AFI Custom Search

SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Thursday, August 10, 2017

NEWLY-RELEASED KATRINA DAY 7 RECORDING: MORE PROOF FEDERAL AGENCIES KNOWINGLY STOLE LEADER TECHNOLOGIES’ SOCIAL NETWORKING INVENTION

Bush, Chertoff, Army, FEMA, DHS relied on Leader’s invention for post-Katrina life saving after government systems had failed

In secret, FBI Mueller and DHS Chertoff were illegally spying on Americans using Leader’s invention via Project Stellar Wind

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Aug. 10, 2016, Aug. 18, 2017 | PDF
Bookmark: #miller-act-good-white-house-service
BREAKING! Aug. 17, 2017:
The White House accepted
delivery of the Leader / McKibben
MILLER ACT NOTICE on
July 28, 2017 4:09am by M NADO
George W. Bush oversaw the expansion of warrantless surveillance of Americans
Fig. 1 – George W. Bush, like his JAmes P. Chandler co-collaborators Bill Clinton and Barack Obama, oversaw the dramatic expansion of illegal warrantless surveillance for the Deep State shadow government. Tellingly, Robert S. Meuller, III was Bush's FBI Director. It now appears that Meuller was given free reign to collect personal data and papers to blackmail members of Congress, the media, the bureaucracy and the Courts, in collusion with crony insiders within the military-industrial complex. Given the incompetence and foot dragging surrounding the Katrina response, it is evident that federal officials were more interested in making sure their offshore bank accounts were unaffected than they were in rescuing citizens suffering at the Super Dome. Many Louisianians died unnecessarily due to their greed, lust for power and incompetence.
Photo: Newsweek.
President George W. Bush receives a briefing from U.S. Army Lt. General Russel Honore, left, inside the Emergency Operations Center in Baton Rouge, La., Monday Sept. 5, 2005, as Homeland Security Secretary Michael Chertoff, second from right, and Louisiana Governor Kathleen Blanco, right, participate the meeting. The polycom device on the conference table is linked to Leader Technologies alert, conferencing and document management services employed by federal, state and local officials.
Fig. 2 – Pres. George Bush, DHS Sec. Chertoff, LA Gov. Kathleen Blanco being briefed by Lt. Gen. Honoree: From the Bush White House Archives: "President George W. Bush receives a briefing from U.S. Army Lt. General Russel Honore, left, inside the Emergency Operations Center in Baton Rouge, La., Monday Sept. 5, 2005 [Labor Day], as Homeland Security Secretary Michael Chertoff, second from right, and Louisiana Governor Kathleen Blanco, right, participate the meeting." https://georgewbush-whitehouse.archives.gov/infocus/hurricane/photoessays/2005/06.html.
Photo: Bush White House Archives.

(Aug. 20, 2017)—The State of Louisiana and the federal government both came to Leader Technologies in Columbus, Ohio on Aug. 28, 2005 to bail them out after Hurricane Katrina had destroyed their emergency communications systems.

A newly-released recording from Labor Day, Sep. 5, 2005 (Day 7) inside the Louisiana Disaster Response Command Center chronicles the dire straits that state and federal officials were in after Hurricane Katrina made landfall.

Some of the reports in this recording describe whole parishes being cut off without food, fuel, communications and water. One parish said that even after a week, FEMA had not yet come to their aid. By contrast, the efforts of Louisiana's Fish and Wildlife agents with their boats were heroic—they became the front line in the life saving. Other recordings chronicled the nightly death toll.

Katrina Landfall, Day 7, Louisiana Emergency Operations Recording:

https://youtu.be/-GIAPjJsNuA | Raw *.mp4 video file | Raw *.mp3 audio file (7.3 MB) | AUDIO TRANSCRIPT
Fig. 3 – Moderator Andy Kopplin, Chief of Staff to Governor Kathleen Blanco. (Sep. 05, 2005). Louisiana Emergency Operations Center Hurricane Katrina response coordination conference call on Labor Day using Leader Technologies' social networking inventions to communicate with all their federal, state and local first responders and elected officials. Leader Technologies. This recording started at 10:00pm CST whereas the meeting with President Bush and Sec. Chertoff at the same location occurred earlier in the day.

[Editorial: It is just obscene and immoral that the federal government is failing to protect its patent contracts with Leader Technologies, most especially after their heroic efforts in the Katrina Disaster Response. It is equally obscene that the federal government uses Leader's groundbreaking social networking inventions without compensating them. We The People must demand that President Trump honor Leader's Miller Act Notice without delay, see below.]

This recording is an important missing piece of the historical record on Hurricane Katrina heroism, bureaucratic ineptitude, systemic corruption and duplicity.

Leader’s founder Michael McKibben said that Leader finally decided to release the recording after waiting a decade for federal authorities to show any interest in this important piece of history. He said, "Sadly, at least at the federal level, their priorities appear to have been more focused on self-aggrandizement, lining their pockets, spying on their neighbors and 'The Internet of Things' blackmail and bribery to maintain power."

U.S. Government steals from patent holders; legal environment for real inventors has become toxic

McKibben said, "Hindsight is 20-20. This recording is more proof that the federal government has utterly failed to honor its patent contracts with us—even after we busted-butt to help them coordinate the Katrina recovery. While we had our heads down helping save lives —which we were only too honored to do—the FBI, C.I.A., NSA and Facebook, among others, were busy ripping us off and building their castles in 'the cloud.'"

"In fact, when Hurricane Rita hit three weeks later, the U.S. Army Corp of Engineers received their first reports of new levee breaches from local political leaders who were dialed in to Andy Kopplin's nightly briefings using our system. I heard those reports myself in real time that night. You can bet these same greedy federal officials made sure their offshore bank accounts were unaffected while they left Louisiana's citzens to suffer for weeks in the Super Dome."

McKibben sighed, "I listened to the body count report each night from the chief medical officer. For the most part, our respect for the many lives lost in Katrina and Rita is why we have waited a decade to talk about this injustice to Leader. No amount of money can bring those blessed souls back. So, even our trillion dollar Miller Act claim now isn't enough to restore their families. However, with those funds, our shareholders can each shine a light in their communities on the evil and corruption that has overtaken our American Republic."

Federal government has not honored its own patent contracts with Leader

"Despite the fact that we received patents for these inventions two years later, that same government that awarded those patents has systematically failed to honor those patent contracts," said McKibben.

"When their backs were up against the wall after Katrina’s landfall, the federal government begged us for help. This was the largest natural disaster in history. We were only too glad to help. We dropped everything and assigned our engineers 24x7."

Washington, D.C. moral climate: a toxic blackmail brew

"All the while, we now know thanks to courageous whistleblowers like Edward Snowden, Julian Assange, Ted Gunderson, William Binney, J. Kirk Wiebe, Tom Drake, James Bamford ("wrongdoing masquerading as patriotism"), Robert David Steele,  Ed Loomis, John Craine, Kevin Shiff,  Diane Roark, Susan Lindauer and many others that President Bush's FBI Director Mueller and Homeland Security Secretary Chertoff were secretly gathering blackmail data on all American citizens through dubious projects like Stellar Wind. This environment makes rampant blackmail inevitable and the moral climate in Washington, D.C. a toxic brew."

McKibben said, "I am proud to say that our system NEVER went down despite the heavy demand from all of Louisiana's agencies and federal emergency agencies. For example, Fish and Wildlife agents with their boats coordinated rooftop rescues using our system. Hospitals organized. Paymasters worked to get money to people stranded in shelters. Transportation organized buses to get people out of harm's way. Engineering reported the structural damage to bridges and roads. Schools organized new sites for the children. Police coordinated efforts to stop looting. In fact, on the first Thursday after landfall, the looting in New Orleans had gotten so bad that Governor Blanco walked into the call and gave the 'shoot to kill' order. This was life and death."

"No previous technology I know of back then could have done what we did to cover the whole state and the federal agencies so quickly or efficiently. That was the beauty of our innovations."

Trillions of dollars in unpaid benefit are due Leader Technologies

McKibben concluded, "Within two years, we received patents on that technology. And yet, outside of Katrina, the federal government and its crony public-private partners like Facebook have enjoyed literally trillions of dollars in benefits from our inventions without paying us a dime for the privilege."

On Jul. 23, 2017, McKibben and Leader Technologies filed a Miller Act Notice (effectively a lien) with President Trump asking him to compensate Leader for the trillions of dollars in benefits received by the federal government and cronies like IBM, Cisco, Oracle, Google and Facebook without any compensation to Leader and its shareholders.

McKibben emphasized, "President Trump had nothing to do with this theft of our social networking invention. But, the Miller Act requires us to serve our notice to the Executive. That is why it is addressed to him. We look forward to him doing right by the U.S. Constitution where patents and copyrights are the only property right actually written into the Constitution."

See previous post, AFI. (Jul. 24, 2017). Leader Technologies files trillion dollar bond lien on the U.S. government. Americans for Innovation.

We remember the vicitims of Hurricanes Katrina and Rita and their families. May their memories be eternal, and may justice and truth prevail.

* * *

Bookmark: #msm-fake-crises-for-propaganda

New, Aug. 16, 2017: MSM is faking crises —just what Soviet Pravda  did during the Cold War

Mainstream Media creates false flag events in attempts to discredit President Donald Trump, his supporters and to undermine our Republican form of democracy

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Friday, August 4, 2017

PROOF MUELLER COLLUDES WITH DEEP STATE LAWYERS CHANDLER, HOLDER, CLINTON

They wrote 208 pages of DOJ guidelines in 2000 now used to try and destroy President Trump with legal nonsense

They hired State Dept, Hillary Clinton stonewaller—Williams & Connolly LLP—to prosecute their first Espionage case as far back as 1998

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Aug. 04, 2016, Updated Aug. 11, 2017 | PDF
Eric H. Holder, Jr. was found in contempt of Congress and defends Mueller
Fig. 1 – Eric H. Holder, Jr. defends Robert S. Mueller because they are old buddies. Mueller and Holder drafted the rambling 208-page Department of Justice Department guidelines on Economic Espionage crimes with James P. Chandler. They are now trying to hang economic crimes around President Trump's neck after failing in their Russian hoax. The document is so discombobulated that these unscrupulous Deep State shadow government lawyers could convict a ham sandwich with it.
Photo: Getty.

(Aug. 04, 2017)—In Nov. 2000, James P. Chandler, Leader Technologies’ patent attorney turned patent thief, compiled a Department of Justice guideline titled "PROSECUTING INTELLECTUAL PROPERTY CLAIMS." Cleverly buried on page 14 is another excuse for a cabal of Justice Department insiders to collude with impunity named "The Intellectual Property Initiative." Ever heard of it? Neither had we, and we're paying close attention to these Deep State criminals. See Fig. 2 caption.

Bookmark: #muellers-deep-state-gang
The Mueller Deep State Gang
Fig. 2—The Department of Justice document PROSECUTING INTELLECTUAL PROPERTY CLAIMS announced "The Intellectual Property Initiative" (PDF p. 25). However, this "Initiative" never existed, it's fake. It evidently provided collusion cover for the announced participants including Eric H. Holder, Jr., James P. Chandler, III and Robert S. Mueller, III. No documents of the activities of this so-called Initiative could be found.

On Nov. 29, 2011, eleven years later, now Barack Obama's Attorney General Eric Holder made a single reference to it saying "in 1999, during my tenure as Deputy Attorney General – I helped to launch the Department’s first intellectual property initiative." Besides being a false statement (the Initiative was announced in Nov. 2000), it is also misleading since the inititative was a phantom group evidently designed to give their spymaster James P. Chandler a job in the Deep State shadow government, and to prepare the social media technology that he had stolen from his client Leader Technologies for Barack Obama's ascension to the Presidency, which he announced on Facebook on Feb. 10, 2007.
Unfit to Serve:
The personal fortunes that these "public servants" have amassed while employed by the U.S. government prove their utter duplicity and untrustworthiness to serve We the People. See financial disclosures for Holder | Mueller. See Mueller's exclusive offshore Cayman Island holdings, including one fund, Mellon Optima, where Larry Summers' former Harvard professor Benjamin M. Friedman is a director. This "Mellon Optima L/S Strategy Fd LLC" required a minimum $10 million investment.

Try googling it. It's FAKE! It does not exist, except in this document! This guideline appears to be the playbook these swamp rats are using to try and take down President Donald J. Trump. While Chandler's name doesn't appear on the document per se, his trade secrets, economic espionage and intellectual property handiwork is notoriously known to Beltway intelligence, legal and political insiders. See Timeline for verifications.

This remarkable document places a number of Washington, D.C. lawyers together at the beginning of the Clinton Administration in the mid 1990's. Except for Janet Reno who is dead, these same people are currently prominent in the Trump-Russia witch hunt, along with their Deep State partners in the mainstream media, DNC and RNC with whom they collude.

Chandler's collaborators in these 2000 guidelines included Robert S. Mueller, III and Eric H. Holder, Jr. who were then U.S. Attorney and Assistant Attorney General respectively. Their boss was Clinton Attorney General Janet Reno of Waco infamey. They hired Paul Mogin of Williams & Connolly LLP to prosecute their first case under Clinton's and Chandler's freshly minted Economic Espionage Act of 1996, U.S. v. Hsu (this links to the in-depth AFI Timeline for Aug. 28, 1998; please be patient while it downloads).

Discussion of the Hsu case features prominently (27 references to it) in the Chandler-Mueller-Holder-Reno-Clinton document. Insiders say Chandler boasted inside the Beltway about Hsu since it was the first successful conviction under his new trade secrets laws.

Tellingly, four of the Clinton's former Arkansas bodyguards (C. LeBleu, T. McKeaham, R. Williams, S. Willis) were shot in the head, execution style, at Janet Reno's Waco attack. And, Williams & Connolly LLP is the law firm hired by Barack Obama's State Department who stonewalled Congress during Hillary Clinton's private email server testimony as well as Lois Lerner's IRS stonewalling about the political targeting of the Tea Party.

Of course, in light of the current misconduct among these same individuals (save the murderer Reno, she's dead), can this collection of former Clinton Administration characters is purely coincidental?

David Goldstone. (Nov. 01, 2017). PROSECUTING INTELLECTUAL CRIMES November 2000. U.S. Dept. of Justice.
Fig. 3—Title page of the rambling 208-page Protecting Intellectual Property Crimes guidelines (Nov. 2000).

Click here to download the 208-page Chandler-Mueller-Holder guidelines.

What Chandler failed to disclose to Leader Technologies is that he was feeding Leader’s social networking invention to the Deep State shadow government at the same time. See previous post.

In the ultimate irony, Chandler was stealing Leader Technologies’ social networking invention just as he was busily drafting a rambling 208-page guideline for prosecuting intellectual property crimes—like the very same crimes he was committing against his client Leader Technologies.

The Chandler-Mueller-Holder document is a joke: It could be used to indict a ham sandwich

The crimes reviewed in the document include counterfeiting, infringement of patents and copyrights, theft of trade secrets, bootlegging, organized crime, and economic espionage.

Chandler announced in the document "The Intellectual Property Initiative" with Eric H. Holder, Jr., then Deputy Attorney General and Robert S. Mueller, III, then U.S. Attorney. This Initiative occurred when Janet Reno was Attorney General and Bill Clinton was president.

Page 14 is the smoking gun (p. 25 in the PDF)—The Intellectual Property Initiative — Chandler's legal playground for rogue Deep State intelligence blackmail thru NSS, IBM, C.I.A., FBI, NSA, NIAC, IBM Eclipse Foundation

David Goldstone. (Nov. 01, 2017). PROSECUTING INTELLECTUAL CRIMES November 2000. U.S. Dept. of Justice.
Fig. 4—Announcement of "The Intellectual Property Initiative" including James P. Chandler, III (not identified but notoriously known to be the author of this document), Eric H. Holder, Jr. and Robert S. Mueller, III, Assistant Attorney General and U.S. Attorney respectively. Note that Chandler's earlier charter to assist the Judiciary with prosecution of economic espionage and trade secrets crimes from 1996 was set to expire on Oct. 11, 2001 (Introduction, pp. 1-2). This phantom "Initiative" allowed him to continue to collude with Holder and Meuller, in the name of 'national security,' of course. Protecting Intellectual Property Crimes guidelines (Nov. 2000), page 14 in the actual document is p. 25 in the PDF file.
Click here to go to the actual page 14, which is p. 25 in the PDF file.

The document is a classical insider discombobulation. It is evidently written by unscrupulous attorneys who intentionally muddy the waters with flowery verbiage that makes it easy for insider judges to make a law say whatever they might find useful later on.

It is legal puffery at its finest. Chandler's and Williams & Connolly LLP's 27 grandstanding references to the Hsu case is a good example.

It includes waffling guidelines for prosecuting and punishing a whole range of crimes that include counterfeiting and economic espionage.

These guidelines are so broad that they could literally be used to indict a ham sandwich.

Notably, credits to Holder and Mueller have been removed at the Justice Department from the current version of these guidelines.

Prediction: Bogus RICO charges are in the Trump Organization's future

We hope we are wrong, but the tea leaves point to Mueller's co-conspirators cooking up RICO organized crime charges (Racketeer Influenced and Corrupt Organizations Act) against the Trump Organization. Why? Because it will embarass the President, and he cannot pardon an organization like he can individuals. It is the strongest set of charges against a company discussed in the guidelines.

This would be insane given all the considerable, proven things that the Clintons, Obama, Rice, Lynch, Podesta, Comey, Mueller, Holder, etc. have been doing.

We the People need to step in and use our Constitutional power over our dysfunctional, failing institutions to fix this.

Tellingly, the guidelines discuss the prosecution of companies with RICO organized crime statutes. Why should we not be surprised if these rogue Deep State legal criminals attempt to accuse the Trump Organization of RICO organized crime offenses to hang around President Trump's neck? This conduct from people in whom we have put our trust for decades is simply outrageous and cannot be tolerated any longer by We The People.

This document referenced in paragraph one proves that the current Mueller investigation of President Trump is illegitimate since Mueller cannot possibly claim impartiality.

Chandler, Mueller, Holder, Reno and Clinton have been colluding for the Deep State since the Clinton Presidency

The Intellectual Property Initiative promoted in 2000 by Chandler, Mueller, Holder, Reno and Clinton is more proof of their intimate political association and agenda.

Further, the Deep State’s promotion of this bogus investigation of President Trump through Google, Facebook and Twitter using Leader Technologies’ stolen social networking invention profoundly discredits these individuals. It also makes them co-conspirators in the theft.

DOJ guidelines to indict ham sandwiches and duly-elected presidents

Click here to download a copy of the 2000 Chandler-Mueller-Clinton-Reno-Holder Department of Justice guidelines to indict ham sandwiches and duly-elected Presidents of the United States.

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Monday, July 24, 2017

LEADER TECHNOLOGIES FILES TRILLION DOLLAR BOND LIEN ON THE U.S. GOVERNMENT

President Trump is asked to compensate Leader for the theft of their inventions by the Deep State shadow government

Leader’s social networking invention was stolen by Clinton’s spy master James P. Chandler in 2000 in order to hijack the Internet

Deep State lawyer notes actually called it a "coup"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Jul. 24, 2016, Updated Aug. 17, 2017 | PDF
The Deep State shadow government has perfected the crony capitalist art of 'public-private' partnership
Fig. 1 – Leader Technologies filed a Miller Act Notice. The real inventor of social networking, Leader Technologies and Michael McKibben, asked President Trump to force technology companies who provide services to the U.S. Deep State intelligence services running rogue operations out of the National Security Staff (NSS), National Infrastructure Advisory Council (NIAC) and the IBM Eclipse Foundation, to pay inventor Leader for the confiscation of their social networking invention since 2000. Bill Clinton's intelligence advisor, James P. Chandler, first learned about Leader invention in Feb. 2002, according to the Miller Act Notice. See Figs. 2, 3 below.
Graphic: Deep State News.

(Jul. 24, 2017)—Citing bombshell lawyer notes of a private conversation, U.S. intelligence insiders called their plan to use stolen social networking technology to take over the Internet a “coup.” Leader Technologies and its founder and inventor, Michael McKibben, served the federal equivalent of a lien on the US government today.

Michael T. McKibben
Fig. 2: Michael McKibben.
Photo: NBC4 WCMH-TV.

Leader CEO McKibben is the true inventor of social networking, as the timeline in the White House notice shows. See Fig. 2 below.

Leader filed a “Miller Act Notice” on the White House at 1600 Pennsylvania Avenue this morning. The Miller Act, 40 USC 3131, requires prime contractors on government contracts to post bonds guaranteeing payment to suppliers. Leader has proven breach of contract and argues that technology suppliers to the the Deep State have benefited from Leader's inventions since 2000 without compensating Leader for those benefits. All this is explained in the Miller Act Notice. Likewise, when your builder doesn't pay the subcontractors, the subs can file a mechanic's lien. The Miller Act is similar, except that the federal government is exempt from having to sell its property to cover outstanding obligations. In lieu of a mechanic's lien, federal contracts require surety bonds.

Bookmark: #mckibben-battle-for-the-soul-of-america

New! Aug. 03, 2017: McKibben: Battle for the Soul of America

Fig. 3: Michael McKibben—Battle for the Soul of America. Mike McKibben explains how Leader Technologies discovered that their patent attorney, James P. Chandler, stole their social networking invention and fed it to IBM and the Deep State rogue shadow government. He also describes his former work in the former Soviet Union where he observed the death of the globalist assault on Christianity in Russia, which is now being repeated in America. https://youtu.be/dqdo2WuhPX0 | Raw *.mp4 video file | VIDEO TRANSCRIPT

The timeline also reveals disturbing long-time collusion of Leader’s former patent attorney, James P. Chandler, with the White House ever since Bill Clinton's presidency, right through George Bush and Barack Obama. It also shows his collusion with rogue intelligence operatives in the NSA, CIA, FBI and with IBM, among others. Perhaps this is why former executives from these agencies are speaking out against President Trump right now? They are attempting to hide this collusion?

Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 4—MILLER ACT NOTICE TIMELINE contained in Leader Technologies' Miller Act Notice served on the White House on Jul. 24, 2017.

Leader shows how the U.S. government stole its social networking inventions through Chandler, who was also Bill Clinton’s intelligence advisor. The timeline also reveals a disturbing pattern of collusion among rogue elements of the FBI, NSA and CIA with private industry that included former director Robert Mueller. Mueller is now leading the ever-expanding Donald Trump Russia collusion witch hunt.

Leader demands payment for 17 years of government theft

Bookmark: #miller-act-notice-receipt-confirmed
Michael T. McKibben. (Jul. 28, 2017). Miller Act Notice USPS Tracking Results for EL 028735568 US signed by M NADO 4:09am EDT.
Fig. 5: Miller Act Notice, July 28, 2017 service confirmation for EL 028735568 US, signed by M NADO 4:09am EDT.
Source: U.S. Postal Service.

Leader says the damages are valued at least $40 billion for historical damages, which they say is not actually close to the real number, and $184 billion per year in ongoing annual license fees. It appears that these amounts will be paid by the surety bond holders who supply the federal government's intelligence apparatus, companies like IBM, Microsoft, Xerox, etc. This puts the payout in the coming years at well over one trillion dollars. The claim is after taxes, which means the government may generate $20 billion or more per year in taxes from this claim as the bond holders pay out.

Former defense secretary Robert M. Gates said in his book Duty that this rogue White House National Security Staff operation had already engulfed the White House during his tenure. He said it had grown from 50 under Clinton to 350 under Obama—a 700% increase. It appears that the primary goal of this surveillance is blackmail. National security has only ever been the excuse to consolidate the Deep State shadow government’s power.

Leader’s lead inventor, Michael McKibben, said “many investigators from around the country have been working on this notice for a long time. He also said that "numerous prominent whistleblowers have helped fill in the pieces of the puzzle.”

McKibben said he will be making a statement in the next few days. He emphasized that President Trump had nothing to do with the theft of social networking, but his predecessors Clinton, Bush and Obama did.

“On behalf of myself and my shareholders, I ask President Trump to correct the injustices we have suffered at the hands of an un-elected, rogue shadow government that has evidently hijacked the Internet to try and maintain their power.” McKibben said all he has ever wanted was a level playing field as promised in the U.S Constitution. Instead, he has encountered only crony capitalism where the winners and losers are predetermined and the courts are rigged. “In our experience, 'Deep State shadow government' is an accurate description for what we have uncovered,” he said. “I am asking the President to finally do right by me, my investors, private property rights, the U.S. Constitution and the Rule of Law.”

Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline
Fig. 6—JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben's social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer's right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.

Regarding the current Russian narrative, McKibben has a unique perspective.

Russian collusion—Yes! Proven for Hillary, Bill, Podesta, Google, Intel and cisco

See the facts:

McKibben said, “It is too easy for Americans to simply yell 'The Russians!' because relatively few Americans go there, much less fly to the Crimea, for example, and verify the stories. So, it is safe to make up lies and never get caught. By the way, I have actually been to the Crimea. I have met families who lost their loved ones in Stalin's mass starvation of up to 10 million Ukrainian Christian farmers (as much as 25% of the population) who were resisting Communism in 1932-33 (Holodomor)."

McKibben continued, "several PROVABLE RUSSIAN FACTS are that Bill Clinton was paid $500,000 for a Renaissance Capital speech in Moscow on Jun. 29, 2010, according to Hillary Clinton 2010 financial disclosure. Another proven fact from the Massachusetts Secretary of State corporate filings is that John Podesta was a director of Joule Unlimited in Boston when Putin’s company Rusnano invested $35 million.” See below:

Bookmark: #real-clinton-podesta-deep-state-russian-collusion

Real Clinton, Podesta, Deep State Russian Collusion

Hillary Clinton. (May 15, 2011). Form 278 Financial Disclosure, 2010, p. 8, item 3. Office of Government Ethics.
Fig. 7 – Hillary Clinton's 2010 Financial Disclosure, page 8, item 3, discloses Bill's $500,000 Renaissance Capital speech in Moscow. Click here to see Page 8 of Hillary's OGE Form 278 Financial Disclosure for 2010.
Joule Unlimited. (Dec. 31, 2011). Annual Report for Joule Unlimited Technologies Inc., John Podesta, Director. Fed. EIN 000960688MA. Secretary of the Commonwealth of Massachusetts.
Fig. 8 – Joule Unlimited. (Dec. 31, 2011). Annual Report for Joule Unlimited Technologies Inc., John Podesta, Director. Fed. EIN 000960688. Secretary for the Commonwealth of Massachusetts. Click here to see Page 2 of the Joule Unlimited 2010 Annual Report to the Secretary for the Commonwealth of Massachusetss.

“Those engagements clearly broke U.S. law and showed the Russians that American values are equally as corrupt as theirs. It is utterly immoral that Obama, Clinton and their Deep State cohorts allowed this to go on with no accountabilty or consequence.”

McKibben believes that the shadow government elitists who stole his social networking inventions are projecting their sins onto Donald Trump as a smoke screen. He says, "it's a red herring, in my opinion."

In the 70's and early 80's, McKibben, a civil engineer and former professonal musician, took contemporary Gospel music groups named Living Sound into Poland and the Soviet Union at the height of the Cold War. He said, "while Leonid Brezhnev was still ruling, honest Soviet citizens sacrificed greatly to achieve some unprecedented results from that work, including organizing our Gospel music performance on national Soviet TV, our music being included on the official 1980 Moscow Summer Olympics film, and the distribution of up to one million Living Sound EPs in 1981."

McKibben says he may have even encountered a young KGB officer named Vladimir Putin at a Leningrad airport security checkpoint where he was body searched after meeting with a Christian activist in Estonia whose sole crime was the anti-Soviet organizing of Christian concerts, and had just been released from prison. Putin was in charge of monitoring foreigners in Leningrad then.

McKibben said in recent years Vladimir Putin says he has come to embrace the Christian faith that he once persecuted. "I hope and pray that is true," said McKibben, who counts John Paul II (now sainted) among his friends and patrons from his work in Poland. "In 1995, I met the late Russian Patriarch Alexy and the current Patriarch Kirill. I also participated in one of the first Church processions allowed in the streets of Moscow since 1917. It was a moving event. We stopped at Lubyanka Square (the former KGB headquarters—infamously known as the "Gateway to the Gulag" through which millions of citizens were sent to their deaths), just after the mass murderer Dzerzhinsky's statue had been toppled and a rough-hewn cross had been strapped to its base. We sang the Orthodox Christian funeral hymn 'Memory Eternal' remembering the martyrs of the Gulag. I will never forget it."

"Mr. Putin's conduct appears contradictory, but such contradictions are not unique to Russians! The closet Muslim Barack Hussein Obama told us before the 2008 election that he was a Christian too. That was evidently a heinous lie. Time will tell regarding Mr. Putin. Jesus said you will know people's real values by the fruits of their actions, not their words."

“Do I blame the Russian government for trying to engage Clinton and Podesta? No. Everyone has known for decades that is what they do. But, to demonize the whole country of Russia is absolutely ridiculous. I know scores of honest, ethical Russians. I watched some of my Russian friends serve prison terms in the U.S.S.R. for standing up for truth and against the lies in their communist society. The grandfather of one friend came out of the Gulag with tuberculosis after suffering for over five years in 10 Soviet prisons and camps. His grandpa died at age 34 from that tuberculosis. What was his grandpa's crime? Befriending American soldiers from the 69th Infantry Division who took him in off the streets after he was liberated from a German slave labor camp.”

"America was called by God to set a higher ethical example for the world. We desperately need to get back to our roots."

"Do I blame Clinton and Podesta for cutting secret deals with the Russians while she was Secretary of State in order to enrich The Clinton Foundation and their globalist agenda? Yes—absolutely!"

Rogue Spy Blackmail Scheme

“Even the FBI admitted recently that not a single terrorist has been stopped by the illegal dragnet surveillance that they set up using our social networking inventions. But it stands to reason that these bad guys have used this data for blackmail, as many whistleblowers now affirm. They evidently have the dirt on many in Congress and the Courts. We need some sort of truth and reconciliation commission to sort out this rogue spy blackmail scheme.”

“God gave us a reprieve with the election of Donald J. Trump. With the funds we are demanding we will finally have an opportunity to introduce our social networking invention in the right way—a way that keeps what everyone likes about social networking, and also respects our Fourth Amendment rights to privacy from unlawful government intrusion,” McKibben concluded. "We fought a revolution over this issue! Why would we give it up now?"

Click here to download a copy of Leader/McKibben’s Miller Act Notice just served on the White House.

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Friday, June 30, 2017

CISCO IS A KEY ENABLER OF THE DEEP STATE SHADOW GOVERNMENT

Cisco CEO John Chambers built back doors into his I nternet routers, donated $5 million to The Clinton Foundation, and paid $1 billion into the Obama/Hillary "Russian Reset"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Jun. 30, 2016, Updated Jul. 25, 2017 | PDF
John T. Chambers, CEO, Cisco, speaking at the Clinton Global Initiative (CGI) on Sep. 25, 2013
Fig. 1 – John T. Chambers, CEO, Cisco Systems. Chambers is emerging as a central organizing figure in the rogue C.I.A. Deep State shadow government's takeover of the American Republic. Here he is as special guest of Bill and Hillary Clinton at the Clinton Global Initiative (CGI) on Sep. 25, 2013. Chambers donated up to $5 million to the Clintons and donated $1 billion to the Hillary/Obama "Russian Reset" to promote Russian technology.
Photo: Hollywood Reporter.
Bookmark: #deep-state-goldstein
Andrew D. Goldstein
Andrew D. Goldstein
Assistant U.S. Attorney; Mueller Russia probe appointee; JPMorgan attorney; failed to prosecute any Wall Street executives
Breaking News! Jul. 03, 2017: New Mueller counsel tied to $13 billion Obama JPMorgan "slush fund"
Robert S. Mueller's appointment of Assistant U.S. Attorney Andrew D. Goldstein (Yale Law, Reg. No. 4585675, formerly Paul Weiss LLP,[*] now Jeh Johnson's law firm) must be rescinded due to Goldstein's personal DOJ conflicts of interest. Goldstein also worked for U.S. Attorney Preetinder Bharara who was recently fired by President Trump. On Oct. 28, 2008, JPMorgan recieved a $25 billion TARP bailout from the U.S. Treasury, managed by Larry H. Summers under Barack Obama. On Mar. 09, 2009, five months later, Goldstein represented JPMorgan Chase and Ford Motor Company against a small NY brokerage firm involving a $20 million transaction. In 2010, Goldstein then joined Preet Bharara's U.S. Attorney's office. On Nov. 19, 2013, JPMorgan settled with Attorney General Eric Holder for $13 billion with no prosecutions of JPMorgan executives by either Bharara or Goldstein. Some experts called this JPMorgan settlement money an Obama political "slush fund." JPMorgan CEO Jamie Dimon had met secretly with Attorney General Eric Holder before the settlement. These close Deep State associations unmistakably tie Goldstein to Clinton-Obama Deep State collusion, and should disqualify him. This is more evidence that Rod Rosenstein and Mueller are organizing a hit job on President Trump. See previous post.

[*] Goldstein's work history at Paul Weiss LLP before 2010 is very evidently censored.

ORIGINAL POST

(Jun. 30, 2017)On Jun. 19, 2017, President Trump hosted a roundtable of technology and academic elitists. Perhaps unknown to President Trump and his agency heads is the fact that these companies have been working for decades to undermine the American Republic in favor of a globalist New World Order run by unelected bureaucrats and multi-national corporations.

Fig. 2: President Trump hosts an American Technology Roundtable as the White House on Jun. 19, 2017. https://youtu.be/v6kB7gO0Ejk | Raw *.mp4 video file | VIDEO TRANSCRIPT

The original authority for this Deep State shadow government Internet collusion is Executive Order 13231 which has been renewed six times by Presidents Bush and Obama. It is due for another renewal on Sep. 30, 2017 as Executive Order 13708.

If Executive Order 13708 is not renewed by Sep. 30, 2017, these Deep State conspirators will be officially rogue—having lost their dubious legal authority to support the White House's National Security Staff (NSS). These devious individuals have hidden their collusion in a mountain of government intelligence legalese that promotes "public-private partnerships"—in the name of national security, of course. Their collusion has been cleverly hidden from Congress and the public by stamping "classified" on almost everything they have done since Bill Clinton came to power in 1993. According to former Defense Secretary Robert Gates in his book Duty (2014), the NSS staff ballooned from 50 in 1993 to over 350 in 2016 under Obama. That is a lot of spies running around in the White House! Are they doing The People's business? That is doubtful.

The question is, for whom have they been spying? The answer is evident: Deep State globalists working for a U.N. New World Order run by the very multinational corporations, academics, intelligence agencies and media who comprise this "public-private partnership" of elitist spies.

The NSS is a rogue C.I.A. spy operation run out of the White House without Congressional oversight to which the 17 other intelligence operations, including the NSA and FBI, are subservient.

The NSS has numerous tentacles into policy, funding, intelligence, media, academia, judicial, research and development—all sustained by a long string of dubious "national security" executive orders from Bill Clinton through George Bush and Barack Obama. Note: AFI researchers interviewed a very prominent member of the judicial community in preparation for this post. He had no awareness of this unConstitutional exploitation of intelligence executive orders. Therefore, spread the word.

  1. Policy & Funding—National Infrastructure Assurance / Advisory Council (NIAC) and the “safe harbor” concept to get around the Fourth Amendment, which prohibits unreasonable searches and seizures. It requires governmental searches and seizures to be conducted only upon issuance of a warrant, judicially sanctioned by probable cause.
  2. R&D—The IBM Eclipse Foundation and theft of social networking invention from Leader Technologies to get around the Fifth Amendment, which protects personal property from confiscation by the government without fair compensation.
  3. Funding—Wall Street, offshore money laundering & drugs. See HSBC / SwissLeaks / Comey / Mueller. See also The Panama Papers.
  4. Media— NPR, New York Times, CNN, Washington Post hide behind the First Amendment to disguise their role as Deep State propagandists. See backdoor keys.
  5. Blackmail—C.I.A., FBI, NSA, use of pedophilia & ritual child sacrifice
  6. AcademiaHarvard, Yale, Stanford, Columbia, GWU, Ohio State M.O.O.C. (Massive Open Online Course—Deep State takeover of universities), Carnegie Mellon
  7. Judicial—Secret FISA Court exploitation and the “safe harbor” mutual fund concept for hiding bribery of judges and getting around judicial ethics prohibitions against the 'appearance of impropriety'

The White House roundtable participants gather regularly around the world in various forums (likely seditious) to further their anti-American globalist agenda in places like Bilderberg, Davos, Tri-lateral Commission, In-Q-Tel, IBM Eclipse, NIAC, NVCA (National Venture Capital Association), World Bank, IMF, Federal Reserve, Council on Foreign Relations (CFR) and the Brookings Institution.

"Ok, Houston, we've had a problem here"

This was the message that Apollo 13 Command Module Pilot Jack Swigert radioed to earth after an explosion in their spacecraft.

This Roundtable group almost universally backed Hillary Clinton for President. A president Hillary would have renewed Executive Order 13708 by Sep. 30, 2017.

However, without that renewal, the decades of digital sedition that has hidden under these executive orders will officially go rogue. The roundtable group members will have no legal authority to operate their warrantless surveillance of Americans and their unConstitutional theft of our privacy.

Said another way, the decades of collusion that have led us to the cliff of The New American Surveillance State will have no legal legitimacy whatsoever come Sep. 30, 2017.

Indeed, like Apollo 13, these conspirators just heard an explosion inside their own “command module.” They have a serious problem.

After September 30, 2017, unless President Trump offers them some sort of amnesty these people will be in trouble. They will need to disclose anyone who is 'blackmailing' them, or their Deep State collusion will likely land substantial numbers of the technology world in prison for treason and sedition. Indeed, former C.I.A. leader turned whistleblower Robert David Steele recommends that President Trump implement such a "truth and reconciliation" program to help fix the rampant rogue spy-generated blackmail that has overtaken our public institutions.

Officially criminals after Sep. 30, 2017

On Sep. 30, 2017, all of the companies and individuals who have colluded with the rogue C.I.A. / NSA / FBI and NSS in the White House to spy illegally on the American people will be officially criminals because they will no longer have the dubious executive order protections they have relied on since 1999 when these shadow government executive orders were instituted. (The first version of the NIAC, Executive Order 13130 was implemented by Bill Clinton on Jul. 14, 1999.)

How bad is it?

President Trump asked each Roundtable participant to introduce himself or herself. AFI researchers have compared that list of attendees to various other collusion membership lists compiled for the AFI TIMELINE:

People you trusted are now hijacking the Internet.

What emerged is a list that we have named the “Deep State Hive Mind Index.” "Hive mind" as in "groupthink." We have hard evidence of this groupthink, in which the desire for harmony or conformity in the group results in an irrational or dysfunctional decision-making outcome. We believe this explains the globalist New World Order elitist drive to seize power and control, at all costs.

The Deep State Hive Mind Index

We coined the term “Deep State Hive Mind Index” as a way to determine the relative contributions of the various actors involved in this massive collusion. Clearly, some of these players are more central to this hive mind than others.

Membership in the following Deep State shadow government activities were each given a “1” value, and Clinton speaking fees were given a “1” for each speech. Ohio State's Trustee President Jeffrey Wadsworth manages numerous intelligence units as CEO of Battelle Institute and therefore classifies Ohio State as a C.I.A. agent.

Ohio State is also the network hub for M.O.O.C. (Massive Open Online Course)—an evident agent of the Deep State shadow government to steal university research data and brainwash students using advanced C.I.A. MKUltra mind control techniques like virtue signaling and trolling. MKUltra never stopped despite Congress' order to shut it down. "Conspiracy theory!" you say? Open your eyes. Such reactions have been effective in hiding this diabolical program in plain sight. This is not 'conspiracy theory' if it is true. See FBI superstar Agent In Charge Ted L. Gunderson whistleblower revelations.

Criteria for the creation of the Index below:

  1. Policy & Funding: National Infrastructure Assurance / Advisory Council (NIAC), the “safe harbor” concept to circumvent 4th Amendment privacy protections; safe harbor protections will expire on Sep. 30, 2017 which will likely and immediately expose all NIAC contributors to treason and sedition charges
  2. FBI backdoor: On Jun. 07, 1993, Podesta and James Chandler sponsored CRYPTO 1993 to give the FBI a backdoor key to the Internet
  3. Judicial bribery: the “safe harbor” mutual fund concept
  4. R&D: IBM Eclipse Foundation and the theft of Leader Technologies’ social networking invention
  5. NSA backdoor encryption: NIST registration of backdoor keys. See also Dell ships backdoor keys
  6. Financing: In-Q-Tel / C.I.A. / Wall Street / Silicon Valley
  7. Gov’t contracting: using procurement to enforce conformity to the rogue agenda
  8. Blackmail data collection: Warrantless Surveillance (Snowden)
  9. Blackmail exploitation: Obama donors and  insiders. See Feb. 17, 2011 and Mar. 02, 2015.
  10. Blackmail exploitation: Clinton Foundation donors and insiders. See also The Clinton Chronicles
No. WH Roundtable Participants
Jun. 19, 2017
Deep State Hive Mind Rating
1 [Cisco] (conspicuously absent, see below) [15]
2 Oracle 11
3 Facebook, Clarion, Palantir / CIA 10
4 IBM / CIA 10
5 Microsoft 10
6 Amazon, Washington Post / CIA 8
7 Apple 8
8 Google, Alphabet 8
9 Kleiner Perkins / CIA 8
10 Ohio State / Battelle / CIA 8
11 Palantir, NSA, In-Q-Tel / CIA 8
12 Qualcomm 8
13 Carnegie Mellon U, Hoover Institution, Stanford 7
14 Intel 7
15 MIT 7
16 VMWare, Dell, EMC 7
17 Accenture 6
18 Akamai 6
19 MasterCard / AOL 6
20 SAP 6
21 Adobe 5
22 OpenGov 5
23 UNC 5
Table 1: White House Technology Roundtable Participants (Jun. 19, 2017).

What is the Deep State Hive Mind?

Is the adoption of the “Eclipse” symbolism merely coincidental? Or, is it intentionally selected Islamic symbolism signaling the unholy alliance between the globalist New World Order has and jihadi Islamic extremists?

One notable trend among these collaborators is their near universal involvement in the IBM Eclipse Foundation started on Nov. 29, 2001. This foundation distributed the social networking invention of Columbus innovator Leader Technologies at no charge to the entire tech community. Of course, embedded in that code were Deep State requirements for backdoor keys and quid pro quo data sharing.

Sacrificed morals for power and money

Evidently, these people sacrificed their morals and ethics to establish this unconstitutional and depersonalized “Internet of Things” to spy on you and steal all your best ideas to exploit among the hive mind elitists.

These people are like a hive of drone bees buzzing around their corrupt Queen Hillary.

Tellingly, Barack Obama even promoted the “Internet of Things” in his Executive Order 13718. They probably thought no one was paying attention.

Misprision of a Felony: Did the roundtable participants commit a felony by not disclosing their Deep State collusion to the President?

The law is clear. It is a felony to have knowledge of fraudulent activity involving a contract with the federal government and not disclose it.

18 U.S. Code § 4 - Misprision of felony

“Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority [including the President and his agency chiefs] under the United States, shall be fined under this title or imprisoned not more than three years, or both.”

Each of these Deep State participants has contracts with the federal government.

By remaining silent about their decades of fraud and crony capitalist collusion, is not each person who introduced himself or herself to President Trump guilty of misprision of a felony? In the opinion of our legal experts, yes.

Why was the Deep State digital kingpin Cisco absent? Good Question.

Conspicuously absent from the White House meeting is one of the Deep State kingpins—Cisco and its chairman John T. Chambers.

Peter A. Thiel
Peter A. Thiel
Facebook director & major shareholder, funded Zuckerberg's first $500,000 in 2004, founder of PayPal, co-founder of Palantir NSA / C.I.A. spy software

We digress for just a moment to give readers more context for the insidious Washington, D.C. corruption machine. Also missing the roundtable was Facebook's Zuckerberg or Sandberg. However, since Peter A. Thiel is a director and major shareholder of Facebook, they were present, even if not introduced. This does not even consider that all or nearly all of the companies who did attend collude with Facebook. See Jim Cramer's CNBC rant about Peter Thiel's unethical sale of Facebook IPO stock on May 22, 2012. Also present were former Goldman Sachs executives who were the primary underwriters for the Facebook stock offering that substantially funded the Deep State.

The Facebook initial public offering provided hundreds of billions of dollars for the Deep State's campaign of bribery and collusion. For example, all of the Leader v. Facebook judges cashed in.

Remember, the real purpose of Facebook and Google is to be a rogue C.I.A. global spy data collection system for the Deep State shadow government to manipulate and control you—the wolf—who comes into your home dressed in the sheep's clothing of coupons, titillation and baby pictures—very devilish, insidious and effective. Isn't that right Alexa? (The voice of Google Home.)

Bookmark: #nsa-strategic-partnerships
News Update! Jul. 09, 2017: Snowden NSA documents prove Cisco, IBM, Google, Facebook helped lead the Deep State takeover

Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 12. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 102: "NSA Strategic Partners, Alliances with over 80 Major Global Corporations Supporting both Missions: Telecommunications & Network Service Providers, Network Infrastructure, Hardware Platforms Desktop/Servers, Operating Systems, Applications Software, Securty Hardware & Software, System Integrators: AT&T, CISCO, EDS, H-P [HP, Hewlett-Packard], IBM, Intel, Oracle, Qualcomm, Microsoft, Motorola, Verizon").
Fig. 3Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 15. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 102: "NSA Strategic Partners, Alliances with over 80 Major Global Corporations Supporting both Missions: Telecommunications & Network Service Providers, Network Infrastructure, Hardware Platforms Desktop/Servers, Operating Systems, Applications Software, Securty Hardware & Software, System Integrators: AT&T, CISCO, EDS, H-P [HP, Hewlett-Packard], IBM, Intel, Oracle, Qualcomm, Microsoft, Motorola, Verizon").
Bookmark: #nsa-strategic-partnerships
Cisco updated switch software to fix rogue NSA problems

Greenwald. (May 14, 2014). Edward Snowden NSA archive Documents from No Place to Hide, PDF page 64. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 150: Cisco provided software to fix NSA problems
Fig. 4Glenn Greenwald. (May 14, 2014). Edward Snowden NSA archive Documents from No Place to Hide, PDF page 15. Glenn Greenwald / MacMillian (Glenn Greenwald, p. 150: Cisco provided software to fix NSA problems).
Bookmark: #nsa-social-collusion
Deep State social spy net: social providers agreed to share their user data in exchange for profits

Edward Snowden. (Jun. 06, 2013). On Jun. 06, 2013, thanks to NSA Whistleblower Edward Snowden, we learned that all the large online 'social' hardware, software and telecommunications providers were creations and certainly tools of their U.S. government spy state cronies. This strategy was hatched during the Clinton administration by his spy master advisor, Harvard law professor James P. Chandler, later Leader Technologies' patent attorney. AT&T played too.
Fig. 5Edward Snowden. (Jun. 06, 2013). On Jun. 06, 2013, thanks to NSA Whistleblower Edward Snowden, we learned that all the large online "social" hardware, software and telecommunications providers were creations rogue C.I.A. This strategy was hatched during the Clinton administration by his spy master advisor, Harvard law professor James P. Chandler, III, later Leader Technologies' patent attorney. The companies revealed are Microsoft (9/11/07), Yahoo (3/12/08), Google (1/14/09), Facebook (6/3/09), PalTalk (12/7/09), YouTube (9/24/10), Skype (2/6/11), AOL (3/31/11), Apple (added Oct, 2012—one year after Steve Jobs died, replaced by former IBMer Timothy D. Cooke. AT&T also participated, see Fig. 3 above.
Bookmark: #nsa-cia-exploit-it-all
Rogue C.I.A. / NSA Lawless Admission: "Exploit it All"

Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 5. Glenn Greenwald / MacMillian. (Greenwald, p. 97: "New Collection Posture: Sniff it All. Know it All. Collect it All. Process it All. Exploit it All. Partner it All").
Fig. 6Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 5. Glenn Greenwald / MacMillian. (Greenwald, p. 97: "New Collection Posture: Sniff it All. Know it All. Collect it All. Process it All. Exploit it All. Partner it All").
Bookmark: #deep-state-admits-racketeering
Deep State colluders admit racketeering: "a lot of money being made by U.S. entities"
Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 96. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 167b: NSA admission: "Let's by blunt—the Western World (especially the US) gained influence and made a lot of money via the drafting of earlier standards.  –The US was the major player in shaping today's Internet. This resulted in pervasive exportation of American culture as well as technology. It also resulted in a lot of money being made by US entities.").
Fig. 7Glenn Greenwald. (May 14, 2014). Snowden NSA archive Documents from No Place to Hide, PDF page 96. Glenn Greenwald / MacMillian. (Glenn Greenwald, p. 167b: NSA admission: "Let's by blunt—the Western World (especially the US) gained influence and made a lot of money via the drafting of earlier standards. –The US was the major player in shaping today's Internet. This resulted in pervasive exportation of American culture as well as technology. It also resulted in a lot of money being made by US entities.").

See TIMELINE for more Snowden proofs of government collusion with the private sector -- unConstitutional crony capitalism at its zenith. (Please be patient! The Jun. 06, 2016 bookmarked timeline entry for Edward Snowden will load automatically.)

Cisco has helped lead the Deep State technology collusion

John T. Chambers
John T. Chambers

From 2002-2006 Cisco’s CEO John T. Chambers was vice chair of the National Infrastructure Assurance Council (NIAC) started under Bill Clinton as the main policy arm of the rogue C.I.A.’s takeover of the Internet. It was during this period that IBM and Cisco conspired with the rest of the technology world to steal Leader Technologies’ social networking invention and convert it to a global spying platform.

These were also the formative years following the Deep State’s rogue C.I.A. orchestration of the 9/11 false flag and The Patriot Act. This council was established under Clinton/Podesta in 1999 and tasked to set policy for the Deep State shadow government's “Internet of Things” global spy grid.

Cisco’s timeline shows that they were helping lead the development of the rogue C.I.A. surveillance system—almost completely outside the oversight of Congress and the American People. It also shows that Cisco has been a central figure in the Clinton-Obama-Soros-Russia axis:

Bookmark: #chambers-cisco-treason-sedition
Cisco/Chambers score the highest—15 on the Deep State Hive Mind Index (see Table 1)
1993 Steven Wolff (later Cisco) collaborated with the Clintons, Podesta, Summers, Sandberg, Albright, Milner and World Bank to give the FBI a backdoor encryption key to all digital traffic and content; media attending were: NPR, New York Times, Washington Post
1997 Chambers/Cisco teamed with IBM, Microsoft, Intel and Wind River to build backdoors into all hardware and firmware for the "Internet of Things" offshore, in Italy, via Eurotech, Ltd.
1999 (Jul 14) Chambers/Cisco secret member of NIAC, v. 1
(Executive Order 13130, under Clinton)
2001 (Oct 16) Chambers/Cisco, secret member, NIAC, v. 2
(Executive Order 13231, under Bush)
2001 (Nov 29) Chambers/Cisco, secret member, IBM Eclipse Foundation
2002-2006 Chambers/Cisco, appointed vice chairman of NIAC (under Bush)
2005 (Sep. 02) Bill Clinton broker the UrAsia uranium mining rights in Kazakhstan for friend Frank Giustra
2006 (May 18) Chambers/Cisco paid Bill Clinton $150,000 for speech in Monterey, CA
2006 (Aug 17) Chambers/Cisco paid Bill Clinton $150,000 for speech in Las Vegas, NV
2007 (Feb 12) Bill Clinton's friend Frank Giustra sold UrAsia uranimum mining to Uranium One for $3.1 billion
2007 (Mar 29) Chambers/Cisco paid Bill Clinton $100,000 for speech in Kiawah Isl., SC 
2008 (Sep 09) Chambers/Cisco, public member, IBM Eclipse Foundation
2009 (Sep 22) Chambers/Cisco donated up to $5,000,000 in Clinton Foundation. See donor list (fn. 320)
2010 (Dec 29) Hillary identified Cisco in stonewalled emails on her illegal private server along with other Deep State Hive Mind conspirators Yahoo, Ebay, Semantec, MicroTech, FCC, Ford Foundation, Microsoft, Apple, Safaricom, Ushahidi, Twitter, Square, Google, Mobile Accord, Carlos Slim, HowCast, Mo Ibrahim Foundation, Mextel, NYU, Harvard. The notes of this speech were redacted as CLASSIFIED by the State Department
2010 (Jun 27) Chambers/Cisco committed $1,000,000,000 (one billion) in Skolkovo, Russia to Obama/Hillary’s 'Russian Reset' along with other funds from IBM, Google and Intel—now this is REAL RUSSIAN COLLUSION!
2010 (Jun 29) Renaissance Capital, Moscow, Russia, Uranium One underwriter with close Kremlin ties, paid Bill Clinton $500,000 for a speech.
2010 (Dec 17) Secretary of State Hillary Rodham Clinton presented Cisco with the Secretary of State’s 2010 Award for Corporate Excellence (ACE). 
2011 (Feb 17) Chambers/Cisco guest of Barack Obama at an excluse Silicon Valley elitist dinner
2011 (Apr 10) Vladimir Putin's Rusnano company, Moscow, Russia, invested $35 million in Joule Unlimited where John Podesta was a director
2013 (May 29) Chambers/Cisco bought Joulex, Thomas E. Noonan, CEO; also long-time IBM shadow executive, and founding member of NIAC
2014 (Aug 28) Chambers/Cisco paid Hillary Clinton $325,000 for speech in Las Vegas, NV.
2016 (Jan 14) Chambers/Cisco given special access to Hillary Clinton at the State Department; admitted NSA penetration; pretended they were not partnered with the NSA
2016 (Aug 16) Chambers/Cisco admitted to building in C.I.A. / NSA / FBI encryption backdoors in Internet switches for many years
2017 (Mar 21) Chambers/Cisco admitted "critical bug" in 318 Internet switches to hide their decades of Deep State collusion with the NSA / C.I.A. / FBI shadow government; fails to admit these were features built in for the rogue C.I.A., not bugs.
Table 2: John T. Chambers, Chairman & CEO, Cisco Systems collusion with Barack Obama, Bill and Hillary Clinton and New World Order Deep State shadow government globalists.
Bookmark: #niac-power-abuse

How do we know the Deep State abused their bureaucratic power?

The NIAC’s own internal PowerPoint said that’s what they were doing—by design. They clearly state that they will essentially bribe vendors with government contracts to get compliance with the plan:

NIAC. (Nov. 21, 2013). National Infrastructure Advisory Council. Business Meeting Agenda, p. 117. Held at the U.S. Patent Office. DHS.
Fig. 8: PowerPoint Slide (page 117) proves that the NIAC colludes with its public-private partners to muscle technology vendors into compliance with their "Internet of Things." NIAC p. 117 from Nov. 21, 2013 | NIAC 126 pgs. Nov. 21, 2013 Meeting Minutes (4.5 MB)

ZIPPED archive of NIAC Quarterly Business Meeting Minutes from Nov. 26, 2002 to Sep. 16, 2016 (last accessed Jun. 28, 2017) (24.7 MB).

This circumstance is EXACTLY what President Dwight D. Eisenhower warned about in his farewell address to the nation on Jan. 17, 1961.

The military-industrial complex hive members have become New American Tyrants

Bookmark: #eisenhower-warning
President Dwight D. Eisenhower's warning about the rise of a corrupt military-industrial complex
Click video to watch 2 min. 30 secs. of President Dwight D. Eisenhower's farewell address on Jan. 17, 1961
Fig. 9: On Jan. 17, 1961, President Dwight D. Eisenhower warned the world about the dangers for tyranny arising from a military-industrial complex. As the AFI investigation has uncovered, that day came on Sep. 29, 1999 when the C.I.A. began investing in hardware and software companies, thus essentially nationalizing, largely in secret, America's emerging digital infrastructure. This gave the C.I.A. an unprecedented and unaccountable ability to spy on everyone without a warrant. https://youtu.be/orEurY6HdXU | Raw *.mp4 video

These criminals control the mainstream media as their propaganda arm, as Roger Stone so clearly describes in this video just released yesterday.

Bookmark: #roger-stone-on-free-speech
Fig. 10 Roger Stone breaks down key principles of American Free Speech and the First Amendment.

Conclusion

We the People must reassert our power over these criminals who have hijacked so much of our country in their stealth.

Bookmark: #roger-stone-the-three-amigos
In lawyers we trust?
Click the image to read Roger Stone's in depth analysis: "Mueller, Rosenstein, and Comey: The Tree Amigos from the Deep State"
Roger Stone. (Jun. 22, 2017). Mueller, Rosenstein, and Comey: The Tree Amigos from the Deep State. StoneColdTruth.com.
Fig. 11: Roger Stone. (Jun. 22, 2017). Mueller, Rosenstein, and Comey: The Three Amigos from the Deep State. StoneColdTruth.com.

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.