AFI Custom Search

To ensure you are reading the latest post, click the logo above.
SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Wednesday, December 30, 2015

THE GREATEST FINANCIAL CRIME IN HISTORY IMPLICATES EVERY USER OF SOCIAL MEDIA

The theft of social networking dwarfs the collapse of Lehman Brothers, Bernie Madoff and Fannie Mae

The media is silent about the crime because it feeds at the social media trough

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Dec. 30, 2015, Updated Jan. 27, 2016 | PDF
WANTED: Information leading to the conviction of thieves at IBM, Harvard, NSA, Accel Partners, Eclipse Foundation who stole Leader Technologies' social networking invention. REWARD: 10% of up to $1 trillion in recovery of funds (Seriously.)
Fig. 1—Wanted: Whistleblowers.
America cannot tolerate a group of insiders conspiring in secret to undermine our Republic. If you have information that leads to the exposure of these malcontents, you are encouraged to come forward before it is too late. Click here to read the full 1990-2015 Cyber Hijack timeline. The facts don't lie.
Graphic: AFI, Oakdome.
Richard G. Andrews
Richard G. Andrews
News Update, Jan. 15, 2016:
JPMorgan muscling Judge Richard G. Andrews to kill another important patent in Delaware

Judge Richard G. Andrews, Delaware federal district court judge, stubbornly refuses to recuse himself from the Pi-Net/Arunachalam v. JPMorgan patent infringement battle surrounding web transactions. Andrews was appointed by Barack Obama on Nov. 7, 2011.
Leonard P. Stark
Leonard P. Stark, Chief Judge
He has ADMITTED IN AN OPINION that he holds JPMorgan stocks and that he worked formerly for another JPMorgan law firm, Mayer Brown LLP. JPMorgan's Daniel A. DeVito with Skadden Arps LLP (Hillary Clinton's former chief of staff's and chief judge Leonard P. Stark's former firm) is now pressuring Andrews to sanction Dr. Arunachalam for daring to sue JPMorgan. They call her suit "frivolous," like bad guys always do.
Sue L. Robinson
Sue L. Robinson, former Chief Judge
Andrews dug in his heals even after his fellow judge, Sue L. Robinson, recused herself for similar conflicts after ruling against Arunachalam in an important Markman Hearing after only a week on the job. Robinson had helped institute dubious changes to judicial mutual fund reporting in 2001 in the Judicial Conference, with Federal Circuit Executive, Jan Horbaly. These changes have been used as the excuse for judges to not report stock portfolio holdings, like JPMorgan, if they are held inside a mutual fund. We call it the "Mutual Fund Scam." (Eight of the Supreme Court justices hold JPMorgan stocks, but did not recuse themselves in Dr. Arunachalam's petition just denied.) Judges Andrews and Stark, both Obama/Chandler nominees, are central actors in "The Greatest Financial Crime in the History of the World." JPMorgan is their central banker. Click here for Dr. Arunachalam's latest motion. Dr. Arunachalam is the former Director of Network Architecture for Sun Microsystems as the commercial Internet was emerging.
Mar. 26, 2012 Hillary Clinton dinner scheduled with Sheryl Sandberg, Cheryl Mills and Marne Levine, Case No. F-2014-20439, Doc. No. C05789834.
Bookmark: #marne-levine
News Update, Jan. 03, 2016:
Hillary Clinton Dec. 2015 Email release reveals another "All in the (Spy State) Family" cartel member: Marne L. Levine (Deutch)
Marne L. Levine (Deutch), serial employee for Lawrence "Larry" Summers; confesses to having no vision and "meandering with a sense of purpose"
Fig. 2: Marne L. Levine (Deutch), serial employee for Larry Summers ever since her Harvard days in 1993.
On Jun. 24, 2010, three weeks before the Leader v. Facebook trial, Levine left Summers and Obama at the White House and joined Facebook. On that same day, the federal district court in Leader v. Facebook forced out the judge and replaced him with Obama's fresh nominee, Leonard P. Stark. He immediately allowed a new Facebook on-sale bar claim and blocked Leader discovery to prepare a defense. Can anyone say fraud and corruption?
Evidently she was the main dirty tricks legal coordinator between Facebook and the White House during Leader v. Facebook. Turn yourself in Marne. For your children's sake. They will read this sad story one day and wonder why you didn't do the right thing.
i Ricchi Restaurant, 1220 19th St. NW, Washington, D.C. 20036.On Mar. 27, 2012, Hillary organized a private dinner with Facebook / Summers / Obama / Clinton sycophants Sheryl K. Sandberg and Marne L. Levine (Deutch) at i-Ricchi Restaurant in Washington, D.C. Levine is a new name in our Spy State Cartel investigation. Levine's father-in-law, John M. Deutch, is the disgraced former C.I.A. director under Bill Clinton (1995-1996).
John M. Deutch, C.I.A. Director (1995-1996). Marne L. Levine (Deutch)'s father-in-law.
Clinton pardoned Deutch for keeping classified documents on his home PC. Birds of a feather, flock together? Remarkably, Deutch's tenure coincides with James P. Chandler's whirlwind of security law creation and executive order manipulation initiated under Clinton. Could the corruption of Washington, D.C. be Deutch's revenge? He arranged for his son to marry Levine to be his mole? Levine (Deutch) now runs Instagram. Be warned folks. Deutch's unelected people are taking notes and names on both Facebook and Instagram.
Hillary R. Clinton
Sheryl K. Sandberg
Marne L. Levine (Deutch)
Cheryl D. Mills
Hillary's dinner occured four days after IBM sold 750 "junk patents" to Facebook and 21 days before the Patent Office Director and former IBM/Eclipse chief counsel, David J. Kappos, ordered an unprecedented third "reexamination" of Leader Technoloiges patent for social networking (after Leader had won the same arguments four times previously). Earlier, on the same day (Jun. 24, 2010) as the court switched out a veteran judge in the Leader v. Facebook for a fresh Obama nominee, Leonard P. Stark, Levine-Deutch left her position as Larry Summers' chief of staff to go to Facebook. Levine's career clearly stalks Leader Technologies.
At this same time, Clinton's previous emails revealed that she was publishing four "Facebook field guides" for State Department employees. So clearly, there was to be no justice for Leader Technologies. The Hillary-Soros-Summers-Barack New World Order agenda was just too important. Six weeks later, the Federal Circuit ruled against Leader Technologies and protected their Facebook investments.
Levine-Deutch has been a gopher for Larry Summers since 1993. Levine is now chief operating officer at Instagram, where Summers is a director along with Facebook director Marc Andreessen. Click here for downloadable Marne L. Levine Timeline.
Marne L. (a.k.a. "Marnie" Levine (Deutch) employment timeline
Click here to watch Marne L. Levine (Deutch)'s Washington Post "meandering" confession. She is a very confused woman. Meandering purpose? This is nonsense. There's no meandering in her resume, she has gone from one Larry Summers job to another. She has no vision, that is why she struggles in this interview. She does what her man Larry tells her to do. Yet more Instagram-sham (Facebook Jr.). Run folks, before the rats beat you off the ship.

Is MArne L. Levine (Deutch) a truthful woman? (Hint: She is married to the son of disgraced former C.I.A. spymaster, Director John M. Deutch (1995-1996), who like Hillary, kept classified information on his home PC, and would have been gone to jail, but Clinton pardoned Deutch on Bill's last day in office.)

Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live. Marne (aka Marnie) Levine. (Dec. 6, 2012). Facebook VP of Global Public Policy. Washington Post Live.
These photos show a women who's soul and words are in moral conflict. What kind of ethical world is Levine (Deutch) intending to leave for her children whom she purports to care about so deeply. [Gag.] She has left an ethical wasteland in the wake of the theft of Leader Technologies' social networking invention. Her empire is built on a big lie. Gee Mommy, should we do as you say, and not as you do?
Graphics & Photos: U.S. Dept. of State, i Ricchi, AFI, The Washington Post Live.

ORIGINAL POST

(Dec. 30, 2015)—Drug pushers give away free drugs to get users hooked. They know that once hooked, users will beg, borrow and steal money for the next fix.

Similarly, purveyors of social networks give away free services. They’ve learned that the user will stay with them once they become dependent. The mainstream media, for example, has become hooked on the digital drug. This addiction has lured them into silence about the perpetrators of this fraud. They ask no questions, get no answers, and remain silent, or rather, muzzled.

Michael T. McKibben
Fig. 3: Michael McKibben (2013). Photo: WCMH-TV.
Click here for AFI backgrounder on Michael McKibben, the real inventor of social networking.

However, the social world is operating illegally, as we show below. The software invention that enables social networking was the brainchild of Columbus, Ohio innovator, Michael McKibben and his company, Leader Technologies.

Leader and McKibben hold the patents and copyrights, yet have not received a dime of compensation from an invention that rivals Thomas Edison’s light bulb in importance.

Trillions of dollars are owed Leader Technologies

The theft of social networking is without doubt the greatest financial crime of all time. The loss to Leader’s shareholders easily reaches into the trillions of dollars.

This crime dwarfs Lehman Brother’s ($600 billion), Fannie Mae’s ($400 billion), WorldCom ($104 billion) and Bernie Madoff ($65 billion).

Fig. 4—World's Largest Greed-driven Corporate Scandals.
The theft of social networking makes Bernie Madoff's fraud miniscule by comparison.
Graphic: AFI, Oakdome.

perfect storm of greed, fraud and hubris

This crime is the perfect storm of greed, hubris, fraud, opportunity and perverted notions of public service.

It did not happen overnight, it started percolating at Harvard in the early 1990s.

What does this crime mean for you as a user of social networking?

If you are given a car for your free use, but later learn it was stolen, what would you do?

Keep it? No, you’d give it back. Alternatively, you’d pay the rightful owner.

Likewise, you have enjoyed Leader Technologies’ social networking invention for years. Granted, you were lied to about the supposed "open source" nature of the software, but that aside, now that you know, you cannot just keep using it in silent assent to the criminals who stole it.

Now that you know your social platform is ill-gotten gain by your provider, one of three things must occur. Either: (1) you stop using the service and settle up with Leader for past use, (2) you order your provider to settle up with Leader and start paying license fees going forward, or (3) you start paying Leader a license yourself.

How did we get in this mess?

Harvard sycophancy created this crime

In the early 1990s, an ambitious Harvard economics professor named Larry Summers was itching to try out his economic theories somewhere in the world.

Summers saw in the collapsing Soviet economy his opportunity for malevolence.

In 1993, Summers left Harvard and joined the World Bank as chief economist. From this perch he proceeded to shove his half-baked theories down Russia’s throat because they needed the hard currency.

Summers' World Bank recommendations doomed Russia to mob rule since the mob were the only ones with the hard currency to buy Summers' ill-conceived privatization vouchers.

What does this have to do with the theft of social networking, you ask?

Clues: Summers’ World Bank interns included his Harvard student, Sheryl K. Sandberg, and Yuri Milner. Sandberg later was Summers' chief of staff under Bill Clinton, then became a Google vice president. She is now chief operating officer at Facebook and a Hillary Clinton confidante. In fact, they are so close that the State Department just classified some of their communications.

Milner used dubious Russian funds from oligarch Alisher Usmanov to pump Facebook’s pre-IPO valuation to $100 billion. Facebook started at Harvard. Summers came back to Harvard after being Bill Clinton’s Treasury Secretary just in time for Facebook to start. 19-year old Mark Zuckerberg came under Summers' wing at Harvard and received more Harvard Crimson news coverage in 6 months than any world leader or event. Leader Technologies' treacherous patent attorney taught at Harvard. Facebook's first venture capital investment was from a Harvard alum.

Do you believe in such coincidences?  We’re just getting warmed up.

While Summers was busy fleecing Russia, his Harvard colleague, law professor James P. Chandler, III, was busy seizing the reigns of America’s national security.

Chandler wrote esoteric laws and executive orders on national security for Bill Clinton. They were so convoluted that he was assigned to advise the three branches of government on what they meant and how to interpret them.

Chandler continued from Bill Clinton through the Bush Administration. He prepared the way for Barack Obama. His cronies all received senior Obama appointments, including Eric Holder, who became Attorney General, and David J. Kappos, IBM's insider intellectual property counsel, who became director of the Patent Office.

Chandler’s behind the scenes super-interpretive role for his newly-minted laws and Executive Orders were too big a temptation for him not to exploit.

During that time, many major companies beat a path to Chandler’s door, including IBM. He hatched a plan with these companies to develop a “public-private” cooperation around national security.

Chandler’s model was to steer cyber security contracts to his cronies in exchange for their cooperation with the NSA for things like warrantless snooping.

NSA spy state invasion of privacy wreaks havoc with the separation of powers

That illicit personal information has surely been used for all sorts of blackmail, coercion, bribery and intimidation of judges, politicians, businesspeople and average citizens alike. Indeed, NSA employees were caught using such information against their two-timing girlfriends. Just imagine the damage to the separation of powers if this information is used against a member of Congress or the Judiciary to get a favorable decision.

We believe this is the reason Washington, D.C. has become so dysfunctional. The NSA and their cronies will never admit they're doing this. But Washington's dysfunction infers it.

This circumstance alone is why nobody, not the NSA, FBI or Congress should have access to unlimited amounts of personal information.

How easy is it to manipulate people when you know what they are thinking and planning? You never have to compromise. The NSA has all that information and uses it to get what they want.

Chandler was not satisfied just being a consultant. He and his cronies secretly formed private shell companies to implement their policy recommendations. Then they fed their companies government security contracts. Various companies associated with Chandler have popped up, like James LLC, Market LLC, Eurotech, AccelPath, EOIR Technologies, Markland Technologies, Technest, The White Oak Group. Many if these companies have untraceable Cayman Island stockholders.

IBM and Microsoft figure prominently in these Chandler plans because they were his clients, their legal departments were his former law students, and they were Chandler’s platforms of choice in his emerging plans for a spy state platform.

Chandler has famously said in Washington, D.C. circles that he believed the only way for the United States to stay on top of global spying was to outspy America's adversaries with technology.

He knew that such ubiquitous spying required control of the underlying software and hardware. IBM and Microsoft agreed to play.

We are now in the late 1990s in this chronology. The Internet browser wars were on (Internet Explorer and Netscape).

Both IBM and Microsoft had bet their futures on "client-server" technology. Their corporate collaborative systems were called "groupware" under brand names like Microsoft Exchange, Microsoft SharePoint, IBM Websphere and IBM Lotus Notes. Novell GroupWise was a distant third.

Chandler believed that IBM and Microsoft would supply his spy platform.

IBM and Microsoft were behind the Internet curve

However, the ground began to shake under both IBM and Microsoft. Their client-server technologies were not able to handle the transaction volumes required for the Internet. In short, they could not rise to the occasion. Try as they might to speed up their platforms, nothing was working.

Columbus entrepreneur, Michael McKibben, had a better idea. McKibben was fresh off his success at rebuilding AT&T’s email system, AccessPlus 3.0. He also learned firsthand from Bell Labs and AT&T's sales force why their alliance with Lotus Notes was being scrapped. He was told that Lotus Notes was a kluge, and was not able to meet large scale requirements.

McKibben raised his own funds, hired his “dream team” and ran the design teams himself.

In late 1999, McKibben and his team had an epiphany. They realized that client-server could never scale to the requirements of the Internet. They determined that a completely different approach to managing and storing data was required.

This was mind blowing to McKibben’s team. They had collectively built many of the largest systems in the country in telecommunications, banking, defense and commerce. What they realized was that the tech world was in a stifling group-think about client-server approaches. It had become their religion, and as with any religion, had its own orthodoxy not quickly challenged.

McKibben believed this widespread groupware orthodoxy insulated him from competition since his colleagues were thinking apples when he realized oranges was the solution. So, he kept it to himself while his team quietly put their heads down and developed what we now call “social networking.”

McKibben knew he needed the best patent attorney he could find to make sure the applications were filed correctly. Through referrals he was introduced to law professor James P. Chandler, III.

What McKibben did not know was that Chandler, IBM and Microsoft were already well down their path toward building their spy state platform. When Chandler learned about McKibben’s inventions, he immediately knew this was what his cronies needed to fix their scalability problems. So, he agreed to be Leader's attorney and even agreed to be a director.

However, neither IBM nor Microsoft could reprogram their legacy groupware group-think quickly. So instead, they elected to let McKibben and Leader Technologies do the research and development heavy lifting while they waited. They knew McKibben could do it since he had already competed against AT&T Bell Labs, arguably the best R&D team on the planet, won the contract, then delivered on time and in budget their new corporate messaging system. The plan was for Chandler to secretly feed it to IBM when it was ready.

McKibben was very protective of his source code, so while Chandler knew generally what Leader had invented, he didn't have the full picture and he did not have the source code. So, Chander's Cartel began to shadow Leader’s every development.

IBM Eclipse Foundation started Nov. 29, 2001 with a $40m IBM "donation"

Chandler thought Leader was ready in late 2001, so IBM formed The Eclipse Foundation on Nov. 29, 2001. They started giving away pieces and parts of IBM code and Leader ideas as Version 1.0.

Then, Chandler schemed a way to get his hands on a complete copy of Leader’s source code. He cooked up a “Smart Camera” project with his cronies at the Department of Energy’s Lawrence Livermore National Laboratory (LLNL). Leader went along as a way to validate their technology in government applications.

Chandler wrote a 71-page contract that included a source code custody provision that was Chandler's excuse to get a copy of the source code. That was Jun. 06, 2002. However, Chandler still needed Leader's interface designs.

So, in early August, Chandler insisted that Leader file copyrights on its interface designs. Hindsight shows that was so the Cartel would see how the source code connected to the various user screens. Leader had invested $750,000 in those designs alone (as a part of the more than $10 million and 145,000 man-hours invested in Leader's overall research and development in the invention).

Aug. 29, 2002—Ground Zero of the theft

Click here for more Ground Zero criminal Detail

Then, on Aug. 29, 2002, IBM Eclipse published Version 2.0.1 that included all of Leader’s innovations given to Chandler on Jun. 6, 2002.

From Eclipse Foundation minutes we have learned that Leader's code was given simultaneously to AltoWeb, Borland, Catalyst Systems, Flashline, Fujitsu, HP, Hitachi, IBM, Instantiations, MKS, Oracle, Parasoft, QNX, Rational, Red Hat, SAP, Scapa Technologies, Serena Software, SlickEdit, SuSE, TeamStudio, Telelogic, TimeSys, TogetherSoft, MontaVista Software and Sybase.

However, about this time, Leader discovered a substantial problem in the implementation of the invention’s database design. That problem took a year to resolve.

Mutual Fund bribery scheme

In the meantime, Mark Zuckerberg had been recruited to be the Harvard student Bill Gates front man narrative. While they waited during 2003 for Leader to complete their engineering, Zuckerberg busied himself stalling the four other campus facebooks that were trying to emerge (Winklevoss Twins, Paul Ceglia, Aaron Greenspan and Harvard's Admin).

About this time, yet another Harvard guy, James W. Breyer, was organizing the banks to fund this theft. Everyone jumped in, including JPMorgan, Morgan Stanley, Goldman Sachs, Fidelity, In-Q-Tel (C.I.A.), Vanguard, UBS, Wells Fargo, you name it.

Also during this time, Chandler used his influence to rewrite the financial ethics rules to allow politicians, judges and judicial employees to hold mutual funds without disclosing the portfolio companies inside those funds.

James W. Breyer got his mutual fund friends to invest in his companies. This way, judges and politicians could load up on Breyer's funds without having to disclose the crony holdings themselves. In short, Chandler legalized judicial and political bribery. Indeed, he has famously complained that judges are underpaid. With this Cartel mutual fund scam system, these judges could guarantee their high returns simply by favorable rulings whenever those cases came before them.

Leader solved their year-long engineering problem on Oct. 28, 2003. Magically, on that very night, Zuckerberg hacked the dormitory servers at Harvard, writing in his online diary: “Let the hacking begin." Three months later, on Feb. 4, 2004, Facebook went live during IBM EclipseCON-2004 (Feb. 2-5, 2004).

2004 and early 2005 was the beginning of the Cartel’s public takeover of digital infrastructure worldwide.  The following events occurred in rapid succession:

  1. Google launched Gmail (4/1/04),
  2. Breyer joined National Venture Capital Association (NVCA) as chairman (5/13/04),
  3. C.I.A.’s Louie Gilman joined NVCA as director (5/13/04),
  4. JPMorgan loaned IBM $10 billion to sell PC Group to Lenovo (China) (5/27/04),
  5. Chandler formed CRYPTO.com (6/29/04),
  6. Obama introduced at the Democratic convention (07/27/04),
  7. Peter Thiel invested $500K in Facebook (08/01/04),
  8. Google went public, underwritten by Goldman Sachs and JPMorgan (08/18/04),
  9. IBM, Motorola and Nokia announced intention to build embedded [spy] systems (08/31/04),
  10. Tsinghua University (Beijing, China) joined Eclipse (10/27/04),
  11. IBM Eclipse announced that it lost track of the original code contributor (Leader)(12/08/04),
  12. IBM sold PC Group to Lenovo, facilitated by Goldman Sachs and JPMorgan (12/08/04),
  13. Breyer formed WininChina LLC (03/02/05),
  14. Breyer and Accel Partners invested $13 million in Facebook (05/26/05), and
  15. Yuri Milner startsed Digital Sky (which eventually invested in Facebook (06/01/05).

Click here for a full timeline.

On Feb. 10, 2007, Barack Obama candidacy announced on Facebook.

On Sep. 11, 2007, Microsoft started feeding user data to the NSA.

On Mar. 12, 2008, Yahoo began feeding user data to the NSA.

On Mar. 14, 2008, Sheryl K. Sandberg left Google and joined Facebook.

On Aug. 01, 2008, David Kilpatrick published The Facebook Effect lies about Zuckerberg.

By Sep. 2008, IBM Eclipse boasted 191 members.

On Oct. 15, 2008, the SEC granted Facebook an unprecedented waiver of the 500-shareholder rule.

On Nov. 07, 2008, Barack Obama elected to his first term. Promised to "fundamentally transform America."

On Nov. 19, 2008, Leader Technologies sued Facebook for patent infringement.

On Nov. 23, 2008, Obama appointed Larry Summers to oversee the bank bailout. Fed $33 billion to Goldman Sachs and Morgan Stanley.

On Dec. 01, 2008, Eric J. Holder, Jr. nominated Attorney General.

On Dec. 05, 2008, Donald K. Stern, Facebook attorney, became Obama’s justice adviser

On Dec. 12, 2008, FISA Court gave Attorney General almost dictatorial powers to approve domestic surveillance by NSA.

On Jan. 14, 2009, Google started feeding user data to the NSA.

The "public-private" duplicity among Obama, Silicon Valley and Wall Street is off the charts—any network built by these players will be corrupt by nature

In 2009, Hillary Clinton nominated Secretary of State; announced plans to use Facebook in foreign policy.

On Jun. 03, 2009, Facebook began feeding user data to the NSA.

On Apr. 01, 2010, Patent Office started a Facebook page.

On Jul. 27, 2010, Leader proved that Facebook infringes its patent for social networking on 11 of 11 claims. However, the federal courts rallied behind Facebook anyway; failed to disclose their financial holdings in Facebook interests; failed to disclose their relationships to Facebook attorneys.

Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO)
Fig. 5—On Feb. 17, 2011, President Obama toasted his Alinsky deception of the American public and the world with 13 members of the IBM Eclipse Foundation NSA Spy State Cartel in Silicon Valley. Conspirators pictured are Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO).

Then, on Mar. 02, 2015, President Obama and senior adviser, Valerie Jarrett, met with his chief Alinsky beneficiaries of the Eclipse Foundation code (stolen from Columbus innovator, Leader Technologies): IBM, Xerox, Dell, Micron Technology, Qualcomm and EMC. Given the timing of this meeting―a week after the radical “Net Neutrality” changes to Internet regulation by the FCC—the real agenda of this group was most likely to discuss progress on their common agenda—the IBM et al “The Internet of Things” takeover of global digital infrastructure, which the FCC changes to Internet regulation helped facilitate.  
Obama, Dell, EMC, IBM, Xerox, Qualcomm, Micron Timeline of Corruption, 2015
Photos: UPI. (top); IBM (bottom).

On Feb. 17, 2011, Barack Obama met with Cartel software vendors in Silicon Valley. See Fig. 4.

In 2011, Hillary’s State Department published four-part “Facebook field guides.”

On Nov. 03, 2011, IBM, Eurotech and Eclipse gave messaging software to Facebook.

On May 18, 2012, Facebook went public.

On May 22, 2012, Facebook's Cartel insiders sold $13.26 billion of their share. This included James W. Breyer, Accel Partners, Yuri Milner (Mail.ru), Mark Zuckerberg, Goldman Sachs, Peter Thiel, Meritech Management and Microsoft (Gates & Balmer).

On Feb. 08, 2015, HSBC Whistleblower Hervé Falciani revealed the Cartel used offshore money laundering to fund illicit activity.

On Mar. 02, 2015, Obama met at the White House with key Cartel hardware vendors: BM, Xerox, Qualcomm, Micron Technology, Applied Materials, Dell and EMC. See Fig. 4.

On Oct. 10, 2015, Obama made a secret trip to meet with Qualcomm.

On Oct. 12, 2015, Dell announced acquisition of fellow Cartel member EMC who had just met with Obama at the White House on Mar. 02, 2015.

NSA lies to protect this theft

On Nov. 20, 2015, The New York Times reported that the NSA lied about stopping their illegal domestic surveillance programs.

$1,000,000,000,000+ damages—
The Greatest Financial Crime in History

The collective revenues of the companies embroiled in this theft are in the multiple trillions of dollars. Since all revenue associated with social networking relies on Leader Technologies’ invention, that revenue is ALL ill-gotten gain.

This makes the theft of Leader Technologies’ social networking invention the greatest financial crime in the history of the world.

10% to whistleblower(s)

Leader Technologies has indicated they are willing to pay a 10% reward for information that leads to the recovery of funds by their shareholders.

Click here for hijack of the cyber world timeline and database.

* * *

Bookmark: #stop-the-cartelStop the Cartel
Letter to Congress:
Word Doc

PDF Doc

The Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

Obama’s Fundamental Transformation of America - Saul Alinsky's Playbook for community organizing
Fig. 6—Obama's Fundamental Transformation of America. His wheel of corruption.
Graphic: AFI.

Click here for hijack of the cyber world timeline and database.

Bookmark: #spy-state-surveillance
Fig. 7—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-players
Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 8—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Saturday, December 19, 2015

THE FALL OF THE U.S. & THE RISE OF A NEW WORLD ORDER

Saul Alinsky's 12 Rules for Radicals guide the tactics of the NSA-IBM Spy State Cartel to "fundamentally transform America"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Dec. 19, 2015, Updated Dec. 25 | PDF
Barack Obama onion - lies and more damn lies
Fig. 1—The Cartel is pressing A New World Order from both the right and the left to grab power permanently—by controlling digital networks.
A cartel of judges, regulators, politicians and corporations have secretly signed on to "A New World Order" where government is "disaggregated" into self-defined networks. From that point on, their pledges of loyalty to the U.S. Constitution became optional.

In the dramatic up tick in White House polemics about Islam, it becomes important to note that unlike Christianity and Judaism where lying is a sin, Muslims are permitted to lie to Westerners, Jews and Christians. Qur'an 3:28. Click here to read the full 1990-2015 Cyber Hijack timeline. The facts don't lie.
Graphic: AFI / Netwrix

(Dec. 19, 2015)—This article is the new Preamble to the Hijack of the Cyberworld timeline. (Click Hijack of the Cyber World Timeline and Database in the upper right hand portion of this site.)

This is the story and timeline of the theft of the invention called "social networking." The thieves are a group we call the "Cartel." Their motives are ancient. They yearn for money and power. Their goal is a "New World Order." Theft of Columbus, Ohio innovator Leader Technologies' invention enabled them to unify their communications, monitor and control "the masses," and fulfill their rapacious grab for your assets and your liberty.

The court-proven facts are that Columbus, Ohio innovator, Michael McKibben, and the company he founded, Leader Technologies, invented social networking in the late 1990’s. Prior to that, McKibben had re-built AT&T’s email system in record time for release with Microsoft’s much ballyhooed Windows 95.

In 1996, Leader was awarded its first patent. However, once the Cartel learned about Leader’s invention from an unscrupulous patent attorney and adviser to IBM and the NSA, they wanted it so badly they broke many laws to get it. The invention enabled them to create “The Internet of Things” or "The Internet of Everything" where they could permanently control the digital economy in all its aspects: communications, banking, law, energy, finance, elections, defense, technology, communications, media, healthcare, education, entertainment, politics, guns, food, environment and news.

This sounds like Hollywood fiction, but as you will read in these pages, it is all too real.

The roots of the modern day “One World Order” agenda go back to the 1700’s and philosopher Emmanuel Kant’s essay. More recently, President Woodrow Wilson’s failed effort to form The League of Nations eventually became The United Nations. The disciples of this soulless, mechanistic agenda include George Soros, Bilderberg Group, the 1910 Jekyll Island Club duck hunt, World Economic Forum (Davos), Council on Foreign Relations, Wall Street, Silicon Valley, and a slew of politicians, judges and bureaucrats. They benefit personally through investment gains and insider information.

Obama’s Fundamental Transformation of America - Saul Alinsky's Playbook for community organizing

World government is the notion of a common political authority for all of humanity, yielding a global government and a single state. Such a government could come into existence either through violent and compulsory world domination or through peaceful and voluntary supranational union. In such a world, national constitutions must be subservient to the single state.

Geroge Soros
George Soros

Proponents of A New World Order are betting against America

On Jan. 05, 2011, new world order godfather and post-WWII Hungarian immigrant to America, George Soros (György Schwartz), stated that the “new world order” will be a “healthy, if painful [violent] adjustment.” He continued, “China will be the engine driving it forward and the U.S. will be actually a drag that is being pulled along through a gradual decline in the dollar.”

A window into Soros' character is the little known fact that as a 14-year old Jewish teenager during the Holocaust, he posed as a Christian and helped the Nazis confiscate Jewish property. In a Dec. 20, 1998 CBS 60 Minutes interview with Steve Kroft, Soros told Kroft that as a young György Schwartz he "had no sense of guilt" about that anti-semitic activity.

The minds of our youth are targeted

Nowhere is more telling of the Cartel’s agenda than the uproar over Common Core. Critical to the Cartel agenda is the centralized control of education via Common Core in secondary education and M.O.O.C. (Massive Open Online Course) in higher education. Just like the re-education camps of every totalitarian ideology before them (like Mao, Lenin, Pol Pot, Stalin, Hitler, Brownshirts, Komsomol), the Cartel works to control the “narratives” that our children learn.

Where the facts do not fit the Cartel narrative, the facts are ignored or altered. They want to grow obedient, docile, faithless worker bees for their factories. Just like George Orwell envisioned in 1984, gone will be free thinking, free will and individuality. Liberty will be replaced by oligarchies, a permanent under-class, doublespeak, political correctness, disrespect, reading between the lines, hate, intolerance, inequality and brutality.

The digital part of this remaking of education is well down the path. Most secondary schools use Google Docs almost exclusively for their document sharing. In universities, M.O.O.C. curricula are rapidly replacing individualized instruction in favor of the allegedly more “rich” (cleansed and censored) content of “Big Data” and “The Cloud.”

Universities are being connected using The Ohio State University's IBM / Microsoft / Oracle / SAP / Eclipse data center as an international M.O.O.C. network hub that Presidential candidate John Kasich approved. The supply of Cartel shiny things to lure educators, parents and students into this morally dark world appears unstoppable as the “users” mainline on the digital drugs.

Anne-Marie Slaughter
Anne-Marie Slaughter

This Leader v. Facebook  timeline reveals Cartel names, places and illegal acts

Hillary Clinton’s political adviser, Anne-Marie Slaughter (2009-2013) implemented her book—A New World Order (Princeton Press 2004)—when she worked for Hillary at the State Department. She started promoting Facebook at the State Departrment in 2009, even though Facebook did not have the intellectual property rights. Of note, Slaughter has Hungarian immigrant connections by marriage with Soros, Intel’s Andy Grove and IDG-Accel Partners (China)’s John P. Breyer. Accel is Facebook’s 2nd largest shareholder.

Lying is a Saul Alinsky tactic (and also permitted in the Koran when Muslims are dealing with Westerners, Christians and Jews—Qur'an 3:28)

To gain control of the world’s information (and thus its money and power), the Cartel employs the political organizing tactics of Saul Alinsky. Hillary Clinton is an expert. She wrote her undergraduate thesis on Alinsky and corresponded with him. Barack Obama employs Alinsky’s bible—12 Rules for Radicals (Random House 1971).

Lucifer
Alinsky, S. (DATE). 12 Rules for Radicals. Random House.

Tellingly, Alinsky dedicated 12 Rules to Lucifer, who he calls the original radical. Lucifer is one of the names for Satan, the Devil, the Evil One and The Dragon (The Book of Revelations 12:2; 20:2).

The Obamas and Clintons employ Alinksy’s habitual lying technique: Keep the enemy confused and on its heels working to keep up with your lies. Lies also often become truths if repeated incessantly. For example, the lies about Zuckerberg and Facebook in The Social Network movie are accepted as the truth by many.

Saul Alinsky's 12-Step Community Organizing Program:
  1. Power is not only what you have but what the enemy thinks you have.
  2. Never go outside the expertise of your people.
  3. Whenever possible, go outside the expertise of the enemy.
  4. Make the enemy live by up to its own book for rules.
  5. Ridicule is man's most potent weapon.
  6. A good tactic is one your people enjoy.
  7. A tactic that drags on too long becomes a drag.
  8. Keep the pressure on. Never let up.
  9. The threat is usually more terrifying than the thing itself.
  10. If you push a negative hard enough, it will push through and become a positive.
  11. The price of a successful attack is a constructive alternative by the enemy.
  12. Pick the traget, freeze it, personalize it and polarize it.

Obama’s and Hillary’s lies are legion. Their whoppers include: (1) Obama’s oft-repeated promise “If you like your doctor, you can keep your doctor,” (2) Obama’s claim to be a Christian to fool voters, (3) Hillary’s fabrication about a Benghazi video, and (4) Hillary’s ever-changing private email stories.

They have also brazenly ignored and violated laws. They encourage others to violate U.S. laws themselves, and not respect traditional authority—our borders, the U.S. Constitution and the people responsible for carrying out our laws, such as our police and military personnel. The Justice Department's U.S. Attorneys have become little more than mobsters themselves—A fish rots from the head down.

The Cartel’s corrupt tactics in Leader v. Facebook  were purposely confusing in order to discourage the public from learning the truth

The following timeline is complex. That is an Alinsky tactic: Put so many layers of lies on the onion that most people won’t take the time to peel them away.

Americans For Innovation has been peeling away the layers of this Leader v. Facebook judicial corruption onion for years. The Cartel’s onion core is now exposed. Names, places, dates, crimes and motives have been uncovered thanks to the dedicated work of many.

Soros’ New World Order wants to force its will on America and the planet. In their morality, you would be reduced to merely a consuming animal—"a useful idiot" (Alinsky).* In their world, faith, hope and love are the antiquated values of weak people. They also have little need for any constitution, law or regulation that stands in their way.

* Alinsky used the phrase "a useful idiot" that is sometimes attributed to Vladimir Lenin, although this is in question.

lure users, young and old, into "The Cloud," then ambush them

Theft of Leader Technologies’ invention of social networking was critical to the Cartel’s plan. With control of the digital endpoints of our lives ("The Internet of Things" aka "The Cloud"), the Cartel could achieve their new world order more quickly.

Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO)
On Feb. 17, 2011, President Obama toasted his Alinsky deception of the American public and the world with 13 members of the IBM Eclipse Foundation NSA Spy State Cartel in Silicon Valley. Conspirators pictured are Barack Obama (U.S. President), Mark Zuckerberg (Facebook CEO), Steve Jobs (Apple CEO), Steve Westly (Westly Group Partner), John Doerr (Kleiner Perkins Partner), Ann Doerr (John Doerr Spouse), Eric Schmidt (Google CEO), Art Levinson (Genentech Chairman), John Chambers (Cisco CEO), Larry Ellison (Oracle CEO), Reed Hastings (Netflix CEO), John Hennessy (Stanford Univ. President), Carol Bartz (Yahoo CEO) and Dick Costolo (Twitter CEO).

Then, on Mar. 02, 2015, President Obama and senior adviser, Valerie Jarrett, met with his chief Alinsky beneficiaries of the Eclipse Foundation code (stolen from Columbus innovator, Leader Technologies): IBM, Xerox, Dell, Micron Technology, Qualcomm and EMC. Given the timing of this meeting―a week after the radical “Net Neutrality” changes to Internet regulation by the FCC—the real agenda of this group was most likely to discuss progress on their common agenda—the IBM et al “The Internet of Things” takeover of global digital infrastructure, which the FCC changes to Internet regulation helped facilitate.  
Obama, Dell, EMC, IBM, Xerox, Qualcomm, Micron Timeline of Corruption, 2015
Photos: UPI. (top); IBM (bottom).

The moral, philosophical and cultural battle lines are drawn. If we choose the Cartel, the “nanny state” of entitlements will eventually overtake us like it collapsed the Soviet Union. On the other hand, if we choose the timeless values of the U.S. Constitution, we must protect and restore Leader Technologies’ property rights. Then, we empower real, ethical innovators to rebuild our digital networks in a way that takes us to higher ground.

This restoration of Leader Technologies’ (and others) property rights will expose the decades of corruption that has resulted in this digital takeover. Whether these criminals go to jail, are pardoned or ignored, one thing is for sure-- they must be defunded and disempowered.

Is "the New World Order" too big to fail?

Some ask if social networks are now "too big to fail." The last time Americans thought that was when our too-big-to-fail banks were bailed out in 2008. The taxpayer was stuck with the bill while the bankers continued to pay themselves bonuses. Not a single banker was jailed, fired or even fined. Is this the New World Order we have to look forward to? The answer is yes, unless WE THE PEOPLE put a stop to this profligacy.

These social networks can and will be reconfigured to provide the positive benefits without the abuses of security and privacy. However, they will not be run by the current crop of greedy "public-private" criminals, who must be run out of town, this current President and his cabinet among them.

Americans deserve statesmen running our digital infrastructure, not scoundrels.

Click here for hijack of the cyber world timeline and database.

* * *

Bookmark: #stop-the-cartelStop the Cartel
Letter to Congress:
Word Doc

PDF Doc

The Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

 

Bookmark: #spy-state-surveillance
Fig. 3—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-playersPrimary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 4—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Tuesday, December 8, 2015

STATE DEPARTMENT STONEWALLS HILLARY’S FACEBOOK CONNECTIONS

FOIA Director failed to disclose his Facebook intelligence conflicts when asked about Facebook addresses uncovered in Hillary’s private server

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Dec. 02, 2015, Updated Dec. 11 | PDF
Breaking News, Dec. 11, 2015: Prosecution of Encryption Engineers Urged. In response to Obama's meeting on Thursday with encryption engineers at the White House "in response to an online petition" [pause, coughed a hairball], privacy advocates are calling for prosecution of encryption engineers who have violated the Fourth Amendment (right to privacy) by feeding data to the NSA illegally. Whistleblowers encouraged. See previous post: Complicit encryption geeks enable the American Spy State.
Breaking News, Dec. 10, 2015:
military forces were at the ready for Benghazi. Hillary failed to approve action. (Preferred "Twitterplomacy")
"They are spinning up as we speak."
DoD Chief of Staff, 7:19 pm, Sep. 11, 2012 (first attack started at 3:40 pm)
Judicial Watch just released a new Benghazi (Sep. 11, 2012, 7:19pm) email from then-Department of Defense Chief of Staff Jeremy Bash to State Department leadership immediately offering “forces that could move to Benghazi” during the terrorist attack on the U.S. Special Mission Compound in Benghazi, Libya on September 11, 2012. In an email sent to top Department of State officials, at 7:19 p.m. ET, only hours after the attack had begun, Bash says, “we have identified the forces that could move to Benghazi. They are spinning up as we speak.” The Obama administration redacted the details of the military forces available, oddly citing a Freedom of Information Act (FOIA) exemption that allows the withholding of “deliberative process” information. Full Story (incl.smoking gun DoD email).
"Twitterplomacy"
Hillary and staff appeared more interested in promoting the Spy State Cartel agenda, false stories of an inflammatory video, lies to the victims' families, "Twitterplomacy," "Open Source, Open Data" initiatives, and keeping Facebook's Sheryl K. Sandberg happy. —Twitterplomacy: Aug. 06, 2012—Open Data: Sep. 18, 2012 —Facebook/Sandberg: Oct. 17, 2012 —Victims remains return home: Oct. 18, 2012.
Sheryl K. Sandberg and husband David Goldberg before his death in a Mexican hotel where he was not staying - yet another mysterious death by a person associated with Bill and Hillary Clinton
Fig. 1—Hillary Clinton's "Best Friend Forever" (BFF) Sheryl K. Sandberg and David Goldberg, during happier times.
On May 1, 2015, David Goldberg, the husband of Sheryl K. Sandberg of 11 years, died mysteriously in Puerto Vallarta, Mexico, ostensibly while exercising alone on a treadmill in the hotel next to the one where the couple was staying. He supposedly hit his head and later died of head trauma in the hospital. Goldberg was the CEO of Survey Monkey. Sandberg's relationship with Hillary Clinton and her staff was close enough that some of Sandberg's words were redacted by the State Department before releasing the emails to Judicial Watch. Disappearance of spouses and loved ones around the Clintons is not a new phenomenon.
Photo: ABC News

(Dec. 08, 2015)Michael McKibben, Founder of Leader Technologies—the real inventor of social networking—just asked the U.S. Department of State’s Director and main Freedom of Information Act (FOIA) officer, John Hackett, to disqualify himself over his Hillary Clinton conflicts of interest.

Hackett is the State Department officer who has led the FOIA stonewalling of Hillary Clinton's emails requested by Judicial Watch and other watchdog groups. See Bade, R. (Jul. 29, 2015). Judge explodes over Hillary email delays. Politico.

State Department published a Facebook email address before the Leader v. Facebook  trial

On Oct. 15, 2015, McKibben had filed a FOIA request asking for documents concerning the State Department’s development, publishing and use of the email address “USgovernment.fb.com” while Hillary Clinton was Secretary of State.

McKibben’s request followed the "rolling releases" of Hillary Clinton’s private emails to Judicial Watch. The emails show a relationship with Facebook’s Sheryl Sandberg which was close enough that Sandberg’s personal information was redacted by the State Department.

Sandberg fawns, Hillary responds

For example, on Oct. 17, 2012, Sandberg, Hillary and Hillary's chief of staff, Cheryl Mills have a cozy, partially-redacted chat about Sandberg's book manuscript. Sandberg fawns on Hillary to get a book endorsement, even offering to write it for her. (Sandberg: "Anything I can do to make this easy for her is great (happy to get quotes written you all can cobble together if that helps"). Notably, Sandberg goes out of her way not to step on political adviser Anne-Marie Slaughter's toes.

Also notable is the timing of Sandberg's email. It also occured on Oct. 17, 2012, the same day that the Patent Office "patent reexamination" kangaroo court reversed four previous rulings in Leader Technologies' favor and summarily invalidated their patent on social networking. Curiously, the panel had issued over 200 patents previously to IBM, Xerox and Microsoft—three (of the several hundred) Facebook cronies in IBM's Eclipse Foundation. The chief judge, Stephen C. Siu, formerly worked for IBM and Microsoft, yet failed to recuse. See previous post: "Patent Office Director David Kappos convened rare secret court with IBM cronies to kill Leader's patent."

Hillary's cozy relationship with Facebook was clearly there from before the beginning of Barack Obama’s first term.

On Feb. 10, 2007, Barack Obama announced his candidacy on Facebook.

On Jul. 9, 2009, Hillary’s emails show that her unofficial political adviser, Sidney Blumenthal, had drafted her first speech to the Council on Foreign Relations. Blumenthal wrote (and Hillary presumably repeated) “Twitter and Facebook will become as much a part of the diplomatic lexicon as cables and demarches.”

On Dec. 29, 2009, by Christmas that year, Hillary had developed a dinner guest list that she called her “Technology Connections dinner.” The dinner was slated to include seven of the companies that Edward Snowden revealed were already feeding customer data to the NSA. The Second Circuit U.S. Court has since declared that activity illegal. Those companies were Microsoft, Yahoo!, Google, Facebook, YouTube (owned by Google), Skype (ownded by Microsoft) and Apple.

Apparently, Leader Technologies, the proven, real inventor of the technology, was not invited. So much for Hillary's commitment to the U.S. Constitution and the rule of law.

During the same time period, Facebook and Mark Zuckerberg were stonewalling all discovery of Zuckerberg's computers from 2003-2004, eventually claiming they were lost. However, in 2012, twenty-eight (28) Zuckerberg hard drives appear two days after the Federal Circuit circle their judicial wagons around Facebook (and their pre-IPO Facebook financial holdings).

Tellingly, the State Department redacted the entire contents of Hillary’s speech to her “Technology Connections” dinner guests.

An earlier Aug. 16, 2009 email shows that Clinton and NSA director James L. Jones were collaborating and likely planning these "Technology Connections." On Dec. 02, 2011, these connections were called by Hillary’s adviser, Anne-Marie Slaughter, "public-private partnerships" where "private incentives are tied to public goals."

Fourteen months later, on Feb. 17, 2011, six of the seven Hillary tech dinner guests attended a private dinner with President Obama in Silicon Valley.

Between Jun. 26 and Dec. 26, 2012, Hillary's State Department published four Facebook field guides, during the Leader v. Facebook case: Facebook Part 1, Part 2, Part 3, Part 4.

To see this activity in the "Rise of the Corrupt Spy State" timeline, click here.

Hillary’s emails open the doors on the “public-private” spy state collusion

The bottom line is that Hillary's Judicial Watch emails open the doors on the Spy State Cartel. It appears that Hillary and Bill were prime movers who have just been better able to hide their duplicity. No wonder she is so smug.

However, as is always the case, Truth finds a way.

The big spy state cartel lie—lure citizens into "The Cloud," then ambush them

The evidence grows clearer every day that the entire social networking technology world was built on an elaborate spy state lie.

That lie was designed to lure unsuspecting citizens into “the cloud” where their privacy could be exploited endlessly in infinite swirls of “Big Data” titillation. Saul Alinsky named unsuspecting citizens “useful idiots.”

Bill, George and Barack all have one thing in common: Professor James P. Chandler.

Hillary and Bill helped lay the foundation, which was the intellectual brainchild of Harvard law professor James P. Chandler.

As Bill was leaving office, he turned Chandler over to George W. Bush, who let him keep going. After 9/11 Chandler practically had free reign. This group of sycophants moved in their people, heavily weighted toward Harvard hubris. It was done quietly and below the radar screen.

The Manchurian candidate is focused on this spy state "public-private partnership" agenda to feed his cronies with cash and power

Then came the Manchurian candidate, Barak Obama. His presidency has been successful at only one thing: this spy state "public-private" agenda to propel his crony network. Nothing else matters. Rest assured, his actions are not incompetent. They are evil.

Unplug them.

* * *

Bookmark: #stop-the-cartelStop the Cartel
Letter to Congress:
Word Doc

PDF Doc

The Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

 

Bookmark: #spy-state-surveillance
Fig. 3—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-playersPrimary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 4—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.