Fourth and Fifth Amendment privacy and property protections are destroyed
(Sep. 11, 2015)—Were the victims of 9/11 sacrifices in vain? You decide after reading these conclusions by AFI investigators.
While the American public went about its business, Harvard lawyers hatched a scheme in the early 1990's to create a permanent ruling class that some researchers have started calling totalitarian liberals.
Republicans & Democrats exploited equally
They want you to call them "progressive liberals," but we have concluded that this is inaccurate. Progressive liberals are Americans. These people are globalists who have no use for the U.S. Constitution. They exploit the Democratic and Republican Parties equally.
In fact, many of these people have become experts in Constitutional law in order to destroy it.
They hatched their scheme at Harvard in the early 1990's where law professor, James P. Chandler, and economics professor, Larry Summers, taught and basked in the glow of their oversized egos.
plural noun: sycophants
a servile self-seeking flatterer : a person who praises powerful people in order to get their approval : a person who acts obsequiously toward someone important in order to gain advantage : a suck-up : doormat : flunky : lackey. (Various sources.)
They reached out to sycophants in banking, technology, politics and the judiciary to perfect this scheme. They picked IBM as their data sharing platform.
IBM's Internet ideas were failing
By the late 1990’s, IBM’s platform was not working well. It was not “scaling” in tech talk. Scaling simply means the ability to grow so that more and more people in various locations can use the same system to communicate.
IBM and its subsidiary, Lotus Notes, were OK with small groups, but were cumbersome, expensive, hard to learn and horribly inefficient (used too much computer processing power) when too many people tried to use it. This was also true for Microsoft's Internet platforms.
However, by this time, the Cartel had begun forming their political, banking and bribery (mutual fund and offshore money laundering fronts) backstories, so they were becoming desperate to have a technology platform they could all use in secret to organize their hegemony.
Chandler was big man on campus in 1996. He slipped in the law that officially sanctions lying to congress and courts
Their spirutual leader was law professor James P. Chandler, III, who had pushed through Congress three seminal laws in 1996: (1) the Economic Espionage Act of 1996, (2) the Federal Trade Secrets Act, and (3) the False Statements Accountabilty Act of 1996 (officially sanctioning lying to Congress and the courts).
Leader invented the solution to scalability—aka "social networking"
Unbeknownst to these elitist misfits, innovators in Columbus, Ohio had broken the sound barrier on scalability. Leader Technologies, and its intrepid founder, Michael McKibben, had figured out what we now call “social networking.”
McKibben’s development team included all proven leaders. They had each built major systems for telecommunications, commerce, banking and the military. So, when their “ah ha” moment came, McKibben made a beeline for Washington, D.C. to protect their important invention.
McKibben was recommended to a law professor who was purported to be the Holy Grail—law professor emeritus, James P. Chandler. Chandler immediately agreed to represent Leader and file their patents.
Chandler plotted to steal Leader's idea from the beginning
Hindsight shows that Chandler’s first recommendation was for the Cartel's best interests and not Leader's. He recommended that Leader “reduce the invention to practice” before he would file it. In other words, even though Leader already had the idea for the software in hand, Chandler said he wanted to be convinced by seeing it actually work first.
This recommendation made no sense, but since Chandler was the hands-down consensus expert, even advising the White House, FBI, CIA, NSA and Judiciary on patenting and intellectual property, Leader followed his advice.
Hindsight shows that Chandler had an ulterior motive. He wanted the invention for himself and his other clients IBM, NSA, C.I.A., his fellow Harvard cronies and their Wall Street and Silicon Valley sycophants (the Cartel).
The Digital Kool-aid
The Spy State Cartel's aim is to become a permanent ruling class using the Internet as their mechanism to simultaneously: (1) manipulate populations through mainstream media “narrative” tuning; (2) titillate the pathetically gullible masses with games, entertainment, pornography and coupons; and (3) use the platform for their secret offline communications, like Hillary Clinton did on her private email servers. See previous posts.
After studying McKibben’s invention as a part of his legal "due diligence," Chandler and IBM hatched an elaborate plan to steal it. They knew the invention would deliver what they needed. They knew that Leader’s innovations had, in effect, broken the sound barrier on scalability.
While the country reeled from 9/11, IBM and Chandler plotted the takeover . . . disguised as national security
They named their theft agency "The Eclipse Foundation" which they formed on Nov. 29, 2001, just six weeks after the 9/11 tragedy. See People we trusted are now hijacking the cyber world TIMELINE.
On Jun. 5, 2002, Chandler wrangled a copy of Leader’s source code for supposed safekeeping in a contract that Chandler had arranged with Lawrence Livermore National Laboratory (LLNL).
The LLNL signatory was Jeffrey Wadsworth, who is now the Spy-state Cartel's iron-fisted ruler, president of the Ohio University State Trustees and CEO of Battelle Memorial Institute in Columbus.
Facebook merely renamed Leader's university initiative; Zuckerberg is a fraud
In 2001, Leader had confidentially presented their "University Initiative" idea to Battelle. That idea was renamed "Facebook" by the Cartel. Zuckerberg was to be the front, and criminal fall guy if necessary.
On Aug. 29, 2002, eleven weeks later, Leader’s social networking invention appeared for the first time in Eclipse’s version 2.0.1.
The IBM-Eclipse code was then redistributed under an illegitimate IBM copyright claim as "Open Source" to essentially every emerging Internet player on the planet. Fig. 2 has their complete list.
Edward Snowden spilled the cartel beans
On Jun. 6, 2013, whistleblower Edward Snowden revealed that these spy-state sycophants had all signed on to the secret NSA PRISM program to collect personal data on Americans. Of course they would, after all, they all owed their "social" Internet existence to IBM-Eclipse's theft of Leader Technologies wonderful invention. They were products of the Big Lie.
The spy-state Harvard totalitarian elitist takeover march was on.
Everything about you, all the time, is stored offshore by the Cartel sycophants in "dark profiles"
In 2012, Mark Zuckerberg’s speech writer, Katherine Losse, revealed that Facebook was building “dark profiles” on non subscribers and storing the data in places like Lulea, Sweden, outside the reach of U.S. law.
Despite AFI's many warnings that these people must be stopped, America's elected representatives remain silent while these spy state purveyors continue their Harvard sycophant march.
Hard to believe? Here’s a snapshot. We suggest you start paying attention. In this case, what you don't know is destroying your property, your privacy and your Republic.
Political data feedback manipulation
Healthcare data feedback manipulation
Diplomacy feedback manipulation
Are all Politicians, regulators, judges and bureaucrats feeding at the Spy state Cartel's data trough and then lying to cover it up?
The NSA has not stopped a single snooping program. As you can see above, they have doubled down through their Spy-state Cartel. They lie to Congress with impunity. They lie boldly because their spy-state spymaster, James P. Chandler, arranged to have the "uncontroversial" False Statements Accountability Act of 1996 (FSAA) passed whose Subsection (b) says NSA officials can lie to courts and Congress without liability, and they do.
How much more controversial can an act of Congress be than to formally sanction lying in court and to Congress?
Curiously, the FSAA was passed almost unanimously by the 1996 Congress. John Boehner voted for it. So did John Kasich. Click here to see who voted for to sanctioning lying to Congress and the courts. Did they know what the were voting for? AFI researchs believe Subsection (b) was slipped in by Chandler during last minute drafting.
Since our politicians, regulators, judges and bureaucrats seem to all be feeding at this spy-state trough, it falls on The People to stop this destruction of the Republic.
Will you stop it, or are you too hooked on their digital drugs to resist?
Don’t think for a second that there is nothing you can do. That’s what these sycophants want you to think.
"We the People" must exert our control over our Republic to stop this lawlessness—NOW!
Resist. Boycott. Protest. Defund. Defend. Speak out. End silence. Vote out of office. Sue. File complaints. March. Make noise. Be determined. Be resolute. Be persistent. Don’t take no for an answer. Disturb this nest of thieves. Make their lives miserable. Expose them. Shame them. Engage in civil disobedience.
The Cartel is trampling the Fourth & Fifth Amendments
The Fourth Amendment protects your privacy from unlawful government search and seizure. The Fifth Amendment prohibits the government from taking your property without compensation, like it has taken Leader Technologies' and others. The Spy-state Cartel and its phalanx of crooked law firms show no care for these fundamental principles of the American Republic.
The future of the American Republic is hanging in the balance. And, as we have just illustrated, the sycophants are well down the path of becoming a permanent ruling class.
Forewarned is forearmed.
* * *
Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.
Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to firstname.lastname@example.org and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.