Wednesday, November 25, 2015

DELL AND LENOVO (IBM) SHIP COMPUTERS WITH SPY STATE BACKDOORS

JPMorgan and Goldman Sachs financed IBM PC unit sale to Lenovo (China).

Dell bought EMC to control "dark profile" storage on all Americans offshore.

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Nov. 25, 2015, Updated Nov. 30 | PDF
Dell ships backdoor keys with every computer
Fig. 1—Dell SHIPS secret BACKDOOR keys in every box.
Classic Cracker Jack Box advertising the prize inside
Whistleblowers just proved that the Dell factory ships backdoor keys boxed inside its computers. It's not your father's Cracker Jack box anymore. The prize inside a Dell and Lenovo PC are not rings and puzzles, but secret keys to allow others to access your computer. These keys allow intruders free access to EVERY machine. Michael Dell collaborates with Barack Obama and Valerie Jarrett in "public-private" collusion among IBM Eclipse Foundation spy state cronies. Dell recently purchased EMC to further consolidate this "Big Data" power in only a few hands, all offshore, all unregulated. The Spy State Cartel is storing much of the "dark profile" personal data on Americans overseas in places like Lulea, Sweden.
Photos: KrebsOnSecurity, Dell, Frito-Lay.
Update Nov. 29
Second Dell backdoor key discovered Allows intruders into your computer while you use airport WiFi, for example.

(Nov. 25, 2015)Whistleblowers on Reddit announced two days ago that Dell has been shipping computers loaded with the equivalent of a spare car key taped under the hood. This key lets impersonators bypass your security and gives them full access to your computer with no visible sign of entry. The invasion of privacy is done, no matter what excuse Dell makes.

Dell's response so far has been evasive: “Customer security and privacy is a top concern and priority at Dell; we deeply regret that this has happened and are taking steps to address it.” Notice that they avoided promising to stop it.

Update, Nov. 28, 2005: Pinocchio Alert:
Dell issues correction for "unintended vulnerability"
Dell just issued a fix for their "unintended security vulnerability." Put simply, this is a boldface lie. The Register (UK) stated that the vulnerabiity, built in by Dell, "puts the machines' owners at risk of identity theft and banking fraud." Stunningly, according to The Register, the certificate cannot be simply removed. It reinstalls the file if it is deleted. Dell says the feature improves the "customer support experience." This sounds hauntingly similar to the explanation cooked up by the slimy lawyers at IBM's Eclipse Foundation as the new euphamism for spying on fellow citizens without a warrant. Where are the whistle blowers inside Dell? Message: Your silence makes you an accomplice to this fraud and equally liable for the damages. Turn yourself in to House Oversight and make a deal. Or, post your evidence anonymously on any number of sites like AFI.
Graphic: The Washington Post.

Dell's surrogate Lombardi Software, who supplies critical business software to Dell customers, appears to have joined the IBM Eclipse Foundation Spy State Cartel on or before 2006. Dell is definitely onboard by 2015 when Michael Dell, Qualcomm, IBM, Xerox, EMC (now Dell) met with Barack Obama and Valerie Jarrett just weeks after Obama signed  Executive Order No. 13691 promoting his cronies in public-private cyber cooperation. See Fig. 2 below.

Bookmark: #obama-eclipse White House, IBM, Eclipse, Dell, EMC, Qualcomm 2015 Conspiracy Timeline
Fig. 2—On Oct. 10, 2015, Obama made a mystery trip to Qualcomm in San Diego after visiting the victims of the Oregon shooting. With Dell taking EMC private, Obama's Cartel is consolidating their power into fewer and fewer hands who are not accountable to public shareholders. Not surprisingly, JOHN BOEHNER bailed as Speaker likely to avoid further pressure from the Cartel to do their bidding (Boehner is heavily invested in Cartel funds, notably UBS, Fidelity, EMC, IBM, Microsoft, Oracle, Xerox, Goldman Sachs, JPMorgan Chase, State Street, Symantec, Vanguard and Wal-Mart; so is MITCH MCCONNELL, notably Vanguard, T. Rowe Price, UBS, Barclays, Wells Fargo, American). The now evident agenda is to consolidate embedded technology control of the Internet so that the new Administration will conclude that their infrastructure is "too big to fail" or be unplugged. Sound like JPMorgan? Rest assured, they can and must be unplugged. A Republic cannot survive the intrusions on privacy created by these self-serving Harvard sycophants behind a national security smoke screen.

Lenovo was also recently discovered to be shipping Superfish adware vulnerabilities, according to the article.

The Backdoor Master Key is called the "Dual EC DRBG" encryption algorithm

None of these newly revealed Dell and Lenovo (IBM) vulnerabilities address the deeper and more insidious embedded spy state vulnerabilities associated with the dubious Dual_EC_DRBG algorithm backdoor that is shipped with most hardware and software. The U.S. government forces vendors to place this algorithm in product shipped to the government. They even have to certify that they have included it in a special NIST (National Institute of Standards and Technology) list. See link in this paragraph.

It does not appear that these companies will change these constitutionally abusive practices without motivation. Unquestionably, they are and have been systematically abusing our privacy while taking our money and mouthing hollow promises of security and privacy. Boycotts are in order.

Sound the alarm

We call upon our readers to boycott products, like Dell and Lenovo, who are proven to be violating our privacy and our lawful expectation of quiet enjoyment. If their profits are hurt, they will change their tune. Sound the alarm. Your silence will only hurt you and every other American.

The “free” social networking feeding frenzy is an NSA creation. Choice is an illusion—it's all the same Spy State Cartel

IBM, Dell, EMC, HP, Hitachi, Samsung, Fujistisu, Microsoft, Oracle all jumped on the feeding frenzy over Columbus, Ohio innovator Leader Technologies’ social networking innovations.

2001 By late 2001, IBM, HP, Hitachi, Fujitsu, Hitachi, Oracle, QNX, Rational, Borland, Red Hat and SAP were members of this new spy state organization—IBM's The Eclipse Foundation (prime organizers: David J. Kappos, James P. Chandler, Eric H. Holder). Likewise, before World War II, IBM supplied computers to Adolf Hitler that he used to catalogue Jews, Poles, gypsies, homosexuals and political opponents as the primary information source for his genocides. Given the Cartel's support of eugenics (selective culling of genetic profiles, including Planned Parenthood), is history about to repeat itself?

2002 On Jun. 5, 2002, law professor James P. Chandler, intellectual property law counsel to IBM’s David J. Kappos and Leader Technologies, received a custody copy of the source code for Leader’s social networking invention. Then, 11 weeks later the IBM feeding frenzy began . . .

Wall Street and Silicon Valley feeding frenzy over Leader Technologies' social networking invention in 2001, perpetrated at the hands of Leader's patent counsel, James P. Chandler
Fig. 3—On Jun. 5, 2002, law professor James P. Chandler took custody of Leader Technologies' source code, ostensibly for safekeeping as a part of a contract he had arranged for Leader with Lawrence Livermore National Laboratory. Magically, 11 weeks later, all the "secret sauce" in Leader's invention appeared in the next release of IBM Eclipse Foundation's version 2.0.1 release. A hungry group of technology sharks, including IBM, Dell, EMC, HP, Hitachi, Samsung, Fujistisu, Microsoft, Oracle, to name just a few, were there to feed on Leader's innovations, and have done ever since.
Photo: Best Travelstore.

2002 On Aug. 29, 2002, the "secret sauce" of Leader Technologies’ social networking innovations appeared in Version 2.0.1 of IBM’s Eclipse Foundation with IBM claiming copyrights on all of Leader's innovations.

2004 By early 2004, Wind River and Intel had signed on. Intel's CEO, Andy Grove, is John P. Breyer’s fellow Hungarian refugee along with George Soros. Breyer is the father of James W. Breyer, Facebook's first director and largest shareholder and managing partner of Accel Partners LLP in Silicon Valley.

2004 On Feb. 4, 2004, Facebook launched—during IBM’s EclipseCON 2004 (Feb. 2-5, 2004). The Social Network movie is pure fiction about Mark Zuckerberg and the supposed Harvard origins of Facebook.

2005 By early 2005, BEA, Sybase and Computer Associates jumped in.

2005 On Oct. 25, 2005, Wiki Creator Ward Cunningham signed on.

2005 On Nov. 11, 2005, Eurotech SpA (Italy) revealed that the same Eclipse members were building embedded hardware for “The Internet of Things” in Italy: IBM, Wind River, Microsoft, Cisco and Intel. JPMorgan’s John McNeil was financing Eurotech as an Italian manufacturing front for the Cartel.

2006 On Nov. 21, 2006, Leader Technologies and inventor Michael McKibben were awarded U.S. Patent No. 7,139,761 for social networking.

2007 On Feb. 10, 2007 (File: 217 MB), Barack Obama announced candidacy on Facebook.

2008 By March 2008, almost every major technology company had joined Eclipse by this time, including Dell, Northrup Grumman, Perot Systems, and even Wal-Mart. The list is so broad and so complete as to telegraph a foreknowledge that Barack Obama would be elected.

2008 By September 2008, Motorola, JPMorgan, Nokia, NetApp, Adobe, Toshiba, AOL, AT&T, Sprint, Verizon, MySQL, Google, Cisco, SAS, Siemens, IDG, Novell, acknowledged their allegiance.

2008 On Oct. 15, 2008, Facebook received an unprecedented exemption from the 500-shareholder rule for private companies. A multiple billion dollar market in Facebook's private stock is made by Goldman Sachs, much of it from Russian oligarchs Alisher Usmanov and Yuri Milner, friends of Harvard's Larry H. Summers and Facebook's COO, Sheryl K. Sandberg, from World Bank days. Summers would be appointed by Obama to managed the bank bailout in November 2008.

2008 On Nov. 7, 2008, Barack Obama elected President.

2008 On Nov. 19, 2008, Leader Technologies filed a patent infringement lawsuit against Facebook.

2009 On July 09, 2009, Hillary Clinton prepared speeches as Secretary of State promoting Facebook.

2009 On Dec. 29, 2009, Hillary Clinton's "Dinner on Connections Technologies" contained an IBM Eclipse Foundation Spy State Who's Who: Cisco, Yahoo, Symantec, Ebay, MicroTech, Microsoft, Apple, Twitter, Square (Larry Summers & Marc Andreessen, Facebook directors and advisors), Google, Mobile Accord, Howcast, MexTel (Carlos Slim, see Stratfor leaks), NYU, TechPresident and Harvard.

2009 On Dec. 31, 2009, Barack Obama issued Executive Order No. 13526 giving him near dictatorial powers regarding intelligence classifications.

2010 On Jul. 27, 2010, in a split verdict, Facebook was found guilty of infringing Leader Technologies' patent on 11 of 11 claims. An unproved on-sale bar ruling was allowed to stand which smothered Facebook's guilt in unprecedented judicial chicanery reaching up to Chief Justice John G. Roberts, Jr.

2012 In 2012, Hillary Clinton issued a four “Facebook field guides” for the State Department. Part 1, Part 2, Part 3, Part 4.

2012 On May 18, 2012, Facebook went public. JPMorgan, Goldman Sachs, Morgan Stanley, Citigroup, UBS, Wells Fargo, Barclays, Bank of America, Deutsche Bank, RBC permitted insiders, including Zuckerberg, Breyer, Milner, Goldman Sachs and Microsoft to cash in $6.3 billion on Day 3.

2013 On Jun 06, 2013, NSA Whistleblower Edward Snowden revealed that all of the IBM Eclipse Foundation members in telecom and Internet infrastructure have been illegally feeding customer data to the NSA since at least 2007.

2015 On Oct. 10, 2015, Barack Obama made a mysterious trip to San Diego for several days of meetings with Qualcomm—a key Spy State Cartel supplier. See Fig. 2 above.

2015 On Oct. 12, 2015, Dell announced purchase of EMC, another Spy State Cartel supplier. See Fig. 2 above.

2015 On Nov. 20, 2015, FOIA revelations show that NSA lied and keeps Americans’ data overseas, despite assertions that they stopped the program in 2011.

The Facts don’t lie:

  1. The last three Administrations (Hillary & Bill, George, Barack) created the Spy State Cartel. They have ignored the U.S. Constitution with the support of attorney sycophants, most notably from Harvard Law School.
  2. Numerous career bureaucrats and politicians are involved.
  3. Silicon Valley is complicit, having constructed Internet backdoors in exchange for free reign over their markets and competitors, with judges and courts that have turned a blind eye to the massive theft of intellectual property.
  4. Wall Street greases the skids of this corruption.
  5. Power has been consolidated into a relatively few hands (less than 1%).
  6. America’s Founders (e.g., George Washington: "permanent alliances), and even Dwight Eisenhower, foresaw the dangers of this unprecedented consolidation of power within the military-industrial complex.
  7. Albert Einstein warned of the day that technological advances overtook man’s ability to manage them morally. That day is here with nuclear proliferation and digital hegemony by unscrupulous technology power mongers.
  8. The Ten Commandments are being ignored, especially "Thou shalt not steal" and "Thou shalt not lie."
  9. The 2016 election could be the American Republic’s last free election. Once the Cartel has full control of the flow of digital information (if we let them), then voter fraud will manipulate election results in any way the Cartel desires.
  10. Truth, facts, dialogue and discourse will give way to only lying “narratives.” (In the former U.S.S.R., the Communist Party's newspaper, Pravda, means "Truth." Soviets commented wryly that to read Pravda was to become expert at reading between the lines. America is there with its sycophant mainstream media.)

The Court of Public Opinion must rule and stop this devolution into tyranny

Since all three branches of the American government are infected by this endemic corruption by people we have trusted, we must now rely on the Court of Public Opinion, the fourth (and first) power, for justice.

“We the People . . .“

We the People must dismiss these unworthy stewards of our national life.

The future of the political experiment is unprecedented in human history, the American Republic—where power is vested in The People, is rapidly devolving into a tyranny led by these scoundrels.

This is not a Left or Right issue. This is an American imperative.

* * *

Stop the Cartel
Letter to Congress:
Word Doc

PDF Doc

For starters, the Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

 

Bookmark: #spy-state-surveillance
Fig. 4—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-players
Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 5—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Wednesday, November 11, 2015

EXPOSED: JPMORGAN HIDES SPY STATE CARTEL COLLUSION IN LOSS OF 83 MILLION CUSTOMER RECORDS

U.S. Attorney Preet Bharara likely floats cyberhack narrative to cover the Cartel’s ILLEGAL activity

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Nov. 11, 2015, Updated Nov. 23 | PDF
Bookmark: #arunachalam
Nov. 19, 2015 Update. Internet pioneer, Dr. Lakshmi Arunachalam, former director of network architecture for Sun Microsystems at the formation of the modern commercial Internet, filed today in the U.S. Supreme Court against J.P. Morgan Chase for theft of her foundational patents on Internet transactions and for judicial corruption (JPMorgan investments and abuses of due process, property and civil rights). Click here to download Dr. Arunachalam's Writ of Certiorari.
Preetinder Bharara, Clean-up Man for the American Spy State Cartel, including JPMorgan
Fig. 1—Preetinder Bharara. The Spy State Cartel's clean-up man..
U.S. Attorney Preetinder"Preet" Bharara has an uncanny ability to appear as the attorney-of-record on any and all matters involved with protecting Facebook and the NSA Spy State Cartel from being exposed. He is currently prosecuting New York businessman Paul Ceglia in his battle with Mark Zuckerberg and Facebook.

Now Bharara is protecting JPMorgan from a likely whistleblower who will show that JPMorgan gave over 83 million customer records to the Cartel to help populate their "dark profile" database in Sweden. These "dark profiles" gather Orwellian levels of data from Facebook, social media, public records, healthcare data, tweets, blogs, photos and wherever else a person's name appears--all without the user's knowledge. One cannot claim without the user's permission since most social sites include a slimy user license agreement where the user unknowingly gives up all their rights to privacy.

Bharara is a fellow NSA Spy State Harvard operatives with Barack Obama, Eric Holder, Preet Bharara, Loretta Lynch, Jamie Dimon, Lloyd Blankfein, John Roberts, James P. Chandler, etc. etc.

Photo: FoxNews.

(Nov. 11, 2015)On Nov. 10, 2015, New York U.S. Attorney Preetinder Bharara charged three Israelis with hacking over 83 million JPMorgan accounts since 2007.

AFI readers will recognize Bharara's name. He is the U.S. Attorney currently prosecuting Paul Ceglia in his battle with Mark Zuckerberg and Facebook. Bharara disrupted Ceglia's civil suit against Zuckerberg by filing criminal charges against Ceglia for allegedly forging a 2003 contract with Zuckerberg and Facebook. Ceglia has fled with his family for safety.

Bookmark: #punks
The "Punk with a Pen" is b-a-c-k
Orin S. Snyder, Gibson Dunn LLP, aka the Punk with a Pen.
Orin S. Synder, Gibson Dunn LLP
Photo: NY Social Diary.
Judge Andrew L. Carter, Southern District of New York, U.S. v. Ceglia
Judge Andrew L. Carter, Jr., first judge until Cartel investments exposed.
Photo: US Courts.
See also US v. Ceglia Judge Holds Facebook Stock and Protects Zuckerberg’s Hard Drives (Bharara is the U.S. Attorney.)

Click here for Friends of Paul Ceglia press release, and Wellsville Daily Reporter.

See also recent Ceglia filings: U.S. Supreme Court Cert. (Nov. 5, 2015) | CA Superior Court (Oct. 19, 2015).

Preetinder Bharara, Loretta Lynch, Eric Holder
All Harvard Law sycophants
L/R: U.S. Attorney Preetinder Bharara, U.S. Attorney Loretta Lynch, U.S. Attorney General Eric Holder. Three Amigo's in the crimes against Paul Ceglia.
Professor James P. Chandler. Photo:NIPLI.
Chandler
All, including both Judges Carter and Broderick, are Harvard Law protégés of James P. Chandler. See a pattern?
Photo: The Last Civil Right.
On Nov. 13, 2015, Bharara's outside co-counsel in the US v. Ceglia judicial corruption, Orin S. Snyder, Gibson Dunn LLP (Bharara's former employer), has asked to join Zuckerberg's defense in Paul Argentieri's defamation case against Facebook. Synder was recently caught lying in the Ceglia case. Gibson Dunn is well-known to have Chief Justice John G. Roberts in their pocket, so apparently Synder has no fear of prosecution for fraud on the court.
Judge Vernon S. Broderick, Southern District of New York, U.S. v. Ceglia
Judge Vernon S Broderick, 2nd judge.
Photo: C-SPAN.
Let's hope the justices of the California Superior Court have some scruples. We'll see. See previous post Gibson Dunn Lawyers taint US v. Ceglia proceedings. Gibson Dunn also handled Facebook's corrupt appeal in Leader v. Facebook, even though Gibson Dunn partner, Thomas G. Hungar, is a Roberts protégé and previously represented the Federal Circuit judges (the judges all held Facebook pre-IPO stock, along with stock in all of Hillary & Bill's Wall Street donors—who are also all of Facebook's bankers and underwriters). Hmmmm. See a pattern? Birds of a feather . . . Facebook appears to be in short supply of hired liars attorneys.
The Wizaard of Oz
Fig. 2—IBM, JPMorgan and Microsoft, the Wizards of Tech Oz, hide behind surrogates, curtains and walls to mask monopolistic control of "The Internet of Things," including the NSA spying on American citizens via social networking platforms like Facebook. IBM works through Professor James P. Chandler and The Eclipse Foundation. Microsoft has hidden its influence over Eclipse via the University of Washington and other tech surrogates. JPMorgan feeds these unscrupulous actors the cash to fuel their treachery. In so doing, it appears these monopolies hope to sidestep exposure of their new anti-trust conduct. Eclipse has supplied Facebook, HP, Ericsson, SAP, Cisco and Intel, among many others.
Graphic: Kushandwizdom.

However, Bharara now has egg on his face in the Ceglia case. The US Secret Service lab recently declared the Ceglia-Zuckerberg contract genuine, and appears to have threatened Ceglia who has fled with his family.

The Vicious Circle of Corruption

Bharara also failed to disclose in the Ceglia case that he was a former partner at Gibson Dunn LLP, Facebook’s attorney. Gibson Dunn is also Facebook’s attorney in the Leader v. Facebook patent infringement case. Gibson Dunn had represented the Federal Circuit judges prior to the Leader case, yet those judges failed to recuse themselves. Chief Justice John Roberts ignored this mountain of conflicts. All these judges, including Roberts, had massive investments in Facebook, as did JPMorgan.

Analysis: Bharara works for the Spy State Cartel

Bharara appears to be a Cartel clean-up man.

Bharara yesterday created the same sort of grandstanding brouhaha around these JPMorgan indictments as he did when he staged Paul Ceglia's arrest.

Bharara wants us to believe that these three Israeli men engaged in the activities that read like a laundry list of Cartel activities.

Wow, these were three busy Israelis. Not.
(It takes large, well-funded organizations to accomplish all the things they are being accused of.)
“The alleged enterprise included pumping up stock prices, online casinos, payment processing for criminals, an illegal Bitcoin exchange, and the laundering of money through at least 75 shell companies and accounts around the world.” Reuters, Nov. 11, 2015.
  1. Pump and dump of stocks. This was the Facebook IPO tactic; JPMorgan was an underwriter and allowed insiders like Goldman Sachs, James W. Breyer, Accel Partners and Microsoft to sell on Day 3)
  2. Online casinos (practically all the Facebook underwriters, including JPMorgan, are laundering money through the Cayman Islands according to HCBC whistleblower Hervé Falciani)
  3. Bitcoin and payment processing for criminals also according to HCBC whistleblower Hervé Falciani
  4. 75 shell companies. See 2005 EuroTech SpA "Internet of Things" activity organized by JPMorgan Italy executive; See also 2007 Stratfor WikiLeaks revelations about C.I.A. offshore activity; See also 2008 James P. Chandler Cayman Islands offshore activity with CRYPTO, Technest, AccelPath, EOIR Technologies and The White Oak Group.

JPMorgan finances the Spy State Cartel

Do you think they would let three Israelis compromise their plans for global hegemony for eight years, undetected?

Click image to enlarge timeline
White House, IBM, Eclipse, Dell, EMC, Qualcomm 2015 Conspiracy Timeline
Fig. 3—On Oct. 10, 2015, Obama made a mystery trip to Qualcomm in San Diego after visiting the victims of the Oregon shooting. With Dell taking EMC private, Obama's Cartel is consolidating their power into fewer and fewer hands who are not accountable to public shareholders. Not surprisingly, JOHN BOEHNER bailed as Speaker likely to avoid further pressure from the Cartel to do their bidding (Boehner is heavily invested in Cartel funds, notably UBS, Fidelity, EMC, IBM, Microsoft, Oracle, Xerox, Goldman Sachs, JPMorgan Chase, State Street, Symantec, Vanguard and Wal-Mart; so is MITCH MCCONNELL, notably Vanguard, T. Rowe Price, UBS, Barclays, Wells Fargo, American). The now evident agenda is to consolidate embedded technology control of the Internet so that the new Administration will conclude that their infrastructure is "too big to fail" or be unplugged. Sound like JPMorgan? Rest assured, they can and must be unplugged. A Republic cannot survive the intrusions on privacy created by these self-serving Harvard sycophants behind a national security smoke screen.

Familiar Cartel conduct: Accuse your enemies of your  crimes

Bharara’s boss, Attorney General Loretta Lynch chimed in, “one of the largest thefts of financial-related data in history.” Bharara, Lynch and Eric Holder all graduated from Harvard Law.

Odor of corruption. JPMorgan security: incompetent or in on the Cartel's scheme?

JPMorgan and the Cartel must really think Americans are stupid. We are supposed to believe that three Israelis could set up 75 shell companies and steal 83 million JPMorgan customer records over eight years without detection? Either JPMorgan’s security people are totally incompetent, or they’re in on the scams. There is no middle ground.

2007 was a formative year for the Cartel

Magically, Bharara claims the hack started in 2007.

Microsoft started feeding customer data to the NSA in 2007, according to NSA whistleblower Edward Snowden. Barack Obama announced his candidacy on Facebook that year.

When one reads Bharara’s announcement between the lines, one discovers a now predicable smokescreen for another agenda. The story sounds real enough to believe, but all the people, names and dates are conveniently just out of reach, in Russia, Israel, and with a server in Egypt. That is one powerful server to be able to take down 83 million records without detection . . . for eight years. Yeh, right.

The story also contains an uncanny number of now known Spy State Cartel members like JPMorgan, Fidelity, Loretta Lynch, Preet Bharara, News Corp and Bitcoin. It would appear that by blaming the theft of data on these three Israelis, the Cartel will later be able to deny that the companies gave them their “Big Data” willingly.

Bharara’s story is not credible

Laughably, Bharara says no JPMorgan account information, passwords and Social Security numbers were accessed. Only contact information.

Ask yourself, what hacker with the skill and sophistication that these men are supposed to have would set up “75 shell companies,” hack 83 million customer records of one of the largest banks in the world, then steal only email addresses? Such a notion is truly humorous. Instead, they will sweep all the account information and at least sell it to the highest black market bidder.

What professional thief walks into a room and steals only the phone books and leaves 83 million piles of money on the table? Bharara's story is fabricated, we believe.

Obviously, this Bharara drama is a made-for-TV prosecution, in our opinion.

  • We were fooled by Hollywood by The Social Network lies about Facebook’s origins.

  • We are being fooled by Facebook’s corruption of senior federal judges in the Leader v. Facebook patent infringement case.

  • We are being fooled by IBM's control of the social enterprise for NSA snooping.

  • We are being fooled by the Harvard Law Cartel collusion among Barack Obama, Eric Holder, Preet Bharara, Loretta Lynch, Jamie Dimon, Lloyd Blankfein, John Roberts, James P. Chandler, et al.

  • We are being fooled by false stories about Paul Ceglia’s alleged forgery that has now been proved genuine, yet Bharara continues the persecution of Paul Ceglia.

Let’s not be fooled about this new JPMorgan false story.

SPOILER ALERT: JPMorgan likely covering Cartel tracks with this false cyberhack story

JPMorgan is very likely covering their tracks, just in case their customer data ever turns up on Spy State Cartel databases (which it surely will). More likely, JPMorgan has already fed their customer information to the Cartel to help build their “dark profiles.” These profiles are being stored offshore, in places like Lulea, Sweden.

In other words, it looks like the Cartel is creating an excuse for how 83 million JPMorgan customers’ data records (as well as Fidelity's) ended up in the Cartel’s “dark profiles” overseas.

Remember, JPMorgan helped create and fund the Spy State Cartel. They have been profiting from the personal background information about every American citizen since the early 2000s as the quid pro quo for helping the NSA create the Spy State infrastructure. That is a lot of all-too-tempting blackmail data.

How can you stop the spy state?

Stop the Cartel
Letter to Congress:
Word Doc

PDF Doc

For starters, the Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

* * *

Bookmark: #spy-state-surveillance
Fig. 4—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Artic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-players
Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 5—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

 

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

Friday, November 6, 2015

COMPLICIT ENCRYPTION GEEKS ENABLE THE AMERICAN SPY STATE

The invasion of America’s privacy is not possible without the support of encryption engineers

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Nov. 06, 2015, Updated Mar. 30, 2017 | PDF
Adolf Hitler with his Brownshirts
Fig. 1—Adolf Hitler relied upon his "Brownshirts" to spy on rivals.
In 1921, Adolf Hitler organized a group to protect his political rallies. They became known as Brownshirts (also stormtroopers, Sturm Abteilung – SA) after the color of their uniform shirts. Their activities evolved from protecting Hitler and Nazi meetings to disrupting the activities of those who opposed him. As Nazi influence grew, the Brownshirts gained a reputation as a well-organized gang of violent thugs. They became Hitler’s private army that led the violence on Kristallnacht (the "Night of the Broken Glass") in November 1938 that destroyed about half the synagogues in Germany and thousands of businesses, and sent tens of thousands of innocent citizens to camps (including the business and family of an AFI contributing writer, God rest their souls).
Encryption engineers are modern day Brownshirts?
While they put many off of Nazism, others were attracted to the group’s discipline. In 1934, to consolidate his power, Hitler ordered the killing of 85 Brownshirt leaders in a “blood purge” that became known as the “Night of the Long Knives.” These hits were carried out by the SS and Gestapo, the secret police of his emerging regime. Germany’s courts turned a blind eye to the murders, a judicial failure that ushered in Hitler as “the supreme judge of the German people.” Hitler then proceeded with his Third Reich eugenic vision of German superiority. (Eugenics: literally “well born”—a set of beliefs and practices that aimed to improve the genetic quality of humanity). IBM provided Hitler with computers to catalog Jews, Poles, Gypsies, homosexuals and political opponents.

America's encryption engineers are betraying our trust, just like Hitler's Brownshirts betrayed their own parents, colleagues, neighbors and relatives. No German was immune from their treachery. The American Spy State Cartel (a) spies on everyone, (b) harasses rivals, (c) supports eugenics, (d) is supported by complicit federal judges turning a blind eye to the law, and (e) presses Obama-Hillary's policy for the "harnessing of private incentives to public goals." They also (f) support IBM who formed The Eclipse Foundation in 2001 and created Facebook along with the rest of social networking industry which compiles detailed "dark profiles" on every person on the planet. These are all disturbingly similar attributes to Hitler's fascism.

(Nov. 06, 2015)—The invasion of America’s privacy in the Digital Age is not possible without the support of encryption engineers.

Technically, politicians and bureaucrats don’t breach your privacy, encryption engineers do. So what has gone wrong with the morality of these talented people? This post will review the facts and leave the moral questions for later.

Encryption engineers manage the digital keys that lock and unlock your data “at rest” (stored) and “in motion” (moving through the Internet).

Encryption must be regulated in public, not by spies, bankers, corrupt judges and greedy lawyers

To date, this esoteric, but all-important task of data encryption has been the murky domain of spies, lawyers and bankers, FISA court judges and tech geeks (the “Spy State Cartel”).

Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.

For example, the phrase “your cancer treatment program” would be encrypted with a digital key and travel through the Internet as “Qij\aq6NB5Lf@;kndFq7CN{Q{." So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor.

The Big Privacy Lie

That is the BIG PRIVACY LIE. The fact is, the Spy State Cartel knows about your cancer and stores that information (along with every other detail about your life) in a “dark profile” maintained on you offshore—out of the reach of the U.S. Constitution.

Only the NSA and their “public-private partner” commercial crony accomplices have access. See President Obama Executive Order No. 13691, Feb. 13, 2015—Promoting Private Sector Cybersecurity Information Sharing.

Edward Snowden, American Patriot
Photo: Edward Snowden, Digital Trends.

On Jun. 06, 2013, we first learned from NSA whistleblower and American patriot Edward Snowden that all of the major American Internet and telecommunications providers have given the NSA a backdoor master encryption key to all your data.

Your personal information is private in any form

Think about it. Would you be incensed if you arrived home tonight and discovered a person rummaging through your file cabinet? Of course you would. You'd call the police. What if it was the police, along with the phone company, a local politician, your and a group of local business leaders, just nosing around? You'd call out the hounds.

So then, why do you allow that very same activity to occur on your computer and phone just because you cannot see the bits and bytes through which they rummage? Put your foot down. Now!

These same providers colluded with former law professor James P. Chandler and crony commercial lawyers via the IBM Eclipse Foundation (2001) to write convoluted “end user license agreements” (EULA) where you agreed to give up your privacy in exchange for free applications and services, like email and document sharing. Stop signing and supporting this sneaky, slimy lawyering. Stop using providers that invade your privacy with such sneaky, abusive practices.

For example, Facebook’s EULA first states “You own all of the content and information you post on Facebook.” Sounds good, but then in the very next sentence you give up those rights “you grant us a . . . worldwide license to use any IP [intellectual property] you post.” It’s much worse, but the point is made.

Our encryption geek sons and daughters have betrayed us

These recalcitrant geek children of ours have allowed this unprecedented assault on our Constitutional rights to privacy and property. They don't appear to care, so let's give them motivation to care. Expose them.

When the NSA comes knocking at the door of an American company, they should be told "NO, you don’t have jurisdiction inside the borders of the United States." But, our encryption engineering children don't fight for our property and privacy rights. Instead, they just give them the backdoor keys and cash the bribery checks, in our opinion.

Bookmark: #drbg-list

Who are these encryption engineers?

The National Institute of Standards (NIST) is required by law to publish a list of companies and their hardware and software products that include a “DRBG Algorithm” which likely gives the NSA and their commercial cronies a permanent backdoor. This list includes contact names and addresses.

See Perlroth, N., Larson, J., Shane, S. (Sep. 05, 2013). N.S.A. Able to Foil Basic Safeguards of Privacy on Web. The Wall Street Journal.

The NIST DRBG Validation List is formatted oddly [NOTE, Mar. 30, 2017: This file has been removed from the NIST website—see HTML | PDF versions reproduced from the file when it was available.] Part of each table entry scrolls off the page. Printing cuts off the disclosure about DRBG algorithms, and it is over 200 pages. Experienced investigators say such unwieldy government disclosure files are common in agencies with something to hide from public scrutiny.

Here are properly formatted versions of the NIST file: HTML | PDF (Thank you to AFI researchers. It took eight hours to fix.)

The list has over 900 entries currently. It reads like a Who’s Who of Internet, computer, software  and telecommunications providers. Includes on the list are Microsoft, Dell, IBM, Cisco, Kapersky, Red Hat, Samsung, Motorola, Sonus, HP, Palo Alto Networks, Apple, McAfee, Oracle and Northrup Grumman.

Left & Right United Against Obama's Spy State
CREDO logo

Petition to Congress:
No end-of-year sweetheart deals for Spy State cronies on Wall Street

"Oppose, in must-pass bills to fund our government or our nation's infrastructure, more Wall Street handouts [incl. Citigroup] like attacks on the consumer protection agency, the Dodd-Frank financial reforms, and rules protecting investors."

Uncannily, the same companies are members of IBM’s Eclipse Foundation (2001). These companies all relied on Leader Technologies' social networking invention stolen by Professor James P. Chandler and the IBM Eclipse Foundation in 2001-2002.

Below are 133 of the most recent entries. Is your son, daughter, friend, or classmate on this list? Ask them why they are complicit or silent about this historic abuse of privacy. Ask them about their “sudden newfound wealth” (very likely for active colluders).

Their investments will likely focus on fellow Cartel members like JPMorgan, Morgan Stanley, Goldman Sachs, HSBC, UBS, Fidelity, Vanguard, T. Rowe Price, TIAA-CREF, Baillie Gifford, Credit Suisse, Barclays, Wells Fargo, Citigroup, Bank of America, Deutsche Bank and BlackRock. A trip to the Cayman Islands may have been in their vacation schedule.

Sons & Daughters Who may be Betraying our privacy — Encourage them to whistleblow and stop this madness

DRBG (Deterministic Random Bit Generator) Validation List, NIST, selected entries from the most recent 133 entries (over 900 total entries). Accessed Nov. 05, 2015. Click here for an Excel spreadsheet | PDF from which the following names were selected.
Company Name (last, first) Email Phone City State
Apple Inc Geddis, Shawn geddis@apple.com   Cupertino CA
Alcatel-Lucent Nothaft, Alfred alfred.nothaft@alcatel-lucent.com + 1-972-477-5087 Ottawa Canada
Alcatel-Lucent Rajsic, Carl carl.rajsic@alcatel-lucent.com + 1-613-784-6218 Ottawa Canada
Dell Inc. Mandava, Srihari srihari_mandava@dell.com   Santa Clara CA
Dell Software Inc. Sanagala, Usha    usanagala@sonicwall.com 408-962-6248  Santa Clara CA
General Dynamics Aylesworth, David David.Aylesworth@gd-ms.com 781-400-6527 Needham MA
Harris Corporation Kwak, Suzanne skwak@harris.com 585-242-4686 Rochester NY
Harris Corporation Ruggieri, Steven sruggi01@harris.com 585-239-7806 Rochester NY
HP Security Voltage Martin, Luther support@voltage.com 408-886-3200 Cupertino CA
Hewlett Packard Enterprise Johnson, Matt matt.johnson@hp.com 402-758-7262 Omaha NE
Hewlett Packard Enterprise Kuriyavar, Nagesh nagesh.kuriyavar@hp.com 402-758-7262 Omaha NE
Hewlett Packard Enterprise Pittman, Bob bob.pittman@hpe.com 978-264-5211 Littleon MA
Hewlett-Packard Drew, John john.drew@hp.com + 44-560-109-0356 Bristol UK
Hewlett-Packard Laredo, Laura laura.loredo@hp.com + 44-117-316-2462 Bristol UK
Hewlett-Packard Company Dhillon, Harjit Harjit.dhillon@hp.com 916-501-1426 Sunnyvale CA
Hewlett-Packard Development Company, L.P. Luciani, Luis            luis.luciani@hp.com 281-518-6762 Houston TX
IBM   Knibloe, Christine cknibloe@us.ibm.com 412-977-9398 Tucson AZ
IBM Corporation Fraser, Marie fraserma@ie.ibm.com + 353 (21) 730-6043 New Brunswick Canada
IBM Corporation Hernandez, Sandra hsandra@us.ibm.com 512-286-5624 New Brunswick Canada
IBM Internet Security Systems Leake, Sheena sleake@us.ibm.com 404-238-5565 Atlanta GA
IBM Internet Security Systems Moultrie, Ferrell fmoultrie@us.ibm.com 678-234-4069 Atlanta GA
Intel Corporation Nissen, Andy andy.nissen@intel.com 651-628-5385 Santa Clara CA
Motorola Solutions Inc. Nguyen, Tom kxp467@motorolasolutions.com 847-576-2352 Schaumburg IL
Motorola Solutions Systems Chmiel, Tomasz tomasz.chmiel@motorolasolutions.com + 48-12-29-79-000 Krakow PL
Motorola Solutions Systems Rypina, Tomasz tomasz.rypina@motorolasolutions.com + 48-12-29-79-000 Krakow PL
Northrop Grumman MS Network Security Howard, Kristian kristian.howard@au.ngc.com + 611300365893 Braddon Australia
Northrop Grumman MS Network Security Hoyle, Warwick warwick.hoyle@au.ngc.com + 611300365893 Braddon Australia
OpenSSL Software Foundation Inc. Marquess, Steve info@openssl.com 877-673-6775 Adamstown MD
Oracle Communications Mathiyalagan, Madhu madhu.mathiyalagan@oracle.com 781-538-7514 Bedford MA
Oracle Communications Suares, Nikhil nikhil.suares@oracle.com 781-538-7568 Bedford MA
Palo Alto Networks Bajic, Jake jbajic@paloaltonetworks.com 408-753-3901 Santa Clara CA
Palo Alto Networks Bishop, Richard rbishop@paloaltonetworks.com 408-753-4000 Santa Clara CA
Qualcomm Technologies Inc. Liong Ling, Yin Ling yliong@qti.qualcomm.com 858-651-7034 San Diego CA
Red Hat, Inc. Rubin, Ann-Marie arubin@redhat.com 978-392-1000 Raleigh NC
Samsung  Ahn, Changsup cs77.ahn@samsung.com + 82-10-3173-9021 Gyeonggi-do Korea
Samsung  Park, Jisoon js00n.park@samsung.com + 82-10-4556-5007 Gyeonggi-do Korea
Samsung Electronics Co, Ltd. Burnham, Kim bumhan.kim@samsung.com + 82-10-9397-1589 Gyeonggi-do Korea
Security First Corporation Orsini, Rick rorsini@securityfirstcorp.com 949-858-7525 Rancho Santa Margarita CA
Sonus Networks Inc. Chan, Nui nchan@sonusnet.com 1-855-GO-SONUS Westford MA
SUSE LLC Biege, Thomas thomas@suse.de + 49-911-74053-500 Cambridge MA
SUSE LLC Hager, Michael mike@suse.de + 49-911-74053-80 Cambridge MA
Toshiba Corporation Kimura, Akihiro akihero.kimura@toshiba.co.jp + 81-45-890-2856 Tokyo   Japan
ViaSat Inc. Naik, Savitha            savitha.naik@viasat.com 740-476-7416 Carlsbad CA
ViaSat Inc. Suksumrit, David david.suksumrit@viasat.com 760-476-2306 Carlsbad CA
Vmware Inc. Betts, Eric betts@vmware.com 1-650-427-1902 Palo Alto CA
Vmware Inc. Sturdivant, Gary    gsturdivant@vmware.com 1-650-427-4429 Palo Alto CA
Vocera Communications Inc. Crispin, Jacob cjacob@vocera.com 918042654719 San Jose CA
Vocera Communications Inc. Keunemany, Ammath akeunemany@vocera.com 408-882-4615 San Jose CA

How can you stop the spy state?

Stop the Cartel
Letter to Congress:
Word Doc

PDF Doc

For starters, the Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

* * *

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.