Ben Franklin: To sacrifice liberty for temporary safety is to deserve neither
(May 29, 2015)—Americans have a Fourth Amendment right to privacy against illegal search and seizure by the government. Sadly, IBM has returned to the scene of its WWII crimes with Adolf Hitler by underpinning the NSA's bulk data collection scheme and feeding that data to its Silicon Valley "Big Data" cronies. See previous post.
Since the early 2000’s, proponents of an electronic spy state have been at work. They discovered an invention that would give them what they wanted, if they could control its continued development and distribution. In the process, they would build in permanent backdoor keys for themselves. That innovation was Leader Technologies’ social networking invention.
Ohio innovator, Leader Technologies, walked into a Washington, D.C. trap disguised as legal advise
In 2000, Leader was introduced to George Washington Law professor, James P. Chandler. Chandler was the NSA’s chief intellectual property counsel. Chandler also advised IBM, Congress, the Federal Judiciary and the White House on information security. This introduction was dumb luck for Chandler, who was actively seeking a new Internet platform with IBM to achieve his vision of bulk surveillance. He fooled Leader into thinking they were in capable legal hands.
But capable of what? As it turns out, theft—the exact opposite of his "I'll protect your trade secrets" sign on the door.
Totalitarian Liberal Logic
Chandler’s totalitarian liberal logic was that Americans are not capable of securing themselves, so he and his friends will do it for us. And of course, it was only fair that they take good care of themselves. This is a quote from Chandler's Aug. 30, 2002 handwritten notes recently disclosed by a whistleblower (See Fig. 2):
TRANSCRIPT of Kelley Clements' stenographer's notes above:
We have no reluctance to share info. with the County - DO NOT GO PUBLIC w/ this
We do valuable work for our country and it is important for that to be understood and acknowledged
-Doug Duncan is aware [Montgomery County, Maryland, Executive]
NIPLI [Chandler's National Intellectual Property Law Institute] to define space specs
- what we need
- what we don't need
IBM Incorporating Members [The Eclipse Foundation]
Business Model - different from current business model
-consider some approach to partnering w/ IBM
"We do valuable work for our country and it is important for that to be understood and acknowledged."—James P. Chandler, III
He appears to have reasoned that taking care of himself and his friends along the way, well, that was only fair.
One thing led to another. Chandler's federal judge friends complained about their pay and how unappreciated they were. So, with JPMorgan’s help, Chandler and JPMorgan concocted a way to make judges wealthy through changes to mutual fund disclosures that Chandler used his Washington law influence to push through unsuspecting judicial conferences. Asking those judges to then rule his way on occasion, well, that was only a fair.
Chandler's client, IBM, was still licking its wounds at being eclipsed by Silicon Valley. So Chandler decided IBM would drive this bus and make Silicon Valley ride. Well, that was only fair.
Chandler's client, the Patent Office, would be instructed to cooperate, on occasion, whenever a pesky inventor whose technology they would steal, made a claim against this hegemony. To insure this, Chandler arranged with his buddy Obama to have his buddy at IBM, David J. Kappos, appointed Patent Office director in a rare recess appointment. Kappos's cooperation in killing patents Eclipse and IBM wanted to steal, well, that was only fair.
Silicon Valley's top thieves venture capitalists played along with Wall Street to create a stream of IPO spin offs off of Leader Technologies' social networking invention. JPMorgan, Goldman Sachs, Morgan Stanley, HSBC, and a slew of offshore money launderers constructed this Ponzi scheme on a heretofore unseen scale. The fact that all these conspirators pocketed fortunes themselves, well, that was only fair.
Mutual funds like Fidelity, Vanguard and T. Rowe Price were invited into the fold to create special mutual fund bribery vehicles to garner the dutiful cooperation of judges, bureaucrats and politicians. (Tip: "Invest in XYZ mutual fund and ask no questions." Wink. Wink. Don't worry, the "safe harbor concept" we slid through the Judicial Conference in 2001 will be your excuse if this scheme is exposed.)
Chandler's client, the NSA, wanted all the backdoor keys, which Chandler arranged with IBM's full support. After all, IBM had prior experience with Adolf Hitler and state surveillance. To reward the people and companies who helped the NSA achieve this goal, well, that was only fair.
(Well, aren't these people just a right fair bunch? Never mind they severely damaged propriety and the world economy in the process.)
IBM: Once a monopoly, always a monopoly. "Power corrupts, and absolute power corrupts absolutely." See previous post, IBM SOLD OUT AMERICA IN SALE OF PC GROUP TO CHINESE IN 2004.
How did Chandler unify all these disparate elements into a common cause?
U.S. Constitution eclipsed by Eclipse
Voile! On Nov. 29, 2012, IBM / Kappos and Chandler formed a fake foundation named "The Eclipse Foundation." IBM "donated" a mere $40 million (Leader Technologies had already invested $10 million and 145,000 man-hours). The term “Eclipse” is Freudian, as in block the U.S. Constitution in the process of building this secret spy engine.
Obama: Fundamentally Transforming America
Obama (and his cronies in banking, tech and the judiciary) would have had this Eclipse agenda in his head when he promised in 2008 to "fundamentally transform(ing) the United States of America."
With The Eclipse Foundation, these disparate players each received what they wanted. The NSA constructed backdoor keys; IBM drove global architecture; Silicon Valley cooked up IPOs with the help of a phalanx of crooked law firms; the Government gave "big data" metadata to feed crony Silicon Valley companies; Wall Street and mutual funds created "deal flow;" judges, bureaucrats and politicians grew rich by riding along and occasionally clear regulatory problems. Facebook took a piece, so did Instagram, Linked In, athenahealth, Castlight Health, Baidu, Mail.ru, Groupon Zynga, Microsoft, wikis, blogs, yada yada yada.
Ben Franklin scolded Chandler’s spy-state mentality centuries ago:
“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” —Ben Franklin (1759)
Ask your Senators to vote to stop NSA bulk data collection and related authorizations
No one in their right mind is against Constitutional law enforcement practices. Equally, no freedom-loving American should tolerate unConstitutional practices where personal information is stored in bulk, without a warrant that is approved by an impartial judge who is not an insider in the cronyistic secret spy state FISA court.
Totalitarian regimes collect bulk data. The American Republic should not.
The U.S. Senate meets in a special Sunday session to vote on whether or not to extend The Patriot Act and its bulk data collection program
Click here to find contact information for your Senator.
Please ask your Senators to vote to stop the un-American NSA bulk data collection program. The spy state apologists argue that no one can prove that the data has been abused. This is a self-serving argument since it is all secret. In any event, the very fact that it is being collected at all is an abuse of the U.S. Constitution. Senator Rand Paul rightly says: "We don't have to choose between fighting terrorism and obeying the Constitution."
Only police states spy indiscriminately
Only police states spy indiscriminately on its citizens to gain advantage. The NSA's spy-state apologists in Silicon Valley and Wall Street are using this metadata to manipulate public opinion, pad their coffers and influence votes. Count on it. America is being fundamentally transformed . . . in secret.
* * *
Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.
Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to firstname.lastname@example.org and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.