AFI Custom Search

To ensure you are reading the latest post, click the logo above.
SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Friday, February 26, 2016

BOMBSHELL: ZUCKERBERG EMAILS PROVE HILLARY ENCOURAGED FACEBOOK TO OBSTRUCT JUSTICE

Obama appointed Facebook attorneys to stonewall the truth about Facebook's spy origins

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Feb. 26, 2016, Updated Mar. 16, 2018 | PDF
Hillary R. Clinton wanted Facebook worse than she wanted to protect Leader Technologies Constitutional property rights
Fig. 1—Hillary Clinton and Barack Obama have protected Facebook's theft of Leader Technologies' social networking invention to promote their New World Order Agenda.
Photos: ibtimes.co.uk.

(Feb. 26, 2016)—Whistleblowers inside Facebook’s law firms have just leaked evidence proving that Hillary Clinton and Barack Obama colluded with Facebook’s lawyers to obstruct justice.

Bookmark: #mitt-romney-financials

Yesterday, an internal document surfaced from Gibson Dunn LLP, one of Facebook’s law firms. It proves that Facebook and CEO Mark Zuckerberg lied in multiple lawsuits about the existence and contents of Zuckerberg's 2003-2004 Harvard computers and emails. This evidence, which is now supported by Ceglia court filings (Doc. No. 42 link below) supports the Leader case that Facebook stole Leader's invention and obstructed justice to hide it from discovery.

Leader v. Facebook

Now, the lies are proven. In Leader v. Facebook, after nearly a year of stonewalling, Facebook's trial attorney, Cooley Godward LLP, claimed that all  of Zuckerberg’s 2003-2004 Harvard emails and computer hard drives were lost. They produced nothing to Leader Technologies in preparation for the trial. They never said that the information was lost until almost a year of stonewalling,  and just days before  they were going to be ordered to produce it by the judge.

When will lawyers condemn this judicial corruption and Constitutional betrayal?
Mark E. Zuckerberg, Thief and Pathological Liar.
Fig .2— Mark E. Zuckerberg, property thief, privacy invader, pathological liar, child predator, identify thief, fraudster, conspirator.

AFI researchers have uncovered more than 233 Zuckerberg Harvard emails between Jun. 02, 2003 and May 08, 2004. Click here for Doc. No. 42, Ceglia v. Zuckerberg, Facebook filed Nov. 17, 2011. It is unclear when the court published this. AFI researchers are just learning about it, and no one in the mainstream media has covered it.

The existence of even one of these Zuckerberg messages would automatically trigger Leader Technologies' right to forensically examine all of Zuckerberg's 28 computer devices and Harvard emails from 2003-2004.

On Oct. 23, 2009, even Magistrate Leonard P. Stark, Obama's eventual nominee, could not ignore Leader's due process right to forensically analyze Zuckerberg's evidence. He stated to then Facebook counsel, White & Case LLP, in a hearing on Facebook's year of stonewalling:

Leonard P. Stark, Leader v. Facebook trial judge
Fig. 5— Leonard P. Stark, Cooley Godward LLP recommendation to Obama; former partner at Skadden Arps LLP, Hillary Clinton's chief of staff, Christina M Tchen, former law firm; Hillary donor.
Donald K. Stern, Cooley Godward LLP; Obama judicial adviser
Fig. 4— Donald K. Stern, Cooley Godward LLP, Facebook attorney,
Obama justice adviser; Obama McBee Strategic energy stimulus adviser.
Heidi L. Keefe, Cooley Godward LLP; former White & Case LLP Facebook attorney
Fig. 3— Heidi L. Keefe, Cooley Godward LLP, Facebook attorney, former White & Case Facebook attorney.

Magistrate Stark on Facebook's year of stonewalling review of Zuckerberg's 2003-2004 Harvard information: "I am inclined to the view that prior deposition testimony related to what materials were relied on in the development of the Facebook website sounds to me like it may very well prove to be relevant and the production of it could also streamline and thereby make more efficient the deposition process in this case."

On Oct. 26, 2009, three days later, Facebook replaced White & Case LLP with Cooley Godward LLP, however, the attorneys remained, including Heidi Keefe. Tellingly, Cooley Godward's partner, Donald K. Stern, was now Obama's Justice adviser at the White House.

Thomas G. Hungar, Gibson Dunn LLP
Fig. 6— Thomas G. Hungar, Gibson Dunn LLP, Facebook attorney.

On Jun. 04, 2010, Heidi L. Keefe, Cooley Godward LLP, instructed Zuckerberg during his Leader v. Facebook deposition not to answer any questions about his 2003-2004 activities.

Gibson Dunn LLP partner, Thomas G. Hungar, a protégé of Chief Justice John G. Roberts, Jr., became Facebook's appeals attorney in Leader v. Facebook. He had represented the judges in the appeals court and both he and the Federal Circuit judges should have recused themselves due to their obvious conflict of interest. But alas, the entire legal community sat silent while Facebook and the Courts performed their charades. Evidently all in the Facebook (Crime) Family.

Bookmark: #zuckerberg-leak-LOST-devices
Zuckerberg's 28 concealed computing devices and Harvard emails
Fig. 7—Mark E. Zuckerberg and Facebook denied the existence of 28 Zuckerberg computer devices and Harvard emails in Leader v. Facebook. However, Facebook's lawyers, Gibson & Dunn LLP, leaked an internal spreadsheet verifying that Zuckerberg's Inbox contained hundreds of emails and files that should have been produced in Leader v. Facebook. Such lies during litigation are Fraud on the Court and are criminal offenses since they obstruct justice. Click here: PDF of the leaked Facebook spreadsheet proving that 2003-2004 information existed.
Photo: Business Insider

Ceglia v. Zuckerberg

Orin S. Snyder, Gibson Dunn LLP, The Punk with a Pen
Fig. 8— Orin S. Synder, Gibson Dunn LLP, Facebook's and Zuckerberg's lawyer in the Ceglia v. Zuckerberg. Some call him the "Punk with a Pen."

Facebook's experts lied. In Ceglia v. Zuckerberg,  Facebook's trial attorney, Gibson Dunn LLP, accused Ceglia of forging over 233 emails exchanged with Zuckerberg during 2003-2004. However, the courts have never  allowed Ceglia to examine Zuckerberg’s information from the same period.

In Nov. 2011, according to sources close to the case, the Winklevoss Twins' attorney warned Ceglia that 28 Zuckerberg hard drives and Harvard emails were never lost as Cooley Godward LLP and Zuckerberg had told Leader Technologies. They were in the custody of Gibson Dunn LLP, and were about to be destroyed. Ceglia's attorneys successfully stopped the destruction.

However, for the next six months, the court continued to shield Zuckerberg's information until finally allowing Ceglia to depose Facebook's experts about Facebook's information. The impropriety aside of only allowing self-serving expert testimony, Ceglia's attorney was blistering nonetheless.

Michael F. McGowan, Stroz Friedberg
Fig. 10— Michael F. McGowan, Stroz Friedberg, Facebook forensic expert who lied about the presences of Ceglia emails on Zuckerberg's 28 hard drives and Harvard emails.
Bryan J. Rose, Stroz Friedberg
Fig. 9— Brian J. Rose, Stroz Friedberg, Facebook forensic expert who lied about the presences of Ceglia emails on Zuckerberg's 28 hard drives and Harvard emails.

In two days of testimony, Facebook's Stroz Friedberg experts, Bryan J. Rose and Michael F. McGowan, confirmed the existence of the 28 computer devices and Harvard emails.

Three months later, criminal charges were filed against Ceglia for forgery of his contract with Zuckerberg (charges which have since been proven unfounded by the U.S. Secret Service forensic lab).

Facebook’s Stroz Friedberg experts lied like drunken sailors.

They admitted appalling professional incompetence (or amnesia):

  1. Took no notes,
  2. Did not ask Zuckerberg if they had everything,
  3. Did not confirm a chain of custody (who has preserved the hard drives and data from tampering and deterioration),
  4. Were not impartial or arm’s length,
  5. Were paid by Facebook, and
  6. Took their search terms from Gibson Dunn LLP.

Banana Republic Courts

To this day, Ceglia's experts have been stonewalled and been unable to study Zuckerberg's 28 computers and Harvard emails. This injustice is just gross; as bad as in a Banana Republic; worse since it is happening in the United States where we are supposed to be better than this.

They were asked a straightforward question:

“If you found an email between Ceglia and Zuckerberg, would you report it?”

Facebook Experts: TweedleDum and Tweedledee

Rose and McGowan waffled with repeated vagaries like “don’t recall,” “not sure,” “hard for me to answer.” Experts are supposed to help juries learn the facts. It is illegal for experts to simply shill and obstruct fact finding for their client, thus betraying their expert objectivity, as Rose and McGowan clearly did. In this case, Tweedledum and Tweedledee would've remembered more than these purported experts.

On the key question of whether Zuckerberg’s assets contained messages from Paul Ceglia, Michael McGowan said:

“I don’t believe so.”

This admission is a bombshell.

Bombshell: Zuckerberg's fraud on the court proved

The whistleblower evidence proves that "I don't believe so" is a boldface lie. It also proves Facebook committed fraud on the court in both Ceglia v. Zuckerberg and Leader v. Facebook.

Orin S. Snyder, Gibson Dunn LLP, The Punk with a Pen
Fig. 11— Orin S. Synder, Gibson Dunn LLP, labelled all of Ceglia's emails bogus. His own leaked internal documents prove he is the liar and defrauded the court.

The leaked forensic spreadsheet was created on April 30, 2012 by "METROSTAR." It compares 111 Ceglia emails and 233 Zuckerberg emails. Here are the Ceglia emails that mostly match messages also in Zuckerberg's emails and prove McGowan lied.

Facebook's Gibson Dunn LLP's attorney, Orin S. Snyder, called the "Punk with a Pen," said that Ceglia's emails were: "supposed emails," "fabricated emails," "fraudulent emails," "those emails were concoted," "bogus emails," "his so-called emails," "purported emails, " and "made up emails." Clearly, Snyder is a bully who spews falsities in bombastic tirades.

Reading Snyder's outburst reminds one of Hamlet, Act III, Scene II (1599): "The lady doth protest too much, methinks." Hamlet's mother, Queen Gertrude, observes of the actor who is secretly playing her in Shakespeare's play-within-a-play that the actor's too frequent and vehement attempts to convince others of some matter of which the opposite is true, makes her appear defensive and insincere.

Note: The leaked Stroz Freidberg spreadsheet was created by "METROSTAR." A Washington, D.C. company named METROSTAR SYSTEMS has a long client list of federal government agencies, including the Department of Justice, Patent Office and FBI. Could this company be running cover and obstructing justice for Facebook on the goverment's dime?

70.5% emails in common in Ceglia's & Zuckerberg's email Inboxes between Jul. 16, 2003 and Oct. 20, 2003

Between Jul. 16, 2003 and Oct. 20, 2003, Ceglia had 62 out of 88 held by Zuckerberg. In other words, 70.5% were held by both men.

Zuckerberg sections missing, strong evidence of doctoring by lawyers

Between Jun. 2, 2003 and Jul. 14, 2003, Ceglia had 42 for which Zuckerberg had 0.

Between Oct. 21, 2003 and May 8, 2004, Ceglia had 103 for which Zuckerberg had 0.

This proves Ceglia did not forge them since he would have had to hack through Harvard FASmail system security and make substantial changes, undetected. He did not have that kind of technical proficiency.

StreetFax mentioned 78 times; proves Ceglia told the truth and Zuckerberg lied

“StreetFax” is mentioned 78 times in the spreadsheet. (This is the smoking gun for McGowan's "I don't believe so" lie.) StreetFax is the parallel project that Zuckerberg and Ceglia were working on along with Facebook.

Zuckerberg's emails either have a typically techie tone, spelling (poor) and grammar (loose), or they are flowery, well-written, properly punctuated and formatted, and obvious written by lawyers.

During the Ceglia case, Facebook accused Ceglia of forging hundreds of emails.

However, the leaked spreadsheet debunks the Facebook accusation that Ceglia forged hundreds of emails. It proves unequivocally that Zuckerberg has lied all along and Ceglia is telling the truth. But, Ceglia has been idicted and had to flea the government's persecution. Click here for more in defense of Paul Ceglia.

obama's and Hillary's pattern of racketeering to promote facebook and obstruct justice

Barack Obama's and Bill & Hillary Clinton's Racketeering Partial Timeline
2007 Click here for full timeline: The Greatest Financial Crime in the History of the World
Feb 10 Barack Obama announced candidacy on Facebook
  12 Bill and Hillary Clinton donated $154m for brokering UrAsia (Goldman Sachs) uranium deal
Mar 01 Bill paid $150,000 for Goldman Sachs speech (UrAsia uranium broker; Facebook broker)
  08 Bill paid $150,000 for Goldman Sachs speech (UrAsia uranium broker; Facebook broker)
2008
Nov 04 Goldman Sachs, Morgan Stanley, JPMorgan, Citi received tens of $ billions in TARP funds
  12 Obama appointed Larry Summers (Clinton Sect'y) to manage TARP despite huge bank speech fees
Nov 21 Leader sued Facebook for patent infringement
Dec 05 Obama appointed Donald K. Stern, Cooley Godward LLP to Justice transition (Facebook lawyer)
  12 FISA Court gave Attorney General near dictatorial spy authority; allowed NSA dragnet
2009
Jan    
Feb 13 Hillary registered www.clintonmail.com domain
  20 Obama inaugurated 44th President
  21 Hillary appointed Secretary of State
  23 Hillary hired Anne-Marie Slaughter (A New World Order)
Mar 21
Hillary started using personal Email server
  27 Eric Holder confirmed as Attorney General
Apr 06 AOL (IBM Eclipse) funded with $42 million from Goldman Sachs, Morgan Stanley and CitiGroup
  15 Obama ordered all FOIA’s vetted thru White House (likely James P. Chandler, III)
May 26 Russian Yuri Milner (Goldman Sachs partner) invested $200 million in Facebook
Jun 06 Facebook started feeding user data to NSA (also other IBM Eclipse members)
  16 Bill Clinton and Goldman Sachs broker $3.1 billion Uranium One deal
  18 IBMer David Kappos nominated for Patent Office director
Jul 09 Hillary declared intent to use Facebook for eDiplomacy
Aug 07 IBMer David Kappos appointed Patent Office director in rare recess appointment
Sep 29 Obama consolidated executive spying overseen by Hillary and Holder
Oct 22 Facebook stonewalled discovery in Leader v. Facebook
Nov 13 Facebook filed for reexamination of Leader’s patent
Dec 29
31
Hillary Clinton invited IBM Eclipse insiders to Internet Freedom speech
Obama established inner spy circle including Clinton and Holder
2010
Jan    
Feb    
Mar 09
Leader attorneys eviscerate Facebook in the Markman Hearing
  17 Obama nominated magistrate Leonard P. Stark to Leader v. Facebook court
Apr 01 Zuckerberg declared he “lost” all his 2003-2004 Harvard computer information
  01 David Kappos and Patent Office launched Facebook page despite reexamination
May    
Jun 24 Obama nominee Judge Stark took over Leader v. Facebook trial; held Facebook stock interests
  24 Stark allowed new Facebook on-sale bar claim; denied Leader discovery
  29 Bill Clinton paid $500m for Moscow speech and UrAsia (Goldman Sachs) uranium deal
Jul 08
Obama appointed Theodore B. Olson, Gibson Dunn, as White House adviser (Facebook)
  14 Bill Clinton paid $175,000 for Microsoft speech (IBM Eclipse, Goldman Sachs, Facebook)
  19 Leader v. Facebook trial started
Table 1—Partial timeline of Barack Obama's and Hillary Clinton's racketeering to promote and protect Facebook. Click here for full timeline.

What can I do about this? Plenty.

What does the average American do about this legal profligacy? Complain loudly and persistently to public officials and the media, and keep complaining until these injustices are righted. Otherwise, if these people are allowed to get away with mistreating Leader Technologies and Paul Ceglia today, you, your family and friends will be next.

http://www.contactingthecongress.org/

* * *

 

10% to whistleblower(s)

Leader Technologies has indicated they are willing to pay a 10% reward for information that leads to the recovery of funds by their shareholders.

Bookmark: #stop-the-cartelStop the Cartel
Letter to Congress:
Word Doc

PDF Doc

The Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

Obama’s Fundamental Transformation of America - Saul Alinsky's Playbook for community organizing
Fig. 10—Obama's Fundamental Transformation of America. His wheel of corruption.
Graphic: AFI.

Click here for hijack of the cyber world timeline and database.

Bookmark: #spy-state-surveillance
Fig. 11—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-players
Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 12—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.


Thursday, February 11, 2016

OBAMA PROMOTES IBM CRIMINALITY IN LATEST EXECUTIVE ORDER

Tries to codify IBM's theft of social networking from Ohio innovator Leader Technologies by calling it "The Internet of Things"

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Feb. 12, 2016, Updated Feb. 25, 2016 | PDF
Breaking News! Feb. 23, 2016C.I.A. whistleblower Jeffrey Sterling, currently serving jail time for leaking documents to The New York Times, said today from his prison cell that Hillary Clinton has been given a pass by the Obama Administration regarding her flagrant email abuses of classified information. Hillary's untouchability is evidently tied to Bill Clinton's defining role in the National Infrastructure Advisory Council (NIAC) and collusion with IBM and the IBM Eclipse Foundation exposed by Obama's latest executive order discussed in this post.
Barack Obama awarded NIAC charter member and social networking thief, IBM, and retiring IBM Chairman, President and CEO, Samuel Palmisano, the 2008 National Medal of Science and the National Medal of Technology and Innovation on Oct. 7, 2009. Getty/Mandel NGAN
On Oct. 07, 2009, Samuel Palmisano, retiring IBM CEO and National Infrastructure Advisory Council (NIAC) charter member (including the membership of chief outside counsel, James P. Chandler), was awarded the a awarded the 2008 National Medal of Science and the National Medal of Technology and Innovation by new President Barack Obama. Photo: Getty/Mandel NGAN
Fig. 1—Barack Obama showers IBM with awards, favors and "criminal" Executive orders
Public Health Notice about Hazards of Facebook Use
Click here to download:
This image | Block version
Abuse of power thru three presidents: These Executive Orders are Ground Zero of the American "public-private" Spy State—without an ounce of Congressional oversight.

A succession of executive orders preceded Obama latest order on Feb. 09, 2016.

EO 13130 (Jul. 14, 1999, Clinton) became:
  • EO 13286 (Feb. 28, 2003, Bush), then
  • EO 13385 (Sep. 29, 2005, Bush), then
  • EO 13446 (Sep. 28, 2007, Bush), then
  • EO 13511 (Sep. 29, 2009, Obama).
  • Now comes: EO [unnumbered] (Feb. 09, 2016, Obama).
These orders have created the American spy state "public-private" Cartel, with spy master James P. Chandler, IBM and Thomas E. Noonan directing traffic. All this activity has occurred outside of Congressional oversight.

This is the shadowy "Washington Cartel" that uses mass surveillance to blackmail, coerce and bribe bureaucrats, politicians, judges, academia and the media into submission, in our opinion. An endless stream of "dirt" on your targets is a powerful weapon to preserve power.
Photos: Getty Images, Mandel Ngan; IBM.

(Feb. 11, 2016)—Just a few days ago, on Feb. 09, 2016, Barack Obama signed an Executive Order creating the Commission on Enhancing National Cybersecurity (CENC).

Obama is documenting a pattern of fraud and racketeering

President Obama wrote in protections for IBM's "The Internet of Things" market push. We believe this action is criminal on numerous counts. (1) He violates ethical pledges of impartiality by federal employees, (2) he fraudulently conceals his IBM loyalties, and (3) he colludes with a host of individual and companies across state lines in a pattern of RICO racketeering (Racketeer Influenced and Corrupt Organizations).

Barack Obama Executive Order, Sec. 3(a)(ii), Feb. 09, 2016, Commission on Enhancing National Cybersecurity (CENC)

Barack Obama Executive Order, Feb, 9, 2016, Sec 3(a)(ii)
Fig. 2Barack Obama Executive Order, Feb. 09, 2016, Commission on Enhancing National Cybersecurity (CENC). Obama identifies IBM "The Internet of Things" market initiative and is attempting to codify its stability and adaptability. Obama fails to disclose that IBM's claim to the enabling social networking technologies is fraudulent, having been stolen from Columbus, Ohio innovator Leader Technologies, Inc.
IBM Internet of Things promotion
Fig. 3—IBM started using the term "The Internet of Things" and cloud computing in about 2009. Today, this theme dominates IBM's market push. Barack Obama is essentially using the power of the presidency to promote IBM in evident violation of the ethics rules, namely the Standards of Ethical Conduct for Employees of the Executive Branch (Subpart D - Conflicting Financial Interests, and Subpart E - Impartiality in Performing Official Duties).

Obama's order is the latest in a string of cybersecurity orders reaching back to Bill Clinton in 1999. On the surface the goal to protect the national from cyber threats seems noble enough. However, these orders are the devil's playground. They have created the illegal American spy state outside of Congressional oversight.

The councils created carry the same acronym:

1999-2001 National Infrastructure Assurance Council (NIAC) (Clinton)
2002-2016 National Infrastructure Advisory Council (NIAC) (Bush, Obama)

Barack H. Obama
Barack H. Obama
George W. Bush
George W. Bush
William J. Clinton
William J. Clinton

Here's the sequence of these secretive executive authorities, all funded by the U.S. Department of Commerce which also manages the U.S. Patent Office:

1999-2001
Clinton EO 13130

2002-2008
Bush EOs 13286, 13385, 13446
"In confusion, there is profit." See this overview of the Bush EO 13286 for a veritable playground for legal mischief, unaccountable power-mongering and greed.

2009-2016
Obama EOs 13511, [02/09/2016 unnumbered]
Preparing the way for behind the scenes manipulation via IBM, Silicon Valley, Wall Street cronies during the next administration

The public record shows that IBM and its career IBMer Thomas E. Noonan have been fixtures at NIAC since inception.

IBM Spy State Timeline


James P. Chandler, III
James P. Chandler, IBM & Leader counsel
On Jan. 18, 2001, Clinton appointed career IBM outside counsel (and his national security adviser), James P. Chandler to NIAC.
Thomas E. Noonan
Thomas E. Noonan, IBM


On Nov. 29, 2001, IBM provided a $40 million "donation" to start The Eclipse Foundation with their chief outside intellectual property counsel, James P. Chandler, who was also Leader Technologies' patent counsel, but who did not disclose his conflicts of interest, which is unethical and illegal for an attorney.

On Aug. 29, 2002, Leader Technologies invention, magically appeared in IBM Eclipse Version 2.0.1, just 11 weeks after Leader had provided a custody copy of the source code to Chandler.

On Sep. 18, 2002, Bush appointed career IBMer Thomas E. Noonan to begin what would become a 14-year reign at NIAC (2002-2016), along with others, notably Cisco's John T. Chambers. Under George Bush, the name changed to the National Infrastructure Advisory Council, but the NAIC acronym was unchanged.

On Feb. 2-5, 2004, IBM Eclipse Foundation sponsored the first EclipseCON 2004.

On Feb. 4, 2004, Facebook launched during IBM EclipseCON 2004.

On Apr. 14, 2004, Bush invited Wall Street to the spy state party, under the guise of "best practices;" banks like Goldman Sachs, JPMorgan and Morgan Stanley (later Facebook underwriters).

On Dec. 08, 2004, IBM wrote they were "unable to locate" the original creator of the Eclipse social networking source code (Leader Technologies).

On Dec. 08, 2004, IBM sold the PC Group to the Chinese (Lenovo), underwritten by Goldman Sachs, JPMorgan and Credit Suisse (later Facebook underwriters).

On Feb. 10, 2007, Barack Obama announced his candidacy for president on Facebook, evidently an IBM spying creation.

On Aug. 07, 2009, Obama appointed another career IBMer, David J. Kappos, to run the Patent Office. Kappos is a Chandler protégé. The Patent Office is managed by the U.S. Department of Commerce which was and is also funding the NAIC executive orders. By Oct. 27, 2009, Kappos dumped his IBM stock and purchase The Vanguard Group—a big winner in the Facebook pintail public offering in 2012.

On Oct. 07, 2009, Obama awarded IBM the 2008 National Medal of Technology and Innovation social networking "The Internet of Things" invention which was STOLEN from Leader Technologies.

On Nov. 03, 2011, IBM, Eurotech SpA and The IBM Eclipse Foundation gave Facebook IBM's MQTT messaging technology.

On Mar. 22, 2012, IBM sold Facebook 750 patents.

On Apr. 17, 2012, career IBMer and Patent Office director, David J. Kappos, ordered Leader Technologies' patent killed by internal secret "reexamination" court. He assigned former IBM employee, Stephen C. Siu, as chief judge.
White House, Mar. 02, 2015, Technology CEO Meeting, Barack Obama, Valerie Jarret with IBM, EMC, Xerox, Micron Technology, Qualcomm, Dell
On Mar. 02, 2015, Obama and Valerie Jarrett met with his Pay-to-Play "Technology CEO Council" at the White House, including IBM's Virginia M. Rometty.

On Feb. 09, 2016, Obama promotes IBM's the "Internet of Things" by name in a new Executive Order likely in violation of ethics, racketeering and fraud laws, for starters.

It is time to pull the plug on this abject criminality masquerading as national security.

Bill Clinton installed James P. Chandler to navigate NIAC through the Bush years

James P. Chandler, III
Fig. 4—James P. Chandler, III, spy master

Tellingly, on Jan. 18, 2001, just a day before Clinton left office, he appointed James P. Chandler as a member of NIAC. Chandler was legal counsel to both IBM and Leader Technologies.

Evidently, Chandler's role was to ensure that: (1) IBM controlled the emerging spy state and (2) Leader Technologies' new social networking invention became NIAC's core Internet architecture and applications.

On Nov. 29, 2001, IBM and Chandler founded The Eclipse Foundation to become the repository of Leader Technologies' social networking invention.

On Aug. 29, 2002, IBM published Leader's invention in IBM Eclipse Version 2.0.1 illegally marked with IBM copyrights. Chandler had received a custody copy of Leader's invention—his other paying client—eleven weeks earlier.

On Aug. 30, 2002, a whistleblower revealed Chandler's duplicity and collusion with IBM and the U.S. Patent Office in Chandler's personal notes.

Thomas E. Noonan (NIAC member from 2002-2016) disguised deep IBM loyalties

Thomas E. Noonan, NIAC appointment, George Bush, Sep. 18, 2002
Fig. 5—On Sep. 18, 2002, Thomas E. Noonan was appointed by George Bush, promoted by IBM outside counsel, James P. Chandler. Tellingly, Noonan gave a resume (shown above from NIAC's meeting minutes) that did not disclose that his Internet Security Systems is an IBM company and that he is a career IBM employee. This is very evidently willful deception. Chandler also does not disclose his close association with IBM and IBM's chief insided intellectual property counsel, David J. Kappos. Also tellingly, Kappos was appointed by Barack Obama as director of the U. S. Patent Office on Aug. 07, 2009 in a surprise recess appointment.
Thomas A. Noonan
Fig. 5—Thomas A. Noonan, career IBMer, IBM Internet Security Systems (ISS) (1994-2008); Cisco (2009?-2016). His time after ISS appears to have been spent in Cisco surrogates.

On Sep. 18, 2002, two weeks later, George Bush appointed Thomas A. Noonan as a member of NIAC, but cleverly disguised his long association with IBM.

Noonan's current biographies hide his deep IBM affiliation (1994-2008). Even NIAC's official records present a confused jumble of ambiguous associations. For example, Noonan's LinkedIn profile list five different affiliations from 1994 and 2008. He lists:

  • GM, IBM Internet Security Systems, December 2006–June 2008 (1 year 7 months)
  • CEO, Internet Security Systems (ISS) (an IBM Company) 1995–2008 (13 years)
  • CEO, ISS (NASDAQ: ISSX, Acquired by IBM) 1994–2008 (14 years)
  • Chairman and CEO, Internet Security Systems (ISS) 1994–2008 (14 years)
  • CEO, Internet Security Systems March 1994–December 2006 (12 years 10 months)

How can one IBM employee be so confused about who he works for, unless he's not, but wants readers of his resume to be confused?

Noonan's shell game

Noonan's jumble of company names and titles are clearly meant to hide his continuous and ongoing IBM affinities. IBM corporate website states: "Once an IBMer, always an IBMer." Judging from Noonan's post 2009 resume and current position at Cisco (another NIAC fixture), Noonan is receiving his "handsome reward" of significant financial gains, like another one of his dutiful counterparts at Baidu (China), Robin Y. Li.

AFI researchers see a now familiar Cartel pattern of obfuscation in Noonan's jumbled affiliations meant to confuse and discourage the casual reader from further investigation.

Noonan has failed to disclose Cobian Corp (now IBM too)

Noonan failed to disclose a shady Cobian Corp, formed in Andover, Massachusetts on Nov. 04, 2002, just two weeks after George Bush / James P. Chandler appointed him to NIAC on Sep. 18, 2002. Germans Olaf Jacobi and Friedrich von Diest are identified on the incorporation papers. The incorporation attorney was a thuggish-looking Steffan Vounessea.

No evidence of a real Cobian Corp business exists.

However, on Oct. 11, 2006, IBM merged Cobian into Noonan's Internet Security Systems and moved the operation, such as it was, to IBM's Atlanta office at 6303 Barfield Rd NE, Atlanta, GA 30328.

NIAC Advisory Meeting Minutes re. Thomas E. Noonan's failure to disclose his IBM association.
Fig. 6—Thomas E. Noonan disguised his IBM association to the National Infrastructure Assurance Council (NIAC) during its formative days. Noonan was recommended to this post by IBM chief outside intellectual property counsel, James P. Chandler. Chandler never disclosed his Noonan association to Leader Technologies, according to a Leader spokesperson. Noonan's public resumes are a jumble of on again, off again, overlapping disclosures of his career at IBM. Here are just a few of Noonan's vague and incomplete resumes: Cisco, Cisco-JouleX, eWorks, LinkedIn, TechCrunch, TechOperators, and Bloomberg.

The evident purpose of Thomas E Noonan's jumbled biographies is to distance himself from his career IMB association which would lessen IBM's overarching control of NIAC activities to direct public policy on national security. Obama's latest executive order shows that IBM intends to embed the future of IBM in America's embedded infrastructure, just ensuring that the gravy train will be in perpetuity. One small problem for IBM is the fact that they rely on the seminal cloud computing invention of social networking that they stole from Columbus innovator, Leader Technologies. Click here: NIAC Meeting Minutes from Jan. 13, 2004. Click here: Terrorex 04 timeline.

Noonan knows about perjury. His failure to disclose Cobian Corp appears willful. What are IBM & Noonan hiding?

On Oct. 11, 2006, IBM and Thomas E. Noonan merged Cobian Corp into IBM and Noonan became its chief executive and chairman. In Cobian Corp's Massachusetts filings, Noonan acknowledges that he knows what perjury is.

NIAC Advisory Meeting Minutes re. Thomas E. Noonan's failure to disclose his IBM association.

Fig. 7—Thomas E. Noonan demonstrates in this Cobian Corp disclosure that he is aware of the legal penalties for failing to disclose material information. However, nowhere does he ever disclose his association with Cobian Corp. To the best of our knowledge and research, Noonan has never disclosed Cobian Corp to the American public during his tenure at the National Infrastructure Advisory Council (NAIC). Click here: Cobian Corp, MA Sec. of State Filing Apr. 06, 2006.

Cobian Corp appears to have been a "shell" company (no operations) that IBM and Noonan felt compelled to merge into IBM on Oct. 11, 2006 to make it go away. Given Noonan's and IBM substantial role in the secret workings of the NAIC, the American public have a right to know what Noonan and IBM are hiding.

Fact: IBM's theft of Leader Technologies' social networking invention was occurring concurrently with the Cobian Corp formation

The AFI Timeline shows for a fact that James P. Chandler and IBM were in the thick of the theft of Leader Technologies' invention at that time. On Aug. 29, 2002, IBM Eclipse release version 2.0.1 On Nov. 04, 2002, Cobian Corp formed, and without any known operation. Then on Oct. 11, 2002, Cobian Corp was merged out of existence into IBM Internet Security Systems (Thomas E. Noonan's company) whereupon Noonan became its Chairman and CEO.

Thomas E. Noonan's undisclosed associations among himself, IBM and the National Infrastructure Assurance Council (NAIC).

Fig. 8—Cobian Corp timeline. IBM has very evidently exploited Leader Technologies' invention of social networking and co opted it for its "The Internet of Things" strategy. It appears that IBM's entire corporate strategy is now based on theft of Leader Technologies' invention. Even Barack H. Obama, the man we elected to protect the property and invention of all Americans, steals it for himself and his narrow-minded cronies. Click here: PDF of this timeline.

Noonan's smoking gun: undisclosed relationships reveal the Spy State Cartel promoted by Clintons, Obama, Bush


Fig. 9—Thomas E. Noonan's undisclosed NAIC relationships reveal the spy state public-private Cartel. Click here: PDF of this timeline.

Internet Security Systems Form S-1. (Jan. 20, 1998). SEC Edgar (verifies material Thomas E. Noonan relationships with Goldman Sachs, UBS, Bank of America, Kleiner Perkins (Google), Facebook, LinkedIn, Reid Hoffman, Accel Partners, James W. Breyer, AT&T and Greylock Partners, Merrill Lynch, PNC Bank, Intel, IBM, HP, Xerox, Microsoft, Lucent, Siemens, Lockheed Martin, AOL, Bell Atlantic, Bell South, GTE, Nippon, Netcom, NASA, USAF, US Army, US DoD, US State Dept, EDS, KPMG, Price Waterhouse, SAIC, SITA).

Karkaria, U. (May 29, 2013). Cisco to acquire Atlanta energy firm JouleX [Thomas E. Noonan] for $107 million. Atlanta Business Chronicle.

Karkaria, U. (May 31, 2013). JouleX [Thomas E. Noonan] sells for 100 times revenue. Atlanta Business Chronicle.

Endolyn, O. (Jun. 03, 2015). [Thomas E. Noonan] On an Epic Winning Streak. Georgia Tech Alumni Magazine.

NJH Security Consulting. (Mar. 07, 1996). Corporate filings, No. K607704. GA Sec. of State.

NJH Security Consulting. (Dec. 27, 2001). Merger with Internet Security Systems, No. K607704 [Thomas E. Noonan]. GA Sec. of State (includes Internet Security Systems Articles of Organization, Apr. 19, 1994).

Having now established that IBM and Thomas E. Noonan have been fixtures at NIAC since inception. And, having also established that IBM, James P. Chandler and Noonan are playing a crooked game with America's security and Leader Technologies' social networking invention, we now return to Barack Obama's latest Executive Order promoting IBM's the "Internet of Things."

In any other industry, Obama's promotion of the IBM "Internet of Things" brand slogan would be an outrage

It would be like Obama ". . . protecting the policy and legal foundation for product security in the context of:"

  • Eat Fresh (Subway),
  • Just Do It (Nike),
  • Finger Linkin’ Good (KFC),
  • Sea food Differently (Red Lobster),
  • Fueling the American Spirit (Marathon), or
  • The Internet of Things (IBM) . . . wait, Obama just protected this brand.
White House, Mar. 02, 2015, Technology CEO Meeting, Barack Obama, Valerie Jarret with IBM, EMC, Xerox, Micron Technology, Qualcomm, Dell

Obama violates the federal employee code of ethics

Obama endorsement of IBM’s The Internet of Things Cloud initiative, including his attempt to give it legal status, is a flagrant violation of 5 C.F.R. § 2635.702(c) that states:

“An employee shall not use or permit the use of his Government position or title or any authority associated with his public office to endorse any product, service or enterprise."

Obama violates the RICO Act

In addition, Obama’s promotion of IBM’s social networking “cloud” infrastructure crosses state lines to conspire with IBM and others to misappropriate Leader Technologies’ invention violates the RICO (Racketeer Influenced and Corrupt Organizations) Act racketeering statute 18 U.S. Code § 1962(c) that states:

"It shall be unlawful for any person employed by or associated with any enterprise engaged in, or the activities of which affect, interstate or foreign commerce, to conduct or participate, directly or indirectly, in the conduct of such enterprise’s affairs through a pattern of racketeering activity."

The wheels are coming off of this spy state Administration and its cronies.

Click here for a full timeline of this public corruption.

* * *

10% to whistleblower(s)

Leader Technologies has indicated they are willing to pay a 10% reward for information that leads to the recovery of funds by their shareholders.

Bookmark: #stop-the-cartelStop the Cartel
Letter to Congress:
Word Doc

PDF Doc

The Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

Obama’s Fundamental Transformation of America - Saul Alinsky's Playbook for community organizing
Fig. 10—Obama's Fundamental Transformation of America. His wheel of corruption.
Graphic: AFI.

Click here for hijack of the cyber world timeline and database.

Bookmark: #spy-state-surveillance
Fig. 11—The evidence is unmistakable. A Cartel of private companies, in collusion with the NSA, collect ALL relationship data between American citizens and the federal government. Much of that data is stored overseas, e.g., Lulea, Sweden, outside the jurisdiction of the U.S. Constitution ("Inside the Arctic Circle, Where Your Data Lives," Business Week).
Graphic: AFI.
Bookmark: #spy-state-players
Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel
Fig. 12—Primary Participants in the American NSA - C.I.A. Spy State "Public-Private" Cartel. See AFI. (Oct. 19, 2015). The social networking patent property case every American needs to fight. Americans For Innovation.
Graphic: AFI.

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.