View Here
to follow updates and to download telegram app
Tokomak Fusion Generators, Space Tech to Mars, Geoengineering Mars and four planets or moons to be habiltable, Space Fleet, US Space Command, Near Earth Space Objects, Apophis Asteroid 2029 debris field impacts, Tesla Space Weapons, THADD missles system Level 1 defense , Plasma Interferrometry Level 2 Chips missle guidance defense, Level 3 Tesla plasma weapons and lasers, Trump Missle Defense Shield Going UP, Artificial Intelligence, PDA Personal Digital Assistants, Mind Cortial Interface with Super NET,
This article is dedicated to my faithful patrons who make my writings possible. The best way to support my work is through Patreon or PayPal or purchase my new book:
Physical books ship this Tuesday and Wednesday. Thank you for your patience!
Coming soon: Seven Thunders
Last night and for the next 72 hours, the earth is coupling with the sun, allowing charged particles to stream to earth. These highly charged particles have the potential to wreak havoc. For earth, it means an uptick in earthquakes and volcanic activity. Ancient volcanoes and earthquake faults can spring to life in a seconds notice. There is an increase in earthquakes and volcanoes on the last day. Some you will hear about, others will be down-graded, and others will mysteriously not be happening such as Shiveluch which maintains its 34,000-foot ash plume obscured from cameras and satellite imagery. There is a synergistic effect with what is happening under our feet as the earth becomes more unstable.
Hurricanes intensify, and their path becomes wonky, so we must pay close attention to the current Hurricane Dorian as she strengthens to a Category 4 storm. What you are seeing or will see is a replay of the 1927 Nova Scotia hurricane. The most memorable hurricanes are those occurring during this cyclical period of Solar Minimum, including the Galveston Hurricane, Katrina, and others.
COSMIC CHAOS TO THE BODY
The situation currently is that we have medium flux of cosmic rays streaming into the earth’s atmosphere for 72-hours. They can cause secondary particles. Even when this wave passes they will return, much as waves upon the beach.
Once a cosmic ray event occurs, a person can have devastating effects. You have been misinformed that cosmic radiation only affects astronauts. That is a blatant lie. What we are witnessing played a part in most of the historical biblical narratives as a backdrop.
Cosmic ray damage to the body occurs in three stages:
Immediately
Early
Late effects
It manifests itself in four progressive steps:
Instant: within 1-2 hours of exposure
Latency will depend upon the duration, intensity of exposure, and annual dose fr radiation is bioaccumulative.
Illness phase that we will discuss momentarily
Recovery or death phase.
Symptoms can occur instantaneously or even 40-years post-exposure.
As the primary rays penetrate and transport throughout your body, the symptoms typically begin dramatically in the skin. While the secondary particles and transported to the ocular lens in your eye, and finally, into your internal organs and tissues deep within your body. A small transition effect is present in the first millimeters of the shielding in the skin dose, which takes the brunt of the radiation hit bu quickly disappears at a depth of the ocular lens.
YOU CAN EXPECT FROM COSMIC RAY BOMBARDMENT
The following is pretty much self-explanatory:
Brain inflammation and neural damage
The central nervous system is impacted, so you may see things like increased insomnia and interference with neurotransmission- the communication system within your brain
Sensorimotor-Cosmic rays can affect all, or anyone of your five (possibly six) senses with sensory alterations
Cognitive damage is seen more often in men than women
Long term, short term, and memory retention increasing you’re, “Why am I here?” moments
Loss of focus and reduction in the ability to problem-solve reduction
Spatial orientation making it more likely for you did lose your way
Faulty decision making is vital to our survival in these dangerous times, and you need to understand that each of us in varying degrees with being impacted.
Efficiency: you are probably discovering that you are not getting as much accomplished as you used to. It is not only age for this loss of efficiency peaks during these cosmic waves.
A marked decrease in performance
Compromised learning ability inhibits our ability to adapt to this new situation in history. While cyclical, most agree this is the last cycle.
Impaired recognition: “Who are you again?” moments
Discrimination both in our ability to rightly divide the truth, holy from profane, but also an increase in ethos warring against ethos as discussed in the bible
Inability or reduced ability to multi-task. I speak from personal experience that during this time, my ability to multi-task, which is a way of life for me-plummets.
Failure to process and deal with unanticipated events or situational awareness will decrease the chances of survival.
Increase in brain fog. One day you wake up, and you can’t think. It is like you are in a fog.
Intense desire to network and communicate, even if for no reason.
Difficulty in reasoning and processing. Not being able to logically think things out is hugely detrimental to us as increasingly, our spiritual and physical lives will be on the line.
BEHAVIORAL IMPACTS
Eating disorders. I do not have an eating disorder, or it is latent, but when I began to track my health history with space weather, this was the first symptom that I noticed. I was exhausted, and my body responded by eating its way through the day, which is very unlike me.
Social interactions will impact cooperation, coordination, communication, which in a nutshell means these rays will change social cohesion and structure within families, relationships, communities, and society.
Psychosocial adaptation or our ability to adapt to new social environments will be impaired.
Increased stress. I hate to be the bearer of bad news, but stress in our lives is going to exponentially increase with no relief. How we handle this, I am still struggling to discover.
Decline the inability to suppress unpleasant and stressful associations, which means that tuning out things we ought not or want to see will become increasingly more difficult.
Loss of desire to explore all the vastness of creation and also closer to home, we will become more complacent and content to be virtual voyeurs.
We have decreased happiness and contentment. The Apostle Paul shares that we should be content with our lot. When we whine and complain, we are mocking His provision and Providence in our lives. I am seeing a general trend of people being less happy overall.
Psychiatric disorders will explode including suicide, anxiety, depression, emotional instability, and bipolar disorders
Extinction fears skyrockets, men’s hearts failing with fear of the things coming upon the earth, as mentioned in the Bible.
Long term-neurodegenerative effects take root such as Alzheimer’s, dementia, ALS, etc.
Medical emergencies, hospital admissions, sports injuries, work injuries, crime rates, and traffic accidents all surge during cosmic waves.
Virulent pandemics begin and spread rampantly during these events.
Metabolic and blood sugar issues for everyone, but, most particularly, all three types of diabetes. Cosmic rays are why you will experience incredible fatigue and bouts of unexplained, unsatiated hunger, with unnautral cravings and lusts. It is also why you will have trouble losing any gained pounds even with dieting and exercise.
INVISIBLE CHANGES
Then there are more permanent and insidious changes such as:
DNA changes, breaks, aberrations, perturbations, and mutations
Gene Expression Changes. Cosmic particles potentially alter your epigenetic expression that originates in your RNA. It is linked with programmed cell death known as apoptosis (programmed cell death from a Greek word meaning “falling off,” as leaves from a tree) and extracellular matrix (ECM) remodeling or restructuring.
Coronary/Ventricular dysfunction, infarction (heart attack), arrhythmia (irregular or pounding heartbeat), stroke, fluctuations in your blood pressure, and heart rate will increase during events. A healthy person can drop deader than a hammer in a fraction of a second- during these times.
Increased oxidative stress- Oxidative stress is essentially an imbalance between the production of free radicals and the ability of the body to counteract or detoxify.
Exacerbation of auto-immune conditions such as arthritis, lupus, epidermal and glandular
Seizures, migraines, and light-based disorders.
Gastrointestinal tract bacterial translocation-where bacteria permeate through your gut wall into your body, carrying pathogens into your bloodstream and also food particles that do not belong in your general body.
Immune system activation- You have an innate immune system that is made of defenses against infection. It can be activated immediately once a pathogen attacks during a cosmic wave. This pathway can be useful when fighting harmful bacteria, although bad when the immune system against itself as in the case of auto-immune diseases-when the body turns against itself, it is terrible news.
Destroys or mutates peripheral hematopoietic cell counts- These are your immature stem cells that can form into any cell in your body. They take 6-8 weeks to mature. If they encounter something such as an allergen or ionizing radiation, they become permanently damaged. Your body is continuously making new stem cells, so it continually has an opportunity to heal if the offending exposure ceases. Indeed you are a new creation as it says in scripture!
Emesis or vomiting escalates. Think about the scripture verses that mention vomiting.
Blood coagulation is known as your blood clotting factor, and your blood tends to become thicker during these events, which is why there are more strokes and heart attacks during these times.
Skin integrity will decline, and solar radiation can plant seeds of cancer within your skin layers.
Behavior/fatigue (including social exploration, exercise, and spontaneous locomotor activity) explaining the, “I am so tired,” that will be your companion. The bible talks about the wearing down of the saints, and this comes to us in a many-layered fashions.
Heart and brain function we have touched upon already, but there are many more.
Survival and our ability to continue in this life decrease ,especially in light of the exponential difficulties that will beset upon us, making survival in an evil day much more difficult.
Cancer of all kinds will abound.
Cataract development-this can come on in mere days.
GOOD NEWS
The good news is that as God removes earth protective barriers in judgment, He provided to all of us who partake, layers of protection.
Armor of God
Food and supplementation
Scripture and Holy Spirit for counsel, discernment and guidence
These layers were designed to keep us safe during the Day of Trouble. I explore all of these protective layers in great detail in my new book, Electromagentic Radiation Protection Solutions, PDF DOWNLOAD . I give you the cutting-edge scientific discoveries, as well as God’s perfect solutions to the comsic and 5G EMF radiation problem.
For those who are actively praying for my ministry, I humbly want to thank each one of you!
If you consider this article informative, please consider becoming a Patron to support my work.
If you would like to purchase individual briefings to share with friends and family here is the link
Going where angels fear to tread.
Celeste has worked as a contractor for Homeland Security and FEMA. Her training and activations include the infamous day of 911, flood and earthquake operations, mass casualty exercises, and numerous other activities. Celeste is FEMA certified and has completed the Professional Development Emergency Management Series.
Emergency Plan Design including all Emergency Support Functions
Principles of Emergency Management
Developing Volunteer Resources
Emergency Planning and Development
Leadership and Influence, Decision Making in Crisis
Exercise Design and Evaluation
Public Assistance Applications
Emergency Operations Interface
Public Information Officer
Flood Fight Operations
Domestic Preparedness for Weapons of Mass Destruction
Incident Command (ICS-NIMS)
Multi-Hazards for Schools
Rapid Evaluation of Structures-Earthquakes
Weather Spotter for National Weather Service
Logistics, Operations, Communications
Community Emergency Response Team Leader
Behavior Recognition
Celeste grew up in military & governmental home with her father working for the Naval Warfare Center, and later as Assistant Director for Public Lands and Natural Resources, in both Washington State and California.
Celeste also has training and expertise in small agricultural lobbying, Integrative/Functional Medicine, asymmetrical and symmetrical warfare, and Organic Farming.
I am inviting you to become a Shepherds Heart Patron and Partner.
My passions are:
A life of faith (Emunah)
Real News
Healthy Living
Please consider supporting the products that I make and endorse for a healthy life just for you! Or, for as little as $1 a month, you can support the work that God has called me to do while caring for the widow. Get to know me better, stay in touch, and show your support.
We live in a day and age that it is critical to be:
Spiritually prepared,
Purity in food and water can
Fair Use Act Disclaimer This site is for educational purposes only. Fair Use Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research.
Fair use is a use permitted by copyright statute that might otherwise be infringing.
Fair Use Definition Fair use is a doctrine in the United States copyright law that allows limited use of copyrighted material without requiring permission from the rights holders, such as commentary, criticism, news reporting, research, teaching or scholarship. It provides for the legal, non-licensed citation or incorporation of copyrighted material in another author’s work under a four-factor balancing test.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2019-09-08 12:29:422019-09-08 12:29:42Solar Coupling with Spiking Cosmic Ray Flux Bodes Ill for Mankind and Earth
Area 51: An Uncensored History’ provides an inside look at one of the United States’ greatest mysteries – the Roswell UFO Incident of 1947 that rocked Area 51
The book – written by journalist Annie Jacobsen – works to disprove long held conspiracy theories that a flying disk crashed near Roswell, New Mexico
Jacobsen posits that the incident was actually linked to Soviet dictator Joseph Stalin in an attempt to cause disarray in the United States
She spoke with more than 70 scientists, pilots and engineers who were able to provide insight into the peculiar test site
Pictures also show the area before it became a government hot spot
The area now known as Area 51 is actually the dry lake remains of Groom Lake, Nevada
It is no secret that Area 51 is perhaps the most secretive place in the world.
But revelations and pictures shared in the 2011 book ‘Area 51: An Uncensored History’ provides an inside look at one of the United States’ greatest mysteries.
The book primarily focuses on the Roswell UFO incident of 1947 and disproving long held conspiracy theories that a flying disk crashed near Roswell, New Mexico.
Author Annie Jacobsen posits that the incident was actually linked to Soviet dictator Joseph Stalin in an attempt to cause disarray in the United States.
ADVERTISING
Scroll down for videos
+11
+11
Area 51: An Uncensored History’ provides an inside look at one of the United States’ greatest mysteries – the Roswell UFO Incident of 1947 that rocked Area 51
+11
Photos include an aircraft designed the Horten brothers of Germany in 1945. The United States Army Counter Intelligence Corps went on an extension manhunt for the brothers, following the 1947 crash, in hopes of finding their ‘flying disk
+11
Trailers at Area 51 where U-2 pilots like Hervey Stockman and Tony Bevacqua slept while learning how to fly the CIA’s first spy plane
+11
Pictures also show the area before it became a government hot spot. The area now known as Area 51 is actually the dry lake remains of Groom Lake, Nevada
She specifically alleges that Sputnik lead inventor Sergei Korlev, Russia’s atomic bomb lead developer Igor Kurchatov and mathmatician Mstislav Keldsh were tapped by Stalin to be a part of his secret UFO study team.
Jacobsen also suggests that children, up to the age of 12, were found inside the aircraft that eventually crashed.
Jacobsen spoke with more than 70 scientists, pilots and engineers who were able to provide insight into the peculiar test site.
Photos include an aircraft designed the Horten brothers of Germany in 1945. The United States Army Counter Intelligence Corps went on an extension manhunt for the brothers, following the 1947 crash, in hopes of finding their ‘flying disk.’
+11
The U-2 spy plane is photographed as it is tested at Area 51 in 1955. Early missions involving the plane were used throughout the Cold War for surveillance over Cuba, the Soviet Union and China
+11
Author Annie Jacobsen spoke with more than 70 scientists, pilots and engineers who were able to provide insight into the peculiar test site
+11
Part of a U-2 spy plane seen in 1955 coming out of a transport airplane at Area 51 – where the secret craft was designed and perfected
Pictures also show the area before it became a government hot spot. The area now known as Area 51 is actually the dry lake remains of Groom Lake, Nevada.
Area 51 has long been lauded as one of the greatest American mysteries as enthusiast have worked tirelessly to find out more about extraterrestrials.
Bob Lazar, a government scientist and engineer, allegedly worked to reverse-engineer alien technology and claimed that he had seen many ‘flying saucers’ in the area in 1989.
He claimed the government was hiding Martian vehicles at the ‘third dry lake bed from Area 51’, which is believed to be close to the Papoose Lake range.
+11
Jacobsen posits that the incident was actually linked to Soviet dictator Joseph Stalin in an attempt to cause disarray in the United States, She specifically alleges that Sputnik lead inventor Sergei Korlev, Russia’s atomic bomb lead developer Igor Kurchatov and mathmatician Mstislav Keldsh were tapped by Stalin to be a part of his secret UFO study team
+11
Until 1945, these men worked for Adolf Hitler, but as soon as the war ended they began working for the American military and various intelligence organizations under ‘Operation Paperclip’
+11
An overhead look at southern Nevada, where Area 51 is said to be
UFO Seekers capture military trucks coming and going from Area 51
Loaded: 0%
Progress: 0%
-:-
Previous
Play
Skip
Unmute
Fullscreen
Advertisement
WHAT DOES BOB LAZAR CLAIM TO HAVE SEEN AT AREA S4?
Bob Lazar stepped forward on a local Las Vegas new program to tell the world about his experience at S4 and Area 51.
He was also highlighted in an article about a jet car he claimed to have worked with Nasa to build, which was made from a jet engine modified and placed on an existing car frame.
The article stated that Lazar was ‘a physicist at the Los Alamos Meson Physics Facility’.
In November 1989, Lazar appeared in an interview with investigative reporter George Knapp on Las Vegas TV station KLAS to talk about his experience while employed at ‘S4’, which he claims atop-secret part of Area 51.
In his interview with Knapp, Lazar said he encountered several flying saucers.
He says he first thought the saucers were secret terrestrial aircraft whose test flights must have been responsible for many UFO reports.
On closer examination and from having been shown multiple briefing documents, Lazar came to the conclusion that the discs were of extraterrestrial origin.
During his filed testimony, Lazar explains how this impression first hit him after he boarded one craft being studied and examined its interior.
Ad
Unmute
Share or comment on this article:
Roswell UFO Incident at Area 51 was a hoax orchestrated by the Soviet Union, journalist claims
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2019-04-07 13:36:092019-04-07 13:36:09'Area 51: An Uncensored History': Journalist shares photos connected to the infamous Roswell UFO Incident of 1947 as she claims it was hoax designed by Soviet Union and Joseph Stalin
FILE – In this July 4, 2017, file photo, a U.S. highly advanced missile defense system called Terminal High Altitude Area Defense, or THAAD, is seen at a golf course in Seongju, South Korea. The U.S. has deployed THAAD in Israel for the first time, the American and Israeli militaries announced, reflecting their shared concerns about Iran’s development of powerful missiles. An Israeli army spokesman, told reporters that a THAAD battery, flown in from the U.S. and Europe, arrived Monday, March 4, 2019, at an air force base in southern Israel. (Kim Jun-beom/Yonhap via AP, File)
JERUSALEM (AP) — The U.S. has deployed a highly advanced missile defense system in Israel for the first time, the American and Israeli militaries announced Monday, reflecting their shared concerns about Iran’s development of powerful missiles.
Prime Minister Benjamin Netanyahu hailed the deployment of the Terminal High Altitude Area Defense system, or THAAD, as a testament to the strength of the two countries’ military ties, saying that it makes Israel “even stronger in order to deal with near and distant threats from throughout the Middle East.”
Lt. Col. Jonathan Conricus, an Israeli army spokesman, told reporters that a THAAD battery, flown in from the U.S. and Europe, arrived Monday at an air force base in southern Israel. He said that the defense battery has only been installed a few times elsewhere in the world, and tested the U.S. ability to carry out accelerated deployment of such powerful and complex weapons.
Israel already has an advanced multi-layered missile defense system, capable of intercepting everything from advanced guided long-range missiles outside the atmosphere to short-range unguided rockets fired from neighboring Gaza.
During this week’s drill, the THAAD battery, which shoots down long and intermediate range missiles, will bolster Israel’s existing systems. The deployment is temporary, and for now, the THAAD system will not be permanently integrated into the Israeli defense shield, Conricus said.
The U.S. military echoed said the deployment demonstrates the United States’ “continued commitment to Israel’s regional security” and more broadly shows that U.S. forces can “respond quickly and unpredictably to any threat, anywhere, at any time.”
Conricus described the deployment as a defensive drill unrelated to current developments in the region, but it comes amid tensions with Iran and its Lebanese proxy Hezbollah. Earlier this year, tensions nearly escalated into a confrontation between the longtime foes when Israel struck Iranian military targets in Syria in retaliation for Iran launching a missile from Damascus toward northern Israel. The Iranian missile was successfully intercepted by Israel’s defensive shield.
Israeli officials have repeatedly raised concerns about Iran’s development of long-range missiles as well as Hezbollah’s vast arsenal of rockets and missiles in neighboring Lebanon.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2019-03-10 17:52:482019-03-10 17:52:48Click to copyhttps://apnews.com/1e434a488591451aba197feab8c84642 RELATED TOPICS International News Middle East Iran Israel Benjamin Netanyahu US deploys advanced anti-missile system in Israel
While magnetic north has always wandered, its routine plod has shifted into high gear, sending it galloping across the Northern Hemisphere—and no one can entirely explain why.
Magnetic north has never sat still. In the last hundred years or so, the direction in which our compasses steadfastly point has lumbered ever northward, driven by Earth‘s churning liquid outer core some 1,800 milesbeneath the surface. Yet in recent years, scientists noticed something unusual: Magnetic north’s routine plod has shifted into high gear, sending it galloping across the Northern Hemisphere—and no one can entirely explain why.
The changes have been so large that scientists began working on an emergency update for the World Magnetic Model, the mathematical system that lays the foundations for navigation, from cell phones and ships to commercial airlines. But then the U.S. government shut down, placing the model’s official release on hold, as Nature News first reported earlier this year.
Questions still likely abound: Why is magnetic north changing so fast? What were the impacts of the update’s delay? Was there really a geologic reason Google maps sent me off course? We’ve got you covered.
1:25
|
2:53
EARTH 101Earth is the only planet known to maintain life. Find out the origins of our home planet and some of the key ingredients that help make this blue speck in space a unique global ecosystem.
What is magnetic north?
Magnetic north is one of three “north poles” on our globe. First, there’s true north, which is the northern end of the axis on which our planet turns.
But our planet’s protective magnetic bubble, or magnetosphere, isn’t perfectly aligned with this spin. Instead, the dynamo of Earth’s core creates a magnetic field that is slightly tilted from the planet’s rotational axis. The northern end of this planet-size bar magnet is what’s known as geomagnetic north—a point sitting off the northwest coast of Greenland that’s changed position little over the last century.
Then there’s magnetic north, what your compass locates, which is defined as the point at which magnetic field lines point vertically down. Unlike geomagnetic north, this position is more susceptible to the surges and flows in the swirl of liquid iron in the core. These currents tug on the magnetic field, sending magnetic north hopping across the globe.
“The north magnetic pole is quite a sensitive place,” says Phil Livermore, a geophysicist at the University of Leeds.
What is the World Magnetic Model?
James Clark Ross first located magnetic north in 1831 in the scattered islands of Canada’s Nunavut territory. Since then, the pole has largely marched north, traversing hundreds of miles over the last several decades. (Curiously, its polar opposite, magnetic south, has moved little during this time.)
Meet the new dinosaur known as the “destroyer of shins”
To keep up with all these changes, the U.S. National Oceanic and Atmospheric Administration and the British Geological Survey developed what eventually became known as the World Magnetic Model, “so they would all be on the same map, essentially,” says Ciaran Beggan, a geophysicist with the BGS.
The model is updated every five years, with the last update in 2015. Between each update, scientists check the model’s accuracy against data from ground magnetic observatories and the European Space Agency’s Swarm mission—a trio of magnetic-field mapping satellites that zip around Earth 15 to 16 times each day. Until now, this seemed sufficient to keep up with magnetic north’s march toward Siberia.
In the mid 1900s, the north magnetic pole was lumbering along at less than a hundred feet each day, adding up to less than seven miles of difference each year. But in the ’90s, this started to change. By the early aughts, magnetic north was chugging along at some 34 miles each year.
“Things are acting very strangely at high latitude,” says Livermore, who notes that this increase seemed to coincide with a strengthening jet in the planet’s liquid outer core. Though the events could be linked, it’s not yet possible to say for sure.
By early 2018, scientists realized that the model would soon exceed the acceptable limits for magnetic-based navigation. Something had to be done before the model’s next regular update, slated for 2020.
Did the government shutdown upset navigation?
To correct the model, NOAA and BGS scientists tweaked it using three years’ worth of recent data. This updated version was pre-released online in October 2018. As Beggan explains, these include the model’s primary users in defense and military—the U.S. Department of Defense, the U.K. Ministry of Defense, and the North Atlantic Treaty Organization.
“Things are acting very strangely at high latitude.”
PHIL LIVERMORE , UNIVERSITY OF LEEDS
The government shutdown delayed the comprehensive public release of the information, which includes online calculators, software, and a technical note describing the changes. In principal, everyone who uses magnetic navigation could benefit from this update, says Arnaud Chulliat, a geomagnetist at the University of Colorado in Boulder and a NOAA affiliate who worked on the update.
The model has found its way into many of our modern mapping systems, including Google and Apple, Beggan adds. But the difference is minor for most civilian purposes, and the changes are mainly limited to latitudes above 55 degrees.
“The average user is not going to be overly affected by this unless they happened to be trekking around the high Arctic,” Beggan says.
What caused all this weirdness?
Interest in these unexpected jolts is about more than mapping. The dance of Earth’s magnetic field lines presents one of the few windows scientists have to processes that happen thousands of miles below your feet.
At the 2018 American Geophysical Union fall meeting, Livermore presented what he calls a magnetic field “tug-of-war” that may offer an explanation for the recent odd behavior. The north magnetic pole seems to be controlled by two patches of magnetic field, he explains, one under northern Canada and one under Siberia. Historically, the one under northern Canada seems to have been stronger, keeping the magnetic pole in its clutches. But recently, that seems to have changed.
“The Siberian patch looks like it’s winning the battle,” he says. “It’s sort of pulling the magnetic field all the way across to its side of the geographic pole.”
0:00
|
1:45
THE ARCTIC: AN OCEAN ON TOP OF THE WORLDIce, wildlife, and adventure—that is what draws us to the icy waters sweeping down from the Arctic Ocean. Join the crew of the National Geographic Fleet to explore the northernmost part of the Earth.
This may be a result of a jet within the core smearing and thus weakening the magnetic field under Canada, he says. The jet’s increase in speed seems to have coincided with the last few decades of the magnetic pole zipping north. But he cautions about jumping to any definite conclusions.
“There may well be a link there,” he says. “It’s not certain, but it could be.”
What’s next for magnetic north?
It’s tough to predict what will happen to the magnetic north pole—or whether it’s even going to maintain its speed as it staggers toward Siberia, notes Robyn Fiori, a research scientist with Natural Resources Canada. The only thing that seems certain about magnetic north is its unpredictability.
Rocks hold geologic maps of even weirder movements of the magnetic poles, suggesting that in the last 20 million years, magnetic north and south have flipped places multiple times. This seems to happen roughly every 200,000 to 300,000 years. The exact causes behind these reversals remains uncertain. But the latest movement shouldn’t have you in knots about an imminent flip.
Models of magnetic north suggest that this latest leap isn’t even the strangest thing the pole has done in more recent history, Fiori adds. Before 1900, its wanderings likely once had a lot more wiggle and may include several hairpin turns in northern Canada that could have sent the pole on a brief southward stint.
“It all has to do with changes in the fluid motion of that outer core,” she says. It’s therefore hard to say if magnetic north’s newfound speed is the new normal.
“We know that the pole now is moving faster than it has for decades, but how often does that happen in the long historical record?” inquires Geoff Reeves, a space scientist at Los Alamos National Lab.
“We don’t have any idea. What we know is what it’s doing now is different, and that’s always exciting scientifically.”
Editor’s Note: This article originally included a misstated quote from Robyn Fiori that has been updated.The types of navigation that can benefit from the new model have also been updated, and the spelling of Arnaud Chulliat’s name has been corrected.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2019-02-17 14:01:532019-02-17 14:01:53Magnetic north just changed. Here's what that means.
Glaciers and sea ice won’t be safe in a world that warms to 2 °C above pre-industrial levels.Credit: NASA/eyevine
Limiting global warming to 1.5 °C above pre-industrial levels would be a herculean task, involving rapid, dramatic changes in how governments, industries and societies function, according to the Intergovernmental Panel on Climate Change (IPCC). But even though the world has already warmed by 1 °C, humanity has 10–30 more years than scientists previously thought in which to kick its carbon habit.
The world would have to curb its carbon emissions by at least 49% of 2017 levels by 2030 and then achieve carbon neutrality by 2050 to meet this target, according to a summary of the latest IPCC report, released on 8 October. The report draws on research conducted since nations unveiled the 2015 Paris climate agreement, which seeks to curb greenhouse-gas emissions and limit global temperature increase to between 1.5 and 2 °C.
The world is on track for around 3 degrees of warming by the end of the century if it doesn’t make major reductions in greenhouse-gas emissions. It could breach 1.5 °C some time between 2030 and 2052 if global warming continues at its current rate.
A world of hurt
Scientists have “high confidence” that 1.5 °C of warming would result in a greater number of severe heat waves on land, especially in the tropics, the report says. They have “medium confidence” that there will be more extreme storms in areas such as high-elevation regions, eastern Asia and eastern North America. The risk of such severe weather would be even greater in a 2 °C world. Temperatures on extreme hot days in mid-latitudes could increase by 3 °C with 1.5 °C of global warming, versus 4 °C in a 2 °C world.
The Arctic could experience ice-free summers once every decade or two in a 2 °C world, versus once in a century at 1.5 °C. Coral reefs would almost entirely disappear with 2 degrees of warming, with just 10–30% of existing reefs surviving at 1.5 °C.
Without aggressive action, the world could become an almost impossible place for most people to live in, says Ove Hoegh-Guldberg, director of the Global Change Institute at the University of Queensland in St Lucia, Australia. “As we go toward the end of the century, we have to get this right.”
Impossible dream
Given that current national commitments on greenhouse-gas emissionsfall well short of the goals laid out in the Paris climate agreement, many scientists have argued that meeting even the 2 °C goal is virtually impossible. But the IPCC report sidestepped questions of feasibility and focused instead on determining what governments, businesses and individuals would need to do to meet the 1.5 °C goal.
Measures include ramping up installation of renewable energy systems such as wind and solar power to provide 70–85% of the world’s electricity by 2050, and expanding forests to increase their capacity to pull carbon dioxide from the atmosphere.
Most scenarios in the report suggest that the world would still need to extract massive amounts of carbon from the atmosphere and pump it underground in the latter half of this century. The technology to do this is in the early stages of development and many researchers say it could be difficult to develop it for use on a global scale.
Other proposed options involve changing lifestyles: eating less meat, riding bicycles and flying less. The report also waded into murky questions about ethics and values, stressing that governments must address climate change and sustainable development in parallel, or risk exacerbating poverty and inequality.
A bigger budget
The IPCC report incorporates recent research suggesting that the amount of carbon that humanity can emit while limiting warming to 1.5 °C might be larger than previously thought. The previous IPCC assessment, released in 2014, estimated that the world would breach 1.5 °C by the early 2020s at the current rate of emissions. The latest report extends that timeline to 2030 or 2040 on the basis of studies1 that revised the amount of warming that has already occurred.
“Every extra tonne of carbon that we dump into the atmosphere today is a tonne that will have to be scrubbed out at the end of the century,” says Myles Allen, a climate scientist at the University of Oxford, UK, and one of the lead authors of the report.
“I think we need to start a debate about who is going to pay for it, and whether it’s right for the fossil-fuel industry and its customers to be enjoying the benefits today and expecting the next generation to pay for cleaning it up,” Allen says.
But scientists have only “medium confidence” in the revised carbon budgets, says Thomas Stocker, a climate scientist at the University of Bern in Switzerland. He says that researchers will provide a more comprehensive look at the numbers in the next full climate assessment, which is scheduled to be released in 2021.
In the meantime, the newer and larger carbon budget could send the wrong message to policymakers, says Oliver Geden, a social scientist and visiting fellow at the Max Planck Institute for Meteorology in Hamburg, Germany. He fears that the IPCC report undersells the difficulty of achieving the 1.5 °C goal. “It’s always five minutes to midnight, and that is highly problematic,” he says. “Policymakers get used to it, and they think there’s always a way out.”
doi: 10.1038/d41586-018-06876-2
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2018-10-09 15:03:452018-10-09 15:03:45IPCC says limiting global warming to 1.5 °C will require drastic action Humanity has a limited window in which it can hope to avoid the worst effects of climate change, according to climate report
Data collected by NASA’s Orbiting Carbon Observatory-2 satellite show the average level of carbon dioxide in the atmosphere over five weeks in 2014.Credit: NASA/JPL-Caltech
European researchers are developing a miniaturized instrument that could precisely measure carbon dioxide coming from cities and power plants. If it works, the device could fly aboard a constellation of small satellites starting in the late 2020s, helping to track daily fluctuations in greenhouse-gas emissions.
Several satellites currently monitor CO2 emissions, including Japan’s GOSAT, the United States’ Orbiting Carbon Observatory-2 (OCO-2), and China’s TanSat. But none of them launched with the explicit goal of tracking compliance with global treaties.
In 2015, before the signing of the Paris accord to limit greenhouse-gas emissions, the European Commission began exploring how it could develop satellites to assess whether nations are abiding by their climate pledges.
The new small sensor could play a part in that. “We want to improve the accuracy of monitoring anthropogenic CO2 emissions,” says Laure Brooker Lizon-Tati, an engineer with Airbus Defence and Space in Toulouse, France. She coordinates the project, called the Space Carbon Observatory (SCARBO), which is being developed by a consortium of eight European companies and research institutions.
Team scientists will describe first results at a space-optics conference in Chania, Greece, on 10 and 11 October.
The proposed Sentinel satellites would precisely measure greenhouse gases around the world. But they would not be able to make daily measurements above places of interest, such as cities. “This is where a constellation of tiny SCARBO systems could come into the game,” says Heinrich Bovensmann, a remote-sensing researcher at the University of Bremen in Germany.
SCARBO satellites would weigh just 50 kilograms each, roughly one-tenth the mass of OCO-2 or TanSat. An estimated two dozen working together would be able to cover the globe once a week, but could fly over particular areas of interest once a day. Together they could monitor frequent changes in carbon emissions, such as morning and afternoon surges from an industrial area.
But first, SCARBO scientists have to show that their plan can work. At its heart is a miniaturized spectrometer — no longer than an outstretched hand — that would detect CO2 concentrations in the air below. Fitting a spectrometer onto a small satellite requires shrinking optics and developing new methods for analysing carbon dioxide concentrations. “It’s a real challenge,” says Bovensmann.
The scientists’ goal is to measure CO2 concentrations to an accuracy of less than 1 part per million at a resolution of 2 kilometres — comparable to the data collected by larger satellites now in orbit. “We want to prove the technology can achieve these types of measurements,” says Etienne Le Coarer of the University Grenoble-Alpes in Grenoble, France, which is building the instrument along with the ONERA French aerospace laboratory in Palaiseau.
NASA’s Jet Propulsion Laboratory in Pasadena, California, has worked on a similar concept for miniaturized sensors, but using a different type of spectrometer.
SCARBO scientists plan to test their instrument aboard a research aeroplane in 2020. It will fly alongside a Dutch-built instrument to study atmospheric aerosols, which are a major source of error when trying to measure greenhouse gases. The test will be the first time that aerosols and carbon dioxide are measured simultaneously to improve the quality of data on greenhouse-gas emissions, says Lizon-Tati.
SCARBO is focusing on CO2 monitoring, although it would also be useful for tracking methane emissions, says Le Coarer. Several private efforts to monitor methane emissions cheaply from space are already under way, including a Canadian microsatellite that has been flying since 2016 and a planned small satellite from the Environmental Defense Fund, an advocacy group in New York City.
doi: 10.1038/d41586-018-06963-4
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2018-10-09 15:01:232018-10-09 15:01:23Europe eyes fleet of tiny CO2-monitoring satellites to track global emissions Miniature instruments could help the European Union determine whether nations are meeting pledges to cut greenhouse-gas emissions.
Hillary Clinton has all of our encryption keys, including the FBI’s. “Encryption keys” is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm and certificate authorities.
The convoluted structure managed by the “Federal Common Policy” group has ceded to companies like ENTRUST INC the ability to sublicense their authority to third parties who in turn manage entire other networks in a Gordian knot of relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.
Click here to read a list of just some of the “more than 2000 organizations in 60 different countries” that Hillary can control. Source: ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar. Return in a few days for links to each of the ENTRUST annual reports from 1998 to 2009.
AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.
AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors. Americans for Innovation.
.
DECIPHERING HILLARY’S ENCRYPTION KEYS THAT HAVE KEPT HER ONE STEP AHEAD OF THE SHERIFF
SPECIAL NOTICE: This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added. Indictable evidence continues to pour in for use by prosecutors, independent media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.
Cryptography—the use of codes and ciphers to protect secrets—began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.
The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a “skytale” to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu ‘ Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher. Tellingly, a design in 1976 by IBM based on “the Lucifer cipher” is now used and called “triple-DES” (the Triple Data Encryption Algorithm).
When the German Enigma Machine was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way, Hillary’s access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things’ version of the Enigma Machine break, which was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been “decisive” to the Allied victory. SeeHistory of Encryption.
.
IMAGINE THAT YOUR IDENTITY IS STOLEN SUDDENLY.
Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.
Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They’re wiped without a trace.
Imagine still further that you are Lord Mark Malloch-Brown from the Queen’s Privy Council. You need to erase the U.S. Department of Treasury’s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.
This cannot happen in America you say? Think again.
Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.
Truth is, Hillary Clinton literally has access to every computer on the Internet through a company named ENTRUST. Her 19-year Rose Law Firm partner Jerry C. Jones directs the company (now ostensibly run by a Silicon Valley dude named Orlando Bravo and his private equity firm Thoma Bravo, LLC), and has done since Dec. 2003. Entrust issues the encryption keys for most major governments and companies in the world.
WHAT IS AN ENCRYPTION KEY AND WHY IS THIS DISCOVERY SO DEVASTATING TO THE DEEP STATE SHADOW GOVERNMENT?
Put simply, encryption keys are used on both the sender’s and receiver’s computers to send data. It takes two keys to make a connection to send or receive data. The Clinton Administration created “trusted Certificate Authorities (CA)” to check with to make sure that the two keys are the real sender and receiver. If your keys are not approved by the CA, your connection will be blocked. In the hands of tyrannical globalists like Hillary Clinton, Barack Obama, George Soros, Eric Schmidt and Robert Mueller, this will be the new censorship on the Internet.
These CA’s make a big deal in their propaganda that you can “trust” them not to use or spoof your identity to get access to data that you and they are not authorized to have. That is a boldface lie. No wonder these people have the countenances of criminals. They are, and they know it.
Suppose you are the CA who issues keys to the FBI. Suppose you want to see the evidence being gathered against you in an investigation.
All you have to do is “borrow” the FBI key from Hillary or ENTRUST. Then you can connect to the target FBI computer using a bogus key created for you by ENTRUST, and voile! You then have two “trusted” keys so the FBI computers let you in. There are technical nuances to this description, but basically, you can do what you want with these keys. Don’t let trollers try to baffle you with techno-jargon to throw your dogs off the scent. Lucifer (literally, IBM Triple-DES) is in these encryption details.
Hillary Clinton has this level of access to practically all data on the planet, including the FBI, NSA, Departments of State, Commerce, Energy, Treasury, GSA, Patent Office, Post Office, NIST, as well as numerous foreign government and commercial entities. SeeENTRUST 10-K Annual Reports (1998-2009). SEC Edgar.
Now that we finally know how the Clinton’s stay one step ahead of the sheriff, we can now stop them.
MORE HARD PROOF THAT HILLARY CLINTON IS A DIGITAL MONSTER
In this post, we will prove without a doubt how Hillary Clinton cleverly wormed her way into full access and control for 50,000 FBI encryption keys.
They are likely managing this empire from Obama’s Google-constructed U.S. Digital Service bunker three blocks from the White House manned by Valerie Jarrett and Eric Holder.
We admit that these findings sound more like Grisham fiction. But the evidence is a pesky thing. The evidence is now pouring out.
THE EVIDENCE PROVIDED IS “JUDICIALLY RECOGNIZABLE” AND INDICTABLE, WE BELIEVE
“Notoriously public” information, like the U.S. Securities & Exchange Commission filings that we cite, is evidence that requires no further verification to be used in litigation, hence the adjective “notoriously.” This means that the information is so publicly noteworthy that further proof of validity is unnecessary. For example, John F. Kennedy was assassinated in 1963. That is a notoriously public fact and no proof is needed.
Notoriously public facts, like SEC filings, are “judicially recognizable” and can be accepted as truthful since the submitter attests to the SEC that they are true. It is criminal fraud to lie intentionally in SEC filings.
TIMELINE: BILL AND HILLARY CLINTON BEGAN ORCHESTRATING UNFETTERED ACCESS TO THE FBI’S ENCRYPTION KEYS IN 1993
On Jun. 07, 1993, the new Clinton Administration convened the “Third CPSR Cryptography and Privacy Conference (CPSR – Computer Professionals For Social Responsibility).”
The conference was held two days before an important Jun. 09, 1993 House hearing on “encryption and telecommunications network security.” The conference gathered over 106 attendees representing government, politics, commerce, manufacturing, industry, media, technology, telecommunications, healthcare, banking, education, faith and accounting. That’s plenty of arm-twisting, even for Washington, D.C.
The meeting sponsor was globalist advocate Carnegie Endowment for International Peace.
The hosts included:
(1) James P. Chandler, III, George Washington University intellectual property and national security law professor, and later patent attorney for social networking inventor Leader Technologies, Inc. (Jan. 2000);
2) John D. Podesta, chief of staff and campaign manager to Bill Clinton, Barack Obama and Hillary Clinton;
(3) Stephen D. Crocker, founding member of the illegal public-private conspiracy group Highland’s Forum/Group (Feb. 1995), then Barack Obama’s director of ICANN (Internet Corporation for Assigned Names and Numbers) who ceded control to the UN on Oct. 01, 2016—one month before Donald J. Trump was elected president.
HILLARY HID THE 1993 ENCRYPTION MEETING ATTENDEE LIST
The information about this meeting was hidden on Hillary’s private email server. It was unearthed by corruption watchdog Judicial Watch after they pressed the State Department in court to release the document. See meeting agenda here.
IN 1993-1994, MORE THAN 20 PEOPLE CLOSE TO OR INVESTIGATING CLINTON CORRUPTION DIED UNDER SUSPICIOUS CIRCUMSTANCES.
THEFT AND WEAPONIZATION OF U. S. INVENTIONS
In Feb. 1995, the Highlands Forum/Group was formed. It was and is a highly illegal private “public-private” meeting sponsored by the Department of Defense Net Assessment group run by Senior Executive Service (SES) members Richard P. O’Neill and Andrew W. Marshall. See also AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.
The no-notes meetings involve no-bid crony insiders from the military, intelligence, banking, technology, telecom, transportation, defense, venture capital, media an academia to discuss the weaponization of new inventions stolen by DARPA (Defense Advanced Research Projects Agency).
On Apr. 17, 1995, Clinton signed Executive Order 12958 titled “Classified National Security.”
This order consolidated control of classification procedures to just seven people: (1) Secretary of State, (2) Secretary of Defense, (3) Attorney General, (4) C.I.A. Director, (5) U.S. Archivist, (6) National Security Director and (7) the President.
A most dubious provision said that any U.S. security classification that contradicted another country’s laws or treaty rendered it of no effect. In other words, if Obama wanted to release a classified document, all he had to do was call up Justin Trudeau in Canada and ask him to pass a law saying America’s XYZ classified information was harmful to beavers on the northern slopes. That would nullify the U.S. classification and give Obama the excuse to release it. Clearly, it was a precursor to Obama’s foreign trade entanglements in the Trans-Pacific Partnership (TPP) that President Trump killed, thankfully.
On Apr. 19, 1995, the Alfred P. Murrah Federal Building in downtown Oklahoma City, was bombed by Timothy McVeigh and Terry Nichols—just two days after Bill Clinton formed a secret White House intelligence operation via Executive Order 12958 cited above.
This bombing created more excuses for mass surveillance against Americans. Notably, Clinton body guard Alan G. Whicher was killed in this weapons grade-energy blast that could not have been caused by a fertilizer bomb, as were led to believe by MSM. Retired FBI superstar Theodore L. Gunderson, a short-list candidate to be FBI director, revealed that psychiatrist Dr. Jolly West, one of the founders of the C.I.A. MKUltra mind control program, paid a visit to McVeigh before the trial. Gunderson said he believed that McVeigh was a brainwashed MKUltra drone.
On Jul. 12, 1995, IBM and Lotus merged. Lotus Notes became the Deep State’s groupware platform of choice for establishing a global mass surveillance spy grid. PKI (Public Key Infrastructure) encryption standards were selected to build into IBM/Lotus/Microsoft/Novell/Red Hat software, hardware and firmware.
LAWS CHANGED TO PREPARE FOR THE PATRIOT ACT ABOLISHMENT OF THE BILL OF RIGHTS
Between 1995-1999, a series of national security laws, executive orders (EOs) and presidential policy directives (PPDs) were written for Clinton by James P. Chandler, III, his national security and intellectual property advisor.
Magically, the laws that Chandler drafted passed nearly unanimously. (Note: Whenever that occurs, all of Congress has been bought off or fooled en masse before the vote. Remember: Clinton had likely already had access to the FBI encryption keys by this time. Therefore, he had amassed plenty of blackmail and extortion information on every influential member of Congress.)
On Feb. 28, 1996, FBI Director Louis Freeh self-consciously deferred to James P. Chandler, III in his testimony on economic espionage, revealing that Chandler controlled FBI security policy for Clinton. Freeh was clearly the puppet and Chandler the puppet master.
S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler. U.S. Senate. Professor James P. Chandler biography, National Intellectual Property, p. 6; Chandler admission and notorious Washington, D.C. knowledge among Chandler associates in the National Intellectual Property Law Institute. Citation: U.S. Senate Judiciary Committee.
On Oct. 11, 1996, Congress passed three Clinton-Chandler laws that were used to further gut Congressional oversight over security and privacy. It enabled the FBI to increase mass surveillance, then lie about it.
The False Statements Accountability Act of 1996, 18 U.S.C. § 1001.
Hindsight shows that the names for these laws were a cruel, unlawful, immoral, devilish deceit and had the opposite of the intentions of the rogue C.I.A., Clinton’s, Chandler, Mueller, Comey, etc. to fuel economic espionage, theft of trade secrets and lying to Congress, courts, the President and We the People.
On Feb. 12, 1997, Chandler incorporated Eurotech, Ltd. to hire former Soviet scientists and engineers to build embedded encryption spy backdoors inside all computer hardware, firmware and software in Italy. The key Eurotech players were/are Microsoft, IBM, Intel, Cisco, Oracle and Wind River, among others. JPMorgan Chase’s John McNeil Wilkie helped expand the company, as did Fenwick & West LLP (another Leader Technologies patent attorney and Silicon Valley C.I.A. co-conspirator).
Mar. 5, 1998—Jul. 11, 1999, Clinton and Gen. Wesley Clark prosecuted the Kosovo fraud based on a so-called “Račak genocide massacre” false flag. French journalists have proved that Račak was completely staged. However, it did succeed in cajoling Congress to approve U.N. intervention (led by Gen. Wesley K. Clark), and it succeeded in disabling Orthodox Christian resistance to the planned jihadi migration wave now occurring.
On Aug. 06, 1998, Robert S. Mueller, III’s law firm Hale & Dorr (now Wilmer Hale) helped file “The Internet of Things” patents for Hewlett-Packard’s Richard C. Walker that described a global surveillance grid that even monitors and controls individual body functions and describes human beings as “wet-ware.” The invention also contains an accounting and taxing capability to manage “certificate authorities” to control Public Key Infrastructure (PKI) encryption, tax the Internet and control “wet-ware” access.
On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.
On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.
On Dec. 20, 1998, globalist psychopath George Soros admitted to having been a Hungarian Jewish Nazi collaborator without remorse for betraying his own Jewish brothers and sisters.
On Mar. 09, 1999, Clinton’s Vice President Al Gore took credit for founding the Internet, laughably.
On Jul. 01, 1999, Clinton Attorney General Janet Reno created a new “Office of Special Counsel” inside the Department of Justice after the Special Counsel law was not re-authorized by Congress. This dubious Department of Justice policy (not a law) is now being used to justify the Mueller witch hunt.
On Jul. 02, 1999, Clinton appointed Larry H. Summers Treasury Secretary. The next day, on Jul. 03, 1999, Summers appointed Sheryl K. Sandberg as chief of staff. Sandberg later started Gmail in Jan. 20, 2001, and then became Facebook chief operating officer on Mar. 14, 2008.
Summers’ former Treasury staffer (1993-2001), Marne L. Levine (Deutch) became Summers’ chief of staff starting at Harvard on Jul. 02, 2001 where she oversaw the C.I.A.’s MKUltra establishment of the 19-year old Mark Zuckerberg as their Facebook cardboard cut out. Then, she became product vice president at AOL on Apr. 06, 2009. Then, she became Summers’ chief of staff for the National Economic Council on Jan. 21, 2009. Then, she became Obama’s Special Assistant to the President for Economic Policy on Jun. 24, 2010. Then, she attended an exclusive dinner with Hillary and Sandberg on Mar. 27, 2012. Then, she became chief operating officer of Instagram on Oct. 07, 2014. Truly magical.
WHITE HOUSE ROGUE INTELLIGENCE NOC (NETWORK OPERATING CENTER): NATIONAL INFRASTRUCTURE ASSURANCE COUNCIL
On Jul. 14, 1999, the Clinton White House set up a spy skunk works that has run rogue intelligence operations called the “National Infrastructure Assurance Council (NIAC)” On Jan. 18, 2001, Clinton appointed James P. Chandler, III and Bill Gates, Microsoft, as directors on NIAC the day before he left office and the same day he pardoned his former CIA director John M. Deutch (Marne L. Levin-Deutch’s father in law) and fraudster Marc Rich.
On Sep. 16, 1999, Clinton announced “relaxed” encryption rules in a flurry of press releases and letters to Congress, which were most assuredly drafted by national security advisor James P. Chandler, III. This action effectively gutted normal engineering security practices. It had the effect of enabling unfettered foreign and domestic access to U.S. classified data.
On Sep. 29, 1999, Bill Clinton established In-Q-Tel Silicon Valley cardboard cutouts for the C.I.A. to be able to raise private venture capital funds to build its rogue operations. It is illegal for a government agencies to invest in private companies.
On Sep. 29, 1999, Clinton C.I.A. institutionalized crony capitalism and the digital take over of America by a Shadow Government, on this day.
On Nov. 12, 1999, Bill Clinton and Larry Summers abolished Glass-Steagall banking controls, enabling the banks to fund In-Q-Tel “private” companies.
On Nov. 17, 1999, Agilent Technologies went public using Robert S. Mueller’s III’s law firm Hale and Dorr (renamed Wilmer Hale). Agilent Technologies was tasked with building the digital infrastructure for “The Internet of Things” global mass surveillance of everything using the Richard C. Walker HP/Agilent patents for monitoring all human beings called “wet-ware” in the patents.
On Jun. 08, 2000, Clinton espionage attorney James P. Chandler, III, participated in seminal Leader invention design meetings as Leader’s newly-appointed patent attorney. He was fully briefed on Leader’s social networking innovations at this meeting (see photo below) without disclosing his Deep State shadow government conflicts of interest and treachery.
JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben’s social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer’s right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.
On Jun. 20, 2000, Sir Geoffrey E. Pattie was awarded the ISSA Silver Star Award in Washington, D.C. Pattie is the primary spy director for the Queen’s Privy Council and founder of SCL Ltd. and Cambridge Analytica—two C.I.A. MKUltra mind control and brain washing operations in the UK.
On Aug. 25, 2000, F. Gary Davis, Acting Director of the U.S. Office of Government Ethics, issued a tortured 13-page “advisory” that dramatically muddied the waters on mutual fund investing disclosure. Davis left government service soon thereafter. This opinion opened the door to massive nondisclosure fraud by politicians, SES and federal bureaucrats.
In 2001, NSA Director Michael V. Hayden recommended expansion of the NSA’s Senior Executive Service (SES) programs.
On Apr. 15, 2001, C.I.A. whistleblower Susan Lindauer warned American senior intelligence leadership that “I first learned of the 9/11 Conspiracy from my CIA handler, Dr. Richard Fuisz, in mid-April, 2001.” She was imprisoned for a year without due process to shut her up as the first casualty of The Patriot Act.
In Jul. 2001, Department of Justice John C. Yoo was hired into the Office of Legal Counsel (OLC) and gave legal opinion cover for a proposed NSA project “Stellar Wind” for mass surveillance of American citizens.
On Sep. 04, 2001, Robert S. Mueller, III was sworn in as FBI Director by President George W. Bush, just 10 days before 9/11.
On Sep. 11, 2001, World Trade Center, Pentagon and Shanksville “terror” attacks were timed simultaneously with DoD NORAD war games and a stand down order.
On Oct. 04, 2001, President Bush approves operation “Stellar Wind” mass surveillance on American citizens.
On Oct. 16, 2001, President Bush signed Executive Order 13231 “Critical Infrastructure Protection in the Information Age” forming the “National Infrastructure Advisory Council (NIAC).” The order used the same NIAC acronym used by Clinton as the excuse for setting up a mass surveillance networking operating center run out of the White House.
On Oct. 26, 2001, President Bush signed The Patriot Act that has essentially destroyed the Bill of Rights. Just look at the flies that gathered to watch the signing.
On Oct 31, 2001, NSA whistleblower and former chief architect William E. Binney resigned the NSA saying the agency had “gone rogue.”
On Nov. 29, 2001, IBM intellectual property attorneys James P. Chandler, III and David J. Kappos used a $40 million IBM “donation” to start the IBM Eclipse Foundation which has been the exclusive distributor of Leader Technologies’ social networking innovations.
On Aug. 29, 2002, IBM Eclipse Foundation distributed Version 2.0.1 that included all of Leader Technologies’ social networking innovations.
On Sep. 18, 2002, career IBMer Thomas E. Noonan (Internet Security Systems, Inc.) was appointed to the National Infrastructure Assurance Council (NIAC) by George W. Bush, surely recommended by James P. Chandler, and he remains a member of the Council to this day. In 2003, Noonan became a partner to ENTRUST INC. Public Key Infrastructure (PKI) controlled by Hillary Clinton.
On Oct. 29, 2003, ENTRUST INC was awarded the contract to supply all 50,000 encryption keys for the Federal Bureau of Investigation (FBI).
ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs & Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).
On Dec. 04, 2003, ENTRUST INC elected Jerry C. Jones as a “Class I” director to replace retiring Gen. Wesley K. Clark. Jones is a 19-year Hillary Clinton partner at the Rose Law Firm, Little Rock, Arkansas. With the appointment of Jones, FBI Director Robert S. Mueller, III had an ethical duty to disclose to the public that his approval of ENTRUST INC to manage 50,000 FBI encryption keys enabled his political mentor Hillary Clinton to have full access to the entire FBI operation.
ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones, PDF page 33. SEC Edgar.ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.
On Mar. 11, 2009, ENTRUST INC. issued its last 10-K annual report before selling its operation to Orlando Bravo, LLC and his Thoma Bravo private equity firm in San Francisco, CA. They disclosed that they had “more than 2,000 customers in 60 different countries.”
On Jul. 16, 2009, ENTRUST, INC. proposed to shareholders to sell to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA., which occurred on Aug. 07, 2009.
CONCLUSIONS:
Conclusion #1: Robert S. Mueller, III had an affirmative duty to disclose his approval of the contract for ENTRUST to manage the FBI’s 50,000 encryption keys in late 2003. The FBI itself has been scandalously compromised to Hillary Clinton and the Rose Law Firm ever since.
Conclusion #2: ENTRUST’s planetary control of the encryption keys for “over 2000 customers in 60 different countries” means that any matter handled by their customers at the FBI, Department of State, NSA, Treasury, etc. is the fruit of a poisonous tree—tainted by Clinton corruption.
Conclusion #3: President Trump has enough evidence here to seize and prosecute the leaders of every government agency that has involved that agency, or induced other agencies to work with ENTRUST, without disclosing their total compromise to Hillary Clinton and her crime syndicate.
Clearly, Hillary Clinton’s director surrogate at ENTRUST, INC., Jerry C. Jones (2003-2009), steered the development of the company’s control over encryption keys for the maximum benefit of his Clinton overlords.
At a bare minimum, Mueller and the FBI leadership has had an ethical duty ever since Jerry C. Jones became an ENTRUST director to disclose his direct conflict of interest and compromise of FBI operations by Hillary Clinton, his mentor.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2018-09-11 18:41:382018-09-11 18:41:38The Shadow Government Steven S. Sadleir The World Trade Center
Youtube World Premiere 9-1-18 – the COMPLETE (40 minutes longer than PBS version) award winning documentary featuring Ed Asner, Psychologists like Fran Shure, M.A., L.P.C. and Marti Hopper, PhD.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2018-09-06 15:13:162018-09-06 15:13:16New-"The Demolition of Truth-Psychologists Examine 9/11" Directors cut.
When I was abducted by aliens they made me sit up …
by Al K. Holic 123