View Here
to follow updates and to download telegram app
ISIS USA CIA supported, Assad Regime Change NeoCons, Al Queda USA CIA Israeli Mossad Supported, ISIS fighters treated Israeli doctors hopitals, False Flags OKC 911 Pulse Night Clug San Bernadino Marathon Bombing, etc., Terror State to Justify Liberty Hostage to Intel Deep State,
While magnetic north has always wandered, its routine plod has shifted into high gear, sending it galloping across the Northern Hemisphere—and no one can entirely explain why.
Magnetic north has never sat still. In the last hundred years or so, the direction in which our compasses steadfastly point has lumbered ever northward, driven by Earth‘s churning liquid outer core some 1,800 milesbeneath the surface. Yet in recent years, scientists noticed something unusual: Magnetic north’s routine plod has shifted into high gear, sending it galloping across the Northern Hemisphere—and no one can entirely explain why.
The changes have been so large that scientists began working on an emergency update for the World Magnetic Model, the mathematical system that lays the foundations for navigation, from cell phones and ships to commercial airlines. But then the U.S. government shut down, placing the model’s official release on hold, as Nature News first reported earlier this year.
Questions still likely abound: Why is magnetic north changing so fast? What were the impacts of the update’s delay? Was there really a geologic reason Google maps sent me off course? We’ve got you covered.
1:25
|
2:53
EARTH 101Earth is the only planet known to maintain life. Find out the origins of our home planet and some of the key ingredients that help make this blue speck in space a unique global ecosystem.
What is magnetic north?
Magnetic north is one of three “north poles” on our globe. First, there’s true north, which is the northern end of the axis on which our planet turns.
But our planet’s protective magnetic bubble, or magnetosphere, isn’t perfectly aligned with this spin. Instead, the dynamo of Earth’s core creates a magnetic field that is slightly tilted from the planet’s rotational axis. The northern end of this planet-size bar magnet is what’s known as geomagnetic north—a point sitting off the northwest coast of Greenland that’s changed position little over the last century.
Then there’s magnetic north, what your compass locates, which is defined as the point at which magnetic field lines point vertically down. Unlike geomagnetic north, this position is more susceptible to the surges and flows in the swirl of liquid iron in the core. These currents tug on the magnetic field, sending magnetic north hopping across the globe.
“The north magnetic pole is quite a sensitive place,” says Phil Livermore, a geophysicist at the University of Leeds.
What is the World Magnetic Model?
James Clark Ross first located magnetic north in 1831 in the scattered islands of Canada’s Nunavut territory. Since then, the pole has largely marched north, traversing hundreds of miles over the last several decades. (Curiously, its polar opposite, magnetic south, has moved little during this time.)
Meet the new dinosaur known as the “destroyer of shins”
To keep up with all these changes, the U.S. National Oceanic and Atmospheric Administration and the British Geological Survey developed what eventually became known as the World Magnetic Model, “so they would all be on the same map, essentially,” says Ciaran Beggan, a geophysicist with the BGS.
The model is updated every five years, with the last update in 2015. Between each update, scientists check the model’s accuracy against data from ground magnetic observatories and the European Space Agency’s Swarm mission—a trio of magnetic-field mapping satellites that zip around Earth 15 to 16 times each day. Until now, this seemed sufficient to keep up with magnetic north’s march toward Siberia.
In the mid 1900s, the north magnetic pole was lumbering along at less than a hundred feet each day, adding up to less than seven miles of difference each year. But in the ’90s, this started to change. By the early aughts, magnetic north was chugging along at some 34 miles each year.
“Things are acting very strangely at high latitude,” says Livermore, who notes that this increase seemed to coincide with a strengthening jet in the planet’s liquid outer core. Though the events could be linked, it’s not yet possible to say for sure.
By early 2018, scientists realized that the model would soon exceed the acceptable limits for magnetic-based navigation. Something had to be done before the model’s next regular update, slated for 2020.
Did the government shutdown upset navigation?
To correct the model, NOAA and BGS scientists tweaked it using three years’ worth of recent data. This updated version was pre-released online in October 2018. As Beggan explains, these include the model’s primary users in defense and military—the U.S. Department of Defense, the U.K. Ministry of Defense, and the North Atlantic Treaty Organization.
“Things are acting very strangely at high latitude.”
PHIL LIVERMORE , UNIVERSITY OF LEEDS
The government shutdown delayed the comprehensive public release of the information, which includes online calculators, software, and a technical note describing the changes. In principal, everyone who uses magnetic navigation could benefit from this update, says Arnaud Chulliat, a geomagnetist at the University of Colorado in Boulder and a NOAA affiliate who worked on the update.
The model has found its way into many of our modern mapping systems, including Google and Apple, Beggan adds. But the difference is minor for most civilian purposes, and the changes are mainly limited to latitudes above 55 degrees.
“The average user is not going to be overly affected by this unless they happened to be trekking around the high Arctic,” Beggan says.
What caused all this weirdness?
Interest in these unexpected jolts is about more than mapping. The dance of Earth’s magnetic field lines presents one of the few windows scientists have to processes that happen thousands of miles below your feet.
At the 2018 American Geophysical Union fall meeting, Livermore presented what he calls a magnetic field “tug-of-war” that may offer an explanation for the recent odd behavior. The north magnetic pole seems to be controlled by two patches of magnetic field, he explains, one under northern Canada and one under Siberia. Historically, the one under northern Canada seems to have been stronger, keeping the magnetic pole in its clutches. But recently, that seems to have changed.
“The Siberian patch looks like it’s winning the battle,” he says. “It’s sort of pulling the magnetic field all the way across to its side of the geographic pole.”
0:00
|
1:45
THE ARCTIC: AN OCEAN ON TOP OF THE WORLDIce, wildlife, and adventure—that is what draws us to the icy waters sweeping down from the Arctic Ocean. Join the crew of the National Geographic Fleet to explore the northernmost part of the Earth.
This may be a result of a jet within the core smearing and thus weakening the magnetic field under Canada, he says. The jet’s increase in speed seems to have coincided with the last few decades of the magnetic pole zipping north. But he cautions about jumping to any definite conclusions.
“There may well be a link there,” he says. “It’s not certain, but it could be.”
What’s next for magnetic north?
It’s tough to predict what will happen to the magnetic north pole—or whether it’s even going to maintain its speed as it staggers toward Siberia, notes Robyn Fiori, a research scientist with Natural Resources Canada. The only thing that seems certain about magnetic north is its unpredictability.
Rocks hold geologic maps of even weirder movements of the magnetic poles, suggesting that in the last 20 million years, magnetic north and south have flipped places multiple times. This seems to happen roughly every 200,000 to 300,000 years. The exact causes behind these reversals remains uncertain. But the latest movement shouldn’t have you in knots about an imminent flip.
Models of magnetic north suggest that this latest leap isn’t even the strangest thing the pole has done in more recent history, Fiori adds. Before 1900, its wanderings likely once had a lot more wiggle and may include several hairpin turns in northern Canada that could have sent the pole on a brief southward stint.
“It all has to do with changes in the fluid motion of that outer core,” she says. It’s therefore hard to say if magnetic north’s newfound speed is the new normal.
“We know that the pole now is moving faster than it has for decades, but how often does that happen in the long historical record?” inquires Geoff Reeves, a space scientist at Los Alamos National Lab.
“We don’t have any idea. What we know is what it’s doing now is different, and that’s always exciting scientifically.”
Editor’s Note: This article originally included a misstated quote from Robyn Fiori that has been updated.The types of navigation that can benefit from the new model have also been updated, and the spelling of Arnaud Chulliat’s name has been corrected.
https://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpg00DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2019-02-17 14:01:532019-02-17 14:01:53Magnetic north just changed. Here's what that means.
Hillary Clinton has all of our encryption keys, including the FBI’s. “Encryption keys” is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm and certificate authorities.
The convoluted structure managed by the “Federal Common Policy” group has ceded to companies like ENTRUST INC the ability to sublicense their authority to third parties who in turn manage entire other networks in a Gordian knot of relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.
Click here to read a list of just some of the “more than 2000 organizations in 60 different countries” that Hillary can control. Source: ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar. Return in a few days for links to each of the ENTRUST annual reports from 1998 to 2009.
AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.
AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors. Americans for Innovation.
.
DECIPHERING HILLARY’S ENCRYPTION KEYS THAT HAVE KEPT HER ONE STEP AHEAD OF THE SHERIFF
SPECIAL NOTICE: This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added. Indictable evidence continues to pour in for use by prosecutors, independent media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.
Cryptography—the use of codes and ciphers to protect secrets—began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.
The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a “skytale” to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu ‘ Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher. Tellingly, a design in 1976 by IBM based on “the Lucifer cipher” is now used and called “triple-DES” (the Triple Data Encryption Algorithm).
When the German Enigma Machine was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way, Hillary’s access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things’ version of the Enigma Machine break, which was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been “decisive” to the Allied victory. SeeHistory of Encryption.
.
IMAGINE THAT YOUR IDENTITY IS STOLEN SUDDENLY.
Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.
Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They’re wiped without a trace.
Imagine still further that you are Lord Mark Malloch-Brown from the Queen’s Privy Council. You need to erase the U.S. Department of Treasury’s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.
This cannot happen in America you say? Think again.
Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.
Truth is, Hillary Clinton literally has access to every computer on the Internet through a company named ENTRUST. Her 19-year Rose Law Firm partner Jerry C. Jones directs the company (now ostensibly run by a Silicon Valley dude named Orlando Bravo and his private equity firm Thoma Bravo, LLC), and has done since Dec. 2003. Entrust issues the encryption keys for most major governments and companies in the world.
WHAT IS AN ENCRYPTION KEY AND WHY IS THIS DISCOVERY SO DEVASTATING TO THE DEEP STATE SHADOW GOVERNMENT?
Put simply, encryption keys are used on both the sender’s and receiver’s computers to send data. It takes two keys to make a connection to send or receive data. The Clinton Administration created “trusted Certificate Authorities (CA)” to check with to make sure that the two keys are the real sender and receiver. If your keys are not approved by the CA, your connection will be blocked. In the hands of tyrannical globalists like Hillary Clinton, Barack Obama, George Soros, Eric Schmidt and Robert Mueller, this will be the new censorship on the Internet.
These CA’s make a big deal in their propaganda that you can “trust” them not to use or spoof your identity to get access to data that you and they are not authorized to have. That is a boldface lie. No wonder these people have the countenances of criminals. They are, and they know it.
Suppose you are the CA who issues keys to the FBI. Suppose you want to see the evidence being gathered against you in an investigation.
All you have to do is “borrow” the FBI key from Hillary or ENTRUST. Then you can connect to the target FBI computer using a bogus key created for you by ENTRUST, and voile! You then have two “trusted” keys so the FBI computers let you in. There are technical nuances to this description, but basically, you can do what you want with these keys. Don’t let trollers try to baffle you with techno-jargon to throw your dogs off the scent. Lucifer (literally, IBM Triple-DES) is in these encryption details.
Hillary Clinton has this level of access to practically all data on the planet, including the FBI, NSA, Departments of State, Commerce, Energy, Treasury, GSA, Patent Office, Post Office, NIST, as well as numerous foreign government and commercial entities. SeeENTRUST 10-K Annual Reports (1998-2009). SEC Edgar.
Now that we finally know how the Clinton’s stay one step ahead of the sheriff, we can now stop them.
MORE HARD PROOF THAT HILLARY CLINTON IS A DIGITAL MONSTER
In this post, we will prove without a doubt how Hillary Clinton cleverly wormed her way into full access and control for 50,000 FBI encryption keys.
They are likely managing this empire from Obama’s Google-constructed U.S. Digital Service bunker three blocks from the White House manned by Valerie Jarrett and Eric Holder.
We admit that these findings sound more like Grisham fiction. But the evidence is a pesky thing. The evidence is now pouring out.
THE EVIDENCE PROVIDED IS “JUDICIALLY RECOGNIZABLE” AND INDICTABLE, WE BELIEVE
“Notoriously public” information, like the U.S. Securities & Exchange Commission filings that we cite, is evidence that requires no further verification to be used in litigation, hence the adjective “notoriously.” This means that the information is so publicly noteworthy that further proof of validity is unnecessary. For example, John F. Kennedy was assassinated in 1963. That is a notoriously public fact and no proof is needed.
Notoriously public facts, like SEC filings, are “judicially recognizable” and can be accepted as truthful since the submitter attests to the SEC that they are true. It is criminal fraud to lie intentionally in SEC filings.
TIMELINE: BILL AND HILLARY CLINTON BEGAN ORCHESTRATING UNFETTERED ACCESS TO THE FBI’S ENCRYPTION KEYS IN 1993
On Jun. 07, 1993, the new Clinton Administration convened the “Third CPSR Cryptography and Privacy Conference (CPSR – Computer Professionals For Social Responsibility).”
The conference was held two days before an important Jun. 09, 1993 House hearing on “encryption and telecommunications network security.” The conference gathered over 106 attendees representing government, politics, commerce, manufacturing, industry, media, technology, telecommunications, healthcare, banking, education, faith and accounting. That’s plenty of arm-twisting, even for Washington, D.C.
The meeting sponsor was globalist advocate Carnegie Endowment for International Peace.
The hosts included:
(1) James P. Chandler, III, George Washington University intellectual property and national security law professor, and later patent attorney for social networking inventor Leader Technologies, Inc. (Jan. 2000);
2) John D. Podesta, chief of staff and campaign manager to Bill Clinton, Barack Obama and Hillary Clinton;
(3) Stephen D. Crocker, founding member of the illegal public-private conspiracy group Highland’s Forum/Group (Feb. 1995), then Barack Obama’s director of ICANN (Internet Corporation for Assigned Names and Numbers) who ceded control to the UN on Oct. 01, 2016—one month before Donald J. Trump was elected president.
HILLARY HID THE 1993 ENCRYPTION MEETING ATTENDEE LIST
The information about this meeting was hidden on Hillary’s private email server. It was unearthed by corruption watchdog Judicial Watch after they pressed the State Department in court to release the document. See meeting agenda here.
IN 1993-1994, MORE THAN 20 PEOPLE CLOSE TO OR INVESTIGATING CLINTON CORRUPTION DIED UNDER SUSPICIOUS CIRCUMSTANCES.
THEFT AND WEAPONIZATION OF U. S. INVENTIONS
In Feb. 1995, the Highlands Forum/Group was formed. It was and is a highly illegal private “public-private” meeting sponsored by the Department of Defense Net Assessment group run by Senior Executive Service (SES) members Richard P. O’Neill and Andrew W. Marshall. See also AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.
The no-notes meetings involve no-bid crony insiders from the military, intelligence, banking, technology, telecom, transportation, defense, venture capital, media an academia to discuss the weaponization of new inventions stolen by DARPA (Defense Advanced Research Projects Agency).
On Apr. 17, 1995, Clinton signed Executive Order 12958 titled “Classified National Security.”
This order consolidated control of classification procedures to just seven people: (1) Secretary of State, (2) Secretary of Defense, (3) Attorney General, (4) C.I.A. Director, (5) U.S. Archivist, (6) National Security Director and (7) the President.
A most dubious provision said that any U.S. security classification that contradicted another country’s laws or treaty rendered it of no effect. In other words, if Obama wanted to release a classified document, all he had to do was call up Justin Trudeau in Canada and ask him to pass a law saying America’s XYZ classified information was harmful to beavers on the northern slopes. That would nullify the U.S. classification and give Obama the excuse to release it. Clearly, it was a precursor to Obama’s foreign trade entanglements in the Trans-Pacific Partnership (TPP) that President Trump killed, thankfully.
On Apr. 19, 1995, the Alfred P. Murrah Federal Building in downtown Oklahoma City, was bombed by Timothy McVeigh and Terry Nichols—just two days after Bill Clinton formed a secret White House intelligence operation via Executive Order 12958 cited above.
This bombing created more excuses for mass surveillance against Americans. Notably, Clinton body guard Alan G. Whicher was killed in this weapons grade-energy blast that could not have been caused by a fertilizer bomb, as were led to believe by MSM. Retired FBI superstar Theodore L. Gunderson, a short-list candidate to be FBI director, revealed that psychiatrist Dr. Jolly West, one of the founders of the C.I.A. MKUltra mind control program, paid a visit to McVeigh before the trial. Gunderson said he believed that McVeigh was a brainwashed MKUltra drone.
On Jul. 12, 1995, IBM and Lotus merged. Lotus Notes became the Deep State’s groupware platform of choice for establishing a global mass surveillance spy grid. PKI (Public Key Infrastructure) encryption standards were selected to build into IBM/Lotus/Microsoft/Novell/Red Hat software, hardware and firmware.
LAWS CHANGED TO PREPARE FOR THE PATRIOT ACT ABOLISHMENT OF THE BILL OF RIGHTS
Between 1995-1999, a series of national security laws, executive orders (EOs) and presidential policy directives (PPDs) were written for Clinton by James P. Chandler, III, his national security and intellectual property advisor.
Magically, the laws that Chandler drafted passed nearly unanimously. (Note: Whenever that occurs, all of Congress has been bought off or fooled en masse before the vote. Remember: Clinton had likely already had access to the FBI encryption keys by this time. Therefore, he had amassed plenty of blackmail and extortion information on every influential member of Congress.)
On Feb. 28, 1996, FBI Director Louis Freeh self-consciously deferred to James P. Chandler, III in his testimony on economic espionage, revealing that Chandler controlled FBI security policy for Clinton. Freeh was clearly the puppet and Chandler the puppet master.
S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler. U.S. Senate. Professor James P. Chandler biography, National Intellectual Property, p. 6; Chandler admission and notorious Washington, D.C. knowledge among Chandler associates in the National Intellectual Property Law Institute. Citation: U.S. Senate Judiciary Committee.
On Oct. 11, 1996, Congress passed three Clinton-Chandler laws that were used to further gut Congressional oversight over security and privacy. It enabled the FBI to increase mass surveillance, then lie about it.
The False Statements Accountability Act of 1996, 18 U.S.C. § 1001.
Hindsight shows that the names for these laws were a cruel, unlawful, immoral, devilish deceit and had the opposite of the intentions of the rogue C.I.A., Clinton’s, Chandler, Mueller, Comey, etc. to fuel economic espionage, theft of trade secrets and lying to Congress, courts, the President and We the People.
On Feb. 12, 1997, Chandler incorporated Eurotech, Ltd. to hire former Soviet scientists and engineers to build embedded encryption spy backdoors inside all computer hardware, firmware and software in Italy. The key Eurotech players were/are Microsoft, IBM, Intel, Cisco, Oracle and Wind River, among others. JPMorgan Chase’s John McNeil Wilkie helped expand the company, as did Fenwick & West LLP (another Leader Technologies patent attorney and Silicon Valley C.I.A. co-conspirator).
Mar. 5, 1998—Jul. 11, 1999, Clinton and Gen. Wesley Clark prosecuted the Kosovo fraud based on a so-called “Račak genocide massacre” false flag. French journalists have proved that Račak was completely staged. However, it did succeed in cajoling Congress to approve U.N. intervention (led by Gen. Wesley K. Clark), and it succeeded in disabling Orthodox Christian resistance to the planned jihadi migration wave now occurring.
On Aug. 06, 1998, Robert S. Mueller, III’s law firm Hale & Dorr (now Wilmer Hale) helped file “The Internet of Things” patents for Hewlett-Packard’s Richard C. Walker that described a global surveillance grid that even monitors and controls individual body functions and describes human beings as “wet-ware.” The invention also contains an accounting and taxing capability to manage “certificate authorities” to control Public Key Infrastructure (PKI) encryption, tax the Internet and control “wet-ware” access.
On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.
On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.
On Dec. 20, 1998, globalist psychopath George Soros admitted to having been a Hungarian Jewish Nazi collaborator without remorse for betraying his own Jewish brothers and sisters.
On Mar. 09, 1999, Clinton’s Vice President Al Gore took credit for founding the Internet, laughably.
On Jul. 01, 1999, Clinton Attorney General Janet Reno created a new “Office of Special Counsel” inside the Department of Justice after the Special Counsel law was not re-authorized by Congress. This dubious Department of Justice policy (not a law) is now being used to justify the Mueller witch hunt.
On Jul. 02, 1999, Clinton appointed Larry H. Summers Treasury Secretary. The next day, on Jul. 03, 1999, Summers appointed Sheryl K. Sandberg as chief of staff. Sandberg later started Gmail in Jan. 20, 2001, and then became Facebook chief operating officer on Mar. 14, 2008.
Summers’ former Treasury staffer (1993-2001), Marne L. Levine (Deutch) became Summers’ chief of staff starting at Harvard on Jul. 02, 2001 where she oversaw the C.I.A.’s MKUltra establishment of the 19-year old Mark Zuckerberg as their Facebook cardboard cut out. Then, she became product vice president at AOL on Apr. 06, 2009. Then, she became Summers’ chief of staff for the National Economic Council on Jan. 21, 2009. Then, she became Obama’s Special Assistant to the President for Economic Policy on Jun. 24, 2010. Then, she attended an exclusive dinner with Hillary and Sandberg on Mar. 27, 2012. Then, she became chief operating officer of Instagram on Oct. 07, 2014. Truly magical.
WHITE HOUSE ROGUE INTELLIGENCE NOC (NETWORK OPERATING CENTER): NATIONAL INFRASTRUCTURE ASSURANCE COUNCIL
On Jul. 14, 1999, the Clinton White House set up a spy skunk works that has run rogue intelligence operations called the “National Infrastructure Assurance Council (NIAC)” On Jan. 18, 2001, Clinton appointed James P. Chandler, III and Bill Gates, Microsoft, as directors on NIAC the day before he left office and the same day he pardoned his former CIA director John M. Deutch (Marne L. Levin-Deutch’s father in law) and fraudster Marc Rich.
On Sep. 16, 1999, Clinton announced “relaxed” encryption rules in a flurry of press releases and letters to Congress, which were most assuredly drafted by national security advisor James P. Chandler, III. This action effectively gutted normal engineering security practices. It had the effect of enabling unfettered foreign and domestic access to U.S. classified data.
On Sep. 29, 1999, Bill Clinton established In-Q-Tel Silicon Valley cardboard cutouts for the C.I.A. to be able to raise private venture capital funds to build its rogue operations. It is illegal for a government agencies to invest in private companies.
On Sep. 29, 1999, Clinton C.I.A. institutionalized crony capitalism and the digital take over of America by a Shadow Government, on this day.
On Nov. 12, 1999, Bill Clinton and Larry Summers abolished Glass-Steagall banking controls, enabling the banks to fund In-Q-Tel “private” companies.
On Nov. 17, 1999, Agilent Technologies went public using Robert S. Mueller’s III’s law firm Hale and Dorr (renamed Wilmer Hale). Agilent Technologies was tasked with building the digital infrastructure for “The Internet of Things” global mass surveillance of everything using the Richard C. Walker HP/Agilent patents for monitoring all human beings called “wet-ware” in the patents.
On Jun. 08, 2000, Clinton espionage attorney James P. Chandler, III, participated in seminal Leader invention design meetings as Leader’s newly-appointed patent attorney. He was fully briefed on Leader’s social networking innovations at this meeting (see photo below) without disclosing his Deep State shadow government conflicts of interest and treachery.
JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben’s social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer’s right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo. Photo: Leader Technologies, Inc.
On Jun. 20, 2000, Sir Geoffrey E. Pattie was awarded the ISSA Silver Star Award in Washington, D.C. Pattie is the primary spy director for the Queen’s Privy Council and founder of SCL Ltd. and Cambridge Analytica—two C.I.A. MKUltra mind control and brain washing operations in the UK.
On Aug. 25, 2000, F. Gary Davis, Acting Director of the U.S. Office of Government Ethics, issued a tortured 13-page “advisory” that dramatically muddied the waters on mutual fund investing disclosure. Davis left government service soon thereafter. This opinion opened the door to massive nondisclosure fraud by politicians, SES and federal bureaucrats.
In 2001, NSA Director Michael V. Hayden recommended expansion of the NSA’s Senior Executive Service (SES) programs.
On Apr. 15, 2001, C.I.A. whistleblower Susan Lindauer warned American senior intelligence leadership that “I first learned of the 9/11 Conspiracy from my CIA handler, Dr. Richard Fuisz, in mid-April, 2001.” She was imprisoned for a year without due process to shut her up as the first casualty of The Patriot Act.
In Jul. 2001, Department of Justice John C. Yoo was hired into the Office of Legal Counsel (OLC) and gave legal opinion cover for a proposed NSA project “Stellar Wind” for mass surveillance of American citizens.
On Sep. 04, 2001, Robert S. Mueller, III was sworn in as FBI Director by President George W. Bush, just 10 days before 9/11.
On Sep. 11, 2001, World Trade Center, Pentagon and Shanksville “terror” attacks were timed simultaneously with DoD NORAD war games and a stand down order.
On Oct. 04, 2001, President Bush approves operation “Stellar Wind” mass surveillance on American citizens.
On Oct. 16, 2001, President Bush signed Executive Order 13231 “Critical Infrastructure Protection in the Information Age” forming the “National Infrastructure Advisory Council (NIAC).” The order used the same NIAC acronym used by Clinton as the excuse for setting up a mass surveillance networking operating center run out of the White House.
On Oct. 26, 2001, President Bush signed The Patriot Act that has essentially destroyed the Bill of Rights. Just look at the flies that gathered to watch the signing.
On Oct 31, 2001, NSA whistleblower and former chief architect William E. Binney resigned the NSA saying the agency had “gone rogue.”
On Nov. 29, 2001, IBM intellectual property attorneys James P. Chandler, III and David J. Kappos used a $40 million IBM “donation” to start the IBM Eclipse Foundation which has been the exclusive distributor of Leader Technologies’ social networking innovations.
On Aug. 29, 2002, IBM Eclipse Foundation distributed Version 2.0.1 that included all of Leader Technologies’ social networking innovations.
On Sep. 18, 2002, career IBMer Thomas E. Noonan (Internet Security Systems, Inc.) was appointed to the National Infrastructure Assurance Council (NIAC) by George W. Bush, surely recommended by James P. Chandler, and he remains a member of the Council to this day. In 2003, Noonan became a partner to ENTRUST INC. Public Key Infrastructure (PKI) controlled by Hillary Clinton.
On Oct. 29, 2003, ENTRUST INC was awarded the contract to supply all 50,000 encryption keys for the Federal Bureau of Investigation (FBI).
ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs & Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).
On Dec. 04, 2003, ENTRUST INC elected Jerry C. Jones as a “Class I” director to replace retiring Gen. Wesley K. Clark. Jones is a 19-year Hillary Clinton partner at the Rose Law Firm, Little Rock, Arkansas. With the appointment of Jones, FBI Director Robert S. Mueller, III had an ethical duty to disclose to the public that his approval of ENTRUST INC to manage 50,000 FBI encryption keys enabled his political mentor Hillary Clinton to have full access to the entire FBI operation.
ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones, PDF page 33. SEC Edgar.ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.
On Mar. 11, 2009, ENTRUST INC. issued its last 10-K annual report before selling its operation to Orlando Bravo, LLC and his Thoma Bravo private equity firm in San Francisco, CA. They disclosed that they had “more than 2,000 customers in 60 different countries.”
On Jul. 16, 2009, ENTRUST, INC. proposed to shareholders to sell to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA., which occurred on Aug. 07, 2009.
CONCLUSIONS:
Conclusion #1: Robert S. Mueller, III had an affirmative duty to disclose his approval of the contract for ENTRUST to manage the FBI’s 50,000 encryption keys in late 2003. The FBI itself has been scandalously compromised to Hillary Clinton and the Rose Law Firm ever since.
Conclusion #2: ENTRUST’s planetary control of the encryption keys for “over 2000 customers in 60 different countries” means that any matter handled by their customers at the FBI, Department of State, NSA, Treasury, etc. is the fruit of a poisonous tree—tainted by Clinton corruption.
Conclusion #3: President Trump has enough evidence here to seize and prosecute the leaders of every government agency that has involved that agency, or induced other agencies to work with ENTRUST, without disclosing their total compromise to Hillary Clinton and her crime syndicate.
Clearly, Hillary Clinton’s director surrogate at ENTRUST, INC., Jerry C. Jones (2003-2009), steered the development of the company’s control over encryption keys for the maximum benefit of his Clinton overlords.
At a bare minimum, Mueller and the FBI leadership has had an ethical duty ever since Jerry C. Jones became an ENTRUST director to disclose his direct conflict of interest and compromise of FBI operations by Hillary Clinton, his mentor.
https://clayandiron.com/wp-content/uploads/2017/11/THADD-Missle-Defense-System-US-Space-Command.jpg5121024DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-11-26 12:06:362017-11-26 12:06:36Uranium One and Star Trek Technology, 1884
China has unveiled ambitious plans to become the next major superpower. Picture: Greg Baker/AFPSource:AFP
BEIJING has outlined plans to become the world’s biggest superpower within the next 30 years.
Opening a five-yearly national congress, Chinese President Xi Jinping set out his time frame for the country to become a “global leader” with international influence.
In his 3 ½ hour speech, Mr Xi urged a reinvigorated Communist Party to take a stronger role in society and economic development to better address the nation’s “grim” challenges.
Speaking in the massive Great Hall of the People near Tiananmen Square, Mr Xi laid out his vision of a ruling party that served as the vanguard for everything from defending national security to providing moral guidance.
He also called for the party not only to safeguard China’s sovereignty but also to revitalise Chinese culture, oppose “erroneous” ideology and promote religion that is “Chinese in orientation”.
China’s President Xi Jinping gives his speech at the opening session of the Chinese Communist Party’s national congress at the Great Hall of the People in Beijing. Picture: Wang Zhao/AFPSource:AFP
He said “it was time for his nation to transform itself into a mighty force” that could lead the entire world on political, economic, military and environmental issues, The Guardian reported.
“The Chinese nation … has stood up, grown rich, and become strong — and it now embraces the brilliant prospects of rejuvenation … It will be an era that sees China moving closer to centre stage and making greater contributions to mankind,” Mr Xi said.
Hailing the start of a “new era”, Mr Xi outlined a vision in which the party would lead China on the road to becoming a “great modern socialist country” by the mid-century.
“The great rejuvenation of the Chinese nation is no walk in the park or mere drum-beating and gong-clanging. The whole party must be prepared to make ever more difficult and harder efforts,” Mr Xi told hundreds of delegates.
“To achieve great dreams there must be a great struggle.”
In a rare acknowledgment of the country’s economic issues, Mr Xi said China’s “prospects are bright but the challenges are grim”.
Critics argue China’s plans are ambitious given it has massive demographic issues and slowed economic growth.
A Chinese People’s Liberation Army (PLA) officer practices conducting a military band before the opening session of the Chinese Communist Party’s five-yearly Congress. Picture: Wang Zhao/AFPSource:AFP
CHINA’S BIG PLAN
Senior analyst in defence strategy and capability at the Australian Strategic Policy Institute, Dr Malcolm Davis, told news.com.au Mr Xi’s message was loud and clear.
“China just doesn’t want to be a just regional superpower, it wants to be the superpower,” he said.
Dr Davis said Beijing wanted to challenge US supremacy and reshape the region according to China’s interests and economic development.
However, he acknowledged China faced several domestic challenges which stood in the way of its long-term goal, including suppression of democracy and freedom of speech.
Dr Davis also said Beijing faced a huge demographic problem with an increasing ageing population and declining birthrate.
This, in turn, would further impact on economic growth.
US President Donald Trump and Chinese President Xi Jinping during a meeting on the sidelines of the G20 Summit in Germany last July. Picture: Saul Loeb/APSource:AP
“Like all authoritarian governments, Beijing sees anything which challenges it as a problem and will crack down hard on that,” Dr Davis said.
“After the Tiananmen Square massacre, Beijing said to its people: ‘If you forgo democracy, we will give you prosperity.’”
He questioned what would happen once China’s prosperity ran out and the disparity between rural and city and the elite and the common man was more obvious. Dr Davis pointed out Beijing was a major maritime power which the US was aware of and one which was determined to assert its dominance, particularly in the South China Sea.
He said China was also trying to make other countries sign up to its One Belt, One Road infrastructure investment project.
By doing this Beijing was extending its influence over other countries which would align themselves more with China than the US.
Dr Davis said China’s plans had a direct impact on Australia.
A solder in a raincoat stands watch outside the Great Hall of the People during the opening ceremony of the 19th Party Congress in Beijing. Picture: Andy Wong/APSource:AP
“Australia was just a backwater when Cold War was taking place, now we are right in the frontline” he said.
“The South China Sea is not far away and China is extending its reach into the Indian Ocean as well.
“We are an ally of the US and a vital partner in any potential conflict. We are front and centre of anything to do with China.”
‘MUSCULAR WORLD VIEW’
Mr Xi may have extolled China’s many great assets, but according to New York-based Asian specialist Sean King, the Chinese President made his keynote speech all about himself.
Mr Xi was “clearly positioning himself” for a possible third term.
“People need to stop calling this event a congress as if it’s some kind of legitimate political event,” Mr King said.
“It’s one man (Xi) controlling the only party in a one-party state. How is that political theatre?”
Mr King said the President may be seeking to modernise his country in regards to infrastructure and technology, but his speech showed cause for concern.
Former Chinese President Jiang Zemin closes his eyes during the President’s long speech. Picture: Mark Schiefelbein/APSource:AP
Indications showed the country was also going backwards when it came to internet freedom, free speech and the right to worship, he said.
“Xi’s muscular world view can mean trouble for the PRC’s (People’s Republic of China) immediate neighbours who typically look to America for security but who now almost openly question our commitment to the region,” Mr King said.
“In particular, our South China Sea friends and allies, as well as Japan’s concerns over its Senkaku Islands.”
Mr King said Australia, Japan, India and other like-minded democracies might conclude they have to take things into their own hands, co-operating more among each other, in the event that the US wasn’t there.
“Our (US) quitting the Trans-Pacific Partnership (TPP), which didn’t start out as such but evolved into an economic power play against Beijing, only furthers these fears,” he said.
Mr Xi made many nationalistic references during the speech. Picture: Lintao Zhang/Getty Images/APSource:Getty Images
MAN BEHIND THE POWER
Mr Xi opened the congress which is expected to enhance his already formidable power.
In his speech, Mr Xi hailed China’s island-building efforts in the disputed South China Sea as well as his signature foreign-policy initiative, the One Belt, One Road infrastructure investment project aimed at improving connections between China, Europe and Africa.
Mr Xi wields undisputed power and is expected to get a second five-year term as party leader at the gathering.
However, critics claim he has consolidated his power by sidelining his competitors in other intra-party cliques, including those surrounding his immediate predecessor Hu Jintao and former leader Jiang Zemin.
https://clayandiron.com/wp-content/uploads/2017/11/TRUMP-XI-CHINA-USA-MEETING.jpg488650DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-11-23 17:16:242017-11-23 17:35:03China’s 30-year deadline to rule the world
Gary Richard Arnold
www.TheMuckraker.net
www.News-Expose.org
Seth Rich’s girlfriend Claudia Kash Spills the Beans
The following story … seems like it
would take too many participants to be
accomplished without having leaked earlier. But as the
James O’Keefe videos show … some Union Leaders and
other resources of the DNC have the kind of ruthlessness to carry out dirty work and discipline it’s disciples into
being silent.
It has also happened the the hard Communist underground has stayed in place as a foundation for espionage
collaborator Leon Panetta who likely salted the personnel into both the CIA and Department of
Defense … so called Deep State. This needs to be looked at for Trump’s survival.
Obama’s relationship with terrorist Bill Ayers has links to Chicago via
James Weinstein a Communist who put together the publication “In
These Times”. In These Times is synonymous with The New
American Movement that is a fusion of Communists with Fabians and
Left Wing Socialists. It was Communist enforcer Hugh DeLacy and
James Weinstein’s the Good Times in Santa Cruz that supported
Leon Panetta’s political career that was simultaneously supported and
protected by the Rockefeller Family.
Ryan Coonerty Santa Cruz mayor (now member of Board of
Supervisors of Santa Cruz County) was “schooled” at the Sydney
and Beatrice Webb founded
(Fabian Socialist London
School of Economics). The
“logo” for the Fabian Society F.S. is the wolf in sheep’s clothing.
Coonerty (left) Don Lane (right)
They have so much contempt and false superiority … and believe the
people will never figure them out. They have conned the average man.
But like Gulliver he is waking up.
Ryan Coonerty together with Supervisor Bruce McPherson (a recipient of thousands of dollars from the Red
Chinese) maintain two plaques honoring Communist Espionage agent Hugh DeLacy on Santa Cruz’s County’s
courthouse steps.
The devious Ryan Coonerty is part and parcel of the Marxist Resource Center for Nonviolence … they claim
their members are interchangeable with the War Resisters
League. The War Resisters League was a front for the
Communist Party in Europe.
“The Resource Center” housed in a building across from the County Government Building monitors not only the
elected officials but the Government Union and it appears to have sway over … a number of department heads.
The Resource Center also claimed common membership with the Fellowship for Reconciliation. A leaflet of
the Fellowship of Reconciliation states:
“Instead of attacking the Soviet Russia, we are anxious to appreciate their contribution … and build here, in this
section of the world , an order that has all the values of the one being created in the Soviet Union.”.
They are building those values through “soviets” … “regionalism” by transferring power from elected officials to
grouping like AMBAG. (The Association of Monterey Governments).
In addition, internally inside the cities, contracts are made with ECLEI a front for the World Bank and United
Nations. That should be against the Logan Act. They use a process called “Harmonizing”. The Aesopian word
for a dictatorial law to be enforced everywhere. This builds world government from the bottom up.
Julius and Ethel Rosenberg were United States citizens who were executed on June 19, 1953 after
being convicted of committing espionage for the Soviet Union.
It was Roy Cohn with a seemingly scurrilous background who prosecuted
the Rosenbergs. It is alleged that Cohn “clued in”
Donald Trump about some of the ways of Washington D. C.
Mr. Cohn having been at the right hand of Senator Joe McCarthy had
been exposed to the treachery of the worldwide Communist network and
it’s support by Central Bankers.
James Weinstein founded In These Times / Good Times … had included DeLacy. And The New American
Movement’s takeover of Monterey Bay by the Panetta Political Machine apparently with the help of the Hewitt
and Packard Foundations..
James Weinstein had shuttled around Communist spy Julius Rosenberg who was
executed for passing atomic bomb information to the Soviets. The
conspirator spy friend fled to Mexico City Morton Sobell.
Morton Sobell was recruited by a Soviet NKVD agent in 1944 and of course has been supported by the Blood
Sisters … Angela Davis, Jane Fonda and Yvonne Braithwaite Burke.
Gary Richard Arnold exposed Burke’s background which contributed to her defeat for Los Angeles Supervisor
in 1980. See: www.News-Expose.org
Don Lane
(Santa Cruz
mayor) gave
the key to the
city to
Communist
Angeles
Davis. Don
Lane staffed Leon Panetta’s various campaigns when Panetta became Congressman and visiting Hugh
DeLacy.
Remember, it was espionage collaborator Leon Panetta who knowingly passed on military information to Soviet /
Red Chinese enemies of America via Hugh DeLacy.
Alger Hiss was part of Rockefeller’s Council on
Foreign Relations was both a Communist Spy was the first
acting head of the United Nations.
James Weinstein merged undercover Communist Party members
with the League for Industrial Democracy / Students for a
Democratic Society / SDS / (American branch of the Socialist Fabian Society).
Both funded by the World Elite / Central Bankers.
Communism is not the people overthrowing the banking establishment
… communism is a tool for the Central Banks / International Elite to control
and cull the people.
Leon Panetta / Panettagate / the article at this hyperlink follows some of the Panetta’s treasonous connections:
The Monterey Bay Area has been a Rand / Tavistock operation. The
English TV series … The Prisoner based on Tavistock’s mind control
experiments … A psychological drama based in a coastal village … like
the Monterey Bay area. The major theme is individualism vs collectivism.
In Santa Cruz the conspiracy of collectivists think they won. They
betrayed their own families and neighbors for surrendering to a pecking
order. The TV drama used mind control, knock out gas, identify theft,
dream manipulation, hallucinogenic drugs. In The Monterey Bay area
fluoride, forced vaccination, free needle distribution, chemtrails, emotionalizing
genitalia and race reduces thinking and promotes group think.
The Monterey Bay Area population is almost in total (Skinner) behaviour
mode. They have little ability to think or reason … their synapses are like the
inside of a Cotton Candy Machine.
The population knows nothing about how the people are manipulated and has little interest to learn.
Marxist Don Lane working with Communist spy Hugh DeLacy, according to WIkipedia “staffed the Santa Cruz
campaign Congressman Leon Panetta in 1976 and again in 1978.”
Lane , a United Nations lover … coordinated Sam Farr’s campaign in order to insert United Nations Agenda 21.
Most of the population have no idea what the hidden contracts with ICLEI (the front for the UN and World Bank)
mean.
Don Lane as mayor in 2015 gave the key to the city of Santa Cruz to Communist, terror
supporting Angela Davis. Ryan cut the public time to speak before the the City Council
by more than 305.
It was John Brennan (CIA) who voted for terror provoking
Gus Hall and Angela Davis. And Obama also appointed
Communist collaborator Leon Panetta to head the CIA.
Obama’s CIA heads both Leon Panetta and John Brennan
have ties to Angeles Davis.
Gus Hall Feb. 1961, Apparently, Gus Hall and Angeles Davis don’t like Christians too
much.
Gus Hall, American Communist Party, Funeral E. Dennis – “I dream of the hour when the last
Congressman is strangled to death on the guts of the last preacher—and since the Christians seem to love to sing
about blood, why not give them a little of it? Slit the throats of their children & draw them over the mourners
bench and the pulpit, & allow them to drown in their own blood, & then see whether they enjoy singing those
hymns.”
John Brennan voted for Angela Davis and Panetta’s key campaign manager Don Lane gave Communist
Angela Davis a Key to the City of Santa Cruz.
Bill Gates (Bilderberger) bought newspapers in the region to protect the
stealth sovietization of the communities via ECLEI protocols. Don Miller
editor of the Santa Cruz paper iis the present controller of propaganda. The
former editor Bruce McPherson, now a supervisor, has worked for
Rockefeller’s Common Cause (California Forward). McPherson ran
interference on Panetta’s espionage conduct so the issue never came up.
McPherson as editor virtually endorsed of the Panetta political machine candidates.
McPherson received thousands of dollars from Chinese Communist double agent Katrina Leung.
Bruce McPherson is known to have supported espionage agent Leon Panetta for his every election. And the
paper still runs puff pieces on California Forward. A giant lobby for the State of California
McPherson refuses to take down two plaques on the Courthouse steps dedicated to the Communist traitor who
can take credit for the deaths of Americans …Since and including World War II.
McPherson is busy with his globalists friends and dupes moving authority from elected bodies to the regional
agency AMBAG The Association of Monterey Bay Area Governments. Appears to me as a virtual “soviet” cog
dedicated to a North American Union and World Government by the billionaires hidden in foundations behind
the scenes.
Key to this “conspiracy” is Fred Keeley a person who also worked for California Forward with Communist
Chinese recipient Bruce McPherson and which
was co-chaired by Communist collaborator Leon
Panetta.
Keeley … like most people selected by the
Rhodes Scholarship organization are bright,
smooth, arrogant and able to easily “con” the
people. Keeley is trained in the Delphi
Technique and has been at service to his masters
throughout the state of California.
Keeley acts like a political whip for the Panetta Machine a nd foundation. It was espionage college of Leon
Panetta who was identified as a Communist Enforcer (Hugh DeLacy) in two legislative committees for the State
of Washington and the State of California.
The mechanism of pressure from above and pressure from below is accelerating to a overthrow if our Republic.
These people who hate the constraints of the Constitution have among their number Soros, National Endowment
for Democracy, evil sectors of the Intelligence community the CFR/T/B and the globalist foundation network.
They only get away with provable lies because of the controlled media and public schools.
Seth Rich was responsible for an internet application that helps voters find
their polling stations.
He discovered that Hillary had set up bogus
polling places that were not on the official record.
Hillary then had DNC staffers merge the results
from both sets of polling places, keeping the
actual number of voters officially recorded at the
legitimate polling station the same while the
actual ballots that went to Bernie and represented
those numbers were swapped out for her.
Seth Rich was appalled by the corruption, and as a result, dumped to Wikileaks. This answer has been out there
since July 21 of 2016 and it rotted until it was recently discovered in a private E-mail. This was written by Claudia
Kash, the girlfriend of Seth Rich. She wrote this shortly after he was killed. The answer has been out there since
the beginning.
“There were two sets of polling places this primary season – one set for most of the voters, who went on state web
sites to find their polling locations, and a second set for Hillary Clinton supporters who looked on Hillary
Clinton’s website to find their polling location. The secretary of state for each state had one set of locations on
the record, the other set of locations, the ones listed on Hillary’s website were not on the state record. I know this
because I looked on her website to find where a friend should vote, then double checked the state website, which
showed a different address.
I thought there must be a mistake – I kept checking right up to election day. But until
they killed Seth Rich, I couldn’t figure out why there would be two different polling places. This is how I think the
scam worked: While most voters look up their location
on their state website, voters who were signed up as Hillary Clinton supporters would be directed to her site to
find their polling
place.
It was set up the same as any other DNC polling place – with
DNC volunteers, regular voting machines etc – and a duplicate
voter roster, the same as the roster at the other polling place.
Voters would be checked off on the roster, same as at the other
polling place, and after the polls closed, the DNC supervisor
would pick up the roster and the ballots.
The supervisor would then pick up the roster at the legitimate
polling place and the ballots there. He (or she) would then
replace a number of
Bernie Sanders ballots with an equal number of the ballots from the
Hillary Clinton voting location. Then the duplicate roster from the HRC
would be shredded and thrown away, along with all the Bernie Sanders
ballots that had been replaced. That way the number of people who voted
on the remaining roster still matches
the number of ballots. This is why so many states reported a “lower than
expected voter turnout”.
Seth Rich, who was responsible for the app that helps voters find their polling places did not realize there were
two sets of polling places until he himself went to vote. He lived in Washington DC, which voted at the end of the
primary season, a week after Clinton had already been declared the winner. I believe he discovered it then and
had started asking questions about why the polling places on Hillary’s web site did not match the ones on the DC
web site.
But even if he didn’t say a word to anybody, it would have been dangerous to let him live. He would have figured it
out sooner or later, and he would have reported it when he did.”
Researcher Alan Donaldson’s comment: Let me then, fill in the blanks: Seth Rich DID figure out Hillary
did this, and said nothing. Instead, he did the DNC leaks to Wikileaks, hopefully to bring the whole house of
cards down. The timing is so close on all of this that it can’t really be known if Seth was killed because he knew
Hillary’s plot, or if he was killed because someone figured out it was him who did the leaks.
To sum this up in a short statement: Hillary set up duplicate polling stations, collected a second set of notes that
never showed up at the legitimate polling place, and then flipped the voter ID information at the legitimate polling
stations and swapped it out with votes from her polling stations exclusively on legitimate ballots where people
voted for Bernie Sanders. She’d have to be mega corrupt and powerful to do this, and the DNC would have to be
rotten to the core, but that is probably so when the Clinton death machine is never forced to give answers. That
means there is serious deeply rooted corruption and dark power.
Seth Rich found out, was having none of it, and then died.
HEADS UP THEN: ANY TIME THERE WAS “UNEXPECTED LOW TURNOUT”, THIS TYPE OF THING IS
GOING ON,
THIS ALSO HAPPENED IN FRANCE AND IN AMERICA’S GENERAL ELECTION.
Hillary no doubt did this to Trump also, via people planted at key, fully compromised polling stations.
That would explain perfectly why there was a “low turnout” even though this was probably the most
heated election in American history, and it also explains why Hillary won in such a small number of
places, yet almost took the election.
There are also questions about the interconnections between Ryan Coonerty and Zach Friend’s support of
PredPol’s … candidate for sheriff John Hart. The data gathering NextDoor is not your friendly neighborhood
watch.
Catch an old TV edition of the Prisoner
Here’s an introduction
https://www.youtube.com/watch?v=zalndXdxri I
It NextDoor, was formed by former CIA Venture Capitalists, and “ex-members” of the Mossad and CIA.
The Panetta Machine isn’t ready to ROLL … But …. Ready to CULL.
Keep in mind the Georgia Guidestones and forced vaccines as voted for by the above.
https://clayandiron.com/wp-content/uploads/2017/09/who-killed-seth-rich.jpg410700DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-09-10 14:27:452017-09-10 14:27:45The Answer to Why Seth Rich was Killed, and Why He Gave Data to Wikileaks is now out
RAMALLAH, West Bank (AP) — Presidential adviser Jared Kushner met with Israeli and Palestinian leaders on Thursday to try to jumpstart moribund peace talks, but after months without progress the Mideast envoy faces growing skepticism on the Palestinian side.
With no clear vision for peace outlined by the administration and domestic issues distracting President Donald Trump, Israeli Prime Minister Benjamin Netanyahu and Palestinian President Mahmoud Abbas, expectations for the new peace push are low.
The Palestinians initially welcomed Trump’s election, but they have since grown impatient with what they say is a failure by the U.S. president to present a roadmap for peace. Specifically, they are seeking a halt to Israeli settlement construction on occupied lands, and an American commitment to the establishment of an independent Palestinian state as part of a peace deal with Israel.
“If the U.S. team doesn’t bring answers to our questions this time, we are going to look into our options because the status quo is not working for our interests,” said Ahmad Majdalani, an aide to Abbas.
It was not clear whether Kushner offered any clarity during his three-hour meeting with Abbas. Nabil Abu Rdeneh, Abbas’ spokesman, called the meeting “positive,” without discussing details, and said the Palestinian leader had reiterated his desire for an American commitment to a Palestinian state.
The White House later said both sides agreed the U.S.-talks were the best step forward. “The Palestinian Authority and the U.S. delegation had a productive meeting focused on how to begin substantive Israeli-Palestinian peace talks. Both sides agreed to continue with the U.S.-led conversations as the best way to reach a comprehensive peace deal,” the statement said.
Abbas said ahead of the meeting the Palestinian side appreciated Trump’s efforts. “We know things are difficult and complicated, but nothing is impossible with good intentions,” he said.
Trump took office with hopes of striking what he calls the “ultimate deal” between Israelis and Palestinians — a goal that has eluded administrations before his dogged by the same intractable issues. But he has since given few details of his vision for peace, managing to frustrate both sides.
Kushner, Trump’s chief Middle East adviser and his son-in-law, met Netanyahu in Tel Aviv earlier Thursday before traveling to Ramallah later in the day to meet with Abbas. Kushner is expected to return to the U.S. on Friday.
Before his meeting with Kushner, Netanyahu spoke optimistically of the road ahead.
“We have a lot of things to talk about, how to advance peace, stability and security in our region, prosperity too,” Netanyahu said, standing alongside Kushner. “I think that all of them are within our reach.”
A statement from Netanyahu’s office after the meeting said the talks were “substantive” but gave no details on progress or further steps.
On the campaign trail, Trump took a staunchly pro-Israel line, energizing Netanyahu and hard-liners in his coalition. He promised to relocate the U.S. Embassy from Tel Aviv to Jerusalem — a move welcomed by Israel and opposed by the Palestinians — and refused to endorse the Palestinian goal of independence. His platform played down the significance of Israeli settlements and he surrounded himself with advisers with deep ties to the settlement movement, including Kushner and the U.S. ambassador to Israel, David Friedman.
But since taking office, Trump decided not to move the embassy and has urged Israel to restrain settlement construction.
He has not come out in support of the two-state solution, a position backed by most of the international community and also his Republican and Democratic predecessors, indicating vaguely that he supports whichever solution the sides agree to.
Disappointed Palestinian officials privately gripe that Trump’s team has begun to support Israeli positions and ignore their concerns.
Further complicating any hope for progress are internal troubles for all three leaders. Trump’s administration has become preoccupied with a series of domestic crises, most recently the fallout from the deadly racially charged violence in Charlottesville, Virginia, earlier this month.
Netanyahu, meanwhile, is facing a growing corruption investigation that could soon lead to an indictment against him. These legal troubles, along with Israeli concerns about a possible long-term Iranian presence in neighboring Syria, make it unlikely that he will agree to any major diplomatic initiative.
After years of on-and-off peace efforts that have yielded no progress, Abbas is deeply unpopular at home. He also is stuck in a bitter rivalry with the Islamic militant group Hamas, which seized the Gaza Strip from his forces a decade ago and is now pursuing a reconciliation deal with Mohammed Dahlan, a former Abbas ally who has turned into his political nemesis.
Since the collapse of U.S.-mediated peace talks three years ago, the sides have grown further apart and have been plagued by repeated rounds of violence, including a war between Israel and Hamas and recurring low-level violence sparked by tensions over a contested Jerusalem site holy to both Jews and Muslims.
Israel, meanwhile, has increasingly shifted its sights toward a regional deal with certain Arab countries, rather than one focusing solely on the Palestinians, an approach Trump has expressed support for.
“The time has come for a regional approach,” Israeli Deputy Foreign Minister Tzipi Hotovely told Israel Radio. “That is the thinking guiding President Trump and the prime minister of Israel, and so our message to the Palestinians is that time is working against them.”
___
Associated Press writer Fares Akram in Gaza City, Gaza Strip, contributed to this report.
https://clayandiron.com/wp-content/uploads/2017/09/dirty-trump-palestinian-terrorist-pic.jpeg533800DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-09-01 13:46:212017-09-01 13:46:21Kushner’s Mideast peace push met with Palestinian skepticism
The military’s record of hitting intermediate-range missiles is less than perfect. That makes the decision to attempt an intercept much harder.
This story has been updated to reflect recent developments overnight.
North Korea launched another medium-range missile on Monday, this one right over Japan. Despite Defense Secretary Jim Mattis’ threats to shoot down missiles aimed at Guam and President Donald Trump’s Pyongyang-aimed bluster, the United States and Japan let it fly. Why?
After the test, Trump on Tuesday said that “all options are on the table,” as every president has said for decades. But the Pentagon is still reluctant to use some of the most obvious options, such as shooting down a missile above the earth’s atmosphere with another missile fired from a ship.
The United States has 33 Aegis warships (three more are slated to arrive next year) that can launch an interceptor to hit a mid- or intermediate-range missile like the Hwasong-12 that North Korea sent over Hokkaido. Sixteen of those warships are currently in the Pacific.
Pacific Command, in Honolulu did not respond to questions about why they didn’t attempt to down Monday’s missile. The command did issue a statement: “North American Aerospace Defense Command, NORAD, determined the missile launch from North Korea did not pose a threat to North America,”
Mattis said earlier this month that any North Korean missile headed toward U.S. land, including Guam and other territories, would be shot down and considered war against the United States. But, he added, if the missile were tracking to land in the sea, it would be the president’s call what to do about it.
Tom Karako, senior fellow and missile defense expert with the Center for Strategic and International Studies, said that if the missile launched Monday were really a threat to the United States or even Japan “then presumably we may well have attempted to engage it.”
But what are the costs and what are the benefits in attempting such an intercept? Anti-missile interceptors like the ones on U.S. warships are designed to hit enemy missiles as they reach peak altitude — in the case of the Hwasong-12, that’s above 3,500 kilometers. The United States has demonstrated that it can intercept mid-range and slightly higher intermediate-range missile. But the test record includes embarrassing and recent failures.
Between January 2002 and August 14 of this year, the Defense Department attempted 37 interceptsof a mid-range missile and hit the target 29 times with an SM-3. There are many reasons for this, but the biggest, according to the Pentagon’s Office of the Director of Operational Testing and Engineering, is that realistic testing of interceptors is very expensive and requires a lot of lead time and support.
Update: On Wednesday morning, MDA conducted another successful intercept test using an SM-6 aboard a warship against a medium-range ballistic missile target. “The USS John Paul Jones detected and tracked a target missile launched from the Pacific Missile Range Facility on Kauai, Hawaii with its onboard AN/SPY-1 radar,” the agency said in a press statement.
In February, MDA showed that their newest version of the standard missile, the SM-3 IIA, could hit a mid-range missile. But a second test in June was a failure. The Navy later attributed that to human error. But 50 percent is not a good record for the most advanced intermediate-range interceptor in the U.S. arsenal.
The Obama administration pushed hard for a ship-based defense against mid-range North Korean missiles aimed at Japan or Guam but found that the military has much better chance of hitting missiles that don’t fly so high.
Shooting down an enemy missile aimed at U.S.territory may be good defense, but shooting down a missile test aimed at the sea would be an act of war. Or so argued North Korea.
“Taking a shot at a North Korean missile is not something the U.S. military would do lightly or without a directive to do so,” said Karako. “if we are going to shoot at something, we will do it like we mean it. But there has to be a good reason to do it. That reason might be if there is an actual threat to the U.S., its forces, or our allies. Or it might be if the U.S. or Japan adopts a policy to intercept certain types of missiles or those on certain kinds of trajectory. But that would have to be a deliberate policy choice.”
The highest probability of success would be to hit the enemy missile closer to the ground, during the so-called boost phase. That’s what MDA is aiming for in the future with laser-armed drones. In July, the agency put out a request for information for a high-altitude long endurance aircraft. Read that to mean a drone that can fly above 63,000 feet for a long time. According to the request, the drone should have enough power for a 140-kw laser. But that program won’t even begin testing until 2023. Until then, and likely even after, every time a missile heads toward Japan, Guam, or anywhere else, military leaders will have to decide whether attempting to shoot down North Korean missiles is worth the costs of possibly missing — or starting a war.
Patrick Tucker is technology editor for Defense One. He’s also the author of The Naked Future: What Happens in a World That Anticipates Your Every Move? (Current, 2014). Previously, Tucker was deputy editor for The Futurist for nine years. Tucker has written about emerging technology in Slate, … FULL BIO
https://clayandiron.com/wp-content/uploads/2017/09/kim-jong-un-us-president-trump-missles-pic.jpg413620DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-09-01 13:42:252017-09-01 13:42:25Why Didn’t the US Shoot Down That North Korean Missile?
WHAT I HAVE BEEN AFRAID TO BLOG ABOUT: THE ESF AND ITS HISTORY (PART 1-5) – FUNDING COVERT OPERATIONS – THE “DEEP STATE”: E$F – ESF’S CHOICES: LYING TO PEOPLE OR SCARING THEM TO DEATH
After months of work, the video series on the Treasury’s Exchange Stabilization Fund (ESF) is finally finished!
Why you should watch these five videos:
It is impossible to understand the world today without knowing what the ESF is and what it has been doing. Officially in charge of defending the dollar, the ESF is the government agency which controls the New York Fed, runs the CIA’s black budget, and is the architect of the world’s monetary system (IMF, World Bank, etc). ESF financing (through the OSS and then the CIA) built up the worldwide propaganda network which has so badly distorted history today (including erasing awareness of its existence from popular consciousness). It has been directly involved in virtually every major US fraud/scandal since its creation in 1934: the London gold pool, the Kennedy assassinations, Iran-Contra, CIA drug trafficking, HIV, and worse…
These five videos are the “answer” I have arrived at after three years of blogging on MarketSkeptics.com. They took me a month and a half to make (and months of research). You will not find the material covered anywhere else. So if you enjoyed them, please donate.
The Links to all the material covered can be found below the videos. I recommend following them and confirming the facts for yourself.
(The youtube view counts for these videos are incomplete (because they only count views on youtube’s website)).
What I have been afraid to blog about: The ESF and Its History – Part 1
What I have been afraid to blog about: The ESF and Its History – Part 2
What I have been afraid to blog about: The ESF and Its History – Part 3
What I have been afraid to blog about: The ESF and Its History – Part 4
What I have been afraid to blog about: The ESF and Its History – Part 5
Debt, debt and more debt is the ONLY economic future Americans will have….
The article immediately linked above was written by Anthony Scaramucci. Scaramucci was appointed by President Trump as the White House Communications Director on July 21, 2017.
A Scaramucci flashback:
A connection worth noting considering the article linked above in which Scaramucci thinks debt is alright and a part of the inevitability of American life now that he has been moved to the position as White House Communications Director:
Because its so secret, the activity’s of the giant Exchange Stabilization Fund, are not known by the public. Whoever controls this fund, my thinking is that it is Jack Lew, is probably one of the most powerful men in the world. It would be natural, for China to accuse the US, and Jack Lew, of being involved in pricking the Chinese stock market bubble. You have to ask yourself, does the pricking of the Chinese stock bubble help the US? How much? If its a lot, then probably the ESF is involved. The ESF enters all markets and controls them in the interest of the US government. They are also involved in pm manipulation. Anyone who acts as an agent for the ESF is exempt for the rule of law. Any bank who acts an agent for the ESF is exempt from all criminal prosecution. It explains a lot. Any covert project that the Treasury Dept or the President wishes to involve himself with can be covered by using the ESF. Whether it is the Secret Space Program, or Covert CIA or alphabet soup agency’s or sabotaging global stock markets. Its all opaque. There is no over site. It does not exist as far as the law is concerned. The most powerful man in the world controls this fund. Period.
You will never hear a politician discuss this fund. It does not exist.
Brother Nathnael has a few words about Jack Lew and David S. Cohen (the “synagogue rules with US Treasury”) on the US Treasury Department regarding economic sanctions against Russia:
What The Media Won’t Tell You About Putin – MUST SEE
REALITY . One ought not to be surprised at all, for Churchill was drunk with power and money long before World War I started. As we have argued in the past, Churchill was ultimately responsible for the deaths of millions of Germans and Indians. Churchill was the man who would do just about anything for money; the Jewish oligarchs put him power, therefore he had to kill for them. He had to save them from Hitler. And nothing was going to stop him from accomplishing his mission. Nothing.
https://clayandiron.com/wp-content/uploads/2017/07/ESS-EQUALS-OPC-EQUALS-CIA-COVERT-OPERATIONS.png280573DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-07-23 19:42:092017-07-23 19:42:09WHAT I HAVE BEEN AFRAID TO BLOG ABOUT: THE ESF AND ITS HISTORY (PART 1-5) – FUNDING COVERT OPERATIONS – THE “DEEP STATE”: E$F – ESF’S CHOICES: LYING TO PEOPLE OR SCARING THEM TO DEATH
Last week America’s UN ambassador Nikki Haley said Washington was prepared to use the full range of its capabilities to defend itself and its allies from a threat coming from North Korea’s missile and nuclear programs.
The US diplomat did not rule out the use of military force if necessary.
Mr Trump has launched a global campaign to tackle the North Korean threat and last week urged Kim’s ally China to apply pressure over his nuclear programme.
U.S. THAAD missile defences hit test target as North Korea tension rises
https://clayandiron.com/wp-content/uploads/2017/07/I-Nuke-You-SOB-Kim-N-Korea-dees.jpg792612DrBillhttps://clayandiron.com/wp-content/uploads/2017/06/logo-1.jpgDrBill2017-07-15 19:58:152017-07-15 19:58:15NORTH Korea has vowed to “turn the US into a pile of ash” if Donald Trump tries to curb the nation’s nuclear ambitions by force.
If you doubt this statement, then take it from Churchill himself. When civilians were being killed by the thousands during World War I, Churchill did not hesitate to say: “I know this war is smashing and shattering the lives of thousands every moment—and yet—I cannot help it—I love every second I live.”http://www.veteranstoday.com/2017/07/23/daily-beast-winston-churchill-did-an-inside-job-to-get-america-into-world-war-ii-2/