{"id":27177,"date":"2018-09-16T15:39:38","date_gmt":"2018-09-16T19:39:38","guid":{"rendered":"https:\/\/cosmicconvergence.org\/?p=27177"},"modified":"2018-09-16T15:39:38","modified_gmt":"2018-09-16T19:39:38","slug":"muellers-treason-proven-by-fbi-encryption-keys-controlled-by-hillary-clinton","status":"publish","type":"post","link":"https:\/\/cosmicconvergence.org\/?p=27177","title":{"rendered":"Mueller&#8217;s Treason Proven By FBI Encryption Keys Controlled by Hillary Clinton"},"content":{"rendered":"<h3 class=\"post-title entry-title\">HILLARY CLINTON CONTROLS 50,000 FBI ENCRYPTION KEYS\u2014PROVES MUELLER\u2019S WITCH HUNT IS TREASONOUS<\/h3>\n<div class=\"post-header\">\n<div class=\"post-header-line-1\"><\/div>\n<\/div>\n<div id=\"post-body-4247296202590604409\" class=\"post-body entry-content\">\n<p><a id=\"return\" name=\"return\"><\/a><\/p>\n<p>With these encryption keys, nothing in our digital lives is off limits to the Clinton&#8217;s and their conspirators<\/p>\n<p>President Trump\u2019s new executive order can be sabotaged with these keys; alternatively, he can use the order to prosecute these criminals<\/p>\n<p>Many foreign powers have conspired with the SES and their Queen\u2019s Privy Council overlords since before 1993<\/p>\n<div>CONTRIBUTING WRITERS | OPINION |\u00a0<a href=\"http:\/\/americans4innovation.blogspot.com\/\"><em>AMERICANS FOR INNOVATION<\/em><\/a>\u00a0\u00a0| SEP. 16, 2018,\u00a0|\u00a0<a title=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" href=\"http:\/\/www.fbcoverup.com\/docs\/afi\/2018-09-16-HILLARY-CLINTON-CONTROLS-50000-FBI-ENCRYPTION-KEYS-PROVES-MUELLER-S-RUSSIA-WITCH-HUNT-IS-TREASON-by-Americans-for-Innovation.pdf\">PDF<\/a>\u00a0|\u00a0<a title=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" href=\"http:\/\/tinyurl.com\/y9yhgksg\">http:\/\/tinyurl.com\/y9yhgksg<\/a><\/div>\n<div>\n<div>HILLARY-MUELLER FBI ENCRYPTION TREASON<\/div>\n<p><a title=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" href=\"http:\/\/2.bp.blogspot.com\/-AfaX6YMBeFE\/W516jzlBSMI\/AAAAAAAAHCY\/cb5Rc18auRQ68hWB7F7YsXe1qP6n_TJZwCLcBGAs\/s1600\/hillary-clinton-7-26-16-2.jpg\"><img decoding=\"async\" src=\"http:\/\/2.bp.blogspot.com\/-AfaX6YMBeFE\/W516jzlBSMI\/AAAAAAAAHCY\/cb5Rc18auRQ68hWB7F7YsXe1qP6n_TJZwCLcBGAs\/s1600\/hillary-clinton-7-26-16-2.jpg\" alt=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>\n<div><strong>Fig. 1\u2014Hillary Clinton has all of our encryption keys, including the FBI&#8217;s<\/strong>.\u00a0&#8220;Encryption keys&#8221; is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public\/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the\u00a0<a title=\"AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2015\/11\/complicit-encryption-geeks-enable.html\">Dual_EC_DRBG<\/a>\u00a0NSA algorithm and certificate authorities. The convoluted structure managed by the &#8220;Federal Common Policy&#8221; group has ceded to companies like ENTRUST INC the ability to sublicense their authority to third parties who in turn manage entire other networks in a Gordian knot of relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.<\/p>\n<div>Click here to read a list of just some of the &#8220;<em>more than 2000 organizations in 60 different countries&#8221;\u00a0<\/em>that Hillary can control. Source:\u00a0<a title=\"NTRUST 10-K. (1998-2009). Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. SEC Edgar.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/09\/2018-09-13-ENTRUST-ENTU-10-K-1998-to-2009-Material-Disclosed-Customers-Partners-Directors-Officers-Dependents-Subsidiaries-SEC-Edgar-compiled-Sep-13-2018\">ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar<\/a>. Return in a few days for links to each of the ENTRUST annual reports from 1998 to 2009.<\/div>\n<p><a title=\"AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2015\/11\/complicit-encryption-geeks-enable.html\">AFI (Nov. 06, 2015)<\/a>. Complicit encryption geeks enable the American spy state.\u00a0<em>Americans for Innovation<\/em>.<\/p>\n<p><a title=\"AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors. Americans For Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2015\/11\/dell-and-lenovo-ibm-ship-computers-with.html\">AFI (Nov. 25, 2015)<\/a>. Dell and Lenovo (IBM) ship computers with spy state backdoors.\u00a0<em>Americans for Innovation<\/em>.<\/p>\n<p><a title=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" href=\"http:\/\/youtu.be\/-zWWJ1BzKgI\">http:\/\/youtu.be\/-zWWJ1BzKgI<\/a>\u00a0|\u00a0<a title=\"AFI. (Sep. 16, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-09-13-Trump-s-September-Surprise-is-a-Doozy-by-McKibben-Gabriel-American-Intelligence-Media-Americans-for-Innovation-Sep-13-2018.mp4\">(Raw *.mp4 video file<\/a>\u2014use if the YouTube version is censored).<\/div>\n<div><em>Graphic: The Judiciary Report<\/em>.<\/div>\n<\/div>\n<\/div>\n<div>\n<div>DECIPHERING HILLARY&#8217;S ENCRYPTION KEYS THAT HAVE KEPT HER ONE STEP AHEAD OF THE SHERIFF<\/div>\n<p><strong>SPECIAL NOTICE:\u00a0<\/strong><em>This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added.<\/em>\u00a0Indictable evidence continues to pour in for use by prosecutors, alternative media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.<\/p>\n<p>Cryptography\u2014the use of codes and ciphers to protect secrets\u2014began thousands of years ago. Until recent decades, it has been the story of what might be called\u00a0classic cryptography\u00a0\u2014 that is, of methods of\u00a0encryption\u00a0that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the\u00a0Enigma\u00a0rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.<\/p>\n<p>In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.<\/p>\n<p>The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a &#8220;skytale&#8221; to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu &#8216; Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher.\u00a0Tellingly, a design in 1976 by IBM based on &#8220;the Lucifer cipher&#8221; is now used and called &#8220;triple-DES&#8221; (the\u00a0Triple Data Encryption Algorithm).<\/p>\n<p>When the German\u00a0<a title=\"Enigma Machine\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enigma_machine\">Enigma Machine<\/a>\u00a0was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way,\u00a0Hillary&#8217;s access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things&#8217; version of the Enigma Machine break, which was considered by western Supreme Allied Commander\u00a0Dwight D. Eisenhower\u00a0to have been &#8220;decisive&#8221; to the Allied victory.\u00a0<em>See<\/em>\u00a0<a title=\"Staff. (2001). History of Encryption. SANS Institute.\" href=\"http:\/\/www.sans.org\/reading-room\/whitepapers\/vpns\/history-encryption-730\"><em>History of Encryption<\/em><\/a>.<\/div>\n<p>(SEP. 16, 2018)\u2014Imagine that your identity is stolen suddenly.<\/p>\n<p>Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.<\/p>\n<p>Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They\u2019re wiped without a trace.<\/p>\n<p>Imagine still further that you are Lord Mark Malloch-Brown from the Queen\u2019s Privy Council. You need to erase the U.S. Department of Treasury\u2019s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.<\/p>\n<p>This cannot happen in America you say? Think again.<\/p>\n<p>Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.<\/p>\n<p>Truth is, Hillary Clinton literally has access to\u00a0<em>every<\/em>\u00a0computer on the Internet through a company named ENTRUST. Her 19-year Rose Law Firm partner Jerry C. Jones directs the company (now ostensibly run by a Silicon Valley dude named Orlando Bravo and his private equity firm Thoma Bravo, LLC), and has done since Dec. 2003. Entrust issues the encryption keys for most major governments and companies in the world.<\/p>\n<div>\n<div>HILLARY HAS ALL YOUR ENCRYPTION KEYS<\/div>\n<div><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/-zWWJ1BzKgI\" width=\"550\" height=\"309\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<div>\n<div><strong>Fig. 2<\/strong>\u2014<a title=\"McKibben, Gabriel. (Sep. 13, 2018). Trump's September Surprise is a Doozy. American Intelligence Media, Americans for Innovation.\" href=\"http:\/\/youtu.be\/-zWWJ1BzKgI\">McKibben, Gabriel. (Sep. 13, 2018)<\/a>. Trump&#8217;s September Surprise is a Doozy. American Intelligence Media, Americans for Innovation.\u00a0<a title=\"Staff. (Apr. 02, 2018). Local News Anchor Forced Into Reading The Same Script. The Rational National.\" href=\"http:\/\/youtu.be\/-zWWJ1BzKgI\">http:\/\/youtu.be\/-zWWJ1BzKgI<\/a>\u00a0| (<a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-09-13-Trump-s-September-Surprise-is-a-Doozy-by-McKibben-Gabriel-American-Intelligence-Media-Americans-for-Innovation-Sep-13-2018.mp4\">Raw *.mp4 video file<\/a>).<\/div>\n<div><em>Video: American Intelligence Media, Americans for Innovation.<\/em><\/div>\n<\/div>\n<\/div>\n<p>WHAT IS AN ENCRYPTION KEY WHY IS THIS DISCOVERY SO DEVASTATING TO THE DEEP STATE SHADOW GOVERNMENT?<\/p>\n<p>Put simply, encryption keys are used on both the sender\u2019s and receiver\u2019s computers to send data. It takes two keys to make a connection to send or receive data. The Clinton Administration created \u201ctrusted Certificate Authorities (CA)\u201d to check with to make sure that the two keys are the real sender and receiver. If your keys are not approved by the CA, your connection will be blocked. In the hands of tyrannical globalists like Hillary Clinton, Barack Obama, George Soros, Eric Schmidt and Robert Mueller, this will be the new censorship on the Internet.<\/p>\n<div>\n<div>WHAT ARE ENCRYPTION KEYS?<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/encryption-illustration.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/encryption-illustration.jpg\" alt=\"AFI. (Sep. 14, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" width=\"98%\" \/><\/a><\/p>\n<div>\n<div><strong>Fig. 3\u2014<\/strong>Put simply, it takes two keys to establish an Internet connection\u2014the sender&#8217;s and the recipient&#8217;s. Those two keys are combined to encrypt your data stream, then decrypt it once it has been received.<\/p>\n<p>Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.<\/p>\n<p>For example, the phrase \u201cyour cancer treatment program\u201d would be encrypted with a digital key and travel through the Internet as \u201c<strong>Qij\\aq6NB5Lf@;kndFq7CN{Q{<\/strong>.&#8221; So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor. Not so for Hillary, she would see you have cancer and could use that information for blackmail, extortion or murder, whatever worked for her.<\/p>\n<\/div>\n<div><em>Graphic: Oracle<\/em>.<\/div>\n<\/div>\n<\/div>\n<p>These CA\u2019s make a big deal in their propaganda that you can \u201ctrust\u201d them not to use or spoof your identity to get access to data that you and they are not authorized to have. That is a\u00a0<strong>boldface<\/strong>\u00a0lie. No wonder these people have the countenances of criminals. They are, and they know it.<\/p>\n<p>Suppose you are the CA who issues keys to the FBI. Suppose you want to see the evidence being gathered against you in an investigation.<\/p>\n<p>All you have to do is \u201cborrow\u201d the FBI key from Hillary or ENTRUST. Then you can connect to the target FBI computer using a bogus key created for you by ENTRUST, and voile! You then have two \u201ctrusted\u201d keys so the FBI computers let you in. There are technical nuances to this description, but basically, you can do what you want with these keys. Don&#8217;t let trollers try to baffle you with techno-jargon to throw your dogs off the scent.\u00a0<strong>Lucifer<\/strong>(literally, IBM Triple-DES) is in these encryption details.<\/p>\n<p>Hillary Clinton has this level of access to practically all data on the planet, including the FBI, NSA, Departments of State, Commerce, Energy, Treasury, GSA, Patent Office, Post Office, NIST, as well as numerous foreign government and commercial entities.\u00a0<em>See<\/em>\u00a0<a title=\"NTRUST 10-K. (1998-2009). Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. SEC Edgar.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/09\/2018-09-13-ENTRUST-ENTU-10-K-1998-to-2009-Material-Disclosed-Customers-Partners-Directors-Officers-Dependents-Subsidiaries-SEC-Edgar-compiled-Sep-13-2018\">ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar<\/a>.<\/p>\n<p>Now that we finally know how the Clinton&#8217;s stay one step ahead of the sheriff, we can now stop them.<\/p>\n<p>MORE HARD PROOF THAT HILLARY CLINTON IS A DIGITAL MONSTER<\/p>\n<p>In this post, we will prove without a doubt how Hillary Clinton cleverly wormed her way into full access and control for 50,000 FBI encryption keys.<\/p>\n<p>They are likely managing this empire from Obama\u2019s Google-constructed U.S. Digital Service bunker three blocks from the White House manned by Valerie Jarrett and Eric Holder.<\/p>\n<p>We admit that these findings sound more like Grisham fiction. But the evidence is a pesky thing. The evidence is now pouring out.<\/p>\n<p>THE EVIDENCE PROVIDED IS \u201cJUDICIALLY RECOGNIZABLE\u201d AND INDICTABLE, WE BELIEVE<\/p>\n<p>\u201cNotoriously public\u201d information, like the U.S. Securities &amp; Exchange Commission filings that we cite, is evidence that requires no further verification to be used in litigation, hence the adjective \u201cnotoriously.\u201d This means that the information is so publicly noteworthy that further proof of validity is unnecessary. For example, John F. Kennedy was assassinated in 1973. That is a notoriously public fact and no proof is needed.<\/p>\n<p>Notoriously public facts, like SEC filings, are \u201cjudicially recognizable\u201d and can be accepted as truthful since the submitter attests to the SEC that they are true. It is criminal fraud to lie intentionally in SEC filings.<\/p>\n<p>TIMELINE:\u00a0BILL &amp; HILLARY CLINTON BEGAN ORCHESTRATING UNFETTERED ACCESS TO THE FBI\u2019S ENCRYPTION KEYS IN 1993<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#crypto-treason\">On Jun. 07, 1993<\/a>, the new Clinton Administration convened the \u201cThird CPSR Cryptography and Privacy Conference (CPSR &#8211; Computer Professionals For Social Responsibility).\u201d<\/p>\n<p>The conference was held two days before an important\u00a0<a href=\"http:\/\/epic.org\/crypto\/clipper\/cpsr_markey_testimony_6_9.html\">Jun. 09, 1993<\/a>\u00a0House hearing on &#8220;encryption and telecommunications network security.&#8221; The conference gathered over 106 attendees representing government, politics, commerce, manufacturing, industry, media, technology, telecommunications, healthcare, banking, education, faith and accounting. That\u2019s plenty of arm-twisting, even for Washington, D.C.<\/p>\n<p>The meeting sponsor was globalist advocate Carnegie Endowment for International Peace.<\/p>\n<p>The hosts included:<\/p>\n<p>(1)\u00a0<strong>James P. Chandler, III<\/strong>,\u00a0 George Washington University intellectual property and national security law professor, and later patent attorney for social networking inventor Leader Technologies, Inc. (<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#mckibben-met-chandler\">Jan. 2000<\/a>);<\/p>\n<p>2)\u00a0<strong>John D. Podesta<\/strong>, chief of staff and campaign manager to Bill Clinton, Barack Obama and Hillary Clinton;<\/p>\n<p>(3)\u00a0<strong>Stephen D. Crocker<\/strong>, founding member of the illegal public-private conspiracy group Highland\u2019s Forum\/Group (<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#highland-forum\">Feb. 1995<\/a>), then Barack Obama\u2019s director of ICANN (Internet Corporation for Assigned Names and Numbers) who ceded control to the UN on\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#obama-icann-fraud\">Oct. 01, 2016<\/a>\u2014one month before Donald J. Trump was elected president.<\/p>\n<p>HILLARY HID THE 1993 ENCRYPTION MEETING ATTENDEE LIST<\/p>\n<p>The information about this meeting was hidden on Hillary\u2019s private email server. It was unearthed by corruption watchdog Judicial Watch after they pressed the State Department in court to release the document.<\/p>\n<div>\n<div>THE ENCRYPTION KEY SET UP<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/1993-06-07-clinton-chandler-podesta-encryption-conference.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/1993-06-07-clinton-chandler-podesta-encryption-conference.jpg\" alt=\"AFI. (Sep. 14, 2018). Hillary Clinton controls 50,000 FBI encryption keys proves Mueller's Russia witch hunt is treasonous. Americans for Innovation.\" width=\"98%\" \/><\/a><\/p>\n<div>\n<div><strong>Fig. 4\u20141993 Clinton encryption conference to give the FBI backdoor keys to the Internet.<\/strong><\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/1993-06-07-Third-CPSR-Cryptography-and-Privacy-Conferece-FOIA-9403963-John-Podesta-James-Chandler-Stephen-Crocker-IBM-HP-ATT-Carnegie-Endowment-for-Inttl-Peace-US-Dept-of-State-Jun-07-1993.pdf\">James P. Chandler, III, John D. Podesta. (Jun. 07, 1993)<\/a>. Third CPSR Cryptography and Privacy Conference, included Stephen D. Crocker, John D. Podesta, James P. Chandler, III, Ann Harkins, Ken Mendelson (Stroz Friedberg), Juan Osuna, Cathy Russell, Steven Wolff, IBM, HP, AT&amp;T. FOIA No. 9403963. U.S. Dept. of State. Note: This PDF file contains a spreadsheet of the attendees (click on the paper clip inside the PDF).<\/div>\n<div><em>Graphic: Judicial Watch<\/em>.<\/div>\n<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#clinton-chronicles\">In 1993-1994<\/a>, more than 20 people close to or investigating Clinton corruption died under suspicious circumstances.<\/p>\n<p>THEFT &amp; WEAPONIZATION OF U.S. INVENTIONS<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#highland-forum\">In Feb. 1995<\/a>, the Highlands Forum\/Group was formed. It was and is a highly illegal private \u201cpublic-private\u201d meeting sponsored by the Department of Defense Net Assessment group run by\u00a0<a href=\"http:\/\/americans4innovation.blogspot.com\/2018\/03\/obama-hired-them-trump-cannot-fire-them.html\">Senior Executive Service (SES)<\/a>\u00a0members Richard P. O&#8217;Neill and Andrew W. Marshall.\u00a0<em>See<\/em>\u00a0also\u00a0<a title=\"AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2017\/11\/the-weaponization-of-social-media.html\">AFI. (Nov. 22, 2017)<\/a>. The Weaponization of Social Media Should Concern Us All.\u00a0<em>Americans for Innovation<\/em>.<\/p>\n<p>The no-notes meetings involve no-bid crony insiders from the military, intelligence, banking, technology, telecom, transportation, defense, venture capital, media an academia to discuss the weaponization of new inventions stolen by DARPA (Defense Advanced Research Projects Agency).<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#eo-12958\">On Apr. 17, 1995<\/a>, Clinton signed Executive Order 12958 titled &#8220;Classified National Security.&#8221;<\/p>\n<p>This order consolidated control of classification procedures to\u00a0<em>just seven people<\/em>: (1) Secretary of State, (2) Secretary of Defense, (3) Attorney General, (4) C.I.A. Director, (5) U.S. Archivist, (6) National Security Director and (7) the President.<\/p>\n<p>A most dubious provision said that\u00a0<em>any<\/em>\u00a0U.S. security classification that contradicted another country&#8217;s laws or treaty rendered it of no effect. In other words, if Obama wanted to release a classified document, all he had to do was call up Justin Trudeau in Canada and ask him to pass a law saying America\u2019s XYZ classified information was harmful to beavers on the northern slopes. That would nullify the U.S. classification and give Obama the excuse to release it. Clearly, it was a precursor to Obama\u2019s foreign trade entanglements in the Trans-Pacific Partnership (TPP) that President Trump killed, thankfully.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#oklahoma-city-bombing\">On Apr. 19, 1995<\/a>, the Alfred P. Murrah Federal Building in downtown Oklahoma City, was bombed by Timothy McVeigh and Terry Nichols\u2014just\u00a0<em>two days<\/em>\u00a0after Bill Clinton formed a secret White House intelligence operation via Executive Order 12958 cited above.<\/p>\n<p>This bombing created more excuses for mass surveillance against Americans. Notably,\u00a0 Clinton body guard\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#alan-whicher\">Alan G. Whicher<\/a>\u00a0was killed in this weapons grade-energy blast that could not have been caused by a fertilizer bomb, as were led to believe by MSM. Retired FBI superstar\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#ted-gunderson-fbi-rogue-cia\">Theodore L. Gunderson<\/a>, a short-list candidate to be FBI director, revealed that psychiatrist Dr. Jolly West, one of the founders of the C.I.A. MKUltra mind control program, paid a visit to McVeigh before the trial. Gunderson said he believed that McVeigh was a brainwashed MKUltra drone.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#ibm-lotus-merged\">On Jul. 12, 1995<\/a>, IBM and Lotus merged. Lotus Notes became the Deep State\u2019s groupware platform of choice for establishing a global mass surveillance spy grid. PKI (Public Key Infrastructure) encryption standards were selected to build into IBM\/Lotus\/Microsoft\/Novell\/Red Hat software, hardware and firmware.<\/p>\n<p>LAWS CHANGED TO PREPARE FOR THE PATRIOT ACT ABOLISHMENT OF THE BILL OF RIGHTS<\/p>\n<p>Between 1995-1999, a series of national security laws, executive orders (EOs) and presidential policy directives (PPDs) were written for Clinton by James P. Chandler, III, his national security and intellectual property advisor.<\/p>\n<p>Magically, the laws that Chandler drafted passed nearly unanimously. (Note: Whenever that occurs, all of Congress has been bought off or fooled\u00a0<em>en masse<\/em>\u00a0before the vote. Remember: Clinton had likely already had access to the FBI encryption keys by this time. Therefore, he had amassed plenty of blackmail and extortion information on every influential member of Congress.)<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#chandler-freeh-fbi-eea\">On Feb. 28, 1996<\/a>, FBI Director Louis Freeh self-consciously deferred to James P. Chandler, III in his testimony on economic espionage, revealing that Chandler controlled FBI security policy for Clinton. \u00a0Freeh was clearly the puppet and Chandler the puppet master.<\/p>\n<div>\n<div>JAMES P. CHANDLER, III HAS DRIVEN THE FBI ENCRYPTION KEY SCAM FOR THE CLINTONS<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/louis-freeh-chandler-senate-feb-28-1996.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/louis-freeh-chandler-senate-feb-28-1996.jpg\" alt=\"S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler, PDF p. 16. U.S. Senate.\" width=\"98%\" \/><\/a><\/p>\n<div>\n<div><strong>Fig. 5\u2014<\/strong><a title=\"S. Hrg. 104-499 (Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler. U.S. Senate\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/1996-02-28-S-Hrg-104-499-Economic-Espionage-Hearing-before-Select-Committee-on-Intelligence-Subcommittee-on-Terrorism-Technology-104-th-Congress-Y-4-IN-8-19-S-Hrg-104-499.pdf\">S. Hrg. 104-499<\/a>\u00a0(Feb. 28, 1998). Economic Espionage Act Hearing, testimony of FBI Director Louis Freeh acknowledging James P. Chandler. U.S. Senate.<\/p>\n<p><a title=\"Professor James P. Chandler biography, National Intellectual Property, p. 6\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/2001-03-28-Trade-Secrets-and-Enforcement-of-Intellectual-Property-Rights-Conference-NIPLI-Prof-James-P-Chandler-Mar-28-2001.pdf\">Professor James P. Chandler<\/a>\u00a0biography, National Intellectual Property, p. 6; Chandler admission and notorious Washington, D.C. knowledge among Chandler associates in the National Intellectual Property Law Institute.<\/div>\n<div><em>Citation: U.S. Senate Judiciary Committee.<\/em><\/div>\n<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#economic-espionage-act\">On Oct. 11, 1996<\/a>, Congress passed three Clinton-Chandler laws that were used to further gut Congressional oversight over security and privacy. It enabled the FBI to increase mass surveillance, then lie about it.<\/p>\n<p>The Economic Espionage Act,\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#economic-espionage-act\">18 U.S. Code \u00a7 1831<\/a>;<\/p>\n<p>The Federal Trade Secrets Act,\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#economic-espionage-act\">18 U.S.C. \u00a7 1836<\/a>; and<\/p>\n<p>The False Statements Accountability Act of 1996,\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#false-statements-act\">18 U.S.C. \u00a7 1001<\/a>.<\/p>\n<p>Hindsight shows that the names for these laws were a cruel, unlawful, immoral, devilish deceit and had the opposite of the intentions of the rogue C.I.A., Clinton&#8217;s, Chandler, Mueller, Comey, etc. to fuel economic espionage, theft of trade secrets and lying to Congress, courts, the President and We the People.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#eurotech-founded-02-12-1997\">On Feb. 12, 1997<\/a>, Chandler incorporated Eurotech, Ltd. to hire former Soviet scientists and engineers to build embedded encryption spy backdoors inside\u00a0<em>all<\/em>\u00a0computer hardware, firmware and software in Italy. The key Eurotech players were\/are Microsoft, IBM, Intel, Cisco, Oracle and Wind River, among others. JPMorgan Chase\u2019s\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#eurotech-11-25-2005\">John McNeil Wilkie<\/a>\u00a0helped expand the company, as did\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#leader-engages-chandler-freeze\">Fenwick &amp; West LLP<\/a>\u00a0(another Leader Technologies patent attorney and Silicon Valley C.I.A. co-conspirator).<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#clinton-foundation-formed\">On Oct. 23, 1997<\/a>, The Clinton Foundation was formed.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#kosovo-war-starts\">Mar. 5, 1998\u2014Jul. 11, 1999<\/a>, Clinton and Gen. Wesley Clark prosecuted the Kosovo fraud based on a so-called \u201cRa\u010dak genocide massacre\u201d false flag. French journalists have proved that Ra\u010dak was\u00a0<em>completely staged<\/em>. However, it did succeed in cajoling Congress to approve U.N. intervention (led by Gen. Wesley K. Clark), and it succeeded in disabling Orthodox Christian resistance to the planned jihadi migration wave now occurring.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#richard-c-walker\">On Aug. 06, 1998<\/a>, Robert S. Mueller, III&#8217;s law firm Hale &amp; Dorr (now Wilmer Hale) helped file &#8220;The Internet of Things&#8221; patents for Hewlett-Packard\u2019s Richard C. Walker that described a global surveillance grid that even monitors and controls individual body functions and describes human beings as &#8220;wet-ware.&#8221; The invention also contains an accounting and taxing capability to manage &#8220;certificate authorities&#8221; to control Public Key Infrastructure (PKI) encryption, tax the Internet and control &#8220;wet-ware&#8221; access.<\/p>\n<div>Click image to enlarge<a title=\"U.S. Patent No. 6,965,816, Fig. 21.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/pfn-trac-person-running.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/pfn-trac-person-running.jpg\" alt=\"U.S. Patent No. 6,965,816, Fig. 21.\" width=\"98%\" \/><\/a><\/p>\n<div>FIG. 6\u2013<a title=\"Richard C. Walker. (Nov. 15, 2005). U.S. Pat. No. 6,965,816, PFN\/TRAC SYSTEM FAA UPGRADES FOR ACCOUNTABLE REMOTE AND ROBOTICS CONTROL TO STOP THE UNAUTHORIZED USE OF AIRCRAFT AND TO IMPROVE EQUIPMENT MANAGEMENT AND PUBLIC SAFETY IN TRANSPORTATION. USPTO.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2005-11-15-US-Pat-No-6965816-PFN-TRAC-SYSTEM-FAA-UPGRADES-RE-AIRCRAFT-ET-AL-Walker-Nov-15-2005.pdf#page=22\">U.S. Patent No. 6,965,816, Fig. 21<\/a>.<\/div>\n<\/div>\n<div>Click image to enlarge<a title=\"U.S. Patent No. 6,965,816, Fig. 1.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/pfn-trac-fig-1.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/pfn-trac-fig-1.jpg\" alt=\"U.S. Patent No. 6,965,816, Fig. 1.\" width=\"98%\" \/><\/a><\/p>\n<div>FIG. 7\u2013<a title=\"Richard C. Walker. (Nov. 15, 2005). U.S. Pat. No. 6,965,816, PFN\/TRAC SYSTEM FAA UPGRADES FOR ACCOUNTABLE REMOTE AND ROBOTICS CONTROL TO STOP THE UNAUTHORIZED USE OF AIRCRAFT AND TO IMPROVE EQUIPMENT MANAGEMENT AND PUBLIC SAFETY IN TRANSPORTATION. USPTO.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2005-11-15-US-Pat-No-6965816-PFN-TRAC-SYSTEM-FAA-UPGRADES-RE-AIRCRAFT-ET-AL-Walker-Nov-15-2005.pdf#page=1\">U.S. Patent No. 6,965,816, Fig. 1<\/a>.<a title=\"AFI. (Jan. 11, 2018). Meet The Person Who Can Remotely Crash Planes And Can Your Mind. Americans for Innovation.\" href=\"http:\/\/www.fbcoverup.com\/docs\/afi\/2018-01-11-MEET-THE-PERSON-WHO-CAN-REMOTELY-CRASH-PLANES-AND-READS-YOUR-MIND-Americans-for-Innovation.pdf\">AFI. (Jan. 11, 2018)<\/a>. Meet The Person Who Can Remotely Crash Planes And Can Your Mind.\u00a0<em>Americans for Innovation.<\/em><\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#entrust-ipo\">On Aug. 18, 1998<\/a>, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities\u2014the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.<\/p>\n<div>Click image to enlarge<a title=\"U.S. Patent No. 6,965,816, Fig. 1.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-prospectus-customers-Aug-18-1998.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-prospectus-customers-Aug-18-1998.jpg\" alt=\"U.S. Patent No. 6,965,816, Fig. 1.\" width=\"98%\" \/><\/a><\/p>\n<div>FIG. 8\u2013<a title=\"Prospectus Form 424B1. (Aug. 18, 1998). Entrust Technologies, Inc., formerly Entrust Technologies, Inc., PDF p. 49. SEC Edgar\/NASDAQ.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/1998-08-18-Entrust-Inc-formerly-Entrust-Technologies-Inc-Prospectus-Form-424B1-SEC-Edgar-NASDAQ-Aug-18-1998.pdf\">Prospectus Form 424B1. (Aug. 18, 1998)<\/a>. Entrust Technologies, Inc., formerly Entrust Technologies, Inc., PDF p. 49. SEC Edgar\/NASDAQ.<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#serco-precursor-formed\">On Oct. 14, 1998<\/a>, SI International, LLC, later renamed SERCO SERVICES, Inc., was allowed to form with Lockheed Martin and\u00a0<a href=\"http:\/\/americans4innovation.blogspot.com\/2018\/03\/obama-hired-them-trump-cannot-fire-them.html\">Senior Executive Service (SES)<\/a>\u00a0executives associated with the treasonous\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#highland-forum\">Highlands Group<\/a>\u00a0(Feb. 1995). Lockheed Martin runs the Queen&#8217;s &#8220;Golden Share&#8221; company\u00a0<a title=\"AFI. (Jun 03, 2018). Spy-gate is directed by the Crown's courtiers in the UK, not by Russia. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/06\/part-i-spy-gate-is-directed-by-crowns.html\">British Nuclear Fuels Limited<\/a>\u00a0with\u00a0<a title=\"AFI. (Apr. 20, 2018). The shadow government uses SES, Serco and OPIC as portals into horrific corruption. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/04\/the-shadow-government-uses-ses-serco.html\">SERCO<\/a>.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#cbs-kroft-soros\">On Dec. 20, 1998<\/a>, globalist psychopath George Soros admitted to having been a Hungarian Jewish Nazi collaborator without remorse for betraying his own Jewish brothers and sisters.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#al-gore-invented-internet-cnn-quote\">On Mar. 09, 1999<\/a>, Clinton&#8217;s Vice President Al Gore took credit for founding the Internet, laughably.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#office-of-special-counsel-procedure-reno-fiat\">On Jul. 01, 1999<\/a>, Clinton Attorney General Janet Reno created a new &#8220;Office of Special Counsel&#8221; inside the Department of Justice after the Special Counsel law was not re-authorized by Congress. This dubious Department of Justice policy (not a law) is now being used to justify the\u00a0<a title=\"AFI. (Mar. 09, 2018). Special Counsel Legal Authority Is Illegitimate. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/03\/special-counsel-legal-authority-is.html\">Mueller witch hunt<\/a>.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#summers-appointed-treasury-secretary\">On Jul. 02, 1999<\/a>, Clinton appointed Larry H. Summers Treasury Secretary. The next day,\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#sandberg-chief-of-staff-for-summers\">on Jul. 03, 1999<\/a>, Summers appointed Sheryl K. Sandberg as chief of staff. Sandberg later started Gmail in\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#band-cgi-sandberg-google-levine\">Jan. 20, 2001<\/a>, and then became Facebook chief operating officer on\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#sandberg-appointed-facebook-coo\">Mar. 14, 2008<\/a>.<\/p>\n<p>Summers&#8217; former Treasury staffer (<a title=\"Marne L. Levine, has been a serial employee of the Clintons and Larry Summers since she graduated from Harvard in 1993.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#deutch-appointed-cia-director\">1993-2001<\/a>), Marne L. Levine (Deutch) became Summers&#8217; chief of staff starting at Harvard on\u00a0<a title=\"On July 02, 2001, the new Harvard president, Larry Summers, hired Marne L. Levine (aka &quot;Marnie&quot;) as his chief of staff as president of Harvard University (2001-2003). Levine had worked for Summers at the U.S. Treasury Department between 1993-2001.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#marne-levine-harvard\">Jul. 02, 2001<\/a>\u00a0where she oversaw the C.I.A.&#8217;s MKUltra establishment of the 19-year old Mark Zuckerberg as their Facebook cardboard cut out. Then, she became product vice president at AOL on\u00a0<a title=\"Marne L. Levine became AOL's Director of Product Management in 2006.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#marne-levine-deutch-aol\">Apr. 06, 2009<\/a>. Then, she became Summers&#8217; chief of staff for the National Economic Council on\u00a0<a title=\"On Jan. 21, 2009, Larry Summers appointed Marne L. Levine (aka &quot;Marnie&quot;) to be his chief of staff at the National Economic Council (NEC) and Special Advisor to the President on Public Policy.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#marne-levine-deutch-nec\">Jan. 21, 2009<\/a>. Then, she became Obama&#8217;s Special Assistant to the President for Economic Policy on\u00a0<a title=\"On Jun. 24, 2010, Marne L. Levine (a.k.a. &quot;Marnie&quot;) left the White House as Special Assistant to the President for Economic Policy, and previously as Chief of Staff to Larry Summers, Director of the National Economics Council, to become Facebook's Vice President of Global Public Policy.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/09\/hillary-clinton-controls-50000-fbi_15.html#marne-levine-deutch-facebook\">Jun. 24, 2010<\/a>. Then, she attended an exclusive dinner with Hillary and Sandberg on\u00a0<a title=\"On Mar. 27, 2012, Hillary Clinton organized a private dinner meeting at i-Ricchi Restaurant in Washington, D.C. with Facebook chief operating officer, Sheryl K. Sandberg, and vice president of global public policy, Marne L. Levine (aka &quot;Marnie&quot;). Cheryl D. Mills also attended.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#hillary-sandberg\">Mar. 27, 2012<\/a>. Then, she became chief operating officer of Instagram on\u00a0<a title=\"On Oct. 07, 2014, Marne L. Levine (aka &quot;Marnie&quot;) (Deutch) was appointed chief operating officer of Instagram\u2014where Larry Summers and Marc Andreessen are directors.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#marne-levine-deutch-instagram\">Oct. 07, 2014<\/a>. Truly magical.<\/p>\n<p>WHITE HOUSE ROGUE INTELLIGENCE NOC (NETWORK OPERATING CENTER):\u00a0NATIONAL INFRASTRUCTURE ASSURANCE COUNCIL<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#niac-version-1\">On Jul. 14, 1999<\/a>, the Clinton White House set up a spy skunk works that has run rogue intelligence operations called the \u201cNational Infrastructure Assurance Council (NIAC)\u201d\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#chandler-niac\">On Jan. 18, 2001<\/a>, Clinton appointed James P. Chandler, III and Bill Gates, Microsoft, as directors on NIAC the day before he left office and the same day he pardoned his former CIA director\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#deutch-cia-pardon\">John M. Deutch<\/a>\u00a0(Marne L. Levin-Deutch&#8217;s father in law) and fraudster\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#marc-rich-pardon\">Marc Rich<\/a>.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#encryption-scam-began\">On Sep. 16, 1999<\/a>, Clinton announced &#8220;relaxed&#8221; encryption rules in a flurry of press releases and letters to Congress, which were most assuredly drafted by national security advisor James P. Chandler, III. This action effectively\u00a0<em>gutted<\/em>\u00a0normal engineering security practices. It had the effect of enabling unfettered foreign and domestic access to U.S. classified data.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#cia-in-q-tel-formed\">On Sep. 29, 1999<\/a>, Bill Clinton established In-Q-Tel Silicon Valley cardboard cutouts for the C.I.A. to be able to raise private venture capital funds to build its rogue operations. It is\u00a0<em>illegal<\/em>for a government agencies to invest in private companies.<\/p>\n<div>Click image to enlarge<a title=\"U.S. Patent No. 6,965,816, Fig. 1.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/cia-in-q-tel-formed-sep-29-1999.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/cia-in-q-tel-formed-sep-29-1999.jpg\" alt=\"On Sep. 29, 1999, the Central Intelligence Agency (C.I.A.) formed In-Q-Tel and hired it first CEO, Gilman Louie. See the book: In-Q-Tel: A New Partnership Between the CIA and the Private Sector.\" width=\"98%\" \/><\/a><\/p>\n<div>FIG. 9\u2013<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#cia-in-q-tel-formed\">On Sep. 29, 1999<\/a>, Clinton C.I.A.\u00a0<em>institutionalized<\/em>\u00a0crony capitalism and the digital take over of America by a Shadow Government,\u00a0<em>on this day<\/em>.<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#glass-steagall\">On Nov. 12, 1999<\/a>, Bill Clinton and Larry Summers abolished Glass-Steagall banking controls, enabling the banks to fund In-Q-Tel \u201cprivate\u201d companies.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#agilent-public-offering\">On Nov. 17, 1999<\/a>, Agilent Technologies went public using Robert S. Mueller\u2019s III\u2019s law firm Hale and Dorr (renamed Wilmer Hale). Agilent \u00a0Technologies was tasked with building the digital infrastructure for \u201cThe Internet of Things\u201d global mass surveillance of everything using the Richard C. Walker HP\/Agilent patents for monitoring all human beings called \u201cwet-ware\u201d in the patents.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#chandler-leader-invention-disclosure\">On Jun. 08, 2000<\/a>, Clinton espionage attorney James P. Chandler, III, participated in seminal Leader invention design meetings as Leader\u2019s newly-appointed patent attorney. He was fully briefed on Leader\u2019s social networking innovations at this meeting (see photo below) without disclosing his Deep State shadow government conflicts of interest and treachery.<\/p>\n<div><a title=\"Michael McKibben. (Jul. 22, 2017). Leader Technologies Miller Act Notice 40 USC 3131 service to U.S. Executive Donald J. Trump et al. Leader Technologies.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2000-06-08-Leader_Technologies_Design_Session_Jun_08_2000_US_Courts-Jun-08-2000.png\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/2000-06-08-Leader_Technologies_Design_Session_Jun_08_2000_US_Courts-Jun-08-2000.png\" alt=\"Leader Technologies Miller Act Notice for Federal Works Projects 40 USC Sec. 3131 et seq. timeline\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 10\u2014<a title=\"Michael McKibben. (Jul. 22, 2017). Leader Technologies Miller Act Notice 40 USC 3131 service to U.S. Executive Donald J. Trump et al. Leader Technologies.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2017-07-23-MILLER-ACT-NOTICE-TO-US-EXECUTIVE-served-via-USPS-Express-Mail-Jul-23-2017.pdf#page=3\">JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER<\/a>\u00a0first learned about Leader\/McKibben&#8217;s social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer&#8217;s right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo.\u00a0<em>Photo<\/em>: Leader Technologies, Inc.<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2000-06-20-Sir-Geoffrey-Edwin-Pattie-Silver-Star-Award-The-ISSA-Awards-International-Strategic-Studies-Association-ISSA-Wayback-Machine-posted-Aug-18-2000-Jun-20-2000.pdf\">On Jun. 20, 2000<\/a>, Sir Geoffrey E. Pattie was awarded the ISSA Silver Star Award in Washington, D.C.\u00a0 Pattie is the primary spy director for the Queen\u2019s Privy Council and founder of SCL Ltd. and Cambridge Analytica\u2014two C.I.A. MKUltra mind control and brain washing operations in the UK.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#OGE-mutual-fund-rules-changed\">On Aug. 25, 2000<\/a>, F. Gary Davis, Acting Director of the U.S. Office of Government Ethics, issued a tortured 13-page &#8220;advisory&#8221; that dramatically muddied the waters on mutual fund investing disclosure. Davis left government service soon thereafter. This opinion opened the door to massive nondisclosure fraud by politicians, SES and federal bureaucrats.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#hayden-expands-nsa-ses\">In 2001<\/a>, NSA Director Michael V. Hayden recommended expansion of the NSA&#8217;s Senior Executive Service (SES) programs.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#susan-lindauer-911-pretext\">On Apr. 15, 2001<\/a>, C.I.A. whistleblower Susan Lindauer warned American senior intelligence leadership that &#8220;I first learned of the 9\/11 Conspiracy from my CIA handler, Dr. Richard Fuisz, in mid-April, 2001.&#8221; She was\u00a0<em>imprisoned<\/em>\u00a0for a year without due process to shut her up as the first casualty of The Patriot Act.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#stellar-wind-setup\">In Jul. 2001<\/a>, Department of Justice John C. Yoo was hired into the Office of Legal Counsel (OLC) and gave legal opinion cover for a proposed NSA project \u201cStellar Wind\u201d for mass surveillance of American citizens.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#mueller-sworn-in-fbi-director\">On Sep. 04, 2001<\/a>, Robert S. Mueller, III was sworn in as FBI Director by President George W. Bush, just 10 days before 9\/11.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#911\">On Sep. 11, 2001<\/a>, World Trade Center, Pentagon and Shanksville \u201cterror\u201d attacks were timed simultaneously with DoD NORAD war games and a stand down order.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#stellar-wind\">On Oct. 04, 2001<\/a>, President Bush approves operation \u201cStellar Wind\u201d mass surveillance on American citizens.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#eo13231-niac\">On Oct. 16, 2001<\/a>, President Bush signed Executive Order 13231 &#8220;Critical Infrastructure Protection in the Information Age&#8221; forming the &#8220;National Infrastructure Advisory Council (NIAC).&#8221; The order used the same NIAC acronym used by Clinton as the excuse for setting up a mass surveillance networking operating center run out of the White House.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#patriot-act\">On Oct. 26, 2001<\/a>, President Bush signed The Patriot Act that has essentially destroyed the Bill of Rights. Just look at the flies that gathered to watch the signing.<\/p>\n<div><a title=\"Michael McKibben. (Jul. 22, 2017). Leader Technologies Miller Act Notice 40 USC 3131 service to U.S. Executive Donald J. Trump et al. Leader Technologies.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/usa-patriot-act.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/usa-patriot-act.jpg\" alt=\"On Oct. 26, 2001, a 132-page, seemingly ready-made USA PATRIOT Act was approved by an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is &quot;Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.&quot;\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 11\u2014On Oct. 26, 2001, a 132-page, seemingly ready-made USA PATRIOT Act was approved by an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is &#8220;Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.&#8221;<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#william-binney-resigned-nsa\">On Oct 31, 2001<\/a>, NSA whistleblower and former chief architect William E. Binney resigned the NSA saying the agency had &#8220;gone rogue.&#8221;<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#ibm-eclipse-formed\">On Nov. 29, 2001<\/a>, IBM intellectual property attorneys James P. Chandler, III and David J. Kappos used a $40 million IBM \u201cdonation\u201d to start the IBM Eclipse Foundation which has been the exclusive distributor of Leader Technologies\u2019 social networking innovations.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#greatest-financial-heist-in-history\">On Aug. 29, 2002<\/a>, IBM Eclipse Foundation distributed Version 2.0.1 that included all of Leader Technologies&#8217; social networking innovations.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#niac-noonan\">On Sep. 18, 2002<\/a>, career IBMer Thomas E. Noonan (Internet Security Systems, Inc.) was appointed to the National Infrastructure Assurance Council (NIAC) by George W. Bush, surely recommended by James P. Chandler, and he remains a member of the Council to this day. In 2003, Noonan became a partner to ENTRUST INC. Public Key Infrastructure (PKI) controlled by Hillary Clinton.<\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#entrust-fbi-encryption\">On Oct. 29, 2003<\/a>, ENTRUST INC was awarded the contract to supply all 50,000 encryption keys for the Federal Bureau of Investigation (FBI).<\/p>\n<div><a title=\"Michael McKibben. (Jul. 22, 2017). Leader Technologies Miller Act Notice 40 USC 3131 service to U.S. Executive Donald J. Trump et al. Leader Technologies.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-fbi-encryuption-keys-oct-29-2003.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-fbi-encryuption-keys-oct-29-2003.jpg\" alt=\"ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs &amp; Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 12\u2014<a title=\"ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003). Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs &amp; Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2003-10-29-Form-8-K-ENTRUST-INC-ENTU-Entrust-Announces-Third-Quarter-Financial-Results-and-Targets-Breakeven-for-Year-end-2003-SEC-Edgar-Oct-29-2003.pdf\">ENTRUST INC, ENTU, Form 8-K. (Oct. 29, 2003).<\/a>\u00a0Entrust Announces Third Quarter-Financial Results and Targets Breakeven for Year-end 2003. Accessed Sep. 08, 2018. SEC Edgar. (Despite losses, highlights new contracts with Northrup Grumman, FBI, UK Customs &amp; Excise, Research in Motion Blackberry, Thomas Noonan, Acxiom Corp., California State Senate Counsel, KPMG).<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#entrust-appointed-jerry-c-jones-rose-law-firm\">On Dec. 04, 2003<\/a>, ENTRUST INC elected\u00a0<a title=\"Jerry C. Jones. (Dec. 05, 2003). Entrust Inc, ENTU, Form 3, Initial Statement of Beneficial Ownership of Securities. SEC Edgar.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2003-12-05-Jerry-C-Jones-Form-3-Entrust-Inc-ENTU-Form-3-Initial-Statement-of-Beneficial-Ownership-of-Securities-SEC-Edgar-Dec-05-2003.pdf\">Jerry C. Jones<\/a>\u00a0as a &#8220;Class I&#8221; director to replace retiring Gen. Wesley K. Clark. Jones is a 19-year Hillary Clinton partner at the Rose Law Firm, Little Rock, Arkansas. With the appointment of Jones, FBI Director Robert S. Mueller, III had an ethical duty to disclose to the public that his approval of ENTRUST INC to manage 50,000 FBI encryption keys enabled his political mentor Hillary Clinton to have full access to the entire FBI operation.<\/p>\n<div><a title=\"Hillary Clinton\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/clinton-hillary.jpg\"><img decoding=\"async\" title=\"Hillary Clinton\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/clinton-hillary.jpg\" alt=\"Hillary Clinton\" width=\"30%\" border=\"0\" \/><\/a>\u00a0<a title=\"Jerry C. Jones\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/jones-jerry-c.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/jones-jerry-c.jpg\" alt=\"Jerry C. Jones\" width=\"30%\" border=\"0\" \/><\/a>\u00a0<a title=\"Gen. Wesley K. Clark\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/clark-wesley-k.jpg\"><img decoding=\"async\" title=\"Gen. Wesley C. Clark\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/clark-wesley-k.jpg\" alt=\"Gen. Wesley K. Clark\" width=\"30%\" border=\"0\" \/><\/a><\/div>\n<div><a title=\"ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones. SEC Edgar. \" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-jerry-c-jones-director-appearance-dec-23-2003.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-jerry-c-jones-director-appearance-dec-23-2003.jpg\" alt=\"ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones. SEC Edgar. \" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 13\u2014<a title=\"ENTRUST, INC., 10-K. (Dec. 23, 2003). Annual Report, first appearance of new director Jerry C. Jones. SEC Edgar.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2003-12-23-ENTRUST-INC-10-K-Annual-Report-first-appearance-of-new-director-Jerry-C-Jones-SEC-Edgar-Dec-23-2003.pdf\">ENTRUST, INC., 10-K. (Dec. 23, 2003)<\/a>. Annual Report, first appearance of new director Jerry C. Jones, PDF page 33. SEC Edgar.<\/div>\n<\/div>\n<div><a title=\"ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/emtrust-director-jerry-c-jones-rose-law-firm-partner-mar-14-2004.jpg\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/emtrust-director-jerry-c-jones-rose-law-firm-partner-mar-14-2004.jpg\" alt=\"ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 14\u2014<a title=\"ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2004-03-15-ENTRUST-INC-10-K-Annual-Report-first-appearance-of-Jerry-C.-Jones-biography-disclosing-19-year-partner-of-Hillary-Clinton-in-the-Rose-Law-Firm-Little-Rock-AR-SEC-Edgar-Mar-15-2004.pdf\">ENTRUST, INC., 10-K. (Mar. 15, 2004)<\/a>. Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#entrust-appointed-jerry-c-jones-rose-law-firm\">On Mar. 11, 2009<\/a>, ENTRUST INC. issued its last 10-K annual report before selling its operation to Orlando Bravo, LLC and his Thoma Bravo private equity firm in San Francisco, CA. They disclosed that they had &#8220;more than 2,000 customers in 60 different countries.&#8221;<\/p>\n<div><a title=\"ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-09-13-ENTRUST-ENTU-10-K-1998-to-2009-Material-Disclosed-Customers-Partners-Directors-Officers-Dependents-Subsidiaries-SEC-Edgar-compiled-Sep-13-2018.pdf\"><img decoding=\"async\" src=\"http:\/\/www.fbcoverup.com\/docs\/library\/entrust-1998-2009-relationships-compilation.jpg\" alt=\"ENTRUST, INC., 10-K. (Mar. 15, 2004). Annual Report, first appearance of Jerry C. Jones biography disclosing 19-year partner of Hillary Clinton in the Rose Law Firm, Little Rock, AR. SEC Edgar.\" width=\"98%\" border=\"0\" \/><\/a><\/p>\n<div>FIG. 15\u2014<a title=\"ENTRUST 10-K. (1998-2009). Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. SEC Edgar. (Raw. *.xlsx spreadsheet file).\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-09-13-ENTRUST-ENTU-10-K-1998-to-2009-Material-Disclosed-Customers-Partners-Directors-Officers-Dependents-Subsidiaries-SEC-Edgar-compiled-Sep-13-2018.pdf\">ENTRUST 10-K. (1998-2009)<\/a>. Disclosed Material Relationships for Customers, Partners, Directors, Officers, Dependents, Subsidiaries, compiled Sep. 13, 2018. SEC Edgar. (<a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-09-13-ENTRUST-ENTU-10-K-1998-to-2009-Material-Disclosed-Customers-Partners-Directors-Officers-Dependents-Subsidiaries-SEC-Edgar-compiled-Sep-13-2018.xlsx\">Raw. *.xlsx spreadsheet file<\/a>).<\/div>\n<\/div>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2009-07-16-ENTRUST-INC-Form-DEFA14A-Entrust-Files-Investor-Presentation-Urges-Shareholders-to-Vote-FOR-Per-Share-Cash-Amended-Merger-Agreement-with-Thoma-Bravo-SEC-Edgar-Jul-16-2009.pdf\">On Jul. 16, 2009<\/a>, ENTRUST, INC. proposed to shareholders to sell to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA., which occurred on Aug. 07, 2009.<\/p>\n<p>CONCLUSIONS:<\/p>\n<p><strong>Conclusion #1:\u00a0<\/strong>Robert S. Mueller, III had an affirmative duty to disclose his approval of the contract for ENTRUST to manage the FBI&#8217;s 50,000 encryption keys in late 2003. The FBI itself has been scandalously compromised to Hillary Clinton and the Rose Law Firm ever since.<\/p>\n<p><strong>Conclusion #2:<\/strong>\u00a0ENTRUST&#8217;s planetary control of the encryption keys for &#8220;over 2000 customers in 60 different countries&#8221; means that any matter handled by their customers at the FBI, Department of State, NSA, Treasury, etc. is the fruit of a poisonous tree\u2014tainted by Clinton corruption.<\/p>\n<p><strong>Conclusion #3:\u00a0<\/strong>President Trump has enough evidence here to\u00a0<em>seize and prosecute<\/em>\u00a0the leaders of every government agency that has involved that agency, or induced other agencies to work with ENTRUST, without disclosing their\u00a0<em>total compromise<\/em>\u00a0to Hillary Clinton and her crime syndicate.<\/p>\n<p>Clearly, Hillary Clinton&#8217;s director surrogate at ENTRUST, INC., Jerry C. Jones (2003-2009), steered the development of the company&#8217;s control over encryption keys for the maximum benefit of his Clinton overlords.<\/p>\n<p>At a bare minimum, Mueller and the FBI leadership has had an ethical duty ever since Jerry C. Jones became an ENTRUST director to disclose his direct conflict of interest and compromise of FBI operations by Hillary Clinton, his mentor.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>HILLARY CLINTON CONTROLS 50,000 FBI ENCRYPTION KEYS\u2014PROVES MUELLER\u2019S WITCH HUNT IS TREASONOUS With these encryption keys, nothing in our digital lives is off limits to the Clinton&#8217;s and their conspirators President Trump\u2019s new executive order can be sabotaged with these &hellip; <a href=\"https:\/\/cosmicconvergence.org\/?p=27177\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":8,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-27177","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/27177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27177"}],"version-history":[{"count":0,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/27177\/revisions"}],"wp:attachment":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}