{"id":28452,"date":"2018-11-18T06:08:34","date_gmt":"2018-11-18T10:08:34","guid":{"rendered":"https:\/\/cosmicconvergence.org\/?p=28452"},"modified":"2018-11-18T06:08:34","modified_gmt":"2018-11-18T10:08:34","slug":"robert-mueller-muscling-hillary-clinton-for-encryption-keys","status":"publish","type":"post","link":"https:\/\/cosmicconvergence.org\/?p=28452","title":{"rendered":"ROBERT MUELLER MUSCLING HILLARY CLINTON FOR ENCRYPTION KEYS"},"content":{"rendered":"<p><!--more-->by AMERICAN INTELLIGENCE MEDIA<\/p>\n<div class=\"entry-featured entry-thumbnail\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-patch-single-image size-patch-single-image wp-post-image\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg?w=679\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg 679w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg?w=300 300w\" alt=\"\" width=\"679\" height=\"383\" data-attachment-id=\"62165\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/hillary-and-mueller\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg\" data-orig-size=\"679,383\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465809&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hillary and mueller\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/hillary-and-mueller.jpg?w=679\" \/><\/div>\n<div class=\"entry-content\">\n<p><span class=\"aligncenter\"><img decoding=\"async\" class=\" size-full wp-image-62127 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=980\" sizes=\"(max-width: 730px) 100vw, 730px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg 730w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=300 300w\" alt=\"mueller muscles\" data-attachment-id=\"62127\" data-permalink=\"http:\/\/aim4truth.org\/?attachment_id=62127\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=980\" data-orig-size=\"730,258\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542396407&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mueller muscles\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/mueller-muscles.jpg?w=980?w=730\" \/><img decoding=\"async\" class=\" size-full wp-image-62128 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=980\" sizes=\"(max-width: 716px) 100vw, 716px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg 716w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=300 300w\" alt=\"Meet sullivan\" data-attachment-id=\"62128\" data-permalink=\"http:\/\/aim4truth.org\/?attachment_id=62128\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=980\" data-orig-size=\"716,147\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542396447&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Meet sullivan\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/meet-sullivan.jpg?w=980?w=716\" \/><img decoding=\"async\" class=\" size-full wp-image-62129 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=980\" sizes=\"(max-width: 712px) 100vw, 712px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg 712w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=300 300w\" alt=\"sullivan 4\" data-attachment-id=\"62129\" data-permalink=\"http:\/\/aim4truth.org\/?attachment_id=62129\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=980\" data-orig-size=\"712,369\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542396489&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sullivan 4\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-4.jpg?w=980?w=712\" \/><\/span>.<\/p>\n<h3 class=\"post-title entry-title\"><strong>ROBERT MUELLER \u2013 THE ORGANIZER OF 911 \u2013 IS MUSCLING HILLARY TO BE THE MOB BOSS OF AN EMPIRE WITHOUT BORDERS OR MORALITY<\/strong><\/h3>\n<div class=\"post-header\"><\/div>\n<div id=\"post-body-4427734958641722064\" class=\"post-body entry-content\">\n<h3>Mueller placed his patsy Joseph E. Sullivan at Cloudflare to fix the 2018 midterm elections<\/h3>\n<h3>Sullivan is a shill for the Senior Executive Service (SES) shadow government controlled by Mueller<\/h3>\n<h3>Sullivan promotes \u201cpublic-private\u201d corporate fascism in Silicon Valley<\/h3>\n<h3>Sullivan tried to cover up the loss of 57 million Uber customer and driver personal data records, was fired, then rehired by Cloudflare that controls FL, OH election encryption keys.<\/h3>\n<p>.<\/p>\n<p>(Nov. 16, 2018)\u2014New facts suggest that special counsel Robert S. Mueller, III who is running the Trump witch hunt, is also muscling in on the Clinton encryption key tax and surveillance empire.<\/p>\n<p>Their war cry appears to be: \u201cTax and Surveil<em>!<\/em>\u201d Ask yourself, if controlling these encryption keys is so central to the mission of the Deep State shadow government and their theft of our Constitutional Republic birthright, shouldn\u2019t\u00a0<em>you<\/em>\u00a0be resisting them with all your strength? We posit that if you are not\u2014if you are silent, or worse, if you scoff at those who are fighting, while mindlessly repeating the \u201cconspiracy theory!\u201d epithet*\u2014then that is your first clue that\u00a0<em>you<\/em>\u00a0have been successfully brainwashed and neutralized by incessant mainstream media propaganda\u2014which these miscreants control.<\/p>\n<p>* The \u201cconspiracy theory\u201d epithet is a\u00a0<em>propaganda mind-control<\/em>creation of the John F. Dulles-led C.I.A. MKUltra program as a way to divert public attention from the\u00a0<em>now proven<\/em>\u00a0suspicions that President John F. Kennedy had been assassinated by the C.I.A. President Kennedy had said in 1961:\u00a0<strong>\u201cI will splinter the CIA into a thousand pieces and scatter it into the winds\u201d<\/strong>\u00a0due to their corruption and insubordination. That same C.I.A. protected its power mongering and murdered our duly-elected President. They have never stepped away from their criminality since.<\/p>\n<p>Now, that same rogue C.I.A. is working to remove another duly-elected President Donald J. Trump\u2014unless we stop them. If we do not protect and defend President Trump, then we do not deserve our Constitutional Republic, and our hard fought sacrifices of time, treasure and life will all be lost. Get off your duffs folks. Take the Red Pill and protect your American heritage! She\u2019s not perfect, but at least we can strive. Close your ears to the mind-control propaganda, President Trump supports America\u2019s ideals, unlike his fascist globalist opponents.\u00a0<em>See<\/em>\u00a0previous post\u00a0<em><a title=\"AFI. (May 09, 2017). Dismantle the rogue C.I.A. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2017\/05\/jfk-dismantle-rogue-cia.html\">Dismantle the rogue C.I.A.<\/a><\/em>\u00a0(<a title=\"AFI. (May 09, 2017). Dismantle the rogue C.I.A. Americans for Innovation.\" href=\"http:\/\/www.fbcoverup.com\/docs\/afi\/2017-05-09-JFK-DISMANTLE-THE-ROGUE-CIA-Americans-for-Innovation-May-09-2017.pdf\">PDF<\/a>).<\/p>\n<p>Traditional mobsters control big city garbage, prostitution, loans, drugs, haulage and so on. They either actually run the business, or shake down enterprises for monthly \u201cprotection\u201d payments.<\/p>\n<p>According to\u00a0<a title=\"The Clinton Chronicles (1994). &quot;The hijacking of America.&quot; The Clinton Corruption Machine expanded to Washington, D.C. from its Arkansas roots to take over the Internet while hiding behind national security as the excuse for secrecy, money laundering, crony enrichment and stonewalling.\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#clinton-chronicles\">Larry Nichols<\/a>\u00a0(Jul. 28, 1994 timeline entry), Bill Clinton\u2019s former political advisor in Arkansas and for President, Hillary\u2019s father Hugh Rodham and Dan Rostenkowski took over the Chicago mob after Al Capone. Later, Rosentkowski became the Democrat representative to Congress from the Illinois 5th district (1959 to 1995). In short, these men learned how to turn corruption into political power\u2014without going to jail.<\/p>\n<p>Hugh Rodham encouraged his daughter to become a patent attorney. He told her to corner the market on emerging technologies, which she has done.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_62156\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62156\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=980\" sizes=\"(max-width: 693px) 100vw, 693px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg 693w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=300 300w\" alt=\"Joseph Sullivan chart\" data-attachment-id=\"62156\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/joseph-sullivan-chart\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=980\" data-orig-size=\"693,645\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542464529&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Joseph Sullivan chart\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/joseph-sullivan-chart.jpg?w=980?w=693\" \/><figcaption class=\"wp-caption-text\"><a title=\"Joseph Edwin Sullivan. (Prepared Nov. 09, 2018). Biography and Timeline. Anonymous Patriots.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-09-Joe-Sullivan-Biography-Timeline-prepared-Nov-09-2018.pdf\">Joseph Edwin Sullivan. (Prepared Nov. 09, 2018)<\/a>. Biography and Timeline. Anonymous Patriots.<\/figcaption><\/figure>\n<p><strong>[Note to reader: Make sure to\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-09-Joe-Sullivan-Biography-Timeline-prepared-Nov-09-2018.pdf\">open the 28 page document<\/a>from the link in the image above to see hundreds of supporting links \u2013 huge intel dump.]<\/strong><\/p>\n<p>In Feb. 1977, Hillary joined the Rose Law Firm in Little Rock, Arkansas, and eventually seized control of a client\u2019s promising invention, a quarter-sized quartz device called the\u00a0<a title=\"AFI. (Jan. 11, 2018). Meet The Person Who Can Remotely Crash Planes And Can Your Mind. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/01\/meet-geek-who-can-remotely-crash-planes.html\">QRS-11<\/a>that could be used to track planes, cars, trucks, trains, buses, and more generally anything in which it was embedded.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-46857 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg?w=225&amp;h=292\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg 179w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg?w=116&amp;h=150 116w\" alt=\"James P Chandler\" width=\"225\" height=\"292\" data-attachment-id=\"46857\" data-permalink=\"http:\/\/aim4truth.org\/james-p-chandler-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg?w=225&amp;h=292\" data-orig-size=\"179,232\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"James P Chandler\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg?w=225&amp;h=292?w=179\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/11\/james-p-chandler.jpg?w=225&amp;h=292?w=179\" \/>Hillary\u2019s legal mentor was a clever black Harvard and George Washington University law professor named James P. Chandler, III. While he coached Bill and Hillary, Chandler was scheming to corner the legal market on protection of software inventions, trade secrets and \u201cthe intellectual property of the United States.\u201d So he boasted at every opportunity.<\/p>\n<p>When the Clintons came to power in 1993, Chandler became their top outside advisor for intellectual property, patents, trademarks, copyrights, trade secrets, economic espionage, counterfeiting and counter intelligence. He immediately wrote and Congress approved (unanimously)\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#economic-espionage-act\">The Economic Espionage and Federal Trade Secrets Acts of 1996<\/a>, and\u00a0<a title=\"The False Statements Accountability Act of 1996\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#false-statements-act\">The False Statements Accountability Act of 1996<\/a>\u00a0(officially sanctioned lying to Congress and the courts, that\u2019s right, you did not misread).<\/p>\n<p>One of Chandler\u2019s strategies was to use his influence over the Clintons to take over the Internet as a way to stay perpetually ahead of Russian, Chinese, Japanese, Israeli, Irish, Indian and French intelligence. So he also boasted.<\/p>\n<p>At the same time, Chandler was outside counsel to IBM. He worked closely with IBM inside intellectual property counsel, David J. Kappos (Obama\u2019s Patent Office director \u2013 2009-2013), to muscle IBM\u2019s competitors with \u201cjunk patents\u201d to extort license fees. This activity was the real \u201cpatent troll\u201d which Chandler and Kappos have flipped 180 degrees into unfounded media attacks on small inventors as the trolls.<\/p>\n<h2>THE WEAPONIZATION OF SOCIAL NETWORKING<\/h2>\n<p>IBM was all the while standing behind Chandler\u2019s plan to weaponize the Internet. See our previous post:\u00a0<a title=\"AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2017\/11\/the-weaponization-of-social-media.html\"><em>The Weaponization of Social Media Should Concern Us All<\/em><\/a>\u00a0(<a title=\"AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.\" href=\"http:\/\/www.fbcoverup.com\/docs\/afi\/2017-11-22-THE-WEAPONIZATION-OF-SOCIAL-MEDIA-SHOULD-CONCERN-US-ALL-Americans-for-Innovation-Nov-22-2017.pdf\">PDF<\/a>).<\/p>\n<p>Within months of Clinton coming to power, Chandler arranged for the\u00a0<a title=\"On Jun. 07, 1993, Clinton, Bush, Obama consiglieri James P. Chandler III and Chief of Staff John D. Podesta, via the Carnegie Endowment for International Peace, sponsored the &quot;Third CPSR Cryptography and Privacy Conference&quot; to gather intelligence with the objective: 'to require that telecommunications manufacturers and service providers redesign their systems to facilitate wiretapping.'\" href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#crypto-treason\">Carnegie Endowment for Peace<\/a>, Clinton chief of staff John Podesta, and a raft of DOJ insiders, including Robert Mueller, James Comey, Duval Patrick and Louis Freeh to hold a\u00a0<em>Who\u2019s Who<\/em>\u00a0conference to promote giving the FBI backdoor encryption access to the emerging commercial Internet, which was in its infancy then. That \u201cClipper Chip\u201d died in Congress over privacy concerns and inadequate safeguards.<\/p>\n<p>Undeterred, Chandler and his FBI\/DOJ co-conspirators turned to the Departments of Commerce and Justice to concoct an export license requirement to embed the backdoor key as a prerequisite for sale of their hardware, software and firmware offshore. The list of vendors who embed the NSA\u00a0<a title=\"AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans For Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2015\/11\/complicit-encryption-geeks-enable.html\">Dual_EC_DRBG<\/a>\u00a0encryption algorithm to this day is even published.<\/p>\n<h2>AMERICAN-STYLE FASCISM WAS PERFECTED UNDER CLINTON RULE<\/h2>\n<p>The Clinton-Chandler-Podesta-Mueller scheme to bypass Congress on encryption backdoors as well as all other technology and Internet policy was hatched.<\/p>\n<p>The Clintons began focusing on: (1) Chandler-drafted executive orders, (2) some changes to laws triggered by totally staged \u201cterror\u201d threats, (3) compliant agency Senior Executive Service (SES) appointments, and (4) cooperation from the private sector in exchange for no-bid contracts. In short, American-style fascism.<\/p>\n<h2>HIGH TECH MOBSTERISM<\/h2>\n<p>In keeping with the age-old maxim of \u201cfollow the money,\u201c the real money being made in \u201cBig Data\u201d is through secret taxes on the encryption keys and the sale of information.<\/p>\n<p>Prior to social networking however, these Clinton mobsters experimented with various forms of control and revenue, but their systems suffered from data \u201csilos.\u201d Large volumes of data were system specific and not easily transportable across systems. Any ability to tax these transactions was fraught with too many technology and policy hurdles to implement it globally.<\/p>\n<p>These mobsters yearned for a way to collect a private, non-governmental tax on each Internet transaction. They also wanted a universal way to spy on people at will.<\/p>\n<p>The answer to their evil prayers came on a day in Jan. 2000 when James P. Chandler, III was introduced to Columbus entrepreneur, engineer and inventor Michael T. McKibben. McKibben and his team, in total secrecy, had invented a way to overcome the silo problem and make the Internet scalable.<\/p>\n<p>McKibben knew what he was doing engineering-wise and organizationally. He was an accomplished organizational development consultant and a leadership and management author. In the early 1990\u2019s he had rebuilt AT&amp;T\u2019s main email system AT&amp;T AccessPlus 3.0 in time for release with Windows 95 as well as designed a number of personal information managers.<\/p>\n<h2>SOCIAL NETWORKING SCALABILITY OPENED THE DOOR TO ONE ENCRYPTION KEY PER PERSON, THUS THE ABILITY TO TRACK AND TAX EVERYTHING<\/h2>\n<p>Hindsight being 20-20, we now see that Chandler, Clinton, Mueller, etc. decided to steal McKibben\u2019s invention (illegal) for infinite Internet scalability, inserted IBM copyrights (illegal), declared it \u201copen source\u201d (illegal), then distributed it free almost overnight to Silicon Valley (illegal) to build the \u201cIBM Internet of Things (IoT),\u201d and thus control universal back end access (illegal) to all the code they had given away. That\u2019s right, the entire IoT industry is one mammoth fraud, built on theft, lies, and more lies.<\/p>\n<p>With McKibben\u2019s social networking invention in mind, they also reconfigured their approach to \u201cPublic Key Infrastructure\u201d (PKI),\u00a0<a title=\"Certificate Authorities ILLUSTRATION. (Accessed Nov. 17, 2018). Federal Public Key Infrastructure Guides. CIO.gov, Idmanagement.gov, GSA.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-17-Certificate-Authorities-ILLUSTRATION-Federal-Public-Key-Infrastructure-Guides-CIO-gov-Idmanagement-gov-GSA-accessed-Nov-17-2018.pdf#page=6\">government documents<\/a>\u00a0(p. 6) describe (ref. \u201c<em>late 90\u2019s<\/em>\u201d [when Chandler met McKibben and Leader Technologies] and \u201c<em>Prior to 200<\/em>4\u2033 [when IBM launched EclipseCon 2004, Feb. 02-05, 2004, and they launched Facebook, Feb. 04, 2002]).<\/p>\n<p>They also devised a\u00a0<em>convoluted<\/em>\u00a0licensing system that only an unscrupulous lawyer could love whereby \u201ctrusted\u201d private companies would maintain not only the public keys used by websites, but also a copy of people\u2019s private keys, ostensibly for disaster recovery convenience.\u00a0<em>See<\/em>\u00a0<a title=\"Certificate Authorities\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/11\/robert-mueller-organizer-of-911-is.html#certificate-authorities\">Fig. 8<\/a>.<\/p>\n<h2>TRUST (NOT)<\/h2>\n<p>These selected PKI Certificate Authorities plaster their cheeky ad words on all their PR. These words include: trust, high standards, security, integrity, verified, trustworthy, assurance, certified, protect, reliable, secure, quality and veritas (Latin: truth). They have proven through focus groups that 99.5% of the public believes their excrement about \u201ctrust\u201d and lets them get away with their criminality.<\/p>\n<blockquote><p><strong>MORAL:<\/strong>\u00a0WHENEVER \u201cPUBLIC-PRIVATE\u201d FASCIST CAPITALISTS USE WORDS LIKE \u201cTRUST,\u201d RUN.<\/p><\/blockquote>\n<h2>SEVERAL TYPES OF ENCRYPTION KEYS THAT USE PKI<\/h2>\n<p>In lay terms, the basic idea behind PKI is that you need to marry up a\u00a0<em>public key<\/em>\u00a0for your recipient\u2019s website with your\u00a0<em>private key<\/em>. Those married keys are then used to encrypt your transmission. Its like you need two keys, not one, to open your front door.<\/p>\n<p>Then, instead of sending your message through the Internet for anyone to read, your transmission is scrambled while it is on the move. See Fig. 3 below. This type of encryption occurs automatically, presuming each side has\u00a0<em>purchased<\/em>\u00a0their essentially government-mandated Certificate Authority (Hint: Herein is the\u00a0<em>universal tax on all Internet transactions<\/em>\u2014run by\u00a0<em>private<\/em>\u00a0corporations controlled by Hillary et al. Want in on this action? No! Deplorables need not apply.)<\/p>\n<p>This purchase is Hillary\u2019s dirty little secret for how she taxes the Internet and makes money from each and every transaction all around the planet.<\/p>\n<figure id=\"attachment_62157\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62157\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=980\" sizes=\"(max-width: 686px) 100vw, 686px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg 686w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=300 300w\" alt=\"how to encrypt file\" data-attachment-id=\"62157\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/how-to-encrypt-file\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=980\" data-orig-size=\"686,227\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542464807&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"how to encrypt file\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/how-to-encrypt-file.jpg?w=980?w=686\" \/><figcaption class=\"wp-caption-text\">Illustration of unencrypted (plain text) and encrypted data<\/figcaption><\/figure>\n<p>Another use of public and private keys is encrypting files and messages. Both sender and recipient share their public key and each creates a private key. The public key is generally kept on a PKI server. The dirty secret here is that these servers also use various ways to sniff and store your private key without your knowledge. In addition, many if not most of the applications that encrypt and decrypt using this method contain the\u00a0<a title=\"AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans For Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2015\/11\/complicit-encryption-geeks-enable.html\">NSA Dual_EC_DRBG<\/a>\u00a0algorithm that enables snoopers to decrypt anything without\u00a0<em>any<\/em>\u00a0keys, public or private.<\/p>\n<h2>MUELLER IS MUSCLING HILLARY FOR ENCRYPTION KEY TURF<\/h2>\n<p>Over the last thirty years, the encryption key turf was controlled by Hillary and her mentor Chandler. They let the DOJ and FBI play through corruptocrats like Robert S. Mueller, III and James B. Comey, among others.<\/p>\n<p>However, it now appears that Mueller and Chandler quietly recruited Joseph Edmund Sullivan, son of a C.I.A. agent, as the mole to do their dirty work.<\/p>\n<p>Sullivan\u2019s mother, Winona Cecile Sullivan nee Yahn, was a C.I.A. agent focused on the Russian spying (1965-67) . She studied Russian at the University of Leningrad, then applied to the C.I.A. to be a spy. Being pleasing to the eye, one needs no imagination to know what she did. The trade craft of deception was well-honed among the Sullivans. Joseph claims he had no knowledge of his mother\u2019s spying, but given his career as a spy himself, this assertion is not credible. And, as we now see, these SES spies like to pass on their insider knowledge to their offspring.<\/p>\n<p>From 1992 to 2002, Sullivan worked for the DOJ and specifically for Chandler and Mueller as Assistant U.S. Attorney (AUSA) in Miami, Las Vegas and San Francisco. He only prosecuted 41 cases in total during his work as AUSA. He bragged at his House Judiciary hearing on Jul. 28, 2010 that he was a founding member of the DOJ Computer Hacking and Intellectual Property Unit, despite scant few cases on that subject. Ironically, that was the very same day that Leader proved in\u00a0<em>Leader v. Facebook<\/em>\u00a0that Facebook was infringing Leader Technologies\u2019 social networking patent on 11 of 11 claims. Sullivan failed to disclose this to Congress. He also failed to disclose Hillary\u2019s secret contract for Facebook to build an election winning template. He also failed to disclose his relationship with Leader\u2019s patent attorney Chandler, thus being engaged in tampering with a witness.<\/p>\n<p>This Mueller Cyber Crime Unit appears to have been a ruse to cover up Mueller\u2019s work to horn in on the Clinton\u2019s money making from taking fees for digital encryption Certificate Authority keys. It appears that the real cyber criminals were Mueller, Chandler and Sullivan.<\/p>\n<p><strong>Here\u2019s proof that Sullivan and Mueller collaborated closely.<\/strong><\/p>\n<figure id=\"attachment_62158\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62158\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=980\" sizes=\"(max-width: 684px) 100vw, 684px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg 684w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=300 300w\" alt=\"sullivan screen shot 1\" data-attachment-id=\"62158\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/sullivan-screen-shot-1\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=980\" data-orig-size=\"684,333\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542464956&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sullivan screen shot 1\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-1.jpg?w=980?w=684\" \/><figcaption class=\"wp-caption-text\"><em><a title=\"US v. Avalar, et al, 5:01-cr-20069-JW-1 filed jointly between Robert S. Mueller, III, US Attorney and Joseph E. Sullivan, Assistant US Attorny (CAND filed Apr. 26, 2001).\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2001-04-26-DOCKET-accessed-Nov-09-2018-USA-v-Avalar-et-al-01-cr-20069-JW-3-CAND-filed-Apr-26-2001.pdf\">US v. Avalar, et al<\/a><\/em>, 5:01-cr-20069-JW-1 filed jointly between Robert S. Mueller, III, US Attorney and Joseph E. Sullivan, Assistant US Attorney (CAND filed Apr. 26, 2001).<\/figcaption><\/figure>\n<p><strong>Here\u2019s further proof that Mueller was Sullivan\u2019 mentor:<\/strong><\/p>\n<figure id=\"attachment_62160\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62160\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=980\" sizes=\"(max-width: 694px) 100vw, 694px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg 694w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=300 300w\" alt=\"sullivan screen shot 2.JPG\" data-attachment-id=\"62160\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/sullivan-screen-shot-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=980\" data-orig-size=\"694,169\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465025&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sullivan screen shot 2\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/sullivan-screen-shot-2.jpg?w=980?w=694\" \/><figcaption class=\"wp-caption-text\"><a title=\"Joseph E. Sullivan. (Jul. 28, 2010). Chief Security Officer for Facebook testimony before the U.S. House of Representatives Committee on the Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security, hearing on Online Privacy, Social Networking, and Crime Victimization. U.S. House of Representatives.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2010-07-28-Joseph-E-Sullivan-Chief-Security-Officer-for-Facebook-Congressional-Testimony-House-Judiciary-Committee-US-Congress-Jul-28-2010.pdf\">Joseph E. Sullivan. (Jul. 28, 2010)<\/a>. Chief Security Officer for Facebook testimony before the U.S. House of Representatives Committee on the Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security, hearing on Online Privacy, Social Networking, and Crime Victimization. U.S. House of Representatives.<\/figcaption><\/figure>\n<h3>Here is proof that Chandler and Sullivan worked together. This case could only have been prosecuted with Chandler\u2019s approval since it is notoriously known in Washington, D.C. that the U.S. Department of Justice was required to permit Chandler to oversee the prosecutions of his newly minted Federal Trade Secrets Act of 1986 19 USC 1832 for ten (10) years.<\/h3>\n<figure id=\"attachment_62161\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62161\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=980\" sizes=\"(max-width: 687px) 100vw, 687px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg 687w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=300 300w\" alt=\"theft of trade secrets sullivan\" data-attachment-id=\"62161\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/theft-of-trade-secrets-sullivan\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=980\" data-orig-size=\"687,390\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465121&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"theft of trade secrets sullivan\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/theft-of-trade-secrets-sullivan.jpg?w=980?w=687\" \/><figcaption class=\"wp-caption-text\"><em><a title=\"US v. Wang, et al, 5:01-cr-20065-JF-1, Joseph E. Sullivan, AUSA with James P. Chandler, III (CAND filed Aug. 24, 2000).\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2001-04-19-DOCKET-accessed-Nov-10-2018-USA-v-Wang-et-al-01-cr-20065-JF-2-CAND-filed-Apr-19-2001.pdf\">US v. Wang, et al<\/a><\/em>, 5:01-cr-20065-JF-1, Joseph E. Sullivan, AUSA with James P. Chandler, III (CAND filed Aug. 24, 2000).<\/figcaption><\/figure>\n<h2>SULLIVAN\u2019S MOVE FROM DOJ\/FBI TO SILICON VALLEY HAS BEEN TRULY MAGICAL<\/h2>\n<p>Sullivan was then placed as the top legal and security officer and advisor at Ebay, PayPal, Skype, Facebook, RiskIQ, U.S. Cyber Alliance, Bluecava (Mark Cuban), Airbnb, GURUCUL, Obama\u2019s Presidential Commission on Enhancing National Cybersecurity (read: get Hillary elected), Uber and now Cloudflare.<\/p>\n<p>After eBay, Sullivan bought two homes in Silicon Valley in 2006 worth $5 million\u2014a remarkable achievement for a guy who had made $130,000 per year as an assistant U.S. attorney.<\/p>\n<p>Remarkably, Sullivan was hired as chief security officer at Cloudflare despite his epic loss of 57 user and driver records at Uber and his attempt to cover it up six months earlier. That got him fired at Uber. Of course, normally that might have been a career-ending\u00a0<em>faux pas<\/em>, but not for Mueller\u2019s and Chandler\u2019s flunky.<\/p>\n<h2>CLOUDFLARE HIRED TAINTED GOODS\u2014EVIDENTLY BECAUSE MUELLER DIRECTED IT<\/h2>\n<p>Evidently, Mueller placed his errand boy Sullivan at Cloudflare, but for what purpose?<\/p>\n<p>A quick review of Cloudflare\u2019s owners is one clue to Mueller\u2019s thinking. It is the same list of shadow government crony corporate beneficiaries like Pelion Ventures, Venrock, NEA (New Enterprise Associates), Union Square Ventures, Greenspring Associates, Fidelity Investments, Google Capital, Microsoft, Qualcomm and Baidu (China).<\/p>\n<p>The specter of foreign interference in U.S. elections is evident given Baidu (China)\u2019s substantial ownership stake in Cloudflare. Also, given Google\u2019s now hostile activity in supporting totalitarian regimes in China and Venezuela, and their support of Project Dragonfly and the heinous \u201csocial credit score\u201d in China, the risk to free and fair US elections is doubly evident.<\/p>\n<blockquote><p>WHEN ONE ADDS THE FACT THAT MUELLER\u2019S RUSSIA PROBE IS A WITCH HUNT THAT IS DEBILITATING OUR GOVERNMENT, HAS HE EXPOSED OUR AMERICAN ELECTIONS TO CHINESE INFLUENCE USING CLOUDFLARE? HAS MUELLER NOT NOW BECOME AN ENEMY OF THE STATE?<\/p><\/blockquote>\n<figure id=\"attachment_62162\" class=\"wp-caption aligncenter\" data-shortcode=\"caption\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-62162\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=616&amp;h=511\" sizes=\"auto, (max-width: 616px) 100vw, 616px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=616&amp;h=511 616w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=150&amp;h=124 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=300&amp;h=249 300w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg 695w\" alt=\"cloudfare screen shot 1.JPG\" width=\"616\" height=\"511\" data-attachment-id=\"62162\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/cloudfare-screen-shot-1\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=616&amp;h=511\" data-orig-size=\"695,576\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465213&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cloudfare screen shot 1\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=616&amp;h=511?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-1.jpg?w=616&amp;h=511?w=695\" \/><figcaption class=\"wp-caption-text\"><a title=\"Anonymous Patriots. (Prepared Nov. 09, 2018). OHIO - State Election Encryption Authorities, by State, p. 71-72. MX Toolbox.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-06-State-Election-Encryption-Certificate-Authorities-by-State-accessed-Oct-06-2018.pdf#page=72\">Anonymous Patriots. (Prepared Nov. 09, 2018)<\/a>. OHIO \u2013 State Election Encryption Authorities, by State, p. 71-72. MX Toolbox.<\/figcaption><\/figure>\n<figure id=\"attachment_62163\" class=\"wp-caption aligncenter\" data-shortcode=\"caption\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-62163 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=575&amp;h=482\" sizes=\"auto, (max-width: 575px) 100vw, 575px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=575&amp;h=482 575w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=150&amp;h=126 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=300&amp;h=251 300w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg 685w\" alt=\"cloudfare screen shot 2\" width=\"575\" height=\"482\" data-attachment-id=\"62163\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/cloudfare-screen-shot-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=575&amp;h=482\" data-orig-size=\"685,574\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465272&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cloudfare screen shot 2\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=575&amp;h=482?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/cloudfare-screen-shot-2.jpg?w=575&amp;h=482?w=685\" \/><figcaption class=\"wp-caption-text\"><a title=\"Anonymous Patriots. (Prepared Nov. 09, 2018). FLORIDA - State Election Encryption Authorities, by State, p. 24-25. MX Toolbox.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-06-State-Election-Encryption-Certificate-Authorities-by-State-accessed-Oct-06-2018.pdf#page=25\">Anonymous Patriots. (Prepared Nov. 09, 2018)<\/a>. FLORIDA \u2013 State Election Encryption Authorities, by State, p. 24-25. MX Toolbox.<em>.<\/em><\/figcaption><\/figure>\n<h2>MUELLER INFILTRATED CLOUDFLARE VIA SULLIVAN TO GET ACCESS TO SWING STATE ELECTION ENCRYPTION KEYS<\/h2>\n<p>Given how quickly Cloudflare and Mueller muscled in on Hillary\u2019s Certificate Authority turf, we are observing an evident mob turf war for control of all Certificate Authority taxing and encryption keys.<\/p>\n<p>When one considers that Hillary and her 19-year law partner Jerry C. Jones sold ENTRUST to placate Michael Chertoff on Dec. 17, 2013, the specter of a full-on mob turf war seems likely. With the ENTRUST purchase, Chertoff bought Certificate Authority in at least Colorado, Oklahoma, Pennsylvania, South Dakota and Wyoming.<\/p>\n<p>The difference between Chertoff and Mueller is that Chertoff appears to be a soy boy who is satisfied with his little piece of the pie.<\/p>\n<blockquote>\n<h3>ROBERT MUELLER: \u2018OLE MULE FACE DREAMS HE IS KING OF THE WORLD! (HE THINKS QUEEN HILLARY SCREWED UP HER ENCRYPTION KEYS IN 2016)<\/h3>\n<\/blockquote>\n<p>Mueller, on the other hand, wants to be king maker.<\/p>\n<p>In the process of giving Michael Chertoff some of the encryption action, Hillary and Jerry C. Jones\u00a0<em>shifted<\/em>\u00a0their Certificate Authority business by purchasing DigiCert, which controls the encryption keys in the following state election systems: Connecticut, Illinois, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Nevada, North Carolina, Ohio (Cloudflare-DigitCert), Oregon, South Carolina, Tennessee, Vermont, Virginia, Washington, West Virginia, Wisconsin<\/p>\n<p>By grabbing encryption keys in Ohio and Florida, Mueller is challenging Hillary\u2019s turf.<\/p>\n<h2>ARE MUELLER\u2019S WHEELS FLYING OFF? WE HOPE SO.<\/h2>\n<p>As an illegitimate special counsel, Mueller is attempting to unseat a duly elected President Donald J. Trump.<\/p>\n<p>Mueller has overstepped his special counsel authority by conducting a political witch hunt against his effective enemies including Paul Manafort, Roger Stone, Julian Assange, among others.<\/p>\n<p>Mueller and Chertoff evidently organized the events of 911 to remove the Constitutional blocks to their SES shadow government takeover of our Constitutional Republic.<\/p>\n<p>Mueller has persecuted dozens of FBI and CIA whistle blowers.<\/p>\n<p>It is strongly believed that Mueller had his former FBI agent Whitey Bulger assassinate recently just before he was preparing to testify about Mueller.<\/p>\n<p>Mueller clearly wants a piece of the Certificate Authority taxing and mass surveillance encryption system that Clintons currently control.<\/p>\n<p>Maybe he wants more.<\/p>\n<p>Maybe he wants to be the King Mob Boss<\/p>\n<p>The Clintons are now in his way.<\/p>\n<h1><strong>CALL TO ACTION:<\/strong><\/h1>\n<p>President Trump can immediately direct his\u00a0<a title=\"Federal Public Key Infrastructure Policy Authority (FPKIPA).\" href=\"http:\/\/www.idmanagement.gov\/fpkipa\/\">Federal Public Key Infrastructure Policy Authority (FPKIPA)<\/a>\u00a0to\u00a0<em>revoke<\/em>\u00a0any and all Certificate Authorities that are engaged in supporting treasonous or seditious activity against the United States. This is a matter of grave national security that falls under the rubric of recent State of Emergency Executive Orders.<\/p>\n<p>Specifically, any certificate authorities associated directly or through surrogates with Robert S. Mueller, III, James P. Chandler, III, James B. Comey, Michael Chertoff, Bill &amp; Hillary Clinton, Jerry C. Jones, Joseph E. Sullivan, Orlando Bravo should be revoked immediately.<\/p>\n<p>Regarding foreign election meddling, any Certificate Authority currently providing services to the\u00a0<strong>state boards of elections<\/strong>that maintain encryption keys offshore should be immediately revoked.<\/p>\n<p>As a part of this review, the President should evaluate the qualifications and loyalties of the members of the\u00a0<a title=\"Federal Public Key Infrastructure Policy Authority (FPKIPA).\" href=\"http:\/\/www.idmanagement.gov\/fpkipa\/\">Federal Public Key Infrastructure Policy Authority (FPKIPA)<\/a>\u00a0which is comprised of members \u201cappointed by each federal agency\u2019s CIO, and the group operates under the authority of the Federal CIO Council.\u201d<\/p>\n<p>It appears that many, if not all, of these chief information officers are stay-behind corruptocrat\u00a0<a title=\"AFI. (Mar. 16, 2018). Obama hired them. Trump cannot fire them. So they say. Americans for Innovation.\" href=\"http:\/\/americans4innovation.blogspot.com\/2018\/03\/obama-hired-them-trump-cannot-fire-them.html\">Senior Executive Service (SES)<\/a>\u00a0members who are not loyal to our duly elected President Donald J. Trump. If he cannot fire them due to the convoluted and self-serving SES policies, then he should invoke the Holman Rule and reduce their salaries and benefits to $1.<\/p>\n<p><a id=\"certificate-authorities\" name=\"certificate-authorities-gsa\"><\/a>Bookmark: #certificate-authorities |\u00a0<a title=\"Certificate Authorities ILLUSTRATION. (Accessed Nov. 17, 2018). Federal Public Key Infrastructure Guides. CIO.gov, Idmanagement.gov, GSA.\" href=\"http:\/\/tinyurl.com\/ycolj834\">http:\/\/tinyurl.com\/ycolj834<\/a><\/p>\n<figure id=\"attachment_62164\" class=\"wp-caption alignnone\" data-shortcode=\"caption\"><img decoding=\"async\" class=\"alignnone size-full wp-image-62164\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=980\" sizes=\"(max-width: 687px) 100vw, 687px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg 687w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=300 300w\" alt=\"certificate authorities\" data-attachment-id=\"62164\" data-permalink=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/certificate-authorities\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=980\" data-orig-size=\"687,610\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Tyla Wells&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1542465391&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"certificate authorities\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2018\/11\/certificate-authorities.jpg?w=980?w=687\" \/><figcaption class=\"wp-caption-text\"><a title=\"Certificate Authorities ILLUSTRATION. (Accessed Nov. 17, 2018). Federal Public Key Infrastructure Guides. CIO.gov, Idmanagement.gov, GSA.\" href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2018-11-17-Certificate-Authorities-ILLUSTRATION-Federal-Public-Key-Infrastructure-Guides-CIO-gov-Idmanagement-gov-GSA-accessed-Nov-17-2018.pdf\">Certificate Authorities ILLUSTRATION. (Accessed Nov. 17, 2018)<\/a>. Federal Public Key Infrastructure Guides. CIO.gov, Idmanagement.gov, GSA.\u00a0<em>See<\/em>\u00a0also GSA.<a title=\"Federal Public Key Infrastructure Guides\" href=\"http:\/\/fpki.idmanagement.gov\/ca\/\">http:\/\/fpki.idmanagement.gov\/ca\/<\/a>\u00a0and\u00a0<a title=\"Federal Public Key Infrastructure Policy Authority (FPKIPA).\" href=\"http:\/\/www.idmanagement.gov\/fpkipa\/\">http:\/\/www.idmanagement.gov\/fpkipa\/<\/a><\/figcaption><\/figure>\n<p>Share this with your circle of influence:\u00a0<a href=\"http:\/\/tinyurl.com\/y8cz4s8d\">http:\/\/tinyurl.com\/y8cz4s8d<\/a><\/p>\n<p>___<br \/>\n<a href=\"http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/\">http:\/\/aim4truth.org\/2018\/11\/17\/robert-mueller-muscling-hillary-clinton-for-encryption-keys\/<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-28452","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/28452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28452"}],"version-history":[{"count":0,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/28452\/revisions"}],"wp:attachment":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}