Category: Espionage

Shocking Twin Tower Photos Released

After you view these shocking photos below of the Twin Tower crime scene, you will want to know what really happened on 9-11. Our citizen intelligence report gives you 9-11 truth, not U.S. government sanctioned propaganda.

Treason: Who Terrorized Americans and the World on 9-11?

911 PHOTOS NEVER PUBLISHED BY FAKE NEWS MEDIA

TRUTH NEVER TOLD BY GOVERNMENT OFFICIALS

TREASON COMMITTED BY US CITIZENS

ESPIONAGE BY FOREIGN ACTORS

Shocking Twin Tower pictures. Never seen before.

Trump tweets treason

.

The British Black Chamber

G.C.C.S & GCHQ are a “cover-up” for “the pooled British Black Chamber under the Foreign Office.” The British Foreign & Commonwealth Office (FCO, FO) runs ALL global intelligence Lord Mark-Malloch Brown (George Soros’: Int’l Crisis Grp, Refugees Int’l, Open Society Fndn, Quantum Fund, Soros Fund) ran FCO 2007-2009 and employed Sir Nigel Kim Darroch, British Amb. to US until Jul. 09, 2019

War Department General Staff. (Sep. 09, 1940). G-2 Covering Interchange of Secret Technical Information with Representatives of British Government, PDF pp. 31. NSA.

https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/ukusa/early_papers_1940-1944.pdf#page=31

https://www.fbcoverup.com/docs/library/1940-09-09-War-Dept-General-Staff-1940-1944-G2-Covering-Intrchnge-of-Secret-Tech-Info-with-Reps-of-Brit-Govt-PDF-pp-20-22-NSA-Sep-09-1940.pdf#page=31

British Black Chamber.JPG

transcription british black chamber.JPG

.

F.B.I. and the “pooled British Black Chamber” MI-6/MI-5/SOE/GCCS/GCHQ spies under the Foreign Office have had “close liaison” since before 1942

G.C. Marshall. (Sep. 11, 1940). SECRET, APPROVED, Sec. of War, Chief of Staff. MEMO: Directive to G-2 Covering Interchange of Secret Technical Information with Representatives of British Government, NSA declassified 04-08-2010 per E.O. 12958, PDF pp. 31-32. NSA.

p. 31

secret  4.JPG

p. 32

secret 5.JPG

https://www.fbcoverup.com/docs/library/1940-09-09-War-Dept-General-Staff-1940-1944-G2-Covering-Intrchnge-of-Secret-Tech-Info-with-Reps-of-Brit-Govt-PDF-pp-20-22-NSA-Sep-09-1940.pdf#page=31

 

IBM Global Tyranny Agenda Has Nazi Roots

IBM has deep Nazi roots and nothing has really changed about the agenda of this company.  Their board of directors hope you are still asleep and are not aware of the crimes they have committed against humanity. This is research being pulled out of our mines daily. Below are some more raw notes we have for our first tier-media creators.

We will also be doing some audios about IBM and its very evil history. Start familiarizing yourself with these nuggets below so that our discussion on the subject will be more familiar to you.

Here are some recent posts so you can “catch-up” on our research:

IBM, NSA, GCHQ faked the “Colossus” codebreaker computer at Bletchley Park

Five Eyes, Echelon, and the Transition to Permanent War

UK Stay-Behind-Spies Threaten U.S. Security

Five Eyes is UK Intelligence Spying on America

.

U.S. Army now admits “Five Eyes” treason war crimes with the 1946 UKUSA Agreement  using the “Soviet Threat” as their excuse – first disclosed in 2010

-Makes no mention of war crimes with IBM

-Makes no admission of war crimes with Siemens, Nokia, Deutsche Telecom, Univ. of Hannover, Microsoft, Electrolux, IBM Eclipse Foundation.

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=9

eisenhower coderman ibm.jpg

ASA 1.jpg

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=14

TICOM.jpg

U.S. Army ASA history lies about the German’s capabilities using IBM Hollerith equipment

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=14

SIGINT 1

Here is actual TICOM reporting about the documents and interviews referenced in the history:

Chief, ASA. (May 01, 1946). TOP SECRET CREAM, VOLUME 2 – NOTES ON GERMAN HIGH LEVEL CRYPTOGRAPHY AND CRYPTANALYSIS AS REVEALED BY ‘TICOM’ INVESTIGATIONS, INTERROGATIONS AND CAPTURED DOCS, Declassified 06-01-2009, DOCID: 3560816. ASA.

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf

encipherment.jpg

  1. Siemens and Halske (1946) – NOW globalist SIEMENS/IBM ECLIPSE FOUNDATION
  2. Duetsche Telefon un Kabelverke – NOW globalist DEUTSECHE TELEFON/IBM ECLIPSE FOUNDATION
  3. “Sueddeutsche Apparate Fabriken” (1946) became Altactel, Lucent and is NOW globalist NOKIA owned by MICROSOFT/IBM ECLIPSE FOUNDATION
  4. A.E.G. Allgemeine Elektrische Gesellschaft (1946) is NOW globalist AEG/ELECTROLUX/IBM ECLIPSE FOUNDATION
  5. Technische Hochschule, Hanover (1946) is NOW University of Hanover/IBM ECLIPSE FOUNDATION
  6. Fabrick C. Lorenz Aktiengesellschaft, NOW globalist NOKIA owned by MICROSOFT/IBM ECLIPSE FOUNDATION

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=39

TICOM 2.JPG

TRUTH covered up by U. S. Army: German and U.S. Army uses of IBM equipment “measured up well”

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=46

german ibm.jpg

boom dynamite.jpgAmerican and British TICOM units DYNAMITED IBM equipment to hide their collusion with German and Italian IBM. The Italian IBM was named Watson.

Reads like FBI James Comey’s review of Hillary Clinton’s Blackberrys smashed with a hammer

 https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=48

TICOM 3

Notice how they want history to rely on their lying hearsay word rather than hard evidence. This makes the official Army Security Agency (USA) official history total misdirection.

Gee Beaver, we’re sorry we dynamited our evidence of IBM’s war crimes.

.

thats not all.JPG

.

https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/european-axis-sigint/volume_2_notes_on_german.pdf

IBM 1.jpg

IBM 2.jpgIBM 3.jpg

IBM supported all the AXIS powers too.

The Italian office was named WATSON.

https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/european-axis-sigint/Volume_3_supreme_command_sigint_agency.pdf

IBM 4.jpgIBM 5IBM 6.jpg

.

chandler and freeze

James E. Freeze post-WWII contemporary in cryptoanalysis. James P. Chandler – government operative that stole Leader Technologies IP using IBM Eclipse Foundation as a government front, run by Highlands Forum Group (Dick O’Neill, James Baker, Andrew Marshall)

F.E. Herrelko, Deputy Director, Communications Security. (May 05, 1954). SECRET Lecture on Foundations of COMSEC to Armed Forces Staff College, declassified on 05-08-2018 per E.O. 13526. NSA/CSS.

https://www.fbcoverup.com/docs/library/1954-05-05-SECRET-Lecture-on-Foundations-of-COMSEC-to-Armed-Forces-Staff-College-by-FE-Herrelko-Deputy-Director-Communications-Security-declassified-on-05-08-2018-per-EO-13526-NSA-CSS-May-05-1954.pdf

Freeze 1.jpgfreeze 2.jpg

.

The Ultra Secret Oath Kept U.S. Under U.K. Control

The 1945-46 “British – U.S. Communication Intelligence Agreement” Five Eyes information withholding exemptions for British and American patents ensured a total ULTRA OATH secrecy lock on telecommunications information for at least the next 30 years, especially considering the American theft (sorry, “confiscation”) of over “50,000 patents some of the finest scientific research”… the true purpose of WWII?

… AND, since Pres. Roosevelt on Dec. 07, 1942 had just confiscated over 50,000 patents from all Axis and occupied countries (incl. the biggest holder, Germany), this U.S. and British patent exemption to withhold information (keep it secret for the Five Eyes insiders) ensured their total lock on surveillance worldwide, at least for 20-30 yrs. (ca. 1975) when those patents and their derivative works started expiring.

This meant that a new round of patenting would have to commence by 1975, which IBM (Chandler) did. So by the time they discovered Leader Technologies’ invention, theft of intellectual property was in their blood.

https://www.fbcoverup.com/docs/library/1942-12-07-Patents-At-Work-A-Statement-of-Policy-by-the-Alien-Property-Custodian-of-the-US-by-Leo-T-Crowley-Alien-Property-Custodian-No-JX5313-U6A5-1943-US-Alien-Property-Custodian-Dec-07-1943.pdf

patents 1.JPGpatent theft.JPG

Five Eyes exempted the sharing of any data collected using (stolen) U.S. and British Patents!

The U.S. – British intelligence agreement exempt them from sharing ANY collateral intelligence “may be withheld” if it was gathered using “U.S. and British patents”

This would be a policy motivating using ONLY stolen U.S. and British patents to build this Five Eyes system!

https://www.fbcoverup.com/docs/library/1946-03-05-British-US-Comm-Intell-Agrmnt-Hist-Coll-NSA-Ser-XILH-Box-47-TSC-release-app-Apr-08-2010-EO-12958-et-seq-DOCID-No-3678942-National-Security-Agency-Mar-05-1946.pdf#page=6

agreement 1

Info collected using (stolen) British & American patents are secret and exempt (“may be withheld”) … that would be everything (if all the technology was stolen). READ: We can all do what we want whenever we want, by agreement.

They institutionalized the motivation to steal patents right here!

https://www.fbcoverup.com/docs/library/1946-03-11-Five-Eyes-ANCIB(US)-ANCICC(UK)-Inauguration-Meeting-DOCID-2959299-REFID-A2666693-National-Archive-Ref-HW-80-5-NSA-Mar-11-1946.pdf#page=30

agreement 2.JPG

This also explains IBM’s motivation to be the largest patent holder on the planet.IBM = patent vacuum to form the tech base for Five Eyes

https://www.industryweek.com/leadership/china-increases-us-patent-holdings-while-ibm-keeps-top-spot

IBM China.JPG

 

1945 Meeting Organized Five Eyes

First Full DRAFTING Meeting to organize Five Eyes, Oct. 29, 1945

(The Japanese had surrendered on September 2, 1945, 31 days earlier)

Clearly, Sir Edward Travis was driving the bus.

Five Eyes. (Oct. 29, 1945). TOP SECRET, Joint Meeting of ANCIB(US)(Army-Navy Communications Intelligence Board)-ANCICC(UK)(Army-Navy Communications Intelligence Coordinating Committee), 29 Oct. 1945, Cat. Ref. HW 80/1, declassified Jun. 25, 2010. The National Archives.

https://www.fbcoverup.com/docs/library/1945-10-29-Five-Eyes-TOP-SECRET-Joint-Meeting-of-ANCIB(US)-ANCICC(UK)-Cat-Ref-HW-80-1-The-National-Archives-Oct-29-1945.pdf#page=2

five eyes meeting 1.JPG

GCHQ was originally established after the First World War as the Government Code and Cypher School (GC&CS) and was known under that name until 1946. During the Second World War it was located at Bletchley Park, where it was responsible for breaking of the German Enigma codes. There are two main components of the GCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the National Cyber Security Centre (NCSC), which is responsible for securing the UK’s own communications.

The Joint Technical Language Service (JTLS) is a small department and cross-government resource responsible for mainly technical language support and translation and interpreting services across government departments. It is co-located with GCHQ for administrative purposes.

meeting 2

This was ignored! Travis equivocated on the definition of  commercial gain vs. commercial purpose. This was a Privy Council tell! We are not using the information for commercial purpose or gain, just for national security. That way, the private beneficiaries of the “national security” non-commercial purpose can exploit it for commercial purpose and gain without running afoul of the agreement. Clever.

meeting 3

Learn more about FIVE EYES:

Unmasking the Five Eyes Beast

James P. Chandler Deep State Operative Exposed

A note from our newest Conclave member:

I was introduced to Richard O’Neill (as Dick O’Neill) at an after meeting gathering in the lounge area of the hotel most of us were staying at during the initial congressional testimonies where I gave my account of the LEGG incident that occurred at the end of September 1982 in December 1982. O’Neill’s interest was primarily what the three of us did to survive the incident. Nothing about what could be done to prevent it in the future, just how we survived.  I thought his question was rather crass at the time, and left the gathering shortly after this exchange occurred. Chandler was at this gathering as well, however I don’t recall seeing him in the testimony. I was not introduced to Chandler but you can’t forget those teeth nor the non-emotional expression on his face. Yoda was at my testimony, but he did not attend the gathering afterwards.

In 1984, while working on the shuttle program at Vandenberg AFB, the team I was working with identified an issue with the Sensor monitoring screens in which during the monitoring cycle (every 2 minutes the screen would transition to the next screen (there were 16 screens in all).  The issue was that it would take a total of 32 minutes for the initial cycle to complete and start over leaving the status of a particular screen unknown for a full 32 minutes.

Our team developed a short-term fix in which we added coding to the software so that a ribbon menu was placed at the bottom of the screen that would flash if something was identified on a screen that had already cycled past the status viewer, and allowed human intervention to select the flashing menu ribbon identifier which would bring that monitoring screen up immediately.

Our team also identified a long term fix that would automatically bring up the status screen if an issue was identified without the need of human intervention. As was the requirement at the time, all safety hazard analysis reports had to be provided to the Cape Safety department for approval to implement. It was rejected by this organization stating that they didn’t feel it was critical to the operation.

When the Challenger blew up in January 1986, I was called back to DC to give testimony as to my teams findings at Vandenberg, and the details of our suggested fix to the issue, as well as the response by the review board from the Cape. During this testimony all three of the men were there, and Chandler was taking copious notes.

I did not see any of these men again until I was invited to attend a special meeting while supporting a classified “Black” program, of which I am still constrained by NDA to reveal anything about the program, however this meeting was not about this black program, but about the utilization of third-party software on classified programs and what we thought the security impacts would be.  Yoda was there but did not speak. O’Neill was there and was just introduced to the attendees, he did not participate in the conversation.

james chandler
Big swamp gator James P. Chandler, III

Chandler on the other hand, made his impressions known on everything that was discussed even to the point that several of the other government contractors did not return after the short lunch break. There were roughly 45 people that were in attendance in the morning, and only 23 of us returned after lunch.

Other than the arguing that was going on this meeting did not seem to accomplish anything to the best of my knowledge, unless the propose was to disrupt the meeting so it did not come to any solutions.

During my time working on the DARPA Responsive Access, Small Cargo, Affordable Launch (RASCAL) program, for Space Launch Corporation out of Irvine, CA, I saw Yoda in a requirements meeting wit the DARPA program manager. He never said a word the entire day, and left without as much as a thank you. The program manager for DARPA gave us a ration about not being able to preform and that the contract should have been awarded to a larger contractor company.

Three months later after we had bench tested the head-end module (HEM), which was the patented positioning module for positioning the small payloads into the correct orbital rotation, the DARPA program manager called and said that our Preliminary Design Review (PDR) had been re-scheduled for the second week in October 2004 which was 8 months before it was originally scheduled. When the day came for the PDR, we tony tether DARPA directorfound out that the DARPA Program Manager was relieved of his position and Tony Tether, the director of DARPA, would be acting as the Program Manager for the review.

After we spent all day presenting our designs and test results of the head-end module, we were told by Tony Tether that the program was being cancelled immediately, and that the company had one month to provide all their analysis work, and all design work paid for by DARPA (Note this did not include the head-end module as it was designed and patented before the company was awarded the contract).

This caused Space Launch Corporation to close it doors and everyone was laid off. I was fortunately able to get a new position with SAIC before the lay offs began.

However, six months after Space launch closed their doors, Northrup-Grumman announced that they had been awarded a new program which other than the program name was exactly the same as the RASCAL program and they even included Space Launches head-end module design, which the CEO of Space Launch who held the patent, sued DARPA and Northrup-Grumman because the DARPA program Manager that was released prior to the PDR meeting had gone to work with Northrup-Grumman and taken all the research, analysis and engineering drawings for everything from the RASCAL program to Northrup-Grumman and apparently did not tell Northrup-Grumman exactly what was going on.

So if you were not aware of Tony Tether’s involvement in the stealing of the design for the head-end module as well as all the research and analysis that was done by the Space Launch team, he should be a part of your list of corrupted officials.

I again saw Chandler and O’Neill at meetings that I attended in association with the transitioning from Internet Protocol version 4 ((IPv4)-Digital) to IPv6 (Hexadecimal) in conjunction with the Future Combat System program in December of 2004 and January 2005. Again they were interested in what security concerns there were between the two protocols as well as the length of time to implement the migration efforts.

It wasn’t until I was giving a brown bag briefing of a convention I attended concerning IPv6 implementation and time lines for implementation in which there were Army personnel in this lunch-time briefing that I was not aware of, who upon my finishing my presentation asked why they had not been made aware of these time lines and requirements before then. I apologized for this but said I was just made aware myself.  By the end of the same day, I was escorted out of the Boeing facilities in which I had been working and the company I worked for at the time SIAC, placed me on another program supporting the Space and Missile Center at LA Air Force base in El Segundo, CA.

.

Former military Robert Mueller faces military tribunal at any time

Mueller as an ex-military officer can stand trial immediately for treason

.

The articles and material below were referenced in our discussion:

Records Obtained in Court-Ordered Discovery Reveal Obama White House Tracking FOIA Request for Clinton Emails

.

Justice Department Discloses No FISA Court Hearings Held on Carter Page Warrants

.

Rep. Matt Gaetz on Spygate, Barr Hearings, and the Attempted Coup Against Trump

.

Miner

From the AIM Miners:

The Americans have yet to understand the mechanisms of the decades of massive Organised Crime, money laundering conduits, especially all those connected to the Bush family, Clintons, Obama and now Trump.

As was exposed in the US, former FBI Director JAMES COMEY’S brother works for the Law Firm that does the
CLINTON FOUNDATION Taxes.

His brother, PETER COMEY works for the Law Firm
DLA PIPER
Now the Americans have never dismantled the Companies that DLA PIPER act for, I have.

Companies that include the 35 year Welsh, Cash Gutted, £Million Asset Stripped PONZI SCAM and Political Dynamic Scandal

ANGLESEY MINING PLC.

Of course, no-one other than myself looked for over 14 years how the Executives of
ANGLESEY MINING PLC
Are interlocked with the
TORONTO STOCK EXCHANGE
TSX-V and the $billionaire Mining
CON ARTIST
FRANK GUISTRA
Now there’s a juicy name to play with.

If the Americans want a little proof as to how to expose this Trans Continent, Criminal, Money Laundering scandal, they could review the 2003 ANGLESEY MINING PLC
ANNUAL REPORT.
Within, they might recognise names connected to the biggest Mining Fraud in History $8.6 Billion
THE BRE-X MINERALS
Subsidiary
BRO-X MINERALS
Fraud

The name in the 2003 ANGLESEY MINING PLC ANNUAL REPORT that the Americans should pay attention to is on
Page 6 of 27
Under the paragraph
FEASIBILITY STUDY
is the name
KILBORN ENGINEERING
The very same Company involved in the
BRE-X MINERALS Fraud.

Directly affiliated to
BARRICK GOLD CORPORATION
you know
Ex US President
GEORGE H W BUSH
MOHAMMED ADNAN KHASHOGGI
STEPHEN ROLAND DATTELS, now there’s a thieving PONZI SCAM Con Artist that should be locked up for 25 years with all his conspiring cohorts.

KILBORN ENGINEERING of course were a subsidiary of another Company under the FRAUD spotlight
SNC – LAVALIN

ANGLESEY MINING PLC Directors front other Canadian Asset Stripped, Debt Facilitated, Care & Maintenance PONZI Scams.

LABRADOR IRON MINE HOLDINGS
and
CANADIAN ZINC CORPORATION

Another RED FLAG for the Americans linking
ANGLESEY MINING PLC
to the massive Trans Continent Organised Crime, Fraud, PONZI Scams and Money Laundering, is found in their publication of their half yearly report for the 6 months to the 30 September 2015

Appointment of Broker
BEAUFORT SECURITIES LIMITED
and its Subsidiary
BEAUFORT ASSET CLEARING

Fraud and Money Laundering charges by the US SEC.

Let’s join some dots for our American Friends linking the RUSSIAN OLIGARCHS to the Americans and the corrupt UK Lords in the UK

CONVICTED
PAUL MANAFORT
and his associate
RICK GATES
aka
RICHARD GATES
aka
RICHARD WILLIAM GATES
aka
RICHARD WILLIAM GATES III

So how did they manage to set up the money laundering conduits, easy, let’s try and keep it simple.

RICHARD WILLIAM GATES III
UK DIRECTOR ID NUMBER
907951695
Date of Birth April 1972

BOOKBUNDLE.COM LIMITED
04343182

RICHARD GATES
UK DIRECTOR ID NUMBER
917733610
Date of Birth April 1972

1) POMPOLO LIMITED
2) SKYTON LIMITED
3) BCAS EUROPE LIMITED

Out of, I aver, 2 ISRAELI / UK INTELLIGENCE Organised Crime Money Laundering connection Addresses

WINNINGTON HOUSE 2 WOODBERRY GROVE NORTH FINCHLEY

ASCOT HOUSE. 2 WOODBERRY GROVE NORTH FINCHLEY

The Conduit Addresses of the massive Israeli / UK Abandoned Trans Continent Organised Crime Money Laundering Boiler Room.

788 – 790 FINCHLEY ROAD LONDON NW11

So, where’s the connection to the UK Corridors of Power, easy.

From the NEWYORK TIMES
8 th October 2018
RICK GATES sought online manipulation plans from Israeli Intelligence Firm for TRUMP Campaign.

PAUL MANAFORT was connected to
Confirmed Homosexual, easily corrupted

LORD GREGORY LEONARD GEORGE BAKER
Who I’ve been asked to provide information on
connected to the RUSSIAN OLIGARCHS including
ANGLO – SIBERIAN OIL COMPANY
and
ROMAN ABRAMOVICH
via
SIBNEFT OIL GROUP
includes
SIBNEFT OIL TRADING COMPANY LIMITED
917520024
SIBNEFT OIL TRADE COMPANY LIMITED
915869837

.

THIS WAS TREASON

Trump tweets THIS WAS TREASON

.

Twitter     Presidential Tweets

May 17, 2019 11:53:00 AM – With all of the Fake and Made Up News out there, Iran can have no idea what is actually going on!

May 17, 2019 09:35:05 AM – It now seems the General Flynn was under investigation long before was common knowledge. It would have been impossible for me to know this but, if that was the case, and with me being one of two people who would become president, why was I not told so that I could make a change?

May 17, 2019 08:44:35 AM – The Fake News Media is hurting our Country with its fraudulent and highly inaccurate coverage of Iran. It is scattershot, poorly sourced (made up), and DANGEROUS. At least Iran doesn’t know what to think, which at this point may very well be a good thing!

May 17, 2019 07:16:40 AM – Will Jerry Nadler ever look into the fact that Crooked Hillary deleted and acid washed 33,000 emails AFTER getting a most powerful demand notice for them from Congress?

May 17, 2019 06:11:45 AM – My Campaign for President was conclusively spied on. Nothing like this has ever happened in American Politics. A really bad situation. TREASON means long jail sentences, and this was TREASON!

May 17, 2019 06:05:30 AM – New Fox Poll: 58% of people say that the FBI broke the law in investigating Donald J. Trump. @foxandfriends

May 17, 2019 06:01:01 AM – MAKE AMERICA GREAT AGAIN!

May 17, 2019 06:00:06 AM – DRAIN THE SWAMP!

May 17, 2019 05:58:43 AM – “What happened is that Donald Trump won. Down goes Comey.” @foxandfriends

coup

Origins of the Coup

.

treason report final

The Treason Report

.

The Treason Report

Douglas Gabriel and Michael McKibben discuss the Treason Report, a U.S. citizen intelligence report on high crimes, treason, and espionage in D.C..

Over 20 years of data collection with two powerful citizen intelligence groups – -Americans for Innovation and American Intelligence Media -release this report to Attorney General A. G Barr and President Donald Trump.

We need your help, patriots. Please email a PDF copy of this extensive report to places listed below. You don’t even need to leave your armchair to get this done – our patriot team did the research. We need YOU to give it some fuel.

Here is the report link: The Treason Report

https://patriots4truth.files.wordpress.com/2019/05/the-treason-report-1.pdf

First copy goes to Bill Barr. Contact him here: https://www.justice.gov/doj/webform/your-message-department-justice

Then send a copy to the White House here: https://www.whitehouse.gov/contact/

Please send copies to your Senator and Congressperson. Many of them are criminal collaborators…others are just clueless. Contact them here: https://truthbits.blog/2018/07/27/contact-any-congressperson/

barr investigates.JPG