Category: Espionage

Patrick Byrne Gets Redpilled by a Russian Spy

Betsy and Thomas discuss the resignation of Patrick Byrne from his CEO position at Overstock and his relationship with Russian spy Maria Butina.

Here is a recommended article that will help you get up to speed on the situation and explain how Peter Strzok, Andrew McCabe, and James Comey are center stage again.

Details Behind Patrick Byrne Allegations of FBI “Political Espionage”

Patrick Byrne Gets Redpilled by a Russian Spy

Thomas references the stock market, MERS, and ICE in the audio. This citizen intelligence report below explains the system.

Exchange Casinos Control Practically Everything You Own

Mueller’s Treasonous Testimony

Michael McKibben and Douglas Gabriel, two trusted names in indie media, give you an overview on what to expect in Robert Mueller’s testimony in front of Congress on July 24, 2019.

Robert Mueller is a former military officer and could be arrested by the military for treason. His tribunal might not ever be known by citizens. So one wonders why this hasn’t been done. Clearly he is a dangerous enemy of the United States, with a long track history of treasonous activities with the Senior Executive Service, FBI, and DOJ and espionage with his British handler Arvinder Sambei.

Mueller’s Treasonous Testimony

Don’t believe Michael and Douglas when they tell you that Herr Mueller and Hildabeast hold the encryption keys to the internet?

Hillary Clinton Controls 50,000 FBI Encryption Keys – Proves Mueller’s Witch Hunt is Treasonous

.

Robert Mueller Muscling Hillary Clinton for Encryption Keys

.

Shocking Twin Tower Photos Released

After you view these shocking photos below of the Twin Tower crime scene, you will want to know what really happened on 9-11. Our citizen intelligence report gives you 9-11 truth, not U.S. government sanctioned propaganda.

Treason: Who Terrorized Americans and the World on 9-11?

911 PHOTOS NEVER PUBLISHED BY FAKE NEWS MEDIA

TRUTH NEVER TOLD BY GOVERNMENT OFFICIALS

TREASON COMMITTED BY US CITIZENS

ESPIONAGE BY FOREIGN ACTORS

Shocking Twin Tower pictures. Never seen before.

Trump tweets treason

.

The British Black Chamber

G.C.C.S & GCHQ are a “cover-up” for “the pooled British Black Chamber under the Foreign Office.” The British Foreign & Commonwealth Office (FCO, FO) runs ALL global intelligence Lord Mark-Malloch Brown (George Soros’: Int’l Crisis Grp, Refugees Int’l, Open Society Fndn, Quantum Fund, Soros Fund) ran FCO 2007-2009 and employed Sir Nigel Kim Darroch, British Amb. to US until Jul. 09, 2019

War Department General Staff. (Sep. 09, 1940). G-2 Covering Interchange of Secret Technical Information with Representatives of British Government, PDF pp. 31. NSA.

https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/ukusa/early_papers_1940-1944.pdf#page=31

https://www.fbcoverup.com/docs/library/1940-09-09-War-Dept-General-Staff-1940-1944-G2-Covering-Intrchnge-of-Secret-Tech-Info-with-Reps-of-Brit-Govt-PDF-pp-20-22-NSA-Sep-09-1940.pdf#page=31

British Black Chamber.JPG

transcription british black chamber.JPG

.

F.B.I. and the “pooled British Black Chamber” MI-6/MI-5/SOE/GCCS/GCHQ spies under the Foreign Office have had “close liaison” since before 1942

G.C. Marshall. (Sep. 11, 1940). SECRET, APPROVED, Sec. of War, Chief of Staff. MEMO: Directive to G-2 Covering Interchange of Secret Technical Information with Representatives of British Government, NSA declassified 04-08-2010 per E.O. 12958, PDF pp. 31-32. NSA.

p. 31

secret  4.JPG

p. 32

secret 5.JPG

https://www.fbcoverup.com/docs/library/1940-09-09-War-Dept-General-Staff-1940-1944-G2-Covering-Intrchnge-of-Secret-Tech-Info-with-Reps-of-Brit-Govt-PDF-pp-20-22-NSA-Sep-09-1940.pdf#page=31

 

IBM Global Tyranny Agenda Has Nazi Roots

IBM has deep Nazi roots and nothing has really changed about the agenda of this company.  Their board of directors hope you are still asleep and are not aware of the crimes they have committed against humanity. This is research being pulled out of our mines daily. Below are some more raw notes we have for our first tier-media creators.

We will also be doing some audios about IBM and its very evil history. Start familiarizing yourself with these nuggets below so that our discussion on the subject will be more familiar to you.

Here are some recent posts so you can “catch-up” on our research:

IBM, NSA, GCHQ faked the “Colossus” codebreaker computer at Bletchley Park

Five Eyes, Echelon, and the Transition to Permanent War

UK Stay-Behind-Spies Threaten U.S. Security

Five Eyes is UK Intelligence Spying on America

.

U.S. Army now admits “Five Eyes” treason war crimes with the 1946 UKUSA Agreement  using the “Soviet Threat” as their excuse – first disclosed in 2010

-Makes no mention of war crimes with IBM

-Makes no admission of war crimes with Siemens, Nokia, Deutsche Telecom, Univ. of Hannover, Microsoft, Electrolux, IBM Eclipse Foundation.

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=9

eisenhower coderman ibm.jpg

ASA 1.jpg

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=14

TICOM.jpg

U.S. Army ASA history lies about the German’s capabilities using IBM Hollerith equipment

https://www.fbcoverup.com/docs/library/2018-10-01-ARMY-HISTORY-incl-US-Army-Security-Agency-ASA-in-Early-Cold-War-Germany-PB-20-18-1-No-106-Winter-2018-Bryan-J-Hockensmith-Mng-Ed-US-Army-Center-of-Military-History-Oct-01-2018.pdf#page=14

SIGINT 1

Here is actual TICOM reporting about the documents and interviews referenced in the history:

Chief, ASA. (May 01, 1946). TOP SECRET CREAM, VOLUME 2 – NOTES ON GERMAN HIGH LEVEL CRYPTOGRAPHY AND CRYPTANALYSIS AS REVEALED BY ‘TICOM’ INVESTIGATIONS, INTERROGATIONS AND CAPTURED DOCS, Declassified 06-01-2009, DOCID: 3560816. ASA.

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf

encipherment.jpg

  1. Siemens and Halske (1946) – NOW globalist SIEMENS/IBM ECLIPSE FOUNDATION
  2. Duetsche Telefon un Kabelverke – NOW globalist DEUTSECHE TELEFON/IBM ECLIPSE FOUNDATION
  3. “Sueddeutsche Apparate Fabriken” (1946) became Altactel, Lucent and is NOW globalist NOKIA owned by MICROSOFT/IBM ECLIPSE FOUNDATION
  4. A.E.G. Allgemeine Elektrische Gesellschaft (1946) is NOW globalist AEG/ELECTROLUX/IBM ECLIPSE FOUNDATION
  5. Technische Hochschule, Hanover (1946) is NOW University of Hanover/IBM ECLIPSE FOUNDATION
  6. Fabrick C. Lorenz Aktiengesellschaft, NOW globalist NOKIA owned by MICROSOFT/IBM ECLIPSE FOUNDATION

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=39

TICOM 2.JPG

TRUTH covered up by U. S. Army: German and U.S. Army uses of IBM equipment “measured up well”

https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=46

german ibm.jpg

boom dynamite.jpgAmerican and British TICOM units DYNAMITED IBM equipment to hide their collusion with German and Italian IBM. The Italian IBM was named Watson.

Reads like FBI James Comey’s review of Hillary Clinton’s Blackberrys smashed with a hammer

 https://www.fbcoverup.com/docs/library/1946-05-01-TOP-SECRET-CREAM-VOL-2-NOTES-ON-GERMAN-HIGH-LEVEL-CRYPTOGRAPHY-AND-CRYPTANALYSIS-AS-REVEALED-BY-TICOM-INVESTIGS-INTERROGS-AND-CAPTURED-DOCS-DOCID-3560816-Declass-06-01-2009-DOCID-3560816-ASA-May-01-1946.pdf#page=48

TICOM 3

Notice how they want history to rely on their lying hearsay word rather than hard evidence. This makes the official Army Security Agency (USA) official history total misdirection.

Gee Beaver, we’re sorry we dynamited our evidence of IBM’s war crimes.

.

thats not all.JPG

.

Click to access volume_2_notes_on_german.pdf

IBM 1.jpg

IBM 2.jpgIBM 3.jpg

IBM supported all the AXIS powers too.

The Italian office was named WATSON.

https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/european-axis-sigint/Volume_3_supreme_command_sigint_agency.pdf

IBM 4.jpgIBM 5IBM 6.jpg

.

chandler and freeze

James E. Freeze post-WWII contemporary in cryptoanalysis. James P. Chandler – government operative that stole Leader Technologies IP using IBM Eclipse Foundation as a government front, run by Highlands Forum Group (Dick O’Neill, James Baker, Andrew Marshall)

F.E. Herrelko, Deputy Director, Communications Security. (May 05, 1954). SECRET Lecture on Foundations of COMSEC to Armed Forces Staff College, declassified on 05-08-2018 per E.O. 13526. NSA/CSS.

https://www.fbcoverup.com/docs/library/1954-05-05-SECRET-Lecture-on-Foundations-of-COMSEC-to-Armed-Forces-Staff-College-by-FE-Herrelko-Deputy-Director-Communications-Security-declassified-on-05-08-2018-per-EO-13526-NSA-CSS-May-05-1954.pdf

Freeze 1.jpgfreeze 2.jpg

.

The Ultra Secret Oath Kept U.S. Under U.K. Control

The 1945-46 “British – U.S. Communication Intelligence Agreement” Five Eyes information withholding exemptions for British and American patents ensured a total ULTRA OATH secrecy lock on telecommunications information for at least the next 30 years, especially considering the American theft (sorry, “confiscation”) of over “50,000 patents some of the finest scientific research”… the true purpose of WWII?

… AND, since Pres. Roosevelt on Dec. 07, 1942 had just confiscated over 50,000 patents from all Axis and occupied countries (incl. the biggest holder, Germany), this U.S. and British patent exemption to withhold information (keep it secret for the Five Eyes insiders) ensured their total lock on surveillance worldwide, at least for 20-30 yrs. (ca. 1975) when those patents and their derivative works started expiring.

This meant that a new round of patenting would have to commence by 1975, which IBM (Chandler) did. So by the time they discovered Leader Technologies’ invention, theft of intellectual property was in their blood.

https://www.fbcoverup.com/docs/library/1942-12-07-Patents-At-Work-A-Statement-of-Policy-by-the-Alien-Property-Custodian-of-the-US-by-Leo-T-Crowley-Alien-Property-Custodian-No-JX5313-U6A5-1943-US-Alien-Property-Custodian-Dec-07-1943.pdf

patents 1.JPGpatent theft.JPG

Five Eyes exempted the sharing of any data collected using (stolen) U.S. and British Patents!

The U.S. – British intelligence agreement exempt them from sharing ANY collateral intelligence “may be withheld” if it was gathered using “U.S. and British patents”

This would be a policy motivating using ONLY stolen U.S. and British patents to build this Five Eyes system!

https://www.fbcoverup.com/docs/library/1946-03-05-British-US-Comm-Intell-Agrmnt-Hist-Coll-NSA-Ser-XILH-Box-47-TSC-release-app-Apr-08-2010-EO-12958-et-seq-DOCID-No-3678942-National-Security-Agency-Mar-05-1946.pdf#page=6

agreement 1

Info collected using (stolen) British & American patents are secret and exempt (“may be withheld”) … that would be everything (if all the technology was stolen). READ: We can all do what we want whenever we want, by agreement.

They institutionalized the motivation to steal patents right here!

https://www.fbcoverup.com/docs/library/1946-03-11-Five-Eyes-ANCIB(US)-ANCICC(UK)-Inauguration-Meeting-DOCID-2959299-REFID-A2666693-National-Archive-Ref-HW-80-5-NSA-Mar-11-1946.pdf#page=30

agreement 2.JPG

This also explains IBM’s motivation to be the largest patent holder on the planet.IBM = patent vacuum to form the tech base for Five Eyes

https://www.industryweek.com/leadership/china-increases-us-patent-holdings-while-ibm-keeps-top-spot

IBM China.JPG

 

1945 Meeting Organized Five Eyes

First Full DRAFTING Meeting to organize Five Eyes, Oct. 29, 1945

(The Japanese had surrendered on September 2, 1945, 31 days earlier)

Clearly, Sir Edward Travis was driving the bus.

Five Eyes. (Oct. 29, 1945). TOP SECRET, Joint Meeting of ANCIB(US)(Army-Navy Communications Intelligence Board)-ANCICC(UK)(Army-Navy Communications Intelligence Coordinating Committee), 29 Oct. 1945, Cat. Ref. HW 80/1, declassified Jun. 25, 2010. The National Archives.

https://www.fbcoverup.com/docs/library/1945-10-29-Five-Eyes-TOP-SECRET-Joint-Meeting-of-ANCIB(US)-ANCICC(UK)-Cat-Ref-HW-80-1-The-National-Archives-Oct-29-1945.pdf#page=2

five eyes meeting 1.JPG

GCHQ was originally established after the First World War as the Government Code and Cypher School (GC&CS) and was known under that name until 1946. During the Second World War it was located at Bletchley Park, where it was responsible for breaking of the German Enigma codes. There are two main components of the GCHQ, the Composite Signals Organisation (CSO), which is responsible for gathering information, and the National Cyber Security Centre (NCSC), which is responsible for securing the UK’s own communications.

The Joint Technical Language Service (JTLS) is a small department and cross-government resource responsible for mainly technical language support and translation and interpreting services across government departments. It is co-located with GCHQ for administrative purposes.

meeting 2

This was ignored! Travis equivocated on the definition of  commercial gain vs. commercial purpose. This was a Privy Council tell! We are not using the information for commercial purpose or gain, just for national security. That way, the private beneficiaries of the “national security” non-commercial purpose can exploit it for commercial purpose and gain without running afoul of the agreement. Clever.

meeting 3

Learn more about FIVE EYES:

Unmasking the Five Eyes Beast

James P. Chandler Deep State Operative Exposed

A note from our newest Conclave member:

I was introduced to Richard O’Neill (as Dick O’Neill) at an after meeting gathering in the lounge area of the hotel most of us were staying at during the initial congressional testimonies where I gave my account of the LEGG incident that occurred at the end of September 1982 in December 1982. O’Neill’s interest was primarily what the three of us did to survive the incident. Nothing about what could be done to prevent it in the future, just how we survived.  I thought his question was rather crass at the time, and left the gathering shortly after this exchange occurred. Chandler was at this gathering as well, however I don’t recall seeing him in the testimony. I was not introduced to Chandler but you can’t forget those teeth nor the non-emotional expression on his face. Yoda was at my testimony, but he did not attend the gathering afterwards.

In 1984, while working on the shuttle program at Vandenberg AFB, the team I was working with identified an issue with the Sensor monitoring screens in which during the monitoring cycle (every 2 minutes the screen would transition to the next screen (there were 16 screens in all).  The issue was that it would take a total of 32 minutes for the initial cycle to complete and start over leaving the status of a particular screen unknown for a full 32 minutes.

Our team developed a short-term fix in which we added coding to the software so that a ribbon menu was placed at the bottom of the screen that would flash if something was identified on a screen that had already cycled past the status viewer, and allowed human intervention to select the flashing menu ribbon identifier which would bring that monitoring screen up immediately.

Our team also identified a long term fix that would automatically bring up the status screen if an issue was identified without the need of human intervention. As was the requirement at the time, all safety hazard analysis reports had to be provided to the Cape Safety department for approval to implement. It was rejected by this organization stating that they didn’t feel it was critical to the operation.

When the Challenger blew up in January 1986, I was called back to DC to give testimony as to my teams findings at Vandenberg, and the details of our suggested fix to the issue, as well as the response by the review board from the Cape. During this testimony all three of the men were there, and Chandler was taking copious notes.

I did not see any of these men again until I was invited to attend a special meeting while supporting a classified “Black” program, of which I am still constrained by NDA to reveal anything about the program, however this meeting was not about this black program, but about the utilization of third-party software on classified programs and what we thought the security impacts would be.  Yoda was there but did not speak. O’Neill was there and was just introduced to the attendees, he did not participate in the conversation.

james chandler
Big swamp gator James P. Chandler, III

Chandler on the other hand, made his impressions known on everything that was discussed even to the point that several of the other government contractors did not return after the short lunch break. There were roughly 45 people that were in attendance in the morning, and only 23 of us returned after lunch.

Other than the arguing that was going on this meeting did not seem to accomplish anything to the best of my knowledge, unless the propose was to disrupt the meeting so it did not come to any solutions.

During my time working on the DARPA Responsive Access, Small Cargo, Affordable Launch (RASCAL) program, for Space Launch Corporation out of Irvine, CA, I saw Yoda in a requirements meeting wit the DARPA program manager. He never said a word the entire day, and left without as much as a thank you. The program manager for DARPA gave us a ration about not being able to preform and that the contract should have been awarded to a larger contractor company.

Three months later after we had bench tested the head-end module (HEM), which was the patented positioning module for positioning the small payloads into the correct orbital rotation, the DARPA program manager called and said that our Preliminary Design Review (PDR) had been re-scheduled for the second week in October 2004 which was 8 months before it was originally scheduled. When the day came for the PDR, we tony tether DARPA directorfound out that the DARPA Program Manager was relieved of his position and Tony Tether, the director of DARPA, would be acting as the Program Manager for the review.

After we spent all day presenting our designs and test results of the head-end module, we were told by Tony Tether that the program was being cancelled immediately, and that the company had one month to provide all their analysis work, and all design work paid for by DARPA (Note this did not include the head-end module as it was designed and patented before the company was awarded the contract).

This caused Space Launch Corporation to close it doors and everyone was laid off. I was fortunately able to get a new position with SAIC before the lay offs began.

However, six months after Space launch closed their doors, Northrup-Grumman announced that they had been awarded a new program which other than the program name was exactly the same as the RASCAL program and they even included Space Launches head-end module design, which the CEO of Space Launch who held the patent, sued DARPA and Northrup-Grumman because the DARPA program Manager that was released prior to the PDR meeting had gone to work with Northrup-Grumman and taken all the research, analysis and engineering drawings for everything from the RASCAL program to Northrup-Grumman and apparently did not tell Northrup-Grumman exactly what was going on.

So if you were not aware of Tony Tether’s involvement in the stealing of the design for the head-end module as well as all the research and analysis that was done by the Space Launch team, he should be a part of your list of corrupted officials.

I again saw Chandler and O’Neill at meetings that I attended in association with the transitioning from Internet Protocol version 4 ((IPv4)-Digital) to IPv6 (Hexadecimal) in conjunction with the Future Combat System program in December of 2004 and January 2005. Again they were interested in what security concerns there were between the two protocols as well as the length of time to implement the migration efforts.

It wasn’t until I was giving a brown bag briefing of a convention I attended concerning IPv6 implementation and time lines for implementation in which there were Army personnel in this lunch-time briefing that I was not aware of, who upon my finishing my presentation asked why they had not been made aware of these time lines and requirements before then. I apologized for this but said I was just made aware myself.  By the end of the same day, I was escorted out of the Boeing facilities in which I had been working and the company I worked for at the time SIAC, placed me on another program supporting the Space and Missile Center at LA Air Force base in El Segundo, CA.

.