Category Archives: conspiracy

Majority of donations to Biden and Democrat PAC from untraceable suspect ‘unemployed’ people

Hollie McKay reports for Fox News, Sept. 13, 2020, that Take Back Action Fund (TBAF), a conservative nonprofit political group, is raising “serious concerns” about millions of donations reported by a major Democratic fundraising platform.

A computer analysis by TBAF found that nearly half of all 2019 donations (48.4%) and a little over half of January-August 2020 donations (50.1%) to Democrat PAC ActBlue were made by people claiming to be unemployed and not having an employer.

In contrast, TBAF found that only 4% of 2019 donations and 5.6% of the Jan.-August 2020 donations to the Republican Party’s fundraising platform WinRed came from people who did not list an employer or were unemployed. WinRed was created last year to counter ActBlue.

The contrast between donations to Biden vs. those to Trump is even starker. Whereas, 49.6% of donations to Biden came from the “unemployed”, only 2.6% of donations to Trump were from the allegedly “unemployed”.

TBAF President John Pudner explains why the large number of donations from “unemployed” people is a red flag that they may be illicit contributions (“straw donors”) from foreign interests attempting to influence U.S. elections:

“The name of employers must be disclosed when making political donations, but more than 4.7 million donations [to ActBlue in 2019] came from people who claimed they did not have an employer. Those 4.7 million donations totaled $346 million ActBlue raised and sent to liberal causes. It is hard to believe that at a time when the U.S. unemployment rate was less than 4 percent, that unemployed people had $346 million dollars to send to ActBlue for liberal causes. 4.7 million donations from people without a job … raised serious concerns.”

In response to questions by Fox News, a representative for ActBlue refused to share information about how they analyze contributions, and insisted that “we use an array of data sources, internal validation and third-party services to verify the validity of transactions,” and that many of its donations came from retirees and people who aren’t counted as employed, such as homemakers.

Blah, blah, blah.

ActBlue, created in 2004, bills itself as a “powerful online fundraising platform available to Democratic candidates and committees, progressive organizations, and nonprofits that share our values for no cost besides a 3.95% processing fee on donations. And we operate as a conduit, which means donations made through ActBlue to a campaign or organization are considered individual donations.

But the ActBlue website allows credit card donations that are not verified, so anyone from any country in the world can donate without a paper trail.

In fact, the issue of unauthenticated political donations via allowing donors to use largely untraceable prepaid credit cards which could be used to mask a donor’s identity, and to evade limits on how much an individual is legally allowed to give was also brought to light by The Washington Post in 2008.

Pudner said: “ActBlue‘s insistence on refusing to allow banks to verify their donations is an invitation to foreign programmers or others to send money through them using fake American names, and we encourage them to start letting banks verify the identity of donors to stop the potential for millions of dollars to influence our election. We found it took other vendors only a matter of hours to switch their system to allow verification of donations and thus prevent the possibility of illegal foreign money being moved into campaigns. Choosing to use an untraceable system has a higher cost in terms of the risk of credit card fraud and also tends to incur higher bank fees. And this untraceable system allows someone with a gift card to make donations in anyone’s name, even if that person never actually made that donation, or even if that person doesn’t exist at all.

Director of National Intelligence John Ratcliffe told Fox News that “China poses a greater national security threat to the U.S. than any other nation. That includes threats of election influence and interference.” On August 19, 2020, the daily newspaper Global Times, which is a mouthpiece of the Chinese Communist Party, endorsed Joe Biden for President. (Gateway Pundit)

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The video the MSM doesn’t want you to see, RITTENHOUSE

Kyle Rittenhouse cleaning graffiti left by vandals

Only the fascist left domestic terrorist supporting democrat controlled propaganda fake news would stoop so low to attack a law abiding 17 year old American patriot.  Instead of being truthful and saying Kyle Rittenhouse defended himself, they chose to blow smoke up everyone on this planet’s  a$%’s.

 

“The teenager with the long gun scuffled with people near a car dealership and opened fire, allegedly killing two people and wounding a third, a criminal complaint says. Even as police and emergency vehicles raced to the scene and chaotic videos of the fatal encounter appeared on social media, the armed suspect walked past a group of officers unnoticed. He was arrested 30 miles awayin Antioch, Illinois.”

Faith Karimi, CNN

That’s how fake news CNN is spinning a Kenosha shooting where 3 democrat supported adult fascist left domestic terrorist were shot when they attacked a minor, 17 year old Kyle Rittenhouse.

Rittenhouse was 1 of many volunteers that were cleared by law enforcement and were protecting  businesses from being destoyed by democrat supported fascists left domestic terrorist Black Lives Matter(BLM)/Antifa, Muslim Extremists and foreign nationals that have entered the country illegally and are working with BLM causing discourse,  attacking Americans and trying to influence our elections.

 

The defenders stopped the terrorist from burning down a gas station.  They also stopped the terrorist from attacking the police with a flaming dumpster.

The terrorist next move was to set the car lot on fire where Rittenhouse was standing guard.

Video shows convicted felon sex offender terrorist Joseph Rosenbaum, 36, chasing Rittenhouse through the car lot.  Rosenbaum can be seen throwing a molotov(claims eyewitness) at Rittenhouse. We hear a gunshot from unknown source .Rittonhouse turns and shoots seconds before Rosenbaum could grab him.  Rosenbaum goes down and we hear more gunfire from unknown source again.

Rittonhouse goes over to where Rosenbaum is laying and offers help. He calls the police.

A person then decides to use his shirt instead of the first aid kit Rittenhouse was carrying.  The same person tells Rittenhouse to go.away.

Rittenhouse starts making his way to the police line and a mob of domestic terrorist start chasing him.   He trips an falls.  While on the ground a unidentified terrorist runs up and kicks him in the head.  While still on the ground, he gets hit in the head with a skateboard carried by convicted felon and domestic terrorist,  26 year old, Anthony Huber.  Rittenhouse takes the skateboard hit and shoots Huber.

Then convicted felon and domestic  terrorist, 26 year old

Gaige Grosskreutz, armed with a handgun goes after Rittenhouse.  Grosskreutz raises his gun and Rittenhoust shoots him in the arm.

Rittenhouse makes his way to the police where he turns himself in.

Police let him go.

Currently charges have been filed on Rittenhouse which if convicted, could give him a life sentence.

Charges were filed before any sort of criminal investigation took place.  At the time there wasn’t  a crime scene investigation, no ballistic data, meaning they don’t  know if Rittenhouse was the only shooter. Video clearly shows he shot in self defense.

Besides the fact that these were convicted felons attacking a minor, they were terrorist in the act of committing crimes. They had already helped burn and destroy other buildings in the city.

CNN and other fake news outlets are lying about what really happened.

So you can decide for yourself, I found as many videos of that night that I could find.  I placed them in order creating a visual timeline of events.  Keep in mind that these are the actual videos captured by reporters on the scene. I haven’t  blurred anything out so you will be seeing shooting, blood and bodies.  That’s your warning.

This is for educational  purposes only.

 

Rittenhouse doesn’t look like the mass shooter that some media outlets describe him.

Really makes you wonder why they are lying.

The person that interviewed Rittenhouse was 10 feet away from Rosenbaum when he got shot.  He also helped carry Rosenbaum to the car.  He was also at the hospital with Rosenbaum.  You would think that being a reporter he would have some video from the hospital.  They covered every other part of the event.  This is the reporter,

 

This is a short video of the day after.

Is Rittenhouse a Patriot or not?  I going with Patriot.

I have to be honest.  I feel like I just watched a poorly scripted reality show.  But what do I know.

Sources

Photos and video captured by the following people:

Andy Ngo

Drew Hernandez

Brendan Gutenschwager

RichieMcGinniss

Julio_Rosas11

Elijah Schaffer

ShelbyTalcott

FromKalen

 

Apologies if I missed anyone.

“Rittenhouse” and “The next day” are unlisted videos.  They are not monetized.  I made them to share information to the public, free as charged.  For educational purposes only. Fair use.

Respectfully,

Deplorable Patriot

Correction- Rittenhouse did not call police after first shooting.  He actually called a friend of his.

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

UK Telegraph: Pedophiles communicate with each other via pizza and cheese emojis on social media

During the 2016 presidential campaign, Wikileaks did something that politically- and morally-compromised mainstream journalists no longer do — reporting the truth.

Wikileaks published a batch of John Posta’s emails. Podesta is a longtime Democratic Party operative who was the chairman of Hillary Clinton’s 2016 presidential campaign at the time, and a former White House chief of staff in Bill Clinton’s administration, and White House counselor in the Obama administration.

In Podesta’s 2,060 emails, there are 149 references to “pizza”73 references to “hot dog”85 “cheese”78 “pasta”41 “sauce”84 “ice cream” and 47 “walnut” — all in very bizarre contexts that have nothing to do with food.

See “Pizzagate: The Podesta ‘pizza’ emails

Law enforcement authorities and online Urban Dictionary-like resources have identified the words in the Podesta emails, such as “pizza”, “hotdogs”, “cheese”, “sauce”, “pasta”, “handkerchief” and “map”, as code words for child sex trafficking. Writing in code provides pedophiles a cover story in the event their communications, such as the Podesta emails, are discovered.

The uproar from Wikileaks‘ publishing of the Podesta emails became known as pizzagate.

Those in the Alternative Media who reported on pizzagate were derided by the MSM as tinfoil hat-wearing nut-cases. Even Gateway Pundit chickened out on reporting on the 2017 Pizzagate March on D.C., while Alex Jones actually apologized for InfoWars‘ posts on pizzagate, calling it “fake news”.

Well, the derided tinfoil hatters are now vindicated.

Mike Wright reports for the UK Telegraph, August 28, 2020, that online safety groups warn that cheese and pizza emojis are being used as a secret code by pedophiles to communicate on social media sites such as Instagram and Twitter.

More than 100 volunteer parents have banded together to hunt down and report social media accounts using the pizza and cheese emojis to signal they are sharing sexualised images of children, in a bid to evade detection by the social media giants.

Members of the parents’ group told The Telegraph they often found such accounts sharing images of children taken in family settings like on the beach, which appeared to have been stolen from the parents’ social media profiles.

The parents’ group was started by a 27-year-old executive assistant in London who goes by the name India, and has asked The Telegraph not to use her surname.

India stumbled across the child image accounts on social media. The accounts often signaled what they were doing by using cheese and pizza emojis, to represent child porn (CP). India then created ProtectPD pages on Twitter and Instagram, dedicated to naming accounts that are sharing child images, so her followers can report them en masse to Instagram and Twitter. She said:

“I couldn’t just scroll past it as at the end of the day these are people’s children. There are pictures of little boys aged five or six on the beach in their swimming trunks and chances are that picture was taken by their parents on their holiday. Somehow that picture has gotten into their [pedophiles’] hands.”

John Carr OBE, an online child protection expert who formerly sat on the UK government’s Council for Internet Safety, described the phenomenon as “horrifying” and said social media giants had to do more to hunt down and delete the child-porn accounts. He said:

“It is understandable that parents want to share pictures of their children with friends and relatives, but if their social media accounts are not private these photos can be seen – and taken – by anyone. This is about parents not thinking because they are not aware that these bad guys are out there doing this.”

Spokesmen for Instagram and Twitter told The Telegraph that they have a zero tolerance policy for child sexual exploitation content, that they are committed to doing everything they can to keep child porn off their apps, and that they “remove accounts that share or solicit this type of content and report them to the police.” Blah, blah, blah.

The discovery of pedophiles using pizza and cheese emojis to communicate with each other on social media prompted a former UK government child safety advisor to warn parents to avoid sharing images of their children openly on social media in case they are stolen and traded online.

The above image is the childish pizza-pie bracelet that then-Vice President Joe Biden gifted Barack Obama on his 55th birthday. (See “Obama spent $65,000 to fly ‘pizzas’ & ‘hotdogs’ from Chicago“)

See also:

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The real story: It’s not just a few big Democrat cities that are burning

Demorats have generally ignored rioting in the streets and have suggested that President Trump is the cause of any social disruption. Mainstream media have suggested that the rioting is confined to half a dozen big cities. Republicans have blamed Demorat mayors and governors for not bringing the riots under control.

But fact is, none of us are getting the true picture of what is happening to this country. Protests and riots have occurred in all 50 states. The Army National Guard has been deployed to at least 23 states and the District of Columbia to combat rioters and looters. More than 350 cities and towns have been wracked with unrest—all this while left-wing socialist/communist government officials sit in complacent approval of the mayhem.

Our country is coming apart at the seams. Nero fiddles while Rome burns.

What follows is research published on June 2, 2020 by Mohammed Haddad, writing for Aljazeera. These data are more than two months old.

I have to wonder, how much worse is it now?

https://www.aljazeera.com/indepth/interactive/2020/06/mapping-cities-george-floyd-protests-erupted-200601081654119.html

~ Grif

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Hydroxychloroquine is why Uganda, with a population of 43M, has only 15 COVID-19 deaths

Uganda, a country in east-central Africa, has a 2018 population of 42.729 million, which is 13% of the United States’ population of  328.239 million in 2019.

And yet Uganda has 1,603 COVID-19 cases and just 15 deaths (h/t Rush Limbaugh), wherease the U.S. has 5,656,744 COVID-19 cases and 175,105 deaths. That means:

  • Uganda’s number of COVID-19 cases is only 0.028% of the number of U.S. COVID-19 cases; and
  • Uganda’s number of COVID-19 deaths is only 0.008% of the number of U.S. COVID-19 deaths.

How can that be, when Uganda is one of the poorest countries in the world, with a per capita GDP of $769 (37.8% of the population in 2012 lived on less than $1.25 a day) and a poor healthcare system.

This is why:

Uganda is afflicted with malaria, a disease caused by parasites that enter the body through the bite of a mosquito.

Malaria is common in Africa. In 2012, Uganda had the 6th highest annual deaths from malaria in Africa.

Hydroxychloroquine is a drug used to treat or prevent malaria — the same hydroxycholoroquine that:

  • President Trump had taken to prevent getting COVID-19.
  • Dr. Stella Immanuel said she had used, effectively, to treat her COVID-19 patients. A native of Nigeria, Dr. Immanuel is a physician at Rehoboth Medical Center in Houston, Texas. On July 27, 2020, with other medical professionals attending the America’s Frontline Doctors Summit in front of the U.S. Supreme Court, Dr. Immanuel spoke out against the current accepted COVID-19 treatment and the need to wear masks. She said: “In the past few months, after taking in over 350 patients, we [Rehoboth Medical Center] have not lost one. Not a diabetic, not somebody with high blood pressure, not somebody with asthma, not an old person. We’ve not lost one patient.” (Heavy.com)
  • But the video of Dr. Immanuel testifying to the effectiveness of hydroxychloroquine was taken down censored by Twitter, YouTube and Facebook, and denounced by Bill Gates as “outrageous”. It just so “happens” that Bill Gates is developing a COVID-19 vaccine with German biotech company CureVac.

Here’s the banned video, thanks to Lagos Today and Heavy.com:

  • Another physician, Dr. Harvey A. Risch, writes in Newsweek: “The Key to Defeating COVID-19 Already Exists. We Need to Start Using It”.
  • Yet another physician, Dr. Brian C. Procter, also testifies to hydrochloroquine’s effectiveness against COVID-19.

There was a White House petition asking President Trump to sign an emergency executive order to allow over-the-counter (OTC) use of hydroxychloroquine (HCQ) to protect against COVID-19. But the petition didn’t garner enough signatures. Link to petition here.

H/t Anon, Laura R., Harold Saive, Vivien Lee.

~Eowyn

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Venezuelan Warns US: Socialism Starts by Destroying Monuments and Censoring Everything

The left’s socialist/communist’s playbook never changes. The reason is simple. It generally achieves its goal of turning free and democratic countries into totalitarian cesspools where a dictatorial government subjugates its citizens and destroys a vibrant capitalist economy all in the name of “equality.” Venezuela is one such socialist utopia.

Venezuela was once the richest and most promising country in Latin America. It has the largest oil reserves in the world, and for a long time it had a growing democracy. But today, its economic and democratic institutions have failed. While inflation skyrockets, food and medicine have become so expensive that for the country’s poor, who now make up a staggering 82 percent of the population, cannot afford to buy them. Many are reduced to eating out of garbage dumps. Theft and murder are endemic, and the ruling Maduro government keeps an iron grip on the people.

Now, Elizabeth Rogliani, an activist who was among the more than two million Venezuelans who have fled their country since dits economy collapsed, has a warning for us.

Andrés Guilarte, who remains in Venezuela, describes his perspective on what socialism will do to the United States if Americans ignore the current turmoil that is dividing the country.

~ Grif

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The Chinese Communist Party has your data and a lot more.

The Chinese Communist Party(CCP) has your data. The thought of them not having it never entered my mind.  How did it happen?

CCP gains control (short version)

During WWII Japan had occupied about 25% of China. During that time there were three armies at war with each other in China. The Chinese Communist Party(CCP) was at war with the Chinese Nationalist.  Both were at war with Japan.

Japan  had invaded China prior to its involvement in WWII.  Japan’s  weapons were far superior and had air superiority. This combined with a plethora of other problems, China was unable to beat Japan.

By the time Japan was removed from China they had killed at least 25 million Chinese and had committed thousands of war crimes.

During WWII America started helping Chinese Nationalist with there problem with Japan.  After America dropped 2 nuclear bombs on Japan, Russia declared war on Japan.  The result was Japan’s surrender. The CCP says they defeated Japan but it was the Americans and Russia, with the help of Chinese Nationalists that beat Japan.

With Japan out of the picture By 1949 the CCP had defeated the Chinese Nationalist.

It was the 1st of October in 1949 when the leader of the Chinese Communist Party(CCP), Mao Zedong declared the creation of the People’s Republic of China (PRC).

I don’t want to get into details about China’s government structure or their  domestic problems but I will say they have a congress, a president and a judicial branch. It should be noted that their roles are not the same as we have here in the USA. For example, their role of president is primarily a ceremonial role with limited powers.

With that being said, the current president, Xi Jinping, is still the most powerful person in China.  Not because he is president…

President Xi Jinping  is also the paramount leader,. His real power comes from being the General Secretary of the Communist Party,. He is also the general secretary of the Central Committee, and Chairman of the Central Military Commission..

The thing to remember is that the CCP has  total control of China.

Xi  once borrowed a line from China’s first president Mao Zedong: “Government, military, society, education, north, south, east, west—the party leads everything.”

 Xi wants China to  be the super power of the world. He wants the world dependent on China.  He wants other nations  to look at China for leadership like they  look at the USA.  

Should we trust China?  Is China a threat to the USA?  I won’t tell you who you should  trust. That’s  for you to decide, but I will say “yes. China is a threat”

Have you ever heard of Title 7 of China’s national intelligence law? It makes every Chinese National a potential spy.

 

The following comes from an article H.R. McMaster’s wrote, which includes parts written by Howard W. French.

“China intends to establish a new tributary system through a massive effort organized under three overlapping policies, carrying the names “Made in China 2025,” “Belt and Road Initiative,” and “Military-Civil Fusion.”
“Made in China 2025” is designed to help China become a largely independent scientific and technological power. To achieve that goal, the party is creating high-tech monopolies inside China and stripping foreign companies of their intellectual property by means of theft and forced technology transfer. In some cases, foreign companies are forced to enter into joint ventures with Chinese companies before they are permitted to sell their products in China. These Chinese companies mostly have close ties to the party, making routine the transfer of intellectual property and manufacturing techniques to the Chinese government.”
“The “Belt and Road Initiative” calls for more than $1 trillion in new infrastructure investments across the Indo-Pacific region, Eurasia, and beyond. Its true purpose is to place China at the hub of trade routes and communications networks. While the initiative at first received an enthusiastic reception from nations that saw opportunities for economic growth, many of those nations soon realized that Chinese investment came with strings attached.”
“The Belt and Road Initiative has created a common pattern of economic clientelism. Beijing first offers countries loans from Chinese banks for large-scale infrastructure projects. Once the countries are in debt, the party forces their leaders to align with China’s foreign-policy agenda and the goal of displacing the influence of the United States and its key partners. Although Chinese leaders often depict these deals as win-win, most of them have just one real winner.”
The Military-Civil Fusion policy is the most totalitarian of the three prongs. In 2014 and then again in 2017, the party declared that all Chinese companies must collaborate in gathering intelligence. “Any organization or citizen,” reads Article 7 of China’s National Intelligence Law, “shall support, assist with, and collaborate with the state intelligence work in accordance with the law, and keep the secrets of the national intelligence work known to the public.” Chinese companies work alongside universities and research arms of the People’s Liberation Army. Military-Civil Fusion encourages state-owned and private enterprises to acquire companies with advanced technologies, or a strong minority stake in those companies, so that the technologies can be applied for not only economic but also military and intelligence advantage. It fast-tracks stolen technologies to the army in such areas as space, cyberspace, biology, artificial intelligence, and energy. In addition to espionage and cybertheft by the Ministry of State Security, the party tasks some Chinese students and scholars in the U.S. and at other foreign universities and research labs with extracting technology.”
“Sometimes U.S. defense funding supports China’s technology transfers. One of many examples is the Kuang-Chi Group, described in the Chinese media as “a military-civilian enterprise.” The Kuang-Chi Group was founded largely on the basis of U.S. Air Force–funded research into meta-materials at Duke University.”

If you have been paying attention and  doing your own research  you might  agree with  French and McMasters. I’m not a fan of McMasters political career in the White House but on this topic he appears to be on target.

Here are 7 more quotes of McMasters.

  1. “Chinese espionage is successful in part because the party is able to induce cooperation, wittingly or unwittingly, from individuals, companies, and political leaders. Companies in the United States and other free-market economies often do not report theft of their technology, because they are afraid of losing access to the Chinese market, harming relationships with customers, or prompting federal investigations.”
  2. “Many universities, research labs, and companies in countries that value the rule of law and individual rights are witting or unwitting accomplices in China’s use of technology to repress its people and improve the Chinese military’s capabilities. For dual-use technologies, the private sector should seek new partnerships with those who share commitments to free-market economies, representative government, and the rule of law, not with those acting against these principles. Many companies are engaged in joint ventures or partnerships that help China develop technologies suited for internal security, such as surveillance, artificial intelligence, and biogenetics. In one of many examples, a Massachusetts-based company sold DNA-sampling equipment that has helped the Chinese government track Uighurs in Xinjiang. (The company has ended such sales.) Companies that knowingly collaborate with China’s efforts to repress its own people or build threatening military capabilities should be penalized.”
  3. “Many Chinese companies directly or indirectly involved in domestic human-rights abuses and violation of international treaties are listed on American stock exchanges. Those companies benefit from U.S. and other Western investors. Tougher screening of U.S., European, and Japanese capital markets would help restrict corporate and investor complicity in China’s authoritarian agenda. Free-market economies like ours control the majority of the world’s capital, and we have far more leverage than we are employing”
  4. “China’s use of major telecommunications companies to control communications networks and the internet overseas must be countered. There should no longer be any dispute concerning the need to defend against the multinational technology company Huawei and its role in China’s security apparatus. In 2019, a series of investigations revealed incontrovertible evidence of the grave national-security danger associated with a wide array of Huawei’s telecommunications equipment. Many Huawei workers are simultaneously employed by China’s Ministry of State Security and the intelligence arm of the People’s Liberation Army. Huawei technicians have used intercepted cell data to help autocratic leaders in Africa spy on, locate, and silence political opponents. A priority area for multinational cooperation among free societies should be the development of infrastructure, particularly 5G communications, to form trusted networks that protect sensitive and proprietary data.”
  5. “We must defend against Chinese agencies that coordinate influence operations abroad—such as the Ministry of State Security, the United Front Work Department, and the Chinese Students and Scholars Association. At the same time, we should try to maximize positive interactions and experiences with the Chinese people. The United States and other free and open societies should consider issuing more visas and providing paths to citizenship for more Chinese—with proper safeguards in place. Chinese who engage with citizens of free countries are the ones who are most likely to question their government’s policies—whether from abroad or when they return home.:”
  6. “The U.S. and other free nations should view expatriate communities as a strength. Chinese abroad—if protected from the meddling and espionage of their government—can provide a significant counter to Beijing’s propaganda and disinformation. Investigations and expulsions of Ministry of State Security and other agents should be oriented not only toward protecting the targeted country but also toward protecting the Chinese expatriates within it.”
  7. “Without effective pushback from the United States and like-minded nations, China will become even more aggressive in promoting its statist economy and authoritarian political model. For me, the state visit to Beijing—and exposure to China’s powerful combination of insecurity and ambition—reinforced my belief that the United States and other nations must no longer adhere to a view of China based mainly on Western aspirations. If we compete aggressively, we have reason for confidence. China’s behavior is galvanizing opposition among countries that do not want to be vassal states. Internally, the tightening of control is also eliciting opposition. The bravado of Li Keqiang and other officials may be intended to evoke the idea of China as sovereign of “everything beneath heaven,” but many beneath heaven do not, and must not, agree.

 

Because of China’s skill in propaganda and the enormous amount of fake news I can understand how some people might not be aware of  Xi’s ambitions, the CCP’s behavior and how China has infiltrated  America.  If you are one of those people,  you shouldn’t be in the dark any longer. McMasters analysis is accurate. Clearly he sees that any American interaction with China, be it a partnership, investment, opening a business in china, helping a Chinese National open a business in America  or any involvement with China is not in the best interest of America
  It only creates opportunity for espionage.
 What the average person sees as a business transaction he probably sees a opportunity  for espionage. I get the impression that he knows that chinese espionage  occurs  daily in the USA.
  Under the current conditions with China, I’m sure he would like to see all activities with China  stop unless immediate action is taking to stop the espionage.  I agree with him because he’s right.(on this matter).
*McMasters  remarks come from his book, Battlegrounds: The Fight to Defend the Free World by H. R. McMaster.  

They can also be found at kyotoreview.org, chinas-three-pronged-strategy-on-regional-connectivity

And https://nationalcybersecurity.com/h-r-mcmaster-what-china-wants-espionage-surveillance-ceo-businesssecurity/

Now that you know what you thought to be true about the CCP and China is actually true, take a look around and see if anything from China has spilled over into your life.

I looked around and found that in both goods and services, China has been in my life for quite a long time..

China is everywhere in the USA. They own property, businesses, banks and politicians. They have also had quite a bit of success on the internet..  That’s  where we need to pay close attention. No one should be using Chinese apps

We see Tencent Holdings all over the news.  They definitely are a security risk. They have access to millions of Americans. They have large amounts of cash invested in American companies. Reddit  and Discord are popular platforms  that Tencent has invested substantial amounts of money.

I’ve talked about this in the past.  You don’t  give 150 million dollars to someone (Reddit) and  say “here’s  my money, contact me when you turn a profit.”  That money gives them partial ownership of the company.  That money gets them influence throughout the whole company.  That influence finds its way to the customer. If you use Reddit, you can be sure Tencent Holdings has some of your data. Don’t forget platforms like Reddit have influence in our elections.

Personally, I think it’s  too late.  China, the CCP has our data.  They have  also infiltrated our government.  What we need to do is remove the problem and see that it doesn’t  happen again. I know exactly who should be the first to go.

There is one company that I think poses the most danger to our country.  It’s  how the CCP has managed to find it’s way into you and your families daily lives.  It’s  worked its  way into  our government and is able to influence voters in our elections..  I’m talking about ZOOM.  The same company that schools use to teach children. The same company that has been making millions during the pandemic. The only company that I’ve seen under investigation by the FBI because of a security risk, but was still authorized for use in our government…(see image).

 

 

For PDF click here

You might be saying, ” ZOOM is an American company, what’s  the problem?”

Here are a few example problems of many .   While reading it, keep in mind article 7 and everything else McMasters mentioned.

Sequoia Capital  has a minimum investment  of 100 million dollars in Zoom.. Sequoia is listed on “Our team” page at Zoom.  The firm has offices in Menlo Park, Singapore, Bengaluru, Mumbai, New Delhi, Hong Kong, Shanghai, Beijing, and Tel Aviv.   Sequoia has numerous investors located in China.  Zoom  has many big investors with branches in China.  Think Article 7 + more.

Zoom as of January 2020 has 2,532 full time employees.  1,396 worked in the USA. Around 700 of the remaining employees work at their research and development location in China. This location alone is a huge risk. To make improvements, research and development is going to need data.  User data..  The facility in China will have employees that are hired locally.  China wouldn’t allow the business exist there if they didn’t. Article 7 risk + more

Zoom cannot guarentee their investors that data and intellectual property under their control is safe. In their annual report they admit that they have had security breaches in the past and imore breaches  they cannot defend against will happen in the future.  Thay also  admit that in some countries they may not be able to protect data. Below is documentation  where they mention these security risks.

 

 

 

 

 

 

 

 

Zoom  has history of getting caught routing data to China.  They say “it was a mistake.  It’s the only time it has ever happened.”  I see it like this, You catch a long time employee stealing. They say it was their first time.  I say, “no. It’s the first time they  got caught. They’ve been stealing since the beginning.”  ZOOM had been doing it since day one.

Taiwan banned zoom for routing data to China.

Singapore teachers banned zoom because of hackers.

ZOOM = PROBLEMS

The following are screenshots of search results that come up when I Google Zoom.

 

So how did Zoom get approved for government  use? FedRamp approved  Zoom.  FedRamp is. part of the General Services administration (GSA) . Technically GSA is part of the executive branch, but it functions on its own.

I believe  Trump saw some problems with FedRamp in 2017.  He signed in an executive order that made the head of departments solely responsible for online security in their departments.

Link

  1. Democrats decided to rewrite FedRamp and pass legislation on it. What they did was create  more non elected job positions that have access to data  in information they shouldn’t be allowed to have loopinformation non elected people should not have.  One of the positions would give them access to Executive  branch information/activity congress has never had in the past.  Basically Democrats created a “mole” that was to report to congress  Another example of Democrats overreach. They created an additional 20 million dollar expense taxpayers neverr had before..

On February 5, 2020 when democrats and the fake news started  advancing their planned pandemic, the democrats in congress suspended the rules and passed the FedRamp rewrite.

Link

When it comes to Zoom, you will see democrats complaining about Zoom.  Personally I think it’s  part of their grift they are pulling on the USA. They do it to control the  conversation.  That way when a real problems comes along they can say “were on it, we see the problem and were taking care of it”.  It’s the only solution I could come up with.  Zoom is on the democrats top donor list.  100% of donations to political parties made by Zoom goes to the left. They are protecting Zoom.

The man behind the donations is the founder and current CEO of Zoom.

Eric S. Yuan(Yuán Zhēng) , Born in 1970, in China. He moved to the USA in 1997 . One of the founders of WebEx, Min Zhu  gave him a job.  WebEx was aquired by Cisco in 2007. He left the company in 2011 after making a pitch and getting denied. That’s when he started his first business which led to his first release  of Zoom in 2012..

,,*Yuan once mentioned that WebEx is still using code he wrote in 1998

*After his failure of promoting his idea, he left and took his idea with him.  It’s always been my understanding that any ideas you come up with while working for a company,  those ideas belong to the company and you cannot take them with you.

*Min Zhu resigned in 2005 and left the USA.. “Zhu continues to serve as a science and technology advisor to the municipal government of San Jose,”

“It does not surprise me that San Jose, located in California would have a citizen of a foreign communist country. as their science and technology advisor. It goes hand in hand with the lawless behavior of the democrat party in California.  The situation that  requires more attention in California  is Governor Newsom hijacking  the residents of California pandemic relief  unemployment insurance money. Parents and their children are starving losing their homes because they have not received their money from the federal government.  Newsom blames  the unemployment office but he is the only person that can stop the flow of money. 
What also requires attention is Newsom forcing mail in ballots.  Even if you go to a polling place to vote they give you a mail in ballot.  It shouldn’t be anymore obvious what the Democrats are doing. They’re rigging the election.

If any  American corporations have  branch locations in China, business partners or accepted big investments out of China and say they don’t have any security  risks, they are lying.  With the current laws in China, any involvement with China is a open door for espionage.  This is not a conspiracy theory, This is a fact. A person only needs to take a minute to look at some of their laws.

National Intelligence Law of the People’s Republic of China

Chapter I: General Provisions

Article 1: In order to strengthen and guarantee national intelligence work, and safeguard national security and interests, on the basis of the Constitution, this Law is formulated.

Article 2: National intelligence work shall persist in an overall national security view, provide intelligence reference for major national policy decisions, provide intelligence support for preventing and dissolving risks endangering national security, and safeguard the national regime, sovereignty, unity, independence and territorial integrity, the prosperity of the people, economic and social sustainable development and other major national interests.

Article 3: The State establishes and completes a concentrated and united national intelligence structure with a coordinated division of work, which is scientific and highly effective.

Central and State security leadership bodies exercise uniform leadership over national intelligence work, formulate principles and policies for national intelligence work, standardize the overall development of national intelligence work, establish and complete coordination mechanisms for national intelligence work, comprehensively coordinate national intelligence work in all areas, research and decide upon major matters in national intelligence work.

The Central Military Commission uniformly leads and organizes military intelligence work.

Article 4: National principles shall persist in the principles of the integration of open work and classified work, the integration of specialized work and the mass line, and the integration of division of work and responsibilities, and coordination and cooperation.

Article 5: Intelligence organs of national security bodies and public security bodies, as well as military intelligence organs (hereafter jointly named national intelligence work organs) will, according to the division of work and responsibilities, provide mutual assistance, do intelligence work and launch intelligence activities well. All relevant national bodies shall, on the basis of their duties, tasks and the division of work, cooperate closely with national intelligence work organs.

Article 6: All national bodies, military forces, political parties, social groups, enterprise and undertaking organizations, as well as citizens, shall support, cooperate with and collaborate in national intelligence work, and maintain the secrecy of national intelligence work they are aware of.

Article 7: National intelligence work shall be conducted according to the law, respect and guarantee human rights, and safeguard the lawful rights and interests of citizens and organizations.

Article 8: The State supports individuals supporting or assisting in national intelligence work, and rewards those making major contributions.

Chapter II: National intelligence work organs and powers

Article 9: National intelligence work organs launch intelligence work inside and outside of the borders on the basis of work requirements, and by using the necessary methods, means and channels according to the law.

Article 10: National intelligence work organs shall lawfully collect and process relevant information on foreign bodies, organizations and individuals engaged in, or inciting or assisting others to engage in, or domestic bodies, organizations and individuals who collude with foreign bodies, organs or individuals to engage in harm to the national security and interests of the People’s Republic of China

Article 11: Foreign bodies, organizations or individuals engaging in acts harming the national security and interests of the People’s Republic of China within Chinese borders must be punished by law. National intelligence work organs shall provide intelligence reference and evidence for preventing, curbing and punishing the abovementioned acts.

Article 12: National intelligence work organs may establish a collaborative relationship with relevant individuals and organizations, and entrust them with carrying out relevant work.

Article 13: Relevant departments in all levels’ People’s Governments, enterprise and undertaking work units, other organizations and citizens shall provide the necessary assistance to national intelligence work organs lawfully carrying out their work, and maintain secrecy.

Article 14: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, after undergoing strict approval procedures, adopt technological reconnaissance measures.

Article 15: National intelligence work bodies’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, acquaint themselves with relevant bodies, organizations, enterprise or undertaking work units and individuals, inquire into relevant circumstances, consult or obtain relevant files, materials and goods.

Article 16: National intelligence work organs’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, enter relevant limited-access localities and premises; they are also permitted to enjoy passage privilege to carry out urgent task requirements, after showing corresponding credentials.

National intelligence organs’ work personnel may, on the basis of work requirements and according to relevant State regulations, use with priority or lawfully commandeer transportation equipment, telecommunications equipment, spaces and buildings of bodies, organizations, enterprise and undertaking work units and individuals, when necessary, they may set up relevant work premises, equipment and facilities, after completion of the task, they shall timely restore or recover the original state, and pay corresponding fees according to regulations; where damage is caused, it shall be compensated.

Article 17: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, request Customs, border control, inspection and quarantine and other such bodies to provide exemption from inspection and other such conveniences.

Article 18: National intelligence work organs and their work personnel shall, during work, strictly act according to the law, they may not exceed their powers, abuse their powers, or engage in irregular favouritism, they may not violate the lawful rights and interests of citizens and organizations, and may not divulge State secrets, commercial secrets or personal privacy.

Chapter III: National intelligence work guarantees

Article 19: The State strengthens the construction of national intelligence work organs, exercises special management over their organic structuring, staffing, personnel allocation, funding and assets, and provides special guarantees.

The State establishes personnel employment, recruitment, assessment, training, remuneration and retirement management structures suited to intelligence work.

Article 20: National intelligence work organs shall adapt to intelligence work requirements, and raise their ability to carry out intelligence work.

Article 21: When the personal security of national intelligence work organs’ personnel or their close relatives is threatened due to their exercising their task, or the personal security of individuals with whom national intelligence work bodies have established a cooperative relationship or their close relatives is threatened because of their assistance to national intelligence work, relevant State departments shall adopt the necessary measures to provide protection and succour.

Article 22: Public security, civil affairs, finance, health, education, human resources and social security, as well as other relevant departments and State-owned enterprise and undertaking work units shall cooperate with national intelligence work bodies to properly arrange for persons in need of placement due to contributions to national intelligence work.

Article 23: National intelligence work organs shall establish supervision and security inspection structures, conduct supervision of their personnel’s observance of discipline, and lawfully adopt the necessary measures to regularly or irregularly conduct security inspections.

Article 24: Any individual or organization has the right to report and accuse instances of national intelligence work organs and their personnel exceeding their powers, abusing their powers, engaging in irregular favouritism and other unlawful acts to higher-level organs or relevant departments. Relevant organs or departments receiving reports and accusations shall timely investigate the matter, and report the investigation results to the reporter or accuser.

No other person or organization may suppress or retaliate against individuals or organizations lawfully reporting on or accusing national intelligence work organs and their personnel.

Chapter IV: Legal liability

Article 25: Those violating the relevant provisions of this Law and impede national intelligence work organs and their personnel from carrying out intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to a warning of administrative detention of less than 15 days by the national public security body, or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 26: Those divulging State secrets involving national intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to administrative detention of less than 15 days by the national public security body or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 27: National intelligence work personnel exceeding their powers, abusing their power, engaging in irregular favouritism, or divulging State secrets, commercial secrets or personal privacy will be punished according to the law; where it constitutes a crime, legal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: This Law takes effect on the date of promulgation.

That was the draft version. For the final version click 2017_PRC_NationalIntelligenceLaw

Zoom is a perfect example of what McMasters talked about.. After reading China’s  laws there shouldn’t be any questions.  Zoom needs to be  removed for government use.  Every  American business connected to China needs to be investigated.

China is not hiding their intentions.  Americans are being  lied to and sold out. Yet, nobody seems to care.

McMasters  knowledge and experience in these matters is unique. If an enemy had access to what he knows. government infiltrations would be almost impossible to stop..

Look at Zoom.  Even with a FBI investigation and a history of security issues. They still  get approved for government use.  It’s  almost like they have a friend on the inside helping them.

What’s  H.R. McMasters up to today? The last time I checked he was doing pretty well. This year he received $450,000 in stock with another $30,000 with an additional $10,000 for being on the audit team. That was just for one job.

That’s  right,  McMasters  sold out. He is currently on the Board of Directors for Zoom.

For full press release click Zoom Adds Board Member H.R. McMaster and Head of Global Public Policy and Government Relations Jonathan Kallmer to Leadership 

Additional  information

https://zoom.us/partners

https://www.forbes.com/sites/peterhigh/2017/03/06/zoom-ceos-promise-to-his-wife-helped-inspire-a-1-billion-valued-company/amp/

https://zoom.us/team

 

China has your data.  Will you allow this to continue? The silent majority must stand up. It’s  time for a great awakening

 

Respectfully,

Deplorable Patriot

 

 

 

 

 

 

 

 

 

 

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

President Trump: ‘This may be the last time you’ll see me for a while’

Yesterday, speaking to workers at a Whirlpool factory in Clyde, Ohio, about what he’s done to restore America’s manufacturing base and his executive order requiring government agencies to purchase all essential drugs from U.S. sources, President Trump made the following cryptic and troubling remark:

“So I have a lot of enemies out there. This may be the last time you’ll see me for a while. A lot of very, very rich enemies, but they are not happy with what I’m doing. But I figure we have one chance to do it, and no other President is going to do what I do. No other President would do a favored nations, a rebate, a buy from other nations at much less cost. Nobody. And there are a lot of unhappy people, and they’re very rich people, and they’re very unhappy.”

By “very rich enemies,” President Trump made reference to wealthy anonymous “middlemen” who skim profits from pharmaceutical sales. He said: “They are so wealthy. They are so wealthy. Nobody has any idea who the hell they are or what they do. They make more money than the drug companies.”

Trump’s executive order on August 6, 2020, directs the Department of Health and Human Services to use the Defense Production Act to buy essential medicines and other equipment from within the United States. Drug prices will be kept low for customers, and American companies will be able to compete more fairly on the world stage as a result.

In addition, the FDA and the Environmental Protection Agency will now give priority to domestic manufacturers during the regulatory review of pharmaceutical ingredients and essential medicines. Federal agencies will also help prevent the trafficking of counterfeit medicines from third-party sellers online.

Here’s a video of Trump’s speech:

H/t Gateway Pundit and Vivien Lee

See also:

Please pray for President Trump!

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Arizona teachers union tells members to write fake COVID-19 obituaries

Teachers’ unions across America are vehemently opposed to reopening public schools — they want to continue the COVID-19 lockdown of schools, although they are in favor of #BLM protests.

Who knew the Wuhan virus is so discriminating that it’ll only infect children attending schools, but not if they participate in public protests?

Arizona Educators United (AEU) is a political activist group for school teachers.

On its Facebook page, this is how AEU describes itself:

…a coalition of teachers, education support professionals, administrators, and those who care about the state of education in Arizona…. This is a group for organizing Arizona educators for action. 

Founded on March 4, 2018, AEU claims to have more than 45,100 members, but is a “private group” on Facebook — “Only members can see who’s in the group and what they post” — which makes one wonder why it is so secretive.

AEU’s hashtag is #REDforED, and encourages its members to wear red in protest events. Red is the color of communists and communist parties.

AEU’s Facebook page gives two websites for the group:

  1. http://arizonaeducatorsunited.com/: A dead link that brings you this message: “404 Page not found”.
  2. http://redfored.com: A website called “Arizona Parents & Allies United” — a public group with 14.8k members.

Previously, Arizona Governor Douglas Ducey, a Republican, had ordered that the state’s public schools re-open on August 17 from the COVID-19 lockdown, which was opposed by many teachers as too soon.

On July 23, 2020, Ducey issued an executive order with a revised plan to reopen the schools (azcentral.):

  • The Arizona Department of Health Services is tasked with setting a metric for reopening schools by August 7, using health data. For example, New York will reopen schools in communities where the daily COVID-19 infection rate remains 5% or lower over 14 days.
  • When schools reopen, everyone will be required to wear masks, with some exceptions for students.
  • Schools will be required to reopen for on-site learning on Aug. 17 for students who have nowhere else to go. That means school districts must open at least one site for students to go, but do not have to open every school or require every teacher to show up to work in-person.
  • Schools must begin instruction on the planned first day of school. If they cannot open in-person safely, then instruction must happen virtually on that first day and beyond.   
  • Whether schools reopen or not, teachers are guaranteed their full salary for the school year, with an additional $370 million in federal CARES Act money for schools.

Arizona Educators United is so opposed to reopening schools that the group is resorting to deceit — it is encouraging its members to write fake obituaries to Governor Ducey to protest his reopening order.

Cory A. DeAngelis is an adjunct scholar at the Cato Institute, director of school choice at the non-profit Reason Foundation, and executive director of the Educational Freedom Institute.

Yesterday, August 2, referring to Arizona Educators United, DeAngelis tweeted that “An Arizona teachers union is telling their members to write fake obituaries to the governor to protest reopening schools,” and is circulating this template for the fake obits:

These are the people who are educating your children.

H/t DCG

~Eowyn

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

New Zealand prime minister is a tranny?

Jacinda Ardern, 40, a “democrat socialist” and a Labour Party member, is the prime minister of New Zealand.

Sworn into office on October 26, 2017, she became the world’s youngest female head of government at age 37.

In March 2019, in a gushing New York Times op/ed, journalist Sushil Aaron praised Ardern for being “exemplary in her response to the massacre in Christchurch, where 50 Muslims were killed in two mosques by an Australian white supremacist and his accomplices.”

For the Christchurch shooting “massacre,” see my posts:

Aaron then characterized Ardern as “emerging as the definitive progressive antithesis to the crowded field of right-wing strongmen like President Trump, Viktor Orban of Hungary and Narendra Modi of India, whose careers thrive on illiberal, anti-Muslim rhetoric.”

Eight months after she was sworn in as prime minister, on June 21, 2018, Ardern was admitted to Auckland City Hospital and gave birth to a girl at 4:45 pm — the world’s second elected head-of-government to give birth while in office. (Wikipedia)

Seven weeks before she gave birth to presumably their child, on May 3, 2019, Ardern and her long-time “domestic partner,” radio and television broadcaster Clarke Gayford got engaged.

Note that Ardern is universally referred to as “she” and a woman who had given birth in a hospital.

But human females don’t have a protruding genital bulge in their groin area, as seen in the video below of Ardern in a red dress.

Ardern’s bulge is reminiscent of “Big Mike” Michelle Obama’s swinging nuts.

~Eowyn

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0