Category Archives: Uncategorized

President has been running a sting operation

According to Dr. Steve Pieczenik, President Trump has laid a trap for the Democrats to catch their voter fraud. The video is interesting.

Here’s the link to the whole article on InfoWars:

Groundbreaking Claim! Trump Set Up Democrats In Sophisticated Sting Operation – Caught Stealing Election Red-Handed

by Kelen McBreen


Peace,

TD

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Another Demonrat pervert: New Yorker legal analyst Jeffrey Toobin masturbated in Zoom call

Do you remember Sexgate, an offshoot of the #MeToo movement in 2018 when the liberal media swamp was drained of some big-name men who were accused of gross sexual improprieties, like Charlie Rose of PBS and CBS who eight women said had made unwanted sexual advances, including lewd phone calls, walking around naked in their presence, and groping their breasts, buttocks or genital areas? See also:

Well, we can now add 60-year-old New Yorker legal analyst Jeffrey Toobin, who is married with three children, to that list of creeps.

As recounted by VICE, last week, in a Zoom video chat between WNYC radio and members of the New Yorker, Jeffrey Toobin masturbated, exposing his penis.

The Zoom call was an election simulation with New Yorker writers playing various parts, such as Donald Trump, Joe Biden, Republicans, Democrats, the military, and the courts (Toobin’s role).

Two people who were on the call, who spoke on the condition of anonymity, told VICE they saw Toobin jerking off. The two sources both described a juncture in the election simulation when there was a strategy session, and the Democrats and Republicans went into their respective break out rooms for about 10 minutes. When the groups returned from their break out rooms, Toobin lowered the camera and was seen touching his penis. Toobin then left the call. Moments later, he called back in, seemingly unaware of what his colleagues had seen, and the simulation continued.

Toobin claims he didn’t know the Zoom video was on. He told VICE: “I made an embarrassingly stupid mistake, believing I was off-camera. I apologize to my wife, family, friends and co-workers. I believed I was not visible on Zoom. I thought no one on the Zoom call could see me. I thought I had muted the Zoom video.”

The New Yorker has suspended Toobin.

What is wrong with a 60-year-old man who not only has to masturbate during a 10-minute break in a business call, but is so lazy he couldn’t even be bothered to go to the bathroom to jerk off?

According to Daily Mail, “this is not the first time Toobin’s obsession with sex has got him into trouble.” His “history of sex scandals” includes:

  • Although he’s been married to Amy McIntosh for 34 years, he had A 10-year on-off affair with fellow lawyer Casey Greenfield.
  • When Greenfield got pregnant in 2008, Toobin offered to pay for an abortion. Greenfield decided to go ahead and have the baby, a boy, and sued Toobin for child support.
  • The Daily News reported that a “well-known media figure” called Toobin a sexual predator. She claimed Toobin pursued her and whispered in her ear something “disgusting”. When she turned him down, Toobin followed her to her hotel room, saying: “You know you want it.”
  • In a 2008 New Yorker article, Toobin admitted visiting Velvet, a swingers’ club in Miami, with political fixer Roger Stone.

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Joe Biden: To Boldly Go Where No Marxist Has Gone Before

As the saying goes: “History doesn’t repeat, but it rhymes.”  It’s a popular phrase, because it rings true. 

But couldn’t a similar also apply regarding science fiction?  Something along the lines of: “Science fiction’s past predictions don’t repeat in the present, but often times the present rhymes with those predictions.”  More on that in a moment.

But first, consider a tumultuous year in America:  Race riots in cities across the land.  Young people in the streets, violently seeking to replace the old order with a new, Marxist one.  A Presidential election year – one with a media-despised Republican candidate, and a generationally divided Democrat Party running an old war horse (of declining health) as its nominee.

2020?  Very much so.  But is also describes 1968. Now let’s review some of the “rhymes.”

1968: Race riots in multiple cities? Check.  Young people pursuing a Marxist revolution? Check – SDS and its budding offshoot, the Weather Underground. A media despised Republican candidate?  Check – Richard Nixon.  A generationally divided Democrat Party? Check – the “youth” were rioting outside the Democrat Convention in Chicago. (Four years later they became the McGovern wing inside the Democrat convention.  Later still many of them became college professors, spawning the likes of today’s “Squad” and BLM and Antifa. In other words, the 1960’s revolutionaries now control the Progressive movement, the media, academia and the Democrat Party).  An old warhorse with declining health as the Democrat nominee? Check – Hubert Humphrey.

2020: Race riots in multiple cities? Check – under the auspices of Marxist front groups called “Black Lives Matter” and “Antifa.”  Young people pursuing a Marxist revolution? Check – Antifa, etc. A media-despised Republican candidate?  Check – Donald Trump.  A generationally divided Democrat Party? Check – the “Bernie” / “Squad” and Silicon Valley faction versus the Pelosi – Schumer – Wall Street establishment of the Democrat Party (or should we say, former establishment of the Democrat Party)?  An old warhorse of declining health as the Democrat nominee? Check – Joe Biden.

1968 also witnessed the premier of a Star Trek episode titled Patterns of Force.  We won’t here recount the entire storyline (which you can peruse at your leisure at the link above).  For now, ponder “doesn’t repeat, but rhymes” as you watch this video montage from it (4:27):

Who is John Gill?

Continue reading

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

D.C Mayor seeks to remove the names of white men from government buildings in Washington

A Washington, DC committee formed by Mayor Muriel Bowser has recommended changing the names of schools and government buildings and has even called for the federal government to “remove, relocate or contextualize” a group of federal memorials and monuments, including the Washington Monument, the Jefferson Memorial, and the Benjamin Franklin Statue. Bowser’s committee, the District of Columbia Facilities and Commemorative Expressions (DC FACES), submitted the final executive report Monday (August 31, 2020).

The report covered surveys of DC’s named, government-owned buildings (libraries, schools, rec centers, etc), parks, statues in DC Government-owned parks, miscellaneous other named public spaces, and even city streets. The committee cataloged the race of people whose names appeared and discovered that fully seventy percent of government properties were named after white people. It is these people whose names are slated for erasure. Just a sample of the names is enough to demonstrate the level of racism and hatred being directed at once prominent white people.

Schools:

1.Alexander Graham Bell – Bell Multicultural High School
2. Robert Brent – Brent Elementary School
3. Jehiel Brooks – Brookland Middle School
4. James Monroe – Bruce-Monroe Elementary School @ Park View
5. James Birney – Excel Academy/Lee Montessori PCS – East End (at Birney School)
6. Charles William Eliot – Eliot-Hine Middle School
7. Anthony T. Hyde, Henry Addison – Hyde-Addison Elementary School
8. Thomas Jefferson – Jefferson Middle School
9. Francis Scott Key – Key Elementary School
10. Zachary Taylor – Ludlow-Taylor Elementary School
11. John Walker Maury – Maury Elementary School
12. William Winston Seaton – Seaton Elementary School
13. Benjamin Stoddert – Stoddert Elementary School
14. Strong John Thomson – Thomson Elementary School
15. John Tyler – Tyler Elementary School
16. John Peter Van Ness – Van Ness Elementary School
17. Joseph Rodman West – West Education Campus
18. Woodrow Wilson – Woodrow Wilson High School
19. C. Melvin Sharpe – Bridges PCS Sharpe Campus
20.William Benning – DC Prep PCS, Benning Elementary
21. Matthew Gault Emery – Emery School (CHOICE Academy)

Parks and recreation

1. James D. Barry – Barry Farm Playground
2. William Benning, Benjamin Stoddert – Benning Stoddert Playground, Garden
3. Robert Brent – Brentwood Playground, Brentwood Hamilton Field
4. James Monroe – Bruce-Monroe Community Garden
5. Matthew Gault Emery – Emery Heights Playground, Garden
6. Henry Foxall – Foxhall Playground
7. Thomas Jefferson – Jefferson Field
8. Guy Mason – Guy Mason Playground
9. William Henry Harrison – Harrison Playground
10. James Greenleaf – King-Greenleaf Playground
11. Benjamin Stoddert – Stoddert Playground
12. Abel P. Upshur – Upshur Playground

Bowser took to Twitter to announce her pleasure with her committee’s recommendations,saying, “”I look forward to reviewing and advancing their recommendations,”

The return tweets from her detractors in response were quick to respond .Interior Secretary David Bernhardt tweeted that no changes were going to happen as long as he was in office. “Not on my watch. Never going to happen,” he tweeted.

The White House also responded to the committee’s report.

“By publishing a plan that recommends potentially removing the Washington Monument, Christopher Columbus Statue, Andrew Jackson Statue, and Jefferson Memorial—among many other ludicrous recommendations—the radically liberal mayor of Washington, D.C., is repeating the same left-wing narrative used to incite dangerous riots: demolishing our history and destroying our great heritage,” White House Press Secretary Kayleigh McEnany said in a statement.

“Our Nation’s capital is rightly filled with countless markers, memorials, and statues to honor and respect the men and women who built this country. President Donald J. Trump believes these places should be preserved, not torn down; respected, not hated; and passed on for generations to come. As long as President Trump is in the White House, the mayor’s irresponsible recommendations will go absolutely nowhere, and as the mayor of our Nation’s capital city—a city that belongs to the American people—she ought to be ashamed for even suggesting them for consideration,” McEnany concluded.

The full report can be read here:

https://mayor.dc.gov/sites/default/files/dc/sites/mayormb/page_content/attachments/DC%20FACES%20Executive%20Summary_r10sm.pdf

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

The video the MSM doesn’t want you to see, RITTENHOUSE

Kyle Rittenhouse cleaning graffiti left by vandals

Only the fascist left domestic terrorist supporting democrat controlled propaganda fake news would stoop so low to attack a law abiding 17 year old American patriot.  Instead of being truthful and saying Kyle Rittenhouse defended himself, they chose to blow smoke up everyone on this planet’s  a$%’s.

 

“The teenager with the long gun scuffled with people near a car dealership and opened fire, allegedly killing two people and wounding a third, a criminal complaint says. Even as police and emergency vehicles raced to the scene and chaotic videos of the fatal encounter appeared on social media, the armed suspect walked past a group of officers unnoticed. He was arrested 30 miles awayin Antioch, Illinois.”

Faith Karimi, CNN

That’s how fake news CNN is spinning a Kenosha shooting where 3 democrat supported adult fascist left domestic terrorist were shot when they attacked a minor, 17 year old Kyle Rittenhouse.

Rittenhouse was 1 of many volunteers that were cleared by law enforcement and were protecting  businesses from being destoyed by democrat supported fascists left domestic terrorist Black Lives Matter(BLM)/Antifa, Muslim Extremists and foreign nationals that have entered the country illegally and are working with BLM causing discourse,  attacking Americans and trying to influence our elections.

 

The defenders stopped the terrorist from burning down a gas station.  They also stopped the terrorist from attacking the police with a flaming dumpster.

The terrorist next move was to set the car lot on fire where Rittenhouse was standing guard.

Video shows convicted felon sex offender terrorist Joseph Rosenbaum, 36, chasing Rittenhouse through the car lot.  Rosenbaum can be seen throwing a molotov(claims eyewitness) at Rittenhouse. We hear a gunshot from unknown source .Rittonhouse turns and shoots seconds before Rosenbaum could grab him.  Rosenbaum goes down and we hear more gunfire from unknown source again.

Rittonhouse goes over to where Rosenbaum is laying and offers help. He calls the police.

A person then decides to use his shirt instead of the first aid kit Rittenhouse was carrying.  The same person tells Rittenhouse to go.away.

Rittenhouse starts making his way to the police line and a mob of domestic terrorist start chasing him.   He trips an falls.  While on the ground a unidentified terrorist runs up and kicks him in the head.  While still on the ground, he gets hit in the head with a skateboard carried by convicted felon and domestic terrorist,  26 year old, Anthony Huber.  Rittenhouse takes the skateboard hit and shoots Huber.

Then convicted felon and domestic  terrorist, 26 year old

Gaige Grosskreutz, armed with a handgun goes after Rittenhouse.  Grosskreutz raises his gun and Rittenhoust shoots him in the arm.

Rittenhouse makes his way to the police where he turns himself in.

Police let him go.

Currently charges have been filed on Rittenhouse which if convicted, could give him a life sentence.

Charges were filed before any sort of criminal investigation took place.  At the time there wasn’t  a crime scene investigation, no ballistic data, meaning they don’t  know if Rittenhouse was the only shooter. Video clearly shows he shot in self defense.

Besides the fact that these were convicted felons attacking a minor, they were terrorist in the act of committing crimes. They had already helped burn and destroy other buildings in the city.

CNN and other fake news outlets are lying about what really happened.

So you can decide for yourself, I found as many videos of that night that I could find.  I placed them in order creating a visual timeline of events.  Keep in mind that these are the actual videos captured by reporters on the scene. I haven’t  blurred anything out so you will be seeing shooting, blood and bodies.  That’s your warning.

This is for educational  purposes only.

 

Rittenhouse doesn’t look like the mass shooter that some media outlets describe him.

Really makes you wonder why they are lying.

The person that interviewed Rittenhouse was 10 feet away from Rosenbaum when he got shot.  He also helped carry Rosenbaum to the car.  He was also at the hospital with Rosenbaum.  You would think that being a reporter he would have some video from the hospital.  They covered every other part of the event.  This is the reporter,

 

This is a short video of the day after.

Is Rittenhouse a Patriot or not?  I going with Patriot.

I have to be honest.  I feel like I just watched a poorly scripted reality show.  But what do I know.

Sources

Photos and video captured by the following people:

Andy Ngo

Drew Hernandez

Brendan Gutenschwager

RichieMcGinniss

Julio_Rosas11

Elijah Schaffer

ShelbyTalcott

FromKalen

 

Apologies if I missed anyone.

“Rittenhouse” and “The next day” are unlisted videos.  They are not monetized.  I made them to share information to the public, free as charged.  For educational purposes only. Fair use.

Respectfully,

Deplorable Patriot

Correction- Rittenhouse did not call police after first shooting.  He actually called a friend of his.

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

The real story: It’s not just a few big Democrat cities that are burning

Demorats have generally ignored rioting in the streets and have suggested that President Trump is the cause of any social disruption. Mainstream media have suggested that the rioting is confined to half a dozen big cities. Republicans have blamed Demorat mayors and governors for not bringing the riots under control.

But fact is, none of us are getting the true picture of what is happening to this country. Protests and riots have occurred in all 50 states. The Army National Guard has been deployed to at least 23 states and the District of Columbia to combat rioters and looters. More than 350 cities and towns have been wracked with unrest—all this while left-wing socialist/communist government officials sit in complacent approval of the mayhem.

Our country is coming apart at the seams. Nero fiddles while Rome burns.

What follows is research published on June 2, 2020 by Mohammed Haddad, writing for Aljazeera. These data are more than two months old.

I have to wonder, how much worse is it now?

https://www.aljazeera.com/indepth/interactive/2020/06/mapping-cities-george-floyd-protests-erupted-200601081654119.html

~ Grif

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

Venezuelan Warns US: Socialism Starts by Destroying Monuments and Censoring Everything

The left’s socialist/communist’s playbook never changes. The reason is simple. It generally achieves its goal of turning free and democratic countries into totalitarian cesspools where a dictatorial government subjugates its citizens and destroys a vibrant capitalist economy all in the name of “equality.” Venezuela is one such socialist utopia.

Venezuela was once the richest and most promising country in Latin America. It has the largest oil reserves in the world, and for a long time it had a growing democracy. But today, its economic and democratic institutions have failed. While inflation skyrockets, food and medicine have become so expensive that for the country’s poor, who now make up a staggering 82 percent of the population, cannot afford to buy them. Many are reduced to eating out of garbage dumps. Theft and murder are endemic, and the ruling Maduro government keeps an iron grip on the people.

Now, Elizabeth Rogliani, an activist who was among the more than two million Venezuelans who have fled their country since dits economy collapsed, has a warning for us.

Andrés Guilarte, who remains in Venezuela, describes his perspective on what socialism will do to the United States if Americans ignore the current turmoil that is dividing the country.

~ Grif

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

The Chinese Communist Party has your data and a lot more.

The Chinese Communist Party(CCP) has your data. The thought of them not having it never entered my mind.  How did it happen?

CCP gains control (short version)

During WWII Japan had occupied about 25% of China. During that time there were three armies at war with each other in China. The Chinese Communist Party(CCP) was at war with the Chinese Nationalist.  Both were at war with Japan.

Japan  had invaded China prior to its involvement in WWII.  Japan’s  weapons were far superior and had air superiority. This combined with a plethora of other problems, China was unable to beat Japan.

By the time Japan was removed from China they had killed at least 25 million Chinese and had committed thousands of war crimes.

During WWII America started helping Chinese Nationalist with there problem with Japan.  After America dropped 2 nuclear bombs on Japan, Russia declared war on Japan.  The result was Japan’s surrender. The CCP says they defeated Japan but it was the Americans and Russia, with the help of Chinese Nationalists that beat Japan.

With Japan out of the picture By 1949 the CCP had defeated the Chinese Nationalist.

It was the 1st of October in 1949 when the leader of the Chinese Communist Party(CCP), Mao Zedong declared the creation of the People’s Republic of China (PRC).

I don’t want to get into details about China’s government structure or their  domestic problems but I will say they have a congress, a president and a judicial branch. It should be noted that their roles are not the same as we have here in the USA. For example, their role of president is primarily a ceremonial role with limited powers.

With that being said, the current president, Xi Jinping, is still the most powerful person in China.  Not because he is president…

President Xi Jinping  is also the paramount leader,. His real power comes from being the General Secretary of the Communist Party,. He is also the general secretary of the Central Committee, and Chairman of the Central Military Commission..

The thing to remember is that the CCP has  total control of China.

Xi  once borrowed a line from China’s first president Mao Zedong: “Government, military, society, education, north, south, east, west—the party leads everything.”

 Xi wants China to  be the super power of the world. He wants the world dependent on China.  He wants other nations  to look at China for leadership like they  look at the USA.  

Should we trust China?  Is China a threat to the USA?  I won’t tell you who you should  trust. That’s  for you to decide, but I will say “yes. China is a threat”

Have you ever heard of Title 7 of China’s national intelligence law? It makes every Chinese National a potential spy.

 

The following comes from an article H.R. McMaster’s wrote, which includes parts written by Howard W. French.

“China intends to establish a new tributary system through a massive effort organized under three overlapping policies, carrying the names “Made in China 2025,” “Belt and Road Initiative,” and “Military-Civil Fusion.”
“Made in China 2025” is designed to help China become a largely independent scientific and technological power. To achieve that goal, the party is creating high-tech monopolies inside China and stripping foreign companies of their intellectual property by means of theft and forced technology transfer. In some cases, foreign companies are forced to enter into joint ventures with Chinese companies before they are permitted to sell their products in China. These Chinese companies mostly have close ties to the party, making routine the transfer of intellectual property and manufacturing techniques to the Chinese government.”
“The “Belt and Road Initiative” calls for more than $1 trillion in new infrastructure investments across the Indo-Pacific region, Eurasia, and beyond. Its true purpose is to place China at the hub of trade routes and communications networks. While the initiative at first received an enthusiastic reception from nations that saw opportunities for economic growth, many of those nations soon realized that Chinese investment came with strings attached.”
“The Belt and Road Initiative has created a common pattern of economic clientelism. Beijing first offers countries loans from Chinese banks for large-scale infrastructure projects. Once the countries are in debt, the party forces their leaders to align with China’s foreign-policy agenda and the goal of displacing the influence of the United States and its key partners. Although Chinese leaders often depict these deals as win-win, most of them have just one real winner.”
The Military-Civil Fusion policy is the most totalitarian of the three prongs. In 2014 and then again in 2017, the party declared that all Chinese companies must collaborate in gathering intelligence. “Any organization or citizen,” reads Article 7 of China’s National Intelligence Law, “shall support, assist with, and collaborate with the state intelligence work in accordance with the law, and keep the secrets of the national intelligence work known to the public.” Chinese companies work alongside universities and research arms of the People’s Liberation Army. Military-Civil Fusion encourages state-owned and private enterprises to acquire companies with advanced technologies, or a strong minority stake in those companies, so that the technologies can be applied for not only economic but also military and intelligence advantage. It fast-tracks stolen technologies to the army in such areas as space, cyberspace, biology, artificial intelligence, and energy. In addition to espionage and cybertheft by the Ministry of State Security, the party tasks some Chinese students and scholars in the U.S. and at other foreign universities and research labs with extracting technology.”
“Sometimes U.S. defense funding supports China’s technology transfers. One of many examples is the Kuang-Chi Group, described in the Chinese media as “a military-civilian enterprise.” The Kuang-Chi Group was founded largely on the basis of U.S. Air Force–funded research into meta-materials at Duke University.”

If you have been paying attention and  doing your own research  you might  agree with  French and McMasters. I’m not a fan of McMasters political career in the White House but on this topic he appears to be on target.

Here are 7 more quotes of McMasters.

  1. “Chinese espionage is successful in part because the party is able to induce cooperation, wittingly or unwittingly, from individuals, companies, and political leaders. Companies in the United States and other free-market economies often do not report theft of their technology, because they are afraid of losing access to the Chinese market, harming relationships with customers, or prompting federal investigations.”
  2. “Many universities, research labs, and companies in countries that value the rule of law and individual rights are witting or unwitting accomplices in China’s use of technology to repress its people and improve the Chinese military’s capabilities. For dual-use technologies, the private sector should seek new partnerships with those who share commitments to free-market economies, representative government, and the rule of law, not with those acting against these principles. Many companies are engaged in joint ventures or partnerships that help China develop technologies suited for internal security, such as surveillance, artificial intelligence, and biogenetics. In one of many examples, a Massachusetts-based company sold DNA-sampling equipment that has helped the Chinese government track Uighurs in Xinjiang. (The company has ended such sales.) Companies that knowingly collaborate with China’s efforts to repress its own people or build threatening military capabilities should be penalized.”
  3. “Many Chinese companies directly or indirectly involved in domestic human-rights abuses and violation of international treaties are listed on American stock exchanges. Those companies benefit from U.S. and other Western investors. Tougher screening of U.S., European, and Japanese capital markets would help restrict corporate and investor complicity in China’s authoritarian agenda. Free-market economies like ours control the majority of the world’s capital, and we have far more leverage than we are employing”
  4. “China’s use of major telecommunications companies to control communications networks and the internet overseas must be countered. There should no longer be any dispute concerning the need to defend against the multinational technology company Huawei and its role in China’s security apparatus. In 2019, a series of investigations revealed incontrovertible evidence of the grave national-security danger associated with a wide array of Huawei’s telecommunications equipment. Many Huawei workers are simultaneously employed by China’s Ministry of State Security and the intelligence arm of the People’s Liberation Army. Huawei technicians have used intercepted cell data to help autocratic leaders in Africa spy on, locate, and silence political opponents. A priority area for multinational cooperation among free societies should be the development of infrastructure, particularly 5G communications, to form trusted networks that protect sensitive and proprietary data.”
  5. “We must defend against Chinese agencies that coordinate influence operations abroad—such as the Ministry of State Security, the United Front Work Department, and the Chinese Students and Scholars Association. At the same time, we should try to maximize positive interactions and experiences with the Chinese people. The United States and other free and open societies should consider issuing more visas and providing paths to citizenship for more Chinese—with proper safeguards in place. Chinese who engage with citizens of free countries are the ones who are most likely to question their government’s policies—whether from abroad or when they return home.:”
  6. “The U.S. and other free nations should view expatriate communities as a strength. Chinese abroad—if protected from the meddling and espionage of their government—can provide a significant counter to Beijing’s propaganda and disinformation. Investigations and expulsions of Ministry of State Security and other agents should be oriented not only toward protecting the targeted country but also toward protecting the Chinese expatriates within it.”
  7. “Without effective pushback from the United States and like-minded nations, China will become even more aggressive in promoting its statist economy and authoritarian political model. For me, the state visit to Beijing—and exposure to China’s powerful combination of insecurity and ambition—reinforced my belief that the United States and other nations must no longer adhere to a view of China based mainly on Western aspirations. If we compete aggressively, we have reason for confidence. China’s behavior is galvanizing opposition among countries that do not want to be vassal states. Internally, the tightening of control is also eliciting opposition. The bravado of Li Keqiang and other officials may be intended to evoke the idea of China as sovereign of “everything beneath heaven,” but many beneath heaven do not, and must not, agree.

 

Because of China’s skill in propaganda and the enormous amount of fake news I can understand how some people might not be aware of  Xi’s ambitions, the CCP’s behavior and how China has infiltrated  America.  If you are one of those people,  you shouldn’t be in the dark any longer. McMasters analysis is accurate. Clearly he sees that any American interaction with China, be it a partnership, investment, opening a business in china, helping a Chinese National open a business in America  or any involvement with China is not in the best interest of America
  It only creates opportunity for espionage.
 What the average person sees as a business transaction he probably sees a opportunity  for espionage. I get the impression that he knows that chinese espionage  occurs  daily in the USA.
  Under the current conditions with China, I’m sure he would like to see all activities with China  stop unless immediate action is taking to stop the espionage.  I agree with him because he’s right.(on this matter).
*McMasters  remarks come from his book, Battlegrounds: The Fight to Defend the Free World by H. R. McMaster.  

They can also be found at kyotoreview.org, chinas-three-pronged-strategy-on-regional-connectivity

And https://nationalcybersecurity.com/h-r-mcmaster-what-china-wants-espionage-surveillance-ceo-businesssecurity/

Now that you know what you thought to be true about the CCP and China is actually true, take a look around and see if anything from China has spilled over into your life.

I looked around and found that in both goods and services, China has been in my life for quite a long time..

China is everywhere in the USA. They own property, businesses, banks and politicians. They have also had quite a bit of success on the internet..  That’s  where we need to pay close attention. No one should be using Chinese apps

We see Tencent Holdings all over the news.  They definitely are a security risk. They have access to millions of Americans. They have large amounts of cash invested in American companies. Reddit  and Discord are popular platforms  that Tencent has invested substantial amounts of money.

I’ve talked about this in the past.  You don’t  give 150 million dollars to someone (Reddit) and  say “here’s  my money, contact me when you turn a profit.”  That money gives them partial ownership of the company.  That money gets them influence throughout the whole company.  That influence finds its way to the customer. If you use Reddit, you can be sure Tencent Holdings has some of your data. Don’t forget platforms like Reddit have influence in our elections.

Personally, I think it’s  too late.  China, the CCP has our data.  They have  also infiltrated our government.  What we need to do is remove the problem and see that it doesn’t  happen again. I know exactly who should be the first to go.

There is one company that I think poses the most danger to our country.  It’s  how the CCP has managed to find it’s way into you and your families daily lives.  It’s  worked its  way into  our government and is able to influence voters in our elections..  I’m talking about ZOOM.  The same company that schools use to teach children. The same company that has been making millions during the pandemic. The only company that I’ve seen under investigation by the FBI because of a security risk, but was still authorized for use in our government…(see image).

 

 

For PDF click here

You might be saying, ” ZOOM is an American company, what’s  the problem?”

Here are a few example problems of many .   While reading it, keep in mind article 7 and everything else McMasters mentioned.

Sequoia Capital  has a minimum investment  of 100 million dollars in Zoom.. Sequoia is listed on “Our team” page at Zoom.  The firm has offices in Menlo Park, Singapore, Bengaluru, Mumbai, New Delhi, Hong Kong, Shanghai, Beijing, and Tel Aviv.   Sequoia has numerous investors located in China.  Zoom  has many big investors with branches in China.  Think Article 7 + more.

Zoom as of January 2020 has 2,532 full time employees.  1,396 worked in the USA. Around 700 of the remaining employees work at their research and development location in China. This location alone is a huge risk. To make improvements, research and development is going to need data.  User data..  The facility in China will have employees that are hired locally.  China wouldn’t allow the business exist there if they didn’t. Article 7 risk + more

Zoom cannot guarentee their investors that data and intellectual property under their control is safe. In their annual report they admit that they have had security breaches in the past and imore breaches  they cannot defend against will happen in the future.  Thay also  admit that in some countries they may not be able to protect data. Below is documentation  where they mention these security risks.

 

 

 

 

 

 

 

 

Zoom  has history of getting caught routing data to China.  They say “it was a mistake.  It’s the only time it has ever happened.”  I see it like this, You catch a long time employee stealing. They say it was their first time.  I say, “no. It’s the first time they  got caught. They’ve been stealing since the beginning.”  ZOOM had been doing it since day one.

Taiwan banned zoom for routing data to China.

Singapore teachers banned zoom because of hackers.

ZOOM = PROBLEMS

The following are screenshots of search results that come up when I Google Zoom.

 

So how did Zoom get approved for government  use? FedRamp approved  Zoom.  FedRamp is. part of the General Services administration (GSA) . Technically GSA is part of the executive branch, but it functions on its own.

I believe  Trump saw some problems with FedRamp in 2017.  He signed in an executive order that made the head of departments solely responsible for online security in their departments.

Link

  1. Democrats decided to rewrite FedRamp and pass legislation on it. What they did was create  more non elected job positions that have access to data  in information they shouldn’t be allowed to have loopinformation non elected people should not have.  One of the positions would give them access to Executive  branch information/activity congress has never had in the past.  Basically Democrats created a “mole” that was to report to congress  Another example of Democrats overreach. They created an additional 20 million dollar expense taxpayers neverr had before..

On February 5, 2020 when democrats and the fake news started  advancing their planned pandemic, the democrats in congress suspended the rules and passed the FedRamp rewrite.

Link

When it comes to Zoom, you will see democrats complaining about Zoom.  Personally I think it’s  part of their grift they are pulling on the USA. They do it to control the  conversation.  That way when a real problems comes along they can say “were on it, we see the problem and were taking care of it”.  It’s the only solution I could come up with.  Zoom is on the democrats top donor list.  100% of donations to political parties made by Zoom goes to the left. They are protecting Zoom.

The man behind the donations is the founder and current CEO of Zoom.

Eric S. Yuan(Yuán Zhēng) , Born in 1970, in China. He moved to the USA in 1997 . One of the founders of WebEx, Min Zhu  gave him a job.  WebEx was aquired by Cisco in 2007. He left the company in 2011 after making a pitch and getting denied. That’s when he started his first business which led to his first release  of Zoom in 2012..

,,*Yuan once mentioned that WebEx is still using code he wrote in 1998

*After his failure of promoting his idea, he left and took his idea with him.  It’s always been my understanding that any ideas you come up with while working for a company,  those ideas belong to the company and you cannot take them with you.

*Min Zhu resigned in 2005 and left the USA.. “Zhu continues to serve as a science and technology advisor to the municipal government of San Jose,”

“It does not surprise me that San Jose, located in California would have a citizen of a foreign communist country. as their science and technology advisor. It goes hand in hand with the lawless behavior of the democrat party in California.  The situation that  requires more attention in California  is Governor Newsom hijacking  the residents of California pandemic relief  unemployment insurance money. Parents and their children are starving losing their homes because they have not received their money from the federal government.  Newsom blames  the unemployment office but he is the only person that can stop the flow of money. 
What also requires attention is Newsom forcing mail in ballots.  Even if you go to a polling place to vote they give you a mail in ballot.  It shouldn’t be anymore obvious what the Democrats are doing. They’re rigging the election.

If any  American corporations have  branch locations in China, business partners or accepted big investments out of China and say they don’t have any security  risks, they are lying.  With the current laws in China, any involvement with China is a open door for espionage.  This is not a conspiracy theory, This is a fact. A person only needs to take a minute to look at some of their laws.

National Intelligence Law of the People’s Republic of China

Chapter I: General Provisions

Article 1: In order to strengthen and guarantee national intelligence work, and safeguard national security and interests, on the basis of the Constitution, this Law is formulated.

Article 2: National intelligence work shall persist in an overall national security view, provide intelligence reference for major national policy decisions, provide intelligence support for preventing and dissolving risks endangering national security, and safeguard the national regime, sovereignty, unity, independence and territorial integrity, the prosperity of the people, economic and social sustainable development and other major national interests.

Article 3: The State establishes and completes a concentrated and united national intelligence structure with a coordinated division of work, which is scientific and highly effective.

Central and State security leadership bodies exercise uniform leadership over national intelligence work, formulate principles and policies for national intelligence work, standardize the overall development of national intelligence work, establish and complete coordination mechanisms for national intelligence work, comprehensively coordinate national intelligence work in all areas, research and decide upon major matters in national intelligence work.

The Central Military Commission uniformly leads and organizes military intelligence work.

Article 4: National principles shall persist in the principles of the integration of open work and classified work, the integration of specialized work and the mass line, and the integration of division of work and responsibilities, and coordination and cooperation.

Article 5: Intelligence organs of national security bodies and public security bodies, as well as military intelligence organs (hereafter jointly named national intelligence work organs) will, according to the division of work and responsibilities, provide mutual assistance, do intelligence work and launch intelligence activities well. All relevant national bodies shall, on the basis of their duties, tasks and the division of work, cooperate closely with national intelligence work organs.

Article 6: All national bodies, military forces, political parties, social groups, enterprise and undertaking organizations, as well as citizens, shall support, cooperate with and collaborate in national intelligence work, and maintain the secrecy of national intelligence work they are aware of.

Article 7: National intelligence work shall be conducted according to the law, respect and guarantee human rights, and safeguard the lawful rights and interests of citizens and organizations.

Article 8: The State supports individuals supporting or assisting in national intelligence work, and rewards those making major contributions.

Chapter II: National intelligence work organs and powers

Article 9: National intelligence work organs launch intelligence work inside and outside of the borders on the basis of work requirements, and by using the necessary methods, means and channels according to the law.

Article 10: National intelligence work organs shall lawfully collect and process relevant information on foreign bodies, organizations and individuals engaged in, or inciting or assisting others to engage in, or domestic bodies, organizations and individuals who collude with foreign bodies, organs or individuals to engage in harm to the national security and interests of the People’s Republic of China

Article 11: Foreign bodies, organizations or individuals engaging in acts harming the national security and interests of the People’s Republic of China within Chinese borders must be punished by law. National intelligence work organs shall provide intelligence reference and evidence for preventing, curbing and punishing the abovementioned acts.

Article 12: National intelligence work organs may establish a collaborative relationship with relevant individuals and organizations, and entrust them with carrying out relevant work.

Article 13: Relevant departments in all levels’ People’s Governments, enterprise and undertaking work units, other organizations and citizens shall provide the necessary assistance to national intelligence work organs lawfully carrying out their work, and maintain secrecy.

Article 14: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, after undergoing strict approval procedures, adopt technological reconnaissance measures.

Article 15: National intelligence work bodies’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, acquaint themselves with relevant bodies, organizations, enterprise or undertaking work units and individuals, inquire into relevant circumstances, consult or obtain relevant files, materials and goods.

Article 16: National intelligence work organs’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, enter relevant limited-access localities and premises; they are also permitted to enjoy passage privilege to carry out urgent task requirements, after showing corresponding credentials.

National intelligence organs’ work personnel may, on the basis of work requirements and according to relevant State regulations, use with priority or lawfully commandeer transportation equipment, telecommunications equipment, spaces and buildings of bodies, organizations, enterprise and undertaking work units and individuals, when necessary, they may set up relevant work premises, equipment and facilities, after completion of the task, they shall timely restore or recover the original state, and pay corresponding fees according to regulations; where damage is caused, it shall be compensated.

Article 17: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, request Customs, border control, inspection and quarantine and other such bodies to provide exemption from inspection and other such conveniences.

Article 18: National intelligence work organs and their work personnel shall, during work, strictly act according to the law, they may not exceed their powers, abuse their powers, or engage in irregular favouritism, they may not violate the lawful rights and interests of citizens and organizations, and may not divulge State secrets, commercial secrets or personal privacy.

Chapter III: National intelligence work guarantees

Article 19: The State strengthens the construction of national intelligence work organs, exercises special management over their organic structuring, staffing, personnel allocation, funding and assets, and provides special guarantees.

The State establishes personnel employment, recruitment, assessment, training, remuneration and retirement management structures suited to intelligence work.

Article 20: National intelligence work organs shall adapt to intelligence work requirements, and raise their ability to carry out intelligence work.

Article 21: When the personal security of national intelligence work organs’ personnel or their close relatives is threatened due to their exercising their task, or the personal security of individuals with whom national intelligence work bodies have established a cooperative relationship or their close relatives is threatened because of their assistance to national intelligence work, relevant State departments shall adopt the necessary measures to provide protection and succour.

Article 22: Public security, civil affairs, finance, health, education, human resources and social security, as well as other relevant departments and State-owned enterprise and undertaking work units shall cooperate with national intelligence work bodies to properly arrange for persons in need of placement due to contributions to national intelligence work.

Article 23: National intelligence work organs shall establish supervision and security inspection structures, conduct supervision of their personnel’s observance of discipline, and lawfully adopt the necessary measures to regularly or irregularly conduct security inspections.

Article 24: Any individual or organization has the right to report and accuse instances of national intelligence work organs and their personnel exceeding their powers, abusing their powers, engaging in irregular favouritism and other unlawful acts to higher-level organs or relevant departments. Relevant organs or departments receiving reports and accusations shall timely investigate the matter, and report the investigation results to the reporter or accuser.

No other person or organization may suppress or retaliate against individuals or organizations lawfully reporting on or accusing national intelligence work organs and their personnel.

Chapter IV: Legal liability

Article 25: Those violating the relevant provisions of this Law and impede national intelligence work organs and their personnel from carrying out intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to a warning of administrative detention of less than 15 days by the national public security body, or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 26: Those divulging State secrets involving national intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to administrative detention of less than 15 days by the national public security body or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 27: National intelligence work personnel exceeding their powers, abusing their power, engaging in irregular favouritism, or divulging State secrets, commercial secrets or personal privacy will be punished according to the law; where it constitutes a crime, legal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: This Law takes effect on the date of promulgation.

That was the draft version. For the final version click 2017_PRC_NationalIntelligenceLaw

Zoom is a perfect example of what McMasters talked about.. After reading China’s  laws there shouldn’t be any questions.  Zoom needs to be  removed for government use.  Every  American business connected to China needs to be investigated.

China is not hiding their intentions.  Americans are being  lied to and sold out. Yet, nobody seems to care.

McMasters  knowledge and experience in these matters is unique. If an enemy had access to what he knows. government infiltrations would be almost impossible to stop..

Look at Zoom.  Even with a FBI investigation and a history of security issues. They still  get approved for government use.  It’s  almost like they have a friend on the inside helping them.

What’s  H.R. McMasters up to today? The last time I checked he was doing pretty well. This year he received $450,000 in stock with another $30,000 with an additional $10,000 for being on the audit team. That was just for one job.

That’s  right,  McMasters  sold out. He is currently on the Board of Directors for Zoom.

For full press release click Zoom Adds Board Member H.R. McMaster and Head of Global Public Policy and Government Relations Jonathan Kallmer to Leadership 

Additional  information

https://zoom.us/partners

https://www.forbes.com/sites/peterhigh/2017/03/06/zoom-ceos-promise-to-his-wife-helped-inspire-a-1-billion-valued-company/amp/

https://zoom.us/team

 

China has your data.  Will you allow this to continue? The silent majority must stand up. It’s  time for a great awakening

 

Respectfully,

Deplorable Patriot

 

 

 

 

 

 

 

 

 

 

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

The real Bye Bye Joe Biden. Resurfaced video of Joe Biden.

This  short video reveals a side of “Bye Bye Joe Biden the Fake News won’t  show you.

We learn that Biden has a history of plagiarism and lying.  We learn that out of a class of 85 people in law school, he finished at #76  in his class.

Biden also confesses  to being “dumb” and will “do dumb things in the future”.  That was just about the only honest thing Joe has ever said.  It’s  the future and “Yes”, Joe has done plenty of dumb things.

Fortunately we don’t get to hear from Joe Biden during the  Democrats Convention.  Fake News says John Kasich expected to speak at Democratic National Convention for Joe Biden.

Not that I would watch it but does  anyone else see a problem with this?

*I found thie vi deo on Dinesh D’Souza’s YouTube page. Thank you Dinesh.

 

 

To give equal exposure time, here is a video President Trump uploaded to Twitter.  Twitter removed the video.

 

 

Respectfully,

Deplorable Patriot

Please follow and like us:

Share and Enjoy !

0Shares
0


0

 

They Die For You

I pray that those who would destroy our country and our way of life would just acknowledge this simple truth. But I doubt that they will.

The truth will set you free.

~ Grif

Please follow and like us:

Share and Enjoy !

0Shares
0


0