Category Archives: Deep State

Biden lackey Ron Klain in 2014 stated via Twitter that elections are rigged

Ron Klain and Biden

Meet Ron Klain, future White House Chief of Staff should Biden get steal the presidency.

Klain has worked with Biden and demorats in the past, from Wikipedia: “Ronald A. Klain is an American political consultant, civil servant, and attorney. A member of the Democratic Party, he served as chief of staff to two U.S. vice presidents: Al Gore (1995–1999) and Joe Biden (2009–2011). After there were reported Ebola virus cases in the United States, he was appointed by Barack Obama to serve as the White House Ebola Response Coordinator in late 2014, serving into early 2015.”

Back in 2014, Klain had an opinion about Americans believing that elections are rigged:

The same Klain who said that Obama/Biden Administration’s handling of Swine flu was “pure luck.”

Buckle up if Biden gets in the White House. The Swamp will achieve even more power than you could ever imagine.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

More from Project Veritas: Federal agents “coerce” USPS whistleblower Hopkins to water down story

God Bless James O’Keefe for exposing the rotten truth of what the demorats have done in this election. Some prayers might be in order for James’ safety.

I hope President Trump and his legal team are ALL OVER THIS!

See also:

Project Veritas exposes USPS voter ballot shenanigans in Michigan
Project Veritas exposes Google: Program manager confirms election interference in favor of Biden search “skewed by owners and drivers of the algorithm”

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Tucker Carlson calls out the voter fraud other media won’t mention

I know, I know…the media/demorats/Big Tech WON’T ask these questions. You’ll even been censored and blocked on Twitter and Facebook for daring to mention some of these stories:

Fox has been taking a well-deserved beating lately for their bias. Tucker is the last sane voice there. Hope he moves on to an outlet that has not lost its credibility.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

How Ol’ Joe won: Pallets Full of Ballots

Biden should know a thing or two about large pallet transfers

Video NSFW due to language.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Project Veritas exposes USPS voter ballot shenanigans in Michigan

More proof the demorats are trying to steal this election.

Go get ’em President Trump!

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Ruh roh: Laptop connected to Hunter Biden linked to FBI money laundering probe

Don’t hold your breath that anything will become of this. Demorats in the swamp are never held responsible for anything.

Heck, I’m sure the media won’t even report it because they’ll consider it “disinformation.”

From Fox News:

The FBI’s subpoena of a laptop and hard drive purportedly belonging to Hunter Biden came in connection with a money laundering investigation in late 2019, according to documents obtained by Fox News and verified by multiple federal law enforcement officials who reviewed them.

It is unclear, at this point, whether the investigation is ongoing or if it was directly related to Hunter Biden.

Multiple federal law enforcement officials, as well as two separate government officials, confirmed the authenticity of these documents, which were signed by FBI Special Agent Joshua Wilson. Wilson did not immediately respond to Fox News’ request for comment.

One of the documents, obtained by Fox News, was designated as an FBI “Receipt for Property” form, which details the bureau’s interactions with John Paul Mac Isaac, the owner of “The Mac Shop” who reported the laptop’s contents to authorities.

The document has a “Case ID” section, which is filled in with a hand-written number: 272D-BA-3065729.

According to multiple officials, and the FBI’s website, “272” is the bureau’s classification for money laundering, while “272D” refers to “Money Laundering, Unknown SUA [Specified Unlawful Activity]—White Collar Crime Program,” according to FBI documents. One government official described “272D” as “transnational or blanket.”

“BA” indicates the case was opened in the FBI’s Baltimore field office, sources said.

The documents state that the subpoena was carried out in Wilmington, Del., which falls under the jurisdiction of the FBI’s Baltimore Field Office.

“The FBI cannot open a case without predication, so they believed there was predication for criminal activity,” a government official told Fox News. “This means there was sufficient evidence to believe that there was criminal conduct.”

Read the whole story here.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Kamala Harris lied on her Financial Disclosures and is connected to multiple campaign finance violations

Kamala Harris neglected to include all her financial information in her Financial Disclosure Reports(FDR) required by the Senate. Since her first day in the Senate until 7/8/2019 she neglected to disclose one of her pension plans. That plan is named “Legislatures Retirement System”.

It wasn’t until 7/8/2019 when she finally decided to disclose the pension plan.

While filing her FDR that was required of her at the time, she  filed amended FDR’s for the years of 2015. 2016, 2017, 2018.  The amended version filed far past the allowed deadlines. Years past.

The new amended versions now include the pension plan.

If a Senator makes a error or mistakenly leaves something out of their FDR’s, they are allowed to amend their disclosure report. They are expected to have the amendment filed that same year with a reasonable excuse.

This isn’t the case with Harris. Each year she made amendments to her FDR’s she neglected to include the Pension plan. She filed at least 8 times in 4 years and didn’t include the pension plan. She really doesn’t have an excuse for her negligence.

The following images are screenshots of pages from three current amended FDR’s.

Because of the size of the files I’ve only included pages from the reports that show the  pension plan. For the same reason I’ve also left out the original FDR’s. Not to worry because I”ve included links to the original FDR’s, amended FDR’s along with sources to everything mentioned here today. These can be found at the bottom of the page.

 

 

 

 

As you can see all of these were filed at the same time and day in 2019.

It’s important to understand that a Senator can be charged with a crime if they fail to report any required information.

Having to amend the FDR every year makes a person question her motives. Withholding information then adding it on 4 years later is criminal.

The following is a basic overview of some of the Financial Disclosure rules.

Public disclosure of a public official’s personal financial interest is often considered the key component to an effective code of conduct.  The drafters of the original Senate Code of Official Conduct in the 95th Congress considered “full and complete disclosure” to be the heart of the Code of Conduct. Pursuant to statute and Senate rules, Members, officers, certain employees of the Senate (including fellows and government employees detailed to the Senate), and Senate candidates are required to file comprehensive public financial disclosure reports. The Senate has required public reporting by statute and by Senate Rule since 1978.” 

Members, officers, and certain employees of the United States Senate, related offices, and candidates for the Senate are required by Title I of the Ethics in Government Act of 1978, as amended (the “Act,” 5 U.S.C. app., Section 101 et seq., also adopted as Senate Rule 34) and Senate Rule 41.1 to file Financial Disclosure Reports with the Secretary of the Senate, Office of Public

“The Act gives the Senate Select Committee on Ethics  the authority to administer the law for the Senate, promulgate the Senate Financial Disclosure Report Forms and Instructions, and issue advisory opinions regarding the Act for the Senate and related offices and Senate candidates.”

In addition to any Committee action, the Ethics in Government Act authorizes the Attorney General of the United States to seek a civil penalty of up to $50,000 against an individual who knowingly and willfully falsifies or fails to file or to report any required information.  Moreover, anyone who knowingly and willfully falsifies or conceals any material fact in a statement to the Government may be subject to fines, criminal prosecution, and sentencing.
See 5 U.S.C. appx. § 104(a)”.

I should point out that it doesn’t appear that she disclosed the pension plan when she filed her taxes. To be fair, it might not be required.  I’m not an expert on taxes.  I’ll  provide a link  to the tax forms she has released to the public.  I should mention that the documents appear to be incomplete and there is no way of knowing if these are the actual forms she gave to the IRS.

*Tax forms revealed,  Kamala Harris donated her clothes to Goodwill and used the receipt for a $15,000 write off on her taxes

It looks like  Harris only updated her disclosures when she decided to run for president.  This sort of criminal behavior is to be expected from Harris.  If you were to look at her campaign  at the Federal Election  Commission(FEC)  you would find that her “Kamala Harris for the People” committee and her “Kamala Harris for Senate” committee are connected to multiple  Campaign Finance violations. The most frequent violation is for accepting donations from ineligible sources.  Joe Biden has the same problems but by far more.  I’ll discuss that in the near future.  I should mention that many of the ineligible sources are the same in both the Biden and Harris committees.

  Here is examples.  Names have been redacted because of FEC laws.

 

If you  look at the entry that is dated 11/30/19 the unredacted page would show that this is the same person.  That many donations in one day should raise some flags.   Sometimes there will be donations almost daily through out  the year,  from the same sources.  That should also raise some flags.

Clicking on the names of the committees above will take you to the FEC pages I just mentioned.  Just open the RFAI files.

*Closer examination of people/businesses  on the receiving end  of some of  her committee  disbursements  will reveal that she paid at least one business that is using an address that comes up vacant.

It doesn’t matter how you look at it, Kamala Harris is a liar and a  criminal.

Files and sources click here

Respectfully,

Deplorable Patriot

**** Special thanks to @AOU or @PMYB2, at  POAL for taking care of that DMCA problem.

For educational purposes only

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The Comey Bunch

Some heads need to roll for what these people did to President Trump. I’m not going to hold my breath that it will happen any time soon. Justice is an unfamiliar concept to those in the DC Swamp.

So guess we can try and have a little laugh about it…

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The video the MSM doesn’t want you to see, RITTENHOUSE

Kyle Rittenhouse cleaning graffiti left by vandals

Only the fascist left domestic terrorist supporting democrat controlled propaganda fake news would stoop so low to attack a law abiding 17 year old American patriot.  Instead of being truthful and saying Kyle Rittenhouse defended himself, they chose to blow smoke up everyone on this planet’s  a$%’s.

 

“The teenager with the long gun scuffled with people near a car dealership and opened fire, allegedly killing two people and wounding a third, a criminal complaint says. Even as police and emergency vehicles raced to the scene and chaotic videos of the fatal encounter appeared on social media, the armed suspect walked past a group of officers unnoticed. He was arrested 30 miles awayin Antioch, Illinois.”

Faith Karimi, CNN

That’s how fake news CNN is spinning a Kenosha shooting where 3 democrat supported adult fascist left domestic terrorist were shot when they attacked a minor, 17 year old Kyle Rittenhouse.

Rittenhouse was 1 of many volunteers that were cleared by law enforcement and were protecting  businesses from being destoyed by democrat supported fascists left domestic terrorist Black Lives Matter(BLM)/Antifa, Muslim Extremists and foreign nationals that have entered the country illegally and are working with BLM causing discourse,  attacking Americans and trying to influence our elections.

 

The defenders stopped the terrorist from burning down a gas station.  They also stopped the terrorist from attacking the police with a flaming dumpster.

The terrorist next move was to set the car lot on fire where Rittenhouse was standing guard.

Video shows convicted felon sex offender terrorist Joseph Rosenbaum, 36, chasing Rittenhouse through the car lot.  Rosenbaum can be seen throwing a molotov(claims eyewitness) at Rittenhouse. We hear a gunshot from unknown source .Rittonhouse turns and shoots seconds before Rosenbaum could grab him.  Rosenbaum goes down and we hear more gunfire from unknown source again.

Rittonhouse goes over to where Rosenbaum is laying and offers help. He calls the police.

A person then decides to use his shirt instead of the first aid kit Rittenhouse was carrying.  The same person tells Rittenhouse to go.away.

Rittenhouse starts making his way to the police line and a mob of domestic terrorist start chasing him.   He trips an falls.  While on the ground a unidentified terrorist runs up and kicks him in the head.  While still on the ground, he gets hit in the head with a skateboard carried by convicted felon and domestic terrorist,  26 year old, Anthony Huber.  Rittenhouse takes the skateboard hit and shoots Huber.

Then convicted felon and domestic  terrorist, 26 year old

Gaige Grosskreutz, armed with a handgun goes after Rittenhouse.  Grosskreutz raises his gun and Rittenhoust shoots him in the arm.

Rittenhouse makes his way to the police where he turns himself in.

Police let him go.

Currently charges have been filed on Rittenhouse which if convicted, could give him a life sentence.

Charges were filed before any sort of criminal investigation took place.  At the time there wasn’t  a crime scene investigation, no ballistic data, meaning they don’t  know if Rittenhouse was the only shooter. Video clearly shows he shot in self defense.

Besides the fact that these were convicted felons attacking a minor, they were terrorist in the act of committing crimes. They had already helped burn and destroy other buildings in the city.

CNN and other fake news outlets are lying about what really happened.

So you can decide for yourself, I found as many videos of that night that I could find.  I placed them in order creating a visual timeline of events.  Keep in mind that these are the actual videos captured by reporters on the scene. I haven’t  blurred anything out so you will be seeing shooting, blood and bodies.  That’s your warning.

This is for educational  purposes only.

 

Rittenhouse doesn’t look like the mass shooter that some media outlets describe him.

Really makes you wonder why they are lying.

The person that interviewed Rittenhouse was 10 feet away from Rosenbaum when he got shot.  He also helped carry Rosenbaum to the car.  He was also at the hospital with Rosenbaum.  You would think that being a reporter he would have some video from the hospital.  They covered every other part of the event.  This is the reporter,

 

This is a short video of the day after.

Is Rittenhouse a Patriot or not?  I going with Patriot.

I have to be honest.  I feel like I just watched a poorly scripted reality show.  But what do I know.

Sources

Photos and video captured by the following people:

Andy Ngo

Drew Hernandez

Brendan Gutenschwager

RichieMcGinniss

Julio_Rosas11

Elijah Schaffer

ShelbyTalcott

FromKalen

 

Apologies if I missed anyone.

“Rittenhouse” and “The next day” are unlisted videos.  They are not monetized.  I made them to share information to the public, free as charged.  For educational purposes only. Fair use.

Respectfully,

Deplorable Patriot

Correction- Rittenhouse did not call police after first shooting.  He actually called a friend of his.

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The Chinese Communist Party has your data and a lot more.

The Chinese Communist Party(CCP) has your data. The thought of them not having it never entered my mind.  How did it happen?

CCP gains control (short version)

During WWII Japan had occupied about 25% of China. During that time there were three armies at war with each other in China. The Chinese Communist Party(CCP) was at war with the Chinese Nationalist.  Both were at war with Japan.

Japan  had invaded China prior to its involvement in WWII.  Japan’s  weapons were far superior and had air superiority. This combined with a plethora of other problems, China was unable to beat Japan.

By the time Japan was removed from China they had killed at least 25 million Chinese and had committed thousands of war crimes.

During WWII America started helping Chinese Nationalist with there problem with Japan.  After America dropped 2 nuclear bombs on Japan, Russia declared war on Japan.  The result was Japan’s surrender. The CCP says they defeated Japan but it was the Americans and Russia, with the help of Chinese Nationalists that beat Japan.

With Japan out of the picture By 1949 the CCP had defeated the Chinese Nationalist.

It was the 1st of October in 1949 when the leader of the Chinese Communist Party(CCP), Mao Zedong declared the creation of the People’s Republic of China (PRC).

I don’t want to get into details about China’s government structure or their  domestic problems but I will say they have a congress, a president and a judicial branch. It should be noted that their roles are not the same as we have here in the USA. For example, their role of president is primarily a ceremonial role with limited powers.

With that being said, the current president, Xi Jinping, is still the most powerful person in China.  Not because he is president…

President Xi Jinping  is also the paramount leader,. His real power comes from being the General Secretary of the Communist Party,. He is also the general secretary of the Central Committee, and Chairman of the Central Military Commission..

The thing to remember is that the CCP has  total control of China.

Xi  once borrowed a line from China’s first president Mao Zedong: “Government, military, society, education, north, south, east, west—the party leads everything.”

 Xi wants China to  be the super power of the world. He wants the world dependent on China.  He wants other nations  to look at China for leadership like they  look at the USA.  

Should we trust China?  Is China a threat to the USA?  I won’t tell you who you should  trust. That’s  for you to decide, but I will say “yes. China is a threat”

Have you ever heard of Title 7 of China’s national intelligence law? It makes every Chinese National a potential spy.

 

The following comes from an article H.R. McMaster’s wrote, which includes parts written by Howard W. French.

“China intends to establish a new tributary system through a massive effort organized under three overlapping policies, carrying the names “Made in China 2025,” “Belt and Road Initiative,” and “Military-Civil Fusion.”
“Made in China 2025” is designed to help China become a largely independent scientific and technological power. To achieve that goal, the party is creating high-tech monopolies inside China and stripping foreign companies of their intellectual property by means of theft and forced technology transfer. In some cases, foreign companies are forced to enter into joint ventures with Chinese companies before they are permitted to sell their products in China. These Chinese companies mostly have close ties to the party, making routine the transfer of intellectual property and manufacturing techniques to the Chinese government.”
“The “Belt and Road Initiative” calls for more than $1 trillion in new infrastructure investments across the Indo-Pacific region, Eurasia, and beyond. Its true purpose is to place China at the hub of trade routes and communications networks. While the initiative at first received an enthusiastic reception from nations that saw opportunities for economic growth, many of those nations soon realized that Chinese investment came with strings attached.”
“The Belt and Road Initiative has created a common pattern of economic clientelism. Beijing first offers countries loans from Chinese banks for large-scale infrastructure projects. Once the countries are in debt, the party forces their leaders to align with China’s foreign-policy agenda and the goal of displacing the influence of the United States and its key partners. Although Chinese leaders often depict these deals as win-win, most of them have just one real winner.”
The Military-Civil Fusion policy is the most totalitarian of the three prongs. In 2014 and then again in 2017, the party declared that all Chinese companies must collaborate in gathering intelligence. “Any organization or citizen,” reads Article 7 of China’s National Intelligence Law, “shall support, assist with, and collaborate with the state intelligence work in accordance with the law, and keep the secrets of the national intelligence work known to the public.” Chinese companies work alongside universities and research arms of the People’s Liberation Army. Military-Civil Fusion encourages state-owned and private enterprises to acquire companies with advanced technologies, or a strong minority stake in those companies, so that the technologies can be applied for not only economic but also military and intelligence advantage. It fast-tracks stolen technologies to the army in such areas as space, cyberspace, biology, artificial intelligence, and energy. In addition to espionage and cybertheft by the Ministry of State Security, the party tasks some Chinese students and scholars in the U.S. and at other foreign universities and research labs with extracting technology.”
“Sometimes U.S. defense funding supports China’s technology transfers. One of many examples is the Kuang-Chi Group, described in the Chinese media as “a military-civilian enterprise.” The Kuang-Chi Group was founded largely on the basis of U.S. Air Force–funded research into meta-materials at Duke University.”

If you have been paying attention and  doing your own research  you might  agree with  French and McMasters. I’m not a fan of McMasters political career in the White House but on this topic he appears to be on target.

Here are 7 more quotes of McMasters.

  1. “Chinese espionage is successful in part because the party is able to induce cooperation, wittingly or unwittingly, from individuals, companies, and political leaders. Companies in the United States and other free-market economies often do not report theft of their technology, because they are afraid of losing access to the Chinese market, harming relationships with customers, or prompting federal investigations.”
  2. “Many universities, research labs, and companies in countries that value the rule of law and individual rights are witting or unwitting accomplices in China’s use of technology to repress its people and improve the Chinese military’s capabilities. For dual-use technologies, the private sector should seek new partnerships with those who share commitments to free-market economies, representative government, and the rule of law, not with those acting against these principles. Many companies are engaged in joint ventures or partnerships that help China develop technologies suited for internal security, such as surveillance, artificial intelligence, and biogenetics. In one of many examples, a Massachusetts-based company sold DNA-sampling equipment that has helped the Chinese government track Uighurs in Xinjiang. (The company has ended such sales.) Companies that knowingly collaborate with China’s efforts to repress its own people or build threatening military capabilities should be penalized.”
  3. “Many Chinese companies directly or indirectly involved in domestic human-rights abuses and violation of international treaties are listed on American stock exchanges. Those companies benefit from U.S. and other Western investors. Tougher screening of U.S., European, and Japanese capital markets would help restrict corporate and investor complicity in China’s authoritarian agenda. Free-market economies like ours control the majority of the world’s capital, and we have far more leverage than we are employing”
  4. “China’s use of major telecommunications companies to control communications networks and the internet overseas must be countered. There should no longer be any dispute concerning the need to defend against the multinational technology company Huawei and its role in China’s security apparatus. In 2019, a series of investigations revealed incontrovertible evidence of the grave national-security danger associated with a wide array of Huawei’s telecommunications equipment. Many Huawei workers are simultaneously employed by China’s Ministry of State Security and the intelligence arm of the People’s Liberation Army. Huawei technicians have used intercepted cell data to help autocratic leaders in Africa spy on, locate, and silence political opponents. A priority area for multinational cooperation among free societies should be the development of infrastructure, particularly 5G communications, to form trusted networks that protect sensitive and proprietary data.”
  5. “We must defend against Chinese agencies that coordinate influence operations abroad—such as the Ministry of State Security, the United Front Work Department, and the Chinese Students and Scholars Association. At the same time, we should try to maximize positive interactions and experiences with the Chinese people. The United States and other free and open societies should consider issuing more visas and providing paths to citizenship for more Chinese—with proper safeguards in place. Chinese who engage with citizens of free countries are the ones who are most likely to question their government’s policies—whether from abroad or when they return home.:”
  6. “The U.S. and other free nations should view expatriate communities as a strength. Chinese abroad—if protected from the meddling and espionage of their government—can provide a significant counter to Beijing’s propaganda and disinformation. Investigations and expulsions of Ministry of State Security and other agents should be oriented not only toward protecting the targeted country but also toward protecting the Chinese expatriates within it.”
  7. “Without effective pushback from the United States and like-minded nations, China will become even more aggressive in promoting its statist economy and authoritarian political model. For me, the state visit to Beijing—and exposure to China’s powerful combination of insecurity and ambition—reinforced my belief that the United States and other nations must no longer adhere to a view of China based mainly on Western aspirations. If we compete aggressively, we have reason for confidence. China’s behavior is galvanizing opposition among countries that do not want to be vassal states. Internally, the tightening of control is also eliciting opposition. The bravado of Li Keqiang and other officials may be intended to evoke the idea of China as sovereign of “everything beneath heaven,” but many beneath heaven do not, and must not, agree.

 

Because of China’s skill in propaganda and the enormous amount of fake news I can understand how some people might not be aware of  Xi’s ambitions, the CCP’s behavior and how China has infiltrated  America.  If you are one of those people,  you shouldn’t be in the dark any longer. McMasters analysis is accurate. Clearly he sees that any American interaction with China, be it a partnership, investment, opening a business in china, helping a Chinese National open a business in America  or any involvement with China is not in the best interest of America
  It only creates opportunity for espionage.
 What the average person sees as a business transaction he probably sees a opportunity  for espionage. I get the impression that he knows that chinese espionage  occurs  daily in the USA.
  Under the current conditions with China, I’m sure he would like to see all activities with China  stop unless immediate action is taking to stop the espionage.  I agree with him because he’s right.(on this matter).
*McMasters  remarks come from his book, Battlegrounds: The Fight to Defend the Free World by H. R. McMaster.  

They can also be found at kyotoreview.org, chinas-three-pronged-strategy-on-regional-connectivity

And https://nationalcybersecurity.com/h-r-mcmaster-what-china-wants-espionage-surveillance-ceo-businesssecurity/

Now that you know what you thought to be true about the CCP and China is actually true, take a look around and see if anything from China has spilled over into your life.

I looked around and found that in both goods and services, China has been in my life for quite a long time..

China is everywhere in the USA. They own property, businesses, banks and politicians. They have also had quite a bit of success on the internet..  That’s  where we need to pay close attention. No one should be using Chinese apps

We see Tencent Holdings all over the news.  They definitely are a security risk. They have access to millions of Americans. They have large amounts of cash invested in American companies. Reddit  and Discord are popular platforms  that Tencent has invested substantial amounts of money.

I’ve talked about this in the past.  You don’t  give 150 million dollars to someone (Reddit) and  say “here’s  my money, contact me when you turn a profit.”  That money gives them partial ownership of the company.  That money gets them influence throughout the whole company.  That influence finds its way to the customer. If you use Reddit, you can be sure Tencent Holdings has some of your data. Don’t forget platforms like Reddit have influence in our elections.

Personally, I think it’s  too late.  China, the CCP has our data.  They have  also infiltrated our government.  What we need to do is remove the problem and see that it doesn’t  happen again. I know exactly who should be the first to go.

There is one company that I think poses the most danger to our country.  It’s  how the CCP has managed to find it’s way into you and your families daily lives.  It’s  worked its  way into  our government and is able to influence voters in our elections..  I’m talking about ZOOM.  The same company that schools use to teach children. The same company that has been making millions during the pandemic. The only company that I’ve seen under investigation by the FBI because of a security risk, but was still authorized for use in our government…(see image).

 

 

For PDF click here

You might be saying, ” ZOOM is an American company, what’s  the problem?”

Here are a few example problems of many .   While reading it, keep in mind article 7 and everything else McMasters mentioned.

Sequoia Capital  has a minimum investment  of 100 million dollars in Zoom.. Sequoia is listed on “Our team” page at Zoom.  The firm has offices in Menlo Park, Singapore, Bengaluru, Mumbai, New Delhi, Hong Kong, Shanghai, Beijing, and Tel Aviv.   Sequoia has numerous investors located in China.  Zoom  has many big investors with branches in China.  Think Article 7 + more.

Zoom as of January 2020 has 2,532 full time employees.  1,396 worked in the USA. Around 700 of the remaining employees work at their research and development location in China. This location alone is a huge risk. To make improvements, research and development is going to need data.  User data..  The facility in China will have employees that are hired locally.  China wouldn’t allow the business exist there if they didn’t. Article 7 risk + more

Zoom cannot guarentee their investors that data and intellectual property under their control is safe. In their annual report they admit that they have had security breaches in the past and imore breaches  they cannot defend against will happen in the future.  Thay also  admit that in some countries they may not be able to protect data. Below is documentation  where they mention these security risks.

 

 

 

 

 

 

 

 

Zoom  has history of getting caught routing data to China.  They say “it was a mistake.  It’s the only time it has ever happened.”  I see it like this, You catch a long time employee stealing. They say it was their first time.  I say, “no. It’s the first time they  got caught. They’ve been stealing since the beginning.”  ZOOM had been doing it since day one.

Taiwan banned zoom for routing data to China.

Singapore teachers banned zoom because of hackers.

ZOOM = PROBLEMS

The following are screenshots of search results that come up when I Google Zoom.

 

So how did Zoom get approved for government  use? FedRamp approved  Zoom.  FedRamp is. part of the General Services administration (GSA) . Technically GSA is part of the executive branch, but it functions on its own.

I believe  Trump saw some problems with FedRamp in 2017.  He signed in an executive order that made the head of departments solely responsible for online security in their departments.

Link

  1. Democrats decided to rewrite FedRamp and pass legislation on it. What they did was create  more non elected job positions that have access to data  in information they shouldn’t be allowed to have loopinformation non elected people should not have.  One of the positions would give them access to Executive  branch information/activity congress has never had in the past.  Basically Democrats created a “mole” that was to report to congress  Another example of Democrats overreach. They created an additional 20 million dollar expense taxpayers neverr had before..

On February 5, 2020 when democrats and the fake news started  advancing their planned pandemic, the democrats in congress suspended the rules and passed the FedRamp rewrite.

Link

When it comes to Zoom, you will see democrats complaining about Zoom.  Personally I think it’s  part of their grift they are pulling on the USA. They do it to control the  conversation.  That way when a real problems comes along they can say “were on it, we see the problem and were taking care of it”.  It’s the only solution I could come up with.  Zoom is on the democrats top donor list.  100% of donations to political parties made by Zoom goes to the left. They are protecting Zoom.

The man behind the donations is the founder and current CEO of Zoom.

Eric S. Yuan(Yuán Zhēng) , Born in 1970, in China. He moved to the USA in 1997 . One of the founders of WebEx, Min Zhu  gave him a job.  WebEx was aquired by Cisco in 2007. He left the company in 2011 after making a pitch and getting denied. That’s when he started his first business which led to his first release  of Zoom in 2012..

,,*Yuan once mentioned that WebEx is still using code he wrote in 1998

*After his failure of promoting his idea, he left and took his idea with him.  It’s always been my understanding that any ideas you come up with while working for a company,  those ideas belong to the company and you cannot take them with you.

*Min Zhu resigned in 2005 and left the USA.. “Zhu continues to serve as a science and technology advisor to the municipal government of San Jose,”

“It does not surprise me that San Jose, located in California would have a citizen of a foreign communist country. as their science and technology advisor. It goes hand in hand with the lawless behavior of the democrat party in California.  The situation that  requires more attention in California  is Governor Newsom hijacking  the residents of California pandemic relief  unemployment insurance money. Parents and their children are starving losing their homes because they have not received their money from the federal government.  Newsom blames  the unemployment office but he is the only person that can stop the flow of money. 
What also requires attention is Newsom forcing mail in ballots.  Even if you go to a polling place to vote they give you a mail in ballot.  It shouldn’t be anymore obvious what the Democrats are doing. They’re rigging the election.

If any  American corporations have  branch locations in China, business partners or accepted big investments out of China and say they don’t have any security  risks, they are lying.  With the current laws in China, any involvement with China is a open door for espionage.  This is not a conspiracy theory, This is a fact. A person only needs to take a minute to look at some of their laws.

National Intelligence Law of the People’s Republic of China

Chapter I: General Provisions

Article 1: In order to strengthen and guarantee national intelligence work, and safeguard national security and interests, on the basis of the Constitution, this Law is formulated.

Article 2: National intelligence work shall persist in an overall national security view, provide intelligence reference for major national policy decisions, provide intelligence support for preventing and dissolving risks endangering national security, and safeguard the national regime, sovereignty, unity, independence and territorial integrity, the prosperity of the people, economic and social sustainable development and other major national interests.

Article 3: The State establishes and completes a concentrated and united national intelligence structure with a coordinated division of work, which is scientific and highly effective.

Central and State security leadership bodies exercise uniform leadership over national intelligence work, formulate principles and policies for national intelligence work, standardize the overall development of national intelligence work, establish and complete coordination mechanisms for national intelligence work, comprehensively coordinate national intelligence work in all areas, research and decide upon major matters in national intelligence work.

The Central Military Commission uniformly leads and organizes military intelligence work.

Article 4: National principles shall persist in the principles of the integration of open work and classified work, the integration of specialized work and the mass line, and the integration of division of work and responsibilities, and coordination and cooperation.

Article 5: Intelligence organs of national security bodies and public security bodies, as well as military intelligence organs (hereafter jointly named national intelligence work organs) will, according to the division of work and responsibilities, provide mutual assistance, do intelligence work and launch intelligence activities well. All relevant national bodies shall, on the basis of their duties, tasks and the division of work, cooperate closely with national intelligence work organs.

Article 6: All national bodies, military forces, political parties, social groups, enterprise and undertaking organizations, as well as citizens, shall support, cooperate with and collaborate in national intelligence work, and maintain the secrecy of national intelligence work they are aware of.

Article 7: National intelligence work shall be conducted according to the law, respect and guarantee human rights, and safeguard the lawful rights and interests of citizens and organizations.

Article 8: The State supports individuals supporting or assisting in national intelligence work, and rewards those making major contributions.

Chapter II: National intelligence work organs and powers

Article 9: National intelligence work organs launch intelligence work inside and outside of the borders on the basis of work requirements, and by using the necessary methods, means and channels according to the law.

Article 10: National intelligence work organs shall lawfully collect and process relevant information on foreign bodies, organizations and individuals engaged in, or inciting or assisting others to engage in, or domestic bodies, organizations and individuals who collude with foreign bodies, organs or individuals to engage in harm to the national security and interests of the People’s Republic of China

Article 11: Foreign bodies, organizations or individuals engaging in acts harming the national security and interests of the People’s Republic of China within Chinese borders must be punished by law. National intelligence work organs shall provide intelligence reference and evidence for preventing, curbing and punishing the abovementioned acts.

Article 12: National intelligence work organs may establish a collaborative relationship with relevant individuals and organizations, and entrust them with carrying out relevant work.

Article 13: Relevant departments in all levels’ People’s Governments, enterprise and undertaking work units, other organizations and citizens shall provide the necessary assistance to national intelligence work organs lawfully carrying out their work, and maintain secrecy.

Article 14: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, after undergoing strict approval procedures, adopt technological reconnaissance measures.

Article 15: National intelligence work bodies’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, acquaint themselves with relevant bodies, organizations, enterprise or undertaking work units and individuals, inquire into relevant circumstances, consult or obtain relevant files, materials and goods.

Article 16: National intelligence work organs’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, enter relevant limited-access localities and premises; they are also permitted to enjoy passage privilege to carry out urgent task requirements, after showing corresponding credentials.

National intelligence organs’ work personnel may, on the basis of work requirements and according to relevant State regulations, use with priority or lawfully commandeer transportation equipment, telecommunications equipment, spaces and buildings of bodies, organizations, enterprise and undertaking work units and individuals, when necessary, they may set up relevant work premises, equipment and facilities, after completion of the task, they shall timely restore or recover the original state, and pay corresponding fees according to regulations; where damage is caused, it shall be compensated.

Article 17: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, request Customs, border control, inspection and quarantine and other such bodies to provide exemption from inspection and other such conveniences.

Article 18: National intelligence work organs and their work personnel shall, during work, strictly act according to the law, they may not exceed their powers, abuse their powers, or engage in irregular favouritism, they may not violate the lawful rights and interests of citizens and organizations, and may not divulge State secrets, commercial secrets or personal privacy.

Chapter III: National intelligence work guarantees

Article 19: The State strengthens the construction of national intelligence work organs, exercises special management over their organic structuring, staffing, personnel allocation, funding and assets, and provides special guarantees.

The State establishes personnel employment, recruitment, assessment, training, remuneration and retirement management structures suited to intelligence work.

Article 20: National intelligence work organs shall adapt to intelligence work requirements, and raise their ability to carry out intelligence work.

Article 21: When the personal security of national intelligence work organs’ personnel or their close relatives is threatened due to their exercising their task, or the personal security of individuals with whom national intelligence work bodies have established a cooperative relationship or their close relatives is threatened because of their assistance to national intelligence work, relevant State departments shall adopt the necessary measures to provide protection and succour.

Article 22: Public security, civil affairs, finance, health, education, human resources and social security, as well as other relevant departments and State-owned enterprise and undertaking work units shall cooperate with national intelligence work bodies to properly arrange for persons in need of placement due to contributions to national intelligence work.

Article 23: National intelligence work organs shall establish supervision and security inspection structures, conduct supervision of their personnel’s observance of discipline, and lawfully adopt the necessary measures to regularly or irregularly conduct security inspections.

Article 24: Any individual or organization has the right to report and accuse instances of national intelligence work organs and their personnel exceeding their powers, abusing their powers, engaging in irregular favouritism and other unlawful acts to higher-level organs or relevant departments. Relevant organs or departments receiving reports and accusations shall timely investigate the matter, and report the investigation results to the reporter or accuser.

No other person or organization may suppress or retaliate against individuals or organizations lawfully reporting on or accusing national intelligence work organs and their personnel.

Chapter IV: Legal liability

Article 25: Those violating the relevant provisions of this Law and impede national intelligence work organs and their personnel from carrying out intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to a warning of administrative detention of less than 15 days by the national public security body, or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 26: Those divulging State secrets involving national intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to administrative detention of less than 15 days by the national public security body or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 27: National intelligence work personnel exceeding their powers, abusing their power, engaging in irregular favouritism, or divulging State secrets, commercial secrets or personal privacy will be punished according to the law; where it constitutes a crime, legal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: This Law takes effect on the date of promulgation.

That was the draft version. For the final version click 2017_PRC_NationalIntelligenceLaw

Zoom is a perfect example of what McMasters talked about.. After reading China’s  laws there shouldn’t be any questions.  Zoom needs to be  removed for government use.  Every  American business connected to China needs to be investigated.

China is not hiding their intentions.  Americans are being  lied to and sold out. Yet, nobody seems to care.

McMasters  knowledge and experience in these matters is unique. If an enemy had access to what he knows. government infiltrations would be almost impossible to stop..

Look at Zoom.  Even with a FBI investigation and a history of security issues. They still  get approved for government use.  It’s  almost like they have a friend on the inside helping them.

What’s  H.R. McMasters up to today? The last time I checked he was doing pretty well. This year he received $450,000 in stock with another $30,000 with an additional $10,000 for being on the audit team. That was just for one job.

That’s  right,  McMasters  sold out. He is currently on the Board of Directors for Zoom.

For full press release click Zoom Adds Board Member H.R. McMaster and Head of Global Public Policy and Government Relations Jonathan Kallmer to Leadership 

Additional  information

https://zoom.us/partners

https://www.forbes.com/sites/peterhigh/2017/03/06/zoom-ceos-promise-to-his-wife-helped-inspire-a-1-billion-valued-company/amp/

https://zoom.us/team

 

China has your data.  Will you allow this to continue? The silent majority must stand up. It’s  time for a great awakening

 

Respectfully,

Deplorable Patriot

 

 

 

 

 

 

 

 

 

 

Please follow and like us:

Share and Enjoy !

0Shares
0 0