Category Archives: FBI

The Chinese Communist Party has your data and a lot more.

The Chinese Communist Party(CCP) has your data. The thought of them not having it never entered my mind.  How did it happen?

CCP gains control (short version)

During WWII Japan had occupied about 25% of China. During that time there were three armies at war with each other in China. The Chinese Communist Party(CCP) was at war with the Chinese Nationalist.  Both were at war with Japan.

Japan  had invaded China prior to its involvement in WWII.  Japan’s  weapons were far superior and had air superiority. This combined with a plethora of other problems, China was unable to beat Japan.

By the time Japan was removed from China they had killed at least 25 million Chinese and had committed thousands of war crimes.

During WWII America started helping Chinese Nationalist with there problem with Japan.  After America dropped 2 nuclear bombs on Japan, Russia declared war on Japan.  The result was Japan’s surrender. The CCP says they defeated Japan but it was the Americans and Russia, with the help of Chinese Nationalists that beat Japan.

With Japan out of the picture By 1949 the CCP had defeated the Chinese Nationalist.

It was the 1st of October in 1949 when the leader of the Chinese Communist Party(CCP), Mao Zedong declared the creation of the People’s Republic of China (PRC).

I don’t want to get into details about China’s government structure or their  domestic problems but I will say they have a congress, a president and a judicial branch. It should be noted that their roles are not the same as we have here in the USA. For example, their role of president is primarily a ceremonial role with limited powers.

With that being said, the current president, Xi Jinping, is still the most powerful person in China.  Not because he is president…

President Xi Jinping  is also the paramount leader,. His real power comes from being the General Secretary of the Communist Party,. He is also the general secretary of the Central Committee, and Chairman of the Central Military Commission..

The thing to remember is that the CCP has  total control of China.

Xi  once borrowed a line from China’s first president Mao Zedong: “Government, military, society, education, north, south, east, west—the party leads everything.”

 Xi wants China to  be the super power of the world. He wants the world dependent on China.  He wants other nations  to look at China for leadership like they  look at the USA.  

Should we trust China?  Is China a threat to the USA?  I won’t tell you who you should  trust. That’s  for you to decide, but I will say “yes. China is a threat”

Have you ever heard of Title 7 of China’s national intelligence law? It makes every Chinese National a potential spy.

 

The following comes from an article H.R. McMaster’s wrote, which includes parts written by Howard W. French.

“China intends to establish a new tributary system through a massive effort organized under three overlapping policies, carrying the names “Made in China 2025,” “Belt and Road Initiative,” and “Military-Civil Fusion.”
“Made in China 2025” is designed to help China become a largely independent scientific and technological power. To achieve that goal, the party is creating high-tech monopolies inside China and stripping foreign companies of their intellectual property by means of theft and forced technology transfer. In some cases, foreign companies are forced to enter into joint ventures with Chinese companies before they are permitted to sell their products in China. These Chinese companies mostly have close ties to the party, making routine the transfer of intellectual property and manufacturing techniques to the Chinese government.”
“The “Belt and Road Initiative” calls for more than $1 trillion in new infrastructure investments across the Indo-Pacific region, Eurasia, and beyond. Its true purpose is to place China at the hub of trade routes and communications networks. While the initiative at first received an enthusiastic reception from nations that saw opportunities for economic growth, many of those nations soon realized that Chinese investment came with strings attached.”
“The Belt and Road Initiative has created a common pattern of economic clientelism. Beijing first offers countries loans from Chinese banks for large-scale infrastructure projects. Once the countries are in debt, the party forces their leaders to align with China’s foreign-policy agenda and the goal of displacing the influence of the United States and its key partners. Although Chinese leaders often depict these deals as win-win, most of them have just one real winner.”
The Military-Civil Fusion policy is the most totalitarian of the three prongs. In 2014 and then again in 2017, the party declared that all Chinese companies must collaborate in gathering intelligence. “Any organization or citizen,” reads Article 7 of China’s National Intelligence Law, “shall support, assist with, and collaborate with the state intelligence work in accordance with the law, and keep the secrets of the national intelligence work known to the public.” Chinese companies work alongside universities and research arms of the People’s Liberation Army. Military-Civil Fusion encourages state-owned and private enterprises to acquire companies with advanced technologies, or a strong minority stake in those companies, so that the technologies can be applied for not only economic but also military and intelligence advantage. It fast-tracks stolen technologies to the army in such areas as space, cyberspace, biology, artificial intelligence, and energy. In addition to espionage and cybertheft by the Ministry of State Security, the party tasks some Chinese students and scholars in the U.S. and at other foreign universities and research labs with extracting technology.”
“Sometimes U.S. defense funding supports China’s technology transfers. One of many examples is the Kuang-Chi Group, described in the Chinese media as “a military-civilian enterprise.” The Kuang-Chi Group was founded largely on the basis of U.S. Air Force–funded research into meta-materials at Duke University.”

If you have been paying attention and  doing your own research  you might  agree with  French and McMasters. I’m not a fan of McMasters political career in the White House but on this topic he appears to be on target.

Here are 7 more quotes of McMasters.

  1. “Chinese espionage is successful in part because the party is able to induce cooperation, wittingly or unwittingly, from individuals, companies, and political leaders. Companies in the United States and other free-market economies often do not report theft of their technology, because they are afraid of losing access to the Chinese market, harming relationships with customers, or prompting federal investigations.”
  2. “Many universities, research labs, and companies in countries that value the rule of law and individual rights are witting or unwitting accomplices in China’s use of technology to repress its people and improve the Chinese military’s capabilities. For dual-use technologies, the private sector should seek new partnerships with those who share commitments to free-market economies, representative government, and the rule of law, not with those acting against these principles. Many companies are engaged in joint ventures or partnerships that help China develop technologies suited for internal security, such as surveillance, artificial intelligence, and biogenetics. In one of many examples, a Massachusetts-based company sold DNA-sampling equipment that has helped the Chinese government track Uighurs in Xinjiang. (The company has ended such sales.) Companies that knowingly collaborate with China’s efforts to repress its own people or build threatening military capabilities should be penalized.”
  3. “Many Chinese companies directly or indirectly involved in domestic human-rights abuses and violation of international treaties are listed on American stock exchanges. Those companies benefit from U.S. and other Western investors. Tougher screening of U.S., European, and Japanese capital markets would help restrict corporate and investor complicity in China’s authoritarian agenda. Free-market economies like ours control the majority of the world’s capital, and we have far more leverage than we are employing”
  4. “China’s use of major telecommunications companies to control communications networks and the internet overseas must be countered. There should no longer be any dispute concerning the need to defend against the multinational technology company Huawei and its role in China’s security apparatus. In 2019, a series of investigations revealed incontrovertible evidence of the grave national-security danger associated with a wide array of Huawei’s telecommunications equipment. Many Huawei workers are simultaneously employed by China’s Ministry of State Security and the intelligence arm of the People’s Liberation Army. Huawei technicians have used intercepted cell data to help autocratic leaders in Africa spy on, locate, and silence political opponents. A priority area for multinational cooperation among free societies should be the development of infrastructure, particularly 5G communications, to form trusted networks that protect sensitive and proprietary data.”
  5. “We must defend against Chinese agencies that coordinate influence operations abroad—such as the Ministry of State Security, the United Front Work Department, and the Chinese Students and Scholars Association. At the same time, we should try to maximize positive interactions and experiences with the Chinese people. The United States and other free and open societies should consider issuing more visas and providing paths to citizenship for more Chinese—with proper safeguards in place. Chinese who engage with citizens of free countries are the ones who are most likely to question their government’s policies—whether from abroad or when they return home.:”
  6. “The U.S. and other free nations should view expatriate communities as a strength. Chinese abroad—if protected from the meddling and espionage of their government—can provide a significant counter to Beijing’s propaganda and disinformation. Investigations and expulsions of Ministry of State Security and other agents should be oriented not only toward protecting the targeted country but also toward protecting the Chinese expatriates within it.”
  7. “Without effective pushback from the United States and like-minded nations, China will become even more aggressive in promoting its statist economy and authoritarian political model. For me, the state visit to Beijing—and exposure to China’s powerful combination of insecurity and ambition—reinforced my belief that the United States and other nations must no longer adhere to a view of China based mainly on Western aspirations. If we compete aggressively, we have reason for confidence. China’s behavior is galvanizing opposition among countries that do not want to be vassal states. Internally, the tightening of control is also eliciting opposition. The bravado of Li Keqiang and other officials may be intended to evoke the idea of China as sovereign of “everything beneath heaven,” but many beneath heaven do not, and must not, agree.

 

Because of China’s skill in propaganda and the enormous amount of fake news I can understand how some people might not be aware of  Xi’s ambitions, the CCP’s behavior and how China has infiltrated  America.  If you are one of those people,  you shouldn’t be in the dark any longer. McMasters analysis is accurate. Clearly he sees that any American interaction with China, be it a partnership, investment, opening a business in china, helping a Chinese National open a business in America  or any involvement with China is not in the best interest of America
  It only creates opportunity for espionage.
 What the average person sees as a business transaction he probably sees a opportunity  for espionage. I get the impression that he knows that chinese espionage  occurs  daily in the USA.
  Under the current conditions with China, I’m sure he would like to see all activities with China  stop unless immediate action is taking to stop the espionage.  I agree with him because he’s right.(on this matter).
*McMasters  remarks come from his book, Battlegrounds: The Fight to Defend the Free World by H. R. McMaster.  

They can also be found at kyotoreview.org, chinas-three-pronged-strategy-on-regional-connectivity

And https://nationalcybersecurity.com/h-r-mcmaster-what-china-wants-espionage-surveillance-ceo-businesssecurity/

Now that you know what you thought to be true about the CCP and China is actually true, take a look around and see if anything from China has spilled over into your life.

I looked around and found that in both goods and services, China has been in my life for quite a long time..

China is everywhere in the USA. They own property, businesses, banks and politicians. They have also had quite a bit of success on the internet..  That’s  where we need to pay close attention. No one should be using Chinese apps

We see Tencent Holdings all over the news.  They definitely are a security risk. They have access to millions of Americans. They have large amounts of cash invested in American companies. Reddit  and Discord are popular platforms  that Tencent has invested substantial amounts of money.

I’ve talked about this in the past.  You don’t  give 150 million dollars to someone (Reddit) and  say “here’s  my money, contact me when you turn a profit.”  That money gives them partial ownership of the company.  That money gets them influence throughout the whole company.  That influence finds its way to the customer. If you use Reddit, you can be sure Tencent Holdings has some of your data. Don’t forget platforms like Reddit have influence in our elections.

Personally, I think it’s  too late.  China, the CCP has our data.  They have  also infiltrated our government.  What we need to do is remove the problem and see that it doesn’t  happen again. I know exactly who should be the first to go.

There is one company that I think poses the most danger to our country.  It’s  how the CCP has managed to find it’s way into you and your families daily lives.  It’s  worked its  way into  our government and is able to influence voters in our elections..  I’m talking about ZOOM.  The same company that schools use to teach children. The same company that has been making millions during the pandemic. The only company that I’ve seen under investigation by the FBI because of a security risk, but was still authorized for use in our government…(see image).

 

 

For PDF click here

You might be saying, ” ZOOM is an American company, what’s  the problem?”

Here are a few example problems of many .   While reading it, keep in mind article 7 and everything else McMasters mentioned.

Sequoia Capital  has a minimum investment  of 100 million dollars in Zoom.. Sequoia is listed on “Our team” page at Zoom.  The firm has offices in Menlo Park, Singapore, Bengaluru, Mumbai, New Delhi, Hong Kong, Shanghai, Beijing, and Tel Aviv.   Sequoia has numerous investors located in China.  Zoom  has many big investors with branches in China.  Think Article 7 + more.

Zoom as of January 2020 has 2,532 full time employees.  1,396 worked in the USA. Around 700 of the remaining employees work at their research and development location in China. This location alone is a huge risk. To make improvements, research and development is going to need data.  User data..  The facility in China will have employees that are hired locally.  China wouldn’t allow the business exist there if they didn’t. Article 7 risk + more

Zoom cannot guarentee their investors that data and intellectual property under their control is safe. In their annual report they admit that they have had security breaches in the past and imore breaches  they cannot defend against will happen in the future.  Thay also  admit that in some countries they may not be able to protect data. Below is documentation  where they mention these security risks.

 

 

 

 

 

 

 

 

Zoom  has history of getting caught routing data to China.  They say “it was a mistake.  It’s the only time it has ever happened.”  I see it like this, You catch a long time employee stealing. They say it was their first time.  I say, “no. It’s the first time they  got caught. They’ve been stealing since the beginning.”  ZOOM had been doing it since day one.

Taiwan banned zoom for routing data to China.

Singapore teachers banned zoom because of hackers.

ZOOM = PROBLEMS

The following are screenshots of search results that come up when I Google Zoom.

 

So how did Zoom get approved for government  use? FedRamp approved  Zoom.  FedRamp is. part of the General Services administration (GSA) . Technically GSA is part of the executive branch, but it functions on its own.

I believe  Trump saw some problems with FedRamp in 2017.  He signed in an executive order that made the head of departments solely responsible for online security in their departments.

Link

  1. Democrats decided to rewrite FedRamp and pass legislation on it. What they did was create  more non elected job positions that have access to data  in information they shouldn’t be allowed to have loopinformation non elected people should not have.  One of the positions would give them access to Executive  branch information/activity congress has never had in the past.  Basically Democrats created a “mole” that was to report to congress  Another example of Democrats overreach. They created an additional 20 million dollar expense taxpayers neverr had before..

On February 5, 2020 when democrats and the fake news started  advancing their planned pandemic, the democrats in congress suspended the rules and passed the FedRamp rewrite.

Link

When it comes to Zoom, you will see democrats complaining about Zoom.  Personally I think it’s  part of their grift they are pulling on the USA. They do it to control the  conversation.  That way when a real problems comes along they can say “were on it, we see the problem and were taking care of it”.  It’s the only solution I could come up with.  Zoom is on the democrats top donor list.  100% of donations to political parties made by Zoom goes to the left. They are protecting Zoom.

The man behind the donations is the founder and current CEO of Zoom.

Eric S. Yuan(Yuán Zhēng) , Born in 1970, in China. He moved to the USA in 1997 . One of the founders of WebEx, Min Zhu  gave him a job.  WebEx was aquired by Cisco in 2007. He left the company in 2011 after making a pitch and getting denied. That’s when he started his first business which led to his first release  of Zoom in 2012..

,,*Yuan once mentioned that WebEx is still using code he wrote in 1998

*After his failure of promoting his idea, he left and took his idea with him.  It’s always been my understanding that any ideas you come up with while working for a company,  those ideas belong to the company and you cannot take them with you.

*Min Zhu resigned in 2005 and left the USA.. “Zhu continues to serve as a science and technology advisor to the municipal government of San Jose,”

“It does not surprise me that San Jose, located in California would have a citizen of a foreign communist country. as their science and technology advisor. It goes hand in hand with the lawless behavior of the democrat party in California.  The situation that  requires more attention in California  is Governor Newsom hijacking  the residents of California pandemic relief  unemployment insurance money. Parents and their children are starving losing their homes because they have not received their money from the federal government.  Newsom blames  the unemployment office but he is the only person that can stop the flow of money. 
What also requires attention is Newsom forcing mail in ballots.  Even if you go to a polling place to vote they give you a mail in ballot.  It shouldn’t be anymore obvious what the Democrats are doing. They’re rigging the election.

If any  American corporations have  branch locations in China, business partners or accepted big investments out of China and say they don’t have any security  risks, they are lying.  With the current laws in China, any involvement with China is a open door for espionage.  This is not a conspiracy theory, This is a fact. A person only needs to take a minute to look at some of their laws.

National Intelligence Law of the People’s Republic of China

Chapter I: General Provisions

Article 1: In order to strengthen and guarantee national intelligence work, and safeguard national security and interests, on the basis of the Constitution, this Law is formulated.

Article 2: National intelligence work shall persist in an overall national security view, provide intelligence reference for major national policy decisions, provide intelligence support for preventing and dissolving risks endangering national security, and safeguard the national regime, sovereignty, unity, independence and territorial integrity, the prosperity of the people, economic and social sustainable development and other major national interests.

Article 3: The State establishes and completes a concentrated and united national intelligence structure with a coordinated division of work, which is scientific and highly effective.

Central and State security leadership bodies exercise uniform leadership over national intelligence work, formulate principles and policies for national intelligence work, standardize the overall development of national intelligence work, establish and complete coordination mechanisms for national intelligence work, comprehensively coordinate national intelligence work in all areas, research and decide upon major matters in national intelligence work.

The Central Military Commission uniformly leads and organizes military intelligence work.

Article 4: National principles shall persist in the principles of the integration of open work and classified work, the integration of specialized work and the mass line, and the integration of division of work and responsibilities, and coordination and cooperation.

Article 5: Intelligence organs of national security bodies and public security bodies, as well as military intelligence organs (hereafter jointly named national intelligence work organs) will, according to the division of work and responsibilities, provide mutual assistance, do intelligence work and launch intelligence activities well. All relevant national bodies shall, on the basis of their duties, tasks and the division of work, cooperate closely with national intelligence work organs.

Article 6: All national bodies, military forces, political parties, social groups, enterprise and undertaking organizations, as well as citizens, shall support, cooperate with and collaborate in national intelligence work, and maintain the secrecy of national intelligence work they are aware of.

Article 7: National intelligence work shall be conducted according to the law, respect and guarantee human rights, and safeguard the lawful rights and interests of citizens and organizations.

Article 8: The State supports individuals supporting or assisting in national intelligence work, and rewards those making major contributions.

Chapter II: National intelligence work organs and powers

Article 9: National intelligence work organs launch intelligence work inside and outside of the borders on the basis of work requirements, and by using the necessary methods, means and channels according to the law.

Article 10: National intelligence work organs shall lawfully collect and process relevant information on foreign bodies, organizations and individuals engaged in, or inciting or assisting others to engage in, or domestic bodies, organizations and individuals who collude with foreign bodies, organs or individuals to engage in harm to the national security and interests of the People’s Republic of China

Article 11: Foreign bodies, organizations or individuals engaging in acts harming the national security and interests of the People’s Republic of China within Chinese borders must be punished by law. National intelligence work organs shall provide intelligence reference and evidence for preventing, curbing and punishing the abovementioned acts.

Article 12: National intelligence work organs may establish a collaborative relationship with relevant individuals and organizations, and entrust them with carrying out relevant work.

Article 13: Relevant departments in all levels’ People’s Governments, enterprise and undertaking work units, other organizations and citizens shall provide the necessary assistance to national intelligence work organs lawfully carrying out their work, and maintain secrecy.

Article 14: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, after undergoing strict approval procedures, adopt technological reconnaissance measures.

Article 15: National intelligence work bodies’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, acquaint themselves with relevant bodies, organizations, enterprise or undertaking work units and individuals, inquire into relevant circumstances, consult or obtain relevant files, materials and goods.

Article 16: National intelligence work organs’ personnel may, when lawfully exercising their duties, according to relevant State regulations, with permission and after showing corresponding credentials, enter relevant limited-access localities and premises; they are also permitted to enjoy passage privilege to carry out urgent task requirements, after showing corresponding credentials.

National intelligence organs’ work personnel may, on the basis of work requirements and according to relevant State regulations, use with priority or lawfully commandeer transportation equipment, telecommunications equipment, spaces and buildings of bodies, organizations, enterprise and undertaking work units and individuals, when necessary, they may set up relevant work premises, equipment and facilities, after completion of the task, they shall timely restore or recover the original state, and pay corresponding fees according to regulations; where damage is caused, it shall be compensated.

Article 17: National intelligence work organs may, on the basis of work requirements and according to relevant State regulations, request Customs, border control, inspection and quarantine and other such bodies to provide exemption from inspection and other such conveniences.

Article 18: National intelligence work organs and their work personnel shall, during work, strictly act according to the law, they may not exceed their powers, abuse their powers, or engage in irregular favouritism, they may not violate the lawful rights and interests of citizens and organizations, and may not divulge State secrets, commercial secrets or personal privacy.

Chapter III: National intelligence work guarantees

Article 19: The State strengthens the construction of national intelligence work organs, exercises special management over their organic structuring, staffing, personnel allocation, funding and assets, and provides special guarantees.

The State establishes personnel employment, recruitment, assessment, training, remuneration and retirement management structures suited to intelligence work.

Article 20: National intelligence work organs shall adapt to intelligence work requirements, and raise their ability to carry out intelligence work.

Article 21: When the personal security of national intelligence work organs’ personnel or their close relatives is threatened due to their exercising their task, or the personal security of individuals with whom national intelligence work bodies have established a cooperative relationship or their close relatives is threatened because of their assistance to national intelligence work, relevant State departments shall adopt the necessary measures to provide protection and succour.

Article 22: Public security, civil affairs, finance, health, education, human resources and social security, as well as other relevant departments and State-owned enterprise and undertaking work units shall cooperate with national intelligence work bodies to properly arrange for persons in need of placement due to contributions to national intelligence work.

Article 23: National intelligence work organs shall establish supervision and security inspection structures, conduct supervision of their personnel’s observance of discipline, and lawfully adopt the necessary measures to regularly or irregularly conduct security inspections.

Article 24: Any individual or organization has the right to report and accuse instances of national intelligence work organs and their personnel exceeding their powers, abusing their powers, engaging in irregular favouritism and other unlawful acts to higher-level organs or relevant departments. Relevant organs or departments receiving reports and accusations shall timely investigate the matter, and report the investigation results to the reporter or accuser.

No other person or organization may suppress or retaliate against individuals or organizations lawfully reporting on or accusing national intelligence work organs and their personnel.

Chapter IV: Legal liability

Article 25: Those violating the relevant provisions of this Law and impede national intelligence work organs and their personnel from carrying out intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to a warning of administrative detention of less than 15 days by the national public security body, or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 26: Those divulging State secrets involving national intelligence work, will be punished by relevant work units on suggestion of the national intelligence work organ, or be subject to administrative detention of less than 15 days by the national public security body or public security bodies; where it constitutes a crime, legal liability will be prosecuted according to the law.

Article 27: National intelligence work personnel exceeding their powers, abusing their power, engaging in irregular favouritism, or divulging State secrets, commercial secrets or personal privacy will be punished according to the law; where it constitutes a crime, legal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: This Law takes effect on the date of promulgation.

That was the draft version. For the final version click 2017_PRC_NationalIntelligenceLaw

Zoom is a perfect example of what McMasters talked about.. After reading China’s  laws there shouldn’t be any questions.  Zoom needs to be  removed for government use.  Every  American business connected to China needs to be investigated.

China is not hiding their intentions.  Americans are being  lied to and sold out. Yet, nobody seems to care.

McMasters  knowledge and experience in these matters is unique. If an enemy had access to what he knows. government infiltrations would be almost impossible to stop..

Look at Zoom.  Even with a FBI investigation and a history of security issues. They still  get approved for government use.  It’s  almost like they have a friend on the inside helping them.

What’s  H.R. McMasters up to today? The last time I checked he was doing pretty well. This year he received $450,000 in stock with another $30,000 with an additional $10,000 for being on the audit team. That was just for one job.

That’s  right,  McMasters  sold out. He is currently on the Board of Directors for Zoom.

For full press release click Zoom Adds Board Member H.R. McMaster and Head of Global Public Policy and Government Relations Jonathan Kallmer to Leadership 

Additional  information

https://zoom.us/partners

https://www.forbes.com/sites/peterhigh/2017/03/06/zoom-ceos-promise-to-his-wife-helped-inspire-a-1-billion-valued-company/amp/

https://zoom.us/team

 

China has your data.  Will you allow this to continue? The silent majority must stand up. It’s  time for a great awakening

 

Respectfully,

Deplorable Patriot

 

 

 

 

 

 

 

 

 

 

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

A really good story behind “Russiagate” by someone who worked with Stefan Halper

I saw this on Twitter yesterday and pretty much confirms what most of us on the right know: The Deep State and Obama administration worked to undermine our 2016 election.

Steven P. Schrage is a doctoral candidate at Cambridge and worked under “FBI Informant” Stefan Halper. Schrage published his story yesterday in an article entitled, “The Spies Who Hijacked America.”

Halper sounds like a very shady character. In 1994 he was arrested for possession of crack.

In 2011 the FBI temporarily ended a relationship with Halper because of his “aggressiveness” toward an FBI agent, and over “questionable allegiance” to a target of FBI intelligence probes.

Schrage writes about his interactions with Halper and along with the information contained in Mollie Heminway’s tweet, Schrage says:

“The stories that The New York Times, Washington Post, and others were pushing didn’t add up. Many seemed planted to cover up or advance the agendas of several individuals whose tentacles secretly ran through these scandals, and who each had longstanding ties to intelligence services like the FBI, CIA, and MI6.”

Watch Steven’s story here:

In a nutshell: They set out to get President Trump via Michael Flynn. It was planned out but they never expected to get caught or they wouldn’t have been so clumsy in some areas.

His story is a bit lengthy but a really good story. Read it here.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Declassification of House Intelligence Russia investigation documents

Declassification of documents.

Now we can see for ourselves how the Democrats lied to the public in matters related to the investigation into Trump/Russia collusion .  When reading the documents keep in mind the following:

“In 2017 and 2018, the House Permanent Select Committee on Intelligence (HPSCI) undertook an investigation into Russia’s interference campaign targeting the 2016 U.S. election. The Committee’s investigation came on the heels of an Intelligence Community assessment, which found:”

“Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia’s goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency. We further assess Putin and the Russian Government developed a clear preference for President-elect Trump.”

Here are some quotes from Adam Schiff.  Truth or false accusations?

“Whil” Special Counsel Mueller found insufficient evidence to prove the crime of criminal conspiracy beyond a reasonable doubt, he refused to draw any conclusion on the issue of collusion — contrary to false representations made by Attorney General Bill Barr and others. There is ample evidence of the corrupt interactions between the Trump campaign and Russia, both direct and circumstantial, in the record:”


 “Trump and his son drafted a false statement for the press together in order to cover up the true purpose of the meeting. .”“Multiple witnesses sought to hide and cover up illicit activity related to Russia during the presidential campaign.”“And the transcripts also show that during the transition period in late 2016, the incoming National Security Advisor.”


“Despite taking part in this investigation and hearing these facts first-hand, the transcripts reveal how House Republicans used witness interviews not to gain the facts, but to press President Trump’s false narrative of ‘no collusion, no obstruction.’


“the White House held up their release to the public by refusing to allow the Intelligence Community to make redactions on the basis of classified information, rather than White House political interests.”

Source and additional information  click https://intelligence.house.gov/russiainvestigation/

Respectfully

Deplorable Patriot

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

The 8chan/8kun QResearch Board Search

I wanted to share this with y’all in case you were not aware of it.

  QResearch.ch,  The 8chan/8kun QResearch Board Search.

Free to use.  No advertising. No tracking.  No porn. No worries.  Just 13,083,277 documents from 38 Qanon related data sources. No loaded  pages from other domains.  Research  with privacy.

If you are into Qanon or just want to see some of the information we have, this is the best place to look.  No login.  No joining.  No vetting.  Just click the link provided at the bottom and start searching.

It’s not like the 8 chan that got shut down.  It’s not like the new 8 Kun.  It’s very simple to use.  You will see the following links at the top of the page for a general search.

For a more detailed search,

  • – specific keywords or keyphrases
  • – specific URL’s
  • – specific dates (e.g. YYYY-MM-DD or YYYY/MM/DD)
  • – specific 8chan/8kun post ID’s

What can you search through?

3,894 Q-Posts from #Qanon
9,738 Answers to Q-Posts from spreadsheet
7,635,941 Posts in 10840 Threads from 8chan/8kun’s QResearch Board
4,045 Posts in 6 Threads from 8chan/8kun’s QResearch Board – AUSTRALIA
2,654 Posts in 4 Threads from 8chan/8kun’s QResearch Board – CANADA
646 Posts in 1 Threads from 8chan/8kun’s QResearch Board – FRANCE
30,265 Posts in 43 Threads from 8chan/8kun’s QResearch Board – GERMANY
1,393 Posts in 2 Threads from 8chan/8kun’s QResearch Board – NETHERLANDS
2,117 Posts in 3 Threads from 8chan/8kun’s QResearch Board – NEW ZEALAND
6,854 Posts in 9 Threads from 8chan/8kun’s QResearch Board – UK
7,311 Posts in 11 Threads from 8chan/8kun’s QResearch Board – Topic ALIEN UFO
6,674 Posts in 9 Threads from 8chan/8kun’s QResearch Board – Topic CLOCKWORK
2,895 Posts in 4 Threads from 8chan/8kun’s QResearch Board – Topic NWO
38,440 Posts in 53 Threads from 8chan/8kun’s QRB Board
29,619 Posts in 41 Threads from 8chan/8kun’s QResearch2Gen Board
224,669 Posts in 312 Threads from 8chan/8kun’s CBTS Board
30,175 Posts in 43 Threads from 8chan/8kun’s TheStorm Board
37,974 Posts in 54 Threads from Endchan’s qanonresearch Board
5,339 Posts in 15 Threads from Endchan’s qrbunker Board
46,571 Tweets from @realDonaldTrump
12,272 Resignations (since Sep. 1, 2017) from resignation.info
106 Corona Infection Cases from “CoronaVirus Notable Cases”-Spreadsheet
372 Death Cases from deathcas.es
143 Helicopter Crashes from “Helicopter Crashes”-list
2,412 Human Trafficking Arrests (events – since Jan. 1, 2016) from “Notable Human Trafficking Arrests”-list
378,295 Unsealed Indictments from https://bad-boys.us/
2,327 Epstein BlackBook from “Epstein BlackBook”
4,275 Epstein Flight Logs from “Epstein Flight Logs”-list
110 Mass Shootings (events – since 1982) from “Mother Jones – Mass Shootings Database, 1982 – 2019”-list
967 Executive Orders (since 1994) from federalregister.gov
33,709 Hillary Clinton Emails from WikiLeaks
59,148 Podesta Emails from WikiLeaks
44,041 DNC Emails from WikiLeaks
138,185 Bahamas Leaks (Names and Companies) from ICIJ Offshore Leaks Database
168,758 Offshore Leaks (Names and Companies) from ICIJ Offshore Leaks Database
212,321 Panama Papers (Names and Companies) from ICIJ Offshore Leaks Database
171,376 Paradise Papers (Names and Companies) from ICIJ Offshore Leaks Database
3,727,246 White House Visitors (2009-2014) from archives.gov
13,083,277 Total

Click here for main page

 

Credit and thanks to Qanon and all who helped make QResearch.ch available.

QResearch is administered by people that do it as a public service.  Just like everyone here at FOTM, there is no pay.  Just people that care.  Searching for the truth.  Because you deserve it.

WWG1WGA

Respectfully,

Deplorable patriot.

 

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Pedophile Jeffrey Epstein co-founded the Clinton Foundation

This news came out more than 2 years ago, but I only discovered this today.

We already know that Bill Clinton had flown on the late convicted-pedophile Jeffrey Epstein’s private plane, dubbed the Lolita Express, dozens of times, as shown in flight logs.

There is also that portrait of Bill Clinton in drag in Epstein’s Manhattan home.

But the connection between the Clintons and Epstein went even deeper.

On July 6, 2016, Fox News alerted us to a 2007 letter by Epstein’s lawyers Alan Dershowitz and Gerald Lefcourt to the U.S. Attorney’s office in the Southern District of Florida, in which Epstein claimed he was part of the original group that conceived the Clinton Global Initiative (CGI). In 2013, CGI was renamed the Bill, Hillary & Chelsea Clinton Foundation.

In the words of the 2007 letter:

Mr. Epstein was part of the original group that conceived the Clinton Global Initiative, which is described as a project “bringing together a community of global leaders to devise and implement innovative solutions to some of the world’s most pressing challenges.” Focuses of this initiative include poverty, climate change, global health, and religious and ethnic conflicts.

The 2007 letter was aimed at boosting Epstein’s image to successfully negotiate a plea deal before Epstein could be tried for using underage girls in a sex ring. Epstein spent 13 months in prison and home detention after agreeing to a plea deal in which he admitted to soliciting just one underage girl for prostitution.

Below are screenshots of page one of the 23-page letter, followed by the excerpt from the letter pertaining to the claim of co-founding the Clinton Foundation.

Fox News could not confirm whether Epstein was an actual founder of the Clinton Foundation. He is not cited in official paperwork filed by the Clinton Global Initiative as a founder or director. However, neither the Clinton Foundation nor Dershowitz responded to FoxNews.com’s inquiry as to the extent of Epstein’s involvement.

What is true is that Jeffrey Epstein had supported the Clinton Foundation financially. This was not made public until 2014 when a whistle-blower released the names of the super-rich, including Epstein, who had Swiss accounts at the HSBC bank. From the whistle-blower’s data, the International Consortium of Investigative Journalists documented $81 million being routed from HSBC Swiss accounts to The Clinton Foundation, including $25,000 from Epstein in 2006 .

The Clinton Foundation has raised hundreds of millions of dollars ostensibly for charitable works in places such as Haiti and Africa, but critics have accused the Clintons of using the foundation as a slush fund and have questioned how much of the donations actually went to helping the poor.

According to Wikpedia, beginning in 2015, the Clinton Foundation was accused of wrongdoing, including a bribery and pay-to-play scheme, “but multiple investigations through 2019 found no evidence of malfeasance.” Indeed, the Washington Post reports on January 9, 2020, that “A Justice Department inquiry launched more than two years ago to mollify conservatives clamoring for more investigations of Hillary Clinton has effectively ended with no tangible results…no criminal charges or other known impacts”.

See also:

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Friday Funnies! A joke *and* Hitler!

We have a joke and Hitler!

A young man named Chuck bought a horse from a farmer for $250. The farmer agreed to deliver the horse the next day.

The next day, the farmer drove up to Chuck’s house and said, “Sorry, son, but I have some bad news, the horse died.”

Chuck replied, “Well then, just give me my money back.”

The farmer said, “Can’t do that, I went and spent it already.”

Chuck said, “Okay then, just bring me the dead horse.”

The farmer asked, “What ya gonna do with him?”

Chuck said, “I’m going to raffle him off.”

The farmer said, “You can’t raffle off a dead horse!”

Chuck said, “Sure I can. Watch me. I just won’t tell anybody he’s dead.”

A month later, the farmer met up with Chuck and asked, “What happened with that dead horse?”

Chuck said, “I raffled him off. I sold 500 tickets at $5 a piece and made a profit of $2,495.”

The farmer said, “Didn’t anyone complain?”

Chuck said, “Just the guy who won. So I gave him his $5 back.”

Chuck grew up and now works for the government.

~Eowyn

Drudge Report has gone to the dark side. Check out Whatfinger News, the Internet’s conservative frontpage founded by a military veteran!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Ruh roh: SF public works director arrested by FBI; charged with public corruption

Mohammed Nuru in some deep doo-doo

SF Gate reports that San Francisco Public Works Director Mohammed Nuru and a local restaurateur were arrested and charged with public corruption by the FBI.

The criminal complaint charges them with wire fraud in connection with an alleged scheme to attempt to bribe a San Francisco Airport Commissioner, United States Attorney David Anderson announced at a press conference.

Excerpts from their report:

The complaint describes a web of corruption involving bribery, kickbacks, and side deals by one of San Francisco’s highest-ranking city employees,” Anderson said in a statement. “The public is entitled to honest work from public officials, free from manipulation for the official’s own personal benefit and profit.”

The defendants both appeared in federal court today and were arraigned and released, each on a $2 million bond. If convicted, they face a maximum statutory sentence of 20 years in prison.

Nuru was initially arrested on this charge on Jan. 21, and said he would cooperate with FBI officials and agreed to not tamper with or disclose the investigation. He was arrested again yesterday for violating those terms.

The main scheme described by the FBI involves the attempted alleged bribery of an unnamed SFO commissioner in exchange for a restaurant contract at the airport. According to the complaint, Nuru and Bovis (the restauranteur also arrested) schemed to give the unnamed commissioner $5,000 and free travel so that she would vote to approve a contract for Bovis’ restaurant Spinnerie. The complaint records multiple conversations between Bovis and an undercover FBI employee who was posing as a friend of a lender. The criminal complaint against Nuru states the unnamed commissioner declined the money, and the contract was never awarded to Bovis.

Anderson outlined four other alleged schemes included in the complaint as examples of the Nuru’s corrupt intentions: First, the complaint alleged Nuru benefited from a Chinese billionaire developing a multi-use project in the city, accepting gifts such as free travel and a bottle of wine valued at over $2,000. He did not report any of the gifts as public officials are required to do.

Second, the FBI alleges Nuru used his position as chair of the Transbay Joint Powers Authority to attempt to secure a desirable restaurant space for Bovis in the Transbay Transit Center. In addition, the complaint alleges Nuru provided Bovis with inside information to give him an unfair advantage in winning contracts for city public restroom projects, including portable bathroom trailers and small container-like housing units for use by the homeless.

Finally, the complaint claims Nuru used a company, which has been awarded city contracts, to work on his Colusa County vacation home at a discounted rate. The complaint also alleges the contractor delivered a John Deere tractor to the home in Stonyford and planned to provide Nuru with training on the machine.”

Nuru was placed on administrative leave effective Monday evening.

Read the whole story here.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

You really trust Shifty Schiff? The one who talks about “the KGB” in present-tense?

I just want to smack that permanent, smug smile off his face.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

“Too early” to say Pensacola Naval shooting was terrorism yet three Saudis apparently filmed the incident

Yesterday morning a Saudi national at Naval Air Station Pensacola opened fire and killed three people before being killed by law enforcement. The Saudi national, a member of the Royal Saudi Air Force, was receiving pilot training (are you kidding me?) at our military installation. His name was Mohammed Saeed Alshamrani (pictured above).

According to Breitbart, a total of six Saudis are being questioned about the incident. Three of those Saudi’s were caught filming the incident.

Yeah, no question about terrorism there AT ALL.

More from the NY Times:

“Six other Saudi nationals were detained for questioning near the scene of the shooting, including three who were seen filming the entire incident, according to a person briefed on the initial stages of the investigation.

It was not known whether the six Saudis detained were students in the classroom building, and there was no immediate indication that those filming the incident were connected to the gunman, the person said.”

Read their whole story here.

In my opinion, it doesn’t take a rocket scientist to deduce that this was most likely an incident of terrorism.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0
 

Demorat Illinois State Sen. Martin Sandoval resigns amid corruption probe

How convenient the state senator dropped the resignation news the night before Thanksgiving weekend.

DCG

Better than Drudge Report. Check out Whatfinger News, the Internet’s conservative frontpage founded by ex-military!

Please follow and like us:

Share and Enjoy !

0Shares
0 0