Facebook, The CIA & The Clintons

Secrecy

Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
By: Jon Rappoport
June 20 2017

This article recounts key events along a time line that stretches from 1986 to the present. Follow the bouncing ball.

Since Facebook went public with an IPO (Initial Public Offering) of stock in 2012, I’ve been following the trail of its stock price.

In 2012, I wrote:

“But now the Facebook stock has tanked. On Friday, August 17 [2012], it weighed in at half its initial IPO price. For the first time since the IPO, venture-capital backers were legally permitted to sell off their shares, and some did, at a loss.”

“Articles have begun appearing that question Zuckerberg’s ability to manage his company. ‘Experts’ are saying he should import a professional team to run the business side of things and step away.”

“This has the earmarks of classic shakeout and squeeze play… First, [insiders] drive down the price of the stock, then they trade it at low levels that discourage and demoralize public investors, who sell their shares…As the stock continues to tank, the insiders quietly buy up as much of it as they can. Finally, when the price hits a designated rock bottom, they shoot it up all the way to new highs and win big.”

In 2013, I followed up and wrote: “Facebook launched its IPO and went public on May 18, 2012. The opening stock price was 42 dollars a share.”

“In September 2012, the collapsing stock hit a low of 17.55.”

“On October 17, 2013, a year later, after a long climb, the stock reached an all-time high: 52.21.”

“So…Facebook, a company with CIA-front connections, a company that encourages people to offer up surveillance data on themselves [and censors politically incorrect news], goes through a financial transformation. Its IPO price collapses like ice in a heat wave. It keeps trading at its new low prices, scaring lots of investors.”

“They sell their shares. Insiders buy up those shares at delicious discounts.”

“Then, when the insiders have scooped up enough, they begin to move the price. Up. The long climb begins.”

Now, in June of 2017, it’s time to check in again. What’s happened to Facebook’s stock price since the high of $54 a share in 2013?

From October 2016 to December 2016, there was another shakeout that convinced many shareholders to dump their stocks—and of course, insiders gobbled up those shares for themselves. The shakeout took the stock price down from an all-time high of $127.88 a share to $115.05.

Then, once again, the relentless climb resumed. On June 2nd of this year, the stock reached a new all-time high of $153.61.

All in all, quite a ride. From the IPO price of $42, down to $17…and now $150.

Are some of the insiders who have been engineering Facebook’s long-term stock-rise front-men for the CIA?

I ask that question because of Facebook’s CIA connections:

The big infusion of cash that sent Mark Zuckerberg and his fledgling college enterprise on their way came from Accel Partners, in 2004.

Jim Breyer, head of Accel, attached a $13 million rocket to Facebook, and nothing has ever been the same.

Earlier that same year, a man named Gilman Louie joined the board of the National Venture Capital Association of America (NVCA). The chairman of NVCA? Jim Breyer. Gilman Louie happened to be the first CEO of the important CIA start-up, In-Q-Tel.

In-Q-Tel was founded in 1999, with the express purpose of funding companies that could develop technology the CIA would use to “gather data.”

That’s not the only connection between Facebook funder Jim Breyer and the CIA’s man, Gilman Louie. In 2004, Louie went to work for BBN Technologies, headed up by Breyer. Dr. Anita Jones also joined BBN at that time. Jones had worked for In-Q-Tel and was an adviser to DARPA, the Pentagon’s technology department that helped develop the Internet.

With these CIA/DARPA connections, it’s no surprise that Jim Breyer’s jackpot investment in Facebook is not part of the popular mythology of Mark Zuckerberg. Better to omit it. Who can fail to realize that Facebook, with its endless stream of personal data, and its tracking capability, is an ideal CIA asset?

From the time Mark Zuckerberg was a child and attended the summer camp for “exceptional children,” CTY (Center for Talented Youth), run by Johns Hopkins University, he, like other CTY students, Sergey Brin (co-founder of Google), and Lady Gaga, have been easy to track.

CTY and similar camps filter applications and pick the best and brightest for their accelerated learning programs. Tracing the later progress of these children in school and life would be a walk in the park for agencies like the CIA.

When Zuckerberg founded an interesting little social network at Harvard, and then sought to turn it into a business, the data-mining possibilities were obvious to CIA personnel. Through their cutouts, as described above, they stepped in and lent a helping hand.

During the 2016 presidential campaign, Facebook/CIA presented an anti-Trump stance, which meant a pro-Hillary stance. Is that a pro-CIA stance? Let’s look at a fascinating piece of history involving the CIA and the other Clinton: Bill.

The source here is the explosive 1995 book, Compromised, by Terry Reed and John Cummings.

According to the authors, Bill Clinton, way back in the 1980s, was involved with the CIA in some very dirty dealings in Arkansas—and I’m not just talking about the cocaine flights landing at the Mena airport.

It seems Bill had agreed to set up CIA weapons-making factories in his home state, under the radar. But because Arkansas, when it comes to money, is all cronies all the time, everybody and his brother found out about the operation and wanted in. Also, Bill was looking for a bigger cut of the action.

This security breach infuriated the CIA, and a meeting was held to dress down Bill and make him see the error of his ways. His CIA handlers told him they were going to shut down the whole weapons operation, because Bill had screwed up royally. A screaming match ensued—but the CIA people backed off a bit and told Bill HE WAS STILL THEIR MAN FOR AN EVENTUAL RUN FOR THE PRESIDENCY.

Of course, there are people who think Reed and Cumming’s book contains fiction, but John Cummings was a top-notch reporter for Newsday. He co-authored the 1990 book, Goombata, about the rise and fall of John Gotti. He exposed US operations to destroy Cuban agriculture with bio-weapons. It’s highly doubtful he would have put his name on Compromised without a deep conviction he was correctly adding up the facts.

Here, from Compromised, is an account of the extraordinary meeting, in Arkansas, between Bill Clinton and his CIA handlers, in March of 1986, six years before Clinton would run for the Presidency. Author Terry Reed, himself a CIA asset at the time, was there. So was Oliver North, and a man named “Robert Johnson,” who was representing CIA head Bill Casey.

Johnson said to Bill Clinton:

“Calm down and listen….We are all in this together. We all have our personal agendas…but let’s not forget, both the Vice President and Mr. Casey want this operation to be a success. We need to get these assets and resources in place and get them self-sustaining and prospering on their own while we have the chance. This is a golden opportunity. The timing is right. We have communists taking over a country in this hemisphere. We must all pull together and play as a team. This is no time for lone wolves…

“I’m not here to threaten you [Bill Clinton]. But there have been mistakes. The Mena operation survived undetected and unexposed only because Mr. [Barry] Seal carried with him a falsely created, high-level profile of a drug runner. All the cops in the country were trying to investigate a drug operation. That put the police in a position where we could control them. We fed them what we wanted to feed them, when we wanted to feed them; it was our restaurant and our menu…now we have to shut it down….

“Bill, you are Mr. Casey’s fair-haired boy. But you do have competition for the job you seek. We would never put all eggs in one basket. You and your state have been our greatest asset. The beauty of this, as you know, is that you’re a Democrat, and with our ability to influence both parties, this country can get beyond partisan gridlock. Mr. Casey wanted me to pass on to you that unless you fuck up and do something stupid, you’re No. 1 on the short list for a shot at the job you’ve always wanted.

“That’s pretty heady stuff, Bill. So why don’t you help us keep a lid on this and we’ll all be promoted together. You and guys like us are the fathers of the new government. Hell, we are the new covenant.”

By this account, Bill Clinton was the CIA’s boy back in 1986, long before he launched himself into his first 1992 Presidential campaign.

That speaks of major planning. In 1992, an obscure governor from a rather obscure state suddenly gains national prominence and vaults to the head of the line in the race for the White House.

Now, consider the role of the CIA-connected Facebook in the 2016 presidential election. Did Facebook’s strategy of cutting off pro-Trump postings/information and instead supporting ANOTHER CLINTON, HILLARY, signal the continuation of a long-running covert CIA op to put and keep the Clintons in power?

Since 1986, have the Clintons been a package deal for the CIA?

Was the most recent incarnation of that deal the Facebook op to put Hillary in the White House?

Most people have a problem looking at log-term ops. They conceive of covert actions taking place along severely limited time lines. That’s exactly what major operatives count on. They can plan in the dark for two or three decades ahead (or longer) and feel they’re in the clear.

And when a little social networking company comes along and needs an infusion of cash, they can step in, help, and, seeing the possibilities, they can help push the stock to new highs and accomplish elite surveillance and censor true information and support their favored presidential candidate—all during the same dozen years.

It’s an easy program.

All sorts of cards can be played from the bottom of the deck.

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Crypto-currency, Financial Clearing, & Rogue Hacking Groups


Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
June 7, 2017

Color me crazy, but I’ve never been on the cashless society bandwagon for a variety of reasons, not the least being that anything Mr. Globaloney is for, is probably ab initio et in principio a bad idea. Crypto-currencies, in this light, always struck me as being “too good to be true” and their principal selling point – security and privacy – a little too convenient. They struck me then, and strike me now, as being taylor-made to press Mr. Globaloney’s desire to move everyone to cashlessness.

Which brings me to my second reason for skepticism: the integrity of cyber systems in general. Why anyone would trust such a system is beyond me, especially when, if one wants to turn the clock back a bit to the 1980s, there were already stories circulating about computers being sold with “clipper chips” that allowed your local not-so-friendly three-letter-agencies access to every electronic communication. Then, of course, came the Inslaw-PROMIS scandals of the late 1980s, and we were off and running.

Now, in that context, consider the following article by Rich Haridy – a very intriguing article from several points of view – that was shared by Mr. J.K.:

Shadow Brokers hacking group reveals bizarre data dump subscription plan

Several things caught my eye in this article, and we’d be here for days if I were to blog about all of them, but I want to draw attention to the first thing that really leaped off the page:

The Shadow Brokers first appeared in August 2016, announcing an auction to sell off a set of security exploits the group purportedly stole from the NSA. After the auction failed to reach the absurd asking price of one million bitcoins, the group publicly released four sets of exploits over the following months. One of those exploits contained the now infamous EternalBlue vulnerability that underpinned the recent WannaCry attack.

Since the WannaCry outbreak, the Shadow Brokers have been threatening to release more NSA hacking tools, and in early May the group published a blog post in broken English ominously announcing a bizarre subscription model offering members a monthly haul of data.

The group described it as a, “new monthly subscription model. Is being like wine of month club. Each month peoples can be paying membership fee, then getting members only data dump each month. What members doing with data after is up to members.”

In a follow-up post published more recently, the group explained the process in greater detail. Subscribers can pay 100 Zcash coins (equivalent to over US$20,000) to access the data dump, which will be revealed in the first two weeks of July.

Zcash is a relatively new cryptocurrency launched in October 2016. Purportedly more secure than Bitcoin, the Shadow Brokers’ use of Zcash seems to be less about using a safer cryptocurrency and more about revealing to the public the US government’s connection to its development.

The Shadow Brokers’ blog post explicitly points out that the development of Zcash is allegedly linked to the Department of Defense, DARPA and Israel. It also claims the new cryptocurrency, which was recently accepted as a legitimate currency on iOS and Android platforms, could be a trojan horse with a cryptographic flaw monitored by the NSA or used by the government to send money to deep cover assets outside of banking systems. (Italicized emphasis added)

Now, before we get to my high octane speculation de jour, note the following things:

(1) The hacking group “Anonymous” seems to have dropped off the radar, to be replaced now with “The Shadow Brokers” which raises the interesting questions: (a) has the former group simply rebranded itself and reemerged under a new name? Or did the former simply cease operations? Or are they two discrete groups? One may never know, but as we’ll see in a moment, the question of who and what this new group – the Shadow Brokers – is, is an important component of any speculation regarding what it going on.

(2) The new group is exposing the alleged links of the new cyber-currency to the US Department of Defense, DARPA, and Israel; and,

(3) that said cyber-currency has a “back door” built in, which, of course, raises the entire philosophical objection I have to the whole idea: what is to prevent any cyber-currency, state-sponsored or otherwise, from having a similar “flaw”? Answer: nothing.

Given that flaw, however, note that The Shadow Brokers have tapped into it, which raises the question of just who they are. Here Mr. Haridy explores the options at opposite ends of the spectrum:

This odd series of actions, which seem to be constantly iterating information with a strong anti-government bent, has caused many to question who The Shadows Brokers actually are, and whether their motives are simply mercenary.

Much speculation has floated around the possibility that the group could be a foreign nation state working to embarrass or disrupt the US government’s cyber-spying efforts. A former NSA employee tells Ars Technica that they, “are foreign intelligence, and the continued requests for money are all geared towards plausible deniability that they are intel.”

Edward Snowden tweeted suspicions that the group were Russian hackers back in August 2016, when the original auction was revealed. Over a series of 15 tweets he laid out a compelling case for the original NSA hacks coming from a foreign intelligence, in particular, Russia.

Security specialist Bruce Schneier also published a more recent, and exhaustive, investigation into the source of the mysterious hacking group. He concludes, quite reasonably, that while they are seemingly not just random hackers or cybercriminals, it also looks unlikely they are a cyber-intelligence sector of a nation state due to their erratic and anarchic activities.

All of this brings me to my high octane speculation of the day. Assuming the first hypothesis, that the group is a state-sponsored group, then the effect of their action seems to be to expose the extent of NSA electronic eavesdropping, and the lack of integrity of cyber systems. If, on the other hand, it is a private group, the effect would be the same. But it is the effect itself that seems to be being ignored by analysts hypothesizing on who they are and what they’re up to, for regardless of whether or not they are state-sponsored (and that means, even a group or faction within the American military-intelligence complex), or not, the group is (1) Calling into question the integrity of cyber systems in general and (2) crypto-cyber currencies in particular. And hence it strikes me as being entirely possible that the real ultimate and deepest motivation of these types of attacks is to call into question the whole agenda of cashless society, all firmly under the control of Mr. Globaloney. In support of this high octane speculation, recall that even Darth Soros was recently hacked, and some of his financial dealings exposed to scrutiny.

If my hypothesis is true, expect more such hacks, and more such exposure of the global super-elite.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

11-Year-Old Activist Warns About The Internet Of Things By “Weaponizing” A Teddy Bear


Source: ActivistPost.com
Kevin Samson
May 18, 2017

The new “smart world” that we are embarking upon as an increasing number of our computerized devices and objects become part of The Internet of Things has promised more convenience and more efficiency. And, yet, not a day seems to pass without a report about hacking.

While malware, election rigging, and corporate attacks tend to take center stage, a disturbing amount of very personal cyber invasions are also on the rise. Here is just a small sampling of articles that represent the dangerous and the downright creepy side of connecting one’s life to the Internet.

By now it should be obvious, even to a child, that we have a problem here. Well, in fact, it might just be a child who can help wake up the world to the scope of the issue.

An AFP article titled “Cyber Kid Stuns Experts Showing Toys Can Be ‘Weapons’” has gone viral. 11-year-old Reuben Paul took the stage at the World Forum cyber security conference in The Hague.

“From airplanes to automobiles, from smart phones to smart homes, anything or any toy can be part of the” Internet of Things (IOT),” he said, a small figure pacing the huge stage at the World Forum in The Hague.

“From terminators to teddy bears, anything or any toy can be weaponised.”

“IOT home appliances, things that can be used in our everyday lives, our cars, lights refrigerators, everything like this that is connected can be used and weaponised to spy on us or harm us.”

Reuben demonstrated this fact by first obtaining the numbers of audience members via their Bluetooth connection, then taking one of the numbers to hack into his toy teddy bear. The bear now became a surveillance and recording device.

 Although 11-year-old Reuben does appear to be a bona fide “cyber ninja” whiz kid, AFP‘s contention that this “stunned experts” stretches the truth a bit. Listen here to a 2012 speech given by DARPA’s Program Manager, Dr. Kathleen Fisher. Sound familiar?

Fortunately, it doesn’t appear that young Reuben is on his way to work for the dark side. Instead he is shouting from the rooftop that we are entering a very dangerous new world where the things around us become “timebombs” as he calls them. Reuben also isn’t stopping with giving speeches to the “experts”; he has formed the CyberShaolin non-profit organisation “to inform kids and adults about the dangers of cyber insecurity.” Let’s hope that Reuben will indeed spearhead a new way forward to fix what the adults in the room should have properly addressed all along.

Kevin Samson writes for Activist Post, where this article first appeared.

Facebook Announces Mind-Controlled Computer Technology

Source: ActivistPost.com
Jake Anderson
April 21, 2017

On Tuesday, Facebook founder Mark Zuckerberg dropped a stunner when he announced to the attendees of F8, Facebook’s annual developers’ conference, that the tech giant is developing technology that will allow users to communicate using only their minds. The technology will come in the form of implantable chips that will create a brain-computer interface (BCI). It’s one of several secret projects being developed in the mysterious R&D division Building 8 labs.

Zuckerberg’s past statements on the fabled brain-computer interface have been nothing less than tantalizing. In 2015, Zuckerberg laid out his personal vision for the technology:

“One day, I believe we’ll be able to send full rich thoughts to each other directly using technology,” Zuckerberg said during a Q&A. “You’ll just be able to think of something and your friends will immediately be able to experience it too if you’d like.”

On Tuesday, Zuckerberg confirmed BCI as one of four technologies the tech giant is currently developing in B8 (in addition to augmented reality, drones, and cameras). This isn’t exactly news, as it’s been known for some time that Facebook was heading in this direction. A recent job post by the company called for “an experienced Brain-Computer Interface (BCI) Engineer who will be responsible for working on a 2-year B8 project focused on developing advanced BCI technologies.”

Zuckerberg teased everyone by announcing more details would be released today, and indeed, they were.

On Wednesday, former DARPA executive Regina Dugan, who also worked for Google’s advanced projects division and currently heads the Building 8 division, told conference attendees that a research team of 60 engineers is currently developing technologies that will allow people to type at 100 words per minute using only their minds. BCI applications will also enable people to control augmented and virtual reality interfaces using only their thoughts.

It appears Dugan is making headway on her original job description, which was to develop “technologies that fluidly blend physical and digital worlds.”

More details about Facebook’s BCI technology will be released in the coming days.

Read More At: ActivistPost.com