Hilary Clinton and cronies can access all digital transactions on the planet

Don’t fall afoul of Clintons or they will ‘turn off your chip’

by Alex Bruce

The zombies in our governments and in the mainstream media are observably controlled, whether through bribery, blackmail or both.

If the film, ‘The Spider’s Web’ details the rise of secrecy jurisdictions that have allowed entities to hide their ill-gotten assets in offshore banks, this interview between Douglas Gabriel and Michael McKibben charts the provenance of the Federal Public Key Infrastructure Architecture (FPKIA) of encryption and certificates, which has facilitated total surveillance and the power to blackmail anybody worth blackmailing.

McKibben, Founder of Leader Technologies has been engaged in massive forensic research to produce indictable evidence for their case against Facebook. Several times along the way, they’ve been floored by their discoveries about how the world actually works, in the spheres of high finance, governments and telecommunications.

Don’t upset Hilary or she will turn off your chip. Hilary is a pin-up girl for the Australian Labor Party and the Greens

A recent finding has left him particularly flabbergasted: Hillary Clinton and her cronies have access to all of the digital keys for all transactions on the planet. In other words, unless you can build a new Internet, you – and say, your cryptocurrencies, for example – are accessible by them. This is literally how they can (and do) “turn off your chip”, in the words of the late Aaron Russo.

It started back in the 1980s, while Hillary was a patent attorney at the Rose Law Firm, which for some odd reason represented the patent claims of many of the entities who would become today’s Tech Giants. (That’s a long story that I’ll attempt to unpack in future posts).

Focusing back on the fundamental encryption keys used on the Internet: McKibben says that back in 1993, the Clinton Administration began giving these backdoor encryption keys to the FBI. He says, “By that I mean, anytime you connect from one computer to another, those computers exchange keys and without those keys, you can’t encrypt or decrypt the signal coming from one machine to another.

“So literally, these keys are used in every transaction on the planet that uses the Internet and what we’ve discovered and – I’m still reeling, my mind is boggled by what we’ve now come to find out, but that a company called Entrust was created in 1998 as a spin-off of a Canadian telephone company [Nortel, a now-defunct Canadian telecommunications conglomerate, with people like former US Secretary of Defense, Frank Carlucci on its Board of Directors. Its 2009 bankruptcy was the largest in Canadian history, leaving pensioners and shareholders with staggering losses while Nortel executives continued to draw “retention bonuses” totaling US$190 million during the eight-year post-bankruptcy period].

McKibben continues, “Entrust became the certificate authority for issuing these digital keys for many organizations and we’ve had people looking at the securities filings for this company from 1998 to 2009, when they sold out to a San Francisco firm and what we discovered, astoundingly is that Hillary Clinton’s partner at the Rose Law Firm [Jerry C Jones] directs this company as a Class-One Director. He was slipped in in late 2003 and this means that we can show solid proof that the entire Internet has been compromised, in that Hillary Clinton and the Clintons have access to all the digital keys for all transactions on the planet.”

[AB note: This relates to how people who run afoul of her are robotically de-platformed and de-monetized, as part of the developing Internet of Things and its attendant Social Credit System].

“That is just astounding, how a private individual could have come to have such power but the facts are now clear, that’s the circumstance we’re in right now. This includes almost all of the agencies, executive agencies of the government and that includes the Federal Deposit Insurance Corporation (FDIC), Department of Treasury, Department of Commerce, National Institute of Standards and Technology (NIST), General Services Agency (GSA), the Department of State, the Department of Energy, the US Post Office, the US Patent Office, the US Marine Corps, the US Coast Guard and on and on and on and then beyond that, we see the names of most of the major telecommunications players in Canada, in Scandinavia, in Denmark. According to their records they have over 2,000 key customers and therefore, the Clintons through their Director, his name is Jerry C Jones have access to the entire back door of the Internet.”

McKibben says that even the NSA is subservient to the Entrust Operation, which controls the entire Federal Public Key Infrastructure Architecture (FPKIA).

I’m trying to keep this article short but will stay on this development. You can hear many more mind-blowing details in this interview.

Running Time: 53 min

https://forbiddenknowledgetv.net/this-is-how-they-can-turn-off-your-chip/

Advertisements

About Editor, cairnsnews

One of the few patriots left who understand the system and how it has been totally subverted under every citizen's nose. If we can help to turn it around we will otherwise our children will have nothing. Our investigations show there is no 'government' of the people for the people of Australia. The removal of the Crown from Australian Parliaments, followed by the incorporation of Parliaments aided by the Australia Act 1987 has left us with corporate government with policies not laws, that apply only to members of political parties and the public service. There is no law, other than the Common Law. This fact will be borne out in the near future as numerous legal challenges in place now, come to a head this year.

Posted on September 21, 2018, in 5G, Australian Bankers Association, Hilary Clinton and tagged , , , , . Bookmark the permalink. 2 Comments.

  1. I recently had occasion to ring an Australian government service – My Aged Care.
    An Australian government service that has been outsourced to a private company.
    I was told by a social worker, who was supposedly helping me to organise respite care after surgery, that my agreement with My Aged Care did not include respite care, that the referral code I was given by My Aged Care was incorrect, that she could not find anything in My Aged Care file to assist her with organising respite care after surgery.

    So I rang My Aged Care ….
    My Aged Care’s computer systems has tracking capability ….
    The know if anyone has accessed their website – what they did on their website & how long they stayed.
    The My Aged Care phone assistance person told me that no one had accessed my file – no one.
    The social worker was telling me lies.
    The Australian government has sacked many public servants & the trend will increase, soon all the Australian government services will be outsourced to private companies.
    Why ??
    About 15 years ago the Federal Police attended the local Centrelink office – the rumor was that a staffer / some staffers had created fake accounts – yes folks, they were ripping off Centrelink.
    Time is money – we have been told that the slack government system was due to RED TAPE – in fact it was due to the lazy slobs who procrastinated & lying throughout the Australian government system – COSTING THE AUSTRALIAN TAXPAYER MILLIONS OF DOLLARS EACH YEAR.
    The Australian politician did not care then – there was lots of borrowed money to go around & they did not give a shit – today Australia’s borrowing capacity is diminishing – today TIME IS MONEY.
    Beware & watch what you do on Australian government websites
    if you work in the Australian governmental service system – THEY ARE FINALLY WATCHING WHAT YOU DO.

  2. Interesting article –
    WOLF STREET – Multi Online Banking Systems Go Down in the UK by Don Quijones.

    How lucky are we that we are not cashless.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.