WELCOME |
![]() |
![]() comments, ephemera, speculation, etc. (protected political speech and personal opinion) - If this is your 1st visit to this page, please start at the bottom - 2025- This web site was taken
down on 11 August 2024
by the Censorship Industrial Complex. We shall resume operations as soon as our 1st Amendment rights are fully restored. 2024- NOVEMBER ELECTION FACTS
The Deep State knows 4 to 5 hours after polls close who won a presidential election. It doesn't take several days. With the CIS ALBERT Sensors they know the results by late on election day. In 2020, counting was stopped in so-called swing states (it's more accurate to call them cheat states) once the magnitude of President Trump's landslide re-election victory was known. The cheaters needed several days to change electronic tallies, switch votes, destroy legitimate ballots and create illegitimate ballots. ANY STATE THAT STOPS COUNTING OR TAKES MORE THAN 24 HOURS TO PUBLISH ELECTION RESULTS IS CHEATING. 2024-08-13 g TRUMP NOT IN DECLINE TRUMP & MUSK TWITTER
SPACE ON 𝕏
* * * * * * * * * * * * * * * * See also: https://revolver.news/2024/08/over-one-billion-views-and-counting * RELATED: * * *
2024-08-13 f CNN IN DECLINE EVEN COLBERT'S AUDIENCE
KNOWS
CNN SPEWS PROPAGANDA * See also: https://modernity.news/2024/08/13/colberts-own-audience-laughs-at-him-seriously-stating-cnn-is-objective 2024-08-13 e OWNERSHIP IN DECLINE THE WORLD'S RICHEST KHAZARS
WANT TO OWN EVERYTHING. SPOILER ALERT: THEY NEVER WILL. You Might Own Nothing
Sooner Than You Think
Imagine a world where ownership is a distant memory, replaced by an eerie semblance of joy in dispossession. In 2016, Klaus Schwab, the enigmatic architect of the World Economic Forum, foretold a future whereby, in 2024, humanity would be stripped of its possessions, shackled in digital chains, yet deceived into a state of contentment. Initially dismissed as lunacy, we stand on the precipice of this harrowing reality; Schwab’s vision looms ominously over us, more prophetic than we dared to believe. For decades, a clandestine cabal of technocrats has meticulously orchestrated our descent into digital serfdom. We sleepwalked into their trap and surrendered our rights and possessions to those who wield the power of the keystroke. In this brave new world, ownership is an illusion, and with a mere digital command, everything we hold dear can be seized. This article unveils the sinister agenda behind the facade of progress. It explores the erosion of ownership through click-wrap agreements, the dematerialization of our assets into databases over the past few decades, the rise of Central Bank Digital Currencies (CBDCs), which threatens our control over money, and The Great Taking, which threatens our control over the rest of our non-monetary assets. All is not lost, although, in a separate article, I will address that our salvation comes not at the ballot box but through our radical non-compliance. Technology can either be used to promote freedom or tyranny. I will discuss how we can adopt technologies to counter the digital slave system actively being developed by technocrats, thus guaranteeing our privacy, ability to engage in voluntary trade, and retention of our free will. The Erosion of Ownership: A Descent into Digital SerfdomIn the bleak dawn of the digital age, we find ourselves trapped in a labyrinth of click-wrap agreements; our freedoms quietly surrendered to the whims of faceless corporations. The once-mighty notion of personal ownership has been reduced to a mere abstraction, a quaint relic of a bygone era. As we click “I agree” with reckless abandon, we seal our fate, surrendering our autonomy to the technocrats who manipulate and control us through the devices we thought would liberate us. Once hailed as a bastion of freedom and progress, the digital realm has devolved into a dystopian nightmare where our every move is tracked, monitored, and exploited. ![]() The Insidious Nature of Digital ControlWe are lulled into complacency by the convenience and ease of digital transactions, unaware of the subtle yet pervasive manipulation that underlies every click, every swipe, and every tap. The fine print, a behemoth of legalese, conceals the true nature of our agreements, hiding in plain sight the draconian terms that govern our digital existence. Consider the staggering numbers: we encounter an estimated 150-400 click-wrap agreements per year, each a ticking time bomb of obligations and responsibilities that we blithely accept without a second thought. These agreements are ubiquitous, embedded in every aspect of our digital lives:
A Life Sentence of ReadingTo keep up with the fine print, we would have to devote up to an hour every day, 365 days a year, just to read the agreements. This is the actual cost of our digital existence: a life sentence of reading, a never-ending task that would consume a significant portion of our daily lives. A Study in DeceptionA recent experiment revealed the shocking truth: 74% of participants blindly accepted terms that would have surrendered their firstborn children to the service’s owners and provided their personal information to the NSA. As one researcher noted:
The Stage is Set for Asset TransferOur increased participation with these clickwrap agreements has set the stage for our assets to be transferred at the click of a button. With the rise of digital currencies, online marketplaces, and social media platforms, our financial, personal, and creative assets are more vulnerable than ever. The implications are dire: a future where our assets are seized, frozen, or transferred without our consent, all under the guise of “agreements” we never truly understood. We have unwittingly surrendered our autonomy, creativity, and humanity to the whims of corporate overlords. As you will see in the coming sections, the assignment of our rights through digital agreements, CBDCs, and asset tokenization will soon leave us owning nothing. Because this article is long, I will keep a cumulative list of key takeaways as bullet points at the end of each section. Key takeaways:
The Digitized Domain: A House of Cards Built on Fragile Databases and Corrupt IntermediariesThe digitization of our lives has bestowed upon us a double-edged sword: convenience and vulnerability. We’ve traded the tangible for the intangible, surrendering our assets to the capricious whims of databases and their intermediaries. But let’s be clear: databases are not just peripheral components of our digital lives but the foundation of modern commerce. Consider it:
corporations and governments store every
transaction, asset, and record of ownership in a
database. Your car title, house deed, and even the
shares you hold in a company are all reduced to mere
data points within these centralized repositories.
And yet, we’re asked to trust that these systems
will safeguard our investments and identities from
prying eyes and malicious actors. But here’s the thing: most of our assets have already been digitized. They exist only as entries in a database, and their value is entirely dependent on the integrity of that database. If the database is compromised, the asset is compromised. If the database is destroyed, the asset is destroyed. Database corruption is not just a theoretical risk; it’s a very real one. The financial losses alone are staggering—$1 trillion in 2017, a projected $10.5 trillion by 2025. And what of the human cost? The disruption of lives, the theft of identities, the destruction of trust? The intermediaries who manage these databases – governments, corporations, and financial institutions – have become gatekeepers to our assets, wielding influence over markets and shaping economies. And yet, we’re expected to accept their security and stability assurances blindly. Let’s take a step back and consider the current state of affairs. The labyrinthine transaction process, as we know it today, is a veritable goldmine for the parasites and leeches that thrive in its shadows. Third-party intermediaries—lawyers, brokers, or bureaucrats—add layer upon layer of time, money, and expense to every transaction, like a suffocating ivy strangling the life out of a tree. Just as the ivy’s tendrils wrap around the tree’s trunk, squeezing out its vitality, these intermediaries choke the life out of our transactions, draining them of efficiency, transparency, and fairness. Consider this: according to some estimates, these parasitic middlemen gobbled up as much as 30-40% of the revenue in specific industries. That’s right, nearly half of every dollar you spend can vanish into the abyss of unnecessary costs and inefficiencies before it even reaches the hands that produce the goods or services we desire. And what do we get in return for this fleecing? A system riddled with redundancies, opacity, and corruption. This concern isn’t new. You can read all about it in the pages of The Wealth of Nations by Adam Smith, who warned against the evils of middlemen and monopolies over two centuries ago.
Whether we like databases being at the heart of commerce or not, they aren’t going away. A new trend is emerging: tokenization, which converts assets into unique digital tokens that can be stored and traded on digital ledgers. Tokenization means a digital token will eventually represent everything from property to goods to services. As we’ll explore in future sections, this shift towards tokenization can either fix some of the security problems and inefficiencies associated with middlemen or create a new level of tyranny. With tokenization, we may be able to create a new, decentralized system for managing our assets and transactions or further surrender our control of our assets to the globalist cabal. Key takeaways:
The Money in Our Bank Accounts Doesn’t Belong to UsWe’ve come to understand that we’ve been signing away our rights digitally, surrendering control over our lives to the whims of centralized databases and their intermediaries. But the loss of ownership doesn’t stop there – it permeates every aspect of our existence, from our cars and houses to our money. Let’s start with what should be our most basic financial instrument: the bank account. We consider the money in our bank accounts ours, but a closer look reveals a different reality. Through my research on the terms and conditions of the four largest banks – Bank of America, Chase, Wells Fargo, and Citibank – I’ve discovered that they can cancel the account without cause, sell or give away our data (and they do give our transaction info to the IRS for use with AI to make sure the taxman gets his cut), change fees, and even modify the terms and conditions at will. I encourage you to check the terms and conditions of your bank account. These contractual terms mean that the money in our bank accounts doesn’t belong to us. It’s held in trust by these financial institutions, subject to their whims and control. And with digital transactions comprising the majority of economic activity—a staggering $3 trillion as of 2023—it’s clear that our money is already primarily digitized. The insidious tendrils of centralization have trapped us all, from the high and mighty to the lowly and obscure. It’s a web of control extending far beyond mere money – it’s a stranglehold on our lives. Consider the cases of Nigel Farage, Dr. Joseph Mercola, and his family – their bank accounts were summarily closed without explanation or provocation. And who’s next? Kanye West, Nick Fuentes, gun groups, religious associations, professional unions, and even protesting truckers – all targeted for exercising their rights, all silenced by the banks. At this point, we aren’t even talking about CBDCs. When people bleat about CBDCs today, they mostly talk about getting their money shut off or being monitored. That already happens today. The threat isn’t the CBDCs of tomorrow but the current state of the dollar today. CBDCs simply take this surveillance and programmability to the next level – paving the way for complete digital tyranny. An Introduction to TokenizationBut what if there was a way to break free from the shackles of these intermediaries and their centralized databases? A way to reclaim ownership and control over our assets, to strip away the layers of unnecessary costs and inefficiencies that plague our transactions? Enter the world of digital tokens. A digital token is a unique digital identifier representing something of value, like a coin or a piece of property. Unlike traditional databases, where information is stored in a single, centralized location, digital tokens are decentralized, meaning they exist independently on a network of computers. Tokenization allows for peer-to-peer transactions without needing a middleman or relying on a single, vulnerable database. Digital tokens can create a more secure, transparent, and efficient system for exchanging value. However, not all tokens are created equally. These tokens could promote freedom, decentralization, or free trade or be used as a surveillance mechanism that leads to confiscating our assets. The following is a high-level overview of token types, followed by an overview of the massive range of uses for tokenization. In subsequent sections, we will go through specific examples of tokenization and highlight the dimensions of freedom versus tyranny.
Considering all of this, we’re witnessing the dawn of a new era in finance, where the tokenization of assets has unleashed a staggering $1.5 quadrillion+ market (yes, you read that right). But it’s not just the impressive size—the breathtaking breadth of possibilities that’s truly revolutionary. Imagine being able to buy, sell, and trade anything of value, from the most minor, most personal items to the most significant, most complex assets. Tokenization is making this a reality. For instance, a rare, vintage car can be tokenized and sold to a collector, while a massive renewable energy project can be tokenized and traded on a global market. A small, independent filmmaker can tokenize their latest movie and sell it directly to viewers, cutting out intermediaries and retaining creative control. Meanwhile, a multinational manufacturer can tokenize its inventory, optimize logistics, and streamline operations. A local, community-supported farm can tokenize its weekly harvest, allowing customers to pre-order and pay for their favorite produce in advance. At the same time, a global e-commerce platform can tokenize entire shipping containers, facilitating international trade and reducing transaction costs. The possibilities for tokenization are vast, from intellectual property rights to sustainable forestry credits, from virtual event tickets to rare, collectible books. Whether it’s a small, niche item or a massive global market, tokenization unlocks new opportunities for creators, entrepreneurs, and investors. Anything of value can be tokenized, traded, and owned. The boundaries between the physical and digital worlds are blurring, and the distinctions between asset classes are dissolving. I have researched a total of 50 different categories of assets that can be tokenized. Here are just the top 20: ![]() The key takeaway from this section is that anybody can tokenize anything of any size or value for trade anywhere in the world. Or, it could be tokenized, programmed, monitored, and censored by 3rd parties. Either way, tokenization is here. Key takeaways:
The Tokenization of MoneyThe cornerstone of “You will own nothing and be happy” involves technocrats seizing control over the means of exchange for goods and services. Building on the types of tokens described in the previous section, I want to divide money tokenization into two sections: money issued by central banks/governments and money separated from the state. From there, we will look at each of their attributes. This table provides an overview of the types of tokenized money: ![]() At the outset, it is essential to state that most people worry about programmable, tokenized money, which exists in the form of CBDCs and bank-issued stablecoins. As we discussed earlier, our current dollar (mainly used today in digital form) can already be monitored and censored – a considerable perceived concern for those worrying about CBDCs. However, CBDCs and bank-issued stablecoins both have the potential to add the following dystopian features:
At the outset, it is essential to note that there are more CBDC accounts globally than decentralized crypto accounts. In 2020, 35 countries were mainly in the research phase of CBDCs (except China). Today, there are 134 countries at various stages of researching, piloting, and rolling out CBDCs, representing 98% of the global GDP. You can track the real-time developments of CBDCs through the Atlantic Council’s website. Eleven countries have already rolled out CBDCs (although eight in the Eastern Caribbean have moved back to the pilot phase to work out some kinks in their systems). As I outline in my book, The Final Countdown: Crypto, Gold, Silver, and the People’s Last Stand Against Tyranny by Central Bank Digital Currencies, there is an end goal to all of this. The ultimate plan is to connect all CBDCs and digital assets on a shared ledger that can be tracked, programmed, and censored, and for an ultimate convergence to a single global digital currency backed by energy credits. The technocracy movement, which started in the 1930s and picked up steam in the early 1970s with the formation of the Trilateral Commission by David Rockefeller and Zbigniew Brzezinski, has dreamed of flipping the global economy from a price-based system to an energy-credit-based system. If this sounds far-fetched, I want to introduce you to the Doconomy MasterCard, a credit card co-sponsored by the United Nations through its Climate Action Sustainable Development Goal (SDG), SDG 13—Climate Action. This MasterCard tracks your carbon usage; your card shuts off when you hit a specific limit. ![]() MasterCard has brought together 150 major corporations, including banks like Barclays and HSBC, retailers like Saks Fifth Avenue and L.L.Bean, and airlines like American and Emirates to track and monitor the carbon footprint of our daily activities. The goal is to measure the environmental impact of every transaction, purchase, and action. This means that airlines will calculate the emissions from their flights, and sports organizations like the PGA Tour and Major League Baseball will assess the carbon footprint of their events. The idea is to hold companies and individuals accountable for their environmental impact, but it also raises concerns about the level of surveillance and control over our daily lives. But let’s be clear: this initiative is not just about companies being socially responsible. It’s a new system of tracking and monitoring our carbon footprint, which could have severe implications for our freedoms. If this trend continues, we may soon face a world where every financial transaction is scrutinized for its environmental impact. This tracking could lead to a situation where we must conform to strict environmental standards with little control over our economic choices. The question is, do we want to live in a world where environmental authorities monitor and judge our every move? I can’t state this clearly enough—for years, MasterCard has been working with large multinational corporations around the globe to track carbon, tie it to financial transactions, and halt the use of money when certain thresholds are met. This energy-credit-based system is the basis for complete digital tyranny and is the endgame of CBDCs. We won’t get to a global energy-credit-based system in one step, and we won’t give up all of our assets in one step either – they will use salami tactics – slice by slice. It is a 3-step process:
Given the current presidential race, there has been much talk about CBDCs in the US. It is current policy under President Biden, through Executive Order 14067, to pursue a CBDC while taking a whole-of-government approach to regulating digital assets. In February, Trump came out strongly against CBDCs (which I had a tiny part of, as discussed in this Zero Hedge article), which he reiterated at the Bitcoin Conference in Nashville in late July. RFK, Jr. has also said he is against CBDCs. Unfortunately, this has engendered a highly misplaced sense of complacency in many. Under the Biden approach (which, at this point, will also be the Kamala Harris approach), we will get a CBDC likely similar to what has been piloted through Project Hamilton. Project Hamilton, a collaboration between the Federal Reserve Bank of Boston and MIT’s Digital Currency Initiative, represents a significant step towards implementing a US Central Bank Digital Currency. This initiative has successfully demonstrated the technical feasibility of a digital dollar, with its prototype capable of processing an impressive 1.7 million transactions per second. This high-speed transaction capability suggests that the technology is ready for deployment and could replace traditional cash systems. The other way we get a CBDC is through bank-issued stablecoins. Based on our description of token types above, CBDCs and bank-issued stablecoins are closed systems with limited access, private operations, and centralized control. To be clear, the Republicans in the House have put together bills that would give regulated financial institutions the exclusive right to issue stablecoins. While it isn’t technically a central bank digital currency, since the banks own the central bank, in the end, it is a distinction without a difference because it will still enable all of the programmability and digital tyranny features expected from a CBDC. We have discussed the tyranny side of tokenized money, but what of the alternatives? There are over 20,000 different cryptocurrencies; as I like to say, it’s the 99% that make the other 1% look bad. Nevertheless, there are various alternatives in the form of open systems, transparent gated systems, and privacy-focused open systems (as outlined in the table at the beginning of this section). I will expand on the explanation of these categories, give specific examples, and then weigh the pros and cons of each. Open SystemsOpen Systems, exemplified by Bitcoin, are the pioneers of decentralized cryptocurrencies. These systems operate on a universal, permissionless network, allowing anyone to participate, verify transactions, and hold a copy of the blockchain. Bitcoin transactions are pseudonymous, not anonymous. While users are identified by wallet addresses rather than names, these addresses can be linked to real-world identities through advanced chain analysis and AI techniques. Companies and government agencies use sophisticated tools to analyze blockchain data, track transaction patterns, and correlate this information with external data sources like exchange records and social media. This analysis allows for the de-anonymization of users, cluster analysis of related addresses, and tracing fund flows across multiple transactions. As these technologies continue to advance, it’s becoming increasingly possible to identify the individuals behind Bitcoin and Ethereum transactions, eliminating practical anonymity on these networks. Users should know that their cryptocurrency activities may be more traceable and linkable to their real-world identities than expected—many people in prison today, including friends of mine, whose assets were identified using these methods through civil asset forfeiture laws. The so-called Bitcoin Strategic Reserve that Trump announced at a recent Bitcoin Nashville conference would be built on coins seized through civil asset forfeiture, which raises fundamental questions about the fungibility of Bitcoin. Fungibility is a fundamental property of money that ensures that all currency units are interchangeable and of equal value. In other words, if you lend someone a $10 bill, it doesn’t matter which specific bill you give them – any $10 bill will do. However, Bitcoin’s ability to be traced and identified through its blockchain means that not all Bitcoins are created equal. Suppose a Bitcoin has been seized through civil asset forfeiture or associated with a particular user or activity. In that case, it can be flagged and potentially whitelisted or blacklisted in the future. The ability to classify BTC into categories by address means that some Bitcoins may be treated differently, undermining their fungibility. As a result, Bitcoin fails to meet critical criteria for a reliable and trustworthy currency. Without fungibility, a currency’s value and utility are compromised, making it less useful for everyday transactions and more vulnerable to manipulation and control. The grubby paws of state surveillance now sully Bitcoin’s promise. In recent weeks, Peter Thiel, Tucker Carlson, and Edward Snowden, the most fastidious of whistleblowers, have all sounded the tocsin: the lack of privacy in Bitcoin transactions is an affront to the very ethos of decentralization. Transparent Gated Systems (Private Stable Coins): A Compromise on FreedomTransparent Gated Systems, such as USDC and USDT (Tether), attempt to balance decentralization with regulatory compliance. However, this compromise comes at the cost of reduced financial freedom. These systems have key characteristics that set them apart from other currencies. They are designed to be more accessible and user-friendly, but this comes with trade-offs. For example, participation in the network may be limited to approved entities or require specific permissions, creating barriers to entry. The level of centralization is relatively high, which can impact security and censorship resistance. Additionally, Transparent Gated Systems often engage with regulatory bodies and implement Anti-Money Laundering (AML) and Know-Your-Customer (KYC) procedures, increasing the risk of government surveillance. One of the main concerns with Transparent Gated Systems is the lack of decentralization. They are often controlled by a single company or organization, which means that users’ money could be in trouble if something goes wrong with that company. This is because the currency’s value is tied to the value of a traditional currency, such as the US dollar. Furthermore, Transparent Gated Systems are vulnerable to various risks, including:
While Transparent Gated Systems may offer some benefits, such as faster transaction times and lower fees, these benefits come with significant risks. Ultimately, Transparent Gated Systems represent a compromise between freedom and control. They occupy a middle ground between traditional and decentralized, secure currencies like Bitcoin. However, this middle ground comes with significant trade-offs, and users must be cautious when using these systems. Privacy-Focused Open Systems: The Guardians of Anonymity*Privacy-focused open Systems, such as Zano, Monero, Zcash, and Pirate Chain (ARRR), are designed to protect user anonymity and confidentiality. These systems utilize advanced cryptographic techniques to conceal transaction details and participant identities, ensuring high privacy. Another important point of differentiation exists within the realm of privacy-focused coins. Privacy coins that are private by default require no extra effort on the user’s part to remain private (Zano, Monero, and Zcash fit this description). Other coins, like Bitcoin Cash (which uses something called CashFusion) and Litecoin (which uses a technology called MimbleWimble), can optionally offer privacy. Still, it requires extra steps on the part of the user. The benefits of Privacy-Focused Open Systems are clear. They offer robust user anonymity and confidentiality protection, making them an attractive option for those seeking to maintain their financial freedom. However, there are also potential drawbacks to consider. The complex cryptography can make these systems more vulnerable to security risks, and the smaller network size can impact decentralization. Despite these challenges, Privacy-Focused Open Systems represent a crucial step toward creating a more private and resilient financial ecosystem. We can build a system that values individual autonomy and peer-to-peer trade by prioritizing decentralization, anonymity, and financial freedom. Ultimately, this approach can transform our thoughts about money and financial transactions and create a more equitable and just economic system. We need not get stuck with dystopian, centralized, closed systems like those offered by CBDCs and bank-issue stablecoins. There are alternatives out there. However, open systems like Bitcoin (BTC) have proven to be too transparent for their own good and have become a form of surveillance coin. While private stablecoins appear to improve our current digital fiat system, they involve so many intermediaries and points of failure that they undermine their use case and are highly subject to regulation. In the end, our best path forward to stopping digital tyranny through CBDCs and bank-issued stable coins is through privacy coins and tokens like Zano, Monero, and the other coins mentioned above. At this point, all we’ve discussed is tokenized money—we haven’t even begun exploring the other 95% of the $1.5 quadrillion asset market that will be tokenized. Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins. Key Takeaways
The Great TakingMoney represents only 5% of total global assets. Most of the rest will ultimately be tokenized as well. However, rather than go straight to comparing and contrasting the technical options for other asset tokenization, I offer a brief interlude to share a frightful bit of news about developments related to the tokenization of stocks, bonds, and other financial instruments that might be the single most significant catalyst to fulfilling Klaus Schwab’s “You will own nothing” agenda. David Rogers Webb is a former highly successful hedge-fund manager and author who has exposed the most significant financial heist of our time in his book The Great Taking. For several months, I’ve reached Webb’s work and collaborated with people to help spread the word about what he’s uncovered. You can watch the video and read the book for free. As our current financial system begins to show signs of stress, I am seeing people share clips from movies about the 2008 crisis, such as The Big Short and Margin Call. Imagine if you could watch/read about the next collapse and its aftermath BEFORE it actually happened and take steps to protect yourself. That’s how important I believe this material is. Webb’s meticulous research unveils a disturbing evolution in our financial laws spanning decades. Starting in 1994, the financial elite orchestrated changes to the Uniform Commercial Code across all 50 states, subtly altering the very nature of securities ownership. By 2005, they had engineered “Safe Harbor” provisions, rigging the system to ensure that when financial catastrophe strikes, they’d be first in line to claim the spoils. The 2008 collapse didn’t trigger these changes–it merely exposed their insidious effects. This carefully crafted legal framework ensures that in the next great financial collapse, the “protected class” of financial institutions stands poised to swoop in and seize assets with unprecedented speed and legal backing. The targets of this cunningly designed scheme? Your stocks, bonds, 401(k)s, and retirement accounts–the very bedrock of middle-class financial security. While sold as necessary safeguards, these laws have effectively tilted the playing field, leaving ordinary investors vulnerable in times of crisis. The 2008 Lehman Brothers shows that when the chips are down, the system is primed to favor the financial titans, potentially leaving the rest of us scrambling for scraps. Let’s begin with the basics. When you “buy” stocks (publicly through a 401K and using a broker), you don’t receive the actual stock certificates or have direct ownership rights. Instead, your broker holds them in “street name,” and there are multiple layers of intermediaries between you and the actual stock. The Depository Trust Company (DTC) and its nominee, Cede & Co., own most shares, with your broker and other financial institutions holding mere electronic records of your “beneficial ownership.” This “indirect holding” system is a labyrinthine construct designed to make trading more efficient, which also means you don’t own your stocks directly. To make this point even more precise, in 2012, when Hurricane Sandy hit New York, one of DTCC’s vaults housing these stock certificates flooded, soaking 1.3 million. That single vault held paper stock certificates valued at over $39 trillion! ![]() The DTCC vault was flooded in 2012 – soaking 1.3 million stock certificates. Note: This is not an actual picture but added to show how centralized our stocks are and that we don’t own the shares. But that’s not all. Large institutional investors like BlackRock, Vanguard, and State Street, who manage massive index funds and ETFs, have voting rights for the shares they hold, giving them influence over company decisions, even though individual investors technically own the underlying shares. And suppose you think that’s not enough. In that case, many brokerages engage in practices like securities lending, where they can lend out “your” shares to short sellers for a profit, often without your knowledge or any benefit to you. So, when you see charts like this showing that Blackrock, Vanguard, and State Street own everything, the irony is that our stocks are purchased with the money we think we own that we’ve given them voting rights to. And, in a great financial collapse, secured creditors (like JP Morgan Chase, Bank of America, Wells Fargo, and Citigroup) will own our stocks through bankruptcy! ![]() Now, you may be thinking, “What’s the big deal? I still get my dividends and can sell my stocks whenever possible.” But, my friends, that’s precisely the point. You don’t own the stocks; you own a right to the value and benefits of those stocks. And in a financial crisis, this could complicate who owns what. This, my friends, is the Great Taking – a potential massive transfer of wealth legally enabled by changes most people are unaware of. It’s a stark reminder that the very foundations of our financial system are designed to protect the interests of large institutions at the expense of individual investors. You don’t own your investments; you merely have a contractual claim against a system rigged against you. Here’s the even more worrisome development. Wall Street is working with the central banks and others to develop a system for tokenizing these stocks and bonds on the same platform as CBDCs. Once this is done, The Great Taking could happen with the click of a mouse button. Everything will be tokenized; the default tokenization is through a closed system, and we have to begin looking for alternatives before it is too late. Key Takeaways
Tokenizing Other AssetsSo, there you have it. Legally, you don’t own your stocks, bonds, and 401Ks. Just like with our privacy and data ownership, we have given away our ownership in our retirement investment vehicles, in this case, through click-wrap agreements and strategic changes made by the incumbent financial services industry through changes in the UCC laws in all 50 states. The tyranny versus freedom aspects of tokenizing money, described in the previous section, apply to tokenizing all other assets as well. ![]() Let’s start with the bad news first. Just as the growth of CBDCs has dwarfed the development of decentralized cryptocurrencies, it appears that all of the momentum is now on the dystopian command and control side of the tokenization of other assets. Generally, tokenized assets through the CBDC system will use the Transparent Gated System type. Transparent Gated Systems (Permissioned Systems)Transparent Gated Systems, such as the Regulated Liability Network (RLN), attempt to balance decentralization with regulatory compliance. However, this compromise comes at the cost of reduced financial freedom. Key characteristics include:
What is a Regulated Liability Network (RLN)? The Regulated Liability Network (RLN) is a proposed global financial infrastructure that aims to digitize and connect various forms of money and assets across countries. Here’s an explanation for a general audience: What is the RLN? The RLN is envisioned as a shared digital platform where central banks, commercial banks, and other regulated financial institutions can issue, transfer, and settle digital versions of traditional financial assets. This platform includes central bank digital currencies (CBDCs), tokenized bank deposits, government bonds, stocks, and potentially even regulated versions of cryptocurrencies and stablecoins (imagine having to register Bitcoin, Ethereum, and your other cryptos on a centralized system). How it works: 1. Digital tokens: Financial assets are represented as digital tokens on the network. These are permissioned tokens, as per the table above. 2. Multiple oversight: Authorized parties, including central banks, financial regulators, and law enforcement agencies, can monitor, track, and potentially censor these tokens. 3. Asset registration: An asset must be registered and approved for trading on the RLN. This registration applies to stocks, bonds, stablecoins, and potentially other cryptocurrencies. 4. KYC/AML implications: The system would require strict Know Your Customer (KYC) and Anti-Money Laundering (AML) procedures. Every participant and transaction would be identifiable, eliminating anonymity. 5. Global connectivity: Different countries’ CBDCs and financial systems would connect to the RLN, creating a global digital asset and money platform. Key players behind the RLN:
Relation to “The Great Taking:” The RLN is the missing piece that could facilitate large-scale asset transfers or seizures due to its comprehensive nature and the level of control it offers to authorities. Here’s a table illustrating how the RLN might relate to aspects of “The Great Taking:” ![]() I know that this table has a lot of technical jargon, so let me simplify the explanation: The Regulated Liability Network (RLN) is the ultimate tool for the wholesale theft of our assets. Imagine a world where all your financial assets are neatly tokenized and stored on a centralized platform, just waiting to be “reallocated” by the benevolent authorities. And don’t worry; it’s all legitimate because the RLN is designed to comply with all the relevant financial regulations. It’s like a digital version of the Reichstag Fire Decree, where the government can seize control of all assets in the name of “national security.” Your stocks, bonds, and securities are converted into “security entitlements,” which can be easily confiscated by the powers that be. And don’t even think about trying to hide your assets because the RLN has real-time visibility into all transactions, ensuring that no one can escape the all-seeing eye of the authorities. The RLN also has smart contracts, which can automate large-scale asset transfers based on predefined conditions. It’s like a digital version of the Soviet Union’s forced collectivization, where the state can seize control of all assets in the name of “the greater good.” By integrating the RLN and Central Bank Digital Currencies (CBDCs), the authorities can compensate you for confiscating assets using their digital funny money. This is the essence of the RLN, stripped of its technical jargon and presented in all its Orwellian glory. The table may spell out the details in dry, technical terms, but the end result is the same: a system designed to facilitate the massive confiscation of assets under the guise of “regulation” and “compliance.” And just like that, You will own nothing, but I am certain you won’t be happy. Just as there are categories of alternatives to CBDCs, there are also alternatives to centralized, dystopian asset tokenization. We will review them now. Key Takeaways
Alternatives to Centralized Asset TokenizationWe have discussed the tyrannical side of tokenized money, but what about the alternatives for tokenizing other assets? Various options exist in the form of open systems, transparent gated systems, and privacy-focused open systems. Here, I will expand on these categories, provide specific examples, and weigh the pros and cons of each. Open SystemsOpen Systems, exemplified by Ethereum and Ravencoin, are pioneers in the decentralized tokenization of assets. These systems operate on a universal, permissionless network, allowing anyone to create, transfer, and verify asset tokens on the blockchain. The critical attributes of Open Systems are:
Open Systems offer unparalleled decentralization, security, and censorship resistance, making them an attractive option for those seeking to tokenize assets freely. However, similar to the problems mentioned above regarding Bitcoin needing to be a viable alternative to CBDCs, the transparency of transactions can still be used to track and analyze user activity, potentially compromising privacy. Privacy-Focused Open Systems: The Guardians of AnonymityPrivacy-Focused Open Systems, such as Zano, are designed to protect user anonymity and confidentiality. These systems utilize advanced cryptographic techniques to conceal transaction details and participant identities, ensuring a high level of privacy.
Privacy-Focused Open Systems offer robust protection for user anonymity and confidentiality, making them an attractive option for those seeking to tokenize assets privately. The complex cryptography can make these systems more vulnerable to security risks, and the smaller network size can impact decentralization. So far, the best solution I’ve found to The Great Taking is a cryptocurrency called Zano. Zano (as mentioned in the section on the tokenization of money) allows you to tokenize assets, hold them in your self-custody wallet, and trade them anywhere in the world without 3rd parties. You can learn more about this technology at https://zano.org. I am new to the exploration of this technology. I have already used Zano to tokenize and trade a physical goldback and am testing various other applications. I believe this technology could be the basis for an international barter system. I am not making investment recommendations; I strongly suggest you do your research and try using it directly. Key Takeaways
The Urgency of Action: Radical Non-ComplianceWe stand at the crossroads of financial freedom. The threat of central bank digital currencies (CBDCs) and the Regulated Liability Network (RLN) looms large, posing an existential threat not only to alternative asset classes but also to free will itself. These centralized systems for asset tokenization aim to control not just our money but our very lives. But we don’t have to surrender to this dystopian future. We have alternatives that can stop all asset tokenization in its tracks. Cryptocurrencies like Zano, Monero, and Bitcoin Cash (with CashFusion) offer a decentralized, private, and secure way to transact and store value. Tokenized gold and silver provide a digital representation of physical precious metals, combining the benefits of cryptocurrencies with the time-tested value of gold and silver. Physical gold and silver outside the banking system provide a tangible store of value that can’t be quickly seized or controlled digitally. These precious metals have been used as money for thousands of years and offer a reliable alternative to fiat currencies. It’s time for the alternative currency fields to unite. Cryptocurrency enthusiasts, precious metals investors, and advocates of financial freedom must work together to create a multi-asset approach that will render CBDCs and RLN obsolete. We need to actively use these alternative assets in our daily lives, creating parallel economies that operate outside the control of centralized institutions. Using privacy alternatives is more than just money – it is about owning our assets. It’s about controlling our destinies and preserving voluntary trade, the basis of free will. We can’t rely on a single asset or system. We need diverse alternatives, working together in harmony, to create a world where financial freedom is a reality. So, let’s join forces. Let’s use Zano, Monero, Bitcoin Cash (with CashFusion), tokenized gold, tokenized silver, and physical gold and silver to create a world where our economic choices are our own. Let’s build a future where decentralized, private, and secure asset tokenization is the norm. The Exit the System Movement: Empowering IndividualsI stopped using a personal bank account in 2019 and have been using self-custody crypto, gold, and silver for my day-to-day life since then. Since 2018, I have also been tokenizing and trading various assets worldwide, including silver, art, wine, clothing, and more. I wrote The Final Countdown to be a book that someone with no technical know-how could read and walk away understanding the CBDC threat, the inevitable failure of fiat currency (the dollar), and be able to follow simple instructions to download a crypto wallet, obtain crypto, gold, and silver, and to begin using these assets and break free from the system. In the past six months, the threat of The Great Taking has reached the top of my radar. I am adding to my repertoire of solutions to digital tyranny the ability to tokenize and trade any asset of any size anywhere in the world without third parties. While many found the book illuminating, not as many were taking the first step to use these alternative assets. My goal in everything I do is not to be a doom peddler but rather to empower people with solutions. I have begun conducting four-hour workshops across the US to teach people the material, set them up with a crypto wallet, tokenized asset, gold, and silver, and show precisely how to use it. To this end, a grassroots movement is emerging to help people “Exit the System.” I am leading a series of workshops across 17 US cities (with more to come) to educate individuals on practical steps to protect their assets and privacy. These workshops cover various topics, including the truth about the emerging global technocracy and its threats to financial freedom as CBDCs, Universal Basic Income, digital IDs, and social credit scores become a reality. I empower participants with knowledge of cryptocurrency and blockchain basics, navigating regulatory storms, self-custody and securing digital assets, mastering precious metals like gold and silver, and private asset tokenization to maintain control over your wealth. I also went into detail about the “Great Taking” to ensure you aren’t caught off guard. Learn about the Uniform Commercial Code changes and the Regulated Liability Network and how to protect your financial holdings. Take control of your financial future and make informed decisions with a comprehensive reference guide, joining the movement towards financial freedom and sovereignty. As detailed in Alan Lash’s recent Zero Hedge article, “Money’s Grim Future,” these workshops provide crucial information and strategies for financial self-defense. Lash writes, “The coming crisis will be used as an excuse to implement a new financial system that gives unprecedented power to central authorities. Those who aren’t prepared will find themselves at the mercy of this system.” The Daylight
Freedom initiative, accessible at https://daylightfreedom.org, offers resources and
opportunities for those interested in attending,
sponsoring, or hosting these vital workshops
nationwide. This grassroots effort aims to create a
network of informed and prepared individuals who can
resist the encroachment of financial tyranny. (read
more) 2024-08-13 d A NATION IN DECLINE IV BRITISH BIG BROTHER
GOES BONKERS.
PROSECUTE “who the fuck is Allah” PRIMARY CAREGIVER OF INFIRM WIFE. WAS HE THROWN IN GAOL FOR BLASPHEMY OR A THOUGHTCRIME? *
2024-08-13 c A NATION IN DECLINE III YOU WILL BE DISPOSSESSED
OF YOUR
COUNTRY AND YOU WILL LIKE IT Places that are "too white" are being "colorized." Dundrum, Tipperary.
This tiny Irish village of 200 people was forcibly planted this morning. 280 ‘asylum seekers’ are to be housed in this hotel, replacing the local population overnight. Ireland is ground zero for population replacement. pic.twitter.com/L4x1x7QMbV — MichaeloKeeffe (@Mick_O_Keeffe) August 13, 2024 *
See also: https://www.independent.ie/regionals/tipperary/news/man-arrested-amid-tense-scenes-in-tipperary-as-first-group-of-asylum-seekers-arrive-at-dundrum-house-hotel/a1733562700.html 2024-08-13 b A NATION IN DECLINE II THE WORLD'S RICHEST KHAZARS
HAVE PLANNED & ARE IMPLEMENTING
THE INVASION OF WESTERN NATIONS BY THE DREGS OF THE THIRD WORLD WHO HATE THEIR WHITE HOSTS. . Unrest in Britain: The
Other Half of the Story
The official story circulating on BBC and echoed by government and police spokespersons is that the riots and unrest seen in the UK in recent weeks are the product of a tiny minority of “far-right” hooligans and criminals, egged on by “disinformation” about the circumstances of the awful murder of innocent children in Southport, in particular the identity of the 17-year-old assailant, who was initially alleged to be a Muslim refugee, and later turned out to be a Welsh-born citizen born to Rwandan parents. This official story is not, strictly speaking, false. But it is only half the story. The race riots, street violence, and public unrest we have seen in recent weeks have complex underlying causes and are not susceptible to any simple, one-dimensional explanation. Yet in their eagerness to condemn “far-right” rioters and looters, many public commentators omit to mention that the visceral anger of the rioters is really just an extreme and unlawful expression of the anger and frustration of many ordinary, law-abiding citizens, whose concerns about immigration and its impact on their communities are usually either ignored or blithely dismissed as “disinformation” or “far-right” propaganda. Don’t get me wrong: I’m not suggesting for a second that it is in any way justified to hurl rocks at a mosque, injure police officers, set refugee accommodation centres on fire, engage in disorderly conduct, or intimidate people of other religions or ethnicities. I’m not suggesting for a second that anti-immigrant violence should be tolerated or encouraged. But I would suggest that the condemnation of “far-right” agitation and violence should not lead us to overlook the broader societal discontent and fragmentation that such violence emerges from. Our condemnation of far-right violence should not be allowed to blind us to the fact that a very large proportion of citizens who express disquiet over immigration policy, or attend public rallies to raise awareness of their concerns, are not violent thugs, or “far-right” agitators; just regular, law-abiding citizens who are worried about how poorly controlled immigration will impact their access to housing and public services, or the safety of their streets, or the cohesion and prosperity of their neighbourhoods. If deep discontent with the UK’s immigration policy was restricted to “far-right” hooligans, we could not explain the remarkable success of the Brexit movement, one of whose primary selling points was its opposition to “mass immigration,” which saw through a successful Brexit referendum in 2016. Nor could we explain the fact that in the 2024 elections, Nigel Farage’s Reform Party, with its call for stricter controls on immigration, managed to win 15% of the popular vote, in a first-past-the-post system in which many of the Reform voters knew they were likely handing the election to Labour. Of course, it is psychologically comforting to blame a social problem on a single scapegoat. It makes you feel more comfortable because the problem is contained and limited to whomever you have chosen to scapegoat – be it those pesky refugees, or the Muslims, or the Jews, or the conservative hillbillies, or the “Far Right.” But it may also be myopic, if the problem happens to be a complex one, with multiple underlying causes. Those who, in the face of growing unrest surrounding immigration and race, limit themselves to condemning [so-called] far-right violence, are missing out on a golden opportunity to open a sophisticated public conversation about fragmented communities across the UK, about the real and perceived failures of immigration policy, and about the reasons why immigration remains such a “hot button issue” in towns and cities across Britain. Public disquiet in the UK over immigration policy is real and goes far beyond “far-right” agitation. Even when that disquiet is not on the front pages of British newspapers, it continues to bubble under the surface, as some communities feel that their access to public services and housing, as well as the future of their way of life, are threatened by disproportionate levels of immigration, including illegal immigration. According to a 2023 analysis of professional opinion polls undertaken by the Migration Observatory, 37% of Britons believe immigration should be reduced “a lot,” and 15% believe it should be reduced “a little,” compared with 6% who believe it should be increased “a lot” and 8% who think it should be increased “a little.” In short, over half of the population believe there is too much immigration, while more than one in three believe there is far too much immigration. The superficiality of the “official” British response to the unfolding unrest may come down to a sort of wishful thinking: if we just keep the focus on the “far right,” then we can just round up the culprits, pack our bags, and go home. After all, what politician or head of police wants to grasp the nettle of a racially charged issue like immigration, in a way that seriously engages with the demands of disgruntled citizens and communities? Nevertheless,
until public authorities and opinion leaders start
to respectfully engage with citizens who believe
illegal immigration is out of control, as well as
communities that worry over the impact of
immigration on social cohesion, housing, public
services, and public finances, the disquiet and
resentment will continue to brew. Sadly,
we can expect more unrest and disorder if public
authorities do not engage in a respectful way with
citizens’ legitimate fears and concerns. (read
more) 2024-08-13 a A NATION IN DECLINE I “Our
economy is shattered.
Our border has been erased. We’re a nation in decline.” “Make the American Dream AFFORDABLE again. Make America SAFE again. Make America GREAT Again!”
2024-08-12 d ANTI-DEMOCRATIC DEMOCRATS VII IF THE RULE OF LAW STILL
PREVAILED IN AMERICA:
THE KENYAN WOULD NOT HAVE BEEN PRESIDENT & TRUMP WOULD BE COMPLETING HIS SECOND TERM & A JAMAICAN/TAMIL MENTAL MIDGET WHO IS NOT A "NATURAL BORN CITIZEN" WOULD NOT BE A CANDIDATE.
2024-08-12 c ANTI-DEMOCRATIC democrats VI YOU WILL HAVE NO FREEDOM
OF
EXPRESSION AND YOU WILL LIKE IT
2024-08-12 b ANTI-DEMOCRATIC DEMOCRATS V CONSTITUENT CONFRONTS
IMPLEMENTER
OF THE PROTOCOLS
2024-08-12 a ANTI-DEMOCRATIC DEMOCRATS IV "you have allowed a laughing hyena
who drinks her lunch
to land at the head of the ticket" The Party Line Is a Mighty
Squishy Line
“I’ve never heard her [Kamala Harris] say anything original or observant; at her best, she simply recites the party line. At her worst, she’s too lazy to memorize the party line.” — Lionel Shriver Does anybody know what this shape-shifting chimera passed off as “our democracy” actually is? I will tell you. Like everything else in the Democratic Party’s tool-bag these days, it’s the opposite of what it appears to mean, namely: You, the demos, give us, officialdom, the power to take whatever we like from you: your savings, your liberty, your stuff, your identity, and your posterity — because we are the boss-of-you, and don’t you forget it. . . and, by the way, the beatings will continue until morale improves. It’s really that simple, though the deceptions cooked up to hide it are convoluted to the max. Like: engineering the illegal entry to the US of millions from other lands and then using procedural hocus-pocus such as motor-voter registration and public assistance applications (free money + automatic voter registration) to stuff the election drop-boxes with the ballots of non-citizens — who, get this, don’t even have to be the ones casting those ballots, which can just be harvested, like so many oven-ready pullets, by lowly hired shills. If you catch onto the ruse, you’ll be instructed that borders are arbitrary roadblocks to social justice thrown up by the old white male patriarchy, and that these are “free and fair elections.” And if you object loudly enough, you lose your job, your livelihood, your Facebook account, and maybe get thrown into solitary confinement for a year. Our democracy. Meanwhile, we’re enjoying the spectacle of this evil party’s candidate selection tour with their joyful warriors/avatars, Harris and Walz — joyful because they laugh and laugh in the absence of articulating any actual views on the particulars of governance, and it’s infectious to witness all that mirth. There is, of course, an air of strenuous artificiality about all this hoopla. It rolls out in an alternative reality like one of those summer techno-pop raves where everyone is stoned on MDMA. The dream girl gets launched into center-stage by invisible forces and is joined by her prom king, and it’s just so heartwarming to get waved at by the grinning, hand-holding couple nobody voted for. This is your demos-free ticket! Will anybody at the imminent Democratic National Convention notice how this all mysteriously came to be? And might there be any active consternation over it? Perhaps even a welling movement to pull the plug on this rave? You may be apt to wonder what is going on in the Chappaqua redoubt of She-Whose-Turn-Has-Been-(so far)-Thwarted, HRC, boss-of-all-girl-bosses, putatively retired from public life. She’s been awfully quiet since that night over a week ago when she was obliged on-stage somewhere to hug and air-kiss Ms. Harris, and made a face seconds after as if she had thrown up in her mouth. Is she stewing in the broth of grievance but still and nonetheless tirelessly working her phone to canvass the delegates of that looming party meet-up? She might remind them that the DNC (that is, the Democratic National Committee, Inc), went broke in 2016 and got bailed out by the Clinton Foundation checkbook, and, Jeez, we can’t seem to find any repayment check from all’y’all. It seems maybe you owe us. . . something. And, by the way, HRC could remind said delegates: you have allowed a laughing hyena who drinks her lunch to land at the head of the ticket for the worst reasons (viz., DEI) minus any votes from the party membership, and then managed to duct-tape a China-owned, Cluster-B head-case to her as the veep sidekick. . . and maybe when all the hee-hawing and hooting dies down, you’ll discover what a pair of losers you’ve allowed to be undemocratically implanted to (ha!) represent you. And also, by the way, I happen to be available as her capable-and-experienced replacement. . . whom you can actually vote for on the convention floor, if you manage to get your shit together. . . you know. . . our democracy, and all. Just sayin’. That is, I’m just sayin’ what She might be thinkin’ (and sayin’). I am in no position to predict any actual outcome, but it’s hard to imagine any winning moves by the Harris & Walz team in actual play-by-play. In case you have forgotten amid all the week-long laughter and euphoria, there are important national issues to discuss about how to manage the malevolent leviathan the federal government has become, and many dilemmas and threats the people face. And there are very different records of each team’s views on these things, party by party. Some of that discussion could happen in the (so far) one scheduled September 10 debate. If Mr. Trump can manage to be polite, he can press Kamala Harris to explain herself on things like the wide-open border, failure to negotiate with the Russians to end the Ukraine War, her party’s antipathy to public safety, her party’s promotion of gender identity insanity, its Gestapo-style lawfare operations, its endless hoaxes, and its disgraceful documented efforts to censor free speech. The record is pretty clear on all of that, and there’s a fair chance that Ms. Harris can’t possibly explain it away. Or laugh it off. Mr. Trump has requested two more head-to-head debates, which Ms. Harris apparently wants to forego. Mr. Trump has come up with an excellent alternative: two “town hall” format appearances in which he fields questions from citizens, or from news reporters, or some combo of both. That would be much to his advantage, without Ms. Harris on stage to defend her positions — or, more likely, to dodge any coherent reply by repeating “racist racist racist,” and laughing her head off. That is, if she even remains the nominee. Let’s see how it goes this week leading to the convention. For instance, if she and Mr. Walz can still weasel out of taking any questions from the news media. Or whether the White House (remember “Joe Biden” still lives squats there) and his blob compadres can engineer a major escalation into world war, to take everybody’s mind off the election race. Or if any tremors of apprehension emanate from the delegate corps packing their rolly-bags for the dreaded party confab in Chicago. You have to kind of wonder if they’re bringing any riot gear. (read more)2024-08-11 c ANTI-DEMOCRATIC DEMOCRATS III DID OBAMA MAKE THEM DO
IT?
RAY McGOVERN: Decay,
Decrepitude, Deceit in Journalism
Journalism is not like war: In war the victors get to write the history; in today’s journalism, the losers write it. Russiagate continues to survive like a science fiction monster resilient to bullets. The latest effort at rehabilitating it is an interview by Adam Rawnsley in the current issue of Rolling Stone magazine of one Michael van Landingham, an intelligence analyst who is proud of having written the first draft of the cornerstone “analysis” of Russiagate, the so-called Intelligence Community Assessment. The ICA blamed the Russians for helping Trump defeat Hillary Clinton in 2016. It was released two weeks before Trump assumed office. The thoroughly politicized assessment was an embarrassment to the profession of intelligence. Worse, it was consequential in emasculating Trump to prevent him from working for a more decent relationship with Russia. In July 2018, Ambassador Jack Matlock (the last U.S. envoy to the Soviet Union), was moved to write his own stinging assessment of the “Assessment” under the title: “Former US Envoy to Moscow Calls Intelligence Report on Alleged Russian Interference ‘Politically Motivated.’” In January 2019, I wrote the following about the ICA:
James Clapper, then director of national intelligence who put together the ICA, knew that all too well. So he evidently thought it would be better not to involve troublesome dissenters, or even inform them what was afoot. Similarly, the Defense Intelligence Agency should have been included, particularly since it has considerable expertise on the G.R.U., the Russian military intelligence agency, which has been blamed for Russian hacking of the DNC emails. But DIA, too, has an independent streak and, in fact, is capable of reaching judgments Clapper would reject as anathema. … With help from the Times and other mainstream media, Clapper, mostly by his silence, was able to foster the charade that the ICA was actually a bonafide product of the entire intelligence community for as long as he could get away with it. After four months it came time to fess up that the ICA had not been prepared, as Secretary Clinton and the media kept claiming, by ‘all 17 intelligence agencies.’ In fact, Clapper went one better, proudly asserting — with striking naiveté — that the ICA writers were ‘handpicked analysts’ from only the F.B.I., C.I.A., and NSA. He may have thought that this would enhance the ICA’s credibility. It is a no-brainer, however, that when you want handpicked answers, you better handpick the analysts. And so he did.” [See: The January 2017 ‘Assessment’ on Russiagate] Buried in Annex B of the ICA is this curious disclaimer:
Small wonder, then, that a New York Times report on the day the ICA was released noted:
Burying Obama’s Role Mainstream journalism has successfully buried parts of the Russiagate story, including the role played by former President Barack Obama. Was Obama aware of the “Russian hack” chicanery? There’s ample evidence he was “all in.” More than a month before the 2016 election, while the F.B.I. was still waiting for the findings of cyber-firm CrowdStrike, which the Democratic Party had hired in place of the F.B.I. to find out who had breached their servers, Obama told Clapper and Dept. of Homeland Security head Jeh Johnson not to wait. So with the election looming, the two dutifully published a Joint Statement on Oct. 7, 2016:
Obama’s role was revealed in 2022 when the F.B.I. was forced to make public F.B.I. emails in connection with the trial of fellow Russiagate plotter, Democratic lawyer Michael Sussmann Clapper and the C.I.A., F.B.I., and NSA directors briefed Obama on the ICA on Jan. 5, 2017. That was the day before they gave it personally to President-elect Donald Trump, telling him it showed the Russians helped him win, and that it had just been made public. On Jan. 18, 2017, at his final press conference, Obama used lawyerly language in an awkward attempt to cover his derriere:
So we ended up with “inconclusive conclusions” on that admittedly crucial point … and, for good measure, use of both words — “hacking” and “leaked.” The tale that Russia hacked the Democratic National Committee in 2016 was then disproved on Dec. 5, 2017 by the head of CrowdStrike’s sworn testimony to Congress. Shawn Henry told the House Intelligence committee behind closed doors that CrowdStrike found no evidence that anyone had successfully hacked the DNC servers. But it is still widely believed because The New York Times and other Democrat-allied corporate media never reported on that testimony when it was finally made public on May 7, 2020. Enter Michael van Landingham Rolling Stone’s article on July 28 about van Landingham says he is still proud of his role as one of the “hand-picked analysts” in drafting the discredited ICA. The piece is entitled: “He Confirmed Russia Meddled in 2016 to Help Trump. Now, He’s Speaking Out.” It says: “Trump viewed the 2017 intel report as his ‘Achilles heel.’ The analyst who wrote it opens up about Trump, Russia and what really happened in 2016.” Without ever mentioning that the conclusions of the ICA were proven false, by Henry’s testimony and the conclusions of Special Counsel Robert Mueller’s investigation that found no evidence of Trump-Russia “collusion,” Rolling Stone says:
Rawnsley writes in Rolling Stone the following as gospel truth, without providing any evidence to back it up.
Because Rawnsley
didn’t tell us, it’s not clear how this “spear
phishing message” provides “undeniable” proof that
Russia was behind it. Consortium News
has contacted Rawnsley to provide more detail to
back up his assertion. Craig Murray, the former British ambassador to Uzbekistan and close friend of Julian Assange, suggested to Scott Horton on Horton’s radio show in 2016 that the DNC leak and the Podesta leak came from two different sources, neither of them the Russian government. “The Podesta emails and the DNC emails are, of course, two separate things and we shouldn’t conclude that they both have the same source,” Murray said. “In both cases we’re talking of a leak, not a hack, in that the person who was responsible for getting that information out had legal access to that information.” Reading between the lines of the interview, one could interpret Murray’s comments as suggesting that the DNC leak came from a Democratic source and that the Podesta leak came from someone inside the U.S. intelligence community, which may have been monitoring John Podesta’s emails because the Podesta Group, which he founded with his brother Tony, served as a registered “foreign agent” for Saudi Arabia. “John Podesta was a paid lobbyist for the Saudi government,” Murray noted. “If the American security services were not watching the communications of the Saudi government’s paid lobbyist in Washington, then the American security services would not be doing their job. … His communications are going to be of interest to a great number of other security services as well.” Leak by Americans Horton then asked, “Is it fair to say that you’re saying that the Podesta leak came from inside the intelligence services, NSA [the electronic spying National Security Agency] or another agency?” “I think what I said was certainly compatible with that kind of interpretation, yeah,” Murray responded. “In both cases they are leaks by Americans.” William Binney, a former U.S. National Security Agency technical director, told Consortium News this regarding Rolling Stone‘s assertion about the Podesta emails:
“There is one more
aspect that’s important to take into account,”
Binney added. “It’s the network log. This contains
a record of every instruction sent on the network
along with addresses for the sender and receiver.
It’s held for a period of time according to
storage allocated to it.” Binney said:
Binney told CN that he proposed automated analysis of the worldwide log for the NSA in 1992, “but they refused it as it would expose all the money and program corruption in NSA contracts.” Binney said he was putting that function into the ThinThread program in 1999/2000 that he was developing for the NSA, but the agency “removed it in 2001 after 9/11.” A report by the private cybersecurity firm SecureWorks in June 2016 assessed with “moderate confidence” that a group identified as APT28, nicknamed “Fancy Bear” among other names “operating from the Russian Federation … gathering intelligence on behalf of the Russian government” was behind the Podesta phishing, though as Binney points out, the NSA found no such evidence, when it would have had to, had Russia done it. The name “Fancy Bear” of the alleged hackers from GRU, the Russian defense intelligence agency, incidentally, was coined by Dmitri Alperovich, the anti-Putin Russian co-founder of CrowdStrike. “This whole Russiagate affair was a concoction of the DNC, the Clintons, the F.B.I. etc. and none of them have produced any specific basic evidence to support their assertions,” Binney said. “The idea that the word ‘Bear’ implies Russia is about the level of technical intellect we are dealing with here.” Binney said these are the key technical questions that still need to be answered: 1. What are the IP and/or MAC numbers involved? And, what are the allocations of these numbers by the Internet Assigned Numbers Authority (network number allocation authority)? 2. What are the trace routes of the hacked packets going across the worldwide network? 3. What instructions are in the network log indicating data exfiltration of data? 4. Are there any other specific technical aspects that are relevant to a potential hack? No opinions or guesses, that’s not factual evidence of anything beyond the writers biases.” Binney said in email:
Binny said that “until such time as those others produce specific technical evidence for peer review and validation (like we have), they are just pushing sludge up an inclined plane with a narrow squeegee hoping they can get it over the top and accepted by all.” Binney noted that the ancient Greek school of sophism called this the fallacy of repetition. “That’s where they keep repeating a falsehood over and over again till it is believed (it helps when they say the same thing from many different directions especially by people in positions of authority),” Binney said. So the head of CrowdStrike testifies that there’s no evidence anyone hacked the DNC and according to Binney and Murray, there is no definitive proof that Russia was behind the Podesta phishing expedition either. WikiLeaks maintains that a state actor was not the source of either. And yet the Russiagate myth persists. It is useful in so many ways for those in the U.S. who still want to ratchet up even more tension with Russia (as though Ukraine isn’t enough) and for a political party to perhaps again explain away an election loss if it happens in November. Thanks to Bill Binney and two other VIPS very senior NSA “alumni”, and the detailed charts and other data revealed by Edward Snowden, Veteran Intelligence Professionals for Sanity (VIPS) was able to publish a memorandum on Dec. 12, 2016 that, based on technical evidence, labeled the Russian hacking allegations “baseless.” The following July we issued a similar VIPS memo, with the title asking the neuralgic question, “Was the ‘Russian Hack’ an Inside Job?” The question lingers. I have now posted an item on X to call attention to this latest Russiagate indignity. I cannot escape the conclusion that journalism is not like war: In war the victors get to write the history; in today’s journalism, the losers — who get it wrong — get to write it. O Tempora, O
Mores! 2024-08-11 b ANTI-DEMOCRATIC DEMOCRATS II BIDEN ADMITS HE WAS FORCED
OUT.
IMPLICATES CORRUPT ITALIAN POLITICIAN. * * * *
* POLITICAL HITWOMAN DIGS
HERSELF A DEEPER HOLE
2024-08-11 a ANTI-DEMOCRATIC DEMOCRATS I KHAZAR'S CANDIDATE,
COMRADE KAMALA,
WILL DESTROY AMERICA * *
* COMRADE KAMALA'S
BODYGUARDS PICK LOCK
TO BREAK INTO A BUSINESS (Just like in a communist country.)
* See also: https://nypost.com/2024/08/11/us-news/secret-service-apologizes-to-salon-owner-over-break-in-bathroom-use-during-kamala-harris-event/
https://theconservativetreehouse.com/blog/2024/08/11/kamala-harris-secret-service-detail-break-into-business-to-use-restroom-disable-cameras-to-hide-their-tracks/ https://www.zerohedge.com/political/secret-service-apologizes-picking-lock-breaking-local-salon-after-camera-covered-tape _______________________ Permission is hereby granted to any and all to copy and paste any entry on this page and convey it electronically along with its URL, http://www.usaapay.com/comm.html _______________________ 2024 ARCHIVE
2023 ARCHIVE
2022 ARCHIVE
2021 ARCHIVE
2020 ARCHIVE
-0-
|
...
News and facts for
those sick and tired of the National Propaganda Radio
version of reality.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
THE ARCHIVE PAGE |
QUOTES | |
![]() |
Richard Feynman, “Learn from science that you must doubt the experts. As a matter of fact, I can also define science another way: Science is the belief in the ignorance of experts.” Friedrich Nietzsche, “The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.” Dwight D.
Eisenhower, “Here in America, we
are descended in blood and in spirit from
revolutionists and rebels – men and women who dare
to dissent from accepted doctrine. As their heirs,
may we never confuse honest dissent with disloyal
subversion.” H. L. Mencken, “All government, in its essence, is a conspiracy against the superior man: its one permanent object is to oppress him and cripple him. If it be aristocratic in organization, then it seeks to protect the man who is superior only in law against the man who is superior in fact; if it be democratic, then it seeks to protect the man who is inferior in every way against both. One of its primary functions is to regiment men by force, to make them as much alike as possible and as dependent upon one another as possible, to search out and combat originality among them. All it can see in an original idea is potential change, and hence an invasion of its prerogatives. The most dangerous man to any government is the man who is able to think things out for himself, without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane and intolerable, and so, if he is romantic, he tries to change it. And even if he is not romantic personally he is very apt to spread discontent among those who are.” |
POTENTIAL TOPICS |
news, real
news, exposé, investigation, fact, just the facts,
journalism, journalist, unsubstantiated, allegation,
academia, academic, expert, intellectual, Middle
East expert, Think Tank, opinion, opinion maker,
approved opinion, editorial, Overton Window, fake
news, agenda, intellectual, court historian, pundit,
bien pensant,
dumbing down, stonewall, stonewalling, cognitive
dissonance, narrative, rumor, baseless rumor,
controlled explanation, indoctrination, propaganda,
Bernays, censorship, Operation Mockingbird,
Wurlitzer, conspiracy theory, Newspeak, memory hole,
manipulation, delegitimizing, deplatforming,
lobbyist, quid
pro quo, corruption, pay to play,
influence, influence peddling, hate, hate speech,
two minutes hate, Orwell, Orwellian, 1984, Big
Brother, artificial intelligence, artificial idiocy,
AI, face recognition, robots, technology, Richard
Stallman, GNU, internet, web, Luddite, privilege,
Asian privilege, black privilege, brown privilege,
white privilege, identity politics,
intersectionality, intersectionality privilege,
egalitarianism, equal outcome, equal opportunity,
equality, outrage, feigned outrage, virtue, virtue
signalling, cultural appropriation, safe space,
infantilizing, marginalized, vulnerable, at risk,
victimized, victim, victim card, victim group,
resentment, affirmative action, quotas, affirmative
action hires, ethnic, ethnic group, ethnicity,
diverse, diversity, inclusive, multicultural,
multiculturalism, tolerance, repressive tolerance,
grievance studies, Frankfurt School, Theodor Adorno,
Antonio Gramsci, Gramscian, Georg Lukacs, Max
Horkheimer, Herbert Marcuse, Wilhelm "Willi"
Münzenberg, Political Correctness, politically
correct, Kulturkampf,
culture war, Cultural Marxism, Cultural Maoism,
Cultural Revolution, Marx, Marxist, Marxism, Lenin,
Bolshevik, Trotsky (Bronstein), Stalin, Communist,
communist sympathizer, fellow traveler, Franklin
Delano Roosevelt, FDR, Socialist, National
Socialist, National Socialist German Worker's Party,
fascist, nusquama,
Utopia, utopian, administration, regime, regime
change, Democrat, RINO, centrist, moderate,
populist, radical, radicalization, Neocon,
Evangelical, warmonger, authoritarian,
Neoconservative, Republican, Old Right, Classical
Liberal, Libertarian, majority, majority rule, mob,
mob rule, founders, framers, separation of powers,
Marbury vs. Madison, liberal, conservative,
election, vote, voter, poll, surveillance, Silicon
Valley, social media, DARPA, coverup, FOIA,
redacted, Glomar response, unredacted, revolution,
color revolution, revolutionary, Jacobin, insurgent,
assassin, assassination, lone wolf, terror,
terrorist, terrorism, Menachem Begin, reign of terror, state sponsor of
terror, CIA, Mossad, MI5, MI6, entrapment, 18
U.S.C. § 1001, perjury trap, 302, Federal Bureau
of Instigation, Federal Bureau of Insurrection,
Federal Bureau of Intimidation, fall guy, patsy,
informant, informer, agents provocateurs, torture,
interrogation, enhanced interrogation, enabling
act, police, militarized police, police state,
police brutality, policing, broken window
policing, guilty until proven innocent, jail,
prison, carceral state, for profit prison,
security, security theater, false flag, Gladio,
rape hoax, Tawana Brawley, Wanetta Gibson, Crystal
Gail Mangum, Duke lacrosse team, Jackie Coakley,
Sabrina Rubin Erdely, hate hoax, Jussie Smollett,
noose, swastika, class, social class, bias,
choice, discrimination, freedom, preference, right
of association, assortative mating, social
construct, race, race card, racial identity,
racism, racist, minority, model minority, credit
to your race, tribe, tribal, cousin marriage,
heredity, genome, genetics, chromosomes,
creativity, intelligence, IQ, bell curve, merit,
meritocracy, sex, gender, binary, nurture versus
nature, Human Action, von Mises, economics, dismal
science, Adam Smith, Austrian Economics, Menger,
capitalism, capitalist, capital, asset, productive
asset, income, income inequality, bank,
bankruptcy, fractional reserve banking, reserve
currency, dollar, petrodollar, yuan, yen, euro,
pound sterling, inflation, monetary inflation,
deflation, bullion, gold, sovereign, gold
sovereign, silver, platinum, precious metals,
savings, price discovery, honest price discovery,
stimulus, helicopter money, central planning, Wall
Street, Plunge Protection Team, President's
Working Group, bubble, asset bubble, irrational
exuberance, crash, investments, equities, options,
commodities, leverage, hedge fund, risk, risk
assets, counterparty risk, contagion, collapse,
offshore, offshore account, offshore trust, shell
company, derivatives, short selling, naked short
selling, stocks, bonds, junk bonds, fracking,
abiotic petroleum, oil shale, diminishing returns,
financialization, monetizing debt, debt, note,
mortgage, interest rate, negative interest rate,
quantitative easing, QE, repo market, repurchase
agreement, panic, panic printing, primary dealer,
scam, Social Security, Ponzi scheme, Federal
Reserve, Eccles Building, Constitution Avenue, New
York Fed, 33 Liberty Street, People's Bank of
China, European Central Bank, Bank of England,
Bank of Japan, Bank for International Settlements,
International Monetary Fund, IMF, Bretton Woods,
technical default, Fort Knox, tungsten bars,
gold-plated tungsten bars, gold leasing, audit,
gold window, Nixon, 15 August 1971, recession,
depression, Great Depression, Florence Owens
Thompson, Dust Bowl, unemployment, supply chain,
supply chain disruption, Little Ice Age, solar
minimum, unseasonable cold, crop failure,
starvation, riots, food riots, martial law,
militia, resistance, secession, liberty |
If
you let them redefine words, they will control
language. If you let them control language, they will control thoughts. If you let them control thoughts, they will control you. They will own you. |
© 2020 - 2024 - thenotimes.com - All Rights Reserved |