When one adds the fact that Mueller’s Russia probe is a witch hunt that is debilitating our government, has he exposed our American elections to Chinese influence using Cloudflare? Has Mueller not now become an enemy of the state?
Listen to Michael McKibben and Douglas Gabriel explain how white hat cyber warriors can protect election integrity. Surprise bonus at the end when Michael makes a huge discovery in Florida elections!
This petition was filed at the Supreme Court on October 29, 2018. We have been told by fellow Conclave member, Christopher Earl Strunk, that Chief Justice John Roberts accepted the petition. When we get a number for the case, we will put it below. In the meantime, the best way to view the document is to open it as a PDF. Your job is to push this document all over the world and make this the most-watched court case in American history.
Senate Judiciary Democrats are demanding in lockstep that the confirmation hearing should be suspended so that the FBI can investigate Judge Kavanaugh further about his time in high school. Never mind that they have investigated him multiple times already. Accuser Blasey Ford feigned sincerity badly.
Here’s why DEMS want to shoehorn the FBI—because Hillary and her cronies can cook the investigation discovery process using their FBI backdoor keys.
Hillary Clinton has all of our encryption keys, including the FBI’s. “Encryption keys” is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm and certificate authorities.
To activate the links, open this chart as a PDF where all links will take you to indictable evidence.
Even a criminal network such as the one we see in the swamp has an organizational and communication structure. We need all White Hats to pay attention to this intel and act accordingly. This is the center hub of their activity – the den of devil, so to speak.
In the winter of 1983, archival research expert David Dodge, and former Baltimore police investigator Tom Dunn, were searching for evidence of government corruption in public records stored in the Belfast Library on the coast of Maine. By chance, they discovered the library’s oldest authentic copy of the Constitution of the United States (printed in 1825). Both men were stunned to see this document included a 13th Amendment that no longer appears on current copies of the Constitution. Moreover, after studying the Amendment’s language and historical context, they realized the principle intent of this “missing” 13th Amendment was to prohibit lawyers from serving in government.
This Congressional Briefing for Congress provides detailed, judicially-recognizable proofs of Sheryl K. Sandberg’s conspiracies against the American people. With Sandberg and Dorsey, Congress will not have an excuse for continuing to ask softball questions, or to tolerate mealy-mouthed answers. If they do, then we will know definitively that they are bought off by Twitter and/or Facebook.
Even left-leaning POLITICO could not ignore this corruption. They disclosed that Sen. Diane Feinstein (CA) had Chinese spies working for her while she oversaw the powerful Senate Judiciary and Intelligence committees, as well as the Democratic Party. Her staffers refused to provide substantive comment.
Sen. Feinstein’s financial disclosure clearly show that she holds a greater than 10% financial interest in AVID Technology. Avid supplies the newsroom management software names LeaderPlus used widely around the world.