The Deep State’s Total Control with Beijing as the Mother of Managers

 

A Status Review

The good news is that our Mother of Managers, RED China, continues to franchise its “One World, One Dream” surveillance and control solution based on its own Golden Shield initiative which produces “Happy Populations and Consumers” that our actuarily our LRUs for predictable profit margin percentages.

Even though Hillary missed her moment again, Diane and her driver, Nancy, the FBI, DOJ, State, NSA, and “Central” have been very helpful.

On the downside, NAFTA and the TPP were exposed, however, the drug trade, human trafficking, and organ harvesting ventures are thriving. Others should implement the “Planned Parenthood” disguise.

Also, the Village Idiots have still not figured out the pretext and goal of Arab Spring, and we really cut it close with The Thing from 1890’s, SSN # 042-68-4425, fake war on Libya and used the crisis to expand our pretext of the Global War on Terror into Europe to ultimately benefit RED China’s loan sharking and total control blueprint.

Syria was never on the Arab Spring list, but we also turned it into an opportunity for “Sustainable Development Wherever the UN Goes or Doesn’t Go When It Ideally Should” with less people as we did with Bosnia, Rwanda, Somalia etc.

Trump like Reagan has interrupted the implementation of the blueprint, but we have some plans and eventually one will work to get the implementation back on track as we are so very close. The good news is Americans are getting dumber by the minute as well as being crushed with debt while thinking their “schooling” is giving them the skill sets for financial success while we have put all the roadblocks in place to prevent that from happening thanks to all our puppets in the U.S. Congress. Eventually they will succumb to the bait of free stuff and be totally dependent on us.

Eventually, with the success of RED China’s “One World, One Dream” solution, we will be able to overcome any resistance to our plan via its built in hostage taking and extortion. RED China’s partnership with NSA and “Central” has made good use of this in America. We must continue on this path and someday very soon all will wake up from The Dream and realize it is not their Dream but our Dream and they will not be able to do anything about it when it becomes their nightmare for our benefit.

Once again, election seasons are coming up again, and we must focus on placing more Emirs into our future areas of control so that we can remove all aspects of resistance. We must make Eichmann proud!

 

 

Editors Note: Farming, Mining, and Management of The Human Kind : The pretext of altruistic endeavors that just suddenly become predatory and parasitic.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

The Blueprint for RED China’s One World One Dream:

How Arab governments use cyberspace laws to shut down activism

Critical Arab voices are being silenced on Twitter, and laws across the Middle East are created to further this cause.

by Yarno Ritzen
25 Jul 2019

In this series of articles, Al Jazeera examines how Twitter in the Middle East has changed since the Arab Spring. 

Government talking points are being magnified through thousands of accounts during politically fraught times and silencing people on Twitter is only part of a large-scale effort by governments to stop human rights activists and opponents of the state from being heard. 

For human rights activists, journalists, dissidents and free speech campaigners, social media has long been a double-edged sword, representing both the positive and harmful aspects of open communication on the internet.

On the one hand, platforms such as Twitter and Facebook allow activists the opportunity to spread their message, reaching an audience they could only dream of before the internet.

But on the other, the nature of open communication raises the risk of being followed, exposed or worse, as some governments increase their digital surveillance capabilities.

As a result, governments around the world are turning social media against their citizens.

China is the country where government control of the internet is by far the most egregious, but many countries in the Middle East are not far behind when it comes to using the internet against those who fight for a more open society, the annual Freedom of the Net report by Freedom House concluded.

Mohamad Najem, executive director at Beirut-based SMEX, a digital rights organisation focusing on issues related to freedom of expression, online privacy and safety, said social media movements had taken the Middle East by surprise and governments adapted relatively quickly, using social media against protesters and civil rights activists.

Over the last decade, SMEX has tracked how the use of social media platforms like Twitter, both by activists and governments, has changed.

“In 2011, access to these tools was still kind of new and governments underestimated them,” Najem told Al Jazeera.

Meet the activists fighting the Great Chinese Firewall

Social media allowed people in the Middle East to voice their concerns and question those in power.

During the Arab Spring, protesters were able to organise on social media, a tool that connected their realities with the rest of the world.

But governments were watching, too, and continue to closely monitor.

“Between the Arab Spring and now, we have witnessed that all the countries in the region are moving more and more towards criminalising speech,” Najem told Al Jazeera.

“The online sphere we used to go to in the Middle East to express ourselves, to talk about politics, has started to close down slowly because of all these regulations,” he added.

“People were prosecuted, thrown in jail, or they had to flee the country.”

To show what laws Middle East governments have introduced in recent years, SMEX launched Cyrilla, a website listing all proposed and passed legislation aimed at curbing free speech.

The database, which offers texts in Arabic and English and covers the entire region, shows clearly how digital liberties in the Middle East have come under attack.

Between the Arab Spring and now, we have witnessed that all the countries in the region are moving more and more towards criminalising speech.

MOHAMAD NAJEM, SMEX

It also lists several countries outside of the Middle East, including RussiaVietnam and Fiji.

“Across the Middle East, there is a large number of countries that have specifically instituted anti-terrorism and cybercrime laws that contain vague prohibitions on free speech,” Jillian York told Al Jazeera.

York is the Berlin-based director for international freedom of expression at the Electronic Frontier Foundation (EFF), which aims to protect civil liberties in the digital world.

Egypt, Jordan, Saudi Arabia, Tunisia, UAE, Qatar; all these countries have instituted cybercrime laws and in most cases, the laws are vague – quite broad,” she said.

As an example, York cited Saudi Arabia’s counterterrorism legislation from 2014, which criminalises defamation of the state and defines calling for atheist thought as a “terrorist” action.

Recently, prominent Norway-based pro-democracy activist Iyad el-Baghdadi, a Palestinian who has been outspoken in his criticism of Saudi authority figures, made a plea for his safety after US intelligence agency CIA found a credible threat to his life from authorities in the kingdom.

El-Baghdadi is behind The Arab Tyrant Manual, which focuses on global authoritarianism and the struggle for democratic liberties in the Arab region. He is also a fellow at Civita, a leading liberal think-tank in Norway, where he sought asylum after he was forced to leave his home in the United Arab Emirates in 2015.

İyad el-Baghdadi | إياد البغدادي

@iyad_elbaghdadi

Spare a thought for all the dissidents, activists, journalists, and private citizens in the Arab world who get beaten, arrested, tortured, murdered without being passed tips and without being offered protection. They are the real heroes, and they are the real victims. Not me.

54 people are talking about this

But it is not just Saudi Arabia, as documented by organisations including Amnesty International and the Gulf Centre for Human Rights show.

Governments in the Middle East have started using platforms such as Twitter as amplifiers, using both automated bot accounts and well-known social media influencers to promote state-approved messaging, Najem said.

So, while activist voices are being drowned out by government-approved messages, sometimes amplified by fake Twitter accounts, campaigners also risk being jailed or are forced to leave the country because of newly implemented cybercrime or “antiterrorism” laws.

Last April, Saudi Arabia arrested three bloggers without giving any reasons for their arrest.

Similarly, the Turkish government cracked down hard last year on Twitter users who used the platform to voice their criticism of the Turkish military operation in northern Syria, claiming they were spreading “terrorist propaganda”.

The UAE, meanwhile, made it a criminal offence to show support for Qatar in the ongoing GCC crisis, claiming people who did so violated the federal decree on Combating Information Technology Crimes, possibly facing a jail term from three to 15 years, and a fine not less than 500,000 dirhams ($136,000).

According to both Najem and York, it is not just governments that are to blame for the crackdown on activists.

Part of the responsibility falls on social media companies for failing to address the issue of automated propaganda accounts and willingly helping governments in the region.

“One of the challenges with companies like Twitter – and most tech companies – is that they are based in Dubai. This is an issue because this is a country that has no respect for human rights, which means they have no respect for digital rights either,” Najem told Al Jazeera.

“We have a problem that all these companies that are being used for free speech, such as Twitter, are based in the Gulf. These are countries that are not signatory of the International Covenant on Civil and Political Rights, so Article 19 of The Universal Declaration of Human Rights [giving everyone a right to freedom of opinion and expression] is not part of their mandate and freedom of expression is not something they care about.”

To add, York explained, the opaque deals these companies make with governments lead to more censorship, which is often hard to notice.

I think Twitter and all these other companies are responsible for when they say ‘yes’ whenever an authoritarian country comes to them to ask to censor certain speech.

JILLIAN YORK, EFF

“Governments sort of wisened up and, due to a number of other factors, they began instead utilising these companies to do this censorship for them,” she said.

“This is a more palatable form of censorship for the people because they don’t notice what is missing. Instead of getting an error page when you visit a website like Twitter or Facebook, the content is just missing – it has disappeared,” she added.

“That has allowed these companies to continue to engage and grow in these markets while not being blamed for the censorship.”

York believes that these companies should be incredibly limited in how they regulate speech.

Another problem, she says, is that these companies consider the Middle East as a single monolithic entity and fail to look at the nuances between different countries.

“It’s very culturally ignorant to think that Lebanese people would want the same rules as the Saudis,” she said.

“To give a concrete example of this, search engine Microsoft Bing for years censored its results in the entire Middle East based on what Saudi Arabia asked them to censor.”

As a result, York explained, Bing instituted a blanket ban for certain keywords in the whole Middle East, so, for example, because Saudi Arabia wanted all mentions of the word “breast” removed from search results, people in Lebanon were not able to use Bing to search for “chicken breast”.

Meanwhile, accessing pornographic websites directly was still possible in Lebanon.

“So, I think Twitter and all these other companies are responsible for when they say ‘yes’ whenever an authoritarian country comes to them to ask to censor certain speech.”

“These days they just do it, they don’t push back on it any more.”

Wael Abbas, an Egyptian human rights activist and blogger, used to document police brutality in Egypt.

“It’s quite clear from Abbas’s case that he was being attacked by trolls on Twitter that he alleges were government paid, but we don’t know that for sure,” York said.

“More and more we see people moving towards private platforms like WhatsApp, Signal or Telegram, which all provide more privacy.”

MOHAMAD NAJEM, SMEX

“Nevertheless, he was attacked by government supporters on Twitter, he fought back and then his account was shut down by Twitter, probably because he used language that was in their rules considered hate speech.”

His account remains suspended.

“In Wael’s example, they should not have kicked him off of the platform for using harsh language,” York said.

These sustained efforts have instilled fear among activists, many of whom have largely moved away from public platforms like Twitter and Facebook to more closed systems.

“More and more we see people moving towards private platforms like WhatsApp, Signal or Telegram, which all provide more privacy,” Najem said.

While the increased privacy of closed platforms provides some more safety for activists, reaching an audience as they did during the Arab Spring seems impossible.

Saudi women’s rights activist Souad al-Shammary looks at her Twitter account on her mobile phone. She is a liberal feminist who was jailed for her views [File: AP]

Article

GO RED China! GO RED China!

 

 

Hillary Clinton's "Watergate Moment," and the "Smoking Gun"?

Editor’s Note – Are we at a “Watergate Moment” now that we have learned of the “Smoking Gun” email that should be the straw that breaks the camel’s back concerning Hillary Clinton?

Will FBI Director Jim Comey send a set of criminal referrals to the Department of Justice as we believe he should?

The latest batch of Hillary Clinton emails released by the State Department early Friday contain what may be the smoking gun that forces the Justice Department to charge the former secretary of state with a crime, according to former federal prosecutor Joseph diGenova.13HoursBenghaziBook

“This is gigantic,” said diGenova. “She caused to be removed a classified marking and then had it transmitted in an unencrypted manner. That is a felony. The removal of the classified marking is a federal crime.

It is the same thing to order someone to do it as if she had done it herself.”

On the June 17, 2011, email chain with senior State Department adviser Jake Sullivan, Clinton apparently asked Sullivan to change the marking on classified information so that it is no longer flagged as classified.

Clinton, using her private email server, asks for “the TPs,” apparently a reference to talking points being prepared for her. Sullivan, who is using his official State Department email, responds, “They say they’ve had issues sending secure fax.

They’re working on it.” Clinton responds, “If they can’t, turn into nonpaper w[ith] no identifying heading and send nonsecure.” (Read more here at Drudge.)

What will Lynch do if Comey does recommend prosecutions? We are certain Hillary Clinton should be disqualified from pursuing office for many other reasons not the least of which were he actions concerning Benghazi but this many individual felonious acts warrant a much swifter prosecution of the law than we have experienced because of her “special status”.

ClintonSullivanFBI

With the movie “13 Hours: The Secret Soldiers of Benghazi” coming to theaters next week, we believe America will demand that she be prosecuted.

We have not even mentioned all the questionable activity over the Clinton Foundation and numerous other issues but we are certain of one thing, America cannot afford another epic mistake in the election of our President after these past 7 years.

Hillary Clinton’s criminal probe will ‘come to a head’ in next 60 days; indictment likely, says ex-US attorney

By Frieda Powers – BPR BizPac Review

The ongoing investigation into Hillary Clinton’s emails has not yet landed the Democratic candidate an interview with the FBI, but a former U.S. attorney thinks a criminal indictment could be coming in the next 60 days.

Former Republican U.S. attorney, Joe DiGenova, said a charge against Clinton personally would put the current administration in a very uncomfortable position, reported the Washington Examiner. The open FBI investigation is Clinton’s “biggest problem right now,” DiGenova said on the “Laura Ingraham Show” radio program, Tuesday.

%CODE%

DiGenova, a Republican who served as a federal prosecutor under former President Ronald Reagan, told conservative radio host Laura Ingraham that the FBI’s
investigation has reached a “critical mass” and the evidence against the former secretary of state is damning. (The Blaze)

“They have reached a critical mass in their investigation of the secretary and all of her senior staff,” he said. “And, it’s going to come to a head, I would suggest, in the next 60 days.”

Before making any findings public, the FBI would still likely need to interview the former secretary of state, DiGenova said. After months of investigating whether Clinton and her staff mishandled classified information on an unsecured network, FBI Director James Comey has not disclosed when the probe will conclude.

“It’s going to be a very complex matter for the Department of Justice, but they’re not going to be able to walk away from it,” said DiGenova. “They are now at over 1,200 classified emails. And, that’s just for the ones we know about from the State Department. That does not include the ones that the FBI is, in fact, recovering from her hard drives.”

While the Clinton campaign has insisted it is not a criminal investigation of the candidate personally, DiGenova maintained that the evidence otherwise is “compelling” and “overwhelming.” The Obama administration would find itself in a corner as the burden would lie with Attorney General Loretta Lynch to charge Clinton personally with a crime.

“The evidence against the Clinton staff and the secretary,” said DiGenova,  “is so overwhelming at this point that if, in fact, she chooses not to charge Hillary, they will never be able to charge another federal employee with the negligent handling of classified information. The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.”

“I believe,” DiGenova added, “that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general. It will be like Watergate. It will be unbelievable.”

 

The Evidence Against Hillary Clinton Is Growing.

Editor’s Note – Benghazi update. The FBI’s probe has now expanded to include another Hillary Clinton private server.

Fresh evidence keeps sinking Hillary Clinton’s email defense

Hillary Clinton’s “there’s no evidence of that” line of defense over her email mess continues to crumble in the face of . . . new evidence.

For all her talk of how using a private email account for her work running the State Department was just fine, it’s now plain she left top-secret information vulnerable to hackers.

Democratic presidential candidate Hillary Rodham Clinton listens to questions during a campaign stop ,Tuesday, July 28, 2015, in Nashua, N.H. (AP Photo/Jim Cole)
Democratic presidential candidate Hillary Rodham Clinton listens to questions during a campaign stop ,Tuesday, July 28, 2015, in Nashua, N.H. (AP Photo/Jim Cole)

More evidence is likely to come out. The FBI’s probe has now expanded to include another private server she used, a backup service with Connecticut-based Datto Inc.

And now the Associated Press has confirmed that her main server was the target of repeated cyberattacks from China, South Korea and Germany. And those came after she left office, when her team belatedly agreed to use some threat-monitoring software.

In other news, a FOIA request from the watchdog group Citizens United has uncovered the fact that Hill’s chief of staff, Cheryl Mills, was forwarding classified info to the Clinton Foundation — so staff there could support Bill Clinton’s work in Africa.

Add to this new details about Hillary’s emails with longtime aide Sidney Blumenthal — emails that somehow didn’t make it into the data she finally handed over once word broke that she’d failed to share her work product with the government.

Her extensive communications with him include the naming of a CIA source (obviously classified) as he pushed for action in Libya — action that would benefit his clients.

“It is curious Secretary Clinton took so much of her advice from someone who had never been to Libya, professed no independent knowledge of the country and who the White House blocked her from hiring,” said Rep. Trey Gowdy (R-SC), who heads the select committee trying to finally get to the full facts on the deadly Benghazi attack.

Curious? Hey, in Clintonworld, blending policy with pocket-lining is routine — national security be damned.

 

N. California Infrastructure – 11 Attacks to Net Grid

Editor’s Note – With the threats we hear so much about emanating from ISIS, and the focus on the holiday weekend fast approaching, we wonder what could happen here inside our borders.

Now we learn that a series of interruptions of the internet in northern California over the past year were caused by deliberate acts of sabotage to infrastructure. It is hard to think they are not related since it has happened so many times – are these further tests?Fibre-optic-cable-007

ISIS has threatened our infrastructure as far back as last August and we do know that a power station in the same region was attacked twice in 2013 and 2014.

The Metcalf sniper attack was a “sophisticated” assault on PG&E Corp’s Metcalf Transmission Substation located outside of San Jose, California.

See something…say something – no matter what, and not just this weekend. This isn’t just vandalism like what happened to cables in Northern Arizona last year to Century Link lines.

FBI investigating 11 attacks on San Francisco-area Internet lines

By Trevor Hughes and Jessica Guynn – USA Today

The FBI is investigating at least 11 physical attacks on high-capacity Internet cables in California’s San Francisco Bay Area dating back a year, including one early Tuesday morning.

Agents confirm the latest attack disrupted Internet service for businesses and residential customers in and around Sacramento, the state’s capital.

FBI agents declined to specify how significantly the attack affected customers, citing the ongoing investigation. In Tuesday’s attack, someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo.

The attacks date back to at least July 6, 2014, said FBI Special Agent Greg Wuthrich.

(Photo: Downdetector.com)
(Photo: Downdetector.com)

“When it affects multiple companies and cities, it does become disturbing,” Wuthrich said. “We definitely need the public’s assistance.”

The pattern of attacks raises serious questions about the glaring vulnerability of critical Internet infrastructure, said JJ Thompson, CEO of Rook Security, a security consulting and services provider in Indianapolis.

Fiber-optic cables are essentially bundles of slender glass fibers that use light waves to transmit data.

They are the interstate highways of the information superhighway, carrying vast amounts of data between decentralized hubs.

From there, Internet services are delivered to homes and businesses by lower-capacity cables, including DSL.

In Arizona earlier this year, tens of thousands of residents were cut off from Internet service after someone sliced through underground fiber-optic cables.

In April 2009, underground fiber-optic cables in California were cut at four sites, knocking out landlines, cell phones and Internet service for tens of thousands in Santa Clara, Santa Cruz and San Benito counties.

The Metcalf power substation was attacked twice, one in 2013, and then in 2014. Now we have 11 other infrastructure attacks?
The Metcalf power substation was attacked twice, once in 2013, and then in 2014. Now we have 11 other infrastructure attacks in the same region?

“When it’s situations that are scattered all in one geography, that raises the possibility that they are testing out capabilities, response times and impact,” Thompson said. “That is a security person’s nightmare.”

Wuthrich said cutting the lines requires tools. Although fiber-optic lines themselves aren’t much bigger than diameter of a pencil, they’re usually protected by tough, flexible conduit.

Citing the ongoing investigation, he declined to further discuss specifics of the attacks, which he said have generally occurred in remote areas not monitored by security cameras.

Mark Peterson, a spokesman for Internet provider Wave Broadband, said an unspecified number of Sacramento-area customers were knocked offline by the latest attack.

He characterized the Tuesday attack as “coordinated” and said the company was working with Level 3 and Zayo to restore service.

Spokeswomen for Level 3 and Zayo confirmed the disruption but declined to discuss specifics.

“Law enforcement is involved and restoration crews are working to restore connectivity as quickly as possible,” Zayo spokeswoman Shannon Paulk said via email.

These types of cables circle the globe
These types of cables circle the globe

Level 3 and Zayo are primarily business-to-business Internet providers, connecting local services like Wave to the broader Internet with their high-speed fiber-optic lines.

Safeguarding these lines “is a massive challenge for municipalities, governments and Corporate America to deal with,” Thompson said.

Fiber-optic cable lines are everywhere and are very visible, said Richard Doherty, research director of The Envisioneering Group, a technology assessment and market research firm.

“There are flags and signs indicating to somebody who wants to do damage: This is where it is folks,” Doherty said. “You often have fiber from several companies sometimes going down the same street or the same trench. One attacker can dig one hole and wipe out service from three companies.”

Backup systems help cushion consumers from the worst of the attacks, meaning people may notice slower email or videos not playing, but may not have service completely disrupted, he said.

But repairs are costly and penalties are not stiff enough to deter would-be vandals, Doherty said.

“It’s a terrible social crime that affects thousands and millions of people,” he said.

"Where's the FBI?" Commies and their successors – Ferguson

Editor’s Note – This article was originally posted at FoundersCode.Com and has been edited for final posting here. Before reading the article, keep in mind her recurring question: “Where is the FBI” and the law as it is being enforced.

The author refers to the law at 50 U.S. Code § 842 – Proscription of Communist Party, its successors, and subsidiary organizations:th (2)

The Communist Party of the United States, or any successors of such party regardless of the assumed name, whose object or purpose is to overthrow the Government of the United States, or the government of any State, Territory, District, or possession thereof, or the government of any political subdivision therein by force and violence, are not entitled to any of the rights, privileges, and immunities attendant upon legal bodies created under the jurisdiction of the laws of the United States or any political subdivision thereof; and whatever rights, privileges, and immunities which have heretofore been granted to said party or any subsidiary organization by reason of the laws of the United States or any political subdivision thereof, are terminated: Provided, however, That nothing in this section shall be construed as amending the Internal Security Act of 1950, as amended [50 U.S.C. 781 et seq.]

Please now read her article here and ask yourself: “Where is the FBI?”

Sedition: Education and Media

By Denise Simon, SUA Asscociate Editor

C’mon parents, your children are being indoctrinated on Islam and Sharia in public schools and at university.  That is bad enough, but do you approve of seditionist infiltration on campus where you pay for tuition for classes taught by Marxists, Leninists, and Communists?

ferguson-communists

Where is the FBI?

Former President Bill Clinton pushed back against the charge that President Obama and his fellow Democrats are card-carrying members of the Communist Party — telling supporters Monday that “nobody’s seen a communist in over a decade” while chastising a freshman Republican for name-calling.

Invoking the specter of Communist-hunter Sen. Joseph McCarthy, Clinton blasted Rep. Allen West (R-Fla.), who in April said that he could identify 80 members of the U.S. House who were Communists — pointing to a caucus of House liberals when pressed for evidence.

Where is the FBI?

Former President Bill Clinton, his wife Hillary and hundreds in the Obama administration who full well know there are communists in the federal government, at universities across the country, and across the spectrum of media. Need more proof?th (3)

Well, look at Ferguson, Missouri. Leftist organizers are using Ferguson to rehearse the Big Ugly

Scan the signage in the photos taken at Ferguson street protests across the nation and note that a handful of groups’ names reoccur.

Among them are REVCOM.US (Revolutionary Community Party USA , A.N.S.W.E.R. Coalition (founded by the pro-Leninist Becker brothers and aligned with the Party for Socialism and Liberation), Peoples Power Assemblies, Socialist Worker.org, and the International Action Center (founded by Jimmy Carter’s former Attorney General, Ramsey Clark, in 1992).

There are more.

Standing behind the signs are well-funded 501(c)(3) groups that receive millions of dollars every year through donations and foundation grants, and then allocate monies to promote social change.

It’s a one-two-three punch involving community organizers, supported by moneyed enablers, who marshal protesters to the street carrying signs with organizational ties most know nothing about.

All of it is well-organized, well-executed, and well-funded by intelligent, well-rehearsed, highly-motivated, ideologically-driven zealots for fundamental transformation in America, and, for some, the world. It’s all perfectly legal.

Where is the FBI?

Where does the money come from that is financially supporting these groups and protests? Organizations that, in recent years, have received direct funding and assistance from George Soros and his Open Society Institute (OSI), For a complete list we suggest you to Discoverthenetworks.org.

But there is more and you need to pay attention as the leadership of these groups get unfettered access to the White House and to media.

Where is the FBI? Who performed the background checks of these people and approved access?

Com.org

The MacsMind website did some good work as noted below. (Link to Revcom where the above screen shots were obtained and the petition mentioned were originally posted.)

If there were any more reasons Van Jones should step down or be fired. In 2006 he signed a petition by the Radical Black Panther Collective for Social Progress. The petition states, “resist so that we will not be crushed. Our resistance gives other people courage.”

Among the supporters, a who’s who of socialist/communistic organizations and individuals:

ListCommies

Where is the FBI?

Then in 1954 a law was passed title the Communist Control Act. The spirit of the law is to identify organizations and people attempting to overthrow the system of government including the Federal and State level. Sure in garden variety terms this has not happened, but when it comes to political correctness, edicts, mandates, enforcing law and prosecution, Communism is here and it is effective, as noted by meetings today in the White House and in towns such as Ferguson, Oakland, St. Louis and Chicago.

FergusonCommies

Where is the FBI?

Where are you parents?

Where is the top leadership at the Department of Education?

Where is the leadership of universities and the donors?