This post has to cover a lot of ground, including:
- Hillary Clinton,
- How the appearance of “professionalism” trumps the need for factual muck-raking,
- sensual gratification produced tactile stimuli.
I would like to say a few words about recent developments in the field of conspiracy history, a.k.a. conspiracy journalism, a.k.a. conspiracy theory.
First of all, I rather presume that anyone with an interest in conspiracies keeps up with the great grandfather of conspiracy theory on the Internet, namely Jeff Rense.
Jeff Rense has run an aggregator on the web for many years. Rense is contrarian. If the mainstream media doesn’t want to talk about it, Rense links to it.
From Rense, you can find many people talking about the folks who get dead around the Clintons.
Some of thse dead people did not appear in the frst draft of this post, such as Sandeep Sherlekar:
The most disturbing thing about the changing story by Foster’s sister is that she ignores the overwhelming evidence of a cover-up of her brother’s murder….
The Special Division of the U.S. Court of Appeals ordered Kenneth Starr, over his objection, to include an appendix in his report on the death of Vincent Foster. The appendix includes copies of twenty-five federal investigative records, proving six areas of cover-up:
- There was a bullet hole in Vince Foster’s neck.
- Photographs of the bullet hole vanished.
- X-Rays of the bullet hole vanished.
- The gun did not belong to Mr. Foster,
- Mr. Foster’s car was not in the park.
- Patrick Knowlton suffered grand jury witness intimidation
The linked article goes into tedious depth, but at least it is well-organized and useful.
As another example of the kind of stuff that Rense links to:
In emails from her private server made available to the public by WikiLeaks, Clinton’s close relationship to Lady de Rothschild is evident due to their warm exchanges which include phrases such as “You are the best […] Sweet dreams,” “I remain your loyal adoring pal,” and “Much love.” This is significant as, judging by Clinton’s other emails, her communication style is almost always curt and concise, never approaching the outright declarations of affection found only in her exchanges with Lady de Rothschild. Lady de Rothschild, married into the Rothschild family in 2000 after being introduced to Sir Evelyn de Rothschild, who alone is worth $20 billion, at the 1998 Bilderberg Conference. War criminal Henry Kissinger served as the couple’s “match-maker.”
Yet, the most bizarre interaction between Clinton and Lady de Rothschild took place in an email titled “Info for you” (ID#1606), which was sent while Clinton was serving as US Secretary of State. In the email, Clinton tells Lady de Rothschild that she had to ask Tony Blair (then-Prime Minister of England) to accompany her to Israel due to the Middle East peace negotiations taking place at the time. Blair had previously planned to spend the weekend in Aspen, Colorado with the Rothschilds at an unspecified conference, but accepted Clinton’s invitation. Clinton then says “I hope you all understand. […] Let me know what penance I owe you.” For those who are not familiar with the word, penance is defined as follows: “An act of self-mortification or devotion performed voluntarily to show sorrow for a sin or other wrongdoing.”
This conspiracy journalism is slightly sensationalized. It is criticism of propaganda rather than a set ofshocking allegations.
Unfortunately, some of the people that Rense links to are professional wriers, who do their best to spin out many thousands of uninformative words because someone is paying them by the word for information that really ought to be available in Metapedia:
Example – Wayne Madsen – a smart guy who has done some good work, but who has a bad habit of re-hashing old news in order to fill up column inches:
…The U.S. intelligence community, … is inventing Russian involvement in a desperate move to divert attention away from the corruption of the Clinton family and Hillary Clinton’s campaign.
Podesta is a magnet for [crackers who try] to expose what they see as a massive cover-up of the ET presence on Earth. The largest hacking of military computers in recent times was carried out by a young Scottish hacker named Gary McKinnon…
The United States tried to have McKinnon extradited …
Earlier this year, Hillary Clinton … told the Conway Daily Sun… she would “get to the bottom” of the UFO cover-up. That served as another magnet for the global hacker community.
And Bill Clinton has done his best to draw the interest of UFO hacker groups. …
Madsen’ conspiracy journalism isn’t intentionally deceptive, it’s just mediocre and inefficient. It is, sadly, “professional.” Madsen isn’t going to print a thinly-sourced claim or let his enthusiasm get the better of his analysis.
Unfortunately, the folks who have the enthusiasm to inform the public are usually the amateur conspiracy theorists, who have passion and altruism, but who never studied journalism and who are not sufficiently educated or informed to give a truly useful summary of their shocking facts.
The following conspiracy journalism is written by an amateur (who called himself “truebluepatriot”) whose heart was obviously in the right place, but whose lack of technical precision might make his technology tips downright wrong and misleading. Rense links to a lot of amateurs like truebluepatriot, who is probably an ex-Federal USA agent who spent years trying to spill the beans on USA government misconduct:
- Not only can NSA remotely activate the microphone and camera on your mobile devices and listen/watch in live to see what you are doing anywhere in the world, (smart phone, lap top, etc), they can insert and remove any file into or from your mobile device or computer no matter what your connection may be (cable, G3, Wi-Fi, Satellite). In my own case they removed a video I had converted to MP4 of a video tape I had provided to former member of Parliament Paul Szabo and in its place inserted a porno video of exactly the same size. The video removed was of corrupt FBI agent named Terry Nelson involved in massive drug smuggling.
Think about this… if you are someone the pols or feds need to smear or discredit, they can insert incriminating evidence, in the form of files or photos, (that they themselves fabricate) into your computer with any date stamp they like. Conversely they can remove any exculpatory evidence or merely change the date stamp …
- They also have the technology to remotely reformat your hard drive (erase it) or they may choose to lock or totally encrypt it as well, or if they prefer insert a key logger program that will capture and send them every thing you type on a daily basis and send it to them via the cloud in real time, or via delayed transmission. In 2012 they erased the entire hard drive of one of my laptops and I was unable to recover the data. Fortunately most of it was backed up elsewhere. …
- The FBI’s dirty tricks team has the technology to create/fabricate incriminating email with professional grade email spoofing software that can be inserted into your email log with all the right timestamps, footers, headers, etc. and only someone in forensic IT law enforcement might be able to tell it is a fake email. …
- Speaking of emails, they can easily decide what emails you get to receive and which get trashed on the way in or out of your email server. Yes, they can and do delay emails in real time by flagging “key words” in the content with a program they use called “Port Reader”. …
according FBI insiders who confided anonymously with Foreign Policy magazine…
“The FBI has configured its port reader to intercept all metadata – including packet size, port label, and IPv6 flow data – that exceeds what the law permits, according to one industry source.
Here’s a link to a 2006 court case elaborating on what counts as metadata for pen register and trap and trace orders. ..
- They now have the technology (and have had it for at least a year or perhaps much longer) to remotely listen into conversations inside an automobile that is equipped with Onstar Sattelite communications link. In 2014, after I gave a training session to a deputy governor of the People’s Bank Of China, he offered me a ride in his car because it was raining. We had a conversation about China’s plans to buy all future oil contracts only in rmb and other currency related issues. Two days later, I was picked up and interrogated by U.S. agents in Beijing about this conversation and was asked to betray my friendship with my student. When I tried to play dumb about the conversation, they played a recording of it to me that was crystal clear. No, I did not betray my student. I also learned there is yet another way to monitor conversations in a car but it is old school and requires a tail car or overhead drone to be within 100 meters and they use an FM bug. …
- DHS and NSA now have the technology today to covertly duplicate the voice of any person within a matter of hours to be so exact that even a spouse would be fooled. …
In 2014, I received a call from an old friend who used to be an investigative reporter asking me to send him copies of 27 audio recordings of various law enforcement officials, and information I obtained from another friend Karlheinz Schreiber who retired from his arms dealing business recently. The voice was familiar and exact. The caller had me fooled completely – until I asked him three questions, about Jorge/George Morales , Steve Finta, and Renee Benitez that caught the impersonating caller off guard and he had to change the subject because he clearly did not know who I was talking about, despite the fact he had been investigating all three for NBC News for several months year ago. The real journalist would have been able to respond intelligently to my questions about George’s murder, Steve’s fake heart attack, and the 30 year imprisonment and betrayal of Benitez.
In 2013, I had received a similar call from an alleged agent for “Phoenix Group Publishing”, allegedly a foreign subsidiary of the huge publisher Harper set up offshore only to publish “controversial non-fiction books of a political nature” She claimed her name was “Trisha McKenzie” and she wanted to meet with me about publishing my book and she claimed to have read several chapters and would like to have the complete manuscripts to review. She even agreed to sign a non-disclosure agreement with me. When I asked how she got any of my manuscripts to read (I had only given copies to five trusted friends to hold and hide for me) she said that my Ohio neighbor and best childhood friend had met with her secretly to seek help for me, and gave her five sample chapters to read. Considering that Mike had just passed away from cancer the year before, she knew that I could not verify her claims, but since I promised my wife I would never publish the book after our son was born, she did not get what she wanted, even after offering a $100,000 advance. I now notice the nice fake web site for Phoenix Publishing Group is gone as is the Linked Page for Patricia McKenzie, both of which she referred me to in 2013. Hmmm. Check this out: https://decryptedmatrix.com/your-voice-is-being-used-to-id-and-track-you/
- Since Bill Gates sold out to the feds on citizen spying and Microsoft bought out Skype in 2013, all Skype traffic is monitored and they have the ability to block connections and transfer of files at will by user names. They can remotely block on a wholesale or specific basis – automatically or on a real-time selective basis. In 2014, I was able to reconnect after the 30 year absence of another close friend and famous political prisoner the world knew only as “Gary Betzner”. Gary was the key pilot for Oliver North’s secret Contra operation who delivered guns and drugs for the famous top secret Contragate scandal after things were exposed when Gene Hasenfus’s C123 was shot down in Central America . …
We finally hooked up on Skype and had lots of catching up to do. But as soon as we started talking about my exile in China and which corrupt agents were involved (known to both Gary and myself), we were disconnected and could not reconnect on Skype – ever again. We found another way to communicate, and soon that channel was also blocked. I then learned that Gary was trying to call me on my mobile phone in China and he was angry that I was not answering his calls. On my end the phone never even rang. Likewise, when I was given a number to call Gary back in Arkansas, the call I made just rang and rang with no answer. Using various settings and a VPN, Skype can temporarily be fooled for one or two calls to get through, but anything said will be recorded. When I tried to transfer Gary a copy of a Private Investigator’s 11 page sworn report, the file transfer was blocked.
- Fake Security Updates of Windows 7: Microsoft has always allowed back door entry into your computers to the feds … Windows 7 can be remotely activated to install spyware bundled with random “security updates”. How long they have had this capability is unknown. No matter how many times I have “disabled” automatic updates, they just keep a coming. So whenever I go online I work as if a federal agent is sitting right next to me videotaping every key stroke.
- Internet Forum Fraud: Freedom of Speech On the internet is really a myth. As recently demonstrated at Thebeijinger.com, Uncle Sam and false “patriots” they recruit often censor and otherwise tamper with unfavorable comments made about American foreign polices, war crimes, etc. or to smear a dissident like myself. Over the past five years over 3 dozen threads about the chemical weapons used in Fallujah, the Bradley Manning “Collateral Murder” video, America’s Banksters, the missing Iraq billions, the missing $2.3 Trillion from the Defense Department, Haliburton’s $39 Bllion in Iraq War profits, American foreign drone deaths of kids and civilians, etc, were all remotely deleted from theBeijinger and I saved the screen shots to prove it if anyone doubts this. When myself and two other users exposed this censorship and demanded an explanation from thebeijinger.com (American owned cut-out company) all of our comments were deleted and we were banned. Recently after I tried to expose a China Internship scam along with a victim named Winnie Maliko who was instructed to commit a felony crime by a company I had infiltrated to investigate, both Winnie and I had our comments deleted and we were blocked from forum access. http://www.scam.com/showthread.php?t=681817 With no other way to challenge and expose the fraud, we resorted to making a few false accounts so we could publicly expose the censorship, but we then noticed that anyone and everyone who disagreed with smear story was being deleted and blocked.…
- Massive Internet Censorship: Approximately one-third of the internet is censored from public view and only about 50% of the deletions are hateful, child porn, obscene, or otherwise qualified for removal. As Google admitted in 2012, about half of all removal requests are coming from government sources and are of a political nature. See http://edition.cnn.com/2012/06/18/tech/web/google-transparency-report/ But what google refuse to remove, government hacks delete on their own. In 2011-2012 I posted a blogspot “Crimes I reported that remain ignored” about the following subjects:
- The alleged suicide of Cliff Baxter (Former Enron CFO)
- The alleged suicide of my former colleague U.S. Coast Guard Radioman Patrick Wesphal
- The murder of federal prisoner Ralph Steele
- Rapes & Beatings of immigrants at the Krome Detention Center
- The murder of my former colleague IRS agent Liston Smith
- The murder of FBI Informant of Al Chalem
- The Barry Seal , Jesus Garcia, Jose Coutin and George Bush Cover-Up Caper
- Money Laundering 101 For Govt. Officials – American Financial Group Style
- American War Crimes
- The Truth About WTC7 – Why are witnesses being jailed?
- The FBI Terry Nelson Drug Ring – Largest in history?
- Why Karlheinz Schreiber could not tell all he knew…
- The Noriega-Bush Connection – A love-hate affair
Within three days of posting this fairly detailed blog it was deleted and my access to the related gmail was blocked. Yet today in 2015, that gmail used for the blogspot shows as “available”! Yet strangely, my wordpress posts about three of the same subjects and the false murder conviction of Canadian Patrick Kelly remain intact! Go figure.
Don’t misunderstand – the amateur journo who wrote the above is probably amazingly competent at real-world muckraking investigations. He might be super-competent at lots of skills – he would have to be if he really got his investigations censored as he describes. But aparently he is too tech-illiterate to figure out how to use TAILS or Qubes or other “reasonably secure” cryptosystems. As a result, his important experiences come across as the cracker-barrel ramblings of a low-tech redneck. By contrast, Julian Assange might be a much less praiseworthy person, but Julian Assange is telegenic and technically competent enough to use encryption from the command line.
Muck-rakers like truebluepatriot have already spilled many important facts. Sadly, I fear that they are not likely to rally any useful opposition, simply because the hardcore crypto geeks will take one look at that and say, “He’s over-generalizing from his personal experience, and he sounds like a stupid Windows loser-user…”
After all of that despair-inducing rage-fuel has been considered, we must then consider how the average person tries to cope with the emotional stress of the modern world.
For anyone is is sufficiently young (or Viagra-fueled) to abandon sexual restraint, the recent stories of prevalent venereal disease should be enough to convince you that William Gibson and Samuel Delaney were wrong about sex in the future – there is not going to be any biomedical breakthrough that is going to make promiscuity safe in the 21st century.
According to the new report in 2015, there were more than 1.5 million chlamydia cases reported, nearly 400,000 cases of gonorrhea, and nearly 24,000 cases of syphilis. In just a year since 2014, chlamydia cases grew by 5.9 percent, gonorrhea by 12.8 percent and syphilis great by 19 percent, according to the Centers for Disease Control and Prevention…
So, given that sex will not bring us to a Logan’s Run-style utopia of materialistic hedonism, what hope do we have for sensual gratification?