The attached article explains how the Clintons had access to all of the world’s accounts and were able to misdirect our transfers. The Trustee has since changed all of the Security Certificates for the Cyber Security companies.
NOTE: The article cited here explains the reference to the SPEAK UPDATE posted this morning on the speakproject.net website.
Important aspects quoted from the article:
“Entrust became the certificate authority for issuing these digital keys for many organizations, and we’ve had people looking at the securities filings for this company from 1998 to 2009, when they sold out to a San Francisco firm and what we discovered, astoundingly, is that Hillary Clinton’s partner at the Rose Law Firm [Jerry C Jones] directs this company as a Class-One Director. He was slipped in in late 2003 and this means that we can show solid proof that the entire Internet has been compromised, in that Hillary Clinton and the Clintons have access to all the digital keys for all transactions on the planet.”…
“…This includes almost all of the agencies, executive agencies of the government, and that includes the Federal Deposit Insurance Corporation (FDIC), Department of Treasury, Department of Commerce, National Institute of Standards and Technology (NIST), General Services Agency (GSA), the Department of State, the Department of Energy, the US Post Office, the US Patent Office, the US Marine Corps, the US Coast Guard and on and on and on and then beyond that, we see the names of most of the major telecommunications players in Canada, Scandinavia and Denmark. According to their records, they have over 2,000 key customers and therefore, the Clintons through their Director, named Jerry C Jones, have access to the entire backdoor of the Internet.”
You can download the PDF file of the below report here:
With these encryption keys, nothing in our digital lives is off limits to the Clintons and their conspirators
President Trump’s new executive order can be sabotaged with these keys; alternatively, he can use the order to prosecute these criminals
Many foreign powers have conspired with the SES, and their Queen’s Privy Council overlords, since before 1993
Fig. 1—Hillary Clinton has all of our encryption keys, including the FBI’s. “Encryption keys” is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm (Dual Eliptical Curve Deterministic Random Bit Generator) and certificate authorities. The convoluted structure managed by the gutless agency chief information officer “Federal Common Policy” group says it has “hundreds” of certificate authorities, but this is a material lie. They have ceded “Root” authority (the basis of the X.509-based public key infrastructure) to key companies like ENTRUST INC, including the ability to sublicense their authority to third parties who in turn manage entire other networks (cross-certificates, subordinate certificates, Bridge certificate authorities) in a Gordian knot of incestuous commercial relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.
Click here to read a list of just some of the “more than 2000 organizations in 60 different countries” for which Hillary has backdoor encrytion keys. Source: ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar. Annual reports from 1998 to 2009 and selected other filings.1999 | 2000 | 2001 | 2002 | 8-K. FBI Contract Press Release (Oct. 29, 2003) | Jones’ Stock Options (Dec. 05, 2003) | 2003 | Co. Overview (2003) | Jones’ Signature (Dec. 23, 2003) | Jones’ Bio (Mar. 15, 2004)| 2005 | 2006| 2007 | 2008 | 2009 | 2009A | Relationships (1998-2009)
AFI (Nov. 06, 2015). Complicit encryption geeks enable the American spy state. Americans for Innovation.
AFI (Nov. 25, 2015). Dell and Lenovo (IBM) ship computers with spy state backdoors. Americans for Innovation.
SPECIAL NOTICE: This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added. Indictable evidence continues to pour in for use by prosecutors, alternative media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.
Cryptography—the use of codes and ciphers to protect secrets—began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.
The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a “skytale” to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu ‘ Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher. Tellingly, a design in 1976 by IBM based on “the Lucifer cipher” is now used and called “triple-DES” (the Triple Data Encryption Algorithm).
When the German Enigma Machine was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way, Hillary’s access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things’ version of the Enigma Machine break, which was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been “decisive” to the Allied victory. See History of Encryption.
(SEP. 16, 2018)—Imagine that your identity is stolen suddenly.
Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.
Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They’re wiped without a trace.
Imagine still further that you are Lord Mark Malloch-Brown from the Queen’s Privy Council. You need to erase the U.S. Department of Treasury’s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.
This cannot happen in America you say? Think again.
Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.