From Stolen Patents to Weaponizing Social Media
Hi Field, I hope all is well. Here is some things that came about through the Patent theft machinations of Hillary Clinton and James P. Chandler III, about 17 years ago; and so your sister Kristine Marcy must be in the mix somewhere? By the way, when did Serco take over the U.S. Patent and Trademark Office? Anyways, here’s the first two installments. Keep up the good work! As always…
Peace in Christ,
American Intelligence Media
Trillion Dollar Rip-Off: Social Networking is a Stolen Trade Secret
Douglas Gabriel interviews Michael McKibben in PART 1 of SIX interviews. One of the largest government sponsored industrial espionage thefts of copyrights, trade secrets, and patents in modern times was the theft of scalable social networking inventions. The technology and programming code that underlie Facebook, Gmail, YouTube, Twitter, Instagram and most the other large-scale social networking companies runs on Leader Technologies’ intellectual property.
It was stolen by a group of criminal lawyers, judges, spies and bankers working with complete impunity and in total disregard for the law. Under the guise of the IBM Eclipse Foundation, James P. Chandler III (who was a national security advisor and top White House attorney) led the group of criminals who, interestingly enough, are also appearing in the news currently due to their most recently discovered crimes, along with John Podesta, Robert Mueller, Rod Rosenstein, John Breyer, James Breyer, Larry Summers, Yuri Milner, Alisher Usmanov, Mark Zuckerberg, Sheryl Sandberg, Bill and Hillary Clinton, and a host of others who are not so well known.
The Evil Tech-Cartel: Weaponizing Social Media
Douglas Gabriel interviews Michael McKibben in PART 2 of 6. Patent theft is accomplished through the Patent Trial and Appeals Board and the many laws that allow the US Patent and Trademark Office to confiscate and control any patent deemed a national security issue. Once confiscated, the inventor is not compensated for the out-right theft of the patent. Stiff penalties, including incarceration, accompany these seemingly “illegal” patent laws that can steal any patent that the military (Department of Defense) or cyber-intelligence (all 17 agencies) considers a patent that could be turned into a weapon.
Once stolen, the government uses a complex group of public, and secret, defense agencies, corporate contractors, and crooked bankers to fund the weaponization of trade secrets, patents, copyrights and other forms of intellectual property. Usually, the government builds in a “back-door” to the technology–so that they can control and manipulate the weaponized property. Then, they fund a “front-man” as a stooge to run a private corporation that is built on the weaponized invention.