Why All Elections Are Rigged


Armstrong Economics Blog/Politics Re-Posted Nov 20, 2022 by Martin Armstrong

QUESTION: Do you think the midterm elections were rigged?

SK

ANSWER: Under normal conditions, one would have to answer that question as – OF COURSE.

In the past five midterm elections, the Republicans gained control of the Senate in 2014, the House in 2010, and the Senate in 2002. The Democrats gained both the House and Senate back in 2006. So it has been 20 years since a midterm election didn’t result in a change of control in at least one chamber of Congress when the Republicans kept the House and Senate in 1998.

Biden has used the strategic oil reserve which was to protect the nation against another embargo as during the 1970s all to manipulate the midterm election. He also sold oil to China. And then Biden promised that he would make abortion a constitutional amendment, which he cannot do – it would take states to vote on that and he knew he was just a bold face liar.

The reason he deplete the strategic oil reserve is because if the economy turns into a recession and/or high inflation, Congress will always flip and in a presidential election, the president is booted out like Hoover in 1932 or Jimmy Carter in 1980.

The youth voted for Democrats and they will soon realize that they were played as the typical fool just as the Democrats, the party of slavery during the Civil War, used the Civil Rights Act in 1964 and many have said it was to get the black vote.

MSNBC reporter Adam Serwer writes:

In Senate cloakrooms and staff meetings, Johnson was practically a connoisseur of the word. According to Johnson biographer Robert Caro, Johnson would calibrate his pronunciations by region, using “nigra” with some southern legislators and “negra” with others. Discussing civil rights legislation with men like Mississippi Democrat James Eastland, who committed most of his life to defending white supremacy, he’d simply call it “the nigger bill.”

Anyone who thinks that those on Capitol Hill really care about you or your future is a brainwashed fool. This is a game of party politics and that is civil war on Capitol Hill.

EVERY election is always rigged! The only question is did it actually effect the outcome. Nobody will dare to actually launch a real investigation into that. When a Grand Jury in 1908 investigated elections in Chicago, they concluded that there was probably NEVER a fair election. It does not matter which side, for they all are in the game.

Sunday Talks, Republican Leader Kevin McCarthy States His Intention to Remove Adam Schiff, Eric Swalwell and Ilhan Omar from House Congressional Committees


Posted originally on the conservative tree house on November 20, 2022 | sundance

During an interview with Maria Bartiromo {Direct Rumble Link Here} incoming Republican Leader Kevin McCarthy discusses his outline to become Speaker of the House of Representatives.

Additionally, Leader McCarthy states his intention to disallow Democrats Adam Schiff and Eric Swalwell to maintain status on the House intelligence committee, and also remove Democrat Ilhan Omar from the House Foreign Affairs Committee. {Segment Rumble Link}  WATCH:

{Full Interview Here}

Full Interview:

.

Trump Sues CNN


Armstrong Economics Blog/Politics Re-Posted Oct 5, 2022 by Martin Armstrong

Former President Trump has filed a defamation lawsuit against CNN. It is of no surprise that the network repeatedly bashed the president before, during, and after his presidency. Trump’s attorney claims the network “has sought to use its massive influence — purportedly as a ‘trusted’ news source — to defame the Plaintiff in the minds of its viewers and readers for the purpose of defeating him politically, culminating in CNN claiming credit for ‘[getting] Trump out’ in the 2020 presidential election.” Trump is seeking $475 million in damages.

Some believe this may be a publicity stunt as defamation suits are notoriously difficult to win. However, we cannot deny that CNN was running a smear campaign against Donald Trump. They reported on the Steele Dossier, Russian collusion, and other completely fake stories as if they were factual. It seemed as if CNN was running a 24/7 channel designed for the purpose of bashing Trump.

Trump’s lawyer also claimed that CNN told their viewers he was a cult leader, associating his likelihood with that of Adolf Hitler. Under this umbrella, the current White House and every other media outlet should be punished for defamation. Joe Biden himself declared MAGA Republicans the biggest threat to democracy, and violence against conservatives has ensued. Let us also not forget how CNN treated Trump during his debates.

This would be a huge step in the right direction for journalism at large if CNN lost. It is unlikely that CNN will completely lose, but they are in the wrong. Journalism has become nothing more than a tool of propaganda that cannot be trusted.

Musk Twitter Purchase Back on Table, Unfortunately with Plan for Everything App


Posted originally on the conservative tree house on October 4, 2022 | Sundance

The only thing I can do is research and write about it.  With an even stronger degree of certainty than originally expressed, and with all of the subsequent data points falling into alignment with the initial suspicions, the background of Jack’s Magic Coffee shop remains unchanged. {Go Deep}

Six weeks ago, the Twitter security ‘whistleblower’ came forward to congress.  The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency.  Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO. {Go Deep}

According to a recent SEC filing [LINK HERE], Elon Musk is now back to supporting the purchase of Twitter as the first step in creating the “everything app.”

{{{sarcastic voice}}} Gee, what could this be about?  I mean what could go wrong?….  We already know the infrastructure of Twitter’s operational database is tied into portals with the Dept of Homeland security {citation}, and now Musk wants to use that central infrastructure to create an all-inclusive “everything app”?

The bigger risk to the surveillance state is discovery that Twitter and the U.S. intelligence community are in a public-private partnership. The Dept of Homeland Security has access by design, not flaw.  How the stakeholder media are reporting on the issue shows the nature of the risk, (emphasis mine):

[…] The scathing disclosure, which totals around 200 pages, including supporting exhibits — was sent last month to a number of US government agencies and congressional committees, including the Securities and Exchange Commission, the Federal Trade Commission and the Department of Justice. The existence and details of the disclosure have not previously been reported. CNN obtained a copy of the disclosure from a senior Democratic aide on Capitol Hill. The SEC, DOJ and FTC declined to comment; the Senate Intelligence Committee, which received a copy of the report, is taking the disclosure seriously and is setting a meeting to discuss the allegations, according to Rachel Cohen, a committee spokesperson. (link)

How would it damage the U.S. government if previous claims about the Chinese government having access to all user data on TikTok, are shown to be exactly identical to the U.S. government having access to all user data on Twitter?

Let that question settle in for a few moments, because that is exactly what I have been alleging since, well, 2011, when the U.S. State Dept first collaborated with Twitter in a joint public-private partnership to use the platform as a communication tool exploiting the Arab Spring uprising in Egypt, Libya and beyond.

The issue of Jack’s Magic Coffee Shop is an issue of financial viability.  The business model of Twitter just doesn’t exist as a free social media discussion platform while running the ultra-expensive data processing system needed for millions of simultaneous users.  A global chat that requires exponential database responses as an outcome of simultaneous users is just ridiculously expensive. {Go Deep} However, if the computing system and massive database were being subsidized by the U.S. government, then the viability of the ‘free coffee‘ business model makes sense.

“Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

♦ Legal Stuff – The issue of American citizen privacy and U.S. constitutional limits against the government listening in on communication is functionally obsolescent.  The Foreign Intelligence Surveillance Act (FISA) prohibits communication intercepts on U.S. citizens without a valid search warrant.  However, if a U.S. citizen is engaged in a conversation with a foreign person, all privacy restrictions are essentially gone. [Insert example of Michael Flynn taking to Russian Ambassador Sergey Kislyak here]

Your phone calls can be intercepted by the government from the foreign side of the call.  The govt can freely monitor the calls that involve foreign actors.  The only rule is that your privacy must be maintained. If the foreign actor is in communication with a U.S. citizen, the U.S. citizen must be “minimized” or not identified in any intercept.

However, what happens when the phone call is on a community line that is connected, and visible, to the entire world?   That’s the benefit of social media monitoring from a surveillance perspective. It is from that opaque and unresolved archaic legal perspective that surveillance authority of social media platforms, by the U.S. intelligence community, exists.   Now you see why the SSCI is taking an interest in the Twitter whistleblower, classic risk mitigation.

Hopefully, you can also see why the 200-page whistleblower document was leaked, by a Democrat staffer, to the Washington Post and CNN.

CNN defends the equity interests of the U.S. State Dept., and WaPo defend the Intelligence Community (CIA, DHS, etc).

Within the narrative as constructed you will note, “Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns.”

If the relationship between Twitter and the U.S. intelligence community is a public-private partnership, why would Twitter want to shut down the portals given to the Dept of Homeland Security?

Answer, they wouldn’t… Ergo the response from Twitter to the whistleblower complaint is (emphasis mine), “What we’ve seen so far is a false narrative about Twitter and our privacy and data security practices that is riddled with inconsistencies and inaccuracies and lacks important context.

Put another way, the “lacks important context” is the nature of the security risk, which is structural to the relationship between the intelligence community and the platform.  See how that works?

The integration between Twitter and the United States Intelligence Community has been hiding in plain sight:

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)

A shared hashing protocol is a form of data system integration.  The databases of the identified social media platforms are integrated with the U.S. intelligence system.

…. And now Musk wants to integrate an “everything app”?

Follow the bouncing ball and you enter the world of the comprehensive surveillance state.   But if you don’t do anything wrong, you’ve got nothing to fear right?  Insert example of non-vaccinated repercussions, Canadian truckers and Dutch farmers here.  Then add a digital identity, digital currency, energy resource apportionment and social equity.  Where do you end up?

All I can do is research and write about it.

Even the influential members of the ‘Rebel Alliance‘ used to think I was crazy….  Not any longer.

.

.

….Me Right Now