Exposing the Real Reasons the RNC Ignores You (Pt. 1) | Harmeet Dhillon | POLITICS | Rubin Report


The Rubin Report Published posted originally on Rumbal on December 26, 2022

Dave Rubin of “The Rubin Report” talks to candidate for RNC Chair Harmeet Dhillon about why the RNC suffered major losses in the 2022 midterm elections under the failed leadership of RNC chairwoman Ronna McDaniel; how she would change the political strategy of the Republican National Committee; why Republicans don’t seem to know how to win an election; and the free speech litigation she has done on the behalf of the Daily Wire and Project Veritas.

Exposing This State’s Secret Enemies List (Pt. 2) | Harmeet Dhillon | POLITICS | Rubin Report


The Rubin Report Published originally on Rumble on December 28, 2022

Dave Rubin of “The Rubin Report” talks to candidate for RNC Chair Harmeet Dhillon about how the Twitter files have confirmed the suspicions of the Center for American Liberty’s lawsuit against Twitter; how she exposed the state of California’s secret enemies list; why she is representing Rogan O’Handley (aka DC Draino) in his fight against big tech censorship; how Republicans dropped the ball in dealing with big tech regulation; how section 230 of the communications decency act needs to be reformed; and why we need a social media bill of rights.

Arizona Judge Orders Kari Lake to Pay $33,000 in Witness Fees but No Legal Sanctions


Posted originally on the CTH on December 27, 2022 | Sundance

Arizona Judge Peter Thompson has ruled that Mrs. Kari Lake must pay witness costs associated with her civil election lawsuit against Maricopa County officials.  However, the judge denied hundreds-of-thousands in defense lawyer fees for Marc Elias and did not issue financial sanctions against Lake.

PHOENIX — A judge has ordered Kari Lake, the Republican who lost the Arizona governor’s race, to pay $33,000 in fees for witnesses who helped defend election officials against Lake’s failed challenge of her defeat to Democrat Katie Hobbs, but rejected a request for hundreds of thousands of dollars in fees for the attorneys who defended the officials.

In an order Tuesday, Maricopa County Superior Court Judge Peter Thompson declined to impose sanctions against Lake and her lawyers, saying Lake’s failure to prove her case doesn’t “equate to a finding that her claims were, or were not, groundless and presented in bad faith.”

Thompson, who was appointed by former Republican Gov. Jan Brewer, pointed to a statistical analysis by a pollster who had testified on behalf of Lake. The witness, who conducts public-opinion polls and is not an election worker, claimed technical problems at polling places on Election Day had disenfranchised enough voters that it would have changed the outcome of the race in Lake’s favor. (read more)

Mrs Lake appeared on the Steve Bannon Warroom podcast earlier today to talk about her intent to file an appeal to the decision. {Direct Rumble Link}

Kari Lake:We’re going to the appeals court this week.

.

Interesting on Many Levels, Mom Blocked from Taking Daughter to Radio City Music Hall Event as Result of Facial Recognition and Blacklist


Posted originally on the CTH on December 27, 2022 | Sundance

Obviously, New York City contains one of the most widespread surveillance networks as a result of DHS funding and security ‘threats’.  However, the use of facial recognition software as a security feature is not as well known in the U.S. as it has been described in China.

A mom was taking her daughter to a show at Radio City Music Hall when she was pulled aside by security and told she would not be permitted admission.  The lady works for a law firm currently in litigation with the venue’s parent company, Madison Square Garden Entertainment.  All employees of the law firm are blacklisted.

Comrade citizens, what I find interesting about the story is the use of facial recognition to identify the woman and block her entry.  It doesn’t take a deep thinker to see where this type of targeting mechanism can be deployed along ideological lines.

NEW YORK – A recent incident at Radio City Music Hall involving the mother of a Girl Scout is shedding light on the growing controversy of facial recognition, as critics claim it is being used to target perceived enemies — by one of the most famous companies in the country.

Kelly Conlon and her daughter came to New York City the weekend after Thanksgiving as part of a Girl Scout field trip to Radio City Music Hall to see the Christmas Spectacular show. But while her daughter, other members of the Girl Scout troop and their mothers got to go enjoy the show, Conlon wasn’t allowed to do so.

That’s because to Madison Square Garden Entertainment, Conlon isn’t just any mom. They had identified and zeroed in on her, as security guards approached her right as he got into the lobby. (read more)

No soup for you!

Oh, but wait… It gets better.

WATCH:

As with all things in our rapid technological era, you do not have to squint to see the horizon and accept that eventually this process will automate.

However, as this process is created, it is worth considering that you are being quietly changed from an individual person to a product. Some are starting to worry in the beta test:

[…] “you must become an object with attributes sitting in a database. Instead of roaming around anonymously making all sorts of transactions without the government’s knowledge, Australians find themselves passing through ‘gates’. …

All product-based systems have these gates to control the flow of stock and weed out errors. It is how computers see things. The more gates, the more clarity.

You are updating the government like a parcel pings Australia Post on its way to a customer. If a fault is found, automatic alerts are issued and you are stopped from proceeding. In New South Wales, this comes in the form of a big red ‘X’ on the myGov vaccine passport app (if you managed to link your Medicare account without smashing the phone to bits).

Gate-keeping systems have been adapted from retail and transformed into human-based crowd solutions to micromanage millions of lives with the same ruthless efficiency as barcodes tracking stock. There is no nuance or humanity in this soulless digital age. Barcodes are binary. Good – bad. Citizen or dissident.

Even if you have all the required government attributes to pass through the gates – two vaccines, six boosters, and a lifelong subscription to Microsoft – something could go wrong. If your data fails the scan, you’ll slip into digital purgatory and become an error message. (read more)

It could be problematic if your status fails to register correctly, or if the system identifies some form of non-compliance that will block you from entry. Then again, that’s what beta tests are for, working out all these techno bugs and stuff. Not to worry…. move along….

Perhaps you attempt to purchase dog food and get denied entry into Pet Smart because you didn’t renew the car registration.  Or perhaps you are blocked from entry because you forgot to change the oil on the leased vehicle you drive and Toyota has this weird agreement with some retail consortium.   You head to the oil change place that conveniently pops up in the citizen compliance App –it’s only two blocks away– they clear the alert after they do the oil and you are gateway compliant again.

Missed your booster shot? We’re sorry citizen, your bank account is frozen until your compliance is restored… please proceed to the nearest vaccination office as displayed conveniently on your cell phone screen to open access to all further gates (checkpoints)…. tap to continue…

Media Rewrites Ukraine’s Dark History, New Twitter Files on Rigged Covid Debate | SYSTEM UPDATE #11


Glenn Greenwald Published originally on Rumble on December 26, 2022

Glenn Greenwald is of of the few reporters left in the United States

Sen. Cruz: “deeply disturbing” special counsel aiming to indict Trump


One America News Network Published originally on Rumble on December 26, 2022

Texas Senator Ted Cruz warns Attorney General Merrick Garland’s handpicked special counsel to probe former President Trump, Jack Smith, has a history of targeting Tea Party activists. One America’s John Hines has more from Capitol Hill.

Twitter File Release #11 – The Government Censorship Campaign to Control COVID-19 Information


Posted originally on the CTH on December 26, 2022 | Sundance

Twitter File release #11 hits on the long-anticipated information surrounding how the platform was instructed by various government agencies to remove content adverse to the expressed opinion of CDC, HHS, and DHS officials. [Release #11 Here]

The first installment of the Twitter COVID-19 files comes from David Zweig, a writer for New York Mag, New York Times, The Atlantic and other publications.  Because the U.S. Government COVID-19 information control operation was so extensive, there will likely be several Twitter File releases related to the SARS-CoV2 pandemic issue.  However, in this first release Zweig starts to build the story of how the CDC and HHS set the foundation for the echo-chamber that ended with Twitter executives running amok.

[Twitter File #11 – Release Here]

As Zweig begins his review he noted, “The United States government pressured Twitter and other social media platforms to elevate certain content and suppress other content about Covid-19.”  While the Trump administration was worried about information that would create panic, like runs on grocery stores, the Biden administration was more focused on content control to push the overall narrative about fearing COVID and the vaccination demand.

When the Biden admin took over, one of their first meeting requests with Twitter executives was on Covid. The focus was on “anti-vaxxer accounts.” Especially Alex Berenson,” Zweig writes as he then begins to give examples of various medical professionals that were targeted by the White House and the platform.

The outcome of the HHS and CDC push circled around politics, which, when combined with the ideological perspectives of the Twitter executives, inevitably ended up making COVID-19 a political issue on the platform.  Critics of COVID-19 policy were blocked, censored, removed and restricted.  Advocates of government policy were enhanced, amplified, promoted and enlarged.

The scale of the issue meant supportive algorithms based on key words needed to be created, and the scope of the information battle necessitated the hiring of contractors.  As Zweig notes, “contractors in places like the Philippines, also moderated content. They were given decision trees to aid in the process, but tasking non experts to adjudicate tweets on complex topics like myocarditis and mask efficacy data was destined for a significant error rate.”

The Biden administration wanted to use fear as a weapon to control public opinion of COVID-19.  The aligned ideological Twitter executives also wanted to assist using fear and fought to controversialize and target any voice who downplayed the fear of covid.  One of those pragmatic voices was President Trump.

President Trump sent out this Tweet in 2020 which was not well received by former FBI General Counsel, now Twitter General Counsel, Jim Baker:

Apparently, the phrase “don’t be afraid of Covid” was triggering for those who wanted fear and panic to be the prevalent perspective on the virus.

Twitter General Counsel Jim Baker asked the head of Twitter’s censorship group, Yoel Roth, why wasn’t this statement worthy of Donald Trump being removed for violating the Twitter Covid policy?

As you can see, Jim Baker wanted to censor the optimistic approach of President Trump in order to amplify the fearful and looming message.

The motive of Jim Baker, while undefined by Mr. Zweig, is transparent in hindsight.

The platform officials and the various officials in media, were promoting the fear and worry narrative as part of an election strategy to facilitate mail-in ballots.  COVID-19 was as much, perhaps even more of, an election manipulation tool as it was a virus.

In the rest of the outline Zweig focuses on the professionals who were targeted by the information control campaign. “Twitter made a decision, via the political leanings of senior staff, and govt pressure, that the public health authorities’ approach to the pandemic – prioritizing mitigation over other concerns – was “The Science” . . .
Information that challenged that view, such as showing harms of vaccines, or that could be perceived as downplaying the risks of Covid, especially to children, was subject to moderation, and even suppression. No matter whether such views were correct or adopted abroad.

The government, media and social media campaign to control information about COVID-19 was never about science or even the virus itself.  The COVID-19 information control operation was always about control over the public.  That campaign became political because the Biden campaign/administration, Democrats, media and the voices in control over social media weaponized it around their political beliefs.

The COVID-19 narrative becomes a tool to achieve a variety of objectives: debate controls; the deployed ‘excuse‘ for a very visible lack of voter enthusiasm for the puppet (Biden); the use of fraudulent ‘mail-in ballots’; the keeping of socially distant physical auditors, etc.  Without COVID as a tool the manufactured process is more difficult. The ‘never let a crisis go to waste‘ strategy includes the creation of a crisis.

The COVID-19 narrative held four primary benefits.  Without COVID weaponized we would not see:

  • (1) Mail-in ballots.  The origination material of the 2020 fraud.
  • (2) Breaking down of alliance-minded gathering and assemblies.  COVID blocked group gatherings to discuss what was around us and stopped us from recognizing the scale of our assembly.  COVID also took down faith-based leadership and church assembly when it was needed most.
  • (3) Spending packages that were really blue state bailouts justified under the auspices of COVID relief.
  • (4) Government providing the crisis solution (and all the ramifications therein).

.

Lastly, we know in hindsight; the 2016 presidential transition team carried a then unknown motive.  Who was it that recommended: Dan Coats (ODNI), Michael Atkinson (ICIG), James Mattis (DoD), Dana Boente (DOJ-NSD then FBI counsel).  Who was the one steering these placements from inside the transition team?

Who was in charge of the transition team and also in charge of the Trump COVID-19 task force?

Elon Musk Tinkering in The Background


Posted originally on the CTH on December 26, 2022 

The issues surrounding Jack’s Magic Coffee Shop are still very opaque and seemingly clouded; however, there does seem to be some clarity surfacing in the bigger picture operation of the social media platform.  Perhaps, just perhaps, we are starting to get a better understanding of how the public opinion control operation was being handled.

(Source Link)

Readers here are very familiar with our researched suspicions of how this interconnected technology system, this weird public-private partnership was being conducted. For quite it has been obvious the various systems to control discussion would need connectivity.

Perhaps Twitter 2.0 is starting to recognize the industrial operation was evolved into a weird system of interconnected networks, necessitated by the larger government need. Whatever the outcome, the basic elements all seem to be aligning in the direction we discussed long ago and, if accurate, the ramifications should soon surface.

With that in mind and accepting that I genuinely do not want to be correct in this because the solution is even more troubling, perhaps it’s worthwhile going back to the original metaphor and see if things continue to make sense.

April 2022 – The metaphorical Jack had a great idea, open a coffee shop where the beverages were free and use internal advertising as the income subsidy to operate the business.  Crowds came for the free coffee, comfy couches, fellowship, conversation and enjoyment.

It didn’t matter where Jack got the coffee, how he paid for it, or didn’t, or what product advertising the customers would be exposed to while there.  Few people thought about such things.  Curiously, it didn’t matter what size the crowd was; in the backroom of Jack’s Coffee Shop they were able to generate massive amounts of never-ending free coffee at extreme scales.

Over time, using the justification of parking lot capacity and township regulations, not everyone would be able to park and enter.  Guards were placed at the entrance to pre-screen customers. A debate began.

Alternative coffee shops opened around town.  It was entirely possible to duplicate Jacks Coffee Shop, yet no one could duplicate the business model for the free coffee.  Indeed, there was something very unique about Jack’s Coffee Shop.  Thus, some underlying suspicions were raised:

The only way Twitter, with 217 million users, could exist as a viable platform is if they had access to tech systems of incredible scale and performance, and those systems were essentially free or very cheap.  The only entity that could possibly provide that level of capacity and scale is the United States Government – combined with a bottomless bank account.  A public-private partnership.

If my hunch is correct, Elon Musk is poised to expose the well-kept secret that most social media platforms are operating on U.S. government tech infrastructure and indirect subsidy.  Let that sink in.

The U.S. technology system, the assembled massive system of connected databases and server networks, is the operating infrastructure that offsets the cost of Twitter to run their own servers and database.  The backbone of Twitter is the United States government.

FREE COFFEE:

♦ June 2013: […] “Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

♦ November 2013: […] “Twitter closed its first day of trading on Nov. 7, 2013, at $44.90 a share. In the years since then, it briefly traded above $70, but more recently, it has struggled.”

Jack’s free coffee shop has been for sale, but there’s no viable business model in the private sector.  No one has wanted to purchase Twitter – it is simply unsustainable; the data processing costs exceed the capacity of the platform to generate revenue – until now….

And suddenly, the people who work in the backroom of Jack’s Magic Coffee Shop don’t want Jack to sell.

Twitter is not making a decision to decline the generous offer by Elon Musk because of stewardship or fiduciary responsibility to shareholders.  The financials of Twitter as a non-viable business model highlight the issue of money being irrelevant.  Twitter does not and cannot make money.  Growing Twitter only means growing an expense. Growing Twitter does not grow revenue enough to offset the increase in expense.

There is only one way for Twitter to exist as a viable entity, people are now starting to realize this.

What matters to the people behind Twitter, the people who are subsidizing the ability of Twitter to exist, is control over the global conversation.

Control of the conversation is priceless to the people who provide the backbone for Twitter.

Once people realize who is subsidizing Twitter, everything changes.

That’s the fight. (more)

♦ 2021, Public-Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama network took pre-assembled intelligence weapons we should never have allowed to be created and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful.

It’s all Connected FolksSEE HERE

[…] “The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago.” … “It is difficult to underestimate the cloud contract’s importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it “one of the most important technology procurements in recent history,” with ramifications far outside the realm of technology.” (READ MORE)

One job…. “take the preexisting system and retool it so the weapons of government only targeted one side of the political continuum.”