February 1, 2018

Compiled by Lisa Phillips of

“Be afraid of Google.  Be very afraid of Google.  They can aim a direct energy weapon at the office building where you’re sitting” – Gordon Duff, Senior Editor of

This video is a primer on the topic of the out of control technocrats who seek to rule the world through the Internet of Things:

Eric Schmidt Global Tech Lord

Video published on January 31, 2018 courtesy of American Intelligence Media

Americans for Innovation reports:

Bill Clinton ordered the C.I.A., NSA & FBI to give intelligence secrets to select private companies on July 1, 1994 to achieve the globalists’ agenda

The U.S. counter-intelligence community became a secret army for the military-industrial complex

The Internet of Things is actually repackaged Nazi-style fascism and must  be dismantled

Downloadable PDF |

(Feb. 01, 2017)—Our regular readers know that Mark Zuckerberg did not create Facebook, and that Columbus innovator Leader Technologies’ social networking invention was stolen by Leader’s patent attorney James P. Chandler, III.

Chandler then formed the IBM Eclipse Foundation on Nov. 29, 2001 with a $40 million “donation” from IBM’s legal counsel David J. Kappos.

The larger question is why would the U.S. government so flagrantly abuse a real American inventor in violation of the Constitution?

Now we know.

Bill Clinton literally codified C.I.A. & NSA fascism in 1994

On Jul. 1, 1994, President Bill Clinton wrote “A National Security Strategy of Engagement and Enlargement.” Clinton actually authorized the C.I.A. and NSA to use their super-secret and illegal Echelon Program (started in 1947) to assist American private companies with whom he and Hillary were aligned in pay-to-play schemes.

Curiously, just weeks later Clinton permitted the Rwandan Genocide false flag as his excuse to seize rare earth mineral mines in Africa for his pay-to-play high tech partners. Congressional testimony later proved that C.I.A. teams on the ground monitored the slaughter of innocents in silence while NSA satellites video taped the faked tribal outrage from space. Eugenic depopulation of the region was a collateral benefit. These people are pure monsters.

Bill Clinton, Jul. 1, 1994, page 12: “Countering terrorism effectively requires close day-to-day coordination among Executive Branch agencies. The Departments of State, Justice and Defense, the FBI and CIA continue to cooperate closely…”

Deep State fascist overlords created The Internet of Things dragnet surveillance

They were given cute Boy King cut out brand names like Facebook, Google, Gmail, Instagram, YouTube, Flickr, Yahoo!, etc.

Clinton’s counter terrorism Executive Branch collaborators look uncannily similar to the nefarious actors being exposed in the current Russia probe, not to mention Benghazi, Server-gate, Fast & Furious, U.S. Digital Service Election Rigging, ISIS, Arab Spring, etc. State (Albright, Hillary, Rice, Christopher, Powell, Kerry), Justice (Chandler, Holder, Lynch, Mukasey, Ashcroft, Gonzales, Reno), Defense (Hayden, Gates, Panetta, Hagel, Carter, Cohen, Rumsfeld, Perry, Cheney), FBI (Mueller, Comey, Rosenstein, McCabe, Ohr, Strzok, Louis Freeh), CIA (Hayden, Clapper, Brennan).

These government officials, by providing intelligence data to selected private companies, committed treason by conspiring to promote modern day Fascism in America behind the smoke screen of incessant false flags and national security.

Bill Clinton, Jul. 1, 1994, p. 15: “Partnership with Business and Labor: Our economic strategy views the private sector as the engine of economic growth. It sees government’s role as a partner to the private sector – acting as an advocate of U.S. business interests; leveling the playing field . . . ”

You read this right. Clinton’s directive actually authorized fascism. He ordered his intelligence agencies to help selected private companies. This is outrageous, but who complained? Apparently no moral voices were around. Everyone who knew about the scam was benefiting and silent. That is why we have not learned about this until now. Whenever the power of the state rewards a selected few companies over others . . . open markets, competition, entrepreneurism, free enterprise, inventorship and accountability die.

Richard C. Walker was recruited as a Boy King cut out for globalist, Fascist technology companies planning global tyranny

These fascists recruited engineer Richard C. Walker to front for their grand plan.


The patent filings Walker began making in 1996 emphasized a well-known build vs. buy approach called “Commercial Off-the-Shelf Software” or C.O.T.S.

C.O.T.S. says buy commercial off-the-shelf technology whenever possible instead of build it. However, the devil is in this detail.

Our communications are quite literally ruled by fascist tyrants

Once the government picks a vendor, then that vendor becomes the de facto government supplier for life. Microsoft. Oracle. Cisco. AT&T. SAP. Apple. Motorola. Siemens. Lockheed. Boeing. Google. Etc. Power corrupts. Once the government agency implements that infrastructure, the argument, along with the bribes to grease the skids, says it is cost prohibitive to switch to a new vendor. Therefore, the natural evolution makes these decisions inherently corruptible. We quite literally, TODAY, live in a fascist American state where our communications infrastructure is ruled by tyrants. Period.

In short, C.O.T.S. is anti-competitive and unAmerican when promoted by the government for its own uses. President Trump is going to stop this.

RiCHARD Walker literally incorporated the super-secret C.I.A. Echelon Program in his claims

Walker made an astounding claim in his patent filings. He actually dictated that his global data collection scheme:

“. . . should be developed by the US government State Department, CIA and (echelon program). The programs should also run voice recognition and identification” and be “used by the FBI to detect stress and deception as well as panic and other emotions of excited human states.”

Fig. 2–Richard Walker, U.S. Patent No. 6,965,816, Col. 69, Lns. 52-55. Click here for a full table of Walker’s patent filings.

This is crazy. The government does not even acknowledge that the C.I.A. Echelon Program exists!

Monstrously, Walker also specifies that his C.I.A., NSA and FBI system includes the capability to remotely shock, sedate, “behavior supression,” poison, steal identities, stalk and drug citizens anywhere on the planet. He even identifies one of his public-private Canada-based suppliers named Descretes Systems Group.

Look at the extraordinary extent of products and applications covered:

U.S. Patent No. 6,965,816, Col. 3, Lns. 5-6 ('This requires hardware, software and wet-ware (people) - the procedures and protocols')
  • Save


Fig. 3–Richard C. Walker. (May 05, 2000). Fig. 6, p. 94, U.S. Pat. App. 60/200872, WO2000078057. Personal PFN Systems for Accountable Tracking Remote Management and Aggressive Control Scenarios. USPTO.

Read this Fig. 3 carefully. In the bottom left of the figure you’ll notice that Walker claims sole ownership over this entire system. He has put both government entities and private companies on notice that he will license it to them. How did an Agilent Technologies nerd acquire such power? Someone should ask him.

This patent claims that Walker (and his Kline & Walker LLC company) is the sole owner of The Internet of Things. While those exact words are not said, the breadth of Walker’s claims leave no doubt.

Fig. 4–Richard C. Walker. (Oct. 01, 2001). p. 6, U.S. Pat. App. 660/325,538, WO2003029922. PFN/TAC system FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation (incl. C.I.A. Echelon). USPTO.

This is completely outrageous and shows how 9/11 was almost certainly achieved.

Walker benevolently offers his system to help restore the public trust in air travel:

Fig. 5–Richard C. Walker. (Oct. 01, 2001). p. 6, U.S. Pat. App. 660/325,538, WO2003029922. PFN/TAC system FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation (incl. C.I.A. Echelon). USPTO.

The verbiage betrays an advanced insider’s knowledge of the event of 9/11.

C.I.A. whistleblower Susan Lindauer [VIDEO] says that the plan to crash planes into the World Trade Center was well known within the C.I.A. as early as April 15, 2001. It is highly suspicious that Richard Walker jumped on the 9/11 tragedy to promote his patent claims for The Internet of Things just days following the tragedy.

Walker fronts for rogue C.I.A. / NSA / FBI Deep State Fascists

Walker dictates how he will license The Internet of Things to third parties in the government and private industry. This is just surreal. No nerd engineer would ever have this kind of power, unless he was given it or told to do it by insiders. This circumstance, besides revealing likely racketeering, conspiracy, organized crime, and is a betrayal of due process for every honest inventor who honestly puts forward claims to the Patent Office.

Walker confirms his association with the illegal, rogue C.I.A. Echelon Program.

As written previously, Walker includes human beings inside his global censor dome as “wet-ware.”

The patent actually says that their plan is to identify, tag, track and control literally everything on the planet! They plan is to embed micro-electronic control devices, either surgically or by injection, in every human being on the planet. To them, it’s all about “management of the world’s resources” including you. Walker Patent No. 6,965,816 Col. 118, Lns. 53-54.

Unbelievably, you are just “wet-ware”

These documents show that their authors have a total disdain for humanity. These define people as “wet-ware.” In this world view, a human is merely a silicon chip surrounded by a membrane of carbon and water.

Bookmark: #wet-ware |

These are the people who are planning to take over the world.

Read for yourself:
Here are two lines captured from the actual patent:
U.S. Patent No. 6,965,816, Col. 3, Lns. 5-6 ('This requires hardware, software and wet-ware (people) - the procedures and protocols')
  • Save

“PFN” means Protected Primary Focal Node. “TRAC” means Trusted Remote Activity Controller.

The illustrations in Walker’s patent are truly dystopian (a community or society that is undesirable and/or frightening)—and they have been implemented! Their message is clear: “you can run but you cannot hide.” In this illustration, even the trees are watching you! Here is Figure 21 from Walker’s patent.

Bookmark: #blanket-surveillance |

Click image to enlarge

Richard Walker’s patent could not work without Leader Technologies’ social networking invention, so they stole it

Despite Walker’s insistence that everyone license from him, he has not licensed the invention of social networking from Leader Technologies. Instead, as this Walker patent reveals, they just stole it.

Indeed, Walker’s patent would not have worked on the large scale they describe without Leader social networking invention. We’ll show that below.

First, these patents to remotely control vehicles started being filed within two months of the passage of the Economic Espionage Act of 1996 (EEA) during Bill Clinton’s first term. The EEA was written by law professor James P. Chandler, III.

Robert Mueller, James Comey, Rod Rosenstein, Loretta Lynch, Eric Holder, Larry Summers were strategically positioned at the top of the Justice Department and Treasury. The patentee, Richard C. Walker, could have patented a ham sandwich had this group wanted it.

Second, the evident intent of the Walker patent was to illustrate the technology planned for control of everything—The Internet of Things.

Third, Robert S. Mueller’s law firm, Wilmer Hale LLP, formerly Hale & Dorr LLP, drove Walker’s filings. Mueller was sworn in as FBI director just seven days before 9/11. This clearly implicates Wilmer Hale in the treachery.

Fourth, the global data sharing platform described in the patent was not doable by the likes of IBM, Microsoft, Boeing, AT&T and Cisco. They were all behind the curve from an R&D perspective when the Internet emerged. For example, Bill Gates thought it was a fad. The telephone pager network that Walker described could not scale to the volumes required for such global communication.

Bookmark: #who-is-richard-c-walker |

Who is Richard C. Walker?
a.k.a. “Rick Walker”

Fig. 8–Richard C. Walker, Hewlett-Packard, Kline & Walker, LLC, Agilent Technologies, client of Wilmer Hall LLP (formerly Hale & Dorr LLP).

Did he really invent all these patents?

Walker is a geek scientist who has worked inside the bowels of Hewlett-Packard and Agilent Technologies his entire career.

We do not believe that Walker is the sole inventor. The sheer breadth of global policy perspectives incorporated in these documents shows a collective policy mind.

Our hunch is that they are derived from the illegal Highlands Group that has been secretly convened since late 1994 by the Department of Defense to begin coordinating the Deep State takeover of the Internet.

According to Walker’s resume, he was a Principal Staff Scientist at Hewlett-Packard (HP) for twenty-one (21) years from Jan. 1981 to 2002. Since 2002 he has been a Senior R&D Electrical Engineer at Agilent Technologies, for whom he continues to file patents.

Walker has consistently failed to disclose his Kline & Walker, LLC company that claims ownership of this 170-page total global surveillance “Internet of Things” patent . . . even though he assigned the patent to Kline & Walker, LLC (a defunct company) on Nov. 15, 2005

Bookmark: #hp-agilent-complicity |

Agilent Technologies is evidently a Deep State surveillance supplier

Walker’s current employer, Agilient Technologies, was a spin off of HP that went public on Nov. 18, 1999. That was only a week after Bill Clinton and his Treasury Secretary Larry Summers abolished Glass-Steagall. Summer’s chief of staff then was Sheryl K. Sandberg, the subsequent creator of Gmail (2004) and the current chief operating officer of Facebook (2008 to current). Another Summers employee then was Marne L. Levine. Levine who married disgraced C.I.A. director John M. Deutch’s son, and is now chief operating officer at Instagram. Deutch was pardoned by Bill Clinton on the same day as Marc Rich. It’s truly a cozy little world at the top of the criminal Internet of Things.

Agilent raised $2.1 billion and was the largest Silicon Valley public offering ever at that time. The usual globalist shadow government suspects were the Agilent underwriters: Goldman Sachs, Morgan Stanley, Credit Suisse, JPMorgan, etc. The insider trading is evident.

To put the Agilent Technologies / HP actions in context, on Jul. 14, 1999, President Bill Clinton formed the National Intellectual Property Assurance Council (NIAC) by Executive Order #13130 with James P. Chandler, III.

A few months later on Sep. 29, 1999, President Bill Clinton formed In-Q-Tel to run a rogue C.I.A. private venture capital company in Silicon Valley.

A few weeks later on Nov. 12, 1999, Bill Clinton and Larry Summers, Clinton’s Treasury Secretary and Chandler’s Harvard colleague, abolished Glass–Steagall market protections separating underwriting and banking.

Evidently, Agilent Technologies and HP are key suppliers to the Internet of Things.

HP & Agilent are Complicit

Here is a complete U.S. Patent Office list of the patents attributed to Richard C. Walker as the inventor. Eleven (11) are assigned to Hewlett-Packard and fourteen (14) are assigned to Agilent Technologies, Inc.

These patents are very evidently refinements of Walker’s “control everything” patent. They are full of euphamisms (deceptions) to obscure the true censorship purpose.

Bookmark: #walker-can-crash-planes-remotely |

This system can crash planes & vehicles remotely

Click image to enlarge

Fig. 9–U.S. Patent No. 6,965,816, Fig. 1.

How Hillary Crashes Cars and Planes

Video published on January 6, 2018 courtesy of American Intelligence Media

Just when you thought you knew all the dirt about Hillary Clinton, Mitt Romney, James A. Baker, James P. Chandler, Robert Mueller, the Bushes, and the corrupt patent system in America, Betsy and Thomas shine a light on a very special patent that has Hillary’s name all over it. It is the QRS-11 and it is a powerful device placed in all moving vehicles, planes, cars, busses, trains, missiles, satellites. You will want to listen to this conversation so that you can know what dangers are being hidden from you, the American citizen, by these corruptocrats in D.C. Articles mentioned in the discussion include:……… We put out a daily TRUTH NEWS HEADLINES each day. To get your free copy and to stay engaged and informed subscribe at

This system was planned to control the global economy in Nazi-Fascist Style

“Socio-Economic and Environmental Technology Accounting System for Democratic Government”

This appears like a Soviet-style central government system.

Click image to enlarge
Fig. 10–U.S. Patent No. 6,965,816, re. Fig. 40 (“World Organization”). Incorporated by reference in multiple Walker applications, including U.S. Pat. App. No. 10/401,041, Fig. 2B, Automated Accounting System That Values Controls Records and Bills The Uses of Equipment Vehicles For Society.

Bookmark: #internet-of-things |

Memo to Wet-ware: The Internet of Things is a Fascist plan to control everything  in your life and your family’s life

Click image to enlarge
Fig. 11–Boston and London Internet of Things pitchman Beecham Research has produced this cute little pastel illustration of the demonic takeover.

Bookmark: #trump-fund-leader-miller-act-notice |

Can this Fascist takeover be stopped? Yes, but we must start removing the spying tools immediately

Defund these criminals—their corruptly-acquired power must be removed.

Stop the criminals who are responsible for this, which means we need to lock up Hillary and the others truly responsible.

Ask President Trump to pay Leader Technologies’ Miller Act Notice. This generates hundreds of billions of dollars in new revenue for the federal government without raising taxes, among the many benefits. It will also help to start developing a true Free Press envisioned by the Founders and now lost to the globalists.

See also previous post: AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All [VIDEO]. Americans for Innovation.

* * *

Notices: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Photos used are for educational purposes only and were obtained from public sources. No claims whatsoever are made to any photo.



Examples of Direct Energy Weapons (DEW) harming American citizens for the NWO/JWO’s agenda:

How and Why CA Fires Were DEW Created

Dr. Judy Wood: Where did the towers Go ? 9/11 Truth

Dr. Joseph Farrell on Hidden Finance, 9/11 and the Nazi International

See also:  New bill could kick road safety tech to the curb – from March 2015

See also:  Abel Danger: Serco Martec Fraud On Lloyd’s, Scaramucci’s Super cat SALT  NWO Clinton insider Carly Fiorina, the former CEO of Hewlett Packard, Inc. set up the back door channel to the US Navy and US Marine Corps intranet, which allowed and facilitated the remote controlled collision of a Philippine cargo ship and the USS Fitzgerald, a guided missile destroyer, on June 17, 2017.


Regulator opposes idea of U.S. government anti-spying 5G network – FCC

How the NWO/JWO will implement this plan and take American dissidents into custody, or just kill us:

Keep in mind, a survey of the US Military was conducted a few years ago.  A staggering 25% of the enlisted members of the US Armed Forces stated they would fire on American citizens on American soil.

The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program

RISE OF THE MACHINE “JADE” is an A.I. quantum computing technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being collected on the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global Information Grid for Network Centric Warfare environments.

The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle plans and and devise ‘new and better’ strategies to increase the ‘kill chain’. The II generation of JADE has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations to this system. In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.

Video (mirrored) published on January 8, 2018 courtesy of Level9News

US Government to Authorize Drone Strikes on US Soil?

How Do Militaries Use Social Media?

They have our Tax Money Already to Implement our Demise:

NSA Doles Out Massive $112 Billion In High-Tech Contracts Over Last Two Years

The Missing Money adds up to More than the National Debt!

And if you’re waiting for President Trump to save you:

Trump Signs Law Allowing Mass Spying on Citizens

The ICING on the Cake:

Operation Talpiot is the back door data pipeline from the NSA to Israel. Everything you communicate electronically is stored and analyzed by Israel.

Check out Israel Greatest Spy Machine of All Time blog by Brendon O’Connell exposing Operation Talpiot


SOLUTION:  Fight Back at the LOCAL LEVEL

Please refer to the InPower Group which illustrates a powerful new method to restore social justice and accountability, and how we can prevent and reverse the installation of this dangerous technology, through holding corporate executives and government actors financially accountable — for the first time ever. And in so doing, we can restore safety in our homes, and bring balance to our world.

How to find patriots in your local area:  Awakening the Warrior Spirit: Do you hear the Call? How to Connect with Local Patriots



1 Comment

Leave a Reply

Your email address will not be published.