LOL. That's proof right there.
I put a link to this on Truth Social. Otherwise, no. ...I don't really post on other sites, to be honest. If you (or anyone else) want to re-post this elsewhere, feel free. No attribution required. Just get the word out!
May I ask: what particular observations have you made that cause you to suspect this?
By golly, you have a point. A REALLY GOOD POINT.
Thank you, sir! You are too kind.
(And I promise I'm not an insider.)
I know it's sort of a long train of thought, and therefore taxing. I appreciate you reading all of this. Please get the word out.
BTW -
In my original email to Mary, I mention that all of the packets traversing the Internet are stored by the NSA, and can be accessed later. This is the main storage facility, for those of you that don't know: https://en.wikipedia.org/wiki/Utah_Data_Center
At Camp Williams.
To make it easier for people, this is the context of the image from the daily thread:
--
Don't know if you guys remember this, as it was 5 months ago. But, I posted this email that I had sent to Mary Fanning:
"Mary, I recently sent you a brief outline “connecting the dots” interspersed between Hammer and Scorecard and Italy-Did-It. I write to you here on a different aspect of the Hammer and Scorecard topic.
First off – thank you for bringing the Whistleblower Tapes to the American public. I have listened to each of them multiple times. And I noticed some unconnected dots that I thought I’d connect for you.
You may recall from The Tapes that at one point Arpaio and Blixseth refer to Obama’s birth certificate. And they say – without justification – that the birth certificate issue and The Hammer issue are “sort of the same thing.” But they don’t say how they are connected and what makes them the same. Given how they characterized The Hammer, I don’t think they actually understood how they are connected.
The Hammer locates a “target” server’s private asymmetric encryption key – in part, through brute computational force. It uses computational power to exhaust the solution space until it finds the sought-after key. I could explain – slowly and understandably – what that means, should it interest you, but the bottom line is this: possession of a “target server’s” private asymmetric key permits the possessor to eavesdrop on all thought-to-be-secure communications with that target server. If you have Bank of America’s private asymmetric key, you can decrypt all communication to and from Bank of America. If you have the private asymmetric key used by the email server at NYU, you can decrypt all communication to and from that server. And so on.
Consider this: the NSA stores all of the IP packets ever communicated via our domestic Internet infrastructure. So, if it is interested in a particular communication session, it can retrieve the packets constituting that communication session, send them – in proper sequence and on a one-by-one basis – to The Hammer, which will decrypt the contents of each packet, and then the whole communication session can be eavesdropped upon.
So, Mary, want to know what this has to do with Obama’s birth certificate? Here’s what. You use the Hammer to find the private asymmetric encryption key for the servers operating the Department of Health for Hawaii. Then you use the NSA’s capabilities to “replay” the communication session by which one of its system administrators logged into the server. The outcome? You literally see the system administrator’s login credentials – i.e., his or her username and password. So you just use that to login, and then issue Obama a birth certificate.
You’re not really “hacking” anything in the traditional sense. You’re just watching the administrators login, and then using their credentials. That’s how they exfiltrated all of that Bank of America data that is referred to in The Tapes. That’s how they compromised the Florida voting database that they mentioned in The Tapes. They can repeat that exploit on any target system, as long as it is in the USA.
The word needs to get out. And to do that, it requires someone who can explain in – simple terms – what the Hammer really is, and what the consequences of it falling into the wrong hands really is. I’m here to help, should that be of interest.
My sincere admiration, gratitude and regards, -Simon"
You can find that here: https://greatawakening.win/p/16aT3ByqiD/my-recent-communication-with-mar/
Well, I noticed that Dennis Montgomery recently updated his website. Check this out: https://greatawakening.win/p/16c2427ICS/
Looks like I was right.
Over and out.
For those that don't know what the Whistleblower Tapes are, they can be found here: https://soundcloud.com/david-broyles-327307388
There are five of them, and they date back to the Obama era.
Thank you. I was just going to clear that up. I had no idea this would be stickied, and thereby cause confusion.
There is more. www.dennismontgomery.com
Scroll down the front page.
A few people have asked for the link to Dennis' website.
www.dennismontgomery.com -- scroll down the first page to find this text (and more).
www.dennismontgomery.com
Scroll down the page to see this text and more.
www.dennismontgomery.com
Scroll down the page to see this text and more.
Don't know if you guys remember this, as it was 5 months ago. But, I posted this email that I had sent to Mary Fanning:
"Mary, I recently sent you a brief outline “connecting the dots” interspersed between Hammer and Scorecard and Italy-Did-It. I write to you here on a different aspect of the Hammer and Scorecard topic.
First off – thank you for bringing the Whistleblower Tapes to the American public. I have listened to each of them multiple times. And I noticed some unconnected dots that I thought I’d connect for you.
You may recall from The Tapes that at one point Arpaio and Blixseth refer to Obama’s birth certificate. And they say – without justification – that the birth certificate issue and The Hammer issue are “sort of the same thing.” But they don’t say how they are connected and what makes them the same. Given how they characterized The Hammer, I don’t think they actually understood how they are connected.
The Hammer locates a “target” server’s private asymmetric encryption key – in part, through brute computational force. It uses computational power to exhaust the solution space until it finds the sought-after key. I could explain – slowly and understandably – what that means, should it interest you, but the bottom line is this: possession of a “target server’s” private asymmetric key permits the possessor to eavesdrop on all thought-to-be-secure communications with that target server. If you have Bank of America’s private asymmetric key, you can decrypt all communication to and from Bank of America. If you have the private asymmetric key used by the email server at NYU, you can decrypt all communication to and from that server. And so on.
Consider this: the NSA stores all of the IP packets ever communicated via our domestic Internet infrastructure. So, if it is interested in a particular communication session, it can retrieve the packets constituting that communication session, send them – in proper sequence and on a one-by-one basis – to The Hammer, which will decrypt the contents of each packet, and then the whole communication session can be eavesdropped upon.
So, Mary, want to know what this has to do with Obama’s birth certificate? Here’s what. You use the Hammer to find the private asymmetric encryption key for the servers operating the Department of Health for Hawaii. Then you use the NSA’s capabilities to “replay” the communication session by which one of its system administrators logged into the server. The outcome? You literally see the system administrator’s login credentials – i.e., his or her username and password. So you just use that to login, and then issue Obama a birth certificate.
You’re not really “hacking” anything in the traditional sense. You’re just watching the administrators login, and then using their credentials. That’s how they exfiltrated all of that Bank of America data that is referred to in The Tapes. That’s how they compromised the Florida voting database that they mentioned in The Tapes. They can repeat that exploit on any target system, as long as it is in the USA.
The word needs to get out. And to do that, it requires someone who can explain in – simple terms – what the Hammer really is, and what the consequences of it falling into the wrong hands really is. I’m here to help, should that be of interest.
My sincere admiration, gratitude and regards, -Simon"
You can find that here: https://greatawakening.win/p/16aT3ByqiD/my-recent-communication-with-mar/
Well, I noticed that Dennis Montgomery recently updated his website. Check this out: https://greatawakening.win/p/16c2427ICS/
Looks like I was right.
Over and out.
I have not seen a transcript of Mr. Archer's testimony. That said, I suspect his attorneys advised him thusly: (1) it is perilous to provide testimony that can be demonstrated to be false; and (2) it behooves you to remain in "good standing" with the man who can pardon you.
That said, I suspect Mr. Archer provided testimony concerning the existence of the phone calls because his attorneys believed that the committee either already had phone records showing their existence, or would soon get those records. Denying their existence would open him up to perjury charges, at the very least. The question is: did Mr. Archer provide testimony concerning any topic he didn't believe the committee to already know by virtue of records? I suspect he did not, but I hope I'm wrong.
In my mind's eye -- however unrealistic it may appear to be -- I see both of them progressing through their respective party's processes. Draining their respective party's resources, and using said resources to their own ends to build their own followings. And... then... jilting their respective parties and joining forces as Independents. Which, at that point, would change politics in the U.S. as we know it. ...Let's make that happen.
Trump and Kennedy on a ticket together would sweep the nation in a way we've never seen.
Could we collectively be that fortunate?
Save America.
I'm not certain it is, this time around. In the past, it was, though. So it may be again.
I'm not sure the two tweets are related. The dates are quite separated.
Elon has tweeted "." in the past. And when he did, it was in reference to E -- i.e., The Errant Friend. A dot is Morse Code for E.
Not sure if that is the reference now. But I thought I'd add it to the conversation.
I hasten to point out that when I eat, I eat whatever I want and as much of it as I want. So, I might have some chicken wings right at 6:30 as an appetizer, and then a couple of hours later have a 5 egg omelette with peppers in it, with a pound of bacon, wash that down with, say, 8-9 light beers, and then have a pack of cookies later that night. So I'm eating. I'm just eating all within a 4 hour period.
Hi Bubble...
I take the turmeric/curcumin in pill form with water, three times per day, 2 pills at a time.
For about 20 years now, I have done all of my eating in the time period between typically 6:30-10:30 pm. No calories outside of that. Diet coke, water, black coffee only, outside of that. Plus, I lift (mainly) and do a little cardio. <-- these habits alone put me in a place where I looked "pretty good" for a middle aged man, and within striking distance of looking quite fit, if only I'd buckle down and lose that last 5-10 pounds around my waste. Which of course is the hardest part. But turmeric did it for me without me even trying. Give it a go.
Absolutely. Do it.
Thank you!