LifeLog was a project of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency (DARPA) of the U.S. Department of Defense (DOD). According to its bid solicitation pamphlet, it was to be “an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities”. The objective of the LifeLog concept was “to be able to trace the ‘threads’ of an individual’s life in terms of events, states, and relationships”, and it has the ability to “take in all of a subject’s experience, from phone numbers dialed and e-mail messages viewed to every breath taken, step made and place gone”.
LifeLog aimed to compile a massive electronic database of every activity and relationship a person engages in. This was to include credit card purchases, web sites visited, the content of telephone calls and e-mails sent and received, scans of faxes and postal mail sent and received, instant messages sent and received, books and magazines read, television and radio selections, physical location recorded via wearable GPS sensors, biomedical data captured through wearable sensors. The high level goal of this data logging was to identify “preferences, plans, goals, and other markers of intentionality”. (Wikipedia)
Interestingly, the LifeLog project was terminated at approximately the same time that Facebook was founded. Coincidence? Sean Parker, Facebook’s first president, was recruited by the CIA in 2004 before heading the tech company. Shortly after, the CIA began investing in venture capital firm In-Q-Tel, which helped mine the user data of millions. As this information begins to surface, top executives are leaving Facebook. Now, Facebook is under investigation for potential privacy breaches. But wait, there’s much more to the story… (Infowars)
(American Intelligence Media) Here is the rest of the story that the main stream, propaganda, corrupt media has chosen to ignore for several years. Michael McKibben literally built the social media platform upon which we operate most of our digital systems. He designed it to be unlimited, scalable and fierce. He designed it for times like these when we “need all she’s got, Scotty.”
Let’s show this amazing entrepreneur, who has been forgotten, robbed and marginalized by the swamp creatures of the cabal, what we can do in the alt media space to tell his story, using the very technology that was stolen from him and his shareholders, to be ONE BIG VOICE OF RIGHTEOUS INDIGNATION.
Michael McKibben reminds us of another Scottish engineer – Scotty of Star Trek. The fictional character was in charge of the Enterprise engines, taking us “boldly where no man has gone before.” And now we have another Scotsman whose engine was built for travel in the digital realm, ready for this time and this space, to take us into higher realms of freedom and consciousness.
One of the largest government sponsored industrial espionage thefts of copyrights, trade secrets, and patents in modern times was the theft of scalable social networking inventions. The technology and programming code that underlie Facebook, Gmail, YouTube, Twitter, Instagram and most the other large-scale social networking companies runs on Leader Technologies’ intellectual property.
It was stolen by a group of criminal lawyers, judges, spies and bankers working with complete impunity and in total disregard for the law. Under the guise of the IBM Eclipse Foundation, James P. Chandler III (who was a national security advisor and top White House attorney) led the group of criminals who, interestingly enough, are also appearing in the news currently due to their most recently discovered crimes, along with John Podesta, Robert Mueller, Rod Rosenstein, John Breyer, James Breyer, Larry Summers, Yuri Milner, Alisher Usmanov, Mark Zuckerberg, Sheryl Sandberg, Bill and Hillary Clinton, and a host of others who are not so well known.
Usually, we see them stealing oil, gold, uranium and other resources, but this time they stole the very software code that is utilized by the largest tech companies in America, Europe, Russia, China, South America, and anywhere else they could market it – making trillions of dollars in the process.
They carved up the globe and the markets in each region, giving each criminal a piece of the market using Leader Technologies’ stolen trade secrets. Eric Schmidt took America and Europe, Chandler got South America, Summers and his side-kick, Sheryl Sandberg, joined Schmidt in taking America. Yuri Milner, Alisher Usmanov and Summers got Russia; the Breyers got China, and a host of fake tech-lords became the front-men for all of the various social networks we see cropping up everywhere – the richest companies in the world – Google, Facebook, Amazon. The criminals got filthy rich off the back of a hard-working, creative American entrepreneur – Michael McKibben.
What did Leader Technologies get? Years of lies, deceit, legal maneuvering, patent tricks, industrial espionage, betrayal, governmental manipulation, frauds on the courts, and a $10 million dollar legal bill – as well as seven lawsuits brought against Leader Technologies itself as an attempt to bankrupt them.
Listen to Michael McKibben, the founder and lead inventor of Leader Technologies and the person responsible for the biggest explosion of Internet technology in history, explain his story to citizen journalist and author, Douglas Gabriel.
WEAPONIZING SOCIAL MEDIA
Patent theft is accomplished through the Patent Trial and Appeals Board and the many laws that allow the US Patent and Trademark Office to confiscate and control any patent deemed a national security issue. Once confiscated, the inventor is not compensated for the out-right theft of the patent. Stiff penalties, including incarceration, accompany these seemingly “illegal” patent laws that can steal any patent that the military (Department of Defense) or cyber-intelligence (all 17 agencies) considers a patent that could be turned into a weapon.
Once stolen, the government uses a complex group of public, and secret, defense agencies, corporate contractors, and crooked bankers to fund the weaponization of trade secrets, patents, copyrights and other forms of intellectual property. Usually, the government builds in a “back-door” to the technology–so that they can control and manipulate the weaponized property. Then, they fund a “front-man” as a stooge to run a private corporation that is built on the weaponized invention.
The dummy company gets tens of millions of dollars in initial investments. Its underwriters then inflate valuations that turn into billions when the fake private corporation later hits the stock market. These fake front-men, pseudo-military corporations, stolen patents, and corrupt defense contractors then magically become the largest corporations in the world – Google (NSA), Facebook (NSA and CIA programs), Amazon (NSA and CIA) and on and on down the line of the huge tech corporations that are consuming everything around them in league with the ill-intent of the military and intelligence agencies.
Leader Technologies’ inventions fueled dozens of the largest corporations in the world. It was out-right industrial espionage at the highest governmental levels that led to the theft of Leader’s trade secrets, copyrights, and patents.
What is quite shocking is the list of exactly who is behind this blatant patent fraud, theft, and “legal” confiscation.
One man was principally responsible for not only conducting personal industrial espionage for his own gain, but also wrote patent laws, acts of Congress, and executive orders that are the framework for the “legal” theft of America’s inventions as well as the illegal surveillance of Americans.
JAMES P. CHANDLER III WAS ONE OF THE KEY LEADERS OF THE TECH-CARTEL THAT HAS GROWN INTO A COMPLETELY CORRUPT SYSTEM OF THEFT, EXTORTION, AND FRAUD ON A GLOBAL SCALE.
Michael McKibben has been in personal business dealings, and later, legal dealings with the core of this evil tech-cartel. He has fought them for 17 years and spent countless hours in depositions, courts, appeals and has even taken his case to the U.S. Supreme Court. He is still at the cutting edge of the continuing lawsuits against Facebook.
No one has seen the underbelly of the tech-lords real nature like Michael and his legion of ticked off shareholders. This battle again has arisen in the press due to another Supreme Court case that will be considered soon.
THE BATTLE RAGES ON AS AMERICAN INVENTORS CONTINUE TO BE OUT-MANEUVERED BY THE CROOKED SYSTEM BASED ON FAKE NATIONAL SECURITY ISSUES THAT ARE A FRONT FOR CRONY CORPORATE IMPERIALISM.
Starting in about 1993, IBM met with this budding tech-cartel as they considered what to do about IBM wanting to sell computers to the .I.A. and use them in foreign countries. Podesta, Summers, Chandler, Clinton, Mueller, Rosenstein, and the other “governmental officials” told IBM to embed a back-door encryption key into all computer hardware, software and firmware sent outside of America. This happened after Congress refused to approve such a key.
As a result, the tech-cartel demonstrated their complete control of Congress over all technology produced by the military’s Defense Advanced Research Program (DARPA) and the CIA’s version called In-Q-Tel. Both DARPA and In-Q-Tel are directed in their research and policy by the Highlands Forum–a secret think-tank that has essentially created our modern technological world of war toys. In the process of investigating the legal corruption in their legal cases, Michael McKibben and his shareholders studied all of these groups and their inner workings quite thoroughly.
ZUCKERBERG’S THEFT OF SOCIAL MEDIA
Many people are aware that Mark Zuckerberg has had to settle out of court again and again over his theft of the social network that he called “Facebook”. What they don’t know, perhaps, is that Zuckerberg was one of the fake tech-lords who got his invention from James Chandler’s and Larry Summers’ efforts to apply the technology they stole from Leader and was being disseminated through the IBM Eclipse Foundation.
Zuckerberg is obviously a fake who admits that he “doesn’t write code anymore.” The supposed greatest “code writer” of our time isn’t interested in writing code now and appears to know little about the many hundreds of thousands of code lines used to create Facebook. Zuckerberg is obviously a front-man, and not a very good one.
The confused stories he tells about Facebook can be made sense of when they are told by the true inventor who did write the code for the greatest software advancement of our time. Listening to Michael McKibben explain the source code reveals, just in his words, that he is the true inventor.
The big infusion of cash that sent Mark Zuckerberg and his fledgling college enterprise on their way came from Accel Partners, in 2004.
Jim Breyer, head of Accel, attached a $13 million rocket to Facebook, and nothing has ever been the same. Earlier that same year, a man named Gilman Louie joined the board of the National Venture Capital Association of America (NVCA). The chairman of NVCA? Jim Breyer. Gilman Louie happened to be the first CEO of the important CIA start-up, In-Q-Tel.
In-Q-Tel was founded in 1999, with the express purpose of funding companies that could develop technology the CIA would use to “gather data.” That’s not the only connection between Jim Breyer and the CIA’s man, Gilman Louie. In 2004, Louie went to work for BBN Technologies, headed up by Breyer. Dr. Anita Jones also joined BBN at that time. Jones had worked for In-Q-Tel and was an adviser to DARPA, the Pentagon’s technology department that helped develop the Internet.
With these CIA/Darpa connections, it’s no surprise that Jim Breyer’s jackpot investment in Facebook is not part of the popular mythology of Mark Zuckerberg. Better to omit it. Who could fail to realize that Facebook, with its endless stream of personal data, and its tracking capability, is an ideal CIA asset?
From the time Mark Zuckerberg was a child and attended the summer camp for “exceptional children,” CTY (Center for Talented Youth), run by Johns Hopkins University, he, like other CTY students, Sergey Brin (co-founder of Google), and Lady Gaga, have been easy to track. CTY and similar camps filter applications and pick the best and brightest for their accelerated learning programs. Tracing the later progress of these children in school and life would be a standard operation for agencies like the CIA.
MILITARY CYBER WARFIGHTING
When Michael McKibben and his software engineers created their quantum leap in technology to almost infinite scalability with their social networking invention, they planned to implement a moral system that respected personal property and privacy and envisioned a new “age of freedom of information.” While Leader Technologies assumed that the government might want to use their invention, they had no way of knowing that the government intended to use it for the exact opposite moral purposes: to take away the user’s freedom and surveil everything in their lives.
Michael was trying to advance the industry and certainly would have never believed that his own government might become his enemy as he resisted the whole-sale theft and weaponization of his inventions. How could Leader Technologies know that the most-respected patent attorney in America was also the most corrupt?
Who could have predicted that the NSA, CIA, FBI and other intelligence agencies would come to control the Internet, social networks, and every communication and broadcast in America – in contra-distinction to US laws and civil liberties. To witness the twisted uses of Leader’s original idea must have been maddening.
What is a beautiful idea when implemented as originally designed, it would be a tool of higher human development.
However, thanks to a thieving government, it was turned into a dark web of pornography, gambling, haters, and total military surveillance. The Internet that we once thought to be a harmless digital tool for greater communications became, in the end, the global network of control of industry, commerce, education, and our personal lives. Most American’s lives would change drastically without the social network scalability invented by Leader Technologies.
UN-WEAPONIZE THE INTERNET
Leader Technologies’ Michael McKibben has a solution to the problem of the US military and intelligence agency’s control of the cyber-warfare experiment called the Internet. The Department of Defense created the Internet which was originally called ARPANET, after the Department of Defense agency called DARPA. These groups have incubated and funded the principle components of the Internet, from the cables it runs on, to the routers every communication runs through, to the micro-processors inside every computer, to the software that makes it work.
All areas of our modern Internet-life were created for military purposes – not to create a system of world-wide free information as Leader Technologies first envisioned. The tech-lords’ monopolies can easily be turned off through one of two plans that the shareholders of Leader Technology have devised. Both plans end the control of the Internet by governmental military and intelligence agencies. Both plans are a win-win scenario for every American. Both plans help bring America back to a lawful society where the innovations and inventions of Americans are treated with respect and not usurped for military weaponization.
The social networking systems that have arisen from Leader’s inventions were meant to expand human freedoms, not suppress them. Only through a complete revamping of the system, and the removal of all government spying and control of information, can we end the drive to centralize all information access via Google, AT&T, Verizon, Amazon, Apple, Yahoo, etc., through communication via Gmail, Instagram, etc., and through social networking via Facebook, Snapchat, and many other companies.
The Internet must be freed from corruption, surveillance, and a contrived monopoly of information that rules our lives and imprisons information instead of freeing it.
REAL RUSSIAN MEDDLING IN THE ELECTION
Eric Schimdt and Mark Zuckerberg used Google and Facebook to manipulate users during the 2008 and 2016 presidential elections. The Facebook “Template to Win” was written by a Russian. This program was used by Obama in the 2008 election to win and during the 2016 election, Obama set up a political war-room that utilized the Template to Win officially under the egis of the US Digital Service – a service used by Democrats against Republicans.
Schmidt has been so bold as to brag about his billion dollar efforts to get Obama and Hillary into the White House by writing new algorithms that direct users to rigged sites and ads that support his candidates. Zuckerberg has tried to hide his crimes by lying about Russian ads and hiding his Template to Win, but the head of the Global Engagement Center has told the press that he used Facebook to target and attack US citizens throughout the election.
Zuckerberg now must answer to why Yuri Milner and other Russians own large amounts of Facebook shares. Mark also needs to answer why his best friend and investor ($200 million), the Russian Yuri Milner now lives in Silicon Valley and buys political and corporate support like it is popcorn. The tech-lord corruption is out of control and the US government is complicit.
How the NSA & FBI made Facebook the perfect mass surveillance tool
The National Security Agency and the FBI teamed up in October 2010 to develop techniques for turning Facebook into a surveillance tool. Documents released alongside security journalist Glenn Greenwald’s new book, “No Place To Hide,” reveal the NSA and FBI partnership, in which the two agencies developed techniques for exploiting Facebook chats, capturing private photos, collecting IP addresses, and gathering private profile data. According to the slides below, the agencies’ goal for such collection was to capture “a very rich source of information on targets,” including “personal details, ‘pattern of life,’ connections to associates, [and] media.”
NSA documents make painfully clear how the agencies collected information “by exploiting inherent weaknesses in Facebook’s security model” through its use of the popular Akamai content delivery network. The NSA describes its methods as “assumed authentication,” and “security through obscurity.”
The slide below shows how the NSA and U.K. spy agency GCHQ also worked together to “obtain profile and album images.”
Two months ago, following a series of Facebook-related NSA spying leaks, Facebook chief Mark Zuckerberg stated in a blog post that he’s “confused and frustrated by the repeated reports of the behavior of the U.S. government.”
According to a report by The Intercept, the above slides do not reveal the NSA’s Facebook surveillance program in full. The report states that the NSA also “disguises itself as a fake Facebook server” to perform “man-in-the-middle” and “man-on-the-side” attacks and spread malware [below].
As we wrote at the time, the “NSA’s Facebook targeting is reportedly a response to the declining success of other malware injection techniques. Previous techniques included the use of “spam emails that trick targets into clicking a malicious link.”
Following the report, released in March, Zuckerberg said, “When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.”
Zuckerberg claimed he disapproved of the NSA’s actions and said that he’s spoken to president Barack Obama by phone to “express [his] frustration over the damage the government is creating for all of our future.”
IMPORTANT MESSAGE FROM THE AMERICAN INTELLIGENCE MEDIA
Please feel free to upload these videos to your own YouTube site and present them to your audience. Please fan out these videos to citizens world wide, unfettered, scalable, and free just as Michael invented the platform for social media.
LET THIS TRUTH RIDE UPON THE VERY STRUCTURE THAT MICHAEL MCKIBBEN CREATED SO WE CAN TAKE DOWN THE EVIL GLOBAL CABAL AND BRING HUMANITY INTO ITS NEXT STAGE OF CONSCIOUSNESS.
ONE THAT MICHAEL ENVISIONED FROM THE BEGINNING OF HIS CREATION.
ONE THAT IS UNFETTERED, UNCENSORED, AND FREE.
You can also create your own videos and use relevant interview frames. Make your videos and messaging much better than we did and make sure you send us your final project so that we can share with all AIM4Truthers. .
Key links and resources:
530 page resource document that supports the article and video testimony above. If you don’t believe what you heard in this oral testimony, then read this amazing document:
For those interested in the backstory of Star Wars and Indiana Jones as discussed in the third video, please see: