Quantcast

Interesting Political Attendee Offered Invitation to Elitist Sun Valley Summit of Billionaire Tech and Media Moguls

The elite annual invite-only conference in Sun Valley, Idaho is thrown by investment bank Allen & Company. The SV21 conference brings together the like-minded ideologues who narrate the world events they shape for domestic and international audiences.

Big Tech owners, operators and executives rub shoulders with those who control the content of media and the massive investment bankers who finance them. All these billionaires with an estimated wealth beyond half a trillion dollars gather together and outline their collective agenda. It is a very private affair.

This year, according to Variety and The Daily Mail, there was only one 2024 political candidate invited. One conniving, manipulative and a well-known politician who has been maneuvering for years toward her objective in securing the White House by any means needed; former South Carolina Governor and former U.N. Ambassador, Nikki Haley.

Obviously her invitation speaks to the intent of the participants. However, after widespread initial reporting, it was also later stated that Nikki Haley would not be in attendance.

Perhaps the visible motive behind a singular invite would be a little too transparent?

(more…)

A Refreshingly Honest Interview About Mitch McConnell and Republicans in DC

I can count on one hand the number of people I know who understood the danger of Senator Mitch McConnell for over a decade; and all of them are admins at CTH.

Mitch McConnell is the most Machiavellian republican in modern history. In 2010 it was Senator McConnell who wanted to see the Tea Party destroyed, and he did everything in his power to achieve that goal along with his friend Tom Donohue, then president of the U.S. Chamber of Commerce.

Additionally, almost everything centering around the current rogue intelligence community can be traced back to McConnell making deals with democrat senators to stand aside from oversight if they secure his position of influence and affluence.

McConnell is exactly the guy Taylor Caldwell was writing about in her book, A Pillar of Iron:

“A nation can survive its fools, and even the ambitious. But it cannot survive treason from within. An enemy at the gates is less formidable, for he is known and carries his banner openly. But the traitor moves amongst those within the gate freely, his sly whispers rustling through all the alleys, heard in the very halls of government itself.”

“For the traitor appears not a traitor; he speaks in accents familiar to his victims, and he wears their face and their arguments, he appeals to the baseness that lies deep in the hearts of all men. He rots the soul of a nation, he works secretly and unknown in the night to undermine the pillars of the city, he infects the body politic so that it can no longer resist. A murderer is less to fear.”

Natalie Harp and Liz Harrington both hit the nail on the head in this interview [Rumble Link].

(more…)

Nancy Pelosi Directs Capitol Hill Security Police Units to Regional Offices in California and Florida, Future Locations Coming

In a remarkable display of how committed the Democrat party is to utilizing the narrative of domestic extremism for their own benefit, Nancy Pelosi is placing satellite field offices for the DC Capitol Police in key regions around the country.  When we consider the FBI has field offices all over the country, you might ask: why does the Capitol Hill police need to expand beyond Washington DC?

Essentially, what Nancy Pelosi is doing is expanding the federal law enforcement mechanism of the legislative branch into specific areas where they can investigate political opposition armed with legal authority.

This is a concerning shift in events; however, there is a likelihood such a move is connected to the larger political goal of enhanced federal enforcement to quell any rebellion, while working in concert with the DOJ.

WASHINGTON — The U.S. Capitol Police on Tuesday announced that the agency was opening regional field offices in California and Florida to investigate threats to members of Congress in the wake of the Jan. 6 attack on the Capitol.

Threats against members of Congress have increased in recent years. As of Tuesday, total threats so far in 2021 were double what they were at this point a year ago, according to Capitol Police.

[…] “At this time, Florida and California are where the majority of our potential threats are,” a department spokesperson said in a statement. “The field offices will be the first for the Department. A regional approach to investigating and prosecuting threats against Members is important, so we will be working closely with the U.S. Attorney’s Offices in those locations.”

(more…)

Michigan Attorney Matt DePerno Discusses Similarities of Remote User Access Log-in in Arizona, Georgia and Michigan Election Systems

Attorney Matt DePerno appears with Steve Bannon to discuss some similarities between Arizona, Georgia and Michigan electronic election systems.  [Rumble Link Here] One of the things DePerno points to is “remote access log-in’s”, administrator level access with elevated privileges in the election management system.

The second point DePerno highlights is something previously covered; however, DePerno appears not to know. Maricopa County and the Secretary of State in Arizona have known about a November 3rd intrusion, a “security breach”, into the voter registration servers in Maricopa county.  DePerno calls this a breaking story unknown to the public and hidden by state officials.  WATCH:

On December 6, 2020, this “security breach” DePerno describes was widely reported, including by Forbes:

FORBES – (December, 2020)  “On the morning of November 5, as the 2020 election hung in the balance, Arizona federal agents raided a two-story house in Fountain Hills, Maricopa County, a county that had become a key battleground in the presidential race. The agents were looking for evidence of a cyberattack on an unnamed organization and stolen voter data. They left with eight hard drives, three computers and a bag of USB sticks.

(more…)

Open Border Activists Demand White House Confront The “Insurrection of Rebellious States”, AKA Red State Alliance Sending Help to Secure Border

This was so predictable CTH wrote about it HERE.  Several states responded to the call from Texas Governor Greg Abbott asking for allied states to send law enforcement and national guard to secure the southern border after the Biden administration actively, intentionally and purposefully works to keep it open.

With the potential for cooperation from states, what I call “extreme federalism“, to secure the border regardless of the Federal inaction, an assembly of various activist groups are petitioning the White House to confront the states with direct military action.

The League of United Latin American Citizens (LULAC), a far-left communist advance group, is asking Joe Biden to fight the state effort with all measures possible, including armed confrontation.

WASHINGTON DC – […] “We told the president in no uncertain terms, this is an insurrection by recalcitrant and rebellious states that must be stopped,” says Domingo Garcia, national president of LULAC. He said Mr. Abbott, who hosted former President Donald Trump for a border visit last week, was “fomenting dangerous racial hatred targeting Latinos.”

(more…)

Preview, The Fourth Branch of Government

After many years of granular research about the intelligence apparatus inside our government, in the summer of 2020 I visited Washington DC to ask specific questions.

My goal was to go where the influence agents within government actually operate, and discover the people deep inside the institutions no-one pays any attention to.

It was during this process when I discovered how information is purposefully put into containment silos; essentially a formal process to block the flow of information between agencies, and between the original branches. While frustrating to discover, the silo effect was important to understand because comprehension of communication networks leads to our ability to reconcile conflict between what we perceive and what’s actually taking place.

In the next few days I am going to explain how the Intelligence Branch works: (1) to control every other branch of government; (2) how it functions as an entirely independent branch of government with no oversight; (3) how and why it was created to be independent from oversight; (4) what is the current mission of the IC Branch, and most importantly (5) who operates it.

When we understand how the Fourth Branch works, questions about our dysfunctional U.S. modern government are answered. Additionally, the motives and intentions of people inside the institutions start to reconcile. Before beginning a deeper explanation, here’s an example almost everyone overlooked.  Remind yourself of a question raised in March of 2017 by Elise Stefanik, and a set of follow-up questions that were never asked.

In April of 2016 the FBI launched a counterintelligence operation against presidential candidate Donald Trump.  The questioning about that operation is what Rep. Stefanik cites in March of 2017, approximately 11 months later.

(more…)

Jobs Report Shows Good News for Service Sector, Bad News for Manufacturing and Construction

CTH has said repeatedly the road to serfdom is cemented with the catch-phrase “a service driven economy.”  The June jobs report from the Bureau of Labor statistics [BLS LINK]  highlights the JoeBama economic policy exactly that way.

Approximately 850,000 jobs were gained in June; however, simultaneously the number of long-term unemployed increased by 233,000 to the current state of four million.

While we should expect to see the leisure and hospitality industries as well as education rebounding from the various COVID-19 shutdowns, and indeed they did ( +343,000 and +155,000 respectively), manufacturing was flat (+11,000), and construction was down -7,000.  The details inside the data are not as great as the top-line would presume.

CTH looks at alternative data connected to the overall economy; empirical data and sector specific trends inside industry.  The biggest domestic issue is inflation, stunningly large increases in prices for fast-turn consumer goods like food and fuel.  Inflation is one of the primary reasons we have stated home values and home sales have peaked on a MACRO level despite the massive amount of real estate investment purchasing underway by financial institutions.

When we look at durable good production, we focus on the primary drivers of higher cost middle-class or working class products.  Seeing construction jobs decline by 7,000 at the same time real-estate values are increasing only points to the problem of working class not being able to afford new home purchases.  In the real estate sector this is unsustainable; it is simply a matter of math, income stability and wages.

(more…)

Big Tech Now Sending Warnings That Users May Have Been Exposed to Extremist Content, Dissident Voices Must Be Controlled

Jumpin’ ju-ju bones, George Orwell was either a time-traveler or he just had incredible prescience. We are all subversives and counter-revolutionaries now!

Facebook users are reporting today that warnings and alerts are showing up on their feeds notifying them they may have been “exposed to extremist content.”  The alerts provide users the option to “Get Support” from some entity that will assist them in deprogramming the unauthorized thoughts that may have followed exposure.

 

It is easy to see where this ideological control mechanism is going.  Big Tech doesn’t want comrade citizens exposed to thoughts and opinions that might run counter to the approved worldview of the totalitarian state.   It’s actually quite remarkable to see this so publicly pushed, and see them so open about it.

Obviously a visit to the wrong website (your internet travel obviously being tracked by the command and control authorities) will likely trigger the warning.  Visit The Conservative Tree House and receive a warning upon exit “you have been exposed to harmful extremist content”.

I think back to that scene in 2001 A Space Odyssey when Dave Bowman is trying to stop the computer system HAL-9000 (artificial intelligence) from controlling his behavior, control his spacecraft, and ultimately killing him: “Dave, I’m afraid I can’t let you do that”…

(more…)

Supreme Court Upholds Arizona Voting Reforms With 6-3 Ruling – Justice Alito: Preventing Voter Fraud is a “strong and entirely legitimate state interest”

A major win for voting integrity laws in the Supreme Court today will enhance the ability of all state legislatures, and further define the parameters and hurdles for lower court activists before they can rule against the rights of states to secure their elections.

The 6-3 ruling (Bryer, Sotomayor, Kagan in dissent) stems from a challenge to the 2016 Arizona election reform that banned ballot harvesting (with some exceptions) and nullified any ballot cast in the wrong precinct.  Democrats and political activists argued the Arizona rules were targeted to restrict minority votes; however, the majority of the court dispatched that argument and went a step further to define how lower courts should approach claims of ‘disparate impact’.

Front row, left to right: Associate Justice Samuel A. Alito, Jr., Associate Justice Clarence Thomas, Chief Justice John G. Roberts, Jr., Associate Justice Stephen G. Breyer, and Associate Justice Sonia Sotomayor. Back row, left to right: Associate Justice Brett M. Kavanaugh, Associate Justice Elena Kagan, Associate Justice Neil M. Gorsuch, and Associate Justice Amy Coney Barrett.

Justice Samuel Alito wrote the decision [pdf available HERE] and strongly defended the ability of states to put voting rules in place that eliminates voter fraud.  Alito concluded the ruling of the majority by stating courts should look at the reason why states want to impose a particular voting rule. Wanting to prevent voter fraud is, Alito made clear, a “strong and entirely legitimate state interest.”

The result is a complete win for the State of Arizona [Brnovich v. Democratic National Committee] and a strong boost for all state legislatures who are currently in the process of creating legislation to combat the voting fraud created by excessive use of mail-in ballots, ultimately the strategy purposefully behind the creation of COVID-19.

(more…)

Tucker Carlson Pushing Back Against NSA Surveillance, However The Intelligence Branch of Government is Much Larger Than Most Consider

Tucker Carlson used his TV broadcast on Wednesday night to continue pushing-back against NSA operational data collection that appears to have caught him in their surveillance dragnet.  However, what Carlson (and many others) have yet to reconcile is the totality of control held by the newest branch of government, the Intelligence Branch.

CTH has been contacted by numerous interested stakeholders in the larger dynamic.  Tomorrow we hope to be able to give readers an explanation of exactly how each traditional branch of government; including the administrative agencies within them; have been taken over by a methodical expansion of the Intelligence Community.  Everything is now controlled by the Intelligence Branch, and the underlying mechanisms of government have abdicated, perhaps even abandoned, their oversight.

In the interim, here’s the latest segment from Carlson along with one of CTH earlier outlines on how the NSA database became a surveillance tool for President Barack Obama.  We are almost 15 years into a process that facilitates the Intelligence Branch as the most powerful -and unelected- governmental system.  After the Carlson segment remind yourself how President Obama exploited a process he created.

There is no workable solution to debate until the American people and congressional representatives admit and accept the totality of the current corrupt system.  In essence, until everyone realizes there is a fourth branch of government now in control.

The process to create the Intelligence Branch started around the time the office of the DNI was created (post 9/11/01).  However, it was President Obama and AG Eric Holder who took advantage of the framework the ODNI system created with an immediate and methodical plan in 2008.  The effectiveness of what they constructed shows up toward the end of the Obama presidency when they were using that system to assist Hillary Clinton.

That is the context to remember a time-frame between December 2015 and April 2016 when the NSA database was being exploited by contractors within the intelligence community, using windows opened by the Obama-era DOJ/FBI, to facilitate unauthorized searches.

(more…)