Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Global Agenda
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

The Trump Human Trafficking Prophecy: Will This 'Good Friday' Bring a Black Monday to the Internet and Dark Web?

% of readers think this story is Fact. Add your two cents.


On April 6th Donald Trump dropped a ‘crumb’ for those of us who have been paying attention when he mentioned that the US Navy and Armed Services are undergoing covert Military operations in the Caribbean Sea presently while we are all under lock down around the planet. I am not going to play spoiler alert here in the description, so you will have to watch the video, but I will leave you a tease. In my last video involving Donald Trump I brought up the subject of the Internet ‘Going Dark’ and what conspiracy theorist veteran David Wilcock has been saying lately about global arrests going down during this world wide quarantine and three days of darkness. Wilcock suggested that one of the reasons why the Internet will go dark for 72 hours is so the powers that be can ‘reset’ the Internet by ‘cleaning’ it up and getting rid of the ‘Dark Web’ that has been home to the Cabal and Pedophiles for years to hide behind. So you will have to hear what Trump says about the Internet and Human Trafficking. Like I always say, use your own discernment when watching my videos and just remember to chew the meat and spit out the bones.  



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 6 comments
    • dave42

      To understand what the Dark Web is can explain why it is merely a tool to propagandize those who do not understand the internet.
      The Dark Web is not a place or Type of connection or web service.
      It was named to describe non-indexed encrypted server instances.
      So every modem and gateway on the web has 65K ports and any of those ports can be used to request and listen for packets from any other gateway or modem on the network.
      When you visit http://www.google.com a request goes out from your machine to your gateway on port 53 your gateway starts listening on a different port above 1024 for a acknowledgement from your DNS server usually your ISP provides this.
      That server responds and returns to your gateway the gateway stores the packet and relays it to your IP on your machine.
      The next request is routed to the DNS and requests the IP address of http://www.google.com.
      The DNS server responds with the address of google www machine.
      Your computer then request the REQ/ACK/DATA from the Google server.
      The same Network Address Translation happens at each gateway and switch through the network connecting the client to the server.

      One variety of IP communication called TOR makes a req to many computers at one time and listens for any of those to respond so hundreds of REQ/ACK/DATA streams are created with hundreds of ports listening at the same time. This allows any one or more of the other computers to act as the server or client. The data is not complete only single packets randomly distributed over hundreds of web IP addresses. Each packet called the datagram is part of a group of packets that get assembled on the client computer and decrypted as part of a message.
      Tor was what the silk road dark web was using to communicate.
      You would never know where any of the servers are at anytime a separate shared list of server locations was available from any of the servers.
      This list was called the ONION domain.

      Another similar protocal is the torrent a torrent is a compressed file that a server presents for download as each client obtains a piece of the file they also make that file available for anyone else asking for it. The result is hundreds of connections to any number of peers relaying portions of the original file without having to download from the original server.
      The concept of law was stretched to the limits when Napster was using torrent like systems to distribute and share music.

      Torrents are not a violation of any law but create obstacles for law enforcement to police.

      The idea of turning off or disabling the ability of networking to function to get rid of the Dark Web is a fools foley.

      For many years the child porno and criminal commerce was being run out of DOD,DOJ and CIA desktops in the Verdin Virginia subnet.

      I write secure communication software for attorneys and governmental agencies I can assure you that the ability to block and intercept communications does not exist. The ability to circumvent such attempts is built into the infrastructure of the internet.

      While we worked in Afghanistan my company linked Kabul to Munich Germany using a device with 4 internet connections on each side the data was segmented and spread across the devices on both sides. Only packets originating from one of the four cards on each side were processed as valid data. ANy intermediate or man in the middle would not receive enough of the original datagram to create a frame. This network link functioned to provide phone and drone across the link.

      In another example a portable link was created to provide a low bandwidth network connection linking Cairo to Virginia this link was run through ten ultra slow SMS gateways of 8 cell phone connections. Not internet exactly but across the Cell tower inter connects on D channel each link supported 8kb the group of 8 supported 48Kb of data.

      Another huge example is how IP tv was supported in Pakistan in 2007-8 a company named Sysmaster made multicast and unicast servers as well as set top boxes. The 224.x.x.x is reserved and routed for multicast. The server does not wait for a REQ but instead generates a SDP for each channel of RTSP data. The server broadcasts the stream out to an unused IP address. Each client makes a request to that same IP and all packets coming from that IP port are directed to the individual set top. So no actual REQ or ACK exists in the datastream. You can google MENTAT streams to learn more about multicast.

      The internet allows any two machines using the same protocal to find link and communicate across the entire network.

      There is NO shutting down the “dark Web” it is not a place or actual thing it is a marketing IDEA put forth to describe something that the police could not control.

    • dave42

      Another thing about the FEMA broadcast well its like 1952 tech.
      Radio Relay and packet radio is a way to broadcast in the shortwave bands you can link over great distances but it is SLOW. like 300 characters a minute.
      FDM is much easier to get some bandwidth.
      But FEMA EBS is just a bunch of networked relays at various cell tower and Radio station antennas.
      As part of a physical license you are required to install their hardware into your transmit line.
      The communication is one way from tower to receiver most of the boxes use cell phone internet or leased line POTS lines to inter connect.
      FDM is just like Hughesnet or other radio internet it requires an uplink usually a landline but some times a MEEGO like up link.
      Femas network superiority is only in the right to prempt broadcast not in the broadcast data.
      A lot more going on on cell and LTE but not for public to know.

      • wheeties

        very good Dave–thanks–you should write an article–98 percent of the articles on bin are nonsense–your at the top of the 2 percent,at the very top,bravo

    • najenuj

      This article misleads those who wish to be misled. Trump removed the seal March 15th, NOT April 1st. Do some research before spouting BS!

      https://www.youtube.com/watch?v=VmqO_p0F5bk

    • truck driver

      I thought the dark web was using security software or hrowser

      • dave42

        Not exactly software the “Dark Web” was an idea that a prosecutor had to make legal activity sound more nefarious.

        Secure communications that are not part of the W3C and RFC are completely legal as long as they do not involve listed foreign entities.

        Not publishing your content or having password protected files is just fine.

        In the USA the encryption that is legal to use has to provide a third key option or have identity attached to enable a warrant to be served for the information.
        The specific law is in the FCC rules and regulations #s 14-15 and 168 Piracy. I was only 14 when I got popped more than 4 decades ago. At 14 piracy is a scary charge.

        The TOR guys have created public open source versions of the Chrome browser and TOR router software that may be what you are referring to.

        Silk Road and other like servers used TOR and shared a list of site addresses once you grabbed the list from a WEB site you would find the rest of the list on the first server.

        The prosecutor that coined Dark Web was trying to confabulate the illegal sales of drugs on the silk road with the existence of a unpublished server. He was using a principle in law called instruments of crime were a person can be charged with an additional crime for possessing some device that can only be used for committing crime. In his mind no information should be beyond the reach of an investigator.
        We still do have a 4th and 5th amendment that prohibits such nosiness by law enforcement.

        The DARK WEB is a law enforcement MARKETING TERM.
        Secure communication and private information is our GOD given inalienable right.

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.