A new bill recently came out of the Senate titled RESTRICT Act. Many people believe that this bill is about the banning of Tik Tok. That is the narrative currently being touted. And this is why it has been given the nickname of the Ban Tik Tok Bill. But that is not at all what this bill is truly about. This bill outlines everything that they are about to implement. This is a massive red alert for anybody who cares about our rights, our liberties, and our freedoms.
Here is the bill itself, and I highly recommend that you all go in and read it:
I spent two hours on a Twitter Space the other day discussing this. And the talk was not only about the bill itself, but also about solutions that we can come up with to deal with what is happening right now. There were some good ideas brought to the table. And there are people out there who are putting together various levels of organization to protest and to fight back. And I do not mean fighting back in a violent way, like the government wants us to. But in a peaceful and constitutional way.
Here is the recorded Twitter Space if you would like to listen:
This is the most tyrannical bill that I have ever seen. It is the Patriot Act for the internet, but it extends far beyond the internet as well. The man in the video below did a great job on touching on the technological aspect. But there is so much more that is going on here. Yes, this bill is going to affect things like servers, routers, Wi-Fi routers, wireless devices, ring doorbells, and smart meters. But that is not what is truly at the core. Those are just intermediaries.
Break Down:
We are going to go through some of the parts of this bill to help break it down and pull out the meaning behind what is being laid out.
To authorize the Secretary of Commerce to review and prohibit certain transactions between persons in the United States and foreign adversaries, and for other purposes.
This is the very first sentence from this bill. And those three words, “prohibit certain transactions,” should concern everyone.
Section 2 is dealing with definitions. But it is all incredibly arbitrary, and there is a reason for that.
(2) CONTROLLING HOLDING.—The term “controlling holding” means a holding with the power, whether direct or indirect and whether exercised or not exercised, to determine, direct, or decide important matters affecting an entity.
“(3) COVERED HOLDING.—The term “covered holding”—
(A) means, regardless of how or when such holding was or will be obtained or otherwise come to have been held, a controlling holding held, directly or indirectly, in an ICTS covered holding entity by—”
Covered holding is representing past, future, and current. What this is saying here is that any technology, both online or physical, that derives from whoever the government deems as an adversary is up for monitoring and investigation.
So, if you have a chip in your cell phone that was developed in China, that gives them access to your technology.
(C) NON-EVASION.—The term “covered transaction” includes any other transaction, the structure of which is designed or intended to evade or circumvent the application of this Act, subject to regulations prescribed by the Secretary.
For instance, if you are using a crypto-currency, or you are wanting to buy into a Chinese company that is traded on the Chinese stock exchange, now you fall into this bill.
(6) ENTITY.—The term “entity” means any of the following, whether established in the United States or outside of the United States:
(A) A firm.
(B) A government, government agency, government department, or government commission.
(C) A labor union.
(D) A fraternal or social organization.
(E) A partnership.
(F) A trust.
(G) A joint venture.
(H) A corporation.
(I) A group, subgroup, or other association or organization whether or not organized for profit.
Understand that this does not just cover organizations and businesses, this covers everyone, meaning individuals as well.
(9) HOLDING.—The term “holding”—
(A) means—
(i) an equity interest;
(ii) a stock;
(iii) a security;
(iv) a share;
(v) a partnership interest;
(vi) an interest in a limited liability company;
(vii) a membership interest; or
(viii) any participation, right, or other equivalent, however designated and of any character; and
(A) includes, without limitation, any security convertible into an ownership interest and right, warrant, or option to acquire ownership interests.
The majority of crypto currencies are securities. As well as digital money like the Chinese digital yuan.
(10) ICTS COVERED HOLDING ENTITY.—The term “ICTS covered holding entity” means any entity that—
(A) owns, controls, or manages information and communications technology products or services;
This is aligning towards technology companies, social media companies, blogging platforms, apps, games, and anything of this nature.
(11) INFORMATION AND COMMUNICATIONS TECHNOLOGY PRODUCTS OR SERVICES.—The term “information and communications technology products or services” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information or data processing, storage, retrieval, or communication by electronic means, including transmission, storage, and display.
The hardware would be things like your computer or your phone. The software is the software applications, which would include apps on your phone and websites that you go to. And any product or service, meaning anything that you buy or any services that are rendered. And they can utilize this is any way, shape, or form that they see fit. To “fulfill or enable the function of information” simply means that its primary function is to exchange information.
(17) TRANSACTION.—The term “transaction” means any acquisition, importation, transfer, installation, dealing in, or use of any information and communications technology product or service, including ongoing activities such as managed services, data transmission, software updates, repairs, or the provision of data hosting services, or a class of such transactions.
This is where you take in any acceptance, or where you do any uploading or giving away, any transfer between individuals. This covers every single post that goes through social media, as well as every private message, every private text message being sent or received, every voice communication through Discord, every Telegram channel, every Signal message, every tweet or truth post, every crypto currency that you buy, and any digital currency that you utilize, including the US dollar or the digital yuan. This bill is written so arbitrarily, and this is exactly why it was written this way.
(A) interfering in, or altering the result or reported result of a Federal election, as determined in coordination with the Attorney General, the Director of National Intelligence, the Secretary of Treasury, and the Federal Election Commission; or
I think we can all remember what everyone on the left as well as government and media sources were saying about the 2020 election. They were saying that we were interfering with the election process. And that is what they are talking about here. Keep this in mind.
(D) coercive or criminal activities by a foreign adversary that are designed to undermine democratic processes and institutions or steer policy and regulatory decisions in favor of the strategic objectives of a foreign adversary to the detriment of the national security of the United States, as determined in coordination with the Attorney General, the Director of National Intelligence, the Secretary of Treasury, and the Federal Election Commission; or
This part right here tells you exactly why they are doing this. This is the main target, but it is also laying the benchwork for everything to come.
(2) PUBLISHED EXPLANATIONS.—If practicable, and consistent with the national security and law enforcement interests of the United States, in coordination and in cooperation with the Director of National Intelligence, the Secretary shall publish information in a declassified form to explain how a covered transaction that the Secretary denied or otherwise mitigated under paragraph (1) meets the criteria established under subsection (a) or section 4(a).
Remember the Information Governance Board? That is exactly what this is. This is a law that determines the Information Governance Board.
SEC. 5. CONSIDERATIONS.
(a) Priority Information And Communications Technology Areas.—In carrying out sections 3 and 4, the Secretary shall prioritize evaluation of—
(1) information and communications technology products or services used by a party to a covered transaction in a sector designated as critical infrastructure in Policy Directive 21 (February 12, 2013; relating to critical infrastructure security and resilience);
(2) software, hardware, or any other product or service integral to telecommunications products and services, including—
(A) wireless local area networks;
(B) mobile networks;
(C) satellite payloads;
(D) satellite operations and control;
(E) cable access points;
(F) wireline access points;
(G) core networking systems;
(H) long-, short-, and back-haul networks; or
(I) edge computer platforms;
(3) any software, hardware, or any other product or service integral to data hosting or computing service that uses, processes, or retains, or is expected to use, process, or retain, sensitive personal data with respect to greater than 1,000,000 persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction, including—
(A) internet hosting services;
(B) cloud-based or distributed computing and data storage;
(C) machine learning, predictive analytics, and data science products and services, including those involving the provision of services to assist a party utilize, manage, or maintain open-source software;
(D) managed services; and
(E) content delivery services;
(4) internet- or network-enabled sensors, webcams, end-point surveillance or monitoring devices, modems and home networking devices if greater than 1,000,000 units have been sold to persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction;
(5) unmanned vehicles, including drones and other aerials systems, autonomous or semi-autonomous vehicles, or any other product or service integral to the provision, maintenance, or management of such products or services;
(6) software designed or used primarily for connecting with and communicating via the internet that is in use by greater than 1,000,000 persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction, including—
(A) desktop applications;
(B) mobile applications;
(C) gaming applications;
(D) payment applications; or
(E) web-based applications; or
(7) information and communications technology products and services integral to—
(A) artificial intelligence and machine learning;
(B) quantum key distribution;
(C) quantum communications;
(D) quantum computing;
(E) post-quantum cryptography;
(F) autonomous systems;
(G) advanced robotics;
(H) biotechnology;
(I) synthetic biology;
(J) computational biology; and
(K) e-commerce technology and services, including any electronic techniques for accomplishing business transactions, online retail, internet-enabled logistics, internet-enabled payment technology, and online marketplaces.
This list covers absolutely everything that you can imagine that we use on a daily basis that is technological. These are things like IP addresses, ring doorbells, cell phone cameras, smart meters, smart refrigerators, vehicles, zoom, coin base, Zelle, PayPal, Venmo, metadata, and much, much more.
(A) DEBATE.—Debate on covered joint resolution, and on all debatable motions and appeals in connection therewith, shall be limited to not more than 10 hours, which shall be divided equally between the majority and minority leaders or their designees. A motion to further limit debate is in order and not debatable. An amendment to, or a motion to postpone, or a motion to proceed to the consideration of other business, or a motion to recommit the covered joint resolution is not in order.
They are wanting to give them only 10 hours to debate this bill before a vote.
This is tyranny in a bill. I think we have all experienced the phenomenon where you are having a conversation with someone and then shortly after you see an ad pop up on your television or on your social media accounts that is correlated to the topic of discussion you were having earlier. This is exactly like the film Minority Report. So hypothetically, if they decided to ban crypto, and you are sitting there having a private conversation with someone, telling them that you are going to buy some Bitcoin, what would happen? They would investigate you; they would fine you for something that you possibly could have done in the future, or they would arrest you. With this bill, that becomes completely legal for them to do.
How Does Tik Tok Play Into This?
This bill may not be about Tik Tok like many are trying to say. But it does play a role here. A few months ago, we learned that big tech companies in the United States like Facebook, Instagram, and Google had a really bad year financially. It has been known that Silicon Valley is getting destroyed by Tik Tok because it has become a massive platform, and people are able to share a lot of information this way. These tech companies actually hired lobbyists to go out to Washington, D.C. and to each state to begin social media campaigns to try to restrict Tik Tok and take them out. They do not like that fact that Tik Tok has been cutting into their profitability.
Before the creation of Tik Tok, China had to buy American data from these tech companies. And these companies made billions of dollars because of it. These same tech companies were funded by a venture capital company known as In-Q-Tel, which is owned directly by Darpa and the CIA. This means that Darpa and the CIA had direct access to this data. When Tik Tok came in and started taking people away from the traditional social media platforms, the advertisers went with them. Not only did the advertisers leave, but if you do not have people utilizing your platform then you have no information or data to sell. Also, the Chinese government, which is undoubtedly taking this information, is no longer having to pay these companies for it. And this is a huge threat to big tech.
China and the BRICS nations understand that everyone is fighting for control of the new world order. There is a fight for control over the new social, economic, and political organization that is going to dominate the twenty first century. They are rising up into a military and economic alliance. And they know that the one thing that they must do is to get rid of their biggest enemy, which is the Unites States of America. The U.S. being one of the leaders of the western global order as well as the deep state.
There are multi-domain warfare conditions taking place right now, which includes socioeconomic warfare, cultural warfare, biological warfare, and many others, as well as factors such as the collapsing infrastructure and the supply chain crisis. But one of the best ways that China could win this war is by arming the people of the United States with information against their own government.
Now enter Tik Tok. There is an abundance of useful information on this app such as prepping, holistic medicine, gardening, how to produce your own technology and electricity, as well as tons of patriotic content. China has all of our meta data. They are aware of all of the Americans who voted for Trump in the 2020 election. And when you get on Tik Tok, the algorithm is going to target you to bring you information that is patriotic and shows you just how deep the rabbit hole goes, how corrupt your government actually is.
This kind of content is going to cause people get pissed off and make them want to rise up against their government. So, when you read in the bill where it says, “coercive and criminal activities by foreign adversaries that are designed to undermine the democratic processes and institutions to steer policy and regulatory decisions in favor of strategic objectives of a foreign adversary,” understand that this is why that is in the bill. That is the exact reason they are trying to ban Tik Tok.
What is the Ultimate Goal?
This bill is laying the foundation in infrastructure for everything that is to come. Things like global IDs, social credit scores, and CBDCs. And it is not coincidental that right now we are seeing things like FedNow, that is about to be rolled out this June and July, CBDCs that are less than 6 months away, and the banking crisis that is occurring right now, which is banking centralization of power.
This bill is nationalization of the internet and nationalization of American information. If you are communicating with someone in China without government permission, you will be targeted. If you are buying crypto currency from a company that is in China, you will be targeted. If you are using a VPN, they are going to come after you.
Remember when they wanted 87,000 new IRS agents? When the FedNow system goes into effect, you will not have to do anything because the banks are going to automatically enroll you. This is why they are centralizing the banking power into the big 6 banks, because it makes it easier to get everyone onto the new system. This means that any time you move money in or out of your bank account, that money will be cleared through the FedNow system. And that transaction ledger that is produced for each transfer or each purchase will give them the information of exactly when and how you spend your money, and it will all be stored on the blockchain.
This will not only be for purchases and transactions made after the system was implemented, but this will actually cover all of your banking information as far back as 7 years. The FedNow system is under the Department of Treasury, and so is the IRS. Those 87,000 agents were meant to sift through those 7 years of past transaction history. They would be able to find any back taxes owed as well as any transactions made to any company or individual deemed as an adversary. This is where this is heading. And this bill is laying the foundation for all of this.
It will cut you off from any parallel economy or parallel system as well as allow for the legal spying and monitoring of any electronic component that you have. And this is all planned. But keep in mind that this is not a partisan issue. This is an American issue through and through. People on both sides of the political aisle are noticing this because everyone uses these technologies. We all use the internet, apps, payment services, cryptocurrency, and personal devices for communication. We all use these things for freedom of speech and freedom of expression. But we need to understand that there many things taking place right now that are meant to distract us from this, as well as to continue to fuel the division of this country. They want to control us from every angle, they want to target us, and they want to persecute us. And we cannot let that happen. This is the precipice.