Sign Up  My Account  About  Contact  

Your Moral Rights

The Golden Rule

The Moral Rights Golden Rule: "Treat others the way you want to be treated." Luke 6:31.

The Greatest Commandment

Jesus said, 'You shall love the Lord your God with all your heart, and with all your soul, and with all your mind.' This is the greatest and first commandment. And the second is like it: 'You shall love your neighbor as yourself.' Matthew 22:36-40

Faith & Works: "Faith by itself, if it does not have works, is dead." James 2:17

The Declaration of Independence

"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness." Declaration of Independence (1776).

See below for a fuller discussion of your moral rights in the U.S. Constitution.

Sign Up

Your Moral Rights in the U.S. Constitution

Click the Amendment to expand the view. Click the title again to close the view.

First Amendment

"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances."

MySQIF™ enables you to discuss your opinions privately, without government or “public-private” corporate intrusion.

MySQIF™ employs a highly-advanced, “mathematically intractable” encryption algorithm for your “data in motion” that is beyond the practical reach of backdoors, iterative mathematics or brute force. We’ll say much more about this superiority on this website.

The First Amendment guarantees freedom of religion, speech, press, assembly, and to petition for redress of grievances.

These Constitutional rights are being devilishly violated in the name of “national security” by the 15 agencies of the Executive branch under the excuse of faked terror threats to justify perpetual Banker's Wars.

In 1993, U.S. intelligence and military implemented a universal back door key into all hardware, software and firmware called the Dual_EC_DRBG algorithm, managed by the National Institute of Standards (NIST). It’s a tool used by insiders to burrow underneath a person’s computer to read their private information with impunityn and without oversight other than a complicit FISA Court.

In 2001, the chief information officers of the various Executive agencies implemented the “Federal Bridge Authority.” They effectively franchised another set of backdoor keys to their crony friends via the Public Key Infrastructure (PKI).

PKI is effectively a grifter toll booth for the PKI system. It allows insiders to collect fees every time someone logs on to the Internet. The Federal Bridge “Certificate Authorities” (CA) buy an insider’s franchise to monitor user access and store all their public AND private keys (ostensibly for safekeeping). With these keys, no browsing is secure – ironically, in the name of everything being secure and "trusted."

CA licenses are sold to scoundrels like Hillary Clinton, Rose Law Firm, Robert S. Mueller III, Michael Chertoff, and Orlando Bravo with company name euphemisms like Entrust, Acxiom, DigiSert, Verisign, and Cloudflare. Remember, these vendors store both a user’s private and public keys, thus allowing any files using their keys to be decrypted, read, and copied at will.

The Federal Bridge Authority “licenses” a franchise (selects a fascist “public-private” commercial insider) to the Secure Socket Layer (SSL) and Transport Layer Security (TSL) systems to “manage” the current Public key infrastructure (PKI).

This PKI approach was developed by British intelligence at GCHQ (the controlling British version of the NSA) in early 1970s. GCHQ is run by the British Pilgrims Society from The City of London (the actual “Deep State”). Yes, America is controlled from the United Kingdom and always has been since before our founding. If you doubt, follow traitor Alexander Hamilton’s history closely (proven to be British Spy No. 7) in his establishment of the first four banks in the United States. This evidence is cited and linked in other parts of the website.

The bottom line is that the SSL/TLS certificate system is a “public-private” grifter scam from top to bottom. It is merely dressed up to look “safe” and "trustworthy" to the unsuspecting user. It is not, and the ​purveyors and regulators know it. Ask Who Profits? and you will identify the British Pilgrims Society scammers. These traitors must hang from the gallows.

Third Amendment

"No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law."

Your MySQIF™ licenses for intractable encryption and social networking enable you to secure your personal premises from digital warfighters who violate your space.

American soldiers may not quarter in any house (broadly, personal space) without the owner’s consent. This includes the soldier’s digital “instrumentalities” of war. In prior wars those instrumentalities were horses, weapons, munitions, belongings, cannons, equipment, or ciphers. Today they include computers, radios, phones, jammers, virtual scifs, thumb drives, hard drives, infrared scopes, virtual goggles, laser-guided missiles, satellites, networks, etc.

Congress allowed the smoke screen of 911 to attack the Bill of Rights and our rights to privacy under the ruse of “national security.” However, in all their fascist cleverness, they failed to address our 3rd Amendment right not to consent to intrusion into our personal space by warfighters, including digital ones.

After the U.S. Executive branch stole social networking from Leader Technologies in Columbus, Ohio, they repackaged their license offering to the tech community through the IBM Eclipse Foundation as “open source.”

That was a boldfaced lie.Then, IBM and its Pilgrims Society cronies pressured the vendors who took the bait to offer a sublicense that included your approval for the vendor and government to use your personal information in exchange for free access. This was a fraudulent contract, and still is.

Fraud vitiates contracts, making vendor “end user licenses agreements” null and void by fraud.

Therefore, your social vendor is breaking the law by sharing your information with third parties, especially so after you subscribe to MySQIF™.

Your MySQIF™ license will clean up this fraudulent licensing mess by giving you a proper, legal license to use social networking. With this license, you can demand that your social provider stop selling your information. They are fraudulently representing to you in their End User License Agreement that they own right, title, and interest to the underlying services they provide. They do not and never have. In short, the are lying to you.

According to the 3rd Amenment, you have a solemn constitutional right to secure your personal space, your home, from intrusion by soldiers of the U.S. government, or its proxies, according to the 3rd Amendment.

Social networking is the “digital house that Michael McKibben built.” He has never consented for any quartering of his invention for war making. Neither should you.

Your MySQIF™ social networking license, AND its powerful encryption, help give you back control over your possessions, physical and digital.

See Steven I. Friedland. (Feb 16, 2023). The Third Amendment, Privacy and Mass Surveillance. The Wake Forest Law Review.

Fourth Amendment

"The right o​f the pe​ople to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

MySQIF™ secures your “data in motion” from data thieves, snoopers, predators, stalkers, advertisers, creeps, voyeurs, gossipers, extortionists, propagandists, drug pushers, and spies.

Realize that if you fail to secure your private information, then you are tacitly approving the abuse of your 4th Amendment rights.

The Fourth Amendment protects persons, houses, papers and effects against unreasonable searches and seizures. The Third Amendment is a close partner, and often referred to as a bundle of rights to privacy, along with the Fourteenth Amendment.

The Fourth Amendment has been much attacked by an out-of-control U.S. government through the corrupt legal gymnastics of force-fed laws like USA PATRIOT Act and the United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court. 

Don’t believe this? Just look at the demonic laws that were pushed through on Oct. 26, 2001 just weeks after 911 by a criminally moribund Congress:

USA PATRIOT ACT, Public Law 107-56, Oct. 26, 2001

An Act to deter and punish terrorist acts in the United States and across the globe, to enhance law enforcement investigatory tools, and for other purposes [ this violates the Bill of Rights. The Tenth Amendment explicitly states that "The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.” "For other purposes" is shady lawyer language to acquire any power arbitrarily defined later by unscupulous actors ]."
Acts amended Electronic Communications Privacy Act
Computer Fraud and Abuse Act
Foreign Intelligence Surveillance Act
Family Educational Rights and Privacy Act
Money Laundering Control Act
Bank Secrecy Act
Right to Financial Privacy Act
Fair Credit Reporting Act
Immigration and Nationality Act of 1952
Victims of Crime Act of 1984
Telemarketing and Consumer Fraud and Abuse Prevention Act
Titles amended 8121518203142474950
U.S.C.  sections created 18 USC § 2712, 31 USC § 5318A, 15 USC § 1681v, 8 USC § 1226A, 18 USC § 1993, 18 USC § 2339, 18 USC § 175b, 50 USC § 403-5b, 51 USC § 5103a
U.S.C. sections amended 8 USC § 1105, 8 USC § 1182g, 8 USC § 1189, 8 USC § 1202, 12 USC § 1828, 12 USC § 3414, 15 USC § 1681a, 15 USC § 6102, 15 USC § 6106, 18 USC § 7, 18 USC § 81, 18 USC § 175, 18 USC § 470, 18 USC § 471, 18 USC § 472, 18 USC § 473, 18 USC § 474, 18 USC § 476, 18 USC § 477, 18 USC § 478, 18 USC § 479, 18 USC § 480, 18 USC § 481, 18 USC § 484, 18 USC § 493, 18 USC § 917, 18 USC § 930, 18 USC § 981, 18 USC § 1029, 18 USC § 1030, 18 USC § 1362, 18 USC § 1363, 18 USC § 1366, 18 USC § 1956, 18 USC § 1960, 18 USC § 1961, 18 USC § 1992, 18 USC § 2155, 18 USC § 2325, 18 USC § 2331, 18 USC § 2332e, 18 USC § 2339A, 18 USC § 2339B, 18 USC § 2340A, 18 USC § 2510, 18 USC § 2511, 18 USC § 2516, 18 USC § 2517, 18 USC § 2520, 18 USC § 2702, 18 USC § 2703, 18 USC § 2707, 18 USC § 2709, 18 USC § 2711, 18 USC § 3056, 18 USC § 3077, 18 USC § 3103, 18 USC § 3121, 18 USC § 3123, 18 USC § 3124, 18 USC § 3127, 18 USC § 3286, 18 USC § 3583, 20 USC § 1232g, 20 USC § 9007, 31 USC § 310 (redesignated), 31 USC § 5311, 31 USC § 5312, 31 USC § 5317, 31 USC § 5318, 31 USC § 5319, 31 USC § 5321, 31 USC § 5322, 31 USC § 5324, 31 USC § 5330, 31 USC § 5331, 31 USC § 5332, 31 USC § 5341, 42 USC § 2284, 42 USC § 2284, 42 USC § 3796, 42 USC § 3796h, 42 USC § 10601, 42 USC § 10602, 42 USC § 10603, 42 USC § 10603b, 42 USC § 14601, 42 USC § 14135A, 47 USC § 551, 49 USC § 31305, 49 USC § 46504, 49 USC § 46505, 49 USC § 60123, 50 USC § 403-3c, 50 USC § 401a, 50 USC § 1702, 50 USC § 1801, 50 USC § 1803, 50 USC § 1804, 50 USC § 1805, 50 USC § 1806, 50 USC § 1823, 50 USC § 1824, 50 USC § 1842, 50 USC § 1861, 50 USC § 1862, 50 USC § 1863

However, our new “discovery” of the Third Amendment essentially overrides the abuses of the Fourth Amendment by PATRIOT ACT and the FISA Court.

This MySQIF™ license can be used to invalidate the USA PATRIOT Act fraud and abuses of the Bill of Rights across the board!

It is your moral duty as an American citizen to protect yourself, whether or not you have “something to hide.” You certainly have hard-fought rights to protect even if you have nothing to hide.

MySQIF™ offers you a first-ever valid license to social networking since your Big Brother vendors have all been lying to you that they had the right to license social networking to you. They all stole it from Leader Technologies in Columbus, Ohio.

Fifth Amendment

"No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation."

MySQIF™ provides you a legal license to your powerful en​cryption. Bad intelligence actors in Washington, D.C. have been inserting backdoors into encryption for decades.

MySQIF™ also provides you a legal license to social networking, which you are currently enjoying illegally.

Agents and digital warfighters of the U.S. government, especially the Executive branch, and its surrogate IBM Eclipse Foundation, with the British Pilgrims Society in The City of London, stole Leader Technologies’ invention of social networking, repackaged it as “open source” (which it never was), and then licensed it for free to all its economic fascist “public-private partnerships” in government, technology, education, financing, banking, newspapers, publishing, media, industry and commerce.

Their smoking gun ruse was the relabeling of proprietary inventions as open source. Evidently, these bad-actor members of the IBM Eclipse Foundation believed they could not make their “open source” claim without first wiping out the true history behind Leaders’ true story.

Curiously, IBM’s then chief intellectual property office, David Kappos, a Chandler collaborator, later became director the U.S. Patent and Trademark Office on Aug. 13, 2009, during the Leader v. Facebook patent infringement trial.

Later, Kappos took unprecedented decisions against Leader’s U.S. Pat. No. 7,139,761, overriding his own patent examiners multiple times before relenting under evident political pressure, before his resignation in order to hide IBM’s central role in the theft of Leader’s invention. He also threw a wet blanket over his own uses of Leader’s invention, as well as uses by Barack Obama and Hillary Clintons, through their respective offices at the Patent Office, Commerce Department, State Department, and White House websites during the Leader v. Facebook litigation.

Every Leader v. Facebook judge held massive undisclosed financial interests in Facebook, rendering their participation in the litigation fraudulent.

The government’s action amounted to the taking of private property for public use without compensation.

This is a clear violation of the Takes Clause of the Fifth Amendment (in bold above).

Take a stand for moral technology with your MySQIF™ subscription

By subscribing to MySQIF™ you push back on the government’s immoral and illegal confiscation of Leader Technologies’ private property (its invention of social networking) not to mention your use of the stolen property.

You can be excused for this moral lapse if you did not know the circumstances. You can be forgiven since the mainstream media has not told you about this theft because they are perpetrators of this massive fraud. This is perhaps the largest financial fraud in the history of the world with damages into the trillions of dollars.

Your MySQIF™ license gets you legal on all platforms and devices that use social networking.

Your My SQIF™ license also supersedes the illegal licenses you have signed from social vendors.

With your legal license, if you wish, you can start making demands for restitution or even take class-action suits against these vendors for defrauding you on their licenses, and selling your personal information based on that fraud.

Your MySQIF™ license give you peace of mind that you are taking the moral high ground

With a MySQIF™ license, even while you continue using these platforms, you get access to privacy ensuring encryption and the surety that you are participating in moral technology.

We encourage you to join your voice to the demand that the federal government compensate Leader Technologies, and its shareholders, for the government’s confiscation of Leader’s private property as they laid out those claims in the FIRST REVISED MILLER ACT NOTICE

Thank you in advance!

Ninth Amendment

The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.”

It means what it says. If the Constitution does not address, or is vague in defining a right, that right is retained by "the people." The Constitution did not authorize any branch of the government to usurp the Bill of Rights in such actions as the Patriot Acts, and the formation of such agencies as the "Senior Executive Services" (that is controlled by British Crown agents controlled by the British Pilgrims Society in The City of London). Therefore, all usurpations of personal and property rights attempting to be siezed by an out-of-control federal government are stillborn. We the People command the government to get behind us while we assert our rights that have been abused by that government and their unelected  spies for many millenia, pursuant to the Ninth Amendment.

Tenth Amendment

"The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people."

The Tenth Amendment (Amendment X) to the United States Constitution, a part of the Bill of Rights, was ratified on December 15, 1791. It expresses the principle of federalism, also known as states' rights, by stating that the federal government has only those powers delegated to it by the Constitution, and that all other powers not forbidden to the states by the Constitution are reserved to each state, or to the people.

Michael Boldin. (Feb, 27, 2023). The Cost of War is Much More than Financial. Tenth Amendment Center. Source: YouTube. (Raw *.mp4 video file).

Sign Up