Your Private Seat to a Forensic Cyber Symposium begins in 4 Days

What to expect when signing up for the Insider Pass:
INSIDER FREE - Some insights about the event
INSIDER PLUS, INSIDER PRO, INSIDER LIFETIME - Deep insights during, and after, the event
Outside of the INSIDER email there may be article(s) posted with a 30,000 foot viewpoint
EVERYTHING provided here will be from an open minded, unbiased, apolitical, information technology forensic viewpoint.
REMEMBER this comes from the Team who brought the ACLJ and ACLU together (far Right and far Left) to agree on something.
DISCLAIMER: I will be involved in un-televised breakout sessions reviewing evidence and may not have time to produce oodles of updates during the event.  I will do my best to deliver some insights while maintaining the integrity of the examination.

There is an event, beginning on Tuesday, where an individual will be presenting evidence, which if determined to be true, would shout loudly to all Citizens of the United States of America that the words of the now assassinated President John F Kennedy  are as true today as they were when JFK voiced them.  Prior to his death, President John F Kennedy spoke before the then media, seeking their assistance with informing the Citizenry about a serious topic, it essentially went like this: there are those who are seeking to take over our country by pen and paper, without a shot being fired, please tell the people.  I can be identified as "elderly" by some accounts.  I lived through the JFK days and never once did I hear about these infamous words of warning.  The media never uttered a word, never inked a whisper of this presidential request, and that brings us to the media of today.  Similarities?  It was some time ago that I happened upon these words from JFK mentioned discretely within a somewhat boring otherwise nondescript archive.

That was, perhaps, my long winded way to emphasize that my attendance at this event has nothing to do with the presenter's belief systems and everything to do with uncovering truth, scaling the legs of the octopus (an analogy), and vetting the evidence presented.  Knowing that the media has been failing to accurately do their job, even since the days of JFK, my only option is boots on the ground.  I feel an innate compulsion to analyze the facts, ferret out the truths, ask questions of the presenter(s), and dispense with the lies, rather than read the self-directed spin provided by the media.  In a few moments I'll be sharing my unique qualifications which brought me to participate in such a forensic analysis and to further propose that those qualifications are much of the reason for my invitation to this live "by invite only" event.

Oh please.  This is not a puff piece.  It is informational so that the reader understands the perspective and qualifications from which these insights will be provided during the Cyber Symposium.

A decade passes swiftly.  Ten years ago I shared the stage, in Washington D.C., with 3 others under the headline "Privacy, What You Need to Know".  Continuing Education Units (CEU) were provided to attendees who needed CEUs to maintain their IAPP (International Association of Privacy Professionals) certifications.  This was hosted at the Georgetown University Law Center (a.k.a. Georgetown Law) at an annual meeting of the ACM (Association for Computing Machinery) and sponsored by the high tech firms of the day.  The audience consisted of world thought leaders and many of the speakers at the multi-day event were high ranking officials of foreign governments, ranking executives/officers of global technology firms, and select experts drawn from the security, privacy, and technology fields.

Leading up to that event, and today's event, my background included information technology work at several Fortune 50 firms.  Yes the firms we all commonly refer to as global multi-national conglomerates; plus a few other descriptors.  In those capacities my work effort delivered an internal 4GL language system to front a robust selection system, artificial intelligence, and even broke the boundaries of the operating system and hardware limitations when I discovered and developed a means for the programs to essentially think for themselves using artificial intelligence concepts to dynamically build custom programs of infinite size (it is far more technical than provided here and one could write books to describe the details, but my hopes are that one can understand the 30,000 foot view from this statement).  Later my path led me to an untitled management role, within a Fortune 50 firm, leading thousands in a quest to complete a $65 million mission critical information technology project.  Then on to teaching networking at one college while later becoming the Chair of the School of Information Technology at another college.

Steve Meyer is an accomplished professional with a knowledge base and skill-set that few individuals can rival. He's worked for Fortune 50 companies, owned successful businesses, and has the unique capability to think on a multi tiered level, instead of linear based approaches. When it comes to security, privacy issues, data-mining and forensics, Steve is a nationally recognized expert.

M.V., Chief Information Officer, Tech Firm

 

Steve is an accomplished information management professional with extensive knowledge of data mining and online privacy issues. I enjoyed working with Steve at the Georgetown University Law Center's Privacy Panel. He is a first class public speaker.

M.A., Director/Principal, Global Consulting Firm

 

[Steve's] vast experiences truly enhance his abilities to recognize and address issues. His advocacy of security and privacy is something that every individual should take to heart, not just companies.

B.M., Manager, National List Compilation Firm

This event is being live streamed to all via the host's "free speech" website FrankSpeech.com.  Viewers of that stream need to register with that site and follow the instructions provided.  The extent of what the viewer is shown consists of numerous presenters; this author is not confident that stream watchers will see everything that attendees get to see so I would ask that you consider becoming a Constitutional Alliance paid INSIDER to whom I will be providing my insights and perspectives.

This Cyber Symposium is said to present substantial evidence of voter fraud that was performed during the last Presidential election.  Fact or fiction, the significance that such a thing could have occurred lays the foundation for a real world solution.  Solutions such as the solution that the Constitutional Alliance has been presenting.  We have many articles written and downloads available which discuss how we could ensure valid elections and close any loopholes which may be given voice by the mentioned evidence to be provided at this Symposium.  Check out these 2 recent articles, a few of many, which open up the discussion around effective solutions:

When things do not make sense, ask why Vaccine Passports

Privacy in Action: Mark Lerner, Constitutional Alliance Co-Founder

Please share this today so that everyone you know has the opportunity to observe this live event while it is happening.

There is greater detail packed into our weekly update emails.  If, like others, you prefer deeper insights then consider signing up for our updates and newsletter emails.  One can do so here

Scroll to top