The “Federal Bridge” public encryption key platform was set up in the early 1990’s under Bill Clinton to enable the spy agencies to tap into any cooperating computer system at any time. It was facilitated by the National Institute of Science and Technology (NIST) through the embedding of an “encryption backdoor key” (algorithm) called the Dual_EC_DRBG algorithm (Dual Elliptical Curve Deterministic Random Bit Generator).
It is a special mathematical formula for generating random numbers used for encryption – the NSA insisted on building in a flaw into this algorithm known only to them as a way to bypass all keys that were generated with this algorithm (ALL KEYS, EVERYWHERE). This NSA flaw in the encryption key is known to all insiders in the Deep State shadow government around the planet, we believe.
Here are properly formatted versions of the NIST Dual_EC_DRBG algorithm registry for required by the Department of Commerce on all hardware, software and firmware used outside the United States (EVERYTHING): HTML | PDF (Thank you to AFI researchers. It took eight hours to fix.)
Relevant Timeline entries showing that the Federal Bridge is the encryption key sharing architecture that enabled the Deep State shadow government (Senior Executive Services – SES) to hack/tap into any computer or phone, anywhere, anytime… and they have been able to do so since the early 1990’s. Robert S. Mueller, III has all information on all us “wet-ware” humans on the planet since the early 1990’s.
1993 Clinton’s FBI encryption backdoor key endorsed by the Carnegie Endowment for Peace, John Podesta, James P. Chandler, III
1994 FEDERAL BRIDGE – ENTRUST PKI (Public Key Infrastructure) monopoly (see below)
1994 Clinton secures high tech rare earth mines in Congo and Rwanda using genocide pretext
1994 Clinton Chronicles documentary released proving Clinton’s racketeering, drug smuggling, money laundering, Rose law firm
1995 Highlands Group created by DoD to coordinate illegal public-private spy partnerships off the record; decisions used as pretext
1997 FEDERAL BRIDGE – ENTRUST PMI Portal Access (Privileged Management Infrastructure) monopoly (see below)
1998 George Soros told CBS that he did not regret working with the Nazis against his fellow Jews in Hungary
1998-1999 Kosovo War used to clear out Christian Serbs from Kosovo to create unimpeded land route for planned coming Soros-funded Muslim migration; created genocide as pretext, like in Rwanda
1999 FEDERAL BRIDGE – ENTRUST PKI for Wireless monopoly (see below)
1999 Precursor to SERCO (SI International) formed by ex-Lockheed executives
1999 Clinton formed CIA In-Q-Tel as a public-private spy technology funding entity, abolished Glass-Steagall banking controls; formed National Infrastructure Assurance Council (NIAC) to run mass surveillance on all Americans from the White House
2000 NSA architect William Binney resigned; observed that NSA had “gone rogue”
2001 Clinton appointed James P. Chandler, III and Microsoft’s Bill Gates to National Infrastructure Assurance Council (NIAC) as he departs the White House
2001 In June, CIA whistleblower Susan Landauer warned of World Trade Center attack using airplanes; she was imprisoned without trial
2001 In July, operation “Stellar Wind” to spy on all Americans was approved by DOJ
2001 On Sep. 04, 2011, Robert S. Mueller, III was sworn in as Baby Bush FBI director
2001 9/11 used as pretext for Patriot Act takeover of American privacy and property Bill of Rights
2001 FEDERAL BRIDGE – ENTRUST Enhanced Internet Security PKI monopoly excuse following 9/11 (see below)
Conclusion: The Federal Bridge, aka Federal Bridge Certificate Authority was the Deep State shadow government, aka Senior Executive Service (SES)’s actual technical platform for how computer systems across the Internet could allow the spy state to tap into any system in real time.
Company Overview. (2003). Entrust – Securing Digital Identities & Information. The Federal Bridge: A Foundation of Trust. Entrust.
Make sure to review our ongoing updates to this research: