ATTACKING CITIZENS WHO REPORT POLITICAL CORRUPTION CRIMES

WHEN THE WHITE HOUSE ORDERS ATTACKS ON CITIZENS AS POLITICAL REPRISAL

The dictionary defines a “Character Assassination Attack”, ie: https://en.wikipedia.org/wiki/Character_assassination , as “…The state-sponsored destruction of reputations, fostered by political propaganda and cultural mechanisms, can have more far-reaching consequences. One of the earliest signs of a society’s compliance to loosening the reins on the perpetration of crimes (and even massacres) with total impunity is when a government favors or directly encourages a campaign aimed at destroying the dignity and reputation of its adversaries, and the public accepts its allegations without question. The mobilisation toward ruining the reputation of adversaries is the prelude to the mobilisation of violence in order to annihilate them. Generally, official dehumanisation has preceded the physical assault of the victims.[8]…”

One of Plaintiff’s greatest complaint’s in this case is the organized use of “The Silicon Valley Cartel” RICO and Antitrust violating racketeering organization to operate a global charactar assassination attack on Plaintiff. The media group of the Cartel is wdely known to consist of Google, Alphabet, YouTube, Gizmodo/Gawker Media, Black Cube, Twitter and the like, which are COVERTLY owned by the government figures involved in these corruption matters. To use an 8 Billion person global media Silicon Valley attack engine is to end someone’s life, to permanently destroy them. The White House and the Department of Energy have been exposed in investigations doing this thousands of times!

Some online articles list an example set of the Silicon Valley Cartel members in a manner such as this:

THE SILICON VALLEY CARTEL MEMBERS

The Worst Ones – Rev 2.2

You would be shocked to learn how many people are killed, every day, for less than $50.00. ISIS and the Taliban will saw your head off for just an ideology. If people would commit murder over that small an amount of money, imagine what they would do to control the trillions of dollars of money that is always moving through the stock market. These are the people that will stop at nothing for power, mansions, hookers, private jets and greed!

### THE BRIBED INSIDER TRADING POLITICIANS – Tracked via financial records and email leaks to quid pro quo:

 

– Aneesh Chopra – White House Tech Exec

– Arnold Schwarzenegger – Governor (Accused of political bribery and kickbacks; tax evasion, illicit deal organization with Russians and more…)

– Barack Obama – Chicago politician

-Bill Daley – White House strong-arm (Forced to resign)(he is now under investigation)

– Bill Lockyer – Calif State finance head (Under investigation and sex scandal conflicts, charged with corruption by media. Assets and ownerships under investigation)

– Daniel Cohen – DOE Legal counsel who assisted in the Steven Chu scam (Sent packing/fired/forced to resign)

– David Axelrod – White House strategist who helped stage the quid-pro-quo (Sent packing/fired/forced to resign)(he is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

– Hunter Biden

– David Plouffe – White House money packager. Arranged deals between VC campaign Donors (Forced to Resign. Under investigation)

– Debbie Wasserman Schultz

– Denis McDonough – White House adviser

– Dianne Feinstein – California politician

– Eric Holder – Attorney General- DOJ (Forced to resign) (Charged with staff & VC Protections and blockade of FBI and Special Prosecutor deployments in order to run the cover-up)

– Eric Strickland – Head of Auto Safety agency under DOT (Sent packing/fired/forced to resign)(he is now under investigation. Charged with cover-up of Tesla and GM auto dangers he had known about)

– Gabriel Burt

– Harry Reid – Senator- Solar factory guru, Congress lead (Accused of political bribery and kickbacks; tax evasion, and more…Forced out of Congress in shame)

– Hillary Clinton – Dynastic politician

– Jack Lew

– Jay Carney – White House press lead (Forced to resign)

– Jeff Berman – Bryan Cave. Berman, the former delegate counter for President Obama’s 2008 campaign

– Jeff Peck, Peck, Madigan, Jones & Stewart. Aide to then-Sen. Joe Biden (D-Del.) on the Senate Judiciary Committee

– Jeffrey Zients

– Jerry Brown – California politician

– Joe Rhodes – White House shill

– Joe Biden – Politican who created Solyndra funds

– John Podesta – White House adviser

– Jonathan Silver – DOE VC (Sent packing/fired/forced to resign)(he is now under investigation. Shamed in media for epic failures)

– Joshua Wright – FTC

– Kamala Harris– Stock favoritism Insider with her husband

– Katherine Feinstein

– Kathy Zoi

– Ken Alex – Scheme Adviser to Jerry Brown

– Ken Duberstein and Marti Thomas, The Duberstein Group. Duberstein was floated as a candidate for Obama’s chief of staff before the president chose Bill Daley, while Thomas is a Democratic vet who worked in the Clinton Treasury Department.

– Lachlan Seward – Energy Department insider gatekeeper

– Melanie Nutter – Pelosi Top Aide

– Matt Rogers – VC and quid pro quo pass-through conduit

– Megan Smith – U.S. CTO

– Mikey Dickerson

– Nancy Pelosi – California politician

– Robert Gibbs – White press office head

– Steven Chu – Secretary of Energy – The most corrupt in US history

– Todd Park – IT manipulator inside White House

– Plus others to be named…

 

 

### THE OLIGARCH FINANCIER/BENEFICIARIES OF THE CRIMES – Tracked via financial records and email leaks to quid pro quo:

 

– Andy Bechtolsheim – VC- Insider campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

– Bill Gurley

– Carl Gordon

– Chad Hurley – YouTube

– Cheryl Sandberg – Facebook boss, reports to Larry Summers

– Dave McClure – VC

– David Danielson

– David Drummond – Lawyer/Lobbyist– Google, bribes expert for DC and EU regions (Under investigation. Quail Road, Woodside, CA home bugged)

– David Mott

– David Prend

– David Sacks

– Draper – Fisher – VC firm (Campaign funder who received massive windfalls from Russian mining & tech start-up rigging)

– Elon Musk – CEO – Tesla (He is now under investigation & in multiple lawsuits for fraud)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation )

– Emerson Collective -Steve Jobs wife, has one of the largest and stealthiest election data combines

– Eric Paley

– Eric Schmidt – Owner- Google (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

– Gilman Louie – VC, founder on IN-Q-Tel

– Goldman Sachs – Financial packager (Suspected of staging most of the TARP/DOE deals for personal gain & insider payouts)

– Greylock Capital – Silicon Valley Insider trading operator (Under investigation)

– Ira Ehrenpreis – VC Campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation)

– Jacque Littlefield – VC, Dead

– James Bronkema – West Coast Money Man for David Rockefeller and Feinstein financier (Dead)

– Jared Cohen – Google boss and international political manipulator

– Wilson Sonsini Partner Club

– Wilson, Sonsini, Goodrich and Rosatti

– Jim Breyer – VC and CIA intermediary

– Joe Lonsdale – VC, famous for rape and abuse scandal and domestic spying via Palantir

– Johanna Shelton – Google Lobbyist

– John Doerr – Owner – Kleiner Perkins. “Godfather” – Silicon Valley Cartel (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)( All of his personal assets, investments and portfolio holdings are under investigation )

– John Lindfors

– Josh Kopelman

– JP Gan

– Keith Rabois -VC

– Ken Howery – VC

– Kleiner Perkins – Campaign funding VC who (Received massive windfalls from Russian mining & tech start-up rigging. Sued. Under investigation. All assets being tracked )

– Larry Page – Google Boss

– Larry Summers – VC

– Lloyd Craig Blankfein – VC and Sachs boss

– Luke Nosek

– Marc Andreessen -VC

– Mario Rosatti – VC

– Mark Zuckerberg – Facebook Boss

– Martin LaGod -VC Firelake Cap

– Mary Meeker – VC

– Max Levchin -VC

– Mckinsey Consulting – The firm you hire to rig white papers and insider hires in government positions for the Palo Alto Mafia

– Michael Moritz -VC

– Neerag Agrawal – VC

– Peter Thiel – VC

– Pierre Omidyar– VC

– Raj Gupta – VC, arrested

– Rakesh Saxeena – Canadian in-house arrest, arms dealer, western political packager

– Ray Lane – VC

– Reid Hoffman – VC and sex.com partner with Gary Kremen, also match.com

– Richard Blum – VC and director/husband of Dianne Feinstein – Finally dead!

– Roelof Botha

– Sanjay Wagle – VC

– Scott Shleiffer

– Sergy Brin – Google boss

– Steve Chen

– Steve Jurvetson – VC embroiled in sex abuse charges

– Steve Rattner – White House car czar, indicted for fraud

– Steve Spinner – Energy Department manipulation expert, Wife was Solyndra’s lawyer

– Steve Westly – VC

– Ted Schlein – IN-Q-Tel

– Tim Draper – VC

– Tom Perkins – Dead KPCB Palo Alto Mafia founder

– Tom Steyer – VC

– Tomorrow Ventures – Social manipulation group

– Tony Podesta, Podesta Group. The prolific Democratic fundraiser has seen his firm rocket to the echelons of the top five lobby shops.

– Viktor Vekselberg – Russian business entity

– Vinod Khosla -VC
– Plus others to be named…

 

### THEIR OPERATIVES AND HIRED MEDIA ASSASSINS – Tracked via financial records, quid pro quo perks and email leaks to payola. The people in the two lists, above, hired these people to harm citizens:

 

– A.J. Delaurio– Defamation-for-sale blogger

– Adam Dachis– Defamation-for-sale blogger

– Adam Weinstein– Defamation-for-sale blogger

– Adrian Covert– Defamation-for-sale blogger

– Adrien Chen– Defamation-for-sale blogger

– Al D’Amato, Park Strategies. The former GOP New York senator has been a big advocate for online gambling as a lobbyist for the Poker Players Alliance.

– Al Mottur and Manuel Ortiz, Brownstein Hyatt Farber Schreck. Mottur heads up lobbying operations at the K Street giant. Ortiz, one of Brownstein’s newest hires, is a rising star in Democratic circles.

– Alan Henry– Defamation-for-sale blogger

– Albert Burneko– Defamation-for-sale blogger

– Alex Balk– Defamation-for-sale blogger

– Alexander Pareene– Defamation-for-sale blogger

Alexander Sternhell, Sternhell Group. Previously a Senate Banking Committee staffer, Sternhell’s two-year-old venture is in the big leagues with clients such as Citigroup Management and PricewaterhouseCoopers.

– Alexandra Philippides– Defamation-for-sale blogger

– Allison Spinner – Wife of Steve Spinner and lawyer at WSGR and Solyndra who helped Feinstein rig the Solyndra cash ((Under investigation. All assets being tracked and terminated.)

– Allison Wentz– Defamation-for-sale blogger

– Andrew Collins– Defamation-for-sale blogger

– Andrew Magary– Defamation-for-sale blogger

– Andrew McCormack

– Andrew Orin– Defamation-for-sale blogger

– Andy Barbour, Smith-Free Group. Smith lobbies for several financial and insurance companies but is best known for his work as the lead Democratic lobbyist for the Financial Services Roundtable.

– Angelica Alzona– Defamation-for-sale blogger

– Anna Merlan– Defamation-for-sale blogger

– Ariana Cohen– Defamation-for-sale blogger

– Ashley Feinberg– Defamation-for-sale blogger

– Ashley Vance – Elon Musk suck-up and Musk hype monger

– Austin Lau

– Ava Gyurina– Defamation-for-sale blogger

– Barry Petchesky– Defamation-for-sale blogger

– Black Cube – An attack service providing hit jobs on competitors

– Brendan I. Koerner– Defamation-for-sale blogger

– Brendan O’Connor– Defamation-for-sale blogger

– Brent Rose– Defamation-for-sale blogger

– Brian Goncher – Deloitte VC intermediary in the stock market rigging (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

Brobeck Law Firm

– Brian Hickey– Defamation-for-sale blogger

– Camila Cabrer– Defamation-for-sale blogger

– Carr & Ferrell – Sony and Facebook’s law firm that helps to blockade inventors

– Choire Sicha– Defamation-for-sale blogger

– Chris Jennings, Jennings Policy Strategies

– Chris Mohney– Defamation-for-sale blogger

– Chuck Brain, Capitol Hill Strategies Inc. Once a Clinton White House aide and longtime House Ways and Means Committee staffer

– Civis Analytics – Social manipulation group

– Clover Hope– Defamation-for-sale blogger

– Covington & Burling

– Dan Tate Jr., Capitol Solutions. Tate delivers stellar client relations while harnessing 10 years of upper-level Hill and administration experience.

– Daniel Morgan– Defamation-for-sale blogger

– Covington & Burling – corrupt law firm that puts appointees in office for VC’s

– David Sandalow

– Diana Moskovitz– Defamation-for-sale blogger

– Doyle Bartlett, Eris Group. Bartlett has years of Capitol Hill experience and a busy lobbying practice

– Eleanor Shechet– Defamation-for-sale blogger

– Elizabeth Spiers– Defamation-for-sale blogger

– Elizabeth Starkey– Defamation-for-sale blogger

– Emily Gould– Defamation-for-sale blogger

– Emily Herzig– Defamation-for-sale blogger

– Emma Carmichael– Defamation-for-sale blogger

– Erin Ryan– Defamation-for-sale blogger

– Ethan Sommer– Defamation-for-sale blogger

– Eyal Ebel– Defamation-for-sale blogger

– Fred Graefe, Law Offices of Frederick H. Graefe

– Fusion GPS – Defamation and journalist bribery service

– Gabrielle Bluestone– Defamation-for-sale blogger

– Gabrielle Darbyshire– Defamation-for-sale blogger and attack services director

– Gawker Media – DNC/Clinton/Obama character assassination media tool (In Mid-Termination)

– Georgina K. Faircloth– Defamation-for-sale blogger

– Gerald Cassidy and Gregg Hartley, Cassidy & Associates

– Gizmodo – DNC/Clinton/Obama character assassination media tool ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )

– Gregory Howard– Defamation-for-sale blogger

– Hamilton Nolan– Defamation-for-sale blogger

– Hannah Keyser– Defamation-for-sale blogger

– Heather Deitrich– Defamation-for-sale blogger

– Heather Podesta, Heather Podesta + Partners. The former congressional aide has built a solid lobbying practice and helps fundraise for Democrats with her husband, Tony Podesta

– Hudson Hongo– Defamation-for-sale blogger

– Hugo Schwyzer– Defamation-for-sale blogger

– Hunter Slaton– Defamation-for-sale blogger

– Ian Fette– Defamation-for-sale blogger and Google, Gawker, Jalopnik, Gizmodo media assassin

– Irin Carmon– Defamation-for-sale blogger

– Jalopnik – Online defamation facade political publication. Pretends to be about cars but is DNC hit job rag

– James Brown Jr – HHS Programming lead in California (Arrested for corruption)

– James J. Cooke– Defamation-for-sale blogger

– James King– Defamation-for-sale blogger

– Jawed Karim – YouTube

– Jeff Lieberman

– Jennifer Ouellette– Defamation-for-sale blogger

– Jesse Oxfeld– Defamation-for-sale blogger

– Jessica Cohen– Defamation-for-sale blogger

– Jesus Diaz– Defamation-for-sale blogger

– Jillian Schulz– Defamation-for-sale blogger

– Joanna Rothkopf– Defamation-for-sale blogger

– Joel Johnson, The Glover Park Group

– John Cook– Defamation-for-sale blogger and director of media assassins group

– John Herrman– Defamation-for-sale blogger

– John Raffaelli, Capitol Counsel

– Jordan Sargent– Defamation-for-sale blogger

– Joseph Keenan Trotter– Defamation-for-sale blogger

– Josh Stein– Defamation-for-sale blogger

– Julia Allison– Defamation-for-sale blogger

– Julianne E. Shepherd– Defamation-for-sale blogger

– Julie Domenick, Multiple Strategies LLC

– Justin Hyde– Defamation-for-sale blogger

– Kate Dries– Defamation-for-sale blogger

– Katharine Trendacosta– Defamation-for-sale blogger

– Katherine Drummond– Defamation-for-sale blogger

– Kelly Stout– Defamation-for-sale blogger

– Kerrie Uthoff– Defamation-for-sale blogger

– Kevin Draper– Defamation-for-sale blogger

– Lacey Donohue– Defamation-for-sale blogger

– Larry O’Brien, OB-C Group

– Lucy Haller– Defamation-for-sale blogger

– Luke Malone– Defamation-for-sale blogger

– Madeleine Davies– Defamation-for-sale blogger

– Madeline Davis– Defamation-for-sale blogger

– Mario Aguilar– Defamation-for-sale blogger

– Mark Isakowitz, Fierce, Isakowitz and Blalock. Isakowitz and his GOP lobby shop scored a coup this year when Apple and Facebook both signed up as clients in a two-week span.

– Mark Kadesh, Kadesh & Associates. Kadesh, once chief of staff to Sen. Dianne Feinstein (D-Calif.), has an A-list of California clients

– Matt Hardigree– Defamation-for-sale blogger

– Matt Novak– Defamation-for-sale blogger

– Michael Ballaban– Defamation-for-sale blogger

– Michael Dobbs– Defamation-for-sale blogger

– Michael Spinelli– Defamation-for-sale blogger

– Morrison and Foerster

– Neal Ungerleider– Defamation-for-sale blogger

– Nicholas Aster– Defamation-for-sale blogger

– Nicholas Guido Denton– Defamation-for-sale blogger and head of the Gawker, Gizmodo, Jalopnik sleaze tabloid empire

– Omar Kardoudi– Defamation-for-sale blogger

– Owen Thomas– Defamation-for-sale blogger

– Patrick George– Defamation-for-sale blogger and Character Assassination expert

– Patrick Laffoon– Defamation-for-sale blogger

– Patrick Redford– Defamation-for-sale blogger

– Perkins Coie – Campaign conduit law firm

– Rich Juzwiak– Defamation-for-sale blogger

– Richard Blakely– Defamation-for-sale blogger

– Richard Rushfield– Defamation-for-sale blogger

– Robert Finger– Defamation-for-sale blogger

– Robert Sorokanich– Defamation-for-sale blogger

– Rory Waltzer– Defamation-for-sale blogger

– Rosa Golijan– Defamation-for-sale blogger

– Ryan Brown– Defamation-for-sale blogger

– Ryan Goldberg– Defamation-for-sale blogger

– Sam Faulkner Biddle– Defamation-for-sale blogger, Runs a large part of the Anti-GOP blog programs

– Sam Woolley– Defamation-for-sale blogger

– Samar Kalaf– Defamation-for-sale blogger

– Sarah Ramey– Defamation-for-sale blogger

– Shannon Marie Donnelly– Defamation-for-sale blogger

– Shep McAllister– Defamation-for-sale blogger

– Sophie Kleeman– Defamation-for-sale blogger

– Stephen Totilo– Defamation-for-sale blogger

– Steve Elmendorf and Jimmy Ryan, Elmendorf | Ryan. A former aide to ex-House Democratic Leader Richard Gephardt (Mo.), Elmendorf brought in Ryan to help expand the Senate ties of his firm.

– Steve McBee, McBee Strategic. A former aide to Rep. Norm Dicks (D-Wash.), McBee has seen his lobby firm take off.

– Steve Perry and Andy Wright, Dutko Grayling. Perry and Wright man the roster for one of the top 20 lobby shops in Washington.

– Tamar Winberg– Defamation-for-sale blogger

– Taryn Schweitzer– Defamation-for-sale blogger

– Taylor McKnight– Defamation-for-sale blogger

– The Groundwork– Social manipulation group

– Thomas Jolly, Jolly/Rissler. Jolly is founding chairman of the Washington Caucus, a group that hosts dinners with lawmakers, and a mainstay among lobbyists.

– Thorin Klosowski– Defamation-for-sale blogger

– Tim Marchman– Defamation-for-sale blogger

– Timothy Burke– Defamation-for-sale blogger

– Tobey Grumet Segal– Defamation-for-sale blogger

– Tom Ley– Defamation-for-sale blogger

– Tom Scocca– Defamation-for-sale blogger

– Veronica de Souza– Defamation-for-sale blogger

– Wes Siler– Defamation-for-sale blogger

– William Haisley– Defamation-for-sale blogger

– William Turton– Defamation-for-sale blogger

– Plus others to be named…

### THEIR CORPORATE STOCK MANIPULATION FRONT FACADES- Tracked via financial records and email leaks to RICO, Anti-trust and Money Laundering violations:

 

– Abound Solar – Criminally corrupt crony campaign finance front operation. (Terminated)

– Alphabet – Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier (Under Federal and EU investigation)

– Facebook/Meta – Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )

– Fisker – Criminally corrupt crony campaign finance front operation. (Terminated)

– Google, Inc. – Data harvesting company(Ran media attacks, stock market pump and dump PR hype and character assassinations)(accused of political bribery and kickbacks; tax evasion, and more…) (charged by EU, and most nations, with multiple abuses of the public. Has totally lost the trust of the public. Revenue loss increasing geometrically.)

– In-Q-Tel, Inc. – CIA off-shoot associated with Eric Schmidt, Google, Elon Musk and the Cartel leaders. Ran “hit-jobs” on Silicon Valley VC adversaries and reporters (Sued, under investigation, exposed in multiple documentaries, under investigation for Cocaine trafficking. Removal of charity status demanded)

– Ivanpah Solar – Criminally corrupt crony Google campaign finance front operation. (In failure mode)

– Linkedin – Election manipulation networking site

– Netflix – Propaganda Site that also conduits jobs as political revolving door payola to politicians

– Solyndra Solar Company – FBI-raided corrupt Clean Tech company

– SpaceX – Elon Musk company that Obama gave part of NASA to in exchange for campaign conduits

– Tesla Motors – Car Company that conduits money to campaigns
– Plus others to be named…

 

Any issues re: culpability can be easily resolved in meetings with the FBI, FINCEN, The SEC, The IRS, The FTC, ICIJ.ORG and open Congressional hearings! Never was the term: “Follow The Money” more appropriate than for these people! Why are these people not yet arrested for election manipulation, RICO and Anti-trust violations, money laundering, bribery and other illicit deeds? Who is protecting them? Who is telling the police not to act? This list also serves as a demand for investigation and prosecution of these individuals who conspired to engage in these illicit acts. This is not the complete list….”

 

While opposition entities Pooh Pooh the assertion, FINCEN and top forensic investigators, and their XKEY-SCORE type databases prove that they are all financially and politically closely aligned. Their media group set out to CONTROL THE NEWS AND INFORMAION PERSPECTIVES THAT ARE VIEWED BY OVER 8 BILLION PEOPLE…”, per Google executives and, indeed, that is what they accomplished. The head of the world reknown publication: Psychology Today, Robert Epstein: (born June 19, 1953) is an American psychologist, professor, author, and journalist. He was awarded a Ph.D. in psychology by Harvard University in 1981, was editor in chief of Psychology Today, and has held positions at several universities including Boston University, University of California, San Diego, and Harvard University. He is also the founder and director emeritus of the Cambridge Center for Behavioral Studies in Concord, MA. In 2012, he founded the American Institute for Behavioral Research and Technology (AIBRT), a nonprofit organization that conducts research to promote the well-being and functioning of people worldwide. Epstein has been a commentator for National Public Radio‘s Marketplace, the Voice of America, and Disney Online. His popular writings have appeared in Reader’s Digest, The Washington Post, The Sunday Times (London), Good Housekeeping, The New York Times, Parenting, and other magazines and newspapers. Epstein is a public figure in the world of psychology.[1][2][3][4] He has published over 350 articles and 15 books. His online competency tests are taken by more than a million people a year.[5] . He has testified before Congress to facts herein.

In fact Every one of the insiders who did get government funding got it in the exact same size and order as their covert political campaign funding and stock market bribes to the deciders. Chamath Palihapitiya and other Silicon Valley insiders have now exposed the fact that Greylock, Kleiner, etc. are just a VC Ponzi Scheme! in this whole mess. Musk used crooked Senators to get his funds. Those Senators and government agency bosses were financed by, friends with, sleeping with, dating the staff of, holding stock market assets in, promised a revolving door job or government service contracts from, partying with, personal friends with, photographed at private events with, making profits by consulting for, exchanging emails with, business associates of or directed by; one of those business adversaries, or the Senators and politicians that those business adversaries pay campaign finances to, or supply political search engine manipulation services to. Elon Musk is notorious for getting Department of Energy money by bribing public officials and placing his friends: Steven Chu, Matt Rogers, Steve Westly, Steve Spinner’s ‘special friend’, etc. on the staff of the Department of Energy and in the White House. We have FBI-class records, financial tracking, emails, stock market relay records and other forensic data that proves it. We can swear, warrant, certify and prove these assertions in front of Congress in a live Congressional hearing or Civil Jury trial, given non-compromised legal backing.

While these CIA, FSB and NSA tactics are pooh poohed by media shills as “Hollywood Fare”, The White House is well documented, in Congressional investigations, doing these very things.

Opposition has argued that these “fantastic” assertions are “here-say” and that no citizen “should think that any government official would ever do anything unethical;..”

That argument might have worked…UNTIL THIS WEEKEND:

A MASSIVE TROVE OF HARD PHYSICAL EVIDENCE SHOWING THE WHITE HOUSE AND TOP GOVERNMENT OFFICIALS USING TWITTER, GOOGLE, FACEBOOK, YOUTUBE, GAWKER AND GIZMODO MEDIA TO ATTACK OTHERS AND RIG ELECTIONS HAS BEGUN TO BE RELEASED! NEW CONGRESSIONAL INVESTIGATION HAVE BEEN LAUNCHED BECAUSE OF THESE DISCLOSURES. PLAINTIFF IS A WITNESS IN THESE INVESTIGATIONS. MUCH MORE EVIDENCE WILL BE LEAKED THIS MONTH BY MAJOR NEWS OUTLETS.

A SMALL SAMPLE OF THIS BREAKING NEWS FOLLOWS:

 

 

Musk Says TWITTER Gave Preference To Leftists During Brazil Election In Order To Rig Election Results...

 

…Shoshana Zuboff’s, The Age of Surveillance Capitalism – Why Twitter, Google, Facebook, Instagram, YouTube, Netflix, Alphabet are the SAME Thing, The SAME SICKO tech elites and the same kinds of social privacy RAPE against citizens for government official’s stock market profiteering!

https://www.contagious.com/news-and-views/shoshana-zuboff-on-the-age-of-surveillance-capitalism

…”

 

SHOCKER: TWITTER, GOOGLE, FACEBOOK, YOUTUBE, INSTAGRAM ALL FOUND TO HAVE MANIPULATED NATIONAL ELECTIONS

 

Democrats lawmakers blasted Twitter for failing to censor MORE content after New York Post Hunter Biden laptop scandal – with lawmakers claiming ‘free speech isn’t absolute’

  • Journalist Matt Taibbi Friday began publishing the internal Twitter documents
  • They showed the shocking political influence on content moderation at the site
  • Taibbi conducted his probe with the cooperation of new Twitter chief Elon Musk
  • Emails showed staffers censoring tweets at the behest of the Joe Biden’s team
  • His campaign made requests for tweets to be taken down – and Twitter complied

What did the President know and when did he know it? Musk releases Hunter Biden laptop files that reveal Twitter execs replied ‘handled’ to requests from ‘Biden team’ to delete tweets – as Trump demands election result is thrown out 

 

Pressure is now mounting on Joe Biden after Elon Musk revealed that Twitter execs responded ‘handled’ to requests from the President’s team to remove content about Hunter Biden’s leaked laptop files. Twitter’s CEO ceremoniously revealed the back-end messages – which seemed to show members of Biden’s inner circle attempting to remove criticism about his son from the platform before the 2020 election. Following the sensational revelations last night, Donald Trump has yet again demanded the 2020 results be void and have the country declare him the rightful winner. Musk also suggested that the social media giant – which he was not in charge of at the time – was taking orders from the federal government following the barrage of tweets he posted, under the name the ‘Twitter Files.’ The leaked correspondence contained damning insider communications that predate Musk’s ownership, which provided insight to the dissent and confusion seen within the company as it responded to reporting on the scandal in October 2020. The emails provided new detail on Twitter’s shady censorship decision, which Musk said was made behind the scenes ‘at the highest levels of the company’ at the behest of Biden officials, and ‘based upon thousands of internal documents obtained by sources at Twitter.’ Following the ordeal last night, Trump spoke out: ‘So, with the revelation of massive and widespread fraud and deception in working closely with Big Tech Companies, the DNC, and the Democrat Party, do you throw the Presidential Election Results of 2020 out and declare the rightful winner, or do you have a new election? A massive fraud of this type and magnitude allows for the termination of all rules, regulations, and articles, even those found in the Constitution. Our great ‘Founders’ did not want, and would not condone, false and fraudulent elections!’

 

By Josh Boswell and Paul Farrell

Files showing Twitter’s suppression of the Hunter Biden laptop scandal were released on the social media giant today.

The documents include internal Twitter emails appearing to show staffers censoring tweets at the behest of the Joe Biden 2020 presidential campaign.

Weeks ahead of the election in October 2020, Twitter prevented sharing of a story about Hunter’s involvement with a Chinese oil giant – and his then-presidential candidate father Joe Biden’s potential slice of a multi-million-dollar deal with the foreign firm.

Emails between Twitter staffers show them censoring people sharing the story, including the White House Press Secretary Kayleigh McEnany, citing their ‘hacked materials policy’.

Elon Musk, the billionaire owner of Twitter, gave journalist Matt Taibbi access to the explosive documents, which he began to publish excerpts of on the social media site on Friday evening.

Twitter also allegedly used blocks in an attempt to halt the spread of the story, published in October 2020 weeks before the election, including tactics usually reserved for preventing the sharing of child porn.

Amid the scramble to limit sharing of the New York Post’s Hunter story, Taibbi claimed emails showed Dorsey intervening multiple times to question the censorship.

The journalist also added that he had not seen any evidence that the federal government had a role in suppressing the story.

However, in a recent interview with Joe Rogan, Facebook founder Mark Zuckerberg admitted that his company received a briefing from the FBI ahead of the 2020 election warning of disinformation campaigns.

The briefing led to Facebook being on high alert for Russian propaganda – which Hunter’s laptop was initially tarred as by top former intelligence officials, until DailyMail.com proved it was real.

Elon Musk, the billionaire owner of Twitter, gave journalist Matt Taibbi access to the explosive documents, which he began to publish excerpts of on the social media site on Friday evening

Twitter CEO Elon Musk has promised that: ‘What happened with the Hunter Biden story suppression by Twitter will be published on Twitter at 5pm ET!’

Emails showed recommendations from the DNC to review certain tweets on the social media giant

Another message showed more requested to be looked at from the Biden team in October 2020

There were requests from the Biden and Trump team, but the vast majority were shown to be from Democrats

Public policy executive Caroline Strom asked staff what was the cause for the story being blocked

Elaine from the comms global escalations team replied, claiming the story breached Twitter’s hacked materials policy

Former Trust and safety chief Yoel Roth was roped into the email chain, as well as legal chief Gadde

Communications official Trenton Kennedy writes: ‘I’m struggling to understand the policy basis for marking this as unsafe’

White House spokeswoman Kaleigh McEnany was locked out of her account for tweeting about the story

Taibbi, a popular podcaster and former Rolling Stone politics correspondent, shared one October 14 2020 email from Donald Trump’s campaign team to Twitter staff complaining that McEnany had been locked out of her account ‘for simply talking about’ the New York Post story.

Twitter’s public policy executive Caroline Strom forwarded the email to an ‘ops analyst’ at the social media company, who wrote back that: ‘the user was bounced by Site Integrity for violating our Hacked Materials policy.’

At that time, the Biden campaign had not disputed the veracity of the material from Hunter’s abandoned laptop, which DailyMail.com later authenticated using top cyber forensics experts.

Taibbi wrote then-CEO Jack Dorsey was unaware of the censorship, but alleged that an executive, ‘former head of legal, policy and trust’ Vijaya Gadde, played a ‘key role’.

They just freelanced it,’ one former employee told the podcaster. ‘Hacking was the excuse, but within a few hours, pretty much everyone realized that wasn’t going to hold. But no one had the guts to reverse it.’

Everyone knew this was f***ed,’ an anonymous ex staffer reportedly told Taibbi.

Emails showed internal arguments breaking out among senior Twitter staff over the suppression of the Post’s story – which included lurid details of Hunter’s escapades with prostitutes and hard drugs, as well as worrying evidence of potential corruption involving Ukrainian gas company Burisma and his links to Chinese firms.

Taibbi wrote then-CEO Jack Dorsey was unaware of the censorship, but alleged that an executive, ‘former head of legal, policy and trust’ Vijaya Gadde (pictured glaring at Musk when he took over), played a ‘key role’

 

Former Twitter CEO Jack Dorsey is pictured last year in Miami. He was apparently kept out of discussions over the Hunter Biden laptop story

One staffer, Trenton Kennedy, allegedly wrote: ‘I’m struggling to understand the policy basis for marking this as unsafe.’

I think the best explainability argument for this externally would be that we’re waiting to understand if this story is the result of hacked materials. We’ll face hard questions on this if we don’t have some kind of solid reasoning for marking the link unsafe.’

Another, Katie Rosborough, shot back with a link to a Fox News article about Hunter’s laptop, asking: ‘will we also mark similar stories as unsafe?’

The internal discussions showed that despite admitting ‘the facts remain unclear’, Twitter decided on ‘preventing this content from being amplified.’

One staffer, Ian Plunkett, wrote that the site should be ‘cautiously interpreting this through the lens of our hacked materials policy and allowing the link with a warning and a significant reduction of spread.’

Even senior executives were questioning the veracity of the claims the laptop material was hacked.

Former VP of global communications Brandon Borrman, wrote: ‘To Ian’s point, can we truthfully claim that this is part of the policy? i.e. As part of our approach to addressing potentially hacked materials, we are limiting visibility of related stories on Twitter while our investigation is ongoing.’

The censorship even caused one Democrat Congressman Ro Khanna to write to Gadde that it was ‘generating huge backlash on hill re speech’ – referring to concerns in Washington DC over limitations on free speech being imposed by Twitter.

In the heat of a Presidential campaign restricting dissemination of newspaper articles (even if NY Post is far right) seems like it will invite more backlash than it will do good,’ Khanna wrote.

Research firm NetChoice wrote to Twitter’s head of Public Policy Lauren Culbertson the next day on October 15 2022, warning that ‘both Democrats and the Republicans were angry’ about the suppression, according to the emails obtained by Taibbi.

NetChoice general counsel Carl Szabo told Culbertson one congressional staffer even described the debacle as ‘tech’s Access Hollywood moment’ – referring to a leaked tape of Donald Trump saying he grabbed married women ‘by the p***y.

Among the most shocking emails is an exchange between two staffers, showing the Biden campaign were making requests for Tweets to be taken down, and Twitter was duly complying.

More to review from the Biden team,’ one staffer wrote on October 24, days ahead of the presidential election, listing five tweets. ‘Thanks all.’

Handled these,’ another replied three hours later.

Taibbi wrote that the Trump campaign had takedown requests granted too, but reported that staffers were taking far more from Biden’s team.

By 2020, requests from connected actors to delete tweets were routine,’ he wrote. ‘Celebrities and unknowns alike could be removed or reviewed at the behest of a political party.

Both parties had access to these tools. For instance, in 2020, requests from both the Trump White House and the Biden campaign were received and honored.

However: this system wasn’t balanced. It was based on contacts. Because Twitter was and is overwhelmingly staffed by people of one political orientation, there were more channels, more ways to complain, open to the left (well, Democrats) than the right.’

He shared statistics from OpenSecrets, showing political donations by Twitter staff were between 96% and 99% to Democrats, with a total $909,431 given to Democrats in the 2020 election cycle and just $14,137 to Republicans by individuals linked to the company.

 

 

  •  

  •  

  •  

 

  •  

  •  

 

In the email to Culbertson, Szabo wrote that he had polled several lawmakers and their staff on the Hill, and that some Democrat lawmakers were less concerned about the First Amendment.

The Democrats were in agreement: social media needs to moderate more because they’re corrupting democracy and making all ‘truth’ relative,’ Szabo wrote. ‘When pushed on how the government might insist on that, consistent with the First Amendment, they demurred: ‘the First Amendment isn’t absolute.’

According to the emails, Twitter was feeling the heat from both sides of the political aisle: Republicans livid over censorship, and Democrats complaining the site ‘doesn’t moderate enough harmful content so when it does… it becomes a story.’

Szabo wrote that Democrat lawmakers ‘complained that the companies are inept: They let conservatives muddy the water and make the Biden campaign look corrupt even though Biden is innocent.’

They linked this to Hillary Clinton’s email scandal: she did nothing wrong but because the press wouldn’t let the story go, it became a scandal far out of proportion,’ Szabo added in his email to the Twitter executive.

In their mind, social media is doing the same thing: it doesn’t moderate enough harmful content so when it does, like it did yesterday, it becomes a story. If the companies moderated more, conservatives wouldn’t even think to use social media for disinformation, misinformation, or otherwise.’

Musk’s choice to grant behind-the-scenes access to Taibbi may be interpreted as a sign of his unfavorable views of major media organizations.

The journalist has written books critical of cable news on both the right and left of the political spectrum, accusing both MSNBC and Fox of polarizing the country.

He has said he admires liberal firebrand Bernie Sanders, but also has enraged left wing activists by slamming cancel culture.

He also was critical of Twitter’s suppression of the Biden scandal from the beginning.

On October 24 2020, about a week after the story about Hunter’s abandoned laptop and its shocking contents broke, Taibbi wrote a post on his substack titled: ‘With the Hunter Biden expose, suppression is a bigger scandal than the actual story’.

The piece was sent by Dorsey to his head of legal Gadde, one of the Twitter internal emails shows.

In a tweet on Friday evening, Musk accused the Twitter staffers: ‘If this isn’t a violation of the Constitution’s First Amendment, what is?’

Taibbi wrote that according to his sources, censoring tweets because they shared ‘hacked materials’ usually required an official finding of a hack by law enforcement, but that policy was abandoned with Hunter’s laptop.

In an email the day after the story broke, one executive allegedly wrote to staff admitting that the New York Post and the Trump campaigns tweets had been censored, among others.

Twitter actioned Tweets yesterday relating to two NY Post articles that were tweeted out that allegedly included pictures and screenshots of emails from a laptop that allegedly belonged to Hunter Biden, Presidential candidate Joe Biden’s son,’ the alleged internal Twitter email shared by Taibbi said.

Our teams made the determination that the materials fall under our Hacked Materials Policy, in addition to sharing personal information, so links were actioned. As you may know, this existing policy framework was launched in 2018 to mitigate real-time harm based on hack and leak scenarios coming out of the 2016 election.

I know there are questions that you probably have and are also probably getting a lot of incoming from stakeholders – governmental, academic, civil society, etc. The last 24 hours certainly has been a whirlwind with lots of curves and unknowns and we fully expect that the issues surrounding this matter will continue to swirl in the coming days so thank you to everyone for your patience.’

Musk had earlier promised: ‘What happened with the Hunter Biden story suppression by Twitter will be published on Twitter at 5pm ET!’

Musk sent out the tweet announcing the publishing of the report around 4:00 pm on Friday

The South African billionaire followed that up with a message reading: ‘This will be awesome’ accompanied by a popcorn emoji.

He went on to say that the publishing will be accompanied by a live question and answer session. It’s not clear who will be featured in the session.

Musk said the publication of the internal Twitter documents was ‘necessary to restore public trust’ in the site, after it deliberately prevented users from sharing links to a front-page newspaper article about Hunter’s private life and his controversial business ties to Ukraine in the run-up to the 2020 election between Biden’s father and Donald Trump.

The New York Post first published documents and photos in October 2020 from Hunter’s laptop which he abandoned at a Delaware computer store a year earlier.

Sensational emails showed Hunter’s involvement in a multi-million deal with a Chinese oil giant, and references to Joe Biden allegedly having his own 10% stake in the deal.

They showed the then-Vice President met with Hunter’s foreign business partners, including an executive at Ukrainian gas firm Burisma.

The Post published excerpts of emails and photos from the laptop ahead of the 2020 election. But without authentication, they were widely dismissed as fake or ‘Russian disinformation’, and suppressed by social media sites including Twitter and Facebook.

DailyMail.com was the first to prove that the laptop and its files were real in April 2021, using a forensic analysis by top experts who founded the FBI’s cyber forensics unit.

Its contents then became a trove for outlets to report on.

In a November 2020 testimony to Congress, Twitter founder Jack Dorsey said: ‘We were called here today because of an enforcement decision we made against the New York Post based on a policy we created in 2018 to prevent Twitter from being used to spread hacked materials. This resulted in us blocking people from sharing a New York Post article publicly or privately.’

He continued: ‘We made a quick interpretation using no other evidence that the materials in the article were obtained through hacking, and according to our policy, we blocked them from being spread. Upon further consideration, we admitted this action was wrong and corrected it within 24 hours.’

 

Elon Musk said Twitter would be releasing files on its own ‘free speech suppression,’ in a tweet on Monday

On Wednesday, Yoel Roth, the former head of trust and safety at Twitter admitted that the company made a mistake when censoring the Hunter Biden laptop story.

Roth resigned in November following Musk’s $44 billionaire takeover of the company. He said the authenticity of the New York Post’s laptop story was difficult for the social media company to verify, and it was quickly censored in October 2020.

Speaking at an interview with journalist Kara Swisher, Roth said: ‘We didn’t know what to believe, we didn’t know what was true, there was smoke—and ultimately for me, it didn’t reach a place where I was comfortable removing this content from Twitter.’

But it set off every single one of my finely tuned APT28 hack and leak campaign alarm bells. Everything about it looked like a hack and leak.’

Roth’s comments come as Musk is set to release files on Twitter’s ‘free speech suppression,’ which is expected to include details on the censorship of the laptop story.

John Paul Mac Isaac, the owner of the computer store where Hunter abandoned his laptop, gave a copy of its hard drive to Donald Trump’s lawyer Rudy Giuliani in September 2020.

Giuliani reportedly leaked documents and photos from the drive to the New York Post, and also gave a whole copy of the drive to Trump’s former advisor Bannon and his podcast co-host Maxey.

The Post published excerpts of emails and photos from the laptop ahead of the 2020 election, but without authentication, they were widely dismissed as fake or ‘Russian disinformation.’

DailyMail.com eventually proved that the laptop and its files were real, and its contents became a trove for outlets to report on.

Roth repeatedly claimed on Wednesday that despite the alarm bells ringing, he never believed the story should’ve been censored.

So it was a mistake?’ Swisher asked.

In my opinion, yes,’ he responded.

  •  

Elon Musk is expected to disclose the full details of Twitter’s 2020 censorship of the New York Post’s reporting on Hunter Biden’s laptop

Twitter’s former head of trust and safety noted that social media platforms were on high alert in 2020, saying that both he and Meta CEO Mark Zuckerberg were warned by the FBI about foreign propaganda and misinformation ahead of the election.

Roth is the latest to criticize the company’s decision after former CEO Jack Dorsey said last year that it was a ‘total mistake.’

We made a total mistake with the New York Post, we corrected that within 24 hours,’ Dorsey said during a meeting with lawmakers. ‘It was not to do with the content, it had to do with a hacked materials policy, we had an incorrect interpretation.’

Both and Roth and Dorsey have not said who it was that ultimately oversaw the censorship of the story.

Democrats lawmakers blasted Twitter for failing to censor MORE content after New York Post Hunter Biden laptop scandal – with lawmakers claiming ‘free speech isn’t absolute’ 

 

Elon Musk has released explosive files detailing how bosses at Twitter suppressed the New York Post’s factual story about Hunter Biden’s laptop in the run-up to the 2020 election. A Twitter thread shared with Musk’s blessing by author Matt Taibbi pinned the blame on Twitter’s former head of legal Vijaya Gadde, who was fired shortly after Musk bought the firm last month. Taibbi says many top Twitter bosses immediately knew they’d overstepped the mark in censoring the Post’s story, but that they did not have the ‘guts’ to immediately reverse their decision.

The FBI is broken’: GOP drops 1,000-page report saying Bureau is ‘rotten at its core’, manipulated domestic violent extremism stats for political purposes, and deliberately downplayed ‘serious allegations of wrongdoing’ from Hunter Biden

 

Republicans on then House Judiciary Committee released a 1,000-page report on the politicization and misconduct in the FBI. The damning file said the bureau is ‘rotted at its core’, manipulated domestic violent extremism statistics for political purposes and downplayed investigations and ‘serious allegations of wrongdoing’ levelled at Hunter Biden. ‘The Federal Bureau of Investigation, under the stewardship of Director Christopher Wray and Attorney General Merrick Garland, is broken,’ the GOP report states. ‘The problem lies not with the majority of front-line agents who serve our country, but with the FBI’s politicized bureaucracy.’

Big Tech lawsuit has uncovered one of the most disturbing revelations yet about social media companies’ collusion with law enforcement agencies to police speech on the Internet.

Missouri Attorney General Eric Schmitt, one of the attorneys general that filed the lawsuit, disclosed an overview of FBI agent Elvis Chan’s testimony on ‘weekly meetings’ about censoring Internet posts ahead of the 2020 election.

In our deposition of FBI agent Elvis Chan on Tuesday, we found that the FBI plays a big role in working with social media companies to censor speech – from weekly meetings with social media companies ahead of the 2020 election to asks for account takedowns,” Schmitt wrote in a Twitter thread.

Chan, the FBI’s FITF, and senior CISA officials had meetings with social media companies in the lead-up to the 2020 election, in which Chan personally told the social media companies that there could potentially be a Russian ‘hack and leak’ operation shortly before the election,” he continued. “Those meetings were initially quarterly, then monthly, then weekly heading into the 2020 election.”

Chan stated that the FBI regularly sent social media companies lists of URLs and social media accounts that should be taken down because they were disinformation from ‘malign foreign influence operations’,” Schmitt went on. “The FBI then inquired whether the platforms have taken down the content. On many occasions, the platforms took down the accounts flagged by the FBI.”

Chan testified because of the agent’s extensive knowledge of the FBI’s interaction with social media companies, the judge in the case stated.

Chan had authority over cybersecurity issues for the FBI in the San Francisco, California region which includes the headquarters of major social-media platforms and played a critical role for the FBI in coordinating with social-media platforms related to censorship,” Judge Terry A. Doughty wrote in his court order.

Even if Chan played no role in the Hunter Biden laptop communication issue, he may have knowledge of who did, and his deposition is nonetheless warranted,”

On Friday night, Twitter released a trove of internal documentation about the social media platform’s coordination with Biden campaign staff and DNC officials ahead of the 2020 election. But one thing was missing, as pointed out by New York Post columnist Miranda Devine.“Elon Musk half-delivered on his promise to tell all about Twitter’s censorship of The New York Post’s Hunter Biden laptop story before the 2020 election,” Devine said. “What was missing were details of specific warnings we know the FBI made to Twitter about a Russian ‘hack and leak operation’ involving Hunter during their weekly meetings with top executives of the social media giant in the days and weeks before The Post published its exclusive bombshell.”

We know that FBI Supervisory Special Agent Elvis Chan testified Tuesday in a lawsuit against the Biden administration brought by Republican attorneys that he organized those weekly meetings with Twitter and Facebook in San Francisco for as many as seven Washington-based FBI agents in the run-up to the 2020 presidential election,” she noted.

Taibbi said he had been shown no evidence of the collusion between the FBI and Twitter that we know occurred,” she added.

Although several sources recalled hearing about a ‘general’ warning from federal law enforcement that summer about possible foreign hacks, there’s no evidence — that I’ve seen — of any government involvement in the laptop story,” Taibbi remarked.

But we know from Mark Zuckerberg’s interview with Joe Rogan, and subsequent testimony before Congress, that the FBI was deeply involved in policing information ahead of the 2020 election, especially the Hunter Biden laptop story.

So, we took a different path than Twitter,” Zuckerberg said. “I mean, basically the background here is the FBI, I think, basically came to us some, some folks on our team and was like, ‘Hey just so you know, like you should be on high alert. There was… we thought that there was a lot of Russian propaganda in the 2016 election. We have it on notice that basically there’s about to be some kind of dump of — that’s similar to that. So just be vigilant.’”

So our protocol is different from Twitter’s,” he went on. “What Twitter did is they said ‘you can’t share this at all.’ We didn’t do that. What we do is we have — if something’s reported to us as potentially misinformation, important misinformation, we also use this third party fact-checking program, ’cause we don’t want to be deciding what’s true and false. And for, I think it was five or seven days when it was basically being being determined, whether it was false, the distribution on Facebook was decreased, but people were still allowed to share it. So you could still share it. You could still consume it.”

Can we say the distribution is decreased… how does that work?” Rogan asked.

It… basically the ranking in newsfeed was a little bit less, so fewer people saw it than would’ve otherwise,” Zuck replied.

By what percentage?”

I don’t know off the top of my head,” Zuck answered. “But it’s meaningful. But I mean, basically a lot of people were still able to share it. We got a lot of complaints that was the case. You know, obviously, this is a hyper-political issue. So, depending on what side of the political spectrum, you either think we didn’t censor it enough or censored it way too much. But we weren’t sort of as black and white about it as Twitter, we just kind of thought, ‘Hey look, if the FBI — which I still view as a legitimate institution in this country, it’s like very professional law enforcement — they come to us and tell us that we need to be on guard about something.’ Then I want to take that seriously.”

Did they specifically say you need to be on guard about that story?” Rogan asked.

No, I don’t remember if it was that specifically,” Zuckerberg said. “But… it basically fit the pattern.”

But Facebook wasn’t done doing the Democratic Party favors during the 2016 election. Multi-billionaire owner Mark Zuckerberg spent hundreds of millions on “Zuckerberg boxes” that disproportionately benefited Democrats, as the Thomas More Society documented in a 2020 report.

Thus, Twitter, Facebook, and Big Tech companies like it, acted like censors for the United States government instead of private, independent companies. The actions raise serious questions about constitutional violations of Americans’ rights, respect for freedom of the press, and 2020 election interference.

 

HIRED TO KILL – THE CYBER ASSASSINS HIRED BY WHITE HOUSE STAFF

 

– A Report To Federal Investigators And The Public

A group of companies and individuals sell cyber assassination services designed to end people’s lives. When we spoke with California Senators Speier, Pelosi, Feinstein and Harris; their staff said that they refuse to regulate such activities because it would violate “Freedom Of Speech”. We also noticed that THEY hire these cyber assassins to attack political enemies, reporters, competitors and whistle-blowers. We asked about that conflict-of-interest. They did not respond… We then asked: “If it is OK for these people to engage in the attacks listed herein, (see the ATTACKERS PLAY-BOOK list; Below), are you OK with them doing all of these things to YOU for the next 5 years?”

They did not respond…

The attackers, (ie: The White House and Government agency staff) set-up a tentacular, layered, covert payment and command/control system in order to operate and disguise their attacks on citizens, reporters, whistle-blowers and competitors. The problem, for these “Bad Guys” in the post-2000 era, is that nothing can be hidden, any longer, because digital technology monitors everything. It is said that “DEEDS DONE IN THE DARK, ALWAYS COME TO LIGHT” and, in this case, that turns out to be quite accurate.

Have you ever wondered who’s pulling the strings?”

Hired cyber assassins hide in the shadows at the tip of the spear of political and market monopoly wars. … Anything they touch is a weapon. They are government-trained to deceive, persuade, change, influence, and inspire others to their ideology. They come in many forms: from fat gamer neck-beards to attractive business suit corporate brunettes. They are everywhere that money buys vengeance.

They spy on you to manipulate your politics, ideology and intentions and to report you to bill collectors, tax colletors, investigators and political parties. The spy, on, and harm you and your company if you speak out about corruption and if your product is better than their bosses product. They help peole who cheat rather than compete.

Google, Netflix, YouTube, Facebook, etc. exist to mass manipulate populations and run stock market scams for their sociopath owners. Even these big companies covertly sell their services as cyber assassins to certain buyers for huge amounts of government wire transfers. From INSIDE Google, our team saw Google manipulate the entire internet to hype up Larry Page’s “boyfriend’: Elon Musk and Tesla, which Google execs owned a portion of, while sabotaging Tesla’s competitors. Google illicitly and illegally timed these manipulations with stock market pump-and-dump efforts to exploit insider trading. That is a felony violation of RICO, Antitrust and other laws. Every single thing that Google does is contrived to harm a competitor, a politician, an employee whistle-blower or some other business adversary.

There are no “bugs”, “operator errors”, “server anomalies” or other media “accidents” at Google, Facebook, Youtube, Twitter, et al

 

 

 

 

 

 

Everything Google, etc, does is contrived, at a psychological warfare kind of level, to change a social perception. Google must show its software to FBI, SEC, FTC and our search engine optimisation experts to prove that they did not engage in these crimes. The fact is: We can prove they did the crimes and FBI experts can help us prove it! Google is known as the “Nazi’s of the Internet”.

In a case unfolding in Britain over whether Google wrongly demoted price comparison rival Foundem from its search results in favour of paid-for adverts, Google must now decide which it values more: the algorithms that rank its search results, or its stance that manually fiddling with those results to promote its own paid-for products over rivals’ sites doesn’t break competition laws.

The integrity of Google’s ranking processes relies upon all webmasters or website owners having the same degree of access to information about Google’s ranking… This will no longer be the case if information of this kind is made available to some individuals offering commercial services to assist companies to improve their Search ranking.

Google is a criminal operation. It’s executives have been publicly exposed as participants in horrific sex scandals, money laundering, political bribery and racism. It is time for the bought and paid shill politicians to stop protecting them! – Google spies on competitors and steals their technology – Google runs tens of millions of dollars of defamation attacks against competitors – Google hides all media and news coverage for competitors of Larry Page’s boyfriend: Elon Musk – Google lies to the public about what they really do with the public’s data –

Google promotes illegal immigration in order to get cheap labor and control votes – Google runs VC funding back-lists against start-ups that are competitive – Google bribes thousands of politicians – Google is a criminal RICO-violating monopoly – Google rigs the stock market with Flash-boy, Pump/Dump and Microblast SEC violating computer tricks – Google pays bribes to politicians in Google and YouTube stock – Google manipulates who gets to see what web-sites, globally, for competitor black-lists – Google has a “no poaching” Silicon Valley jobs blacklist –

Google bosses sexually abuse women and young boys – Google bosses run sex trafficking operations in the Epstein and NXVIUM cults – Google bosses control the NVCA financing cartel over start-ups – Google has placed the majority of the corporate staff in at least one White House – Google controls national elections for anti-competitive purposes – The company “Polyhop”, in the HOUSE OF CARDS tv show, does all the crimes that Google actually does in reality – Google’s law firms, like Wilson Sonsini, are corrupt conduits for payola and political conduit-relays –

Google bribes some politicians with revolving door jobs – Google is primarily responsible for destroying the Bay Area Housing opportunities – Google runs DDoS attacks on competitors by massively crawling their sites – Google boss Andy Rubin runs a sex slave farm according to his own family – Google boss Eric Schmidt was a philandering sex-penthouse owner according to vast news articles – Google executives hire so many hookers that one of them, Mr. Hayes, was killed by his hooker –

Google executives sexually abuse so many women that the women staff of Google walked out one day – In the 2009 White House, you could not swing a cat without hitting a Google insider – Google has paid covert bribes, PAC funds, real estate and search rigging payola to every CA Senator – Google has paid bribes, through its lobby fronts, to halt FBI, SEC, FEC and FTC investigations of Google crimes – Google was funded by the CIA, via In-Q-Tel, a so called “501 c3 charity” which was caught with tons of cocaine – Google gets millions of dollars of taxpayer cash for spying on Americans inside the USA – Google’s map service was a spy system paid for by taxpayers money that Google now profits off of –

Nancy Pelosi and Dianne Feinstein have promised to “protect” Google because their families profit off Google stocks – Payment receipts prove that Google and Gawker/Gizmodo exchanged cash and staff for Character Assassination attacks – Google VC’s and bosses have spent $30M+ rigging the U.S. Patent Office to protect Google and harm Google competitors –

Google bribed it’s lawyer into position as head of the U.S. Patent office in order to have her protect Google – To rig insider stock trades, Google hides negative Tesla stories and pumps positive Tesla stories on “push days” – Google and Elon Musk Co-own, co-invest and co-market stocks covertly while running anti-trust schemes – Google rarely likes, or hires, black employees per federal and news media investigations – Google hired most of the Washington, DC K Street lobby firms and told them to “do what ever they could” – The film: “Miss Sloane” depicts only 2% of the illicit lobbying tactics Google employs daily –

Demands for an FTC and FBI raid of Google, for criminal activity, securities law and election felonies have been filed – Google’s David Drummond had his Woodside, CA Quail Road house bugged revealing sex and financial misdeeds – Google, and it’s Cartel (Alphabet, Youtube, and hundreds of other shell-company facades) are a criminal organization engaged in felony-class crimes. Google’s bosses bribe politicians, regulators and law enforcement officials to hold off prosecution.

At Google: Kent Walker, Andy Rubin, Larry Page, Eric Schmidt, Sergy Brin, Jared Cohen, Yasmin Green, David Drummond and Ian Fette are so enmeshed in sex scandals, election manipulation, and White House bribes that it is hard to comprehend how they can get any legitimate work done. Google executives came from most of the fraternity houses involved in the college rape scandals. Google sells covert character assassination services to politicians and fellow oligarchs. Youtube/Google/Alphabet/Deep State are all the same entity. They conspire to hide news about their corruption and they control most of the internet.

There are hundreds of millions of people in America. The same 120 of them are all involved in operating the same crimes and corruption including: the Sony Pictures corruption; the Afghanistan rare earth mine scandals operated through The Energy Department political slush fund that involves the lithium battery cover-ups (headed by Elon Musk); the Big Tech Brotopia rape, sex trafficking, bribery, exclusionism, racism and misogyny issues they were taught at Stanford University; The Facebook – Meta – Google – Alphabet – Netflix, et al, coordinated news manipulation and domestic spying that they engage in; the hiring of Fusion GPS – Black Cube – Gizmodo/Gawker assassins; the destruction of the housing market by their mass real estate manipulations; patent theft and industrial espionage; and the bribery of almost every politician all the way up to the Oval Office.

So, while the categories covered in this investigation may seem diverse. They are connected through an enterprise of criminality and illicit, coordinated operations. We list, by name, the 120 most complicit individuals organizing these crimes, in the evidence documents already submitted to the FBI, FINCEN, DOJ, FTC, SEC, FEC, Congress, InterPol and other authorities. Digital financial tracking of those persons and all of their family members should be assumed to have been under way for some time. Wire-taps and device taps of those persons and all of their family members should be assumed to have been under way for some time.

Twitter, Splunk, Google, Facebook, Netflix, YouTube and the Silicon Valley internet Cartel serve you custom manipulated content by automatically creating a covert digital dossier on you reflecting the content consumption preferences they have spied on about you. They continually evolve their dossier on you in order to steer you towards their ideology and their Democrat political party. At these companies, “data mining”, “machine learning” and “AI” means computerized propaganda processing for certain political entities. They began hiring off-shore people (because they would work so cheap) but most of those people turned out to be Muslim. This created conflicts with the entire southern part of the United States (which is anti-Muslim) because those workers steered content to pro-Muslim positions.

Their spy dossier on you uses abstract content-specific features of the consumed content, such as categories, topic models, and entities, which they automatically extract using natural language processing by comparing every word you use to a giant computer library of what those words might mean about your psychology. So it’s like you are getting “mind-raped” without any penis use. Their assessment of what your words might mean is based on what rich, white male, $200K/year, DNC-promoting programmers think they might mean. Their computers scale and expand their tools with algorithmic software created by those politically and socially biased frat white boys that wrote the code. It is all biased as hell. They never hire blacks or women in system creation roles so everything these companies do only supports rich white soyboy snowflake type gamer thinking.

Because the White House told them to spy on billions of people, even for these web giants, it is impractical to store the entire dynamic history of a user’s interaction features. They, thus, out of greed, use algorithms that selectively decay information in order to generalize users and populations. To them, you are just a generalized data point, like cattle on a ranch, to be harvested and fed upon by Silicon Valley.

These cyber assassin attackers are often fired CIA staffers and disgruntled and naive news bloggers from Gawker, Buzzfeed, etc. They conduct influence activities to target psychological vulnerabilities and create or intensify fissures, confusion, and doubt in adversaries.

They use all available means of dissemination – from sensitive and high tech, to low-tech, to no-tech, and methods from overt, to clandestine, to deception.

These PSYOPS attackers are trained to confuse, mislead, redirect, and occupy your mind with thoughts that a targeted candidate, reporter or whistle-blower is “bad” or to be shunned.

They are ghosts in the machine, watching and warping everything to trick you into hating someone that might tell the truth about them, or their bosses,

A site known as The Vigilant Citizen suggests believes their intent may be darker, and possibly related to the occult. These allusions to magic are not merely figurative. PSYOPS extensively researched occult and supernatural phenomenons such as ESP (extra-sensory perception) and remote viewing,” Vigilant Citizen reports. “There was always a ‘magical’, supernatural element to PSYOPS. The 4th Psychological Operations Group has a Task & Purpose report which is a master class in psychological warfare. A big part of the attackers psychological operations is creating persuasive fake news media. One wonders who Americans should be most afraid of: foreign powers or their own government.

Law enforcement agencies, intelligence agencies and private investigators have identified these attackers complicit in this matter.

A lifetime analysis of the published work, payments and who paid them, often via covert payment routes, conducted at an FBI-level of research, reveals some pretty interesting illicit and overt connections between all of them. For example, the following chart shows a typical money-laundering, tax and government survellance evasion system for one of the attackers:

 


Figure 1: ONE OF A VAST NETWORK OF MONEY LAUNDERING, TAX EVASION, KILL SERVICE OPS NETWORKS


Figure 2: THERE ARE THOUSANDS OF BANKING RECORDS THAT SHOW THAT GAWKER AND GOOGLE TRADED CASH FOR KILLS


Figure 3: THERE ARE TENS OF THOUSANDS OF BANK, SEC, FINCEN, IRS AND OTHER RECORDS PROVING THE CASH MOVING THROUGH THESE EFFORTS WAS HUGE AND CAME FROM GOVERNMENT CONTACTS


Figure 4: THIS SHOWS THAT ONE OF THE ATTACKERS CLEARLY SELLS HIS SERVICES ON FACEBOOK AS AN “ASSASSIN”


Figure 5: ONE ATTACKER PAYMENT SCHEME HAD OVER 980 PASS POINTS VIA SHELLS, TRUSTS AND MONEY DROPS

 

 

While the thousands of graphics, that forensic investigators have acquired, provide a good visual tale of the crimes, corruption and attacks, the following text description of an FBI-level investigation is even more shocking. It is important to keep in mind that U.S. Government officials faxed, emailed, U.S. mailed and delivered the character assassination materials to their target’s employers, family, friends, associates, fiance and others, in order to maximize the harm to the targeted citizens.

All of the attackers got paid cash, stock perks, job advancements and other compensation. Here are some of the ways they hid the compensation transfers:

Based on publicly available FEC records, repeatedly throughout the 2016 presidential campaign, HVF would purportedly transfer funds to its constituent political committees, which included between 34 and 40 state parties,” the complaint states. “On the very same day each of these transfers supposedly occurred, or occasionally the very next day, every single one of those state parties purportedly contributed all of those funds to the DNC.”

– In New York City, No. 9 East 71st Street is a well-known sex mansion used to pay off politicians and operatives via sex favors

On Nov. 8, Craig B. Hulet, a well known and highly respected analyst on government policy, terrorism, and international relations, spoke on Coast to Coast AM regarding the growing scandal involving a lawsuitagainst the Federal Reserve, major banks, and many members of the Bush and Obama administrations.  During his one hour interview, Hulet offered the assessment that many members of the Obama cabinet, including Hillary Clinton, Timothy Geithner, and Eric Holder, were resigning their offices due to their potential roles in the TARP money laundering lawsuit.

Attorney General Jeff Sessions encouraged the DOJ to reopen the Uranium One case.  This indictment may be a byproduct of their investigation into the Clinton Foundation and Russia.  Fitton doesn’t think it’s coincidental that the DOJ under Obama was “hiding this in plain sight from the American people”, and certainly hiding “key elements” from congress.  Then the DOJ under “Jeff Sessions responds by saying we’re going to take another look at this.  There’s a new indictment to follow up on the indictment that is already out there, or a conviction… from 2015.” According to Fitton, this is a follow-up investigation that started in Little Rock Arkansas.  Both the FBI and the Attorney General are looking into pay to play allegations on the part of the Clinton Foundation. “One would hope Uranium One is part of it.”  He claims there were tens of millions of dollars that were laundered by the Russians through the Clinton Foundation.

– The Committee to Defend the President, a political action committee, filed its complaint with the FEC on Monday with the allegations that the Hillary Victory Fund (HVF) solicited cash from big-name donors, including Calvin Klein and “Family Guy” creator Seth MacFarlane — money that was allegedly sent through state chapters and back to the DNC before ending up with the Clinton campaign.

– The FBI and FINCEN found that attacker David Brock, a professional cyber attacker and media assassin, has 7 non-profits, 3 Super PACs, one 527-committee, one LLC, one joint fundraising committee, and one unregistered solicitor crammed into his office in Washington DC.

Uncovered records expose a constant flow of money between these organizations. The Bonner Group, his professional solicitor, works off a commission.  Every time money gets passed around, Bonner receives a 12.5% cut. It appears that Brock has been passing around donations quite a bit, giving The Bonner Group a handout each time. In 2014, Media Matters for America raised $10,021,188. The Bonner Group was credited for raising these funds.  Media Matters paid them a $1,147,882 commission. That same year, Media Matters gave a $930,000 cash grant to David Brock’s Franklin Education Forum, an organization that shares office space with Media Matters. In 2014, the Franklin Education Forum reported $994,000 in total contributions.  93.6% of that total came from Media Matters! Surprisingly, though, the Franklin Education Forum gave full credit to Bonner for raising that money.  They paid the fundraiser a $124,250 commission in 2014! As all of these groups exist within Brock’s DC office, it would be difficult for him to claim he had no idea this was going on. The report continues:  Furthermore, the New York Times reports that David Brock shares a summer rental in the Hamptons with Mary Pat Bonner, the President of the Bonner Group!

The above quoted sections of investigations are not the exception but, rather, the rule in money-laundering and covert payola to attackers. We have over 200,000.. let me repeat, OVER TWO HUNDRED THOUSAND OTHER EXAMPLES OF THESE ILLICIT PAYMENT SCHEMES TO POLITICAL AND ANTI-COMPETITION ATTACKERS FINANCED, SUPPORTED, ENABLED AND OPERATED BY THE U.S. GOVERNMENT! These payments occer in government offices DAILY! Government officials do not halt these methods, stop stock ownership by politicians, or delay this money laundering because THEY PROFIT FROM IT. That is WRONG, ILLICIT, CRIMINAL and a VIOLATION OF THE BASIC PRECEPTS of AMERICA!

A lifetime analysis of the published work, payments and who paid them, often via covert payment routes, conducted at an FBI-level of research, reveals some pretty interesting illicit and overt connections between all of them.

 

THE NAMES OF THE ATTACKERS

 

These are the people that the tech oligarchs, The White House and U.S. Senators hire to end your life if you report their crimes. It should be against the law for these cyber assassination kill services to even exist, but Congress won’t outlaw them because Senators use them every day. If they can do the things they do, to you, then it must be legal to do the same things back to them. While they spend millions of dollars and get paid millions of dollars to destroy you, the average person only has a fraction of that money, if any at all, to fight back with. Since they are hired to destroy you, you have every right to destroy them…as long as you do it legally and in the most creative and insidious ways possible. In payback for accepting compensation for trying to destroy you and your family, they must be hunted and tracked for the rest of their lives! Criminal referrals and RICO charges appear to have been filed against every party on this list:

  • A.J. DelaurioDefamation-for-sale blogger
  • Acronym
  • Adam DachisDefamation-for-sale blogger
  • Adam WeinsteinDefamation-for-sale blogger
  • Adrian CovertDefamation-for-sale blogger
  • Adrien ChenDefamation-for-sale blogger
  • Al Mottur and Manuel Ortiz, Brownstein Hyatt Farber Schreck
  • Alan HenryDefamation-for-sale blogger
  • Albert BurnekoDefamation-for-sale blogger
  • Alex BalkDefamation-for-sale blogger
  • Alexander PareeneDefamation-for-sale blogger
  • Alexandra PhilippidesDefamation-for-sale blogger
  • Allison Spinner
  • Allison WentzDefamation-for-sale blogger
  • Alphabet – Privacy abuser, spy-on-the-public, Fake News election rigger
  • American Independent Foundation – Attack service
  • American Ledger – Attack service
  • AmpliFire News – News attack media network
  • American Bridge – Spy service and attack service processor
  • American Bridge 21st Century Foundation Group – Experts at separating rich people from their cash to fund attacks
  • Andrew Collins Defamation-for-sale blogger
  • Andrew MagaryDefamation-for-sale blogger
  • Andrew McCormack
  • Andrew OrinDefamation-for-sale blogger
  • Andy Barbour, Smith-Free Group
  • Andy BechtolsheimVC- Insider campaign backer
  • Aneesh Chopra
  • Angelica AlzonaDefamation-for-sale blogger
  • Anna Merlan Defamation-for-sale blogger
  • Ariana Cohen Defamation-for-sale blogger
  • Arnold SchwarzeneggerOutrage media operative
  • Ashley FeinbergDefamation-for-sale blogger
  • Austin Lau
  • Ava GyurinaDefamation-for-sale blogger
  • Barack ObamaChicago politician who hired 70% of the attack services available
  • Barry PetcheskyDefamation-for-sale blogger
  • Bill DaleyWhite House strong-arm who pushed attack services at White House
  • Bill Gurley
  • Bill LockyerCalif State finance head
  • Black Cube – Private Mossad attack service
  • Brendan I. KoernerDefamation-for-sale blogger
  • Brendan O’ConnorDefamation-for-sale blogger
  • Brent RoseDefamation-for-sale blogger
  • Brian GoncherDeloitte VC intermediary that worked Big Tech mafia
  • Brian HickeyDefamation-for-sale blogger
  • Buzzfeed – Attack service that convinces naive soyboys to write news clips
  • Cambridge Analytica – Attack service, keeps changing name
  • Camila CabrerDefamation-for-sale blogger
  • Carl Gordon
  • Cardinal & Pine – Attack service
  • Chad Hurley
  • Cheryl SandbergFacebook attack boss, reports to Larry Summers, dates Activision CEO
  • Choire SichaDefamation-for-sale blogger
  • Chris Jennings, Jennings Policy Strategies
  • Chris MohneyDefamation-for-sale blogger
  • Chuck Brain, Capitol Hill Strategies Inc
  • Civis AnalyticsSocial manipulation attack group
  • Clover HopeDefamation-for-sale blogger
  • Clearview AI Face Tracking
  • Correct The Record – Attack service
  • Covington & Burling – Policy manipulation & appointee rigging lawyers
  • Courier Newsroom – Attack service
  • Daniel CohenDOE Legal maniupulation counsel
  • Daniel MorganDefamation-for-sale blogger
  • Daniel Jones – Dianne Feinsteins media “hit man”
  • Dave McClureVC, Hell magnet
  • David AxelrodWhite House attack boss
  • David Brock – Master of character assassination services
  • David Danielson
  • David DrummondLawyer/Lobbyist– Google, wife cheater
  • David MatthewsDefamation-for-sale blogger
  • David Mott
  • David PlouffeWhite House money packager & election rigger
  • David Prend
  • David Sacks
  • David Sandalow
  • Debbie Wasserman Schultz – Attack politician advisor, election rigger
  • Denis McDonoughWhite House attack coordinator
  • Diana MoskovitzDefamation-for-sale blogger
  • Dianne FeinsteinCalifornia politician who hired huge numbers of attack services
  • Draper – FisherVC firm (Campaign funder who received massive windfalls from Russian mining & tech start-up rigging)
  • Eleanor ShechetDefamation-for-sale blogger
  • Elizabeth SpiersDefamation-for-sale blogger
  • Elizabeth StarkeyDefamation-for-sale blogger
  • Elon MuskAttack boss, has CIA staff and Mercs on payroll to attack others
  • Emerson Collective – Steve Job’s cash deployer for political intrigues
  • Emily GouldDefamation-for-sale blogger, sounds like an idiot on Jimmel Kimmel interview
  • Emily HerzigDefamation-for-sale blogger
  • Emma CarmichaelDefamation-for-sale blogger
  • Eric HolderAttorney General- DOJ, indicted by Congress for contempt, ran cover-ups
  • Eric Paley
  • Eric SchmidtOwner- Google. Jigsaw Boss, Dr. Strangelove level of sociopathy
  • Erin RyanDefamation-for-sale blogger
  • Ethan SommerDefamation-for-sale blogger
  • Eyal EbelDefamation-for-sale blogger
  • Facebook – Privacy abuse, spy-on-the-public, Fake News election rigger
  • Fusion GPSDefamation attack and journalist bribery service
  • Gabriel Burt
  • Gabrielle BluestoneDefamation-for-sale blogger
  • Gabrielle DarbyshireDefamation-for-sale blogger and attack services director
  • Gawker MediaDNC/Clinton/Obama character assassination media tool
  • Georgina K. FairclothDefamation-for-sale blogger
  • Gilman LouieVC, founder of IN-Q-Tel spy service
  • GizmodoDNC/Clinton/Obama character assassination media tool
  • Goldman SachsFinancial packager (Suspected of staging most of the TARP/DOE deals for personal gain & insider payouts – Elon Musk’s stock manipulation partner
  • Google, Inc.Data harvesting company(Ran media attacks, stock market pump and dump PR hype and character assassinations – amplifies attacks by the others on this list and locks those attacks at the top of every search result for a fee
  • Gregory HowardDefamation-for-sale blogger
  • Greylock CapitalSilicon Valley Insider trading operator focused on election manipulation
  • Hamilton NolanDefamation-for-sale blogger
  • Hannah KeyserDefamation-for-sale blogger
  • Heather DeitrichDefamation-for-sale blogger
  • Heather Podesta, Heather Podesta + Partners
  • Hopewell Fund – Attack service
  • Hudson HongoDefamation-for-sale blogger
  • Hugo SchwyzerDefamation-for-sale blogger
  • Hunter SlatonDefamation-for-sale blogger
  • Ian FetteDefamation-for-sale blogger and Google, Gawker, Jalopnik, Gizmodo media assassin
  • In-Q-Tel, Inc.CIA off-shoot
  • Investing in US
  • Ira EhrenpreisVC Campaign backer
  • Irin CarmonDefamation-for-sale blogger
  • JalopnikOnline defamation facade political publication. Pretends to be about cars but is hit job rag
  • James Brown JrHHS Programming lead in California (Arrested for corruption)
  • James J. CookeDefamation-for-sale blogger
  • James KingDefamation-for-sale blogger
  • Jared CohenGoogle boss and international political manipulator
  • Jared Birchell – Elon Musk’s attack dog
  • Jawed Karim
  • JigSaw Operations within the Google Cartel – Attack service
  • Hunter Biden
  • Jay CarneyWhite House press attack plots coordinator
  • Jeff Berman and David Russell, Bryan Cave
  • Jeff Lieberman
  • Jeff Peck, Peck, Madigan, Jones & Stewart
  • Jeffrey Zients
  • Jennifer OuelletteDefamation-for-sale blogger
  • Jeremy Stoppelman
  • Jesse OxfeldDefamation-for-sale blogger
  • Jessica CohenDefamation-for-sale blogger
  • Jesus DiazDefamation-for-sale blogger
  • Jillian SchulzDefamation-for-sale blogger
  • Jim Blanchard and Ilia Rodriguez, DLA Piper
  • Jim BreyerVC and CIA intermediary
  • Jim Goetz
  • Joanna RothkopfDefamation-for-sale blogger
  • Joe LonsdaleVC, famous for rape and abuse scandal and domestic spying via Palantir
  • Joe RhodesWhite House shill
  • Joel Johnson, The Glover Park Group
  • Johanna Shelton – Google’s White House manipulator
  • John Cook –  Defamation-for-sale blogger and director of media assassins group
  • John DoerrOwner – Kleiner Perkins. Tech Mafia “Godfather”
  • John HerrmanDefamation-for-sale blogger
  • John Lindfors
  • John PodestaWhite House attack adviser
  • John Raffaelli, Capitol Counsel
  • Jonathan SilverDOE VC (Sent packing/fired/forced to resign)
  • Jordan SargentDefamation-for-sale blogger
  • Joseph Keenan TrotterDefamation-for-sale blogger
  • Josh Ackil and Matt Tanielian, Franklin Square Group
  • Josh Kopelman
  • Josh SteinDefamation-for-sale blogger
  • Joshua Wright
  • JP Gan
  • Julia AllisonDefamation-for-sale blogger
  • Julianne E. ShepherdDefamation-for-sale blogger
  • Julie Domenick, Multiple Strategies LLC
  • Justin HydeDefamation-for-sale blogger
  • Kamala HarrisDefamation-for-sale hiring boss
  • K2 Intelligence – Kill service
  • Kate DriesDefamation-for-sale blogger
  • Katharine TrendacostaDefamation-for-sale blogger
  • Katherine DrummondDefamation-for-sale blogger
  • Kathy Zoi – DOE Quid Pro Quo operator
  • Keith Rabois -VC
  • Kelly StoutDefamation-for-sale blogger
  • Ken AlexAdviser to Jerry Brown
  • Ken Duberstein and Marti Thomas, The Duberstein Group
  • Ken HoweryVC
  • Kerrie UthoffDefamation-for-sale blogger
  • Kevin DraperDefamation-for-sale blogger
  • Kleiner PerkinsCampaign funding VC – hires many attack services
  • Kroll – Private CIA and attack services
  • Lacey DonohueDefamation-for-sale blogger
  • Lachlan SewardEnergy Department gatekeeper for White House insiders
  • Larry O’Brien, OB-C Group
  • Larry PageGoogle Boss accused of stealing technology for Google
  • Larry SummersVC and Facebook covert advisor
  • Licy Do Canto, The DoCanto Group
  • Lisa Kountoupes, Kountoupes Consulting
  • Lloyd Craig BlankfeinVC and Sachs boss
  • Lucy HallerDefamation-for-sale blogger
  • Luke MaloneDefamation-for-sale blogger
  • Luke Nosek
  • Madeleine DaviesDefamation-for-sale blogger
  • Madeline DavisDefamation-for-sale blogger
  • Marc Andreessen – VC who has a kill-them-all process towards competitors
  • Mario AguilarDefamation-for-sale blogger
  • Mario RosattiVC
  • Mark Isakowitz, Fierce, Isakowitz and Blalock
  • Mark Kadesh, Kadesh & Associates
  • Mark ZuckerbergFacebook Boss
  • Martin LaGod – VC Firelake Cap
  • Marty Paone, Prime Policy Group
  • Mary MeekerVC
  • Matt HardigreeDefamation-for-sale blogger
  • Matt NovakDefamation-for-sale blogger
  • Matt RogersVC and pass-through conduit
  • Max Levchin -VC
  • Mckinsey ConsultingThe firm you hire to rig white papers and insider hires in government positions for the Palo Alto Mafia
  • Media Matters – Attack service
  • Megan Smith
  • Melissa Schulman, The Bockorny Group
  • Michael BallabanDefamation-for-sale blogger
  • Michael DobbsDefamation-for-sale blogger
  • Michael Eisenberg
  • Michael Sussmann – attack operative
  • Michael Moritz -VC
  • Michael SpinelliDefamation-for-sale blogger
  • Mikey Dickerson
  • Mitch Feuer and Robert Griner, Rich Feuer Group
  • Morrison and Foerster
  • MotiveAI – Digital attack and media manipulation service
  • Nancy PelosiCalifornia politician who hires many attack services
  • Nathan Parker
  • Neal UngerleiderDefamation-for-sale blogger
  • New America Foundation
  • New Venture Fund – Tricks rich people into financing attack services
  • Neerag Agrawal
  • Nicholas AsterDefamation-for-sale blogger
  • Nicholas Guido DentonDefamation-for-sale blogger and head of the Gawker, Gizmodo, Jalopnik sleaze tabloid empire – Takes kill orders directly from White House, Elon Musk and Larry Page
  • Nick Cook – Gawker attack services coordinator
  • Omar KardoudiDefamation-for-sale blogger
  • Open Society – George Soros own attack provider service and news manipulation outlet
  • Orbis Business Intelligence – Attack service
  • Owen ThomasDefamation-for-sale blogger
  • Pacronym – Election manipulation and attack service
  • Pantsuit Nation – Election manipulation service
  • Palantir – Peter Thiel’s spy agency, private CIA
  • Patrick GeorgeDefamation-for-sale blogger and Character Assassination expert
  • Patrick LaffoonDefamation-for-sale blogger
  • Patrick RedfordDefamation-for-sale blogger
  • Perkins CoieCampaign conduit law firm, attack and spy service
  • Peter Fenton
  • Peter ThielVC and Elon Musk boyfriend
  • Pierre OmidyarDefamation-for-sale blogger
  • Plouffe Consulting – Talks rich people into funding attacks and election rigging
  • PR Firm Sunshine Sachs – Attack service
  • Priorities USA – Attack service
  • Rahm EmanuelWhite House boss, loves attack services
  • Raj Gupta – VC, arrested
  • Rakesh SaxeenaCanadian in-house arrest, arms dealer, western political packager
  • Ray LaneVC, under IRS investigation
  • Reid HoffmanVC and sex.com partner with Gary Kremen, also match.com
  • Rhod Shaw, The Alpine Group
  • Rich JuzwiakDefamation-for-sale blogger
  • Richard BlakelyDefamation-for-sale blogger
  • Richard RushfieldDefamation-for-sale blogger
  • Robert FingerDefamation-for-sale blogger
  • Robert GibbsWhite press office head, ordered the hiring of attack services
  • Robert Raben, The Raben Group
  • Robert SorokanichDefamation-for-sale blogger
  • Roelof Botha
  • Rory WaltzerDefamation-for-sale blogger
  • Rosa GolijanDefamation-for-sale blogger
  • Russel Simmons
  • Ryan BrownDefamation-for-sale blogger
  • Ryan GoldbergDefamation-for-sale blogger
  • Sam Faulkner BiddleDefamation-for-sale blogger, Runs a large part of the Anti-GOP blog programs
  • Sam WoolleyDefamation-for-sale blogger
  • Samar KalafDefamation-for-sale blogger
  • Sanjay WagleVC
  • Sarah RameyDefamation-for-sale blogger
  • Scott Shleiffer
  • Sergy BrinGoogle boss involved in sex scandal
  • Shannon Marie DonnellyDefamation-for-sale blogger
  • Shadow Inc – Attack Service
  • Shareblue – Attack Service
  • Sid Blumenthal – Creator of Attacks-As-Service concept
  • Shep McAllisterDefamation-for-sale blogger
  • Sixteen Thirty Fund – Tricks rich people into financing attacks
  • Sophie KleemanDefamation-for-sale blogger
  • SpaceXDomestic spy satellites spy on consumers
  • States Newsroom – Media attack network
  • Secondary Infektion – Blogger attack service
  • Stephen TotiloDefamation-for-sale blogger
  • Steve Chen
  • Steve Elmendorf and Jimmy Ryan, Elmendorf Group
  • Steve JurvetsonVC embroiled in sex abuse charges
  • Steve McBee, McBee Strategic
  • Steve Perry and Andy Wright, Dutko Grayling
  • Steve RattnerWhite House car czar, indicted for fraud
  • Steve SpinnerEnergy Department manipulation expert, Wife was Solyndra’s lawyer before the FBI raid
  • Steve WestlyVC that financed Obama campaign
  • Steven ChuSecretary of Energy – The most corrupt in US history
  • Stratfor Intelligence Services – Spy and attack service
  • Supermajority News – Attack service
  • Tamar WinbergDefamation-for-sale blogger
  • Taryn SchweitzerDefamation-for-sale blogger
  • Taylor McKnightDefamation-for-sale blogger
  • Ted Schlein
  • Tesla MotorsCar Company that conduits money to campaigns
  • The GroundworkSocial manipulation group
  • The Americano
  • The Agency – Massive network of attack bloggers based out of Russia
  • The X – Attack network Elon Musk uses that creates fake fanboys on Twitter, Facebook, Instagram, Google, etc.
  • Think Progress
  • Thomas Jolly, Jolly/Rissler
  • Thorin KlosowskiDefamation-for-sale blogger
  • Tim DraperVC
  • Tim MarchmanDefamation-for-sale blogger
  • Timothy BurkeDefamation-for-sale blogger
  • Tobey Grumet SegalDefamation-for-sale blogger
  • Todd ParkIT manipulator inside White House
  • Tom LeyDefamation-for-sale blogger
  • Tom O’Donnell, Gephardt Government Affairs Group
  • Tom ScoccaDefamation-for-sale blogger
  • Tom SteyerVC
  • Tomorrow VenturesSocial manipulation group
  • Tony Podesta, Podesta Group
  • Twitter – Biased media manipulation service
  • Tracy Spicer, Avenue Solutions
  • Veronica de SouzaDefamation-for-sale blogger
  • Viktor VekselbergRussian man who hires many services
  • Vinod Khosla -VC
  • Wes SilerDefamation-for-sale blogger
  • WikiStrat – Attack service
  • William HaisleyDefamation-for-sale blogger
  • William TurtonDefamation-for-sale blogger
  • Wilson, Sonsini, Goodrich and Rosatti – Attack lawyers
  • WordPress.org – Censors or deletes any site that speaks against Nancy Pelosi directives, Soros funded
  • Yasmin Green – Google’s Anti-arab
  • YouTube – Media manipulation attack service
  • Undercover Global Ltd – Attack service
  • Versa LLC – Attack service

Congressional and FEC investigators have a big question here. The big question is: If the people, above, are manipulating public elections with information trickery: IS THAT TREASON?

Because almost every one of them coordinated to attack others and their businesses, they broke the RICO Racketeering and anti-trust laws in America! In an FBI interview, it is believed that every person on this list would be implicated in charges when asked, under oath: “ARE YOU, OR HAVE YOU EVER HIRED, A CYBER ATTACKER?

These were not just ‘some people’ who wrote something mean on a Facebook post. They had exclusive publishing resources on a national and global network that they systematically, and in a highly coordinated manner, operated on in exchange for compensation, to harm and attack specific targets that they were instructed to harm.

More names will be forthcoming as investigators complete their reviews.

ATTACKERS Daniel Jones, Michael Sussmann, Nicholas Guido Denton, John Herrman, Adrian Covert, Media Matters, John Cook, Ian Fette, Gabrielle Darbyshire, Patrick George, Eric Schmidt, Jay Carney and David Axelrod have already been placed under federal surveillance for some time. TARGET will request their case records from the FBI, FINCEN, Interpol, The NSA, The IRS, their banking and stock market accounts, and other sources, which will prove the assertions about their attacks, who hired them and the top-level command-and-control authority over their actions.

THE REPRISAL ATTACK TOOLS USED ON AMERICAN CITIZENS – THE ATTACKERS PLAY-BOOK:

 

HARM #1: MANIPULATION AND BLOCKADE OF TARGET’s EARNED GOVERNMENT FUNDS

In a typical reprisal case a Plaintiff (also known as a “TARGET”) applied for government SSDI and a HUD home certificate. SSA stated that all of TARGET’s disabling conditions existed but that TARGET must confirm they will last more than a year. TARGET’s SSDI and HUD certificate were blockaded by Pelosi and Feinstein in reprisal for TARGET helping law enforcement on anti-corruption investigations that involved Pelosi, Feinstein and their political financial backers.
California Senators, all of whom have vast documented court and news report records of hiring attackers from spy agencies for reprisal attacks on whistle-blowers, used their resources to stop all funding in the TARGET’s SSDI funding as reprisal for whistle-blowing. They got SSA to say that TARGET WAS permanently disabled, but that because he could not work, he lost his SSA credits waiting the one year and one day that SSA required to prove that his disabilites would last longer than a year. Dianne Feinsteins own staff and family, who had cohabitated with TARGET, confessed to these ‘dirty-tricks’ actions as reprisal for TARGET’s testimony accidentally cutting off $120 million+ of potential profit the family expected. Her staff have been exposed by CIA staff as “the masters of dirty tricks reprisals…even as good as the ones we (THE CIA) pull off..”

Another time, a TARGET applied for his HUD Mortgage coupon. He was forced to wait 15+ years and he still has not received it after over 100 inquiries as to the status. City and County officials have stated that they have “never seen it take so long”. According to all experts, the only way it could have been stone-walled this long is if a public official (ie Feinstein, Pelosi, Harris…) had ordered it slow-walked as part of the politial reprisal attacks on TARGET. Three different counties have checked on this and said that TARGET’s records ‘went missing” in a Lois Lerner type of error set.

The cut-off of TARGET’s finances and benefits coincides, exactly, with his whistle-blower testimony AND to the reprisal threats and promises by THE ONLY PEOPLE IN THE WORLD capable of accomplishing such state-sponsored attacks. The ATTACKERS were the only entity with the means, the motivation and the proven history of such actions on a regular historical basis.

Feinstein’s current and former staff members (See the Dossier on Daniel Jones) (See the fact that TARGET lived with, dined with and partied with her family and senior staff) have stated that the Feinstein and Pelosi offices commonly order citizens government funding to be cut off as political reprisal. The White does it almost every other day. In this case they did it to TARGET at least three times.
TARGET, had an industry standard pay rate of $10,000.00 per month, based on Salary.com, his high highest recorded salary and accomplishment records in Silicon Valley contrasted with the salaries of less experienced executives at Google, Facebook, Netflix and Tesla. The U.S. Government states, via all of its agencies, that the minimum survivable cost-of-living in the Bay Area is $3200.00 per month. By intentional actions of government officers, in reprisal, TARGET’s income was reduced to $300.00 per month for most of the past decades. Two SSA officials confessed to assisting in hit jobs on him including Mario U from the San Mateo SSA office and an official who worked at the San Francisco SSA office and who then went to work for a Senator who assisted in the attacks on TARGET. When asked for TARGET’s medical records SSA sent a huge number of medical records for two strange women in massive violation of federal medical privacy rights. The SSA Inspector General has shown TARGET thousands of cases of politicians using SSA for political reprisal punishments. FBI IT experts and ‘Black Hat’ hackers can hack into every SSA server in minutes and change records, files and decisions. Rahm Emanual, Nancy Pelosi and Dianne Feinstein can do it with a single phone call. It should be noted by the Court that EVERY background check file in AMERICA was hacked and stolen by China within a few hours and that every hacking tool of the NSA and CIA was hacked by Russia and posted on the internet. It is IMPOSSIBLE for anyone to ever assert that “nobody can hack SSA”. That would be a remarkable lie. In fact, TARGET has agency confimation that 95% of the Silicon Valley oligarchs entire family tax records, stock accounts, political payments and payola and pretty much everything that would destroy them, has been hacked and is in the hands of ICIJ (Panama Papers investigators), Propublica, FINCEN and pretty much everybody they would not want to have it.
The TARGET has demanded that the Court order SSA to award TARGET his full SSDI backpay from up to today, with interest, based on the fact that SSA was used to harm Plantiff as a reprisal tool. The Inspector General has proven this happens regularly and hundreds of other whistle-blowers are prepared to confirm this fact.

 

HARM #2: THREATS OF DEATH AND ACTUAL MURDERS OF PEERS

One TARGET has actually been attacked as enumerated below and has active cases with SFPD, FBI, OSC and other agencies. Twice TARGET’s car was rammed. The first time the attacker performed a PIT maneuver, flipping TARGET’s car onto the concrete median wall on the Freeway, causing massive damage. The attacker sped away. A car next rammed TARGET’s parked car in front of his home and, at the same location, a man tried to drive has car through the fence into TARGET’s cottage. Two other times, strangers pulled up along TARGET, pointed at him and yelled “you are dead”. TARGET has received threats by email and voicemail and had dead animals tossed over his fence. Further proving the at-risk claims of TARGET. TARGET, and his peers, had contact with the following persons in the corruption case: Rajeev Motwani; Gary D. Conley; Seth Rich; Philip Haney; David Bird; Doug Bourn; Misti Epstein; Joshua Brown; Kenneth Bellando; Moritz Erhardt; Imran Aliev; Kate Matrosova; David Drye; Vincent Foster; Kathy Ferguson; Duane Garrett; Eric S. Fox; Judi Gibbs; Berta Caceres; Suzanne Coleman; L.J. Davis; John Hillyer; Stanley Huggins; Sandy Hume; Shawn Lucas; Gary Johnson; John Jones; John F. Kennedy, Jr.; Stephen Ivens; Mary ‘Caity’ Mahoney; Eric Butera; Danny Casolara; John Ashe; Tony Moser; Larry Nichols; Joseph Rago; Ron Brown; Bob Simon; Don Adams; Peter Smith; Victor Thorn; Lori Klausutis; Gareth Williams; Daphne Caruana Galizia; James D Johnston; Dave Goldberg; Loretta Fuddy; Paul Wilcher; Gary Webb; Beranton J. Whisenant Jr; Stanley Meyer; Jon Parnell Walker; Tyler Drumheller; Barnaby Jack; Dominic Di-Natale; Barbara Wise; Ilya Zhitomirskiy; Jeff Joe Black; Robin Copeland; John Wheeler; Ashley Turton; Michael Hastings; Antonin Scalia; David Koschman; David Werner; Alex Okrent; Kam Kuwata; Larry Frankel; And hundreds more connected to this case who suddenly, and strangely, turned up dead in this case and, ironically, their deaths all benefit the suspects in this case.Rajeev Motwani taught Google how to Google. Suddenly, in perfect health, he was found floating face-down, dead, in his Silicon Valley swimming pool. It helps certain people that he can no longer talk. Gary D. Conley was the CleanTech competitor to, and whistle-blower on, the suspects. He was suddenly found with a bullet in his head behind Beale Air Force base. It helps certain people that he can no longer talk. He TOLD TARGET that someone from Google was going to kill him. Google programmer Forrest Hayes, who worked on Google search engine rigging, was suddenly found dead with the story that “he was overdosed by a Google hooker on his sex yacht”. Google associate and Tesla Investments founder Ravi Kumar was also killed by his hooker. Deep Google investor VC liason and husband of Facebook executive Cheryl Sandberg was suddenly found dead with a hole is his head. The “official” story is that he was the first person in history to be killed by his treadmill. David Bird was the Wall Street Journal energy reporter who was working on a story that involved Cleantech energy connections of some of the suspects. He was working on a story about who controlled the modern energy industry and cleantech. He went for a walk and was found a long time later, dead, floating in a pond. It helps certain people that he can no longer talk. One Mr. Breitbart was a famous blogger, who railed on the web about the political manipulations of the suspects. Suddenly, he had a “heart attack” in his shower and died. It helps certain people that he can no longer talk on the blogs. Mr. Karl Slym , with Tata Motors was involved in a car deal with some of the suspects for one of the biggest Indian auto-makers. Suddenly he was a stain on the sidewalk, accomplished by his fall from the top of a skyscraper hotel. It helps certain people that he can no longer talk. Doug Bourn, The senior electrical engineer at Tesla (Google’s covert partner), Andrew Ingram of Palo Alto, a top systems electrical engineer at Tesla; and Brian M. Finn the senior manager of interactive electronics, at Tesla, had deep knowledge of financial misdeeds and technical cover-ups at Tesla Motors. They were key parts of the Tesla operation. For some reason, they all got into a private airplane, in perfect health, and then the airplane plowed into the ground, killing all three at once. It helps certain people that they can no longer talk. They wrote, and helped describe, in Tesla’s own federal patent filings, the fact that Tesla’s batteries would kill you, maim you and/or burn your house down. Tesla did not realize this when they paid the federal patent filing fees. When Tesla, later realized this, they were forced to give all of their patents away for free. These three senior engineers had deep inside knowledge of the Tesla Motors operations. Their aircraft suffered an “Engineering failure”. This case involves potential crimes by two Presidents of The United States, their staffs, U.S. Senators and the Silicon Valley oligarchs that financed and controlled them, two wars and trillions of dollars of manipulated U.S. Treasury monies and stock marke monies. How could anyone think this was NOT a life-endanging situation for the TARGET?

 

HARM #3: THE GOVERNMENT DEFRAUDED A TARGET OVER AND OVER:

Government agency bosses solicited a TARGET with false promises of future loans, carbon credit sales, billions of dollars of stock market valuation profits, contracts and/or grants from their agencies and caused the TARGET and his associates to expend millions of dollars and years of their time for projects which those government bosses had covertly promised to their friends. They used TARGET’s ‘nice guy’ brand as a “smokescreen” to cover their illegal government slush-funds for TARGET’s competitors and personal enemies who were OWNED by government officials. By using this tactic, the attackers drained the TARGET’s funds and forced TARGET into an economic disaster, without the government bosses fearing any reprisal for their scam. The crony insiders made hundreds of billions of dollars in profit in the notorious Solyndra-type scandals as seen in the CBS 60 Minutes episode: “The Cleantech Crash”, thousands of TV news segments and the related GAO and Congressional corruption reports.

HARM #4: THE PLACING OF MOLES AND SPYING ON TARGET:

White House financier Kleiner Perkins placed moles inside of TARGET’s companies in order to sabotage, delay and misdirect operations. The moles were discovered to be staff of Kleiner Perkins. The main offices of Kleiner Perkins were broken into, per San Mateo County police reports, and records of corruption copied or duplicated by a state-sponsored intelligence agency entity, which provided further proof that Kleiner Perkins and the White House were exchanging Quid Pro Quo. Tom Perkins, one of the founders of Kleiner Perkins told TARGET that he was on “A government hit-list” for exposure the corruption of Silicon Valley titans and government executives. John Doerr, another partner, told one TARGET at a VC conference, that he will make sure the government kills off any effort to support fuel cells (which compete with his and Elon Musk’s lithium batteries)

HARM #5: BLOCKADES OF TARGET’S ACCESS TO LEGAL COUNSEL:

The hired cyber assassins used every trick in the book to keep Targets from gaining equitable legal justice or representation because exposure of The ATTACKERS crimes would shame them Government officials and the federal agency: Legal Services Corporation (LSC corporation -A federal agency dedicated to providing legal services to citizens) blockaded TARGET’s rights to legal representation in order to prevent TARGET’s from personally suing the attackers because such a lawsuit would have embarrassed corrupt public officials. High tech law firms that were discussing a services agreement with TARGET’s were threatened and ordered to not help TARGET’s or “they would be black-listed or be cut-off from tens of millions of dollars of Google, Netflix, Facebook and government contracts”. Individual lawyers were threatened with black-listing and getting “flooded with more filings than you could ever respond to in your life-time...” LSC officials, who were almost entirely Obama Administration associates, refused to assist with lawyer referrals. That is a violation of their federal contract with The U.S. Government. Every other possible lawyer had either 1.) been threatened, by the attackers, from representing the Plaintiff, 2.) contracted by the attackers so that they were conflicted from representing the Plaintiff, 3.), or intimidated by the attackers in one of many ways.

HARM #6: HIRED CHARACTER ASSASSINATION AND DEFAMATION SERVICES THAT The ATTACKERS USED TO DESTROY TARGETS LIFE

In one case the attackers purchased over $30 Million dollars of attacks against the TARGET with Media Matters, The Gawker/Gizmodo Tabloid empire and Google. It was equal in scope and cost the amount of money Bloomberg spent IN ONE WEEK to attack Presidential candidate Trump. A sophisticated animated attack film was produced by Google/Youtube and Nicholas Denton attacking TARGET’s. An animated film is an expensive effort involving considerable time and expense. An attacker must be well financed to undertake such an effort. The film was published on YouTube and locked onto the very top search result line on every YouTube search in front of 7.5 billion internet users for over a decade. The damage to TARGET’s reputation is estimated in the tens of millions of dollars. YouTube steadfastly refused to remove or adjust the search results even though YouTube executives knew TARGET personally and knew that the video represented a character assassination attempt against TARGET. YouTube owners finance the political campaigns of the public officials who ordered the attacks. While Google/YouTube stated to Congress that all of it’s search results are arbitrary, the never-moving search result of this attack video proved that Google’s and YouTube’s search results are manually manipulated by human maintained black-lists. The corrupt officials hired Nicholas Guido Denton and his character-assassination-for-hire sleazy tabloid publication empire known as Gawker Media AKA Gizmodo Media. They own Gawker, Gizmodo, Jalopnik and a number of fake news sites based in the USA and near-Russian regions. The offshore sites are used for money laundering and tax evasion. The FBI has been asked to interview and financially trace the payments and command-and-control orders back and forth between Nicholas Guido Denton and his attacker/operatives: Ian Fette, Adrian Covert, Nick Cook, Gabrielle Darbyshire, John Hermann, Patrick George, et al and Google. Forensic data proves that the attackers transferred payments and communications between each other to conspire, operate, produce and publish the articles, videos, blogs and server manipulations for the attacks against their victims around the world. These attacks resulted in billions of dollars of damages to the victims. The orders for these attacks can be traced back to The White House. This ended the TARGET’s lives but created an enemy for the attackers that has lots of of investigator contacts and nothing to lose. Silicon Valley has caused the deaths of more children than any other entities. Harassment is harassment – whether it happens at school, at the playground, on the job, or on the internet. But online bullying is downplayed. Victims are stigmatized, mocked as oversensitive snowflakes who can’t take a joke. Plenty of people are unwilling to accept that victims can be seriously hurt by this behavior. Internet harassment is not only real and damaging, it represents a threat to the most vulnerable among us: children. The attacker’s Cyberbullying statistics show the high cost of online harassment. From increased depression and suicide rates to social anxiety and alienation, the pain and consequences of online harassment are as severe as they are undeniable. Imagine every new friend, potential date, your fiance’, your bank, anybody.. typing your name on the internet and seeing that Google says that you are a scumbag. Nobody will ever talk to you, hire you or help you ever again. Google, Gawker and Gizmodo are now known to partner together on character assassination efforts. One of their bloggers hired to “kill” TARGET even advertises himself on Facebook, globally, as an assassin-for-hire. TARGET has acquired the banking records of these Co-conspirators showing that they, and the U.S. government wired millions and millions of dollars between each other for these “spy agency” dirty tricks hit jobs.

Google knew one TARGET personally. The TARGET went to school and events with the founders. It was a lie for Google and YouTube to say over-and-over that they never heard of TARGET so they “can’t remove the attacks because it is ‘just how their algorithm works’…” The founder’s teacher: Rajeev Motwani, revealed to TARGET that Google manually sets all of their key search results BY HAND. Rajeev died was murdered for telling the truth about Google’s insidious plans and internet manipulations. Investigators suspect shell fish toxin or a reverse taser-like electronic heart-attack inducing defibulator device was used to kill him.

TARGET’s charges proved that Google manually rigs search results based on cronyism and that Google/YouTube lied to Congress about not doing so. This allowed TARGET to drive U.S. agencies and State AG’s to sue Google/Alphabet/Youtube for being lying, manipulate, society-abusing, child-killing, monopolistic monsters. Even though the Google/Gawker/Gizmodo produced and hosted attack articles and animated videos were completely discredited as a “character assassination hatchet job paid for by politicians”; by every known expert, The ATTACKERS still post them on their servers with hidden “P8” codes covertly embedded in the search engines to trick the public, in front of 7 billion internet readers as “payback”, in order to operate their reprisal attacks. No other servers or publishers in the world host and lock this attack media on their search results EXCEPT The ATTACKERS MEDIA COMPANIES. This ALONE would seem to prove that The ATTACKERS did the harms that they are charged with doing as The ATTACKERS are the only ones running, hosting and operating the attacks on TARGET on all of Earth!

TARGET has, over and over, demanded that the FBI, POLICE, FINCEN and other enforcement investigators reveal what they discovered when they traced the compensation routes and command-and-control management of these attackers. TARGET demands that this Court order the FBI, FINCEN and the NSA to reveal those compensation path records on the attackers from their investigations.

One might wonder why it has been so hard to get this information from the authorities. If the FBI reveals that the path-of-compensation goes from Adrian Covert, Nicholas Guido Denton and John Herrman right to the Oval Office in the White House, then the question is asked and answered. White House staff members Jay Carney, David Axelrod and Robert Gibbs have said “maybe”. White House staff insider Jofi Joseph has said “without a doubt”. Rahm Emanual’s White House staff say that, while in the White House, Rahm ordered all kinds of hit-jobs on whistle-blowers.
Gawker Media and Gizmodo Media have engaged in the origination of, production of and global broadcast of compensated character assassination videos and articles as a reprisal-service-for-hire (like Fusion GPS, Black Cube, Black Water and other related services) because we were FBI and GAO witnesses against Gawker and Gizmodo financiers. As 1.) the only publishing group on Earth to have engaged in such attacks and 2.) since the attacks were financed by complainants business competitors and 3.) since adversaries own staff have admitted to the scheme and 4.) since communications, FBI records and previous litigation records prove complainants assertions, complainants are justified in their demands.

The attacks and broadcast of multiple defamation attack articles and videos by Gawker Media, Google, YouTube and Gizmodo Media has been operating as recently as this today, thus the statutes of limitations are not exceeded. Well known U.S. government political figures and political financiers hired Gawker Media, Gizmodo Media and “Nick” Denton to undertake these ongoing attacks and to manipulate web servers to operate those attacks globally and permanently. The attackers hired Gawker Media, Gizmodo Media, “Nick Guido Denton”, Univision/Unimoda, Google and YouTube (essentially all the same people) to engage in reprisals because of the TARGET’s testimony against the Cartel in federal investigations and because the TARGET had superior technologies that the attackers could not compete with. Transaction documents showing payments between the “bad guys” in this case, were recently uncovered in other court cases.

Defendant adversaries produced a series of videos and defamation articles and used internet server technology tricks to place those attack materials in front of 7.5+ billion people day after day, year after year, refreshing the attack daily. This is, essentially, a “hit-job” service that Univision provides as a side gig through it’s TV networks and it’s offensive tabloid brands of: Gizmodo, Jalopnik, Jezebel, Gawker and other Univision/Unimoda assets along with it’s partnership with Google for the operation of such attacks. “Univision uses this service as a political-payback tool for politicians as well as an anti-trust violating anti- competition tool for its clients”, claim TARGET’s. The TARGET’s are informed and believe and, based on that information and belief, allege that the named The ATTACKERS herein and each of the parties designated as a “DOE” and every one of them, are legally responsible jointly and severally for the Federal RICO Statute violating events and happenings referred to in the within Complaint for Intentional Interference with Contractual Relations, Intentional Interference with Prospective Economic Advantage, Cyberstalking, Fraud, Invasion of Privacy, Unfair Competition and Theft of Intellectual Property and RICO statute violations. In particular, The ATTACKERS took compensation for, and engaged in, malicious and coordinated tactics to seek to destroy, damage, harm and ruin TARGET’s via an illicit media “hit-job” service which The ATTACKERS regularly offered in covert commerce and engaged in regularly against targets that The ATTACKERS were hired to seek to ruin as part of reprisal, vendetta, retribution programs operated for business and political competitors of the targets. Historical facts and other history-making lawsuits by third parties, has proven The ATTACKERS to be the single largest core violator of human rights, in this manner, in the world. The ATTACKERS offer the service of creating and publishing contrived “hatchet job” movies, fake news articles, faked comments and repercussion backlinks describing the TARGET’s in horrific descriptors. The ATTACKERS media holdings manipulate national elections.

Let’s be clear on this: TARGET does swear, warrant and certify that Google, Facebook, YouTube, The Elon Musk Group, Twitter and Linkedin plan and operate the conscious and manual manipulation of national American elections and international elections.

The attack material is reposted, “impression accelerated”, “click-farm fertilized” and Streisand array cloned over-and-over by The ATTACKERS massive character assassination technology via servers, algorithms and technical internet manipulation, daily, as recently as yesterday. The ATTACKERS also embed the article in job hiring databases on Axciom, Palantir, Taleo and other databases used by all hiring and recruiting services in order to prevent TARGET’s from ever receiving income for W2 or 1099 work ever again. The ATTACKERS own staff then post thousands of fake comments, below each attack item, under fake names, designed to make it appear as if a broad consensus of the public agreed with the defamation messages by The ATTACKERS. Almost all of the fake comments were created by a handful of The ATTACKERS own staff pretending to be a variety of outside voices. The ATTACKERS provide the service of delivering “weaponized text and media to corporate clients”. The ATTACKERS replicated various versions of these attack items across all of their different brands and facade front publications and addedadditional fake comments to each on a regular basis.

The ATTACKERS have formed a business and political and industry manipulation “Cartel”. The bosses of the the ATTACKERS intended to inflict corruption upon the United States Federal Government, The State Government and the California State authorities, as defined by law under RICO Racketeering Statutes for the purpose of manipulating the value of stock market holdings and controlling political policy decisions.

In exchange for financing, The ATTACKERS Clients gave The ATTACKERS Associates business monopolies and government contract monopolies and media distribution exclusives worth trillions of dollars. This was an illegal quid-pro-quo arrangement. TARGET’s designed, produced, received patent awards on, received federal commendations for, received federal funding for and first marketed the very products which The ATTACKERS copied and made billions of dollars on and which The ATTACKERS felt might beat them in hundreds of billions of dollars of competitive market positions and stock market trades. Companies operated by TARGET’s included automobile design and manufacturing companies, global television broadcasting companies and energy companies which are commonly known to have generated hundreds of billions of dollars in profits, revenue and stock market transactions for The ATTACKERS competing holdings at TARGET’s expense. The ATTACKERS operated a criminal CARTEL as defined by RICO LAWS and that Cartel ran an an anti-trust market rigging and crony political payola operation. The ATTACKERS spent tens of millions of dollars attacking TARGET’s because The ATTACKERS were not clever enough to build better products. The ATTACKERS chose to “CHEAT RATHER THAN COMPETE” and to try to kill TARGET’s lives, careers, brands, revenues, assets, businesses and efforts via malicious and ongoing efforts.

The U.S. Attorney General has been informed, in writing, of these charges and TARGET’s understand that DOJ officials have an ongoing investigation into these matters.Under investigation for these crimes, New York State attorney general Eric Schniderman was recently forcedto quit over corruption and sexual cult charges involving the NXIUM group and related matters.

Due to The ATTACKERS fears of the loss of up a trillion dollars of crony payola from their illegal abuse of taxpayer funds, The ATTACKERS engaged in felonious actions in order seek to intimidate others.

Just as, over time, the Watergate crimes are now intimately documented and detailed; over time The “Cleantech Crash Scandal” as featured on CBS News 60 MINUTES TV Show, has

been detailed and exposed in numerous federal, news media and public investigations. Significant barriers to justice were illicitly placed in front of TARGET’s by The ATTACKERS.

The ATTACKERS organized and operated a series of malicious attacks and thefts against TARGET’s as reprisals and competitive vendettas. The ATTACKERS report to the FBI, GAO, FTC, SEC,

Congressional Ethics Committees, The White House and other entities on a regular basis.

The ATTACKERS and their associates Elon Musk, Jon Doerr, Eric Schmidt, Larry Page, Steve Jurvetson, Vinod Khosla and other members of the “Silicon Valley Cartel” are documented in tens of thousands of news reports, federal law enforcement reports and Congressional reports in their attempts to infiltrate and corrupt the U.S. Government in an attempt to route trillions of tax dollars to The ATTACKERS private accounts. The ATTACKERS perceived TARGET’s as a threat to their crimes. Federal investigators, news investigators and whistle-blowers have reported to TARGET’s that The ATTACKERS were the financiers and/or beneficiaries and/or command and control operatives for the crimes and corruption disclosed in the CBS NEWS 60 Minutes investigative reports entitled: “The Cleantech Crash”, “The Lobbyists Playbook” and “Congress Trading on Insider Information”; The Feature Film: “The Car and the Senator” Federal lawsuits with case numbers of: USCA Case #16-5279; and over 50 other cases including the ongoing “Solyndra” investigation and federal and Congressional investigations detailed at:

http://greencorruption.blogspot.com

and

https://theintercept.com/2016/04/22/googles-remarkably-close-relationship-with-the-obama-white-house-in-two-charts/

 

and thousands of other documentation sites. TARGET’s are charged withengaging in these crimes and corruptions against TARGET’s and financing and ordering attacks on TARGET’s. TARGET’s engaged in U.S. commerce and did everything properly and legally. Unlike The ATTACKERS, TARGET’s did not steal technology. Unlike The ATTACKERS, TARGET’s did not bribe elected officials in order to get market exclusives. Unlike The ATTACKERS, TARGET’s did not poach The ATTACKERS staff. Unlike The ATTACKERS, TARGET’s were the original inventors of their products. Unlike The ATTACKERS, TARGET’s did not operate “AngelGate Collusion” schemes and “High Tech No Poaching Secret Agreements” and a Mafia-like Silicon Valley exclusionary Cartel. Unlike The ATTACKERS, TARGET’s did not place their employees in the U.S. Government, The California Government, The U.S. Patent Office and The U.S. Department of Energy in order to control government contracts to The ATTACKERS exclusive advantage. Unlike The ATTACKERS, TARGET’s did not place moles inside of competitors companies. Unlike The ATTACKERS, TARGET’s did not hire Gawker Media and Think Progress to seek to kill TARGET’s careers, lives and brands. Unlike The ATTACKERS, TARGET’s did not rig the stock market with “pump-and-dump”, “Flash Boy” and “Google-stock/PR-pump” schemes. TARGET’s engaged in hard work every day of their lives for the time-frame in question under the belief that the good old American work ethic and just rewards for your creations was still in effect in the U.S.A., and that the thieves and criminals that attempted to interdict TARGET’s would face Justice. In a number of circumstances The ATTACKERS took advantages of TARGET’s hard work via come-ons; The ATTACKERS then made billions of dollars from Plainiffs work at TARGET’s expense and attacked TARGET’s in order to reduce TARGET’s competitive and legal recovery options.

The ATTACKERS exchanged payments for services via cash, stock warrants, illicit personal services, media control and a technology known as a “Streisand Effect Massive Server Array” which can control public impressions for, or against a person, party, ideology or issue. The ATTACKERS StreisandEffect internet system was used to destroy TARGET’s in reprisal, retribution, and vendetta for TARGET’s help with law enf ment efforts in the case and because TARGET’s companies competed with The ATTACKERS companies with superior technologies.

The ATTACKERS have used their Streisand Effect technology to build a character assassination ring of bloggers and hired shill “reporters” who engage in a process called a “Shiva”. This process is named after a TARGET in a similar case named: Shiva Ayyadurai, the husband of Actress Fran Drescher. Shiva Ayyadurai holds intellectual property rights to part of The ATTACKERS email technology. In fact, the people most threatened by the Shiva Ayyadurai patent right claims, ironically turn out to be The ATTACKERS and, in particular, The ATTACKERS associates Elon Musk, Jon Doerr, Eric Schmidt, Larry Page, Steve Jurvetson, Vinod Khosla and other members of the “Silicon Mafia” who own most of the main companies exploiting email technology. Were Shiva Ayyadurai to prevail in his claims, The ATTACKERS would owe him billions of dollars. “Running A Shiva” involves the production of a series of Defamation articles by bloggers who act asif they are independent from The ATTACKERS but are in fact, not. The ATTACKERS used “the Shiva” to attack and seek to destroy Donald Trump, Shiva Ayyadurai, TARGET’s, and numerous political figures. Univision, Unimoda,Jalo pnik, Gawker Media, Gizmodo and over a hundred stealth-ed, and overt, assets of The ATTACKERS have been using “The Shiva” network to attack Donald Trump, Shiva Ayyadurai, TARGET’s, and numerous political figures as recently as this morning, thus, the time bar restarts every day. TARGET’s have pleaded with The ATTACKERS to cease their attacks but The ATTACKERS have refused to comply. Even with Fran Drescher’s ongoing royalty payments from her popular television series, friends have reported that the attacks on the Ayyadurai family have been devastating and have caused massive damages and personal and emotional devastation.

The ATTACKERS produced animated movies, attack articles, fake blog comments, DNS routes, “Shiva” Campaigns, and other attack media against TARGET’s and expended over $30 million dollars in value, as quantified by The ATTACKERS partner: Google, in placing the attack material in front of 7.5 billion people on the planet for the rest of TARGET’s lifetime. No person could survive such an attack and in the case of TARGET’s, lives were destroyed and multiple companies invested into by TARGET’s, which The ATTACKERS made over $50B off of the copies of, were destroyed because they competed with The ATTACKERS.

The TARGET’s are informed and believe, and based on that information and belief allege that at all times mentioned in the within Complaint, all The ATTACKERS were the agents, owners and employees of their affiliated insiders and, in doing the things alleged in this Complaint, were acting within the course and scope of such agency and employment.

As to any corporate employer specifically named, or named as a “DOE” herein, the TARGET’s are informed and believe and therefore allege that any act, conduct, course of conduct or omission, alleged herein to have been undertaken with sufficient, malice, fraud and oppression to justify an award of punitive damages, was, in fact, completed with the advance knowledge and conscious disregard, authorization, or ratification of and by an officer, director, or managing agent of such corporation. The Statute of Limitations and time bar on this case has not expired. TARGET’s only became aware of all of the facts recently due to the FBI, Congressional and hacker-exposed investigation data on The ATTACKERS operating and receiving cash, rewards and assets from an illegal and illicit set of political slush-funds established to compensate them for financing political campaigns. The Sony, Clinton, DNC, HSBC, Panama Papers and other hacks and publication of all of the relevant files and the Congressional investigation of illicit activities and the continuing issuance of federal documents to TARGET’s confirming TARGET’s intellectual property areall vastly WITHIN the statutes of limitations to allow this case to proceed to Jury Trial. TARGET’s has had a long, ongoing and high-level interaction with Defendant in both the work effort and the monetization and collection effort. TARGET’s has been continually interactive with Defendant in order to try to collect his money. Attacks and interference with TARGET’s has occurred as recently as this week by The ATTACKERS. The TARGET’s, whose multiple businesses ventures had already suffered significant damage as the result of the online attacks of the The ATTACKERS, contacted renowned experts, and especially Search Engine Optimization and forensic internet technology (IT) experts, to clear and clean the internet of the false, defamatory, misleading and manufactured information belittling the TARGET’s, attacking them and discrediting their reputation as an inventor, product developer and project director from their websites.

None of the technology experts hired by the TARGET’s, at substantial expense, were successful in their attempts to clear, manage or even modify the false, defamatory, misleading and

manufactured information belittling the TARGET’s, attacking him and discrediting their reputation as an inventor, product developer and project director which only The ATTACKERS, the controlling entity of the internet, refused to remove. In fact, those experts were able to even more deeply confirm, via technical forensic internet analysis and criminology technology examination techniques that The ATTACKERS was rigging internet search results for its own purposes and anti-trust goals.

All efforts, including efforts to suppress or de-rank the results of a name search for “TARGET’s” failed, and even though tests on other brands and names, for other unrelated parties did achieve balance, the SEO and IT tests clearly proved that The ATTACKERS was consciously, manually, maliciously and intentionally rigging its search engine and adjacent results in order to “mood manipulate” an attack on TARGET’s.

In fact, the experts and all of them, instead, informed the TARGET’s, that, not only had The ATTACKERS locked the false, defamatory, misleading and manufactured information belittling the

TARGET’s, attacking them and discrediting their reputation as an inventor, project developer and project director into its search engine so that the information could never be cleared, managed or even modified, The ATTACKERS had assigned the false, defamatory, misleading and manufactured information belittling the TARGET’s, attacking them and discrediting their reputation as an inventor, project developer and project director “PR8” algorithmic internet search engine coding embedded in the internet information-set programmed into Defendantsinternet architecture. [See, Information received from one of over 30 IT, forensic network investigators and forensic SEO test analysts, a true and correct copy of which is attached hereto in the Exhibits.]

 

Per the many world-wide search engine results forensic analysis experts TARGET hired – They had never seen search engines results that were locked so maliciously, manually and unmovably into Google’s and YouTube’s search results. “It was as if the CIA, or Larry Page himself, was doing this”, said one. TARGET placed associates inside of Google and, among other things, acquired bank records proving Google and the attackers were exchanging millions of dollar with each other.

TARGET even went to the effort of placing nearly a thousand virtual forensic test servers around the globe, using empty space on third-party existing servers owned by hundreds of other people, in order to monitor and metricize the manipulations of search results of examples of the

TARGET’s name in comparison to the manipulations for PR hype for The ATTACKERS financial partners, for example: the occurrence of the phrase ”Elon Musk”, The ATTACKERS business partner and beneficiary, over a five year period. The EU, China, Russia, and numerous research groups (ie:

http://www.politico.com/magazine/story/2015/08/how-google-could-rig-the-2016-election-121548 By Robert Epstein ) have validated these forensic studies of The ATTACKERS architect-ed character assassination and partner hype system .

The “PR8” codes are hidden codes within the The ATTACKERS software and internet architecture which profess to state that a link is a “fact” or is an authoritative factual document per The ATTACKERS research. By placing “PR8” codes in the defamatory links that The ATTACKERS was manipulating about TARGET’s, The ATTACKERS was seeking to tell the world that the links pointed to “Facts” and not “Opinions”. The ATTACKERS embedded many covert codes in their architecture which marketing the material in the attack links and video as “facts” according to The ATTACKERS.

The “PR8” codes are a set of codes assigned and programmed into the internet, by the The ATTACKERS to matters it designates as dependable and true, thereby attributing primary status as the most The ATTACKERS is known to have provided tens of millions of dollars to this tabloid chain per The ATTACKERS financial staff, SEC filings and disclosures in other legal cases.

TARGET also used CIA technology call “Steganography” to embed text-based messages and codes into photos and videos in order track Google and YouTube’s global impression manipulations and create a significant and important link to be viewed by online researchers regarding the subject of their search.

The ATTACKERS were fully aware that all of the information in the attack articles against TARGET’s was false,The ATTACKERS promo ted these attacks as vindictive vendetta-like retribution against TARGET.

At all times The ATTACKERS maintained it had no subjective control or input into the rankings of links obtained by online researchers as the result of a search on its search engines and that its search engine algorithms and the functions of its media assets were entirely “arbitrary” according to the owners and founders of The ATTACKERS.

In or about April 15, 2015, The European Union Commission took direct aim at The ATTACKERS charging the their Internet-search giant with skewing and rigging search engine results in order to damage those who competed with The ATTACKERS business and ideological interests.

In those proceedings, although The ATTACKERS continued to maintain that it has no subjective control or input into the rankings of links obtained by online researchers as the result of a search

on its search engines and that its staff had no ability to reset, target, mood manipulate, arrange adjacent text or links, up-rank, down-rank or otherwise engage in human input which would change algorithm, search results, perceptions or subliminal perspectives of consumers, voters, or any other class of users of the worldwide web, also known as The Internet, the court, in accord with evidence submitted, determined that The ATTACKERS, does in fact have and does in fact exercise, subjective control over the results of information revealed by searches on its search engine.

The ATTACKERS has a variety of such hidden codes and has various internal names for such codes besides, and in addition to, “PR8”. The ATTACKERS has been proven to use these fact vs. fiction

rankings to affect elections, competitors rankings, ie: removing the company: NEXTAG from competing with The ATTACKERS on-line; or removing political candidates from superior internet exposure and it is believed by investigators and journalists, that The ATTACKERS are being protected

from criminal prosecution by public officials who The ATTACKERS have compensated with un-reported campaign funding. As a result of receiving this information, the TARGET’s became convinced of the strength and veracity of their original opinion that the The ATTACKERS, had, in fact posted the false, defamatory, misleading and manufactured information belittling the TARGET’s, attacking them and discrediting TARGET’s reputation as inventor, project developer and project designer had been intentionally designed, published, orchestrated and posted by them in retaliation to the true testimony provided by the TARGET’s, to the Government Office of Accountability of the United States in May of 2005, and to the Securities and Exchange Commission, The Federal Bureau of Investigation, The United States Senate Ethics Committeeand other investigating parties, and had been disseminated maliciously and intentionally by them in an effort to do damage to their reputation and to their business prospects and to cause him severe and irremediable emotional distress. In fact, the TARGET’s, has suffered significant and irremediable damage to their reputation and to their financial and business interests. As a natural result of this damage, as intended by the

The ATTACKERS, Plaintiffs has also suffered severe and irremediable emotional distress.

 

To this day, despite the age of the false, defamatory, misleading and manufactured information belittling the TARGET’s, attacking him and discrediting their reputation as an inventor, project developer and project director, in the event any online researcher searches for information regarding the TARGET’s, the same information appears at the top of any list of resulting links.

 

In addition, due to their control of all major internet database interfaces, The ATTACKERS have helped to load negative information about TARGET’s on every major HR and employment database that TARGET’s might be searched on, thus denying TARGET’s all reasonable rights to income around the globe by linking every internal job, hiring, recruiter, employment, consulting, contracting or other revenue engagement opportunity for TARGET’s back to false “red flag” or negative false background data which is designed to prevent TARGET from future income in retribution for TARGET’s assistance to federal investigators.

 

HARM #7: The ATTACKERS USED FACTORY-PROCESSED SOCIAL MEDIA ATTACKS AGAINST THEIR TARGETS:

In the book: “ATTACKED”, the Court will see the CIA, FSB and MI6 tactics and techniques that are trained and practiced, illicitly, by political officials. Social networking sites including MeetUp, Match, Facebook, etc. and all other IAC-owned, or similar, sites (IAC is managed by Hillary Clinton’s daughter, whose Mother knew TARGET’s) have had their profiles, texts, and inter-member communications, since those companies were started, hacked or purchased. The financiers of almost everyone of these sites are also the financiers of the suspects. The attack service providers use Palantir, Acronym, In-Q-Tel financed data analysis software to analyze every activity in those services in order to find honey-trap, blackmail and social conflict exploitation opportunities. Your social life will, essentially, end. Every photo on every social site is cross checked with every other photo on the internet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total manipulation profile data file on you. New contacts on these sites were contacted by the attackers and told to “avoid” the TARGET’s in order to damage TARGET’s. These attacks were all documented and operated against TARGET as detailed in the EXHIBITS and evidence repositories. The ATTACKERS bought these services from Eastern Bloc nations, China and South America. “The Agency”, in Russia does much of this work. They are hard at work, even as recently as today according to the CIA, pushing a “positive spin” on Russia’s invasion of the Ukraine based on Hunter Biden’s computer leaks.

HARM #8: GOVERNMENT OFFICIALS CAUSED SSA AND HUD BENEFITS BLOCKADES AND MANIPULATIONS AS REPRISAL AGAINST TARGET:

Social Security, SSI, SDI, Disability and other earned benefits were stone-walled. Applications for benefits for the TARGET’s were intentionally “lost” like a “Lois Lerner hard drive”. Files in the application process “disappeared”. A U.S. Senator ordered TARGET’s benefits to “never be approved” even though TARGET’s worked 60 hour+ weeks for decades in service to their nation and their community. A SSA official in the local SSA office, who had a devout expressed hatred against one United States President ordered a benefits blockade against TARGET’s because he found out that TARGET’s ex-lawyer now worked in the White House. Forensic evidence and backgrounders on every person who worked on, or had access to, Applicants files, records, benefits decisions and related data sets shows that a number of those employees and contractors were members, financiers, web promoters or supporters of ANTIFA anarchy groups or KKK or Proud Boys related political activist-type groups. In San Francisco and Marin Counties SSA offices, in employees workspaces and on their Facebook and MySpace sites, many employees proudly display pictures of themselves wearing their pink “pussy hats”, black riot gear and sporting political tattoos. FBI records and IG investigations show that SSA has the highest percentage of political activist employees of any federal agency. Such persons are inclined to become drunk with power when allowed access to the trillions of dollars of government technology on the SSA file and decisions systems. A number of these persons have worked for, or with, U.S. Senators and other politicians who targeted Applicant in political reprisal. At least 3 persons in the San Francisco SSA office, at least 2 persons in the San Mateo SSA office and at least 2 persons in Marin SSA office are known to have engaged in such actions. Applicants funding and benefits were manipulated, so as to harm Applicant, as political reprisal as vendetta for his provision of testimony to federal investigators in a trillion dollar political corruption matter involving famous political figures featured in global news coverage. A vast number of agency abuse cases and lawsuits are now on public record in the Inspector General’s offices and federal courts. It is an indisputable fact that some government agencies run “hit-jobs” on citizens on orders from certain corrupt politicians.

These actions are felony violations of the law. Federal and State Agencies including SSA, FEC, GOVT, HHS, VA, CIA, HUD, SA, SEC, FBI, DOJ and many others, have been charged, and found guilty, in these crimes against citizens. In the Congressional investigation published by the United States Congress in review of the U.S. Department of Energy LGP/ATVM programs, it is clearly proven that the U.S. Department of Energy was used as a slush-fund by some GOVT executives in order to pay off campaign financiers by attacking and sabotaging their competitors. The GOVT Paducah Gaseous Diffusion Plant under contracts with The U.S. Government and the government-owned U.S. Enrichment Corp paid $5M whistle-blower awards to those whistle-blowers who were attacked, using government agency resources, for reporting a crime. Dept. of Energy Hanford URS has agreed to settle a lawsuit brought by former employee Walter Tamosaitis for $4.1 million.

The settlement in the whistle-blower case comes almost one year before the case was set for a jury trial in federal court in Richland and compensates Tamosaitis for attacks against him, by GOVT officials, in retribution for reporting a crime. VA officials attacked hundreds of citizens who reported corruption, ie: https://www.thenewamerican.com/usnews/health-care/item/18610-va-whistleblowers-facing-retribution. As shown in this report: https://www.pogo.org/analysis/2018/08/new-report-confirms-whistleblower-retaliation-is-alive-and-well-at-department-of-veterans-affairs/, Agencies attack often and harshly. CIA and NSA executives have been widely shown to use spy tools to attack domestic citizens they don’t like, ie: https://www.dailymail.co.uk/news/article-2435011/NSA-employees-used-phone-tapping-tools-spy-girlfriends-cheating-husbands.html , and hundreds of other news links that can be provided. Elon Musk and Tesla, as well as Eric Schmidt and Larry Page at Google, have been proven to use the CIA group: IN-Q-TEL, to run government sponsored/financed attacks on business competitors. In Civil Action No. 1:13-cv-00777-RBW GOVERNMENT AGENCIES WERE CAUGHT BEING USED FOR ATTACKS AGAINST CITIZENS AND PUNISHED IN THE COURT AND THE MEDIA! The IRS, and hordes of other government agencies have been caught and proven, IN COURT, to target and attack people for presumed political differences.

Why should we assume that the Social Security Administration is not ALSO doing this too to harm citizens who speak out? The Lois Lerner IRS attacks took many years to resolve. In an unprecedented victorious conclusion to a four year-long legal battle against the IRS, the bureaucratic agency admitted in federal court that it wrongfully targeted citizens, during the Obama Administration, because of their political viewpoints and issued an apology to those people for doing so. In addition, the IRS is consenting to a court order that would prohibit it from ever engaging in this form of unconstitutional discrimination in the future. In a proposed Consent Order filed with the Court, the IRS has apologized for its treatment of U.S. citizens including organizations from 20 states that applied for 501(c)(3) and (c)(4) tax-exempt status with the IRS between 2009 and 2012 — during the tax-exempt determinations process. Crucially, following years of denial by the IRS and blame-shifting by IRS officials, the agency now expressly admits that its treatment of our clients was wrong and a total violation of our Democracy. As set forth in the proposed Order: “The IRS admits that its treatment of TARGET’s during the tax-exempt determinations process, including screening their applications based on their names or policy positions, subjecting those applications to heightened scrutiny and inordinate delays, and demanding of some TARGET’s’ information that TIGTA determined was unnecessary to the agency’s determination of their tax-exempt status, was wrong.

For such treatment, the IRS expresses its sincere apology.” Throughout litigation of this case, activists have remained committed to protecting the rights of the public who faced unlawful and discriminatory action by the IRS and other agencies. The objective from the very beginning has been to hold agencies accountable for corrupt practices.

This Consent Order represents a historic victory for the public and sends the unequivocal message that a government agency’s targeting of citizens organizations, or any organization, on the basis of political viewpoints, will never be tolerated and that revenge will be swift and vast. The Order will put an end, once and for all, to the abhorrent practices utilized against citizens, as the agreement includes the IRS’s express acknowledgment of – and apology for – its wrongful treatment of the public. While this agreement is designed to prevent any such practices from occurring again, rest assured that all public interest lawyers will remain vigilant to ensure that the IRS, SSA, DOJ or SEC does not resort to such tactics in the future. Per detailed reports, in March of 2012 lawyers began being contacted by literally dozens of citizens and groups who were being harassed by the Obama IRS after submitting applications for tax-exempt status. Their tax-exempt applications were held up for years (over seven years in some cases), and they began receiving obtrusive and unconstitutional requests for donor and member information. That began a now more than five and a half year fight with the burgeoning bureaucracy at the IRS. Then on May 10, 2013, Lois Lerner, the then head of the IRS Tax Exempt Organizations Division, publicly implicated the IRS in one of the worst political targeting scandals of the century.

This is an extraordinary victory against government agency abuse. It sends a powerful warning to the deep state bureaucracy that it will not be allowed to violate the Constitution in order to silence and shut down the whistle-blowers. In addition to the IRS’s admissions of and apology for its wrongful conduct, the Consent Order would specifically award TARGET’s the following: – A declaration by the Court that it is wrong to apply the United States tax code to any tax-exempt applicant or entity based solely on such entity’s name, any lawful positions it espouses on any issues, or its associations or perceived associations with a particular political movement, position or viewpoint; – A declaration by the Court that any action or inaction taken by the IRS must be applied evenhandedly and not based solely on a tax-exempt applicant or entity’s name, political viewpoint, or associations or perceived associations with a particular political movement, position or viewpoint; and – A declaration by the Court that discrimination on the basis of political viewpoint in administering the United States tax code violates fundamental First Amendment rights.

Disparate treatment of taxpayers based solely on the taxpayers’ names, any lawful positions the taxpayers espouse on any issues, or the taxpayers’ associations or perceived associations with a particular political movement, position or viewpoint is unlawful. In the Order, the IRS has also agreed that (unless expressly required by law) certain actions against the TARGET’s– i.e. the sharing, dissemination, or other use of information unnecessarily obtained by the IRS during the determinations process (such as donor names, the names of volunteers, political affiliations of an organization’s officers, etc.) – would be unlawful. In addition, the IRS promises not to take any retaliatory action against our clients for exposing the targeting scheme. Finally, and of crucial significance, the IRS admits it targeted persons and groups based on their viewpoints (i.e., “policy positions”) and that such viewpoint discrimination violates fundamental First Amendment rights. This is the first time the IRS has admitted that its targeting scheme was not just “inappropriate” – as TIGTA found – but, as alleged, blatantly unconstitutional. To ensure consistency and uniformity within the agency’s operations going forward, the IRS is required, pursuant to the Order, to inform all employees within the Exempt Organizations Division, as well as the Commissioners and Deputy Commissioners within other divisions, of the Order’s terms. This Order not only validates allegations about their treatment at the hands of the corrupt Obama-era IRS but also provides important assurances to the American public that the agency understands its obligation to refrain from further such discriminatory conduct. As Attorney General Sessions acknowledged in this regard, “[t]here is no excuse for [the IRS’s] conduct,” as it is “without question” that the First Amendment prohibits the conduct that occurred here, i.e., subjecting American citizens to disparate treatment “based solely on their viewpoint or ideology.” Sessions further confirmed his Department’s commitment to ensuring that the “abuse of power” in which the IRS engaged here “will not be tolerated.” It is impossible to overstate the importance of this victory.

This marks a years-long fight for justice in defense of the constitutional rights of the public. This is an extraordinary victory against abuse of power and corruption. It sends a powerful warning to the deep state bureaucracy that it will not be allowed to violate the Constitution and manipulate the IRS, SSA and other agencies in order to silence and shut down those who speak out about political corruption crimes. In the wake of Wisconsin Watchdog’s investigation into SSA staff allegations of incompetence, misconduct, and retaliation in Social Security disability appeals offices, several employees have taken their complaints to a Senate committee led by Wisconsin Sen. Ron Johnson.
An official with knowledge of the complaints said the Senate Homeland Security and Governmental Affairs Committee, chaired by the Oshkosh Republican, has received emails and other contacts from “certain people” inside the Social Security Administration’s Office of Disability Adjudication and Review. The initial complaints came from an employee inside the Milwaukee office following Wisconsin Watchdog’s opening investigative report that found some claimants waiting more than 1,000 days for an appeals decision on their disability benefits claim. Following Wednesday’s story of a whistle-blower in the Madison ODAR office, the committee has received more specific complaints about retaliation against employees, the source said. Committee staff members sent the latest Watchdog piece to SSA administrators hoping they will “cooperate,” the source said. To date, the agency has been less than cooperative. “This is an ongoing process, and they are not always as forthcoming as we’d like them to be,” the source said. “Hopefully with your continued reporting, this is an issue they can’t duck.” A Senate committee member said officials there are working with the Office of Special Counsel on “multiple whistle-blower retaliation claims.” The committee continues to request information from the SSA. The whistle-blower in the Madison office claims management retaliated against her after she was called to testify in a misconduct case.

The incident involved “inappropriate behavior” by an administrative law judge, she said. “They are so corrupt. It’s absolutely horrible,” said the woman, a lead case technician in the Madison Office of Disability Adjudication and Review. She spoke on condition of anonymity, fearing more retribution from her supervisors. While she said recounting her particular experiences will more than likely betray her identity anyway, the ODAR case worker insisted she has had enough. “I’m at point where they don’t care about me, I don’t see why I’m protecting them. This is my last resort,” she said. “I want to do my work without fear of retaliation.” She said she has contacted the Senate committee. “I forwarded my information to them and I got an email back from them. See these reports:

HARM #9: The ATTACKERS USED BLACKLISTING AGAINST TARGET:

ie: The U.S. Stops Silicon Valley’s ‘No Poaching’ Deals. . . a …

https://www.aol.com › 2010 › 09 › 26 › doj-stops-silicon-valleys-no-poaching-deals-a-few-years-t

DOJ Stops Silicon Valley’s ‘No Poaching’ Deals. … But anyone on the ground in Silicon Valley knows that a full-blown war for talent is under way, with checkbooks blazin. Government officials and tech oligarchs contacted members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade TARGET’s from receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the “AngelGate” Scandal and the “High Tech No Poaching Class Action Lawsuit” cases) you will never get investor funding again.

HARM #10: The ATTACKERS ORDERED FOIA OBFUSCATION OF TARGET’S FOIA AND STILL HAVE NOT RESPONDED TO MANY FOR YEARS BECAUSE THEY SHAME The ATTACKERS:

Federal FOIA requests were hidden, frozen, stone-walled, delayed, lied about and only partially responded to in order to seek to hide information and run cover-ups. In once instance, even though GOVT FOIA staff had the requested FOIA files in their top desk drawers, they delayed handing the FOIA copies over for nearly a decade in order to run a cover-up.

HARM #11: The ATTACKERS ENGAGED IN ARBITRARY DEADLINE MANIPULATION:

Crony state and federal officials play an endless game of Catch-22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed. DOE’s PATTERN OF SUPPORTING WHISTLEBLOWER RETALIATION:

 

In case # 2:11-cv-05157-LRS ECF; it was proven that when a DOE contractor employee files a complaint alleging whistleblower retaliation, it is the practice of the DOE to align itself with the contractor and to assert attorney client privilege. For example, in an eleven-TARGET whistleblower retaliation case litigated against Fluor Federal Services, Inc., DOE attorney Robert Carosino refused to disclose evidence relating to meetings between DOE and the offending contractors claiming attorney client privilege because DOE and the contractor share a common interest in the litigation. A13-18. This practice prevents the DOE from effective oversight of contractor retaliation and creates a culture of fear among the Hanford workforce.

Upon Dr. Tamosaitis filing a whistleblower complaint with the DOL in 2010, the DOE, Bechtel and URS asserted attorney client privilege as to their discussions concerning Dr. Tamosaitis’ claim owing to their common interest. This fact has been verified by the sworn testimony of Jean Dunkirk in her deposition, which was taken in connection with the state claim (transcript available).

There is a practice of DOE managers, and most other government agency managers, supporting retaliation against contractor employees who oppose unsafe practices. For example, in 2008, then URS Chief Nuclear Engineer and Manager of Nuclear Safety Donna Busche, was terminated from her position at the Waste Isolation Pilot Plant in Carlsbad, New Mexico, with the approval of DOE officials, after she refused to rescind a Technical Safety Violation report that she had filed regarding the improper handling of a drum from Hanford that contained transuranic waste.

In 2009, Ms. Busche was reassigned to the WTP as Manager of Environmental and Nuclear Safety. A155-6. In October 2010, she was berated by Ines Triay, the DOE EM1, after giving truthful testimony at a hearing a by the DNFSB. A198-199. At a post-hearing meeting with Ms. Triay and numerous URS managers, Triay said, “If your intent was to piss people off, you did a very good job. You pissed people off.” A199. Ms. Bushe has suffered retaliation since then,

which has been compounded by her having been a witness in this case. 2.60 In 2010, DOE WTP Federal Project Director Dale Knudson submitted a sworn statement to the DOL indicating that he “did not direct BNI or URS to take any specific actions with regards to Dr. Tamosaitis.” A14. In fact, Knudson was directly involved in the decision to terminate Dr. Tamosaitis from the WTP. A114. He also participated in the decision that Dr. Tamosaitis not be returned to the WTP after

hearing that Dr. Tamosaitis was a whistleblower. Throughout the Tamosaitis retaliation, DOE managers supported Bechtel and URS efforts to stop necessary design changes to the WTP so that artificial deadlines could be met, and did nothing to protect, or supported, retaliation by

contractors against employees who opposed those improper decisions.

PLACING A CONTRACTOR EMPLOYEE INTO AN OVERSIGHT POSTION

CREATED AN INHERENT CONELICT OF INTEREST: In 2010, DOE placed PNNL manger Dale Knudson into the position of DOE Federal Project Director of the WTP. A52-3. This created an inherent conflict of interest in that a contractor employee who, on information and belief, is not

motivated by government service and placing the public interest before profit, is placed in a temporary position, overseeing the work of other contractors. On information and belief, after about two years, Knudson will return to his position at PNNL or to another position in the private sector.

 

HARM #12: POLITICAL POISONING & TOXIC EXPOSURE BY The ATTACKERS HARMED TARGET:

TARGET’s were found to be strangely poisoned, not unlike the Alexander Litvenko case, The Salisbury Case and hundreds of other political poisoning cases. Heavy metals and toxic materials were found right after TARGET’s work with The U.S. Government weapons and energy facilities. Many wonder if TARGET’s was intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of TARGET’s were exposed to deadly compounds and radiations, via GOVT, without being provided with proper HazMat suits which GOVT officials knew were required. TARGET was awarded an exceptional number of issued patents on the energy technologies he had developed for the Dept of Energy. 3rd Party outside legal valuation experts appriased the value of these patents at over $200,000.000.00. The patents, clearly visible in full detail, on the US Patent office website, list many of the chemicals and compounds TARGET was working with without adequate hazmat resources of Sandia, Argonne or other National Labs safety oversight.

HARM #13: WORKPLACE SABOTAGE AND OBSTRUCTION OF TARGET’S RIGHT TO WORK:

TARGET’s contacts at ARTECH and KAISER PERMANENTE were called, and faxed, and ordered to fire target TARGET’s from their places of employment, in the middle of the day, with no notice, as a retribution tactic.

HARM #14: MEDIA ASSASSINATION PROGRAMS WERE CONTRACTED BY The ATTACKERS TO HARM TARGET:

On orders from Obama White House officials Google, YouTube, Gawker Media and Gizmodo Media produced attack articles. Google locked these contrived attack articles from the Nicholas Guido Denton tabloid empire on the top line, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over $40 million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of these attacks proves that Google rigged these attacks against TARGET’s on the internet and that all of Google’s “impressions” are manually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. This data was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of public perceptions. Hired attackers Nicholas Guido Denton, John Herman, Adrian Covert, Ian Fette, Patrick George, Gabrielle Darbyshire and John Cook have been referred to the FBI for surveillance, tracking and interview relative to the command, control and compensation for those attacks.

HARM #15: COMMERCIAL EMPLOYMENT DATABASE POISONING AND RED-FLAGGING OF TARGET’S HR DATABASE REFERENCES WERE CREATED TO HARM TARGET’S INCOME POTENTIAL:

TARGET’s HR and employment records, on Taleo, Palantir and EVERY recruiting and hiring database, was embedded with negative keywords and “flags” in order to prevent the TARGET’s from ever gaining future employment.

HARM #16: ATTEMPTS ON THE LIVES OF WHISTLE-BLOWERS BY THE ATTACKERS WERE MEANT TO FRIGHTEN TARGET:

Gary D. Conley, Seth Rich, Rajeev Motwani who TARGET’s knew, and many other whistle-blowers in these matters, turned up dead under strange circumstances. TARGET’s has received ongoing death threats for his help to federal investigations in the larger organized crime investigation relative to this matter. See the list of over 120 dead victims, lower down in this document, 1/3 of whom worked with TARGET’s and were threatened in advance of their deaths.

HARM #17: THE ATTACKERS ENGAGED IN REVENUE BLOCKADES AND INTERNET INCOME RE-DIRECTION TO MINIMIZE TARGET RESOURCES SO HE COULD NOT FIGHT BACK:

Paypal, and other on-line payments for on-line sales by TARGET’s are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target who competed with the attackers interests and holdings. This further denied TARGET’s income. As a test, TARGET’s built an online store with hundreds of thousands of products and marketed it globally. Trackers, placed by TARGET’s technicians, on servers, discovered that Paypal and an outside “Virgina-based system” were DNS and payment re-directed all traffic away from the store so that TARGET’s received no traffic and no income. In DNS redirection, “website spoofing” sends target TARGET’s websites to dead ends where no sales orders or customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using outside covert servers operated by the attackers and revealed in the Snowden Leaks. All commercial storefronts and on-line sales attempts by target TARGET’s, had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto, California in order to terminate revenue potentials for the TARGET’s.

HARM #18: The ATTACKERS USED THE TROLL FARM DEPLOYMENTS AGAINST TARGET THAT THEY USE AGAINST PRESIDENTIAL OPPOSITION CANDIDATES:

Contracted trolls, shills, botnets and synth-blog deployments are deployed to place defamatory statements and disinformation about TARGET’s in front of 7.5 billion people around the world on the internet in order to seek to damage their federal testimony credibility by a massively resourced facility. Some of these troll farms were uncovered in Russia, Ukraine, Israel and Brazil. Renown author Farrow writes about this technique in his book: “Catch And Kill”. FUSION GPS, BLACK CUBE and MEDIA MATTERS Brand, Reputation and Credibiity “KILL” CONTRACTS were executed by The ATTACKERS targeting TARGET. Campaign finance dirty tricks contractors were hired by campaign financiers to attack the friends and family members of the target TARGET’s in order to create low morale for the target TARGET’s psyche and motivation. The Fusion GPS Scandal implicates Gawker and Gizmodo Media In Pay-To-Publish Scheme. A court filing from the U.S. district court for DC shows that Fusion GPS paid several journalist to run hit jobs on political adversaries and was paid by a media organization. All of those players were attackers hired to attack TARGET. FBI interviews can verify this.

HARM #19: MANUAL SEARCH ENGINE LOCK-IN ATTACKS WERE CONTRACTED FROM GOOGLE AND YOUTUBE, BY The ATTACKERS, TO HARM TARGET:

In one case covert political partner: Google, transferred large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on TARGET’s by many magnitudes.

HARM #20: THE U.S. PATENT OFFICE MANIPULATION WAS USED TO BLOCKADE REVENUE FROM TARGET’S INVENTIONS:

Facebook and Google executives sit on the boards and run The United States Patent Office. That fact alone says it all. For details see https://www.usinventor.org

Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in charge of the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices with Google-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts that Google engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’s operations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles and investigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff. A conflict-of-interest unlike any in American history. Google’s investors personally told TARGET’s they would “kill him”. Google and the Obama Administration were “the same entity”. TARGET’s testified in the review that got Michelle Lee terminated and uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds. For additional proof, SEE THE VIDEO at: The_Battle_to_Save_Inventing.m4v

Silicon Valley has taken over the U.S. Patent Office with lobbyists and influence payments. Per Randy Landreneau, the President the U.S. Inventor guild: “ Independence Day is that special time when we Americans remember and celebrate our country’s freedom. While it may mean different things to many people, suffice to say, it is the reason we are Free, we have Liberty. Founder, writer, statesman and inventor Benjamin Franklin wrote, “On Historical occasions, Questions of Right and Wrong, Justice and Injustice, will naturally arise.” Here, on this honored day, we take a quick look at Invention and our Independence. Towards the beginning of the Declaration of Independence, whose principal author was our eventual third president, Thomas Jefferson, the very purpose of our Founders’ quest was established. It is stated: “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.” These were men and women of incredible vision, of intense courage, and they succeeded in accomplishing their seemingly insurmountable task, rising up and defeating perhaps the most powerful global Empire of the time, Great Britain. The United States of America eventually became the beacon of hope and individual freedom around the world. People from virtually every land came to this country to seek the American Dream, which ideals include individual and property rights, religious freedom, liberty, equality and the opportunity for upward mobility, achieved through dedication and hard work. One of the reasons America became the world leader in nearly all categories is due, in no small part, to how our Founders recognized and encouraged invention and innovation. They understood what builders, creators and designers could mean to a small, fledgling country with such a noble purpose. After declaring our independence and fighting a long and bloody war to establish it, our Founders gathered once again in Philadelphia for the Constitutional Convention to form a government that would embody those ideals embodied in our Declaration of Independence. The Father of our Constitution and eventual fourth President, James Madison wrote, in Federalist 43 (January 23, 1788): “A power ‘to promote the progress of science and useful arts, by securing, for a limited time, to authors and inventors, the exclusive right to their respective writings and discoveries.’ “The utility of this power will scarcely be questioned. The copyright of authors has been solemnly adjudged, in Great Britain, to be a right of common law. The right to useful inventions seems with equal reason to belong to the inventors. The public good fully coincides in both cases with the claims of individuals. The States cannot separately make effectual provisions for either of the cases, and most of them have anticipated the decision of this point, by laws passed at the instance of Congress.” Thus, within our U.S. Constitution is that short item, located in Article I Section 8 as Clause 8: “To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” That clause is, in reality, a significant and powerful part of the American Dream, allowing people from all walks of life who have a bright and useful idea to capitalize on their innovations and creations. For more than two centuries that which our Founders established for inventors and patent holders held true, for the most part. However, the biggest blow to true Independence for Inventors came with passage of the America Invents Act of 2011 (AIA). Due to ambiguous language and loopholes in that piece of legislation, multinational conglomerates and Big Tech have all but wiped out what our Founders had set up, which they hoped would endure – patent holder property rights. When any form of poor legislation is passed and enacted we are reminded of what Samuel Adams, Sons of Liberty founder and a leader of the Boston Tea Party, said; “The grand end of civil government, from the very nature of its institution, is for the support, protection, and defense of those very rights; the principal of which, as is before observed, are Life, Liberty, and Property.”

Indeed, Jefferson states it quite succinctly, “Our legislators are not sufficiently apprized of the rightful limits of their power; that their true office is to declare and enforce only our natural rights and duties, and to take none of them from us.” Madison adds to that, “A Government is instituted to protect property of every sort…This being the end of government, that alone is a just government, which impartially secures to every man, whatever is his own.” As we celebrate Independence Day, and all that our Founders provided for our great country, we at US Inventor are working to correct the wrongs and injustices that have befallen inventors, particularly since the AIA was enacted, by revitalizing the spirit of our Declaration of Independence (“…Life, Liberty and the pursuit of Happiness.”) through restoration of patent rights and protection as guaranteed in Article I Section 8 Clause 8 of our United States Constitution (“securing, for a limited time, to … inventors, the exclusive right to their respective … discoveries.”). We will not rest until the rights of inventors have been restored. We’re gaining ground, but our enemies are powerful. We need your help in forwarding our cause and becoming involved when it matters. This isn’t just for us, it’s for our children, our grandchildren, and the future existence of the American Dream.”

Silcon Valley oligarchs have spent billions of dollars to put their people inside the United States Patent Office and to manipulate patent rulings in order to harm WITNESS and his peers for the purposes of: 1.) cheating instead of competing by stealing technologies and not paying for them and, 2.) operating reprisal, vendetta, retaliation campaigns against competitors and political enemies. TARGET was awarded an exceptional number of issued patents on the energy technologies he had developed for the Dept of Energy. 3rd Party outside legal valuation experts appriased the value of these patents at over $200,000.000.00. By it’s actions, The U.S. Government made TARGET’s patents unusuable for monetization by causing black-listing of those patents with NVCA investors and by using online trolls to make the marketing for those patents close off. TARGET demands that the U.S. Government now purchase ALL of TARGET’s patents at fair market value to partially offset his loss.

HARM #21: HONEY-TRAPS WERE PLACED ON SOCIAL MEDIA SITES BY The ATTACKERS SPY OPERATIVES TO HARM TARGET:

Honeytraps” and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject. Match.com and other dating sites are owned by famous politicians and election campaign financier involved with Jeffrey Epstein and those sites were used to source girls for Epstein and Honey-traps to lure political adversaries.

HARM #22: A FAKE NEWS TABLOID EMPIRE WAS CREATED JUST FOR DEFAMATION ATTACKS, BY THE ATTACKERS, AND USED TO HARM TARGET:

Gawker Media, Gizmodo Media, Snopes, SPLC and other hired media assassins were retained to produce “hatchet job” character assassination articles about TARGET’s. Then those articles were faxed, mailed and emailed to Kaiser Permanente and investors with a note saying: “You don’t want to have anything to do with this person, do you..?” in order to get TARGET’s fired from their job and get TARGET’s loans or financing pulled. The attackers use their round one attack media, that they authored, to create a round two second wave attack designed to end TARGET’s life status via economic warfare. All of the other attack victims received between $100,000.00 to $75,000,000.00 but TARGET received ZERO DOLLARS because the Judge was friends with the The ATTACKERS.

HARM #23: HOUSING BLOCKADES WERE DEPLOYED BY The ATTACKERS TO HARM TARGET:

Mortgage and rental applications had red flags added to them in databases to prevent the targets from getting homes or apartments. HUD applications were manipulated or stalled from 2007 to today, as reprisal.

HARM #24: HACKING OF TARGET’s DEVICES OCCURRED ON ORDERS OF The ATTACKERS:

Krebs On Security, Wired, Ars Technica, The Wall Street Journal and most major IT publications have reported that hundreds of spy “back-doors” have been found on every Intel, AMD, Apple, Xfinity, Cisco, Microsoft, Juniper Networks motherboard, chip-set and hardware component set. This means that the attackers used a “key” code can open any of TARGET’s computer, server, router, cloud-network or other network connected device and read every file, photo, video, your calendar and email on devices at any time from any location on Earth. This has been widely reported on by Glenn Greenwald, Edward Snowden, Scahill, Cheryl K of CBS News and others. TARGET’s was hacked at least 10 times. In a number of instances, people, who TARGET’s had been communicating with online, were mysteriously contacted by a third party who sent them the Gizmodo attack article or phoned them with warnings to avoid TARGET’s. These kinds of Man-In-The-Middle interceptions would only have been possible from hacking and MITM surveillance tactics.

HARM #25: TECH INDUSTRY BLACK-LIST COORDINATION AGAINST TARGET HAD COMMAND-AND-CONTROL OUT OF The ATTACKERS OFFICES:

McCarthy-Era “Black-lists” were created and employed against target TARGET’s who competed with Obama Administration executives and their campaign financiers to prevent them from getting funding and future employment. This White House process is known as “RatFucking”, a tactic that is documented in a variety of published reports and on Wikipedia. Using Gust, Google Docs, Dropbox and secret meetings, a black-list has been maintained to attack TARGET’s for whistle-blowing. TARGET has named specific individuals to this court and demanded that the Court request the FBI 302 reports on those individuals. Additional, TARGET demands the FINCEN financial mapping records for those Defendant parties. That data, cross referenced in the XKEYSCORE database, provides indisputable, fully incriminating, follow-the-money evidence about every single party mentioned in this complaint.

HARM #26: HUD AND USDA MORTGAGE RIGHTS BLOCKADES TO HARM TARGET HOUSING IN REPRISAL AS DIRECTED BY The ATTACKERS VIA THEIR ‘DIRTY TRICKS’ TEAM:

The housing rights of TARGET’s were stalled in reprisal. Public records show that tens of thousands of other TARGET’s were moved ahead of TARGET’s even though TARGET’s validation metrics exceeded those of almost every other TARGET’s. TARGET’s was “black-listed”.

  1. Additional ‘dirty tricks’ efforts were used per:
    https://www.justice-integrity.org/634-intelligence-agencies-use-social-media-for-dirty-tricks-propaganda-new-report
  2. https://www.commondreams.org/news/2014/02/07/gchqs-dirty-tricks-revealed-false-flags-virus-attacks-and-honey-traps
  3. https://theintercept.com/2014/02/24/jtrig-manipulation/
  4. https://www.salon.com/2011/02/11/threats_against_glenn_greenwald_wikileaks/
  5. https://www.theguardian.com/commentisfree/2013/jun/24/surveillance-us-national-security
  6. https://www.straight.com/news/482846/government-trolls-use-psychology-based-influence-techniques-social-media
  7. http://federal-report.com/public/The_Political_Reprisal_Vendetta_Playbook.pdf
  8. https://thedailybanter.com/2014/02/05/greenwalds-latest-snowden-revelation-the-british-gchq-is-waging-war-on-hackers/
  9. https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf
  10. …and thousands of additional reports proving the attacker assertions.

 

TARGET is aware of the FBI procedure of the filing of FBI ‘302’ Reports on subjects. TARGET has, on multiple occasions, via the DC and SFO FBI offices, requested that the FBI interview, observe and track the attackers and confirm the command and control communications authority authorizing, managing and financing their attacks and the paths of compensation of those attacks. The FBI has had the full capacity and resources to easily confirm who ordered and operated the attacks on TARGET via an interview and investigation of the The ATTACKERS hired attackers, specifically Nicholas Guido Denton, John Herrman, Gabrial Darbyshire, Patrick George, Jay Carney, Robert Gibbs, Adrian Covert, Eric Schmidt, Larry Page, Perkins Coie, John Cook, Elon Musk, The Secretary of Energy Jennifer Granholm, et. al; and those other parties listed within the main complaint..

 

The FBI ‘302’ reports on those attackers is hereby requested, and a request for the Court to demand those reports is hereby requested for review by all parties concerned.

(G) Court ordered back payments from SSA from 2007 to today because public officials ordered blockade of TARGET’s SSDI payments as political reprisal for whistle-blowing in 2007 as proven by Inspector General and attached Exhibits:

TARGET hereby places a plea before the Court for the Court to order the Social Security Administration to pay TARGET back payments from SSA for SSDI from 2007 to today because, as proven in the Master Complaint, public officials, including White House staff and California Senators with intelligence agency access to government ‘dirty tricks’ teams, ordered the blockade of TARGET’s SSDI payments as political reprisal for whistle-blowing in 2007 as proven by Inspector General and attached Exhibits in the Master Complaint. Some SSA officials now work for the charged The ATTACKERS. This illicit federal reprisal circumvention of TARGET’s income cost him his house and all many of the damages listed, in detail, in the Master Complaint. It has been proven, in the evidence, that Senator’s Pelosi, Harris, Reid, Feinstein, and other senior public officials regularly order hacking, data manipulation and de-funding of political whistle-blowers. Dianne Feinstein’s staffer: Daniel Jones, is world known as the ‘CIA Master of Dirty Tricks’. In fact, TARGET and his peers, previously won federal lawsuits, as detailed in the Master Complaint, proving that, “government agencies infected by corruption use their resources to put reprisal hit-jobs on citizens”. Any Senate aide can hack or manipulate SSA, DOE, HUD and other agency decision files within minutes and order ANY citizen to have their funds cut-off with a single phone call. That happened in this case, as TARGET, and federal evidence has sworn, certified and verified as to the veracity of such dirty tricks operations within the Government. Senator’s staff and family cohabited with TARGET and revealed such tactics.

There are a vast number of other attack tactics. You can find those tactics listed in the, now public, CIA manuals and British JTRIG manuals.