THERE ARE NO 'CONSPIRACY THEORIES' HERE - JUST HARD FACTS THAT STAND UP IN COURT FROM TOP FBI, CONGRESSIONAL AND NEWS INVESTIGATORS
Some California and Washington DC politicians, and their Silicon Valley financiers at Google, Tesla, Facebook, Netflix, etc., will do ANYTHING including lying, bribery, cheating and murder, in order to try to get hold of the trillions of taxpayer dollars in the Treasury and the hundreds of trillions of dollars moving through manipulated stock markets that they have access to. They live in mansions, buy jets and islands, have movie star parties every weekend, and have sex workers and drugs delivered to them constantly. These U.S. Senators and Silicon Valley oligarchs are addicted to this corruption and they will do ANYTHING to keep it going.
When a public system is created to provide fairness, but billionaires and crooked Senators go behind the scenes and rig that system for their personal benefit, we will report them.
When they use our tax money to do it to us, with that public system, personally, we will destroy them and bring every law enforcement, regulatory, news entity and voter to their front door!
If these facts had not been covered up, A President of the United States and a number of well known Senators and other politicians would have been forced to resign mid-term!
This site, and the auto-generated copies of it around the globe, are created for three audiences: 1.) The Public. Millions of you have been reading these sites for a number of years. These sites are written in a manner that makes them interesting for the average person. 2.) Federal Prosecutors. We have filed formal charges about these crimes with most top federal law enforcement and regulatory bodies and here is part of the evidence proving the charges. 3.) Investigative Journalists. Anyone who can investigate further, from 60 Minutes to Citizen Sleuths, and publish widely, is encouraged to do so.
This is about one part of these crimes that we witnessed at the White House, The Department of Energy, The FEC and other government entities:
Some of the most famous politicians are involved in organized crime with your tax money. They pretend to be 'saving trees' but the only 'green' they care about is your cash! The stock market scams they operate, every day, harm every family in America!
WE EXPERIENCED AND REPORTED A CRIME INVOLVING BILLIONS OF DOLLARS OF BRIBES BEING PAID TO SPECIFIC PUBLIC OFFICIALS VIA COVERT CORRUPT STOCK MARKET DEALS, 'REVOLVING DOOR' JOBS AND SEX TRAFFICKING!
IN REPRISAL, AGENCY OFFICIALS CUT OFF OUR FUNDS AND BENEFITS AND HIRED FUSION GPS AND BLACK CUBE-TYPE ATTACK CONTRACTORS TO RUN 'HIT-JOBS' ON US!
THIS IS ABOUT A CRIMINAL ORGANIZATION OF PEOPLE THAT OPERATE BETWEEN SILICON VALLEY AND WASHINGTON DC AND SOME OF THEM ARE YOUR SENATORS!
THEY USED THE SECRET LARGEST BRIBERY SYSTEM IN HISTORY TO AVOID PROSECUTION... UNTIL NOW!
FACEBOOK AND GOOGLE'S POLITICAL AND STOCK MARKET MANIPULATION TEAM, COMBINED, IS LARGER THAN THE U.S. GOVERNMENT!
THINK ABOUT THAT: A PRIVATE CARTEL WITH A PERSONAL AGENDA HAS MORE MONEY, POWER, BRIBED POLITICIANS AND TECHNOLOGY THAN THE WHOLE U.S. GOVERNMENT!!! WHAT COULD POSSIBLY GO WRONG!?
DEMAND FBI RAIDS AND SEVERE ANTI-TRUST AND RICO CHARGES AGAINST GOOGLE, FACEBOOK AND THEIR SANDHILL ROAD SEX ABUSE AND MONOPOLY CARTEL!
Witness testimony: "...My investigators and law enforcement peers have yet to find any past reviewers of this case who were not hand-picked by our business adversaries. In other words, we would like the Court to provide any evidence that our case has been fairly reviewed in the past. My FBI-class associates have not found a single entity in our case reviews or determinations who was not either: financed by, friends, with, sleeping with, dating the staff of, holding stock market assets in, promised a revolving door job or government service contracts from, partying with, personal friends with, photographed at private events with, exchanging emails with, business associates of or directed by; one of those business adversaries, or the Senators and politicians that those business adversaries pay campaign finances to, or supply political digital services to..."
Jan. 2, 2020
Dear President Trump:
Can you help with this issue?
We are demanding a satisfactory resolution to our claim.
Political bias and a political Civil War-type mentality in government agencies has precluded us from our Constitutional rights.
We have demanded, in writing to multiple State and Federal agencies, that an unbiased lawyer and CPA be provided by The Government, to us, for this case but none has been provided.
Our team members qualify for free legal aid as low-income, senior, disabled, felony crime victims. The federal LSC Corporation and public-interest law groups have stated that it is our right to receive such case legal assistance from The Government.
We have contacted NOSSCR, LSC, Legal Aid societies, PDF, NADR, Bar Association, DOJ and all known local resources provided, but none of those have been responsive to complex, low-income, case work like this case because they have been intimidated by corrupt politicians that fear exposure. We have asked our contacts at 60 Minutes and other news outlets to provide legal aid for us, in exchange for news coverage exclusives, but it is unclear if they will be responsive in time.
We have a highly productive domestic work record supported by many letters of reference from famous third-parties and a vast amount of proof-of-work for government, corporate and family office clients and employers.
We have been friends with, and shared homes with, multiple White House and Senate staff and family members and some of them have vouched for us on the record. We are Bi-Partisan and not affiliated with any political party, but: We hate political corruption and have the connections and community organization contacts to fight it when it affects us and America.
There are numerous photos and videos published online of us getting hugs from, and hanging out with: Warren Buffet, Hillary Clinton, Monica Lewinksy’s buddy, Mayor’s, Senator’s, Vice President’s of the United States, Congressional leaders and other heads of State. There are multiple letters in our portfolio on White House letterhead from U.S. President’s and Vice Presidents of both parties. We have provided authorized federal officials with some of our substantial law enforcement and investigator credentials.
The toxic poisoning, life-time black-listing, tens of millions of dollars of fake news media character assassinations via Gawker/Gizmodo/Google and web server attacks are liabilities that were financed and managed by government officials. Their actions against us were politically so-ordered at White House-level, as proven by federal IC and law enforcement investigators.
One of the individuals that financed those public officials (one Mr. Mark Zuckerberg) made 27 billion dollars in personal profits last year alone from exclusive government perks his political financing bought him. Mark’s cohorts: Larry Page, Eric Schmidt, Steve Jurvetson, Elon Musk, Vinod Khosla, et al, (Now the subjects of over 120 State and Federal investigations) have been proven by Congress to have “owned and controlled” the previous White House Administration. This group, and their associates, were also the main financiers of, friends of, staffing suppliers of and beneficiaries of the Obama Administration. They also happen to have paid the largest amount of bribes to government politicians in our region. “Ironic”? No jury in a court trial will accept the argument that the failure to compensate us for our damages is “fair” based on the facts, metrics, damages comps, references, legal precedents, news investigations, track record, law enforcement and technology accomplishments by us for our Country!
We have been damaged by the actions of the California and United States Governments. We, and many others, have won cases proving our points. We and “Whistle-blower Walter Tamosaitis” (easily found on web searches) were both Department of Energy Whistle-blowers. Walter got $4.1 MILLION dollars for his whistle-blower work. We got ZERO DOLLARS and nothing but punishing benefits blockades and benefit reductions. In fact, almost every person attacked by these people has received between $300,000.00 to $50 MILLION dollars in damages recoveries. We have received NOTHING and suffered more! One of the people we helped get arrested sits around and drinks booze and collects over $150,000.00 per year in government benefits...and they are an arrested crook! We are having a hard time seeing how we have been treated fairly in light of our public service! We are hoping DOJ and your office can explain that to us!
Federal agencies have been proven in recent Congressional hearings to have been weaponized as political reprisal tools against us. Our government submissions have been interpreted in a manner to harm our benefits because some Federal executives were instructed to find ways to harm us through our benefits as political reprisal. That is a felony!
For example, some of us were awarded a Congressional contract award in the Iraq War Bill under the United States Congress. We were one of the teams that were to build America's alternative energy back-up plan for the nation under the Department of Energy. We fully executed our federal agreement and did not go bankrupt, did not embezzle funds, did not bribe California politicians or get FBI- raided like our competitor: Solyndra! Shortly thereafter we became a federal witness in a national embezzlement matter involving famous California and Washington DC politicians and over a 900 billion dollars of energy industry manipulations in the stock market. Part of this matter was featured on CBS News 60 Minutes investigative news segments. We spoke with CBS news staff, including Bob Simon, Matt Mosk and many others in major news stories (ie: the segments: "THE CLEANTECH CRASH", "CONGRESS TRADING ON INSIDER INFORMATION", "THE LOBBYISTS PLAYBOOK" and investigations into hundreds of billions of dollars of stock market payola illicitly routed through Silicon Valley tech companies). If the White House, at that time, had been charged for these stock market campaign payola crimes, The President would have been forced out of office. Instead, the AG, Eric Holder, was impeached/Held-In-Contempt-Of Congress and he had to leave office.
This is why the attacks on us have used so many intelligence community dirty-tricks oriented high-end schemes: To punish us for helping law enforcement and because our companies competed with their stock market schemes by making their products obsolete with better technology. There are now thousands of news and Congressional reports; from “Spygate”, to The IRS Lois Lerrner case to the FBI McCabe case and a vast number of IG reports (Copies of which we have provided to Congress) about government agencies being weaponized against citizens for political reprisals.
Compromised government staff used government resources to harm us, our health, our brand, our career and our benefits because we helped halt one of the largest corruption schemes in modern American history.
If there is any doubt about this fact, Congressional leaders are invited to a public Congressional hearing with us, Christopher Wray and David Johnson from the FBI, Mr. Rusco from the GAO and a number of Senators from Congressional Ethics, Intelligence and Judiciary Committees who we will provide.
This case is still an active case via many federal law enforcement and regulatory agencies. Since our work with Department of Energy and Government programs beginning in 2000 (Proven by signed NDA’s and emails), some of us were cellular-level blood poisoned by exposure to toxic chemicals, compounds, powders and radioactive materials in our work environments for the Department of Energy projects. It is unclear if this poisoning was intentional “Alexander Valterovich Litvinenko-like” reprisal poisoning or accidental. We have yet to receive proper medical treatment for Cesium, Thorium overdose, micro-particulant toxins, radical solvents, high energy EMF and the kinds of exotic materials that Department of Energy weapons and energy labs, that we worked with on federal programs.
It is our understanding, from FBI-class federal investigators and private investigators, that well known California Senate officials and well known White House officials ordered our benefits and rights to be blocked, delayed, obfuscated, denied and otherwise harmed as political reprisal and retribution for our assistance to law enforcement. An XKEYSCORE-class data scan of our entire records still finds no discussion of many of our submitted documents. It is as if part of our records were digitally expunged in order to cover these crimes up.
Criminal forensic data has proven that digital manipulation of our files did occur and that government computers are regularly hacked by many parties including the China 'Cloud Hopper' APT 10 group, currently under federal indictment and rumored to have been engaged with the “Chinese Connections” at Dianne Feinstein’s office, and hundreds of domestic attack groups, some of whom are hired by U.S. Senators. APT 10, and their peers, by the way, are known to have penetrated every Silicon Valley venture capital office and every federal office related to these matters. They sell their acquisitions on The Dark Web and Fusion GPS, Black Cube and related parties are known to buy some of those blackmail resources. A number of California and Washington DC Senators and agency heads have already been arrested, indicted and/or removed from office in these matters. Over 40 of our peers and associates in this matter (Rajeev Motwani, Gary D. Conley, Seth Rich, Dr. Epstein’s wife, David Goldberg, David Bird, Karl Slym, Doug Bourn, Ashley Turton, Michael Hastings, Aaron Schwartz, Bob Simon, etc. ) are now dead via mysterious and suspicious circumstances. We have received numerous death threats and have been personally attacked on multiple occasions including getting our car rammed and drive-by death threats. Some of those victims may have been murdered for whistle-blowing. Multiple senior government officials and Senators have been exposed hiring Google, YouTube, Fusion GPS, In-Q-Tel, PsyOps, Plouffe Consulting, Cambridge Analytica, ShareBlue, Media Matters, Black Cube, Gizmodo, et al, and other "kill services" to attack citizens in political reprisals. In fact, we report to the FBI, GAO, and Congress about such matters. Along with the associated Congressional investigation records and FBI files, we submit, in this case, the following books and videos, which prove these assertions:
Catch and Kill By Ronan Farrow,
Permanent Record By Edward Snowden,
Brotopia By Emily Chang,
Throw Them All Out By Peter Schweizer,
The Circle (Based on Google and Facebook) By David Eggers,
Disrupted By Dan Lyons,
Chaos Monkeys By Antonio García Martínez,
The Creepy Line By Matthew Taylor,
The Cleantech Crash By Leslie Stahl,
In a famous court case series, Congressional officials encouraged us to sue the United States Government and the Department of Energy in a first-of-its-kind Washington DC lawsuit, which we did. In other words: The U.S. Government asked us to sue the U.S. Government in order to correct a corruption matter in a new strategy which could give citizens as much power as a Grand Jury. Our lawsuits made history and were a first-of-their-kind! The Secretary of Energy and his staff got fired because of it!
The lawsuits were financed by public interest community law groups since it benefited the public as well as us. We are the first American citizens to prove in federal court that domestic citizens had their federal funding applications influenced by political corruption and reprisal attacks. We had lost millions of dollars when we got defrauded by the U.S. Government when they asked us to invest in building a green manufacturing company after they had already covertly promised our federal funds to Elon Musk, who the California and Federal officials owned the stock in, partied with, shared staffing with, got revolving door contracts from, owned the suppliers for and conduit-ed campaign finances through, as FBI and SEC evidence proves! We have yet to be compensated for those damages from the government defrauding, much less the damages from the state-sponsored attacks.
We won our federal case proving political corruption influences citizen applications for government funds and permanently posted the corruption expose documents on public record for the world to see. We may be the only people on federal record in which the federal court has referred to an agency “infected by political corruption” and political reprisals. Our team made new legal court precedents and laws. Millions of consumers have joined us in a Wikipedia-like ‘Citizen Sleuth’ forensic investigation of the culprits.
There should be no question, that our government rights and benefits have been influenced by political parties who want revenge. There should be no question about the fact that we are owed money for our damages. Any government official reading this letter must know that it is part of their legal obligation to take action to get us: the domestic, natural-born, citizen taxpayer, crime victims, our money!
The MULTIPLE cases our peers launched create a precedent. Millions of dollars of legal and law enforcement research are now posted on PACER.GOV, and in The National Archives, proving our assertions of crony political payola and reprisal attacks by government officials at federal agencies. We encourage you to call The White House press office, today, to ask them about the proofs they hold of such abuses, “Spygate’s” and weaponizations of federal offices for political purposes against everybody from The President of the United States, to non-profit groups, to us!… all to cover-up an epic stock market crime!
We have proven that there were massive conflicts-of-interest with past government reviewers on our case, including felony-class SEC violations, covert stock ownership's by Senators, revolving door bribes, shell company off shore tax evasion and other crimes.
Our peers have posted globally online (in hundreds of thousands of mirror nodes read by the FBI and Congressional investigators daily), and presented to government offices, in writing and on hard drives, MILLIONS of pages of evidence from Congress, federal and private investigators, 60 Minutes and other famous journalists and witness testimony. The assertions are beyond reproach, and true, unless someone refuses to hear the truth due to a political agenda.
Our promised benefits have STILL yet to be provided to us and every action by ‘authorized public officers’, so far, has succeeded in harming us or blockading our rights. This cover-up is a violation of our human, U.S. and California Constitutional rights. We put our life on the line for our country and we more than earned the benefits that we are asking for, plus damages, interest and back-fees!
We demand better! How can you help us resolve this?
BCC: White House, FBI, SEC, FTC, Congress, DE, GH, DC-DOc2, Investigative news insiders, ‘Dead-man switch’ insurance repositories, OSC, CFTC, MD, NARA
THE FINANCIAL RECORDS AT www.opensecrets.org AND AT THE FBI PROVE THAT OUR POLITICIANS, THEIR FINANCIERS AND OUR ATTACKERS WERE THE SAME PEOPLE!
Testimony: "... we were solicited and defrauded by government officials who turned out to be: best friends with, later employed by, hiring their staff from, campaign financed by, sleeping with and stock market invested in: OUR ARCH COMPETITORS! These are government officials who engaged in these crimes! Our metrics beat those of every other applicant except one: WE DIDN'T PAY THE BRIBES THEY WANTED! This was a crime of epic proportions. We, and the taxpayers, were scammed. When we reported it through "proper channels" they put hit-jobs and media attacks on us for reporting their crimes. These people are part of the Jeffrey Epstein School of Crime.."
IT WAS "PAY-TO-PLAY" FOR GOVT CONTRACTS AND FUNDING THAT ONLY CAMPAIGN FINANCIERS GOT AWARDED WHILE THEIR COMPETITORS GOT SABOTAGED ON ORDERS FROM THE WHITE HOUSE! WE REFUSED TO PAY BRIBES SO WE GOT THE SHAFT FROM OUR OWN ELECTED OFFICIALS! SO, NOW, PAYBACK IS A BITCH!
Thousands of documented Inspector General cases where State And Federal agencies were weaponized against taxpayers for political reprisal, revenge and retribution by public officials who were engaged in corruption. The worst offenders: VA, SSA, HUD, FBI, HHS!
WE ARE EXPOSING, SHAMING, SUING, 'VERITAS'ING, DOCUMENTARY FILM-MAKING, FBI-302 FILING AND CRIMINALLY CHARGING EVERY SINGLE PERSON INVOLVED...AND WE HAVE ALL OF THEIR NAMES! SEE THE PROOF AT THESE, AND MANY MORE, LINKS:
WE ARE SEEKING CONTINGENCY FEE LAW FIRMS TO FILE LAWSUITS IN THE U.S. COURT OF CLAIMS, AND IN CIVIL COURTS, TO RECOVER OUR VICTIM'S DAMAGES, MONIES OWED, LOST INCOME AND FEES! WE HAVE FBI-CLASS EVIDENCE AND TOP CONGRESSIONAL WITNESSES!
To finance one of the victim's lawsuits, and share in the court awards, contact:
We are filing, or have filed, charges against corporations, government officials (personally), government agencies and organizations who engaged in attacks ( HOW WE WERE ATTACKED ) against us for reporting corruption and who engaged in corruption against the public! To support our cases, refer to case reference #: "XYZ CASES 2020"
THESE CROOKS WILL RUE THE DAY THEY WERE BORN FOR USING OUR DEMOCRACY AS THEIR RICH BOY PLAYTHING! THEY ARE UNDER SURVEILLANCE, BY THE PUBLIC, FOR THE REST OF THEIR LIVES! THEIR CORRUPT STOCK MARKET VALUES WILL BE OBLITERATED BECAUSE THEY USED THOSE TECH STOCKS TO PAY BRIBES TO POLITICIANS
NOBODY HAS FOUND A SINGLE PERSON THAT DISPUTES OUR EVIDENCE EXCEPT THOSE WHO ARE PART OF THE CRIMES. WALL STREET JOURNAL, NEW YORK TIMES, 60 MINUTES, FBI REPORTS, CONGRESSIONAL REPORTS, COURT RECORDS AND THOUSANDS MORE PROVE OUR CHARGES! BILLIONS OF DOLLARS OF TESLA, GOOGLE, NETFLIX AND FACEBOOK STOCK AND ASSETS HAVE BEEN PAID TO POLITICIANS AS BRIBES AND QUID-PRO-QUO PAYOLA! WE DEMAND ARRESTS!
We have spent decades working with current and former FBI, CIA, NSA, DIA, InterPol, FTC, SEC, FEC and Congressional investigators. We connected them, and their forensics, with investigative journalists, citizen sleuth and community groups devoted to anti-corruption. We selected the top 300 most corrupt targets that had a shared beneficiary status in their crimes. We used AI, field surveillance, stings and peer-to-peer mesh database comparison work to examine the stock market transactions, investment bank communications, emails, owned assets, texts, party and event participation's, home meetings, public statements, document leaks, sexual relationships, Panama Papers/Swiss Leaks/KPCB Leaks and other leaks, lobbyist payments, 1090 contractors, fake charity fronts, payments, receipts and other connecting evidence proving that these targets organized in order to commit a crime against the public.
We knew some of these criminals personally. We have absolute proof (...and federal law enforcement officials have absolute proof) of these crimes engaged in against us as individuals and against the American people as a whole. The evidence has been placed in irremovable torrent repositories around the globe and provided on hard drives to journalists world-wide. The evidence is added to daily and whistle-blowers are constantly increasing the volume of evidence.
The cover-up actions of public officials have prevented us from having fair access to the Justice System so our team has been bringing them down using simple, and 100% legal, Wikipedia-like transparency technologies! You, the reader, are encouraged to copy and deploy these processes against ANY corrupt public official!
This CBS News 60 Minutes Investigation episode exposes one of the schemes that the criminal politicians and their Silicon Valley tech oligarch backers used to acquire billions of dollars of taxpayer funds and many more billions of dollars, at the expense of taxpayers, in stock market pump-and-dump, windfall write-offs, "Goldman Skims" and hundreds of other financial manipulations. Part of the techn
Many citizens are fighting back against the corruption, like this:
When criminally corrupt White House officials, Department Of Energy bosses, U.S. Senators and thier Silicon Valley Tech Oligarch masters devised a stock market pump-and-dump scam of epic proportions, they defrauded American citizens out of their life savings in the process. Those citizens are fighting back and have created new legal precedents, new anti-corruption laws, gotten the highest level government officials fired from their jobs, launched dozens of federal investigations and created one of the largest citizen sleuth programs in history! Never again, in America, will political crooks be able to undertake these kinds of crimes against the public without getting caught, exposed and prosecuted by the public!
Note: This entire project is Kill Switch Protected. In the event of another death of one of our peers, vast and politically lethal documents will be released to the public on a global basis. ( http://londonworldwide.com/public/CLEANTECH_DEATH-LIST_2.09vv.pdf )
HOW THE CALIFORNIA POLITICAL TECH CARTEL MOBSTERS OPERATE
Men that got rich by stealing the technology ( INVENTION DYNAMICS ) of others and joining forces with Senators to operate monopolies are the bosses of the mafia-like Silicon Valley tech Cartel.
They include men like Jeffrey Epstein, Elon Musk, Larry Page, John Podesta, Reid Hoffman, Vinod Khosla, David Plouffe, Steve Jurvetson, Ed Buck, Tim Draper, George Soros, Mark Zuckerberg, Andy Rubin, Mark Pincus, Richard Blum, Jared Cohen, Steve Spinner, Steve Rattner, David Drummond, Eric Schmidt, Steve Westly, John Doerr, etc. These men operate a sex trafficking and abuse ring as a testament to their control and power over others. The perverts in the SandHill Road Venture Capital offices, located between Highway 280 down to to Santa Cruz Avenue on Sand Hill Road in Menlo Park, California, are the main perpetrators of this global cartel. Their executives at Google, Facebook, Netflix, Linkedin, Twitter, and their related holdings, comprise the rest. The Harvey Weinstein and Ed Buck sex scandals are well known. These men's sex cult actions have been widely covered in the news individually in the Joe Lonsdale rape case, The Kleiner Perkins Ellen Pao sex abuse lawsuit, The Eric Schmidt sex penthouse stories, The Jeffrey Epstein case, The Google Forrest Hayes hooker murder case, The Andy Rubin sex slave case, The Sergy Brin 3-way sex romp scandal, The British Hydrant investigation, The Elon Musk Steve Jurvetson billionaire sex parties scandals,The NXIVM sexual slave cases, The Michael Goguen anal sex slave trial, The Tom Perkins Hooker Parties and thousands of other cases and federal divorce court filings. This group of people have proven themselves, over and over, to be sociopath control freaks not fit for participation in public commerce, public policy or media control. The Four Seasons Hotel and Rosewood Hotels in Silicon Valley are estimated to engage in over $30,000.00 of high-end escort sex trafficking per day, a portion of it managed by Eastern Bloc Mafia operators. At least 10 Ukrainian escorts fly in and out of SFO and SJO airports every week for these Cartel members. Google boss David Drummond engaged in horrible philandering sexual violations of his wife yet Google covers up every story about it on the web. You here about the female victims of this sex cult but you rarely hear about the young male victims. One of their vast numbers of prostitutes is quoted as saying that the girls and boys are paid "not just for sex but for the oligarch's endless need to feel that they can control anyone for any reason...". Multiple attorney general's controlled by their cartel, ie: Eric Schneiderman and Eliot Spitzer , are involved this these sex rings. These are the main influencers of a national political party and they are all involved in horrific sex perversions and abuses!
Each of these men have covert operative contracts, through stealth-ed intermediaries, with Fusion GPS, Black Cube, Google, YouTube, Facebook, David Plouffe, IN-Q-Tel, Gawker Media, ACRONYM, Jalopnik, Gizmodo Media, K2 Intelligence, WikiStrat, Podesta Group, Alphabet, LinkedIn, Twitter, Think Progress, Media Matters, Mossad, Correct The Record, Stratfor, ShareBlue, Cambridge Analytica, Sid Blumenthal, David Brock, PR Firm Sunshine Sachs, Covington and Burling, Buzzfeed, Perkins Coie, Wilson Sonsini and related shill operatives who, in turn, contract thousands of meat-puppet bloggers and off-shore click-farms.
They have teams of crooked manipulators inside investment banking groups at JPMorgan Chase, Goldman Sachs, BofA Securities, Morgan Stanley, Citigroup, Credit Suisse, Barclays Investment Bank, Deutsche Bank, UBS, RBC Capital Markets, Wells Fargo Securities, HSBC, Jefferies Group, BNP Paribas, Mizuho, Lazard, Nomura, Evercore Partners, BMO Capital, Markets, Mitsubishi UFJ Financial Group and related banks. Senators Reid, Feinstein, Pelosi, Harris and other politicians have their family accounts at these banks too.
They use Arthur Andersen, Arthur Young, Coopers and Lybrand, Deloitte Haskins & Sells, Ernst & Whinney, Peat Marwick Mitchell, KPMG, Price Waterhouse, Touche Ross, Mossack Fonseca and other CPA firms who pretend to be "legit" but who actually provide legal tricks to evade taxes, run stock market pump-and-dumps and launder money for bribes. As with the investment banks, each company has a crooked group behind a smoke-screen of legitimate service departments.
They meet in the back-rooms of restaurants (ie: The Angelgate Conspiracy ); in their corporate board rooms (ie: The Silicon Valley No Poaching Class Action Lawsuit High-Tech Employee Lawsuit) at sex parties in their homes (ie: The Steve Jurvetson Sex Parties Silicon Valley "sex party" ) and at "retreats" (ie: The Half Moon Bay Techonomy retreat) where they make coordinate their plots.
They place their agents in City, State and Federal agencies that might regulate them and, additionally, bribe top staff in those agencies while, concurrently, bribing elected and appointed officials who might have jurisdiction over those investigations.
They operate an organized crime entity like the mafia. Their actions violate racketeering RICO laws. Their operation is so large that the government can't shut them down or arrest them. They flaunt their "untouchable" status by calling themselves "The Paypal Mafia" or "The Deep State". They have no fear of the law. The owned and controlled the Obama government administration. They order their digital media companies to produce "fake news" and to censor any news coverage of their illicit deeds. Their goal is to control every search engine result in the world and all "first-30" highlights on information aggregators, movie-on-demand sites and other public media outlets for their personal ideological, political and stock market manipulation interests. They spy on the public even more than the NSA does and they use the private consumer data they harvest in order to manipulate elections and social perceptions.
THE CURRENT ASSERTIONS AND THE EVIDENCE PROVING THOSE CHARGES PER QUESTIONS AND COMMENTS FROM LAW ENFORCEMENT STAFF, CONGRESS, THE PUBLIC AND JOURNALISTS. CHECK BACK DAILY FOR NEW EVIDENCE UPDATES IN THE REPOSITORIES:
If you have any evidence disproving any of these assertions please submit that evidence in FBI 302-form narrative structure and it will be included.
Additional statements from victims:
"SILICON VALLEY OLIGARCHS AND OBAMA WHITE HOUSE STAFF HIRE CHARACTER ASSASSINS, LIKE THOSE REVEALED IN RONAN FARROW'S BOOK "CATCH AND KILL", ON A DAILY BASIS AND HAVE THEM ATTACK INNOCENT VOTERS AND SMALL BUSINESS COMPETITORS"
"SILICON VALLEY CEO'S AND VENTURE CAPITAL EXECS (IE: Schmidt, Musk, Doerr, Page, Jurvetson, Khosla, Perkins, Westly, Spinner, Draper, Rubin, Drummond, Conway, Hoffman, etc.) ON PALO ALTO'S SANDHILL ROAD OPERATE AN ORGANIZED CRIME RING BASED ON BRIBERY, TAX EVASION, SEX CRIMES, STOCK MARKET RIGGING AND OTHER CRIMINAL COLLUSION. THE SILICON VALLEY MOB CONSPIRES AND COORDINATES THE GLOBAL MANIPULATION OF MEDIA, NEWS AND INFORMATION IN ORDER TO HIDE AND HARM COMPETITORS AND EXCLUSIVELY PUMP THEIR OWN STOCKS WHICH WERE OWNED BY U.S. SENATORS..."
"TYCOONS AND SILICON VALLEY TECH OLIGARCHS HIRE PRIVATE INVESTIGATORS AND SPIES TO FOLLOW ALL THE WOMEN THEY LIKE AND THE COMPETITORS THEY HATE. They use Cambridge Analytica, Acronym, Splunk, Civis, Fusion GPS, Media Matters and hundreds of other dirty tech FACADES to spy on Americans and rig their sex schemes and NATIONAL ELECTIONS! If voters understood the crimes that these tech companiers get up to with their data, they would flip out!"
" MEDIA REPORTS SAY THAT ELON MUSK IS A 'LYING', 'NARCISSIST', 'SOCIOPATH', 'JEFFREY EPSTEIN SEX ADDICT', 'FRAUD' WHO BRIBES POLITICIANS FOR TAX HAND-OUTS, IS PROTECTED BY BROMANTIC RELATIONS WITH GOOGLE'S LARRY PAGE AND ORDERS HIT-JOBS ON HIS COMPETITORS."
"CHARACTER ASSASSINATIONS AND DEFAMATION ATTACKS WERE ORDERED, OPERATED AND PAID FOR BY WHITE HOUSE, CALIFORNIA SENATORS AND GOOGLE EXECUTIVES"
"THE EVIDENCE PROVES THAT GOOGLE IS A CRIMINAL CARTEL, AN UNREGULATED POLITICAL PAC AND A TAX EVADING, SENATOR BRIBING ILLICIT DOMESTIC SPYING OPERATION."
"THE EVIDENCE PROVES THAT SILICON VALLEY OLIGARCHS HIRE CROOKED LOBBYISTS AND BIG TECH LAW FIRMS THAT THEY PAY COVERT COMPENSATION TO FOR THEIR SERVICES TO MANIPULATE THE GOVERNMENT."
"LITHIUM ION BATTERIES ARE PART OF A TRILLION DOLLAR+ RARE EARTH MINING SCAM. THEIR KNOWN DANGERS ARE COVERED UP BY LEFTIST PRESS IN ORDER TO PROTECT ELON MUSK'S AND GOOGLE'S INVESTMENTS IN THEM. CALIFORNIA SENATORS OWN STOCK IN THEM AND COVER UP THE DEADLY TOXIC AND EXPLOSIVE DANGERS OF THEM. Elon Musk and Panasonic engaged in "product dumping" because they both knew, over a decade ago, that the 18650 lithium ion batteries would 1.) degrade and explode due to faulty chemistry and dendrite expansion, 2.) Had toxic cancer-causing fumes when ignited, 3.) used child labor and genocide regions for mining the raw materials, 4.) could never hold up in auto powerplant use, 5.) sickened and killed the workers making them; and other horrific things that were covered up in an epic, and ongoing, safety scam because U.S. Senator's and CIA executives own stock in lithium ion batteries. These facts are easily proven in court!"
"SILICON VALLEY EXECUTIVES, FAMOUS POLITICIANS AND VENTURE CAPITALISTS OPERATE A SEX CULT AND SEX TRAFFICKING RING"
"THE SO CALLED "PAYPAL MAFIA" AND "THE DEEP STATE" ARE THE SAME GROUP OF PEOPLE"
"SILICON VALLEY WEB COMPANIES USE SPYING-ON-THE-PUBLIC TO SEEK TO RIG ELECTIONS AND CONTROL THE MASSES FOR THEIR PERSONAL IDEOLOGIES. THE TRADE THOSE ILLICIT SERVICES WITH FAMOUS POLITICIANS IN EXCHANGE FOR GOVERNMENT CONTRACTS, GRANTS, LOANS AND FAVORS.."
"GOVERNMENT AGENCIES, IN PARTICULAR THE U.S. DEPARTMENT OF ENERGY, SSA, FTC, ETC, ARE USED AS POLITICAL SLUSH FUNDS TO PAYOLA OBAMA CAMPAIGN FINANCIERS AND SABOTAGE THOSE FINANCIERS COMPETITORS..."
"THERE ARE FULLY LEGAL, INTELLIGENCE AGENCY CREATED, FBI-CLASS TACTICS, FORENSICS METHODOLOGIES, MASS PUBLIC CROWD-SOURCED INVESTIGATION TOOLS AND TECHNOLOGIES THAT THE PUBLIC CAN USE TO DESTROY THESE CORRUPT OLIGARCHS... HERE ARE PUBLIC TACTICS THAT REGULAR FOLKS HAVE USED IN THE PAST TO TAKE-DOWN THESE KINDS OF CORRUPT OLIGARCHS AND THEIR DIRTY COMPANIES..."
"MOST CALIFORNIA POLITICIANS HAVE BEEN TAKING BRIBES, MOSTLY IN THE FORM OF STOCK TRADES, IN EXCHANGE FOR HELPING THEIR FRIENDS COMPANIES AND HARMING THEIR FRIENDS COMPETITORS"
"Certain California State officials, Obama White House Staff and Federal Agency staff accepted bribes from Silicon Valley Oligarchs and Investment Bank Cartels. They were bribed with: Billions of dollars of Google, Twitter, Facebook, Tesla, Netflix and Sony Pictures stock and stock warrants which is never reported to the FEC; Billions of dollars of Google, Twitter, Facebook, Tesla, Netflix and Sony Pictures search engine rigging and shadow-banning which is never reported to the FEC; Free rent; Male and female prostitutes; Cars; Dinners; Party Financing; Sports Event Tickets; Political campaign printing and mailing services "Donations"; Secret PAC Financing; Jobs in Corporations in Silicon Valley For The Family Members of Those Who Take Bribes And Those Who Take Bribes; "Consulting" contracts from McKinsey as fronted pay-off gigs; Overpriced "Speaking Engagements" which are really just pay-offs conduited for donors; Gallery art; Private jet rides and the use of Government fuel depots (ie: Google handed out NASA jet fuel to staff); Recreational drugs; Real Estate; Fake mortgages; The use of Cayman, Boca Des Tores, Swiss and related money-laundering accounts; The use of HSBC, Wells Fargo, Goldman Sachs and Deustche Bank money laundering accounts and covert stock accounts; Free spam and bulk mailing services owned by Silicon Valley corporations; Use of high tech law firms such as Perkins Coie, Wilson Sonsini, MoFo, Covington & Burling, etc. to conduit bribes to officials; and other means now documented by us, The FBI, the FTC, The SEC, The FEC and journalists..."
"A typical boondoggle in this case is exampled by one of the many victims: "...We owned a global vehicle design and manufacturing business and a global clean energy production and storage business financed by the U.S. Government. White House and California politicians owned our competitors and re-routed our funding to our competitors, who were the friends and campaign financiers of those politicians. Those politicians contracted Fusion GPS, Black Cube, Gawker/Gizmodo, Crowd-strike, etc. to run hit-jobs on us to blockade our business for their benefit. Those politicians engaged in felony bribery, anti-trust violations and racketeering and they are still being protected by regulators who have conflict-of-interest relations with those politicians..."
"As payback for manipulating politics and the stock market, Google, Facebook, Linkedin, YouTube, Netflix, etc. are being taken over from within, and cornered with new laws, so that they will be forced to become tools of the public and blocked from being the facade shill organizations for corruption, tax evasion, sex abuse, bribery and extremism. We are using the billions of dollars that Schmidt and Zuckerberg spent to turn their companies into our companies. A great example is the fact that Jack Dorsey at Twitter says that he "wants Trump dead" yet Trump uses Twitter as a daily global communications tool; the irony is awesome and a strategic deployment, carefully planned...."
REFERENCES, VERIFICATION, CONFIRMATIONS AND VALIDATING EVIDENCE:
- RONAN FARROW'S BOOK: CATCH AND KILL
- EDWARD SNOWDEN'S BOOK: PERMANENT RECORD
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://londonworldwide.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://stopelonfromfailingagain.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://tesla-motors-cronyism
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.thecreepyline.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.icij.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://vcracket.weebly.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.transparency.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.judicialwatch.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://wikileaks.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://causeofaction.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://fusion4freedom.com/about-gcf/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://peterschweizer.com/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://globalinitiative.net
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://fusion4freedom.com/the-green-corruption-files-archive/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://propublica.org
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.allsides.com/unbiased-balanced-news
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://wearethenewmedia.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://ec.europa.eu/anti_fraud/index_en.html
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://gopacnetwork.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.iaaca.org/News/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.interpol.int/Crime-areas/Corruption/Corruption
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.icac.nsw.gov.au/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.traceinternational.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.oge.gov/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://ogc.commerce.gov/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://anticorruptionact.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.anticorruptionintl.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://represent.us/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.giaccentre.org/dealing_with_corruption.php
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.acfe.com/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.oas.org/juridico/english/FightCur.html
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.opus.com/international-anti-corruption-day-businesses/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.opengovpartnership.org/theme/anti-corruption
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.ethicalsystems.org/content/corruption
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://sunlightfoundation.com/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.googletransparencyproject.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://xyzcase.weebly.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://en.wikipedia.org/wiki/Angelgate
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://www.opensecrets.org/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://en.wikipedia.org/wiki/High-Tech_Employee_Antitrust_Litigation
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.projectveritasaction.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): THE PALO ALTO MAFIA
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): INVESTIGATION CASE SUMMARIES
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): NEWS VIDEOS m4v
- HOW TYCOONS AND SILICON VALLEY TECH OLIGARCHS HIRE SPIES
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): MUSK AND UNSAFE TESLA CARS
- PROOF - GO TO PACER - Public Access to Court Electronic Records and log in. Read all of the first case filings under searches under the names: "Elon Musk" or "Tesla Motors". If you refuse to read and understand the truth about Elon Musk then you are the same as the person who allows the priest to rape the little boys. You cannot delude yourself into protecting Musk because you have bought into his hype that he is some sort of "technology god"! WE SAY ELON MUSK IS A CROOK AND HERE IS OUR PROOF
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): Elon Musk is a total fraud - nypost.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): Elon Musk is a total fraud: Truth about Tesla billionaire exposed
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): Elon Musk Passes the Hat Again on Capitol Hill… And in China
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): About Elon Musk - A WASHINGTON DC ORGANIZED CRIME
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): Mark Spiegel: Elon Musk is 'a pathological liar'
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): Tesla's Elon Musk is a liar, he will do anything to keep
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): HERE: WEB READY NEWS VIDEOS
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): https://nationalnewsnetwork.net/
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): http://www.videonet111.com
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): DEFAMATION ATTACKS AND ASSASSINATIONS
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): THE GOOGLE CARTEL IS A CRIMINAL POLITICAL MONOPOLY
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): PALO ALTO MAFIA RIGS POLITICS AND CONTROLS K STREET
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): RARE EARTH MINING PAYOLA, CHILD LABOR, BRIBES
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): SOCIOPATH FRAT BOY DEGENERATES
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): DEEP STATE CONSPIRACY AGAINST DEMOCRACY
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): SURVEILLANCE CAPITALISM THAT ABUSES THE PUBLIC
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): ILLICIT CRONY SLUSH FUND
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): PAYBACK
- PROOF - (LINK TO FOLDER OF EVIDENCE SAMPLES): FIGHT AND WIN AGAINST CORRUPTION
Anne Broache. "FBI wants widespread monitoring of 'illegal' Internet activity". CNET. Retrieved 25 March 2014.
"Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
"Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
Hacktivists in the frontline battle for the internet retrieved 17 June 2012
Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2009-03-13.
"CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
"CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
American Council on Education vs. FCC Archived 2012-09-07 at the Wayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved 2009-03-19.
McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved 2009-03-13.
"First round in Internet war goes to Iranian intelligence", Debkafile, 28 June 2009. (subscription required)
Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.
"How Stuff Works". Retrieved November 10, 2017.
[electronics.howstuffworks.com/gadgets/high-tech-gadgets/should-smart-devices-automatically-call-cops.htm. "How Stuff Works"] Check
|url=value (help). Retrieved November 10, 2017.
[time.com/4766611/alexa-takes-the-stand-listening-devices-raise-privacy-issues "Time Alexa Takes the Stand Listening Devices Raise Privacy Issues"] Check
|url=value (help). Retrieved November 10, 2017.
Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. Retrieved 2009-03-17.
Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. Retrieved 2009-03-21.
Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. Retrieved 2009-03-21.
"Advertising and Privacy". Google (company page). 2009. Retrieved 2009-03-21.
"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software", Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
"Office workers give away passwords for a cheap pen", John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.
"Passwords are passport to theft", The Register, 3 March 2004. Retrieved 7 September 2013.
"Social Engineering Fundamentals, Part I: Hacker Tactics", Sarah Granger, 18 December 2001.
"Stuxnet: How does the Stuxnet worm spread?". Antivirus.about.com. 2014-03-03. Retrieved 2014-05-17.
Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". New York Times. Retrieved 14 March 2009.
Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). Retrieved March 14, 2009.
Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Archived from the original (PDF) on February 6, 2009. Retrieved March 14, 2009.
Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved 2009-03-16.
Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Retrieved 2009-03-16.
Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
Kuhn, M.G. (26–28 May 2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25.
Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard Acoustic Emanations (PDF), IBM Almaden Research Center
Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News
"LA Times". Retrieved November 10, 2017.
Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.
Jeremy Reimer (20 July 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica.
Hopper, D. Ian (4 May 2001). "FBI's Web Monitoring Exposed". ABC News.
"New York Times". Retrieved November 10, 2017.
"Stanford University Clipper Chip". Retrieved November 10, 2017.
"Consumer Broadband and Digital Television Promotion Act" Archived 2012-02-14 at the Wayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
"Swiss coder publicises government spy Trojan". News.techworld.com. Retrieved 25 March 2014.
Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428
"Censorship is inseparable from surveillance", Cory Doctorow, The Guardian, 2 March 2012
The Enemies of the Internet Special Edition : Surveillance Archived 2013-08-31 at the Wayback Machine, Reporters Without Borders, 12 March 2013
"When Secrets Aren’t Safe With Journalists", Christopher Soghoian, New York Times, 26 October 2011
Everyone's Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007
Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved March 13, 2009.
"CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved March 14, 2009.
"CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). September 20, 2007. Retrieved March 14, 2009.
Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved March 19, 2009.
McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved September 26, 2014.
"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats". Wired Magazine. July 18, 2007.
Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
Kuhn, M.G. (2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25.
Risen, James; Lichtblau, Eric (June 16, 2009). "E-Mail Surveillance Renews Concerns in Congress". New York Times. pp. A1. Retrieved June 30, 2009.
Ambinder, Marc (June 16, 2009). "Pinwale And The New NSA Revelations". The Atlantic. Retrieved June 30, 2009.
Greenwald; Ewen, Glen; MacAskill (June 6, 2013). "NSA Prism program taps in to user data of Apple, Google and others" (PDF). The Guardian. Retrieved February 1, 2017.
Sottek, T.C.; Kopfstein, Janus (July 17, 2013). "Everything you need to know about PRISM". The Verge. Retrieved February 13, 2017.
Singel, Ryan (September 10, 2007). "Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated". Threat Level. Wired. Retrieved March 19, 2009.
Roland, Neil (March 20, 2007). "Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas". Bloomberg News. Retrieved March 19, 2009.
Piller, Charles; Eric Lichtblau (July 29, 2002). "FBI Plans to Fight Terror With High-Tech Arsenal". LA Times. Retrieved March 14, 2009.
Schneier, Bruce (December 5, 2006). "Remotely Eavesdropping on Cell Phone Microphones". Schneier On Security. Retrieved December 13, 2009.
Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect". Financial Times. Retrieved March 14, 2009.
"Telephones". Western Regional Security Office (NOAA official site). 2001. Retrieved March 22, 2009.
Coughlin, Kevin (December 13, 2006). "Even if they're off, cellphones allow FBI to listen in". The Seattle Times. Retrieved December 14, 2009.
Hampton, Brittany (2012). "From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note". University of Louisville Law Review. Fifty One: 159–176 – via Law Journal Library.
"Tracking a suspect by mobile phone". BBC News. August 3, 2005. Retrieved March 14, 2009.
Miller, Joshua (March 14, 2009). "Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal". FOX News. Archived from the original on March 18, 2009. Retrieved March 14, 2009.
Zetter, Kim (December 1, 2009). "Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year". Wired Magazine: Threat Level. Retrieved December 5, 2009.
"Greenstone Digital Library Software". snowdenarchive.cjfe.org. Retrieved June 3, 2017.
Sanger, David (September 26, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A". New York Times. Retrieved November 1, 2014.
Gellman, Barton (December 4, 2013). "NSA tracking cellphone locations worldwide, Snowden documents show". The Washington Post. Retrieved November 1, 2014.
Nye, James (October 26, 2014). "British spies can go through Americans' telephone calls and emails without warrant revelas legal challenge in the UK". Mail Online. Retrieved November 1, 2014.
"Rise of Surveillance Camera Installed Base Slows". May 5, 2016. Retrieved January 5, 2017.
"Smart cameras catch man in 60,000 crowd". BBC News. April 13, 2018. Retrieved April 13, 2018.
Schorn, Daniel (September 6, 2006). "We're Watching: How Chicago Authorities Keep An Eye On The City". CBS News. Retrieved March 13, 2009.
"The Price of Privacy: How local authorities spent £515m on CCTV in four years" (PDF). Big Brother Watch. February 2012. p. 30. Retrieved February 4, 2015.
"FactCheck: how many CCTV cameras?". Channel 4 News. June 18, 2008. Retrieved May 8, 2009.
"You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated". The Guardian. March 2, 2011. Retrieved January 7, 2017; "In the press: How the media is reporting the 1.85 million cameras story". Security News Desk. March 3, 2011. Retrieved January 7, 2017.
"CCTV in London" (PDF). Retrieved July 22, 2009.
"Big Brother To See All, Everywhere". CBS News. Associated Press. July 1, 2003. Retrieved September 26, 2014.
Bonsor, K. (September 4, 2001). "How Facial Recognition Systems Work". Retrieved June 18, 2006.
McNealy, Scott. "Privacy is (Virtually) Dead". Retrieved December 24, 2006.
"WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network". Retrieved October 5, 2016.
"EPIC Video Surveillance Information Page". EPIC. Retrieved March 13, 2009.
Hedgecock, Sarah (August 14, 2012). "TrapWire: The Less-Than-Advertised System To Spy On Americans". The Daily Beast. Retrieved September 13, 2012.
Albrechtlund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). Retrieved March 14, 2009.
Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Retrieved July 28, 2012.
Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. Archived from the original on November 16, 2004. Retrieved March 15, 2009.
Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved March 16, 2009.
Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Retrieved March 16, 2009.
Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. Archived from the original on February 26, 2015. Retrieved March 15, 2009.
Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
"DyDAn Research Blog". DyDAn Research Blog (official blog of DyDAn). Retrieved December 20, 2009.
Singel, Ryan (October 29, 2007). "AT&T Invents Programming Language for Mass Surveillance". Threat Level. Wired. Retrieved March 19, 2009.
Singel, Ryan (October 16, 2007). "Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known". Threat Level. Wired. Retrieved March 19, 2009.
Havenstein, Heather (September 12, 2008). "One in five employers uses social networks in hiring process". Computer World. Archived from the original on September 23, 2008. Retrieved March 14, 2009.
Frank, Thomas (May 10, 2007). "Face recognition next in terror fight". USA Today. Retrieved March 16, 2009.
Vlahos, James (January 2008). "Surveillance Society: New High-Tech Cameras Are Watching You". Popular Mechanics. Archived from the original on December 19, 2007. Retrieved March 14, 2009.
Nakashima, Ellen (December 22, 2007). "FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces". Washington Post. pp. A01. Retrieved May 6, 2009.
Arena, Kelly; Carol Cratty (February 4, 2008). "FBI wants palm prints, eye scans, tattoo mapping". CNN. Retrieved March 14, 2009.
Gross, Grant (February 13, 2008). "Lockheed wins $1 billion FBI biometric contract". IDG News Service. InfoWorld. Retrieved March 18, 2009.
"LAPD: We Know That Mug". Wired Magazine. Associated Press. December 26, 2004. Retrieved March 18, 2009.
Mack, Kelly. "LAPD Uses Face Recognition Technology To Fight Crime". NBC4 TV (transcript from Officer.com). Archived from the original on March 30, 2010. Retrieved December 20, 2009.
Willon, Phil (September 17, 2009). "LAPD opens new high-tech crime analysis center". LA Times. Retrieved December 20, 2009.
Dotinga, Randy (October 14, 2004). "Can't Hide Your Lying ... Face?". Wired Magazine. Retrieved March 18, 2009.
Boyd, Ryan. "MQ-9 Reaper". Retrieved October 5, 2016.
Friedersdorf, Conor (March 10, 2016). "The Rapid Rise of Federal Surveillance Drones Over America". Retrieved October 5, 2016.
McCullagh, Declan (March 29, 2006). "Drone aircraft may prowl U.S. skies". CNet News. Retrieved March 14, 2009.
Warwick, Graham (June 12, 2007). "US police experiment with Insitu, Honeywell UAVs". FlightGlobal.com. Retrieved March 13, 2009.
La Franchi, Peter (July 17, 2007). "UK Home Office plans national police UAV fleet". Flight International. Retrieved March 13, 2009.
"No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons". International Online Defense Magazine. February 22, 2005. Retrieved March 15, 2009.
"BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)" (PDF). Information Processing Technology Office (DARPA) – Official Website. December 5, 2003. Archived from the original (PDF) on November 27, 2008. Retrieved March 16, 2009.
Sirak, Michael (November 29, 2007). "DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture". Defense Daily. Archived from the original on March 9, 2012. Retrieved March 16, 2009.
Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.
Saska, M.; Vakula, J.; Preucil, L. Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.
Clayton, Mark (February 9, 2006). "US Plans Massive Data Sweep". Christian Science Monitor. Retrieved March 13, 2009.
Flint, Lara (September 24, 2003). "Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power". The Center For Democracy & Technology (official site). Archived from the original on March 8, 2009. Retrieved March 20, 2009.
""National Network" of Fusion Centers Raises Specter of COINTELPRO". EPIC Spotlight on Surveillance. June 2007. Retrieved March 14, 2009.
anonymous (January 26, 2006). "Information on the Confidential Source in the Auburn Arrests". Portland Indymedia. Archived from the original on December 5, 2008. Retrieved March 13, 2009.
Myers, Lisa (December 14, 2005). "Is the Pentagon spying on Americans?". NBC Nightly News. msnbc.com. Retrieved March 13, 2009.
"The Use of Informants in FBI Domestic Intelligence Investigations". Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270. Retrieved March 13, 2009.
"Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News". www.prisonlegalnews.org. Retrieved October 5, 2016.
Ross, Brian (July 25, 2007). "FBI Proposes Building Network of U.S. Informants". Blotter. ABC News. Retrieved March 13, 2009.
"U.S. Reconnaissance Satellites: Domestic Targets". National Security Archive. Retrieved March 16, 2009.
Block, Robert (August 15, 2007). "U.S. to Expand Domestic Use Of Spy Satellites". Wall Street Journal. Retrieved March 14, 2009.
Gorman, Siobhan (October 1, 2008). "Satellite-Surveillance Program to Begin Despite Privacy Concerns". The Wall Street Journal. Retrieved March 16, 2009.
Warrick, Joby (August 16, 2007). "Domestic Use of Spy Satellites To Widen". Washington Post. pp. A01. Retrieved March 17, 2009.
Shrader, Katherine (September 26, 2004). "Spy imagery agency watching inside U.S." USA Today. Associated Press. Retrieved March 17, 2009.
Kappeler, Victor. "Forget the NSA: Police May be a Greater Threat to Privacy".
"Two Stories Highlight the RFID Debate". RFID Journal. July 19, 2005. Retrieved March 23, 2012.
Lewan, Todd (July 21, 2007). "Microchips in humans spark privacy debate". USA Today. Associated Press. Retrieved March 17, 2009.
McCullagh, Declan (January 13, 2003). "RFID Tags: Big Brother in small packages". CNET News. Retrieved July 24, 2012.
Gardener, W. David (July 15, 2004). "RFID Chips Implanted In Mexican Law-Enforcement Workers". Information Week. Retrieved March 17, 2009.
Campbell, Monica (August 4, 2004). "Law enforcement in Mexico goes a bit bionic". Christian Science Monitor. Retrieved March 17, 2009.
Claburn, Thomas (March 4, 2009). "Court Asked To Disallow Warrantless GPS Tracking". Information Week. Retrieved March 18, 2009.
Hilden, Julie (April 16, 2002). "What legal questions are the new chip implants for humans likely to raise?". CNN.com (FindLaw). Retrieved March 17, 2009.
Wolf, Paul. "COINTELPRO". (online collection of historical documents). Retrieved March 14, 2009.
"Domestic CIA and FBI Mail Opening Programs" (PDF). Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from the original (PDF) on May 5, 2011. Retrieved March 13, 2009.
Hauser, Cindy E.; McCarthy, Michael A. (July 1, 2009). "Streamlining 'search and destroy': cost-effective surveillance for invasive species management". Ecology Letters. 12 (7): 683–692. doi:10.1111/j.1461-0248.2009.01323.x. ISSN 1461-0248. PMID 19453617.
Holden, Matthew H.; Nyrop, Jan P.; Ellner, Stephen P. (June 1, 2016). "The economic benefit of time-varying surveillance effort for invasive species management". Journal of Applied Ecology. 53 (3): 712–721. doi:10.1111/1365-2664.12617. ISSN 1365-2664.
Flewwelling, Peter; Nations, Food and Agriculture Organization of the United (January 1, 2003). Recent Trends in Monitoring Control and Surveillance Systems for Capture Fisheries. Food & Agriculture Org. ISBN .
Yang, Rong; Ford, Benjamin; Tambe, Milind; Lemieux, Andrew (January 1, 2014). Adaptive Resource Allocation for Wildlife Protection Against Illegal Poachers. Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. AAMAS '14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems. pp. 453–460. ISBN .
Mörner, T.; Obendorf, D. L.; Artois, M.; Woodford, M. H. (April 1, 2002). "Surveillance and monitoring of wildlife diseases". Revue Scientifique et Technique (International Office of Epizootics). 21 (1): 67–76. doi:10.20506/rst.21.1.1321. ISSN 0253-1933. PMID 11974631.
Sprenger, Polly (January 26, 1999). "Sun on Privacy: 'Get Over It'". Wired Magazine. Retrieved March 20, 2009.
"Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
"Privacy fears over online surveillance footage broadcasts in China". December 13, 2017.
Marx, G. T., & Muschert, G. W. (2007). Personal information, borders, and the new surveillance studies Archived August 11, 2017, at the Wayback Machine. Annual Review of Law and Social Science, 3, 375–395.
Agre, Philip E. (2003), "Your Face is not a bar code: arguments against automatic face recognition in public places". Retrieved November 14, 2004.
Nishiyama, Hidefumi (2017). "Surveillance as Race Struggle: On Browne's Dark Matters". Theory & Event. Johns Hopkins University Press. 20 (1): 280–285 – via Project MUSE.
Browne, Simone (October 2, 2015). Dark Matters: On the Surveillance of Blackness. Duke University Press Books. p. 224. ISBN .
Court of Appeal, Second District, Division 6, California. (July 30, 2008). "People vs. Diaz". FindLaw. Retrieved February 1, 2017.
California Fourth District Court of Appeal (June 25, 2014). "Riley v. California". Oyez – IIT Chicago-Kent College of Law. Retrieved February 1, 2013.
"The Secrets of Countersurveillance". Security Weekly. June 6, 2007.
HOW WE ARE ENDING CORRUPTION IN AMERICA - THE PROCESS
- Every member of the public should join in these citizen sleuth and crowd-sourced anti-corruption actions.
- This involves one of the largest organized crime matters in American history. Public officials are altering political decisions in order to have themselves, their families and their friends gather exclusive stock market profits from their heinous manipulations of taxpayer resources. There are hundreds of billions of dollars of corruption involved here!
- The FBI expends $60M+ per year paying whistle-blowers, informants and witnesses. Where is our money per our FBI invoice? We testified to the GAO, SEC, FTC and other agencies and we want our money!
- Specific individuals ordered federal agencies including DOE, SSA, HUD and others to harm us and cut off our money in reprisal for reporting these crimes. We want our money!
- California and Nevada Senators operated hit jobs on us because we exposed their crimes. They cost our businesses a vast amount of money in losses. We want our money!
The State and Federal agencies do not get to say that they didn't hear about the crimes from us FIRST because we filed multiple federal lawsuits and put our facts on federal court record proving that we disclosed the crimes, money laundering and stock market manipulations first. Thus we are owed our witness/whistle-blower/informant fees from multiple agencies that we provided testimony to in interviews and reports! WE WANT OUR MONEY FOR OUR DAMAGES, FEES AND RELATED LOSSES!
- The price of using our Democracy to harm us is your choice of payment programs, either: 1.) Face your bankruptcy and global doxing in a 100% legal plan implemented by every citizen with a computer or, 2.) Pay us what you owe us! We want our money!
Washington Post releases secret documents proving that Obama lied to America to keep his Afghanistan War going so he could get crooked rare-earth mining deals for his Silicon Valley political financiers...
Report: Justice Dept IG Horowitz Has 104 "Criminal FBI investigations going on.."
Scumbag Larry Page forced to step down as CEO of ALPHABET...
Sex addict Sergey Brin will no longer be president of Google Cartel...
Crooked pair STILL hold more than 50% voting shares and are doing massive harm to society...
We and the fired Google engineers seek federal probe...
Stayed tuned for more shockers throughout 2020...
This is what they did to us simply because we reported a crime to federal law enforcement....so we watched, we learned, we waited and now we have struck back! If it was legal for them to try to execute us, our lives and our brands this way, then it must be legal for us to do it right back to every single one of them for the rest of their lives. There is now nothing they can do to stop what is coming. Even if we are dead, a billion others have already taken our place!
Elon Musk, Larry Page, Sergy Brin, Eric Schmidt, Reid Hoffman, etc. and the California Senators bury billions of dollars of ill-gotten corruption money in a huge number of mansion and office building real estate assets. They think that when, and if, they get busted, they will be able to liquidate this real estate later. We have uncovered their thousands of shell corps, fake LLCs, false-front corporate facades and phony charities and we are exposing their crime network to every voter and law enforcement agency on Earth! They all work with the Jeffrey Epstein School of Money Laundering, Payola And Sex Trafficking!
These are the 100% legal steps, tactics, methodologies and procedures being used to end political corruption in America. Every citizen, in every nation, is encouraged to engage in these efforts:
- Draft versions of FBI "302 Reports", on each and every suspect in the associated list of targets, (in these related documents) are being authored and submitted to the FBI. We will teach you how to write and submit them too!
- These sites, and the associated evidence repositories, have been electronically made available to every FBI agent, Interpol Agent and law enforcement agency in the world.
- Criminal complaints and investigation demands are being authored and submitted to the DOJ, FTC, FEC, SEC, SSA, OSC, CIA, GAO, Congress and each Inspector General.
- We have forced over 100 agency heads to resign simply by providing them with copies of the Draft versions of FBI "302 Reports" on them that we intend to submit.
- We have produced an analysis chart template, with the help of Wikileaks, ICIJ, Sunshine Groups, Follow-the-Money and other database efforts. This chart depicts a graphic analysis of each suspects collusion's, bribes and compromised assets.
- We are teaching and providing forensics and criminal investigation training to the public so that the public is as resourced as any special agent. A vast number of "how to be a private investigator" books have been published on Amazon, E-Book sites and shared online.
- Confirming copies of all submitted reports are digitally carbon-copied to the press, the public and global "dead-man switch" torrent archives.
- We created a new series of public lawsuits, anti-trust lawsuits, RICO lawsuits and class-action lawsuits by the public and against the targets. These lawsuits have now placed permanent public transparency on record and changed the law to help the public and stop the crooks.
- We have exposed their Silicon Valley Bay Area, New York And Florida executive sex trafficking rings.
- Billions of members of the public are monitoring the suspects via public database information and public shared observation of their activities, locations, owner-ships and transactions via each member of the public's personal computers.
- We identified and listed every person, organization and company involved in the attacks and RICO law violations and provided that list to The U.S. Congress and every agency.
- We opened our own private investigator and crowd-sourced investigations into the following:
- - Every stock market account they or their family owns
- - Every judge that has taken campaign finance and stock market bribes from the crooks
- - Every Uber or Lyft ride they ever took for any meeting or transport of sex workers
- - Every flight manifest they appeared on
- - Every bank account they have ever held
- - Every lawsuit, divorce record and police record they have ever appeared in
- - Every trust fund they or their family holds
- - Every shell corporation they, or their family holds
- - Every person named in the Epstein Pedo book: https://www.scribd.com/document/416207833/Jeffrey-Epsteins-Little-Black-Book-Redacted cross referenced across all of the other databases and then supplied to the FBI and Child Protection Agencies
- - Every item in the Swiss Leaks that cross connects to their holdings
- - Every item in the Panama Papers Leaks that cross connects to their holdings
- - Every item in the WikiLeaks that cross connects to their holdings
- - Every item in the Snowden Leaks that cross connects to their holdings
- - Every sex trafficking incident that connects to each of them alone, and in groups
- - Every financial transaction between any of the parties on the master list and the character assassination and hit job firms of: Google, Univision, Gawker Media, Unimoda, Jalopnik, Gizmodo,Black Cube, Fusion GPS, Media Matters, Think Progress, IN-Q-Tel, K2 Intelligence, WikiStrat, Podesta Group, YouTube, Alphabet, David Drummond, Larry Page, Facebook, Correct The Recor, Stratfor, ShareBlue, Sid Blumenthal, David Brock, Eric Schmidt, Sunshine Sachs, Covington and Burling, Buzzfeed, Perkins Coie and Wilson Sonsini or their derivatives with common owners.
- - Every use of Mossack Fonseca and related crooked CPA's, Banks and Tech Law Firms they engaged in
- - Every item in the Quest Leaks that cross connects to their holdings
- - Every tactical deployment, by a campaign financier, of the tactics listed in this manual: https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf
- - Every sex service that their credit card payments every connect too
- - Every person leaving or entering locations where they sleep
- - Every real estate transaction that any name or company they, or their family, were involved in, tracks to
..... and hundreds of thousands of other information points about them that prove that they benefit from crimes that they engage in for others who engage in crimes using the America public policy system.
It all goes into shared 100% legal public collaborative databases that work like XKEYSCORE, or MS Access, or Oracle Databases.
The proof of collusion, organized criminal actions and raw covert corruption is indisputable. The actors are all the same people. The beneficiaries are all the same people. The communications between the parties all coordinate the same actions.
The suspects will never get away with these crimes and these actions and investigations will be conducted on a permanent basis and passed from person-to-person and generation-to-generation.
Every new candidate for office suspected of similar bribes and collusion's will undergo the same circumspection.
We are not a club or membership group. You are us. If you are reading this, just start doing the things listed here and do them as professionally as you can.
We are freely providing the tools, technologies and mass publishing systems, to the billions of members of the public who would like to be involved in anti-corruption actions. All of the technology is open-source.
Moral, ethical and public policy battles used to be just political — and fought only in the arena of ideas. In the "old days" candidates and nominees would step forward, present their credentials, background, and beliefs — then the public would decide.
Campaigns were simply the effective communication of a platform to earn votes on Election Day.
Now American politics is horrifyingly different and controlled by one media cartel of a tiny group of men, programmed since childhood, to think like extremist control freaks in a "means-is-justified-by-the-ends" sociopath type of madness.
American politics is total information manipulation control war headed by Google, Facebook, Linked-in and Netflix bosses, etc; these days. Most of those under attack have NOT effectively engaged in responding to the character assassination and scorched-earth tactics of these media-control extremists.
The world must accept that there is no daylight between mainstream media and Silicon Valley and Hollywood oligarch leadership. They are THE SAME PEOPLE! California oligarchs are afforded enormous protections, plus given assurances that the press will turn any and all accusations (no matter how spurious) into rock-solid “facts” overnight.
It’s a well-oiled machine, which we saw on full display during the Brett Kavanaugh hearings in the summer of 2018.
Enter THE INFORMED PUBLIC. Average folks have now joined together to ensure that any corporate media manipulation trafficking in rumors, lies, or innuendo is held accountable...to be perfectly clear, accountable means being put on the record, exposed to voters, and facing drastic possible legal and political repercussions!
Politics is now a full-on assault against voters in a highly toxic and 24/7 media landscape. media cartels employ any and all manner of manipulation and deceit to attack all outside candidates. They knowingly push the most heinous rumors imaginable to render others “morally unfit” to hold office, which is a stunning double standard that ironically would disqualify most they caucus with instantly.
A complicit media acts in conjunction with media cartels in promoting outright lies based on anonymous, unsubstantiated rumors to drive the best candidates and nominees not only out of political life, but also away from everything they’ve spent a lifetime building. Inflicting pain and creating pariahs is the name of the game. Opposition forces have yet to fully adapt to this new environment.
Outside candidates are left defenseless to react, refute, retaliate or reclaim the narrative once the opposition starts attacking in an endless pile-on that’s also a race to the bottom.
THE INFORMED PUBLIC is founded on the twin bedrocks of truth and protecting our center-right “brand” from falsehoods, slander and the personal destruction of our members, candidates and judicial nominees.
THE INFORMED PUBLIC will ensure outside candidates and nominees are not left for dead.
The media cartel corporate media dominate our airwaves with the steady drip, drip, drip of derision and the relentless erosion of independent candidates because their bosses embrace certain extremist viewpoints and work hand-in-glove to help media cartels maintain power.
Any political scandal increases their advertising bottom line. It’s a risk-free investment on their part — and it translates directly to clicks and profits via scumbag attack tabloids like Gawker, Gizmodo, Valleywag, CNN and Buzzfeed.
Today, the often amnesiac public doesn’t get the benefit of due diligence on baseless charges thrown about — because the media watchdogs never demands it.
THE INFORMED PUBLIC will now employ an aggressive playbook to win the information battles of the future.
The peer-to-peer powered crowd-sourced forensic public will engage directly and confront head-on.
Massive funds are being raised for a well-planned effort to fight back against the political and media narratives fixated on destroying the very lives of the best and brightest. Even without any funding, 5 billion members of the public are already doing severe damage to the corporate liars in big media!
Resources are being deployed against elected media cartels, candidates, members of the press, and accusers who attack outside members, candidates, and judicial nominees. There currently exist rich, untapped veins and mines of accepted facts about dozens of the most vocal against us today. Much of this data has been in the public domain for years but has never been employed for maximum exposure. Many of the loudest media cartels have never faced true opposition research or public revelations of their personal records.
These efforts by THE INFORMED PUBLIC approach won’t be your standard “compare and contrast” election-year fare. It won’t be about how any generic political shill voted on issue X or issue Y. We will go on the offensive, be excruciatingly thorough, and ensure that if a corrupt member of Congress, media representative, or Big Tech head chooses to stand as a moral judge, that person will be investigated at a CIA and FBI-level of forensic skill-sets.
THE INFORMED PUBLIC are proactive. They will exercise caution in obtaining and handling information, but won’t hesitate to use it when and where it hurts the most.
The only way to put an end to the freewheeling corrosive CNN-like lies currently contaminating our system is to subject grand-standers to the same kind of invasive scrutiny of their personal pasts they prescribe in full view of the public eye.
This is THE INFORMED PUBLIC’s straightforward mission.
It is being implemented again and again — until the lesson is learned among our so-called tech elites and the price tag for their actions is fully understood.
Once they understand that they will be held to account for their past actions and behavior via the blanketed advertising of it in their districts, states, and across the nation, they may not again hold themselves up as paragons of virtue.
THE INFORMED PUBLIC will do what the public has never done: Respond accordingly. The public, the average person, will finally be able to examine the validity and character of each one of their accusers.
THE INFORMED PUBLIC will deliver the same scrutiny insisted upon by media cartels in each and every circus of their own creation. Their hypocritical high ground may shift when the skeletons in their own past begin to be unburied and exposed to the world forever.
It’s time to stop letting sick, sex-trafficking, bribe-paying, tax-evading, big tech media drive all the narratives without legitimate cross-examination and powerful challenge.
It’s time to stand up and push back for the future of the average citizen! The list of attackers and criminally corrupt politicos engaging in these crimes is written up, widely distributed and the parties on that list are overtly obvious by their actions. Even without a list, you know who the liars and media manipulators are!
It’s time to fight.
Our database efforts and FBI, SEC, FTC and Congressional reporting programs mine existing financial relays in order to destroy the use of those resources for political bribery, money laundering, payola and related corruption. Every 501c3 and 501c4 fake non-profit of Elon Musk, Google and Facebook executives and insiders are being exposed for the camapign finance dark money frauds that they are.
TRACKING THE BRIBES AND PAYOLA DOLLAR-BY-DOLLAR
The following are the largest money laundering banks; the full-service political cash conduit banks usually provide both advisory and financing banking services, as well as sales, market making, and research on a broad array of financial products, including equities, credit, rates, currency, commodities, and their derivatives to hide money from tax agencies and law enforcement. :
Many of the largest crooked banks are considered among the "Bulge Bracket banks" and as such underwrite the majority of financial transactions in the world. Additionally, banks seeking more deal flow with smaller-sized deals with comparable profitability are known as "Middle Market investment banks" (known as boutique or independent investment banks).
Financial conglomerates cover operations
Large financial-services conglomerates combine commercial banking, investment banking, and sometimes insurance. Such combinations were common in Europe but illegal in the United States prior to the passage of the Gramm-Leach-Bliley Act of 1999. The following are large investment banking firms (not listed above) that are affiliated with large financial institutions:
- ABN AMRO
- Banco Bradesco
- Banco Santander
- BB&T (BB&T Capital Markets)
- Bank of China (BOC International Holdings)
- Bank of Communications (BOCOM International Holdings)
- Berenberg Bank
- Canadian Imperial Bank of Commerce (CIBC World Markets)
- China Construction Bank (CCB International Holdings)
- China CITIC Bank
- Crédit Agricole
- Daiwa Securities
- DBS Bank (Capital Markets Group)
- Desjardins Group (Desjardins Capital Markets)
- ICICI Bank
- Industrial and Commercial Bank of China (ICBC International Holdings)
- ING Group
- Intesa Sanpaolo (Banca IMI)
- İş Bankası (Is Investment)
- Itaú Unibanco (Itaú BBA)
- KBC Bank
- KeyCorp (KeyBanc Capital Markets)
- Kotak Mahindra Bank
- Laurentian Bank of Canada (Laurentian Bank Securities)
- Lloyds Banking Group (Lloyds Bank Wholesale Banking & Markets)
- Macquarie Group
- Mizuho Financial Group
- Banca Monte dei Paschi di Siena (MPS Capital Services)
- M&T Bank
- National Bank of Canada (National Bank Financial Markets)
- PNC Financial Services (Harris Williams & Company)
- RHB Bank
- Sanlam (Sanlam)
- Scotiabank (Scotia Capital)
- Société Générale
- Standard Bank
- Standard Chartered Bank
- State Bank of India (SBI Capital Markets)
- Stifel Financial (Stifel Nicolaus)
- Sumitomo Mitsui Financial Group
- SunTrust (Robinson Humphrey)
- TD Securities
- UniCredit (UBM)
- VTB Bank (VTB Capital)
Private placement firms acting as bribe haven advisories
- Almeida Capital
- Atlantic-Pacific Capital
- Campbell Lutyens
- Cogent Partners
- Helix Associates
- J.P. Morgan Cazenove
- Park Hill Group
- Probitas Partners
Previous Notable former investment banks and brokerages we are tracking all clients from:
The following are notable investment banking and brokerage firms that have been liquidated, acquired or merged and no longer operate under the same name.
|Alex. Brown & Sons||ultimately part of Deutsche Bank, survives as minor business unit|
|A.G. Becker & Co.||acquired by Merrill Lynch in 1984|
|A.G. Edwards||acquired by Wachovia in 2007|
|The Argosy Group||acquired by Canadian Imperial Bank of Commerce in 1995|
|Babcock & Brown||collapsed 2009, liquidation of its assets|
|BancAmerica Robertson Stephens||acquired by NationsBank in 1998 and integrated into NationsBanc Montgomery Securities to form Banc of America Securities.|
|Barings||collapsed 1995; assets acquired by ING Bank|
|Bear Stearns||collapsed 2008; assets acquired by JPMorgan Chase|
|Bowles Hollowell Connor & Co.||acquired by First Union in 1998|
|Blyth, Eastman Dillon & Co.||merged with Paine Webber in 1979|
|Brown Bros. & Co.||merged with Harriman Brothers & Company to form Brown Brothers Harriman & Co.|
|BT Alex. Brown||acquired by Deutsche Bank to form Deutsche Bank Alex. Brown|
|C.E. Unterberg, Towbin||acquired by Collins Stewart in 2007|
|Commodities Corporation||acquired by Goldman Sachs and renamed Goldman Sachs Princeton in 1997|
|Dain Rauscher Wessels||bought by Royal Bank of Canada in 2000|
|Dean Witter Reynolds||merged with Morgan Stanley to form Morgan Stanley Dean Witter, subsequently the Dean Witter name was eliminated|
|Dillon, Read & Company||acquired by Swiss Bank Corporation, and is ultimately part of UBS AG|
|Donaldson, Lufkin & Jenrette||acquired by Credit Suisse in 2001|
|Drexel Burnham Lambert||liquidated 1990|
|E.F. Hutton & Co.||acquired by Shearson Lehman/American Express in 1988, ultimately part of Lehman Brothers|
|First Boston Corporation||merged with Credit Suisse in 1988 to form CS First Boston, renamed "Credit Suisse First Boston" in 1996 and "Credit Suisse" in 2006|
|First Union Securities||acquired by Wachovia in 2002 to form Wachovia Securities|
|G.H. Walker & Co.||acquired by White Weld & Co and ultimately part of Merrill Lynch|
|Giuliani Capital Advisors||the investment banking division of Giuliani Partners was sold to Macquarie Group in 2007|
|Goodbody & Co.||merged into Merrill Lynch in 1970|
|Gruntal & Co.||acquired by Ryan Beck & Co. in 2002|
|H.B. Hollins & Co.||liquidated in 1913|
|Halsey, Stuart & Co.||ultimately part of Wachovia|
|Hambrecht & Quist||acquired by Chase Manhattan Bank and ultimately part of JPMorgan Chase. H&Q name continues as investment advisor|
|Hambros Bank||acquired by Société Générale|
|Hayden, Stone & Co.||acquired Shearson Hammill & Co. in 1974 and assumed the Shearson name. Ultimately acquired by American Express in 1981|
|Harriman Brothers & Company||merged with Brown Bros. & Co. to form Brown Brothers Harriman & Co.|
|HBOS||acquired by Lloyds TSB to form the Lloyds Banking Group in 2009|
|Hill Samuel||acquired by Trustee Savings Bank (TSB) in 1987 later Lloyds TSB|
|Hornblower & Weeks||investment bank acquired by Loeb, Rhoades & Co. and ultimately part of Shearson/American Express|
|J.&W. Seligman & Co.||investment bank ultimately part of UBS AG; continues as asset manager|
|J.C. Bradford & Co.||acquired by PaineWebber in 2000, ultimately part of UBS AG|
|John Nuveen & Co.||IBD acquired by Piper Jaffray in 1999; company continues as asset management house under Nuveen Investments, which is controlled by private equity firm Madison Dearborn Partners|
|Keefe, Bruyette & Woods||acquired by Stifel in 2012, still maintain independent branding|
|Kidder, Peabody & Co.||acquired by General Electric Corporation in 1986, subsequently resold to PaineWebber in 1994 and ultimately part of UBS AG|
|Kleinwort Benson||acquired by Dresdner Bank in 1995|
|Kuhn, Loeb & Co.||ultimately part of Lehman Brothers|
|Llama Company||ultimately defunct after departure of Alice Walton|
|L.F. Rothschild||ultimately part of C.E. Unterberg, Towbin, with parts sold to Oppenheimer. Not to be confused with Rothschild & Co (the result of a merger of the British N.M. Rothschild & Sons with the French Rothschild & Cie); see Rothschild family|
|Lee, Higginson & Co.||liquidated 1932|
|Lehman Brothers||bankrupt in 2008, asset sold to Barclays Capital and Nomura Holdings|
|Loeb, Rhoades & Co.||acquired by Shearson Hammill & Co. to form Shearson Loeb Rhoades in 1979 which was later acquired by American Express in 1981 to form Shearson/American Express|
|McColl Partners||acquired by Deloitte in 2013 to form Deloitte Corporate Finance|
|Mendelssohn & Co.||aryanized by the Nazis in 1938, sold in parts to Deutsche Bank|
|Merrill Lynch & Co.||acquired by Bank of America in 2008 and integrated into Banc of America Securities to form Bank of America Merrill Lynch|
|Miller Buckfire & Co.||acquired by Stifel in 2012, still maintains independent branding|
|Montgomery Securities||acquired by NationsBank in 1997 and integrated into NationsBanc Capital Markets to form NationsBanc Montgomery Securities|
|Morgan & Cie||acquired by Morgan Stanley in 1967 and incorporated as Morgan et Compagnie International in Morgan Stanley International Incorporated in 1975|
|Morgan Grenfell||acquired by Deutsche Bank in 1990|
|Morgan, Harjes & Co.||renamed Morgan & Cie in 1926 and acquired by Morgan Stanley in 1926|
|Paine Webber||acquired by UBS AG|
|Park Ryan||liquidated 1979|
|Prudential Securities||acquired by Wachovia in 2003|
|Reynolds Securities||merged with Dean Witter & Co. to form Dean Witter Reynolds, subsequently merged with Morgan Stanley|
|Robert Fleming & Co.||acquired by JPMorgan Chase|
|Robertson Stephens||acquired by BankAmerica in 1997 and integrated into BancAmerica Securities to form BancAmerica Robertson Stephens. Sold again in 1998 to BankBoston (later FleetBoston Financial and would operate as Robertson Stephens from 1998–2002, when the firm was shuttered after the collapse of the Internet bubble|
|Roosevelt & Son||Broken up into three firms in 1934: Roosevelt & Son (liquidated), Roosevelt & Weigold (today operates as Roosevelt & Cross); and Dick & Merle Smith|
|Ryan Beck & Co.||acquired by Stifel in 2007|
|S. G. Warburg & Co||ultimately part of UBS AG; not to be confused with M.M. Warburg or Warburg Pincus; see Warburg family|
|Salomon Brothers||acquired by Travelers Group in 1997, ultimately part of Citigroup|
|Schroders||investment bank bought by Citigroup; continues as asset manager|
|Shearson/American Express||acquired Lehman Brothers Kuhn Loeb in 1984 to form Shearson Lehman/American Express, later Shearson Lehman Hutton and Shearson Lehman Brothers|
|Shearson, Hammill & Co.||renamed Shearson Loeb Rhoades after the 1979 acquisition of Loeb, Rhoades & Co. in 1979. Acquired by American Express in 1981 to form Shearson/American Express|
|Shearson Lehman Hutton||renamed Shearson Lehman Brothers in 1990 and split up in 1993 with the IPO of Lehman Brothers and the sale of the retail and brokerage operations to Primerica|
|Soundview Technology Group||ultimately part of Charles Schwab|
|Swiss Bank Corporation||merged with Union Bank of Switzerland to form UBS AG|
|Union Bank of Switzerland||merged with Swiss Bank Corporation to form UBS AG|
|Wachovia Securities||acquired by Wells Fargo in 2008 and renamed Wells Fargo Securities|
|Wasserstein Perella & Co.||bought by Dresdner Bank|
|Wertheim & Co.||acquired by Schroders, and ultimately by Salomon Smith Barney|
|White Weld & Co.||bought by Merrill Lynch|
|Wood Gundy||acquired by the Canadian Imperial Bank of Commerce in 1987, operating as CIBC Wood Gundy before becoming CIBC World Markets in 1997|
The tech oligarchs and U.S. politicians employ a "Magic Circle" of crooked law firms to operate their schemes. The term is a derivation of the widely recognised London "magic circle" of top law firms, and is widely used in the offshore legal industry. The term has also become used to describe the offshore legal industry in a more pejorative sense (e.g. when the general media reports on paradise papers–type offshore financial scandals), and is therefore more sparingly used, or found, in major legal publications (e.g. Legal Business).
There is no consensus definition over which firms belong in the offshore magic circle. A 2008 article in the publication Legal Business (Issue 181, Offshore Review, February 2008) suggested a list, which has been repeated by others, and is simply the top 10 offshore law firms, but excluding Gibraltar–specialist Hassans.[a]
Mofo, Brobeck, Wilson Sonsini, Perkins Coie and other tech Cartel "dirty firms" are under specific and deep investigation by both public and FBI teams. A 2017 study published in Nature into offshore financial centres (see Conduit and Sink OFCs), showed the depth of legal connections between classic "offshore" tax havens (called Sink OFCs), and emerging modern "onshore" corporate tax havens (called Conduit OFCs).
All of these entities partner with crooked CPA and Financial Planning firms ranging from:
- Arthur Andersen (until its closure in 2002 for a conviction related to the Enron scandal which was later overturned by the US Supreme Court)
- Arthur Young (Arthur Young, McLelland, Moores & Co from 1968 to 1985)
- Coopers and Lybrand (until 1973 Cooper Brothers in the UK and Lybrand, Ross Bros., & Montgomery in the United States)
- Deloitte Haskins & Sells (until 1978 Haskins & Sells in the United States and Deloitte & Co. in the UK)
- Ernst & Whinney (until 1979 Ernst & Ernst in the United States and Whinney Murray in the UK)
- Peat Marwick Mitchell (later Peat Marwick, then KPMG)
- Price Waterhouse
- Touche Ross
...to the smaller Mossack Fonseca & Co (Panama Papers) kind of boutique tax evasion and money laundering firms, of which there are thousands. A political family such as the Feinstein's, The Pelosi's, The Musk's, etc. employ nearly a hundred of the types of entities listed on this page. Google's venture capitalists and executives employ one of the largest networks of these kinds of obfuscation experts in the world.
Dense the legal relationships have become between modern economies and "offshore" tax havens via Conduit OFCs, and the rise in offshore magic circle firms setting up offices in modern corporate–focused tax havens, like Dublin.