THE STANFORD CYCLE OF CORRUPTION
"Elite arrogant asshole dynasties send their kids to Stanford
University.
Stanford puts the kids in asshole frat houses to train them
to get away with rape and run monopolies.
When they graduate they either go up the hill to Sandhill
Road and start a venture capital clone operation or they get
their frat friends on Sandhill Road to racketeer-fund their
start-up or political campaign using money scammed from your
parents pension funds.
They only work with their frat buddies and insiders in a
tribal old boys club manner.
They steal all the technology and markets they want because
they control all of the tech lawyers and politicians via bribes
and revolving doors.
Stanford bosses keep all of this covered-up and covertly fund
political camapigns to grease the wheels of political
corruption.
They then sexually extort some Standford interns in Rosewood
Hotel rooms, get the most 'trophy wife' ones pregnant, and start
the cycle all over again...."
HOW TO WIPE OUT THE CORRUPT
You, 100% legally, will use CIA-class databases, social media,
public watch-dog technologies, FBI-quality monitoring systems and
open-source collaborative forensics comparison data to hunt down
every: hooker, real estate asset, male prostitute, mistress,
secret email account, social media posting, family trust fund,
shell corporation, family stock market transaction, off-shore
account, covert investment brokerage, email, Uber and Lyft ride,
hotel entry and exit, credit card transaction, Paypal account,
search engine manipulation, venture capital connection, Stanford
University admissions bribe, expense account abuse, taxpayer funds
abuse, rape, sextortion, covert tech company stock they own under
another name, every party they attended, every tag they appear in
on social media, every Cayman Island account, every crooked CPA or
law firm they have used, every lobbyist they ever
paid....EVERYTHING.. and you will drop the data into a simple
database and cross matrix everything even better than the spy
agencies can do it..
...AND EXPOSE IT ALL. YOU WILL SUE THEM IN SMALL CLAIMS COURT. YOU
WILL LAUNCH CLASS ACTION LAWSUITS. YOU WILL HOLD PRESS CONFERENCES
IN FRONT OF THEIR HOMES. YOU WILL CONFRONT THEM WITH FACTS AT
EVERY SINGLE TOWN HALL AND PUBLIC APPEARANCE. YOU WILL PUT UP A
BOOTH AT EVERY STREET FAIR AND PUBLIC ASSEMBLY AREA AND HAND OUT
LITERATURE. YOU WILL CREATE A MASSIVE PUBLIC MEDIA CIRCUS. YOU
WILL MAKE DISCLOSURE WEBSITES. YOU WILL NOT LET THEM ESCAPE!
These are the 100% legal steps, tactics, methodologies
and procedures being used to end political corruption in America.
Every citizen, in every nation, is encouraged to engage in these
efforts:
- Draft versions of FBI "302 Reports", on each and every suspect
in the associated list of targets, (in these related documents)
are being authored and submitted to the FBI. We will teach you how
to write and submit them too!
- These sites, and the associated evidence repositories, have
been electronically made available to every FBI agent, Interpol
Agent and law enforcement agency in the world.
- Criminal complaints and investigation demands are being
authored and submitted to the DOJ, FTC, FEC, SEC, SSA, OSC, CIA,
GAO, Congress and each Inspector General.
- We have forced over 100 agency heads to resign simply by
providing them with copies of the Draft versions of FBI "302
Reports" on them that we intend to submit.
- We have produced an analysis chart template, with the help of
Wikileaks, ICIJ, Sunshine Groups, Follow-the-Money and other
database efforts. This chart depicts a graphic analysis of each
suspects collusion's, bribes and compromised assets.
- We are teaching and providing forensics and criminal
investigation training to the public so that the public is as
resourced as any special agent. A vast number of "how to be a
private investigator" books have been published on Amazon, E-Book
sites and shared online.
- Confirming copies of all submitted reports are digitally
carbon-copied to the press, the public and global "dead-man
switch" torrent archives.
- We created a new series of public lawsuits, anti-trust lawsuits,
RICO lawsuits and class-action lawsuits by the public and against
the targets. These lawsuits have now placed permanent public
transparency on record and changed the law to help the public and
stop the crooks.
- We have exposed their Silicon Valley Bay Area, New York And
Florida executive sex trafficking rings.
- Billions of members of the public are monitoring the suspects
via public database information and public shared observation of
their activities, locations, owner-ships and transactions via each
member of the public's personal computers.
- We identified and listed every person, organization and company
involved in the attacks and RICO law violations and provided that
list to The U.S. Congress and every agency.
- We opened our own private investigator and crowd-sourced
investigations into the following:
- - Every stock market account they or their family owns
- - Every judge that has taken campaign finance and stock market
bribes from the crooks
- - Every Uber or Lyft ride they ever took for any meeting or
transport of sex workers
- - Every flight manifest they appeared on
- - Every bank account they have ever held
- - Every lawsuit, divorce record and police record they have
ever appeared in
- - Every trust fund they or their family holds
- - Every shell corporation they, or their family holds
- - Every person named in the Epstein Pedo book: https://www.scribd.com/document/416207833/Jeffrey-Epsteins-Little-Black-Book-Redacted
cross referenced across all of the other databases and then
supplied to the FBI and Child Protection Agencies
- - Every item in the Swiss Leaks that cross connects to their
holdings
- - Every item in the Panama Papers Leaks that cross connects to
their holdings
- - Every item in the WikiLeaks that cross connects to their
holdings
- - Every item in the Snowden Leaks that cross connects to their
holdings
- - Every sex trafficking incident that connects to each of them
alone, and in groups
- - Every financial transaction between any of the parties on
the master list and the character assassination and hit job
firms of: Google, Univision, Gawker Media, Unimoda, Jalopnik,
Gizmodo,Black Cube, Fusion GPS, Media Matters, Think Progress,
IN-Q-Tel, K2 Intelligence, WikiStrat, Podesta Group, YouTube,
Alphabet, David Drummond, Larry Page, Facebook, Correct The
Recor, Stratfor, ShareBlue, Sid Blumenthal, David Brock, Eric
Schmidt, Sunshine Sachs, Covington and Burling, Buzzfeed,
Perkins Coie and Wilson Sonsini or their derivatives with common
owners.
- - Every use of Mossack Fonseca and related crooked CPA's,
Banks and Tech Law Firms they engaged in
- - Every item in the Quest Leaks that cross connects to their
holdings
- - Every tactical deployment, by a campaign financier, of the
tactics listed in this manual:
https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf
- - Every sex service that their credit card payments every
connect too
- - Every person leaving or entering locations where they sleep
- - Every real estate transaction that any name or company they,
or their family, were involved in, tracks to
..... and hundreds of thousands of other information points about
them that prove that they benefit from crimes that they engage in
for others who engage in crimes using the America public policy
system.
It all goes into shared 100% legal public collaborative databases
that work like XKEYSCORE, or MS Access, or Oracle Databases.
The proof of collusion, organized criminal actions and raw covert
corruption is indisputable. The actors are all the same people.
The beneficiaries are all the same people. Study the writings and
teachings of Luke Bencie and you will be at the top of the game.