Rev 2.3
- Famous political figures use the trillions of
dollars in government treasuries and the stock market for illicit
profiteering by rigging the system exclusively for themselves and their
crony insiders.
- They attacked us using government taxpayer funded media (Fusion GPS,
Black Cube, Google, Pysops, Gizmodo, Media Matters, Blumenthal, etc.)
and spy agency tools because we competed with their businesses and
reported their crimes.
- San Francisco Bay Area government has as many corrupt politicians as
Chicago and relies on the same RICO-violating insider corruption network
to operate; as proven by deep AI searches of their financial records.
Arrests of those officials is now underway.
- Silicon Valley law enforcement records prove that these tech
oligarchs engage in an organized, racketeering-based, massive sex
trafficking, tax evasion, anti-trust violating, spousal abuse, money
laundering, black-listing, racist, ageist, political bribery, crony
racketeering crime Cartel.
- Famous U.S. Senators, Governors and their staff knowingly engage in,
finance, operate and benefit from these crimes in exchange for search
engine manipulation and stock market assets.
- Silicon Valley and Hollywood media companies censor and cover-up news
coverage of these crimes because they have a financial connection to the
perpetrators.
- Most of the government officials working on our case were hand-picked
by our business adversaries. Our case has never been fairly reviewed by
non-biased, non-conflicted officials. Our FBI-class associates have not
found a single entity in our case reviews, or determinations, who was
not either: financed by, friends, with, sleeping with, dating the staff
of, holding stock market assets in, promised a revolving door job or
government service contracts from, partying with, personal friends with,
photographed at private events with, exchanging emails with, business
associates of or directed by; one of those business adversaries, or the
Senators and politicians that those business adversaries pay campaign
finances to, or supply political digital services to.
WE SAW CRIMES AND COVER-UPS UNDERTAKEN BY U.S. SENIOR
POLITICIANS AND THE EXECUTIVES AT:
- THE U.S. DEPARTMENT OF ENERGY
- THE WHITE HOUSE
- THE SOCIAL SECURITY ADMINISTRATION
- THE CALIFORNIA ATTORNEY GENERALS OFFICE
- THE CALIFORNIA GOVERNORS OFFICE
HELP US GET JUSTICE FOR OURSELVES, AND EVERY AMERICAN. DEMAND A
SPECIAL PROSECUTOR!
WE TRACKED THE FINANCIAL AND ASSET RECORDS OF EVERY CROOK ON THE LIST
BELOW AND WE FOUND EXACTLY WHAT YOU WOULD EXPECT!
The only people that have engaged in disputes or nay-says of
these facts are the criminals, or friends of the criminals, doing
these crimes. We have tracked every public official who refuses to
help us back to their financial connections to these mobsters!
BE A PART OF THE SOLUTION. JOIN MILLIONS OF CITIZENS ON
CROWD-SOURCED SITES AROUND THE GLOBE.
We have already made new laws, changed bad old laws, sued bad
guys, gotten corrupt politicians fired... and we are only just getting
started.
If the IG's, DOJ officers, SEC investigators and State AG's that are supposed to help us won't do their jobs, we will do it for them! History has proven that political cover-ups ALWAYS take-down the political operatives who run those cover-ups!
--------------------------
These are the FACTS behind our case filings
to the U.S. Government and the citizens of the nation!
Federal agency bosses took bribes! We have the proof! They attacked
us when we reported the crimes. We have the proof!
Join billions of consumers with new forensic technologies. Be part of the global exposure of dirty payola schemes and the shaming of the tech oligarch crooks who use our Democracy as their plaything. See what happens to those who attack us using our own taxpayer resources: THE ATTACKS **** - Why We Are Hunting Down And Prosecuting Each Attacker
We are the largest collective of citizen sleuths and former
federal investigation officers in the world. There is no corrupt
person or entity we can't take down using 100% legal FBI-class
forensics!
**** Our goals:
- 1.) To put the corrupt people and companies, on the list
below, out of business, using fully legal forensic tactics and media
shame. Those who were supposed to arrest them have been bribed and
influenced to delay justice. Those delays will no longer be tolerated.
- 2.) To educate every voter in the world about how to operate
forensic investigations, as sophisticated as the FBI or the CIA do,
from the comfort of their home.
- 3.) To eradicate fake news shill entities and make all news
open-source public information gathered by the public. The "deflect,
delay & disinform" tactics of the tech oligarchs will be exposed
and illuminated at every turn.
- We are well on the way to accomplishing every one of these goals
thanks to crowd-sourced forensics and peer-to-peer communities!
Crooks: "...We don't need to have very much money to take you out. What we do have are a very particular set of skills. Skills we have acquired over a very long career. Skills that make us a nightmare for people like you...."
------------------------------------
A Statement from one of the victims: "WE DEMAND A FAIR JURY TRIAL WITH ADEQUATE LEGAL REPRESENTATION! OUR CONSTITUTIONAL AND CIVIL RIGHTS ARE BEING BLOCKED BY CORRUPT POLITICIANS WHO KNOW WHAT WILL BE EXPOSED ABOUT THEM IN COURT!!! WE DEMAND LSC LEGAL FEE COVERAGE FOR A FAIR JURY TRIAL AND A FAIR CONGRESSIONAL PUBLIC DISCLOSURE HEARING!"
PROOF OF THE ASSERTIONS - CASE FILE EVIDENCE HIGHLIGHTS:
These are our criminal charges filed with the FBI, DOJ, SEC, FTC, SSA, Congress and their Inspector General's
Who Are We?
We are the victims of these crimes, the witnesses that saw these crimes and every independent journalist, investigator, public citizen sleuth and forensic expert we could find in every nation on Earth that wants to end corruption. We are the people that will never let up until we get justice. We are the people that are terminating (using 100% legal tactics) every oligarch and politician that engaged in these crimes and the cover-ups. Educate yourself in forensic science and investigative research and be one of us too.
Parking is a nightmare at the Washington DC, San Francisco and LA FBI offices. We have been there enough to know how busy they are. To make it easier on everyone, we simply gave the FBI around-the-clock access to this site. These are our minute-by-minute reports to the FBI and members of the U.S. Congress. Every FBI office in the world can read this WIKI at will. This kind of reporting WIKI also helps inform the public and provide cross-alliance transparency.
THESE ARE THE CROOKS UNDER DEEP SURVEILLANCE BY THE PUBLIC AND TARGETED FOR 100% LEGAL TERMINATION AND EXPOSURE. FEDERAL AGENCIES AND CITIZEN SLEUTHS ARE ASKED TO FULLY PROSECUTE THEM!
Join the "FOLLOW-THE-MONEY" Team
and learn 100% legal CIA and FBI-class tactics and technologies
which are being used to track why these people are all connected by
covert financial and asset tracks. Extensive case files and dossiers
on each party, below, are available in torrents globally. These
people knowingly engaged in these crimes, attacks and illicit
activities! ** = The worst ones. They share a cadre of dirty CPA,
legal and lobbyist firms that assist them with their dirty work and
run the interface between Fusion GPS, Black Cube, Media Matters,
Gizmodo and other hit-job services.
- A.J. Delaurio – Defamation-for-sale blogger **
- Abound Solar - Criminally
corrupt crony campaign finance front operation. (Terminated)
- Adam Dachis –
Defamation-for-sale blogger
- Adam Weinstein –
Defamation-for-sale blogger
- Adrian Covert –
Defamation-for-sale blogger **
- Adrien Chen –
Defamation-for-sale blogger
- Al Mottur and Manuel
Ortiz, Brownstein Hyatt Farber Schreck **
- Alan Henry –
Defamation-for-sale blogger
- Albert Burneko –
Defamation-for-sale blogger
- Alex Balk –
Defamation-for-sale blogger
- Alexander Pareene –
Defamation-for-sale blogger
- Alexandra Philippides –
Defamation-for-sale blogger
- Allison Spinner – Wife of
Steve Spinner and lawyer at WSGR and Solyndra who helped Feinstein
rig the Solyndra cash ((Under investigation. All assets being
tracked and terminated.) **
- Allison Wentz –
Defamation-for-sale blogger
- Alphabet - Privacy abuse,
spy-on-the-public, Fake News election rigger, Clinton/DNC scheme
financier, Possible Rogue spy agency operation(Under Federal and EU
investigation) **
- Andrew Collins –
Defamation-for-sale blogger
- Andrew Magary –
Defamation-for-sale blogger
- Andrew McCormack
- Andrew Orin –
Defamation-for-sale blogger
- Andy Barbour, Smith-Free
Group **
- Andy Bechtolsheim – VC,
Tech Manipulator- **
- Aneesh Chopra
- Angelica Alzona –
Defamation-for-sale blogger
- Anna Merlan –
Defamation-for-sale blogger
- Ariana Cohen –
Defamation-for-sale blogger
- Arnold Schwarzenegger –
Governor (Accused of political bribery and kickbacks; tax evasion,
illicit deal organization with Russians and more…)
- Ashley Feinberg –
Defamation-for-sale blogger
- Austin Lau
- Ava Gyurina –
Defamation-for-sale blogger
- Barack Obama – Chicago
politician **
- Barry Petchesky –
Defamation-for-sale blogger
- Bill Daley – White House
strong-arm (Forced to resign)(he is now under investigation) **
- Bill Gurley
- Bill Lockyer – Calif
State finance head (Under investigation and sex scandal conflicts,
charged with corruption by media. Assets and ownerships under
investigation) **
- Brendan I. Koerner –
Defamation-for-sale blogger
- Brendan O’Connor –
Defamation-for-sale blogger
- Brent Rose –
Defamation-for-sale blogger
- Brian Goncher – Deloitte
VC intermediary in the stock market rigging (He is now under
investigation)(accused of political bribery and kickbacks; tax
evasion, and more…) **
- Brian Hickey –
Defamation-for-sale blogger
- Brobeck Law Firm -
Corrupt insiders for crony deals (Terminated)
- Camila Cabrer –
Defamation-for-sale blogger
- Carl Gordon
- Chad Hurley
- Cheryl Sandberg –
Facebook boss, reports to Larry Summers **
- Choire Sicha –
Defamation-for-sale blogger
- Chris Jennings, Jennings
Policy Strategies **
- Chris Mohney –
Defamation-for-sale blogger
- Chuck Brain, Capitol Hill
Strategies Inc. **
- Civis Analytics – Social
manipulation group **
- Clover Hope –
Defamation-for-sale blogger
- Covington & Burling
**
- Dan Tate Jr., Capitol
Solutions
- Daniel Cohen – DOE Legal
counsel who assisted in the Steven Chu scam (Sent
packing/fired/forced to resign) **
- Daniel Morgan –
Defamation-for-sale blogger
- Dark Money Group relay Inside
Google
- David Axelrod – White
House strategist who helped stage the quid-pro-quo (Sent
packing/fired/forced to resign)(he is now under
investigation)(accused of political bribery and kickbacks; tax
evasion, and more…) **
- David Castagnetti **
- David Danielson
- David Drummond –
Lawyer/Lobbyist– Google, bribes expert for DC and EU regions.
Cheated on wife with Google employees. (Under investigation. Quail
Road, Woodside, CA home bugged) **
- David Matthews –
Defamation-for-sale blogger
- David Mott
- David Plouffe – White
House money packager. Arranged deals between VC campaign Donors;
caught bribing Rahm Emanual (Forced to Resign. Under investigation)
**
- David Prend
- David Sacks
- David Sandalow **
- Debbie Wasserman Schultz
**
- Denis McDonough – White
House adviser **
- Diana Moskovitz –
Defamation-for-sale blogger
- Dianne Feinstein –
California politician with the largest corruption charges, Chinese
spies and a huge hit-job contract group **
- Draper - Fisher – VC firm
(Campaign funder who received massive windfalls from Russian mining
& tech start-up rigging) **
- Eleanor Shechet –
Defamation-for-sale blogger
- Elizabeth Spiers –
Defamation-for-sale blogger **
- Elizabeth Starkey –
Defamation-for-sale blogger
- Elon Musk – CEO – Tesla
(He is now under investigation & in multiple lawsuits for
fraud)(accused of political bribery and kickbacks; tax evasion, and
more…) ( All of his personal assets, investments and portfolio
holdings are under investigation ) **
- Emanuel Rouvelas, K&L
Gates **
- Emily Gould –
Defamation-for-sale blogger
- Emily Herzig –
Defamation-for-sale blogger
- Emma Carmichael –
Defamation-for-sale blogger
- Eric Holder – Attorney
General- DOJ (Forced to resign) (Charged with staff & VC
Protections and blockade of FBI and Special Prosecutor deployments
in order to run the cover-up) **
- Eric Paley
- Eric Schmidt – Owner-
Google (He is now under investigation)(accused of political bribery,
sex addiction abuse and kickbacks; tax evasion, and more…) **
- Eric Strickland – Head of
Auto Safety agency under DOT (Sent packing/fired/forced to
resign)(he is now under investigation. Charged with cover-up of
Tesla and GM auto dangers he had known about) **
- Erin Ryan –
Defamation-for-sale blogger
- Ethan Sommer –
Defamation-for-sale blogger
- Eyal Ebel –
Defamation-for-sale blogger
- Facebook - Privacy abuse,
spy-on-the-public, Fake News election rigger, Clinton/DNC scheme
financier ( Failing, rapidly decreasing users and increasing fake ad
stats disclosures ) **
- Fisker - Criminally
corrupt crony campaign finance front operation. (Terminated)
- Fred Graefe, Law Offices
of Frederick H. Graefe **
- Fusion GPS – Defamation
and journalist bribery service **
- Gabriel Burt
- Gabrielle Bluestone –
Defamation-for-sale blogger
- Gabrielle Darbyshire –
Defamation-for-sale blogger and attack services director **
- Gawker Media –
DNC/Clinton/Obama character assassination media tool (In
Mid-Termination) **
- Georgina K. Faircloth –
Defamation-for-sale blogger
- Gerald Cassidy and Gregg
Hartley, Cassidy & Associates **
- Gilman Louie – VC,
founder on IN-Q-Tel **
- Gizmodo Media –
DNC/Clinton/Obama character assassination media tool ( Failing,
rapidly decreasing users and increasing fake ad stats disclosures )
**
- Goldman Sachs – Financial
packager (Suspected of staging most of the TARP/DOE deals for
personal gain & insider payouts) **
- Google, Inc. – Data
harvesting company(Ran media attacks, stock market pump and dump PR
hype and character assassinations)(accused of political bribery and
kickbacks; tax evasion, and more…) (charged by EU, and most nations,
with multiple abuses of the public. Has totally lost the trust of
the public. Revenue loss increasing geometrically.) **
- Gregory Howard –
Defamation-for-sale blogger
- Greylock Capital –
Silicon Valley Insider trading operator and covert campaign
financier (Under investigation) **
- Hamilton Nolan –
Defamation-for-sale blogger
- Hannah Keyser –
Defamation-for-sale blogger
- Harry Reid – Senator-
Solar factory guru, Congress lead (Accused of political bribery and
kickbacks; tax evasion, and more…Forced out of Congress in shame) **
- Heather Deitrich –
Defamation-for-sale blogger **
- Heather Podesta, Heather
Podesta + Partners with her husband, Tony. **
- Hillary Clinton –
Dynastic politician **
- Hudson Hongo –
Defamation-for-sale blogger
- Hugo Schwyzer –
Defamation-for-sale blogger
- Hunter Slaton –
Defamation-for-sale blogger
- Ian Fette –
Defamation-for-sale blogger and Google, Gawker, Jalopnik, Gizmodo
media assassin **
- In-Q-Tel, Inc. – Rogue
CIA off-shoot associated with Eric Schmidt, Google, Elon Musk and
the Cartel leaders. Ran “hit-jobs” on Silicon Valley VC adversaries
and reporters (Sued, under investigation, exposed in multiple
documentaries, under investigation for Cocaine trafficking. Removal
of charity status demanded) **
- Ira Ehrenpreis – VC
Campaign backer (He is now under investigation)(accused of political
bribery and kickbacks; tax evasion, and more…) ( All of his personal
assets, investments and portfolio holdings are under investigation)
**
- Irin Carmon –
Defamation-for-sale blogger
- Ivanpah Solar -
Criminally corrupt crony Google campaign finance front operation.
(In failure mode)
- Jack Lew
- Jack Quinn, Quinn
Gillespie & Associates
- Jacque Littlefield – VC,
Dead
- Jalopnik – Online
defamation facade political publication. Pretends to be about cars
but is DNC hit job rag **
- James Bronkema – West
Coast Money Man for David Rockefeller and Feinstein financier (Dead)
- James Brown Jr –
Obamacare HHS Programming and Operations lead in California
(Arrested for corruption)
- James J. Cooke –
Defamation-for-sale blogger
- James King –
Defamation-for-sale blogger
- Jared Cohen – Google boss
and international political manipulator - **
- Jawed Karim
- Jay Carney – White House
press lead (Forced to resign) **
- Jeff Berman and David
Russell, Bryan Cave. Berman, the former delegate counter for
President Obama’s 2008 campaign **
- Jeff Lieberman
- Jeff Peck, Peck, Madigan,
Jones & Stewart. Once an aide to then-Sen. Joe Biden
(D-Del.) on the Senate Judiciary Committee **
- Jeffrey Zients **
- Jennifer Ouellette –
Defamation-for-sale blogger
- Jeremy Stoppelman
- Jerry Brown – California
politician **
- Jesse Oxfeld –
Defamation-for-sale blogger
- Jessica Cohen –
Defamation-for-sale blogger
-
Jesus Diaz – Defamation-for-sale blogger
-
Jillian Schulz – Defamation-for-sale blogger
-
Jim Blanchard and Ilia Rodriguez, DLA Piper. Blanchard, a
former Democratic governor of Michigan, and Rodriguez, an
ex-lobbyist for the Center for American Progress **
-
Jim Breyer – VC and CIA intermediary **
-
Jim Goetz
-
Jimmy Ryan, Elmendorf | Ryan
-
Joanna Rothkopf – Defamation-for-sale blogger
-
Joe Lonsdale – VC, famous for rape and abuse scandal and
domestic spying via Palantir **
-
Joe Rhodes – White House shill **
-
Joel Johnson, The Glover Park Group. The former aide to Sen.
Tom Daschle (D-S.D.) **
-
Johanna Shelton **
-
John Cook – Defamation-for-sale blogger and director of media
assassins group **
-
John Doerr – Owner – Kleiner Perkins. “Godfather” – Silicon
Valley Cartel (He is now under investigation)(accused of political
bribery and kickbacks; tax evasion, and more…)( All of his personal
assets, investments and portfolio holdings are under investigation )
**
-
John Goudie - Florida mob boss, Christopher Columbus party scammer
(arrested)
-
John Herrman – Defamation-for-sale blogger **
-
John Lindfors
-
John Podesta – White House adviser **
-
John Raffaelli, Capitol Counsel. **
-
Jonathan Silver – DOE VC (Sent packing/fired/forced to
resign)(he is now under investigation. Shamed in media for epic
failures) **
-
Jordan Sargent – Defamation-for-sale blogger
-
Joseph Keenan Trotter – Defamation-for-sale blogger
-
Josh Ackil and Matt Tanielian, Franklin Square Group. With
clients including Apple, Google and Intel, the two Democrats are
among the elite lobbyists for Silicon Valley in Washington. **
-
Josh Kopelman **
-
Josh Stein – Defamation-for-sale blogger
-
Joshua Wright
-
JP Gan
-
Julia Allison – Defamation-for-sale blogger
-
Julianne E. Shepherd – Defamation-for-sale blogger
-
Julie Domenick, Multiple Strategies LLC. The Democratic
lobbyist **
-
Justin Hyde – Defamation-for-sale blogger
-
Kamala Harris – Crooked Senator directed by investment banker
husband **
-
Kate Dries – Defamation-for-sale blogger
-
Katharine Trendacosta – Defamation-for-sale blogger
-
Katherine Drummond – Defamation-for-sale blogger
-
Kathy Zoi **
-
Keith Rabois - VC **
-
Kelly Stout – Defamation-for-sale blogger
-
Ken Alex – Scheme adviser to Jerry Brown **
-
Ken Duberstein and Marti Thomas, The Duberstein Group.
Duberstein was floated as a candidate for Obama’s chief of staff
before the president chose Bill Daley, while Thomas is a Democratic
vet who worked in the Clinton Treasury Department. **
-
Ken Howery – VC **
-
Kenneth Kies, Federal Policy Group
-
Kerrie Uthoff – Defamation-for-sale blogger
-
Kevin Draper – Defamation-for-sale blogger
-
Kleiner Perkins – Campaign funding VC who (Received massive
windfalls from Russian mining & tech start-up rigging. Sued.
Under investigation. All assets being tracked ) **
-
Lacey Donohue – Defamation-for-sale blogger
-
Lachlan Seward – Energy Department gatekeeper, dirty schemes
operator for Steven Chu **
-
Larry O’Brien, OB-C Group. O’Brien is one of the most potent
Democratic fixers in the country and has a personal connection to
Fusion GPS and Google insider deals **
-
Larry Page – Google Boss, technology thief and covert
political campaign financier **
-
Larry Summers – VC and Facebook covert boss to Sandberg **
-
Licy Do Canto, The DoCanto Group. The former aide to Rep.
Barney Frank (D-Mass.) and the late Sen. Edward Kennedy (D-Mass.)
-
Lisa Kountoupes, Kountoupes Consulting. The former aide to
Rep. John Dingell (D-Mich.) **
-
Lloyd Craig Blankfein – VC and Sachs boss **
-
Lucy Haller – Defamation-for-sale blogger
-
Luke Malone – Defamation-for-sale blogger
-
Luke Nosek
-
Madeleine Davies – Defamation-for-sale blogger
-
Marc Andreessen - VC **
-
Margaret Sullivan – VC, USAID Boss, Tom Steyer’s partner and
Hillary Clinton best friend, intended Scty of State if Tom Steyer
wins Presidency
-
Mario Aguilar – Defamation-for-sale blogger
-
Mario Rosatti – VC and insider lawyer, covert political
campaign finance specialist **
-
Mark Isakowitz, Fierce, Isakowitz and Blalock. Isakowitz and
his lobby shop scored a coup this year when Apple and Facebook both
signed up as clients in a two-week span **
-
Mark Kadesh, Kadesh & Associates. Kadesh, once chief of
staff to Sen. Dianne Feinstein (D-Calif.), has an A-list of
California Silicon Valley ANTIFA-like clients **
-
Mark Zuckerberg – Facebook Boss **
-
Martin LaGod - Firelake VC and political manipulator **
-
Marty Paone, Prime Policy Group. Paone spent decades on
Capitol Hill working for Senate Democrats **
-
Mary Meeker – VC **
-
Matt Hardigree – Defamation-for-sale blogger
-
Matt Novak – Defamation-for-sale blogger
-
Matt Rogers – VC and pass-through conduit **
-
Max Levchin - VC **
-
Mckinsey Consulting – The firm you hire to rig white papers
and insider hires in government positions for the Palo Alto Mafia **
-
Megan Smith
-
Melissa Schulman, The Bockorny Group. A former aide to Rep.
Steny Hoyer (D-Md.) - **
-
Michael Ballaban – Defamation-for-sale blogger
-
Michael Dobbs – Defamation-for-sale blogger
-
Michael Eisenberg
-
Michael Moritz - VC
-
Michael Spinelli – Defamation-for-sale blogger
-
Mikey Dickerson
-
Mitch Feuer and Robert Griner, Rich Feuer Group. Goldman
Sachs lobbyist **
-
Mohammed Nuru - San Francisco Public Works Boss, Arrested For
Corruption
-
Morrison and Foerster **
-
Nancy Pelosi – California politician **
-
Nathan Parker
-
Neal Ungerleider – Defamation-for-sale blogger
-
Neerag Agrawal
-
Nicholas Aster – Defamation-for-sale blogger
-
Nicholas Guido Denton – Defamation-for-sale blogger and head
of the Gawker, Gizmodo, Jalopnik sleaze tabloid empire **
-
Nick Allard, Thomas Hale Boggs Jr., Micah Green, Jonathan
Yarowsky and Edward Newberry, Patton Boggs **
-
Omar Kardoudi – Defamation-for-sale blogger
-
Owen Thomas – Defamation-for-sale blogger
-
Patrick George – Defamation-for-sale blogger and Character
Assassination expert **
-
Patrick Laffoon – Defamation-for-sale blogger
-
Patrick Redford – Defamation-for-sale blogger
-
Perkins Coie – Campaign cash conduit law firm **
-
Peter Fenton
-
Peter Thiel – VC **
-
Pierre Omidyar – Defamation-for-sale blogger **
-
Rahm Emanuel – White House boss **
-
Raj Gupta – VC, (Arrested)
-
Rakesh Saxeena – Canadian in-house arrest, arms dealer,
western political packager (arrested)
-
Ray Lane – VC **
-
Reid Hoffman – VC and sex.com partner with Gary Kremen **
- Rich Gold, Kathryn Lehman and Gerry Sikorski, Holland & Knight **
- Rich Juzwiak –
Defamation-for-sale blogger
- Richard Blakely –
Defamation-for-sale blogger
- Richard Blum – VC and
director/husband of Dianne Feinstein **
- Richard Rushfield –
Defamation-for-sale blogger
- Rick Kessler - Dow Lohnes
Government Strategies **
- Robert Finger –
Defamation-for-sale blogger
- Robert Gibbs – White
press office head attack dog **
- Robert Raben, The Raben
Group. Raben, a former aide to Rep. Barney Frank (D-Mass.) and
Clinton Justice Department official **
- Robert Sorokanich –
Defamation-for-sale blogger
- Robert Van Heuvelen, VH
Strategies **
- Roelof Botha
- Rory Waltzer –
Defamation-for-sale blogger
- Rosa Golijan –
Defamation-for-sale blogger
- Russel Simmons
- Ryan Brown –
Defamation-for-sale blogger
- Ryan Goldberg –
Defamation-for-sale blogger
- Sam Faulkner Biddle –
Defamation-for-sale blogger, Runs a large part of the Anti-GOP blog
programs **
- Sam Woolley –
Defamation-for-sale blogger
- Samar Kalaf –
Defamation-for-sale blogger
- Sander Lurie - SNR Denton
**
- Sandi Stuart - Clark
& Weinstock
- Sanjay Wagle – VC
- Sarah Ramey –
Defamation-for-sale blogger
- Scott Shleiffer
- Sergy Brin – Google boss,
sex addict and oligarch **
- Shannon Marie Donnelly –
Defamation-for-sale blogger
- Shep McAllister –
Defamation-for-sale blogger
- Solyndra Solar Company –
FBI raided corrupt Clean Tech company invested in by Feinstein’s
(terminated)
- Sophie Kleeman –
Defamation-for-sale blogger
- SpaceX – Elon Musk
company that Obama gave part of NASA to in exchange for campaign
conduits, most of their work is satellites that spy on the public **
- Stephen Totilo – Defamation-for-sale blogger
- Steve Chen
- Steve Jurvetson – VC embroiled in sex abuse charges and money laundering investigations **
- Steve McBee, McBee Strategic **
- Steve Perry and Andy Wright, Dutko Grayling
- Steve Rattner – White House car czar, indicted for fraud **
- Steve Spinner – Energy Department manipulation expert, Wife was Solyndra’s lawyer **
- Steve Westly – VC **
- Steven Chu – Secretary of Energy – The most corrupt in US history **
- Tamar Winberg – Defamation-for-sale blogger
- Taryn Schweitzer – Defamation-for-sale blogger
- Taylor McKnight – Defamation-for-sale blogger
- Ted Schlein
- Tesla Motors – Car Company that conduits money to campaigns **
- The Groundwork – Social manipulation group
- Thomas Jolly, Jolly/Rissler. Jolly is founding chairman of the Washington Caucus **
- Thorin Klosowski – Defamation-for-sale blogger
- Tim Draper – VC **
- Tim Marchman – Defamation-for-sale blogger
- Timothy Burke – Defamation-for-sale blogger
- Tobey Grumet Segal – Defamation-for-sale blogger
- Todd Park – IT manipulator inside White House **
- Tom Ley – Defamation-for-sale blogger
- Tom O’Donnell, Gephardt Government Affairs Group. O’Donnell and his former Capitol Hill boss, ex-House Democratic Leader Richard Gephardt (Mo.), **
- Tom Perkins – KPCB Palo Alto Mafia founder (dead)
- Tom Scocca – Defamation-for-sale blogger
- Tom Sheridan, The Sheridan Group. **
- Tom Steyer – VC **
- Tomorrow Ventures – Social manipulation group **
- Tony Podesta, Podesta Group **
- Veronica de Souza – Defamation-for-sale blogger
- Victor Fazio, Joel Jankowsky, Scott Parven and Bill Paxon, Akin, Gump, Strauss, Hauer & Feld. Fazio, Jankowsky, Parven and Paxon - lobbyists - Akin Gump **
- Viktor Vekselberg – Russian business entity **
- Vinod Khosla - VC **
- Wes Siler – Defamation-for-sale blogger
- William Haisley – Defamation-for-sale blogger
- William Turton – Defamation-for-sale blogger
- The Wilson Sonsini Insider Partner Staff Club **
- Wilson, Sonsini, Goodrich and Rosatti **
California & DC politicians are being paid bribes with Billions of dollars of Google, Twitter, Facebook, Tesla, Netflix and Sony Pictures stock and stock warrants which is never reported to the FEC; Billions of dollars of Google, Twitter, Facebook, Tesla, Netflix and Sony Pictures search engine rigging and shadow-banning which is never reported to the FEC; Free rent; Rare-Earth mining rights; Male and female prostitutes; Cars; Dinners; Party Financing; Sports Event Tickets; Political campaign printing and mailing services "Donations"; Secret PAC Financing; Jobs in Corporations in Silicon Valley For The Family Members of Those Who Take Bribes And Those Who Take Bribes; "Consulting" contracts from McKinsey as fronted pay-off gigs; Overpriced "Speaking Engagements" which are really just pay-offs conduited for donors; Gallery art; Private jet rides and the use of Government fuel depots (ie: Google handed out NASA jet fuel to staff); Recreational drugs; Real Estate; Fake mortgages; The use of Cayman, Boca Des Tores, Swiss and related money-laundering accounts; The use of HSBC, Wells Fargo, Goldman Sachs and Deustche Bank money laundering accounts and covert stock accounts; Free spam and bulk mailing services owned by Silicon Valley corporations; Use of high tech law firms such as Perkins Coie, Wilson Sonsini, MoFo, Covington & Burling, etc. to conduit bribes to officials; and other means now documented by us, The FBI, the FTC, The SEC, The FEC and journalists. DEMAND COMPLETE LAWS TO MAKE ANY BENEFITS TO POLITICIANS TOTALLY ILLEGAL!
We guarantee that these deeds done in the dark will come to light and that these perpetrators will be fully exposed, shamed and prosecuted.
In the TV series: "Surviving R. Kelly" you can clearly see how a certain low I.Q. percentage of the population will defend an R. Kelly, an Elon Musk and a Harvey Weinstein even though they obviously and overtly engage in heinous crimes.
The Jeffrey Epstein's, the John Doerr's, the Andy Rubin's, the Steve Jurvetson's, the Eric Schmidt's, the Larry Page's, etc. think they are untouchable because they buy protection and pay bribes.
That will always be their downfall!
----------------------------
Want To Understand More About How These Crimes REALLY Work?
We have placed more software sensors on more server networks globally than anyone else has ever announced. When Google-Alphabet-YouTube Shadow Bans, DNS re-routes, Hides, Demonetizes, Search Manipulates, Server Table Edits, Censors, Election Rigs, SEO limits, etc; our links, we record it, document it technically and report it to every regulatory and publishing group in the world. We also compile the data into evidence for lawsuits against Google and each Google executive. Our insiders work at the deepest levels of their operation. It isn't nice to mess with Mother Nature or Freedom Of Speech. It's worse to run tax evasion, sex trafficking, dark money funds, real estate fraud and other crimes from inside Google!
Our autonomous monitoring applications are on a vast number of
co-location servers, shared hosting ISP's, stand-alone servers and sites
around the world and have been operating for over ten years. We log: 1.)
Google's search results compared to other search engines, 2.) Google's
DNS and spoofing activities, 3.) Google's results on 100 key search
terms including search terms of assets, candidates and business
associates connected to Google (ie: "Obama", "Elon Musk", "Election
Results", etc.), 4.) Where Google sends data from users clicking on
Google supplied links, 5.) Where fabricated "mole" data that was
injected as user data ultimately ended up later, 6.) Google's election
manipulation attempts, and other metrics. The results prove that Google
abuses the market, the public, privacy rights, politics and human
rights.
So Google, everytime you do it, you are just digging your own grave and giving us all the proof we need to wipe you out, process anti-trust filings and expose your monopolist, sex trafficking, sociopath owners!
"...The Silicon Valley Mafia is The Sandhill Road Venture Capital frat boy company bosses in Palo Alto, their National Venture Capital Association (NVCA) partners (Greylock Capital; Kleiner Perkins Caufield & Byers, Draper, Khosla Ventures, etc.) and the tech companies (Google, Tesla, Facebook, Amazon, Twitter, Linkedin, etc.) they control. They are sometimes referred to as "The Deep State". They have purchased California, New York and Washington, DC politicians (mostly Senators) who they also control. The names of the worst-200 most horrific and sociopath-like members are listed in these reports. They hire dirty law firms like MoFo, Wilson Sonsini, Covington, Perkins, etc. and dirty lobbysists like McBee, Podesta, Blumenthal, etc. to do their dirty deeds.
They hire rogue ex-intelligence agents to operate Fusion GPS,
Gawker/Gizmodo, Black Cube, ShareBlue, New America, In-Q-Tel, Podesta
Group, Media Matters, etc. massive media attack programs against
competitors, reporters and outsiders. They collude on black-lists,
valuation controls, election manipulation, search engine rigging,
domestic spying for political manipulation, stock rigging, insider
trading, Jeffrey Epstein-like executive prostitute sex-trafficking
clubs, trophy wife assignments, the bribery of politicians and worse.
They are felons who bribe politicians to halt investigations and
interdiction efforts.
They have quid-pro-quo stock market bribe deals with Senators Reid,
Feinstein, Harris, Boxer, Spier, etc. For example, in the CleanTech
Crash: Every single Dept of Energy executive, and related Senator,
owns stock market assets in Tesla, Fisker, Solyndra, Ener1, etc. so
they blockaded and sabotaged every applicant who competed with their
holdings in a RICO-violating, felony organized crime, using taxpayer
funds, in order to profit at the expense of taxpayers.
They are widely covered in news media articles as: 'sex abusers,
cult enthusiasts, elitists, rapists, woman beaters, probiosis abusers,
sexual work extortion operators, extremists, arrogant clones of each
other, tone deaf, echo-chamber reinforcing, misogynist, racist,
manipulative, insecure, covertly gay, corrupt, thieves' and other
anti-social revelations. The divorce court and lawsuit federal court
records on them prove that they are sex-abusing sociopaths.
They use their monopolistic control of the internet to massively and
exclusively scale services that only they control and use to abuse the
public's privacy, human rights, invention rights and information. They
run their cartel like the old Italian Mafia once did.
Google's Larry Page, his boyfriend Elon Musk; Google's Eric Schmidt,
Dave Rubin, David Drummond, Kent Walker, Jared Cohen and Sergy Brin;
Political manipulators David Plouffe, Steve Westly, Steve Spinner and
Vinod Khosla; Sociopath billionaires Reid Hoffman, Jeff Epstein, Tim
Draper, Steve Jurvetson, etc. all order their staff and associates to:
bribe politicians; operate sex trafficking for them; manipulate stock
market valuations; launder money; run off-shore tax evasion schemes;
black-list employees and competitors; hide, down-rank, DNS dead-hole,
shadow-ban, censor and server obsfucate enemies on the entire web; rig
the U.S. Patent Office; help them cheat on their wives; and engage in
massive volumes of insider, illicit, RICO and anti-trust violating
crimes while bribing public officials to avoid prosecution.
We demand that the FBI arrest them!"
- Tom Martin
To: John, Adrian, Nicholas, John2, Gabby, and the rest of the contracted assassins: We hired the greatest intelligence and law enforcement, investigative experts in the world to track you down and place you under a lifetime of surveillance. Every illegal drug and sex worker you buy is reported. Every tax evasion and money laundering scheme you engage in is reported. Everything you will ever do will be monitored and reported to the authorities. Every contact you have with a political operative, anywhere, is monitored. You accepted compensation to try to kill us, slander us, libel us and defame us. You chose your fate when you accepted the "kill orders". Never, ever, go to sleep at night thinking you will ever get away with it. Our contractors will always be watching you, forever!
We are the victims of these crimes, the witnesses that saw these crimes and every independent journalist, investigator, public citizen sleuth and forensic expert we could find in every nation on Earth that wants to end corruption. We are the people that will never let up until we get justice. We are the people that are terminating (using 100% legal tactics) every oligarch and politician that engaged in these crimes and the cover-ups. This site is anonymously collaborative-edited online like Wikipedia. Educate yourself in forensic science and investigative research and be one of us too. We are you!
"Elite arrogant asshole dynasties send their kids to Stanford University.
Stanford puts the kids in asshole frat houses to train them to get away with rape and run monopolies.
When they graduate they either go up the hill to Sandhill Road and start a venture capital clone operation or they get their frat friends on Sandhill Road to racketeer-fund their start-up or political campaign using money scammed from your parents pension funds.
They only work with their frat buddies and insiders in a tribal old boys club manner.
They steal all the technology and markets they want because they control all of the tech lawyers and politicians via bribes and revolving doors.
Stanford bosses keep all of this covered-up and covertly fund political camapigns to grease the wheels of political corruption.
They then sexually extort some Standford interns in Rosewood Hotel rooms, get the most 'trophy wife' ones pregnant, and start the cycle all over again...."
How did we fight back against the most powerful organized crime entity on Earth? Is it possible for anybody to fight the "Illuminati" and keep knocking them off their thrones like we do?
We get those questions all the time. Here are the answers.
First, they started it. The bad guys attacked us because our products and services were better than theirs and they could not compete. They decided to cheat rather than compete and they cheated with political bribes, black-lists, collusion and other anti-trust violating acts. When we helped law enforcement investigate them, the bad guys doubled down on their attacks. The bad guys crossed the line when they used our own government officials and taxpayer funds to operate their crimes. They broke felony laws and the basic principles of Democracy.
So who are these mobsters? They are your Senators, White House Staff, insider agency staff and their Silicon Valley Oligarch sociopath political financiers. Some of your public officials set-up, operated and maintained an organized crime scheme for personal profit at the expense of every taxpayer. They went after Five Trillion dollars of your tax money for their personal interests via rigged stock market scams, rigged government contracts, exclusionary policy manipulations and other schemes that harmed American taxpayers.
We are taxpayers...so.. Game On!
We wrote FBI-quality criminal activities reports and filed them with every law enforcement and regulatory agency in every country in the world that we could find, including the FBI, OSC, GAO, EU, Interpol, FSB, UN, etc.
We identified and listed every person, organization and company involved in the attacks and RICO law violations and provided that list to The U.S. Congress and every agency.
We built an NSA-class global open-source database that can track all of the locations, hookers, fake fronts, family trusts, bank accounts, stock market accounts, bribes and other goodies, of any corrupt public official, in minutes!
We opened our own private investigator and crowd-sourced investigations into the following:
- Every stock market account they or their family owns
- Every Uber or Lyft ride they ever took for any meeting or transport of sex workers
- Every flight manifest they appeared on
- Every bank account they have ever held
- Every lawsuit, divorce record and police record they have ever appeared in
- Every trust fund they or their family holds
- Every shell corporation they, or their family holds
- Every person named in the Epstein Pedo book: https://www.scribd.com/document/416207833/Jeffrey-Epsteins-Little-Black-Book-Redacted cross referenced across all of the other databases and then supplied to the FBI and Child Protection Agencies
- Every item in the Swiss Leaks that cross connects to their holdings
- Every item in the Panama Papers Leaks that cross connects to their holdings
- Every item in the WikiLeaks that cross connects to their holdings
- Every item in the Snowden Leaks that cross connects to their holdings
- Every sex trafficking incident that connects to each of them alone, and in groups
- Every financial transaction between any of the parties on the master list and the character assassination and hit job firms of: Google, Univision, Gawker Media, Unimoda, Jalopnik, Gizmodo,Black Cube, Fusion GPS, UC Global, Media Matters, Think Progress, IN-Q-Tel, K2 Intelligence, WikiStrat, Podesta Group, YouTube, Alphabet, David Drummond, Larry Page, Facebook, Correct The Recor, Stratfor, ShareBlue, Sid Blumenthal, David Brock, Eric Schmidt, Sunshine Sachs, Covington and Burling, Buzzfeed, Perkins Coie and Wilson Sonsini or their derivatives with common owners.
- Every item in the Quest Leaks that cross connects to their holdings
- Every tactical deployment, by a campaign financier, of the tactics listed in this manual: https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf
- Every sex service that their credit card payments every connect too
- Every real estate transaction that any name or company they, or their family, were involved in, tracks to
..... and hundreds of thousands of other information points about them that prove that they benefit from crimes that they engage in for others who engage in crimes using the America public policy system.
It all goes into shared 100% legal public collaborative databases that work like XKEYSCORE, or MS Access, or Oracle Databases.
The proof of collusion, organized criminal actions and raw covert corruption is indisputable. The actors are all the same people. The beneficiaries are all the same people. The communications between the parties all coordinate the same actions.
We have demanded their arrests, indictments, exposures and bankruptcies. We say "Fuck You" to the Silicon Valley Oligarch 'Illuminati' scumbags and the crooked Senators and Governor's they bribed. You say you are going to "kill us and destroy our lives.." and that you are so frightening. You think you are a big scary thing? Here comes 'scary'! Watch what billions of taxpaying voters with collaborative FBI-class forensics investigation software is doing to you now!
Notes: Most of the sites are AI populated and auto-regenerate in other locations when attacked. If a link is dead, please advise our volunteer team and we will let you know which new link has auto-replaced it.
File Repositories Of Evidence Sets. Search Each Folder By Keyword:
https://www.ethics-committee.com
DROPBOX Sets
MEGA Upload Sets
Snowden/ICIJ Journalist
Sets
And daily auto-generated mirror clones
Corruption And Bribery Case Evidence Samples Top Archives:
Previous Case Evidence Court Sets:
Search our staff cases, Devin Nunes Cases by Biss, Harmeet Dhillon Cases, All cases against Tesla Motors and Elon Musk, Cases involving “lithium ion fires”, “Google and Alphabet” abuses and other keywords to be provided
Video Evidence For This Case:
http://nationalnewsnetwork.net
Public Citizen Sleuth And Whistle-Blowers Alliance:
Associated
FBI, SEC, FTC, GAO, And Congressional Ethics Committee
Case Files Database Search Keywords For Their Criminal
Case Files On This Case:
“Elon Musk”, “Solyndra”, “Rare Earth Mining Scam”, Tesla Motors”, “Steven Chu”, “Afghan Mining”, “Jeffrey Epstein”, “Flashboy Aglorithms”, “Silicon Valley Anti-Trust”, “UraniumOne”, “The Silicon Valley No Poaching Lawsuit”, “AngelGate”,
“frank guistra”, “Raj Gupta”, “Nicholas Guido Denton”, “Larry Page Tax Evasion”, “Fusion GPS” and other case file database search keywords to be provided...
Links To Third-Party Evidence Files Proving Each And Every Assertion:
https://stopelonfromfailingagain.com
https://fusion4freedom.com/about-gcf/
https://fusion4freedom.com/the-green-corruption-files-archive/
https://www.allsides.com/unbiased-balanced-news
http://ec.europa.eu/anti_fraud/index_en.html
http://www.interpol.int/Crime-areas/Corruption/Corruption
http://www.traceinternational.org/
https://anticorruptionact.org/
http://www.anticorruptionintl.org/
http://www.giaccentre.org/dealing_with_corruption.php
https://www.oas.org/juridico/english/FightCur.html
https://www.opus.com/international-anti-corruption-day-businesses/
https://www.opengovpartnership.org/theme/anti-corruption
https://www.ethicalsystems.org/content/corruption
https://sunlightfoundation.com/
http://www.googletransparencyproject.org/
https://en.wikipedia.org/wiki/Angelgate
https://en.wikipedia.org/wiki/High-Tech_Employee_Antitrust_Litigation
http://www.projectveritasaction.com
Disrupted By Dan Lyons, https://www.goodreads.com/book/show/26030703-disrupted
Congress: Trading stock By Steve Kroft, https://www.cbsnews.com/news/congress-trading-stock-on-inside-information/
Anne Broache. "FBI
wants widespread monitoring of 'illegal' Internet activity".
CNET. Retrieved 25 March 2014.
"Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
"Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
Hacktivists in the frontline battle for the internet retrieved 17 June 2012
Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2009-03-13.
"CALEA Archive -- Electronic Frontier Foundation". Electronic Frontier Foundation (website). Archived from the original on 2009-05-03. Retrieved 2009-03-14.
"CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
"CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). Retrieved 2009-03-14.
Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. p. 131. ISBN .
American Council on Education vs. FCC Archived 2012-09-07 at the Wayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved 2009-03-19.
McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved 2009-03-13.
"First round in Internet war goes to Iranian intelligence", Debkafile, 28 June 2009. (subscription required)
O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017). "Toward a Sociology of Privacy". Annual Review of Sociology. 43: 249–269. doi:10.1146/annurev-soc-060116-053643.
Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.
"How Stuff Works". Retrieved November 10, 2017.
[electronics.howstuffworks.com/gadgets/high-tech-gadgets/should-smart-devices-automatically-call-cops.htm.
"How Stuff Works"] Check |url=
value (help).
Retrieved November 10, 2017.
[time.com/4766611/alexa-takes-the-stand-listening-devices-raise-privacy-issues
"Time Alexa Takes the Stand Listening Devices Raise Privacy
Issues"] Check |url=
value (help).
Retrieved November 10, 2017.
Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. Retrieved 2009-03-17.
Butler, Don (January 31, 2009). "Are we addicted to being watched?". The Ottawa Citizen. canada.com. Archived from the original on 22 July 2013. Retrieved 26 May 2013.
Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. Retrieved 2009-03-21.
Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. Retrieved 2009-03-21.
"Advertising and Privacy". Google (company page). 2009. Retrieved 2009-03-21.
"Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software", Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
Aycock, John (2006). Computer Viruses and Malware. Springer. ISBN .
"Office workers give away passwords for a cheap pen", John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.
"Passwords are passport to theft", The Register, 3 March 2004. Retrieved 7 September 2013.
"Social Engineering Fundamentals, Part I: Hacker Tactics", Sarah Granger, 18 December 2001.
"Stuxnet: How does the Stuxnet worm spread?". Antivirus.about.com. 2014-03-03. Retrieved 2014-05-17.
Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". New York Times. Retrieved 14 March 2009.
Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). Retrieved March 14, 2009.
Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Archived from the original (PDF) on February 6, 2009. Retrieved March 14, 2009.
Ethier, Jason (27 May 2006). "Current Research in Social Network Theory" (PDF). Northeastern University College of Computer and Information Science. Retrieved 15 March 2009.[permanent dead link]
Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved 2009-03-16.
Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Retrieved 2009-03-16.
Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
McNamara, Joel (4 December 1999). "Complete, Unofficial Tempest Page". Archived from the original on 1 September 2013. Retrieved 7 September 2013.
Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
Kuhn, M.G. (26–28 May 2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25.
Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard Acoustic Emanations (PDF), IBM Almaden Research Center
Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News
"LA Times". Retrieved November 10, 2017.
Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.
Jeremy Reimer (20 July 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica.
Hopper, D. Ian (4 May 2001). "FBI's Web Monitoring Exposed". ABC News.
"New York Times". Retrieved November 10, 2017.
"Stanford University Clipper Chip". Retrieved November 10, 2017.
"Consumer Broadband and Digital Television Promotion Act" Archived 2012-02-14 at the Wayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
"Swiss coder publicises government spy Trojan". News.techworld.com. Retrieved 25 March 2014.
Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428
"FAQ – Häufig gestellte Fragen". Ejpd.admin.ch. 2011-11-23. Archived from the original on 2013-05-06. Retrieved 2014-05-17.
"Censorship is inseparable from surveillance", Cory Doctorow, The Guardian, 2 March 2012
The Enemies of the Internet Special Edition : Surveillance Archived 2013-08-31 at the Wayback Machine, Reporters Without Borders, 12 March 2013
"When Secrets Aren’t Safe With Journalists", Christopher Soghoian, New York Times, 26 October 2011
Everyone's Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007
Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved March 13, 2009.
"CALEA Archive – Electronic Frontier Foundation". Electronic Frontier Foundation (website). Archived from the original on May 3, 2009. Retrieved March 14, 2009.
"CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved March 14, 2009.
"CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). September 20, 2007. Retrieved March 14, 2009.
Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved March 19, 2009.
McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved September 26, 2014.
"FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats". Wired Magazine. July 18, 2007.
Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
Kuhn, M.G. (2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25.
Risen, James; Lichtblau, Eric (June 16, 2009). "E-Mail Surveillance Renews Concerns in Congress". New York Times. pp. A1. Retrieved June 30, 2009.
Ambinder, Marc (June 16, 2009). "Pinwale And The New NSA Revelations". The Atlantic. Retrieved June 30, 2009.
Greenwald; Ewen, Glen; MacAskill (June 6, 2013). "NSA Prism program taps in to user data of Apple, Google and others" (PDF). The Guardian. Retrieved February 1, 2017.
Sottek, T.C.; Kopfstein, Janus (July 17, 2013). "Everything you need to know about PRISM". The Verge. Retrieved February 13, 2017.
Singel, Ryan (September 10, 2007). "Rogue FBI Letters Hint at Phone Companies' Own Data Mining Programs – Updated". Threat Level. Wired. Retrieved March 19, 2009.
Roland, Neil (March 20, 2007). "Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas". Bloomberg News. Retrieved March 19, 2009.
Piller, Charles; Eric Lichtblau (July 29, 2002). "FBI Plans to Fight Terror With High-Tech Arsenal". LA Times. Retrieved March 14, 2009.
Schneier, Bruce (December 5, 2006). "Remotely Eavesdropping on Cell Phone Microphones". Schneier On Security. Retrieved December 13, 2009.
McCullagh, Declan; Anne Broache (December 1, 2006). "FBI taps cell phone mic as eavesdropping tool". CNet News. Archived from the original on November 10, 2013. Retrieved March 14, 2009.
Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect". Financial Times. Retrieved March 14, 2009.
"Telephones". Western Regional Security Office (NOAA official site). 2001. Retrieved March 22, 2009.
"Can You Hear Me Now?". ABC News: The Blotter. Archived from the original on August 25, 2011. Retrieved December 13, 2009.
Coughlin, Kevin (December 13, 2006). "Even if they're off, cellphones allow FBI to listen in". The Seattle Times. Retrieved December 14, 2009.
Hampton, Brittany (2012). "From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note". University of Louisville Law Review. Fifty One: 159–176 – via Law Journal Library.
"Tracking a suspect by mobile phone". BBC News. August 3, 2005. Retrieved March 14, 2009.
Miller, Joshua (March 14, 2009). "Cell Phone Tracking Can Locate Terrorists – But Only Where It's Legal". FOX News. Archived from the original on March 18, 2009. Retrieved March 14, 2009.
Zetter, Kim (December 1, 2009). "Threat Level Privacy, Crime and Security Online Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year". Wired Magazine: Threat Level. Retrieved December 5, 2009.
"Greenstone Digital Library Software". snowdenarchive.cjfe.org. Retrieved June 3, 2017.
Sanger, David (September 26, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A". New York Times. Retrieved November 1, 2014.
Gellman, Barton (December 4, 2013). "NSA tracking cellphone locations worldwide, Snowden documents show". The Washington Post. Retrieved November 1, 2014.
Nye, James (October 26, 2014). "British spies can go through Americans' telephone calls and emails without warrant revelas legal challenge in the UK". Mail Online. Retrieved November 1, 2014.
"Rise of Surveillance Camera Installed Base Slows". May 5, 2016. Retrieved January 5, 2017.
"Smart cameras catch man in 60,000 crowd". BBC News. April 13, 2018. Retrieved April 13, 2018.
Spielman, Fran (February 19, 2009). "Surveillance cams help fight crime, city says". Chicago Sun Times. Retrieved March 13, 2009.[permanent dead link]
Schorn, Daniel (September 6, 2006). "We're Watching: How Chicago Authorities Keep An Eye On The City". CBS News. Retrieved March 13, 2009.
"The Price of Privacy: How local authorities spent £515m on CCTV in four years" (PDF). Big Brother Watch. February 2012. p. 30. Retrieved February 4, 2015.
"FactCheck: how many CCTV cameras?". Channel 4 News. June 18, 2008. Retrieved May 8, 2009.
"You're being watched: there's one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated". The Guardian. March 2, 2011. Retrieved January 7, 2017; "In the press: How the media is reporting the 1.85 million cameras story". Security News Desk. March 3, 2011. Retrieved January 7, 2017.
"CCTV in London" (PDF). Retrieved July 22, 2009.
"How many cameras are there?". CCTV User Group. June 18, 2008. Archived from the original on October 23, 2008. Retrieved May 8, 2009.
Den Haag. "Camera surveillance". Archived from the original on October 8, 2016. Retrieved December 2, 2016.
Klein, Naomi (May 29, 2008). "China's All-Seeing Eye". Rolling Stone. Archived from the original on March 26, 2009. Retrieved March 20, 2009.
"Big Brother To See All, Everywhere". CBS News. Associated Press. July 1, 2003. Retrieved September 26, 2014.
Bonsor, K. (September 4, 2001). "How Facial Recognition Systems Work". Retrieved June 18, 2006.
McNealy, Scott. "Privacy is (Virtually) Dead". Retrieved December 24, 2006.
Roebuck, Kevin (October 24, 2012). Communication Privacy Management. ISBN .
"WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network". Retrieved October 5, 2016.
"EPIC Video Surveillance Information Page". EPIC. Retrieved March 13, 2009.
Hedgecock, Sarah (August 14, 2012). "TrapWire: The Less-Than-Advertised System To Spy On Americans". The Daily Beast. Retrieved September 13, 2012.
Albrechtlund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday. 13 (3). Retrieved March 14, 2009.
Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Retrieved July 28, 2012.
Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. Archived from the original on November 16, 2004. Retrieved March 15, 2009.
Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved March 16, 2009.
Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Retrieved March 16, 2009.
Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. Archived from the original on February 26, 2015. Retrieved March 15, 2009.
Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs. II (2). Retrieved March 14, 2009.
"DyDAn Research Blog". DyDAn Research Blog (official blog of DyDAn). Retrieved December 20, 2009.
Singel, Ryan (October 29, 2007). "AT&T Invents Programming Language for Mass Surveillance". Threat Level. Wired. Retrieved March 19, 2009.
Singel, Ryan (October 16, 2007). "Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known". Threat Level. Wired. Retrieved March 19, 2009.
Havenstein, Heather (September 12, 2008). "One in five employers uses social networks in hiring process". Computer World. Archived from the original on September 23, 2008. Retrieved March 14, 2009.
Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003). Biometrics: A Look at Facial Recognition. RAND Corporation. ISBN . Retrieved March 15, 2009.
Frank, Thomas (May 10, 2007). "Face recognition next in terror fight". USA Today. Retrieved March 16, 2009.
Vlahos, James (January 2008). "Surveillance Society: New High-Tech Cameras Are Watching You". Popular Mechanics. Archived from the original on December 19, 2007. Retrieved March 14, 2009.
Nakashima, Ellen (December 22, 2007). "FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces". Washington Post. pp. A01. Retrieved May 6, 2009.
Arena, Kelly; Carol Cratty (February 4, 2008). "FBI wants palm prints, eye scans, tattoo mapping". CNN. Retrieved March 14, 2009.
Gross, Grant (February 13, 2008). "Lockheed wins $1 billion FBI biometric contract". IDG News Service. InfoWorld. Retrieved March 18, 2009.
"LAPD: We Know That Mug". Wired Magazine. Associated Press. December 26, 2004. Retrieved March 18, 2009.
Mack, Kelly. "LAPD Uses Face Recognition Technology To Fight Crime". NBC4 TV (transcript from Officer.com). Archived from the original on March 30, 2010. Retrieved December 20, 2009.
Willon, Phil (September 17, 2009). "LAPD opens new high-tech crime analysis center". LA Times. Retrieved December 20, 2009.
Dotinga, Randy (October 14, 2004). "Can't Hide Your Lying ... Face?". Wired Magazine. Retrieved March 18, 2009.
Boyd, Ryan. "MQ-9 Reaper". Retrieved October 5, 2016.
Friedersdorf, Conor (March 10, 2016). "The Rapid Rise of Federal Surveillance Drones Over America". Retrieved October 5, 2016.
Edwards, Bruce, "Killington co-founder Sargent dead at 83" Archived September 4, 2015, at the Wayback Machine, Rutland Herald, November 9, 2012. Retrieved December 10, 2012.
McCullagh, Declan (March 29, 2006). "Drone aircraft may prowl U.S. skies". CNet News. Retrieved March 14, 2009.
Warwick, Graham (June 12, 2007). "US police experiment with Insitu, Honeywell UAVs". FlightGlobal.com. Retrieved March 13, 2009.
La Franchi, Peter (July 17, 2007). "UK Home Office plans national police UAV fleet". Flight International. Retrieved March 13, 2009.
"No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons". International Online Defense Magazine. February 22, 2005. Retrieved March 15, 2009.
"HART Overview" (PDF). IPTO (DARPA) – Official website. August 2008. Archived from the original (PDF) on December 5, 2008. Retrieved March 15, 2009.
"BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)" (PDF). Information Processing Technology Office (DARPA) – Official Website. December 5, 2003. Archived from the original (PDF) on November 27, 2008. Retrieved March 16, 2009.
Sirak, Michael (November 29, 2007). "DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture". Defense Daily. Archived from the original on March 9, 2012. Retrieved March 16, 2009.
Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.
Saska, M.; Vakula, J.; Preucil, L. Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.
Anthony, Denise (2017). "Toward a Sociology of Privacy". Annual Review of Sociology. 43 (1): 249–269. doi:10.1146/annurev-soc-060116-053643.
Hildebrandt, Mireille; Serge Gutwirth (2008). Profiling the European Citizen: Cross Disciplinary Perspectives. Dordrecht: Springer. ISBN .
Clayton, Mark (February 9, 2006). "US Plans Massive Data Sweep". Christian Science Monitor. Retrieved March 13, 2009.
Flint, Lara (September 24, 2003). "Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power". The Center For Democracy & Technology (official site). Archived from the original on March 8, 2009. Retrieved March 20, 2009.
""National Network" of Fusion Centers Raises Specter of COINTELPRO". EPIC Spotlight on Surveillance. June 2007. Retrieved March 14, 2009.
anonymous (January 26, 2006). "Information on the Confidential Source in the Auburn Arrests". Portland Indymedia. Archived from the original on December 5, 2008. Retrieved March 13, 2009.
Myers, Lisa (December 14, 2005). "Is the Pentagon spying on Americans?". NBC Nightly News. msnbc.com. Retrieved March 13, 2009.
"The Use of Informants in FBI Domestic Intelligence Investigations". Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270. Retrieved March 13, 2009.
"Secret Justice: Criminal Informants and America's Underground Legal System | Prison Legal News". www.prisonlegalnews.org. Retrieved October 5, 2016.
Ross, Brian (July 25, 2007). "FBI Proposes Building Network of U.S. Informants". Blotter. ABC News. Retrieved March 13, 2009.
"U.S. Reconnaissance Satellites: Domestic Targets". National Security Archive. Retrieved March 16, 2009.
Block, Robert (August 15, 2007). "U.S. to Expand Domestic Use Of Spy Satellites". Wall Street Journal. Retrieved March 14, 2009.
Gorman, Siobhan (October 1, 2008). "Satellite-Surveillance Program to Begin Despite Privacy Concerns". The Wall Street Journal. Retrieved March 16, 2009.
"Fact Sheet: National Applications Office". Department of Homeland Security (official website). August 15, 2007. Archived from the original on March 11, 2009. Retrieved March 16, 2009.
Warrick, Joby (August 16, 2007). "Domestic Use of Spy Satellites To Widen". Washington Post. pp. A01. Retrieved March 17, 2009.
Shrader, Katherine (September 26, 2004). "Spy imagery agency watching inside U.S." USA Today. Associated Press. Retrieved March 17, 2009.
Kappeler, Victor. "Forget the NSA: Police May be a Greater Threat to Privacy".
"Section 100i – IMS I-Catcher" (PDF), The German Code Of Criminal Procedure, 2014, pp. 43–44, archived from the original (PDF) on September 25, 2015, retrieved November 27, 2015
"Two Stories Highlight the RFID Debate". RFID Journal. July 19, 2005. Retrieved March 23, 2012.
Lewan, Todd (July 21, 2007). "Microchips in humans spark privacy debate". USA Today. Associated Press. Retrieved March 17, 2009.
McCullagh, Declan (January 13, 2003). "RFID Tags: Big Brother in small packages". CNET News. Retrieved July 24, 2012.
Gardener, W. David (July 15, 2004). "RFID Chips Implanted In Mexican Law-Enforcement Workers". Information Week. Retrieved March 17, 2009.
Campbell, Monica (August 4, 2004). "Law enforcement in Mexico goes a bit bionic". Christian Science Monitor. Retrieved March 17, 2009.
Crowder, Stan, and Turvery E. Brent. Ethical Justice: Applied Issues for Criminal Justice Students and Professionals. 1st ed. Academic Press, 2013. p150. Print.
Claburn, Thomas (March 4, 2009). "Court Asked To Disallow Warrantless GPS Tracking". Information Week. Retrieved March 18, 2009.
Hilden, Julie (April 16, 2002). "What legal questions are the new chip implants for humans likely to raise?". CNN.com (FindLaw). Retrieved March 17, 2009.
Wolf, Paul. "COINTELPRO". (online collection of historical documents). Retrieved March 14, 2009.
"U.S. Army Intelligence Activities" (PDF). Archived from the original (PDF) on August 8, 2015. Retrieved 25 May 2015.
"Domestic CIA and FBI Mail Opening Programs" (PDF). Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from the original (PDF) on May 5, 2011. Retrieved March 13, 2009.
Goldstein, Robert (2001). Political Repression in Modern America. University of Illinois Press. ISBN .
Hauser, Cindy E.; McCarthy, Michael A. (July 1, 2009). "Streamlining 'search and destroy': cost-effective surveillance for invasive species management". Ecology Letters. 12 (7): 683–692. doi:10.1111/j.1461-0248.2009.01323.x. ISSN 1461-0248. PMID 19453617.
Holden, Matthew H.; Nyrop, Jan P.; Ellner, Stephen P. (June 1, 2016). "The economic benefit of time-varying surveillance effort for invasive species management". Journal of Applied Ecology. 53 (3): 712–721. doi:10.1111/1365-2664.12617. ISSN 1365-2664.
Flewwelling, Peter; Nations, Food and Agriculture Organization of the United (January 1, 2003). Recent Trends in Monitoring Control and Surveillance Systems for Capture Fisheries. Food & Agriculture Org. ISBN .
Yang, Rong; Ford, Benjamin; Tambe, Milind; Lemieux, Andrew (January 1, 2014). Adaptive Resource Allocation for Wildlife Protection Against Illegal Poachers. Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. AAMAS '14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems. pp. 453–460. ISBN .
Mörner, T.; Obendorf, D. L.; Artois, M.; Woodford, M. H. (April 1, 2002). "Surveillance and monitoring of wildlife diseases". Revue Scientifique et Technique (International Office of Epizootics). 21 (1): 67–76. doi:10.20506/rst.21.1.1321. ISSN 0253-1933. PMID 11974631.
Sprenger, Polly (January 26, 1999). "Sun on Privacy: 'Get Over It'". Wired Magazine. Retrieved March 20, 2009.
Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999). "Privacy". Business Week. Archived from the original on October 17, 2008. Retrieved March 20, 2009.
Solove, Daniel (2007). "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy". San Diego Law Review. 44: 745. SSRN 998565.
"Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.
"Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
"Privacy fears over online surveillance footage broadcasts in China". December 13, 2017.
Marx, G. T., & Muschert, G. W. (2007). Personal information, borders, and the new surveillance studies Archived August 11, 2017, at the Wayback Machine. Annual Review of Law and Social Science, 3, 375–395.
Agre, Philip E. (2003), "Your Face is not a bar code: arguments against automatic face recognition in public places". Retrieved November 14, 2004.
Chayko, Mary (2017). Superconnected: the internet, digital media, and techno-social life. New York, NY: Sage Publications.
Nishiyama, Hidefumi (2017). "Surveillance as Race Struggle: On Browne's Dark Matters". Theory & Event. Johns Hopkins University Press. 20 (1): 280–285 – via Project MUSE.
Browne, Simone (October 2, 2015). Dark Matters: On the Surveillance of Blackness. Duke University Press Books. p. 224. ISBN .
Court of Appeal, Second District, Division 6, California. (July 30, 2008). "People vs. Diaz". FindLaw. Retrieved February 1, 2017.
California Fourth District Court of Appeal (June 25, 2014). "Riley v. California". Oyez – IIT Chicago-Kent College of Law. Retrieved February 1, 2013.
"The Secrets of Countersurveillance". Security Weekly. June 6, 2007.
Birch, Dave (July 14, 2005). "The age of sousveillance". The Guardian. London. Retrieved August 6, 2007.
Eggers, David (2013). The Circle. New York: Alfred A. Knopf, McSweeney's Books. pp. 288, 290–291, 486. ISBN .
Additionally, tens of thousands of investigative journalists have covered the issue and many would cooperate with a credentialed lawsuit request for information.
‘Fair Use’, SLAPP Protections, Public Domain, Freedom-of-the-Press, Creative Commons, Reddit/Voat Wiki, First Amendment, EU GDPR, WikiPedia and other protective rights apply