HOW TO WIPE OUT THE CORRUPT


You, 100% legally, will use CIA-class databases, social media, public watch-dog technologies, FBI-quality monitoring systems and open-source collaborative forensics comparison data to hunt down every: hooker, real estate asset, male prostitute, mistress, secret email account, social media posting, family trust fund, shell corporation, family stock market transaction, off-shore account, covert investment brokerage, email, Uber and Lyft ride, hotel entry and exit, credit card transaction, Paypal account, search engine manipulation, venture capital connection, Stanford University admissions bribe, expense account abuse, taxpayer funds abuse, rape, sextortion, covert tech company stock they own under another name, every party they attended, every tag they appear in on social media, every Cayman Island account, every crooked CPA or law firm they have used, every lobbyist they ever paid....EVERYTHING.. and you will drop the data into a simple database and cross matrix everything even better than the spy agencies can do it..

...AND EXPOSE IT ALL. YOU WILL SUE THEM IN SMALL CLAIMS COURT. YOU WILL LAUNCH CLASS ACTION LAWSUITS. YOU WILL HOLD PRESS CONFERENCES IN FRONT OF THEIR HOMES. YOU WILL CONFRONT THEM WITH FACTS AT EVERY SINGLE TOWN HALL AND PUBLIC APPEARANCE. YOU WILL PUT UP A BOOTH AT EVERY STREET FAIR AND PUBLIC ASSEMBLY AREA AND HAND OUT LITERATURE. YOU WILL CREATE A MASSIVE PUBLIC MEDIA CIRCUS. YOU WILL MAKE DISCLOSURE WEBSITES. YOU WILL NOT LET THEM ESCAPE!

These are the 100% legal steps, tactics, methodologies and procedures being used to end political corruption in America. Every citizen, in every nation, is encouraged to engage in these efforts:

- Draft versions of FBI "302 Reports", on each and every suspect in the associated list of targets, (in these related documents) are being authored and submitted to the FBI. We will teach you how to write and submit them too!

- These sites, and the associated evidence repositories, have been electronically made available to every FBI agent, Interpol Agent and law enforcement agency in the world.

- Criminal complaints and investigation demands are being authored and submitted to the DOJ, FTC, FEC, SEC, SSA, OSC, CIA, GAO, Congress and each Inspector General.

- We have forced over 100 agency heads to resign simply by providing them with copies of the Draft versions of FBI "302 Reports" on them that we intend to submit.

- We have produced an analysis chart template, with the help of Wikileaks, ICIJ, Sunshine Groups, Follow-the-Money and other database efforts. This chart depicts a graphic analysis of each suspects collusion's, bribes and compromised assets.

- We are teaching and providing forensics and criminal investigation training to the public so that the public is as resourced as any special agent. A vast number of "how to be a private investigator" books have been published on Amazon, E-Book sites and shared online.

- Confirming copies of all submitted reports are digitally carbon-copied to the press, the public and global "dead-man switch" torrent archives.

- We created a new series of public lawsuits, anti-trust lawsuits, RICO lawsuits and class-action lawsuits by the public and against the targets. These lawsuits have now placed permanent public transparency on record and changed the law to help the public and stop the crooks.

- We have exposed their Silicon Valley Bay Area, New York And Florida executive sex trafficking rings.

- Billions of members of the public are monitoring the suspects via public database information and public shared observation of their activities, locations, owner-ships and transactions via each member of the public's personal computers.

- We identified and listed every person, organization and company involved in the attacks and RICO law violations and provided that list to The U.S. Congress and every agency.

- We opened our own private investigator and crowd-sourced investigations into the following:

..... and hundreds of thousands of other information points about them that prove that they benefit from crimes that they engage in for others who engage in crimes using the America public policy system.

It all goes into shared 100% legal public collaborative databases that work like XKEYSCORE, or MS Access, or Oracle Databases.

The proof of collusion, organized criminal actions and raw covert corruption is indisputable. The actors are all the same people. The beneficiaries are all the same people. Study the writings and teachings of Luke Bencie and you will be at the top of the game.