WHEN THE WHITE HOUSE ORDERS ATTACKS ON CITIZENS AS POLITICAL REPRISAL

The dictionary defines a “Character Assassination Attack”, ie: https://en.wikipedia.org/wiki/Character_assassination , as “...The state-sponsored destruction of reputations, fostered by political propaganda and cultural mechanisms, can have more far-reaching consequences. One of the earliest signs of a society's compliance to loosening the reins on the perpetration of crimes (and even massacres) with total impunity is when a government favors or directly encourages a campaign aimed at destroying the dignity and reputation of its adversaries, and the public accepts its allegations without question. The mobilisation toward ruining the reputation of adversaries is the prelude to the mobilisation of violence in order to annihilate them. Generally, official dehumanisation has preceded the physical assault of the victims.[8]…”

One of Plaintiff’s greatest complaint’s in this case is the organized use of “The Silicon Valley Cartel” RICO and Antitrust violating racketeering organization to operate a global charactar assassination attack on Plaintiff. The media group of the Cartel is wdely known to consist of Google, Alphabet, YouTube, Gizmodo/Gawker Media, Black Cube, Twitter and the like, which are COVERTLY owned by the government figures involved in these corruption matters. To use an 8 Billion person global media Silicon Valley attack engine is to end someone’s life, to permanently destroy them. The White House and the Department of Energy have been exposed in investigations doing this thousands of times!

Some online articles list an example set of the Silicon Valley Cartel members in a manner such as this:

THE SILICON VALLEY CARTEL MEMBERS

The Worst Ones - Rev 2.2

You would be shocked to learn how many people are killed, every day, for less than $50.00. ISIS and the Taliban will saw your head off for just an ideology. If people would commit murder over that small an amount of money, imagine what they would do to control the trillions of dollars of money that is always moving through the stock market. These are the people that will stop at nothing for power, mansions, hookers, private jets and greed!

### THE BRIBED INSIDER TRADING POLITICIANS - Tracked via financial records and email leaks to quid pro quo:



- Aneesh Chopra - White House Tech Exec

- Arnold Schwarzenegger – Governor (Accused of political bribery and kickbacks; tax evasion, illicit deal organization with Russians and more…)

- Barack Obama – Chicago politician

-Bill Daley – White House strong-arm (Forced to resign)(he is now under investigation)

- Bill Lockyer – Calif State finance head (Under investigation and sex scandal conflicts, charged with corruption by media. Assets and ownerships under investigation)

- Daniel Cohen – DOE Legal counsel who assisted in the Steven Chu scam (Sent packing/fired/forced to resign)

- David Axelrod – White House strategist who helped stage the quid-pro-quo (Sent packing/fired/forced to resign)(he is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

- Hunter Biden

- David Plouffe – White House money packager. Arranged deals between VC campaign Donors (Forced to Resign. Under investigation)

- Debbie Wasserman Schultz

- Denis McDonough – White House adviser

- Dianne Feinstein – California politician

- Eric Holder – Attorney General- DOJ (Forced to resign) (Charged with staff & VC Protections and blockade of FBI and Special Prosecutor deployments in order to run the cover-up)

- Eric Strickland – Head of Auto Safety agency under DOT (Sent packing/fired/forced to resign)(he is now under investigation. Charged with cover-up of Tesla and GM auto dangers he had known about)

- Gabriel Burt

- Harry Reid – Senator- Solar factory guru, Congress lead (Accused of political bribery and kickbacks; tax evasion, and more…Forced out of Congress in shame)

- Hillary Clinton – Dynastic politician

- Jack Lew

- Jay Carney – White House press lead (Forced to resign)

- Jeff Berman - Bryan Cave. Berman, the former delegate counter for President Obama’s 2008 campaign

- Jeff Peck, Peck, Madigan, Jones & Stewart. Aide to then-Sen. Joe Biden (D-Del.) on the Senate Judiciary Committee

- Jeffrey Zients

- Jerry Brown – California politician

- Joe Rhodes – White House shill

- Joe Biden - Politican who created Solyndra funds

- John Podesta – White House adviser

- Jonathan Silver – DOE VC (Sent packing/fired/forced to resign)(he is now under investigation. Shamed in media for epic failures)

- Joshua Wright - FTC

- Kamala Harris– Stock favoritism Insider with her husband

- Katherine Feinstein

- Kathy Zoi

- Ken Alex – Scheme Adviser to Jerry Brown

- Ken Duberstein and Marti Thomas, The Duberstein Group. Duberstein was floated as a candidate for Obama’s chief of staff before the president chose Bill Daley, while Thomas is a Democratic vet who worked in the Clinton Treasury Department.

- Lachlan Seward – Energy Department insider gatekeeper

- Melanie Nutter – Pelosi Top Aide

- Matt Rogers – VC and quid pro quo pass-through conduit

- Megan Smith - U.S. CTO

- Mikey Dickerson

- Nancy Pelosi – California politician

- Robert Gibbs – White press office head

- Steven Chu – Secretary of Energy – The most corrupt in US history

- Todd Park – IT manipulator inside White House

- Plus others to be named...





### THE OLIGARCH FINANCIER/BENEFICIARIES OF THE CRIMES - Tracked via financial records and email leaks to quid pro quo:



- Andy Bechtolsheim – VC- Insider campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

- Bill Gurley

- Carl Gordon

- Chad Hurley - YouTube

- Cheryl Sandberg – Facebook boss, reports to Larry Summers

- Dave McClure – VC

- David Danielson

- David Drummond – Lawyer/Lobbyist– Google, bribes expert for DC and EU regions (Under investigation. Quail Road, Woodside, CA home bugged)

- David Mott

- David Prend

- David Sacks

- Draper - Fisher – VC firm (Campaign funder who received massive windfalls from Russian mining & tech start-up rigging)

- Elon Musk – CEO – Tesla (He is now under investigation & in multiple lawsuits for fraud)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation )

- Emerson Collective -Steve Jobs wife, has one of the largest and stealthiest election data combines

- Eric Paley

- Eric Schmidt – Owner- Google (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

- Gilman Louie – VC, founder on IN-Q-Tel

- Goldman Sachs – Financial packager (Suspected of staging most of the TARP/DOE deals for personal gain & insider payouts)

- Greylock Capital – Silicon Valley Insider trading operator (Under investigation)

- Ira Ehrenpreis – VC Campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation)

- Jacque Littlefield – VC, Dead

- James Bronkema – West Coast Money Man for David Rockefeller and Feinstein financier (Dead)

- Jared Cohen – Google boss and international political manipulator

- Wilson Sonsini Partner Club

- Wilson, Sonsini, Goodrich and Rosatti

- Jim Breyer – VC and CIA intermediary

- Joe Lonsdale – VC, famous for rape and abuse scandal and domestic spying via Palantir

- Johanna Shelton - Google Lobbyist

- John Doerr – Owner – Kleiner Perkins. “Godfather” – Silicon Valley Cartel (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)( All of his personal assets, investments and portfolio holdings are under investigation )

- John Lindfors

- Josh Kopelman

- JP Gan

- Keith Rabois -VC

- Ken Howery – VC

- Kleiner Perkins – Campaign funding VC who (Received massive windfalls from Russian mining & tech start-up rigging. Sued. Under investigation. All assets being tracked )

- Larry Page – Google Boss

- Larry Summers – VC

- Lloyd Craig Blankfein – VC and Sachs boss

- Luke Nosek

- Marc Andreessen -VC

- Mario Rosatti – VC

- Mark Zuckerberg – Facebook Boss

- Martin LaGod -VC Firelake Cap

- Mary Meeker – VC

- Max Levchin -VC

- Mckinsey Consulting – The firm you hire to rig white papers and insider hires in government positions for the Palo Alto Mafia

- Michael Moritz -VC

- Neerag Agrawal - VC

- Peter Thiel – VC

- Pierre Omidyar– VC

- Raj Gupta – VC, arrested

- Rakesh Saxeena – Canadian in-house arrest, arms dealer, western political packager

- Ray Lane – VC

- Reid Hoffman – VC and sex.com partner with Gary Kremen, also match.com

- Richard Blum – VC and director/husband of Dianne Feinstein - Finally dead!

- Roelof Botha

- Sanjay Wagle – VC

- Scott Shleiffer

- Sergy Brin – Google boss

- Steve Chen

- Steve Jurvetson – VC embroiled in sex abuse charges

- Steve Rattner – White House car czar, indicted for fraud

- Steve Spinner – Energy Department manipulation expert, Wife was Solyndra’s lawyer

- Steve Westly – VC

- Ted Schlein - IN-Q-Tel

- Tim Draper – VC

- Tom Perkins – Dead KPCB Palo Alto Mafia founder

- Tom Steyer – VC

- Tomorrow Ventures – Social manipulation group

- Tony Podesta, Podesta Group. The prolific Democratic fundraiser has seen his firm rocket to the echelons of the top five lobby shops.

- Viktor Vekselberg – Russian business entity

- Vinod Khosla -VC
- Plus others to be named...



### THEIR OPERATIVES AND HIRED MEDIA ASSASSINS - Tracked via financial records, quid pro quo perks and email leaks to payola. The people in the two lists, above, hired these people to harm citizens:



- A.J. Delaurio– Defamation-for-sale blogger

- Adam Dachis– Defamation-for-sale blogger

- Adam Weinstein– Defamation-for-sale blogger

- Adrian Covert– Defamation-for-sale blogger

- Adrien Chen– Defamation-for-sale blogger

- Al D’Amato, Park Strategies. The former GOP New York senator has been a big advocate for online gambling as a lobbyist for the Poker Players Alliance.

- Al Mottur and Manuel Ortiz, Brownstein Hyatt Farber Schreck. Mottur heads up lobbying operations at the K Street giant. Ortiz, one of Brownstein’s newest hires, is a rising star in Democratic circles.

- Alan Henry– Defamation-for-sale blogger

- Albert Burneko– Defamation-for-sale blogger

- Alex Balk– Defamation-for-sale blogger

- Alexander Pareene– Defamation-for-sale blogger

Alexander Sternhell, Sternhell Group. Previously a Senate Banking Committee staffer, Sternhell’s two-year-old venture is in the big leagues with clients such as Citigroup Management and PricewaterhouseCoopers.

- Alexandra Philippides– Defamation-for-sale blogger

- Allison Spinner – Wife of Steve Spinner and lawyer at WSGR and Solyndra who helped Feinstein rig the Solyndra cash ((Under investigation. All assets being tracked and terminated.)

- Allison Wentz– Defamation-for-sale blogger

- Andrew Collins– Defamation-for-sale blogger

- Andrew Magary– Defamation-for-sale blogger

- Andrew McCormack

- Andrew Orin– Defamation-for-sale blogger

- Andy Barbour, Smith-Free Group. Smith lobbies for several financial and insurance companies but is best known for his work as the lead Democratic lobbyist for the Financial Services Roundtable.

- Angelica Alzona– Defamation-for-sale blogger

- Anna Merlan– Defamation-for-sale blogger

- Ariana Cohen– Defamation-for-sale blogger

- Ashley Feinberg– Defamation-for-sale blogger

- Ashley Vance - Elon Musk suck-up and Musk hype monger

- Austin Lau

- Ava Gyurina– Defamation-for-sale blogger

- Barry Petchesky– Defamation-for-sale blogger

- Black Cube - An attack service providing hit jobs on competitors

- Brendan I. Koerner– Defamation-for-sale blogger

- Brendan O’Connor– Defamation-for-sale blogger

- Brent Rose– Defamation-for-sale blogger

- Brian Goncher – Deloitte VC intermediary in the stock market rigging (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)

Brobeck Law Firm

- Brian Hickey– Defamation-for-sale blogger

- Camila Cabrer– Defamation-for-sale blogger

- Carr & Ferrell - Sony and Facebook's law firm that helps to blockade inventors

- Choire Sicha– Defamation-for-sale blogger

- Chris Jennings, Jennings Policy Strategies

- Chris Mohney– Defamation-for-sale blogger

- Chuck Brain, Capitol Hill Strategies Inc. Once a Clinton White House aide and longtime House Ways and Means Committee staffer

- Civis Analytics – Social manipulation group

- Clover Hope– Defamation-for-sale blogger

- Covington & Burling

- Dan Tate Jr., Capitol Solutions. Tate delivers stellar client relations while harnessing 10 years of upper-level Hill and administration experience.

- Daniel Morgan– Defamation-for-sale blogger

- Covington & Burling - corrupt law firm that puts appointees in office for VC's

- David Sandalow

- Diana Moskovitz– Defamation-for-sale blogger

- Doyle Bartlett, Eris Group. Bartlett has years of Capitol Hill experience and a busy lobbying practice

- Eleanor Shechet– Defamation-for-sale blogger

- Elizabeth Spiers– Defamation-for-sale blogger

- Elizabeth Starkey– Defamation-for-sale blogger

- Emily Gould– Defamation-for-sale blogger

- Emily Herzig– Defamation-for-sale blogger

- Emma Carmichael– Defamation-for-sale blogger

- Erin Ryan– Defamation-for-sale blogger

- Ethan Sommer– Defamation-for-sale blogger

- Eyal Ebel– Defamation-for-sale blogger

- Fred Graefe, Law Offices of Frederick H. Graefe

- Fusion GPS – Defamation and journalist bribery service

- Gabrielle Bluestone– Defamation-for-sale blogger

- Gabrielle Darbyshire– Defamation-for-sale blogger and attack services director

- Gawker Media – DNC/Clinton/Obama character assassination media tool (In Mid-Termination)

- Georgina K. Faircloth– Defamation-for-sale blogger

- Gerald Cassidy and Gregg Hartley, Cassidy & Associates

- Gizmodo – DNC/Clinton/Obama character assassination media tool ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )

- Gregory Howard– Defamation-for-sale blogger

- Hamilton Nolan– Defamation-for-sale blogger

- Hannah Keyser– Defamation-for-sale blogger

- Heather Deitrich– Defamation-for-sale blogger

- Heather Podesta, Heather Podesta + Partners. The former congressional aide has built a solid lobbying practice and helps fundraise for Democrats with her husband, Tony Podesta

- Hudson Hongo– Defamation-for-sale blogger

- Hugo Schwyzer– Defamation-for-sale blogger

- Hunter Slaton– Defamation-for-sale blogger

- Ian Fette– Defamation-for-sale blogger and Google, Gawker, Jalopnik, Gizmodo media assassin

- Irin Carmon– Defamation-for-sale blogger

- Jalopnik – Online defamation facade political publication. Pretends to be about cars but is DNC hit job rag

- James Brown Jr – HHS Programming lead in California (Arrested for corruption)

- James J. Cooke– Defamation-for-sale blogger

- James King– Defamation-for-sale blogger

- Jawed Karim - YouTube

- Jeff Lieberman

- Jennifer Ouellette– Defamation-for-sale blogger

- Jesse Oxfeld– Defamation-for-sale blogger

- Jessica Cohen– Defamation-for-sale blogger

- Jesus Diaz– Defamation-for-sale blogger

- Jillian Schulz– Defamation-for-sale blogger

- Joanna Rothkopf– Defamation-for-sale blogger

- Joel Johnson, The Glover Park Group

- John Cook– Defamation-for-sale blogger and director of media assassins group

- John Herrman– Defamation-for-sale blogger

- John Raffaelli, Capitol Counsel

- Jordan Sargent– Defamation-for-sale blogger

- Joseph Keenan Trotter– Defamation-for-sale blogger

- Josh Stein– Defamation-for-sale blogger

- Julia Allison– Defamation-for-sale blogger

- Julianne E. Shepherd– Defamation-for-sale blogger

- Julie Domenick, Multiple Strategies LLC

- Justin Hyde– Defamation-for-sale blogger

- Kate Dries– Defamation-for-sale blogger

- Katharine Trendacosta– Defamation-for-sale blogger

- Katherine Drummond– Defamation-for-sale blogger

- Kelly Stout– Defamation-for-sale blogger

- Kerrie Uthoff– Defamation-for-sale blogger

- Kevin Draper– Defamation-for-sale blogger

- Lacey Donohue– Defamation-for-sale blogger

- Larry O’Brien, OB-C Group

- Lucy Haller– Defamation-for-sale blogger

- Luke Malone– Defamation-for-sale blogger

- Madeleine Davies– Defamation-for-sale blogger

- Madeline Davis– Defamation-for-sale blogger

- Mario Aguilar– Defamation-for-sale blogger

- Mark Isakowitz, Fierce, Isakowitz and Blalock. Isakowitz and his GOP lobby shop scored a coup this year when Apple and Facebook both signed up as clients in a two-week span.

- Mark Kadesh, Kadesh & Associates. Kadesh, once chief of staff to Sen. Dianne Feinstein (D-Calif.), has an A-list of California clients

- Matt Hardigree– Defamation-for-sale blogger

- Matt Novak– Defamation-for-sale blogger

- Michael Ballaban– Defamation-for-sale blogger

- Michael Dobbs– Defamation-for-sale blogger

- Michael Spinelli– Defamation-for-sale blogger

- Morrison and Foerster

- Neal Ungerleider– Defamation-for-sale blogger

- Nicholas Aster– Defamation-for-sale blogger

- Nicholas Guido Denton– Defamation-for-sale blogger and head of the Gawker, Gizmodo, Jalopnik sleaze tabloid empire

- Omar Kardoudi– Defamation-for-sale blogger

- Owen Thomas– Defamation-for-sale blogger

- Patrick George– Defamation-for-sale blogger and Character Assassination expert

- Patrick Laffoon– Defamation-for-sale blogger

- Patrick Redford– Defamation-for-sale blogger

- Perkins Coie – Campaign conduit law firm

- Rich Juzwiak– Defamation-for-sale blogger

- Richard Blakely– Defamation-for-sale blogger

- Richard Rushfield– Defamation-for-sale blogger

- Robert Finger– Defamation-for-sale blogger

- Robert Sorokanich– Defamation-for-sale blogger

- Rory Waltzer– Defamation-for-sale blogger

- Rosa Golijan– Defamation-for-sale blogger

- Ryan Brown– Defamation-for-sale blogger

- Ryan Goldberg– Defamation-for-sale blogger

- Sam Faulkner Biddle– Defamation-for-sale blogger, Runs a large part of the Anti-GOP blog programs

- Sam Woolley– Defamation-for-sale blogger

- Samar Kalaf– Defamation-for-sale blogger

- Sarah Ramey– Defamation-for-sale blogger

- Shannon Marie Donnelly– Defamation-for-sale blogger

- Shep McAllister– Defamation-for-sale blogger

- Sophie Kleeman– Defamation-for-sale blogger

- Stephen Totilo– Defamation-for-sale blogger

- Steve Elmendorf and Jimmy Ryan, Elmendorf | Ryan. A former aide to ex-House Democratic Leader Richard Gephardt (Mo.), Elmendorf brought in Ryan to help expand the Senate ties of his firm.

- Steve McBee, McBee Strategic. A former aide to Rep. Norm Dicks (D-Wash.), McBee has seen his lobby firm take off.

- Steve Perry and Andy Wright, Dutko Grayling. Perry and Wright man the roster for one of the top 20 lobby shops in Washington.

- Tamar Winberg– Defamation-for-sale blogger

- Taryn Schweitzer– Defamation-for-sale blogger

- Taylor McKnight– Defamation-for-sale blogger

- The Groundwork– Social manipulation group

- Thomas Jolly, Jolly/Rissler. Jolly is founding chairman of the Washington Caucus, a group that hosts dinners with lawmakers, and a mainstay among lobbyists.

- Thorin Klosowski– Defamation-for-sale blogger

- Tim Marchman– Defamation-for-sale blogger

- Timothy Burke– Defamation-for-sale blogger

- Tobey Grumet Segal– Defamation-for-sale blogger

- Tom Ley– Defamation-for-sale blogger

- Tom Scocca– Defamation-for-sale blogger

- Veronica de Souza– Defamation-for-sale blogger

- Wes Siler– Defamation-for-sale blogger

- William Haisley– Defamation-for-sale blogger

- William Turton– Defamation-for-sale blogger

- Plus others to be named...

### THEIR CORPORATE STOCK MANIPULATION FRONT FACADES- Tracked via financial records and email leaks to RICO, Anti-trust and Money Laundering violations:



- Abound Solar - Criminally corrupt crony campaign finance front operation. (Terminated)

- Alphabet - Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier (Under Federal and EU investigation)

- Facebook/Meta - Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )

- Fisker - Criminally corrupt crony campaign finance front operation. (Terminated)

- Google, Inc. – Data harvesting company(Ran media attacks, stock market pump and dump PR hype and character assassinations)(accused of political bribery and kickbacks; tax evasion, and more…) (charged by EU, and most nations, with multiple abuses of the public. Has totally lost the trust of the public. Revenue loss increasing geometrically.)

- In-Q-Tel, Inc. – CIA off-shoot associated with Eric Schmidt, Google, Elon Musk and the Cartel leaders. Ran “hit-jobs” on Silicon Valley VC adversaries and reporters (Sued, under investigation, exposed in multiple documentaries, under investigation for Cocaine trafficking. Removal of charity status demanded)

- Ivanpah Solar - Criminally corrupt crony Google campaign finance front operation. (In failure mode)

- Linkedin - Election manipulation networking site

- Netflix - Propaganda Site that also conduits jobs as political revolving door payola to politicians

- Solyndra Solar Company – FBI-raided corrupt Clean Tech company

- SpaceX – Elon Musk company that Obama gave part of NASA to in exchange for campaign conduits

- Tesla Motors – Car Company that conduits money to campaigns
- Plus others to be named...



Any issues re: culpability can be easily resolved in meetings with the FBI, FINCEN, The SEC, The IRS, The FTC, ICIJ.ORG and open Congressional hearings! Never was the term: "Follow The Money" more appropriate than for these people! Why are these people not yet arrested for election manipulation, RICO and Anti-trust violations, money laundering, bribery and other illicit deeds? Who is protecting them? Who is telling the police not to act? This list also serves as a demand for investigation and prosecution of these individuals who conspired to engage in these illicit acts. This is not the complete list….”



While opposition entities Pooh Pooh the assertion, FINCEN and top forensic investigators, and their XKEY-SCORE type databases prove that they are all financially and politically closely aligned. Their media group set out to “CONTROL THE NEWS AND INFORMAION PERSPECTIVES THAT ARE VIEWED BY OVER 8 BILLION PEOPLE…”, per Google executives and, indeed, that is what they accomplished. The head of the world reknown publication: Psychology Today, Robert Epstein: (born June 19, 1953) is an American psychologist, professor, author, and journalist. He was awarded a Ph.D. in psychology by Harvard University in 1981, was editor in chief of Psychology Today, and has held positions at several universities including Boston University, University of California, San Diego, and Harvard University. He is also the founder and director emeritus of the Cambridge Center for Behavioral Studies in Concord, MA. In 2012, he founded the American Institute for Behavioral Research and Technology (AIBRT), a nonprofit organization that conducts research to promote the well-being and functioning of people worldwide. Epstein has been a commentator for National Public Radio's Marketplace, the Voice of America, and Disney Online. His popular writings have appeared in Reader's Digest, The Washington Post, The Sunday Times (London), Good Housekeeping, The New York Times, Parenting, and other magazines and newspapers. Epstein is a public figure in the world of psychology.[1][2][3][4] He has published over 350 articles and 15 books. His online competency tests are taken by more than a million people a year.[5] . He has testified before Congress to facts herein.

In fact Every one of the insiders who did get government funding got it in the exact same size and order as their covert political campaign funding and stock market bribes to the deciders. Chamath Palihapitiya and other Silicon Valley insiders have now exposed the fact that Greylock, Kleiner, etc. are just a VC Ponzi Scheme! in this whole mess. Musk used crooked Senators to get his funds. Those Senators and government agency bosses were financed by, friends with, sleeping with, dating the staff of, holding stock market assets in, promised a revolving door job or government service contracts from, partying with, personal friends with, photographed at private events with, making profits by consulting for, exchanging emails with, business associates of or directed by; one of those business adversaries, or the Senators and politicians that those business adversaries pay campaign finances to, or supply political search engine manipulation services to. Elon Musk is notorious for getting Department of Energy money by bribing public officials and placing his friends: Steven Chu, Matt Rogers, Steve Westly, Steve Spinner's 'special friend', etc. on the staff of the Department of Energy and in the White House. We have FBI-class records, financial tracking, emails, stock market relay records and other forensic data that proves it. We can swear, warrant, certify and prove these assertions in front of Congress in a live Congressional hearing or Civil Jury trial, given non-compromised legal backing.


While these CIA, FSB and NSA tactics are pooh poohed by media shills as “Hollywood Fare”, The White House is well documented, in Congressional investigations, doing these very things.

Opposition has argued that these “fantastic” assertions are “here-say” and that no citizen “should think that any government official would ever do anything unethical;..”

That argument might have worked...UNTIL THIS WEEKEND:

A MASSIVE TROVE OF HARD PHYSICAL EVIDENCE SHOWING THE WHITE HOUSE AND TOP GOVERNMENT OFFICIALS USING TWITTER, GOOGLE, FACEBOOK, YOUTUBE, GAWKER AND GIZMODO MEDIA TO ATTACK OTHERS AND RIG ELECTIONS HAS BEGUN TO BE RELEASED! NEW CONGRESSIONAL INVESTIGATION HAVE BEEN LAUNCHED BECAUSE OF THESE DISCLOSURES. PLAINTIFF IS A WITNESS IN THESE INVESTIGATIONS. MUCH MORE EVIDENCE WILL BE LEAKED THIS MONTH BY MAJOR NEWS OUTLETS.

A SMALL SAMPLE OF THIS BREAKING NEWS FOLLOWS:






Musk Says TWITTER Gave Preference To Leftists During Brazil Election In Order To Rig Election Results...



...Shoshana Zuboff's, The Age of Surveillance Capitalism - Why Twitter, Google, Facebook, Instagram, YouTube, Netflix, Alphabet are the SAME Thing, The SAME SICKO tech elites and the same kinds of social privacy RAPE against citizens for government official’s stock market profiteering!

https://www.contagious.com/news-and-views/shoshana-zuboff-on-the-age-of-surveillance-capitalism

...”



SHOCKER: TWITTER, GOOGLE, FACEBOOK, YOUTUBE, INSTAGRAM ALL FOUND TO HAVE MANIPULATED NATIONAL ELECTIONS



Democrats lawmakers blasted Twitter for failing to censor MORE content after New York Post Hunter Biden laptop scandal – with lawmakers claiming ‘free speech isn’t absolute’

What did the President know and when did he know it? Musk releases Hunter Biden laptop files that reveal Twitter execs replied ‘handled’ to requests from ‘Biden team’ to delete tweets – as Trump demands election result is thrown out 



Pressure is now mounting on Joe Biden after Elon Musk revealed that Twitter execs responded ‘handled’ to requests from the President’s team to remove content about Hunter Biden’s leaked laptop files. Twitter’s CEO ceremoniously revealed the back-end messages – which seemed to show members of Biden’s inner circle attempting to remove criticism about his son from the platform before the 2020 election. Following the sensational revelations last night, Donald Trump has yet again demanded the 2020 results be void and have the country declare him the rightful winner. Musk also suggested that the social media giant – which he was not in charge of at the time – was taking orders from the federal government following the barrage of tweets he posted, under the name the ‘Twitter Files.’ The leaked correspondence contained damning insider communications that predate Musk’s ownership, which provided insight to the dissent and confusion seen within the company as it responded to reporting on the scandal in October 2020. The emails provided new detail on Twitter’s shady censorship decision, which Musk said was made behind the scenes ‘at the highest levels of the company’ at the behest of Biden officials, and ‘based upon thousands of internal documents obtained by sources at Twitter.’ Following the ordeal last night, Trump spoke out: ‘So, with the revelation of massive and widespread fraud and deception in working closely with Big Tech Companies, the DNC, and the Democrat Party, do you throw the Presidential Election Results of 2020 out and declare the rightful winner, or do you have a new election? A massive fraud of this type and magnitude allows for the termination of all rules, regulations, and articles, even those found in the Constitution. Our great ‘Founders’ did not want, and would not condone, false and fraudulent elections!’



THE TWITTER FILES: PART 1

How And Why Twitter Blocked The Hunter Biden Laptop Story

By Josh Boswell and Paul Farrell

Files showing Twitter’s suppression of the Hunter Biden laptop scandal were released on the social media giant today.

The documents include internal Twitter emails appearing to show staffers censoring tweets at the behest of the Joe Biden 2020 presidential campaign.

Weeks ahead of the election in October 2020, Twitter prevented sharing of a story about Hunter’s involvement with a Chinese oil giant – and his then-presidential candidate father Joe Biden’s potential slice of a multi-million-dollar deal with the foreign firm.

Emails between Twitter staffers show them censoring people sharing the story, including the White House Press Secretary Kayleigh McEnany, citing their ‘hacked materials policy’.

Elon Musk, the billionaire owner of Twitter, gave journalist Matt Taibbi access to the explosive documents, which he began to publish excerpts of on the social media site on Friday evening.

Twitter also allegedly used blocks in an attempt to halt the spread of the story, published in October 2020 weeks before the election, including tactics usually reserved for preventing the sharing of child porn.

Amid the scramble to limit sharing of the New York Post’s Hunter story, Taibbi claimed emails showed Dorsey intervening multiple times to question the censorship.

The journalist also added that he had not seen any evidence that the federal government had a role in suppressing the story.

However, in a recent interview with Joe Rogan, Facebook founder Mark Zuckerberg admitted that his company received a briefing from the FBI ahead of the 2020 election warning of disinformation campaigns.

The briefing led to Facebook being on high alert for Russian propaganda – which Hunter’s laptop was initially tarred as by top former intelligence officials, until DailyMail.com proved it was real.

Elon Musk, the billionaire owner of Twitter, gave journalist Matt Taibbi access to the explosive documents, which he began to publish excerpts of on the social media site on Friday evening

Twitter CEO Elon Musk has promised that: ‘What happened with the Hunter Biden story suppression by Twitter will be published on Twitter at 5pm ET!’

Emails showed recommendations from the DNC to review certain tweets on the social media giant

Another message showed more requested to be looked at from the Biden team in October 2020

There were requests from the Biden and Trump team, but the vast majority were shown to be from Democrats

Public policy executive Caroline Strom asked staff what was the cause for the story being blocked

Elaine from the comms global escalations team replied, claiming the story breached Twitter’s hacked materials policy

Former Trust and safety chief Yoel Roth was roped into the email chain, as well as legal chief Gadde

Communications official Trenton Kennedy writes: ‘I’m struggling to understand the policy basis for marking this as unsafe’

White House spokeswoman Kaleigh McEnany was locked out of her account for tweeting about the story

Taibbi, a popular podcaster and former Rolling Stone politics correspondent, shared one October 14 2020 email from Donald Trump’s campaign team to Twitter staff complaining that McEnany had been locked out of her account ‘for simply talking about’ the New York Post story.

Twitter’s public policy executive Caroline Strom forwarded the email to an ‘ops analyst’ at the social media company, who wrote back that: ‘the user was bounced by Site Integrity for violating our Hacked Materials policy.’

At that time, the Biden campaign had not disputed the veracity of the material from Hunter’s abandoned laptop, which DailyMail.com later authenticated using top cyber forensics experts.

Taibbi wrote then-CEO Jack Dorsey was unaware of the censorship, but alleged that an executive, ‘former head of legal, policy and trust’ Vijaya Gadde, played a ‘key role’.

They just freelanced it,’ one former employee told the podcaster. ‘Hacking was the excuse, but within a few hours, pretty much everyone realized that wasn’t going to hold. But no one had the guts to reverse it.’

Everyone knew this was f***ed,’ an anonymous ex staffer reportedly told Taibbi.

Emails showed internal arguments breaking out among senior Twitter staff over the suppression of the Post’s story – which included lurid details of Hunter’s escapades with prostitutes and hard drugs, as well as worrying evidence of potential corruption involving Ukrainian gas company Burisma and his links to Chinese firms.

Taibbi wrote then-CEO Jack Dorsey was unaware of the censorship, but alleged that an executive, ‘former head of legal, policy and trust’ Vijaya Gadde (pictured glaring at Musk when he took over), played a ‘key role’



Former Twitter CEO Jack Dorsey is pictured last year in Miami. He was apparently kept out of discussions over the Hunter Biden laptop story

One staffer, Trenton Kennedy, allegedly wrote: ‘I’m struggling to understand the policy basis for marking this as unsafe.’

I think the best explainability argument for this externally would be that we’re waiting to understand if this story is the result of hacked materials. We’ll face hard questions on this if we don’t have some kind of solid reasoning for marking the link unsafe.’

Another, Katie Rosborough, shot back with a link to a Fox News article about Hunter’s laptop, asking: ‘will we also mark similar stories as unsafe?’

The internal discussions showed that despite admitting ‘the facts remain unclear’, Twitter decided on ‘preventing this content from being amplified.’

One staffer, Ian Plunkett, wrote that the site should be ‘cautiously interpreting this through the lens of our hacked materials policy and allowing the link with a warning and a significant reduction of spread.’

Even senior executives were questioning the veracity of the claims the laptop material was hacked.

Former VP of global communications Brandon Borrman, wrote: ‘To Ian’s point, can we truthfully claim that this is part of the policy? i.e. As part of our approach to addressing potentially hacked materials, we are limiting visibility of related stories on Twitter while our investigation is ongoing.’

The censorship even caused one Democrat Congressman Ro Khanna to write to Gadde that it was ‘generating huge backlash on hill re speech’ – referring to concerns in Washington DC over limitations on free speech being imposed by Twitter.

In the heat of a Presidential campaign restricting dissemination of newspaper articles (even if NY Post is far right) seems like it will invite more backlash than it will do good,’ Khanna wrote.

Research firm NetChoice wrote to Twitter’s head of Public Policy Lauren Culbertson the next day on October 15 2022, warning that ‘both Democrats and the Republicans were angry’ about the suppression, according to the emails obtained by Taibbi.

NetChoice general counsel Carl Szabo told Culbertson one congressional staffer even described the debacle as ‘tech’s Access Hollywood moment’ – referring to a leaked tape of Donald Trump saying he grabbed married women ‘by the p***y.

Among the most shocking emails is an exchange between two staffers, showing the Biden campaign were making requests for Tweets to be taken down, and Twitter was duly complying.

More to review from the Biden team,’ one staffer wrote on October 24, days ahead of the presidential election, listing five tweets. ‘Thanks all.’

Handled these,’ another replied three hours later.

Taibbi wrote that the Trump campaign had takedown requests granted too, but reported that staffers were taking far more from Biden’s team.

By 2020, requests from connected actors to delete tweets were routine,’ he wrote. ‘Celebrities and unknowns alike could be removed or reviewed at the behest of a political party.

Both parties had access to these tools. For instance, in 2020, requests from both the Trump White House and the Biden campaign were received and honored.

However: this system wasn’t balanced. It was based on contacts. Because Twitter was and is overwhelmingly staffed by people of one political orientation, there were more channels, more ways to complain, open to the left (well, Democrats) than the right.’

He shared statistics from OpenSecrets, showing political donations by Twitter staff were between 96% and 99% to Democrats, with a total $909,431 given to Democrats in the 2020 election cycle and just $14,137 to Republicans by individuals linked to the company.









In the email to Culbertson, Szabo wrote that he had polled several lawmakers and their staff on the Hill, and that some Democrat lawmakers were less concerned about the First Amendment.

The Democrats were in agreement: social media needs to moderate more because they’re corrupting democracy and making all ‘truth’ relative,’ Szabo wrote. ‘When pushed on how the government might insist on that, consistent with the First Amendment, they demurred: ‘the First Amendment isn’t absolute.’

According to the emails, Twitter was feeling the heat from both sides of the political aisle: Republicans livid over censorship, and Democrats complaining the site ‘doesn’t moderate enough harmful content so when it does… it becomes a story.’

Szabo wrote that Democrat lawmakers ‘complained that the companies are inept: They let conservatives muddy the water and make the Biden campaign look corrupt even though Biden is innocent.’

They linked this to Hillary Clinton’s email scandal: she did nothing wrong but because the press wouldn’t let the story go, it became a scandal far out of proportion,’ Szabo added in his email to the Twitter executive.

In their mind, social media is doing the same thing: it doesn’t moderate enough harmful content so when it does, like it did yesterday, it becomes a story. If the companies moderated more, conservatives wouldn’t even think to use social media for disinformation, misinformation, or otherwise.’

Musk’s choice to grant behind-the-scenes access to Taibbi may be interpreted as a sign of his unfavorable views of major media organizations.

The journalist has written books critical of cable news on both the right and left of the political spectrum, accusing both MSNBC and Fox of polarizing the country.

He has said he admires liberal firebrand Bernie Sanders, but also has enraged left wing activists by slamming cancel culture.

He also was critical of Twitter’s suppression of the Biden scandal from the beginning.

On October 24 2020, about a week after the story about Hunter’s abandoned laptop and its shocking contents broke, Taibbi wrote a post on his substack titled: ‘With the Hunter Biden expose, suppression is a bigger scandal than the actual story’.

The piece was sent by Dorsey to his head of legal Gadde, one of the Twitter internal emails shows.

In a tweet on Friday evening, Musk accused the Twitter staffers: ‘If this isn’t a violation of the Constitution’s First Amendment, what is?’

Taibbi wrote that according to his sources, censoring tweets because they shared ‘hacked materials’ usually required an official finding of a hack by law enforcement, but that policy was abandoned with Hunter’s laptop.

In an email the day after the story broke, one executive allegedly wrote to staff admitting that the New York Post and the Trump campaigns tweets had been censored, among others.

Twitter actioned Tweets yesterday relating to two NY Post articles that were tweeted out that allegedly included pictures and screenshots of emails from a laptop that allegedly belonged to Hunter Biden, Presidential candidate Joe Biden’s son,’ the alleged internal Twitter email shared by Taibbi said.

Our teams made the determination that the materials fall under our Hacked Materials Policy, in addition to sharing personal information, so links were actioned. As you may know, this existing policy framework was launched in 2018 to mitigate real-time harm based on hack and leak scenarios coming out of the 2016 election.

I know there are questions that you probably have and are also probably getting a lot of incoming from stakeholders – governmental, academic, civil society, etc. The last 24 hours certainly has been a whirlwind with lots of curves and unknowns and we fully expect that the issues surrounding this matter will continue to swirl in the coming days so thank you to everyone for your patience.’

Musk had earlier promised: ‘What happened with the Hunter Biden story suppression by Twitter will be published on Twitter at 5pm ET!’

Musk sent out the tweet announcing the publishing of the report around 4:00 pm on Friday

The South African billionaire followed that up with a message reading: ‘This will be awesome’ accompanied by a popcorn emoji.

He went on to say that the publishing will be accompanied by a live question and answer session. It’s not clear who will be featured in the session.

Musk said the publication of the internal Twitter documents was ‘necessary to restore public trust’ in the site, after it deliberately prevented users from sharing links to a front-page newspaper article about Hunter’s private life and his controversial business ties to Ukraine in the run-up to the 2020 election between Biden’s father and Donald Trump.

The New York Post first published documents and photos in October 2020 from Hunter’s laptop which he abandoned at a Delaware computer store a year earlier.

Sensational emails showed Hunter’s involvement in a multi-million deal with a Chinese oil giant, and references to Joe Biden allegedly having his own 10% stake in the deal.

They showed the then-Vice President met with Hunter’s foreign business partners, including an executive at Ukrainian gas firm Burisma.

The Post published excerpts of emails and photos from the laptop ahead of the 2020 election. But without authentication, they were widely dismissed as fake or ‘Russian disinformation’, and suppressed by social media sites including Twitter and Facebook.

DailyMail.com was the first to prove that the laptop and its files were real in April 2021, using a forensic analysis by top experts who founded the FBI’s cyber forensics unit.

Its contents then became a trove for outlets to report on.

In a November 2020 testimony to Congress, Twitter founder Jack Dorsey said: ‘We were called here today because of an enforcement decision we made against the New York Post based on a policy we created in 2018 to prevent Twitter from being used to spread hacked materials. This resulted in us blocking people from sharing a New York Post article publicly or privately.’

He continued: ‘We made a quick interpretation using no other evidence that the materials in the article were obtained through hacking, and according to our policy, we blocked them from being spread. Upon further consideration, we admitted this action was wrong and corrected it within 24 hours.’



Elon Musk said Twitter would be releasing files on its own ‘free speech suppression,’ in a tweet on Monday

 On Wednesday, Yoel Roth, the former head of trust and safety at Twitter admitted that the company made a mistake when censoring the Hunter Biden laptop story.

Roth resigned in November following Musk’s $44 billionaire takeover of the company. He said the authenticity of the New York Post’s laptop story was difficult for the social media company to verify, and it was quickly censored in October 2020.

Speaking at an interview with journalist Kara Swisher, Roth said: ‘We didn’t know what to believe, we didn’t know what was true, there was smoke—and ultimately for me, it didn’t reach a place where I was comfortable removing this content from Twitter.’

But it set off every single one of my finely tuned APT28 hack and leak campaign alarm bells. Everything about it looked like a hack and leak.’

Roth’s comments come as Musk is set to release files on Twitter’s ‘free speech suppression,’ which is expected to include details on the censorship of the laptop story.

John Paul Mac Isaac, the owner of the computer store where Hunter abandoned his laptop, gave a copy of its hard drive to Donald Trump’s lawyer Rudy Giuliani in September 2020.

Giuliani reportedly leaked documents and photos from the drive to the New York Post, and also gave a whole copy of the drive to Trump’s former advisor Bannon and his podcast co-host Maxey.

The Post published excerpts of emails and photos from the laptop ahead of the 2020 election, but without authentication, they were widely dismissed as fake or ‘Russian disinformation.’

DailyMail.com eventually proved that the laptop and its files were real, and its contents became a trove for outlets to report on.

Roth repeatedly claimed on Wednesday that despite the alarm bells ringing, he never believed the story should’ve been censored.

So it was a mistake?’ Swisher asked.

In my opinion, yes,’ he responded.

Elon Musk is expected to disclose the full details of Twitter’s 2020 censorship of the New York Post’s reporting on Hunter Biden’s laptop

Twitter’s former head of trust and safety noted that social media platforms were on high alert in 2020, saying that both he and Meta CEO Mark Zuckerberg were warned by the FBI about foreign propaganda and misinformation ahead of the election.

Roth is the latest to criticize the company’s decision after former CEO Jack Dorsey said last year that it was a ‘total mistake.’

We made a total mistake with the New York Post, we corrected that within 24 hours,’ Dorsey said during a meeting with lawmakers. ‘It was not to do with the content, it had to do with a hacked materials policy, we had an incorrect interpretation.’

Both and Roth and Dorsey have not said who it was that ultimately oversaw the censorship of the story.

Democrats lawmakers blasted Twitter for failing to censor MORE content after New York Post Hunter Biden laptop scandal – with lawmakers claiming ‘free speech isn’t absolute’ 



Elon Musk has released explosive files detailing how bosses at Twitter suppressed the New York Post’s factual story about Hunter Biden’s laptop in the run-up to the 2020 election. A Twitter thread shared with Musk’s blessing by author Matt Taibbi pinned the blame on Twitter’s former head of legal Vijaya Gadde, who was fired shortly after Musk bought the firm last month. Taibbi says many top Twitter bosses immediately knew they’d overstepped the mark in censoring the Post’s story, but that they did not have the ‘guts’ to immediately reverse their decision.

The FBI is broken’: GOP drops 1,000-page report saying Bureau is ‘rotten at its core’, manipulated domestic violent extremism stats for political purposes, and deliberately downplayed ‘serious allegations of wrongdoing’ from Hunter Biden



Republicans on then House Judiciary Committee released a 1,000-page report on the politicization and misconduct in the FBI. The damning file said the bureau is ‘rotted at its core’, manipulated domestic violent extremism statistics for political purposes and downplayed investigations and ‘serious allegations of wrongdoing’ levelled at Hunter Biden. ‘The Federal Bureau of Investigation, under the stewardship of Director Christopher Wray and Attorney General Merrick Garland, is broken,’ the GOP report states. ‘The problem lies not with the majority of front-line agents who serve our country, but with the FBI’s politicized bureaucracy.’

 Big Tech lawsuit has uncovered one of the most disturbing revelations yet about social media companies’ collusion with law enforcement agencies to police speech on the Internet.

Missouri Attorney General Eric Schmitt, one of the attorneys general that filed the lawsuit, disclosed an overview of FBI agent Elvis Chan’s testimony on ‘weekly meetings’ about censoring Internet posts ahead of the 2020 election.

In our deposition of FBI agent Elvis Chan on Tuesday, we found that the FBI plays a big role in working with social media companies to censor speech – from weekly meetings with social media companies ahead of the 2020 election to asks for account takedowns,” Schmitt wrote in a Twitter thread.

Chan, the FBI’s FITF, and senior CISA officials had meetings with social media companies in the lead-up to the 2020 election, in which Chan personally told the social media companies that there could potentially be a Russian ‘hack and leak’ operation shortly before the election,” he continued. “Those meetings were initially quarterly, then monthly, then weekly heading into the 2020 election.”

Chan stated that the FBI regularly sent social media companies lists of URLs and social media accounts that should be taken down because they were disinformation from ‘malign foreign influence operations’,” Schmitt went on. “The FBI then inquired whether the platforms have taken down the content. On many occasions, the platforms took down the accounts flagged by the FBI.”

Chan testified because of the agent’s extensive knowledge of the FBI’s interaction with social media companies, the judge in the case stated.

Chan had authority over cybersecurity issues for the FBI in the San Francisco, California region which includes the headquarters of major social-media platforms and played a critical role for the FBI in coordinating with social-media platforms related to censorship,” Judge Terry A. Doughty wrote in his court order.

Even if Chan played no role in the Hunter Biden laptop communication issue, he may have knowledge of who did, and his deposition is nonetheless warranted,”

On Friday night, Twitter released a trove of internal documentation about the social media platform’s coordination with Biden campaign staff and DNC officials ahead of the 2020 election. But one thing was missing, as pointed out by New York Post columnist Miranda Devine.“Elon Musk half-delivered on his promise to tell all about Twitter’s censorship of The New York Post’s Hunter Biden laptop story before the 2020 election,” Devine said. “What was missing were details of specific warnings we know the FBI made to Twitter about a Russian ‘hack and leak operation’ involving Hunter during their weekly meetings with top executives of the social media giant in the days and weeks before The Post published its exclusive bombshell.”

We know that FBI Supervisory Special Agent Elvis Chan testified Tuesday in a lawsuit against the Biden administration brought by Republican attorneys that he organized those weekly meetings with Twitter and Facebook in San Francisco for as many as seven Washington-based FBI agents in the run-up to the 2020 presidential election,” she noted.

Taibbi said he had been shown no evidence of the collusion between the FBI and Twitter that we know occurred,” she added.

Although several sources recalled hearing about a ‘general’ warning from federal law enforcement that summer about possible foreign hacks, there’s no evidence — that I’ve seen — of any government involvement in the laptop story,” Taibbi remarked.

But we know from Mark Zuckerberg’s interview with Joe Rogan, and subsequent testimony before Congress, that the FBI was deeply involved in policing information ahead of the 2020 election, especially the Hunter Biden laptop story.

So, we took a different path than Twitter,” Zuckerberg said. “I mean, basically the background here is the FBI, I think, basically came to us some, some folks on our team and was like, ‘Hey just so you know, like you should be on high alert. There was… we thought that there was a lot of Russian propaganda in the 2016 election. We have it on notice that basically there’s about to be some kind of dump of — that’s similar to that. So just be vigilant.’”

So our protocol is different from Twitter’s,” he went on. “What Twitter did is they said ‘you can’t share this at all.’ We didn’t do that. What we do is we have — if something’s reported to us as potentially misinformation, important misinformation, we also use this third party fact-checking program, ’cause we don’t want to be deciding what’s true and false. And for, I think it was five or seven days when it was basically being being determined, whether it was false, the distribution on Facebook was decreased, but people were still allowed to share it. So you could still share it. You could still consume it.”

Can we say the distribution is decreased… how does that work?” Rogan asked.

It… basically the ranking in newsfeed was a little bit less, so fewer people saw it than would’ve otherwise,” Zuck replied.

By what percentage?”

I don’t know off the top of my head,” Zuck answered. “But it’s meaningful. But I mean, basically a lot of people were still able to share it. We got a lot of complaints that was the case. You know, obviously, this is a hyper-political issue. So, depending on what side of the political spectrum, you either think we didn’t censor it enough or censored it way too much. But we weren’t sort of as black and white about it as Twitter, we just kind of thought, ‘Hey look, if the FBI — which I still view as a legitimate institution in this country, it’s like very professional law enforcement — they come to us and tell us that we need to be on guard about something.’ Then I want to take that seriously.”

Did they specifically say you need to be on guard about that story?” Rogan asked.

No, I don’t remember if it was that specifically,” Zuckerberg said. “But… it basically fit the pattern.”

But Facebook wasn’t done doing the Democratic Party favors during the 2016 election. Multi-billionaire owner Mark Zuckerberg spent hundreds of millions on “Zuckerberg boxes” that disproportionately benefited Democrats, as the Thomas More Society documented in a 2020 report.

Thus, Twitter, Facebook, and Big Tech companies like it, acted like censors for the United States government instead of private, independent companies. The actions raise serious questions about constitutional violations of Americans’ rights, respect for freedom of the press, and 2020 election interference.



HIRED TO KILL – THE CYBER ASSASSINS HIRED BY WHITE HOUSE STAFF



- A Report To Federal Investigators And The Public


A group of companies and individuals sell cyber assassination services designed to end people’s lives. When we spoke with California Senators Speier, Pelosi, Feinstein and Harris; their staff said that they refuse to regulate such activities because it would violate “Freedom Of Speech”. We also noticed that THEY hire these cyber assassins to attack political enemies, reporters, competitors and whistle-blowers. We asked about that conflict-of-interest. They did not respond... We then asked: “If it is OK for these people to engage in the attacks listed herein, (see the ATTACKERS PLAY-BOOK list; Below), are you OK with them doing all of these things to YOU for the next 5 years?”

They did not respond...

The attackers, (ie: The White House and Government agency staff) set-up a tentacular, layered, covert payment and command/control system in order to operate and disguise their attacks on citizens, reporters, whistle-blowers and competitors. The problem, for these “Bad Guys” in the post-2000 era, is that nothing can be hidden, any longer, because digital technology monitors everything. It is said that “DEEDS DONE IN THE DARK, ALWAYS COME TO LIGHT” and, in this case, that turns out to be quite accurate.

Have you ever wondered who’s pulling the strings?”

Hired cyber assassins hide in the shadows at the tip of the spear of political and market monopoly wars. ... Anything they touch is a weapon. They are government-trained to deceive, persuade, change, influence, and inspire others to their ideology. They come in many forms: from fat gamer neck-beards to attractive business suit corporate brunettes. They are everywhere that money buys vengeance.

They spy on you to manipulate your politics, ideology and intentions and to report you to bill collectors, tax colletors, investigators and political parties. The spy, on, and harm you and your company if you speak out about corruption and if your product is better than their bosses product. They help peole who cheat rather than compete.

Google, Netflix, YouTube, Facebook, etc. exist to mass manipulate populations and run stock market scams for their sociopath owners. Even these big companies covertly sell their services as cyber assassins to certain buyers for huge amounts of government wire transfers. From INSIDE Google, our team saw Google manipulate the entire internet to hype up Larry Page’s “boyfriend’: Elon Musk and Tesla, which Google execs owned a portion of, while sabotaging Tesla’s competitors. Google illicitly and illegally timed these manipulations with stock market pump-and-dump efforts to exploit insider trading. That is a felony violation of RICO, Antitrust and other laws. Every single thing that Google does is contrived to harm a competitor, a politician, an employee whistle-blower or some other business adversary.

There are no “bugs”, “operator errors”, “server anomalies” or other media “accidents” at Google, Facebook, Youtube, Twitter, et al















Everything Google, etc, does is contrived, at a psychological warfare kind of level, to change a social perception. Google must show its software to FBI, SEC, FTC and our search engine optimisation experts to prove that they did not engage in these crimes. The fact is: We can prove they did the crimes and FBI experts can help us prove it! Google is known as the “Nazi’s of the Internet”.

In a case unfolding in Britain over whether Google wrongly demoted price comparison rival Foundem from its search results in favour of paid-for adverts, Google must now decide which it values more: the algorithms that rank its search results, or its stance that manually fiddling with those results to promote its own paid-for products over rivals’ sites doesn’t break competition laws.

The integrity of Google’s ranking processes relies upon all webmasters or website owners having the same degree of access to information about Google’s ranking… This will no longer be the case if information of this kind is made available to some individuals offering commercial services to assist companies to improve their Search ranking.

Google is a criminal operation. It’s executives have been publicly exposed as participants in horrific sex scandals, money laundering, political bribery and racism. It is time for the bought and paid shill politicians to stop protecting them! – Google spies on competitors and steals their technology – Google runs tens of millions of dollars of defamation attacks against competitors – Google hides all media and news coverage for competitors of Larry Page’s boyfriend: Elon Musk – Google lies to the public about what they really do with the public’s data –

Google promotes illegal immigration in order to get cheap labor and control votes – Google runs VC funding back-lists against start-ups that are competitive – Google bribes thousands of politicians – Google is a criminal RICO-violating monopoly – Google rigs the stock market with Flash-boy, Pump/Dump and Microblast SEC violating computer tricks – Google pays bribes to politicians in Google and YouTube stock – Google manipulates who gets to see what web-sites, globally, for competitor black-lists – Google has a “no poaching” Silicon Valley jobs blacklist –

Google bosses sexually abuse women and young boys – Google bosses run sex trafficking operations in the Epstein and NXVIUM cults – Google bosses control the NVCA financing cartel over start-ups – Google has placed the majority of the corporate staff in at least one White House – Google controls national elections for anti-competitive purposes – The company “Polyhop”, in the HOUSE OF CARDS tv show, does all the crimes that Google actually does in reality – Google’s law firms, like Wilson Sonsini, are corrupt conduits for payola and political conduit-relays –

Google bribes some politicians with revolving door jobs – Google is primarily responsible for destroying the Bay Area Housing opportunities – Google runs DDoS attacks on competitors by massively crawling their sites – Google boss Andy Rubin runs a sex slave farm according to his own family – Google boss Eric Schmidt was a philandering sex-penthouse owner according to vast news articles – Google executives hire so many hookers that one of them, Mr. Hayes, was killed by his hooker –

Google executives sexually abuse so many women that the women staff of Google walked out one day – In the 2009 White House, you could not swing a cat without hitting a Google insider – Google has paid covert bribes, PAC funds, real estate and search rigging payola to every CA Senator – Google has paid bribes, through its lobby fronts, to halt FBI, SEC, FEC and FTC investigations of Google crimes – Google was funded by the CIA, via In-Q-Tel, a so called “501 c3 charity” which was caught with tons of cocaine – Google gets millions of dollars of taxpayer cash for spying on Americans inside the USA – Google’s map service was a spy system paid for by taxpayers money that Google now profits off of –

Nancy Pelosi and Dianne Feinstein have promised to “protect” Google because their families profit off Google stocks – Payment receipts prove that Google and Gawker/Gizmodo exchanged cash and staff for Character Assassination attacks – Google VC’s and bosses have spent $30M+ rigging the U.S. Patent Office to protect Google and harm Google competitors –

Google bribed it’s lawyer into position as head of the U.S. Patent office in order to have her protect Google – To rig insider stock trades, Google hides negative Tesla stories and pumps positive Tesla stories on “push days” – Google and Elon Musk Co-own, co-invest and co-market stocks covertly while running anti-trust schemes – Google rarely likes, or hires, black employees per federal and news media investigations – Google hired most of the Washington, DC K Street lobby firms and told them to “do what ever they could” – The film: “Miss Sloane” depicts only 2% of the illicit lobbying tactics Google employs daily –

Demands for an FTC and FBI raid of Google, for criminal activity, securities law and election felonies have been filed – Google’s David Drummond had his Woodside, CA Quail Road house bugged revealing sex and financial misdeeds – Google, and it’s Cartel (Alphabet, Youtube, and hundreds of other shell-company facades) are a criminal organization engaged in felony-class crimes. Google’s bosses bribe politicians, regulators and law enforcement officials to hold off prosecution.

At Google: Kent Walker, Andy Rubin, Larry Page, Eric Schmidt, Sergy Brin, Jared Cohen, Yasmin Green, David Drummond and Ian Fette are so enmeshed in sex scandals, election manipulation, and White House bribes that it is hard to comprehend how they can get any legitimate work done. Google executives came from most of the fraternity houses involved in the college rape scandals. Google sells covert character assassination services to politicians and fellow oligarchs. Youtube/Google/Alphabet/Deep State are all the same entity. They conspire to hide news about their corruption and they control most of the internet.

There are hundreds of millions of people in America. The same 120 of them are all involved in operating the same crimes and corruption including: the Sony Pictures corruption; the Afghanistan rare earth mine scandals operated through The Energy Department political slush fund that involves the lithium battery cover-ups (headed by Elon Musk); the Big Tech Brotopia rape, sex trafficking, bribery, exclusionism, racism and misogyny issues they were taught at Stanford University; The Facebook – Meta – Google – Alphabet – Netflix, et al, coordinated news manipulation and domestic spying that they engage in; the hiring of Fusion GPS – Black Cube – Gizmodo/Gawker assassins; the destruction of the housing market by their mass real estate manipulations; patent theft and industrial espionage; and the bribery of almost every politician all the way up to the Oval Office.

So, while the categories covered in this investigation may seem diverse. They are connected through an enterprise of criminality and illicit, coordinated operations. We list, by name, the 120 most complicit individuals organizing these crimes, in the evidence documents already submitted to the FBI, FINCEN, DOJ, FTC, SEC, FEC, Congress, InterPol and other authorities. Digital financial tracking of those persons and all of their family members should be assumed to have been under way for some time. Wire-taps and device taps of those persons and all of their family members should be assumed to have been under way for some time.

Twitter, Splunk, Google, Facebook, Netflix, YouTube and the Silicon Valley internet Cartel serve you custom manipulated content by automatically creating a covert digital dossier on you reflecting the content consumption preferences they have spied on about you. They continually evolve their dossier on you in order to steer you towards their ideology and their Democrat political party. At these companies, “data mining”, “machine learning” and “AI” means computerized propaganda processing for certain political entities. They began hiring off-shore people (because they would work so cheap) but most of those people turned out to be Muslim. This created conflicts with the entire southern part of the United States (which is anti-Muslim) because those workers steered content to pro-Muslim positions.

Their spy dossier on you uses abstract content-specific features of the consumed content, such as categories, topic models, and entities, which they automatically extract using natural language processing by comparing every word you use to a giant computer library of what those words might mean about your psychology. So it’s like you are getting “mind-raped” without any penis use. Their assessment of what your words might mean is based on what rich, white male, $200K/year, DNC-promoting programmers think they might mean. Their computers scale and expand their tools with algorithmic software created by those politically and socially biased frat white boys that wrote the code. It is all biased as hell. They never hire blacks or women in system creation roles so everything these companies do only supports rich white soyboy snowflake type gamer thinking.

Because the White House told them to spy on billions of people, even for these web giants, it is impractical to store the entire dynamic history of a user’s interaction features. They, thus, out of greed, use algorithms that selectively decay information in order to generalize users and populations. To them, you are just a generalized data point, like cattle on a ranch, to be harvested and fed upon by Silicon Valley.

These cyber assassin attackers are often fired CIA staffers and disgruntled and naive news bloggers from Gawker, Buzzfeed, etc. They conduct influence activities to target psychological vulnerabilities and create or intensify fissures, confusion, and doubt in adversaries.

They use all available means of dissemination – from sensitive and high tech, to low-tech, to no-tech, and methods from overt, to clandestine, to deception.

These PSYOPS attackers are trained to confuse, mislead, redirect, and occupy your mind with thoughts that a targeted candidate, reporter or whistle-blower is “bad” or to be shunned.

They are ghosts in the machine, watching and warping everything to trick you into hating someone that might tell the truth about them, or their bosses,

A site known as The Vigilant Citizen suggests believes their intent may be darker, and possibly related to the occult. These allusions to magic are not merely figurative. PSYOPS extensively researched occult and supernatural phenomenons such as ESP (extra-sensory perception) and remote viewing,” Vigilant Citizen reports. “There was always a ‘magical’, supernatural element to PSYOPS. The 4th Psychological Operations Group has a Task & Purpose report which is a master class in psychological warfare. A big part of the attackers psychological operations is creating persuasive fake news media. One wonders who Americans should be most afraid of: foreign powers or their own government.

Law enforcement agencies, intelligence agencies and private investigators have identified these attackers complicit in this matter.

A lifetime analysis of the published work, payments and who paid them, often via covert payment routes, conducted at an FBI-level of research, reveals some pretty interesting illicit and overt connections between all of them. For example, the following chart shows a typical money-laundering, tax and government survellance evasion system for one of the attackers:




Figure 1: ONE OF A VAST NETWORK OF MONEY LAUNDERING, TAX EVASION, KILL SERVICE OPS NETWORKS




Figure 2: THERE ARE THOUSANDS OF BANKING RECORDS THAT SHOW THAT GAWKER AND GOOGLE TRADED CASH FOR KILLS




Figure 3: THERE ARE TENS OF THOUSANDS OF BANK, SEC, FINCEN, IRS AND OTHER RECORDS PROVING THE CASH MOVING THROUGH THESE EFFORTS WAS HUGE AND CAME FROM GOVERNMENT CONTACTS




Figure 4: THIS SHOWS THAT ONE OF THE ATTACKERS CLEARLY SELLS HIS SERVICES ON FACEBOOK AS AN "ASSASSIN"




Figure 5: ONE ATTACKER PAYMENT SCHEME HAD OVER 980 PASS POINTS VIA SHELLS, TRUSTS AND MONEY DROPS







While the thousands of graphics, that forensic investigators have acquired, provide a good visual tale of the crimes, corruption and attacks, the following text description of an FBI-level investigation is even more shocking. It is important to keep in mind that U.S. Government officials faxed, emailed, U.S. mailed and delivered the character assassination materials to their target’s employers, family, friends, associates, fiance and others, in order to maximize the harm to the targeted citizens.

All of the attackers got paid cash, stock perks, job advancements and other compensation. Here are some of the ways they hid the compensation transfers:

- “Based on publicly available FEC records, repeatedly throughout the 2016 presidential campaign, HVF would purportedly transfer funds to its constituent political committees, which included between 34 and 40 state parties,” the complaint states. “On the very same day each of these transfers supposedly occurred, or occasionally the very next day, every single one of those state parties purportedly contributed all of those funds to the DNC.”

- In New York City, No. 9 East 71st Street is a well-known sex mansion used to pay off politicians and operatives via sex favors

- On Nov. 8, Craig B. Hulet, a well known and highly respected analyst on government policy, terrorism, and international relations, spoke on Coast to Coast AM regarding the growing scandal involving a lawsuitagainst the Federal Reserve, major banks, and many members of the Bush and Obama administrations.  During his one hour interview, Hulet offered the assessment that many members of the Obama cabinet, including Hillary Clinton, Timothy Geithner, and Eric Holder, were resigning their offices due to their potential roles in the TARP money laundering lawsuit.

- Attorney General Jeff Sessions encouraged the DOJ to reopen the Uranium One case.  This indictment may be a byproduct of their investigation into the Clinton Foundation and Russia.  Fitton doesn’t think it’s coincidental that the DOJ under Obama was “hiding this in plain sight from the American people”, and certainly hiding “key elements” from congress.  Then the DOJ under “Jeff Sessions responds by saying we’re going to take another look at this.  There’s a new indictment to follow up on the indictment that is already out there, or a conviction… from 2015.” According to Fitton, this is a follow-up investigation that started in Little Rock Arkansas.  Both the FBI and the Attorney General are looking into pay to play allegations on the part of the Clinton Foundation. “One would hope Uranium One is part of it.”  He claims there were tens of millions of dollars that were laundered by the Russians through the Clinton Foundation.

- The Committee to Defend the President, a political action committee, filed its complaint with the FEC on Monday with the allegations that the Hillary Victory Fund (HVF) solicited cash from big-name donors, including Calvin Klein and “Family Guy” creator Seth MacFarlane -- money that was allegedly sent through state chapters and back to the DNC before ending up with the Clinton campaign.

- The FBI and FINCEN found that attacker David Brock, a professional cyber attacker and media assassin, has 7 non-profits, 3 Super PACs, one 527-committee, one LLC, one joint fundraising committee, and one unregistered solicitor crammed into his office in Washington DC.

Uncovered records expose a constant flow of money between these organizations. The Bonner Group, his professional solicitor, works off a commission.  Every time money gets passed around, Bonner receives a 12.5% cut. It appears that Brock has been passing around donations quite a bit, giving The Bonner Group a handout each time. In 2014, Media Matters for America raised $10,021,188. The Bonner Group was credited for raising these funds.  Media Matters paid them a $1,147,882 commission. That same year, Media Matters gave a $930,000 cash grant to David Brock’s Franklin Education Forum, an organization that shares office space with Media Matters. In 2014, the Franklin Education Forum reported $994,000 in total contributions.  93.6% of that total came from Media Matters! Surprisingly, though, the Franklin Education Forum gave full credit to Bonner for raising that money.  They paid the fundraiser a $124,250 commission in 2014! As all of these groups exist within Brock’s DC office, it would be difficult for him to claim he had no idea this was going on. The report continues:  Furthermore, the New York Times reports that David Brock shares a summer rental in the Hamptons with Mary Pat Bonner, the President of the Bonner Group!

The above quoted sections of investigations are not the exception but, rather, the rule in money-laundering and covert payola to attackers. We have over 200,000.. let me repeat, OVER TWO HUNDRED THOUSAND OTHER EXAMPLES OF THESE ILLICIT PAYMENT SCHEMES TO POLITICAL AND ANTI-COMPETITION ATTACKERS FINANCED, SUPPORTED, ENABLED AND OPERATED BY THE U.S. GOVERNMENT! These payments occer in government offices DAILY! Government officials do not halt these methods, stop stock ownership by politicians, or delay this money laundering because THEY PROFIT FROM IT. That is WRONG, ILLICIT, CRIMINAL and a VIOLATION OF THE BASIC PRECEPTS of AMERICA!

A lifetime analysis of the published work, payments and who paid them, often via covert payment routes, conducted at an FBI-level of research, reveals some pretty interesting illicit and overt connections between all of them.



THE NAMES OF THE ATTACKERS



These are the people that the tech oligarchs, The White House and U.S. Senators hire to end your life if you report their crimes. It should be against the law for these cyber assassination kill services to even exist, but Congress won't outlaw them because Senators use them every day. If they can do the things they do, to you, then it must be legal to do the same things back to them. While they spend millions of dollars and get paid millions of dollars to destroy you, the average person only has a fraction of that money, if any at all, to fight back with. Since they are hired to destroy you, you have every right to destroy them...as long as you do it legally and in the most creative and insidious ways possible. In payback for accepting compensation for trying to destroy you and your family, they must be hunted and tracked for the rest of their lives! Criminal referrals and RICO charges appear to have been filed against every party on this list:

Congressional and FEC investigators have a big question here. The big question is: If the people, above, are manipulating public elections with information trickery: IS THAT TREASON?

Because almost every one of them coordinated to attack others and their businesses, they broke the RICO Racketeering and anti-trust laws in America! In an FBI interview, it is believed that every person on this list would be implicated in charges when asked, under oath: "ARE YOU, OR HAVE YOU EVER HIRED, A CYBER ATTACKER?"

These were not just ‘some people’ who wrote something mean on a Facebook post. They had exclusive publishing resources on a national and global network that they systematically, and in a highly coordinated manner, operated on in exchange for compensation, to harm and attack specific targets that they were instructed to harm.

More names will be forthcoming as investigators complete their reviews.

ATTACKERS Daniel Jones, Michael Sussmann, Nicholas Guido Denton, John Herrman, Adrian Covert, Media Matters, John Cook, Ian Fette, Gabrielle Darbyshire, Patrick George, Eric Schmidt, Jay Carney and David Axelrod have already been placed under federal surveillance for some time. TARGET will request their case records from the FBI, FINCEN, Interpol, The NSA, The IRS, their banking and stock market accounts, and other sources, which will prove the assertions about their attacks, who hired them and the top-level command-and-control authority over their actions.

THE REPRISAL ATTACK TOOLS USED ON AMERICAN CITIZENS – THE ATTACKERS PLAY-BOOK:



HARM #1: MANIPULATION AND BLOCKADE OF TARGET's EARNED GOVERNMENT FUNDS

In a typical reprisal case a Plaintiff (also known as a “TARGET”) applied for government SSDI and a HUD home certificate. SSA stated that all of TARGET’s disabling conditions existed but that TARGET must confirm they will last more than a year. TARGET's SSDI and HUD certificate were blockaded by Pelosi and Feinstein in reprisal for TARGET helping law enforcement on anti-corruption investigations that involved Pelosi, Feinstein and their political financial backers.
California Senators, all of whom have vast documented court and news report records of hiring attackers from spy agencies for reprisal attacks on whistle-blowers, used their resources to stop all funding in the TARGET’s SSDI funding as reprisal for whistle-blowing. They got SSA to say that TARGET WAS permanently disabled, but that because he could not work, he lost his SSA credits waiting the one year and one day that SSA required to prove that his disabilites would last longer than a year. Dianne Feinsteins own staff and family, who had cohabitated with TARGET, confessed to these ‘dirty-tricks’ actions as reprisal for TARGET’s testimony accidentally cutting off $120 million+ of potential profit the family expected. Her staff have been exposed by CIA staff as “the masters of dirty tricks reprisals...even as good as the ones we (THE CIA) pull off..”

Another time, a TARGET applied for his HUD Mortgage coupon. He was forced to wait 15+ years and he still has not received it after over 100 inquiries as to the status. City and County officials have stated that they have “never seen it take so long”. According to all experts, the only way it could have been stone-walled this long is if a public official (ie Feinstein, Pelosi, Harris...) had ordered it slow-walked as part of the politial reprisal attacks on TARGET. Three different counties have checked on this and said that TARGET's records ‘went missing” in a Lois Lerner type of error set.

The cut-off of TARGET’s finances and benefits coincides, exactly, with his whistle-blower testimony AND to the reprisal threats and promises by THE ONLY PEOPLE IN THE WORLD capable of accomplishing such state-sponsored attacks. The ATTACKERS were the only entity with the means, the motivation and the proven history of such actions on a regular historical basis.

Feinstein’s current and former staff members (See the Dossier on Daniel Jones) (See the fact that TARGET lived with, dined with and partied with her family and senior staff) have stated that the Feinstein and Pelosi offices commonly order citizens government funding to be cut off as political reprisal. The White does it almost every other day. In this case they did it to TARGET at least three times.
TARGET, had an industry standard pay rate of $10,000.00 per month, based on Salary.com, his high highest recorded salary and accomplishment records in Silicon Valley contrasted with the salaries of less experienced executives at Google, Facebook, Netflix and Tesla. The U.S. Government states, via all of its agencies, that the minimum survivable cost-of-living in the Bay Area is $3200.00 per month. By intentional actions of government officers, in reprisal, TARGET's income was reduced to $300.00 per month for most of the past decades. Two SSA officials confessed to assisting in hit jobs on him including Mario U from the San Mateo SSA office and an official who worked at the San Francisco SSA office and who then went to work for a Senator who assisted in the attacks on TARGET. When asked for TARGET’s medical records SSA sent a huge number of medical records for two strange women in massive violation of federal medical privacy rights. The SSA Inspector General has shown TARGET thousands of cases of politicians using SSA for political reprisal punishments. FBI IT experts and ‘Black Hat’ hackers can hack into every SSA server in minutes and change records, files and decisions. Rahm Emanual, Nancy Pelosi and Dianne Feinstein can do it with a single phone call. It should be noted by the Court that EVERY background check file in AMERICA was hacked and stolen by China within a few hours and that every hacking tool of the NSA and CIA was hacked by Russia and posted on the internet. It is IMPOSSIBLE for anyone to ever assert that “nobody can hack SSA”. That would be a remarkable lie. In fact, TARGET has agency confimation that 95% of the Silicon Valley oligarchs entire family tax records, stock accounts, political payments and payola and pretty much everything that would destroy them, has been hacked and is in the hands of ICIJ (Panama Papers investigators), Propublica, FINCEN and pretty much everybody they would not want to have it.
The TARGET has demanded that the Court order SSA to award TARGET his full SSDI backpay from up to today, with interest, based on the fact that SSA was used to harm Plantiff as a reprisal tool. The Inspector General has proven this happens regularly and hundreds of other whistle-blowers are prepared to confirm this fact.



HARM #2: THREATS OF DEATH AND ACTUAL MURDERS OF PEERS

One TARGET has actually been attacked as enumerated below and has active cases with SFPD, FBI, OSC and other agencies. Twice TARGET's car was rammed. The first time the attacker performed a PIT maneuver, flipping TARGET's car onto the concrete median wall on the Freeway, causing massive damage. The attacker sped away. A car next rammed TARGET's parked car in front of his home and, at the same location, a man tried to drive has car through the fence into TARGET’s cottage. Two other times, strangers pulled up along TARGET, pointed at him and yelled “you are dead”. TARGET has received threats by email and voicemail and had dead animals tossed over his fence. Further proving the at-risk claims of TARGET. TARGET, and his peers, had contact with the following persons in the corruption case: Rajeev Motwani; Gary D. Conley; Seth Rich; Philip Haney; David Bird; Doug Bourn; Misti Epstein; Joshua Brown; Kenneth Bellando; Moritz Erhardt; Imran Aliev; Kate Matrosova; David Drye; Vincent Foster; Kathy Ferguson; Duane Garrett; Eric S. Fox; Judi Gibbs; Berta Caceres; Suzanne Coleman; L.J. Davis; John Hillyer; Stanley Huggins; Sandy Hume; Shawn Lucas; Gary Johnson; John Jones; John F. Kennedy, Jr.; Stephen Ivens; Mary 'Caity' Mahoney; Eric Butera; Danny Casolara; John Ashe; Tony Moser; Larry Nichols; Joseph Rago; Ron Brown; Bob Simon; Don Adams; Peter Smith; Victor Thorn; Lori Klausutis; Gareth Williams; Daphne Caruana Galizia; James D Johnston; Dave Goldberg; Loretta Fuddy; Paul Wilcher; Gary Webb; Beranton J. Whisenant Jr; Stanley Meyer; Jon Parnell Walker; Tyler Drumheller; Barnaby Jack; Dominic Di-Natale; Barbara Wise; Ilya Zhitomirskiy; Jeff Joe Black; Robin Copeland; John Wheeler; Ashley Turton; Michael Hastings; Antonin Scalia; David Koschman; David Werner; Alex Okrent; Kam Kuwata; Larry Frankel; And hundreds more connected to this case who suddenly, and strangely, turned up dead in this case and, ironically, their deaths all benefit the suspects in this case….Rajeev Motwani taught Google how to Google. Suddenly, in perfect health, he was found floating face-down, dead, in his Silicon Valley swimming pool. It helps certain people that he can no longer talk. Gary D. Conley was the CleanTech competitor to, and whistle-blower on, the suspects. He was suddenly found with a bullet in his head behind Beale Air Force base. It helps certain people that he can no longer talk. He TOLD TARGET that someone from Google was going to kill him. Google programmer Forrest Hayes, who worked on Google search engine rigging, was suddenly found dead with the story that “he was overdosed by a Google hooker on his sex yacht”. Google associate and Tesla Investments founder Ravi Kumar was also killed by his hooker. Deep Google investor VC liason and husband of Facebook executive Cheryl Sandberg was suddenly found dead with a hole is his head. The “official” story is that he was the first person in history to be killed by his treadmill. David Bird was the Wall Street Journal energy reporter who was working on a story that involved Cleantech energy connections of some of the suspects. He was working on a story about who controlled the modern energy industry and cleantech. He went for a walk and was found a long time later, dead, floating in a pond. It helps certain people that he can no longer talk. One Mr. Breitbart was a famous blogger, who railed on the web about the political manipulations of the suspects. Suddenly, he had a "heart attack" in his shower and died. It helps certain people that he can no longer talk on the blogs. Mr. Karl Slym , with Tata Motors was involved in a car deal with some of the suspects for one of the biggest Indian auto-makers. Suddenly he was a stain on the sidewalk, accomplished by his fall from the top of a skyscraper hotel. It helps certain people that he can no longer talk. Doug Bourn, The senior electrical engineer at Tesla (Google's covert partner), Andrew Ingram of Palo Alto, a top systems electrical engineer at Tesla; and Brian M. Finn the senior manager of interactive electronics, at Tesla, had deep knowledge of financial misdeeds and technical cover-ups at Tesla Motors. They were key parts of the Tesla operation. For some reason, they all got into a private airplane, in perfect health, and then the airplane plowed into the ground, killing all three at once. It helps certain people that they can no longer talk. They wrote, and helped describe, in Tesla's own federal patent filings, the fact that Tesla's batteries would kill you, maim you and/or burn your house down. Tesla did not realize this when they paid the federal patent filing fees. When Tesla, later realized this, they were forced to give all of their patents away for free. These three senior engineers had deep inside knowledge of the Tesla Motors operations. Their aircraft suffered an "Engineering failure". This case involves potential crimes by two Presidents of The United States, their staffs, U.S. Senators and the Silicon Valley oligarchs that financed and controlled them, two wars and trillions of dollars of manipulated U.S. Treasury monies and stock marke monies. How could anyone think this was NOT a life-endanging situation for the TARGET?



HARM #3: THE GOVERNMENT DEFRAUDED A TARGET OVER AND OVER:

HARM #4: THE PLACING OF MOLES AND SPYING ON TARGET:

HARM #5: BLOCKADES OF TARGET’S ACCESS TO LEGAL COUNSEL:

HARM #6: HIRED CHARACTER ASSASSINATION AND DEFAMATION SERVICES THAT The ATTACKERS USED TO DESTROY TARGET’S LIFE

Google knew one TARGET personally. The TARGET went to school and events with the founders. It was a lie for Google and YouTube to say over-and-over that they never heard of TARGET so they “can’t remove the attacks because it is ‘just how their algorithm works’…” The founder’s teacher: Rajeev Motwani, revealed to TARGET that Google manually sets all of their key search results BY HAND. Rajeev died was murdered for telling the truth about Google’s insidious plans and internet manipulations. Investigators suspect shell fish toxin or a reverse taser-like electronic heart-attack inducing defibulator device was used to kill him.

TARGET's charges proved that Google manually rigs search results based on cronyism and that Google/YouTube lied to Congress about not doing so. This allowed TARGET to drive U.S. agencies and State AG’s to sue Google/Alphabet/Youtube for being lying, manipulate, society-abusing, child-killing, monopolistic monsters. Even though the Google/Gawker/Gizmodo produced and hosted attack articles and animated videos were completely discredited as a “character assassination hatchet job paid for by politicians”; by every known expert, The ATTACKERS still post them on their servers with hidden “P8” codes covertly embedded in the search engines to trick the public, in front of 7 billion internet readers as “payback”, in order to operate their reprisal attacks. No other servers or publishers in the world host and lock this attack media on their search results EXCEPT The ATTACKERS MEDIA COMPANIES. This ALONE would seem to prove that The ATTACKERS did the harms that they are charged with doing as The ATTACKERS are the only ones running, hosting and operating the attacks on TARGET on all of Earth!


TARGET has, over and over, demanded that the FBI, POLICE, FINCEN and other enforcement investigators reveal what they discovered when they traced the compensation routes and command-and-control management of these attackers. TARGET demands that this Court order the FBI, FINCEN and the NSA to reveal those compensation path records on the attackers from their investigations.

One might wonder why it has been so hard to get this information from the authorities. If the FBI reveals that the path-of-compensation goes from Adrian Covert, Nicholas Guido Denton and John Herrman right to the Oval Office in the White House, then the question is asked and answered. White House staff members Jay Carney, David Axelrod and Robert Gibbs have said “maybe”. White House staff insider Jofi Joseph has said “without a doubt”. Rahm Emanual’s White House staff say that, while in the White House, Rahm ordered all kinds of hit-jobs on whistle-blowers.
Gawker Media and Gizmodo Media have engaged in the origination of, production of and global broadcast of compensated character assassination videos and articles as a reprisal-service-for-hire (like Fusion GPS, Black Cube, Black Water and other related services) because we were FBI and GAO witnesses against Gawker and Gizmodo financiers. As 1.) the only publishing group on Earth to have engaged in such attacks and 2.) since the attacks were financed by complainants business competitors and 3.) since adversaries own staff have admitted to the scheme and 4.) since communications, FBI records and previous litigation records prove complainants assertions, complainants are justified in their demands.

The attacks and broadcast of multiple defamation attack articles and videos by Gawker Media, Google, YouTube and Gizmodo Media has been operating as recently as this today, thus the statutes of limitations are not exceeded. Well known U.S. government political figures and political financiers hired Gawker Media, Gizmodo Media and “Nick” Denton to undertake these ongoing attacks and to manipulate web servers to operate those attacks globally and permanently. The attackers hired Gawker Media, Gizmodo Media, “Nick Guido Denton”, Univision/Unimoda, Google and YouTube (essentially all the same people) to engage in reprisals because of the TARGET’s testimony against the Cartel in federal investigations and because the TARGET had superior technologies that the attackers could not compete with. Transaction documents showing payments between the “bad guys” in this case, were recently uncovered in other court cases.

Defendant adversaries produced a series of videos and defamation articles and used internet server technology tricks to place those attack materials in front of 7.5+ billion people day after day, year after year, refreshing the attack daily. This is, essentially, a “hit-job” service that Univision provides as a side gig through it’s TV networks and it’s offensive tabloid brands of: Gizmodo, Jalopnik, Jezebel, Gawker and other Univision/Unimoda assets along with it’s partnership with Google for the operation of such attacks. “Univision uses this service as a political-payback tool for politicians as well as an anti-trust violating anti- competition tool for its clients”, claim TARGET's. The TARGET's are informed and believe and, based on that information and belief, allege that the named The ATTACKERS herein and each of the parties designated as a “DOE” and every one of them, are legally responsible jointly and severally for the Federal RICO Statute violating events and happenings referred to in the within Complaint for Intentional Interference with Contractual Relations, Intentional Interference with Prospective Economic Advantage, Cyberstalking, Fraud, Invasion of Privacy, Unfair Competition and Theft of Intellectual Property and RICO statute violations. In particular, The ATTACKERS took compensation for, and engaged in, malicious and coordinated tactics to seek to destroy, damage, harm and ruin TARGET's via an illicit media “hit-job” service which The ATTACKERS regularly offered in covert commerce and engaged in regularly against targets that The ATTACKERS were hired to seek to ruin as part of reprisal, vendetta, retribution programs operated for business and political competitors of the targets. Historical facts and other history-making lawsuits by third parties, has proven The ATTACKERS to be the single largest core violator of human rights, in this manner, in the world. The ATTACKERS offer the service of creating and publishing contrived “hatchet job” movies, fake news articles, faked comments and repercussion backlinks describing the TARGET's in horrific descriptors. The ATTACKERS media holdings manipulate national elections.

Let’s be clear on this: TARGET does swear, warrant and certify that Google, Facebook, YouTube, The Elon Musk Group, Twitter and Linkedin plan and operate the conscious and manual manipulation of national American elections and international elections.

The attack material is reposted, “impression accelerated”, “click-farm fertilized” and Streisand array cloned over-and-over by The ATTACKERS massive character assassination technology via servers, algorithms and technical internet manipulation, daily, as recently as yesterday. The ATTACKERS also embed the article in job hiring databases on Axciom, Palantir, Taleo and other databases used by all hiring and recruiting services in order to prevent TARGET's from ever receiving income for W2 or 1099 work ever again. The ATTACKERS own staff then post thousands of fake comments, below each attack item, under fake names, designed to make it appear as if a broad consensus of the public agreed with the defamation messages by The ATTACKERS. Almost all of the fake comments were created by a handful of The ATTACKERS own staff pretending to be a variety of outside voices. The ATTACKERS provide the service of delivering “weaponized text and media to corporate clients”. The ATTACKERS replicated various versions of these attack items across all of their different brands and facade front publications and addedadditional fake comments to each on a regular basis.

The ATTACKERS have formed a business and political and industry manipulation “Cartel”. The bosses of the the ATTACKERS intended to inflict corruption upon the United States Federal Government, The State Government and the California State authorities, as defined by law under RICO Racketeering Statutes for the purpose of manipulating the value of stock market holdings and controlling political policy decisions.

In exchange for financing, The ATTACKERS Clients gave The ATTACKERS Associates business monopolies and government contract monopolies and media distribution exclusives worth trillions of dollars. This was an illegal quid-pro-quo arrangement. TARGET's designed, produced, received patent awards on, received federal commendations for, received federal funding for and first marketed the very products which The ATTACKERS copied and made billions of dollars on and which The ATTACKERS felt might beat them in hundreds of billions of dollars of competitive market positions and stock market trades. Companies operated by TARGET's included automobile design and manufacturing companies, global television broadcasting companies and energy companies which are commonly known to have generated hundreds of billions of dollars in profits, revenue and stock market transactions for The ATTACKERS competing holdings at TARGET's expense. The ATTACKERS operated a criminal CARTEL as defined by RICO LAWS and that Cartel ran an an anti-trust market rigging and crony political payola operation. The ATTACKERS spent tens of millions of dollars attacking TARGET's because The ATTACKERS were not clever enough to build better products. The ATTACKERS chose to “CHEAT RATHER THAN COMPETE” and to try to kill TARGET's lives, careers, brands, revenues, assets, businesses and efforts via malicious and ongoing efforts.

The U.S. Attorney General has been informed, in writing, of these charges and TARGET's understand that DOJ officials have an ongoing investigation into these matters.Under investigation for these crimes, New York State attorney general Eric Schniderman was recently forcedto quit over corruption and sexual cult charges involving the NXIUM group and related matters.

Due to The ATTACKERS fears of the loss of up a trillion dollars of crony payola from their illegal abuse of taxpayer funds, The ATTACKERS engaged in felonious actions in order seek to intimidate others.

Just as, over time, the Watergate crimes are now intimately documented and detailed; over time The “Cleantech Crash Scandal” as featured on CBS News 60 MINUTES TV Show, has

been detailed and exposed in numerous federal, news media and public investigations. Significant barriers to justice were illicitly placed in front of TARGET's by The ATTACKERS.

The ATTACKERS organized and operated a series of malicious attacks and thefts against TARGET's as reprisals and competitive vendettas. The ATTACKERS report to the FBI, GAO, FTC, SEC,

Congressional Ethics Committees, The White House and other entities on a regular basis.

The ATTACKERS and their associates Elon Musk, Jon Doerr, Eric Schmidt, Larry Page, Steve Jurvetson, Vinod Khosla and other members of the “Silicon Valley Cartel” are documented in tens of thousands of news reports, federal law enforcement reports and Congressional reports in their attempts to infiltrate and corrupt the U.S. Government in an attempt to route trillions of tax dollars to The ATTACKERS private accounts. The ATTACKERS perceived TARGET's as a threat to their crimes. Federal investigators, news investigators and whistle-blowers have reported to TARGET's that The ATTACKERS were the financiers and/or beneficiaries and/or command and control operatives for the crimes and corruption disclosed in the CBS NEWS 60 Minutes investigative reports entitled: “The Cleantech Crash”, “The Lobbyists Playbook” and “Congress Trading on Insider Information”; The Feature Film: “The Car and the Senator” Federal lawsuits with case numbers of: USCA Case #16-5279; and over 50 other cases including the ongoing “Solyndra” investigation and federal and Congressional investigations detailed at:

http://greencorruption.blogspot.com

and

https://theintercept.com/2016/04/22/googles-remarkably-close-relationship-with-the-obama-white-house-in-two-charts/



and thousands of other documentation sites. TARGET's are charged withengaging in these crimes and corruptions against TARGET's and financing and ordering attacks on TARGET's. TARGET's engaged in U.S. commerce and did everything properly and legally. Unlike The ATTACKERS, TARGET's did not steal technology. Unlike The ATTACKERS, TARGET's did not bribe elected officials in order to get market exclusives. Unlike The ATTACKERS, TARGET's did not poach The ATTACKERS staff. Unlike The ATTACKERS, TARGET's were the original inventors of their products. Unlike The ATTACKERS, TARGET's did not operate “AngelGate Collusion” schemes and “High Tech No Poaching Secret Agreements” and a Mafia-like Silicon Valley exclusionary Cartel. Unlike The ATTACKERS, TARGET's did not place their employees in the U.S. Government, The California Government, The U.S. Patent Office and The U.S. Department of Energy in order to control government contracts to The ATTACKERS exclusive advantage. Unlike The ATTACKERS, TARGET's did not place moles inside of competitors companies. Unlike The ATTACKERS, TARGET's did not hire Gawker Media and Think Progress to seek to kill TARGET's careers, lives and brands. Unlike The ATTACKERS, TARGET's did not rig the stock market with “pump-and-dump”, “Flash Boy” and “Google-stock/PR-pump” schemes. TARGET's engaged in hard work every day of their lives for the time-frame in question under the belief that the good old American work ethic and just rewards for your creations was still in effect in the U.S.A., and that the thieves and criminals that attempted to interdict TARGET's would face Justice. In a number of circumstances The ATTACKERS took advantages of TARGET's hard work via come-ons; The ATTACKERS then made billions of dollars from Plainiffs work at TARGET's expense and attacked TARGET's in order to reduce TARGET's competitive and legal recovery options.

The ATTACKERS exchanged payments for services via cash, stock warrants, illicit personal services, media control and a technology known as a “Streisand Effect Massive Server Array” which can control public impressions for, or against a person, party, ideology or issue. The ATTACKERS StreisandEffect internet system was used to destroy TARGET's in reprisal, retribution, and vendetta for TARGET's help with law enf ment efforts in the case and because TARGET's companies competed with The ATTACKERS companies with superior technologies.

The ATTACKERS have used their Streisand Effect technology to build a character assassination ring of bloggers and hired shill “reporters” who engage in a process called a “Shiva”. This process is named after a TARGET in a similar case named: Shiva Ayyadurai, the husband of Actress Fran Drescher. Shiva Ayyadurai holds intellectual property rights to part of The ATTACKERS email technology. In fact, the people most threatened by the Shiva Ayyadurai patent right claims, ironically turn out to be The ATTACKERS and, in particular, The ATTACKERS associates Elon Musk, Jon Doerr, Eric Schmidt, Larry Page, Steve Jurvetson, Vinod Khosla and other members of the “Silicon Mafia” who own most of the main companies exploiting email technology. Were Shiva Ayyadurai to prevail in his claims, The ATTACKERS would owe him billions of dollars. “Running A Shiva” involves the production of a series of Defamation articles by bloggers who act asif they are independent from The ATTACKERS but are in fact, not. The ATTACKERS used “the Shiva” to attack and seek to destroy Donald Trump, Shiva Ayyadurai, TARGET's, and numerous political figures. Univision, Unimoda,Jalo pnik, Gawker Media, Gizmodo and over a hundred stealth-ed, and overt, assets of The ATTACKERS have been using “The Shiva” network to attack Donald Trump, Shiva Ayyadurai, TARGET's, and numerous political figures as recently as this morning, thus, the time bar restarts every day. TARGET's have pleaded with The ATTACKERS to cease their attacks but The ATTACKERS have refused to comply. Even with Fran Drescher’s ongoing royalty payments from her popular television series, friends have reported that the attacks on the Ayyadurai family have been devastating and have caused massive damages and personal and emotional devastation.

The ATTACKERS produced animated movies, attack articles, fake blog comments, DNS routes, “Shiva” Campaigns, and other attack media against TARGET's and expended over $30 million dollars in value, as quantified by The ATTACKERS partner: Google, in placing the attack material in front of 7.5 billion people on the planet for the rest of TARGET's lifetime. No person could survive such an attack and in the case of TARGET's, lives were destroyed and multiple companies invested into by TARGET's, which The ATTACKERS made over $50B off of the copies of, were destroyed because they competed with The ATTACKERS.

The TARGET's are informed and believe, and based on that information and belief allege that at all times mentioned in the within Complaint, all The ATTACKERS were the agents, owners and employees of their affiliated insiders and, in doing the things alleged in this Complaint, were acting within the course and scope of such agency and employment.

As to any corporate employer specifically named, or named as a “DOE” herein, the TARGET's are informed and believe and therefore allege that any act, conduct, course of conduct or omission, alleged herein to have been undertaken with sufficient, malice, fraud and oppression to justify an award of punitive damages, was, in fact, completed with the advance knowledge and conscious disregard, authorization, or ratification of and by an officer, director, or managing agent of such corporation. The Statute of Limitations and time bar on this case has not expired. TARGET's only became aware of all of the facts recently due to the FBI, Congressional and hacker-exposed investigation data on The ATTACKERS operating and receiving cash, rewards and assets from an illegal and illicit set of political slush-funds established to compensate them for financing political campaigns. The Sony, Clinton, DNC, HSBC, Panama Papers and other hacks and publication of all of the relevant files and the Congressional investigation of illicit activities and the continuing issuance of federal documents to TARGET's confirming TARGET's intellectual property areall vastly WITHIN the statutes of limitations to allow this case to proceed to Jury Trial. TARGET's has had a long, ongoing and high-level interaction with Defendant in both the work effort and the monetization and collection effort. TARGET's has been continually interactive with Defendant in order to try to collect his money. Attacks and interference with TARGET's has occurred as recently as this week by The ATTACKERS. The TARGET's, whose multiple businesses ventures had already suffered significant damage as the result of the online attacks of the The ATTACKERS, contacted renowned experts, and especially Search Engine Optimization and forensic internet technology (IT) experts, to clear and clean the internet of the false, defamatory, misleading and manufactured information belittling the TARGET's, attacking them and discrediting their reputation as an inventor, product developer and project director from their websites.

None of the technology experts hired by the TARGET's, at substantial expense, were successful in their attempts to clear, manage or even modify the false, defamatory, misleading and

manufactured information belittling the TARGET's, attacking him and discrediting their reputation as an inventor, product developer and project director which only The ATTACKERS, the controlling entity of the internet, refused to remove. In fact, those experts were able to even more deeply confirm, via technical forensic internet analysis and criminology technology examination techniques that The ATTACKERS was rigging internet search results for its own purposes and anti-trust goals.

All efforts, including efforts to suppress or de-rank the results of a name search for “TARGET's” failed, and even though tests on other brands and names, for other unrelated parties did achieve balance, the SEO and IT tests clearly proved that The ATTACKERS was consciously, manually, maliciously and intentionally rigging its search engine and adjacent results in order to “mood manipulate” an attack on TARGET's.

In fact, the experts and all of them, instead, informed the TARGET's, that, not only had The ATTACKERS locked the false, defamatory, misleading and manufactured information belittling the

TARGET's, attacking them and discrediting their reputation as an inventor, project developer and project director into its search engine so that the information could never be cleared, managed or even modified, The ATTACKERS had assigned the false, defamatory, misleading and manufactured information belittling the TARGET's, attacking them and discrediting their reputation as an inventor, project developer and project director “PR8” algorithmic internet search engine coding embedded in the internet information-set programmed into Defendantsinternet architecture. [See, Information received from one of over 30 IT, forensic network investigators and forensic SEO test analysts, a true and correct copy of which is attached hereto in the Exhibits.]



Per the many world-wide search engine results forensic analysis experts TARGET hired – They had never seen search engines results that were locked so maliciously, manually and unmovably into Google’s and YouTube’s search results. “It was as if the CIA, or Larry Page himself, was doing this”, said one. TARGET placed associates inside of Google and, among other things, acquired bank records proving Google and the attackers were exchanging millions of dollar with each other.

TARGET even went to the effort of placing nearly a thousand virtual forensic test servers around the globe, using empty space on third-party existing servers owned by hundreds of other people, in order to monitor and metricize the manipulations of search results of examples of the

TARGET's name in comparison to the manipulations for PR hype for The ATTACKERS financial partners, for example: the occurrence of the phrase ”Elon Musk”, The ATTACKERS business partner and beneficiary, over a five year period. The EU, China, Russia, and numerous research groups (ie:

http://www.politico.com/magazine/story/2015/08/how-google-could-rig-the-2016-election-121548 By Robert Epstein ) have validated these forensic studies of The ATTACKERS architect-ed character assassination and partner hype system .

The “PR8” codes are hidden codes within the The ATTACKERS software and internet architecture which profess to state that a link is a “fact” or is an authoritative factual document per The ATTACKERS research. By placing “PR8” codes in the defamatory links that The ATTACKERS was manipulating about TARGET's, The ATTACKERS was seeking to tell the world that the links pointed to “Facts” and not “Opinions”. The ATTACKERS embedded many covert codes in their architecture which marketing the material in the attack links and video as “facts” according to The ATTACKERS.

The “PR8” codes are a set of codes assigned and programmed into the internet, by the The ATTACKERS to matters it designates as dependable and true, thereby attributing primary status as the most The ATTACKERS is known to have provided tens of millions of dollars to this tabloid chain per The ATTACKERS financial staff, SEC filings and disclosures in other legal cases.

TARGET also used CIA technology call “Steganography” to embed text-based messages and codes into photos and videos in order track Google and YouTube’s global impression manipulations and create a significant and important link to be viewed by online researchers regarding the subject of their search.

The ATTACKERS were fully aware that all of the information in the attack articles against TARGET's was false,The ATTACKERS promo ted these attacks as vindictive vendetta-like retribution against TARGET.

At all times The ATTACKERS maintained it had no subjective control or input into the rankings of links obtained by online researchers as the result of a search on its search engines and that its search engine algorithms and the functions of its media assets were entirely “arbitrary” according to the owners and founders of The ATTACKERS.

In or about April 15, 2015, The European Union Commission took direct aim at The ATTACKERS charging the their Internet-search giant with skewing and rigging search engine results in order to damage those who competed with The ATTACKERS business and ideological interests.

In those proceedings, although The ATTACKERS continued to maintain that it has no subjective control or input into the rankings of links obtained by online researchers as the result of a search

on its search engines and that its staff had no ability to reset, target, mood manipulate, arrange adjacent text or links, up-rank, down-rank or otherwise engage in human input which would change algorithm, search results, perceptions or subliminal perspectives of consumers, voters, or any other class of users of the worldwide web, also known as The Internet, the court, in accord with evidence submitted, determined that The ATTACKERS, does in fact have and does in fact exercise, subjective control over the results of information revealed by searches on its search engine.

The ATTACKERS has a variety of such hidden codes and has various internal names for such codes besides, and in addition to, “PR8”. The ATTACKERS has been proven to use these fact vs. fiction

rankings to affect elections, competitors rankings, ie: removing the company: NEXTAG from competing with The ATTACKERS on-line; or removing political candidates from superior internet exposure and it is believed by investigators and journalists, that The ATTACKERS are being protected

from criminal prosecution by public officials who The ATTACKERS have compensated with un-reported campaign funding. As a result of receiving this information, the TARGET's became convinced of the strength and veracity of their original opinion that the The ATTACKERS, had, in fact posted the false, defamatory, misleading and manufactured information belittling the TARGET's, attacking them and discrediting TARGET's reputation as inventor, project developer and project designer had been intentionally designed, published, orchestrated and posted by them in retaliation to the true testimony provided by the TARGET's, to the Government Office of Accountability of the United States in May of 2005, and to the Securities and Exchange Commission, The Federal Bureau of Investigation, The United States Senate Ethics Committeeand other investigating parties, and had been disseminated maliciously and intentionally by them in an effort to do damage to their reputation and to their business prospects and to cause him severe and irremediable emotional distress. In fact, the TARGET's, has suffered significant and irremediable damage to their reputation and to their financial and business interests. As a natural result of this damage, as intended by the

The ATTACKERS, Plaintiffs has also suffered severe and irremediable emotional distress.



To this day, despite the age of the false, defamatory, misleading and manufactured information belittling the TARGET's, attacking him and discrediting their reputation as an inventor, project developer and project director, in the event any online researcher searches for information regarding the TARGET's, the same information appears at the top of any list of resulting links.



In addition, due to their control of all major internet database interfaces, The ATTACKERS have helped to load negative information about TARGET's on every major HR and employment database that TARGET's might be searched on, thus denying TARGET's all reasonable rights to income around the globe by linking every internal job, hiring, recruiter, employment, consulting, contracting or other revenue engagement opportunity for TARGET's back to false “red flag” or negative false background data which is designed to prevent TARGET from future income in retribution for TARGET's assistance to federal investigators.



HARM #7: The ATTACKERS USED FACTORY-PROCESSED SOCIAL MEDIA ATTACKS AGAINST THEIR TARGETS:

HARM #8: GOVERNMENT OFFICIALS CAUSED SSA AND HUD BENEFITS BLOCKADES AND MANIPULATIONS AS REPRISAL AGAINST TARGET:

HARM #9: The ATTACKERS USED BLACKLISTING AGAINST TARGET:

https://www.aol.com › 2010 › 09 › 26 › doj-stops-silicon-valleys-no-poaching-deals-a-few-years-t

DOJ Stops Silicon Valley's 'No Poaching' Deals. ... But anyone on the ground in Silicon Valley knows that a full-blown war for talent is under way, with checkbooks blazin. Government officials and tech oligarchs contacted members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade TARGET's from receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit" cases) you will never get investor funding again.


HARM #10: The ATTACKERS ORDERED FOIA OBFUSCATION OF TARGET’S FOIA AND STILL HAVE NOT RESPONDED TO MANY FOR YEARS BECAUSE THEY SHAME The ATTACKERS:

HARM #11: The ATTACKERS ENGAGED IN ARBITRARY DEADLINE MANIPULATION:



In case # 2:11-cv-05157-LRS ECF; it was proven that when a DOE contractor employee files a complaint alleging whistleblower retaliation, it is the practice of the DOE to align itself with the contractor and to assert attorney client privilege. For example, in an eleven-TARGET whistleblower retaliation case litigated against Fluor Federal Services, Inc., DOE attorney Robert Carosino refused to disclose evidence relating to meetings between DOE and the offending contractors claiming attorney client privilege because DOE and the contractor share a common interest in the litigation. A13-18. This practice prevents the DOE from effective oversight of contractor retaliation and creates a culture of fear among the Hanford workforce.

Upon Dr. Tamosaitis filing a whistleblower complaint with the DOL in 2010, the DOE, Bechtel and URS asserted attorney client privilege as to their discussions concerning Dr. Tamosaitis’ claim owing to their common interest. This fact has been verified by the sworn testimony of Jean Dunkirk in her deposition, which was taken in connection with the state claim (transcript available).

There is a practice of DOE managers, and most other government agency managers, supporting retaliation against contractor employees who oppose unsafe practices. For example, in 2008, then URS Chief Nuclear Engineer and Manager of Nuclear Safety Donna Busche, was terminated from her position at the Waste Isolation Pilot Plant in Carlsbad, New Mexico, with the approval of DOE officials, after she refused to rescind a Technical Safety Violation report that she had filed regarding the improper handling of a drum from Hanford that contained transuranic waste.

In 2009, Ms. Busche was reassigned to the WTP as Manager of Environmental and Nuclear Safety. A155-6. In October 2010, she was berated by Ines Triay, the DOE EM1, after giving truthful testimony at a hearing a by the DNFSB. A198-199. At a post-hearing meeting with Ms. Triay and numerous URS managers, Triay said, “If your intent was to piss people off, you did a very good job. You pissed people off.” A199. Ms. Bushe has suffered retaliation since then,

which has been compounded by her having been a witness in this case. 2.60 In 2010, DOE WTP Federal Project Director Dale Knudson submitted a sworn statement to the DOL indicating that he “did not direct BNI or URS to take any specific actions with regards to Dr. Tamosaitis.” A14. In fact, Knudson was directly involved in the decision to terminate Dr. Tamosaitis from the WTP. A114. He also participated in the decision that Dr. Tamosaitis not be returned to the WTP after

hearing that Dr. Tamosaitis was a whistleblower. Throughout the Tamosaitis retaliation, DOE managers supported Bechtel and URS efforts to stop necessary design changes to the WTP so that artificial deadlines could be met, and did nothing to protect, or supported, retaliation by

contractors against employees who opposed those improper decisions.

PLACING A CONTRACTOR EMPLOYEE INTO AN OVERSIGHT POSTION

CREATED AN INHERENT CONELICT OF INTEREST: In 2010, DOE placed PNNL manger Dale Knudson into the position of DOE Federal Project Director of the WTP. A52-3. This created an inherent conflict of interest in that a contractor employee who, on information and belief, is not

motivated by government service and placing the public interest before profit, is placed in a temporary position, overseeing the work of other contractors. On information and belief, after about two years, Knudson will return to his position at PNNL or to another position in the private sector.



HARM #12: POLITICAL POISONING & TOXIC EXPOSURE BY The ATTACKERS HARMED TARGET:

HARM #13: WORKPLACE SABOTAGE AND OBSTRUCTION OF TARGET'S RIGHT TO WORK:

HARM #14: MEDIA ASSASSINATION PROGRAMS WERE CONTRACTED BY The ATTACKERS TO HARM TARGET:

HARM #15: COMMERCIAL EMPLOYMENT DATABASE POISONING AND RED-FLAGGING OF TARGET'S HR DATABASE REFERENCES WERE CREATED TO HARM TARGET’S INCOME POTENTIAL:

HARM #16: ATTEMPTS ON THE LIVES OF WHISTLE-BLOWERS BY THE ATTACKERS WERE MEANT TO FRIGHTEN TARGET:

HARM #17: THE ATTACKERS ENGAGED IN REVENUE BLOCKADES AND INTERNET INCOME RE-DIRECTION TO MINIMIZE TARGET RESOURCES SO HE COULD NOT FIGHT BACK:

HARM #18: The ATTACKERS USED THE TROLL FARM DEPLOYMENTS AGAINST TARGET THAT THEY USE AGAINST PRESIDENTIAL OPPOSITION CANDIDATES:

HARM #19: MANUAL SEARCH ENGINE LOCK-IN ATTACKS WERE CONTRACTED FROM GOOGLE AND YOUTUBE, BY The ATTACKERS, TO HARM TARGET:

HARM #20: THE U.S. PATENT OFFICE MANIPULATION WAS USED TO BLOCKADE REVENUE FROM TARGET’S INVENTIONS:

HARM #21: HONEY-TRAPS WERE PLACED ON SOCIAL MEDIA SITES BY The ATTACKERS SPY OPERATIVES TO HARM TARGET:

HARM #22: A FAKE NEWS TABLOID EMPIRE WAS CREATED JUST FOR DEFAMATION ATTACKS, BY THE ATTACKERS, AND USED TO HARM TARGET:

HARM #23: HOUSING BLOCKADES WERE DEPLOYED BY The ATTACKERS TO HARM TARGET:

HARM #24: HACKING OF TARGET's DEVICES OCCURRED ON ORDERS OF The ATTACKERS:

HARM #25: TECH INDUSTRY BLACK-LIST COORDINATION AGAINST TARGET HAD COMMAND-AND-CONTROL OUT OF The ATTACKERS OFFICES:

HARM #26: HUD AND USDA MORTGAGE RIGHTS BLOCKADES TO HARM TARGET HOUSING IN REPRISAL AS DIRECTED BY The ATTACKERS VIA THEIR ‘DIRTY TRICKS’ TEAM:

  1. Additional ‘dirty tricks’ efforts were used per:
    https://www.justice-integrity.org/634-intelligence-agencies-use-social-media-for-dirty-tricks-propaganda-new-report

  2. https://www.commondreams.org/news/2014/02/07/gchqs-dirty-tricks-revealed-false-flags-virus-attacks-and-honey-traps

  3. https://theintercept.com/2014/02/24/jtrig-manipulation/

  4. https://www.salon.com/2011/02/11/threats_against_glenn_greenwald_wikileaks/

  5. https://www.theguardian.com/commentisfree/2013/jun/24/surveillance-us-national-security

  6. https://www.straight.com/news/482846/government-trolls-use-psychology-based-influence-techniques-social-media

  7. http://federal-report.com/public/The_Political_Reprisal_Vendetta_Playbook.pdf

  8. https://thedailybanter.com/2014/02/05/greenwalds-latest-snowden-revelation-the-british-gchq-is-waging-war-on-hackers/

  9. https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf

  10. ...and thousands of additional reports proving the attacker assertions.




TARGET is aware of the FBI procedure of the filing of FBI ‘302’ Reports on subjects. TARGET has, on multiple occasions, via the DC and SFO FBI offices, requested that the FBI interview, observe and track the attackers and confirm the command and control communications authority authorizing, managing and financing their attacks and the paths of compensation of those attacks. The FBI has had the full capacity and resources to easily confirm who ordered and operated the attacks on TARGET via an interview and investigation of the The ATTACKERS hired attackers, specifically Nicholas Guido Denton, John Herrman, Gabrial Darbyshire, Patrick George, Jay Carney, Robert Gibbs, Adrian Covert, Eric Schmidt, Larry Page, Perkins Coie, John Cook, Elon Musk, The Secretary of Energy Jennifer Granholm, et. al; and those other parties listed within the main complaint..



The FBI ‘302’ reports on those attackers is hereby requested, and a request for the Court to demand those reports is hereby requested for review by all parties concerned.

(G) Court ordered back payments from SSA from 2007 to today because public officials ordered blockade of TARGET’s SSDI payments as political reprisal for whistle-blowing in 2007 as proven by Inspector General and attached Exhibits:

TARGET hereby places a plea before the Court for the Court to order the Social Security Administration to pay TARGET back payments from SSA for SSDI from 2007 to today because, as proven in the Master Complaint, public officials, including White House staff and California Senators with intelligence agency access to government ‘dirty tricks’ teams, ordered the blockade of TARGET’s SSDI payments as political reprisal for whistle-blowing in 2007 as proven by Inspector General and attached Exhibits in the Master Complaint. Some SSA officials now work for the charged The ATTACKERS. This illicit federal reprisal circumvention of TARGET’s income cost him his house and all many of the damages listed, in detail, in the Master Complaint. It has been proven, in the evidence, that Senator’s Pelosi, Harris, Reid, Feinstein, and other senior public officials regularly order hacking, data manipulation and de-funding of political whistle-blowers. Dianne Feinstein’s staffer: Daniel Jones, is world known as the ‘CIA Master of Dirty Tricks’. In fact, TARGET and his peers, previously won federal lawsuits, as detailed in the Master Complaint, proving that, “government agencies infected by corruption use their resources to put reprisal hit-jobs on citizens”. Any Senate aide can hack or manipulate SSA, DOE, HUD and other agency decision files within minutes and order ANY citizen to have their funds cut-off with a single phone call. That happened in this case, as TARGET, and federal evidence has sworn, certified and verified as to the veracity of such dirty tricks operations within the Government. Senator’s staff and family cohabited with TARGET and revealed such tactics.



There are a vast number of other attack tactics. You can find those tactics listed in the, now public, CIA manuals and British JTRIG manuals.