What Happens When The White House Orders An Attack On A Domestic Taxpaying Citizen As An Illegal Vendetta?


You get attacked by White House operatives when you have the power to change the course of history or to reveal evidence that may get The President removed from office. It is, in fact, a tribute to your significance if it happens to you. A "Tier One" hit job is a high honor because it validates the assertions you are making about the corruption you witnessed. On the other hand, no matter how noble, you will end up ruined, or dead. So there's that!

In one particular case, the FBI, special investigators and Congressional researchers say that there were only 6 people capable of operating attacks of this scale and sophistication against the victim (known as “Witness 7” in reports) .

All 6 of these people are U.S. Government senior officials working in the White House and/or the U.S. Senate.

Every one of the attack technologies and resources used against Witness 7 were previously deployed against Presidential candidates in past elections. The providers, operators and compensation conduits of the attack services are known to law enforcement. The payment records have been uncovered, revealing that over $30M of billings were incurred in the production of, and compensation for, these vendetta attacks. By way of comparison: $30M is the typical WEEKLY expenditure for opposition character assassination programs in a U.S. Presidential election using Gawker, Gizmodo, Facebook, Google and Fusion GPS media attack services.



Witness 7 and his peers swear, warrant and certify that this is true. Witness 7's representatives can prove in a Grand Jury, Civil Jury and Congressional Hearing that White House staff, U.S. Senators and their Silicon Valley financiers did order, operate and finance a massive “hit-job” on the witness as revenge/retribution/vendetta because he reported an organized crime activity involving well known public officials.

EVERY PUBLIC OFFICIAL WHO WAS, BY LAW, SUPPOSED TO HELP THE WITNESS HAS, SO FAR, BEEN PROVEN BY INVESTIGATORS TO HAVE BEEN IN DIRECT COMPETITION AND CONFLICT-OF-INTEREST WITH THE WITNESS AND SOCIALLY PARTYING WITH THE COMPETITORS. Investigators have not found a single political entity in this case  who was not either: financed by, friends with, sleeping with, dating the staff of, holding stock market assets in, promised a revolving door job or government service contracts from, partying with, personal friends with, photographed at private events with, making profits by consulting for, exchanging emails with, business associates of or directed by; one of those business adversaries, or the Senators and politicians that those business adversaries pay campaign finances to, or supply political search engine manipulation services to.

The effort made by political executives to steer the annual expenditure of trillions of dollars of taxpayer funds and stock market perks to one group of friends or another is called “Cronyism” and it is operated by U.S. Senators and White House staff for profiteering purposes. The corrupt public officials involved here used real estate, tech company stock market ownership,revolving door payola jobs, quid-pro-quo deals and investment bank accounts to profiteer from each deal that the charged officials pushed in Congress.

FBI-level tracking of the covert accounts, trusts, shell corporations, family members and associates of every public official involved in this case proves that they made money by competing with the Applicant’s business ventures. The conflicts-of-interest were massive. The Panama Papers leaks, Swiss Leaks, Snowden Leaks, and all of the other leaks prove this as fact. The facts prove that A modern Character Assassination and political "Kill Order" was executed by famous politicians, and their Silicon Valley oligarch financiers, against the Witness and that government officials blockaded the victims Constitutional rights.

This is how a vendetta, revenge and political payback operation was implemented against an American taxpayer when a "kill-order" was issued against a whistle-blower.

In such Lewinsky-style attacks the main client does not like to get their hands dirty so the actual hit job mechanics are performed by companies such as: IN-Q-Tel; Gawker Media; Jalopnik; Gizmodo Media; K2 Intelligence; WikiStrat; Podesta Group; Fusion GPS; Google; YouTube; Alphabet; Facebook; Twitter; Think Progress; Media Matters; Black Cube; Correct The Record; Orbis Business Intelligence, Undercover Global Ltd; Stratfor; Jigsaw; Kroll; ShareBlue/Acronym; Cambridge Analytica; Sid Blumenthal; David Brock; Plouffe Consulting; David Drummond; Draper Family Fund; Eric Schmidt Family Fund; PR Firm Sunshine Sachs; Yasmin Green; Jared Cohen; Covington and Burling; Buzzfeed; Perkins Coie and Wilson Sonsini to run hit-jobs, character assassinations, dirty tricks and economic reprisal attacks on any party who reported the crimes. Each of those entities are now under federal and civil investigation. These are the people and companies that except cash, revolving door jobs, political appointments, insider trading stock in Silicon Valley tech companies, prostitutes and real estate in exchange for destroying the lives of others.

These attackers deserve to be punished for the rest of their lives for taking away the lives of others in exchange for remuneration. People that they have attacked have committed to hunting them for the rest of time and exposing them in the media and to law enforcement at every opportunity. Most victims of their attacks feel that "...these assassins should be publicly shamed in the media and forced out of business..." like Gawker, Cambridge Analytica and other attack services were.

These attack services are responsible for 90% of the "Fake News" problem in the world because they are the authors of most fake news. Congress must act to make these kinds of attack companies illegal!

These digital assassination services offer hit-jobs, character assassinations and economic reprisal programs to famous billionaires and corrupt politicians who are seeking revenge, retribution and vendetta executions.

These are the specific attacks undertaken against Witness 7:

- Government agency bosses solicited the target with false promises of future loans, contracts and grants from their agency and caused the target victim to expend millions of dollars and years of their time for government projects which those government bosses had covertly already promised to their friends. They defrauded Witness 7 and his investors, knowing that the federal insiders had already hard-wired the money exclusively for their friends and that, from Day One, Witness 7 and his Team were never going to be allowed to compete with the Government agency bosses friends like Elon Musk, Mark Zuckerberg, Larry Page and John Doerr. Even though, Witness 7's Team beat every competitor on every competitive metric, the reviewers were all of their competitors. They used the target victim as a “smokescreen” to cover their illegal government slush-funds for the victims competitors and personal enemies. By using this tactic, the attackers drain the target victims funds and forced victims into an economic disaster without the government bosses fearing any reprisal for their scam. The mobsters made billions of dollars in profit and wind-fall tax gains in the notorious Solyndra scandals as seen in the CBS 60 Minutes episode: “The Cleantech Crash”, thousands of TV news segments and the related GAO and Congressional corruption reports.

- Government officials and LSC Corporation (A federal agency dedicated to providing legal services to victims) blockaded victim’s rights to legal representation in order to prevent victim from personally suing the attackers because such a lawsuit would have embarrassed corrupt public officials. High tech law firms that were discussing a services agreement with victim were threatened and ordered to not help victim or “they would be black-listed or be cut-off from tens of millions of dollars of Google, Netflix, Facebook and government contracts”. Individual lawyers were threatened with black-listing and getting “flooded with more filings than you could ever respond to in your life-time...” LSC officials, who were almost entirely Obama Administration associates, refused to assist with lawyer referrals, which is against their federal contract. Court-requested legal services applications were stone-walled and "lost".

- An animated attack film was produced attacking victim. An animated film is an expensive effort involving considerable time and expense. An attacker must be well financed to undertake such an effort. The film was published on YouTube and locked onto the very top search result line on every YouTube search in front of 5 billion internet users for over a decade. The damage to victim’s reputation is estimated in the tens of millions of dollars. YouTube steadfastly refused to remove or adjust the search results even though YouTube executives knew victim and knew that the video represented a character assassination attempt against victim because YouTube owners finance the political campaigns of the public officials who ordered the attacks. While Google/YouTube stated to Congress that all of it’s search results are arbitrary, the never-moving search result of this attack video proved that Google’s and YouTube’s search results are manually manipulated by human maintained black-lists. Any counter-measures videos refuting each and every attack point were hidden or deleted by YouTube.

- Social networking sites including MeetUp, Match, Facebook, etc. and all other IAC-owned, or similar, sites (IAC is managed by Hillary Clinton's daughter, whose Mother knew victim) have had their profiles, texts, and inter-member communications, since those companies were started sold to outside adversaries,hacked or purchased. The financiers of almost every one of these "social" sites are also the financiers of the suspects. The attack service providers use Palantir,  In-Q-Tel, Taleo, etc. data analysis software to analyze every activity in those services in order to find honey-trap,blackmail and social conflict exploitation opportunities. Your social life will, essentially, end. Every photo on every social site is cross checked, by computer AI, with every other photo on the internet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total manipulation profile data file on you. New contacts on these sites were contacted by the attackers and told to “avoid” the victim in order to damage victim.

- Social Security, SSI, SDI, Disability and other earned benefits were stone-walled. Applications for benefits for the victim were intentionally “lost” like a “Lois Lerner hard drive”. Files in the application process “disappeared”. A U.S. Senator ordered Applicant’s benefits to “never be approved” even though victim worked 60 hour+ weeks for decades in service to their nation and their community. That same Senator was revealed housing Chinese spies and hiring Fusion GPS for other hit jobs. An SSA official ("Mario") in the local SSA office, who had a devout expressed hatred against one United States President ordered a benefits blockade against victim because he found out that victim’s ex-lawyer now worked in the White House. That was a felony violation of victim's rights.

- Government officials and tech oligarchs contacted members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade victim from receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit" cases) you will never get investor funding again.

- Federal FOIA requests were hidden, frozen, stone-walled, delayed, lied about and only partially responded to in order to seek to hide information and run cover-ups.

- Compromised State and federal officials play an endless game of Catch-22 by arbitrarily determining that arbitrary deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed.

- Multiple victims were found to be strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after victim’s work with the Department of Energy weapons and energy facilities. Many wonder if victim was intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of victims were exposed to deadly compounds and radiations, via DOE, without being provided with proper HazMat suits which DOE officials knew were required. Cellular level exotic laboratory toxins are found in victims biology including cesium, nano-particles and telomere-killing materials.

- Victims employers including Kaiser Permanente, Artech, Sony, etc. were called, and faxed, and ordered to fire target victims from their places of employment, in the middle of the day, with no notice, as a retribution tactic. The attackers openly discussed a planned attack on social media, then executed the attack.

- On orders from David Plouffe, David Axelrod, John Podesta and other Obama White House officials Google, YouTube, Gawker Media and Gizmodo Media produced attack articles and defamation videos. Google locked these contrived attack articles from the Nicholas Guido Denton tabloid empire on the top line, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over $40+ million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of these attacks proves that Google rigged these attacks against victim on the internet and that all of Google’s “impressions” are manually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. For all of time, when-ever any person in the world typed victims name on the Google-controlled internet, they were directed to defamation articles operated and created by Google's financiers and partners. This data was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of public perceptions. The FBI has been formally asked to interview attackers including: Nicholas Guido Denton, Ian Fette, Adrian Covert, Nick Cook and John Hermann. Victim's of those attackers have hired private investigators to place them under permanent surveillance. See more in: How Google Controls Government Policy And Process In America FREE.pdf

- Victims HR and employment records, on Taleo, Palantir, SAP, IBM DB and EVERY recruiting and hiring database, was embedded with negative keywords and “flags” in order to prevent the victim from ever gaining future employment.

- Gary D. Conley, Seth Rich, Rajeev Motwani who victim knew, and many other whistle-blowers in these matters, turned up dead under strange circumstances. Many of them seem to have been murdered using sophisticated spy agency-style tactics. Victim has received ongoing death threats for his help to federal investigations in the larger organized crime investigation relative to this matter.

- Paypal (A DNC-biased operation) and other on-line payments for on-line sales by victim are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target who competed with the attackers interests and holdings. This further denied victim income. As a test, victim built an online store with hundreds of thousands of products and marketed it globally. Trackers, placed by victim’s technicians, on servers, discovered that Paypal and an outside “Virgina-based system” were DNS and payment re-directed all traffic away from the store so that victim received no traffic and no income. In DNS redirection, "website spoofing" sends target victims websites to dead ends where no sales orders or customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using outside covert servers operated by the attackers and revealed in the Snowden Leaks. All commercial storefronts and on-line sales attempts by target victims, had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto, California in order to terminate revenue potentials for the victim.

- Contracted trolls, shills, botnets and synth-blog deployments are deployed to place defamatory statements and disinformation about victim in front of 7.5 billion people around the world on the internet in order to seek to damage their federal testimony credibility by a massively resourced facility. Some of these troll farms were uncovered in Russia, Ukraine, Israel and Brazil.

- Campaign finance dirty tricks contractors were hired by campaign financiers to attack the friends and family members of the target victim in order to create low morale for the target victims psyche and motivation.

- In one case covert political partner: Google, transferred large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded html and php codes in the links and web-pages which multiplied the attacks on Victims by many magnitudes.

- Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in charge of the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices with Google-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts that Google engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’s operations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles and investigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff. A conflict-of-interest unlike any in American history. Google’s investors personally told Applicant they would “kill him”. Google and the Obama Administration were “the same entity”. Applicant testified in the review that got Michelle Lee terminated and uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds. Most of the corrupt politicians in this case own parts of Google or have been paid campaign funds by Google. Revenue from the U.S. Patent Office assigned rights for Witness 7 were blockaded on political orders from a political campaign financier. This blockade cost Witness 7 millions of dollars in losses. It was yet another political trick that only Witness 7 was hit with when all of his peers were exempt.

- “Honey-traps”and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the“target” in order to spy on and misdirect the subject.

- Mortgage and rental applications had red flags added to them in databases to prevent the targets from getting homes or apartments for over a decade. These public services database manipulations take only seconds to do but affect the target for the rest of their lives!

- Krebs On Security, Wired, Ars Technica, The Wall Street Journal and most major IT publications have reported that hundreds of spy "back-doors" have been found on every Intel, AMD, Apple, Xfinity, Cisco, Microsoft, Juniper Networks motherboard, chip-set and hardware component set. This means that the attackers used a "key" code can open any of victims computer, server, router, cloud-network or other network connected device and read every file, photo, video, your calendar and email on devices at any time from any location on Earth. This has been widely reported on by Glenn Greenwald, Edward Snowden, Jeremy Scahill, Cheryl Atkisson of CBS News and others. Victim was hacked at least 10 times. In a number of instances, people, who victim had been communicating with online, were mysteriously contacted by a third party who sent them the Gizmodo attack article or phoned them with warnings to avoid victim. These kinds of Man-In-The-Middle interceptions would only have been possible from hacking and MITM surveillance tactics. Microsoft Outlook, an easily hacked software program, was found to be sending copies of communications to adversaries via a "dark drop".

- McCarthy-Era"Black-lists" were created and employed against target victims who competed with Obama Administration executives and their campaign financiers to prevent them from getting funding and future employment. This White House process is known as “RatFucking”, a tactic that is documented in a variety of published reports and on Wikipedia.

- The housing rights of Applicant were stalled in reprisal. Public records show that tens of thousands of other applicants were moved ahead of victim even though victim’s validation metrics exceeded those of almost every other Applicant. Victim was “black-listed”.

Federal law enforcement, the United States Congress and the highest level investigators in the U.S., and abroad, have documented (per the “FISA Memo”, Congressional Reports and federal employee testimony) and proven the fact that the Obama Administration regularly engaged in the operation of retribution, vendetta and reprisal campaigns known as “hit-jobs” against domestic natural born U.S. citizen domestic taxpayers. The Federal Court, in at least one previous court case, has ruled that the corporation in which victim was an investor, in this particular matter, were the victims and target of a number of these attacks designed to inflict permanent medical, emotional,character assassination, brand negation, economic and career damage.

The law says that any of these attack tactics, that are not illegal, may be freely done back to the attackers. Thousands of citizen groups and citizen sleuth public crowd-sourced forensics investigators are doing just that!
 

EXAMPLES OF THE ATTACKERS TARGETING OTHERS:


https://bigleaguepolitics.com/they-literally-know-nothing-ben-rhodes-bragged-about-manipulating-clueless-reporters/


https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/


https://freedom.press/news/lawsuit-seeks-government-guidelines-surveillance-journalists-leak-investigations-surge/


http://www.attacked.biz


http://www.google-is-a-mobster.com


https://knightcolumbia.org/


https://bigleaguepolitics.com/brennan-and-clapper-accused-of-hacking-john-roberts-to-blackmail-him/


https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/


https://bigleaguepolitics.com/heres-why-obama-clearly-ordered-the-spying-on-trump/


https://dailycaller.com/2018/09/17/lindsey-graham-dems-kavanaugh/


https://www.thegatewaypundit.com/2018/09/okeefe-strikes-again-project-veritas-exposes-doj-official-using-govt-databases-to-stalk-business-owners-video/


https://www.politico.com/gallery/16-worst-political-dirty-tricks


http://artofverbalwar.com/2016/11/03/quick-dirty-guide-political-debate-tactics/


https://politicaldictionary.com/topics/dirty-tricks/


https://www.learntoinfluence.com/dirty-tricks-and-office-politics/


https://www.motherjones.com/politics/2012/11/election-dirty-tricks/


https://www.nytimes.com/2016/10/21/us/politics/video-dnc-trump-rallies.html


http://freakonomics.com/2007/11/06/the-complete-history-of-dirty-politics-a-qa-on-anything-for-a-vote/


https://en.wikipedia.org/wiki/Ratfucking


https://www.washingtonpost.com/opinions/the-npr-video-and-political-dirty-tricks/2011/03/17/ABbyMym_story.html


https://www.huffingtonpost.com/rich-rubino/dirty-political-tricks-from-american-politics_b_9324226.html


http://www.electomatic.com/dirty-campaign-techniques/


https://en.wikipedia.org/wiki/COINTELPRO


https://www.cnn.com/2008/POLITICS/05/29/obamas.first.campaign/


https://www.nytimes.com/2016/11/05/us/politics/dirty-tricks-vandalism-and-the-dark-side-of-politics.html


https://whyy.org/articles/political-dirty-tricks-are-a-staple-of-modern-politics/


https://www.theguardian.com/uk-news/2018/mar/19/cambridge-analytica-execs-boast-dirty-tricks-honey-traps-elections


https://medium.com/@j363j/how-roger-stones-campaign-of-tammany-hall-political-corruption-lead-to-trump-russia-3099d87784e


https://www.bridgemi.com/detroit-journalism-cooperative/lawsuits-dirty-tricks-and-angry-ex-wife-detroits-ugliest-election


https://www.salon.com/2016/03/25/hillary_clintons_dirty_politics_bernie_sanders_is_experiencing_the_same_nasty_tricks_that_clintons_campaign_dealt_obama_in_2008/


http://savannahnow.com/opinion-opinion-columns/2016-10-25/cal-thomas-political-dirty-tricks-then-and-now


https://www.cbc.ca/news/politics/5-political-dirty-tricks-we-learned-from-the-robocalls-trial-1.2669924


https://www.reddit.com/r/dredmorbius/comments/2d0r1d/the_reactionary_political_debate_playbook_karl/


https://www.politico.com/story/2016/02/south-carolina-dirty-tricks-republicans-219116


https://www.zerohedge.com/news/2019-02-10/yale-newspaper-publishes-guide-destroying-white-boy-lives-using-stasi-tactics


https://www.americanthinker.com/blog/2019/02/yale_editor_chillingly_urges_fellow_yalies_to_act_as_a_stasi_to_monitor_white_males.html


https://russia-insider.com/en/jeff-bezos-nudie-pics-be-released-cyber-tycoon-complains-about-loss-privacy/ri26224


https://www.youtube.com/watch?v=VP5jqLAjbDw


** 'They Can't Beat Him On The Law So They Are Trying To Destroy His Life' -Sen. Graham Questions Dems' Motives On Brett Kavanaugh Sexual Assault Allegations (dailycaller.com)


** Silicon Valley Has Been Manipulating The Entire BREXIT Campaign !!!!!! Second former employee of controversial data firm to be questioned by special counsel’s inquiry into Russia collusion. Per Carole Cadwalladr: Brittany Kaiser is said to be cooperating fully with the Mueller inquiry. A director of the controversial data company Cambridge Analytica, who appeared with Arron Banks at the launch of the Leave.EU campaign, has been subpoenaed by the US investigation into possible collusion between the Trump campaign and the Russian government. A spokesman for Brittany Kaiser, former business development director for Cambridge Analytica – which collapsed after the Observer revealed details ofits misuse of Facebook data – confirmed that she had been subpoenaed by special counsel Robert Mueller, and was cooperating fully with his investigation. He added that she was assisting other US congressional and legal investigations into the company’s activities and had voluntarily turned over documents and data. Kaiser, who gave evidence to the UK parliament last April in which she claimed Cambridge Analytica had carried out in-depth work for Leave.EU, is the second individual connected to the firm subpoenaed by the special counsel. The Electoral Commission has said its investigation into Leave.EU found no evidence that the campaign “received donations or paid for services from Cambridge Analytica …beyond initial scoping work”. Damian Collins, chairman of parliament’s inquiry into faken ews, said it was “no surprise” that Kaiser was under scrutiny by Mueller because “her work connected her to WikiLeaks, Cambridge Analytica and [its parent company] SCL, the Trump campaign, Leave.EU and Arron Banks”. He said it was now vital Britain had its own inquiry into foreign interference: “We should not be leaving this to the Americans.”


** CBS NEWS 60 MINUTES Lara Logan "I’m Being ‘Targeted’ . Per Tamar Auber: former CBS News foreign correspondent Lara Logan spoke with Fox News Sean Hannity about her recent comments slamming the media as “mostly liberal.” Logan told Breitbart podcaster Mike Ritland the remarks made on his show — which drew widespread attention online — amounted to “professional suicide.”Defending her remarks on Hannity’s show, Logan said that as the result of her speaking out about how the media is “mostly liberal”she has been targeted because she is an independent voice. “Any journalists who are not beating the same drum and giving the same talking points,” she insisted “pay the price” for not going along with the liberal crowd. She also called out her targeters by name. “I know they’re going to come after me,” she told Hannity. “Michael Calderone whois at the Huffington Post. I can give you the script now. I can tell you who the players are. Joe Hagan. Brian Stelter.” She added:“They smear you personally. They go after your integrity. They go after your reputation as a person and a professional. They will stop at nothing. I am not the only one. And I am just, I am done, right, I am tired of it. And they do not get to write my story anymore. They don’t get to speak for me, I want to say loudly and clearly to anybody who is listening, I am not owned. Nobody owns me, right? I’m not owned by the left or the right.” Logan made headlines recently when, during a scorched earth podcast interview with Ritland, she said that there was a lot of “weight” in most news organizations on “one side of the political spectrum.” “The media everywhere is mostly liberal. But in this country, 85 percent of journalists are registered Democrats. So that’s just a fact, right?” she told Ritland. She also trashed reporting based on single, anonymous government sources. “That’s not journalism, that’s horseshit,”Logan stressed. “Responsibility for fake news begins with us. We bear some responsibility for that, and we’re not taking ownership of that and addressing it. We just want to blame it all on somebody else.”


** Internal documents from a private Israeli intelligence firm called Psy-Group show that, at the time of many incidents, the company, and possibly other private investigators, were targeting U.S. citizens because they spoke up about crimes. Psy-Group’s intelligence and influence operations, which included a failed attempt in the summer of 2017 to sway a local election in central California, were detailed in a New Yorker investigation that I co-wrote earlier this month. Before itwent out of business (ie: changed it's name) , last year, Psy-Group was part of a new wave of private-intelligence firms that recruited from the ranks of Israel’s secret services and described themselves as “private Mossads.” Psy-Group initially stood out among its rivals because it didn’t just gather intelligence; its operatives used false identities, or avatars, to covertly spread messages in an attempt to influence what people believed and how they behaved. In 2016, Psy-Group held discussions with the Trump campaign and others about conducting covert “influence” operations to benefit the candidate. Psy-Group’s founder and C.E.O., Royi Burstien, a veteran Israeli intelligence officer who established the firm in 2014, told me that his talks with the Trump campaign went nowhere. The company’s posturing, however, attracted the attention of Robert Mueller, the special counsel, who has been investigating interference in the 2016Presidential race.'


** FED BOMBSHELL: Fusion GPS Bribed Dozens of MSM Journalists With Cash To Run Character Assassinations. High-ranking FBI insiders are pulling back the curtain on Fusion GPS, the firm that commissioned and spread the bogus Trump dossier. It appears the embattled intelligence firm was quite busy paying off Big Media reporters,according to federal sources who have traced dozens of transactions between TD Bank and media members as well as media organizations,sources confirm. But stunningly, Big Media organizations have employed Fusion GPS to dig dirt on politicians and D.C.’s elite —namely Donald Trump. “Fusion GPS was on the payroll of the media and in turn had members of the media on its payroll,” one FBI insider said. FBI insiders confirm Fusion GPS employed law firms as well as shell companies to send and receive funds to and from media and reporters. But the embattled firm also used its accounts at TD Bank to directly commission reporters. Likewise, Fusion GPS received funds from media companies into its own accounts at TD Bank, FBI insiders said, “There are dozens of payments from the media flowing into their (Fusion GPS’) account,” one federal law enforcement official said. “One company wired funds to Fusion (GPS) more than a dozen times.” Why would media companies commission Fusion GPS? Likely to dig dirt on enemies or secure records that reporters could not legally obtain, one federal law enforcement insider said. One FBI insider said the payments to Fusion GPS coincide with Donald Trump’s run for the White House. The payments were made between Sept. 2015 and Sept. 2017, records show. The unthinkable: The mainstream media paying Fusion GPS for dirt on Trump to the same firm the Democratic National Committee paid to fund the bogus Trump dossier. And at the same time Fusion GPS bribing journalists to place stories — likely negative about Trump, as well as spread the bogus Trump dossier around.


** Death By Metadata: Jeremy Scahill & Glenn Greenwald Reveal ...


https://www.democracynow.org/2014/2/10/death_by_metadata_jeremy_scahill_glenn

Jeremy Scahill and Glenn Greenwald have also revealed ... And the source then is in addition to the documents that Edward Snowden ... "The NSA's Secret Role in the U.S. Assassination Program ...

** How Covert Agents Infiltrate the Internet to Manipulate ...

https://theintercept.com/2014/02/24/jtrig-manipulation/

But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online ...



** New Snowden Doc Reveals How GCHQ/NSA Use The Internet To ...


https://www.techdirt.com/articles/20140224/17054826340/new-snowden-doc-reveals-how-gchqnsa-use-internet-to-manipulate-deceive-destroy-reputations.shtml

A few weeks ago, Glenn Greenwald, while working with NBC News, revealed some details of a GCHQ presentation concerning how the surveillance organization had a "dirty tricks" group known as JTRIG ...



** Snowden Drip: Government Funded Character Assassination Squads Rampant Online

From The Intercept:

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tella chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of“honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control,infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

There’s a common misconception in the public that there are briefcases full of cash changing hands in Washington, DC, and votes of Members of Congress are for sale to the highest cash bidder. Make no mistake, the votes are still for sale, but the direct cash payments are (mostly) gone. While bags of bills may have been how it worked in the past, that’s not how corruption happens anymore. A lot of money still changes hands and people are getting rich, but it’s now done through "conduit intermediaries".

Hunter Biden knew as much about Ukraine and the oil and natural gas business as he did about not smoking crack, so of course him getting a position with a Ukrainian gas and oil company for $50,000 per month was a pay-off to his dad. Every parent wants their kids to do well, few are in a position to actually make that happen. Or, in the case of the former vice president, in charge of a US administration’s policy for a country most people couldn’t find on a map.

But Biden’s shady dealings are not unique to him, or to Democrats. It’s political grift by proxy. You can’t pay off a politician anymore because there are digital fingerprints everywhere, so they find other covert ways to achieve the same outcome.

Children and spouses of politicians are raking in cash from campaigns and corporations seeking to buy influence. California's Bay Area Senators excel at such graft. Remember: these are the people who write the rules and they only write the rules for themselves, not you!

Board seats, real estate, revolving door jobs and sweetheart “consulting”, "speaking" and lobbying contracts are the new bags of cash. Department of Energy free loans are the ultimate political payola to campaign financiers. Want a chairman of a specific committee to look favorably on your bids for government contracts? Put someone close to them in a position to benefit from it. Want protections from regulators or to use regulators to harm your competitors or guard against foreign competition? Make the livelihood of someone who matters to the people in power dependent upon getting your way. Watch the seas part.

Campaigns are not the cash cows corporations are, no one is raking in more than the average American family’s annual income every month from them like Hunter Biden was from Burisma. But for the closest to direct payoffs you can get, look no further than campaign cash.

Politicians beg for money every single day. If you have the misfortune to end up on a campaign’s email list, you find yourself getting emails begging for money from big name politicians and people you’ve never heard of.

They all breathlessly try to spin the reader up about how important it is you give, even just a couple of dollars, to them to keep or get them in office. You likely laugh at them, they’re absurd to normal people. But they must work on someone because they keep sending them and the money flows.

Much of that money goes to politicians who have a better shot of waking up naked on the moon than they do losing their reelection bids. After they contract with the necessary power-brokers and kick “walking around money” to the required people, a good chunk of that cash ends up in the pockets of their family members.

Here’s just one example: Maxine Waters won reelection in 2018 with 78 percent of the vote even though she doesn’t live in her district. Her job is so safe that she could hold a press conference the week before the vote and call her constituents morons while whipping puppies into a wood-chipper and she’d still win in a walk. But she still raises a fortune for her campaign.

Being Chair of the House Financial Services Committee has its perks, people with a lot of money want to suck up to Waters so they can make even more.

To remain in the good graces of Waters or any Member of Congress you gotta cut a check, whether their campaign needs the money or not. In the case of Waters, she hired her daughter to handle campaign mailing to voters. Why mail voters who are going to reelect you no matter what when mailing constituents is budgeted for in every congressional office? Because your campaign can pay family a ton of money to do it.

The news reports Karen Waters, Maxine’s daughter, was paid hundreds of thousands of dollars to send out mailers for her mother’s campaign. Those campaign contributions don’t go directly into the pockets of the politicians, they’re laundered through the campaigns to family members, sometimes spouses. Waters is not alone, not by a long shot.

Right out in the open, there are payoffs, kickbacks, and graft happening every day. Hunter Biden is in the spotlight right now, and with good reason, but he’s just the tip of the iceberg. It’s all corrupt as hell, and no one is saying a damn thing about it...until now! Corruption - Your Termination Notice Has Been Served!