What Happens When The White House Orders An Attack On A Domestic
Taxpaying Citizen?
You get attacked by White House operatives when you have the power to change
the course of history or to reveal evidence that may get The President
removed from office. It is, in fact, a tribute to your significance if it
happens to you. A "Tier One" hit job is a high honor because it
validates the assertions you are making about the corruption you witnessed.
On the other hand, no matter how noble, you will end up ruined, or dead. So
there's that!
In one particular case, the FBI, special
investigators and Congressional researchers say that there were only
6 people capable of operating attacks of this scale and
sophistication against the victim (known as “Witness 7”
in reports) .
All 6 of these
people are U.S. Government senior officials working in the White
House and/or the U.S. Senate.
Every one of the
attack technologies and resources used against Witness 7 were
previously deployed against
Presidential candidates in past elections. The providers, operators
and compensation conduits of the attack services are known to law
enforcement. The payment records have been uncovered, revealing that
over $30M of billings were incurred in the production of, and compensation
for, these vendetta attacks. By way of comparison: $30M is the
typical WEEKLY expenditure for opposition character assassination
programs in a U.S. Presidential election using Gawker, Gizmodo,
Facebook, Google and Fusion GPS media attack services.
Witness 7 and
his peers swear, warrant and certify that this is true. Witness 7's
representatives can prove in a Grand Jury, Civil Jury
and Congressional Hearing that White House staff, U.S. Senators and
their Silicon Valley financiers did order, operate and finance a
massive “hit-job” on the witness as
revenge/retribution/vendetta because he reported an organized crime
activity involving well known public officials.
EVERY PUBLIC OFFICIAL WHO WAS, BY LAW, SUPPOSED TO HELP THE WITNESS HAS, SO
FAR, BEEN PROVEN BY INVESTIGATORS TO HAVE BEEN IN
DIRECT COMPETITION
AND CONFLICT-OF-INTEREST WITH THE WITNESS.
The effort made by
political executives to steer the annual expenditure of trillions of
dollars of taxpayer funds and stock market perks to one group of friends or
another is
called “Cronyism” and it is operated by U.S. Senators and White
House staff for profiteering purposes. The corrupt public
officials involved here used real estate, tech company stock market
ownership,
revolving door payola jobs, quid-pro-quo deals and investment bank accounts
to profiteer
from each deal that the charged officials pushed in Congress.
FBI-level tracking
of the covert accounts, trusts, shell corporations, family members
and associates of every public official involved in this case proves
that they made money by competing with the Applicant’s business
ventures. The conflicts-of-interest were massive. The Panama Papers
leaks, Swiss Leaks, Snowden Leaks, and
all of the other leaks prove this as fact. The facts prove that A modern
Character Assassination and political "Kill Order" was
executed by famous politicians, and their Silicon Valley oligarch
financiers, against the Witness and that government officials blockaded the
victims Constitutional rights.
This is how a
vendetta, revenge and political payback
operation was implemented
against an American taxpayer when a "kill
order" was issued against on a whistle-blower
In such Lewinsky-style attacks the main client does
not like to get their hands dirty so the actual hit job mechanics are
performed
by companies such as: IN-Q-Tel; Gawker Media; Jalopnik; Gizmodo Media; K2
Intelligence; WikiStrat; Podesta Group; Fusion GPS; Google; YouTube;
Alphabet; Facebook; Twitter; Think Progress; Media Matters); Black Cube;
Correct The Record; Orbis Business Intelligence, Undercover Global Ltd;
Stratfor; Jigsaw; ShareBlue/Acronym; Cambridge Analytica; Sid Blumenthal;
David Brock; Plouffe Consulting; David Drummond; Draper Family Fund; Eric
Schmidt Family Fund; PR Firm Sunshine Sachs; Yasmin Green; Jared Cohen;
Covington and Burling; Buzzfeed; Perkins Coie and Wilson Sonsini to run
hit-jobs, character assassinations, dirty tricks and economic reprisal
attacks on any party who reported the crimes. Each of those entities are now
under federal and civil investigation. These are the people and companies
that except
cash, revolving door jobs, political appointments, insider trading
stock in Silicon Valley tech companies, prostitutes and real estate
in exchange for destroying the lives of others.
These attackers
deserve to be punished for the rest of their lives for taking away
the lives of others in exchange for remuneration. People that they have
attacked have committed to hunting them for the rest of time and exposing
them in the media and to law enforcement at every opportunity. Most victims
of their attacks feel that "...these assassins should be publicly shamed
in the media and forced out of
business..." like Gawker, Cambridge Analytica and other attack
services were.
These attack
services are responsible for 90% of the "Fake News" problem
in the world because they are the authors of most fake news. Congress
must act to make these kinds of attack companies illegal!
These digital
assassination services offer hit-jobs, character assassinations and
economic reprisal programs to famous billionaires and corrupt
politicians who are seeking revenge, retribution and vendetta
executions.
These are the specific attacks
undertaken against Witness 7:
- Government agency
bosses solicited the target with false promises of future loans,
contracts and grants from their agency and caused the target victim to
expend millions of dollars and years of their time for government projects
which
those government bosses had covertly already promised to their friends. They
defrauded Witness 7 and his investors, knowing that they had already
hard-wired the money exclusively for their friends and that, from Day One, Witness
7 and his Team were never going to be allowed to compete with the
Government agency bosses friends like Elon Musk, Mark Zuckerberg, Larry Page and John Doerr.
Even though, Witness 7's Team beat every competitor on every competitive
metric, the reviewers were all of their competitors. They
used the target victim as a “smokescreen” to cover their illegal
government slush-funds for the victims competitors and personal
enemies. By using this tactic, the attackers drain the target victims
funds and forced victims into an economic disaster without the
government bosses fearing any reprisal for their scam. The mobsters
made billions of dollars in profit and wind-fall tax gains in the notorious
Solyndra scandals
as seen in the CBS 60 Minutes episode: “The Cleantech Crash”,
thousands of TV news segments and the related GAO and Congressional
corruption reports.
- Government
officials and LSC corporation (A federal agency dedicated to
providing legal services to victims) blockaded victim’s rights to
legal representation in order to prevent victim from personally suing
the attackers because such a lawsuit would have embarrassed corrupt
public officials. High tech law firms that were discussing a services
agreement with victim were threatened and ordered to not help victim
or “they would be black-listed or be cut-off from tens of
millions of dollars of Google, Netflix, Facebook and government
contracts”. Individual lawyers were threatened with
black-listing and getting “flooded with more filings than you
could ever respond to in your life-time...” LSC officials, who
were almost entirely Obama Administration associates, refused to
assist with lawyer referrals, which is against their federal
contract. Court-requested legal services applications were stone-walled and
"lost".
- An animated attack
film was produced attacking victim. An animated film is an expensive
effort involving considerable time and expense. An attacker must be
well financed to undertake such an effort. The film was published on
YouTube and locked onto the very top search result line on every
YouTube search in front of 5 billion internet users for over a
decade. The damage to victim’s reputation is estimated in the tens
of millions of dollars. YouTube steadfastly refused to remove or
adjust the search results even though YouTube executives knew victim
and knew that the video represented a character assassination attempt
against victim because YouTube owners finance the political campaigns
of the public officials who ordered the attacks. While Google/YouTube
stated to Congress that all of it’s search results are arbitrary,
the never-moving search result of this attack video proved that
Google’s and YouTube’s search results are manually manipulated by
human maintained black-lists. Any counter-measures videos refuting each and
every attack point were hidden or deleted by YouTube.
- Social networking
sites including MeetUp, Match, Facebook, etc. and all other
IAC-owned, or similar, sites (IAC is managed by Hillary Clinton's
daughter, whose Mother knew victim) have had their profiles, texts,
and inter-member communications, since those companies were started sold to
outside adversaries,
hacked or purchased. The financiers of almost every one of these "social"
sites
are also the financiers of the suspects. The attack service providers
use Palantir, In-Q-Tel, Taleo, etc. data analysis software to analyze
every activity in those services in order to find honey-trap,
blackmail and social conflict exploitation opportunities. Your social
life will, essentially, end. Every photo on every social site is
cross checked with every other photo on the internet in order to cull
your Facebook, Linkedin, Snapchat and other social media together to
create a total manipulation profile data file on you. New contacts on
these sites were contacted by the attackers and told to “avoid”
the victim in order to damage victim.
- Social Security,
SSI, SDI, Disability and other earned benefits were stone-walled.
Applications for benefits for the victim were intentionally “lost”
like a “Lois Lerner hard drive”. Files in the application
process
“disappeared”. A U.S. Senator ordered Applicant’s benefits to
“never be approved” even though victim worked 60 hour+ weeks
for
decades in service to their nation and their community. That same Senator
was revealed housing Chinese spies and hiring Fusion GPS for other hit jobs.
A SSA
official in the local SSA office, who had a devout expressed hatred
against one United States President ordered a benefits blockade
against victim because he found out that victim’s ex-lawyer now
worked in the White House. That was a felony violation of victim's rights.
- Government
officials and tech oligarchs contacted members of the National
Venture Capital association (NVCA) and created national “black-lists”
to blockade victim from receiving investor funding. This was also
confirmed in a widely published disclosure by Tesla Motors Daryl Siry
and in published testimony. If Silicon Valley political campaign
finance oligarchs black-list you (see the "AngelGate"
Scandal and the "High Tech No Poaching Class Action Lawsuit"
cases) you will never get investor funding again.
- Federal FOIA
requests were hidden, frozen, stone-walled, delayed, lied about and
only partially responded to in order to seek to hide information and
run cover-ups.
- Compromised State and
federal officials play an endless game of Catch-22 by arbitrarily
determining that arbitrary deadlines had passed that they, the government
officials, had stonewalled and obfuscated applications for, in order
to force these deadlines that they set, to appear to be missed.
- Multiple victims were
found to be strangely poisoned, not unlike the Alexander Litvenko
case. Heavy metals and toxic materials were found right after
victim’s work with the Department of Energy weapons and energy
facilities. Many wonder if victim was intentionally exposed to toxins
in retribution for their testimony. The federal MSDS documents
clearly show that a number of victims were exposed to deadly
compounds and radiations, via DOE, without being provided with proper
HazMat suits which DOE officials knew were required. Cellular level exotic
laboratory toxins are found in victims biology including cesium,
nano-particles and telomere-killing materials.
- Victims
employers including Kaiser Permanente, Artech, Sony, etc. were called, and
faxed, and ordered to fire target victims
from their places of employment, in the middle of the day, with no
notice, as a retribution tactic. The attackers openly discussed a planned
attack on social media, then executed the attack.
- On orders from
Obama White House officials Google, YouTube, Gawker Media and Gizmodo
Media produced attack articles and defamation videos. Google locked
these contrived attack articles from the Nicholas Guido Denton
tabloid empire on the top line, of the front page of all Google
searches for a decade in front of 7.5 billion people,
around the
world. This attack-type uses over $40+ million dollars in server
farms, production costs and internet rigging. The forensic data
acquired from tracking some of these attacks proves that Google
rigged these attacks against victim on the internet and that all of
Google’s “impressions” are manually controlled by Google’s
executives who are also the main financiers and policy directors of
the Obama Administration. For all of time, when-ever any person in the world
typed victims name on the Google-controlled internet, they were directed to
defamation articles operated and created by Google's financiers and
partners. This data was provided to the European
Union for it’s ongoing prosecution of Google’s political
manipulation of public perceptions. The FBI has been formally asked to
interview attackers including: Nicholas Guido Denton, Ian Fette, Adrian
Covert, Nick Cook and John Hermann. Victim's of those attackers have hired
private investigators to place them under permanent surveillance. See more
in: How Google Controls Government Policy And
Process In America FREE.pdf
- Victims HR and
employment records, on Taleo, Palantir, SAP, IBM DB and EVERY recruiting
and
hiring database, was embedded with negative keywords and “flags”
in order to prevent the victim from ever gaining future employment.
- Gary D.
Conley, Seth Rich, Rajeev Motwani who victim knew, and many other
whistle-blowers in these matters, turned up dead under strange
circumstances. Many of them seem to have been murdered using sophisticated
spy agency-style tactics. Victim has received ongoing death threats for his
help
to federal investigations in the larger organized crime investigation
relative to this matter.
- Paypal (A
DNC-biased operation) and other on-line payments for on-line sales by
victim are de-platformed, delayed, hidden, or re-directed in order to
terminate income potential for target who competed with the attackers
interests and holdings. This further denied victim income. As a test,
victim built an online store with hundreds of thousands of products
and marketed it globally. Trackers, placed by victim’s technicians,
on servers, discovered that Paypal and an outside “Virgina-based
system” were DNS and payment re-directed all traffic away from the
store so that victim received no traffic and no income. In DNS
redirection, "website spoofing" sends target victims
websites to dead ends where no sales orders or customer inquiries
actually get back to the target. These internet revenue activity
manipulations are conducted using outside covert servers operated by
the attackers and revealed in the Snowden Leaks. All commercial
storefronts and on-line sales attempts by target victims, had their
sites hidden, or search engine de-linked by a massively resourced
facility located in Virginia, Texas or Palo Alto, California in order
to terminate revenue potentials for the victim.
- Contracted
trolls, shills, botnets and synth-blog deployments are deployed to
place defamatory statements and disinformation about victim in front
of 7.5 billion people around the world on the internet in order to
seek to damage their federal testimony credibility by a massively
resourced facility. Some of these troll farms were uncovered in
Russia, Ukraine, Israel and Brazil.
- Campaign
finance dirty tricks contractors were hired by campaign financiers to
attack the friends and family members of the target victim in order
to create low morale for the target victims psyche and motivation.
- In one case
covert political partner: Google, transferred large sums of cash to
dirty tricks contractors and then manually locked the media portion
of the attacks into the top lines of the top pages of all Google
searches globally, for years, with hidden embedded codes in the links
and web-pages which multiplied the attacks on Victims by many
magnitudes.
- Covert Cartel
financier: Google, placed Google’s lawyer: Michelle Lee, in charge
of the U.S. Patent Office and she, in turn, stacked all of the U.S.
Patent Office IPR and ALICE review boards and offices with
Google-supporting employees in order to rig the U.S. Patent Office to
protect Google from being prosecuted for the vast patent thefts that
Google engages in. Google has hundreds of patent lawsuits for
technology theft and a number of those lawsuits refer to Google’s
operations as “Racketeering”, “Monopolistic Cartel” and
“Government Coup-like” behaviors. Thousands of articles and
investigations detail the fact that Google, “essentially” ran the
Obama White House and provided over 80% of the key White House staff.
A conflict-of-interest unlike any in American history. Google’s
investors personally told Applicant they would “kill him”. Google
and the Obama Administration were “the same entity”. Applicant
testified in the review that got Michelle Lee terminated and
uncovered a tactical political and social warfare group inside Google
who were financed by Federal and State funds. Most of the corrupt
politicians in this case own parts of Google or have been paid campaign
funds by Google.
- “Honeytraps”
and moles were employed by the attackers. In this tactic, people who
covertly worked for the attackers were employed to approach the
“target” in order to spy on and misdirect the subject.
- Mortgage and
rental applications had red flags added to them in databases to
prevent the targets from getting homes or apartments.
- Krebs On
Security, Wired, Ars Technica, The Wall Street Journal and most major
IT publications have reported that hundreds of spy "back-doors"
have been found on every Intel, AMD, Apple, Xfinity, Cisco,
Microsoft, Juniper Networks motherboard, chip-set and hardware
component set. This means that the attackers used a "key"
code can open any of victims computer, server, router, cloud-network
or other network connected device and read every file, photo, video,
your calendar and email on devices at any time from any location on
Earth. This has been widely reported on by Glenn Greenwald, Edward
Snowden, Jeremy Scahill, Cheryl Atkisson of CBS News and others. Victim was
hacked
at least 10 times. In a number of instances, people, who victim had
been communicating with online, were mysteriously contacted by a
third party who sent them the Gizmodo attack article or phoned them
with warnings to avoid victim. These kinds of Man-In-The-Middle
interceptions would only have been possible from hacking and MITM
surveillance tactics. Microsoft Outlook, an easily hacked software program,
was found to be sending copies of communications to adversaries via a "dark
drop".
- McCarthy-Era
"Black-lists" were created and employed against target
victims who competed with Obama Administration executives and their
campaign financiers to prevent them from getting funding and future
employment. This White House process is known as “RatFucking”,
a
tactic that is documented in a variety of published reports and on
Wikipedia.
- The housing rights
of Applicant were stalled in reprisal. Public records show that tens
of thousands of other applicants were moved ahead of victim even
though victim’s validation metrics exceeded those of almost every
other Applicant. Victim was “black-listed”.
Federal law
enforcement, the United States Congress and the highest level
investigators in the U.S., and abroad, have documented (per the “FISA
Memo”, Congressional Reports and federal employee testimony) and
proven the fact that the Obama Administration regularly engaged in
the operation of retribution, vendetta and reprisal campaigns known
as “hit-jobs” against domestic natural born U.S. citizen domestic
taxpayers. The Federal Court, in at least one previous court case,
has ruled that the corporation in which victim was an investor, in
this particular matter, were the victims and target of a number of
these attacks designed to inflict permanent medical, emotional,
character assassination, brand negation, economic and career damage.
The law says that any of these attack tactics, that are not illegal, may
be freely done back to the attackers. Thousands of citizen groups and
citizen sleuth public crowd-sourced forensics investigators are doing just
that!
EXAMPLES
OF THE ATTACKERS TARGETING OTHERS:
https://bigleaguepolitics.com/they-literally-know-nothing-ben-rhodes-bragged-about-manipulating-clueless-reporters/
https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/
https://freedom.press/news/lawsuit-seeks-government-guidelines-surveillance-journalists-leak-investigations-surge/
http://www.attacked.biz
http://www.google-is-a-mobster.com
https://knightcolumbia.org/
https://bigleaguepolitics.com/brennan-and-clapper-accused-of-hacking-john-roberts-to-blackmail-him/
https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/
https://bigleaguepolitics.com/heres-why-obama-clearly-ordered-the-spying-on-trump/
https://dailycaller.com/2018/09/17/lindsey-graham-dems-kavanaugh/
https://www.thegatewaypundit.com/2018/09/okeefe-strikes-again-project-veritas-exposes-doj-official-using-govt-databases-to-stalk-business-owners-video/
https://www.politico.com/gallery/16-worst-political-dirty-tricks
http://artofverbalwar.com/2016/11/03/quick-dirty-guide-political-debate-tactics/
https://politicaldictionary.com/topics/dirty-tricks/
https://www.learntoinfluence.com/dirty-tricks-and-office-politics/
https://www.motherjones.com/politics/2012/11/election-dirty-tricks/
https://www.nytimes.com/2016/10/21/us/politics/video-dnc-trump-rallies.html
http://freakonomics.com/2007/11/06/the-complete-history-of-dirty-politics-a-qa-on-anything-for-a-vote/
https://en.wikipedia.org/wiki/Ratfucking
https://www.washingtonpost.com/opinions/the-npr-video-and-political-dirty-tricks/2011/03/17/ABbyMym_story.html
https://www.huffingtonpost.com/rich-rubino/dirty-political-tricks-from-american-politics_b_9324226.html
http://www.electomatic.com/dirty-campaign-techniques/
https://en.wikipedia.org/wiki/COINTELPRO
https://www.cnn.com/2008/POLITICS/05/29/obamas.first.campaign/
https://www.nytimes.com/2016/11/05/us/politics/dirty-tricks-vandalism-and-the-dark-side-of-politics.html
https://whyy.org/articles/political-dirty-tricks-are-a-staple-of-modern-politics/
https://www.theguardian.com/uk-news/2018/mar/19/cambridge-analytica-execs-boast-dirty-tricks-honey-traps-elections
https://medium.com/@j363j/how-roger-stones-campaign-of-tammany-hall-political-corruption-lead-to-trump-russia-3099d87784e
https://www.bridgemi.com/detroit-journalism-cooperative/lawsuits-dirty-tricks-and-angry-ex-wife-detroits-ugliest-election
https://www.salon.com/2016/03/25/hillary_clintons_dirty_politics_bernie_sanders_is_experiencing_the_same_nasty_tricks_that_clintons_campaign_dealt_obama_in_2008/
http://savannahnow.com/opinion-opinion-columns/2016-10-25/cal-thomas-political-dirty-tricks-then-and-now
https://www.cbc.ca/news/politics/5-political-dirty-tricks-we-learned-from-the-robocalls-trial-1.2669924
https://www.reddit.com/r/dredmorbius/comments/2d0r1d/the_reactionary_political_debate_playbook_karl/
https://www.politico.com/story/2016/02/south-carolina-dirty-tricks-republicans-219116
https://www.zerohedge.com/news/2019-02-10/yale-newspaper-publishes-guide-destroying-white-boy-lives-using-stasi-tactics
https://www.americanthinker.com/blog/2019/02/yale_editor_chillingly_urges_fellow_yalies_to_act_as_a_stasi_to_monitor_white_males.html
https://russia-insider.com/en/jeff-bezos-nudie-pics-be-released-cyber-tycoon-complains-about-loss-privacy/ri26224
https://www.youtube.com/watch?v=VP5jqLAjbDw
** 'They
Can't Beat Him On The Law So They Are Trying To Destroy His Life'
-Sen. Graham Questions Dems' Motives On Brett Kavanaugh Sexual
Assault Allegations (dailycaller.com)
** !!!!! Mueller
Hears That Silicon Valley Has Been Manipulating The Entire BREXIT
Campaign !!!!!! Second former employee of controversial data
firm to be questioned by special counsel’s inquiry into Russia
collusion. Per Carole Cadwalladr: Brittany Kaiser is said to be
cooperating fully with the Mueller inquiry. A director of the
controversial data company Cambridge Analytica, who appeared with
Arron Banks at the launch of the Leave.EU campaign, has been
subpoenaed by the US investigation into possible collusion between
the Trump campaign and the Russian government. A spokesman for
Brittany Kaiser, former business development director for Cambridge
Analytica – which collapsed after the Observer revealed details of
its misuse of Facebook data – confirmed that she had been
subpoenaed by special counsel Robert Mueller, and was cooperating
fully with his investigation. He added that she was assisting other
US congressional and legal investigations into the company’s
activities and had voluntarily turned over documents and data. Kaiser, who
gave
evidence to the UK parliament last April in which she claimed
Cambridge Analytica had carried out in-depth work for Leave.EU, is
the second individual connected to the firm subpoenaed by the special
counsel. The Electoral Commission has said its investigation into
Leave.EU found no evidence that the campaign “received donations or
paid for services from Cambridge Analytica …beyond initial scoping
work”. Damian Collins, chairman of parliament’s inquiry into fake
news, said it was “no surprise” that Kaiser was under scrutiny by
Mueller because “her work connected her to WikiLeaks, Cambridge
Analytica and [its parent company] SCL, the Trump campaign, Leave.EU
and Arron Banks”. He said it was now vital Britain had its own
inquiry into foreign interference: “We should not be leaving this
to the Americans.”
** CBS NEWS 60
MINUTES Lara Logan "I’m Being ‘Targeted’ . Per
Tamar Auber: former CBS News foreign correspondent Lara Logan spoke
with Fox News Sean Hannity about her recent comments slamming the
media as “mostly liberal.” Logan told Breitbart podcaster Mike
Ritland the remarks made on his show — which drew widespread
attention online — amounted to “professional suicide.”
Defending her remarks on Hannity’s show, Logan said that as the
result of her speaking out about how the media is “mostly liberal”
she has been targeted because she is an independent voice. “Any
journalists who are not beating the same drum and giving the same
talking points,” she insisted “pay the price” for not going
along with the liberal crowd. She also called out her targeters by
name. “I know they’re
going to come after me,” she told Hannity. “Michael Calderone who
is at the Huffington Post. I can give you the script now. I can tell
you who the players are. Joe Hagan. Brian Stelter.” She added:
“They smear you personally. They go after your integrity. They go
after your reputation as a person and a professional. They will stop
at nothing. I am not the only one. And I am just, I am done, right, I
am tired of it. And they do not get to write my story anymore. They
don’t get to speak for me, I want to say loudly and clearly to
anybody who is listening, I am not owned. Nobody owns me, right? I’m
not owned by the left or the right.” Logan made headlines recently
when, during a scorched earth podcast interview with Ritland, she
said that there was a lot of “weight” in most news organizations
on “one side of the political spectrum.” “The media everywhere
is mostly liberal. But in this country, 85 percent of journalists are
registered Democrats. So that’s just a fact, right?” she told
Ritland. She also trashed reporting based on single, anonymous
government sources. “That’s not journalism, that’s horseshit,”
Logan stressed. “Responsibility for fake news begins with us. We
bear some responsibility for that, and we’re not taking ownership
of that and addressing it. We just want to blame it all on somebody
else.”
** Internal
documents from a private Israeli intelligence firm called Psy-Group
show that, at the time of many incidents, the company, and possibly
other private investigators, were targeting U.S. citizens because
they spoke up about crimes. Psy-Group’s intelligence and influence
operations, which included a failed attempt in the summer of 2017 to
sway a local election in central California, were detailed in a New
Yorker investigation that I co-wrote earlier this month. Before it
went out of business (ie: changed it's name) , last year, Psy-Group
was part of a new wave of private-intelligence firms that recruited
from the ranks of Israel’s secret services and described themselves
as “private Mossads.” Psy-Group initially stood out among its
rivals because it didn’t just gather intelligence; its operatives
used false identities, or avatars, to covertly spread messages in an
attempt to influence what people believed and how they behaved. In
2016, Psy-Group held discussions with the Trump campaign and others
about conducting covert “influence” operations to benefit the
candidate. Psy-Group’s founder and C.E.O., Royi Burstien, a veteran
Israeli intelligence officer who established the firm in 2014, told
me that his talks with the Trump campaign went nowhere. The company’s
posturing, however, attracted the attention of Robert Mueller, the
special counsel, who has been investigating interference in the 2016
Presidential race.'
** FED
BOMBSHELL: Fusion GPS Bribed Dozens of MSM Journalists With Cash To
Run Character Assassinations. High-ranking FBI insiders are
pulling back the curtain on Fusion GPS, the firm that commissioned
and spread the bogus Trump dossier. It appears the embattled
intelligence firm was quite busy paying off Big Media reporters,
according to federal sources who have traced dozens of transactions
between TD Bank and media members as well as media organizations,
sources confirm. But stunningly, Big Media organizations have
employed Fusion GPS to dig dirt on politicians and D.C.’s elite —
namely Donald Trump. “Fusion GPS was on the payroll of the media
and in turn had members of the media on its payroll,” one FBI
insider said. FBI insiders confirm Fusion GPS employed law firms as
well as shell companies to send and receive funds to and from media
and reporters. But the embattled firm also used its accounts at TD
Bank to directly commission reporters. Likewise, Fusion GPS received
funds from media companies into its own accounts at TD Bank, FBI
insiders said, “There are dozens of payments from the media flowing
into their (Fusion GPS’) account,” one federal law enforcement
official said. “One company wired funds to Fusion (GPS) more than a
dozen times.” Why would media companies commission Fusion GPS?
Likely to dig dirt on enemies or secure records that reporters could
not legally obtain, one federal law enforcement insider said. One FBI
insider said the payments to Fusion GPS coincide with Donald Trump’s
run for the White House. The payments were made between Sept. 2015
and Sept. 2017, records show. The unthinkable: The mainstream media
paying Fusion GPS for dirt on Trump to the same firm the Democratic
National Committee paid to fund the bogus Trump dossier. And at the
same time Fusion GPS bribing journalists to place stories — likely
negative about Trump, as well as spread the bogus Trump dossier
around.
** Death
By
Metadata: Jeremy Scahill & Glenn Greenwald Reveal ...
** New
Snowden
Doc Reveals
How GCHQ/NSA Use The Internet To ...
** Snowden
Drip: Government Funded Character Assassination Squads Rampant Online
From The
Intercept:
One of the many pressing stories that remains to be told
from the Snowden archive is how western intelligence agencies are
attempting to manipulate and control online discourse with extreme
tactics of deception and reputation-destruction. It’s time to tell
a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News
to publish a series
of articles
about “dirty
trick”
tactics used by GCHQ’s previously secret unit, JTRIG
(Joint Threat Research Intelligence Group). These were based on
four classified GCHQ documents presented
to
the NSA and the other three partners in the English-speaking “Five
Eyes”
alliance. Today, we at the Intercept are
publishing another
new
JTRIG document, in full, entitled “The Art of Deception:
Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting
highlighted some of the key, discrete revelations: the monitoring of
YouTube and Blogger, the targeting of Anonymous with the very same
DDoS attacks they accuse “hacktivists” of using, the use of
“honey traps” (luring people into compromising situations using
sex) and destructive viruses. But, here, I want to focus and
elaborate on the overarching point revealed by all of these
documents: namely, that these agencies are attempting to control,
infiltrate, manipulate, and warp online discourse, and in doing so,
are compromising the integrity of the internet itself.