“Elon Musk is a criminal and a racketeer”
Op-Ed- By Lee Van Steiner If you hear that phrase and you suddenly turn your brain off and think to yourself: “I don’t want to hear that because either; A.) I bought into Musk’s hype and now I feel stupid or; B.) the mainstream media told me that Musk is someone I should worship and it makes me feel stupid to find out he was a sham...” or both, then get over it. A bunch of media hype told the public that Al Capone, Bernie Madoff and Enron were cool before the truth came out. Live and learn. The Wall Street Journal just said: “Tesla is a soft budget constraint company in two ways. It gets plenty of revenue indirectly as result of government policy (consumer tax rebates, fuel mileage credits, HOV permits), not to mention directly in the form of loan guarantees, corporate tax abatements, etc. But Tesla also gets considerable funding from repeated sales of stock to the public. Though its Wall Street cheerleaders don’t emphasize its dependence on political favoritism, Tesla’s own disclosures are required to be more candid. Keeping investors giddy about Tesla’s prospects therefore implicitly means reassuring them that Tesla will continue to attract the political patronage that has sustained it so far.” This means, in normal language that Musk is running a scam and he is using the taxpayers hard-earned money to operate his shell game. “With enough government handouts, a car company never has to break even” Says the Wall Street Journal.This means that Musk and his Silicon Valley Mobsters are running a Bernie Madoff-style ponzi scheme where they bribe politicians, get huge government hand-outs, use those hand-outs to pump the stock market with fake valuations, skim those sudden stock perks and then do it all over again. Wash-Rinse-Repeat; except their dirty laundry just keeps getting dirtier. Elon Musk is an absolute crime-ster who pays PR agencies to post self-aggrandizing glory Op-Eds about himself in every major city in the world and on Twitter, Google and Facebook around the clock. As his rockets and cars explode into flames over-and-over, and volumes of evidence against him pile up, it is hard to imagine that anyone but the utterly clue-less could still think Musk is not an epic crook. He is the wolf in sheep’s clothing. He is a felon. The FBI, SEC, FTC, and most major regulators, have received hard copies of this fact for many years. When will they commit to the arrest of Musk? Probably when we finally get a new President whose West Wing is no longer running cover for Musk’s crimes, dirty overseas mining deals, “donations”/bribes and market rigging!
0 Comments
New FREE Books Offer Amazing Insights Into The Department of Energy Crony Corruption Scandal – Download and share the books for free now! How does corruption work? How does it affect you? Where did a trillion dollars of your tax money disappear to? Who are the “bad guys” and who are the “good guys”? GET ALL OF THE SECRETS IN ONE SET OF BOOKS. CLICK ONE OF THESE LINKS TO THE FREE REPOSITORIES: MIRROR LINK ONE MIRROR LINK TWO MIRROR LINK THREE MIRROR LINK FOUR
SEE WHY NANCY PELOSI AND JARED HUFFMAN HAVE REFUSED TO TAKE ANY ACTION ON BEHALF OF THE TAXPAYERS WHO LIVE IN THEIR DISTRICTS AND ASKED FOR THEIR HELP:
DOWNLOAD YOUR FREE COPY OF: THE BOOK OF TESLA:
the_book_of_tesla_edit_odt_v.2.7.pdf.zip Download File the_book_of_tesla_edit_odt_v.2.7.pdf Download File the_book_of_tesla_corruption_investigation_tips.pdf.zip Download File the_book_of_tesla_photos_set_1.pdf.zip Download File the_solyndraappendixpt1low.pdf.zip Download File THE CLEANTECH CRASH: SCANDAL UPDATES Version Update 9/1/2015.A Let’s check out the latest news in the notorious “Cleantech Crash” that brought you Solyndra, corruption scandals and political ruckus. Here is a quick overview of the latest findings. What were the attacks and abuses of office:
There are over 200 additional misdeeds and proof overviews… stay tuned. Security Note: To protect Plaintiffs, All of the data exists in globally published, disguised, encrypted “Drawstring” torrents which can be released on a moment’s notice by multiple parties Get ready! Watch us use the same technology, and tactics, that The Donald just used to blow the lid off of the fuddy duddy old political scene...except,... Ours will be ten times more turbo charged.
Nearly half a decade in the planning, saddle-up for a media extravaganza like you never saw before! Pop up the popcorn. Grab a comfy seat. Get ready for the fireworks show of the Century! In a famous case, by victims of the CleanTech Department of Energy funding manipulation scandal, nearly 40 federal officials have been forced to resign or been fired, their campaign backers have been placed under investigation, Entire political campaigns have been crashed; and that appears to be only the beginning. With 2016 elections approaching; the public, victims rights groups, lawyers, the media and more are crunching down on the bad guy politicians who engaged in these misdeeds. The victims have simply asked to be reimbursed for the damages that federal officials caused to them by their intentional targeting actions. According to financial and social economics analysts, if the federal officials do not settle up, the costs of NOT settling will be in the billions. Their campaigns will be ruined, their PR will be countered. Their other schemes will be exposed. It will be a disaster. The disaster could all be avoided if not for the hubris and arrogance of these politicians. According to reporters following the case: “The federal officials wish to act like bitchy little school girls who got caught smoking in the school bathroom”. Instead of accepting responsibility for their actions, the federal officials at the Department of Energy and the White House Press office have gone into “cover-up mode”. In the Age of Transparency, social media and the lowest public approval ratings in the history of Washington DC, their head-in-the-sand approach has proven to be a total disaster. 60 Minutes and tens of thousands of published journalism articles, have shown the Steven Chu Department of Energy façade up for what it was: a total scam against taxpayers. Instead of paying their debts, Department of Energy and White House staff tried to hide things under the rug. Unfortunately, for them, that rug is frayed, thread-bare and slowly falling apart under the tide of public circumspection. History has proven, time and time again, that the longer you keep a cover-up going, the worse it is for those covering up. Clearly, this will no longer wait until after the 2016 elections. In fact, the only hope for any of the political candidates whom the Department of Energy hopes will, in turn, help them, is to resolve this immediately. The victims have gotten together with all of the rest of the groups, individuals and media organization who seek justice in this, and related matters. Together, they have already had great impacts in early take-downs of some who attacked them. They are fine doing the rest of the take-downs, from the biggest to the smallest, all without breaking a single law. All while using the law to their advantage. Department of Energy Staff and White House staff have been fully informed of the metrics of settle this vs. take the hit. Stunning examples have been provided in the take-downs of Solyndra, A123, and dozens of Senators and “political money intermediaries” suddenly getting arrested. Even the FBI and the GAO are helping the victims. About the only support the bad guy politicos have on their side are a few corrupt cash-bag billionaires. Those particular billionaires, though, are one stock market crash away from becoming impotent. The evidence is clear, and proven, as described by one of the victims groups: “The White House put Steven Chu into office per the demands of Silicon Valley campaign financiers. Chu was to supply money back to those financiers, via the rigging of government funding programs. Chu, and DOE staff, sabotaged all applicants for those same funds, per White House staff directions, unless they were part of the campaign financiers group, and PARTICULARLY, if they had technology which competed with those financiers. White House staff put media, economic and digital hit-jobs on anyone who complained. A huge amount of confirming evidence, leaks, witnesses and investigation results proves this, beyond a doubt, to be true. Now, those State and Federal parties have been found out, and must recompense those who they maliciously damaged, in their petty, and vindictive, retribution campaign. These actions, according to federal agency published reports, have cost taxpayers nearly half a trillion dollars in losses.” According to investigators, certain candidates, now running for 2016 elections, were fully aware of this scam and their campaigns will be compromised if this drags on. Many feel that it is “insane and illogical for federal officials to shirk their responsibility in a matter in which they so overtly screwed up” The public is encouraged to call the White House Press office at 202-555-1212 Or https://www.whitehouse.gov/contact And the Department of Justice Press office at 202-514-2000 Or http://www.justice.gov/contact-us …And ask them “why they won’t engage in their responsibility to offset the damages of the victims of the Steven Chu CleanTech Crash and help America get back to work”! This Labor Day, federal documents reveal that nearly a third of America is out of work. The Obama Administration can no longer afford to be intentionally keeping Americans out of work, and running economic hit-jobs on those who try to work, but can’t, because of such hit-jobs. Nuclear-waste plant engineer wins settlement of $4.1 million
He was fired for expressing worries about a plan to turn radioactive sludge into glass. By Ralph Vartabedian Los Angeles Times When Walter Tamosaitis warned in 2011 that the Energy Department’s plans for a waste treatment plant at the former Hanford nuclear weapons complex were unsafe, he was demoted and put in a basement room with cardboard boxes and plywood for office furniture. Tamosaitis had been leading a team of 100 scientists and engineers in designing a way to immobilize millions of gallons of highly toxic nuclear sludge as thick as peanut butter. The sludge, which could deliver a lethal dose of radiation to a nearby person within minutes, is stored in leaking underground tanks near the Columbia River in Washington state. Two years later, Tamosaitis was fired after 44 years with San Francisco-based engineering firm URS, which was later acquired by Los Angeles-based AECOM. He filed a wrongful termination suit but encountered some initial legal setbacks, and it looked as if he had been blackballed from the industry. But on Wednesday, Tamosaitis won a $4.1 million settlement from AECOM, among the largest known legal damages paid out to a whistleblower in the Energy Department’s vast nuclear waste cleanup program. “It was something I lived with every minute of every day over the last five years,” Tamosaitis, 68, said in an interview. “Hopefully, I have sent a message to young engineers to keep their honesty, integrity and courage intact.” AECOM spokesman Ed Mayer said the company reached its resolution with Tamosaitis “in order to avoid the cost and distraction of litigation relating to events that occurred over five years ago. The company strongly disagrees that it retaliated against him in any manner.” Tamosaitis led the research into transforming the toxic and radioactive sludge into solid glass that could theoretically be buried safely for thousands of years. Over time, Tamosaitis said he began to worry that the technology for chemically mixing the sludge was flawed, potentially allowing explosives to build up inside large tanks and clumps of plutonium to form that could start a spontaneous nuclear reaction. The Hanford plant is currently considered to be one of the biggest nuclear administrative disasters in America. Why Did Obama Give Billionaires Elon Musk and John Doerr so many billion dollars of your tax money that it could have paid for all of the schools in America? White Paper – By the Observation Group Dated 8.28.15 Did Elon Musk and John Doerr provide cash, marketing, Google rigging, stock market rewards and other things to Obama people in exchange for billions of dollars in kickbacks? To answer this question with certainty, you have to break it down. The first part of the analysis would have to be whether, or not, the White House gave Elon Musk anything. The press has confirmed and documented that Elon Musk received over six billion dollars from the White House. He was the only person in the world who got this much cash from this source. That is a fact. He was the only person, from among a huge number of his competitors that got this cash and all of the competitors, to Musk and Doerr, who applied for the same money, were sabotaged, denied and manipulated by people who are paid by, or run by The White House. That is a fact. So, it is proven, then, that the White did give Elon Musk taxpayer cash. It is also a documented fact that the White House gave Musk free or low cost real estate, tax waivers, tax credits, government contracts, space ports, private jet fuel and stock valuation increases. This adds an additional many tens of billions of dollars to what Elon Musk received. This is a documented fact on public record. John Doerr runs Kleiner Perkins. This is a fact. Kleiner Perkins is a business associate of Elon Musk and helped create Google. These are documented facts in stock filings, public securities documents and leaked emails. John Doerr and Kleiner Perkins related ownerships received more money from the Obama Administration than almost any other company in the world. This is a documented fact. John Doerr, Elon Musk and the heads of Google work together. This is proven by their mutual quotes in the press, glorifying each other, their stock ownerships, the over-seas bank holdings and their surveilled communications. This is also proven by the fact that, after ten years of internet search results analysis, Google was proven to have rigged search results in order to glorify Musk while deleting any negative news stories about Musk in such an overt way that it is obvious by the historical metrics. No other search engine on Earth, even came within a small fraction of promoting Musk in such an obvious set-up. The EU, the Epstein Group and numerous universities have also conducted conclusive research proving that Google rigs it’s search engine results to hurt some people and benefit others, per it’s investors ideological beliefs. The same type of Musk comparative data tests for Google results were also conducted with analyses, from 2007 to today, between Obama’s name and the names of the top 6 opposing candidates, in opposition to Obama, from January 1, 2007 until today. The results are even more shocking. It is very clear that Google embedded itself in all domestic digital media and news distribution and then manipulated what was read, and viewed by Americans, in order to make Obama get almost all of the attention and control the mood of the public around their perception of Obama vs. any opposing candidate. These research studies are available and prove the fact. Additionally, because the internet provides permanent records, and countries like China and Russia, who Google does not control, also have such archives, anybody can replicate the same research to prove that Google operated attack and glorification programs for, and against, people contingent on the whims of Google’s investors ideologies. So the manipulation of Google is now a proven fact. The business, political, financial and ideological relationship between Elon Musk, John Doerr, Google owners and Google results and Barack Obama are documented, provable facts. Has Elon Musk made cocky statements in the media and acted so narcissistic, as to imply that he felt he was untouchable and had the highest level protections in Washington DC and the Fed? Mitt Romney says so but let’s look deeper. Because “the internet never forgets” all of Musk’s statements, from 2008 to today, are easily documented and can be culled together. Musk is known to have self-purchased many TV segments, ratings reviews and magazine articles about himself, as proven by billing statements and former PR firms employees. Even the most rudimentary analysis of Musk self-promotion vs. all others, during this time and the careful reading of his published words, proves that Musk knew he had White House, NASDAQ, Fed and SEC protections, to prevent his companies from going bankrupt, as “Embarrassment Protection” for The White House. Additionally, Tesla’s patent filings reveal that Musk Engineers warned that his batteries, and the way he used them, created deadly fire and explosion consequences. Musk staffer Bernard Tse, also filed documents, which prove that Tesla knew that their batteries would explode, as early as 2007, and that Tesla knew that when their batteries exploded, “went thermal”, or started fires, they released deadly chemical fumes that cause cancer, liver damage, lung damage, brain damage and the mutation of un-born babies. These documents exist as fact. Therefore, to also prove that Musk was receiving White House protection, we can look to the archives of the U.S. Department of Energy. The U.S. Department of Energy receives more money for technology research and validation than almost any other agency for any other country in the world. The U.S. Department of Energy claims to have the most sophisticated technical research data anywhere. Indeed, when you FOIA, and openly examine the Department of Energy records, they beat Tesla to the knowledge that his approach to the batteries was a deadly dangerous option. Their videos, and documents, prove that they knew it nearly a decade earlier. So, even with both the funders of Tesla: The U.S. Department of Energy and Tesla, itself, saying, in writing, that the Tesla battery solution was one of the most disastrous choices, The White House still ordered Tesla to get it’s cash. All of the above are documented facts. As a sub query, one might ask: “Why would these batteries be so desired if they were so awful? To answer that question, one simply has to look inside the batteries. Inside the Musk batteries, you will find the key chemical called lithium. Who had acquired control of the Afghan, Bolivian and other key lithium mines? Elon Musk, Kliener Perkins and their partners. Kliener Perkins associates did the same thing with Solyndra, Abound, A123 and other DOE “failure companies”. Just before the companies failed, Kliener and Sachs had “scrapped” their profits “off-the-top”. After, the failures, Kleiner and Sachs, even made more money on these failed companies by using them as tax write-offs. These ownerships, waterfall charts and financial subterfuges are now on public record, in SEC filings, Guccifer leaks, Swiss Leaks and other published documents. There is no longer any question about the relationships and financial flows of the scheme. Did Google rig public perceptions in order to make Obama the President so that he could give kickbacks to Google’s partners? The finances track back; the benefits track back; the IT data tracks back; the exclusivities track back; The White House logs track back; the lobby disclosures track back; the emails track back; and witnesses conform this as fact so that must be assumed to be true. Modern stock market tracking has provided the world with massive amounts of software that track stock market activities, ownerships, link-backs and connections on a half second by half-second basis. Day traders use this graphic visualization trackers all day long. Anybody can pull recorded stock market history to see if Elon Musk and John Doerr manipulated stock market valuations by “pumping stock” on a coordinated basis with The Fed, Steven Chu and White House announcements. The data seems to indicate that that is, indeed, what took place. Additionally, Tesla has been sued for fraud and homicide, it has many charges by ex-employees, deaths, explosions and fires. Each time horrible news about Tesla took place, Google would hide the news and push some non-story about Musk, at the same time, data shows that the Tesla stock should have dropped but, as it started to drop, Tesla investors would engage in automated Flash Boy buybacks of their own stock in order to pump the stock back up and falsify the stock market valuation. The data and the documents prove this as fact. Researchers have found extensive additional evidence verifying that a high level, highly corrupt crime did take place in this scheme. This article would become too lengthy if it were to attempt to detail all of the information now available. In short, to answer the question: “Did Elon Musk and John Doerr provide cash, marketing, Google rigging, stock market perks and other things to Obama people in exchange for billions of dollars in kick-backs?” The answer appears to be: YES, without question! America’s Internal Assassination Squad: How Corrupt Politicians & Their Sociopath Billionaires Take You Out By Dave Emory and Paula White Micheal T. works in a little known office, in a little known operation in Arlington, Virginia. He gets up in the morning, brushes his teeth, makes bacon and eggs, reads the Washington Post and then drives 41 miles to work in a plain looking office high-rise. He turns on his computers, upon arriving at his desk, and he begins killing American taxpayers in cities like Houston, San Francisco and Detroit. He does not use bullets. He uses metatags, databases and troll farms. He is a hired character assassin. He works for The President, Senators and their corrupt campaign billionaires. What you are about to read is based on true incidents. The names have been changed. This actually takes place, on a daily basis, and thousands of domestic Americans are the targets. Today Micheal has logged in a “Z-Notice” on a man in Houston, Texas. This man worked with Sandia National Laboratories and this man, who we will call Steve, witnessed technicians burying plutonium in a field because their boss had forgotten to add a concrete casing order to his annual budget. The boss didn’t want to get a budget over-run, so he thought he could have his guys fix the cost problem with a shovel and some dirt. When all of the ground squirrels, that usually ran freely around the Sandia campus, suddenly died. People became suspicious. After Micheal launches the retribution and revenge program on Steve, he will begin the take-down of Susan, a senior nurse at the San Diego VA hospital. She reported that VA officials were putting very ill veterans on a permanent hold, hoping they would die before the VA executives had to go to all of the trouble of treating them. His next “Z-Notice” is on Bob who reported that Steven Chu was embezzling tens of billions of federal dollars during is tenure at the Department of Energy. On and on, the Z-Notices keep on coming. Traditional logic would presume that most government executives would just say: “Thank you for pointing out those bad actors. Here is your whistle-blower reward”. In the world of corruption and dirty politicians, it does not work like that. Criminally corrupt politicians exist because they have a little club of other criminally corrupt politicians who operate a quid-pro-quo round-robin kick-back scheme. That is how the British famous politician pedophile ring operates. One famous political pedophile passes the abused, and the cover-up media, to the next. Each one cover’s the other ones butt, so to speak. The only weapon against them is transparency. The corrupt politicians and their billionaires are the most egotistical, narcissistic idiots you could ever meet. They would rather die than become embarrassed. That is their weak link. Their hubris and ego-mania will always get them. The only weapon, against their foes, is character assassination. It is a dark and grimy path that the corrupt have wandered down. Steve, in Houston, rated a “high kill order” because be embarrassed both the President and two, highly placed, corrupt Senators. Steve went to the FBI and that created files that will never go away. Congress has so many watchdogs on the FBI, now, that, despite what creepy things they may, or may not do, It is no longer possible for the FBI to have “hard drives go missing.” Steve had gotten himself a new job as a technical aide at the University in Houston. Micheal had been watching Steve’s payroll 1099 forms, by hacking into the University HR service, and wanted to make sure that Steve had received at least 2 months of pay. At the same time, Micheal had his boys at Gawker Media write a hatchet job article about how someone suspected that technical aides at the University in Houston were raping young girls. It was then a simple matter for Micheal to use his DNS spoofing computer to send a FAX to the HR Director, at the University, with a copy of the article, with the words: “I THINK THIS MIGHT BE STEVE”, scrawled across one corner of the fax. The Fax ID made it look like the FAX came from the New York Times. Micheal used a voice modifier and a disposable cell phone with a New Jersey spoofed SIM card to call the staff of the University to say that he thought Steve had molested his daughter. Steve was fired, without any reason except “budget cuts”, that afternoon. Micheal used his special account on Axciom and Oracle’s recruiter database engine to place a flag on Steve’s background checks and online profiles so that every person that might hire Steve, will see the special internal code that is the digital equivalent of a “red flag”. This made certain that Steve would never get employed again. He followed that up with a double whammy. Micheal went into all 3 of the main credit services and, first, downgraded Steves credit scores and then he pulled all of the data about anybody that Steve owed money to. Micheal sent anonymous notices to all of the lenders and payment suppliers that Steve was obligated to, in order to try to get them to call his loans, refuse his loans or demand payment, In order to force Steve into bankruptcy and get him to live in his car. Because Steve was exposed to plutonium, Steve got poisoned by it. When Steve applies for disability insurance through social security, Micheal gets a notice on his Lotus Notes tracker and Micheal then makes sure that, first, Steve’s disability review is delayed for as long as humanly possible and then, when he finally gets a response, it is denied. All of Steve’s requests for hearings are denied too. Micheal is delighted. The take-down of Steve is going great. This will teach those damn taxpayers to speak their minds! The Senator will probably give him a big Kill Bonus on this one. Steve can’t get a job, he can’t get disability. He can’t retire and use his other social security because he is not old enough, yet. Micheal, a few days later, gets another Lotus Notes computer notice that Steve has tried to open an online store on Zazzle and Café Press, in a desperate attempt to make money. Micheal sees to that by logging all of Steve’s email addresses as “flagged accounts” and rerouting any payments to Paypal into a black hole. Micheal has the contractors at In-Q-Tel, run a full hack on Steve’s phone. Steve is persistent, though, and Steve tries to set up an online T-Shirt business. Damn, thinks Micheal, his shirts might sell. Can’t have Steve getting any cash. He might hire a lawyer. Micheal logs into the agency account at Tai Systems in Taiwan. Tai Systems is a block, or two, of old warehouses. It looks like nothing is going on at the Tai Building. There are not many cars in the parking lot. Tai only needs a handful of people to do what Tai does. All of the buildings are filled with racks, and racks, of Dell Edge Servers. A few IT guys wander around the building looking for red lights and cooling issues. In one room 12 people sit at long tables with triple LCD screens on each table. They are firing digital machine guns. Tai does two things well. It runs devastating troll farm blog screeds and it fires off some of the most potent denial of service attacks on websites. Micheal orders up a 3 month, 30,000 fake login attempt per day, attack on every website that Steve creates in order to try to get some money. Steve is wiped out and there is now no possible way for Steve to get any money. Steve commits suicide 6 months later, with a little help from a modified sleeping pill prescription, that Micheal had wired into Steve’s Walgreen’s account, that changed Steve’s brain chemistry in order to increase his anxiety levels. Micheal got a big bonus from The Senator for that one. The next target looked fun, some guy named Aaron with some wisenheimer tech start-up called Reddit. Federal lawyers say that ''if a Politician uses these tactics on taxpaying citizens, they are then giving permission for those citizens to return the favor'' Did you piss off a corrupt White House politician and then have your life go to sh*t? Here is how they did it to you: That corrupt Senator then had their chief of staff call either: In-Q-Tel, Tactical Resources or PsyoContract. These are consulting groups made up of former CIA operatives. Those kinds of services sell “hit-jobs”, using the latest government technology and psychological tactics. Here is what they did to you. This activity is referred to as "Organized Corporate Stalking" - or "Political Gang Stalking" in the vernacular. Several million of Americans experience this type of activity in the US if they have been deemed a "dissident, activist, domestic threat or domestic terrorist." There are dozens of websites and YouTube channels dedicated to these black ops which are perpetrated in every major city of the US (and small towns as well) Moving objects around in someone's home is referred to as "gas-lighting" and is done so that the complainant/victim sounds delusional when they call the police for assistance. After all, who is going to break into a home (usually without leaving a trace) and move a few objects around without stealing anything? It does not sound credible or believable. Everything is done so there is plausible deniability, should the potential perpetrators ever be identified. These tactics/techniques were used against American Embassy Staff in Cuba and Russia for years, however US authorities have been quite mum about it since the same techniques are used on a wide scale in the United States against "dissidents, activists" and anyone else who has been extra-judicially deemed a threat to the establishment, the status quo or large companies. These activities are usually done in conjunction with vehicle vandalism/hacking, computer/e-mail/bank account hacking, mail tampering and untraceable, remotely-initiated damage to electronic devices and their power supplies. Additionally victims of these covertly-styled assaults are also plagued by people passing by their residences at all hours and blowing their horns or revving their engines (referred to as a noise campaign). Codes can be remotely stripped/read from computer keyboards, phones and alarm touch-pads since every key generates an electronic signature which can be read/culled from a distance - there are devices built specifically for this purpose. Furthermore, these black ops are done while the victim’s name is simultaneously being slandered via false accusations of criminal activity, theft, violence, crimes of moral turpitude and prior mental health issues. The "teams" perpetrating these illegal acts will try and destroy every aspect of the target's life. You are likely bugged and your vehicle tagged with a GPS, thus moving will not necessarily terminate the issue(s) you are experiencing - although if your experience(s) have been published it may alleviate some of the illegal activities. These politicos will hire private security groups and criminals to follow their targets around in order to let them know that he/she is now "persona non grata" and being monitored. Being a single woman - especially with a child makes these activities even more traumatizing. These tactics were used by Hitler, Mao Tze Tung, the East German Stasi and the KGB. All of these activities are done so that the perpetrators are hard to identify - and the criminal acts are hard to prove to the police - and in court. (plausible deniability). You will find you can’t get a job. You will get many phone calls and emails from people with east indian accents asking you to approve submitting a resume for a great job. Each time you will never hear back from them. Your disappointment will increase. That is how they like it. Those were not real recruiters, they were operatives trying to build you up and let you down, over and over, in order to create a sense of self-doubt and a sense of personal failure, so that you will be too emotionally weakened to fight against the politician. It is also referred to as "No-Touch Torture" and is used to intimidate the target in addition to making them psychologically more vulnerable. The technique was developed by the Stasi and is called Zersetzung Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) was a working technique of the East German secret police, the Stasi. The "measures of Zersetzung", defined in the framework of a directive on police procedures in 1976,[1] were effectively used in the context of so-called "operational procedures" (in German Operative Vorgänge or OV). They replaced the overt terror of the Ulbricht era. As to the practice of repressive persecution, Zersetzung comprised extensive and secret methods of control and manipulation, even in the personal relations of the target. The Stasi relied for this on its network of unofficial collaborators[2] (in German inoffizielle Mitarbeiter or IM), on the State's influence on institutions, and on "operational psychology". By targeted psychological attacks the Stasi tried in this way to deprive the dissident of any possibility of "hostile action". Thanks to numerous files of the Stasi made public following "the turning" (Die Wende) of East Germany, the use of measures of Zersetzung is well documented. Estimates of the number of victims of such measures are on the order of a thousand, or even about 10,000,[3] of which 5,000 sustained irreversible damage.[4] Pensions for restitution have been created for the victims. [Zersetzung is] an operational method of the Ministry for Security of State for an efficacious struggle against subversive doings, in particular in the treatment of operations. With Zersetzung, across different operational political activities, one gains influence over hostile and negative persons, in particular over that which is hostile and negative in their dispositions and beliefs, in such a way that these would be shaken off and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be provoked, exploited, and reinforced. The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to impede thereby, in a preventive manner, the hostile and negative doings, to limit them in large part, or to totally avert them, and if applicable to prepare grounds for a political and ideological reestablishment. Zersetzung is equally an immediate constitutive element of "operational procedures" and other preventive activities to impede hostile gatherings. The principal forces to put Zersetzung in practice are the unofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures of Zersetzung. Zersetzung must be produced on the basis of an analysis of the root of facts and the exact establishment of a concrete goal. Zersetzung must be executed in a uniform and supervised manner; its results must be documented. The political explosivity of Zersetzung poses elevated imperatives in that which concerns the maintenance of secrecy.[5] Political context During the first decade of existence of the German Democratic Republic, political opposition was combatted primarily through the penal code, via accusations of incitement to war or boycott.[6] To counteract the isolation of the GDR on the international scene due to the construction of the Berlin wall in 1963, judicial terror was abandoned.[7] Especially since the debut of the Honecker era in 1971, the Stasi intensified its efforts to punish dissident behaviors without using the penal code.[8] Important motives were the desire on the part of the GDR for international recognition and rapprochement with West Germany at the end of the '60s. In fact the GDR was committed, in adhering to the Charter of the U.N.[9] and the Helsinki accords[10] as well as the fundamental treaty signed with the Federal Republic of Germany,[11] to respect human rights, or at least it announced its intention as such. The regime of the Socialist Unity Party of Germany decided thus to reduce the number of political prisoners, which was compensated for by practices of repression without imprisonment or judicial condemnation.[12][13] In practice The Stasi used Zersetzung essentially as a means of psychological oppression and persecution.[14] Findings of Operativen psychologie (psychological operations),[15] formulated into method at the Stasi's College of Legal Studies (Juristischen Hochschule der Staatssicherheit, or JHS), were applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them through subjection to repeated disappointments, and to socially alienate them through interference in and disruption of their relationships with others. The aim was to then induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism.[16] The Stasi intended that their role as mastermind of the operations remain concealed.[17][18] Jürgen Fuchs, a victim of Zersetzung who later wrote about his experience, described the Stasi's actions as “psychosocial crime”, and “an assault on the human soul”.[16] Although its techniques had been established as effective by the late 1950s, Zersetzung was not defined in terms of scientific method until the mid-1970s, and only began to be carried out in a significantly systematic way in the 1970s and 1980s.[19] It is difficult to determine the number of people targeted, since source material has been deliberately and considerably redacted; it is known, however, that tatics were varied in scope, and that a number of different departments participated in their implementation. Overall there was a ratio of four or five authorised Zersetzung operators for each targeted group, and three for each individual.[20] Some sources indicate that around 5,000 people were “persistently victimised” by Zersetzung.[21] At the College of Legal Studies, the number of dissertations submitted on the subject of Zersetzung was in double figures.[22] It also had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.[23] Institutions implementing and cooperating with Zersetzung operations Almost all Stasi departments were involved in Zersetzung operations, although foremost among these in implementing them were the head department of the Stasi's directorate XX (Hauptabteilung XX) in Berlin, as well as its divisional offices in regional and municipal government. The function of the head and area Abteilung XXs was to maintain surveillance of religious communities; cultural and media establishments; alternative political parties; the GDR's many political establishment-affiliated mass social organisations; sport; and education and health services - effectively, as such, covering all aspects of civic life and activity.[24] The Stasi made use of the means available to them within, and as a circumstance of, the GDR's closed social system. An established, politically-motivated collaborative network (politisch-operatives Zusammenwirken, or POZW) provided them with extensive opportunities for interference in such situations as the sanctioning of professionals and students, expulsion from associations and sports clubs, and occasional arrests by the Volkspolizei[17] (the GDR's quasi-military national police). Refusal of permits for travel to socialist states, or denial of entry at Czechoslovakian and Polish border crossings where no visa requirement existed, were also arranged. The various collaborators (Partnern des operativen Zusammenwirkens) included branches of regional government, university and professional management, housing administrative bodies, the Sparkasse public savings bank, and in some cases head physicians.[25] The Stasi's Linie III (Observation), Abteilung 26 (Telephone and room surveillance) and M (Postal communications) departments provided essential background information for the designing of Zersetzung techniques, with Abteilung 32 procuring the required technology.[26] The Stasi also collaborated with the secret services of other Eastern Bloc countries in implementing Zersetzung. One such example was the co-operation of the Polish secret services in actions taken against branches of the Jehovah's Witnesses organisation in the early 1960s, which would come to be known[27] as "innere Zersetzung"[28] (internal subversion). Against individuals The Stasi applied Zersetzung before, during, after, or instead of incarcerating the targeted individual. The "operational procedures" did not have as an aim, in general, to gather evidence for charges against the target, or to be able to begin criminal prosecutions. The Stasi considered the "measures of Zersetzung" rather in part as an instrument that was used when judiciary procedures were not convenient, or for political reasons such as the international image of the GDR.[29][30] In certain cases, the Stasi attempted meanwhile to knowingly inculpate an individual, as for example in the case of Wolf Biermann: The Stasi set him up with minors, hoping that he would allow himself to be seduced, and that they could then pursue criminal charges.[31] The crimes that they researched for such accusations were non-political, as for example drug possession, trafficking in customs or currencies, theft, financial fraud, and rape.[32] …the Stasi often used a method which was really diabolic. It was called Zersetzung, and it's described in another guideline. The word is difficult to translate because it means originally "biodegradation." But actually, it's a quite accurate description. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn't try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions. —Hubertus Knabe, German historian [33] The proven forms of Zersetzung are described in the directive 1/76: a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; [...] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups [...]; putting in place spatial and temporal obstacles rendering impossible or at least difficult the reciprocal relations of a group [...], for example by [...] assigning distant workplaces. —Directive No. 1/76 of January 1976 for the development of "operational procedures".[34] Beginning with intelligence obtained by espionage, the Stasi established "sociograms" and "psychograms" which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual — for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right — or even the veil of shame from the rumors poured out upon one's circle of acquaintances.[35][36] From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all "schematism" had to be avoided.[35] For marketing and political manipulation, Google now maintains a sociogram of each user and manipulates each user via Stasi-like mood manipulation. Moreover, methods of Zersetzung included espionage, overt, hidden, and feigned; opening letters and listening to telephone calls; encroachments on private property; manipulation of vehicles; and even poisoning food and using false medications.[37] Certain collaborators of the Stasi tacitly took into account the suicide of victims of Zersetzung.[38] It has not been definitely established that the Stasi used x-rays to provoke long-term health problems in its opponents.[39] That said, Rudolf Bahro, Gerulf Pannach, and Jürgen Fuchs, three important dissidents who had been imprisoned at the same time, died of cancer within an interval of two years.[40] A study by the Federal Commissioner for the Records of the State Security Service of the former GDR (Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik or BStU) has meanwhile rejected on the basis of extant documents such a fraudulent use of x-rays, and only mentions isolated and unintentional cases of the harmful use of sources of radiation, for example to mark documents.[41] In the name of the target, the Stasi made little announcements, ordered products, and made emergency calls, to terrrorize him/her.[42][43] To threaten or intimidate or cause psychoses the Stasi assured itself of access to the target's living quarters and left visible traces of its presence, by adding, removing, and modifying objects.[32] Against groups and social relations The Stasi manipulated relations of friendship, love, marriage, and family by anonymous letters, telegrams and telephone calls as well as compromising photos, often altered.[44] In this manner, parents and children were supposed to systematically become strangers to one another.[45] To provoke conflicts and extramarital relations the Stasi put in place targeted seductions by Romeo agents.[31] For the Zersetzung of groups, it infiltrated them with unofficial collaborators, sometimes minors.[46] The work of opposition groups was hindered by permanent counter-propositions and discord on the part of unofficial collaborators when making decisions.[47] To sow mistrust within the group, the Stasi made believe that certain members were unofficial collaborators; moreover by spreading rumors and manipulated photos,[48] the Stasi feigned indiscretions with unofficial collaborators, or placed members of targeted groups in administrative posts to make believe that this was a reward for the activity of an unofficial collaborator.[31] They even aroused suspicions regarding certain members of the group by assigning privileges, such as housing or a personal car.[31] Moreover the imprisonment of only certain members of the group gave birth to suspicions.[47] Target groups for measures The Stasi used Zersetzung tactics on individuals and groups. There was no particular homogeneous target group, as opposition in the GDR came from a number of different sources. Tactical plans were thus separately adapted to each perceived threat.[49] The Stasi nevertheless defined several main target groups:[50]
Prominent individuals targeted by Zersetzung operations included Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, husband and wife Gerd und Ulrike Poppe, and Wolfgang Templin. Social and juridicial process Once aware of his own status as a target, GDR opponent Wolfgang Templin tried, with some success, to bring details of the Stasi's Zersetzung activities to the attention of western journalists.[52] In 1977 Der Spiegel published a five-part article series (“Du sollst zerbrechen!” - "You're going to crack!") by the exiled Jürgen Fuchs, in which he describes the Stasi's “operational psychology”. The Stasi tried to discredit Fuchs and the contents of similar articles, publishing in turn claims that he had a paranoid view of its function,[53] and intending that Der Spiegel and other media would assume he was suffering from a persecution complex.[54][55] This, however, was refuted by the official Stasi documents examined after Die Wende (the political power shift in the GDR in 1989-90). Because the scale and nature of Zersetzung were unknown both to the general population of the GDR and to people abroad, revelations of the Stasi's malicious tactics were met with some degree of disbelief by those affected.[56] Many still nowadays express incomprehension at how the Stasi's collaborators could have participated in such inhuman actions.[57] Since Zersetzung as a whole, even after 1990, was not deemed to be illegal because of the principle of nulla poena sine lege (no penalty without law), actions against involvement in either its planning or implementation were not enforceable by the courts.[58] Because this specific legal definition of Zersetzung as a crime didn't exist,[59] only individual instances of its tactics could be reported. Acts which even according to GDR law were offences (such as the violation of Briefgeheimnis, the secrecy of correspondence) needed to have been reported to the GDR authorities soon after having been committed in order not to be subject to a statute of limitations clause.[60] Many of the victims experienced the additional complication that the Stasi was not identifiable as the originator in cases of personal injury and misadventure. Official documents in which Zersetzung methods were recorded often had no validity in court, and the Stasi had many files detailing its actual implementation destroyed.[61] Unless they had been detained for at least 180 days, survivors of Zersetzung operations, in accordance with §17a of a 1990 rehabilitation act (the Strafrechtlichen Rehabilitierungsgesetzes, or StrRehaG), are not eligible for financial compensation. Cases of provable, systematically effected targeting by the Stasi, and resulting in employment-related losses and/or health damage, can be pursued under a law covering settlement of torts (Unrechtsbereinigungsgesetz, or 2. SED-UnBerG) as claims either for occupational rehabilitation or rehabilitation under administrative law. These overturn certain administrative provisions of GDR institutions and affirm their unconstitutionality. This is a condition for the social equalisation payments specified in the Bundesversorgungsgesetz (the war victims relief act of 1950). Equalisation payments of pension damages and for loss of earnings can also be applied for in cases where victimisation continued for at least three years, and where claimants can prove need.[62] The above examples of seeking justice have, however, been hindered by various difficulties victims have experienced, both in providing proof of the Stasi's encroachment into the areas of health, personal assets, education and employment, and in receiving official acknowledgement that the Stasi was responsible for personal damages (including psychic injury) as a direct result of Zersetzung operations.[63] Modern use of techniques Russia's secret police, the FSB, has been reported to use such techniques against foreign diplomats and journalists.[64] See also
1. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic. Directive No. 1/76 on the Development and Revision of Operational Procedures Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge (OV) 2. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic: The Unofficial Collaborators (IM) of the MfS 3. Jump up ^ Süß, Strukturen, p. 217. 4. Jump up ^ Consider in this regard the written position taken by Michael Beleites, responsible for the files of the Stasi in the Free State of Saxony: PDF, visited 24 August 2010, as well as 3sat : Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, visited 24 August 2010. 5. Jump up ^ Ministry for Security of State, Dictionary of political and operational work, entry Zersetzung: Ministerium für Staatssicherheit (Hrsg.): Wörterbuch zur politisch-operativen Arbeit, 2. Auflage (1985), Stichwort: „Zersetzung“, GVS JHS 001-400/81, p. 464. 6. Jump up ^ Rainer Schröder: Geschichte des DDR-Rechts: Straf- und Verwaltungsrecht, forum historiae iuris, 6 avril 2004. 7. Jump up ^ Falco Werkentin: Recht und Justiz im SED-Staat. Bundeszentrale für politische Bildung, Bonn 1998, 2. durchgesehene Auflage 2000, S. 67. 8. Jump up ^ Sandra Pingel-Schliemann: Zerstörung von Biografien. Zersetzung als Phänomen der Honecker-Ära. In: Eckart Conze/Katharina Gajdukowa/Sigrid Koch-Baumgarten (Hrsg.): Die demokratische Revolution 1989 in der DDR. Köln 2009, S. 78–91. 9. Jump up ^ Art. 1 Abs. 3 UN-Charta. Dokumentiert in: 12. Deutscher Bundestag: Materialien der Enquete-Kommission zur Aufarbeitung von Geschichte und Folgen der SED-Diktatur in Deutschland. Band 4, Frankfurt a. M. 1995, S. 547. 10. Jump up ^ Konferenz über Sicherheit und Zusammenarbeit in Europa, Schlussakte, Helsinki 1975, S. 11. 11. Jump up ^ Art. 2 des Vertrages über die Grundlagen der Beziehungen zwischen der Bundesrepublik Deutschland und der Deutschen Demokratischen Republik vom 21. Dezember 1972. In: Matthias Judt (Hrsg.): DDR-Geschichte in Dokumenten – Beschlüsse, Berichte, interne Materialien und Alltagszeugnisse. Bundeszentrale für politische Bildung Bd. 350, Bonn 1998, S. 517. 12. Jump up ^ Johannes Raschka: „Staatsverbrechen werden nicht genannt“ – Zur Zahl politischer Häftlinge während der Amtszeit Honeckers. In: Deutschlandarchiv. Band 30, Nummer 1, 1997, S. 196 13. Jump up ^ Jens Raschka: Einschüchterung, Ausgrenzung, Verfolgung – Zur politischen Repression in der Amtszeit Honeckers. Berichte und Studien, Band 14, Dresden 1998, S. 15. 14. Jump up ^ Klaus-Dietmar Henke: Zur Nutzung und Auswertung der Stasi-Akten. In: Vierteljahrshefte für Zeitgeschichte. Nummer 4, 1993, S. 586. 15. Jump up ^ Süß: Strukturen. S. 229. 16. ^ Jump up to: a b Pingel-Schliemann: Zersetzen. S. 188. 17. ^ Jump up to: a b Jens Gieseke: Mielke-Konzern. S. 192f. 18. Jump up ^ Pingel-Schliemann: Formen. S. 235. 19. Jump up ^ Süß: Strukturen. S. 202-204. 20. Jump up ^ Süß: Strukturen. S. 217. 21. Jump up ^ Siehe hierzu die schriftliche Stellungnahme des Sächsischen Landesbeauftragten für die Stasi-Unterlagen Michael Beleites zur Anhörung des Rechtsausschusses des Deutschen Bundestages zu den Gesetzentwürfen und Anträgen zur Verbesserung rehabilitierungsrechtlicher Vorschriften für Opfer politischer Verfolgung in der DDR vom 7. Mai 2007 (PDF, 682 KB), eingesehen am 24. August 2010, sowie 3sat: Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, eingesehen am 24. August 2010. 22. Jump up ^ Günter Förster: Die Dissertationen an der „Juristischen Hochschule“ des MfS. Eine annotierte Bibliographie. BStU, Berlin 1997, Online-Quelle (Memento vom 13. Juli 2009 im Internet Archive). 23. Jump up ^ Anforderungen und Wege für eine konzentrierte, offensive, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Juristische Hochschule Potsdam 1977, BStU, ZA, JHS 24 503. 24. Jump up ^ Jens Gieseke: Das Ministerium für Staatssicherheit 1950–1989/90 – Ein kurzer historischer Abriss. In: BF informiert. Nr. 21, Berlin 1998, S. 35. 25. Jump up ^ Hubertus Knabe: Zersetzungsmaßnahmen. In: Karsten Dümmel, Christian Schmitz (Hrsg.): Was war die Stasi? KAS, Zukunftsforum Politik Nr. 43, Sankt Augustin 2002, S. 31, PDF, 646 KB. 26. Jump up ^ Pingel-Schliemann: Zersetzen, S. 141–151. 27. Jump up ^ Waldemar Hirch: Zusammenarbeit zwischen dem ostdeutschen und dem polnischen Geheimdienst zum Zweck der „Zersetzung“ der Zeugen Jehovas. In: Waldemar Hirch, Martin Jahn, Johannes Wrobel (Hrsg.): Zersetzung einer Religionsgemeinschaft: die geheimdienstliche Bearbeitung der Zeugen Jehovas in der DDR und in Polen. Niedersteinbach 2001, S. 84–95. 28. Jump up ^ Aus einem Protokoll vom 16. Mai 1963, zit. n. Sebastian Koch: Die Zeugen Jehovas in Ostmittel-, Südost- und Südeuropa: Zum Schicksal einer Religionsgemeinschaft. Berlin 2007, S. 72. 29. Jump up ^ Richtlinie 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge vom 1. Januar 1976. Dokumentiert in: David Gill, Ulrich Schröter: Das Ministerium für Staatssicherheit. Anatomie des Mielke-Imperiums. S. 390 30. Jump up ^ Lehrmaterial der Hochschule des MfS: Anforderungen und Wege für eine konzentrierte, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Kapitel 11: Die Anwendung von Maßnahmen der Zersetzung in der Bearbeitung Operativer Vorgänge vom Dezember 1977, BStU, ZA, JHS 24 503, S. 11. 31. ^ Jump up to: a b c d Gieseke: Mielke-Konzern. S. 195f. 32. ^ Jump up to: a b Pingel-Schliemann: Phänomen. S. 82f. 33. Jump up ^ Hubertus Knabe: The dark secrets of a surveillance state, TED Salon, Berlin, 2014 34. Jump up ^ Roger Engelmann, Frank Joestel: Grundsatzdokumente des MfS. In: Klaus-Dietmar Henke, Siegfried Suckut, Thomas Großbölting (Hrsg.): Anatomie der Staatssicherheit: Geschichte, Struktur und Methoden. MfS-Handbuch. Teil V/5, Berlin 2004, S. 287. 35. ^ Jump up to: a b Knabe: Zersetzungsmaßnahmen. S. 27–29 36. Jump up ^ Arbeit der Juristischen Hochschule der Staatssicherheit in Potsdam aus dem Jahr 1978, MDA, MfS, JHS GVS 001-11/78. In: Pingel-Schliemann: Formen. S. 237. 37. Jump up ^ Pingel-Schliemann: Zersetzen. S. 266–278. 38. Jump up ^ Pingel-Schliemann: Zersetzen. S. 277. 39. Jump up ^ Pingel-Schliemann: Zersetzen, S. 280f. 40. Jump up ^ Der Spiegel 20/1999: In Kopfhöhe ausgerichtet (PDF, 697 KB), S. 42–44. 41. Jump up ^ Kurzdarstellung des Berichtes der Projektgruppe „Strahlen“ beim BStU zum Thema: „Einsatz von Röntgenstrahlen und radioaktiven Stoffen durch das MfS gegen Oppositionelle – Fiktion oder Realität?“, Berlin 2000. 42. Jump up ^ Udo Scheer: Jürgen Fuchs – Ein literarischer Weg in die Opposition. Berlin 2007, S. 344f. 43. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 44. Jump up ^ Gisela Schütte: Die unsichtbaren Wunden der Stasi-Opfer. In: Die Welt. 2. August 2010, eingesehen am 8. August 2010 45. Jump up ^ Pingel-Schliemann: Zersetzen, S. 254–257. 46. Jump up ^ Axel Kintzinger: „Ich kann keinen mehr umarmen“. In: Die Zeit. Nummer 41, 1998. 47. ^ Jump up to: a b Pingel-Schliemann: Zersetzen, S. 358f. 48. Jump up ^ Stefan Wolle: Die heile Welt der Diktatur. Alltag und Herrschaft in der DDR 1971–1989. Bonn 1999, S. 159. 49. Jump up ^ Kollektivdissertation der Juristischen Hochschule der Staatssicherheit in Potsdam. In: Pingel-Schliemann: Zersetzen. S. 119. 50. Jump up ^ Jens Gieseke: Mielke-Konzern. S. 192f. 51. Jump up ^ Mike Dennis: Surviving the Stasi: Jehovah's Witnesses in Communist East Germany, 1965 to 1989. In: Religion, State and Society. Band 34, Nummer 2, 2006, S. 145-168 52. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 53. Jump up ^ Scheer: Fuchs. S. 347. 54. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 55. Jump up ^ Treffbericht des IMB „J. Herold“ mit Oberleutnant Walther vom 25. März 1986 über ein Gespräch mit dem „abgeschöpften“ SPIEGEL-Redakteur Ulrich Schwarz. Dok. in Jürgen Fuchs: Magdalena. MfS, Memphisblues, Stasi, Die Firma, VEB Horch & Gauck – Ein Roman. Berlin 1998, S. 145. 56. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB). 57. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB). 58. Jump up ^ Interview mit der Bundesbeauftragten für die Stasi-Unterlagen Marianne Birthler im Deutschlandradio Kultur vom 25. April 2006: Birthler: Ex-Stasi-Offiziere wollen Tatsachen verdrehen, eingesehen am 7. August 2010. 59. Jump up ^ Renate Oschlies: Die Straftat „Zersetzung“ kennen die Richter nicht. In: Berliner Zeitung. 8. August 1996. 60. Jump up ^ Hubertus Knabe: Die Täter sind unter uns – Über das Schönreden der SED-Diktatur. Berlin 2007, S. 100. 61. Jump up ^ Ilko-Sascha Kowalczuk: Stasi konkret – Überwachung und Repression in der DDR, München 2013, S. 211, 302f. 62. Jump up ^ Stasiopfer.de: Was können zur Zeit sogenannte „Zersetzungsopfer“ beantragen?, PDF, 53 KB, eingesehen am 24. August 2010. 63. Jump up ^ Jörg Siegmund: Die Verbesserung rehabilitierungsrechtlicher Vorschriften – Handlungsbedarf, Lösungskonzepte, Realisierungschancen, Bundesstiftung Aufarbeitung, Symposium zur Verbesserung der Unterstützung der Opfer der SED-Diktatur vom 10. Mai 2006, PDF (Memento vom 28. November 2010 im Internet Archive), 105 KB, S. 3, eingesehen am 24. August 2010. 64. Jump up ^ Russian spy agency targeting western diplomats, The Guardian, 2011-7-23 How Do You Fight Back When Large Corrupt Entities Attack You: Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them“hit-men”. From the famously vindictive SidneyBlumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; whenthey come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires. Your saving grace, though, will always be this: The “bad guys” are forced to operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. Tips for Tech Companies Under Attack – 1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking. 2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of greatreferences and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups, kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble. 3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you. 4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers. 5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers. 6. Read about who does hired character assassinations, and how they do it, at THIS LINK and watch for the early signs of the attacks. 7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s:Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK http://wp.me/P1EyVm-xH 8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever. 9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics. 10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them” 11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are. 12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators ( http://wp.me/P1EyVm-xH ) that they wanted “out of the way”. 13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages. 14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with. 15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream. 16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information. 17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit. 18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators. 19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove the attackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious. HERE ARE SOME OF THE ACTUAL PAGES FROM THE ATTACK INSTRUCTION MANUALS AS REVEALED BY THE GUCCIFER AND SNOWDEN LEAKS:HERE IS ONE OF THEIR ASSASSINS, OPERATING UNDER ORDERS FROM ELECTED OFFICIALS: |
READ THE CASE EVIDENCE:
THE STORY OF HOW ELECTED OFFICIALS SABOTAGED HUNDREDS OF COMPANIES ON ORDERS FROM CAMPAIGN BILLIONAIRES
Sabotaged by government executives in order to protect their huge illegal kick-back scheme. They got caught. Now they must pay our damages. We are asking every elected official and law enforcement boss: "HOW ARE YOU GOING TO MAKE THIS RIGHT?" "The White House put Steven Chu into office per the demands of Silicon Valley campaign financiers. Chu was to supply money back to those financiers, via the rigging of government funding programs. Chu, and DOE staff, sabotaged all applicants for those same funds, per White House staff directions, unless they were part of the campaign financiers group, and PARTICULARLY, if they had technology which competed with those financiers. White House staff put media, economic and digital hit-jobs on anyone who complained. A huge amount of confirming evidence, leaks, witnesses and investigation results proves this, beyond a doubt, to be true. Now, those State and Federal parties have been found out, and must recompense those who they maliciously damaged, in their petty, and vindictive, retribution campaign."
At this site we have aggregated only a tiny portion of the vast set of materials provided to us by journalists & investigators. There are many more evidence sets on file with authorities.
SEE THE NETWORK NEWS COVERAGE OF THIS CASE: CLICK HERE END THE "BLOW-OFF" & THE ATTACKS ON US!
|