Why Did Obama Give Billionaires Elon Musk and John Doerr so many billion dollars of your tax money that it could have paid for all of the schools in America? White Paper – By the Observation Group Dated 8.28.15 Did Elon Musk and John Doerr provide cash, marketing, Google rigging, stock market rewards and other things to Obama people in exchange for billions of dollars in kickbacks? To answer this question with certainty, you have to break it down. The first part of the analysis would have to be whether, or not, the White House gave Elon Musk anything. The press has confirmed and documented that Elon Musk received over six billion dollars from the White House. He was the only person in the world who got this much cash from this source. That is a fact. He was the only person, from among a huge number of his competitors that got this cash and all of the competitors, to Musk and Doerr, who applied for the same money, were sabotaged, denied and manipulated by people who are paid by, or run by The White House. That is a fact. So, it is proven, then, that the White did give Elon Musk taxpayer cash. It is also a documented fact that the White House gave Musk free or low cost real estate, tax waivers, tax credits, government contracts, space ports, private jet fuel and stock valuation increases. This adds an additional many tens of billions of dollars to what Elon Musk received. This is a documented fact on public record. John Doerr runs Kleiner Perkins. This is a fact. Kleiner Perkins is a business associate of Elon Musk and helped create Google. These are documented facts in stock filings, public securities documents and leaked emails. John Doerr and Kleiner Perkins related ownerships received more money from the Obama Administration than almost any other company in the world. This is a documented fact. John Doerr, Elon Musk and the heads of Google work together. This is proven by their mutual quotes in the press, glorifying each other, their stock ownerships, the over-seas bank holdings and their surveilled communications. This is also proven by the fact that, after ten years of internet search results analysis, Google was proven to have rigged search results in order to glorify Musk while deleting any negative news stories about Musk in such an overt way that it is obvious by the historical metrics. No other search engine on Earth, even came within a small fraction of promoting Musk in such an obvious set-up. The EU, the Epstein Group and numerous universities have also conducted conclusive research proving that Google rigs it’s search engine results to hurt some people and benefit others, per it’s investors ideological beliefs. The same type of Musk comparative data tests for Google results were also conducted with analyses, from 2007 to today, between Obama’s name and the names of the top 6 opposing candidates, in opposition to Obama, from January 1, 2007 until today. The results are even more shocking. It is very clear that Google embedded itself in all domestic digital media and news distribution and then manipulated what was read, and viewed by Americans, in order to make Obama get almost all of the attention and control the mood of the public around their perception of Obama vs. any opposing candidate. These research studies are available and prove the fact. Additionally, because the internet provides permanent records, and countries like China and Russia, who Google does not control, also have such archives, anybody can replicate the same research to prove that Google operated attack and glorification programs for, and against, people contingent on the whims of Google’s investors ideologies. So the manipulation of Google is now a proven fact. The business, political, financial and ideological relationship between Elon Musk, John Doerr, Google owners and Google results and Barack Obama are documented, provable facts. Has Elon Musk made cocky statements in the media and acted so narcissistic, as to imply that he felt he was untouchable and had the highest level protections in Washington DC and the Fed? Mitt Romney says so but let’s look deeper. Because “the internet never forgets” all of Musk’s statements, from 2008 to today, are easily documented and can be culled together. Musk is known to have self-purchased many TV segments, ratings reviews and magazine articles about himself, as proven by billing statements and former PR firms employees. Even the most rudimentary analysis of Musk self-promotion vs. all others, during this time and the careful reading of his published words, proves that Musk knew he had White House, NASDAQ, Fed and SEC protections, to prevent his companies from going bankrupt, as “Embarrassment Protection” for The White House. Additionally, Tesla’s patent filings reveal that Musk Engineers warned that his batteries, and the way he used them, created deadly fire and explosion consequences. Musk staffer Bernard Tse, also filed documents, which prove that Tesla knew that their batteries would explode, as early as 2007, and that Tesla knew that when their batteries exploded, “went thermal”, or started fires, they released deadly chemical fumes that cause cancer, liver damage, lung damage, brain damage and the mutation of un-born babies. These documents exist as fact. Therefore, to also prove that Musk was receiving White House protection, we can look to the archives of the U.S. Department of Energy. The U.S. Department of Energy receives more money for technology research and validation than almost any other agency for any other country in the world. The U.S. Department of Energy claims to have the most sophisticated technical research data anywhere. Indeed, when you FOIA, and openly examine the Department of Energy records, they beat Tesla to the knowledge that his approach to the batteries was a deadly dangerous option. Their videos, and documents, prove that they knew it nearly a decade earlier. So, even with both the funders of Tesla: The U.S. Department of Energy and Tesla, itself, saying, in writing, that the Tesla battery solution was one of the most disastrous choices, The White House still ordered Tesla to get it’s cash. All of the above are documented facts. As a sub query, one might ask: “Why would these batteries be so desired if they were so awful? To answer that question, one simply has to look inside the batteries. Inside the Musk batteries, you will find the key chemical called lithium. Who had acquired control of the Afghan, Bolivian and other key lithium mines? Elon Musk, Kliener Perkins and their partners. Kliener Perkins associates did the same thing with Solyndra, Abound, A123 and other DOE “failure companies”. Just before the companies failed, Kliener and Sachs had “scrapped” their profits “off-the-top”. After, the failures, Kleiner and Sachs, even made more money on these failed companies by using them as tax write-offs. These ownerships, waterfall charts and financial subterfuges are now on public record, in SEC filings, Guccifer leaks, Swiss Leaks and other published documents. There is no longer any question about the relationships and financial flows of the scheme. Did Google rig public perceptions in order to make Obama the President so that he could give kickbacks to Google’s partners? The finances track back; the benefits track back; the IT data tracks back; the exclusivities track back; The White House logs track back; the lobby disclosures track back; the emails track back; and witnesses conform this as fact so that must be assumed to be true. Modern stock market tracking has provided the world with massive amounts of software that track stock market activities, ownerships, link-backs and connections on a half second by half-second basis. Day traders use this graphic visualization trackers all day long. Anybody can pull recorded stock market history to see if Elon Musk and John Doerr manipulated stock market valuations by “pumping stock” on a coordinated basis with The Fed, Steven Chu and White House announcements. The data seems to indicate that that is, indeed, what took place. Additionally, Tesla has been sued for fraud and homicide, it has many charges by ex-employees, deaths, explosions and fires. Each time horrible news about Tesla took place, Google would hide the news and push some non-story about Musk, at the same time, data shows that the Tesla stock should have dropped but, as it started to drop, Tesla investors would engage in automated Flash Boy buybacks of their own stock in order to pump the stock back up and falsify the stock market valuation. The data and the documents prove this as fact. Researchers have found extensive additional evidence verifying that a high level, highly corrupt crime did take place in this scheme. This article would become too lengthy if it were to attempt to detail all of the information now available. In short, to answer the question: “Did Elon Musk and John Doerr provide cash, marketing, Google rigging, stock market perks and other things to Obama people in exchange for billions of dollars in kick-backs?” The answer appears to be: YES, without question!
0 Comments
America’s Internal Assassination Squad: How Corrupt Politicians & Their Sociopath Billionaires Take You Out By Dave Emory and Paula White Micheal T. works in a little known office, in a little known operation in Arlington, Virginia. He gets up in the morning, brushes his teeth, makes bacon and eggs, reads the Washington Post and then drives 41 miles to work in a plain looking office high-rise. He turns on his computers, upon arriving at his desk, and he begins killing American taxpayers in cities like Houston, San Francisco and Detroit. He does not use bullets. He uses metatags, databases and troll farms. He is a hired character assassin. He works for The President, Senators and their corrupt campaign billionaires. What you are about to read is based on true incidents. The names have been changed. This actually takes place, on a daily basis, and thousands of domestic Americans are the targets. Today Micheal has logged in a “Z-Notice” on a man in Houston, Texas. This man worked with Sandia National Laboratories and this man, who we will call Steve, witnessed technicians burying plutonium in a field because their boss had forgotten to add a concrete casing order to his annual budget. The boss didn’t want to get a budget over-run, so he thought he could have his guys fix the cost problem with a shovel and some dirt. When all of the ground squirrels, that usually ran freely around the Sandia campus, suddenly died. People became suspicious. After Micheal launches the retribution and revenge program on Steve, he will begin the take-down of Susan, a senior nurse at the San Diego VA hospital. She reported that VA officials were putting very ill veterans on a permanent hold, hoping they would die before the VA executives had to go to all of the trouble of treating them. His next “Z-Notice” is on Bob who reported that Steven Chu was embezzling tens of billions of federal dollars during is tenure at the Department of Energy. On and on, the Z-Notices keep on coming. Traditional logic would presume that most government executives would just say: “Thank you for pointing out those bad actors. Here is your whistle-blower reward”. In the world of corruption and dirty politicians, it does not work like that. Criminally corrupt politicians exist because they have a little club of other criminally corrupt politicians who operate a quid-pro-quo round-robin kick-back scheme. That is how the British famous politician pedophile ring operates. One famous political pedophile passes the abused, and the cover-up media, to the next. Each one cover’s the other ones butt, so to speak. The only weapon against them is transparency. The corrupt politicians and their billionaires are the most egotistical, narcissistic idiots you could ever meet. They would rather die than become embarrassed. That is their weak link. Their hubris and ego-mania will always get them. The only weapon, against their foes, is character assassination. It is a dark and grimy path that the corrupt have wandered down. Steve, in Houston, rated a “high kill order” because be embarrassed both the President and two, highly placed, corrupt Senators. Steve went to the FBI and that created files that will never go away. Congress has so many watchdogs on the FBI, now, that, despite what creepy things they may, or may not do, It is no longer possible for the FBI to have “hard drives go missing.” Steve had gotten himself a new job as a technical aide at the University in Houston. Micheal had been watching Steve’s payroll 1099 forms, by hacking into the University HR service, and wanted to make sure that Steve had received at least 2 months of pay. At the same time, Micheal had his boys at Gawker Media write a hatchet job article about how someone suspected that technical aides at the University in Houston were raping young girls. It was then a simple matter for Micheal to use his DNS spoofing computer to send a FAX to the HR Director, at the University, with a copy of the article, with the words: “I THINK THIS MIGHT BE STEVE”, scrawled across one corner of the fax. The Fax ID made it look like the FAX came from the New York Times. Micheal used a voice modifier and a disposable cell phone with a New Jersey spoofed SIM card to call the staff of the University to say that he thought Steve had molested his daughter. Steve was fired, without any reason except “budget cuts”, that afternoon. Micheal used his special account on Axciom and Oracle’s recruiter database engine to place a flag on Steve’s background checks and online profiles so that every person that might hire Steve, will see the special internal code that is the digital equivalent of a “red flag”. This made certain that Steve would never get employed again. He followed that up with a double whammy. Micheal went into all 3 of the main credit services and, first, downgraded Steves credit scores and then he pulled all of the data about anybody that Steve owed money to. Micheal sent anonymous notices to all of the lenders and payment suppliers that Steve was obligated to, in order to try to get them to call his loans, refuse his loans or demand payment, In order to force Steve into bankruptcy and get him to live in his car. Because Steve was exposed to plutonium, Steve got poisoned by it. When Steve applies for disability insurance through social security, Micheal gets a notice on his Lotus Notes tracker and Micheal then makes sure that, first, Steve’s disability review is delayed for as long as humanly possible and then, when he finally gets a response, it is denied. All of Steve’s requests for hearings are denied too. Micheal is delighted. The take-down of Steve is going great. This will teach those damn taxpayers to speak their minds! The Senator will probably give him a big Kill Bonus on this one. Steve can’t get a job, he can’t get disability. He can’t retire and use his other social security because he is not old enough, yet. Micheal, a few days later, gets another Lotus Notes computer notice that Steve has tried to open an online store on Zazzle and Café Press, in a desperate attempt to make money. Micheal sees to that by logging all of Steve’s email addresses as “flagged accounts” and rerouting any payments to Paypal into a black hole. Micheal has the contractors at In-Q-Tel, run a full hack on Steve’s phone. Steve is persistent, though, and Steve tries to set up an online T-Shirt business. Damn, thinks Micheal, his shirts might sell. Can’t have Steve getting any cash. He might hire a lawyer. Micheal logs into the agency account at Tai Systems in Taiwan. Tai Systems is a block, or two, of old warehouses. It looks like nothing is going on at the Tai Building. There are not many cars in the parking lot. Tai only needs a handful of people to do what Tai does. All of the buildings are filled with racks, and racks, of Dell Edge Servers. A few IT guys wander around the building looking for red lights and cooling issues. In one room 12 people sit at long tables with triple LCD screens on each table. They are firing digital machine guns. Tai does two things well. It runs devastating troll farm blog screeds and it fires off some of the most potent denial of service attacks on websites. Micheal orders up a 3 month, 30,000 fake login attempt per day, attack on every website that Steve creates in order to try to get some money. Steve is wiped out and there is now no possible way for Steve to get any money. Steve commits suicide 6 months later, with a little help from a modified sleeping pill prescription, that Micheal had wired into Steve’s Walgreen’s account, that changed Steve’s brain chemistry in order to increase his anxiety levels. Micheal got a big bonus from The Senator for that one. The next target looked fun, some guy named Aaron with some wisenheimer tech start-up called Reddit. Federal lawyers say that ''if a Politician uses these tactics on taxpaying citizens, they are then giving permission for those citizens to return the favor'' Did you piss off a corrupt White House politician and then have your life go to sh*t? Here is how they did it to you: That corrupt Senator then had their chief of staff call either: In-Q-Tel, Tactical Resources or PsyoContract. These are consulting groups made up of former CIA operatives. Those kinds of services sell “hit-jobs”, using the latest government technology and psychological tactics. Here is what they did to you. This activity is referred to as "Organized Corporate Stalking" - or "Political Gang Stalking" in the vernacular. Several million of Americans experience this type of activity in the US if they have been deemed a "dissident, activist, domestic threat or domestic terrorist." There are dozens of websites and YouTube channels dedicated to these black ops which are perpetrated in every major city of the US (and small towns as well) Moving objects around in someone's home is referred to as "gas-lighting" and is done so that the complainant/victim sounds delusional when they call the police for assistance. After all, who is going to break into a home (usually without leaving a trace) and move a few objects around without stealing anything? It does not sound credible or believable. Everything is done so there is plausible deniability, should the potential perpetrators ever be identified. These tactics/techniques were used against American Embassy Staff in Cuba and Russia for years, however US authorities have been quite mum about it since the same techniques are used on a wide scale in the United States against "dissidents, activists" and anyone else who has been extra-judicially deemed a threat to the establishment, the status quo or large companies. These activities are usually done in conjunction with vehicle vandalism/hacking, computer/e-mail/bank account hacking, mail tampering and untraceable, remotely-initiated damage to electronic devices and their power supplies. Additionally victims of these covertly-styled assaults are also plagued by people passing by their residences at all hours and blowing their horns or revving their engines (referred to as a noise campaign). Codes can be remotely stripped/read from computer keyboards, phones and alarm touch-pads since every key generates an electronic signature which can be read/culled from a distance - there are devices built specifically for this purpose. Furthermore, these black ops are done while the victim’s name is simultaneously being slandered via false accusations of criminal activity, theft, violence, crimes of moral turpitude and prior mental health issues. The "teams" perpetrating these illegal acts will try and destroy every aspect of the target's life. You are likely bugged and your vehicle tagged with a GPS, thus moving will not necessarily terminate the issue(s) you are experiencing - although if your experience(s) have been published it may alleviate some of the illegal activities. These politicos will hire private security groups and criminals to follow their targets around in order to let them know that he/she is now "persona non grata" and being monitored. Being a single woman - especially with a child makes these activities even more traumatizing. These tactics were used by Hitler, Mao Tze Tung, the East German Stasi and the KGB. All of these activities are done so that the perpetrators are hard to identify - and the criminal acts are hard to prove to the police - and in court. (plausible deniability). You will find you can’t get a job. You will get many phone calls and emails from people with east indian accents asking you to approve submitting a resume for a great job. Each time you will never hear back from them. Your disappointment will increase. That is how they like it. Those were not real recruiters, they were operatives trying to build you up and let you down, over and over, in order to create a sense of self-doubt and a sense of personal failure, so that you will be too emotionally weakened to fight against the politician. It is also referred to as "No-Touch Torture" and is used to intimidate the target in addition to making them psychologically more vulnerable. The technique was developed by the Stasi and is called Zersetzung Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) was a working technique of the East German secret police, the Stasi. The "measures of Zersetzung", defined in the framework of a directive on police procedures in 1976,[1] were effectively used in the context of so-called "operational procedures" (in German Operative Vorgänge or OV). They replaced the overt terror of the Ulbricht era. As to the practice of repressive persecution, Zersetzung comprised extensive and secret methods of control and manipulation, even in the personal relations of the target. The Stasi relied for this on its network of unofficial collaborators[2] (in German inoffizielle Mitarbeiter or IM), on the State's influence on institutions, and on "operational psychology". By targeted psychological attacks the Stasi tried in this way to deprive the dissident of any possibility of "hostile action". Thanks to numerous files of the Stasi made public following "the turning" (Die Wende) of East Germany, the use of measures of Zersetzung is well documented. Estimates of the number of victims of such measures are on the order of a thousand, or even about 10,000,[3] of which 5,000 sustained irreversible damage.[4] Pensions for restitution have been created for the victims. [Zersetzung is] an operational method of the Ministry for Security of State for an efficacious struggle against subversive doings, in particular in the treatment of operations. With Zersetzung, across different operational political activities, one gains influence over hostile and negative persons, in particular over that which is hostile and negative in their dispositions and beliefs, in such a way that these would be shaken off and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be provoked, exploited, and reinforced. The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to impede thereby, in a preventive manner, the hostile and negative doings, to limit them in large part, or to totally avert them, and if applicable to prepare grounds for a political and ideological reestablishment. Zersetzung is equally an immediate constitutive element of "operational procedures" and other preventive activities to impede hostile gatherings. The principal forces to put Zersetzung in practice are the unofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures of Zersetzung. Zersetzung must be produced on the basis of an analysis of the root of facts and the exact establishment of a concrete goal. Zersetzung must be executed in a uniform and supervised manner; its results must be documented. The political explosivity of Zersetzung poses elevated imperatives in that which concerns the maintenance of secrecy.[5] Political context During the first decade of existence of the German Democratic Republic, political opposition was combatted primarily through the penal code, via accusations of incitement to war or boycott.[6] To counteract the isolation of the GDR on the international scene due to the construction of the Berlin wall in 1963, judicial terror was abandoned.[7] Especially since the debut of the Honecker era in 1971, the Stasi intensified its efforts to punish dissident behaviors without using the penal code.[8] Important motives were the desire on the part of the GDR for international recognition and rapprochement with West Germany at the end of the '60s. In fact the GDR was committed, in adhering to the Charter of the U.N.[9] and the Helsinki accords[10] as well as the fundamental treaty signed with the Federal Republic of Germany,[11] to respect human rights, or at least it announced its intention as such. The regime of the Socialist Unity Party of Germany decided thus to reduce the number of political prisoners, which was compensated for by practices of repression without imprisonment or judicial condemnation.[12][13] In practice The Stasi used Zersetzung essentially as a means of psychological oppression and persecution.[14] Findings of Operativen psychologie (psychological operations),[15] formulated into method at the Stasi's College of Legal Studies (Juristischen Hochschule der Staatssicherheit, or JHS), were applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them through subjection to repeated disappointments, and to socially alienate them through interference in and disruption of their relationships with others. The aim was to then induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism.[16] The Stasi intended that their role as mastermind of the operations remain concealed.[17][18] Jürgen Fuchs, a victim of Zersetzung who later wrote about his experience, described the Stasi's actions as “psychosocial crime”, and “an assault on the human soul”.[16] Although its techniques had been established as effective by the late 1950s, Zersetzung was not defined in terms of scientific method until the mid-1970s, and only began to be carried out in a significantly systematic way in the 1970s and 1980s.[19] It is difficult to determine the number of people targeted, since source material has been deliberately and considerably redacted; it is known, however, that tatics were varied in scope, and that a number of different departments participated in their implementation. Overall there was a ratio of four or five authorised Zersetzung operators for each targeted group, and three for each individual.[20] Some sources indicate that around 5,000 people were “persistently victimised” by Zersetzung.[21] At the College of Legal Studies, the number of dissertations submitted on the subject of Zersetzung was in double figures.[22] It also had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.[23] Institutions implementing and cooperating with Zersetzung operations Almost all Stasi departments were involved in Zersetzung operations, although foremost among these in implementing them were the head department of the Stasi's directorate XX (Hauptabteilung XX) in Berlin, as well as its divisional offices in regional and municipal government. The function of the head and area Abteilung XXs was to maintain surveillance of religious communities; cultural and media establishments; alternative political parties; the GDR's many political establishment-affiliated mass social organisations; sport; and education and health services - effectively, as such, covering all aspects of civic life and activity.[24] The Stasi made use of the means available to them within, and as a circumstance of, the GDR's closed social system. An established, politically-motivated collaborative network (politisch-operatives Zusammenwirken, or POZW) provided them with extensive opportunities for interference in such situations as the sanctioning of professionals and students, expulsion from associations and sports clubs, and occasional arrests by the Volkspolizei[17] (the GDR's quasi-military national police). Refusal of permits for travel to socialist states, or denial of entry at Czechoslovakian and Polish border crossings where no visa requirement existed, were also arranged. The various collaborators (Partnern des operativen Zusammenwirkens) included branches of regional government, university and professional management, housing administrative bodies, the Sparkasse public savings bank, and in some cases head physicians.[25] The Stasi's Linie III (Observation), Abteilung 26 (Telephone and room surveillance) and M (Postal communications) departments provided essential background information for the designing of Zersetzung techniques, with Abteilung 32 procuring the required technology.[26] The Stasi also collaborated with the secret services of other Eastern Bloc countries in implementing Zersetzung. One such example was the co-operation of the Polish secret services in actions taken against branches of the Jehovah's Witnesses organisation in the early 1960s, which would come to be known[27] as "innere Zersetzung"[28] (internal subversion). Against individuals The Stasi applied Zersetzung before, during, after, or instead of incarcerating the targeted individual. The "operational procedures" did not have as an aim, in general, to gather evidence for charges against the target, or to be able to begin criminal prosecutions. The Stasi considered the "measures of Zersetzung" rather in part as an instrument that was used when judiciary procedures were not convenient, or for political reasons such as the international image of the GDR.[29][30] In certain cases, the Stasi attempted meanwhile to knowingly inculpate an individual, as for example in the case of Wolf Biermann: The Stasi set him up with minors, hoping that he would allow himself to be seduced, and that they could then pursue criminal charges.[31] The crimes that they researched for such accusations were non-political, as for example drug possession, trafficking in customs or currencies, theft, financial fraud, and rape.[32] …the Stasi often used a method which was really diabolic. It was called Zersetzung, and it's described in another guideline. The word is difficult to translate because it means originally "biodegradation." But actually, it's a quite accurate description. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn't try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions. —Hubertus Knabe, German historian [33] The proven forms of Zersetzung are described in the directive 1/76: a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; [...] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups [...]; putting in place spatial and temporal obstacles rendering impossible or at least difficult the reciprocal relations of a group [...], for example by [...] assigning distant workplaces. —Directive No. 1/76 of January 1976 for the development of "operational procedures".[34] Beginning with intelligence obtained by espionage, the Stasi established "sociograms" and "psychograms" which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual — for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right — or even the veil of shame from the rumors poured out upon one's circle of acquaintances.[35][36] From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all "schematism" had to be avoided.[35] For marketing and political manipulation, Google now maintains a sociogram of each user and manipulates each user via Stasi-like mood manipulation. Moreover, methods of Zersetzung included espionage, overt, hidden, and feigned; opening letters and listening to telephone calls; encroachments on private property; manipulation of vehicles; and even poisoning food and using false medications.[37] Certain collaborators of the Stasi tacitly took into account the suicide of victims of Zersetzung.[38] It has not been definitely established that the Stasi used x-rays to provoke long-term health problems in its opponents.[39] That said, Rudolf Bahro, Gerulf Pannach, and Jürgen Fuchs, three important dissidents who had been imprisoned at the same time, died of cancer within an interval of two years.[40] A study by the Federal Commissioner for the Records of the State Security Service of the former GDR (Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik or BStU) has meanwhile rejected on the basis of extant documents such a fraudulent use of x-rays, and only mentions isolated and unintentional cases of the harmful use of sources of radiation, for example to mark documents.[41] In the name of the target, the Stasi made little announcements, ordered products, and made emergency calls, to terrrorize him/her.[42][43] To threaten or intimidate or cause psychoses the Stasi assured itself of access to the target's living quarters and left visible traces of its presence, by adding, removing, and modifying objects.[32] Against groups and social relations The Stasi manipulated relations of friendship, love, marriage, and family by anonymous letters, telegrams and telephone calls as well as compromising photos, often altered.[44] In this manner, parents and children were supposed to systematically become strangers to one another.[45] To provoke conflicts and extramarital relations the Stasi put in place targeted seductions by Romeo agents.[31] For the Zersetzung of groups, it infiltrated them with unofficial collaborators, sometimes minors.[46] The work of opposition groups was hindered by permanent counter-propositions and discord on the part of unofficial collaborators when making decisions.[47] To sow mistrust within the group, the Stasi made believe that certain members were unofficial collaborators; moreover by spreading rumors and manipulated photos,[48] the Stasi feigned indiscretions with unofficial collaborators, or placed members of targeted groups in administrative posts to make believe that this was a reward for the activity of an unofficial collaborator.[31] They even aroused suspicions regarding certain members of the group by assigning privileges, such as housing or a personal car.[31] Moreover the imprisonment of only certain members of the group gave birth to suspicions.[47] Target groups for measures The Stasi used Zersetzung tactics on individuals and groups. There was no particular homogeneous target group, as opposition in the GDR came from a number of different sources. Tactical plans were thus separately adapted to each perceived threat.[49] The Stasi nevertheless defined several main target groups:[50]
Prominent individuals targeted by Zersetzung operations included Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, husband and wife Gerd und Ulrike Poppe, and Wolfgang Templin. Social and juridicial process Once aware of his own status as a target, GDR opponent Wolfgang Templin tried, with some success, to bring details of the Stasi's Zersetzung activities to the attention of western journalists.[52] In 1977 Der Spiegel published a five-part article series (“Du sollst zerbrechen!” - "You're going to crack!") by the exiled Jürgen Fuchs, in which he describes the Stasi's “operational psychology”. The Stasi tried to discredit Fuchs and the contents of similar articles, publishing in turn claims that he had a paranoid view of its function,[53] and intending that Der Spiegel and other media would assume he was suffering from a persecution complex.[54][55] This, however, was refuted by the official Stasi documents examined after Die Wende (the political power shift in the GDR in 1989-90). Because the scale and nature of Zersetzung were unknown both to the general population of the GDR and to people abroad, revelations of the Stasi's malicious tactics were met with some degree of disbelief by those affected.[56] Many still nowadays express incomprehension at how the Stasi's collaborators could have participated in such inhuman actions.[57] Since Zersetzung as a whole, even after 1990, was not deemed to be illegal because of the principle of nulla poena sine lege (no penalty without law), actions against involvement in either its planning or implementation were not enforceable by the courts.[58] Because this specific legal definition of Zersetzung as a crime didn't exist,[59] only individual instances of its tactics could be reported. Acts which even according to GDR law were offences (such as the violation of Briefgeheimnis, the secrecy of correspondence) needed to have been reported to the GDR authorities soon after having been committed in order not to be subject to a statute of limitations clause.[60] Many of the victims experienced the additional complication that the Stasi was not identifiable as the originator in cases of personal injury and misadventure. Official documents in which Zersetzung methods were recorded often had no validity in court, and the Stasi had many files detailing its actual implementation destroyed.[61] Unless they had been detained for at least 180 days, survivors of Zersetzung operations, in accordance with §17a of a 1990 rehabilitation act (the Strafrechtlichen Rehabilitierungsgesetzes, or StrRehaG), are not eligible for financial compensation. Cases of provable, systematically effected targeting by the Stasi, and resulting in employment-related losses and/or health damage, can be pursued under a law covering settlement of torts (Unrechtsbereinigungsgesetz, or 2. SED-UnBerG) as claims either for occupational rehabilitation or rehabilitation under administrative law. These overturn certain administrative provisions of GDR institutions and affirm their unconstitutionality. This is a condition for the social equalisation payments specified in the Bundesversorgungsgesetz (the war victims relief act of 1950). Equalisation payments of pension damages and for loss of earnings can also be applied for in cases where victimisation continued for at least three years, and where claimants can prove need.[62] The above examples of seeking justice have, however, been hindered by various difficulties victims have experienced, both in providing proof of the Stasi's encroachment into the areas of health, personal assets, education and employment, and in receiving official acknowledgement that the Stasi was responsible for personal damages (including psychic injury) as a direct result of Zersetzung operations.[63] Modern use of techniques Russia's secret police, the FSB, has been reported to use such techniques against foreign diplomats and journalists.[64] See also
1. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic. Directive No. 1/76 on the Development and Revision of Operational Procedures Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge (OV) 2. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic: The Unofficial Collaborators (IM) of the MfS 3. Jump up ^ Süß, Strukturen, p. 217. 4. Jump up ^ Consider in this regard the written position taken by Michael Beleites, responsible for the files of the Stasi in the Free State of Saxony: PDF, visited 24 August 2010, as well as 3sat : Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, visited 24 August 2010. 5. Jump up ^ Ministry for Security of State, Dictionary of political and operational work, entry Zersetzung: Ministerium für Staatssicherheit (Hrsg.): Wörterbuch zur politisch-operativen Arbeit, 2. Auflage (1985), Stichwort: „Zersetzung“, GVS JHS 001-400/81, p. 464. 6. Jump up ^ Rainer Schröder: Geschichte des DDR-Rechts: Straf- und Verwaltungsrecht, forum historiae iuris, 6 avril 2004. 7. Jump up ^ Falco Werkentin: Recht und Justiz im SED-Staat. Bundeszentrale für politische Bildung, Bonn 1998, 2. durchgesehene Auflage 2000, S. 67. 8. Jump up ^ Sandra Pingel-Schliemann: Zerstörung von Biografien. Zersetzung als Phänomen der Honecker-Ära. In: Eckart Conze/Katharina Gajdukowa/Sigrid Koch-Baumgarten (Hrsg.): Die demokratische Revolution 1989 in der DDR. Köln 2009, S. 78–91. 9. Jump up ^ Art. 1 Abs. 3 UN-Charta. Dokumentiert in: 12. Deutscher Bundestag: Materialien der Enquete-Kommission zur Aufarbeitung von Geschichte und Folgen der SED-Diktatur in Deutschland. Band 4, Frankfurt a. M. 1995, S. 547. 10. Jump up ^ Konferenz über Sicherheit und Zusammenarbeit in Europa, Schlussakte, Helsinki 1975, S. 11. 11. Jump up ^ Art. 2 des Vertrages über die Grundlagen der Beziehungen zwischen der Bundesrepublik Deutschland und der Deutschen Demokratischen Republik vom 21. Dezember 1972. In: Matthias Judt (Hrsg.): DDR-Geschichte in Dokumenten – Beschlüsse, Berichte, interne Materialien und Alltagszeugnisse. Bundeszentrale für politische Bildung Bd. 350, Bonn 1998, S. 517. 12. Jump up ^ Johannes Raschka: „Staatsverbrechen werden nicht genannt“ – Zur Zahl politischer Häftlinge während der Amtszeit Honeckers. In: Deutschlandarchiv. Band 30, Nummer 1, 1997, S. 196 13. Jump up ^ Jens Raschka: Einschüchterung, Ausgrenzung, Verfolgung – Zur politischen Repression in der Amtszeit Honeckers. Berichte und Studien, Band 14, Dresden 1998, S. 15. 14. Jump up ^ Klaus-Dietmar Henke: Zur Nutzung und Auswertung der Stasi-Akten. In: Vierteljahrshefte für Zeitgeschichte. Nummer 4, 1993, S. 586. 15. Jump up ^ Süß: Strukturen. S. 229. 16. ^ Jump up to: a b Pingel-Schliemann: Zersetzen. S. 188. 17. ^ Jump up to: a b Jens Gieseke: Mielke-Konzern. S. 192f. 18. Jump up ^ Pingel-Schliemann: Formen. S. 235. 19. Jump up ^ Süß: Strukturen. S. 202-204. 20. Jump up ^ Süß: Strukturen. S. 217. 21. Jump up ^ Siehe hierzu die schriftliche Stellungnahme des Sächsischen Landesbeauftragten für die Stasi-Unterlagen Michael Beleites zur Anhörung des Rechtsausschusses des Deutschen Bundestages zu den Gesetzentwürfen und Anträgen zur Verbesserung rehabilitierungsrechtlicher Vorschriften für Opfer politischer Verfolgung in der DDR vom 7. Mai 2007 (PDF, 682 KB), eingesehen am 24. August 2010, sowie 3sat: Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, eingesehen am 24. August 2010. 22. Jump up ^ Günter Förster: Die Dissertationen an der „Juristischen Hochschule“ des MfS. Eine annotierte Bibliographie. BStU, Berlin 1997, Online-Quelle (Memento vom 13. Juli 2009 im Internet Archive). 23. Jump up ^ Anforderungen und Wege für eine konzentrierte, offensive, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Juristische Hochschule Potsdam 1977, BStU, ZA, JHS 24 503. 24. Jump up ^ Jens Gieseke: Das Ministerium für Staatssicherheit 1950–1989/90 – Ein kurzer historischer Abriss. In: BF informiert. Nr. 21, Berlin 1998, S. 35. 25. Jump up ^ Hubertus Knabe: Zersetzungsmaßnahmen. In: Karsten Dümmel, Christian Schmitz (Hrsg.): Was war die Stasi? KAS, Zukunftsforum Politik Nr. 43, Sankt Augustin 2002, S. 31, PDF, 646 KB. 26. Jump up ^ Pingel-Schliemann: Zersetzen, S. 141–151. 27. Jump up ^ Waldemar Hirch: Zusammenarbeit zwischen dem ostdeutschen und dem polnischen Geheimdienst zum Zweck der „Zersetzung“ der Zeugen Jehovas. In: Waldemar Hirch, Martin Jahn, Johannes Wrobel (Hrsg.): Zersetzung einer Religionsgemeinschaft: die geheimdienstliche Bearbeitung der Zeugen Jehovas in der DDR und in Polen. Niedersteinbach 2001, S. 84–95. 28. Jump up ^ Aus einem Protokoll vom 16. Mai 1963, zit. n. Sebastian Koch: Die Zeugen Jehovas in Ostmittel-, Südost- und Südeuropa: Zum Schicksal einer Religionsgemeinschaft. Berlin 2007, S. 72. 29. Jump up ^ Richtlinie 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge vom 1. Januar 1976. Dokumentiert in: David Gill, Ulrich Schröter: Das Ministerium für Staatssicherheit. Anatomie des Mielke-Imperiums. S. 390 30. Jump up ^ Lehrmaterial der Hochschule des MfS: Anforderungen und Wege für eine konzentrierte, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Kapitel 11: Die Anwendung von Maßnahmen der Zersetzung in der Bearbeitung Operativer Vorgänge vom Dezember 1977, BStU, ZA, JHS 24 503, S. 11. 31. ^ Jump up to: a b c d Gieseke: Mielke-Konzern. S. 195f. 32. ^ Jump up to: a b Pingel-Schliemann: Phänomen. S. 82f. 33. Jump up ^ Hubertus Knabe: The dark secrets of a surveillance state, TED Salon, Berlin, 2014 34. Jump up ^ Roger Engelmann, Frank Joestel: Grundsatzdokumente des MfS. In: Klaus-Dietmar Henke, Siegfried Suckut, Thomas Großbölting (Hrsg.): Anatomie der Staatssicherheit: Geschichte, Struktur und Methoden. MfS-Handbuch. Teil V/5, Berlin 2004, S. 287. 35. ^ Jump up to: a b Knabe: Zersetzungsmaßnahmen. S. 27–29 36. Jump up ^ Arbeit der Juristischen Hochschule der Staatssicherheit in Potsdam aus dem Jahr 1978, MDA, MfS, JHS GVS 001-11/78. In: Pingel-Schliemann: Formen. S. 237. 37. Jump up ^ Pingel-Schliemann: Zersetzen. S. 266–278. 38. Jump up ^ Pingel-Schliemann: Zersetzen. S. 277. 39. Jump up ^ Pingel-Schliemann: Zersetzen, S. 280f. 40. Jump up ^ Der Spiegel 20/1999: In Kopfhöhe ausgerichtet (PDF, 697 KB), S. 42–44. 41. Jump up ^ Kurzdarstellung des Berichtes der Projektgruppe „Strahlen“ beim BStU zum Thema: „Einsatz von Röntgenstrahlen und radioaktiven Stoffen durch das MfS gegen Oppositionelle – Fiktion oder Realität?“, Berlin 2000. 42. Jump up ^ Udo Scheer: Jürgen Fuchs – Ein literarischer Weg in die Opposition. Berlin 2007, S. 344f. 43. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 44. Jump up ^ Gisela Schütte: Die unsichtbaren Wunden der Stasi-Opfer. In: Die Welt. 2. August 2010, eingesehen am 8. August 2010 45. Jump up ^ Pingel-Schliemann: Zersetzen, S. 254–257. 46. Jump up ^ Axel Kintzinger: „Ich kann keinen mehr umarmen“. In: Die Zeit. Nummer 41, 1998. 47. ^ Jump up to: a b Pingel-Schliemann: Zersetzen, S. 358f. 48. Jump up ^ Stefan Wolle: Die heile Welt der Diktatur. Alltag und Herrschaft in der DDR 1971–1989. Bonn 1999, S. 159. 49. Jump up ^ Kollektivdissertation der Juristischen Hochschule der Staatssicherheit in Potsdam. In: Pingel-Schliemann: Zersetzen. S. 119. 50. Jump up ^ Jens Gieseke: Mielke-Konzern. S. 192f. 51. Jump up ^ Mike Dennis: Surviving the Stasi: Jehovah's Witnesses in Communist East Germany, 1965 to 1989. In: Religion, State and Society. Band 34, Nummer 2, 2006, S. 145-168 52. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 53. Jump up ^ Scheer: Fuchs. S. 347. 54. Jump up ^ Gieseke: Mielke-Konzern. S. 196f. 55. Jump up ^ Treffbericht des IMB „J. Herold“ mit Oberleutnant Walther vom 25. März 1986 über ein Gespräch mit dem „abgeschöpften“ SPIEGEL-Redakteur Ulrich Schwarz. Dok. in Jürgen Fuchs: Magdalena. MfS, Memphisblues, Stasi, Die Firma, VEB Horch & Gauck – Ein Roman. Berlin 1998, S. 145. 56. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB). 57. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB). 58. Jump up ^ Interview mit der Bundesbeauftragten für die Stasi-Unterlagen Marianne Birthler im Deutschlandradio Kultur vom 25. April 2006: Birthler: Ex-Stasi-Offiziere wollen Tatsachen verdrehen, eingesehen am 7. August 2010. 59. Jump up ^ Renate Oschlies: Die Straftat „Zersetzung“ kennen die Richter nicht. In: Berliner Zeitung. 8. August 1996. 60. Jump up ^ Hubertus Knabe: Die Täter sind unter uns – Über das Schönreden der SED-Diktatur. Berlin 2007, S. 100. 61. Jump up ^ Ilko-Sascha Kowalczuk: Stasi konkret – Überwachung und Repression in der DDR, München 2013, S. 211, 302f. 62. Jump up ^ Stasiopfer.de: Was können zur Zeit sogenannte „Zersetzungsopfer“ beantragen?, PDF, 53 KB, eingesehen am 24. August 2010. 63. Jump up ^ Jörg Siegmund: Die Verbesserung rehabilitierungsrechtlicher Vorschriften – Handlungsbedarf, Lösungskonzepte, Realisierungschancen, Bundesstiftung Aufarbeitung, Symposium zur Verbesserung der Unterstützung der Opfer der SED-Diktatur vom 10. Mai 2006, PDF (Memento vom 28. November 2010 im Internet Archive), 105 KB, S. 3, eingesehen am 24. August 2010. 64. Jump up ^ Russian spy agency targeting western diplomats, The Guardian, 2011-7-23 How Do You Fight Back When Large Corrupt Entities Attack You: Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them“hit-men”. From the famously vindictive SidneyBlumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; whenthey come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires. Your saving grace, though, will always be this: The “bad guys” are forced to operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. Tips for Tech Companies Under Attack – 1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking. 2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of greatreferences and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups, kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble. 3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you. 4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers. 5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers. 6. Read about who does hired character assassinations, and how they do it, at THIS LINK and watch for the early signs of the attacks. 7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s:Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK http://wp.me/P1EyVm-xH 8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever. 9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics. 10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them” 11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are. 12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators ( http://wp.me/P1EyVm-xH ) that they wanted “out of the way”. 13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages. 14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with. 15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream. 16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information. 17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit. 18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators. 19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove the attackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious. HERE ARE SOME OF THE ACTUAL PAGES FROM THE ATTACK INSTRUCTION MANUALS AS REVEALED BY THE GUCCIFER AND SNOWDEN LEAKS:HERE IS ONE OF THEIR ASSASSINS, OPERATING UNDER ORDERS FROM ELECTED OFFICIALS:Here is what is going to happen to each, and every politician, and their campaign backers, that do not help us, and that do engage in the furtherance of this corruption:
"We will make CERTAIN that they are currently under criminal investigation. We certainly can uproot every PAC, hidden campaign donor, stealth family trust, conduit scheme, off-shore tax haven, corrupt backer, hooker, kick-back stock warrant, illegal credit card use, aide misappropriation finances, private server, cheating husband, Google search engine-rigging kick-back, Google character assassination attack on us, and other corruption misdeed for any political figure on Earth from the biggest to the smallest. We will file lawsuits, FOIA's, press releases, torrents, Tweets, social media postings, and picket your homes. We can do this alongside law enforcement, media and huge swaths of voters." We are 300 million taxpaying voters! ...You used taxpayer money illegally and you attacked us for helping the cops. We saw you do the crimes. The FBI, NSA, OSC, and others, recorded you doing the crimes. Now you have to pay for your crimes! THIS IS WHAT YOU ARE UP AGAINST, HERE, BAD GUYS: (A CORRUPTION TALE)
This is a personal note to a small group of criminally corrupt Senators and their Silicon Valley VC’s. We thought the rest of the world might also find this to be of interest, so we are also publishing it to, you know; the rest of the world. In the Department of Energy CleanTech Fraud Case, our Teams, The FBI, The GAO, The OSC, 60 Minutes, Hornets Nest Alliance, ProPublica, Media Circus Resources, et al, and 300+ million taxpayers all have two things in common: We all hate corruption, and we are all working, around the clock, to end it, each in our own ways. Now you bitches may have billions of dollars but there are only a few of you. The world has decided that you are the biggest scum on Earth and you are driven by greed and narcissism and the dark side. Some of you have been charged with pedophilia, rape and felony stock market fraud. You really did turn out to be pretty slimy sociopathic, misogynistic little rats, didn’t you? On the other hand, we are legion, we are regular folks, public media and federal investigators. We are equally liked and we are driven by morality, ethics and justice. None of the public wants to help you do crimes, but all of the public want to help you go to jail! In national polls, 90% of America said they think you suck! Every single day, hundreds of thousands of additional people, around the globe, find out about your crimes. Every single day, one of your ex-staff, ex-hookers, or insiders, turns states evidence or confides in a journalist. Now, we, and over 30 news journals are paying cash rewards for any other, additional, people who will help to put you in prison by providing even more hard evidence to accomplish that goal. Your future is not looking bright, so Harry Reid, and the rest of you, really won’t be needing those dark sunglasses much longer. The eventual outcome of all this is clear. For you rats, it is now inextricable. So, Feinstein, Musk, Doerr, Schmidt, Jurvetson, et al. You are not Democrats. You didn’t do a single thing to help the voters and the common people. Every single thing you did was to help YOURSELVES at the expense of the common people. You pretended to serve but instead you stole. You took advantage of our system in order for you to rob the U.S. Treasury with your little scam. China, Russia and parts of Washington DC have spent nearly a trillion dollars trying to shut down the internet in order to keep political crimes, like this, from getting exposed. With all of their resources, even they could not shut down the web, or control it. Over three billion internet users won’t let them shut it down. Those users geometrically increase that kind of transparency every hour of every day. You tried to take over Google, Reddit, Mercury News, etc., and manipulate the rest of your little media cabal, but the world is not buying your “Shill-ware”. The public knows you are trying to filter their news and, gosh darn it, they seem to be a might bit pissed about getting treated like farm animals by you. (Go Voat.co) So, Bad Guy’s: This is NEVER going away. Millions of people have the ball on this. You can’t kill them all, and you can’t wipe out their internet. Just sayin’ Here’s the funny part; when David Axelrod, Robert Gibbs and Rahm Emanuel set-up this kick-back scheme, with Elon Musk and John Doerr, they thought that there was no possible way in hell that anybody could ever track the kick-backs back to the campaign financing flip-around. They were thinking this before Snowden, the Swiss Leaks, The Sony Leaks, Guccifer and about 30 leaks you have not even heard about yet. Ooopsie! Throughout all of recorded time; criminals, like you, always win for a little bit, at the start, and always fall, hard, at the end. History has forever remembered Judas, Brutus, John Wilkes Booth, FDR’s Business Plot, Mai Lai, Hitler and the rest of the political horrors of humankind. History will never forget you and you will always exist, in the history books, boiling in your legacy of dark criminality for all of recorded time. Your end is now in sight. We know, for a fact, that overwhelming evidence now sits in the hands of the law, the media and now, the public. The 2016 elections are now approaching and the world has already witnessed the earliest stages of the 2016 election surprises. Rest assured, more fun is en-route. As the new Star Wars film arrives this year; you will be reminded of a choice that you dirty boys and girls need to make. Are you going to stay on the Dark Side? Or… Are you going to turn to the Light? Latecomers won’t get plea deals! Love, The Hornet’s Nest Corruption Taskforce and Friends http://endtheblowoff.weebly.com We want to thank the large numbers of law enforcement, special investigator, journalism and taxpaying volunteer team members, who helped to bring this case to the attention of the world INCLUDING: MESSAGE FROM THE VICTIMS: "PAY US FOR THE DAMAGES YOU CAUSED AND GIVE US AN APOLOGY LETTER AND THIS WILL END!" VOTERS & TAXPAYERS:
Learn How To Wipe Out ANY corrupt politician, and all of their dirty financiers, without breaking a single law, using common & clever law enforcement tactics & resources. Take out ANY corrupt candidate in the 2016 Elections. DIY, right from your living room. Become part of "the Age of Transparency". CLICK HERE You can ask any member of their staff about this. This matter has been featured in all of the news. For even the lowest level intern to claim that they don't know about this would, obviously, be a lie.
Both Nancy, and Jared have, personally, read thousands of pages of investigative documents, from multiple Senate and law enforcement people, about this. This has come to be known as the “CleanTech Scandal”. It has been deeply documented in numerous lawsuits; the 60 Minutes Episode called: “The CleanTech Crash”; Many published GAO investigations; the in-progress FBI case which began with the FBI Solyndra raid; Over 100,000 news stories which deal with the following keywords: “Corruption, steven chu, department of energy Solyndra”; U.S. Senate ethics investigation documents, and thousands of other published, and broadcast materials. In fact, there is now, so much published evidence, proving that this scandal took place, that it is impossible to deny. There are now millions of pages of evidence, and hours of recordings that provide irrefutable proof. For any elected official to say: "We have to study this".. or "We will pass this along", etc. is a stone-walling trick. They know all about this and they know exactly what to do to fix this with two telephone calls. A Tale of Two Whistle-Blowers
One ended in death. One ended in a minor victory Both suffered unspeakable hell ordered by top elected officials. Is this what we pay our elected officials to do to us? Walter Tamosaitis was emotionally and economically tortured, by government officials and those who pay bribes to government officials. His Crime: Going to the authorities about public corruption he witnessed . Gary D. Conley was found dead. He had a bullet in his head. He, also, was emotionally and economically tortured, by government officials and those who pay bribes to government officials. e was found behind Beale Air Force Base in Northern California. His Crime: Going to the authorities about public corruption he witnessed. Both paid the price for doing what every red-blooded American is raised to do: The Right Thing! They are not alone; Rajeev Motwani was in perfect health. He was found floating face-down in his Silicon Valley Swimming Pool. His Crime: Going to the authorities about public corruption he witnessed . Edward Snowden is said to have 12 death warrants issued on his head. His Crime: Going to the authorities about public corruption he witnessed . Yesterday a shooting took place involving another whistle-blower who had fought against attacks on him for 16 years, after he reported corruption. Body, after body is piling up. Destroyed life, after destroyed life, devastated by elected officials, and their campaign billionaires, are stacking the pile, ever higher. One reads, with horror of Brazilian and Korean secret police squads that pull people out of their homes, at night, and haul them off the fields to be tortured and killed. The treatment of American’s, who report crimes, is no different. It is just slower and more subtle. How can the average citizen trust a government where the President, Attorney General and Senior White House staff order hit-jobs on them? Is it any wonder that public approval of the Washington, DC has dropped to the lowest level in Recorded History? How can the government recover its prestige? Simple: Make heroes out of those who report crimes, and stop turning them into attack targets. Let’s look at a few cases: Nation & World Nuclear-waste plant whistleblower wins settlement of $4.1 million He says he was fired for expressing worries about a plan to turn radioactive sludge into glass. By Ralph Vartabedian Los Angeles Times Share Read Article When Walter Tamosaitis warned in 2011 that the Energy Department’s plans for a waste treatment plant at the former Hanford nuclear weapons complex were unsafe, he was demoted and put in a basement room with cardboard boxes and plywood for office furniture. Tamosaitis had been leading a team of 100 scientists and engineers in designing a way to immobilize millions of gallons of highly toxic nuclear sludge as thick as peanut butter. The sludge, which could deliver a lethal dose of radiation to a nearby person within minutes, is stored in leaking underground tanks near the Columbia River in Washington state. Search photos available for purchase: Photo Store → Two years later, Tamosaitis was fired after 44 years with San Francisco-based engineering firm URS, which was later acquired by Los Angeles-based AECOM. He filed a wrongful termination suit but encountered some initial legal setbacks, and it looked as if he had been blackballed from the industry. But on Wednesday, Tamosaitis won a $4.1 million settlement from AECOM, among the largest known legal damages paid out to a whistleblower in the Energy Department’s vast nuclear waste cleanup program. “It was something I lived with every minute of every day over the last five years,” Tamosaitis, 68, said in an interview. “Hopefully, I have sent a message to young engineers to keep their honesty, integrity and courage intact.” AECOM spokesman Ed Mayer said the company reached its resolution with Tamosaitis “in order to avoid the cost and distraction of litigation relating to events that occurred over five years ago. The company strongly disagrees that it retaliated against him in any manner.” Tamosaitis led the research into transforming the toxic and radioactive sludge into solid glass that could theoretically be buried safely for thousands of years. Over time, Tamosaitis said he began to worry that the technology for chemically mixing the sludge was flawed, potentially allowing explosive hydrogen gas to build up inside large tanks and clumps of plutonium to form that could start a spontaneous nuclear reaction. His warnings, although disputed by his employer, were taken seriously by independent federal safety investigators and by senior Energy Department officials. Within months, department officials said the plant’s design and construction failed to meet federal safety standards. In 2013, then-Energy Secretary Steven Chu ordered a halt to the construction of two massive processing facilities at Hanford: the pretreatment plant and the high-level vitrification plant that would turn the waste into glass. The suspension continues to this day amid doubts about whether the plants could operate as designed. So far, more than $13 billion has been spent on the project. Congressman: New York gunman was whistleblower who got 'raw deal' · Kevin Downing, 68, shot dead security guard Idrissa Camara on Friday · New Jersey representative Bill Pascrell had worked with deceased gunman Secretary of Homeland Security Jeh Johnson speaks at news conference near the scene of the shooting at a federal office building in New York on Friday. Photograph: Andrew Kelly/Reuters Associated Press in New York Saturday 22 August 2015 10.11 EDTLast modified on Saturday 22 August 201512.28 EDT · Share on Facebook · Share on Twitter · Share via Email · Share on Pinterest · Share on LinkedIn · Share on Google+ Shares 99 Save for later A New Jersey congressman said on Saturday a man who shot dead a security guard at a federal building in Manhattan on Friday evening, before killing himself, was a whistleblower who had been given “a raw deal” by the agency that fired him. Representative Bill Pascrell said several members of his staff worked with the gunman, Kevin Downing, to resolve his case. He said Downing never showed any violent tendencies, and said he had no idea why Downing acted as he did on Friday. Law enforcement authorities said the 68-year-old opened fire at a federal building on Varick Street that houses an immigration court, a passport processing center and a regional office for the Labor Department, killing security guard Idrissa Camara. Authorities said Downing then walked towards an elevator where he encountered another employee, then shot himself in the head. Camara worked for FJC Security Services, police said. He had been supposed to leave work at 4pm but had agreed to stay for an extra shift, his company said. Downing was fired from his job at the New York City office of the Bureau of Labor Statistics in 1999. A New Jersey newspaper, the Record, reported that in 2013, Pascrell wrote a letter to the Labor Department saying: “There is evidence to indicate Mr Downing’s termination was inappropriate because it was in retaliation for his communication with congressional staff regarding what he believed to be waste and abuse present in the Bureau of Labor Statistics.” After the shooting, federal agents swarmed Downing’s home in Fort Lee, New Jersey, searching for anything that could help them understand it. “We’re in the very early stages of the investigation and are working to establish his motive for coming here, if he had an intended target beyond the security officer, and what the motive was behind the crime,” said James O’Neill, a chief with the New York police department. Advertisement There was no indication the shooting was terrorism-related, O’Neill said. John Miller, the NYPD’s deputy commissioner for intelligence and counterterrorism, said detectives were trying to piece together Downing’s work history. Asked about the prospect Downing was a whistleblower, Miller told reporters: “That would go to potential motive. Part of the background we’re conducting now is, ‘What was his motive?”’ Miller said Downing had also collected Veterans Affairs benefits, but investigators were unsure which branch of the armed services he served in. A VA spokeswoman said the agency had offices in the building but did not immediately respond to questions about Downing’s military service. The FBI was assisting in the investigation because Camara was working as a contractor for a federal agency, police said. Camara was armed but never had a chance to defend himself, the security company said. “Camara ... was an extraordinary senior guard who was well trained, cared deeply about his job and knew that building better than anyone else,” said Michael McKeon, a spokesman for the security company. Hector Figueroa, the president of Camara’s union, 32 BJ SEIU, said he was horrified by the news. “Security officers around the city and country serve on the front line each and every day to keep us safe and secure,” Figueroa said. “We are heartbroken that one of our own has fallen. We hope some of our questions in the face of this terrible tragedy will be answered. For now, we are keeping Camara’s family and loved ones in our thoughts and prayers.” Autism-Vaccine Cover-up Snowballs as Whistleblower's Identity ... Autism-Vaccine Cover-up Snowballs as Whistleblower's Identity is Revealed—LATEST UPDATES 100. ... Not because some shot is causing it. It's not. anh-usa.org/autism-vaccine-cover-up-latest-updates/ More results Whistleblower shot at, pet dog dies trying to save him - The ... A whistleblower who had conducted many sting operations on policemen in the Capital was attacked on Friday night outside his house by some persons. thehindu.com/news/cities/Delhi/whistleblower-shot-at-p... More results Merck Whistleblower Suit A Boon to Vaccine Foes Even As It ... ... vaccines' alleged potential to cause harm is sure to have heard the big news this week -- the unsealing of a whistleblower suit against ... forbes.com/sites/gerganakoleva/2012/06/27/merck-whis... More results CDC scientist says he would never inject his pregnant wife ... CDC scientist says he would never inject his pregnant wife with a flu vaccine because of ... The same whistleblower who recently went public about his ... naturalnews.com/047139_flu_vaccine_mercury_CDC_whistleblo... More results CDC whistleblower exposes massive autism cover-up perpetrated ... CDC whistleblower exposes massive autism cover-up perpetrated by government agency. Español Mobile Site. Home Subscribe (free) ... naturalnews.com/046595_CDC_whistleblower_autism_MMR_vacci... More results Whistleblower: Ukrainian Troops Shot Down MH17 - YouTube Award winning former Associated Press reporter Robert Parry has been told by an intelligence source that the United States is in possession of satellite ... youtube.com/watch?v=CR5HtzbMy-E More results Exclusive: Whistleblower Reveals New VA Scandal - Infowars VA Supervisor: Older Veterans Should be "Shot in the Head" to Save Money Exclusive: Whistleblower reveals new Veterans Affairs scandal infowars.com/exclusive-whistleblower-reveals-new-va-sc... More results H1N1 Vaccine Whistleblower Silenced « DarkGovernment H1N1 Vaccine Whistleblower Silenced. ... With a needle shot in your arm, your death will be slow, painful, and very profitable for drug companies. darkgovernment.com/news/h1n1-vaccine-whistleblower-silenced/ More results For one whistleblower, getting fired was too much For one whistleblower, getting fired was too much. Family of whistleblower says retaliation drove him to kill himself. usatoday.com/story/news/2015/04/12/va-whistleblower-ki... More results CDC Whistleblower: Mercury in Vaccines Given to Pregnant ... CDC Whistleblower: Mercury in Vaccines Given to Pregnant Women Linked to Autism. Health Impact News Editor Comments. ... but is still in the annual flu shot, ... healthimpactnews.com/2014/cdc-whistle-blower-mercury-in-vaccin... More results Va Whistleblower- Death Panels Are Real! Supervisor said older veterans should be "taken outside and shot in the head" to save money A Veterans Affairs whistleblower has exclusively revealed to Infowars ... americasfreedomfighters.com/2014/05/21/va-whistleblower-death-panels-... More results CDC Whistleblower: CDC Covered Up MMR Vaccine Link to Autism ... UPDATE: Whistleblower revealed as Dr. William Thompson. Whistleblower Says CDC Knew in 2003 of Higher Autism Rate Among African-American Boys Receiving MMR Shot ... healthimpactnews.com/2014/cdc-whistleblower-cdc-covered-up-mmr... More results Whistleblower: U.S. Satellite Images Show Ukrainian Troops ... Whistleblower: U.S. Satellite Images Show Ukrainian Troops Shooting Down MH17 Source tells award winning reporter Washington lying about responsibility for ... infowars.com/whistleblower-u-s-satellite-images-show-u... More results Whistleblower shot dead in Uttar Pradesh | Latest News ... An advocate and whistleblower was allegedly shot dead by three unidentified assailants at his residence in Khurja area, 20 kms from here, police said on Wednesday. dnaindia.com/india/report-whistleblower-shot-dead-in-u... More results CDC "Whistleblower" Now Says He'd NEVER Inject His ... - YouTube This is enough to make you throw up, so sorry in advance. Listen to this man who works for the CDC say that he'd NEVER inject his pregnant wife with a flu ... youtube.com/watch?v=32nO3rpeBD4 More results Whistleblowers: Merck hid declining efficacy of MMR shot ... Two former Merck employees lodged a whistleblower suit against the drugmaker, alleging that it overstated the effectiveness of its MMR vaccine. fiercepharma.com/story/whistleblowers-merck-hid-declining-... More results CDC Epidemiologist Whistleblower Confirms New Review Showing ... CDC Epidemiologist Whistleblower Confirms New Review Showing Vaccine Autism Link By ... A Shot of Truth is an educational campaign sponsored by Focus Autism. secure.marketwatch.com/story/cdc-epidemiologist-whistleblower-co... More results Whistleblower shot dead in Bihar - The Hindu In a shocking incident, Ram Thakur (48), an activist and whistleblower, was shot dead in Bihar's Muzaffarpur district on Saturday evening. "Mr. Thakur was part of ... thehindu.com/news/national/whistleblower-shot-dead-in-... More results CDC's "Snowden" MMR Whistleblower Identity Revealed CDC whistleblower is being identified as William Thompson, an author of the paper on timing of MMR vaccination and risk of autism. -- Dan Olmsted. ageofautism.com/2014/08/cdcs-snowden-mmr-whistleblower-id... More results CDC Whistleblower Exposes Ebola ... - National Report A CDC whistleblower has recently gone on record to expose nefarious government plans which ... Why would you go to hell for getting an Ebola shot? That's retarded ... nationalreport.net/cdc-whistleblower-exposes-ebola-vaccinati... More results Autism caused by MMR vaccine: CDC cover-up exposed by CDC ... Autism rates are increasing drastically and so is the $52 billion vaccine industry. But now, CDC whistleblower Dr. examiner.com/article/autism-caused-by-mmr-vaccine-cdc-... More results Whistleblower cop: Oxnard, Calif., police get gun and skull ... Meagan Hockaday and Alfonso Limon - both shot to death by Oxnard Police At 1 AM this past Saturday, Meagan Hockaday, a 26-year-old African-American mother ... dailykos.com/story/2015/03/31/1374603/-Whistleblower-c... More results Whistleblower shot dead in UP | Zee News An advocate and whistleblower was allegedly shot dead by three unidentified assailants at his residence in Khurja area, 20 kms from here, police said on Wednesday. zeenews.india.com/news/uttar-pradesh/whistleblower-shot-dea... More results Whistleblower shot dead in UP's Bulandshahr Bulandshahr: An advocate and whistleblower was allegedly shot dead by three unidentified assailants at his residence in Khurja area, 20 kms from here, police said today. indiatvnews.com/crime/news/whistleblower-shot-dead-in-up-... More results The Whistleblower - Wikipedia, the free encyclopedia The Whistleblower is a 2010 thriller film directed by Larysa Kondracki and starring Rachel Weisz. Kondracki and Eilis Kirwan wrote the screenplay, which was inspired ... en.wikipedia.org/wiki/The_Whistleblower More results Whistleblower comes forward to claim £30m reward for saying ... A mystery whistleblower has claimed a stunning £30 million reward for identifying who shot down Malaysian Airlines flight MH17, killing all 298 on board, it is claimed. dailymail.co.uk/news/article-3131397/Mystery-whistleblowe... More results Frank Serpico - Wikipedia, the free encyclopedia Frank Serpico was the first police officer in the history of the New York City Police Department to step forward to report and subsequently testify openly about ... en.wikipedia.org/wiki/Frank_Serpico More results Autism and Vaccines: CDC Whistleblower Exposes Vaccine ... According to a study by Focus Autism Foundation, a CDC whistleblower revealed manipulation of scientific data in regards to the MMR vaccine. There was pressure from ... organiclifestylemagazine.com/autism-and-vaccines-cdc-whistleblower-exp... More results Philippine Politics 2013: Maguindanao Whistleblower shot dead This is an outrage. A SCHOOL district supervisor in the Central Mindanao region who exposed alleged poll irregularities in the May 14 elections in ... politicaljunkie.blogspot.com/2007/06/maguindanao-whistleblower-shot-de... More results snopes.com: RFID Chips in Ebola Vaccine? Did a CDC whistleblower reveal that . ... Here is the link to this report of the CDC using Ebola to implant RFID chips via vaccine injections. snopes.com/media/notnews/rfidebola.asp More results Load More Whistle-blower shot at in Delhi - Oneindia Whistle-blower shot at in Delhi. Updated: Saturday, April 25, 2015, 22:31 [IST]. HC extends Vyapam whistleblower's security for two months. oneindia.com/india/whistle-blower-shot-at-in-delhi-172... More results ANC World Cup Whistle-Blower Shot Dead My Daily Dose of Sports: World Cup WhistleBlower Shot Dead linked to this post on January 7, 2009. therightperspective.org/2009/01/05/anc-world-cup-whistle-blower-s... More results Whistleblower: ...Rate in African-American Boys Receiving MMR Shot... Whistleblower: CDC Knew in 2003 of Higher Autism Rate in African-American Boys Receiving MMR Shot. By phunkychic666 on August 21, 2014 in News 21. disinfo.com/2014/08/whistleblower-cdc-knew-2003-highe... More results Firing Squads - ...Manual Insinuates Whistleblowers Should be Shot... However, a training manual for employees of the ATF insinuates that whistleblowers like Dodson should be shot before firing squads. freedomoutpost.com/2013/10/firing-squads-atf-manual-insinuat... More results Whistleblower shot at, pet dog dies trying to save him - The Hindu A whistleblower who had conducted many sting operations on policemen in the Capital was attacked on Friday night outside his house by some persons. Chetan Prakash Sharma was shot at in Rajapuri... thehindu.com/todays-paper/tp-national/tp-otherstates/w... More results Whistleblower: ...show ukrainian troops shooting... WHISTLEBLOWER: U.S. SATELLITE IMAGES SHOW UKRAINIAN TROOPS SHOOTING DOWN MH17 Source tells award winning reporter Washington lying about responsibility for tragedy. themillenniumreport.com/2014/07/whistleblower-u-s-satellite-image... More results Whistleblower shot dead at point blank - Video Dailymotion RTI activist Amit Jethwa was shot dead by two unidentified men in front of the Gujarat High Court. http://www.istream.in. dailymotion.com/video/xe3r8w_whistleblower-shot-dead-at-p... More results ...#WhistleblowerKids | In the Best Interests of the 'Whistleblower Kids'? In the Best Interests of the 'Whistleblower Kids'? The 'Hampstead Scandal': from Child Snatching and the Home#Pauffley as #SpinDoctor? #Judgement needs a Shot of #Truth #WhistleblowerKids. whistleblowerkids.uk/2015/03/28/pauffley-as-spindoctor-judgeme... More results Don't shoot the messenger! - - New Internationalist What is a whistleblower? The term is used loosely to describe any person who has and reports insider knowledge of Comments on Don't shoot the messenger! Leave your comment. Your name newint.org/features/2014/04/01/keynote-whistleblowers/ More results Ukraine's Snowden: Whistleblower confirms MH17 was shot down... The Ukrainian whistleblower described what he witnessed on July 17, 2014: the airfield in question It appears the pilot was given orders to shoot down a plane passing through the airspace he patrolled. futuristrendcast.wordpress.com/2014/12/29/ukraines-snowden-whistleblower... More results Addicting Info - Whistleblower Reveals California Cops Get 'Shooting... It's bad enough when cops shoot to kill first and ask questions later, as often happens these days. But do they have to brag about it? The Free Thought Project reports a whistleblower cop came forward... addictinginfo.org/2014/10/12/whistleblower-reveals-californ... More results Whistleblower Cop: ..."Gang Tattoos" To Celebrate Their Shooting... The anonymous whistleblower is in talks with private investigators about how some officers with the department in Oxnard were getting tattoos on their left shoulders as "notches" to signify their shooting... thefreethoughtproject.com/cops-reportedly-gang-tattoos-count-shooti... More results Whistleblower to Former AP Reporter: U.S. Satellite Images Show... Has anyone ascertained if the culprits that shot down this latest Malaysian aircraft, were Muslim? Once they can verify where the shot orignated... dcclothesline.com/2014/07/21/whistleblower-former-ap-report... More results Jimmy Mohlala, World Cup Whistleblower, Shot to Death in South... And then two men showed up at Mohlala's house, started an argument about parking their car, shot his son in the ankle, and then shot and killed him. runofplay.com/2009/01/05/jimmy-mohlala-world-cup-whistl... More results Prison Planet.com » VA Supervisor: Older Veterans Should be "Shot... A Veterans Affairs whistleblower has exclusively revealed to Infowars that the facility at which he of how one supervisor expressed his desire to see older veterans "taken outside and shot in the head." prisonplanet.com/exclusive-whistleblower-reveals-new-va-sc... More results Whistleblower Mark Livingston Battles Wyeth Pharmaceuticals "Sadly," Zuckerman says, "management often adopts a shoot-the-messenger mentality towards whistleblowers, and that is why we need to vigorous enforcement of whistleblower protection laws." lawyersandsettlements.com/articles/whistleblower/wyeth-00187.html More results Whistleblower - Wikipedia, the free encyclopedia This page brought to you ad-free as a public service. Images have been censored at the request of our sponsors. You may view the full article on Wikipedia. A whistleblower (whistle-blower or whistle blower) is a person who exposes misconduct, alleged dishonest or illegal activity occurring in an... wikipedia.sfstate.us/Whistleblower More results Johns Hopkins Scientist Reveals Shocking Report on Flu Vaccines Further, says Doshi, the studies that underlie the CDC's policy of encouraging most people to get a yearly flu shot are often low quality studies that do not substantiate the official claims. realfarmacy.com/johns-hopkins-scientist-reveals-shocking-... More results Breaking! Original Jade Helm Whistle Blower Shot And Left For Dead!... They never looked and I was then shot from ground level two weeks later inside my home. After I get out of the hospital, crippled, my career over, my life ruined and being falsely called crazy... patriotnewswire.com/2015/04/breaking-original-jade-helm-whist... More results |
READ THE CASE EVIDENCE:
THE STORY OF HOW ELECTED OFFICIALS SABOTAGED HUNDREDS OF COMPANIES ON ORDERS FROM CAMPAIGN BILLIONAIRES
Sabotaged by government executives in order to protect their huge illegal kick-back scheme. They got caught. Now they must pay our damages. We are asking every elected official and law enforcement boss: "HOW ARE YOU GOING TO MAKE THIS RIGHT?" "The White House put Steven Chu into office per the demands of Silicon Valley campaign financiers. Chu was to supply money back to those financiers, via the rigging of government funding programs. Chu, and DOE staff, sabotaged all applicants for those same funds, per White House staff directions, unless they were part of the campaign financiers group, and PARTICULARLY, if they had technology which competed with those financiers. White House staff put media, economic and digital hit-jobs on anyone who complained. A huge amount of confirming evidence, leaks, witnesses and investigation results proves this, beyond a doubt, to be true. Now, those State and Federal parties have been found out, and must recompense those who they maliciously damaged, in their petty, and vindictive, retribution campaign."
At this site we have aggregated only a tiny portion of the vast set of materials provided to us by journalists & investigators. There are many more evidence sets on file with authorities.
SEE THE NETWORK NEWS COVERAGE OF THIS CASE: CLICK HERE END THE "BLOW-OFF" & THE ATTACKS ON US!
|