What Happens When The White House Orders An Attack On A Domestic Taxpaying Citizen?


You get attacked by White House operatives when you have the power to change the course of history or to reveal evidence that may get The President removed from office. It is, in fact, a tribute to your significance if it happens to you. A "Tier One" hit job is a high honor because it validates the assertions you are making about the corruption you witnessed. On the other hand, no matter how noble, you will end up ruined, or dead. So there's that!

In one particular case, the FBI, special investigators and Congressional researchers say that there were only 6 people capable of operating attacks of this scale and sophistication against the victim (known as “Witness 7” in reports) .

All 6 of these people are U.S. Government senior officials working in the White House and/or the U.S. Senate.

Every one of the attack technologies and resources used against Witness 7 were previously deployed against Presidential candidates in past elections. The providers, operators and compensation conduits of the attack services are known to law enforcement. The payment records have been uncovered, revealing that over $30M of billings were incurred in the production of, and compensation for, these vendetta attacks. By way of comparison: $30M is the typical WEEKLY expenditure for opposition character assassination programs in a U.S. Presidential election using Gawker, Gizmodo, Facebook, Google and Fusion GPS media attack services.

Witness 7 and his peers swear, warrant and certify that this is true. Witness 7's representatives can prove in a Grand Jury, Civil Jury and Congressional Hearing that White House staff, U.S. Senators and their Silicon Valley financiers did order, operate and finance a massive “hit-job” on the witness as revenge/retribution/vendetta because he reported an organized crime activity involving well known public officials.

EVERY PUBLIC OFFICIAL WHO WAS, BY LAW, SUPPOSED TO HELP THE WITNESS HAS, SO FAR, BEEN PROVEN BY INVESTIGATORS TO HAVE BEEN IN DIRECT COMPETITION AND CONFLICT-OF-INTEREST WITH THE WITNESS.

The effort made by political executives to steer the annual expenditure of trillions of dollars of taxpayer funds and stock market perks to one group of friends or another is called “Cronyism” and it is operated by U.S. Senators and White House staff for profiteering purposes. The corrupt public officials involved here used real estate, tech company stock market ownership, revolving door payola jobs, quid-pro-quo deals and investment bank accounts to profiteer from each deal that the charged officials pushed in Congress.

FBI-level tracking of the covert accounts, trusts, shell corporations, family members and associates of every public official involved in this case proves that they made money by competing with the Applicant’s business ventures. The conflicts-of-interest were massive. The Panama Papers leaks, Swiss Leaks, Snowden Leaks, and all of the other leaks prove this as fact. The facts prove that A modern Character Assassination and political "Kill Order" was executed by famous politicians, and their Silicon Valley oligarch financiers, against the Witness and that government officials blockaded the victims Constitutional rights.

This is how a vendetta, revenge and political payback operation was implemented against an American taxpayer when a "kill order" was issued against on a whistle-blower

In such Lewinsky-style attacks the main client does not like to get their hands dirty so the actual hit job mechanics are performed by companies such as: IN-Q-Tel; Gawker Media; Jalopnik; Gizmodo Media; K2 Intelligence; WikiStrat; Podesta Group; Fusion GPS; Google; YouTube; Alphabet; Facebook; Twitter; Think Progress; Media Matters); Black Cube; Correct The Record; Orbis Business Intelligence, Undercover Global Ltd; Stratfor; Jigsaw; ShareBlue/Acronym; Cambridge Analytica; Sid Blumenthal; David Brock; Plouffe Consulting; David Drummond; Draper Family Fund; Eric Schmidt Family Fund; PR Firm Sunshine Sachs; Yasmin Green; Jared Cohen; Covington and Burling; Buzzfeed; Perkins Coie and Wilson Sonsini to run hit-jobs, character assassinations, dirty tricks and economic reprisal attacks on any party who reported the crimes. Each of those entities are now under federal and civil investigation. These are the people and companies that except cash, revolving door jobs, political appointments, insider trading stock in Silicon Valley tech companies, prostitutes and real estate in exchange for destroying the lives of others.

These attackers deserve to be punished for the rest of their lives for taking away the lives of others in exchange for remuneration. People that they have attacked have committed to hunting them for the rest of time and exposing them in the media and to law enforcement at every opportunity. Most victims of their attacks feel that "...these assassins should be publicly shamed in the media and forced out of business..." like Gawker, Cambridge Analytica and other attack services were.

These attack services are responsible for 90% of the "Fake News" problem in the world because they are the authors of most fake news. Congress must act to make these kinds of attack companies illegal!

These digital assassination services offer hit-jobs, character assassinations and economic reprisal programs to famous billionaires and corrupt politicians who are seeking revenge, retribution and vendetta executions.

These are the specific attacks undertaken against Witness 7:


- Government agency bosses solicited the target with false promises of future loans, contracts and grants from their agency and caused the target victim to expend millions of dollars and years of their time for government projects which those government bosses had covertly already promised to their friends. They defrauded Witness 7 and his investors, knowing that they had already hard-wired the money exclusively for their friends and that, from Day One, Witness 7 and his Team were never going to be allowed to compete with the Government agency bosses friends like Elon Musk, Mark Zuckerberg, Larry Page and John Doerr. Even though, Witness 7's Team beat every competitor on every competitive metric, the reviewers were all of their competitors. They used the target victim as a “smokescreen” to cover their illegal government slush-funds for the victims competitors and personal enemies. By using this tactic, the attackers drain the target victims funds and forced victims into an economic disaster without the government bosses fearing any reprisal for their scam. The mobsters made billions of dollars in profit and wind-fall tax gains in the notorious Solyndra scandals as seen in the CBS 60 Minutes episode: “The Cleantech Crash”, thousands of TV news segments and the related GAO and Congressional corruption reports.

- Government officials and LSC corporation (A federal agency dedicated to providing legal services to victims) blockaded victim’s rights to legal representation in order to prevent victim from personally suing the attackers because such a lawsuit would have embarrassed corrupt public officials. High tech law firms that were discussing a services agreement with victim were threatened and ordered to not help victim or “they would be black-listed or be cut-off from tens of millions of dollars of Google, Netflix, Facebook and government contracts”. Individual lawyers were threatened with black-listing and getting “flooded with more filings than you could ever respond to in your life-time...” LSC officials, who were almost entirely Obama Administration associates, refused to assist with lawyer referrals, which is against their federal contract. Court-requested legal services applications were stone-walled and "lost".

- An animated attack film was produced attacking victim. An animated film is an expensive effort involving considerable time and expense. An attacker must be well financed to undertake such an effort. The film was published on YouTube and locked onto the very top search result line on every YouTube search in front of 5 billion internet users for over a decade. The damage to victim’s reputation is estimated in the tens of millions of dollars. YouTube steadfastly refused to remove or adjust the search results even though YouTube executives knew victim and knew that the video represented a character assassination attempt against victim because YouTube owners finance the political campaigns of the public officials who ordered the attacks. While Google/YouTube stated to Congress that all of it’s search results are arbitrary, the never-moving search result of this attack video proved that Google’s and YouTube’s search results are manually manipulated by human maintained black-lists. Any counter-measures videos refuting each and every attack point were hidden or deleted by YouTube.

- Social networking sites including MeetUp, Match, Facebook, etc. and all other IAC-owned, or similar, sites (IAC is managed by Hillary Clinton's daughter, whose Mother knew victim) have had their profiles, texts, and inter-member communications, since those companies were started sold to outside adversaries, hacked or purchased. The financiers of almost every one of these "social" sites are also the financiers of the suspects. The attack service providers use Palantir,  In-Q-Tel, Taleo, etc. data analysis software to analyze every activity in those services in order to find honey-trap, blackmail and social conflict exploitation opportunities. Your social life will, essentially, end. Every photo on every social site is cross checked with every other photo on the internet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total manipulation profile data file on you. New contacts on these sites were contacted by the attackers and told to “avoid” the victim in order to damage victim.

- Social Security, SSI, SDI, Disability and other earned benefits were stone-walled. Applications for benefits for the victim were intentionally “lost” like a “Lois Lerner hard drive”. Files in the application process “disappeared”. A U.S. Senator ordered Applicant’s benefits to “never be approved” even though victim worked 60 hour+ weeks for decades in service to their nation and their community. That same Senator was revealed housing Chinese spies and hiring Fusion GPS for other hit jobs. A SSA official in the local SSA office, who had a devout expressed hatred against one United States President ordered a benefits blockade against victim because he found out that victim’s ex-lawyer now worked in the White House. That was a felony violation of victim's rights.

- Government officials and tech oligarchs contacted members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade victim from receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit" cases) you will never get investor funding again.

- Federal FOIA requests were hidden, frozen, stone-walled, delayed, lied about and only partially responded to in order to seek to hide information and run cover-ups.

- Compromised State and federal officials play an endless game of Catch-22 by arbitrarily determining that arbitrary deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed.

- Multiple victims were found to be strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after victim’s work with the Department of Energy weapons and energy facilities. Many wonder if victim was intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of victims were exposed to deadly compounds and radiations, via DOE, without being provided with proper HazMat suits which DOE officials knew were required. Cellular level exotic laboratory toxins are found in victims biology including cesium, nano-particles and telomere-killing materials.

- Victims employers including Kaiser Permanente, Artech, Sony, etc. were called, and faxed, and ordered to fire target victims from their places of employment, in the middle of the day, with no notice, as a retribution tactic. The attackers openly discussed a planned attack on social media, then executed the attack.

- On orders from Obama White House officials Google, YouTube, Gawker Media and Gizmodo Media produced attack articles and defamation videos. Google locked these contrived attack articles from the Nicholas Guido Denton tabloid empire on the top line, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over $40+ million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of these attacks proves that Google rigged these attacks against victim on the internet and that all of Google’s “impressions” are manually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. For all of time, when-ever any person in the world typed victims name on the Google-controlled internet, they were directed to defamation articles operated and created by Google's financiers and partners. This data was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of public perceptions. The FBI has been formally asked to interview attackers including: Nicholas Guido Denton, Ian Fette, Adrian Covert, Nick Cook and John Hermann. Victim's of those attackers have hired private investigators to place them under permanent surveillance. See more in: How Google Controls Government Policy And Process In America FREE.pdf

- Victims HR and employment records, on Taleo, Palantir, SAP, IBM DB and EVERY recruiting and hiring database, was embedded with negative keywords and “flags” in order to prevent the victim from ever gaining future employment.

- Gary D. Conley, Seth Rich, Rajeev Motwani who victim knew, and many other whistle-blowers in these matters, turned up dead under strange circumstances. Many of them seem to have been murdered using sophisticated spy agency-style tactics. Victim has received ongoing death threats for his help to federal investigations in the larger organized crime investigation relative to this matter.

- Paypal (A DNC-biased operation) and other on-line payments for on-line sales by victim are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target who competed with the attackers interests and holdings. This further denied victim income. As a test, victim built an online store with hundreds of thousands of products and marketed it globally. Trackers, placed by victim’s technicians, on servers, discovered that Paypal and an outside “Virgina-based system” were DNS and payment re-directed all traffic away from the store so that victim received no traffic and no income. In DNS redirection, "website spoofing" sends target victims websites to dead ends where no sales orders or customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using outside covert servers operated by the attackers and revealed in the Snowden Leaks. All commercial storefronts and on-line sales attempts by target victims, had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto, California in order to terminate revenue potentials for the victim.

- Contracted trolls, shills, botnets and synth-blog deployments are deployed to place defamatory statements and disinformation about victim in front of 7.5 billion people around the world on the internet in order to seek to damage their federal testimony credibility by a massively resourced facility. Some of these troll farms were uncovered in Russia, Ukraine, Israel and Brazil.

- Campaign finance dirty tricks contractors were hired by campaign financiers to attack the friends and family members of the target victim in order to create low morale for the target victims psyche and motivation.

- In one case covert political partner: Google, transferred large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on Victims by many magnitudes.

- Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in charge of the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices with Google-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts that Google engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’s operations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles and investigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff. A conflict-of-interest unlike any in American history. Google’s investors personally told Applicant they would “kill him”. Google and the Obama Administration were “the same entity”. Applicant testified in the review that got Michelle Lee terminated and uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds. Most of the corrupt politicians in this case own parts of Google or have been paid campaign funds by Google.

- “Honeytraps” and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject.

- Mortgage and rental applications had red flags added to them in databases to prevent the targets from getting homes or apartments.

- Krebs On Security, Wired, Ars Technica, The Wall Street Journal and most major IT publications have reported that hundreds of spy "back-doors" have been found on every Intel, AMD, Apple, Xfinity, Cisco, Microsoft, Juniper Networks motherboard, chip-set and hardware component set. This means that the attackers used a "key" code can open any of victims computer, server, router, cloud-network or other network connected device and read every file, photo, video, your calendar and email on devices at any time from any location on Earth. This has been widely reported on by Glenn Greenwald, Edward Snowden, Jeremy Scahill, Cheryl Atkisson of CBS News and others. Victim was hacked at least 10 times. In a number of instances, people, who victim had been communicating with online, were mysteriously contacted by a third party who sent them the Gizmodo attack article or phoned them with warnings to avoid victim. These kinds of Man-In-The-Middle interceptions would only have been possible from hacking and MITM surveillance tactics. Microsoft Outlook, an easily hacked software program, was found to be sending copies of communications to adversaries via a "dark drop".

- McCarthy-Era "Black-lists" were created and employed against target victims who competed with Obama Administration executives and their campaign financiers to prevent them from getting funding and future employment. This White House process is known as “RatFucking”, a tactic that is documented in a variety of published reports and on Wikipedia.

- The housing rights of Applicant were stalled in reprisal. Public records show that tens of thousands of other applicants were moved ahead of victim even though victim’s validation metrics exceeded those of almost every other Applicant. Victim was “black-listed”.

Federal law enforcement, the United States Congress and the highest level investigators in the U.S., and abroad, have documented (per the “FISA Memo”, Congressional Reports and federal employee testimony) and proven the fact that the Obama Administration regularly engaged in the operation of retribution, vendetta and reprisal campaigns known as “hit-jobs” against domestic natural born U.S. citizen domestic taxpayers. The Federal Court, in at least one previous court case, has ruled that the corporation in which victim was an investor, in this particular matter, were the victims and target of a number of these attacks designed to inflict permanent medical, emotional, character assassination, brand negation, economic and career damage.

The law says that any of these attack tactics, that are not illegal, may be freely done back to the attackers. Thousands of citizen groups and citizen sleuth public crowd-sourced forensics investigators are doing just that!

EXAMPLES OF THE ATTACKERS TARGETING OTHERS:


https://bigleaguepolitics.com/they-literally-know-nothing-ben-rhodes-bragged-about-manipulating-clueless-reporters/



https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/



https://freedom.press/news/lawsuit-seeks-government-guidelines-surveillance-journalists-leak-investigations-surge/



http://www.attacked.biz



http://www.google-is-a-mobster.com



https://knightcolumbia.org/



https://bigleaguepolitics.com/brennan-and-clapper-accused-of-hacking-john-roberts-to-blackmail-him/



https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/



https://bigleaguepolitics.com/heres-why-obama-clearly-ordered-the-spying-on-trump/



https://dailycaller.com/2018/09/17/lindsey-graham-dems-kavanaugh/



https://www.thegatewaypundit.com/2018/09/okeefe-strikes-again-project-veritas-exposes-doj-official-using-govt-databases-to-stalk-business-owners-video/



https://www.politico.com/gallery/16-worst-political-dirty-tricks



http://artofverbalwar.com/2016/11/03/quick-dirty-guide-political-debate-tactics/



https://politicaldictionary.com/topics/dirty-tricks/



https://www.learntoinfluence.com/dirty-tricks-and-office-politics/



https://www.motherjones.com/politics/2012/11/election-dirty-tricks/



https://www.nytimes.com/2016/10/21/us/politics/video-dnc-trump-rallies.html



http://freakonomics.com/2007/11/06/the-complete-history-of-dirty-politics-a-qa-on-anything-for-a-vote/



https://en.wikipedia.org/wiki/Ratfucking



https://www.washingtonpost.com/opinions/the-npr-video-and-political-dirty-tricks/2011/03/17/ABbyMym_story.html



https://www.huffingtonpost.com/rich-rubino/dirty-political-tricks-from-american-politics_b_9324226.html



http://www.electomatic.com/dirty-campaign-techniques/




https://en.wikipedia.org/wiki/COINTELPRO



https://www.cnn.com/2008/POLITICS/05/29/obamas.first.campaign/



https://www.nytimes.com/2016/11/05/us/politics/dirty-tricks-vandalism-and-the-dark-side-of-politics.html



https://whyy.org/articles/political-dirty-tricks-are-a-staple-of-modern-politics/



https://www.theguardian.com/uk-news/2018/mar/19/cambridge-analytica-execs-boast-dirty-tricks-honey-traps-elections



https://medium.com/@j363j/how-roger-stones-campaign-of-tammany-hall-political-corruption-lead-to-trump-russia-3099d87784e



https://www.bridgemi.com/detroit-journalism-cooperative/lawsuits-dirty-tricks-and-angry-ex-wife-detroits-ugliest-election



https://www.salon.com/2016/03/25/hillary_clintons_dirty_politics_bernie_sanders_is_experiencing_the_same_nasty_tricks_that_clintons_campaign_dealt_obama_in_2008/



http://savannahnow.com/opinion-opinion-columns/2016-10-25/cal-thomas-political-dirty-tricks-then-and-now



https://www.cbc.ca/news/politics/5-political-dirty-tricks-we-learned-from-the-robocalls-trial-1.2669924



https://www.reddit.com/r/dredmorbius/comments/2d0r1d/the_reactionary_political_debate_playbook_karl/



https://www.politico.com/story/2016/02/south-carolina-dirty-tricks-republicans-219116



https://www.zerohedge.com/news/2019-02-10/yale-newspaper-publishes-guide-destroying-white-boy-lives-using-stasi-tactics



https://www.americanthinker.com/blog/2019/02/yale_editor_chillingly_urges_fellow_yalies_to_act_as_a_stasi_to_monitor_white_males.html



https://russia-insider.com/en/jeff-bezos-nudie-pics-be-released-cyber-tycoon-complains-about-loss-privacy/ri26224



https://www.youtube.com/watch?v=VP5jqLAjbDw



** 'They Can't Beat Him On The Law So They Are Trying To Destroy His Life' -Sen. Graham Questions Dems' Motives On Brett Kavanaugh Sexual Assault Allegations (dailycaller.com)


** !!!!! Mueller Hears That Silicon Valley Has Been Manipulating The Entire BREXIT Campaign !!!!!! Second former employee of controversial data firm to be questioned by special counsel’s inquiry into Russia collusion. Per Carole Cadwalladr: Brittany Kaiser is said to be cooperating fully with the Mueller inquiry. A director of the controversial data company Cambridge Analytica, who appeared with Arron Banks at the launch of the Leave.EU campaign, has been subpoenaed by the US investigation into possible collusion between the Trump campaign and the Russian government. A spokesman for Brittany Kaiser, former business development director for Cambridge Analytica – which collapsed after the Observer revealed details of its misuse of Facebook data – confirmed that she had been subpoenaed by special counsel Robert Mueller, and was cooperating fully with his investigation. He added that she was assisting other US congressional and legal investigations into the company’s activities and had voluntarily turned over documents and data. Kaiser, who gave evidence to the UK parliament last April in which she claimed Cambridge Analytica had carried out in-depth work for Leave.EU, is the second individual connected to the firm subpoenaed by the special counsel. The Electoral Commission has said its investigation into Leave.EU found no evidence that the campaign “received donations or paid for services from Cambridge Analytica …beyond initial scoping work”. Damian Collins, chairman of parliament’s inquiry into fake news, said it was “no surprise” that Kaiser was under scrutiny by Mueller because “her work connected her to WikiLeaks, Cambridge Analytica and [its parent company] SCL, the Trump campaign, Leave.EU and Arron Banks”. He said it was now vital Britain had its own inquiry into foreign interference: “We should not be leaving this to the Americans.”


** CBS NEWS 60 MINUTES Lara Logan "I’m Being ‘Targeted’ . Per Tamar Auber: former CBS News foreign correspondent Lara Logan spoke with Fox News Sean Hannity about her recent comments slamming the media as “mostly liberal.” Logan told Breitbart podcaster Mike Ritland the remarks made on his show — which drew widespread attention online — amounted to “professional suicide.” Defending her remarks on Hannity’s show, Logan said that as the result of her speaking out about how the media is “mostly liberal” she has been targeted because she is an independent voice. “Any journalists who are not beating the same drum and giving the same talking points,” she insisted “pay the price” for not going along with the liberal crowd. She also called out her targeters by name. “I know they’re going to come after me,” she told Hannity. “Michael Calderone who is at the Huffington Post. I can give you the script now. I can tell you who the players are. Joe Hagan. Brian Stelter.” She added: “They smear you personally. They go after your integrity. They go after your reputation as a person and a professional. They will stop at nothing. I am not the only one. And I am just, I am done, right, I am tired of it. And they do not get to write my story anymore. They don’t get to speak for me, I want to say loudly and clearly to anybody who is listening, I am not owned. Nobody owns me, right? I’m not owned by the left or the right.” Logan made headlines recently when, during a scorched earth podcast interview with Ritland, she said that there was a lot of “weight” in most news organizations on “one side of the political spectrum.” “The media everywhere is mostly liberal. But in this country, 85 percent of journalists are registered Democrats. So that’s just a fact, right?” she told Ritland. She also trashed reporting based on single, anonymous government sources. “That’s not journalism, that’s horseshit,” Logan stressed. “Responsibility for fake news begins with us. We bear some responsibility for that, and we’re not taking ownership of that and addressing it. We just want to blame it all on somebody else.”


** Internal documents from a private Israeli intelligence firm called Psy-Group show that, at the time of many incidents, the company, and possibly other private investigators, were targeting U.S. citizens because they spoke up about crimes. Psy-Group’s intelligence and influence operations, which included a failed attempt in the summer of 2017 to sway a local election in central California, were detailed in a New Yorker investigation that I co-wrote earlier this month. Before it went out of business (ie: changed it's name) , last year, Psy-Group was part of a new wave of private-intelligence firms that recruited from the ranks of Israel’s secret services and described themselves as “private Mossads.” Psy-Group initially stood out among its rivals because it didn’t just gather intelligence; its operatives used false identities, or avatars, to covertly spread messages in an attempt to influence what people believed and how they behaved. In 2016, Psy-Group held discussions with the Trump campaign and others about conducting covert “influence” operations to benefit the candidate. Psy-Group’s founder and C.E.O., Royi Burstien, a veteran Israeli intelligence officer who established the firm in 2014, told me that his talks with the Trump campaign went nowhere. The company’s posturing, however, attracted the attention of Robert Mueller, the special counsel, who has been investigating interference in the 2016 Presidential race.'


** FED BOMBSHELL: Fusion GPS Bribed Dozens of MSM Journalists With Cash To Run Character Assassinations. High-ranking FBI insiders are pulling back the curtain on Fusion GPS, the firm that commissioned and spread the bogus Trump dossier. It appears the embattled intelligence firm was quite busy paying off Big Media reporters, according to federal sources who have traced dozens of transactions between TD Bank and media members as well as media organizations, sources confirm. But stunningly, Big Media organizations have employed Fusion GPS to dig dirt on politicians and D.C.’s elite — namely Donald Trump. “Fusion GPS was on the payroll of the media and in turn had members of the media on its payroll,” one FBI insider said. FBI insiders confirm Fusion GPS employed law firms as well as shell companies to send and receive funds to and from media and reporters. But the embattled firm also used its accounts at TD Bank to directly commission reporters. Likewise, Fusion GPS received funds from media companies into its own accounts at TD Bank, FBI insiders said, “There are dozens of payments from the media flowing into their (Fusion GPS’) account,” one federal law enforcement official said. “One company wired funds to Fusion (GPS) more than a dozen times.” Why would media companies commission Fusion GPS? Likely to dig dirt on enemies or secure records that reporters could not legally obtain, one federal law enforcement insider said. One FBI insider said the payments to Fusion GPS coincide with Donald Trump’s run for the White House. The payments were made between Sept. 2015 and Sept. 2017, records show. The unthinkable: The mainstream media paying Fusion GPS for dirt on Trump to the same firm the Democratic National Committee paid to fund the bogus Trump dossier. And at the same time Fusion GPS bribing journalists to place stories — likely negative about Trump, as well as spread the bogus Trump dossier around.


** Death By Metadata: Jeremy Scahill & Glenn Greenwald Reveal ...

https://www.democracynow.org/2014/2/10/death_by_metadata_jeremy_scahill_glenn

Jeremy Scahill and Glenn Greenwald have also revealed ... And the source then is in addition to the documents that Edward Snowden ... "The NSA's Secret Role in the U.S. Assassination Program ...

** How Covert Agents Infiltrate the Internet to Manipulate ...

https://theintercept.com/2014/02/24/jtrig-manipulation/

But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online ...


** New Snowden Doc Reveals How GCHQ/NSA Use The Internet To ...

https://www.techdirt.com/articles/20140224/17054826340/new-snowden-doc-reveals-how-gchqnsa-use-internet-to-manipulate-deceive-destroy-reputations.shtml

A few weeks ago, Glenn Greenwald, while working with NBC News, revealed some details of a GCHQ presentation concerning how the surveillance organization had a "dirty tricks" group known as JTRIG ...


** Snowden Drip: Government Funded Character Assassination Squads Rampant Online

From The Intercept:
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.