Why White House Press Conferences Are Insane

 

The new process used by opposition "reporters" is called "Implication Manipulation Questions". It is like the "When did you stop beating your wife question". There is no right answer and the asking of it causes instant defamation. The tactic uses repetitive neuro-linguistics to trick listeners into thinking a false statement is true. If the White House press secretary asked a reporter: "Mr. Acosta, have CNN reporters been killing and eating Chinese prison babies and harvesting their blood for life extension experiments?" Mr. Acosta might deny it on-the-spot but ongoing questioning about the same issue will eventually make the public start wondering.

CNN owners make billions of dollars off of profits from stock market assets that only make money if government policies are steered toward certain candidates. CNN has dedicated itself to being, and only hiring, political shills whose job it is to engage in contrived Implication Manipulation that seeks to harm the GOP politicians that CNN owners don't like. Daily Caller does the same thing against DNC players. The DNC needs all the black voters it can get so it pushes the "Trump is secretly KKK" narrative and organizes street riots in ghettos. They, and the CNN bosses, have agreed that there must be at least 5 questions, about racial issues and Trump, lobbed out in every White House press conference. If they can push the false narrative that Trump-is-racist because he is rich and white then they can control more taxpayer funds for their stock market manipulations. It is all political theater but low intellect people may fall for it.

These tactics are created and exploited by consultants from commercial "Kill Companies".

In Sweitzer, T. (1996, September). Kill or be killed. [Electronic version] Campaigns & Elections, 17(9), 46-47., the process usedto “kill” others is described just as it was used against the Plaintiffs. Inhttps://theintercept.com/2014/02/24/jtrig-manipulation/ the formal process of hired character assassination, exactly as itwas used against the Plaintiffs, is detailed. The well-documented process is further outlined in the articles:


Character assassination - Wikiquote

https://en.wikiquote.org/wiki/Character_assassination

Character assassination is at once easier and surer than physical assault; and it involves far less risk for the assassin. It leaves him free to commit the same deed over and over again, and may, indeed, win him the honors of a hero in the country of his Plaintiffss. Alan Barth, The Rights of Free Men: An Essential Guide to Civil Liberties (1984).
 

New Snowden Doc Reveals How GCHQ/NSA Use The Internet To ...

https://www.techdirt.com/articles/20140224/17054826340/new-snowden-doc-reveals-how-gchqnsa-use-internet-to-manipulate-deceive-destroy-reputations.shtml

A few weeks ago, Glenn Greenwald, while working with NBC News, revealed some details of a GCHQ presentation concerning how the surveillance organization had a "dirty tricks" group known as JTRIG …
 

Glenn Greenwald on the NSA, GCHQ, and Spying | naked ...

https://www.nakedcapitalism.com/2013/10/glenn-greenwald-on-the-nsa-gchq-and-spying.html

Glenn Greenwald on the NSA, GCHQ, and Spying. Posted on October 4, 2013 by Yves Smith. Yves here. This BBC NewsInsight interview is a remarkable little piece. Greenwald confronts a clearly hostile set of questions from the BBC interviewer. ... These kinds of remarks are transparent and vapid and should be dismissed like any other textbook …
 

Greenwald: Leaked Docs Reveal Agency's (GCHQ) Digital ...

https://www.democraticunderground.net/10025241916

Greenwald: Leaked Docs Reveal Agency's (GCHQ) Digital Propaganda Toolkit. Latest files provided by Edward Snowden show GCHQ's ability to 'manipulate' the Internet using 'hacker's buffet for wreaking online havoc' by Jon Queally, staff writer Common Dreams, July 15, 2014 ...

All of the attackers contractors are Silicon Valley oligarchpolitical campaign financiers.

Every one of the attack technologies and resources were previously deployed againstPresidential candidates in past elections. The providers, operators and compensation conduits of the attack services are known to lawenforcement. The payment records have been uncovered, revealing that over $30M of attack services billings and/or in-kind servicesexchanges were incurred by the attackers. By way of contrast: $30M is the typical WEEKLY expenditure for opposition character assassinationprograms in a U.S. Presidential election using Gawker, Gizmodo, Facebook, Google and Fusion GPS media attack services.

Plaintiffs, and their peers, swear, warrant and certify that this is true. Expertscan prove in a Grand Jury, Civil Jury and Congressional Hearing that White House staff, U.S. Senators and their Silicon Valley financiersdid order, operate and finance a massive “hit-job” on Plaintiffs as revenge/retribution/vendetta because Plaintiffs reported anorganized crime activity involving well known public officials.

Every public official who was, by law, supposed to help Plaintiffshas, so far, been proven by investigators to have been in direct business competition with Plaintiffs.

The effort made by political executives to steer the annual expenditure of trillions ofdollars of taxpayer funds and stock market profits to one group of friends or another is called “Cronyism” and it is operated byU.S. Senators and White House staff for illicit profiteering purposes.

The corrupt public officials involved here used real estate, stock market ownership,revolving door payola jobs and investment bank accounts to profiteer from each deal that the charged officials pushed.

FBI-level tracking of the covert accounts, trusts, shell corporations, family membersand associates of every public official involved in this case proves that they made money by competing with PLAINTIFFS business ventures.The Panama Papers Leaks, Swiss Leaks, Snowden Leaks, and all of the other leaks prove this as fact. This is how a vendetta, revenge and political payback operation was implementedagainst an American taxpayer when a Senator issued a "kill order" on a whistle-blower

Investigations have revealed that the White House and California Senators hired thecharacter assassination and defamation attack services: Cardinal & Pine; Pacronym, Acronym;  The Americano; Investing in US; Shadow Inc; Courier Newsroom; IN-Q-Tel; Gawker Media; Jalopnik; Gizmodo Media; K2 Intelligence; WikiStrat; Podesta Group;Fusion GPS; Google; YouTube; Alphabet; Facebook; Twitter; Think Progress; Media Matters); Black Cube; Correct TheRecord; Orbis Business Intelligence, Undercover Global Ltd; Stratfor; Jigsaw; ShareBlue/Acronym; Versa LLC; American Ledger; SupermajorityNews; New Venture Fund; Sixteen Thirty Fund; Cambridge Analytica; Sid Blumenthal; States Newsroom; Hopewell Fund;  Open Society.; David Brock; AmpliFire News; American Bridge; Plouffe Consulting; Pantsuit Nation;MotiveAI; American Bridge 21st Century Foundation; Priorities USA; PR Firm Sunshine Sachs; The American Independent Foundation; Covingtonand Burling; Buzzfeed; The American Independent; Perkins Coie; Secondary Infektion; Wilson Sonsini and thousands more to run hit-jobs, character assassinations, dirty tricks and economic reprisal attacks on anytargets who reported the crimes. Each of those companies are now under federal and civil investigation. Most of these businesses offerthe service of manipulating elections and news coverage in order to steer stock market profits into the pockets of billionaire clients atthe expense of the taxpayer and Democracy. They hide their transactions via money-laundering. All of these services, whenfocused on individual citizens, are lethal.

These attackers deserve to be punished for the rest of their lives for taking awaythe lives of others in exchange for remuneration. Any company who is corrupt enough to hire any of these assassins should be forced out ofbusiness.

These attack services are responsible for 90% of the "Fake News" problemin the world because they are the authors of most fake news. Congress must act to make these kinds of companies illegal!

These digital assassination services offer hit-jobs, character assassinations andeconomic reprisal programs to famous billionaires and corrupt politicians who are seeking revenge, retribution and vendettaexecutions.

The Specific Attacks

- Government agency bosses solicited the targets with false promises of future loans,carbon credit sales, billions of dollars of stock market valuation profits, contracts and/or grants from their agencies and caused thetarget Plaintiffs to expend millions of dollars and years of their time for projects which those government bosses had covertly promisedto their friends. They used the target Plaintiffs as a “smokescreen” to cover their illegal government slush-funds for the Plaintiffscompetitors and personal enemies. By using this tactic, the attackers drained the target Plaintiffs funds and forced Plaintiffs into aneconomic disaster, without the government bosses fearing any reprisal for their scam. The crony insiders made hundreds of billions ofdollars in profit in the notorious Solyndra-type scandals as seen in the CBS 60 Minutes episode: “The Cleantech Crash”, thousands of TV news segments and the related GAO and Congressionalcorruption reports.

- White House financier Kleiner Perkins placed moles inside of Plaintiffs companiesin order to sabotage, delay and misdirect operations. The moles were discovered to be staff of Kleiner Perkins. The main offices ofKleiner Perkins were broken into, per San Mateo County police reports, and records of corruption copied or duplicated by astate-sponsored intelligence agency entity, which provided further proof that Kleiner Perkins and the White House were exchanging QuidPro Quo.

- Government officials and the federal agency: Legal Services Corporation (LSCcorporation -A federal agency dedicated to providing legal services to citizens) blockaded Plaintiffs rights to legal representation inorder to prevent Plaintiffs from personally suing the attackers because such a lawsuit would have embarrassed corrupt publicofficials. High tech law firms that were discussing a services agreement with Plaintiffs were threatened and ordered to not helpPlaintiffs or “they would be black-listed or be cut-off from tens of millions of dollars of Google, Netflix, Facebook andgovernment contracts”. Individual lawyers were threatened with black-listing and getting “flooded with more filings than you could ever respond to in your life-time...” LSC officials, who were almost entirely Obama Administration associates, refused toassist with lawyer referrals. That is a violation of their federal contract with the U.S. Government.

- An sophisticated animated attack film was produced by Google/Youtube and NicholasDenton attacking Plaintiffs. An animated film is an expensive effort involving considerable time and expense. An attacker must be wellfinanced to undertake such an effort. The film was published on YouTube and locked onto the very top search result line on everyYouTube search in front of 7.5 billion internet users for over a decade. The damage to Plaintiffs reputation is estimated in the tensof millions of dollars. YouTube steadfastly refused to remove or adjust the search results even though YouTube executives knewPlaintiffs and knew that the video represented a character assassination attempt against Plaintiffs because YouTube ownersfinance the political campaigns of the public officials who ordered the attacks. While Google/YouTube stated to Congress that all of it’ssearch results are arbitrary, the never-moving search result of this attack video proved that Google’s and YouTube’s search resultsare manually manipulated by human maintained black-lists.

- Social networking sites including MeetUp, Match, Facebook, etc. and all otherIAC-owned, or similar, sites (IAC is managed by Hillary Clinton's daughter, whose Mother knew Plaintiffs) have had their profiles,texts, and inter-member communications, since those companies were started, hacked or purchased. The financiers of almost everyone ofthese sites are also the financiers of the suspects. The attack service providers use Palantir, Acronym, In-Q-Tel financed dataanalysis software to analyze every activity in those services in order to find honey-trap, blackmail and social conflict exploitationopportunities. Your social life will, essentially, end. Every photo on every social site is cross checked with every other photo on theinternet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total manipulation profile datafile on you. New contacts on these sites were contacted by the attackers and told to “avoid” the Plaintiffs in order to damagePlaintiffs.

- Social Security, SSI, SDI, Disability and other earned benefits were stone-walled.Applications for benefits for the Plaintiffs were intentionally “lost” like a “Lois Lerner hard drive”. Files in theapplication process “disappeared”. A U.S. Senator ordered Plaintiffs benefits to “never be approved” even though Plaintiffsworked 60 hour+ weeks for decades in service to their nation and their community. A SSA official in the local SSA office, who had adevout expressed hatred against one United States President ordered a benefits blockade against Plaintiffs because he found out thatPlaintiffs ex-lawyer now worked in the White House.

- Government officials and tech oligarchs contacted members of the NationalVenture Capital association (NVCA) and created national “black-lists” to blockade Plaintiffs from receiving investor funding. This was alsoconfirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaignfinance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit"cases) you will never get investor funding again.

- Federal FOIA requests were hidden, frozen, stone-walled, delayed, lied about andonly partially responded to in order to seek to hide information and run cover-ups.

- Crony state and federal officials play an endless game of Catch-22 by arbitrarilydetermining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in orderto force these deadlines that they set, to appear to be missed.

- Plaintiffs were found to be strangely poisoned, not unlike the AlexanderLitvenko case. Heavy metals and toxic materials were found right after Plaintiffs work with the Department of Energy weapons andenergy facilities. Many wonder if Plaintiffs was intentionally exposed to toxins in retribution for their testimony. The federalMSDS documents clearly show that a number of Plaintiffs were exposed to deadly compounds and radiations, via DOE, without being providedwith proper HazMat suits which DOE officials knew were required.

- Plaintiffs employers were called, and faxed, and ordered to fire targetPlaintiffs from their places of employment, in the middle of the day, with no notice, as a retribution tactic.

- On orders from Obama White House officials Google, YouTube, Gawker Media and GizmodoMedia produced attack articles. Google locked these contrived attack articles from the Nicholas Guido Denton tabloid empire on the topline, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over$40 million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of theseattacks proves that Google rigged these attacks against Plaintiffs on the internet and that all of Google’s “impressions” aremanually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. Thisdata was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of publicperceptions. Hired attackers Nicholas Guido Denton, John Herman, Adrian Covert, Ian Fette, Patrick George, Gabrielle Darbyshire andJohn Cook have been referred to the FBI for surveillance, tracking and interview relative to the command, control and compensation forthose attacks.

- Plaintiffs HR and employment records, on Taleo, Palantir and EVERY recruiting andhiring database, was embedded with negative keywords and “flags” in order to prevent the Plaintiffs from ever gaining futureemployment.

- Gary D. Conley, Seth Rich, Rajeev Motwani who Plaintiffs knew, and many otherwhistle-blowers in these matters, turned up dead under strange circumstances. Plaintiffs has received ongoing death threats for hishelp to federal investigations in the larger organized crime investigation relative to this matter.

- Paypal (A DNC-biased operation) and other on-line payments for on-line sales byPlaintiffs are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target who competed with theattackers interests and holdings. This further denied Plaintiffs income. As a test, Plaintiffs built an online store with hundreds ofthousands of products and marketed it globally. Trackers, placed by Plaintiffs technicians, on servers, discovered that Paypal and anoutside “Virgina-based system” were DNS and payment re-directed all traffic away from the store so that Plaintiffs received notraffic and no income. In DNS redirection, "website spoofing" sends target Plaintiffs websites to dead ends where no sales ordersor customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using outside covertservers operated by the attackers and revealed in the Snowden Leaks. All commercial storefronts and on-line sales attempts by targetPlaintiffs, had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto,California in order to terminate revenue potentials for the Plaintiffs.

- Contracted trolls, shills, botnets and synth-blog deployments are deployed toplace defamatory statements and disinformation about Plaintiffs in front of 7.5 billion people around the world on the internet in orderto seek to damage their federal testimony credibility by a massively resourced facility. Some of these troll farms were uncovered inRussia, Ukraine, Israel and Brazil.

- Campaign finance dirty tricks contractors were hired by campaign financiers toattack the friends and family members of the target Plaintiffs in order to create low morale for the target Plaintiffs psyche andmotivation.

- In one case covert political partner: Google, transferred large sums of cash todirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Googlesearches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on Plaintiffs by manymagnitudes.

- Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in chargeof the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices withGoogle-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts thatGoogle engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’soperations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles andinvestigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff.A conflict-of-interest unlike any in American history. Google’s investors personally told Plaintiffs they would “kill him”.Google and the Obama Administration were “the same entity”. Plaintiffs testified in the review that got Michelle Lee terminatedand uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds.

- “Honeytraps” and moles were employed by the attackers. In this tactic, people whocovertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject.

- Gawker Media, Gizmodo Media, Snopes, SPLC and other hired media assassins wereretained to produce "hatchet job" character assassination articles about Plaintiffs. Then those articles were faxed, mailed andemailed to Kaiser Permanente and investors with a note saying: "You don't want to have anything to do with this person, do you..?"in order to get Plaintiffs fired from their job and get Plaintiffs loans or financing pulled. The attackers use their round one attackmedia, that they authored, to create a round two second wave attack designed to end Plaintiffs life status via economic warfare.

- Mortgage and rental applications had red flags added to them in databases toprevent the targets from getting homes or apartments.

- Krebs On Security, Wired, Ars Technica, The Wall Street Journal and most majorIT publications have reported that hundreds of spy "back-doors" have been found on every Intel, AMD, Apple, Xfinity, Cisco,Microsoft, Juniper Networks motherboard, chip-set and hardware component set. This means that the attackers used a "key"code can open any of Plaintiffs computer, server, router, cloud-network or other network connected device and read every file,photo, video, your calendar and email on devices at any time from any location on Earth. This has been widely reported on by GlennGreenwald, Edward Snowden, Scahill, Cheryl K of CBS News and others. Plaintiffs was hacked at least 10 times. In a number of instances,people, who Plaintiffs had been communicating with online, were mysteriously contacted by a third party who sent them the Gizmodoattack article or phoned them with warnings to avoid Plaintiffs. These kinds of Man-In-The-Middle interceptions would only have beenpossible from hacking and MITM surveillance tactics.

- McCarthy-Era "Black-lists" were created and employed against targetPlaintiffs who competed with Obama Administration executives and their campaign financiers to prevent them from getting funding andfuture employment. This White House process is known as “RatFucking”, a tactic that is documented in a variety of published reports and onWikipedia.

- The housing rights of Plaintiffs were stalled in reprisal. Public records show that tensof thousands of other Plaintiffs were moved ahead of Plaintiffs even though Plaintiffs validation metrics exceeded those of almost everyother Plaintiffs. Plaintiffs was “black-listed”.

Federal law enforcement, the United States Congress and the highest levelinvestigators in the U.S., and abroad, have documented (per the “FISA Memo”, Congressional Reports and federal employee testimony) andproven the fact that the Obama Administration regularly engaged in the operation of retribution, vendetta and reprisal campaigns knownas “hit-jobs” against domestic natural born U.S. citizen domestic taxpayers. The Federal Court, in at least one previous court case,has ruled that the corporation in which Plaintiffs were an investor, in this particular matter, were the Plaintiffs and target of a numberof these attacks designed to inflict permanent medical, emotional, character assassination, brand negation, economic and career damage.

Additional Examples Of The Attackers Methods:

 

https://bigleaguepolitics.com/they-literally-know-nothing-ben-rhodes-bragged-about-manipulating-clueless-reporters/

 

https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/

 

https://freedom.press/news/lawsuit-seeks-government-guidelines-surveillance-journalists-leak-investigations-surge/

 

http://www.attacked.biz

 

http://www.google-is-a-mobster.com

 

https://knightcolumbia.org/

 

https://bigleaguepolitics.com/brennan-and-clapper-accused-of-hacking-john-roberts-to-blackmail-him/

 

https://freedom.press/news/revealed-justice-depts-secret-rules-targeting-journalists-fisa-court-orders/

 

https://bigleaguepolitics.com/heres-why-obama-clearly-ordered-the-spying-on-trump/

 

https://dailycaller.com/2018/09/17/lindsey-graham-dems-kavanaugh/

 

https://www.thegatewaypundit.com/2018/09/okeefe-strikes-again-project-veritas-exposes-doj-official-using-govt-databases-to-stalk-business-owners-video/

 

https://www.politico.com/gallery/16-worst-political-dirty-tricks

 

http://artofverbalwar.com/2016/11/03/quick-dirty-guide-political-debate-tactics/

 

https://politicaldictionary.com/topics/dirty-tricks/

 

https://www.learntoinfluence.com/dirty-tricks-and-office-politics/

 

https://www.motherjones.com/politics/2012/11/election-dirty-tricks/

 

https://www.nytimes.com/2016/10/21/us/politics/video-dnc-trump-rallies.html

 

http://freakonomics.com/2007/11/06/the-complete-history-of-dirty-politics-a-qa-on-anything-for-a-vote/

 

https://en.wikipedia.org/wiki/Ratfucking

 

https://www.washingtonpost.com/opinions/the-npr-video-and-political-dirty-tricks/2011/03/17/ABbyMym_story.html

 

https://www.huffingtonpost.com/rich-rubino/dirty-political-tricks-from-american-politics_b_9324226.html

 

http://www.electomatic.com/dirty-campaign-techniques/

 

https://en.wikipedia.org/wiki/COINTELPRO

 

https://www.cnn.com/2008/POLITICS/05/29/obamas.first.campaign/

 

https://www.nytimes.com/2016/11/05/us/politics/dirty-tricks-vandalism-and-the-dark-side-of-politics.html

 

https://whyy.org/articles/political-dirty-tricks-are-a-staple-of-modern-politics/

 

https://www.theguardian.com/uk-news/2018/mar/19/cambridge-analytica-execs-boast-dirty-tricks-honey-traps-elections

 

https://medium.com/@j363j/how-roger-stones-campaign-of-tammany-hall-political-corruption-lead-to-trump-russia-3099d87784e

 

https://www.bridgemi.com/detroit-journalism-cooperative/lawsuits-dirty-tricks-and-angry-ex-wife-detroits-ugliest-election

 

https://www.salon.com/2016/03/25/hillary_clintons_dirty_politics_bernie_sanders_is_experiencing_the_same_nasty_tricks_that_clintons_campaign_dealt_obama_in_2008/

 

http://savannahnow.com/opinion-opinion-columns/2016-10-25/cal-thomas-political-dirty-tricks-then-and-now

 

https://www.cbc.ca/news/politics/5-political-dirty-tricks-we-learned-from-the-robocalls-trial-1.2669924

 

https://www.reddit.com/r/dredmorbius/comments/2d0r1d/the_reactionary_political_debate_playbook_karl/

 

https://www.politico.com/story/2016/02/south-carolina-dirty-tricks-republicans-219116

 

https://www.zerohedge.com/news/2019-02-10/yale-newspaper-publishes-guide-destroying-white-boy-lives-using-stasi-tactics

 

https://www.americanthinker.com/blog/2019/02/yale_editor_chillingly_urges_fellow_yalies_to_act_as_a_stasi_to_monitor_white_males.html

 

https://russia-insider.com/en/jeff-bezos-nudie-pics-be-released-cyber-tycoon-complains-about-loss-privacy/ri26224

 

https://www.youtube.com/watch?v=VP5jqLAjbDw

 

** 'They Can't Beat Him On The Law So They Are Trying To Destroy His Life'-Sen. Graham Questions Dems' Motives On Brett Kavanaugh Sexual Assault Allegations (dailycaller.com)

 

** !!!!! Mueller Hears That Silicon Valley Has Been Manipulating The Entire BREXITCampaign !!!!!! Second former employee of controversial data firm to be questioned by special counsel’s inquiry into Russiacollusion. Per Carole Cadwalladr: Brittany Kaiser is said to be cooperating fully with the Mueller inquiry. A director of thecontroversial data company Cambridge Analytica, who appeared with Arron Banks at the launch of the Leave.EU campaign, has beensubpoenaed by the US investigation into possible collusion between the Trump campaign and the Russian government. A spokesman forBrittany Kaiser, former business development director for Cambridge Analytica – which collapsed after the Observer revealed details ofits misuse of Facebook data – confirmed that she had been subpoenaed by special counsel Robert Mueller, and was cooperatingfully with his investigation. He added that she was assisting other US congressional and legal investigations into the company’sactivities and had voluntarily turned over documents and data.

Kaiser, who gave evidence to the UK parliament last April in which she claimedCambridge Analytica had carried out in-depth work for Leave.EU, is the second individual connected to the firm subpoenaed by the specialcounsel. The Electoral Commission has said its investigation into Leave.EU found no evidence that the campaign “received donations orpaid for services from Cambridge Analytica …beyond initial scoping work”. Damian Collins, chairman of parliament’s inquiry into fakenews, said it was “no surprise” that Kaiser was under scrutiny by Mueller because “her work connected her to WikiLeaks, CambridgeAnalytica and [its parent company] SCL, the Trump campaign, Leave.EU and Arron Banks”. He said it was now vital Britain had its owninquiry into foreign interference: “We should not be leaving this to the Americans.”

 

** CBS NEWS 60 MINUTES Lara Logan "I’m Being ‘Targeted’ . Per Tamar Auber: former CBS News foreign correspondent Lara Logan spokewith Fox News Sean Hannity about her recent comments slamming the media as “mostly liberal.” Logan told Breitbart podcaster MikeRitland the remarks made on his show — which drew widespread attention online — amounted to “professional suicide.”Defending her remarks on Hannity’s show, Logan said that as the result of her speaking out about how the media is “mostly liberal”she has been targeted because she is an independent voice. “Any journalists who are not beating the same drum and giving the sametalking points,” she insisted “pay the price” for not going along with the liberal crowd. She also called out her targeters byname.

“I know they’re going to come after me,” she told Hannity. “Michael Calderone whois at the Huffington Post. I can give you the script now. I can tell you who the players are. Joe Hagan. Brian Stelter.” She added:“They smear you personally. They go after your integrity. They go after your reputation as a person and a professional. They will stopat nothing. I am not the only one. And I am just, I am done, right, I am tired of it. And they do not get to write my story anymore. Theydon’t get to speak for me, I want to say loudly and clearly to anybody who is listening, I am not owned. Nobody owns me, right? I’mnot owned by the left or the right.” Logan made headlines recently when, during a scorched earth podcast interview with Ritland, shesaid that there was a lot of “weight” in most news organizations on “one side of the political spectrum.” “The media everywhereis mostly liberal. But in this country, 85 percent of journalists are registered Democrats. So that’s just a fact, right?” she toldRitland. She also trashed reporting based on single, anonymous government sources. “That’s not journalism, that’s horseshit,”Logan stressed. “Responsibility for fake news begins with us. We bear some responsibility for that, and we’re not taking ownershipof that and addressing it. We just want to blame it all on somebody else.”

 

** Internal documents from a private Israeli intelligence firm called Psy-Group show that, at the time of many incidents, the company, and possiblyother private investigators, were targeting U.S. citizens because they spoke up about crimes. Psy-Group’s intelligence and influenceoperations, which included a failed attempt in the summer of 2017 to sway a local election in central California, were detailed in a NewYorker investigation that I co-wrote earlier this month. Before it went out of business (ie: changed it's name) , last year, Psy-Groupwas part of a new wave of private-intelligence firms that recruited from the ranks of Israel’s secret services and described themselvesas “private Mossads.” Psy-Group initially stood out among its rivals because it didn’t just gather intelligence; its operativesused false identities, or avatars, to covertly spread messages in an attempt to influence what people believed and how they behaved. In2016, Psy-Group held discussions with the Trump campaign and others about conducting covert “influence” operations to benefit thecandidate. Psy-Group’s founder and C.E.O., Royi Burstien, a veteran Israeli intelligence officer who established the firm in 2014, toldme that his talks with the Trump campaign went nowhere. The company’s posturing, however, attracted the attention of Robert Mueller, thespecial counsel, who has been investigating interference in the 2016 Presidential race.'

 

** FED BOMBSHELL: Fusion GPS Bribed Dozens of MSM Journalists With Cash ToRun Character Assassinations. High-ranking FBI insiders are pulling back the curtain on Fusion GPS, the firm that commissionedand spread the bogus Trump dossier. It appears the embattled intelligence firm was quite busy paying off Big Media reporters,according to federal sources who have traced dozens of transactions between TD Bank and media members as well as media organizations,sources confirm. But stunningly, Big Media organizations have employed Fusion GPS to dig dirt on politicians and D.C.’s elite —namely Donald Trump. “Fusion GPS was on the payroll of the media and in turn had members of the media on its payroll,” one FBIinsider said. FBI insiders confirm Fusion GPS employed law firms as well as shell companies to send and receive funds to and from mediaand reporters. But the embattled firm also used its accounts at TD Bank to directly commission reporters. Likewise, Fusion GPS receivedfunds from media companies into its own accounts at TD Bank, FBI insiders said, “There are dozens of payments from the media flowinginto their (Fusion GPS’) account,” one federal law enforcement official said. “One company wired funds to Fusion (GPS) more than adozen times.” Why would media companies commission Fusion GPS? Likely to dig dirt on enemies or secure records that reporters couldnot legally obtain, one federal law enforcement insider said. One FBI insider said the payments to Fusion GPS coincide with Donald Trump’srun for the White House. The payments were made between Sept. 2015 and Sept. 2017, records show. The unthinkable: The mainstream mediapaying Fusion GPS for dirt on Trump to the same firm the Democratic National Committee paid to fund the bogus Trump dossier. And at thesame time Fusion GPS bribing journalists to place stories — likely negative about Trump, as well as spread the bogus Trump dossieraround.

 

** Death By Metadata: Jeremy Scahill & Glenn Greenwald Reveal ...

https://www.democracynow.org/2014/2/10/death_by_metadata_jeremy_scahill_glenn

Jeremy Scahill and Glenn Greenwald have also revealed ... And the source then is in addition to the documents that Edward Snowden ... "The NSA's Secret Role in the U.S. Assassination Program ...


 

** How Covert Agents Infiltrate the Internet to Manipulate ...

https://theintercept.com/2014/02/24/jtrig-manipulation/

But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online ...

 

** New Snowden Doc Reveals How GCHQ/NSA Use The Internet To ...

https://www.techdirt.com/articles/20140224/17054826340/new-snowden-doc-reveals-how-gchqnsa-use-internet-to-manipulate-deceive-destroy-reputations.shtml

A few weeks ago, Glenn Greenwald, while working with NBC News, revealed some details of a GCHQ presentation concerning how the surveillance organization had a "dirty tricks" group known as JTRIG ...

 

** Snowden Drip: Government Funded Character Assassination Squads Rampant Online

From The Intercept:

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies areattempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tella chunk of that story, complete with the relevant documents.
Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based onfour classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring ofYouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of“honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus andelaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control,infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.