Premium Only Content
GIZMODO AND GAWKER WORK FOR ELON MUSK AND THE WHITE HOUSE TO DO CHARACTER ASSASSINATIONS
POLITICAL KILL ORDERS AND STATE-SPONSORED CHARACTER ASSASSINATIONS - How A Modern Character Assassination and Political "Kill Order" Is Executed By the Silicon Valley Oligarchs and their total control of propaganda media. Patrick George At Jalopnik attacks outsiders under contract with Elon Musk and the DNC. Silicon Valley campaign finance oligarchs hire him to run hatchet jobs on innocent outsiders and then Gawker-Gizmodo-Jalopnik uses their financial partnership with the DNC's Google to push the character assassination articles to the top of Google web products and searches. Patrick George, Adrian Covert, John Hermann and Nick Cook are the sexually degenerate cabin boys that report to boy-loving sleaze-tabloid oligarch Nick Denton. They created the Fake News crisis in the media by flooding the internet with defamation posts and reprisal hatchet job articles designed to damage political enemies of the Socialists. They coordinate a large number of the character assassination efforts at Gawker, Gizmodo, Jalopnik, CNN, New York Times and other propaganda outlets. These Millennial boys are "Media Rapists" and should be treated as abusers. - How and why did a Donald Trump stripper-date named "Stormy" or an Elon Musk sex party or a Kavanaugh drinking incident or the Moonves and Weinstein indiscretions suddenly hit the news at about the same time in news history? - In addition to actual murder, Politicians and Silicon Valley Oligarchs hire operatives to end people's lives in other creative ways. - It is all part of the modern trend in vendetta, revenge and political payback when a Senator or a tech oligarch issues a "kill order" on an opponent. - The client does not like to get their hands dirty so the actual social hit job is performed by companies such as: IN-Q-Tel - (DNC); Gawker Media - (DNC); Jalopnik - (DNC); Gizmodo Media - (DNC); K2 Intelligence - (DNC); WikiStrat - (DNC); Podesta Group - (DNC); Fusion GPS - (DNC/GOP); Google - (DNC); YouTube - (DNC); Alphabet - (DNC); Facebook - (DNC); Twitter - (DNC); Think Progress - (DNC); Media Matters - (DNC); Black Cube - (DNC); Mossad - (DNC); Correct The Record - (DNC); Sand Line - (DNC/GOP); Blackwater - (DNC/GOP); Undercover Global Ltd (DNC/GOP) Stratfor - (DNC/GOP); ShareBlue - (DNC); Wikileaks (DNC/GOP); Cambridge Analytica - (DNC/GOP); Sid Blumenthal- (DNC); David Brock - (DNC); PR Firm Sunshine Sachs (DNC); Covington and Burling - (DNC), Buzzfeed - (DNC) Perkins Coie - (DNC); Wilson Sonsini - (DNC) and hundreds of others…These are the people and companies that except cash, revolving door jobs, political appointments, insider trading stock in Silicon Valley tech companies, prostitutes and real estate in exchange for destroying the lives of others. - These attackers deserve to be punished for the rest of their lives for taking away the lives of others in exchange for cash. Any company who is corrupt enough to hire any of these assassins should be forced out of business. These attack services are responsible for 90% of the "Fake News" problem in the world because they are the authors of most fake news. Congress must act to make these kinds of companies illegal! - These digital assassination services offer hit-jobs, character assassinations and economic reprisal programs to famous billionaires and corrupt politicians who are seeking revenge, retribution and vendetta executions. - In the case of reporters getting targeted for attacks, President Donald Trump has been accused by the liberal corporate media of whipping up a hateful frenzy against the press. But while CNN’s Jim Acosta grandstands against Trump, real journalists are still reeling from the draconian extrajudicial measures that Barack Obama and his administration used to target them for exposing truth. - This secretive targeting occurred while Obama speechwriter and hate-filled ANTIFA supporter Ben Rhodes was running “Operation Echo Chamber,” which reportedly continues, in which he fed information to willing corporate media scribes. “They literally know nothing,” Rhodes said of the twentysomething journalists he easily manipulated. - The Freedom of the Press Foundation’s Trevor Timm published documents showing how former attorney general Eric Holder changed the rules to more effectively intimidate and surveil members of the press. - Timm writes: “Today, we are revealing—for the first time—the Justice Department’s rules for targeting journalists with secret FISA court orders. The documents were obtained as part of a Freedom of Information Act lawsuit brought by Freedom of the Press Foundation and Knight First Amendment Institute at Columbia University.” - Obama is also clearly linked to the plot to obtain fraudulent FISA warrants on President Trump’s team, as evidenced by Peter Strzok and Lisa Page’s texts confirming that Obama was overseeing their fly-by-night operation. - Larry Schweikart reported for Big League Politics: For months pundits and researchers have been pondering the mystery of the FISA approval that led to the illegal and historically titanic scandals to ever hit the U.S. government. Some have argued that Assistant Attorney General Rod Rosenstein knew the FISA was bogus when he extended it. Others have wondered if Special Counsel Robert Mueller knew about the fraudulent basis of the FISA when he used it, in part, to indict Michael Flynn. Other still, that Mueller was fooled by the FBI. This is what President Trump calls “SPYGATE”. - It may well be that the surveillance that was conducted began with UK intelligence services and then was fed back to the White House of Barack Obama. Here’s the kicker: President Barack Obama did not need a FISA warrant to authorize spying/electronic surveillance on Trump because Obama all along had legal authorization to by-pass the normal court vetting process. According to 50 U.S. Code 1802, the “Electronic Surveillance Authorization” () “Foreign intelligence in relation to a US person (Trump or his associates) is information that’s necessary for the US to protect against attack, hostile acts, sabotage, . . . as well as other clandestine activities by a foreign power . . . OR . . . information relevant to national defense/security of the US, or the conduct of foreign affairs of the U.S.” Such an authorization by Obama required certification by Attorney General Loretta Lynch that must be logged with the FISC court. (“The [AG]+ shall immediately transmit under seal to the court [FISC] a copy of his certification.”) - In short, the DOJ has this. If we are correct, a copy of that certification is currently under seal at least with the DOJ and the FISC. - This is what they are hiding. - However, the Act requires the AG to keep the Select Committee on Intelligence and the Senate Committee on Intelligence informed of these authorizations and unmaskings therein. See 1803 (a) (1) (C) If indeed this is what happened, did Lynch report—or only selectively report—to the committees in a way that excluded non-friendlies? Can you see why Adam Schiff, Mark Warner, and their ilk are terrified? - These are the playbook tactics that Senators and tech oligarchs most often use to destroy the lives of their political and business enemies: - Government agency bosses sometimes solicit the target victims with false promises of future loans, contracts or grants from their agency and cause the target victims to expend millions of dollars and years of their time for projects which those government bosses had covertly promised to their friends. They use the target victims as a “smokescreen” to cover their illegal government slush-funds for the victims competitors and personal enemies. By using this tactic, the attackers can drain the target victims funds and force them into an economic disaster in plain view of everyone without the government bosses fearing any reprisal for their scam.- Every match.com, okcupid.com, Plenty Of Fish, Seeking Arrangements and all other IAC-owned, or similar, dating sites (IAC is managed by Hillary Clinton's daughter) have had their profiles, texts, and inter-member communications, since those companies were started, hacked or purchased. The attack service providers use Palantir and In-Q-Tel financed data analysis software to analyze every activity in those dating services in order to find honey-trap, blackmail, sextortion and social conflict exploitation opportunities. If you had a bad date with someone, that someone will be hunted down and convinced to help harm, #metoo or "rape charge" the intended target. All dates involve a search for sex, so the likelihood that a sexual disappointment experience will exist in each persons dating history is high. Searching every past dating email and text of a subject is quite easy with modern software and hacking techniques. A synthetically amplified, PR-agency optimized sex scandal can destroy any target. Your dating experiences from the 70's or 80's will come back to haunt you decades later. Most dates involve drinking alcohol and taking drugs. If you were unattractive or had bad sexual skills your bad date will be called "date rape", "drugging your date for sex" and related twisted narratives that are designed to shame you, the target. If you try to get a date in the future, your potential date will be contacted by a third party who will slander and libel you to make sure your potential first date gets cancelled. Your social life will, essentially, end. Every photo on every dating site is cross checked with every other photo on the internet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total psychological manipulation profile data file on you. A single photo on a dating site can be cross searched on every mugshot archive, photo album and corporate database in the worth within minutes using modern super-computers. Your sex life will be on public record in a flash.- Social Security, SSI, SDI, Disability and other earned benefits are stone-walled. Applications of targets are “lost”. Files in the application process “disappeared”. Lois Lerner hard drive “incidents” are operated in order to seek to hide information and run cover-ups. - Government officials and tech oligarchs contact members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade target victims from ever receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit" cases) you will never get investor funding again. - FOIA requests are hidden, frozen, stone-walled, delayed, lied about and only partially responded to in order to seek to hide information and run cover-ups.- State and federal employees will play an endless game of Catch-22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed. This can bankrupt a target victim.- Some Victims found themselves strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after their work with the Department of Energy weapons and energy facilities. Many wonder if these “targets” were intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of these people were exposed to deadly compounds and radiations, via DOE, without being provided with proper HazMat suits which DOE officials knew were required. - Victims employers are called, and faxed, and ordered to fire target victims from their places of employment, in the middle of the day, with no notice, as a retribution tactic. - On orders from Obama White House officials, DNC-financed Google, YouTube, Gawker Media and Gizmodo Media produce attack articles and defamation videos. Google locks this attack media on the internet on the top line, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over $40 million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of these attacks proves that Google rigs attacks against individuals on the internet and that all of Google’s “impressions” are manually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. This data was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of public perceptions. - Victims HR and employment records, on recruiting and hiring databases, are embedded with negative keywords in order to prevent the victim targets from ever gaining future employment. - Gary D. Conley, Seth Rich, Rajeev Motwani and many other whistle-blowers in these matters, turned up dead under strange circumstances. It is very possible that some of these attack services, operated by former CIA operatives, even offer discrete murder-for-sale services using high-tech assassination tools that make murders look like heart attacks and brain failures. - Disability and VA complaint hearings and benefits are frozen, delayed, denied or subjected to lost records and "missing hard drives" as in the Lois Lerner case.- Paypal (A DNC-biased operation) and other on-line payments for on-line sales are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target victims who competed with the attackers interests and holdings.- DNS redirection, "website spoofing" sends target victims websites to dead ends where no sales orders or customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using Google and Amazon servers. All commercial storefronts and on-line sales attempts by target victims, will have had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto, California in order to terminate revenue potentials for the target victims.- Over 50,000 trolls, shills, botnets and synth-blog deployments are deployed to place defamatory statements and disinformation about victims in front of 7.5 billion people around the world on the internet in order to seek to damage their federal testimony credibility by a massively resourced facility. - Campaign finance dirty tricks contractors are hired by campaign financiers to attack the friends and family members of the target victim in order to create low morale for the target victims psyche and motivation.- Are you getting weird headaches and hearing a "buzzing sound" in your head? The U.S. Government has now acknowledged that the Cuban, Chinese and other embassy "sonic attacks" are from a known microwave beam weapon. Any one of the technical departments of the attack services listed at the top of this article can build such a biological harassment weapon. It can be aimed at the target victims office, bedroom or vehicle and, within a week, have caused biological and emotional damage using a weapon that has no visible track of trajectory. It is designed to make the target victim think they are "going crazy" or "hearing sounds in their head".- In one case covert political partner: Google, transferred large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on Victims by many magnitudes.- Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in charge of the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices with Google-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts that Google engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’s operations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles and investigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff. A conflict-of-interest unlike any in American history. Google’s investors personally told Applicant they would “kill him”. Google and the Obama Administration were “the same entity”. Applicant testified in the review that got Michelle Lee terminated and uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds. - Honeytraps and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject.
-
1:15:00
Awaken With JP
10 hours agoMerry Christmas NOT Happy Holidays! Special - LIES Ep 71
130K115 -
1:42:21
The Quartering
11 hours agoTrump To INVADE Mexico, Take Back Panama Canal Too! NYC Human Torch & Matt Gaetz Report Drops!
109K92 -
2:23:15
Nerdrotic
11 hours ago $0.77 earnedA Very Merry Christmas | FNT Square Up - Nerdrotic Nooner 453
86.9K12 -
1:14:05
Tucker Carlson
11 hours ago“I’ll Win With or Without You,” Teamsters Union President Reveals Kamala Harris’s Famous Last Words
173K338 -
1:58:31
The Dilley Show
11 hours ago $1.42 earnedTrump Conquering Western Hemisphere? w/Author Brenden Dilley 12/23/2024
137K39 -
1:09:59
Geeks + Gamers
12 hours agoSonic 3 DESTROYS Mufasa And Disney, Naughty Dog Actress SLAMS Gamers Over Intergalactic
97.2K21 -
51:59
The Dan Bongino Show
13 hours agoDemocrat Donor Admits The Scary Truth (Ep. 2393) - 12/23/2024
852K2.86K -
2:32:15
Matt Kohrs
1 day agoRumble CEO Chris Pavlovski Talks $775M Tether Partnership || The MK Show
128K31 -
28:23
Dave Portnoy
1 day agoDavey Day Trader Presented by Kraken - December 23, 2024
160K43 -
59:29
BonginoReport
14 hours agoTrump, Murder Plots, and the Christmas Miracle: Evita + Jack Posobiec (Ep.110) - 12/23/2024
165K140