WAS GAWKER MEDIA A RUSSIAN SPY OPERATION?

UNITED STATES BANKRUPTCY COURT

 

SOUTHERN DISTRICT OF NEW YORK

 

——————————————————x

 

:

 

In re : Chapter 11

 

:

 

Gawker Media LLC, et al., 1 : Case No. 16-11700 (SMB)

 

:

 

Debtors. : (Jointly Administered)

 

:

 

——————————————————x

 

 

 

 

 

AMENDED RICO (Racketeer Influenced and Corrupt Organizations Act ) DEMAND FOR CO-OPERATIVE FILING OF RICO CHARGES WITH ASSISTED AND ASSOCIATED CHARGES COMBINING THE U.S. DEPARTMENT OF JUSTICE AND PLAINTIFFS AS PLAINTIFF GROUP

 

WHEREAS, Defendants Gawker Media, GMGI, Gawker Hungary (f/k/a Blogwire Hungary Szellemi Alkotast Hasznosito Kft.), Gawker Entertainment LLC, Gawker Technology, LLC, Gawker Sales, LLC, Nicholas G. A. Denton, Irin Carmon, Univision Communications, Univision America, Adrian Covert, Jon Herrman, Gaby Darbyshire, UniModa LLC, Elon Musk, John Doerr and DOES I through 220, including each employee of Gawker Media, did engage in RICO statute violations in their attempts to damage Plaintiffs.

 

WHEREAS, public officials and investigators have provided proof of RICO violations to all journalism, Congressional and law enforcement parties with jurisdiction in these charges.

 

WHEREAS, public news media and IT forums have now confirmed that due to Gawker Media’s attempted media manipulations in the 2008 and 2016 Presidential elections and the cross-national exchange of funds and interests between multiple questionable entities on multiple continents that each and every member of the above-stated defendants group has been under electronic surveillance on every electronic device with an IMEI address or network functionality by multiple law enforcement, defense, civil investigation, intelligence entities and the placement of under-cover journalists with Defendants group; and that the results of that surveillance, since 2007 is subpoena-accessible in this matter. Further, each of those legitimate entities that engaged in such surveillance that had even a single Cisco or Juniper Networks back-door embedded device touching their network has been revealed by U.S. DHS public reports to have had their servers breached by hackers. Any such evidence discovered after-the-fact may also legally be used in this case as evidence

 

WHEREAS the publication known as THE INTERCEPT is funded by Gawker Media’s backers and shares real-estate venues with Gawker Media, First Look, The Intercept and other coordinating publications and that publication has published the following overview which describes in detail the Stasi-like methods used by Defendants against Plaintiffs:

 

“One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

 

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

 

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

 

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

 

 

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

 

 

Then there are the tactics used to destroy companies the agency targets:

 

 

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

 

 

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

 

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

 

 

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

 

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

 

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

 

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

 

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

 

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

 

 

 

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

 

 

 

 

 

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

 

 

 

 

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

 

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

 

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

 

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

 

Documents referenced in this article:

 

 

WHEREAS, Defendants are documented by advisors, whistle-blowers and consultants from law enforcement, defense, civil investigation, insider reporters from such as publications as TECH CRUNCH, The Daily Mail, ICIJ, Drudge Report, etc. and intelligence entities as being the persons and parties who did engage in the following attacks on Plaintiffs and said attacks can be tracked back to Defendants via forensic data and said attacks by Defendants threatened the lives, brands, incomes, careers, safety, security, and other metrics of Plaintiffs:

 

­ Defendants produced a series of attack videos, articles, blog comments and documents and sent them directly to the spouses, partners, landlords, investors, employers, news media and others in an effort to “vaporize” Plaintiffs as part of the reprisal, vendetta, retribution services which Defendants offered and accepted employment to engage in. Defendants published these attack materials to over 5 billion people for over 5 years in hopes of “destroying” Plaintiffs.

 

– Defendants contacted Social Security, SSI, SDI, Disability and other earned benefits services and caused them to be stone­walled. Applications were “lost”. Files in the application process “disappeared”. Lois Lerner hard drive “incidents” took place.

 

­ Corrupt state and federal employees worked with Defendants to play an endless game of Catch­22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed.

 

­ Some applicants found themselves strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after their work with the Department of Energy weapons and energy facilities. Many wonder if these “targets” were intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of these people were exposed to deadly compounds and radiations.

 

­ Applicants employers were called, and faxed, and ordered to fire applicants from their places of employment, in the middle of the day,with no notice, as a retribution tactic.

 

­ Applicants HR and employment records, on recruiting and hiring databases, were embedded with negative keywords and links to Defendants servers in order to prevent them from gaining future employment.

 

­ Peers Gary D. Conley and Rajeev Motwani, both whistle­blowers in this matter, turned up dead under strange circumstances. They are not alone in a series of bizarre deaths related to this matter.

 

­ Paypal, owned by Gawker backer Pierre Omidyar, and other on­line payments for on­line sales were delayed, hidden, or re­directed in order to terminate income potential for applicants who competed with Defendants interests and holdings.

 

­ DNS redirection, website spoofing which sent applicants websites to dead ends and other Internet activity manipulations were conducted.

 

­ Campaign finance dirty tricks contractors IN­Q­Tel, Think Progress, Media Matters, Gawker Media, Syd Blumenthal, etc., were hired and proven to have all been financially connected to Defendants. Executives and their campaign financiers to attack applicants who competed with Defendant executives stocks and personal assets.

 

­ Covert Defendant partner: Google, transfered large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on applicants by many magnitudes.

 

­ Honeytraps and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject. Vanity Fair produced a feature article about one such attack on the Founder of Tech Crunch, a peer.

 

­ Mortgage and rental applications had red flags added to them by Defendants in databases to prevent the targets from getting homes or apartments.

 

­ McCarthy­Era “Black­lists” were created and employed against applicants who competed with Defendants executives and their campaign financiers to prevent them from funding and future employment.

 

­ Targets were very carefully placed in a position of not being able to get jobs, unemployment benefits, disability benefits or acquire any possible sources of income. “

 

The above list is only a partial set of examples of the attacks by Defendants.

 

WHEREAS, Defendants attacking entities, for whom law enforcement and intelligence surveillance records exist, are, at least, known to include Defendants employees and contractors: Adam Dachis, Adam Weinstein, Adrian Covert, Adrien Chen, Alan Henry, Albert Burneko, Alex Balk, Alexander Pareene, Alexandra Philippides, Allison Wentz, Andrew Collins, Andrew Magary, Andrew Orin, Angelica Alzona, Anna Merlan, Ariana Cohen, Ashley Feinberg, Ava Gyurina, Barry Petchesky, Brendan I. Koerner, Brendan O’Connor, Brent Rose, Brian Hickey, Camila Cabrer, Choire Sicha, Chris Mohney, Clover Hope, Daniel Morgan, David Matthews, Diana Moskovitz, Eleanor Shechet, Elizabeth Spiers, Elizabeth Starkey, Emily Gould, Emily Herzig, Emma Carmichael, Erin Ryan, Ethan Sommer, Eyal Ebel, Gabrielle Bluestone, Gabrielle Darbyshire, Georgina K. Faircloth, Gregory Howard, Hamilton Nolan, Hannah Keyser, Hudson Hongo. Heather Deitrich, Hugo Schwyzer, Hunter Slaton, Ian Fette, Irin Carmon, James J. Cooke, James King, Jennifer Ouellette, Jesse Oxfeld, Jessica Cohen, Jesus Diaz, Jillian Schulz, Joanna Rothkopf, John Cook, John Herrman, Jordan Sargent, Joseph Keenan Trotter, Josh Stein, Julia Allison, Julianne E. Shepherd, Justin Hyde, Kate Dries, Katharine Trendacosta, Katherine Drummond, Kelly Stout, Kerrie Uthoff, Kevin Draper, Lacey Donohue, Lucy Haller, Luke Malone, Madeleine Davies, Madeline Davis, Mario Aguilar, Matt Hardigree, Matt Novak, Michael Ballaban, Michael Dobbs, Michael Spinelli, Neal Ungerleider, Nicholas Aster, Nicholas Denton, Omar Kardoudi, Pierre Omidyar, Owen Thomas, Patrick George, Patrick Laffoon, Patrick Redford, Rich Juzwiak, Richard Blakely, Richard Rushfield, Robert Finger, Robert Sorokanich, Rory Waltzer, Rosa Golijan, Ryan Brown, Ryan Goldberg, Sam Faulkner Bidle, Sam Woolley, Samar Kalaf, Sarah Ramey, Shannon Marie Donnelly, Shep McAllister, Sophie Kleeman, Stephen Totilo, Tamar Winberg, Taryn Schweitzer, Taylor McKnight, Thorin Klosowski, Tim Marchman, Timothy Burke, Tobey Grumet Segal, Tom Ley, Tom Scocca, Veronica de Souza, Wes Siler, William Haisley, William Turton at a minimum but not to be limited by this law enforcement list.

 

WHEREAS further information provided in the 7 other related federal cases that this Court has been notified of provide further confirming evidence.

 

WHEREAS financial tracking of the financiers, beneficiaries and means of operations communications prove that a RICO-qualified Cartel was operated by Defendants.

 

DEMAND IS HEREBY MADE FOR A JOINT DOJ/PLAINTIFF FEDERAL RICO COMPLAINT TO BE FILED AGAINST DEFENDANTS BY DOJ ON BEHALF OF PLAINTIFFS AND THE UNITED STATES TAXPAYERS.

 

 

 

PLEASE TAKE FURTHER NOTICE that copies of any motions scheduled for hearing on the omnibus dates may be obtained free of charge by visiting the website of the Debtors’ claims and noticing agent, Prime Clerk LLC, at https://cases.primeclerk.com/gawker.

 

You may also obtain copies of any pleadings by visiting the Court’s website at http://nysb.uscourts.gov in accordance with the procedures and fees set forth therein. You may also obtain copies of non-classified evidence for this case at http://www.globalscoop.net Case # 2788-D in folders # A-1 through A-50.

 

 

 

PROOF OF SERVICE

 

Plaintiffs group hereby certifies that on this date we caused this filing to be served via a true and correct copy of the foregoing by causing copies of same to be served on all counsel of record, all known creditors, federal law enforcement liaisons and on the U.S. Trustee for the Southern District of

 

New York, Region 2, by electronic filing same via electronically traced and tracked digital networking and using the Prime Clerk case system and the Judge’s office electronic filing system.

 

 

 

 

BCC: FBI, U.S. Congress, FTC, SEC, OSC, GAO, INTERPOL

 

The last four digits of the taxpayer identification number of the debtors are: Gawker Media LLC (0492); Gawker

Media Group, Inc. (3231); and Gawker Hungary Kft. (f/k/a Kinja Kft.) (5056). Gawker Media LLC and Gawker

Media Group, Inc.’s mailing addresses are c/o Opportune LLP, Attn: William D. Holden, Chief Restructuring

Officer, 10 East 53rd Street, 33rd Floor, New York, NY 10022. Gawker Hungary Kft.’s mailing address is c/o

Opportune LLP, Attn: William D. Holden, 10 East 53rd Street, 33rd Floor, New York, NY 10022.

 

 

1The last four digits of the taxpayer identification number of the debtors are: Gawker Media LLC (0492); Gawker

Media Group, Inc. (3231); and Gawker Hungary Kft. (f/k/a Kinja Kft.) (5056). Gawker Media LLC and Gawker

Media Group, Inc.’s mailing addresses are c/o Opportune LLP, Attn: William D. Holden, Chief Restructuring

Officer, 10 East 53rd Street, 33rd Floor, New York, NY 10022. Gawker Hungary Kft.’s mailing address is c/o

Opportune LLP, Attn: William D. Holden, 10 East 53rd Street, 33rd Floor, New York, NY 10022.

Advertisements

GAWKER MEDIA LAWSUIT TURNS UP THE REAL REASON GAWKER EXISTED: IT WAS AN ATTACK DOG SERVICE

UNITED STATES BANKRUPTCY COURT

 

SOUTHERN DISTRICT OF NEW YORK

 

——————————————————x

 

:

 

In re : Chapter 11

 

:

 

Gawker Media LLC, et al., 1 : Case No. 16-11700 (SMB)

 

:

 

Debtors. : (Jointly Administered)

 

:

 

——————————————————x

 

 

 

 

 

AMENDED RICO (Racketeer Influenced and Corrupt Organizations Act ) DEMAND FOR CO-OPERATIVE FILING OF RICO CHARGES WITH ASSISTED AND ASSOCIATED CHARGES COMBINING THE U.S. DEPARTMENT OF JUSTICE AND PLAINTIFFS AS PLAINTIFF GROUP

 

WHEREAS, Defendants Gawker Media, GMGI, Gawker Hungary (f/k/a Blogwire Hungary Szellemi Alkotast Hasznosito Kft.), Gawker Entertainment LLC, Gawker Technology, LLC, Gawker Sales, LLC, Nicholas G. A. Denton, Irin Carmon, Univision Communications, Univision America, Adrian Covert, Jon Herrman, Gaby Darbyshire, UniModa LLC, Elon Musk, John Doerr and DOES I through 220, including each employee of Gawker Media, did engage in RICO statute violations in their attempts to damage Plaintiffs.

 

WHEREAS, public officials and investigators have provided proof of RICO violations to all journalism, Congressional and law enforcement parties with jurisdiction in these charges.

 

WHEREAS, public news media and IT forums have now confirmed that due to Gawker Media’s attempted media manipulations in the 2008 and 2016 Presidential elections and the cross-national exchange of funds and interests between multiple questionable entities on multiple continents that each and every member of the above-stated defendants group has been under electronic surveillance on every electronic device with an IMEI address or network functionality by multiple law enforcement, defense, civil investigation, intelligence entities and the placement of under-cover journalists with Defendants group; and that the results of that surveillance, since 2007 is subpoena-accessible in this matter. Further, each of those legitimate entities that engaged in such surveillance that had even a single Cisco or Juniper Networks back-door embedded device touching their network has been revealed by U.S. DHS public reports to have had their servers breached by hackers. Any such evidence discovered after-the-fact may also legally be used in this case as evidence

 

WHEREAS the publication known as THE INTERCEPT is funded by Gawker Media’s backers and shares real-estate venues with Gawker Media, First Look, The Intercept and other coordinating publications and that publication has published the following overview which describes in detail the Stasi-like methods used by Defendants against Plaintiffs:

 

“One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

 

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

 

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

 

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

 

 

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

 

 

Then there are the tactics used to destroy companies the agency targets:

 

 

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

 

 

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

 

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

 

 

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

 

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

 

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

 

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

 

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

 

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

 

 

 

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

 

 

 

 

 

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

 

 

 

 

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

 

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

 

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

 

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

 

Documents referenced in this article:

 

 

WHEREAS, Defendants are documented by advisors, whistle-blowers and consultants from law enforcement, defense, civil investigation, insider reporters from such as publications as TECH CRUNCH, The Daily Mail, ICIJ, Drudge Report, etc. and intelligence entities as being the persons and parties who did engage in the following attacks on Plaintiffs and said attacks can be tracked back to Defendants via forensic data and said attacks by Defendants threatened the lives, brands, incomes, careers, safety, security, and other metrics of Plaintiffs:

 

­ Defendants produced a series of attack videos, articles, blog comments and documents and sent them directly to the spouses, partners, landlords, investors, employers, news media and others in an effort to “vaporize” Plaintiffs as part of the reprisal, vendetta, retribution services which Defendants offered and accepted employment to engage in. Defendants published these attack materials to over 5 billion people for over 5 years in hopes of “destroying” Plaintiffs.

 

– Defendants contacted Social Security, SSI, SDI, Disability and other earned benefits services and caused them to be stone­walled. Applications were “lost”. Files in the application process “disappeared”. Lois Lerner hard drive “incidents” took place.

 

­ Corrupt state and federal employees worked with Defendants to play an endless game of Catch­22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed.

 

­ Some applicants found themselves strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after their work with the Department of Energy weapons and energy facilities. Many wonder if these “targets” were intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of these people were exposed to deadly compounds and radiations.

 

­ Applicants employers were called, and faxed, and ordered to fire applicants from their places of employment, in the middle of the day,with no notice, as a retribution tactic.

 

­ Applicants HR and employment records, on recruiting and hiring databases, were embedded with negative keywords and links to Defendants servers in order to prevent them from gaining future employment.

 

­ Peers Gary D. Conley and Rajeev Motwani, both whistle­blowers in this matter, turned up dead under strange circumstances. They are not alone in a series of bizarre deaths related to this matter.

 

­ Paypal, owned by Gawker backer Pierre Omidyar, and other on­line payments for on­line sales were delayed, hidden, or re­directed in order to terminate income potential for applicants who competed with Defendants interests and holdings.

 

­ DNS redirection, website spoofing which sent applicants websites to dead ends and other Internet activity manipulations were conducted.

 

­ Campaign finance dirty tricks contractors IN­Q­Tel, Think Progress, Media Matters, Gawker Media, Syd Blumenthal, etc., were hired and proven to have all been financially connected to Defendants. Executives and their campaign financiers to attack applicants who competed with Defendant executives stocks and personal assets.

 

­ Covert Defendant partner: Google, transfered large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on applicants by many magnitudes.

 

­ Honeytraps and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject. Vanity Fair produced a feature article about one such attack on the Founder of Tech Crunch, a peer.

 

­ Mortgage and rental applications had red flags added to them by Defendants in databases to prevent the targets from getting homes or apartments.

 

­ McCarthy­Era “Black­lists” were created and employed against applicants who competed with Defendants executives and their campaign financiers to prevent them from funding and future employment.

 

­ Targets were very carefully placed in a position of not being able to get jobs, unemployment benefits, disability benefits or acquire any possible sources of income. “

 

The above list is only a partial set of examples of the attacks by Defendants.

 

WHEREAS, Defendants attacking entities, for whom law enforcement and intelligence surveillance records exist, are, at least, known to include Defendants employees and contractors: Adam Dachis, Adam Weinstein, Adrian Covert, Adrien Chen, Alan Henry, Albert Burneko, Alex Balk, Alexander Pareene, Alexandra Philippides, Allison Wentz, Andrew Collins, Andrew Magary, Andrew Orin, Angelica Alzona, Anna Merlan, Ariana Cohen, Ashley Feinberg, Ava Gyurina, Barry Petchesky, Brendan I. Koerner, Brendan O’Connor, Brent Rose, Brian Hickey, Camila Cabrer, Choire Sicha, Chris Mohney, Clover Hope, Daniel Morgan, David Matthews, Diana Moskovitz, Eleanor Shechet, Elizabeth Spiers, Elizabeth Starkey, Emily Gould, Emily Herzig, Emma Carmichael, Erin Ryan, Ethan Sommer, Eyal Ebel, Gabrielle Bluestone, Gabrielle Darbyshire, Georgina K. Faircloth, Gregory Howard, Hamilton Nolan, Hannah Keyser, Hudson Hongo. Heather Deitrich, Hugo Schwyzer, Hunter Slaton, Ian Fette, Irin Carmon, James J. Cooke, James King, Jennifer Ouellette, Jesse Oxfeld, Jessica Cohen, Jesus Diaz, Jillian Schulz, Joanna Rothkopf, John Cook, John Herrman, Jordan Sargent, Joseph Keenan Trotter, Josh Stein, Julia Allison, Julianne E. Shepherd, Justin Hyde, Kate Dries, Katharine Trendacosta, Katherine Drummond, Kelly Stout, Kerrie Uthoff, Kevin Draper, Lacey Donohue, Lucy Haller, Luke Malone, Madeleine Davies, Madeline Davis, Mario Aguilar, Matt Hardigree, Matt Novak, Michael Ballaban, Michael Dobbs, Michael Spinelli, Neal Ungerleider, Nicholas Aster, Nicholas Denton, Omar Kardoudi, Pierre Omidyar, Owen Thomas, Patrick George, Patrick Laffoon, Patrick Redford, Rich Juzwiak, Richard Blakely, Richard Rushfield, Robert Finger, Robert Sorokanich, Rory Waltzer, Rosa Golijan, Ryan Brown, Ryan Goldberg, Sam Faulkner Bidle, Sam Woolley, Samar Kalaf, Sarah Ramey, Shannon Marie Donnelly, Shep McAllister, Sophie Kleeman, Stephen Totilo, Tamar Winberg, Taryn Schweitzer, Taylor McKnight, Thorin Klosowski, Tim Marchman, Timothy Burke, Tobey Grumet Segal, Tom Ley, Tom Scocca, Veronica de Souza, Wes Siler, William Haisley, William Turton at a minimum but not to be limited by this law enforcement list.

 

WHEREAS further information provided in the 7 other related federal cases that this Court has been notified of provide further confirming evidence.

 

WHEREAS financial tracking of the financiers, beneficiaries and means of operations communications prove that a RICO-qualified Cartel was operated by Defendants.

 

DEMAND IS HEREBY MADE FOR A JOINT DOJ/PLAINTIFF FEDERAL RICO COMPLAINT TO BE FILED AGAINST DEFENDANTS BY DOJ ON BEHALF OF PLAINTIFFS AND THE UNITED STATES TAXPAYERS.

 

 

 

PLEASE TAKE FURTHER NOTICE that copies of any motions scheduled for hearing on the omnibus dates may be obtained free of charge by visiting the website of the Debtors’ claims and noticing agent, Prime Clerk LLC, at https://cases.primeclerk.com/gawker.

 

You may also obtain copies of any pleadings by visiting the Court’s website at http://nysb.uscourts.gov in accordance with the procedures and fees set forth therein. You may also obtain copies of non-classified evidence for this case at http://www.globalscoop.net Case # 2788-D in folders # A-1 through A-50.

 

 

 

PROOF OF SERVICE

 

Plaintiffs group hereby certifies that on this date we caused this filing to be served via a true and correct copy of the foregoing by causing copies of same to be served on all counsel of record, all known creditors, federal law enforcement liaisons and on the U.S. Trustee for the Southern District of

 

New York, Region 2, by electronic filing same via electronically traced and tracked digital networking and using the Prime Clerk case system and the Judge’s office electronic filing system.

 

 

 

 

BCC: FBI, U.S. Congress, FTC, SEC, OSC, GAO, INTERPOL

 

The last four digits of the taxpayer identification number of the debtors are: Gawker Media LLC (0492); Gawker

Media Group, Inc. (3231); and Gawker Hungary Kft. (f/k/a Kinja Kft.) (5056). Gawker Media LLC and Gawker

Media Group, Inc.’s mailing addresses are c/o Opportune LLP, Attn: William D. Holden, Chief Restructuring

Officer, 10 East 53rd Street, 33rd Floor, New York, NY 10022. Gawker Hungary Kft.’s mailing address is c/o

Opportune LLP, Attn: William D. Holden, 10 East 53rd Street, 33rd Floor, New York, NY 10022.

 

 

1The last four digits of the taxpayer identification number of the debtors are: Gawker Media LLC (0492); Gawker

Media Group, Inc. (3231); and Gawker Hungary Kft. (f/k/a Kinja Kft.) (5056). Gawker Media LLC and Gawker

Media Group, Inc.’s mailing addresses are c/o Opportune LLP, Attn: William D. Holden, Chief Restructuring

Officer, 10 East 53rd Street, 33rd Floor, New York, NY 10022. Gawker Hungary Kft.’s mailing address is c/o

Opportune LLP, Attn: William D. Holden, 10 East 53rd Street, 33rd Floor, New York, NY 10022.

 

 

Tesla’s Cover-Up Is Falling Apart- Lawsuits Filed- NHTSA Charged With Hiding Tesla Dangers To Protect Obama

For years, numerous groups have been filing reports with DOT and NHTSA charging TESLA with faulty acceleration and fire dangers but the White House ordered agencies to take no action against campaign financier Elon Musk.

Tesla owner files lawsuit in California claiming sudden acceleration

Signage is displayed outside of Tesla Motors before the Tesla Energy Powerwall Home Battery event in Hawthorne, California

View photos
Signage is displayed outside of Tesla Motors before the Tesla Energy Powerwall Home Battery event in Hawthorne, California April 30, 2015. REUTERS/Patrick T. Fallon

SAN FRANCISCO (Reuters) – Tesla Motors Inc was sued on Friday by a Model X owner who said his electric SUV suddenly accelerated while being parked, causing it to crash through the garage into the owner’s living room, injuring the driver and a passenger.

The Model X owner, Ji Chang Son, said that one night in September, he slowly pulled into his driveway as his garage door opened when the car suddenly sped forward.

“The vehicle spontaneously began to accelerate at full power, jerking forward and crashing through the interior wall of the garage, destroying several wooden support beams in the wall and a steel sewer pipe, among other things, and coming to rest in Plaintiffs’ living room,” the lawsuit said.

The lawsuit, filed in U.S. District Court in the Central District of California, seeks class action status. It cites seven other complaints registered in a database compiled by the National Highway Traffic Safety Administration (NHTSA) dealing with sudden acceleration without warning.

Tesla said in a statement that it had “conducted a thorough investigation” of the claims made by Son.

“The evidence, including data from the car, conclusively shows that the crash was the result of Mr. Son pressing the accelerator pedal all the way to 100 percent,” a Tesla spokesperson said in an emailed statement.

Tesla said it has various ways to protect against pedal misapplication, including using its Autopilot sensors to distinguish between erroneous pedal application and normal cases.

The lawsuit alleges product liability, negligence and breaches of warranty, and seeks unspecified damages.

NHTSA did not return a phone call seeking verification of the complaints in its database.

The luxury Model X, launched in late 2015 X, was Tesla’s first sport utility vehicle.

In its marketing, Tesla claims the Model X is the safest SUV in history.

Why you should NEVER buy a Tesla, or anything that Elon Musk Makes!

 

 

 

  • If you have an ounce of morality, then you will not want to help Musk & Tesla profit from the crony political corruption that created them. Musk exists because he bribes politicians & acts as an illegal campaign financing conduit.

  • DOT/NHTSA has covered up years of reports about an acceleration surge issue that can suddenly crash your Tesla into walls and drive it off cliffs. It is either a known hacking attack or the effect of WiFi on Tesla electronics. Either can kill you.

  • If you believe in God, or are in any way religious, Musk & Tesla are pure evil & exist because of hyper-corruption. You don’t want to contribute to their evil or be part of it in any way. You are funding evil & supporting criminal corruption by buying a Tesla or any Elon Musk owned product like Solar City, Tesla, Space X, Hyperloop, etc.!

  • If you read about the dirty deeds and cocaine dealings with the In-Q-Tel airplanes called “Cocaine 1” & “Cocaine 2”, & the corruption behind the company called In-Q-Tel & Musk’s software programmer who ran “The Silk Road” drug & murder service then you must be concerned that many In-Q-Tel people work for Musk. Why does Musk need dirty druggies & spies on his payroll unless he is running covert drug and business spying activities?

  • If you are a Democrat then know that Elon Musk cost you the Hillary Clinton campaign because of his payola schemes. If you are a Republican, know that Elon Musk is the epitome of the worst form of DNC crony corruption you ever saw!

  • Musk bribed California politicians to give him hundreds of millions of dollars of taxpayer dollars & resources he never earned or worked for. He only got those crony payola perks handed to him because he operated as an illicit front for corrupt campaign financing for Dianne Feinstein, Jerry Brown, Harry Reid, Barack Obama and Hillary Clinton.

  • Multiple parties have filed “Demands For The Arrest of Elon Musk” with the FBI, DOJ, AG, FTC, SEC and other law enforcement agencies. It is not likely that Musk, or his companies will survive a full investigation.

  • Tesla and Solyndra sit on the same land in Fremont, CA. Solyndra was raided by the FBI for corruption. Tesla SHOULD be raided by the FBI for corruption. Both companies had kick-back crony payola schemes with Senator Dianne Feinstein. She owned the land, lease, HR, construction company and supplier interests and stock for both companies in one of the most massive conflict-of-interest crony financing schemes in U.S. history. Elon Musk and the Feinsteins are corruption partners.

  • People who see you in a Tesla think of you as a “Tone Deaf Douchebag”, “Tesla Tool!”, “Arrogant Prick”, “Ostentatious Obama Oaf”, “Sheep”, “Mindless Yuppie Scum”, “Misogynistic Silicon Valley Clone”, “Self-promoting Elitist Douche”, “Fake News Reading Main Stream Boob”, “Naive Idiot” or other bad things.

  • Elon Musk is one of the main financiers behind Barack Obama & Hillary Clinton, both of whom have been charged with corruption. Musk endlessly tweets lies & “…No I didn’t do those bad things” BS but nobody else supports him.

  • Tesla financial records are “cooked” in a fraudulent manner to make the stock market valuation of Tesla a falsely manipulated factor. Musk uses “pre-orders”, by his own investors, to fake sales and wrote emails to customers asking them to put small deposits down so he could book them as fully paid sales in one of a large number of stock and loan valuation frauds. Musk and his investors practice stock market skims, pump-and-dumps and Flash Boy manipulations.

  • Lithium ion batteries are blowing up, starting fires &, generally, destroying people’s homes, cars, electronics & physical health. Boeing was ordered to stop flying the 787 Dreamliner because it’s Lithium ion batteries are catching fire spontaneously. A group of silicon valley venture capitalists forced/leveraged the government to buy & pay for these specific batteries, that they have stock in, in order to benefit their profit margins. Other batteries don’t have these problems. They knew about the dangers from day one, but put greed ahead of safety. There are thousands & thousands of reports of spontaneous lithium ion fires but the VC’s who back lithium ion pay to keep this information hushed up. Millions of these batteries have been recalled for fire risk. The VC’s tried to push as many as they could before they got caught. Now they are caught. These VC’s & the Senators they bribed own stock in lithium mining companies too.

  • Tesla Motors has filed a patent which states the following , THESE ARE TESLA MOTORS WORDS warning about a crisis, the level of which they never disclosed to the consumer: “Thermal runaway is of major concern since a single incident can lead to significant property damage &, in some circumstances, bodily harm or loss of life. When a battery undergoes thermal runaway, it typically emits a large quantity of smoke, jets of flaming liquid electrolyte, & sufficient heat to lead to the combustion & destruction of materials in close proximity to the cell. If the cell undergoing thermal runaway is surrounded by one or more additional cells as is typical in a battery pack, then a single thermal runaway event can quickly lead to the thermal runaway of multiple cells which, in turn, can lead to much more extensive collateral damage. Regardless of whether a single cell or multiple cells are undergoing this phenomenon, if the initial fire is not extinguished immediately, subsequent fires may be caused that dramatically expand the degree of property damage. For example, the thermal runaway of a battery within an unattended laptop will likely result in not only the destruction of the laptop, but also at least partial destruction of its surroundings, e.g., home, office, car, laboratory, etc. If the laptop is on-board an aircraft, for example within the cargo hold or a luggage compartment, the ensuing smoke & fire may lead to an emergency landing or, under more dire conditions, a crash landing. Similarly, the thermal runaway of one or more batteries within the battery pack of a hybrid or electric vehicle may destroy not only the car, but may lead to a car wreck if the car is being driven or the destruction of its surroundings if the car is parked”.

  • Tesla’s own staff, & every fire department, have now admitted that once a lithium ion fire gets started in a Tesla, that it is impossibleto extinguish burning lithium ion material. This is Telsa’s own words in THEIR patent filing, (You can look it up online) saying that the risk is monumental. Tesla has 6800 lithium ion batteries, any one of which can “go thermal”, start a chain reaction and blow up all of the rest of the 6800+ deadly batteries! Tesla drivers have been burned alive in thermal globs of flaming lithium ion, plastics & metal. Bystanders have heard their horrific screams of unutterable pain & terror as they were burned alive! Tesla fires can’t be extinguished & the bodies are burned into “unrecognizable lumps of charred flesh”, according to fireman.

  • Lithium Ion batteries “go thermal” in peoples pockets, in your notebook, especially in a Tesla & Fisker car. There are tens of thousands of articles documenting this & there is a cover-up by the VC’s that fund these things to keep this fact out-of-sight. Making Lithium Ion batteries poisons the workers who make them. It is a dangerous product that is covered-up by the Obama Administration. Panasonic knows that these batteries are deadly.

  • Tesla only exists to exploit Elon Musk’s briberies. The lithium ion batteries blow up when they get: wet, hot, bumped, over-charged, struck by energy fields, exposed to air or squashed. Lithium ion batteries poison the Earth & that they poison & kill the workers that make them. Lithium ion batteries come from war profiteering in Afghan & Bolivian corruption.

  • Panasonic is Elon Musk’s partner. Panasonic is one of the most corrupt companies in the world. Panasonic has been charged, on multiple continents with: Product dumping, bribery, collusion, price fixing, anti-trust law violations, racketeering, worker abuse, toxic poisoning of workers, & other crimes. It is no wonder that Elon Musk & Panasonic are partners. Tata Motors executive Karl Slym was killed for exposing this fact.

  • Your tax dollars were stolen in order to make Tesla Motors, as part of a political financing kick-back scam. In other words, part of your paycheck was taken away from you in order to buy hookers, rent-boys & private jets for Musk & company.

  • Tesla’s are forged in criminal corruption, so anybody who drives a Tesla must be either ignorant, a weasel or one of the corrupt. The whole world now knows all of the facts in this list so you can never plead ignorance to these crimes.

  • Telsa’s have a huge amount of highly documented defects. The defects are so extensive that Tesla made buyers sign confidentiality agreements to try to hide how messed up their cars are.

  • Tesla’s have killed more people than the main-stream news has reported. The full Tesla death-list is covered up.

  • Musk lied about why he wanted to make electric cars, when, in fact, he actually poisons the environment because Tesla investors wanted to exploit toxic minerals & materials which can’t be recycled in a clean manner

  • No other electric car has been so mundane, & yet had so many problems with it, since the electric car was first sold in the 1800’s. There is nothing “novel” or “amazing” about the Tesla aside from dime store parlor tricks for PR hype.

  • More drunks have crashed Tesla’s, than any other per capita car in the world, per volume of cars made

  • Elon Musk’s co-founders, investors, partners, wives, investors, suppliers & employees have sued him for being a fraud &, essentially, called him an “asshole” in court records.

  • Elon Musk lied on this Department of Energy funding application and the Obama Administration refuses to allow any federal employees or witnesses to testify to these facts in public due to the devastating potential results of these facts.

  • More owners of Tesla’s have been found to cheat on their taxes, & be involved in abuse-based divorces, than almost any other car brand owner. Tesla owners are bad people who rationalize their poor life choices.

  • Elon Musk will lie, cheat & steal in order to self-aggrandize & glorify his egotistical mania. Musk has been documented engaging in over 100 lies which were later proven to be false. He has spent tens of millions of dollars to but fake news about himself on Twitter, Facebook & Google because he is such a mentally disturbed ego-maniac.

  • None of Elon Musk’s companies would exist if not for taxpayer funded handouts given to him by corrupt politicians in exchange for illegal campaign finance deals with him & his investors.

  • Google, & Tesla, who are financial & political partners, have both been caught spying on consumers & manipulating Internet data in order to cover-up their complicity in huge political corruption & kick-back deals

  • Musk took U.S. taxpayer dollars from the government & then hired cheap off-shore labor & fired U.S. Union workers & domestic workers. He lied to & screwed the NUMMI workers that were working at the Fremont plant.

  • Musk has put over 18 surveillance devices in the Tesla. Anybody can hack those devices & monitor you. WORSE YET, foreign agents have hacked the Tesla & taken over the controls & driven Tesla’s into bystanders & over cliffs.

  • When Erick Strickland was head of the NHTSA he was confronted about DOT safety cover-ups of the Tesla to protect Obama. He quit 48 hours later. The DOT safety cover-ups to protect the Obama campaign finance payola scheme continue to this day. Obama’s Gibbs, Emanual, Plouffe, Axelrod and Carney quit within a week of being threatened with exposure.

  • Tesla’s have had a large number of recalls but Elon Musk refuses to call them “recalls”. Tesla’s have had multiple recalls for SEVERE safety dangers. DOT has been told this, in writing, for years, but wont take action in order to protect Obama.

  • Elon Musk is a bullshit artist who has no original ideas & wears black-turtle neck shirts (like Elizabeth Homes) to try to create a “cult” around himself & convince the world that he is a “Jesus-like” figure when, in fact, he is a clinical sociopath.

  • Tesla is a severe public safety hazard that has been systematically covered up by corrupt politicians.

  • Tesla Motors batteries were promoted by those who wished to exploit the Afghanistan War for personal profit by controlling the Afghan lithium mining fields. Kleiner Perkins and Draper Fisher hyped the “…trillions of $ of lithium in Afganistan.

  • Tesla Motors batteries blow up on their own.

  • Tesla Motors batteries blow up when they get wet.

  • Tesla Motors batteries fires cannot be put out by any common fire-fighting resources.

  • Tesla Motors batteries set themselves on fire.

  • Per MSDS documents, Tesla Motors batteries emit cancer-causing vapors when they burn.

  • Tesla Motors Vehicles toxicity poison bystanders, nearby vehicular passengers, airline passengers in planes carrying said batteries in their holds, & environments where such incidents occur.

  • Tesla Motors batteries blow up when bumped by the same level of car incident that would, otherwise, only dent a normal car bumper.

  • In an accident, when a Tesla rolls over, molten metal & plastic can drip on & burn the occupants alive.

  • Per MSDS documents, Tesla Motors batteries emit brain damaging chemicals when they burn.

  • Per MSDS documents, Tesla Motors batteries emit chemicals, burning, or not, that can damage an unborn fetus.

  • Per MSDS documents, Tesla Motors batteries emit chemicals that can cause lung damage.

  • Per MSDS documents, Tesla Motors batteries emit chemicals that can cause liver damage.

  • Per published lawsuits & news reports, the factories that make Tesla Motors batteries have been charged with the deaths, & potentially fatal illness, of over 1000 workers & the poisoning of nearby towns.

  • Tesla Motors batteries become even more dangerous over time, particularly when tasked by electric transportation systems like Hover-boards & Tesla’s. The chemistry in a lithium ion battery changes to become more unstable over time.

  • Tesla Motors batteries were never designed to be used in automobiles. Tesla used non-automotive batteries in one of the most dangerous configurations possible.

  • Tesla Motors occupants experience higher EMF radiation exposure than gasoline vehicle occupants.

  • Elon Musk’s Space X vehicles & Tesla Motors vehicles have both had a higher-than-average number of explosions. This has caused outside experts to doubt Musk’s ability to place safety considerations over his need for hyped-up PR.

  • Leaked Sandia National Labs & FAA research videos dramatically demonstrate the unstoppable, horrific, “re-percussive accelerating domino-effect” explosive fire effect of the Tesla Motors batteries.

  • Tesla’s own “Superchargers” & home 3-prong chargers have set Tesla’s, homes & businesses on fire.

  • Consumer rights groups contacted Erick Strickland, the head of the NHTSA, & charged him with a cover-up. He quit days later. The NHTSA then issued a safety investigation request to Tesla Motors, which would have more publicly exposed these dangers, but the safety investigation was never under-taken due to White House requests & lobbyist bribes, from Tesla, which got the investigation shut down.

  • NEPA regulations for the Tesla NUMMI factory in California & the Nevada Tesla “Gigafactory” have been violated relative to environmental safety standards.

  • Tesla Motors vehicles are not “Factory Built” “like Ford” builds cars, as Tesla professes. They are hand built in small volumes & subjected to numerous defects. Blogs have documented hundreds of defects, as listed by Tesla owners. Tesla has lost at least one LEMON CAR LAWSUIT for defective manufacturing.

  • Tesla’s “showrooms” are often “pop-up” retail storefronts that are in tight-proximity retail centers, putting it’s neighbors at risk of total loss from fire damage.

  • Tesla Motors vehicles have been hacked & taken over. Their doors, steering, listening devices & navigation have been taken over by outside parties. Multiple Tesla have suddenly swerved off the road, over cliffs & into other vehicles, killing bystanders & Tesla drivers.

  • Three Tesla top engineers & two competing senior executives, all of whom had whistle-blown on Tesla, who were in perfect health one day, suddenly died mysteriously the next day.

  • Multiple employees, founders, investors, marital partners, suppliers & others have sued Tesla Motors, &/or it’s senior executives for fraud. Musk had nothing to do with creating Tesla. He ran a hostile take-over of Tesla from the founders.

  • In addition to suing him, many of his former staff & partners have described Musk as an “Arrogant Prick”.

  • If you think the above bullet-points are bad there are over a 1000 more. Find the book “Is Elon Musk A Fraud” online or visit https://stopelonfromfailingagain.com/ or thousands of other sites that expose the truth about Musk & Tesla!

 

 

 

 

 

 

 

<

p class=”western” style=”margin-left:.25in;margin-bottom:0;line-height:100%;orphans:2;widows:2;” align=”left”>Print this out & freely re-post it on blogs & social media. Post this on bulletin boards. Put this on the windshield of every Tesla you find. Print this out & hand these out in front of every Tesla dealership: Nobody can stop you from handing these out, it is your U.S. Constitutional First Amendment Right! Pass the word! This report is also being used to globally track, metricize, quantify and forensically document Google’s, Twitter’s and Facebook’s manipulation of internet information for a pending RICO lawsuit. Revision 2.5

 

RICO RACKETEERING CHARGES DEMAND FILED FOR JOINT DOJ CHARGES AGAINST GAWKER MEDIA AND THEIR “CARTEL”

 

 

 

 

Evidence Set, per BRANCHES public
law center http://www.globalscoop.net Case # 2788-D

 

 

 

In pro per Claimant and Plaintiff group requesting Court
Appointed legal counsel or the provision of contingency litigators
or deferral fee litigators

 

 

 

 

 

UNITED STATES BANKRUPTCY COURT

 

SOUTHERN DISTRICT OF NEW YORK

 

——————————————————x

 

:

 

In re : Chapter 11

 

:

 

Gawker Media LLC, et al., 1 : Case No. 16-11700 (SMB)

 

:

 

Debtors. : (Jointly Administered)

 

:

 

——————————————————x

 

 

 

 

 

RICO Racketeer Influenced and Corrupt Organizations Act demand for co-operative filing of RICO charges in association with The U.S. Department of Justice

 

WHEREAS, Defendants Gawker Media, GMGI, Gawker Hungary (f/k/a Blogwire Hungary Szellemi Alkotast Hasznosito Kft.), Gawker Entertainment LLC, Gawker Technology, LLC, Gawker Sales, LLC, Nicholas G. A. Denton, Irin Carmon, Univision Communications, Univision America, Adrian Covert, Jon Herrman, Gaby Darbyshire, Elon Musk, John Doerr and DOES I through 50 did engage in RICO statute violations in their attempts to damage Plaintiffs.

 

WHEREAS, public officials and investigators have provided proof of RICO violations to all parties with jurisdiction in these charges.

 

WHEREAS the publication known as THE INTERCEPT is funded by Gawker Media’s backers and that publication has published the following overview which describes in detail the methods used by Defendants against Plaintiffs:

 

“One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

 

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

 

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

 

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

 


 

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

 


 

Then there are the tactics used to destroy companies the agency targets:

 


 

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

 


 

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

 

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

 


 

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

 

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

 

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

 

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

 

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

 

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

 


 


 

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

 


 

 

 

 

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

 

 

 

 

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

 

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

 

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

 

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

 

Documents referenced in this article:

 

 

WHEREAS further information provided in the 7 other related federal cases that this Court has been notified of provide further confirming evidence.

 

WHEREAS financial tracking of the financiers, beneficiaries and means of operations communications prove that a RICO-qualified Cartel was operated by Defendants.

 

DEMAND IS HEREBY MADE FOR A JOINT DOJ/PLAINTIFF FEDERAL RICO COMPLAINT TO BE FILED AGAINST DEFENDANTS BY DOJ ON BEHALF OF PLAINTIFFS AND THE UNITED STATES TAXPAYERS.

 

 

PLEASE TAKE FURTHER NOTICE that copies of any motions scheduled for hearing on the omnibus dates may be obtained free of charge by visiting the website of the Debtors’ claims and noticing agent, Prime Clerk LLC, at https://cases.primeclerk.com/gawker.

You may also obtain copies of any pleadings by visiting the Court’s website at http://nysb.uscourts.gov in accordance with the procedures and fees set forth therein. You may also obtain copies of non-classified evidence for this case at http://www.globalscoop.net Case # 2788-D in folders # A-1 through A-50.

 

PROOF OF SERVICE

 

Plaintiffs group hereby certifies that on this date we caused this filing to be served via a true and correct copy of the foregoing by causing copies of same to be served on all counsel of record, all known creditors, federal law enforcement liaisons and on the U.S. Trustee for the Southern District of

 

New York, Region 2, by electronic filing same via electronically traced and tracked digital networking and using the Prime Clerk case system and the Judge’s office electronic filing system.

 

 

 

BCC: FBI, U.S. Congress, FTC, SEC, OSC, GAO, INTERPOL

 

1The last four digits of the taxpayer identification number of the debtors are: Gawker Media LLC (0492); Gawker

Media Group, Inc. (3231); and Gawker Hungary Kft. (f/k/a Kinja Kft.) (5056). Gawker Media LLC and Gawker

Media Group, Inc.’s mailing addresses are c/o Opportune LLP, Attn: William D. Holden, Chief Restructuring

Officer, 10 East 53rd Street, 33rd Floor, New York, NY 10022. Gawker Hungary Kft.’s mailing address is c/o

Opportune LLP, Attn: William D. Holden, 10 East 53rd Street, 33rd Floor, New York, NY 10022.

 

 

LETTER TO NANCY PELOSI CHALLENGES POLITICAL CORRUPTION

The Honorable Nancy Pelosi

 

Speaker of the House – U.S. Senate

 

450 Golden Gate Ave

 

San Francisco, CA 94107

 

 

 

The Honorable Nancy Pelosi

 

Speaker of the House – U.S. Senate

 

Senate Dirksen 127

 

Washington DC  20510

 

 

 

Dec. 30, 2016

 

 

 

Dear Ms. Pelosi:

 

 

We have been contacting you and your office since 2009 about a political corruption matter. We documented our meetings, phone calls and certified letters to your senior staff who said they were reporting directly to you. We provided our concerns, in writing to every U.S. law enforcement and ethics body.

 

 

You now must consider your legacy and the legacy of your family. Over 10,000 new news media organizations are now tracking this matter and have over one million pages of evidence in hand. They are guaranteed to lock your legacy over this matter in the history books for the next 200 years. What you do next will determine how that legacy, your profits and any benefits fall in the deficit column.

 

 

We hope you are not one of the parties that law enforcement and forensic investigators found had spent over $30M on reprisals, vendettas and retribution actions against your own constituents, including us. As our employee, you have a legal obligation to protect us and not attack us. Is that not correct?

 

 

As a few examples of the obfuscation and obligation evasion we have experienced from your senior staff let us quote these highly documented items.

 

 

We met with Melanie Nutter who said that she reported to you on a “daily basis”. She gave us her card and stated that she was your Deputy District Director. We met with her inside your office at 450 Golden Gate Ave in San Francisco. She said that there “appeared to be some severe dysfunction in the Department of Energy”. She never responded again after numerous calls and visits. Here is her card with her forensic data on it:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

We have sent you, Ms. Pelosi, many communications as your constituents. None of which you have replied to. Here are federal receipts from recent mailings to you which have remained 100% unresponsive:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

We report to Mr. James Comey and David Johnson at the FBI, The investigative groups at the FTC, the SEC, The EU, the GAO, The Congressional Ethics offices and over a hundred others, but it is YOUR JOB to help us solve the problem of having attacks placed on us by your colleagues and staff using our own tax dollars to do so.

 

Your top staffers John Lawrence and Amy Rosenbaum said their were “no problems with the TARP, DOE ATVM or DOE LGP funds” yet the facts prove that there was felony-class payola, crony kickback operations and insider trading going on in history-making volumes. The FBI raid of Solyndra and the House Ethics reports are part of hundreds of thousands of evidence element sources that can prove forensic proof in front of the public and/or a Special Prosecutor.

 

 

Since these crimes began, tens of thousands of new news sites (examples of a few: http://wearethenewmedia.com ) have emerged which reach tens of millions of voters, add millions more daily, and guarantee to Streisand-Effect the disclosures of each and every public official who engaged in the criminal use of the TARP, ATVM and LGP funds as a criminal slush-fund into the next century.

 

 

As you are by now aware, every stock market payola holding, off-shore tax evasion account and real estate payola asset of those politicians is being crashed and turned into negative assets. This is being done using 100% legal methods WITH the help of law enforcement agencies and the Press. By the time this is over, none of the corrupt politicians and Silicon Valley Cartel members “will have a pot to piss in”, as they say. Silicon Valley is having every single company who financed the scam, and rigged the internet for political corruption, exterminated with the simple and 100% legal use of epic transparency. The media and the voting public are doing it and it is 100% legal. You see Ms. Pelosi: Crime truly does not pay!

 

 

In one of thousands of emails to you, such as this one:

 

 

“Subject: [Aid4Mail Trial tag #140] Reply from Congresswoman Nancy Pelosi

 

Date: Mon, 10 Nov 2008 10:19:03 -0500

 

From: “Rep. Nancy Pelosi” <pelosi@mail.house.gov>”

 

 

 

…by The Lotus Notes Development Team; you were made aware of this incident over and over by huge numbers of the voting public and ourselves yet the only action you took seems to be to launch a stone-walling effort. Did you do anything else?

 

 

YOU need to pick up the phone and call us now and tell us how YOU plan to get us our restitution for the attacks your staff and colleague engaged in against us. YOU know exactly who did what and, if you are even slightly unclear on the issues, we will be glad to meet you across the street at the FBI conference room and go over the over one million pages of devastating evidence.

 

 

When can we expect your call?

 

 

 

Sincerely,

 

 

 

 

 

 

 

<

p class=”western” style=”margin-bottom:0;line-height:100%;orphans:2;widows:2;”> 

 

Trump Administration Promises To Expose Obama’s Use of Dept. of Energy as “Giant Criminal Slush-Fund”!

Donald Trump just drew a line in the proverbial sand. And President Barack Obama better simmer down very quickly, or face brutal consequences.

 

Trump officials made it clear late Thursday that if Obama continues to scorch America’s already-fragile foreign policy on his way out of the White House door, he will face sweeping federal probes when Trump assumes the presidency and control of the nation’s law enforcement apparatus.

 

True Pundit spoke with well-placed sources who have accepted new positions with the Trump administration. They agreed Trump and key members of his transition team are increasingly frustrated by the recent actions of Obama who just this week picked unwarranted international fights with Israel and Russia.

 

“At this rate the feeling is Obama will have to face consequences for what he is doing right now,” the Trump insider said. “We can take a very close look at him, (Valerie) Jarrett, (John) Kerry and his inner circle to see what they have really been doing, especially in the Middle East. And where the billions (of U.S. dollars) went.”

 

One source, a highly decorated intelligence official, said he has recommended investigating the details of Obama and Kerry’s nuclear agreement with Iran, including the millions in cash of ransom paid to release American hostages as well as untold billions paid to the Iranians “for no sound policy reasons.”

 

The Trump insider said such probes would include examining the personal finances of all U.S. officials involved in crafting the Iran deal, including searching for offshore bank accounts where illicit funds might be parked.

 

Trump believes perhaps U.S. officials personally benefited from the Iran deal, the insider said. He described Trump as perplexed why the deal was struck in the first place, and that the president elect thinks that illicit side deals were the motivation of Obama administration insiders to enter into such a lopsided and disastrous agreement with an unstable country.

 

Perhaps another good angle would be unsealing all of Obama’s personal records and see how his well-crafted narrative as the next John F. Kennedy quickly unravels.