FIGHTING BACK AGAINST POLITICAL CORRUPTION

How did we fight back against the most powerful organized crime entity on Earth?

We get that question all the time. Here is the answer.

First, they started it. The bad guys attacked us because our products and services were better than theirs and they could not compete. They decided to cheat rather than compete and they cheated with political bribes, black-lists, collusion and other anti-trust violating acts. When we helped law enforcement investigate them, the bad guys doubled down on their attacks. The bad guys crossed the line when they used our own government officials and taxpayer funds to operate their crimes. They broke felony laws and the basic principles of Democracy.

So who are these mobsters? They are your Senators, White House Staff, insider agency staff and their Silicon Valley Oligarch sociopath political financiers. Some of your public officials set-up, operated and maintained an organized crime scheme for personal profit at the expense of every taxpayer. They went after Five Trillion dollars of your tax money for their personal interests via rigged stock market scams, rigged government contracts, exclusionary policy manipulations and other schemes that harmed American taxpayers.

We are taxpayers…so.. Game On!

We wrote FBI-quality criminal activities reports and filed them with every law enforcement and regulatory agency in every country in the world that we could find, including the FBI, OSC, GAO, EU, Interpol, FSB, UN, etc.

We identified and listed every person, organization and company involved in the attacks and RICO law violations and provided that list to The U.S. Congress and every agency.

We opened our own private investigator and crowd-sourced investigations into the following:

– Every stock market account they or their family owns

– Every Uber or Lyft ride they ever took for any meeting or transport of sex workers

– Every flight manifest they appeared on

– Every bank account they have ever held

– Every lawsuit, divorce record and police record they have ever appeared in

– Every trust fund they or their family holds

– Every shell corporation they, or their family holds

– Every person named in the Epstein Pedo book: https://www.scribd.com/document/416207833/Jeffrey-Epsteins-Little-Black-Book-Redacted    cross referenced across all of the other databases and then supplied to the FBI and Child Protection Agencies

– Every item in the Swiss Leaks that cross connects to their holdings

– Every item in the Panama Papers Leaks that cross connects to their holdings

– Every item in the WikiLeaks that cross connects to their holdings

– Every item in the Snowden Leaks that cross connects to their holdings

– Every sex trafficking incident that connects to each of them alone, and in groups

– Every financial transaction between any of the parties on the master list and the character assassination and hit job firms of: Google, Univision, Gawker Media, Unimoda, Jalopnik, Gizmodo,Black Cube, Fusion GPS, Media Matters, Think Progress, IN-Q-Tel, K2 Intelligence, WikiStrat, Podesta Group, YouTube, Alphabet, David Drummond, Larry Page, Facebook, Correct The Recor, Stratfor, ShareBlue, Sid Blumenthal, David Brock, Eric Schmidt, Sunshine Sachs, Covington and Burling, Buzzfeed, Perkins Coie and Wilson Sonsini or their derivatives with common owners.

– Every item in the Quest Leaks that cross connects to their holdings

– Every tactical deployment, by a campaign financier, of the tactics listed in this manual: https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf

– Every sex service that their credit card payments ever connect too

– Every real estate transaction that any name or company they, or their family, were involved in, tracks to

….. and hundreds of thousands of other information points about them that prove that they benefit from crimes that they engage in for others who engage in crimes using the American public policy system.

It all goes into publicly shared, open-source, 100% legal, public collaborative databases that work like XKEYSCORE, or MS Access, or Oracle Databases.

The proof of collusion, organized criminal actions and raw covert corruption is indisputable. The actors are all the same people. The beneficiaries are all the same people. The communications between the parties all coordinate the same actions.

We have demanded their arrests, indictments, exposures and bankruptcies.