Lawsuit seeks to bring corrupt officials to justice

3 weeks ago The Investigators 0

THE GAME WAS RIGGED…

It was rigged for a handful of corrupt Silicon Valley billionaires and the corrupt senators, agency heads and White House staff that they owned!

It has been proven, with irrefutable evidence, that The White House, and their campaign billionaires, rigged the Department of Energy to pay themselves kick-backs, via the manipulation of taxpayer cash, while sabotaging every other applicant, and competitor, using government resources to engage in those attacks.

WARREN

IT WAS AN ORGANIZED CRIME SCAM INVOLVING STATE AND FEDERAL OFFICIALS…

Per federal investigators:“White House campaign staff traded campaign financing, federal “Cleantech” funding and stock market perks, with Silicon Valley oligarchs in an illegal political finance scam. They were assisted by Attorney General Eric Holder and Secretary of Energy Steven Chu, who had financial and personal relationships with all of the suspects. Together, they sabotaged other applicants, industries, domestic jobs and domestic innovation out of pure greed and ego-mania. The forensic financial, email and benefits surveillance, and tracking, now proves it!”


State & Federal employees, in a kick-back scheme…,

at the direction of elected officials, used taxpayer money to put “hit-jobs”, black-listing attacks, character assassinations and digital revenge strikes on their domestic competitors, who were taxpaying, voters. State and federal tax officials “Lois Lerner’d” competitors and gave away billions to campaign backers who ordered the hits on those competitors.

The facts are now published, and the victims are prepared to publicly debate any of the political attackers on live network newscasts, open public Congressional hearings, public law enforcement hearings and in federal courts.


Have you seen the, now famous, 60 Minutes episode? Take a look:

Click This Link:

https://videopress.com/v/wNlHgLlK?hd=0&autoPlay=0&permalink=0&loop=0 

60minutescrash

You can see more about that in the many broadcast news stories; at this link:

https://policystudy.wordpress.com/top-videos/

‎or this link:

http://wp.me/P6h5en-60q

Here is the story, that you have seen in the news lately, about the group known as: “The Silicon Valley Cartel, the biggest scam in tech.”


And you think you had a bad day…

How would you like to discover that The President of The United States has put a “hit-job” on you.

He didn’t order you wiped out because you were a “bad guy”. He ordered you; a tax paying, born in the USA, red-blooded American; wiped out because you reported a crime that his staff engaged in.

The concept of such a thing would have been inconceivable, a few years ago. Now, published revelations, lawsuits, the Lois Lerner case, The Drake case, documentaries and witness testimony has proven that it has happened to thousands of American taxpayers, IN AMERICA.

The victims of these attacks had White House staff coordinate hatchet job media-article character assassinations, job terminations, data-base sabotage, hacking, black-listing, honey-traps, credit score crashes, application manipulation, competitive sabotage, loan and mortgage down-ranking, and other dirty tricks. The attackers did it to these people out of vindictive, malicious smugness. It was a crime. It was illegal. It was a Constitutional violation. The proof that they did it is now published in court and news documents.

Now is the time to fix the White House so that it can never break the law again. VOTE FOR ANTI-CORRUPTION CANDIDATES, WHO SIGN A GUARANTEE TO PROSECUTE CORRUPTION, IN 2016!


Testimony of Witness Group #256 to The Federal Bureau of Investigation:

“…Our group had been contacted, during the initial project by a group called In-Q-Tel. In-Q-Tel also contacted our team after we had testified to the GAO in their investigation of Steven Chu. We are now informed, by multiple federal and media investigators, of the following facts:

  • In-Q-Tel works with The New America Foundation on a financial pass-through process. In-Q-Tel says it is a “501 C 3 non-profit charity” yet has been involved in cocaine trafficking and outfitting mercenary groups.

  • In-Q-Tel and New America Foundation are funded and controlled by Eric Schmidt, and his partners, and have provided lobbying, manipulation and policy leverage for his personal interests.

  • Eric Schmidt has spent more time in the White House, lobbying and directing policy, than all of the members of Congress, combined.

  • Eric Schmidt, and his business and political partners received hundreds of billions of dollars of profit, at the expense of U.S. taxpayers, in the case herein under discussion. The Corbett Report has broadcast numerous documentaries about, potentially, illegal lobbying by In-Q-Tel.

  • Eric Schmidt used his company: Google to attack (Witness Group #256) by rigging search engine, media, proxy and network operations results against (Witness Group #256) and, when confronted with the charges by licensed lawyers for (Witness Group #256), had his staff refuse, in writing, to remove the attacks

  • In-Q-Tel contacted (Witness Group #256), under the pretext of wanting to invest in (Witness Group #256) software for emergency refugee rescue operations. In-Q-Tel then copied the software, put “back-doors” in it, distributed it under their organizations own name, and flooded the market with their software, while at the same time coordinating an attack with their financially connected associates at Google and Gawker in retribution for (Witness Group #256) assisting federal investigators with their investigations. This caused witnesses millions of dollars in losses and damages, while In-Q-Tel made millions of dollars in profits off of the effort.

  • In-Q-Tel is known to offer services as a domestic supplier of “dirty tricks” for political operations for various domestic companies, illegally using CIA resources. This is widely documented in public news and Congressional reports. Elon Musk has his companies staffed by In-Q-Tel, works with Eric Schmidt on stock market and media manipulation to rig his stocks, and had all of his competitors sabotaged by the same DOE staff who exclusively gave him taxpayer cash in violation of the Section 136 law.

  • In-Q-Tel operated a political payback service for Eric Schmidt, John Doerr and the other Silicon Valley Cartel members who had set-up a scam, valued at over a trillion dollars, and connected with campaign funding for Barack Obama and Dianne Feinstein. The financial records, beneficiary tracking, database analysis, emails and testimony; prove these facts beyond any doubt.”

  • In-Q-Tel, New America Foundation and related organizations are all financially, and politically, connected to Eric Schmidt, John Doerr and an organized, private, political and business effort to control Washington DC activities for their own personal interests.”

ZDNET
DID-SCHMIDT-BRIBE-WHITE-HOUSE7BZCfbrXKs4transparency

GOOGLE-SABOTAGES-COMPETITORSFOLLOWTHEMONEY   PROPUBLICA   corruption-11

STOCK-MARKET   GOOGLE-AND-OBAMAGOOGLE_CONTROLS_THE_MEDIA
A CASE EXAMPLE:

As an example of one of nearly a hundred attacks on U.S. taxpayers, and voters, by corrupt Senators, and their campaign financiers, take a look at this example case:

In a case of “awkward timing”, During the Iraq War, Team-6 was asked, via Congressional invitation and Congressional Commendation (published in the Federal Register by the United States Congress), to develop, for the United States, via the U.S. Department of Energy, the technology requested as the back-up plan, for when, and if, the Middle East went “sideways”. (If you have been reading the news, you will have noticed that has already happened) Team-6 won federal and industry commendations, federal grants, historical patents, federal contracts, industry acclaim U.S. Congressional commendation in the Federal Register, built and demonstrated numerous versions of  the technology. The technology is an instant-swap/recharge battery that runs longer than almost any other battery, can use almost any one of over 3000 organic material fuel compositions, it leaves only drinkable water as it’s waste, needs no new infrastructure and can be created entirely from domestic materials including household kitchen waste. All of the technology is already fully functional, globally, in industrial uses.

Not only did the technology work, it has been deployed by competing interests globally in over $300M worth of contracts. 100% of the technology is in use in the world today.

Alas, the technology Team-6 developed was the one technology that, not only, obsoleted the Cartel’s scam but, in hindsight, exceeded it, by many paradigms in safety, cost, national security, ease-of-distribution, consumer access, consumer price-point, and a vast number of other metrics. The Cartel had taken over the lithium battery industry, which relied entirely on foreign incursions, toxic chemicals and off-shore mining deals, in advance, but nobody told Team-6 before they got roped into building the “lithium-killer”.

This journalist says it best: “With this fuel cell technology, If UPS, FedEx, a natural gas line or a water line, could reach your home, then your home was already set-up to use clean, sustainable energy that you had control over. The Cartel didn’t like that, because that meant that 3.4 billion consumers could already compete with them. ‘We couldn’t have consumers doing things on their own, now could we’?”

The Cartel politicians, and their campaign backers, went to war over it.

In retribution for assisting federal investigators, and for Team-6 “building a better mousetrap”, the corrupt billionaires hired In-Q-Tel, Gawker Media and Gizmodo (SEE THIS LINK FOR DESCRIPTION OF THIS GROUP), a “troll farm” blogging service and “sock puppets”, to embed the word “scam” next to every mention of Team-6 ‘s name, and staff, on the internet, HR databases and network services, as a character assassination program, in order to seek to terminate income flow, in retribution and revenge for Team-6 helping Congress and law enforcement interdict the political and financial crimes.

Click This Link, BELOW, to download an adobe .pdf file with the latest press clippings about Gawker lawsuits and investigations: (GAWKER MEDIA EXPOSED AS HIT-JOB FRONT FOR SILICON VALLEY CARTEL)

Gawker and their Silicon Valley Campaign partners, who own Google, then had Google lock the attack on the front page of Google, refusing to remove it after numerous legally correct requests by lawyers, in order to accelerate the damage to Team 1. The FBI, The San Francisco Police Department, The SEC, The OSC, The GAO, The FTC, The U.S. Senate and other agency’s, are now investigating this political and economic retribution attack on Team-6 and active case numbers now exist for this, and related matters, with those agencies. Google, and the coordinating parties, have now been tracked and confirmed, by digital forensics, as fully complicit and now bear the brunt of all loss liabilities to Team-6 . In addition to the recent Sony, Snowden, HSBC and other leaks; forensic IT tracking data; Silicon Valley and Washington DC whistle-blowers ; the sheer volume of the attacks; and their exclusive, IT data metrics confirmed, locked position on Google, prove the point of a coordinated and consciously manipulated attack, thus holding Google, and the related Cartel entities, liable for all losses and damages. In England this is called “hoisted by your own pitard”. English and French courts are discussing litigation against Google, with this case as  one of the example metrics of Google’s manual search results manipulation to attack adversaries. Over 400,000 pages of evidence have now been acquired.

In short: Team-6 engineered, designed, built, demonstrated, delivered, patented and began marketing technologies that the Cartel either asked to look at, then took, without compensation, or sabotaged because they beat the Cartel technologies. After millions of dollars of federal patent office research, not a single Cartel technology has proven to have preceded Team-6 technologies. In every single case, it has been proven that this Cartel of campaign finance manipulators, asked, in writing to look at Team-6 technology, and then, either: rejected it in writing as “unworkable”, yet they then copied and sold 100% copies of the “unworkable” technologies as their own; or, sabotaged the technology to prevent it from affecting their market. Team-6,  and other companies, who suffered the same attacks, are seeking fair, equally resourced public federal court & media hearings, to resolve the issues.

This was particularly ironic, since some of the Cartel “bad guys” have now been arrested, indicted and/or placed under FBI investigation for actually running a real embezzlement scam. The FBI Solyndra Raid, the U.S. Senate investigations and 14 other criminal investigations have put severe heat on the corrupt technology investors and politicians who Team-6. Per data exposure from Snowden, Greenwald, etc., Per Snowden/Greenwald/HSBC/Sony leaks, federal investigators have been found to have had every suspect under long-term extensive surveillance and now, their state and federal prosecutions are only a matter of time.

Team-6 will, now, always fight the good fight against criminal behaviour, bad ethics and public policy corruption. Their credentials, references, broadcast news videos and past project evidence, clearly counter-measure any of the attack false-hoods presented by those people. The GAO, OMB, FBI, U.S. Treasury, Washington Post, and hundreds of university research groups, calculate the loss, to the United States and the American taxpayer, from these crimes, at well over one trillion dollars of losses.


NEWS COVERAGE OF THE INCIDENT:


TRANSPARENCY-INTERNATIONAL2

DOE-STORY1

 

DOE-STORY2

 

DOE-STORY-3

DOE-STORY-4

DOE-STORY-5

IACC

INTEGRITY

pay-to-play-cronyism

By Dan Epstein

News flash: Government subsidies and special-interest favors go hand in hand.

The latest example comes from a federal green-energy loan program. Last month, the DC District Court ruled that Cause of Action, where I am executive director, can proceed with a lawsuitagainst the Department of Energy. We’re suing the federal government for the blatant political favoritism in its $25 billion “Advanced Technology Vehicle Manufacturing Loan Program.”

ADVERTISEMENT

In principle, this taxpayer-funded program was supposed to support the manufacture of energy-efficient cars. In practice, it rewarded a select few well-connected companies.

Since the program was created in 2008, numerous businesses have applied for its taxpayer-backed financial support. Yet only a small number were approved. Among the lucky few were two electric car manufacturers: Teslaand Fisker.

Both companies’ political connections run deep, especially Tesla’s. The company’s founder, Elon Musk, was a max donor for President Obama. One of its board members, Steven Westly, was appointed to a Department of Energy advisory board. And another Obama bundler, Tesla investor and adviser Steven Spinner, secured employment in the department’s Loan Program Office—the very office that gave the company a taxpayer-backed loan.

Fisker also has friends in high places. The company, which has since gone bankruptwas backed by a San Francisco venture capital firm whose senior partners donated millions to the 2008 Obama campaign and other Democrat causes. One partnerJohn Doerr, parlayed his support into a seat on the President’s Council of Jobs and Competitiveness.

Such connections can allow a company to exert political pressure to enrich itself. Unsurprisingly, Department of Energy emails show that such pressure was rampant in its loan programs.

There’s no shortage of examples. The department’s leaders—including then-Secretary of Energy Steven Chu—repeatedly promised to deliver results to politicians like Rep. Steny Hoyer (D-Md.) and Sen. Harry Reid (D-Nev.). One emails reads, “DOE has made a political commitment” to approve a company’s loan. Another says the “pressure is on real heavy” from none other than Vice President Joe Biden. And still another shows an employee asking, “what’s another billion anyhow?”

Unsurprisingly, the Obama administration gave Tesla and Fisker preferential treatment, and then some.

The Department of Energy revised its review process in order finish the companies’ applications faster. The government gave them extraordinary access to its staff and facilities—even to the point of having government employees personally walk them through the loan application and approval process. The department ignored its own lending rules in order to approve the companies’ loans. And it renegotiated the terms of some loans after the companies could not keep their original commitments or were experiencing financial difficulties. Tellingly, Fisker has since gone out of business, despite receiving over a billion dollars in loans through this federal program.

Now contrast this preferential treatment with what happened to XP Vehicles and Limnia, neither of which have the same political connections. (My organization is suing the Department of Energy on their behalf). The two companies partnered to manufacture an energy-efficient sport utility vehicle that would have competed with Tesla and Fisker’s cars. They applied for loans in 2008 and 2009 under the same loan program.

The department refused them both—and it used bogus reasons to do so.

For starters, the department made claims that were laughably false. To take one example: It rejected XPV’s application because its vehicle was powered by hydrogen. It was an electric SUV. It also raised objections that it didn’t raise with other companies whose applications were approved. For instance: The bureaucracy criticized the proposed all-electric vehicle for not using a specific type of gasoline. Yet Tesla and Fisker received the loans despite producing similar all-electric cars.

In light of these obvious problems and hypocrisy, both companies presented the Department of Energy with detailed rebuttals. Yet the government failed to respond. To this day, both XPV and Limnia are awaiting a satisfactory reply. In the meantime, XPV has gone out of business, unable to compete against its politically connected—and subsidized—rivals.

This casts the Department of Energy’s loan program in a new light. It was sold to the American public as a means of promoting energy-efficient vehicles. Instead, it was used to benefit a select few well-connected companies. It was a blatant crony handout, paid for by the U.S. taxpayer.

Sadly, similar examples are widespread in Washington. That’s no surprise considering the feds spend roughly $100 billion a year in taxpayer-funded handouts to businesses. This breeds the sort of government-business collusion Americans think is rampant in Washington. In fact, over two-thirds of likely voters think the federal government helps businesses that hire the most lobbyists, shake the right hands, and pad the right pockets. They’re right.

This points to a simple conclusion: Politicians and bureaucrats shouldn’t use the public’s money to pad private companies’ bottom lines. As the Department of Energy’s green-vehicle loan program shows, the capacity for corruption is immense—and inevitable.

Epstein is executive director of Cause of Action, a government watchdog.

 


 

Dear-President-Obama-1

Dear-President-Obama-2

DOE-HQ-2008-0020-0007

Chu.Zients.2010

Chu.Zients.2010b

congress


 “This was an organized crime operation, involving state and federal employees, which

THE GAME WAS RIGGED…

It was rigged for a handful of corrupt Silicon Valley billionaires and the corrupt senators, agency heads and White House staff that they owned!

It has been proven, with irrefutable evidence, that The White House, and their campaign billionaires, rigged the Department of Energy to pay themselves kick-backs, via the manipulation of taxpayer cash, while sabotaging every other applicant, and competitor, using government resources to engage in those attacks.

WARREN


Per federal investigators:“White House campaign staff traded campaign financing, federal “Cleantech” funding and stock market perks, with Silicon Valley oligarchs in an illegal political finance scam. They were assisted by Attorney General Eric Holder and Secretary of Energy Steven Chu, who had financial and personal relationships with all of the suspects. Together, they sabotaged other applicants, industries, domestic jobs and domestic innovation out of pure greed and ego-mania.”


State & Federal employees…,

at the direction of elected officials, used taxpayer money to put “hit-jobs”, black-listing attacks, character assassinations and digital revenge strikes on their domestic competitors, who were taxpaying, voters.

The facts are now published, and the victims are prepared to publicly debate any of the political attackers on live network newscasts, open public Congressional hearings, public law enforcement hearings and in federal courts.


Have you seen the, now famous, 60 Minutes episode? Take a look:

Click This Link:

https://videopress.com/v/wNlHgLlK?hd=0&autoPlay=0&permalink=0&loop=0 

60minutescrash

You can see more about that in the many broadcast news stories; at this link:

https://policystudy.wordpress.com/top-videos/

‎or this link:

http://wp.me/P6h5en-60q

Here is the story, that you have seen in the news lately, about the group known as: “The Silicon Valley Cartel, the biggest scam in tech.”


And you think you had a bad day…

How would you like to discover that The President of The United States has put a “hit-job” on you.

He didn’t order you wiped out because you were a “bad guy”. He ordered you; a tax paying, born in the USA, red-blooded American; wiped out because you reported a crime that his staff engaged in.

The concept of such a thing would have been inconceivable, a few years ago. Now, published revelations, lawsuits, the Lois Lerner case, The Drake case, documentaries and witness testimony has proven that it has happened to thousands of American taxpayers, IN AMERICA.

The victims of these attacks had White House staff coordinate hatchet job media-article character assassinations, job terminations, data-base sabotage, hacking, black-listing, honey-traps, credit score crashes, application manipulation, competitive sabotage, loan and mortgage down-ranking, and other dirty tricks. The

THE GAME WAS RIGGED…

It was rigged for a handful of corrupt Silicon Valley billionaires and the corrupt senators, agency heads and White House staff that they owned!

It has been proven, with irrefutable evidence, that The White House, and their campaign billionaires, rigged the Department of Energy to pay themselves kick-backs, via the manipulation of taxpayer cash, while sabotaging every other applicant, and competitor, using government resources to engage in those attacks.

WARREN


Per federal investigators:“White House campaign staff traded campaign financing, federal “Cleantech” funding and stock market perks, with Silicon Valley oligarchs in an illegal political finance scam. They were assisted by Attorney General Eric Holder and Secretary of Energy Steven Chu, who had financial and personal relationships with all of the suspects. Together, they sabotaged other applicants, industries, domestic jobs and domestic innovation out of pure greed and ego-mania.”


State & Federal employees…,

at the direction of elected officials, used taxpayer money to put “hit-jobs”, black-listing attacks, character assassinations and digital revenge strikes on their domestic competitors, who were taxpaying, voters.

The facts are now published, and the victims are prepared to publicly debate any of the political attackers on live network newscasts, open public Congressional hearings, public law enforcement hearings and in federal courts.


Have you seen the, now famous, 60 Minutes episode? Take a look:

Click This Link:

https://videopress.com/v/wNlHgLlK?hd=0&autoPlay=0&permalink=0&loop=0 

60minutescrash

You can see more about that in the many broadcast news stories; at this link:

https://policystudy.wordpress.com/top-videos/

‎or this link:

http://wp.me/P6h5en-60q

Here is the story, that you have seen in the news lately, about the group known as: “The Silicon Valley Cartel, the biggest scam in tech.”


And you think you had a bad day…

How would you like to discover that The President of The United States has put a “hit-job” on you.

He didn’t order you wiped out because you were a “bad guy”. He ordered you; a tax paying, born in the USA, red-blooded American; wiped out because you reported a crime that his staff engaged in.

The concept of such a thing would have been inconceivable, a few years ago. Now, published revelations, lawsuits, the Lois Lerner case, The Drake case, documentaries and witness testimony has proven that it has happened to thousands of American taxpayers, IN AMERICA.

The victims of these attacks had White House staff coordinate hatchet job media-article character assassinations, job terminations, data-base sabotage, hacking, black-listing, honey-traps, credit score crashes, application manipulation, competitive sabotage, loan and mortgage down-ranking, and other dirty tricks. The attackers did it to these people out of vindictive, malicious smugness. It was a crime. It was illegal. It was a Constitutional violation. The proof that they did it is now published in court and news documents.

Now is the time to fix the White House so that it can never break the law again. VOTE FOR ANTI-CORRUPTION CANDIDATES, WHO SIGN A GUARANTEE TO PROSECUTE CORRUPTION, IN 2016!


Testimony of Witness Group #256 to The Federal Bureau of Investigation:

“…Our group had been contacted, during the initial project by a group called In-Q-Tel. In-Q-Tel also contacted our team after we had testified to the GAO in their investigation of Steven Chu. We are now informed, by multiple federal and media investigators, of the following facts:

  • In-Q-Tel works with The New America Foundation on a financial pass-through process. In-Q-Tel says it is a “501 C 3 non-profit charity” yet has been involved in cocaine trafficking and outfitting mercenary groups.

  • In-Q-Tel and New America Foundation are funded and controlled by Eric Schmidt, and his partners, and have provided lobbying, manipulation and policy leverage for his personal interests.

  • Eric Schmidt has spent more time in the White House, lobbying and directing policy, than all of the members of Congress, combined.

  • Eric Schmidt, and his business and political partners received hundreds of billions of dollars of profit, at the expense of U.S. taxpayers, in the case herein under discussion. The Corbett Report has broadcast numerous documentaries about, potentially, illegal lobbying by In-Q-Tel.

  • Eric Schmidt used his company: Google to attack (Witness Group #256) by rigging search engine, media, proxy and network operations results against (Witness Group #256) and, when confronted with the charges by licensed lawyers for (Witness Group #256), had his staff refuse, in writing, to remove the attacks

  • In-Q-Tel contacted (Witness Group #256), under the pretext of wanting to invest in (Witness Group #256) software for emergency refugee rescue operations. In-Q-Tel then copied the software, put “back-doors” in it, distributed it under their organizations own name, and flooded the market with their software, while at the same time coordinating an attack with their financially connected associates at Google and Gawker in retribution for (Witness Group #256) assisting federal investigators with their investigations. This caused witnesses millions of dollars in losses and damages, while In-Q-Tel made millions of dollars in profits off of the effort.

  • In-Q-Tel is known to offer services as a domestic supplier of “dirty tricks” for political operations for various domestic companies, illegally using CIA resources. This is widely documented in public news and Congressional reports. Elon Musk has his companies staffed by In-Q-Tel, works with Eric Schmidt on stock market and media manipulation to rig his stocks, and had all of his competitors sabotaged by the same DOE staff who exclusively gave him taxpayer cash in violation of the Section 136 law.

  • In-Q-Tel operated a political payback service for Eric Schmidt, John Doerr and the other Silicon Valley Cartel members who had set-up a scam, valued at over a trillion dollars, and connected with campaign funding for Barack Obama and Dianne Feinstein. The financial records, beneficiary tracking, database analysis, emails and testimony; prove these facts beyond any doubt.”

  • In-Q-Tel, New America Foundation and related organizations are all financially, and politically, connected to Eric Schmidt, John Doerr and an organized, private, political and business effort to control Washington DC activities for their own personal interests.”

ZDNET
DID-SCHMIDT-BRIBE-WHITE-HOUSE7BZCfbrXKs4transparency

GOOGLE-SABOTAGES-COMPETITORSFOLLOWTHEMONEY   PROPUBLICA   corruption-11

STOCK-MARKET   GOOGLE-AND-OBAMAGOOGLE_CONTROLS_THE_MEDIA
A CASE EXAMPLE:

As an example of one of nearly a hundred attacks on U.S. taxpayers, and voters, by corrupt Senators, and their campaign financiers, take a look at this example case:

In a case of “awkward timing”, During the Iraq War, Team-6 was asked, via Congressional invitation and Congressional Commendation (published in the Federal Register by the United States Congress), to develop, for the United States, via the U.S. Department of Energy, the technology requested as the back-up plan, for when, and if, the Middle East went “sideways”. (If you have been reading the news, you will have noticed that has already happened) Team-6 won federal and industry commendations, federal grants, historical patents, federal contracts, industry acclaim U.S. Congressional commendation in the Federal Register, built and demonstrated numerous versions of  the technology. The technology is an instant-swap/recharge battery that runs longer than almost any other battery, can use almost any one of over 3000 organic material fuel compositions, it leaves only drinkable water as it’s waste, needs no new infrastructure and can be created entirely from domestic materials including household kitchen waste. All of the technology is already fully functional, globally, in industrial uses.

Not only did the technology work, it has been deployed by competing interests globally in over $300M worth of contracts. 100% of the technology is in use in the world today.

Alas, the technology Team-6 developed was the one technology that, not only, obsoleted the Cartel’s scam but, in hindsight, exceeded it, by many paradigms in safety, cost, national security, ease-of-distribution, consumer access, consumer price-point, and a vast number of other metrics. The Cartel had taken over the lithium battery industry, which relied entirely on foreign incursions, toxic chemicals and off-shore mining deals, in advance, but nobody told Team-6 before they got roped into building the “lithium-killer”.

This journalist says it best: “With this fuel cell technology, If UPS, FedEx, a natural gas line or a water line, could reach your home, then your home was already set-up to use clean, sustainable energy that you had control over. The Cartel didn’t like that, because that meant that 3.4 billion consumers could already compete with them. ‘We couldn’t have consumers doing things on their own, now could we’?”

The Cartel politicians, and their campaign backers, went to war over it.

In retribution for assisting federal investigators, and for Team-6 “building a better mousetrap”, the corrupt billionaires hired In-Q-Tel, Gawker Media and Gizmodo (SEE THIS LINK FOR DESCRIPTION OF THIS GROUP), a “troll farm” blogging service and “sock puppets”, to embed the word “scam” next to every mention of Team-6 ‘s name, and staff, on the internet, HR databases and network services, as a character assassination program, in order to seek to terminate income flow, in retribution and revenge for Team-6 helping Congress and law enforcement interdict the political and financial crimes.

Click This Link, BELOW, to download an adobe .pdf file with the latest press clippings about Gawker lawsuits and investigations: (GAWKER MEDIA EXPOSED AS HIT-JOB FRONT FOR SILICON VALLEY CARTEL)

Gawker and their Silicon Valley Campaign partners, who own Google, then had Google lock the attack on the front page of Google, refusing to remove it after numerous legally correct requests by lawyers, in order to accelerate the damage to Team 1. The FBI, The San Francisco Police Department, The SEC, The OSC, The GAO, The FTC, The U.S. Senate and other agency’s, are now investigating this political and economic retribution attack on Team-6 and active case numbers now exist for this, and related matters, with those agencies. Google, and the coordinating parties, have now been tracked and confirmed, by digital forensics, as fully complicit and now bear the brunt of all loss liabilities to Team-6 . In addition to the recent Sony, Snowden, HSBC and other leaks; forensic IT tracking data; Silicon Valley and Washington DC whistle-blowers ; the sheer volume of the attacks; and their exclusive, IT data metrics confirmed, locked position on Google, prove the point of a coordinated and consciously manipulated attack, thus holding Google, and the related Cartel entities, liable for all losses and damages. In England this is called “hoisted by your own pitard”. English and French courts are discussing litigation against Google, with this case as  one of the example metrics of Google’s manual search results manipulation to attack adversaries. Over 400,000 pages of evidence have now been acquired.

In short: Team-6 engineered, designed, built, demonstrated, delivered, patented and began marketing technologies that the Cartel either asked to look at, then took, without compensation, or sabotaged because they beat the Cartel technologies. After millions of dollars of federal patent office research, not a single Cartel technology has proven to have preceded Team-6 technologies. In every single case, it has been proven that this Cartel of campaign finance manipulators, asked, in writing to look at Team-6 technology, and then, either: rejected it in writing as “unworkable”, yet they then copied and sold 100% copies of the “unworkable” technologies as their own; or, sabotaged the technology to prevent it from affecting their market. Team-6,  and other companies, who suffered the same attacks, are seeking fair, equally resourced public federal court & media hearings, to resolve the issues.

This was particularly ironic, since some of the Cartel “bad guys” have now been arrested, indicted and/or placed under FBI investigation for actually running a real embezzlement scam. The FBI Solyndra Raid, the U.S. Senate investigations and 14 other criminal investigations have put severe heat on the corrupt technology investors and politicians who Team-6. Per data exposure from Snowden, Greenwald, etc., Per Snowden/Greenwald/HSBC/Sony leaks, federal investigators have been found to have had every suspect under long-term extensive surveillance and now, their state and federal prosecutions are only a matter of time.

Team-6 will, now, always fight the good fight against criminal behaviour, bad ethics and public policy corruption. Their credentials, references, broadcast news videos and past project evidence, clearly counter-measure any of the attack false-hoods presented by those people. The GAO, OMB, FBI, U.S. Treasury, Washington Post, and hundreds of university research groups, calculate the loss, to the United States and the American taxpayer, from these crimes, at well over one trillion dollars of losses.


NEWS COVERAGE OF THE INCIDENT:


TRANSPARENCY-INTERNATIONAL2

DOE-STORY1

DOE-STORY2

DOE-STORY-3

DOE-STORY-4

DOE-STORY-5

IACC

INTEGRITY

pay-to-play-cronyism

By Dan Epstein

News flash: Government subsidies and special-interest favors go hand in hand.

The latest example comes from a federal green-energy loan program. Last month, the DC District Court ruled that Cause of Action, where I am executive director, can proceed with a lawsuitagainst the Department of Energy. We’re suing the federal government for the blatant political favoritism in its $25 billion “Advanced Technology Vehicle Manufacturing Loan Program.”

ADVERTISEMENT

In principle, this taxpayer-funded program was supposed to support the manufacture of energy-efficient cars. In practice, it rewarded a select few well-connected companies.

Since the program was created in 2008, numerous businesses have applied for its taxpayer-backed financial support. Yet only a small number were approved. Among the lucky few were two electric car manufacturers: Teslaand Fisker.

Both companies’ political connections run deep, especially Tesla’s. The company’s founder, Elon Musk, was a max donor for President Obama. One of its board members, Steven Westly, was appointed to a Department of Energy advisory board. And another Obama bundler, Tesla investor and adviser Steven Spinner, secured employment in the department’s Loan Program Office—the very office that gave the company a taxpayer-backed loan.

Fisker also has friends in high places. The company, which has since gone bankruptwas backed by a San Francisco venture capital firm whose senior partners donated millions to the 2008 Obama campaign and other Democrat causes. One partnerJohn Doerr, parlayed his support into a seat on the President’s Council of Jobs and Competitiveness.

Such connections can allow a company to exert political pressure to enrich itself. Unsurprisingly, Department of Energy emails show that such pressure was rampant in its loan programs.

There’s no shortage of examples. The department’s leaders—including then-Secretary of Energy Steven Chu—repeatedly promised to deliver results to politicians like Rep. Steny Hoyer (D-Md.) and Sen. Harry Reid (D-Nev.). One emails reads, “DOE has made a political commitment” to approve a company’s loan. Another says the “pressure is on real heavy” from none other than Vice President Joe Biden. And still another shows an employee asking, “what’s another billion anyhow?”

Unsurprisingly, the Obama administration gave Tesla and Fisker preferential treatment, and then some.

The Department of Energy revised its review process in order finish the companies’ applications faster. The government gave them extraordinary access to its staff and facilities—even to the point of having government employees personally walk them through the loan application and approval process. The department ignored its own lending rules in order to approve the companies’ loans. And it renegotiated the terms of some loans after the companies could not keep their original commitments or were experiencing financial difficulties. Tellingly, Fisker has since gone out of business, despite receiving over a billion dollars in loans through this federal program.

Now contrast this preferential treatment with what happened to XP Vehicles and Limnia, neither of which have the same political connections. (My organization is suing the Department of Energy on their behalf). The two companies partnered to manufacture an energy-efficient sport utility vehicle that would have competed with Tesla and Fisker’s cars. They applied for loans in 2008 and 2009 under the same loan program.

The department refused them both—and it used bogus reasons to do so.

For starters, the department made claims that were laughably false. To take one example: It rejected XPV’s application because its vehicle was powered by hydrogen. It was an electric SUV. It also raised objections that it didn’t raise with other companies whose applications were approved. For instance: The bureaucracy criticized the proposed all-electric vehicle for not using a specific type of gasoline. Yet Tesla and Fisker received the loans despite producing similar all-electric cars.

In light of these obvious problems and hypocrisy, both companies presented the Department of Energy with detailed rebuttals. Yet the government failed to respond. To this day, both XPV and Limnia are awaiting a satisfactory reply. In the meantime, XPV has gone out of business, unable to compete against its politically connected—and subsidized—rivals.

This casts the Department of Energy’s loan program in a new light. It was sold to the American public as a means of promoting energy-efficient vehicles. Instead, it was used to benefit a select few well-connected companies. It was a blatant crony handout, paid for by the U.S. taxpayer.

Sadly, similar examples are widespread in Washington. That’s no surprise considering the feds spend roughly $100 billion a year in taxpayer-funded handouts to businesses. This breeds the sort of government-business collusion Americans think is rampant in Washington. In fact, over two-thirds of likely voters think the federal government helps businesses that hire the most lobbyists, shake the right hands, and pad the right pockets. They’re right.

This points to a simple conclusion: Politicians and bureaucrats shouldn’t use the public’s money to pad private companies’ bottom lines. As the Department of Energy’s green-vehicle loan program shows, the capacity for corruption is immense—and inevitable.

Epstein is executive director of Cause of Action, a government watchdog.


Dear-President-Obama-1

Dear-President-Obama-2

DOE-HQ-2008-0020-0007

Chu.Zients.2010

Chu.Zients.2010b

congress


 “This was an organized crime operation, involving state and federal employees, which

THE GAME WAS RIGGED…

It was rigged for a handful of corrupt Silicon Valley billionaires and the corrupt senators, agency heads and White House staff that they owned!

It has been proven, with irrefutable evidence, that The White House, and their campaign billionaires, rigged the Department of Energy to pay themselves kick-backs, via the manipulation of taxpayer cash, while sabotaging every other applicant, and competitor, using government resources to engage in those attacks.

WARREN


Per federal investigators:“White House campaign staff traded campaign financing, federal “Cleantech” funding and stock market perks, with Silicon Valley oligarchs in an illegal political finance scam. They were assisted by Attorney General Eric Holder and Secretary of Energy Steven Chu, who had financial and personal relationships with all of the suspects. Together, they sabotaged other applicants, industries, domestic jobs and domestic innovation out of pure greed and ego-mania.”


State & Federal employees…,

at the direction of elected officials, used taxpayer money to put “hit-jobs”, black-listing attacks, character assassinations and digital revenge strikes on their domestic competitors, who were taxpaying, voters.

The facts are now published, and the victims are prepared to publicly debate any of the political attackers on live network newscasts, open public Congressional hearings, public law enforcement hearings and in federal courts.


Have you seen the, now famous, 60 Minutes episode? Take a look:

Click This Link:

https://videopress.com/v/wNlHgLlK?hd=0&autoPlay=0&permalink=0&loop=0 

60minutescrash

You can see more about that in the many broadcast news stories; at this link:

https://policystudy.wordpress.com/top-videos/

‎or this link:

http://wp.me/P6h5en-60q

Here is the story, that you have seen in the news lately, about the group known as: “The Silicon Valley Cartel, the biggest scam in tech.”


And you think you had a bad day…

How would you like to discover that The President of The United States has put a “hit-job” on you.

He didn’t order you wiped out because you were a “bad guy”. He ordered you; a tax paying, born in the USA, red-blooded American; wiped out because you reported a crime that his staff engaged in.

The concept of such a thing would have been inconceivable, a few years ago. Now, published revelations, lawsuits, the Lois Lerner case, The Drake case, documentaries and witness testimony has proven that it has happened to thousands of American taxpayers, IN AMERICA.

The victims of these attacks had White House staff coordinate hatchet job media-article character assassinations, job terminations, data-base sabotage, hacking, black-listing, honey-traps, credit score crashes, application manipulation, competitive sabotage, loan and mortgage down-ranking, and other dirty tricks. The attackers did it to these people out of vindictive, malicious smugness. It was a crime. It was illegal. It was a Constitutional violation. The proof that they did it is now published in court and news documents.

Now is the time to fix the White House so that it can never break the law again. VOTE FOR ANTI-CORRUPTION CANDIDATES, WHO SIGN A GUARANTEE TO PROSECUTE CORRUPTION, IN 2016!


Testimony of Witness Group #256 to The Federal Bureau of Investigation:

“…Our group had been contacted, during the initial project by a group called In-Q-Tel. In-Q-Tel also contacted our team after we had testified to the GAO in their investigation of Steven Chu. We are now informed, by multiple federal and media investigators, of the following facts:

  • In-Q-Tel works with The New America Foundation on a financial pass-through process. In-Q-Tel says it is a “501 C 3 non-profit charity” yet has been involved in cocaine trafficking and outfitting mercenary groups.

  • In-Q-Tel and New America Foundation are funded and controlled by Eric Schmidt, and his partners, and have provided lobbying, manipulation and policy leverage for his personal interests.

  • Eric Schmidt has spent more time in the White House, lobbying and directing policy, than all of the members of Congress, combined.

  • Eric Schmidt, and his business and political partners received hundreds of billions of dollars of profit, at the expense of U.S. taxpayers, in the case herein under discussion. The Corbett Report has broadcast numerous documentaries about, potentially, illegal lobbying by In-Q-Tel.

  • Eric Schmidt used his company: Google to attack (Witness Group #256) by rigging search engine, media, proxy and network operations results against (Witness Group #256) and, when confronted with the charges by licensed lawyers for (Witness Group #256), had his staff refuse, in writing, to remove the attacks

  • In-Q-Tel contacted (Witness Group #256), under the pretext of wanting to invest in (Witness Group #256) software for emergency refugee rescue operations. In-Q-Tel then copied the software, put “back-doors” in it, distributed it under their organizations own name, and flooded the market with their software, while at the same time coordinating an attack with their financially connected associates at Google and Gawker in retribution for (Witness Group #256) assisting federal investigators with their investigations. This caused witnesses millions of dollars in losses and damages, while In-Q-Tel made millions of dollars in profits off of the effort.

  • In-Q-Tel is known to offer services as a domestic supplier of “dirty tricks” for political operations for various domestic companies, illegally using CIA resources. This is widely documented in public news and Congressional reports. Elon Musk has his companies staffed by In-Q-Tel, works with Eric Schmidt on stock market and media manipulation to rig his stocks, and had all of his competitors sabotaged by the same DOE staff who exclusively gave him taxpayer cash in violation of the Section 136 law.

  • In-Q-Tel operated a political payback service for Eric Schmidt, John Doerr and the other Silicon Valley Cartel members who had set-up a scam, valued at over a trillion dollars, and connected with campaign funding for Barack Obama and Dianne Feinstein. The financial records, beneficiary tracking, database analysis, emails and testimony; prove these facts beyond any doubt.”

  • In-Q-Tel, New America Foundation and related organizations are all financially, and politically, connected to Eric Schmidt, John Doerr and an organized, private, political and business effort to control Washington DC activities for their own personal interests.”

ZDNET
DID-SCHMIDT-BRIBE-WHITE-HOUSE7BZCfbrXKs4transparency

GOOGLE-SABOTAGES-COMPETITORSFOLLOWTHEMONEY   PROPUBLICA   corruption-11

STOCK-MARKET   GOOGLE-AND-OBAMAGOOGLE_CONTROLS_THE_MEDIA
A CASE EXAMPLE:

As an example of one of nearly a hundred attacks on U.S. taxpayers, and voters, by corrupt Senators, and their campaign financiers, take a look at this example case:

In a case of “awkward timing”, During the Iraq War, Team-6 was asked, via Congressional invitation and Congressional Commendation (published in the Federal Register by the United States Congress), to develop, for the United States, via the U.S. Department of Energy, the technology requested as the back-up plan, for when, and if, the Middle East went “sideways”. (If you have been reading the news, you will have noticed that has already happened) Team-6 won federal and industry commendations, federal grants, historical patents, federal contracts, industry acclaim U.S. Congressional commendation in the Federal Register, built and demonstrated numerous versions of  the technology. The technology is an instant-swap/recharge battery that runs longer than almost any other battery, can use almost any one of over 3000 organic material fuel compositions, it leaves only drinkable water as it’s waste, needs no new infrastructure and can be created entirely from domestic materials including household kitchen waste. All of the technology is already fully functional, globally, in industrial uses.

Not only did the technology work, it has been deployed by competing interests globally in over $300M worth of contracts. 100% of the technology is in use in the world today.

Alas, the technology Team-6 developed was the one technology that, not only, obsoleted the Cartel’s scam but, in hindsight, exceeded it, by many paradigms in safety, cost, national security, ease-of-distribution, consumer access, consumer price-point, and a vast number of other metrics. The Cartel had taken over the lithium battery industry, which relied entirely on foreign incursions, toxic chemicals and off-shore mining deals, in advance, but nobody told Team-6 before they got roped into building the “lithium-killer”.

This journalist says it best: “With this fuel cell technology, If UPS, FedEx, a natural gas line or a water line, could reach your home, then your home was already set-up to use clean, sustainable energy that you had control over. The Cartel didn’t like that, because that meant that 3.4 billion consumers could already compete with them. ‘We couldn’t have consumers doing things on their own, now could we’?”

The Cartel politicians, and their campaign backers, went to war over it.

In retribution for assisting federal investigators, and for Team-6 “building a better mousetrap”, the corrupt billionaires hired In-Q-Tel, Gawker Media and Gizmodo (SEE THIS LINK FOR DESCRIPTION OF THIS GROUP), a “troll farm” blogging service and “sock puppets”, to embed the word “scam” next to every mention of Team-6 ‘s name, and staff, on the internet, HR databases and network services, as a character assassination program, in order to seek to terminate income flow, in retribution and revenge for Team-6 helping Congress and law enforcement interdict the political and financial crimes.

Click This Link, BELOW, to download an adobe .pdf file with the latest press clippings about Gawker lawsuits and investigations: (GAWKER MEDIA EXPOSED AS HIT-JOB FRONT FOR SILICON VALLEY CARTEL)

Gawker and their Silicon Valley Campaign partners, who own Google, then had Google lock the attack on the front page of Google, refusing to remove it after numerous legally correct requests by lawyers, in order to accelerate the damage to Team 1. The FBI, The San Francisco Police Department, The SEC, The OSC, The GAO, The FTC, The U.S. Senate and other agency’s, are now investigating this political and economic retribution attack on Team-6 and active case numbers now exist for this, and related matters, with those agencies. Google, and the coordinating parties, have now been tracked and confirmed, by digital forensics, as fully complicit and now bear the brunt of all loss liabilities to Team-6 . In addition to the recent Sony, Snowden, HSBC and other leaks; forensic IT tracking data; Silicon Valley and Washington DC whistle-blowers ; the sheer volume of the attacks; and their exclusive, IT data metrics confirmed, locked position on Google, prove the point of a coordinated and consciously manipulated attack, thus holding Google, and the related Cartel entities, liable for all losses and damages. In England this is called “hoisted by your own pitard”. English and French courts are discussing litigation against Google, with this case as  one of the example metrics of Google’s manual search results manipulation to attack adversaries. Over 400,000 pages of evidence have now been acquired.

In short: Team-6 engineered, designed, built, demonstrated, delivered, patented and began marketing technologies that the Cartel either asked to look at, then took, without compensation, or sabotaged because they beat the Cartel technologies. After millions of dollars of federal patent office research, not a single Cartel technology has proven to have preceded Team-6 technologies. In every single case, it has been proven that this Cartel of campaign finance manipulators, asked, in writing to look at Team-6 technology, and then, either: rejected it in writing as “unworkable”, yet they then copied and sold 100% copies of the “unworkable” technologies as their own; or, sabotaged the technology to prevent it from affecting their market. Team-6,  and other companies, who suffered the same attacks, are seeking fair, equally resourced public federal court & media hearings, to resolve the issues.

This was particularly ironic, since some of the Cartel “bad guys” have now been arrested, indicted and/or placed under FBI investigation for actually running a real embezzlement scam. The FBI Solyndra Raid, the U.S. Senate investigations and 14 other criminal investigations have put severe heat on the corrupt technology investors and politicians who Team-6. Per data exposure from Snowden, Greenwald, etc., Per Snowden/Greenwald/HSBC/Sony leaks, federal investigators have been found to have had every suspect under long-term extensive surveillance and now, their state and federal prosecutions are only a matter of time.

Team-6 will, now, always fight the good fight against criminal behaviour, bad ethics and public policy corruption. Their credentials, references, broadcast news videos and past project evidence, clearly counter-measure any of the attack false-hoods presented by those people. The GAO, OMB, FBI, U.S. Treasury, Washington Post, and hundreds of university research groups, calculate the loss, to the United States and the American taxpayer, from these crimes, at well over one trillion dollars of losses.


NEWS COVERAGE OF THE INCIDENT:


TRANSPARENCY-INTERNATIONAL2

DOE-STORY1

DOE-STORY2

DOE-STORY-3

DOE-STORY-4

DOE-STORY-5

IACC

INTEGRITY

pay-to-play-cronyism

By Dan Epstein

News flash: Government subsidies and special-interest favors go hand in hand.

The latest example comes from a federal green-energy loan program. Last month, the DC District Court ruled that Cause of Action, where I am executive director, can proceed with a lawsuitagainst the Department of Energy. We’re suing the federal government for the blatant political favoritism in its $25 billion “Advanced Technology Vehicle Manufacturing Loan Program.”

ADVERTISEMENT

In principle, this taxpayer-funded program was supposed to support the manufacture of energy-efficient cars. In practice, it rewarded a select few well-connected companies.

Since the program was created in 2008, numerous businesses have applied for its taxpayer-backed financial support. Yet only a small number were approved. Among the lucky few were two electric car manufacturers: Teslaand Fisker.

Both companies’ political connections run deep, especially Tesla’s. The company’s founder, Elon Musk, was a max donor for President Obama. One of its board members, Steven Westly, was appointed to a Department of Energy advisory board. And another Obama bundler, Tesla investor and adviser Steven Spinner, secured employment in the department’s Loan Program Office—the very office that gave the company a taxpayer-backed loan.

Fisker also has friends in high places. The company, which has since gone bankruptwas backed by a San Francisco venture capital firm whose senior partners donated millions to the 2008 Obama campaign and other Democrat causes. One partnerJohn Doerr, parlayed his support into a seat on the President’s Council of Jobs and Competitiveness.

Such connections can allow a company to exert political pressure to enrich itself. Unsurprisingly, Department of Energy emails show that such pressure was rampant in its loan programs.

There’s no shortage of examples. The department’s leaders—including then-Secretary of Energy Steven Chu—repeatedly promised to deliver results to politicians like Rep. Steny Hoyer (D-Md.) and Sen. Harry Reid (D-Nev.). One emails reads, “DOE has made a political commitment” to approve a company’s loan. Another says the “pressure is on real heavy” from none other than Vice President Joe Biden. And still another shows an employee asking, “what’s another billion anyhow?”

Unsurprisingly, the Obama administration gave Tesla and Fisker preferential treatment, and then some.

The Department of Energy revised its review process in order finish the companies’ applications faster. The government gave them extraordinary access to its staff and facilities—even to the point of having government employees personally walk them through the loan application and approval process. The department ignored its own lending rules in order to approve the companies’ loans. And it renegotiated the terms of some loans after the companies could not keep their original commitments or were experiencing financial difficulties. Tellingly, Fisker has since gone out of business, despite receiving over a billion dollars in loans through this federal program.

Now contrast this preferential treatment with what happened to XP Vehicles and Limnia, neither of which have the same political connections. (My organization is suing the Department of Energy on their behalf). The two companies partnered to manufacture an energy-efficient sport utility vehicle that would have competed with Tesla and Fisker’s cars. They applied for loans in 2008 and 2009 under the same loan program.

The department refused them both—and it used bogus reasons to do so.

For starters, the department made claims that were laughably false. To take one example: It rejected XPV’s application because its vehicle was powered by hydrogen. It was an electric SUV. It also raised objections that it didn’t raise with other companies whose applications were approved. For instance: The bureaucracy criticized the proposed all-electric vehicle for not using a specific type of gasoline. Yet Tesla and Fisker received the loans despite producing similar all-electric cars.

In light of these obvious problems and hypocrisy, both companies presented the Department of Energy with detailed rebuttals. Yet the government failed to respond. To this day, both XPV and Limnia are awaiting a satisfactory reply. In the meantime, XPV has gone out of business, unable to compete against its politically connected—and subsidized—rivals.

This casts the Department of Energy’s loan program in a new light. It was sold to the American public as a means of promoting energy-efficient vehicles. Instead, it was used to benefit a select few well-connected companies. It was a blatant crony handout, paid for by the U.S. taxpayer.

Sadly, similar examples are widespread in Washington. That’s no surprise considering the feds spend roughly $100 billion a year in taxpayer-funded handouts to businesses. This breeds the sort of government-business collusion Americans think is rampant in Washington. In fact, over two-thirds of likely voters think the federal government helps businesses that hire the most lobbyists, shake the right hands, and pad the right pockets. They’re right.

This points to a simple conclusion: Politicians and bureaucrats shouldn’t use the public’s money to pad private companies’ bottom lines. As the Department of Energy’s green-vehicle loan program shows, the capacity for corruption is immense—and inevitable.

Epstein is executive director of Cause of Action, a government watchdog.


Dear-President-Obama-1

Dear-President-Obama-2

DOE-HQ-2008-0020-0007

Chu.Zients.2010

Chu.Zients.2010b

congress


 “This was an organized crime operation, involving state and federal employees, which cost the taxpayers, and American business, a record-breaking amount of losses, as well as massive damage to the public policy process..”  – Federal Investigator – GAO/Treasury

SENATE

“If corrupt politicians, and their financiers, don’t mind having the FBI, and 20 other enforcement agencies, up their back-sides,  for the rest of their lives; along with the news media, and the voters, then they should probably keep doing these sorts of crimes…”  Senior Reporter – Washington Post


FINAL-US-CONGRESS


GEORGE-MASON-UNIVERSITY


THE GREEN CORRUPTION FILES : DEVELOPING: Department of Energy 


You can see more about this story at these news links:

http:/www.xyzcase.com

http://greencorruption.blogspot.com

http://www.paybackpolitics.org

https://videopress.com/v/scaGcupR?hd=0&autoPlay=0&permalink=0&loop=0Onward and upward!


For more details, use the following internet search terms, in the search field, on the web search engines at www.bing.com; www.duckduckgo.com; www.ask.com; www.yahoo.com, www.voat.co, : “Solyndra Corruption” , “Steven Chu corruption”, “Department of Energy Corruption”, “The Silicon Valley Cartel”, “AngelGate Collusion”, “The Silicon Valley Anti-poaching conspiracy”, “Afghanistan Lithium”, “Tesla Motors fires”, “Who is In-Q-Tel”, “In-Q-Tel, The Corbett Report”, “Elon Musk government money”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “IRS hit jobs lerner”, “Google campaign financing”, and related search phrases… (It is advised to avoid Google searches, in this matter, as Google is owned by the parties under investigation by the FBI, FTC, EU, OSC, CC, ACLU, SEC and other investigations, and is, thus, a “compromised entity”)


How did the tide turn?

In the old days, when this all began, state and federal agency people would first think:

“How can we keep the politicians from getting upset? We’d better cover this up!”

In the new era, with a national election just around the corner, the lowest Congressional approval rate in history, the dawn of the Age of Transparency and leaked documents dropping like rain, from every sector, the agencies are now thinking:

“How can we keep the voters from getting MORE upset?  We’d better fix this properly!”


 

More News Coverage:

A TRILLION DOLLARS OF YOUR TAX MONEY…MISSING…

(Re-printed From Simon’s Blog)

You work hard. Your pay stub has 40% taken out of it. This is over a Trillion Dollars of your money that was taken and put into the “bad guys” pockets so they could buy private jets and roller coasters.
It’s not like your town needed that money to pay teachers and fireman and pave the roads.

Type “Silicon Valley Cartel” into the http://www.duckduckgo.com search engine and read the hard facts about an actual, operating, organized crime effort in a huge Silicon Valley scam. Then type “AngelGate”, and read more about it.

The broadcast news stories, below, and over 5000 others you can see at THIS LINK, and others, go into details about the crime that investigators believe the suspects engaged in.

When you have been asked to assist the FBI, The GAO, the U.S. Congress and other law enforcement entities in an anti-corruption investigation, it turns out that you get media “hit-jobs” put on you. For more on how to know the players. See This LINK.  

Over 200 Silicon Valley tech companies have now faced the onslaught. Protect yourself, and your project, from black-listing, organized and synchronized media attacks, “troll farm” floods, HR Data Base manipulation, Search engine rigging and other criminal, and unethical, punitive tactics by those who believe they can operate outside of the law. Read more at the link above and:

http://www.aclu.org

http://www.gao.gov/rss/topic/Government_Operations

http://www.fbi.gov/news/stories/story-index/public-corruption/rss.xml

https://en.wikipedia.org/wiki/Character_assassination

http://www.cruxcatalyst.com/2012/07/11/surviving-personal-attacks/

and related sites…

For Details on related cases see the following video news coverage:

https://videos.files.wordpress.com/7BIiJUSD/the-cleantech-crash_sm_fmt1.ogv

https://videos.files.wordpress.com/DO9b78R0/jack-abramoff-the-lobbyists-playbook_high_fmt1.ogv

https://videos.files.wordpress.com/6ZG7Qe6u/is-the-electric-car-being-suppressed__fmt1.ogv


As one CEO said: “Of Course, in the Case of Team 1; Elon Musk, John Doerr and Eric Schmidt probably love us more than life itself. It is hard to imagine that they were the people who led the attack in this one particular case we can think of….but who knows, we live in interesting times.”

But, for discussion purposes, let’s say there were some billionaire politico types who thought your technology was obsoleting their technology and who found that your team kept one-up-ing them. If they go after you, here is what you can do –


How Do You Fight Back When Large Corrupt Entities Attack You:

Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them “hit-men”. From the famously vindictive Sidney Blumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; when they come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires.

Your saving grace, though, will always be this: The “bad guys” are forced to  operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light
on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. 


Tips for Tech Companies Under Attack –

1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking.

2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of great references and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not
credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups,
kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble.

3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you.

4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers.

5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers.

6. Read about who does hired character assassinations, and how they do it, at THIS LINK   and watch for the early signs of the attacks.

7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s: Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK    http://wp.me/P1EyVm-xH

8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever.

9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics.

10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them”

11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are.

12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators  (   http://wp.me/P1EyVm-xH  ) that they wanted “out of the way”.

13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages.

14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with.

15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream.

16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information.

17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit.

18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators.

19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove theattackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious.

Do billionaires really do extreme attacks, like these, on average American citizens?

What do you think “bad guys” would do to steal a Trillion Dollars?


We just heard from another federal agency. Federal law enforcement, private investigators and certain news journalists can now prove, beyond a shadow of a doubt, with no “ifs”, “ands” or “buts” that certain Silicon Valley billionaires engaged in organized crime activities and, while doing those crimes, attacked a number of parties.

These suspects are doing everything in their power, and spending vast amounts of money, to prevent the requested public hearing, before a Special Prosecutor, in Washington, DC to show the taxpaying public the acquired evidence.

bob_simon_60_Minutes

Keywords:
“Afghanistan Lithium”, “AngelGate Collusion”, “Department of Energy Corruption”, “Elon Musk government money”, “Google campaign financing”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “Solyndra Corruption”, “Steven Chu corruption”, “Tesla Motors fires”, “The Silicon Valley Anti-poaching conspiracy”, “The Silicon Valley Cartel”, biggest scam in tech, CleanTech the biggest scam in tech, elon musk: the biggest scam in tech, IRS hit jobs lerner”, john doerr the biggest scam in tech, Kleiner Perkions: the biggest scam in tech, Monica Lewinksy, Richard Berman, Sidney Blumenthal, Silicon Valley scam, the biggest scam in tech, the-silicon-valley-cartel-the-biggest-scam-in-tech/

cost the taxpayers, and American business, a record-breaking amount of losses, as well as massive damage to the public policy process..”  – Federal Investigator – GAO/Treasury

SENATE

“If corrupt politicians, and their financiers, don’t mind having the FBI, and 20 other enforcement agencies, up their back-sides,  for the rest of their lives; along with the news media, and the voters, then they should probably keep doing these sorts of crimes…”  Senior Reporter – Washington Post


FINAL-US-CONGRESS


GEORGE-MASON-UNIVERSITY


THE GREEN CORRUPTION FILES : DEVELOPING: Department of Energy 


You can see more about this story at these news links:

http:/www.xyzcase.com

http://greencorruption.blogspot.com

http://www.paybackpolitics.org

https://videopress.com/v/scaGcupR?hd=0&autoPlay=0&permalink=0&loop=0Onward and upward!


For more details, use the following internet search terms, in the search field, on the web search engines at www.bing.com; www.duckduckgo.com; www.ask.com; www.yahoo.com, www.voat.co, : “Solyndra Corruption” , “Steven Chu corruption”, “Department of Energy Corruption”, “The Silicon Valley Cartel”, “AngelGate Collusion”, “The Silicon Valley Anti-poaching conspiracy”, “Afghanistan Lithium”, “Tesla Motors fires”, “Who is In-Q-Tel”, “In-Q-Tel, The Corbett Report”, “Elon Musk government money”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “IRS hit jobs lerner”, “Google campaign financing”, and related search phrases… (It is advised to avoid Google searches, in this matter, as Google is owned by the parties under investigation by the FBI, FTC, EU, OSC, CC, ACLU, SEC and other investigations, and is, thus, a “compromised entity”)


How did the tide turn?

In the old days, when this all began, state and federal agency people would first think:

“How can we keep the politicians from getting upset? We’d better cover this up!”

In the new era, with a national election just around the corner, the lowest Congressional approval rate in history, the dawn of the Age of Transparency and leaked documents dropping like rain, from every sector, the agencies are now thinking:

“How can we keep the voters from getting MORE upset?  We’d better fix this properly!”


 

More News Coverage:

A TRILLION DOLLARS OF YOUR TAX MONEY…MISSING…

(Re-printed From Simon’s Blog)

You work hard. Your pay stub has 40% taken out of it. This is over a Trillion Dollars of your money that was taken and put into the “bad guys” pockets so they could buy private jets and roller coasters.
It’s not like your town needed that money to pay teachers and fireman and pave the roads.

Type “Silicon Valley Cartel” into the http://www.duckduckgo.com search engine and read the hard facts about an actual, operating, organized crime effort in a huge Silicon Valley scam. Then type “AngelGate”, and read more about it.

The broadcast news stories, below, and over 5000 others you can see at THIS LINK, and others, go into details about the crime that investigators believe the suspects engaged in.

When you have been asked to assist the FBI, The GAO, the U.S. Congress and other law enforcement entities in an anti-corruption investigation, it turns out that you get media “hit-jobs” put on you. For more on how to know the players. See This LINK.  

Over 200 Silicon Valley tech companies have now faced the onslaught. Protect yourself, and your project, from black-listing, organized and synchronized media attacks, “troll farm” floods, HR Data Base manipulation, Search engine rigging and other criminal, and unethical, punitive tactics by those who believe they can operate outside of the law. Read more at the link above and:

http://www.aclu.org

http://www.gao.gov/rss/topic/Government_Operations

http://www.fbi.gov/news/stories/story-index/public-corruption/rss.xml

https://en.wikipedia.org/wiki/Character_assassination

http://www.cruxcatalyst.com/2012/07/11/surviving-personal-attacks/

and related sites…

For Details on related cases see the following video news coverage:

https://videos.files.wordpress.com/7BIiJUSD/the-cleantech-crash_sm_fmt1.ogv

https://videos.files.wordpress.com/DO9b78R0/jack-abramoff-the-lobbyists-playbook_high_fmt1.ogv

https://videos.files.wordpress.com/6ZG7Qe6u/is-the-electric-car-being-suppressed__fmt1.ogv


As one CEO said: “Of Course, in the Case of Team 1; Elon Musk, John Doerr and Eric Schmidt probably love us more than life itself. It is hard to imagine that they were the people who led the attack in this one particular case we can think of….but who knows, we live in interesting times.”

But, for discussion purposes, let’s say there were some billionaire politico types who thought your technology was obsoleting their technology and who found that your team kept one-up-ing them. If they go after you, here is what you can do –


How Do You Fight Back When Large Corrupt Entities Attack You:

Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them “hit-men”. From the famously vindictive Sidney Blumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; when they come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires.

Your saving grace, though, will always be this: The “bad guys” are forced to  operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light
on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. 


Tips for Tech Companies Under Attack –

1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking.

2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of great references and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not
credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups,
kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble.

3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you.

4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers.

5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers.

6. Read about who does hired character assassinations, and how they do it, at THIS LINK   and watch for the early signs of the attacks.

7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s: Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK    http://wp.me/P1EyVm-xH

8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever.

9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics.

10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them”

11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are.

12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators  (   http://wp.me/P1EyVm-xH  ) that they wanted “out of the way”.

13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages.

14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with.

15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream.

16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information.

17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit.

18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators.

19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove theattackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious.

Do billionaires really do extreme attacks, like these, on average American citizens?

What do you think “bad guys” would do to steal a Trillion Dollars?


We just heard from another federal agency. Federal law enforcement, private investigators and certain news journalists can now prove, beyond a shadow of a doubt, with no “ifs”, “ands” or “buts” that certain Silicon Valley billionaires engaged in organized crime activities and, while doing those crimes, attacked a number of parties.

These suspects are doing everything in their power, and spending vast amounts of money, to prevent the requested public hearing, before a Special Prosecutor, in Washington, DC to show the taxpaying public the acquired evidence.

bob_simon_60_Minutes

Keywords:
“Afghanistan Lithium”, “AngelGate Collusion”, “Department of Energy Corruption”, “Elon Musk government money”, “Google campaign financing”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “Solyndra Corruption”, “Steven Chu corruption”, “Tesla Motors fires”, “The Silicon Valley Anti-poaching conspiracy”, “The Silicon Valley Cartel”, biggest scam in tech, CleanTech the biggest scam in tech, elon musk: the biggest scam in tech, IRS hit jobs lerner”, john doerr the biggest scam in tech, Kleiner Perkions: the biggest scam in tech, Monica Lewinksy, Richard Berman, Sidney Blumenthal, Silicon Valley scam, the biggest scam in tech, the-silicon-valley-cartel-the-biggest-scam-in-tech/

attackers did it to these people out of vindictive, malicious smugness. It was a crime. It was illegal. It was a Constitutional violation. The proof that they did it is now published in court and news documents.

Now is the time to fix the White House so that it can never break the law again. VOTE FOR ANTI-CORRUPTION CANDIDATES, WHO SIGN A GUARANTEE TO PROSECUTE CORRUPTION, IN 2016!


Testimony of Witness Group #256 to The Federal Bureau of Investigation:

“…Our group had been contacted, during the initial project by a group called In-Q-Tel. In-Q-Tel also contacted our team after we had testified to the GAO in their investigation of Steven Chu. We are now informed, by multiple federal and media investigators, of the following facts:

  • In-Q-Tel works with The New America Foundation on a financial pass-through process. In-Q-Tel says it is a “501 C 3 non-profit charity” yet has been involved in cocaine trafficking and outfitting mercenary groups.

  • In-Q-Tel and New America Foundation are funded and controlled by Eric Schmidt, and his partners, and have provided lobbying, manipulation and policy leverage for his personal interests.

  • Eric Schmidt has spent more time in the White House, lobbying and directing policy, than all of the members of Congress, combined.

  • Eric Schmidt, and his business and political partners received hundreds of billions of dollars of profit, at the expense of U.S. taxpayers, in the case herein under discussion. The Corbett Report has broadcast numerous documentaries about, potentially, illegal lobbying by In-Q-Tel.

  • Eric Schmidt used his company: Google to attack (Witness Group #256) by rigging search engine, media, proxy and network operations results against (Witness Group #256) and, when confronted with the charges by licensed lawyers for (Witness Group #256), had his staff refuse, in writing, to remove the attacks

  • In-Q-Tel contacted (Witness Group #256), under the pretext of wanting to invest in (Witness Group #256) software for emergency refugee rescue operations. In-Q-Tel then copied the software, put “back-doors” in it, distributed it under their organizations own name, and flooded the market with their software, while at the same time coordinating an attack with their financially connected associates at Google and Gawker in retribution for (Witness Group #256) assisting federal investigators with their investigations. This caused witnesses millions of dollars in losses and damages, while In-Q-Tel made millions of dollars in profits off of the effort.

  • In-Q-Tel is known to offer services as a domestic supplier of “dirty tricks” for political operations for various domestic companies, illegally using CIA resources. This is widely documented in public news and Congressional reports. Elon Musk has his companies staffed by In-Q-Tel, works with Eric Schmidt on stock market and media manipulation to rig his stocks, and had all of his competitors sabotaged by the same DOE staff who exclusively gave him taxpayer cash in violation of the Section 136 law.

  • In-Q-Tel operated a political payback service for Eric Schmidt, John Doerr and the other Silicon Valley Cartel members who had set-up a scam, valued at over a trillion dollars, and connected with campaign funding for Barack Obama and Dianne Feinstein. The financial records, beneficiary tracking, database analysis, emails and testimony; prove these facts beyond any doubt.”

  • In-Q-Tel, New America Foundation and related organizations are all financially, and politically, connected to Eric Schmidt, John Doerr and an organized, private, political and business effort to control Washington DC activities for their own personal interests.”

ZDNET
DID-SCHMIDT-BRIBE-WHITE-HOUSE7BZCfbrXKs4transparency

GOOGLE-SABOTAGES-COMPETITORSFOLLOWTHEMONEY   PROPUBLICA   corruption-11

STOCK-MARKET   GOOGLE-AND-OBAMAGOOGLE_CONTROLS_THE_MEDIA
A CASE EXAMPLE:

As an example of one of nearly a hundred attacks on U.S. taxpayers, and voters, by corrupt Senators, and their campaign financiers, take a look at this example case:

In a case of “awkward timing”, During the Iraq War, Team-6 was asked, via Congressional invitation and Congressional Commendation (published in the Federal Register by the United States Congress), to develop, for the United States, via the U.S. Department of Energy, the technology requested as the back-up plan, for when, and if, the Middle East went “sideways”. (If you have been reading the news, you will have noticed that has already happened) Team-6 won federal and industry commendations, federal grants, historical patents, federal contracts, industry acclaim U.S. Congressional commendation in the Federal Register, built and demonstrated numerous versions of  the technology. The technology is an instant-swap/recharge battery that runs longer than almost any other battery, can use almost any one of over 3000 organic material fuel compositions, it leaves only drinkable water as it’s waste, needs no new infrastructure and can be created entirely from domestic materials including household kitchen waste. All of the technology is already fully functional, globally, in industrial uses.

Not only did the technology work, it has been deployed by competing interests globally in over $300M worth of contracts. 100% of the technology is in use in the world today.

Alas, the technology Team-6 developed was the one technology that, not only, obsoleted the Cartel’s scam but, in hindsight, exceeded it, by many paradigms in safety, cost, national security, ease-of-distribution, consumer access, consumer price-point, and a vast number of other metrics. The Cartel had taken over the lithium battery industry, which relied entirely on foreign incursions, toxic chemicals and off-shore mining deals, in advance, but nobody told Team-6 before they got roped into building the “lithium-killer”.

This journalist says it best: “With this fuel cell technology, If UPS, FedEx, a natural gas line or a water line, could reach your home, then your home was already set-up to use clean, sustainable energy that you had control over. The Cartel didn’t like that, because that meant that 3.4 billion consumers could already compete with them. ‘We couldn’t have consumers doing things on their own, now could we’?”

The Cartel politicians, and their campaign backers, went to war over it.

In retribution for assisting federal investigators, and for Team-6 “building a better mousetrap”, the corrupt billionaires hired In-Q-Tel, Gawker Media and Gizmodo (SEE THIS LINK FOR DESCRIPTION OF THIS GROUP), a “troll farm” blogging service and “sock puppets”, to embed the word “scam” next to every mention of Team-6 ‘s name, and staff, on the internet, HR databases and network services, as a character assassination program, in order to seek to terminate income flow, in retribution and revenge for Team-6 helping Congress and law enforcement interdict the political and financial crimes.

Click This Link, BELOW, to download an adobe .pdf file with the latest press clippings about Gawker lawsuits and investigations: (GAWKER MEDIA EXPOSED AS HIT-JOB FRONT FOR SILICON VALLEY CARTEL)

Gawker and their Silicon Valley Campaign partners, who own Google, then had Google lock the attack on the front page of Google, refusing to remove it after numerous legally correct requests by lawyers, in order to accelerate the damage to Team 1. The FBI, The San Francisco Police Department, The SEC, The OSC, The GAO, The FTC, The U.S. Senate and other agency’s, are now investigating this political and economic retribution attack on Team-6 and active case numbers now exist for this, and related matters, with those agencies. Google, and the coordinating parties, have now been tracked and confirmed, by digital forensics, as fully complicit and now bear the brunt of all loss liabilities to Team-6 . In addition to the recent Sony, Snowden, HSBC and other leaks; forensic IT tracking data; Silicon Valley and Washington DC whistle-blowers ; the sheer volume of the attacks; and their exclusive, IT data metrics confirmed, locked position on Google, prove the point of a coordinated and consciously manipulated attack, thus holding Google, and the related Cartel entities, liable for all losses and damages. In England this is called “hoisted by your own pitard”. English and French courts are discussing litigation against Google, with this case as  one of the example metrics of Google’s manual search results manipulation to attack adversaries. Over 400,000 pages of evidence have now been acquired.

In short: Team-6 engineered, designed, built, demonstrated, delivered, patented and began marketing technologies that the Cartel either asked to look at, then took, without compensation, or sabotaged because they beat the Cartel technologies. After millions of dollars of federal patent office research, not a single Cartel technology has proven to have preceded Team-6 technologies. In every single case, it has been proven that this Cartel of campaign finance manipulators, asked, in writing to look at Team-6 technology, and then, either: rejected it in writing as “unworkable”, yet they then copied and sold 100% copies of the “unworkable” technologies as their own; or, sabotaged the technology to prevent it from affecting their market. Team-6,  and other companies, who suffered the same attacks, are seeking fair, equally resourced public federal court & media hearings, to resolve the issues.

This was particularly ironic, since some of the Cartel “bad guys” have now been arrested, indicted and/or placed under FBI investigation for actually running a real embezzlement scam. The FBI Solyndra Raid, the U.S. Senate investigations and 14 other criminal investigations have put severe heat on the corrupt technology investors and politicians who Team-6. Per data exposure from Snowden, Greenwald, etc., Per Snowden/Greenwald/HSBC/Sony leaks, federal investigators have been found to have had every suspect under long-term extensive surveillance and now, their state and federal prosecutions are only a matter of time.

Team-6 will, now, always fight the good fight against criminal behaviour, bad ethics and public policy corruption. Their credentials, references, broadcast news videos and past project evidence, clearly counter-measure any of the attack false-hoods presented by those people. The GAO, OMB, FBI, U.S. Treasury, Washington Post, and hundreds of university research groups, calculate the loss, to the United States and the American taxpayer, from these crimes, at well over one trillion dollars of losses.


NEWS COVERAGE OF THE INCIDENT:


TRANSPARENCY-INTERNATIONAL2

DOE-STORY1

DOE-STORY2

DOE-STORY-3

DOE-STORY-4

DOE-STORY-5

IACC

INTEGRITY

pay-to-play-cronyism

By Dan Epstein

News flash: Government subsidies and special-interest favors go hand in hand.

The latest example comes from a federal green-energy loan program. Last month, the DC District Court ruled that Cause of Action, where I am executive director, can proceed with a lawsuitagainst the Department of Energy. We’re suing the federal government for the blatant political favoritism in its $25 billion “Advanced Technology Vehicle Manufacturing Loan Program.”

ADVERTISEMENT

In principle, this taxpayer-funded program was supposed to support the manufacture of energy-efficient cars. In practice, it rewarded a select few well-connected companies.

Since the program was created in 2008, numerous businesses have applied for its taxpayer-backed financial support. Yet only a small number were approved. Among the lucky few were two electric car manufacturers: Teslaand Fisker.

Both companies’ political connections run deep, especially Tesla’s. The company’s founder, Elon Musk, was a max donor for President Obama. One of its board members, Steven Westly, was appointed to a Department of Energy advisory board. And another Obama bundler, Tesla investor and adviser Steven Spinner, secured employment in the department’s Loan Program Office—the very office that gave the company a taxpayer-backed loan.

Fisker also has friends in high places. The company, which has since gone bankruptwas backed by a San Francisco venture capital firm whose senior partners donated millions to the 2008 Obama campaign and other Democrat causes. One partnerJohn Doerr, parlayed his support into a seat on the President’s Council of Jobs and Competitiveness.

Such connections can allow a company to exert political pressure to enrich itself. Unsurprisingly, Department of Energy emails show that such pressure was rampant in its loan programs.

There’s no shortage of examples. The department’s leaders—including then-Secretary of Energy Steven Chu—repeatedly promised to deliver results to politicians like Rep. Steny Hoyer (D-Md.) and Sen. Harry Reid (D-Nev.). One emails reads, “DOE has made a political commitment” to approve a company’s loan. Another says the “pressure is on real heavy” from none other than Vice President Joe Biden. And still another shows an employee asking, “what’s another billion anyhow?”

Unsurprisingly, the Obama administration gave Tesla and Fisker preferential treatment, and then some.

The Department of Energy revised its review process in order finish the companies’ applications faster. The government gave them extraordinary access to its staff and facilities—even to the point of having government employees personally walk them through the loan application and approval process. The department ignored its own lending rules in order to approve the companies’ loans. And it renegotiated the terms of some loans after the companies could not keep their original commitments or were experiencing financial difficulties. Tellingly, Fisker has since gone out of business, despite receiving over a billion dollars in loans through this federal program.

Now contrast this preferential treatment with what happened to XP Vehicles and Limnia, neither of which have the same political connections. (My organization is suing the Department of Energy on their behalf). The two companies partnered to manufacture an energy-efficient sport utility vehicle that would have competed with Tesla and Fisker’s cars. They applied for loans in 2008 and 2009 under the same loan program.

The department refused them both—and it used bogus reasons to do so.

For starters, the department made claims that were laughably false. To take one example: It rejected XPV’s application because its vehicle was powered by hydrogen. It was an electric SUV. It also raised objections that it didn’t raise with other companies whose applications were approved. For instance: The bureaucracy criticized the proposed all-electric vehicle for not using a specific type of gasoline. Yet Tesla and Fisker received the loans despite producing similar all-electric cars.

In light of these obvious problems and hypocrisy, both companies presented the Department of Energy with detailed rebuttals. Yet the government failed to respond. To this day, both XPV and Limnia are awaiting a satisfactory reply. In the meantime, XPV has gone out of business, unable to compete against its politically connected—and subsidized—rivals.

This casts the Department of Energy’s loan program in a new light. It was sold to the American public as a means of promoting energy-efficient vehicles. Instead, it was used to benefit a select few well-connected companies. It was a blatant crony handout, paid for by the U.S. taxpayer.

Sadly, similar examples are widespread in Washington. That’s no surprise considering the feds spend roughly $100 billion a year in taxpayer-funded handouts to businesses. This breeds the sort of government-business collusion Americans think is rampant in Washington. In fact, over two-thirds of likely voters think the federal government helps businesses that hire the most lobbyists, shake the right hands, and pad the right pockets. They’re right.

This points to a simple conclusion: Politicians and bureaucrats shouldn’t use the public’s money to pad private companies’ bottom lines. As the Department of Energy’s green-vehicle loan program shows, the capacity for corruption is immense—and inevitable.

Epstein is executive director of Cause of Action, a government watchdog.


Dear-President-Obama-1

Dear-President-Obama-2

DOE-HQ-2008-0020-0007

Chu.Zients.2010

Chu.Zients.2010b

congress


 “This was an organized crime operation, involving state and federal employees, which cost the taxpayers, and American business, a record-breaking amount of losses, as well as massive damage to the public policy process..”  – Federal Investigator – GAO/Treasury

SENATE

“If corrupt politicians, and their financiers, don’t mind having the FBI, and 20 other enforcement agencies, up their back-sides,  for the rest of their lives; along with the news media, and the voters, then they should probably keep doing these sorts of crimes…”  Senior Reporter – Washington Post


FINAL-US-CONGRESS


GEORGE-MASON-UNIVERSITY


THE GREEN CORRUPTION FILES : DEVELOPING: Department of Energy 


You can see more about this story at these news links:

http:/www.xyzcase.com

http://greencorruption.blogspot.com

http://www.paybackpolitics.org

https://videopress.com/v/scaGcupR?hd=0&autoPlay=0&permalink=0&loop=0Onward and upward!


For more details, use the following internet search terms, in the search field, on the web search engines at www.bing.com; www.duckduckgo.com; www.ask.com; www.yahoo.com, www.voat.co, : “Solyndra Corruption” , “Steven Chu corruption”, “Department of Energy Corruption”, “The Silicon Valley Cartel”, “AngelGate Collusion”, “The Silicon Valley Anti-poaching conspiracy”, “Afghanistan Lithium”, “Tesla Motors fires”, “Who is In-Q-Tel”, “In-Q-Tel, The Corbett Report”, “Elon Musk government money”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “IRS hit jobs lerner”, “Google campaign financing”, and related search phrases… (It is advised to avoid Google searches, in this matter, as Google is owned by the parties under investigation by the FBI, FTC, EU, OSC, CC, ACLU, SEC and other investigations, and is, thus, a “compromised entity”)


How did the tide turn?

In the old days, when this all began, state and federal agency people would first think:

“How can we keep the politicians from getting upset? We’d better cover this up!”

In the new era, with a national election just around the corner, the lowest Congressional approval rate in history, the dawn of the Age of Transparency and leaked documents dropping like rain, from every sector, the agencies are now thinking:

“How can we keep the voters from getting MORE upset?  We’d better fix this properly!”


 

More News Coverage:

A TRILLION DOLLARS OF YOUR TAX MONEY…MISSING…

(Re-printed From Simon’s Blog)

You work hard. Your pay stub has 40% taken out of it. This is over a Trillion Dollars of your money that was taken and put into the “bad guys” pockets so they could buy private jets and roller coasters.
It’s not like your town needed that money to pay teachers and fireman and pave the roads.

Type “Silicon Valley Cartel” into the http://www.duckduckgo.com search engine and read the hard facts about an actual, operating, organized crime effort in a huge Silicon Valley scam. Then type “AngelGate”, and read more about it.

The broadcast news stories, below, and over 5000 others you can see at THIS LINK, and others, go into details about the crime that investigators believe the suspects engaged in.

When you have been asked to assist the FBI, The GAO, the U.S. Congress and other law enforcement entities in an anti-corruption investigation, it turns out that you get media “hit-jobs” put on you. For more on how to know the players. See This LINK.  

Over 200 Silicon Valley tech companies have now faced the onslaught. Protect yourself, and your project, from black-listing, organized and synchronized media attacks, “troll farm” floods, HR Data Base manipulation, Search engine rigging and other criminal, and unethical, punitive tactics by those who believe they can operate outside of the law. Read more at the link above and:

http://www.aclu.org

http://www.gao.gov/rss/topic/Government_Operations

http://www.fbi.gov/news/stories/story-index/public-corruption/rss.xml

https://en.wikipedia.org/wiki/Character_assassination

http://www.cruxcatalyst.com/2012/07/11/surviving-personal-attacks/

and related sites…

For Details on related cases see the following video news coverage:

https://videos.files.wordpress.com/7BIiJUSD/the-cleantech-crash_sm_fmt1.ogv

https://videos.files.wordpress.com/DO9b78R0/jack-abramoff-the-lobbyists-playbook_high_fmt1.ogv

https://videos.files.wordpress.com/6ZG7Qe6u/is-the-electric-car-being-suppressed__fmt1.ogv


As one CEO said: “Of Course, in the Case of Team 1; Elon Musk, John Doerr and Eric Schmidt probably love us more than life itself. It is hard to imagine that they were the people who led the attack in this one particular case we can think of….but who knows, we live in interesting times.”

But, for discussion purposes, let’s say there were some billionaire politico types who thought your technology was obsoleting their technology and who found that your team kept one-up-ing them. If they go after you, here is what you can do –


How Do You Fight Back When Large Corrupt Entities Attack You:

Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them “hit-men”. From the famously vindictive Sidney Blumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; when they come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires.

Your saving grace, though, will always be this: The “bad guys” are forced to  operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light
on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. 


Tips for Tech Companies Under Attack –

1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking.

2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of great references and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not
credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups,
kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble.

3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you.

4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers.

5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers.

6. Read about who does hired character assassinations, and how they do it, at THIS LINK   and watch for the early signs of the attacks.

7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s: Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK    http://wp.me/P1EyVm-xH

8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever.

9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics.

10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them”

11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are.

12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators  (   http://wp.me/P1EyVm-xH  ) that they wanted “out of the way”.

13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages.

14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with.

15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream.

16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information.

17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit.

18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators.

19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove theattackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious.

Do billionaires really do extreme attacks, like these, on average American citizens?

What do you think “bad guys” would do to steal a Trillion Dollars?


We just heard from another federal agency. Federal law enforcement, private investigators and certain news journalists can now prove, beyond a shadow of a doubt, with no “ifs”, “ands” or “buts” that certain Silicon Valley billionaires engaged in organized crime activities and, while doing those crimes, attacked a number of parties.

These suspects are doing everything in their power, and spending vast amounts of money, to prevent the requested public hearing, before a Special Prosecutor, in Washington, DC to show the taxpaying public the acquired evidence.

bob_simon_60_Minutes

Keywords:
“Afghanistan Lithium”, “AngelGate Collusion”, “Department of Energy Corruption”, “Elon Musk government money”, “Google campaign financing”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “Solyndra Corruption”, “Steven Chu corruption”, “Tesla Motors fires”, “The Silicon Valley Anti-poaching conspiracy”, “The Silicon Valley Cartel”, biggest scam in tech, CleanTech the biggest scam in tech, elon musk: the biggest scam in tech, IRS hit jobs lerner”, john doerr the biggest scam in tech, Kleiner Perkions: the biggest scam in tech, Monica Lewinksy, Richard Berman, Sidney Blumenthal, Silicon Valley scam, the biggest scam in tech, the-silicon-valley-cartel-the-biggest-scam-in-tech/

cost the taxpayers, and American business, a record-breaking amount of losses, as well as massive damage to the public policy process..”  – Federal Investigator – GAO/Treasury

SENATE

 

“If corrupt politicians, and their financiers, don’t mind having the FBI, and 20 other enforcement agencies, up their back-sides,  for the rest of their lives; along with the news media, and the voters, then they should probably keep doing these sorts of crimes…”  Senior Reporter – Washington Post


 

 

FINAL-US-CONGRESS

 


 

GEORGE-MASON-UNIVERSITY


THE GREEN CORRUPTION FILES : DEVELOPING: Department of Energy 


 

You can see more about this story at these news links:

http:/www.xyzcase.com

http://greencorruption.blogspot.com

http://www.paybackpolitics.org

https://videopress.com/v/scaGcupR?hd=0&autoPlay=0&permalink=0&loop=0Onward and upward!


For more details, use the following internet search terms, in the search field, on the web search engines at www.bing.com; www.duckduckgo.com; www.ask.com; www.yahoo.com, www.voat.co, : “Solyndra Corruption” , “Steven Chu corruption”, “Department of Energy Corruption”, “The Silicon Valley Cartel”, “AngelGate Collusion”, “The Silicon Valley Anti-poaching conspiracy”, “Afghanistan Lithium”, “Tesla Motors fires”, “Who is In-Q-Tel”, “In-Q-Tel, The Corbett Report”, “Elon Musk government money”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “IRS hit jobs lerner”, “Google campaign financing”, and related search phrases… (It is advised to avoid Google searches, in this matter, as Google is owned by the parties under investigation by the FBI, FTC, EU, OSC, CC, ACLU, SEC and other investigations, and is, thus, a “compromised entity”)


How did the tide turn?

In the old days, when this all began, state and federal agency people would first think:

“How can we keep the politicians from getting upset? We’d better cover this up!”

In the new era, with a national election just around the corner, the lowest Congressional approval rate in history, the dawn of the Age of Transparency and leaked documents dropping like rain, from every sector, the agencies are now thinking:

“How can we keep the voters from getting MORE upset?  We’d better fix this properly!”


 

More News Coverage:

A TRILLION DOLLARS OF YOUR TAX MONEY…MISSING…

(Re-printed From Simon’s Blog)

You work hard. Your pay stub has 40% taken out of it. This is over a Trillion Dollars of your money that was taken and put into the “bad guys” pockets so they could buy private jets and roller coasters.
It’s not like your town needed that money to pay teachers and fireman and pave the roads.

Type “Silicon Valley Cartel” into the http://www.duckduckgo.com search engine and read the hard facts about an actual, operating, organized crime effort in a huge Silicon Valley scam. Then type “AngelGate”, and read more about it.

The broadcast news stories, below, and over 5000 others you can see at THIS LINK, and others, go into details about the crime that investigators believe the suspects engaged in.

When you have been asked to assist the FBI, The GAO, the U.S. Congress and other law enforcement entities in an anti-corruption investigation, it turns out that you get media “hit-jobs” put on you. For more on how to know the players. See This LINK.  

Over 200 Silicon Valley tech companies have now faced the onslaught. Protect yourself, and your project, from black-listing, organized and synchronized media attacks, “troll farm” floods, HR Data Base manipulation, Search engine rigging and other criminal, and unethical, punitive tactics by those who believe they can operate outside of the law. Read more at the link above and:

http://www.aclu.org

http://www.gao.gov/rss/topic/Government_Operations

http://www.fbi.gov/news/stories/story-index/public-corruption/rss.xml

https://en.wikipedia.org/wiki/Character_assassination

http://www.cruxcatalyst.com/2012/07/11/surviving-personal-attacks/

and related sites…

For Details on related cases see the following video news coverage:

https://videos.files.wordpress.com/7BIiJUSD/the-cleantech-crash_sm_fmt1.ogv

https://videos.files.wordpress.com/DO9b78R0/jack-abramoff-the-lobbyists-playbook_high_fmt1.ogv

https://videos.files.wordpress.com/6ZG7Qe6u/is-the-electric-car-being-suppressed__fmt1.ogv


As one CEO said: “Of Course, in the Case of Team 1; Elon Musk, John Doerr and Eric Schmidt probably love us more than life itself. It is hard to imagine that they were the people who led the attack in this one particular case we can think of….but who knows, we live in interesting times.”

But, for discussion purposes, let’s say there were some billionaire politico types who thought your technology was obsoleting their technology and who found that your team kept one-up-ing them. If they go after you, here is what you can do –


How Do You Fight Back When Large Corrupt Entities Attack You:

Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them “hit-men”. From the famously vindictive Sidney Blumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; when they come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires.

Your saving grace, though, will always be this: The “bad guys” are forced to  operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light
on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up. 


Tips for Tech Companies Under Attack –

1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking.

2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of great references and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not
credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups,
kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble.

3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you.

4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers.

5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers.

6. Read about who does hired character assassinations, and how they do it, at THIS LINK   and watch for the early signs of the attacks.

7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s: Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK    http://wp.me/P1EyVm-xH

8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever.

9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics.

10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them”

11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are.

12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators  (   http://wp.me/P1EyVm-xH  ) that they wanted “out of the way”.

13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages.

14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with.

15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream.

16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information.

17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit.

18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators.

19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove theattackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious.

Do billionaires really do extreme attacks, like these, on average American citizens?

What do you think “bad guys” would do to steal a Trillion Dollars?


We just heard from another federal agency. Federal law enforcement, private investigators and certain news journalists can now prove, beyond a shadow of a doubt, with no “ifs”, “ands” or “buts” that certain Silicon Valley billionaires engaged in organized crime activities and, while doing those crimes, attacked a number of parties.

These suspects are doing everything in their power, and spending vast amounts of money, to prevent the requested public hearing, before a Special Prosecutor, in Washington, DC to show the taxpaying public the acquired evidence.

bob_simon_60_Minutes

Keywords:
“Afghanistan Lithium”, “AngelGate Collusion”, “Department of Energy Corruption”, “Elon Musk government money”, “Google campaign financing”, “Kleiner Perkens scandals”, “Silicon Valley Campaign backers”, “Solyndra Corruption”, “Steven Chu corruption”, “Tesla Motors fires”, “The Silicon Valley Anti-poaching conspiracy”, “The Silicon Valley Cartel”, biggest scam in tech, CleanTech the biggest scam in tech, elon musk: the biggest scam in tech, IRS hit jobs lerner”, john doerr the biggest scam in tech, Kleiner Perkions: the biggest scam in tech, Monica Lewinksy, Richard Berman, Sidney Blumenthal, Silicon Valley scam, the biggest scam in tech, the-silicon-valley-cartel-the-biggest-scam-in-tech/

Related posts: