What Is the Proof That the Gawker Media Attacks on XP Vehicles Was a Sponsored Vendetta Program?

What Is the Proof That the Gawker Media Attacks on XP Vehicles Was a Sponsored Vendetta Program?

What is the proof that the Gawker Media attacks on XP Vehicles was a sponsored vendetta program? Per the case study at http://www.slush-fund.com, and many other sites, the evidence is now clear: White House staff and their campaign financiers put hit jobs on innocent Americans out of pure spite. In the CBS News 60 Minutes segment called: “The Cleantech Crash” we see how a group of Silicon Valley billionaires and a few White House insiders rigged nearly a hundred billion dollars of taxpayer cash for themselves. In a related 60 Minutes segment about how Congress takes favors (aka: bribes) as insider stock trading advantages, we see why the crooks who conducted the Cleantech Crash crimes, at the expense of the U.S. taxpayers, were never prosecuted. Those crooks have, until now, had the protection of top law enforcement and policy executives who were running the cover-up. When they are confronted, their only retort is to mockingly admonish: “Now look here, you are making wild assertions. Where is the proof of these so called crimes?…” Now, they no longer have that smokescreen to hide behind. Rahm Emanual, Robert Gibbs, David Axelrod, David Plouffe, Bill Daley, Steven Chu and other top White House staff coordinated this crime with Silicon Valley millionaires Eric Schmidt, Larry Page, Steve Jurvetson, Elon Musk, Steve Westly, Steve Spinner and Goldman Sachs. HERE IS THE PROOF: 1.) Every person who organized, paid for, implemented and financially benefited from the attacks was the same handful of White House insiders. 2.) Every person who was attacked was a business and political competitor of the same handful of White House insiders who organized, paid for, implemented and financially benefited from the attacks. 3.) If the victims had not been attacked, their technologies would have been funded by the same funds that the same handful of White House insiders who organized, paid for, implemented and financially benefited from the attacks re-routed from the victims and put in there own pockets. 4.) The technologies that the victims were taking to high volume market production would have obsoleted the companies of the White House insiders who organized, paid for, implemented and financially benefited from the attacks. 5.) The financial, services and stock payola that paid the attack providers for their attack services were paid by the White House insiders who organized, paid for, implemented and financially benefited from the attacks. 6.) State and Federal law enforcement and intelligence agencies each have vast investigation case files proving the above facts but they have been ordered to “stand-down” on those investigations by the White House insiders who organized, paid for, implemented and financially benefited from the attacks. 7.) When 9/11 took place, the Bush Administration ordered the hacking and tapping of every electronic device in the world. As part of the scheme, most networking companies (Cisco, Juniper Networks, etc.) and major government IT contractors (CGI, Etc.) placed an electronic back-door in every major networking device so that the NSA could go into any network when they wanted to. This is no longer a big secret. This fact is now widely reported in the news. The back-doors were poorly constructed and highly insecure. The Russian and Chinese hackers got the keys and spent over a decade taking everything off the servers of all of the major politicians and their Silicon Valley campaign financiers. Now those hackers have started posting all of the evidence of crimes by those people on the web. Those leaks also confirm the charges. 8.) Special public/private task-force teams have kept the investigations going and have now assembled nearly a million pages of evidence and placed that evidence in multiple archives around the world. 9.) A number of the victims are joining together to seek to force either a federal Special Prosecutor to publicly investigate the case, a RICO racketeering lawsuit to be filed, a public TV Congressional hearing on the case or all of the above. 10.) In a listing of all of the financial beneficiaries, their stock ownerships, the transit of cash into their family trusts, the transit of cash to their offshore and HSBC, Goldman Sachs and JP Morgan accounts and billions of dollars of unreported web manipulation services by Google; the quid-pro-quo is obvious and covert and clearly proves an organized crime took place based on kick-backs using U.S. Treasury funds. 11.) There is much, much more proof that a simple federal subpoena will next reveal. Scientific analysis, forensic data, criminologist expert study, actuarial historical precedents and the historically large number of expert witnesses prove that this was not, as suggested by the culprits: “A mere coincidence”. The only possible, conclusive reality is that political officials operated an organized crime scam to hand themselves, and their Silicon Valley campaign financiers, massive amounts of exclusive crony payola while putting hit-jobs on their competitors using state and federal resources. The payola included cash, stock market stocks, give-away government contracts, revolving door jobs (Ie: Google got to place over 400 of it’s staff into decision control positions in Washington, DC), hookers, free jet fuel, free real estate, tax avoidance schemes, Google search engine rigging and other creative kick-backs. After all of the revelations from the Sony, HSBC, Wikileaks, Guccifer, Snowden, Panama and other leaks and the thousands of crimes those have exposed, it is now relatively easy to believe these charges. Now it is time for the public to take action and vote these people, and their cohorts, as far out of office as possible. Gawker Produced Two Hatchet Job Articles, an animated hatchet job video and over 300 fake blog postings from within Gawker Media offices in the San Francisco Bay and New York Offices of Gawker in order to attack XP and it’s staff and funding. Gawker then posted those, in organized conjunction with Google, for over five years, locked in the top searches on the internet in front of billions of people around the globe. GOOGLE AND GAWKER MEDIA TRANSFERED VAST AMOUNTS OF CASH, SERVICES AND WEB RIGGING BETWEEN EACH OTHER FOR THESE ATTACKS. GOOGLE HAS PLACED OVER 400 OF IT’S EMPLOYEES INSIDE THE U.S. GOVERNMENT IN A HIGHLY SUCCESSFUL EFFORT TO STEER BILLIONS OF TAXPAYER DOLLARS TO GOOGLE. GOOGLE AND IT’S ASSOCIATES OWN INTEREST IN ALL OF THE THINGS THAT XP COMPETES WITH. THE FOLLOWING AGGREGATED NEWS ARTICLES AND REPORTS PROVIDE A SMALL SAMPLE OF OVER A MILLION PAGES OF EVIDENCE, SOME OF WHICH HAS BEEN SUPPLIED BY FEDERAL INVESTIGATORS, RENOWN JOURNALISTS AND LEAKERS: Report To Congress On Gawker Media An Investigation Into The Illicit Character Assassination Services Provided By Nick Denton And Gawker Media Overview Financial records, stock holdings, off-shore bank records, tax haven routing, emails, inter-party communications, PAC records, credit card records, advertising contracts and personnel records; implicate Gawker Media and campaign financiers in a clear effort to subvert the processes of Democracy. By using public resources, enhanced by tax advantages, facilities and public utility tools to manipulate public perceptions, and to attack and damage taxpaying members of the public, Nick Denton and Gawker Media have created a blight upon the public policy system, and the public communications system, of the nation, and the world. By creating an unfair system of retribution, vindictiveness and vendetta, exclusive to Gawker Media, which provides no reasonable option, nor affordable measure, for the public to counter-measure Gawker’s attacks; Gawker is violating the Constitutional and Human Rights of American citizens. Gawker Media has taken money and resources from third parties for whom Gawker Media then produced coordinated character and brand assassination attacks that harmed, or destroyed, American industry and American taxpayers. While the press may certainly have the rights to free speech and freedom of the press, the public has a reasonable expectation of security, privacy and avoidance from terrorism by that press. Nick Denton and Gawker Media have certainly engaged in terrorism against U.S. citizens as targeted, malicious and heinous as any previous attack on our citizens. The following public evidence provides conclusive proof of these assertions. Demand’s Increase For Gawker’s Nick Denton To Be Arrested! New York City - ‘Jail Denton’ Posters Targeting Gawker Founder Appear Around New York City Flickr by Allum Bokhari Posters calling for Gawker Media founder Nick Denton to be jailed have sprung up around New York City. Denton, considered a pariah by many due to his media company’s track record of political public shaming and violating the privacy of private individuals, recently joined his company in declaring bankruptcy following Hulk Hogan’s successful lawsuit against the company. Someone in New York, however, believe that Denton has yet to fully answer for his crimes. The following posters were spotted earlier today in New York, and are being spread on social media by a newly-created Twitter account, “@jail_denton.” A full gallery of high-res photos of the posters at various locations in New York can be found on Flickr. One of the people behind the poster campaign, who did not wish to be identified, gave the following comment to Breitbart Tech. Nick Denton deserves prison for numerous crimes, including revenge porn, tax evasion, and child pornography. GamerGate cost Gawker millions. We see that record

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    246 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us