
THE CORRUPTION DISRUPTION MANUAL Your Guide To Terminating Any Corrupt Person, Organization or Company 100% Legally Draft Revision 2.4 1 Table of Contents THE CORRUPTION DISRUPTION MANUAL......................................................................................1 HOW THE PUBLIC IS ENDING POLITICAL CORRUPTION FOREVER..........................................4 YOU OWE IT TO YOURSELF AND THE NATION TO TAKE THEM DOWN!................................17 HOW TO WRITE UP THE DOSSIER ON EACH CROOK..................................................................19 NEW SOFTWARE REVEALED THAT EXPOSES CROOKS IN PUBLIC OFFICE...........................25 HOW TO USE 'THE STREISAND EFFECT' TO SHUT DOWN BAD GUYS....................................34 WHEN THE SILICON VALLEY FRAT CARTEL TRIED TO BURY OUTSIDERS, THEY DISCOVERED THAT THEY WERE SEEDS........................................................................................38 Valley of the dolts................................................................................................................................43 ANOTHER REASON TO TAKE DOWN THE OLIGARCHS..............................................................49 FORCING THE MEDIA TO HELP YOU...............................................................................................52 The Techtopus: How Silicon Valley's most celebrated CEOs conspired to drive down 100,000 tech engineers' wages..................................................................................................................................60 THE NIGHTMARE THAT SILICON VALLEY OLIGARCHS CREATED..........................................73 LAWS YOU NEED TO FORCE YOUR POLITICAL REPRESENTATIVES TO MAKE....................78 HOW TO CONDUCT A CITIZENS ARREST OF A CORRUPT CROOK INCLUDING OLIGARCHS ..................................................................................................................................................................86 REFERENCES AND SELF-EDUCATION LINKS:...............................................................................93 THE EXAMPLE CASE.........................................................................................................................110 2 The methods, tactics and procedures listed herein are intended to convey totally legal ways to expose, terminate and cause the arrest of any target. Do not cross the legal line when you undertake these actions. Use your best judgment. This is a wikipedia-style document produced by the internet. 3 HOW THE PUBLIC IS ENDING POLITICAL CORRUPTION FOREVER This is about powerful and greedy people abusing the public system in order to manipulate TRILLIONS of government treasury and stock market dollars into their own pockets. They lie, cheat, bribe, steal, attack, and even kill, in order to grab this money (provided from the pockets of the taxpayers). They create fake "political issues" in order to steer massive amounts of government money to "solutions" that they just happen to own the companies of. ("Follow the Money") They collude on cover-ups, cover-stories, pump-and-dumps, fake "Stimulus Funds" redirection and other illicit deeds. Famous politicians are a very big part of this crime. They are easy to spot via the tens of millions of dollars, in their personal bank accounts, which only appeared after they took office. They broke and separated America by promoting their fake causes, which divide the public, in order to benefit off of their exclusive stock market scams. In fact, if the, completely computer manipulated, stock market did not exist, political corruption in America would be reduced by 95%. One part of them is: The Silicon Valley Tech Cartel; an anti-trust violating organized-crime operation based on quid-pro-quo. They manipulated the Dept of Energy to only fund political favorites and to sabotage the competitors of those favorites in an epic violation of anti-trust and anti-racketeering laws. How YOU can use the public "Corruption Kill Box" to wipe out crooked politicians and their financiers: A Corruption Kill Box Procedure combines federal police investigations created by formal filed criminal referrals and Form 302 overview drafts, public class-action lawsuits, massive news media disclosure blasts, formal regulatory agency complaint filings, individual lawsuits against political and agency executives, documentary film production and distribution, the promotion and organization of Congressional hearings, crowd-sourced social media public forensics and open-source AI financial crimes tracking software. The procedure is an extinction-level event with a 100% success rate against corrupt entities. CKB's only work on the corrupt, so non corrupt parties are safe from it's effects. ANY member of the public can engage in these totally legal anti-corruption actions. Just do it! The most effective interdiction process for political corruption is now here. It is called "Citizen Forensics". It is the process of the crowd-sourced deep investigation of public officials, and their shills, followed by the global public exposure and shaming of their illicit deeds. Federal law enforcement groups will even help you do this because you, and they, both have a common goal: to take down crooks. Over the last decade, these procedures have been proven to work. This manual guides you through procedures that work totally, magnificently and effectively against evil people and scumbags! Taking Down Corrupt California Politicians, Dirty Government Agency Executives And Their Tech Oligarch Bosses 4 KEY TACTICS: • We identified potential targets • We developed an investigative theory • We chose the best investigative techniques • We examined issues unique to these proactive corruption investigations • We mitigated special considerations in public corruption investigations IDENTIFYING POTENTIAL TARGETS: • We asked law enforcement and government sources, including inspectors general, and contract compliance, Congress members and oversight personnel who they suspect • We asked citizens; business competitors or political rivals; disgruntled current or former employees; paid informants and cooperating defendants; individuals involved in the illegal activity who are seeking to limit or eliminate their criminal exposure by blowing the whistle on corrupt conduct • We read print, television, and internet media outlets for tips • We examined if each specific target may be identified via credible tips. Does source have a motive to lie? Is there corroboration? • We looked at transactions that were identified or appear suspect without specific targets and used those to identify the entities and individuals involved and make a preliminary assessment of the roles played by these individuals, such as decision makers, knowledgeable actors, unwitting participants, and knowledgeable but uninvolved potential witnesses. We always follow the money ‐ We determine who profited from the transaction and how ‐ Political corruption cases are always about the money! Use modern AI around-the-clock tracking software on the target and their family members to spot money laundering. Each corrupt politician and operative made a profit from their corrupt actions and those benefits can always be traced with modern forensic accounting and tracking AI. The recent leaks from CPA, VC, law firm and lobbyist records make it even easier. The hack-and-disclose foreign actor campaigns (ie: Supernova, Spectre, Solarwinds, etc.) have even added to those disclosures. WE DEVELOPED AN INVESTIGATIVE THEORY: • Theory gives direction to the investigation, but we stay flexible as new facts are leaked or exposed 5 • We make an initial assessment of whether the alleged corrupt conduct appears to be criminal, or whether it is civil or administrative in nature • We then identify the elements needed to prove the crimes • We then try to anticipate possible factual and legal issues and defenses and build our case to rebut or avoid them • We then identify corrupt officials in jurisdictional law enforcement and regulatory agencies who may be stopping investigations in order to protect a Senator or tech oligarch that pays them or promises them a career advance MAIN TYPES OF OUR INVESTIGATIONS: - Historical cases ‐ based on document analysis and witness interviews - Proactive/undercover cases ‐ running gamut from one day and one deal to elaborate and long‐running multi‐transaction and multi‐target operations CHOOSING THE BEST INVESTIGATIVE TECHNIQUES: • We determined which investigative tools to use depending on a variety of factors, including the nature of the alleged violations, the type of investigation our members are conducting, and the resources we had available • We used the normal progression from simple to complex, with information from initial steps leading to more advanced steps, such as search warrants and federally assisted wiretaps • We mix and match our methods as appropriate • Due to the hybrid public/private/citizen investigative team, an “insurance policy” encrypted file set is pre-distributed to journalists, lawyers and Congressional insiders to protect citizen team members NOTES ON SOME OF THE INVESTIGATIVE TECHNIQUES WE USE: • Public Source Information • Internet and media sources • Court filings, including criminal histories, divorces and other lawsuits, bankruptcy filings, and administrative proceedings before agencies such as the SEC, FTC, and insurance and banking regulators 6 • Leaks and hacks • Choicepoint, Autotrack, property records • Financial disclosure forms; Campaign contribution
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages188 Page
-
File Size-