BECOME YOUR OWN PRIVATE FBI!

SHARE THIS WITH YOUR SOCIAL MEDIA - Share

YOU Can Wipe Out Corruption:

 

Here are 100% legal methods for wiping out the Silicon Valley Mafia, their political shills and their crony companies:

- Make sure your interdiction of their illicit deeds lasts the rest of their life. Make it your hobby and engage in it every month. Put it on your calendar to have a monthly action day.

- Bankrupt their corrupt companies by contacting EVERY single advertising director for EVERY company that advertises with them to show them the evidence and encourage them to stop advertising with the suspect under threat of boycott.

- Bankrupt their corrupt companies by contacting EVERY single employee that works for them to show them the evidence and encourage them to quit.

- Bankrupt their corrupt companies by contacting EVERY single investor that funds them to show them the evidence and encourage them to divest.

- Contact billionaire’s (ie: Peter Thiel, Larry Ellison, etc.) to get them to sponsor a RICO, or other kind of lawsuit, against these corrupt parties. Use proxies to sue the corrupt (ie: Get Thiel to pay for some other guy to sue Gawker for you)

- Bankrupt their corrupt companies by contacting EVERY user of their company, via mass media and personal out-reach, to show them the evidence and encourage them to cancel their subscriptions and ‘poison’ their data by filling their profiles with fantasy data.

- Bankrupt their corrupt companies by contacting EVERY single member of Congress and regulatory agencies to show them the evidence and demand, in writing, a federal investigation.

- Bankrupt their corrupt companies by exposing corrupt sources of supply to the news and the public; ie: Elon Musk uses “blood cobalt” mines in the Congo which rely on child labor and mercenaries to operate the cobalt mineral mines.

- Expose the covert sex cults (ie: Pizza Gate, NXIUM, Burning Man, Mission Control, Power Exchange, etc.) that they frequent.

- Look on Linkedin and other databases to contact their former interns to see if they sexually or mentally abused that intern and help that intern find lawyers (ie: Lawless Firm, AllRed, etc.).

- All of the data of famous corrupt persons and corporations has been hacked and acquired by many, many parties over the last decade. Watch for it to get leaked on the web or go search the ICIJ, Wikileaks and related databases for keywords about your targets. Expose what you find to the public. Cross reference what you find with the Palantir, Taleo, Bitcoin Trace, PayPal Trace, VISA Trace, D&B Insider, Gust-Scan, etc. commercially available databases and you will have an even more powerful search than the NSA’s XKEYSCORE tool.

- Expose the trust funds, shell corporations and real estate contracts that they and their family own and make sure the IRS and SEC knows about those slush fund pots. Find all of their insider trading payola scams and expose them.

- Expose every reporter and ‘stock analyst’ that is actually a shill for the corrupt. Call them out by name in press releases and your own news articles. Demand to see their financial records if they claim to have never been paid by the corrupt entity in question.

- Expose the racist, tribal, misogynist organizations that the majority of their executive hires are part of.

- Investigate them and share your investigation data, from public data resources, on databases. All of their addresses, account numbers, tax records, bank accounts, dating site records, phone numbers, fax numbers, IMEI device records, IP addresses, device serial numbers, etc. are on public record.

- As Comey, et al; proved, there are crooks at the FBI...but there will always be, at least, one Elliot Ness kind of good guy at the FBI. DO report your findings to the FBI, in writing, but report to EVERY main, and regional FBI office, in writing, with a carbon copy to the media. It only takes one good FBI agent to get an official FBI case going. The same goes for the SEC, The EU and the CFTC.

- These incredibly abusive people have an inordinate number of divorce lawsuits for abusive behavior. Showcase the most revealing text from those abusive divorce court filings.

- Write ‘Request For Prosecution’ requests to every major law enforcement agency and send copies of those requests to every other law enforcement agency and independent news reporters.

- If they run for office, confront them (legally) at public speaking events and hand out one page fliers about their crimes to the public at these events. Name their crony financial backers out loud at these events.

- File charges with the FEC for campaign finance violations. Ie: In one year Google reported a million in campaign contribution cash to one party but they actually provided many billions of campaign contributions via search engine rigging and perception manipulation services. Report that to the FEC and demand to know what the FEC is doing about it. Ask the FEC, in writing, every month until you get an answer in writing.

- Don’t just ‘follow the money’. Make fun charts and diagrams of the illicit funds routes and mass distribute those graphics.

- Meme them forever.

- Uncover every: illicit sex partner and who they cheated on; drug deals; hooker; rent boy; Uber and Lyft trip route; neighbors who complained about them; GPS records, social media posting that hinted at a political agenda, etc. All of this information can be legally acquired. They put most of it out on the web themselves and agreed to let Facebook, Uber and Google sell the data.

- Search every face recognition database with automated search tools. They agreed to allow their image on databases for security cameras, Walmart cameras, restaurant cameras, Google and Bing image databases, social networks, dating sites, traffic cameras, hotel and motel cameras and everything that has ever recorded their face; which is public domain. Check out what they were doing at each place they were recorded.

- Report every illicit deed done by the corrupt to large Congressional, news writer, social network and voter mass distribution systems.

- Learn ‘Veil Protection Strategies’ and How to Bust Them’.

- Break their cover-ups. Carbon copy every Inspector General (IG), reporter and social media resource you can find. Never allow only a few people to be the only ones that know what you uncovered. Tell everyone and never stop finding new people to tell. Use the “Streisand Effect”.

- If they ever, for the rest of their life: cheat on taxes, take money off-the-books, lie on an application, get arrested, get sued, buy drugs, buy sex, cheat, hide money, use off-shore conduits, set-up an illicit trust fund or shell corporation, get an STD, lie on a dating site, abuse or extort an employee, abuse a co-worker, plagiarize, break the law, run a real estate scam, hide insider stock trading, provide political campaign services without filing detailed and accurate FEC disclosures, support a political campaign, spend or receive any money that they do not report, etc.; THEN YOU EXPOSE THEM AND THE ILLICIT ACTIONS THEY TOOK.

- Educate yourself by typing this phrase into the top 5 non-Google search engines: “How To Be A Private Investigator” and read all of the results. Try more searches, like: “Investigation methods” or “Background check methods” or “Investigate a politician”, etc. There are thousands of other legal techniques in addition to those few listed here. They all work if you are persistent.

- Learn how to put a covert media alarm in ‘Corporate Poison Pills’ and find ‘Criminal Back-Dating’.

- Make certain that you find every other voter and community group who might help you. Support their efforts and share what you have uncovered with them. Use the web to guarantee that there is no place on Earth they can hide from justice. Work to mesh investigators, Congress, journalists, law enforcement, intelligence community, voters and your friends and family to never let them out of your sights!

 

SHARE THIS WITH YOUR SOCIAL MEDIA - Share

nhji8jHT44Fooophn

Author: nhji8jHT44Fooophn

Stay in touch with the latest news and subscribe to the RSS Feed about this category

Comments (0)

Comments are closed


No attachment



You might also like