SEE THIS LINK FOR IDEAS ON HOW TO FIGHT BACK: - FIGHT BACK

POLITICAL ATTACKS ON CITIZENS


What Happens To Our Enemies - A Payback Playbook Against Corruption


"When You Political And Corporate Goons Attack Us And Operate Character Assassination Smear Campaigns, This Is What You Can Expect:"


Dear Attackers:

You may work for a sociopath industrialist oligarch. You may actually be one of those sociopath billionaire tech oligarchs. You may only be one of the low-life blogger scum at the bottom of their political pig trough. In any case, you are going down.

You have more money than us but we have more time, dedication, creativity and voting members of the public on our side. We also have the law, ethics and tactical resources on our side.

Because you chose to try to end our lives we are coming after you and we are coming for the rest of your life, the rest of your families life and for 100 years of your legacy in any historical publications.

We play the “long game” for people like you. Everything that will now happen to you will be done 100% legally and the law enforcement and intelligence community will help us do it to you.

Slowly, over time, you will notice your life falling apart. Your business efforts will fail. Your romances will fail. Your investments will fail. Your health will fail. Things will seem to be falling apart, in slow motion, all around you. You must know that YOU brought everything on yourself that is about to happen.

Every member of the public that hears about your deviant, repulsive activities will help make what is going to take place come to fruition.

Here is what you can look forward to:

We will have justice served up with a big cold scoop of vengeance.

You will eventually be bankrupted but that will be the least of your worries.

Take a look at any stock you own, right now. Your stock market valuations are going to dive. Your brand is going to crash. Your profits will start to vaporize. By the time you notice, it will be too late.

Using these proven tactics and methodologies, a task-force of voters, journalists, investigators and forensic experts have caused over 300 billion dollars in losses to corrupt companies and individuals and bankrupted their criminally evil operations with 100% legal procedures. Any member of the public can do this too, on their own, without breaking a single law and with the gratitude of every citizen.

As a target, let’s take a look at the corrupt politicians that work for dirty corporations. Let's deeply examine the Silicon Valley oligarch financiers, their dirty corporate law firms and their media attack squads that have demonstrated a cycle of attack and harm to citizens.

Now we are ripping you, and your kind, a new one.

Signed,

Your Victims

---------------------------------------------------------------------


HERE IS JUST ONE OF THE WAYS GOOGLE AND THE NICK DENTON TABLOIDS (GAWKER, GIZMODO, JALOPNIK, ETC.) PARTNERED TO ATTACK US, AND OTHER MEMBERS OF THE PUBLIC, IN EXCHANGE FOR PAYMENTS FROM WHITE HOUSE STAFF AND SILICON VALLEY OLIGARCHS:


HOW GOOGLE RIGS ELECTIONS AND CHARACTER ASSASSINATION ATTACKS AROUND THE GLOBE

BY ROBERT EPSTEIN

Authorities in the UK have finally figured out that fake news stories and Russian-placed ads are not the real problem. The UK Parliament is about to impose stiff penalties—not on the people who place the ads or write the stories, but on the Big Tech platforms that determine which ads and stories people actually see.

Parliament’s plans will almost surely be energized by the latest leak of damning material from inside Google’s fortress of secrecy: The Wall Street Journal recently reported on emails exchanged among Google employees in January 2017 in which they strategized about how to alter Google search results and other “ephemeral experiences” to counter President Donald Trump’s newly imposed travel ban. The company claims that none of these plans was ever implemented, but who knows?

While U.S. authorities have merely held hearings, EU authorities have taken dramatic steps in recent years to limit the powers of Big Tech, most recently with a comprehensive law that protects user privacy—the General Data Protection Regulation—and a whopping $5.1 billion fine against Google for monopolistic practices in the mobile device market. Last year, the European Union also levied a $2.7 billion fine against Google for filtering and ordering search results in a way that favored their own products and services. That filtering and ordering, it turns out, is of crucial importance.

As years of research I’ve been conducting on online influence has shown, content per se is not the real threat these days; what really matters is (a) which content is selected for users to see, and (b) the way that content is ordered in search results, search suggestions, news feeds, message feeds, comment lists, and so on. That’s where the power lies to shift opinions, purchases, and votes, and that power is held by a disturbingly small group of people.

I say “these days” because the explosive growth of a handful of massive platforms on the internet—the largest, by far, being Google and the next largest being Facebook—has changed everything. Millions of people and organizations are constantly trying to get their content in front of our eyes, but for more than 2.5 billion people around the world—soon to be more than 4 billion—the responsibility for what algorithms do should always lie with the people who wrote the algorithms and the companies that deployed them.

In randomized, controlled, peer-reviewed research I’ve conducted with thousands of people, I’ve shown repeatedly that when people are undecided, I can shift their opinions on just about any topic just by changing how I filter and order the information I show them. I’ve also shown that when, in multiple searches, I show people more and more information that favors one candidate, I can shift opinions even farther. Even more disturbing, I can do these things in ways that are completely invisible to people and in ways that don’t leave paper trails for authorities to trace.

Worse still, these new forms of influence often rely on ephemeral content—information that is generated on the fly by an algorithm and then disappears forever, which means that it would be difficult, if not impossible, for authorities to reconstruct. If, on Election Day this coming November, Mark Zuckerberg decides to broadcast go-out-and-vote reminders mainly to members of one political party, how would we be able to detect such a manipulation? If we can’t detect it, how would we be able to reduce its impact? And how, days or weeks later, would we be able to turn back the clock to see what happened?

Of course, companies like Google and Facebook emphatically reject the idea that their search and newsfeed algorithms are being tweaked in ways that could meddle in elections. Doing so would undermine the public’s trust in their companies, spokespeople have said. They insist that their algorithms are complicated, constantly changing, and subject to the “organic” activity of users.

This is, of course, sheer nonsense. Google can adjust its algorithms to favor any candidate it chooses no matter what the activity of users might be, just as easily as I do in my experiments. As legal scholar Frank Pasquale noted in his recent book “The Black Box Society,” blaming algorithms just doesn’t cut it; the responsibility for what an algorithm does should always lie with the people who wrote the algorithm and the companies that deployed the algorithm. Alan Murray, president of Fortune, recently framed the issue this way: “Rule one in the Age of AI: Humans remain accountable for decisions, even when made by machines.”

Given that 95 percent of donations from Silicon Valley generally go to Democrats, it’s hard to imagine that the algorithms of companies like Facebook and Google don’t favor their favorite candidates. A newly leaked video of a 2016 meeting at Google shows without doubt that high-ranking Google executives share a strong political preference, which could easily be expressed in algorithms. The favoritism might be deliberately programmed or occur simply because of unconscious bias. Either way, votes and opinions shift.

It’s also hard to imagine how, in any election in the world, with or without intention on the part of company employees, Google search results would fail to tilt toward one candidate. Google’s search algorithm certainly has no equal-time rule built into it; we wouldn’t want it to! We want it to tell us what’s best, and the algorithm will indeed always favor one dog food over another, one music service over another, and one political candidate over another. When the latter happens … votes and opinions shift.

Here are 10 ways—seven of which I am actively studying and quantifying—that Big Tech companies could use to shift millions of votes this coming November with no one the wiser. Let’s hope, of course, that these methods are not being used and will never be used, but let’s be realistic too; there’s generally no limit to what people will do when money and power are on the line.

1. Search Engine Manipulation Effect (SEME)
Ongoing research I began in January 2013 has shown repeatedly that when one candidate is favored over another in search results, voting preferences among undecided voters shift dramatically—by 20 percent or more overall, and by up to 80 percent in some demographic groups. This is partly because people place inordinate trust in algorithmically generated output, thinking, mistakenly, that algorithms are inherently objective and impartial.

But my research also suggests that we are conditioned to believe in high-ranking search results in much the same way that rats are conditioned to press levers in Skinner boxes. Because most searches are for simple facts (“When was Donald Trump born?”), and because correct answers to simple questions inevitably turn up in the first position, we are taught, day after day, that the higher a search result appears in the list, the more true it must be. When we finally search for information to help us make a tough decision (“Who’s better for the economy, Trump or Clinton?”), we tend to believe the information on the web pages to which high-ranking search results link.

As The Washington Post reported last year, in 2016, I led a team that developed a system for monitoring the election-related search results Google, Bing, and Yahoo were showing users in the months leading up to the presidential election, and I found pro-Clinton bias in all 10 search positions on the first page of Google’s search results. Google responded, as usual, that it has “never re-ranked search results on any topic (including elections) to manipulate political sentiment”—but I never claimed it did. I found what I found, namely that Google’s search results favored Hillary Clinton; “re-ranking”—an obtuse term Google seems to have invented to confuse people—is irrelevant.

Because (a) many elections are very close, (b) 90 percent of online searches in most countries are conducted on just one search engine (Google), and (c) internet penetration is high in most countries these days—higher in many countries than it is in the United States—it is possible that the outcomes ofupwards of 25 percent of the world’s national elections are now being determined by Google’s search algorithm, even without deliberate manipulation on the part of company employees. Because, as I noted earlier, Google’s search algorithm is not constrained by equal-time rules, it almost certainly ends up favoring one candidate over another in most political races, and that shifts opinions and votes.

2. Search Suggestion Effect (SSE)
When Google first introduced autocomplete search suggestions—those short lists you see when you start to type an item into the Google search bar—it was supposedly meant to save you some time. Whatever the original rationale, those suggestions soon turned into a powerful means of manipulation that Google appears to use aggressively.

My recent research suggests that (a) Google starts to manipulate your opinions from the very first character you type, and (b) by fiddling with the suggestions it shows you, Google can turn a 50–50 split among undecided voters into a 90–10 split with no one knowing. I call this manipulation the Search Suggestion Effect (SSE), and it is one of the most powerful behavioral manipulations I have ever seen in my nearly 40 years as a behavioral scientist.

How will you know whether Google is messing with your election-related search suggestions in the weeks leading up to the election? You won’t.

3. The Targeted Messaging Effect (TME)
If, on Nov. 8, 2016, Mr. Zuckerberg had sent go-out-and-vote reminders just to supporters of Mrs. Clinton, that would likely have given her an additional 450,000 votes. I’ve extrapolated that number from Facebook’s own published data.

Because Zuckerberg was overconfident in 2016, I don’t believe he sent those messages, but he is surely not overconfident this time around. In fact, it’s possible that, at this very moment, Facebook and other companies are sending out targeted register-to-vote reminders, as well as targeted go-out-and-vote reminders in primary races. Targeted go-out-and-vote reminders might also favor one party on Election Day in November.

My associates and I are building systems to monitor such things, but because no systems are currently in place, there is no sure way to tell whether Twitter, Google, and Facebook (or Facebook’s influential offshoot, Instagram) are currently tilting their messaging. No law or regulation specifically forbids the practice, and it would be an easy and economical way to serve company needs. Campaign donations cost money, after all, but tilting your messaging to favor one candidate is free.

4. Opinion Matching Effect (OME)
In March 2016, and continuing for more than seven months until Election Day, Tinder’s tens of millions of users could not only swipe to find sex partners, they could also swipe to find out whether they should vote for Trump or Clinton. The website iSideWith.com—founded and run by “two friends” with no obvious qualifications—claims to have helped more than 49 million people match their opinions to the right candidate. Both CNN and USA Today have run similar services, currently inactive.

I am still studying and quantifying this type of, um, helpful service, but so far it looks like (a) opinion matching services tend to attract undecided voters—precisely the kinds of voters who are most vulnerable to manipulation, and (b) they can easily produce opinion shifts of 30 percent or more without people’s awareness.

At this writing, iSideWith is already helping people decide who they should vote for in the 2018 New York U.S. Senate race, the 2018 New York gubernatorial race, the 2018 race for New York District 10 of the U.S. House of Representatives, and, believe it or not, the 2020 presidential race. Keep your eyes open for other matching services as they turn up, and ask yourself this: Who wrote those algorithms, and how can we know whether they are biased toward one candidate or party?

5. Answer Bot Effect (ABE)
More and more these days, people don’t want lists of thousands of search results, they just want the answer, which is being supplied by personal assistants like Google Home devices, the Google Assistant on Android devices, Amazon’s Alexa, Apple’s Siri, and Google’s featured snippets—those answer boxesat the top of Google search results. I call the opinion shift produced by such mechanisms the Answer Bot Effect (ABE).

My research on Google’s answer boxes shows three things so far: First, they reduce the time people spend searching for more information. Second, they reduce the number of times people click on search results. And third, they appear to shift opinions 10 to 30 percent more than search results alone do. I don’t yet know exactly how many votes can be shifted by answer bots, but in a national election in the United States, the number might be in the low millions.

6. Shadowbanning

Recently, Trump complained that Twitter was preventing conservatives from reaching many of their followers on that platform through shadowbanning, the practice of quietly hiding a user’s posts without the user knowing. The validity of Trump’s specific accusation is arguable, but the fact remains that any platform on which people have followers or friends can be rigged in a way to suppress the views and influence of certain individuals without people knowing the suppression is taking place. Unfortunately, without aggressive monitoring systems in place, it’s hard to know for sure when or even whether shadowbanning is occurring.

7. Programmed Virality and the Digital Bandwagon Effect
Big Tech companies would like us to believe that virality on platforms like YouTube or Instagram is a profoundly mysterious phenomenon, even while acknowledging that their platforms are populated by tens of millions of fake accounts that might affect virality.

In fact, there is an obvious situation in which virality is not mysterious at all, and that is when the tech companies themselves decide to shift high volumes of traffic in ways that suit their needs. And aren’t they always doing this? Because Facebook’s algorithms are secret, if an executive decided to bestow instant Instagram stardom on a pro-Elizabeth Warren college student, we would have no way of knowing that this was a deliberate act and no way of countering it.

The same can be said of the virality of YouTube videos and Twitter campaigns; they are inherently competitive—except when company employees or executives decide otherwise. Google has an especially powerful and subtle way of creating instant virality using a technique I’ve dubbed the Digital Bandwagon Effect. Because the popularity of websites drives them higher in search results, and because high-ranking search results increase the popularity of websites (SEME), Google has the ability to engineer a sudden explosion of interest in a candidate or cause with no one—perhaps even people at the companies themselves—having the slightest idea they’ve done so. In 2015, I published a mathematical model showing how neatly this can work.

8. The Facebook Effect
Because Facebook’s ineptness and dishonesty have squeezed it into a digital doghouse from which it might never emerge, it gets its own precinct on my list.

In 2016, I published an article detailing five ways that Facebook could shift millions of votes without people knowing: biasing its trending box, biasing its center newsfeed, encouraging people to look for election-related material in its search bar (which it did that year!), sending out targeted register-to-vote reminders, and sending out targeted go-out-and-vote reminders.

I wrote that article before the news stories broke about Facebook’s improper sharing of user data with multiple researchers and companies, not to mention the stories about how the company permitted fake news stories to proliferate on its platform during the critical days just before the November election—problems the company is now trying hard to mitigate. With the revelations mounting, on July 26, 2018, Facebook suffered the largest one-day drop in stock value of any company in history, and now it’s facing a shareholder lawsuit and multiple fines and investigations in both the United States and the EU.
Facebook desperately needs new direction, which is why I recently called for Zuckerberg’s resignation. The company, in my view, could benefit from the new perspectives that often come with new leadership.

9. Censorship
I am cheating here by labeling one category “censorship,” because censorship—the selective and biased suppression of information—can be perpetrated in so many different ways.

Shadowbanning could be considered a type of censorship, for example, and in 2016, a Facebook whistleblower claimed he had been on a company team that was systematically removing conservative news stories from Facebook’s newsfeed. Now, because of Facebook’s carelessness with user data, the company is openly taking pride in rapidly shutting down accounts that appear to be Russia-connected—even though company representatives sometimes acknowledge that they “don’t have all the facts.”

Meanwhile, Zuckerberg has crowed about his magnanimity in preserving the accounts of people who deny the Holocaust, never mentioning the fact that provocative content propels traffic that might make him richer. How would you know whether Facebook was selectively suppressing material that favored one candidate or political party? You wouldn’t. (For a detailed look at nine ways Google censors content, see my essay “The New Censorship,” published in 2016.)

10. The Digital Customization Effect (DCE)
Any marketer can tell you how important it is to know your customer. Now, think about that simple idea in a world in which Google has likely collected the equivalent of millions of Word pages of information about you. If you randomly display a banner ad on a web page, out of 10,000 people, only five are likely to click on it; that’s the CTR—the “clickthrough rate” (0.05 percent). But if you target your ad, displaying it only to people whose interests it matches, you can boost your CTR a hundredfold.

That’s why Google, Facebook, and others have become increasingly obsessed with customizing the information they show you: They want you to be happily and mindlessly clicking away on the content they show you.
In the research I conduct, my impact is always larger when I am able to customize information to suit people’s backgrounds. Because I know very little about the participants in my experiments, however, I am able to do so in only feeble ways, but the tech giants know everything about you—even things you don’t know about yourself. This tells me that the effect sizes I find in my experiments are probably too low. The impact that companies like Google are having on our lives is quite possibly much larger than I think it is. Perhaps that doesn’t scare you, but it sure scares me.

The Same Direction

OK, you say, so much for Epstein’s list! What about those other shenanigans we’ve heard about: voter fraud (Trump’s explanation for why he lost the popular vote), gerrymandering, rigged voting machines, targeted ads placed by Cambridge Analytica, votes cast over the internet, or, as I mentioned earlier, those millions of bots designed to shift opinions. What about hackers like Andrés Sepúlveda, who spent nearly a decade using computer technology to rig elections in Latin America? What about all the ways new technologies make dirty tricks easier in elections? And what about those darn Russians, anyway?
To all that I say: kid stuff. Dirty tricks have been around since the first election was held millennia ago. But unlike the new manipulative tools controlled by Google and Facebook, the old tricks are competitive—it’s your hacker versus my hacker, your bots versus my bots, your fake news stories versus my fake news stories—and sometimes illegal, which is why Sepúlveda’s efforts failed many times and why Cambridge Analytica is dust.

“Cyberwar,” a new book by political scientist Kathleen Hall Jamieson, reminds us that targeted ads and fake news stories can indeed shift votes, but the numbers are necessarily small. It’s hard to overwhelm your competitor when he or she can play the same games you are playing.

Now, take a look at my numbered list. The techniques I’ve described can shift millions of votes without people’s awareness, and because they are controlled by the platforms themselves, they are entirely noncompetitive. If Google or Facebook or Twitter wants to shift votes, there is no way to counteract their manipulations. In fact, at this writing, there is not even a credible way of detecting those manipulations.

And what if the tech giants are all leaning in the same political direction? What if the combined weight of their subtle and untraceable manipulative power favors one political party? If 150 million people vote this November in the United States, with 20 percent still undecided at this writing (that’s 30 million people), I estimate that the combined weight of Big Tech manipulations could easily shift upwards of 12 million votes without anyone knowing. That’s enough votes to determine the outcomes of hundreds of close local, state, and congressional races throughout the country, which makes the free-and-fair election little more than an illusion.

Full disclosure: I happen to think that the political party currently in favor in Silicon Valley is, by a hair (so to speak), the superior party at the moment. But I also love America and democracy, and I believe that the free-and-fair election is the bedrock of our political system. I don’t care how “right” these companies might be; lofty ends do not justify shady means, especially when those means are difficult to see and not well understood by either authorities or the public.

Can new regulations or laws save us from the extraordinary powers of manipulation the Big Tech companies now possess? Maybe, but our leaders seem to be especially regulation-shy these days, and I doubt, in any case, whether laws and regulations will ever be able to keep up with the new kinds of threats that new technologies will almost certainly pose in coming years.

I don’t believe we are completely helpless, however. I think that one way to turn Facebook, Google, and the innovative technology companies that will succeed them, into responsible citizens is to set upsophisticated monitoring systems that detect, analyze, and archive what they’re showing people—in effect, to fight technology with technology.

As I mentioned earlier, in 2016, I led a team that monitored search results on multiple search engines. That was a start, but we can do much better. These days, I’m working with business associates and academic colleagues on three continents to scale up systems to monitor a wide range of information the Big Tech companies are sharing with their users—even the spoken answers provided by personal assistants. Ultimately, a worldwide ecology of passive monitoring systems will make these companies accountable to the public, with information bias and online manipulation detectable in real time.

With November drawing near, there is obviously some urgency here. At this writing, it’s not clear whether we will be fully operational in time to monitor the midterm elections, but we’re determined to be ready for 2020.

- Robert Epstein is a senior research psychologist at the American Institute for Behavioral Research and Technology in California. Epstein, who holds a doctorate from Harvard University, is the former editor-in-chief of Psychology Today and has published 15 books and more than 300 articles on internet influence and other topics. He is currently working on a book called “Technoslavery: Invisible Influence in the Internet Age and Beyond.” His research is featured in the new documentary “The Creepy Line.” You can find him on Twitter
- Robert Epstein is a senior research psychologist at the American Institute for Behavioral Research and Technology in California. Epstein, who holds a doctorate from Harvard University, is the former editor-in-chief of Psychology Today and has published 15 books and more than 300 articles on internet influence and other topics. He is currently working on a book called “Technoslavery: Invisible Influence in the Internet Age and Beyond.” His research is featured in the new documentary “The Creepy Line.” You can find him on Twitter @DrREpstein.@DrREpstein.


-------------------------------------------------------------

Dear Public:

They use criminally corrupt and illicit operations designed to steal taxpayer monies and they character assassinate, defame, murder, black-list, and monopolize industries against anyone who speaks out against them.

They formed a business and political manipulation “Cartel” intended to inflict corruption upon the United States Federal Government, The New York State Government and the California State Government, as defined by law under RICO Racketeering Statutes for the purpose of manipulating the value of stock market holdings and controlling political policy decisions. They violated “Treason” laws against the nation.

The criminally corrupt are enabled by criminally corrupt law firms who spend all day operating legal evasion schemes. Public efforts took down the Brobeck law firm and hundreds of others that were doing such crime cover-ups. There are many more needing to be terminated. Wilson Sonsini, Perkins Coi, Covington and Burling are targeted for termination next. Watch the TV show called “Queen Of The South” and watch how the cartel lawyer for the main drug queen is actually running the system. Every lawyer like that needs to be hunted down and 100% legally terminated.

These criminally corrupt people, companies and organizations are now going to experience payback, for their crimes against society, for the rest of their time on Earth. Their historical legacy after they die will remember each of them, in every history book, as: “...political criminals, insider trading mobsters and crony taxpayer abusing scum...”.

Society provides only 3 options when these people try to take your life and your ethical society: 1.) Kill them – This is illegal. 2.) Sue them - While it is easy to sue them for their crimes, their criminally corrupt law firms will only blockade and/or delay such litigation. 3.) Expose them and boycott them – This has proven to work best.

Because they are scumbags who have been accused, by reporters, employees, spouses and tipsters, of very evil bribery, sex abuse, drug deals, political crimes, tax evasion, crony government payola, industry black-lists, money laundering, defamation, libel, slander, misogyny, stock market rigging, election manipulation, global search engine fake news, employee abuse and other horrific crimes against society. Exposing them, and their enablers, is proven method to take them down. A person, company or organization who commits crimes has always, according to historical forensics data, been indicative as only just one small part of a deeply infected body which is fully corrupt and one which requires termination.

The take-down effort must last for the rest of their lives. It must not just be a passing fad inspired by a single news expose’. Society must never forget about what they did and never forgive them for attacking and damaging you, as a citizen, and for damaging and abusing society.

You will learn how to wipe out their eco-system. You will investigate, expose and demand prosecution of their corrupt: 

A.) Law Firm Corporations
B.) CPA Firms
C.) Investment Banks
D.) Crony Politicians
E.) Fake Money Laundering ‘Charities’
F.) False Front Stock Market Accounts
G.) Covert Family Trust Funds And Shell Corporations
H.) Internet Search Engine Manipulation Services

I.) PR And Advertising Agency News Cover-Up Services
J.) Offshore Money Laundering Services
K.) And Every Other Intermediary Money Laundering Conduit...

There are now massive free database software systems the public can use to build your collaborative case files. CERN in Switzerland uses billions of dollars of free global database software that you can use too. You will use the web to create shared public collaboration peer-to-peer crime interdiction databases. The databases have every piece of information about the bad guys that was ever created, ie: all of their addresses, account numbers, tax records, bank accounts, dating site records, phone numbers, fax numbers, IMEI device records, IP addresses, device serial numbers, every lover they cheated on, service calls, drug deals, hookers, rent boys, Uber and Lyft trip addresses, neighbors, GPS records, etc. All of this information can be legally acquired by the public. These narcissistic criminals put most of it out on the web themselves. The public has already built their own versions of Palantir, XKEYSCORE, and other CSI database tools. You must now use these tools to end corruption.

If you have the funds, you can hire ex-FBI, CIA, NSA, GCHQ and other top intelligence and crime interdiction experts. They have ways of watching the bad guys every second of every day. Many of them are already doing it out of a sense of public service and you can find them on Voat.co, Reddit.com, 4Chan and tens of thousands of online web sleuth and citizen investigator sites.

Did you know that WiFi and the ceramic objects around you can can make it look like there are not even walls where the bad guys are right now? Science has created a new world in which technology can see through walls and there is, LITERALLY, no place crooks can hide!

Face recognition can also source up every image of them that was on security cameras, store cameras, restaurant cameras, Google and Bing image databases, social networks, dating sites, traffic cameras, hotel and motel cameras and everything that has ever recorded their face; which is public domain. Everything they are connected to will be connected to them and psychologically analyzed. A map of every “secret” meeting they had each day can now be computer generated in minutes.

If these political crooks ever, for the rest of their life, cheat on taxes, take money off-the-books, lie on an application, get arrested, get sued, buy drugs, buy sex, cheat, hide money, use off-shore conduits, set-up an illicit trust fund or shell corporation, get an STD, lie on a dating site, abuse or extort an employee, abuse a co-worker, plagiarize, break the law, run a real estate scam, hide insider stock trading, provide political campaign services without filing detailed and accurate FEC disclosures, support a political campaign, spend or receive any money that they do not report, etc… THE PUBLIC CAN NOW CATCH THEM!

There is now no place on Earth a corrupt politician or their corrupt financier can hide from the crowd-sourced investigations. The public now has investigators online across the globe. The public can now count on friends in Congress, journalists, law enforcement and the intelligence community to help taxpayers never let the corrupt out of their sights!

You, as a PUBLIC INVESTIGATOR never have to do creepy illicit things, like they do, so you have nothing to worry about.

THEY have PLENTY to worry about. These tactics only work on Bad Guys like them!

Each of these crooks are, today, sitting at the edge of the same precipice that BILL COSBY, FOREX, SOLYNDRA, ABOUND SOLAR, A123, ENERDEL, AMY PASCAL, E.F.HUTTON, RADIO SHACK, ENRON, MCI WORLDCOM, EASTERN AIRLINES, STANDARD OIL, ERIC HOLDER, STEVEN CHU, ARTHUR ANDERSON, DELOREAN, PETS.COM, BEAR STEARNS, BEATRICE FOODS, HEALTHSOUTH, ALLEN STANFORD, TYCO, LANCE ARMSTRONG, PARMALAT, BANINTER, HSBC, GLOBAL CROSSING LTD., BLACKBERRY, HIH INSURANCE, IMCLONE, DEUTSCHE BANK (SPY CASE), URBAN BANK, JEROME KERVIEL, BARCLAYS BANK, BRE-X, FISKER, BARINGS BANK, PATRICIA DUNN, SIEMENS AG, PETROBAS, FERNANDO MARCOS, KELLOG BROWN AND ROOT, BAE SYSTEMS, KERRY KHAN, ALCATEL-LUCENT SA, PRESIDENT RICHARD NIXON, HARVEY WEINSTEIN, ERIC SCHNIDERMAN, JAMES COMEY...and many, many more, sat at just before they slid down their filthy funnels straight to hell. We all hope they enjoy the ride! Our public efforts took those players down! If the crooks think they are immune, they are 100% wrong! Google, Facebook, Twitter, Kliener Perkins, Snapchat, Musk, and the rest of the Silicon Valley Cartel should expect a life-time of investigations.

Here are a few of the thousands of 100% legal methods for wiping out creeps like them.

These corrupt politicians, the Silicon Valley Mafia, their political shills and their crony companies can be terminated from the comfort of any voter’s living room.

This only works on criminals and the corrupt.

The “good guys” have nothing to fear.

Our goal is to get over 300 million voters working on these efforts ASAP:


Step-By-Step Termination Instructions For The Public To Use On Corrupt Targets:


- Make sure your interdiction of their illicit deeds lasts the rest of their life. Make it your hobby and engage in it every month. Put it on your calendar to have a monthly action day.

- Bankrupt their corrupt companies by contacting EVERY single advertising director for EVERY company that advertises with them to show them the evidence and encourage them to stop advertising with the suspect under threat of boycott.

- List out every past employee of the tabloid that was used to attack the taxpayers.

- Bankrupt their corrupt companies by contacting EVERY single employee that works for them to show them the evidence and encourage them to quit.

- Bankrupt their corrupt companies by contacting EVERY single investor that funds them to show them the evidence and encourage them to divest.

- Use “Espionage Journalism” like Project Veritas does. Sneak in to the bad guys operation using your cell phone as a broadcast camera and film the crooks doing crooked things.

- Contact billionaire’s (ie: Peter Thiel, Larry Ellison, etc.) to get them to sponsor a RICO, or other kind of lawsuit, against these corrupt parties. Use proxies to sue the corrupt (ie: Get Thiel to pay for some other guy to sue Gawker for you). The Legal Proxy is one of your biggest assets. You can get billions of dollars of lawsuits executed against corrupt mega giants. Make Hulk Hogan be YOUR proxy. He takes all of the risk and YOU get to see a criminally corrupt oligarch (ie: Nick Denton and Gawker/Gizmodo Media) ground into the dirt. Read the news daily and PACER.GOV and FIND YOUR PROXY!

- Bankrupt their corrupt companies by contacting EVERY user of their company, via mass media and personal out-reach, to show them the evidence and encourage them to cancel their subscriptions and ‘poison’ their data by filling their profiles with fantasy data.

- See the movie: “DARK MONEY’ ! Understand what “Dark Money” is. Then cut off every possible source of the bad guys “Dark Money and expose every party involved in Dark Money schemes.

- Write every government agency with a short, concise, detailed complaint letter and say IN YOUR LETTER that “THIS LETTER IS ON FOIA PUBLIC RECORD”. These days, all government documents are leaked, hacked or FOIA’d so assume the public will be reading your letter. Compose your letter as if you were writing it for the audience of the Jerry Springer show so that the public will be interested in it, excited about it and amused by it. This will help the public help you to push your issue. Audacious controversy gets traction.

- Bankrupt their corrupt companies by contacting EVERY single member of Congress and regulatory agencies to show them the evidence and demand, in writing, a federal investigation.

- Bankrupt their corrupt companies by exposing corrupt sources of supply to the news and the public; ie: Elon Musk uses “blood cobalt” mines in the Congo which rely on child labor and mercenaries to operate the cobalt mineral mines.

- Expose the covert sex cults (ie: Pizza Gate, NXIUM, Burning Man, Mission Control, Power Exchange, etc.) that they frequent.

- Look on Linkedin and other databases to contact their former interns to see if they sexually or mentally abused that intern and help that intern find lawyers (ie: Lawless Firm, AllRed, etc.).

- All of the data of famous corrupt persons and corporations has been hacked and acquired by many, many parties over the last decade. Watch for it to get leaked on the web or go search the ICIJ, Wikileaks and related databases for keywords about your targets. Expose what you find to the public. Cross reference what you find with the Palantir, Taleo, Bitcoin Trace, PayPal Trace, VISA Trace, D&B Insider, Gust-Scan, etc. commercially available databases and you will have an even more powerful search than the NSA’s XKEYSCORE tool.

- Expose the trust funds, shell corporations and real estate contracts that they and their family own and make sure the IRS and SEC knows about those slush fund pots. Find all of their insider trading payola scams and expose them.

- Expose every reporter and ‘stock analyst’ that is actually a shill for the corrupt. Call them out by name in press releases and your own news articles. Demand to see their financial records if they claim to have never been paid by the corrupt entity in question.

- Expose the racist, tribal, misogynist organizations that the majority of their executive hires are part of.

- Investigate them and share your investigation data, from public data resources, on databases. All of their addresses, account numbers, tax records, bank accounts, dating site records, phone numbers, fax numbers, IMEI device records, IP addresses, device serial numbers, etc. are on public record.

- As Comey, et al; proved, there are crooks at the FBI...but there will always be, at least, one Elliot Ness kind of good guy at the FBI. DO report your findings to the FBI, in writing, but report to EVERY main, and regional FBI office, in writing, with a carbon copy to the media. It only takes one good FBI agent to get an official FBI case going. The same goes for the SEC, The EU and the CFTC.

- These incredibly abusive people have an inordinate number of divorce lawsuits for abusive behavior. Showcase the most revealing text from those abusive divorce court filings.

- Write ‘Request For Prosecution’ requests to every major law enforcement agency and send copies of those requests to every other law enforcement agency and independent news reporters.

- If they run for office, confront them (legally) at public speaking events and hand out one page fliers about their crimes to the public at these events. Name their crony financial backers out loud at these events.

- File charges with the FEC for campaign finance violations. Ie: In one year Google reported a million in campaign contribution cash to one party but they actually provided many billions of campaign contributions via search engine rigging and perception manipulation services. Report that to the FEC and demand to know what the FEC is doing about it. Ask the FEC, in writing, every month until you get an answer in writing.

- Don’t just ‘follow the money’. Make fun charts and diagrams of the illicit funds routes and mass distribute those graphics.

- Meme them forever.

- Uncover every: illicit sex partner and who they cheated on; drug deals; hooker; rent boy; Uber and Lyft trip route; neighbors who complained about them; GPS records, social media posting that hinted at a political agenda, etc. All of this information can be legally acquired. They put most of it out on the web themselves and agreed to let Facebook, Uber and Google sell the data.

- Search every face recognition database with automated search tools. They agreed to allow their image on databases for security cameras, Walmart cameras, restaurant cameras, Google and Bing image databases, social networks, dating sites, traffic cameras, hotel and motel cameras and everything that has ever recorded their face; which is public domain. Check out what they were doing at each place they were recorded.

- Report every illicit deed done by the corrupt to large Congressional, news writer, social network and voter mass distribution systems.

- Learn ‘Corporate Veil Protection Strategies’ and How to Bust Them With Doxing And Public Lawsuits’.

- Break their cover-ups. Carbon copy every Inspector General (IG), reporter and social media resource you can find. Never allow only a few people to be the only ones that know what you uncovered. Tell everyone and never stop finding new people to tell. Use the “Streisand Effect”.

- If they ever, for the rest of their life: cheat on taxes, take money off-the-books, lie on an application, get arrested, get sued, buy drugs, buy sex, cheat, hide money, use off-shore conduits, set-up an illicit trust fund or shell corporation, get an STD, lie on a dating site, abuse or extort an employee, abuse a co-worker, plagiarize, break the law, run a real estate scam, hide insider stock trading, provide political campaign services without filing detailed and accurate FEC disclosures, support a political campaign, spend or receive any money that they do not report, etc.; THEN YOU EXPOSE THEM AND THE ILLICIT ACTIONS THEY TOOK.

- Educate yourself by typing this phrase into the top 5 non-Google search engines: “How To Be A Private Investigator” and read all of the results. Try more searches, like: “Investigation methods” or “Background check methods” or “Investigate a politician”, etc. There are thousands of other legal techniques in addition to those few listed here. They all work if you are persistent.

- Learn how to put a covert media alarm in ‘Corporate Poison Pills’ and find ‘Criminal Back-Dating’.

- Track the spouses finances of corrupt Senators and expose the crony deals to the world.

- Make certain that you find every other voter and community group who might help you. Support their efforts and share what you have uncovered with them. Use the web to guarantee that there is no place on Earth they can hide from justice. Work to mesh investigators, Congress, journalists, law enforcement, intelligence community, voters and your friends and family to never let them out of your sights!

- Use social media, press releases, direct mail, PR and publicity stunts to seek out and join every other person or group, in the world, who also hates corruption. Share these notes with them and ask them to “pass them around...”


Hundreds of corrupt public officials have now been terminated since the main public web corruption purge efforts began in 2009. The corrupt are fools if they think they are immune. There is no “invisible cloak of corruption”. Every single day a shocking new set of revelations ends the career or some, now notorious, well known political figure.

If the corrupt think they hid their deeds in private texts, whispered restaurant conversations, secret home servers, the back seats of Uber and Lyft, closed doors in the back room or Cayman Islands hotel rooms THEY COULD NOT BE MORE MISTAKEN!

Every trust fund that they and their family own has been tracked.

Every Goldman Sachs, JP Morgan, Wells Fargo, and other I-Bank account they, and their corrupt family own, has been tracked and cross referenced to every political action they participated in that resulted in valuation increases to their crony insider accounts.

Every stock market account they and their family own has been tracked and cross referenced to every political action they took that might have increased the valuation of those stocks. Every sale of stock they engaged in is being analyzed for “pump-and-dump” illegality. ICIJ and Wikileaks still have tens of thousands of investigative documents that need to be reviewed. Volunteer to help find keywords and incrimination data in those records.

Every dirty off-shore account in Switzerland, the Caymans, Brazil and all of their other hiding places has been tracked and data-based on fully resourced online tracking databases.

Every person these criminal politicians ever communicated with on a dating site is being contacted. Any abuse, sexual misdeeds, sexting, porno pictures and lies are being documented and reported. Dating sites sell their user data and all of their server records, since inception, are available to the public, investigators and law enforcement with a single credit card purchase thanks to Facebook, Google and Axciom. They caught two different NY AG’s by reading their Match.com messages.

The Russians, Chinese, activists and bored teens have been entering the electronic device back doors on every router and consumer electronics device for decades and vacuuming up every record and file on every corporate and government network. Now they sell, or freely provide, those records to every public-interest law suit litigant to help them sue corrupt politicians and their financiers.

If they ever beat or abused a woman or child, it will be uncovered and reported just like Harvey, Huma’s Weiner and the New York AG were outed!

Hundreds of thousands of new non-main-stream, non-party-controlled, non-corporate owned news outlets have been created and they now reach the majority of the voting public. Hundreds of thousands of new voters are invited to these sites every hour, around the world. These news sites are exposing them and exposing the “Main Stream Fake News” that the corrupt thought they controlled.

There is no under-age sex scheme that they are involved in that will not be found out and exposed.

There is no male or female prostitute that they used that will not be found out and exposed.

There are no abuse charges in your divorce filings and other documents that will not be uncovered.

There is no intern that they sexually abused that will not be protected when they tell their story about them.


TIPS FOR THE TAXPAYING PUBLIC:

For major anti-corruption lawsuit efforts we had to find the hidden money that corrupt Silicon Valley political financing billionaires had spent billions of dollars to hide. How hard was it to peel the skins off of Google’s onion? Thanks to modern law enforcement and intelligence technology, it was not hard at all.

The fluency and practice of piercing the corporate veil & alter ego liability shields of political manipulation bosses such as George Soros, Eric Schmidt, Larry Page, Elon Musk and their colleagues, has become increasingly important in recent years due to changes in the law and business cycles.

As more small taxpayers need to help hunt down the corrupt, it is increasingly critical for taxpayers to be fluent with the cutting-edge techniques and best tools to pierce & dissolve the corporate veil, as well as determine alter ego liability. The growing number of bankruptcies, foreclosures, and judgments has dramatically increased the need for forensic experts proficient in the science of effective judgment enforcement and asset recovery against the Silicon Mafia collection of corrupt California tech companies.

Ie: Any corrupt Department of Energy employer or contractor can now be sued, lose their home and have the courts transfer all of their assets away.

It is critical for action groups to understand the best strategies to suck dry the corporate assets in judgments for cases and how to sue individual State and Federal workers.

Any member of the public can now begin piercing of the Google corporate veil, navigating complex determinations on corporate liability, strategies involving legal alter ego, and breaking open both corporate & personal liability with your home computer.

We use tools that not only include, but exceed, the capabilities of XKEYSCORE, Palantir, Taleo, Bitcoin Trace, PayPal Trace, VISA Trace, D&B Insider, Gust-Scan, and hundreds of other executive asset tracking and intelligence engines.


You, as a voter, need to learn how to:

Expose Veil Protection Strategies and How to Bust Through Them

Expose Liabilities for the Obligations of the Entity That Wilson Sonsini Created For Google & Tesla and How We Busted Through Them In Less Than 24 Hours

Employ Best Practices in Litigating the Veil Piercing Case in a Gawker Media-Like Laundering Operation

Snag The Corrupt With Veil Piercing Tactics & Fraudulent Conveyances With Sting Operations

Inform The Corrupt About How Dire Their Situations Are In the New Information Age

Expose Corporate Entities Used to Diminish Liability And Use Them As Evidence Against The Corrupt

Understand the Alter Ego of Insane Silicon Valley Tech Billionaires

Run Reverse Veil Piercing Investigations

Connect the Separate "Personalities" of the Corporation & Shareholders

From the underlying substantive law to practical aspects of asset protection planning (i.e., what works and what does not), new groups are teaching the public everything they need to know about dissolving corporate and executive asset protection like butter on a frying pan.

From Gawker to Enron and from Solyndra to Nigerian War Lords, From Steven Chu and Eric Holder to Brian Goncher and Steve Jurvetson; taxpayers are now only a few mouse clicks away from the deepest family trust fund hide-aways and the darkest sexual services transactional relationship disclosure.

The public can now see how to uncover assets from tort plaintiffs, lenders, government entities and other creditors, hidden in thousands of corporations, partnerships, LLCs and offshore entities. Online web sleuths who are distinguished CIA-FBI-NSA-Class staff will teach you specific approaches and solutions, including the most effective tactics, best practices, and the cutting-edge strategies to peel an Eric Schmidt or a John Doerr veil open like a Taco, 100% legally.

The public is learning various ways, from the very simple to the very sophisticated, to expose specific assets of State and Federal corrupt employees and illicit contractors: houses, bank and brokerage accounts, private islands, billionaire bunkers, hookers with billionaires homes in their names, rent-boy services, rental real estate, businesses and professional practices and retirement plans. Sue Obama? Yes! He is now a private, corrupt citizen!

Every taxpayer is now able to easily acquire the most effective strategies and latest law in destroying all corrupt asset protection for the criminal titans.

You, as a taxpayer, can learn and use these methods:

Practical Goals and Limitations of Asset Protection – Google bosses were never as safe as their consultants told them they were

Picking the Right Structure to Trick an Oligarch Into Incriminating himself

Understanding Fraudulent Transfers and How To Get Their Relatives To Disclose Them

Effectively Planning for Possible Challenges From Their Corrupt CPA’s

Busting Multi-Entity Structures For The Fake Sheathing of Business Assets

Dealing with Successor Liability; Get The Money From The Next Guy

Using Check-the-Box Election As Incrimination Evidence

Charging Order Protection and Tearing It Apart

Best Practices on Picking the Right Jurisdiction

Single Member LLCs, Poison Pills and Criminal Back-Dating

Every bad and immoral thing the corrupt did yesterday will be on the lead stories in the Wall Street Journal tomorrow.

Use this document as your check-list. Try to accomplish everything on it against the most corrupt entity you see in the news. It does not matter how big they are. These tactics work on a corrupt entity of ANY size!

Not only is this effort 100% legal, it is your moral obligation to undertake it. Even if you don’t care about the moral issues, you should care about the fact that your personal assets will increase and the quality of your life will improve as this program increases in effectiveness.

In “The 25% Revolution—How Big Does a Minority Have to Be to Reshape Society?” David Noonan describes how this sort of program by a committed few can influence the many and sweep away social conventions. In fact MASS, PEER-TO-PEER, CROWD-SOURCED POLITICAL CORRUPTION INTERDICTION has already moved to the influence of many.

Social change—from evolving attitudes toward gender and marijuana to the rise of Donald Trump to the emergence of the Black Lives Matter and #MeToo movements—is a constant. It is also mysterious, or so it can seem. For example, “How exactly did we get here?” might be asked by anyone who lived through decades of fierce prohibition and now buys pot at one of the more than 2,000 licensed dispensaries across the U.S.
A new study about the power of committed minorities to shift conventional thinking offers some surprising possible answers. Published this week in Science, the paper describes an online experiment in which researchers sought to determine what percentage of total population a minority needs to reach the critical mass necessary to reverse a majority viewpoint. The tipping point, they found, is just 25 percent. At and slightly above that level, contrarians were able to “convert” anywhere from 72 to 100 percent of the population of their respective groups. Prior to the efforts of the minority, the population had been in 100 percent agreement about their original position.

This is not about a small elite with disproportionate resources,” says Arnout van de Rijt, a sociologist at Utrecht University in the Netherlands who studies social networks and collective action, and was not involved in the study. “It's not about the Koch brothers influencing American public opinion. Rather, this is about a minority trying to change the status quo, and succeeding by being unrelenting. By committing to a new behavior, they repeatedly expose others to that new behavior until they start to copy it.”

The experiment was designed and led by Damon Centola, associate professor in the Annenberg School of Communications at the University of Pennsylvania. It involved 194 people randomly assigned to 10 “independent online groups,” which varied in size from 20 to 30 people. In the first step group members were shown an image of a face and told to name it. They interacted with one another in rotating pairs until they all agreed on a name. In the second step Centola and his colleagues seeded each group with “a small number of confederates…who attempted to overturn the established convention (the agreed-on name) by advancing a novel alternative.”

For the second step, as Centola explains it, the researchers began with a 15 percent minority model and gradually increased it to 35 percent. Nothing changed at 15 percent, and the established norm remained in place all the way up to 24 percent.

The magic number, the tipping point, turned out to be 25 percent. Minority groups smaller than that converted, on average, just 6 percent of the population. Among other things, Centola says, that 25 percent figure refutes a century of economic theory. “The classic economic model—the main thing we are responding to with this study—basically says that once an equilibrium is established, in order to change it you need 51 percent. And what these results say is no, a small minority can be really effective, even when people resist the minority view.” The team’s computer modeling indicated a 25 percent minority would retain its power to reverse social convention for populations as large as 100,000.

But the proportion has to be just right: One of the groups in the study consisted of 20 members, with four contrarians. Another group had 20 members and five contrarians—and that one extra person made all the difference. “In the group with four, nothing happens,” Centola says, “and with five you get complete conversion to the alternative norm.” The five, neatly enough, represented 25 percent of the group population. “One of the most interesting empirical, practical insights from these results is that at 24 percent—just below the threshold—you don’t see very much effect,” adds Centola, whose first book, How Behavior Spreads: The Science of Complex Contagions, comes out this month. “If you are those people trying to create change, it can be really disheartening.” When a committed minority effort starts to falter there is what Centola calls “a convention to give up,” and people start to call it quits. And of course members have no way to know when their group is just short of critical mass. They can be very close and simply not realize it. “So I would say to Black Lives Matter, #MeToo and all of these social change movements that approaching that tipping point is slow going, and you can see backsliding. But once you get over it, you’ll see a really large-scale impact.”

Real-life factors that can work against committed minorities—even when they reach or exceed critical mass—include a lack of interaction with other members, as well as competing committed minorities and what’s called “active resistance”—which pretty well describes the way many people in 2018 respond to political ideas with which they disagree. But even with such obstacles, Centola says the tipping point predicted in his model remains well below 50 percent.

Certain settings lend themselves to the group dynamics Centola describes in his study, and that includes the workplace. “Businesses are really great for this kind of thing,” he says, “because people in firms spend most of their day trying to coordinate with other people, and they exhibit the conventions that other people exhibit because they want to show that they’re good workers and members of the firm. So you can see very strong effects of a minority group committed to changing the culture of the population.”

The other environment in which the 25 percent effect is particularly evident, Centola says, is online—where people have large numbers of interactions with lots of other people, many of them strangers. This raises some tricky questions: Can a bot stand in for a member of a committed minority? And can a committed minority be composed of bots and the real people the bots influence, so that bots are actually driving the change? According to Centola, “In a space where people can’t distinguish people from bots, yes. If you get a concerted, focused effort by a group of agents acting as a minority view, they can be really effective.”

You owe it to society, and yourself, to fight against political and corporate corruption.

Taxpayers cannot afford to let corrupt corporate bullies win!

-------------------------------------------------------------------

This site was created with the help of FBI, CIA, DOJ, Police and Congressional experts in order to confirm that all of these methods are legal and effective.

READ MORE:


Peter Eigen: How to expose the corrupt | TED …

Some of the world's most baffling social problems, says Peter Eigen, can be traced to systematic, pervasive government corruption, hand-in-glove with global companies. In his talk, Eigen describes the thrilling counter-attack led by his organization, Transparency International.

  cached proxied

Latest News - Exposing the Truth about Corrupt

The March 24th and 27th articles point to a serious amount of potential corruption in the EPSO. First, you report that the County Attorney (Amy Folsom) recommends the

  cached proxied

Peter Eigen: How to expose the corrupt | TED Talk - TED.com

Let me talk about my own experience. I used to work as the director of the World Bank office in ...

  cached proxied

Peter Eigen: How to expose the corrupt - YouTube

http://www.ted.com Some of the world's most baffling social problems, says Peter Eigen, can be ...

  cached proxied

Sidney Powell – Author of the Bestseller Licensed …

“That our government is corrupt is the only conclusion. This book helps the people understand the nature of this corruption—and how it is possible for federal prosecutors to …

  cached proxied

Why exposing and preventing corruption is important - Independent ...

Why exposing and preventing corruption is important. Undetected and unchecked corruption in the public sector can cause serious damage including:.

  cached proxied

Doxing - Wikipedia

Doxxing (from dox, abbreviation of documents) or doxing is the Internet-based practice of researching and broadcasting private or identifiable information (especially personally identifiable information) about an individual or organization.

  cached proxied

dox – Wiktionary

 Alternative forms . doxx; Etymology . Phonetic respelling of docs, which is a short form of documents. Pronunciation . Rhymes: -ɒks; Noun . dox pl (plural only)

  cached proxied

How to Dox Anyone « Null Byte :: WonderHowTo

Doxing is the act of finding one's personal information through research and discovery, with little to no information to start with. You may have ...

  cached proxied

How To Find Someones Online Identity - DOX Tutorial - YouTube

Hochgeladen von The Hacker ShowDOX - An Internet slang word for finding and releasing personally identifiable information such ...

cached proxied

I was taught to dox by a master | The Daily Dot

It makes you feel vulnerable and on-edge, knowing that anyone has the details ... While doxers sometimes use hacking or deception to uncover ...

  cached proxied

18th International Anti-Corruption Conference: Plenary 3: Exposing ...

The role of media and particularly of investigative journalists have transformed the fight against corruption: leaks, whistleblowers, cross-border ...

  cached proxied