Character Assassin David Brock from Media Matters Was Behind Lisa Bloom Effort To Bring Forward Sexual Harassment Claims Against Trump
By VICTIMS GROUP on -, - - NEWS
By VICTIMS GROUP on -, - - NEWS
As the recent elections and Supreme Court nominations have shown: smear tactics, character assassination programs, vendetta attacks, reprisal and revenge media coordination and hatchet jobs are the main-stay of certain politicians. While this may be accepted between millionaire candidates and Silicon Valley oligarchs, no citizen can survive multi-million dollar state-sponsored attacks like this. Our whistle-blower and crime-reporting victims suffered $30 million dollars (provable in court) worth of attacks. They had no resources to fight back and defend themselves against these violent abuses of their human, Constitutional and ethical rights. They were blockaded from their rights.
DEMAND A FEDERAL LAW TO MAKE IT ILLEGAL TO TRY TO "KILL" OUR CITIZENS WITH MEDIA ATTACKS!!!!
HELP US STOP AMERICA FROM CONTINUING TO BE A CHARACTER ASSASSINATION NATION! HELP HUNT DOWN AND TERMINATE THE ASSASSINS USING 100% LEGAL TOOLS AND TACTICS!
SEE THE FILM ABOUT HOW GOOGLE, GAWKER AND THE SPECIAL INTERESTS ATTACK AND DESTROY AMERICAN CITIZENS:
SEEKING CONTINGENCY LAW FIRMS TO SUE THE HIGH-NET WORTH GROUPS WHO HAVE BEEN EVIDENCED AS THE HIRED ATTACKERS OF INNOCENT MEMBERS OF THE PUBLIC.
CONTACT US, IF YOUR FIRM CAN CLEAR A CONFLICTS AND BACKGROUND REVIEW, AND GET PAID A LARGE PERCENTAGE OF THE SETTLEMENT OR JURY AWARD. DEFENDANTS CAN INCLUDE: GOOGLE, DNC, ALPHABET, DRAPER-FISHER, KPCB, GAWKER, ELON MUSK, TESLA, APPLE, SONY, UNIVISION, NICK DENTON, FEINSTEIN, PELOSI, YOUTUBE, GIZMODO, JALOPNIK, CNET, THEIR STAFF AS INDIVIDUALS, AND OTHER TOP TARGETS:
There are over 170 companies in America who commercially sell character assassination services!
How can this allowed?
Why has Congress not made it illegal to sell character assassination services and to end citizens lives?
Now that major public figures have all suffered the same fate as our victims have, they might reconsider!
Business Firms Offering "Hit-Jobs":
IN-Q-Tel - (DNC)
Gawker Media - (DNC)
Jalopnik - (DNC)
Gizmodo Media - (DNC)
K2 Intelligence - (DNC)
WikiStrat - (DNC)
Psy-Group - (GOP/DNC)
Podesta Group - (DNC)
Fusion GPS - (DNC/GOP)
Google - (DNC)
YouTube - (DNC)
Alphabet - (DNC)
Facebook - (DNC)
Twitter - (DNC)
Think Progress - (DNC)
Media Matters - (DNC)
Black Cube - (DNC)
Mossad - (DNC)
Correct The Record - (DNC)
Sand Line - (DNC/GOP)
Blackwater - (DNC/GOP)
Blumenthal Consulting - (DNC)
Stratfor - (DNC/GOP)
CrowdStrike - (DNC)
ANTIFA Media - (DNC)
ShareBlue - (DNC)
Cambridge Analytica - (DNC/GOP)
Individuals Organizing And/Or Offering "Hit-Jobs":
Pierre Omidyar (Financier Of Gawker Media) - (DNC Financier/Beneficiary)
Eric Schmidt - (DNC Financier/Beneficiary)
Larry Page - (DNC Financier/Beneficiary)
Elon Musk (Covert owner of massive bot, troll, click-farm services) - (DNC Financier/Beneficiary)
David Brock - (DNC Financier/Beneficiary)
Sid Blumenthal - (DNC Financier/Beneficiary)
Nicholas Guido Denton - (DNC Financier/Beneficiary)
Mike Cernovich - (GOP)
John Cook, Attack Blogger - (DNC)
Adrian Covert, Attack Blogger - (DNC)
John Hermann, Attack Blogger - (DNC)
Gabrielle Darbyshire, Attack Blogger - (DNC)
A.J. Delaurio, Attack Blogger - (DNC)
Adam Dachis, Attack Blogger - (DNC)
Adam Weinstein, Attack Blogger - (DNC)
Adrien Chen, Attack Blogger - (DNC)
Alan Henry, Attack Blogger - (DNC)
Albert Burneko, Attack Blogger - (DNC)
Alex Balk, Attack Blogger - (DNC)
Alexander Pareene, Attack Blogger - (DNC)
Alexandra Philippides, Attack Blogger - (DNC)
Allison Wentz, Attack Blogger - (DNC)
Andrew Collins, Attack Blogger - (DNC)
Andrew Magary, Attack Blogger - (DNC)
Andrew Orin, Attack Blogger - (DNC)
Angelica Alzona, Attack Blogger - (DNC)
Anna Merlan, Attack Blogger - (DNC)
Ariana Cohen, Attack Blogger - (DNC)
Ashley Feinberg, Attack Blogger - (DNC)
Ava Gyurina, Attack Blogger - (DNC)
Barry Petchesky, Attack Blogger - (DNC)
Brendan I. Koerner, Attack Blogger - (DNC)
Brendan O’Connor, Attack Blogger - (DNC)
Brent Rose, Attack Blogger - (DNC)
Brian Hickey, Attack Blogger - (DNC)
Camila Cabrer, Attack Blogger - (DNC)
Choire Sicha, Attack Blogger - (DNC)
Chris Mohney, Attack Blogger - (DNC)
Clover Hope, Attack Blogger - (DNC)
Daniel Morgan, Attack Blogger - (DNC)
David Matthews, Attack Blogger - (DNC)
Diana Moskovitz, Attack Blogger - (DNC)
Eleanor Shechet, Attack Blogger - (DNC)
Elizabeth Spiers, Attack Blogger - (DNC)
Elizabeth Starkey, Attack Blogger - (DNC)
Emily Gould, Attack Blogger - (DNC)
Emily Herzig, Attack Blogger - (DNC)
Emma Carmichael, Attack Blogger - (DNC)
Erin Ryan, Attack Blogger - (DNC)
Ethan Sommer, Attack Blogger - (DNC)
Eyal Ebel, Attack Blogger - (DNC)
Gabrielle Bluestone, Attack Blogger - (DNC)
Georgina K. Faircloth, Attack Blogger - (DNC)
Gregory Howard, Attack Blogger - (DNC)
Hamilton Nolan, Attack Blogger - (DNC)
Hannah Keyser, Attack Blogger - (DNC)
Hudson Hongo, Attack Blogger - (DNC)
Heather Deitrich, Attack Blogger - (DNC)
Hugo Schwyzer, Attack Blogger - (DNC)
Hunter Slaton, Attack Blogger - (DNC)
Ian Fette, Attack Blogger - (DNC)
Irin Carmon, Attack Blogger - (DNC)
James J. Cooke, Attack Blogger - (DNC)
James King, Attack Blogger - (DNC)
Jennifer Ouellette, Attack Blogger - (DNC)
Jesse Oxfeld, Attack Blogger - (DNC)
Jessica Cohen, Attack Blogger - (DNC)
Jesus Diaz, Attack Blogger - (DNC)
Jillian Schulz, Attack Blogger - (DNC)
Joanna Rothkopf, Attack Blogger - (DNC)
Jordan Sargent, Attack Blogger - (DNC)
Joseph Keenan Trotter, Attack Blogger - (DNC)
Josh Stein, Attack Blogger - (DNC)
Julia Allison, Attack Blogger - (DNC)
Julianne E. Shepherd, Attack Blogger - (DNC)
Justin Hyde, Attack Blogger - (DNC)
Kate Dries, Attack Blogger - (DNC)
Katharine Trendacosta, Attack Blogger - (DNC)
Katherine Drummond, Attack Blogger - (DNC)
Kelly Stout, Attack Blogger - (DNC)
Kerrie Uthoff, Attack Blogger - (DNC)
Kevin Draper, Attack Blogger - (DNC)
Lacey Donohue, Attack Blogger - (DNC)
Lucy Haller, Attack Blogger - (DNC)
Luke Malone, Attack Blogger - (DNC)
Madeleine Davies, Attack Blogger - (DNC)
Madeline Davis, Attack Blogger - (DNC)
Mario Aguilar, Attack Blogger - (DNC)
Matt Hardigree, Attack Blogger - (DNC)
Matt Novak, Attack Blogger - (DNC)
Michael Ballaban, Attack Blogger - (DNC)
Michael Dobbs, Attack Blogger - (DNC)
Michael Spinelli, Attack Blogger - (DNC)
Neal Ungerleider, Attack Blogger - (DNC)
Nicholas Aster, Attack Blogger - (DNC)
Nicholas Denton, Attack Blogger - (DNC)
Omar Kardoudi, Attack Blogger - (DNC)
Owen Thomas, Attack Blogger - (DNC)
Patrick George, Attack Blogger - (DNC)
Patrick Laffoon, Attack Blogger - (DNC)
Patrick Redford, Attack Blogger - (DNC)
Rich Juzwiak, Attack Blogger - (DNC)
Richard Blakely, Attack Blogger - (DNC)
Richard Rushfield, Attack Blogger - (DNC)
Robert Finger, Attack Blogger - (DNC)
Robert Sorokanich, Attack Blogger - (DNC)
Rory Waltzer, Attack Blogger - (DNC)
Rosa Golijan, Attack Blogger - (DNC)
Ryan Brown, Attack Blogger - (DNC)
Ryan Goldberg, Attack Blogger - (DNC)
Sam Faulkner Bidle, Attack Blogger - (DNC)
Sam Woolley, Attack Blogger - (DNC)
Samar Kalaf, Attack Blogger - (DNC)
Sarah Ramey, Attack Blogger - (DNC)
Shannon Marie Donnelly, Attack Blogger - (DNC)
Shep McAllister, Attack Blogger - (DNC)
Sophie Kleeman, Attack Blogger - (DNC)
Stephen Totilo, Attack Blogger - (DNC)
Tamar Winberg, Attack Blogger - (DNC)
Taryn Schweitzer, Attack Blogger - (DNC)
Taylor McKnight, Attack Blogger - (DNC)
Thorin Klosowski, Attack Blogger - (DNC)
Tim Marchman, Attack Blogger - (DNC)
Timothy Burke, Attack Blogger - (DNC)
Tobey Grumet Segal, Attack Blogger - (DNC)
Tom Ley, Attack Blogger - (DNC)
Tom Scocca, Attack Blogger - (DNC)
Veronica de Souza, Attack Blogger - (DNC)
Wes Siler, Attack Blogger - (DNC)
William Haisley, Attack Blogger - (DNC)
William Turton, Attack Blogger - (DNC)
- Smear articles published by Gawker, Gizmodo, Jalopnik, C-Net, etc, are republished endlessly, globally, by DNC-controlled Google who operate in paid partnership with Gawker/Gizmodo. Google locks biased attack articles on the top search results, for over a decade, of all of it's brands in order to maximize the damage to the target victim.
- - Smear videos published by Gawker, Gizmodo, Jalopnik, C-Net, etc, are republished endlessly, globally, by DNC-controlled Google who operate in paid partnership with Gawker/Gizmodo. Google locks biased attack articles on the top search results, for over a decade, of all of it's brands in order to maximize the damage to the target victim.
- Hacking of phones, routers and PC's and doxing of victims using found data
- Databases from hiring and recruiting services that connect to Taleo, Axciom, Jobs USA, Palantir, Craigslist, Oracle databases, Linkedin, Microsoft Accel databases, etc. are injected with non-visible codes which block you, and red-flag you, from ever getting a job again. The Obama Administration and the Feinstein office uses this trick. The Silicon Valley "No Poaching Class Action Lawsuit" ( U.S. District Court, Northern District of California 11-cv-2509 ) only addressed a small part of this issue. Even though you may have perfect credentials and an ideal resume, if you upset a Senator, you will be sabotaged from all future employment, in an almost undetectable way, via the manipulation of data sets.
- Victim's income sources will be eliminated by public officials, attacks and brand defamation, forcing victims to take un-planned social security early retirement at a dramatically reduced monthly retirement amount. Victims lose up to 50% of their retirement investment via this tactic.
- Government agency bosses sometimes solicit the target victims with false promises of future loans, contracts or grants from their agency and cause the target victims to expend millions of dollars and years of their time for projects which those government bosses had covertly promised to their friends. They use the target victims as a “smokescreen” to cover their illegal government slush-funds for the victims competitors and personal enemies. By using this tactic, the attackers can drain the target victims funds and force them into an economic disaster in plain view of everyone without the government bosses fearing any reprisal for their scam.
- Every match.com, okcupid.com, Plenty Of Fish, Seeking Arrangements and all other IAC-owned, or similar, dating sites (IAC is managed by Hillary Clinton's daughter) have had their profiles, texts, and inter-member communications, since those companies were started, hacked or purchased. The attack service providers use Palantir and In-Q-Tel financed data analysis software to analyze every activity in those dating services in order to find honey-trap, blackmail, sextortion and social conflict exploitation opportunities. If you had a bad date with someone, that someone will be hunted down and convinced to help harm, #metoo or "rape charge" the intended target. All dates involve a search for sex, so the likelihood that a sexual disappointment experience will exist in each persons dating history is high. Searching every past dating email and text of a subject is quite easy with modern software and hacking techniques. A synthetically amplified, PR-agency optimized sex scandal can destroy any target. Your dating experiences from the 70's or 80's will come back to haunt you decades later. Most dates involve drinking alcohol and taking drugs. If you were unattractive or had bad sexual skills your bad date will be called "date rape", "drugging your date for sex" and related twisted narratives that are designed to shame you, the target. If you try to get a date in the future, your potential date will be contacted by a third party who will slander and libel you to make sure your potential first date gets cancelled. Your social life will, essentially, end. Every photo on every dating site is cross checked with every other photo on the internet in order to cull your Facebook, Linkedin, Snapchat and other social media together to create a total psychological manipulation profile data file on you. A single photo on a dating site can be cross searched on every mugshot archive, photo album and corporate database in the worth within minutes using modern super-computers. Your sex life will be on public record in a flash.
- Social Security, SSI, SDI, Disability and other earned benefits are stone-walled. Applications of targets are “lost”. Files in the application process “disappeared”. Lois Lerner hard drive “incidents” are operated in order to seek to hide information and run cover-ups.
- Government officials and tech oligarchs contact members of the National Venture Capital association (NVCA) and created national “black-lists” to blockade target victims from ever receiving investor funding. This was also confirmed in a widely published disclosure by Tesla Motors Daryl Siry and in published testimony. If Silicon Valley political campaign finance oligarchs black-list you (see the "AngelGate" Scandal and the "High Tech No Poaching Class Action Lawsuit" cases) you will never get investor funding again.
- FOIA requests are hidden, frozen, stone-walled, delayed, lied about and only partially responded to in order to seek to hide information and run cover-ups.
- State and federal employees will play an endless game of Catch-22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed. This can bankrupt a target victim.
- Some Victims found themselves strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after their work with the Department of Energy weapons and energy facilities. Many wonder if these “targets” were intentionally exposed to toxins in retribution for their testimony. The federal MSDS documents clearly show that a number of these people were exposed to deadly compounds and radiations, via DOE, without being provided with proper HazMat suits which DOE officials knew were required.
- Victims employers are called, and faxed, and ordered to fire target victims from their places of employment, in the middle of the day, with no notice, as a retribution tactic.
- On orders from Obama White House officials, DNC-financed Google, YouTube, Gawker Media and Gizmodo Media produce attack articles and defamation videos. Google locks this attack media on the internet on the top line, of the front page of all Google searches for a decade in front of 7.5 billion people, around the world. This attack-type uses over $40 million dollars in server farms, production costs and internet rigging. The forensic data acquired from tracking some of these attacks proves that Google rigs attacks against individuals on the internet and that all of Google’s “impressions” are manually controlled by Google’s executives who are also the main financiers and policy directors of the Obama Administration. This data was provided to the European Union for it’s ongoing prosecution of Google’s political manipulation of public perceptions.
- Victims HR and employment records, on recruiting and hiring databases, are embedded with negative keywords in order to prevent the victim targets from ever gaining future employment.
- Gary D. Conley, Seth Rich, Rajeev Motwani and many other whistle-blowers in these matters, turned up dead under strange circumstances. It is very possible that some of these attack services, operated by former CIA operatives, even offer discrete murder-for-sale services using high-tech assassination tools that make murders look like heart attacks and brain failures.
- Disability and VA complaint hearings and benefits are frozen, delayed, denied or subjected to lost records and "missing hard drives" as in the Lois Lerner case.
- Paypal (A DNC-biased operation) and other on-line payments for on-line sales are de-platformed, delayed, hidden, or re-directed in order to terminate income potential for target victims who competed with the attackers interests and holdings.
- DNS redirection, "website spoofing" sends target victims websites to dead ends where no sales orders or customer inquiries actually get back to the target. These internet revenue activity manipulations are conducted using Google and Amazon servers. All commercial storefronts and on-line sales attempts by target victims, will have had their sites hidden, or search engine de-linked by a massively resourced facility located in Virginia, Texas or Palo Alto, California in order to terminate revenue potentials for the target victims.
- Over 50,000 trolls, shills, botnets and synth-blog deployments are deployed to place defamatory statements and disinformation about victims in front of 7.5 billion people around the world on the internet in order to seek to damage their federal testimony credibility by a massively resourced facility.
- Campaign finance dirty tricks contractors are hired by campaign financiers to attack the friends and family members of the target victim in order to create low morale for the target victims psyche and motivation.
- Are you getting weird headaches and hearing a "buzzing sound" in your head? The U.S. Government has now acknowledged that the Cuban, Chinese and other embassy "sonic attacks" are from a known microwave beam weapon. Any one of the technical departments of the attack services listed at the top of this article can build such a biological harassment weapon. It can be aimed at the target victims office, bedroom or vehicle and, within a week, have caused biological and emotional damage using a weapon that has no visible track of trajectory. It is designed to make the target victim think they are "going crazy" or "hearing sounds in their head". While this may sound pretty out there, web search "Embassy sonic attacks" on the top 5 non-Google search engines and read the very credible reports of these attacks.
- In one case covert political partner: Google, transferred large sums of cash to dirty tricks contractors and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web-pages which multiplied the attacks on Victims by many magnitudes.
- Covert Cartel financier: Google, placed Google’s lawyer: Michelle Lee, in charge of the U.S. Patent Office and she, in turn, stacked all of the U.S. Patent Office IPR and ALICE review boards and offices with Google-supporting employees in order to rig the U.S. Patent Office to protect Google from being prosecuted for the vast patent thefts that Google engages in. Google has hundreds of patent lawsuits for technology theft and a number of those lawsuits refer to Google’s operations as “Racketeering”, “Monopolistic Cartel” and “Government Coup-like” behaviors. Thousands of articles and investigations detail the fact that Google, “essentially” ran the Obama White House and provided over 80% of the key White House staff. A conflict-of-interest unlike any in American history. Google’s investors personally told Applicant they would “kill him”. Google and the Obama Administration were “the same entity”. Applicant testified in the review that got Michelle Lee terminated and uncovered a tactical political and social warfare group inside Google who were financed by Federal and State funds.
- Honeytraps and moles were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target” in order to spy on and misdirect the subject.
- Gawker Media, Gizmodo Media, Snopes, SPLC and other hired media assassins will be retained to produce "hatchet job" character assassination articles about you. Then those articles will be faxed, mailed and emailed to your employer and investors with a note saying: "You don't want to have anything to do with this person, do you..?" in order to get you fired from your job and get your loans or financing pulled. The attackers will use their round one attack media, that they authored, to create a round two second wave attack designed to end your life via economic warfare.
- Mortgage and rental applications will have had red flags added to them in databases to prevent the targets from getting homes or apartments.
- Krebs On Security, Wired, Ars Technica, The Wall Street Journal and most major IT publications have reported that hundreds of spy "back-doors" have been found on every Intel, AMD, Apple, Xfinity, Cisco, Microsoft, Juniper Networks motherboard, chip-set and hardware component set. This means that any kid with the "key" code can open any computer, server, router, cloud-network or other network connected device and read every file, photo, video, your calendar and email on your devices at any time from any location on Earth. The key codes have been released to every hacker community in the world for over ten years. There is now no government, corporate or personal data that can't be hacked, even data from decades ago. Every single one of your darkest secrets can be in the hands of your enemy within 60 minutes, or less. Important meetings you had planned with potential investors, employers, clients, dates, suppliers and others will suddenly get cancelled at the last minute. They will get cancelled because your enemies are reading your calendar remotely and covertly sending slander information to those you had hoped to engage with in order to sabotage your life. Nothing you have ever typed on a computer or Smartphone is safe. it WILL be acquired and it WILL be used against you.
- McCarthy-Era "Black-lists" are created and employed against target victims who competed with Obama Administration executives and their campaign financiers to prevent them from getting funding and future employment.
- Obama Administration victims were very carefully placed in a position of not being able to get jobs, unemployment benefits, disability benefits or acquire any possible sources of income. The retribution tactics were audacious, overt..and quite illegal.
REPORTING TO THE U.S. CONGRESS