OBAMA WIRE-TAPPED THE PUBLIC AND RAN DIRTY TRICKS CAMPAIGNS AGAINST ORDINARY AMERICANS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  • A huge number of disclosures reveal Valarie Jarret, Ben Rhodes and Barack Obama holed-up in Obama’s new mansion running Nixon-like Dirty Tricks Program

  • Websites like http://xyzcase.xyz provide vast evidence

  • Books like “SLUSH-FUND: THE BOOK” provide hard proof

  • Congressional leaders urge Watergate style public hearings

 

 

 

 

 

By Dan Ashford

 

 

There are a team of people associated with the West Wing and financed by the DNC and Silicon Valley tech billionaires. Some of them have desks inside the White House. When a journalist, or congressman, catches an Obama staffer doing something bad, these attack dogs are sent out to destroy the reputations and income of those who are “making trouble” in retribution for speaking up.
In the reign of Obama, though, so many revelations about Obama staff doing “something bad” came out, that the White even began targeting ordinary citizens that mouthed off. Their list of attack strategies is awe inspiring. It includes:

 

 

-Phone taps were one phone call away and a FISA note from hook-up. It took 30 minutes or less to use AT&T special rooms in AT&T main buildings in San Francisco on Market Street, In New York City, Los Angeles, Chicago and most any main city to pipe all of your phone calls, emails and texts to a White House office on K Street in Washington, DC.

 

­ Social Security, SSI, SDI, Disability and other earned benefits were stone-walled. Applications were “lost”. Files in the application process “disappeared”. Lois Lerner hard drive “incidents” took place.

 

 

 

­ State and federal employees played an endless game of Catch­22 by arbitrarily determining that deadlines had passed that they, the government officials, had stonewalled and obfuscated applications for, in order to force these deadlines that they set, to appear to be missed.

 

 

 

­ Some applicants found themselves strangely poisoned, not unlike the Alexander Litvenko case. Heavy metals and toxic materials were found right after their work with the Department of Energy weapons and energy facilities. Many wonder if these “targets” were intentionally exposed to toxins in

 

retribution for their testimony. The federal MSDS documents clearly show that a number of these people were exposed to deadly compounds and radiations without being provided with proper HazMat suits which DOE officials knew were required.

 

­ Applicants employers were called, and faxed, and ordered to fire applicants from their places of employment, in the middle of the day, with no notice, as a retribution tactic.

 

 

 

­ Applicants HR and employment records, on recruiting and hiring databases, were embedded with negative keywords in order to prevent them from gaining future employment.

 

­ One Gary D. Conley and one Rajeev Motwani, both whistle­blowers in this matter, turned up dead under strange circumstances. They are not alone in a series of bizarre deaths related to the DOE.

 

­ Disability and VA complaint hearings and benefits were frozen, delayed, denied or subjected to lost records and “missing hard drives” as in the Lois Lerner case.

 

­ Paypal and other on­line payments for on­line sales were delayed, hidden, or re­directed in order to terminate income potential for applicants who competed with DOE interests and holdings

 

 

 

.­ DNS redirection, website spoofing which sent applicants websites to dead ends and other Internet activity manipulations were conducted.­ Campaign finance dirty tricks contractors IN­Q­Tel, New America Foundation, Think Progress, Media Matters, Gawker Media, Sid Blumenthal, etc., were hired

 

to attack applicants who competed with Obama campaign financiers and those

 

they paid off in stock market holdings.

 

 

 

­ Websites that victims had, to try to make money or blog about the case with, were ordered removed by DNC­controlled WordPress or hit with massive DDOS attacks by servers owned by entities that reported to West Wing staff.

 

 

 

­ DNC­backed Google, transfered large sums of cash to dirty tricks contractors, like Gawker Media, and then manually locked the media portion of the attacks into the top lines of the top pages of all Google searches globally, for years, with hidden embedded codes in the links and web­pages which multiplied the attacks on applicants by many magnitudes.

 

 

 

­ Honey­traps and moles, operating through Match.com and OK Cupid, were employed by the attackers. In this tactic, people who covertly worked for the attackers were employed to approach the “target”

 

in order to spy on and misdirect the subject. Obama financiers Kleiner Perkins, Ford, Draper Fisher and other companies placed moles, ordered to disrupt operations, inside of the competition.

 

 

 

­ Highly produced animated attack videos were produced by Google and Gawker Media and locked in top position on YouTube, DNC­controlled Google’s global broadcasting network.

 

­ The White House ordered the FBI, FCC, FTC, DOE, SEC, OSC and other agencies that it controlled, to under­take no investigations into the charges of character assassination and interference. This was known as, in Watergate terms, “A Cover­Up”.

 

­ DNC controlled Gawker Media staff Nick Denton, Adrian Covert, John Herrman, John Cook and Google-Gawker staffer Ian Fette, would write hit­job/hatchet­job articles on people on the “enemies list” and DNC controlled Google would lock the links to those articles on the top lines of the front page of Google for over five years straight without the links even moving in the search results. Google clearly rigs search engine results to attack others.

 

­ Mortgage and rental applications had red flags added to them in databases to prevent the targets from getting homes or apartments.

 

­ McCarthy­Era “Black­lists” were created and employed against applicants who competed with DOE executives and their campaign financiers to prevent them from funding and future employment.

 

 

­ Targets were very carefully placed in a position of not being able to get jobs, unemployment benefits, disability benefits or acquire any possible sources of income.

 

The retribution tactics were audacious, overt..and quite illegal.Because the U.S. Department of Energy “Cleantech Crash” (So called because of the 60 Minutes investigation of the crimes) used these attackers so freely, it is of note in this discussion.

 

The attack team ordered their staff to manipulate, hide, shred, sabotage, stone­wall or take no action on grant, contract and proposal applications, by plaintiffs, while at the same time promoting and approving inferior proposals for inferior competing products owned by the defendants Cartel. Financial, covert stock exchanges, witness, surveillance and communications records prove this.

 

 

Goldman Sachs has been charged with multiple crimes, against U.S. citizens, by the U.S. Government and state investigators. Goldman Sachs had the key banking relationship and financial strategy role for almost every entity charged with misdeeds and made many billions of dollars, at taxpayer expense, off of misdeeds. Goldman Sachs, and their mouthpiece promotion agencies Deloitte and cKinsey consulting, who also staffed the defendants, claimed that their scheme, in published white papers and news reports, circulated in Washington, DC and Sacramento, California, would lead to “Trillions of dollars in exclusive profits” for the Cartel. It is not inconceivable to comprehend how defendants may have engaged in murders, bribery, character assassination and other crimes, in order to gain, over a trillion dollars of, corrupt profits.

 

 

Financial, covert stock exchanges, witness, surveillance and communications records prove this.

 

Under West Wing orders,California Controller Bill Lockyer, and State Tax Officials, rigged exclusive tax waivers and tax kick­backs for defendants while denying those same favors for plaintiffs. Over 12 California state agencies also gave defendant­controlled, side­by­side, crony corruption schemes: Tesla and Solyndra, hundreds of millions of dollars of political favors for failed technologies while denying those same resources to plaintiffs, whose technologies have become world leaders. Plaintiff’s were

 

“Lois Lerner’d” in retribution. Financial, covert stock exchanges, witness, surveillance and communications records prove this. California State Officials worked with Senator Diane Feinstein to promulgate these kick­back deals, in which the Feinsteins operated multiple criminal conflicts of interest leading them to tens of millions of dollars in ill­gotten profit. Senator Feinstein, personally, ordered the sabotage of some plaintiffs to protect her profiteering scam in this Cartel.

 

 

The defendants owned, and controlled, through shell companies, false charities and front groups, mining contracts in countries that were being invaded by the U.S. The defendants promoted acceleration of war efforts in order to profiteer on the chemicals, mined from those war ravaged countries, for exploitation in Tesla and Solyndra under the guise of: “It’s for “green products” don’t question it”; in order to “sucker” taxpayers.

 

 

Defendants made hundreds of millions of dollars in profits by skimming cash off the top of incoming government grant and loan money and, duplicitously, also taking tax profits when those same companies went bankrupt. Agency enforcement officers, who were supposed to prosecute all of the crimes listed herein, held stock profits in many of the defendants companies and had a

 

vested interest in seeing plaintiffs fail.Defendant Elon Musk is documented as having engaged in multiple financial crimes, stock market manipulations, state and federal documentation lies and

 

illegal campaign finance payola. State and federal officials have ordered a “hands­off” protection racket for Musk because his poor control of his hubris is known to be capable of easily linking all of the defendants together. Financial, covert stock exchanges, witness, surveillance and communications

 

records prove this.

 

 

 

The following text is from one of the attack manuals the Obama team used:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Obama Administration Source Confirms Wiretapping Against Trump

 

Obama Administration Source Confirms Wiretapping Against Trump (youtube.com)

 

submitted ago by brapbrapbrap to politics (+98|-3)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Trump asks Congress to establish whether Obama administration abused investigative powers in 2016

 

Trump asks Congress to establish whether Obama administration abused investigative powers in 2016 (rt.com)

 

submitted ago by gramman74 to news (+25|-0)

 

 

 

 

 

 

 

 

Indictments for Obama and entire staff?

 

Indictments for Obama and entire staff? (youtube.com)

 

submitted ago by Empress to news (+14|-0)

 

 

 

 

 

 

 

 

 

 

Washington and America Implode at the Hands of a Treasonous, Obama-Led Shadow Government

 

Washington and America Implode at the Hands of a Treasonous, Obama-Led Shadow Government (sott.net)

 

submitted ago by status_psyquo to news (+25|-1)

 

 

 

 

 

 

 

 

Obama wiretapped Trump Tower prior to election

 

Obama wiretapped Trump Tower prior to election (thehill.com)

 

submitted ago by ScreaminMime to news (+227|-6)

 

 

 

 

Paul Ryan confirming that the Obama Administration wiretapped Trump and found no evidence of Russian influence

 

Paul Ryan confirming that the Obama Administration wiretapped Trump and found no evidence of Russian influence (youtube.com)

 

submitted ago by brapbrapbrap to politics (+220|-5)

 

 

<

p style=”margin-bottom:0;line-height:100%;”> 

 

Advertisements

Submit A News Tip -

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s