On the afternoon I knocked on the door, a modest white sedan was parked in the driveway; a sticker from Mills College, which is where Allen went to school, was in the rear window, faded it seemed, like anything resembling childhood innocence. It was hard not to imagine Jenn’s mom and dad driving their little girl off to school in that car.
After several knocks, Allen’s mother opened a window above me. I recognized her from a photo that Allen had posted online. It seems Allen documents a lot of her life on the Web. Including photos of her only sibling, a sister who is in an elite Ph.D. program, and who also politely declined to speak with me. Looking down at me from the window, Allen’s mother said, “My other daughter warned me you would probably try to contact me. We can’t talk to you.” In her eyes there was an exasperation, an anguish, an agony—a mother’s petition for mercy and privacy. I nodded and started down the steps to leave, and she closed the window.
On May 7, 2013, Michael Arrington filed suit against Allen, seeking damages for defamation. In her answer to Arrington’s complaint, filed in June, Allen did not retract her statements, though she did revise at least one major aspect of her allegation. She said that she had been mistaken when she said he had raped her on March 5. Later she would tweet that it actually happened on March 30.
According to her answer, Allen is represented by two law firms, one of them, Allred, Maroko & Goldberg, the firm headed by feminist superlawyer Gloria Allred, who herself was a victim of rape. To date, Allen has not filed a criminal charge against Arrington. Nor have the two other women. A trial has been set for next October.
More than two dozen sources I spoke with were quick to point out the intensity of the rivalry that existed between Michael Arrington and Valleywag, which is essentially a Gawker dedicated to Silicon Valley. Gawker’s Nick Denton launched Valleywag in 2006, shut it down in 2008, then relaunched it this year. Arrington had called Denton “evil” in the San Francisco Chronicle around the time Valleywag launched and “a total dick” in Portfolio in 2008, and he wrote a TechCrunch column that same year lambasting the site for being irresponsible: “Today I read all the sordid details about the alleged sexual encounter between a notable technology visionary and a woman who appears to be looking for as much publicity as possible. Where did I read it? On the Silicon Valley gossip blog Valleywag. The posts include private IM chats and various rumors, all designed to make the person mentioned look like as much of a fool as possible. That’s not new, of course. Valleywag is making a business out of digging into people’s personal lives and publishing it for all to see (me included, regularly).” (Denton didn’t respond to numerous requests for comment.)
In his column, published in March 2008, Arrington noted that a business executive had recently committed suicide after being written about in a blog (not owned by Denton), and then asked:
So how long will it be before Valleywag drives someone in our community to suicide? My fear is that it isn’t a matter of if it will happen, but when. Valleywag and Nick Denton, though, will likely look forward to the event, and the great traffic growth that will surely follow. There’s a market for this kind of content, obviously. And nothing can stop it except significant changes to our libel and defamation laws. That isn’t something I support. But the valley was a much nicer place to live and work before the days of Valleywag.”
There are just as many people in the Valley who would say it was a lot nicer place before the days of Arrington. The allegations lobbed at him are the result of the very same blog/social media/Silicon Valley “innovative journalism” that he himself has championed. In 2009, Arrington wrote a blog post on TechCrunch in defense of his site’s practice of publishing rumors as part of the process to get to the “absolute truth.” Digitally savvy journalists have academically dubbed this “process journalism.”
“Some people ask why we don’t just wait until we have the whole story before posting,” Arrington wrote. “The fact is that we sometimes can’t get to the end story without going through this process. . . . When a story is up and posted, it’s amazing how many people come out of the woodwork to give us additional information. . . . And readers love it. The only people who don’t like it are competitors who like to point out that a story was partially wrong, and that they got it right later. But the fact is that they didn’t even know there was a story to begin with. Our original post kicked off the process, and they, like us, started digging for the absolute truth.”
You might say process journalism was applied to the accusations against Arrington, and this sordid mess is the necessary by-product of a pursuit of the absolute truth. Regardless of the absolute truth of what Arrington did or did not do to Jenn Allen, the whole affair makes this much clear: while the Valley is busy incubating a lot of shiny new start-ups and promising innovations and social networks that generate all kinds of value propositions and tremendous revenue possibilities, behind the scenes of that eco-system there’s another part of the culture, where someone is always trying to screw somebody over, where it’s crunch or be crunched. The big question the luminaries of the Valley might want to ask themselves is the question Arrington himself posed that day at Berkeley: Does the Valley want to solve the problem, or does it want to pick on Mike?
——————————
(G.H.- See More About GAWKER, HERE>>> )
(F- LAT- Payback’s a Bitch, VC’s)
(F- Daily Caller- The Silicon Valley VC’s are the DNC ‘s bankroll . When they go, the DNC goes.)
(FGH- Here’s the problem with the Venture Capitalists character assassinating someone clever and entrepreneurial like Arrington. When you end someone’s life with a character attack you create a highly motivated enemy. They, and their friends, will come after you forever. When you do it to a publisher with lots of friends you double your pleasure/payback. When you do it to someone who is clever, a publisher and you do it on the internet where all of the other kids, adults, etc. who got attacked, themselves, can catch some affinity; you (VC/illuminati ) pretty much shoot yourselves in the foot. Combine doing it to Greenwald, Assange, Arrington, Manning and the others at the same exact historical time-span and you are pretty much fucked, you VC’s. Good luck with a pissed off Arrington, Silicon Valley. You were better off with just a blabby Arrington. You should have let sleeping dogs sleep.)
(SD- The Arrington/D. McClure/R. Conway payback scheme will be Epic)
(GH-j- Elon Musk hit Martin Eberhard, and most of Musk’s enemies, with most of “The Full Monty” in order to force a settlement from him. According to his ex-wives and ex-girlfriends, he also threatened them with “trouble” if they didn’t accept a quick settlement, too as discussed HERE>>> )
(MA- Gawker is a stealth front for Jay Carney and Robert Gibbs in the WH Press Office. If it is too dirty for a WH press syndicate release they have Nick Denton do the hit on somebody (usually the GOP) and, in exchange, avoid looking at his overseas accounts)
(G- Per the quote in the article about waiting for “Valleywag to drive someone in the -Silicon Valley- community to suicide .. ” It Has!!! Silicon Valley Has Committed Suicide in Self-Disgust. Goodbye Silicon Valley and the Arrogant Hipsters and Douche Bag VC’s .
MARTIN EBERHARD, of Tesla, got the FULL MONTY.
———————————————————————————–
In The Wall Street Journal, Information Age columnist Gordon Crovitz writes that the tech industry’s affection for Washington keeps growing—with Facebook …
online.wsj.com/ news/ articles/ SB10001424127887323539804578266290231304934 – View by Ixquick Proxy – Highlight
Jul 14, 2013 … The recent suicides of Jody Sherman, Aaron Swartz and Ilya Zhitomirskiy are tragic but all too familiar stories. Some might also recall the …
www.toobbox.com/blog/suicide-in-silicon –valley / – View by Ixquick Proxy – Highlight
Apr 4, 2013 … A few months ago, on Sunday, January 27, an entrepreneur named Jody Sherman had plans to see a movie with a friend. But that afternoon …
www.businessinsider.com/jody-sherman-ecomom-2013-4 – View by Ixquick Proxy – Highlight
(DFG- THIS LINK has Arrington’s big blow-out disclosure on the VC’s.)
But once in awhile, Reporters win! See the Movie: “Big Boys Gone Bananas” :
VIDEO
VIDEO
http://www.youtube.com/watch?v=IckPHuuNIYc
—————————————————————————————
Option #2: “Actual” Death-
Known as “Wet-Work” and done by hired mercenaries, who mainstream news calls: “Contractors” (See George Clooney’s movie “Micheal Clayton” to see how it is done). Killing you dead with, formerly , untraceable creepy technology… Internet lore holds that Brietbart is thought to have been taken out this way.
…they can actually, ACTUALLY, kill you like THIS!>>> as shown in THESE ARTICLES
—————————————————————————————
Option #3: “The Come On”-
They ask to look at your technology, then steal it, then they say: “Ha! We are going to give it away, or just use it without paying you, to kill your market. What are you going to do about it, Sue us? Ha! Suckers… “
Except, …now you CAN sue them, and win!
.. they can sabotage your business like THIS!>>>
—————————————————————————————
Option #4: “The Poor Boy”-
Political operatives hack into, or pay friends to access, each of the career databases and credit reporting companies to falsely crash your background and credit checks so you can’t get a job. The companies they mostly use are:
TalentShield
BeenVErified
GIS BackGround Checks
CVCertify
Social Intelligence
Dun And Bradstreet
EquiFax
Infortal
Kroll Backgrounds
Onesource
Checkpeople
and others…
—————————————————————————————-
Option #5: “The Honey Trap”-
They send somebody to sleep with you, or charge you for sex, or get pregnant or all of the above and cause all kinds of hell in the media…
The creepiest Honey Trap system is the one we heard about at ProPublica where the owners of Match.com/OKCupid.com are closely connected to certain political “interests” . A source claimed that they allow those interests to scan their database with photo-comparison software . If the dating profile picture you posted on Match.com or OkCupid is a match for a person the “interests” want to run a Honey Trap on, the “interests” send in a fake date person to try to get info from you or get you in a compromising situation. Very often the hot blonde you think you are writing to is some hairy fat male political operative in New Jersey. Both sites already have a number of legal actions for fake profiles. If true, and you are controversial, I suppose you can’t date anymore… bummer!
Ed- PP
—————————————————–
To see some of the HONEYS. CLICK HERE>>>
——————————————————-
Dec 8, 2010 … Anyone who doubts the unmitigated evil of the US government and its international enablers has only to look at the disgraceful persecution of …
original.antiwar.com/ justin/ 2010/ 12/ 07/ julian –assange -in-the-honey –trap / – View by Ixquick Proxy – Highlight
Aug 23, 2012 … WikiLeaks founder Julian Assange on the balcony of the … internet; they have been trashed, accused of setting a “honey trap “, and seen their …
www.theguardian.com/ commentisfree/ 2012/ aug/ 23/ women-against-rape-julian –assange – View by Ixquick Proxy – Highlight
Feb 27, 2013 … Eyewitnesses report “an astounding swarm of women” around Julian Assange . Lucky guy but the fact that they were journalists from …
www.thetruthseeker.co.uk/?p=66167 – View by Ixquick Proxy – Highlight
Dec 10, 2010 … Anna Ardin, described in court documents as “Miss A,” had deleted Twitter messages speaking highly of Wikileaks founder Julian Assange , the …
www.infowars.com/ cia-honey trap -ardin-deleted-twitter-posts-praising-assange / – View by Ixquick Proxy – Highlight
25.10mins: Stephens denies claims Assange has seen the full report of the sex allegations against him. 28.20mins: ‘The honey –trap has been sprung’ …
www.ibanet.org/ Article/ Detail.aspx?ArticleUid=160c30de-e4db-4837-a0fe-466c951a23f9 – View by Ixquick Proxy – Highlight
Mar 17, 2011 … This information raises questions about CIA and ASIO (australian spy organisation), and whether the sexcharges against Julian Assange was …
www.daddys-sverige.com/ 3/ post/ 2011/ 03/ was-it-a-cia-honey trap -after-all.html – View by Ixquick Proxy – Highlight
Dec 16, 2010 … In computer terminology, a honeytrap or honeypotis a trap set to detect, … seen the proof says Julian Assange ‘s lawyer” Source: dailymail.co.uk …
Jul 19, 2013 … And in a briefing at the International Spy Museum in Washington , D.C., recently, Melton spilled some of sexpionage’s greatest secrets.
www.santafenewmexican.com/ opinion/ commentary/ article_384c8f16-b025-5767-8744-5f8bdebc0e68.html – View by Ixquick Proxy – Highlight
Jul 28, 2012 … In popular fiction a “honey trap ” usually implies a woman entrapping … Reston, Virginia and other installations near Washington , D.C., among …
www.ejfi.org/DV/dv-34.htm – View by Ixquick Proxy – Highlight
Honey Trap : Dozens of G20 Diplomats Get Hacked After They Click on a Link … elites in Washington DC are competent super-managers of sterling character …
Apr 3, 2012… of President Obama’s inner circle in a seduction “honey trap ” when FBI … born at the Smithsonian’s National Zoo in Washington D.C. on Aug.
www.nydailynews.com/ news/ national/ russian-spy-anna-chapman-luring-u-s-cabinet-member-sexy-honey –trap -re port-article-1.1055088 – View by Ixquick Proxy – Highlight
What is a honey trap ? Simply, a honey trap (sometimes called a honey pot trap ) is a kind of “sting operation” in which a person hired by you approaches your …
www.catchyourcheatingpartner.com/should_you_set_up_honey _trap .php – View by Ixquick Proxy – Highlight
—————————————————————————————-
OR, just Bully Them To Death with “Swiftboating”, “Character Kills”…
(This is why good candidates don’t run for office, nobody wants to get character assassinated except the ones that are so dirty they just don’t give a damn – GH)
Sep 18, 2013 … Democrat LBJ won the White house by a gigantic landslide on an anti-war … As far as character assassination, with all the ammo that he has …
www.usatoday.com/ story/ onpolitics/ 2013/ 09/ 18/ rand-paul-wife-2016-presidential-race/ 2832395/ – View by Ixquick Proxy – Highlight
Sep 23, 2013 … KNIGHT: Foiling the left’s character assassination … that was so much a part of our country’s life and certainly our time in the White House .”.
www.washingtontimes.com/ news/ 2013/ sep/ 23/ knight-foiling-the-lefts-character -assassination/ ?page=all – View by Ixquick Proxy – Highlight
Sep 26, 2012 … “This is a campaign, not about character assassination, even though that’s … the economy going while in the White House , and will twist things.
www.cbsnews.com/ 8301-250_162-57521036/ romney-obama-engaged-in-character -assassination/ – View by Ixquick Proxy – Highlight
Jan 1, 2013 … The rush to character assassination seems to be our only bipartisan … She is slated to appear before the House Foreign Affairs Committee in …
articles.washingtonpost.com/ 2013-01-01/ opinions/ 36103279_1_benghazi-attacks-clot-ambassador-christopher-stevens – View by Ixquick Proxy – Highlight
Jul 15, 2012 … White House to get aggressive on climate change · The Plum Line | Greg …. Character assassination is a diversion, not a policy. Personal Post …
articles.washingtonpost.com/ 2012-07-15/ opinions/ 35489376_1_character -assassination-economic-growth-obama – View by Ixquick Proxy – Highlight
Jul 19, 2013 … This Wednesday they sent a 16-year-old intern to question the White House about whether the President of the United States was providing …
www.qwstnevrythg.com/ 2013/ 07/ the-character -assassination-of-trayvon-martin/ – View by Ixquick Proxy – Highlight
Jan 1, 2013 … Washington Post Column: The character assassination of Hillary Clinton ….. The White House claimed the firings were done because financial …
www.freerepublic.com/focus/news/2974085/posts – View by Ixquick Proxy – Highlight
Jan 23, 2012 … Barack Obama agreed to using character assassination tactics against Hillary Clinton during his 2008 presidential campaign, White House …
www.telegraph.co.uk/ news/ worldnews/ northamerica/ usa/ 9032170/ Barack-Obama-attacked-Hillary-Clinton-in-negative-campaign-leaked-mem os-show.html – View by Ixquick Proxy – Highlight
Nov 23, 2013… sought to bring grace, history, and good works to the White House . … if character assassination and ideology hadn’t ended his Camelot in …
www.politicususa.com/2013/11/23/brand-presidential-assassination.html – View by Ixquick Proxy – Highlight
Sep 9, 2009 … Last month, Fox News’ Glenn Beck engaged in a character assassination campaign to demonize White House environmental adviser Van …
www.thinkprogress.org/economy/2009/09/09/59758/beck-kerpen-jones/ – View by Ixquick Proxy – Highlight
Sep 28, 2013 … Asad Rauf accuses Mumbai police of ‘character assassination’ over IPL …. White House makes Twitter typo, sparks Obamacare photo meme …
news.yahoo.com/ asad-rauf-accuses-mumbai-police-character -assassination-over-05381012 4.html – View by Ixquick Proxy – Highlight
Jun 26, 2013 … They, the majority in this decision, used character assassination as a … Tucker Carlson: White House Saying It’s Your Fault If You Lost Your …
www.realclearpolitics.com/ video/ 2013/ 06/ 26/ limbaugh_supreme_court_used_character _assassination_in_doma_decision. html – View by Ixquick Proxy – Highlight
Jul 10, 2013 … NBC: ‘Escalating Battle’ Between White House and Press Corps Over … AP Starts the 2016 Character Assassination of Rick Perry, Part 1: ‘Five …
www.newsbusters.org/ blogs/ tom-blumer/ 2013/ 07/ 10/ ap-starts-2016-character -assassination-rick-perry – View by Ixquick Proxy – Highlight
Aug 9, 2011… personal assault ” and character assassination on Romney, who it … a prominent Democratic strategist close to the White House told Politico.
www.foxnews.com/ politics/ 2011/ 08/ 09/ romney-calls-disgraceful-obama-teams-plan-for-character -assassination / – View by Ixquick Proxy – Highlight
Whether or not the planned and intended character assassination evidenced by … harlots and their supportive whores in Congress and the White House .
www.rense.com/general72/zoch.htm – View by Ixquick Proxy – Highlight
Jun 5, 2013 … Character assassination attempted on 5th Circuit Judge Edith Jones. ….. (she was sent out the side door of the White House and put in a cab).
althouse .blogspot.com/ 2013/ 06/ character -assassination-attempted-on.html – View by Ixquick Proxy – Highlight
Nov 10, 2013 … Frisk judge’s attorney says city using ‘character assassination’. Judge Shira …. White House widens Obamacare insurance exemptions.
www.nydailynews.com/ news/ crime/ frisk-judge-attorney-city-character -assassination-article-1.1512570 – View by Ixquick Proxy – Highlight
Jul 10, 2013 … But his White House run flamed out spectacularly, culminating in a debate in Michigan where Perry remembered that he’d pledged to shutter …
www.newsbusters.org/ blogs/ tom-blumer/ 2013/ 07/ 10/ ap-starts-2016-character -assassination-rick-perry-part-2 – View by Ixquick Proxy – Highlight
Oct 14, 2013 … My Turn: Donald Rumsfeld a subject of character assassination …. Right are finding common cause – namely, an amateur is in the white house .
www.taosnews.com/ opinion/ article_8894cbc4-31cd-11e3-a383-0019bb2963f4.html – View by Ixquick Proxy – Highlight
Aug 4, 2013 … Character Assassination of Manning is Defense of Criminal U.S. Foreign Policy …. Glenn Greenwald Tells MSNBC Host Put Down White House …
www.youtube.com/watch?v=piF_EhvknU8 – View by Ixquick Proxy – Highlight
[edit]. In politics, perhaps the most common form of character assassination is the spread of allegations that a candidate is a liar.
https://en.wikipedia.org/wiki/Character _assassination – View by Ixquick Proxy – Highlight
Oct 5, 2013 … Will Hutton: The Ralph Miliband article demeans the Mail’s campaigning on bank bonuses and other issues.
www.theguardian.com/ commentisfree/ 2013/ oct/ 06/ miliband-daily-mail-damage-democracy – View by Ixquick Proxy – Highlight
Information about character assassination in the free online English dictionary … The BJP is pursuing politics of character assassination to mislead the people.
www.thefreedictionary.com/character +assassination – View by Ixquick Proxy – Highlight
Character assassination is slandering another person intending to destroy public trust … (4) In fact it is a conundrum of American politics that one way to beat an …
www.batstar.net/piper/char.htm – View by Ixquick Proxy – Highlight
Nov 17, 2013 … This blackmail, or rather political character assassination , always has a victim. It is not the target that is the ultimate loser of such acts- it is …
www.nigeriavillagesquare.com/ articles/ 2015-the-dark-art-of-political –character –assassination .html – View by Ixquick Proxy – Highlight
Dec 3, 2013 … In general, the goal of character assassination is to cause some harm to the target as a result of the stories or rumors. For instance, in a political …
www.wisegeek.com/what-is-character –assassination .htm – View by Ixquick Proxy – Highlight
In context of the Presidential contest between George W. Bush and Al Gore, we hear stories of character assassination …political and non-political .
www.thisamericanlife.org/ radio-archives/ episode/ 160/ character –assassination – View by Ixquick Proxy – Highlight
Character assassination is a common technique used in propaganda. … Politicians are famed for their attacks on their political opponents, from sly innuendo to …
www.changingminds.org/ techniques/ propaganda/ character _assassination .htm – View by Ixquick Proxy – Highlight
Mudslinging, especially during election campaigns, has become political … Therefore, expect character assassination to rear its ugly head during the 2004 U.S. …
www.realtruth.org/articles/167-tdaoca.html – View by Ixquick Proxy – Highlight
Jan 14, 2011 … The Political Economy of Character Assassination . by JONATHAN M. FELDMAN. “I drew and painted out of protest and tried, through my work, …
www.counterpunch.org/ 2011/ 01/ 14/ the-political -economy-of-character –assassination / – View by Ixquick Proxy – Highlight
Of late, there have been a growing trend or emerging pattern in Tanzanian politics which is constructed on the worst style of political blackmail.
www.jamiiforums.com/ great-thinkers/ 564220-tanzania-and-the-politics-of-character –assassination .html – View by Ixquick Proxy – Highlight
Jan 1, 2013 … The rush to character assassination seems to be our only bipartisan imperative and is a blight on our political system. In this brooding age of …
articles.washingtonpost.com/ 2013-01-01/ opinions/ 36103279_1_benghazi-attacks-clot-ambassador-christopher-stevens – View by Ixquick Proxy – Highlight
Dec 11, 2013 … Ramjattan practising politics of deception, character assassination … for “ practicing politics of deception and character assassination ”. Finance …
www.guyanachronicle.com/ ramjattan-practising-politics-of-deception-character –assassination / – View by Ixquick Proxy – Highlight
Nov 17, 2013 … Sonia rails against Nehru’s ‘character assassination ‘. TNN Nov … falsehood and marked by a “political intent aimed at character assassination “.
articles.timesofindia.indiatimes.com/ 2013-11-17/ india/ 44161327_1_character –assassination -jawaharlal-nehru-memorial-lecture- narendra-modi – View by Ixquick Proxy – Highlight
Sep 19, 2013… moves from reporting the news to writing character assassinations. … These economists span the political spectrum — from Jeff Sachs to …
www.forbes.com/ sites/ kotlikoff/ 2013/ 09/ 19/ michael-hiltzik-turns-from-reporting-to-character –assassination / – View by Ixquick Proxy – Highlight
Character Assassination : An Interdisciplinary Approach Eric Shiraev George Mason University, USA Any competition in social, professional, and political life …
character attack.wordpress.com/our-publications/ – View by Ixquick Proxy – Highlight
May 22, 2013 … Political opportunism has reached its lowest point and the only comfort is … of political backstabbing and character assassination are clearly to …
www.informante.web.na/ index.php?option=com_content &view=article &id=12044:hit-lists-dirty-deeds-and-character –assassination &catid=16:off-the-desk &Itemid=102 – View by Ixquick Proxy – Highlight
Jul 10, 2013 … AP Starts the 2016 Character Assassination of Rick Perry, Part 2: ‘A Political Punchline on Par With Dan Quayle’ …
www.newsbusters.org/ blogs/ tom-blumer/ 2013/ 07/ 10/ ap-starts-2016-character –assassination -rick-perry-part-2 – View by Ixquick Proxy – Highlight
The term “swiftboating” is an expression that has become synonymous with deceptive and untrue political attacks that were originally used with devasta.
www.huffingtonpost.com/news/character –assassination – View by Ixquick Proxy – Highlight
It’s Surnow whom Greenwald blames for what he calls the script’s “political character assassination ” of the Democratic icon. True to form, Greenwald has made a …
www.bravenewfilms.org/ is_the_kennedys_miniseries_a_political _character _assassination – View by Ixquick Proxy – Highlight
Yes, I believe that Hillary Clinton is undergoing a character assassination . If you look beyond a year ago in the past, Hillary Clinton’s political and personal …
www.debate.org/ opinions/ is-hilary-clinton-undergoing-a-character –assassination – View by Ixquick Proxy – Highlight
Sep 19, 2010 … “The Politics of Character Assassination ”. “If you push a negative hard and deep enough it will break through into its counterside”…..Eleventh …
www.africanamericanconservatives.com/ 2010/ 09/ 19/ the-politics-of-character –assassination -by-ltc-allen-west/ – View by Ixquick Proxy – Highlight
Oct 13, 2013 … Character assassination is easy. The great thing about it is you don’t actually have to prove anything. You can use any number of techniques.
www.waliberals.org/ conlin-vs-sawant-the-politics-of-character –assassination / 2013/ 10/ 13/ – View by Ixquick Proxy – Highlight
Every two years the American politics industry fills the airwaves with the most virulent, scurrilous, wall-to-wall character assassination of nearly every political …
www.brainyquote.com/quotes/keywords/assassination .html – View by Ixquick Proxy – Highlight
Now she has stunned the political class with an open letter to Fillon in Le Monde, a scathing character assassination accusing him of the “lone ambition” of a …
en.wiktionary.org/wiki/character _assassination – View by Ixquick Proxy – Highlight
noun. : the act of saying false things about a person usually in order to make the public stop liking or trusting that person. Full Definition of CHARACTER …
www.merriam-webster.com/dictionary/character %20assassination – View by Ixquick Proxy – Highlight
Oct 23, 2013… were using social media as a tool for “character assassination . … It was a barely concealed swipe at arch political rival Narendra Modi, who is …
www.ndtv.com/ article/ india/ nitish-kumar-s-dig-at-narendra-modi-social-media-used-for-character -a ssassination-436430 – View by Ixquick Proxy – Highlight
Character assassination — … and Marilyn Monroe — in Jean Seberg’s private life , films, and political victimization, the personal really becomes the political .
www.ejumpcut.org/archive/onlinessays/JC28folder/Seberg.html – View by Ixquick Proxy – Highlight
Sep 23, 2013 … It was 10 years ago that Hillary Rodham Clinton famously lamented “the politics of personal destruction.” The former first lady and future …
www.washingtontimes.com/ news/ 2013/ sep/ 23/ knight-foiling-the-lefts-character –assassination / ?page=all – View by Ixquick Proxy – Highlight
Nov 25, 2013 … “It is pertinent to note that Arjun Modhwadia, while giving a political … The phrase is used to describe a person of bad/loose character ,” BJP …
Jul 1, 2013 … In a series of tweets that appear to have been sent out of frustration, prominent Silicon Valley VC, Dave McClure let it all rip on what he thinks of …
www.ventureburn.com/ 2013/ 07/ dave-mcclure -says-silicon –valley -is-functionally-illiterate-about-mar keting/ – View by Ixquick Proxy – Highlight
———————————————————————–
Option #6: “The Hack and Block”-
Did you ever think you were doing everything right and things inexplicably go south right at the last minute? If you are a reporter or a public service person, you might be under the watch of a Hack and Block Operative . These technical hackers are already inside your phone and computer via embedded backdoors and spyware. Most of the time they do not even have to watch as you type. They just program their spyware to look for a selection of keywords that may have something to do with what they want to block. For example, if you are working on a story about stuffed animals and toxins, they might program their spyware to resend them anything with the words: “teddy bear, mattel, stuffed, stuffing, elmo, toys, investigation…etc” and on and on for thousands of words. The second you type one of these things, the political operative gets a text about it and goes to work. Did you just set up a meeting with an investor? That investor suddenly gets an anonymous tip with damaging info about you and the meeting is “rain-checked”.. Did you just set up a date online? Your date gets a disturbing message about you and suddenly she is “busy”. Did you just try to source a great tip for an interview? Suddenly the tip source “wants to think about it some more”? Your Operative got mail and you got Blocked.
15 hours ago … WASHINGTON — The personal e-mail account of a State Department whistleblower was hacked , and four years worth of messages — some …
www.nypost.com/ 2013/ 12/ 30/ state -dept-whistleblower -has-email –hacked -deleted/ – View by Ixquick Proxy – Highlight
10 hours ago … The personal e-mail account of a State Department whistleblower was hacked , and four years worth of messages — some detailing alleged …
www.infowars.com/state -dept-whistleblower -has-email –hacked -deleted/ – View by Ixquick Proxy – Highlight
9 hours ago … A whistleblower who had helped expose misconduct by Hillary Clinton’s security detail had his Gmail account hacked and key evidence …
www.breitbart.com/ Big-Government/ 2013/ 12/ 30/ Whistleblower -Who-Exposed-State –Department -Wrongdoing-Has-Email -Hacke d – View by Ixquick Proxy – Highlight
Also known as “Hack-And-Extort”!
Ideal counter measures are: Massive disinformation output, never keep anything connected to any network (ie: unplug all power cords and network cables), only write fake meeting dates in electronic calendars, encrypt, relay, tor, create false lead traps that end up at your litigation firm’s office, put black electrical over every camera lens, phone lens, tablet lens, webcam lens, smart tv lens, computer lens, etc.
One of the more horrific uses of Hack and Block is this story, an act which every American is now at risk of if you don’t put black electrical tape over every camera lens on your phone, tablet and computers:
Apple Inc. And Other Webcams Hacked – Miss Teen USA Nude Photos Taken
Apple Inc. And Other Webcams Hacked – Miss Teen USA Nude Photos Taken
http://guardianlv.com/wp-content/uploads/2013/12/Apple-Inc.-And-Other-Webcams-Hacked-Miss-Teen-USA-Nude-Photos-Taken-650×361.jpg
Researchers at the Department of Computer Science at Johns Hopkins University say that Apple Inc.’s iSight camera system among other webcams can be vulnerable to hijack hacking. However, 19-year-old Miss Teen USA, Cassidy Wolf, found out the hard way when she received an anonymous email containing two nude photos of herself that were taken by her own hacked webcam.
The email demanded more nude photos from Wolf or the anonymous sender threatened to release her photos to the public if she didn’t comply. More demands were also made in the email, but the details of these demands were not shared.
http://guardianlv.com/wp-content/uploads/2013/12/Apple-Inc.-And-Other-Webcams-Hacked-Miss-Teen-USA-Nude-Photos-Taken2-450×382.jpg
The nude photos were taken over several months by Wolf’s own laptop webcam. Wolf said that her webcam light never came on during this period, which would have tipped her off that her webcam was in use. It was never confirmed whether the webcam light had been disabled by the hacker, or if Wolf just didn’t realize the LED light being on. The hacker was spying on her and through up to 150 other webcams in the area.
The FBI says suspected hacker, Jared Abrahams, breached the privacy of people by hacking into their webcams with his sophisticated network and peeping software. Abrahams has now pled guilty to extortion charges.
Earlier this month the FBI also revealed that they have been using a malicious software program called “malware” as a spying technique on suspects through the suspect’s own webcams. The malware program was able to allow surveillance without toggling on the “in-operation” LED light located on a suspect’s webcam. This is a similar sounding observation described by Miss Teen USA when her webcam was hacked and the nude photos were taken. Apple Inc.’s and other webcams have a hardware interlock between the LED light and the webcam. When the webcam is in operation, the LED light is always supposed to be toggled to the on position automatically.
Assistant professor and co-author of the Johns Hopkins’ paper – iSeeYou, Stephen Checkoway, says that he and his partner were able to hack into Apple Inc.’s iSight camera system and disable the LED light when the camera was operating. Checkoway and his paper’s co-author, Matthew Brocker, were able to independently control the camera to record audio, video, and snap pictures without enabling the camera’s integrated LED light. The team was able to accomplish their feat by reprogramming the microcontroller contained within the iSight camera system.
Checkoway and Brocker notified Apple Inc. about their ability to exploit the iSight camera system, and although Apple did not reply to requested comments, Apple sources say they took this very serious. The researchers did follow up with Apple several times, but were not informed by any possible plans for mitigation. Checkoway did note that the exploit now only works on older 2008 Apple products.
The federal government made agreements with seven computer rental companies last year, when it was discovered that they were unlawfully spying on their customers. The companies were allegedly capturing photos of their customers through the rental computer’s webcam.
Miss Teen USA is only one case where nude photos have been taken from a hacked webcam. Apple Inc. and other webcam manufacturers will always remain vulnerable to malware hacking programs. The Federal Trade Commission says that currently many thousands of people may be getting spied on from webcam software named PC Rental Agent. This program had previously been installed on approximately 420,000 computers across the world. When it’s not in use, covering the webcam with a piece of paper remains to be the best security from any hacked webcam.
By Brent Matsalla
Sources:
New York Times
Techland
Washington Post
(PS: GHI- A number of auto execs/agency heads have quit, or are sleeping in fear, because they believe they got Hack & Blocked doing bribery, WITH VIDEO, and their numbers may be about to come up in federal investigations. I’d say keep on eye out for Mother Jones or ProPublica’s next video undercover exclusive from the tipsters 😉 …… )
Personal Privacy Security 2014:
(What a drag…)
Get rid of your credit cards. Only use cash.
Tape over every digital camera lens. Don’t buy devices with built-in cameras.
Unplug both the power cord and network cord of any device that network connects, when not in use. Routers, gamebox, appliances, Smart TV’s, etc. They all watch you.
Never leave your wifi unit in the “on” position.
Keep your cell phone in “flight” mode or “airplane” mode until you are ready to use it and then turn it off after use.
Always remove the battery from your phone when you go into a meeting or drive between locations.
Try to buy devices that do not have a GPS chip in them.
Don’t “sync” any device.
Phone, computer and other wall charger/adpaters often have bugs built into them.
Delete your contact list, calendar, taks & memos from any mobile device. Carry them on paper or on a device with no modem, wifi or bluetooth.
Never use a “social network” site. Delete all data and cancel all existing sites.
Remember: “If it has a plug, it has a bug”.
Use TOR and peer to peer hardware and software certified by the open source community.
Never post your picture online. If you do, make sure it is only used once per site and has your own steganography ID in it but your data meta tags stripped out.
Don’t own anything with an RFID chip. Even your car tires have them in them.
Cover your mouth when saying something important. Surveillance cameras read lips.
—————————————————————————
Option #7: “The Molasses Tactic” –
AKA: The slow burn delay tactic
Lawyers and administrators PRETEND to be doing their jobs but, in actuality, they are intentionally delaying and “bottom drawer-ing” actions for years until you run out of money, time, patience, resources and sanity. Specific to reporters, their FOIA (Freedom of Information Act) request will sometimes be held off until the last possible minute.
Sometimes, a law-firm or lawyer will approach you because they “heard about your situation and want to help you”. Be sure they do not, secretly, work for the other side and they are there to make sure you lose the case or that it runs so slow, it has no effect.
—————————————————————————
Option #8: ” Having You De-Googled” – CLICK HERE FOR DETAILS
Paying Google to Remove your name, company name or political campaign from Google Web searches or associating a search of your name with artificially created horrible things as was done with Rick Santorum’s name being “search-frozen” by Google to always bring up a disgusting sexual term.
————————————————————————–
See Additional suppression techniques: CLICK HERE>>>
—————————————————————————
Collaborative article team: hj, hjl, h, ggh, dsg, ght, jk, gg, ma, dm, hr