Zone Resistance

Zone ResistanceZone ResistanceZone Resistance

Zone Resistance

Zone ResistanceZone ResistanceZone Resistance
  • Home of Zone Resistance
  • II REVELATION (Solutions)
  • Revelation 2 (HTML)
  • Zodiac's ID Revealed HTML
  • Stepdad was SRH Murderer
  • Killing Guadalupe
  • Data Caper/STUXNET
  • Infringement
  • NOTES
  • Prior Versions, Etc.
  • Current Editions/Versions
  • Ongoing Communication
  • Más
    • Home of Zone Resistance
    • II REVELATION (Solutions)
    • Revelation 2 (HTML)
    • Zodiac's ID Revealed HTML
    • Stepdad was SRH Murderer
    • Killing Guadalupe
    • Data Caper/STUXNET
    • Infringement
    • NOTES
    • Prior Versions, Etc.
    • Current Editions/Versions
    • Ongoing Communication
  • Home of Zone Resistance
  • II REVELATION (Solutions)
  • Revelation 2 (HTML)
  • Zodiac's ID Revealed HTML
  • Stepdad was SRH Murderer
  • Killing Guadalupe
  • Data Caper/STUXNET
  • Infringement
  • NOTES
  • Prior Versions, Etc.
  • Current Editions/Versions
  • Ongoing Communication

STUXNET: The Aggregated Data Caper

URGENT: If you're reading this before the evening of September 23rd, 2024 (in the Western hemisphere), please stop until you read the information below the timer on the II Revelation page, or at the bottom of the Revelation 2 HTML page.

Hollywood, Big Tech, and the Aggregated Data Caper

 The HTML or PDFs below are copies of the website I created in 2021, documenting how I conceived "aggregated data," and how the US government, tech and film industry stole this and all of my IP, in real time, and paid US judges to make it work.   


 From about February 2021 to February 2023, I had a website at www.DataCaper.com, which told the astounding story of how Hollywood (and the US government) stole my intellectual property, using a variety of hacking methods. The website linked to about 200 legal documents, website, news articles, and videos. I even identified, by name and face, about five of the elite Stanford hackers the US and Hollywood deployed to steal my works and ideas. But easily the most amazing part of the story was the STUXNET portion, which showed conclusively the extreme, almost impossible length the US went to steal my work. Because I've made a policy of writing what I feel and believe, without being insulting, but without pretentiously diluting my views to win-over skeptics, many of my claims initially seem hard to believe -but the more you investigate, the more you understand everything I've alleged (and much more) is accurate. 

The Stuxnet section begins on page 37. The PDF is just a PDF copy of the website I made around February or 2023. The links in the PDF no longer link to documents, and the photos that were on the original website did not print in the process of creating the PDF. I'll upload some of the pics and PDFs, again, if time allows. 

If you'd rather read the phone and computer-friendly HTML version just scroll down.

Download PDF

        This is a PDF of the original Data Caper / Stuxnet website. The site did not convert very well to PDF, so portion are unreadable. Thus, I made the PDF above. Curiously, the many photos on the website/article would not print in the PDF. 

Download PDF

#1

Below is the text of my old website (at datacaper.com), created in 2021. The links are no longer active, but I uploaded some of the photos from the site. I'll upload  some of the old PDFs soon. 

The STUXNET section begins 



HOLLYWOOD, BIG TECH, AND THE AGGREGATED DATA CAPER



FOREWORD​


        My name is Steve Wilson Briggs. In December 2006 I introduced the world to the concept of “Data Aggregation,” in a screenplay that presented a sinister vision of how all of the world’s data could be aggregated (collected together) and streamed into a massive Earth/universe computer replication (simulation), which could then be sped up, thousands of time faster than the actual world, to create a virtual time machine, capable of predicting and preventing crime and predicting military outcomes. In short, beyond “aggregated data,” I conceived the world’s first (and only) actionable time machine.

       Overnight, these ideas would change the world, very much for the worse.

       I introduced these plainly evil ideas to show the unparalleled danger of unbridled, hate-based power. But sickeningly, a group of American corporate powerhouses would unlawfully obtain these ideas, and find them “desirable,” and act to create a White-Western dominated world, where their status as rulers of this new world is cemented by global surveillance, disinformation and aggregated data.

       The following Data Caper article explains how, in December 2006, U.S. big-tech and big-media industries unlawfully accessed my ideas by using a hacking company named MovieLabs (Motion Picture Laboratories, Inc), run by Steve Weinstein, an elite hacker and Stanford University professor to US intelligence personnel, and via the social network for filmmakers "Trigger Street," owned by Kevin spacey, at TriggerStreet.com, where the script was posted, on and off, from 2006 to 2007. (Concurrent to these hacking events, my screenplay was also accessed by a film company, named Zero Gravity Management, who emailed me to request a copy of the script in January 2006. Zero Gravity Management would quickly join forces with the other conspirators.) These parties then quickly involved the US government (under President George W Bush), and invited over 140 major tech and media executives to meet in Hawaii, in October 2007, for a convention called “The Lobby,” to plan secret new US policing and defense systems, based on aggregated data, unauthorized data collection and mass surveillance. Among those in attendance at The Lobby were Jeff Bezos (Amazon), Mark Zuckerberg (Facebook), Sergey Brin and Larry Page (Google), Evan Williams (Twitter founder), Peter Thiel (Palantir, PayPal), Jimmy Wales (Wikipedia). The Lobby, and its elite invitees, were first reported, May 2, 2007, on VenturBeat.com, at: https://venturebeat.com/2007/05/02/the-lobby-are-you-on-the-list/ (or see the pdf HERE). 

       This plan was so contrary to our Founding Fathers’ intent that it amounted to the unlawful formation of a new nationalist social order. And, inevitably, this plan would connect former U.S. President Donald Trump to 3 Ukrainian/Russian businessmen, and entangle the US Copyright Office in multiple acts of document falsification.

      The conspirators / participants. The primary participants in this plan were Microsoft, Amazon, Facebook, Google, Twitter, News Corp, the “Big 6” studios (Disney, Warner Bros, Paramount, Universal, 20th Century Fox, Sony Pictures), their parent corporations (WarnerMedia, Comcast, ViacomCBS, Paramount Global & Sony), the Motion Picture Association & MovieLabs (which are jointly owned by the Big 6 studios), Lionsgate, MRC (Media Rights Capital), WME (Williams Morris Endeavor), and the owners of these companies. For brevity, the article refers to these corporations and their owners as “the conspirators” or “the participants.”

        Amazingly, the facts in the following Data Caper article were only discovered because a wonderful 89-year old attorney named Shirley Potash called me with a tip in March 2018. [Please see my “thank you” to Shirley, on the “Thanks” page, to read the whole story. And read more about Shirley Potash HERE.]


Shirley Potash


       Attached PDFs. The Data Caper article links to many news articles, business filings, IP registrations, as well linking to some PDFs of filings in the court action Briggs v Cameron (2020); most of the Briggs v Cameron (BvC) documents are also linked to the PDF page below the article. Some of these filings contain hundreds of pages of exhibits. The article relies on numerous BvC filings, rather than just the complaint, because after I filed the complaint, as I continued to research the defendants’ shell companies, I uncovered many of the disturbing facts that inspired this article. I then filed numerous motions in limine and requests for judicial notice, to inform the court of the new facts and evidence. (The portion of these filings that you'll find most interesting/astonishing are the FRE Rule 902 compliant exhibit attachments.)


Bullet Points


       Beyond the staggering facts concerning the "aggregated data" and “The Lobby” schemes, the "Data Caper" article reveals:


  1. Why so many big tech & media executives resigned between Dec 2019 and Feb 2021 (Bill Gates, Jeff Bezos, Sergey Brin, Larry Page, Jack Dorsey...);
  2. How two months after the conspirators held "The Lobby" event (Oct 24-26, 2007), Richard Parson, the only Black CEO in Big 6 history, was fired.
  3. How immediately after I introduced “aggregated data,” the conspirators formed many fake “shell” companies, to distribute their stolen profits;
  4. How my court filings ended shell companies, on January 1, 2021;
  5. How former President Donald Trump released dozen of demonstrably fake documents, pertaining to “data aggregation,” on numerous federal websites, in an effort to help the conspirators steal and backdate this concept (the article contains links, including video demonstrations, explaining how to spot the fraudulent elements in the fake web documents);
  6. How, in support of this plan, Ninth Circuit Chief Judge Sidney R Thomas formed 2 shell companies (one, formed in 2006, appears created for payments from film industry participants; the other, formed Jan 2007, just weeks after I introduced “aggregated data,” appears intended for payments from big-tech participants). Thomas then, personally, presided over my Briggs v Blomkamp appeal, AND the rehearing petition.
  7. How, in support of this plan, the conspirators created the "Stuxnet" spyware virus, which was originally named the “Mr X” virus -named after the film I was working on from late 2007 to 2011. This is confirmed by examining Stuxnet’s two (and only) driver/install files, both of which start with the MRX prefix (“Mr X”). The nonsensical "Stuxnet" name was given to the virus by Microsoft, over a year after the virus was  launched.
  8. How, in 2020, to suppress news of these events, the Ninth Circuit removed 25 of my Briggs v Cameron case filings from its public docket (case filings are public documents which should never be removed from the docket), and did not return my case filings until after I published this website.
  9. How the U.S. Copyright Office produced falsified registrations to help foreign entities steal the intellectual property of an American creator;
  10. How these conspirators used trusted news sources to publish & backdate false web-stories;
  11. How my BvC Complaint helped the Department of Justice stop an aggregated data disaster, in the Spring of 2020;
  12. How in its BvC "motion to dismiss," Google admitted to sabotaging my efforts to market my own films and scripts, by not including my films & online fundraising campaigns in Google’s search results, claiming a First Amendment right to do so (read pages 9 & 10, HERE); 
  13. How the conspirators hacked into my devices for 2 decades, using Steve Weinstein & his hacking companies MovieLabs & Liberate Technologies;
  14. How in 2017 to 2018 the conspirators (Google & Facebook) hired me to work in their Google, Facebook & Stanford University funded makerspace, where Steve Weinstein personally came to observe me, at least twice;
  15. How MovieLabs patented its method for hacking me and distributing the stolen ideas to the Big 6 studios (see HERE);
  16. How the Internet Archive created fake crawls of the conspirators’ fake webpages, while Google modified its browser to display valid URLs of these fake crawls.
  17. How, on Jan 14, 2020, the day I discovered how Google and Internet Archive were falsifying crawls and URLs, I happened to film the hackers (MovieLabs) hack into my laptop;
  18. How the same day that I filmed this hacking, January 14, 2020, the NSA revealed a "serious vulnerability" in Windows 10; which allowed the Internet Archive and Google to deceive me for months. (See HERE.) A few days later, the US government and Microsoft said that this was an extremely rare and sophisticated "zero-day" hack. (See HERE.) As you will see, the conspirators used zero-day hacks of Windows software to gain access to my computer, then steal and destroy files, multiple times.
  19. How, to support this plan, the Bush administration and the Supreme Court would pass two laws that would betray the US Founders, by giving judges unchecked power to silence litigants and end lawsuits, without accountability. These new laws were Bell v Twombly (2007), and Ashcroft v Iqbal (2009) -the last case argued under Bush, December 10, 2008. Ashcroft v Iqbal, in just a few years, would quickly become one of the 5 most cited cases in US legal history, and would be used to silence and end thousands of civil rights and copyright suits every year. Meanwhile, three of the five conservative justices that supported the ruling secretly owned shell corporations. (Shell corporations are the corrupt payment apparatus used by money launderers and mafias around the world.)​

​

      After the overlong introduction, I hope you enjoy the story.


​

HOLLYWOOD, BIG TECH, AND THE AGGREGATED DATA CAPER​

​


       The Aggregated Data Caper didn’t just happen; it was a sequel, or a threequel—an unexpected product of two smaller capers:

  1. First. In 1999, after I sent Rupert Murdoch a copy of a short story, Murdoch, Steven Spielberg, Sumner Redstone and Microsoft began using Liberate Technologies to hack into my computer, to steal screenplays. 
  2. Second. January 2006, a defunct company named Zero Gravity Management (ZGM) unlawfully acquired my screenplay; causing the Big 6 to buy multiple ZGM subsidiaries (to keep ZGM quiet). Then, after a federal fraud investigation into Liberate, the Big 6 changed Liberate Technologies' name to "MovieLabs"—to more discreetly steal my ideas.

        Confusing? Let’s take a brief look at the first two capers. 

        [NOTE: The next few passages address "access" (how the conspirators obtained my works). Should you have the slightest doubt about the access story(s), you should know that on March 9, 2020 (five days after I filed my BvC Complaint) the Ninth Circuit Court of Appeals issued its Skidmore v Led Zeppelin decision. The Skidmore v Led Zeppelin ruling effectively makes it unnecessary for Ninth Circuit plaintiffs to show access (because in this age of hacking, online postings and email forwarding, access is always possible). This means I don't need to show or prove access to the court or anyone. But I am including the details concerning "access" to share imperative information, with my fellow Americans, concerning the corruption of American institutions and values. (It is my belief, that the Ninth issued its Skidmore v Led Zeppelin, five days after I filed my BvC Complaint, hoping that it would end my investigation into the Conspirators. It did not.)


1. THE FIRST CAPER

(February 1999)

       In 1999, Rupert Murdoch began to spy on private citizens. (See HERE.) These spying exploits led to the "News International phone-hacking scandal" of 2005-07, which led to Murdoch losing his "News of the World" newspaper. (See HERE.) February of that same year, 1999, I sent Murdoch’s “HarperCollins” book company (and a few other publishers) a copy of my short story, “Hot Orange & Honey,” which can be read HERE (the last page, or so, has been redacted, because I may choose to publish the short, elsewhere, in the future). To read a few notes regarding Hot Orange and Honey, and to read the names and details of the TV series, book and film that infringe Hot Orange and Honey, click HERE. 

       Later that year, November 1999, Murdoch’s News Corp entered into a “partnership” with Liberate Technologies (see HERE), likely to legitimize payments from News Corp to Liberate.

       Steve Weinstein, Liberate’s Chief Strategist/Technologist, teaches “Hacking for Defense” to US intelligence prospects at Stanford University (see HERE)  and worked for the prestigious US Naval Research Laboratory —a research think tank that studies everything from artificial intelligence to electronic warfare; see HERE. (Also see Third Motion In Limine, pp 1-6; Fifth Motion In Limine, pp 22, 23; Opening Brief, p 3.) In 1996, about the time that Liberate Technologies opened, Steve Weinstein and Liberate Technologies patented his method for hacking. (See HERE.) This is Liberate's earliest patent, and Weinstein's only patent. [More on Weinstein under “Disappearing Webpages" in the "Hacking" section, and read about my two personal encounters with Weinstein, near the end of this article.]

       In 2004 a federal investigation accused Liberate of fraud, for using its own funds to create the false appearance of legitimate revenue—by supplying a customer money to make a purchase. Fake companies, that are false fronts for hackers, that make no legitimate product, need to create the appearance of valid income. (See HERE.) (See: Fifth Motion In Limine, p 21.) In April 2005, Liberate closed and sold its assets to Comcast. (See HERE.) 

       Liberate Technologies hacked into my devices from 1999 to 2005, at the behest of: 1. Rupert Murdoch (News Corp), 2. Steven Spielberg (Dreamworks), 3. Paul Allen (Microsoft), 4. Bill Gates (Microsoft), 5. Sumner Redstone (ViacomCBS). To learn how these parties came together, see Amended Second Declaration, pp 24-25.​


2. THE SECOND CAPER 

(January 20, 2006)

  • January 2006, a defunct company named Zero Gravity Management unlawfully acquired my screenplay; causing the Big 6 film Studios to buy multiple ZGM subsidiaries, and change Liberate Technologies' name to “MovieLabs.” 

       In December 2003 or January 2004, I began writing a screenplay originally called “Uberopolis: City of Light.” I finished the first draft in May 2005, and emailed it to a few friends and family. 

      About that same time, Sept 12, 2005, a company named Zero Gravity Management (ZGM), owned by Michael Pierce and Mark Williams, went out of business. (See HERE , a PDF of ZGM's 2005, business cancellation, attached to the BvC complaint as Exhibit U. The California Secretary of State, Shirley Weber, changed the CA Sec of State business filing website in 2022; thus, this filing can not be directly linked to the CA Sec of State website.) 

       Meanwhile, I continued to revise my script, and emailed a portion of my script, to my brother, on May 12, 2005. 

  • The first complete script that I emailed out was sent on May 25, 2005. To read a few pages of this emailed script, click HERE.
  • By Jan 2006, the script was becoming something unprecedented. To see the first few pages of a version, emailed myself, Jan 16, 2006, click HERE.

       Unaware that ZGM was out of business, on January 20, 2006, after finding a listing on moviebytes.com stating that ZGM was looking for screenplays to produce, I emailed ZGM to ask if they would like to read my screenplay. ZGM replied, that same day, via email, permitting me to send them my screenplay. To read that email exchange, click HERE (scroll down to read complete exchange). I emailed ZGM the script immediately.

       Six days after receiving my screenplay, ZGM filed a new California business certificate, and went back in business. (See HERE, a PDF of the business filing, from exhibit V of the BvC Complaint. The link to this filing on the CA Sec of State site was severed in 2022.)

       ZGM (Pierce and Williams) never contacted me again.


Pierce & Williams Become Subsidiaries of the Big 6,

And Appear on the Avatar Copyright. 


       Quickly, Pierce and Williams formed many new anonymous shell companies, which became subsidiaries of various Big 6 movie studios. These shells were formed because, in 2006, ZGM (who were friends with 20th Century Fox's VP, Alex Young) tried to market my script to 20th Century Fox. Upon learning that ZGM were aware of my script, Rupert Murdoch (CEO of 20th Cent Fox) arranged to have Pierce & Williams create numerous shells, that Murdoch and the Big 6 would buy from Pierce and Williams, to funnel money to Pierce and Williams. (See BvC Complaint pp 19-23, for a more detailed telling of this story).

       August 2006, billionaire Stephan H Margolis formed 4 companies with ZGM’s Pierce & Williams (Future Service Inc, Future Films USA LLC, Future Films USA 1 LLC, Future Films USA 2 LLC). For Future Films USA, Margolis (a UK citizen) unlawfully used Pierce and Williams’ California Address. (See HERE.) Pierce and Williams claimed this address on many official documents, at that time. (See HERE.)

       September 2006, Pierce, Williams and Margolis formed their new company, Future Service Inc, which would appear on many Avatar movie copyright registrations. Avatar is one of 2 films at the center of the Briggs v Cameron. Future Service Inc immediately became a subsidiary of Murdoch’s News Corp and 20th Century Fox (now Disney). (See HERE ; also see BvC Complaint pp 15-23, 53.) 

       December 2006, Mark Williams formed Williams Productions LLC, (see HERE ; also Amended Motion In Limine, pp 8-9.)  which became a subsidiary of NBCUniversal, although the company is located in a towing yard (see HERE).


The Motion Picture Association (MPA)


       The “Big 6” are the six most powerful studios in the US (Disney, Warner Bros, Sony Pictures, Paramount, Universal, Netflix*). The Big 6 own the Motion Picture Association (MPA). November 2005, seven months after Liberate Technologies closed, the Big 6 & the MPA filed a California business registration for Motion Pictures Laboratories, Inc (MovieLabs); see HERE. 

  • Netflix replaced 20th Century Fox in the Big 6 in 2019, after Disney purchased 20th Century Fox.


MOVIELABS: PART 1


       The MPA would not announce MovieLabs’ formation until July 2006. (See HERE.)     

       Thus, six months after ZGM acquired my screenplay, the MPA (which had been in existence for 84 years) created its first and only known subsidiary, MovieLabs, and appointed Steve Weinstein as MovieLabs’ first CEO. Weinstein and the other “executives” (hackers) at defunct Liberate Technologies (Raymond Drewry, Craig Seidel, Jim Helman) all moved to MovieLabs. (Click HERE; also see Third Motion In Limine, pp 1-6; Amended Second Declaration, pp 39, 40; Fifth Motion In Limine, pp 22, 23.) MovieLabs claims to be located in Palo Alto, CA (near Stanford University).

       MovieLabs was created to hack into my computer and phone, full time, and steal my screenplays, books, shorts, email —even my conversations.

       Liberate Technologies’ failed because its owners made it a public company, which invited government scrutiny. So the Big 6 & the MPA were careful to make MovieLabs a private company, which they alleged derived its income from a few private clients. [NOTE: All of the hacking companies that the conspirators have used over the years, Liberate Technologies, MovieLabs, EFI (Electronics for Imaging, where Steve Weinstein also worked) claim(ed) that they work for a few private clients, and produce some sort of software for computers or TV boxes or printers —because software is not tangible; thus, they never have to show a product—because these are fake company fronts, for hackers, who don’t produce anything.]

  • The complete facts about MovieLabs are lengthy, so I have moved most of the remaining MovieLabs facts to the section of the article titled: "MOVIELABS - PART 2".

​

  • 3. THE AGGREGATED DATA CAPER BEGINS

The Revision

       Around June 2006, I changed my screenplay’s name, from “Uberopolis: City of Light” to “Butterfly Driver,” and substantially revised it. In addition to the dozen original ideas found in the prior versions, I added an arch about the importance of hope (this has since been infringed dozens of times).

       But in December 2006, I revised the script again, to add four revolutionary concepts, which would inspire new industries (such as: aggregated data collection and distribution, aggregated data based defense systems, biometric data collection and cyber imaging, neurological electromagnetic imaging…). The four revolutionary ideas contained in the revised December 2006 screenplay were:    

  1. Data aggregation: collecting all available data (surveillance cams, GPS, traffic, telephone, meteorological, nautical, astronomical, internet activity, commerce...), then aggregating (combining) all of that data into a giant computer data center;
  2. Using an advanced MRI scanner to make perfect digital/cyber reproductions (neurogens) of human brains, bodies and souls, which look, act and think just like the original human. These neurogens could then be inserted into…
  3. A massive computerized replication (simulation) of Earth and the known universe (called the “GenLab,” “The Accelerator,” or “Soul Machine”);
  4. By inserting all known living persons’ “neurogens” into the Accelerator, and by inserting all available data into the Accelerator, the Accelerator could then be sped up, thousands of times faster than the real world, to prevent and predict crime (and military outcomes) up to 4 hour into the future, with 99.98% accuracy.

  • NOTE: Google is currently very involved in creating computer reproductions of brain scans. (See HERE.)

       I then posted this new version of my script on Kevin Spacey’s screenwriter and filmmaker social network, Trigger Street (at www.TriggerStreet.com) for 3-6 weeks, in December 2006. Although the conspirators may have accessed the script on Trigger Street, I believe they used Steve Weinstein and MovieLabs to hack into my computer, and watched me write it in real time. Once they saw that advanced policing and military systems, and a virtual time machine, were possible (via aggregated data), they set out to make these possibilities realities.


THE LOBBY


The Conspirators’ New Government of Terror

       May 2007, roughly six months after the conspirators accessed my revised screenplay, Google, Microsoft, Amazon, Facebook, the Big 6 film studios, and over 140 executives of powerful tech, film, media and financial corporations, agreed to participate in an exclusive convention, called “The Lobby,” to be held in late October 2007, at The Fairmont Orchid, on the Big Island, in Hawaii. (See HERE; also Fifth Motion In Limine, pp 22, 23; and Opening Brief, pp 6-8.)

       While the big-tech companies were interested in aggregating data to predict markets, crime and military outcomes, and selling these ideas to the US military, the film industry was simply interested in the entertainment value of my ideas.

       “The Lobby” convention was intended to get all of these major companies on board with secretly collecting as much real-time data on users as possible, to create a predictive, data-based marketing system, to anticipate the wants and needs of the participants’ customers. But the larger plan, which many Lobby invitees were likely unaware of, was to collect the data from ALL of The Lobby participants, then use that unrelated aggregated data to create predictive policing and defense systems. 

       There was no official announcement about The Lobby, because it was a private event. On May 2nd, 2007, Matt Marshall published the only known blurb (8 sentences) about the event, which included a “list” of all of the invitees’ names. Inexplicably, on this list, amid the many powerhouse corporations, was Steve Weinstein, CEO of MovieLabs (a company that was only a year old, with no known product or income). The Lobby occurred October 24 to 26, 2007.

       10 days after The Lobby convention, November 6, 2007, Facebook would launch it’s “Beacon” data collection program. Facebook’s Beacon program was quickly sued (Lane v Facebook, Inc). This lawsuit proved that Facebook was collecting real-time user data, without consent, and while users were not logged on, and they continued to collect data after users “opted out”. Beacon ended in September 2009. 

​

GOVERNMENT BY HATRED,

DEHUMANIZATION & SUVEILLANCE


       Demographically, “The Lobby” invitees were disproportionately White, disproportionately Jewish, with a higher representation of Asians and South Asians than are demographically present in America.* Latinos were under-represented. No Blacks attended the “The Lobby” —although a few were initially invited, they were reassigned or promoted before The Lobby took place—making them conveniently unable to attend. (For example, Denmark West of MTV was on the Lobby list, but July 19, 2007, two months after The Lobby list was published (but 3 months before the actual event) West was transferred to BET; see HERE, or pdf HERE.) Renown Black powerhouses, like David Steward, Oprah Winfrey, Robert Smith, Jay-Z and Tyler Perry (who were more established and more powerful than many of the invitees) were conspicuously excluded.​

       The Lobby catalyzed after a group of powerful White men stole the intellectual property of a Black (bi-racial) American (myself), then used the stolen ideas to create military and policing systems that negatively target Blacks (Amazon’s Rekognition and Clearview AI’s facial recognition software, which are behind most American police surveillance systems, have been found to discriminate against Blacks). Therefore, The Lobby must be called what it was: a secret racist retreat to plan to use aggregated data, aggressive surveillance and disinformation to subjugate, brutalize and dehumanize Blacks and darker-skinned minorities. 

       I suspect the Lobby’s organizers were Rupert Murdoch, Larry Ellison, Jeff Bezos, Bill Gates, Larry Page, Sergey Brin and Mark Zuckerberg. Rupert Murdoch’s anti-Black views are expressed in FOX News’ anti-Black bias. The anti-Black sentiment of Bezos, Gates, Ellison, Page, Brin and Zuckerberg can be seen in their companies’ terrible records of hiring Blacks and Latinos, prior to 2020. (See The Opening Brief pp 6-8; Fifth Motion In Limine, pp 22, 23; Amended Second Declaration, pp 41-49).​


THE GOAL


       Today, Microsoft and Amazon both provide aggregated data-based cyber defense services to the US Department of Defense. In 2020, Microsoft and Amazon entered a bidding war for the U.S. JEDI (Joint Enterprise Defense Infrastructure) military contract. Microsoft won. Aggregated data-based policing and defense systems are real. The evidence presented on this website suggests that other major tech providers and social networks, such as Google (Alphabets), Facebook and many others, became data collectors for the US military and policing agencies, AND, after stealing all of these concepts from a Black/bi-racial American (who thought these ideas were clearly to evil to ever implement), the U.S. implemented these ideas, with an extreme emphasis on American Blacks and minorities.

​

​

The Lobby Connects To Fraud at the US Copyright Office;

The Trump-Russian Connection


       While checking the copyright registrations of a few works that infringe my screenplays, I found several shameless examples of the US Copyright Office producing demonstrably falsified documents, and most of these documents were for foreign entities (Japan and the UK). (See the Amended Second Declaration, pp 10-14, and 7, 8, and Second Request for Judicial Notice, and Fifth Motion In Limine, pp 15-20).

       But the sickest example of fraud at the Copyright Office is related to Sony Pictures’ and MRC’s 2017 film “Baby Driver,”  which the Copyright Office went grossly out of date and grossly out sequence to give the film a registration ending in “44444”. (See HERE.) The Copyright Office fraud related to this registration is extensive, fully explained in the Amended Second Declaration, p 9-15 (you can read that section HERE). The significance of this number, in short, is related to my personal interest in the number 4. For 20 years the conspirators' hacker saw the various ways I use the number 4 - such as making certain songs in my movie "The Amazing Mr Excellent" (2010) 4 minutes and 44 seconds long (see https://www.allmusic.com/album/the-amazing-mr-excellent-movie-soundtrack-mw0002187096 ; you'll see the tenth song is 4:44, and the first song is 2:44), and setting Butterfly Driver in the year 2144, and other such personal uses of the number 4). But in selecting a copyright registration number ending in 44444, the conspirators were mocking the fact that on January 16, 2015, I gave my son a check for $4,444.44. A redacted screenshot of my son's bank account showing the $4,444.44 check deposited on January 16, 2015 can be seen below. (See footnote about the number 4 below.) (To learn more about the #4, in relation to the conspirators and me, see the "Postscript" section, at the end of this article.)

​

       By selecting the copyright registration number ending in 44444, the conspirators were trying to intimidate me, and tell me they could see everything I did, and act with impunity. But, perhaps worse than the date and sequencing fraud at the Copyright Office, “Baby Driver” infringes my screenplay “Cyclones,” which I copyrighted in 1992, which Ari Emanuel, Sony, Media Rights Capital and WME could have only accessed through a connection at the US Copyright Office. (The name “Baby Driver” was selected to mock “Butterfly Driver,” and to send a message: “we can steal whatever we want from you.”) All of this prompted me to look into the leadership of the US Copyright Office.

       I quickly learned that Karyn Temple, who was the Register of Copyrights at the time of much of the document falsification, left the Copyright Office in January 2020, and took a new job with the Motion Picture Association (MPA).  (See HERE; also Third Request For Judicial Notice.) Again, the MPA is owned by the Big 6 studios, and the MPA owns MovieLabs.

       I then found Carla Hayden (the U.S. Librarian of Congress, who presides over the US Copyright Office) featured on the “Speakers” website of All American Entertainment (AAE). (See Fifth Motion In Limine, pp 4, 8.) 

       Although I had never heard of AAE, on the AAE “Speakers” website (www.AllAmericanSpeakers.com), I found web pages for the biggest actors in the world (although I found no Black actors, other than Hayden, on this site). I soon found all of the primary conspirators, named on “The Lobby” announcement, listed on the AAE “Speakers” website: Gates, Bezos,  Zuckerberg, Spielberg, Iger, Thiel, Page, Brin, Reed Hasting, Ari Emanuel…. Click HERE.  Somewhere along the way I found Eric Trump, son of former US President Donald Trump. (See Fifth Motion In Limine, exhibit E.)  This prompted me to go to OpenCorporates.com, to investigate AAE. I soon learned:

  1. All American Entertainment Inc (AAE) is based in Deerfield Beach, FL, 29 miles from Trump’s Mar-a-Lago home (Fifth Motion In Limine, p 12); 
  2. All American Entertainment is sponsored by Microsoft, Google, and others (Fifth Motion In Limine, p 8);
  3. All American Entertainment is connected to 3 Ukrainian/Russian businessmen, through a man named Robert Chmielinski (see Fifth Motion In Limine, pp 13, 14). 
  4. In May and July, 2008, Robert Chmielinski opened two companies, which appear to be involved in biometric imaging —the technology necessary for 3D cyber images of human bodies or brains: 1. Imaging Equipment International, LTD; 2. IT - Innovation Technologies, Inc.

  • Any ties Trump may have to these Russians/Ukrainians is hidden by Trump’s 500 shell LLCs; see HERE.
  • To be fair and accurate, this information does not prove a tie between Trump and Russia, now does it prove corrupt action or intent; but it indicate that there MAY be an improper connection, etc.
  • After I filed my Opening Brief with the 9th Circuit (in which I commented that I found no Blacks on the AAE speaker website), AAE began prominently displaying Black artists on its Speakers homepage. 
  • After I filed my Fifth Motion In Limine, the Internet Archive stopped legitimately archiving its crawls of www.AllAmericanEntertainment.com . Now, when one enters “www.allamericanentertainment.com” into the Internet Archive app, the app’s URL directs to: https://web.archive.org/web/2020*/https://www.allamericanentertainment.com/ ; when it should direct to: https://web.archive.org/web/*/https://www.allamericanentertainment.com . 

       Click the last link, to see this. The fake element in the URL that the link redirects to, is the “2020” near the center of the URL, adjacent to the asterisk (*). This Internet Archive fake URL scheme is explained in the BvC Complaint, pp 96-108, and later in this article.

Business Formation Connections

2006

       After the conspirators obtained my script from ZGM, the following businesses (owned by the infringers of my work, or parties connected with the infringement) formed between Jan 26, 2006 and Dec 31, 2006:

  1. Zero Gravity Management LLC, went back in business, January 26, 2006.
  2. Dune Entertainment II LLC, the first “Dune” company, owned by US Treasury Secretary Stephen Mnuchin, was formed March 14, 2006. [Dune Entertainment III LLC, which appears on the Avatar movie copyright, was formed June 2007.] See HERE. (NOTE: Steven Mnuchin was the Executive V.P. of Goldman Sachs from 2001 to 2002.)
  3. ​The same day that Mnuchin’s company was formed, Mar 14, 2006, All American Entertainment Inc was formed (HERE; 5th Motion In Limine, p 10).
  4. July 2006, the Motion Picture Association (owned by the Big 6) opened a new subsidiary: MovieLabs. (See HERE; also Third Motion In Limine, p 4.) 
  5. August 2006, Stephen Margolis and ZGM formed 4 shell companies: Future Service Inc, Future Films USA LLC, Future Films USA 1 LLC, Future Films USA 1 LLC. (See HERE.)
  6. Sept 7, 2006, a man named Sidney R. Thomas (the Chief Judge of the 9th Circuit) formed “Thomas-Hume Holdings, LLC”. (See HERE.) This AZ business filing appears falsified (explained later in this article). Chief Judge Thomas presided over the Briggs v Blomkamp appeal, 2018, AND the rehearing petition.
  7. Sept 20, 2006, Pierce and Williams (ZGM) formed Future Service Inc, which appears on the Avatar copyright and became a 20th Century Fox subsidiary. See HERE.
  8. Jeff Bezos formed his company "Blue Origins" on September 29, 2006; see HERE. Bezos abused lax US business oversight to fraudulently backdate the Blue Origin to 2000, by improperly connecting Blue Origin to a company formed in 2000 named "Blue Operation" (as explained on pages 44 and 45 of the Amended Second Declaration; or see HERE).
  9. February 3rd &  16th, 2006, "The Spaceship Company" (Richard Branson's spaceship building company) was formed. (See HERE & HERE.)
  10. Media Rights Capital (producer of Elysium), formed on November 30, 2006. See HERE. 
  11. Dec 2006, Mark Williams (ZGM) opened a new shell, Williams Productions LLC, which became a subsidiary of Universal Pictures (NBCU) in 2007.
  12. June 13, 2006, former US President Donald J Trump formed “TIHM Member Corp.” See HERE.

  • The significance of Bezos and Branson forming space tourism companies, within a year of each other, is explained at the end of the article.
  • Several years after Bezos and Branson, in 2013, Elon Musk upgraded his goals and announced his intent to use Spacex to get humans to Mars. Originally, from 2001-2013 Spacex had been a rocket company, creating reliable rockets to help propel other private projects into space. See HERE.


2007


       After I published the revised script (containing the "aggregated data" concept, the GenLab/Accelerator, etc), in December 2006, the following businesses (related to the infringement of my work) began forming:

  1. January 11, 2007, Sidney R. Thomas, Chief Judge of the Ninth Circuit, formed  Trinity Property Development, LLC, with Chris Jaska and Randy White. Judge Thomas presided over the Briggs v Blomkamp appeal in 2018. This business filing shows many signs of fraud (explained later in this article). See HERE. Thomas’ business partner, Chris Jaska, is an advanced laser “imaging” engineer.
  2. May 2, 2007, VentureBeat.com announced the Lobby convention, to be held in Hawaii, in October, 2007. (See HERE.)  
  3. Mnuchin’s company Dune Entertainment III LLC, was formed June 2007. (See HERE.)
  4. July 2008, Pierce (ZGM) formed 212 Degrees Fahrenheit Corporation, a company that would become a contractor for Microsoft, Google and the US Marines. (See HERE; also Amended Second Motion In Limine, pp 2, 3, HERE.) 

      *Thus, after acquiring my script, Pierce & Williams went from being out of business, to being (1) owners of numerous Big 6 subsidiaries; (2) subcontractors for Microsoft, Google and the US Marines; (3) producers of one of the biggest films ever (Avatar). 

       These facts suggest the financial structure behind the participants plans. Specifically, after accessing my script in January 2006, the conspirators created shells to receive payments (possibly from Steve Mnuchin and Goldman Sachs). And after they accessed my work in December 2007, and saw my ideas of an actionable time machine and policing systems based on “aggregated data,” the participants committed to actualize these ideas, and may have planned to use Mnuchin and his connections at Goldman Sachs to distribute money to the participants, through All American Entertainment, Inc.

  • Chief Judge Sidney R. Thomas, personally intervened, TWICE, to block my Briggs v Blomkamp appeal. He sat on the Feb 2018, three judge appellate panel (click HERE), and he sat on the April 6, 2018, three judge petition-for-rehearing panel (click HERE).
  • More on Sidney R Thomas' shell companies toward the end of this article.

My Reporting On The Conspirators’ Shell Companies

Led to the End of All U.S. Shell Companies


       “Shell” companies are companies in name only, that hide the true owner’s identity, and are usually used for money laundering or other forms of business fraud. The BvC filings show the conspirators not only created countless shell companies, but protected these shells by hacking, and using The Corporate Service Company (CSC) to falsify WHOIS and ICANN internet records/reports for the conspirators’ fraudulent websites and shells, by taking advantage of internet registration loopholes. (See Pages 43-46 of the BvC Complaint, for an explanation of how this scheme worked.) This is international organized crime.

       Shell companies go back at least 150 years in America, to Thomas C. Durant’s “Credit Mobilier”. The “Panama Papers” (a huge document leak about shell companies) were leaked April 3, 2016. But after the Panama Papers were leaked, the Republican controlled Congress (under President Obama) did nothing about shells. And from January 2017 to December 2020, almost 4 years, Donald Trump (who owns 500 shells) and his Republican Senate, also did nothing about shells. 

       But January 1, 2021, sixteen days after I filed my Opening Brief, the US Congress passed the “Corporate Transparency Act,” which bans anonymous shell companies. The act was tucked away in the annual National Defense Authorization Act. (See HERE.) The Corporate Transparency Act was passed because of my Opening Brief.​


​The Department Of Justice’s

Unlawful & Improper Intervention;

Judge Orrick’s Recusal


       Circumstantial evidence indicates that former US President Donald Trump’s Attorney General, William Barr, and the Department of Justice (DoJ) improperly interceded in Briggs v Cameron, to have the original judge, the honorable Judge William Orrick, recuse. Judge Orrick suddenly recused, on June 23, 2020, without explanation. (See HERE.) It is also possible that Chief Judge Sidney R. Thomas is responsible for this change. Judge Orrick was replaced with Judge Vince Chhabria. Judge Chhabria presided over Briggs v Spacey, and dismissed the matter on a SATURDAY, 3 days before Christmas. Judge Chhabria did this because media outlets are less inclined to check court docket activity on holidays and weekends (as courts rarely enter their orders on weekends, or holidays). District Judge Chhabria was assigned to my cases THREE consecutive times. Cases in the Ninth are to be randomly assigned, to different judges, each time. However, unlawfully, Chhabria imposed himself over my cases three consecutive times.

         Also very concerning, in Briggs v Universal and Briggs v Spacey, I reported large scale and extreme business fraud and improper corporate conduct, on official state business filings and court documents, with AMPLE evidentiary attachments. All that was left for Judge Chhabria was to refer matters to the State Attorneys General (Kamala Harris and Xavier Becerra), as only authorized officers can refer cases to the California Attorney General.  The Briggs v Spacey complaint (attached below) and the Briggs v Spacey Request for Judicial Notice (see HERE) document these corrupt, organized-crime-style business practices. Yet, Judge Chhabria did nothing. 


​

Court Filings Removed From Public Docket


       It appears either Sidney Thomas (Ninth Circuit Chief Judge) or William Barr and the DoJ improperly interceded to have 25 of my BvC court filings removed from the court docket. Legal documents are public documents and should never be removed from the docket. Yet, by looking at the copy of the docket (which is required in the Excerpt of the Record, filed December 16, 2020), one sees that 25 of my filings were removed from the docket, without explanation. The missing docket filings are numbers 4, 8, 18, 31, 35, 37, 39, 43, 45, 51, 52, 53, 67, 68, 80, 81, 83, 84, 86, 87, 99, 101, 103, 105, 109.)  (See Excerpts of the Record, pp 2-10; click HERE.)

       February 2, 2021, I wrote a letter to the Ninth Circuit, asking why these documents were removed from the docket. Click HERE to see the letter. 

       February 24, 2020, the Ninth Circuit sent me a PDF of the updated docket, showing that my 25 documents were now back on the docket. The Ninth did not explain why my filings were removed in the first place.

  • The DoJ acted unlawfully, to protect President Donald Trump, who appears to be a participant in the conspirators’ plan.

FEDERAL Aggregated Data Fraud, Under Trump


       Former U.S. President Donald Trump authorized at least 8 different U.S. federal agencies (including the CDC and the Department of Defense) to produce and publish falsified and fraudulently backdated web-articles on at least 8 federal websites. These falsified documents unlawfully endeavor to backdate the conception of “data aggregation” to before 2007. All of these fake web pages either had demonstrably fake Internet Archive crawls, or had never been crawled by the Internet Archive. Some had additional problems.

       I made 2 videos for the court, of myself examining these fraudulent webpages and their Internet Archive “crawls,” explaining how to spot the fraudulent Internet Archive URL elements. These videos can be seen at https://youtu.be/8E3qt2facA0 and at https://youtu.be/2XTHKDMbrWs ). (See Fifth Motion In Limine, pp 23-25.) The second video is also posted on this site. The first was too large to post on this site, but it is extremely informative. 



My Warning Averts An Aggregated Data Disaster:

The DoJ Disconnects Google’s Undersea

Internet Cable To Hong Kong


       Once I realized that the conspirators had stolen my ideas to make one or more “actual” data aggregation systems for U.S. police and military, I alerted the court that Google and Amazon (and Microsoft) appear to be involved in creating aggregated data-based police and defense systems. I then tactfully warned that aggregated data-based defense systems can be hacked and “give foreign hackers (of the systems or the data) the ability to predict US military responses and allow hackers (or the owners) to predict markets.” (See BvC Complaint, p 124, HERE.) 

       Five weeks later, April 2020, the US Department of Justice ordered Google and Facebook to disconnect Hong Kong from an undersea cable line that Google ran from the U.S. to Hong Kong, between 2016 and 2018. The DoJ ordered this disconnection because they realized that I was correct about this vulnerability. *Thus, as William Barr’s Department of Justice was actively sabotaging my lawsuit, they eagerly accepted my guidance on how to keep hackers out of U.S. defense systems.


  • I also warned of two more vulnerabilities in this sort of aggregated data defense system in my Amended Opposition To Google’s MTD (page 3, filed May 28, 2020, see HERE). But I didn’t elaborate. Neither the DoJ or the DoD enquired about these or other vulnerabilities. 


THE ELITE HACKERS

Steve Weinstein teaching hacking to future US intel prospects at a program connected with Standford University and the US Air Force. Weinstein was one of the elite hackers deployed to hack me from 2007 until around 2019. After that, his subordinated at MovieLabs took over. I also believe Weinstein was one of 2-4 people deployed to hack and spy on me, via cable boxes and phones, from 1982 to 1998 (when I moved to NYC). Edward Horowitz (of HBO) likely led all hacking activities from 1982 to 2007.

Here's Steve Weinstein on his Stanford faculty page.

Here's the elite hacking and theft team at MovieLabs. I suspect Kip Welch was responsible for giving my works to a myriad of talentless Hollywood "writers" to make crappy derivatives. I suspect Daniel Lucas gave any actionable technological ideas to US defense and tech industries, who otherwise had no ideas.

#2

 TWO MONTHS AFTER THE LOBBY, THE ONLY

BLACK CEO OF A BIG SIX STUDIO WAS FIRED


  • As a person who has made a life-long commitment to promoting racial and cultural understanding through art, some of the facts in this section are difficult to report. But as a writer, with a proclivity for science, I'm committed to reporting the facts as I find them; not as I would prefer them. 


       In 1999, when I mailed my short story, Hot Orange & Honey, to Rupert Murdoch’s HarperCollins Books, ALL of the Big 6 film studios were owned Jewish men:

  1. Disney - Michael Eisner (1984 – September 2005);
  2. Paramount and CBS - Sumner Redstone (1994 – 2016);
  3. Sony Pictures - Michael Lynton (CEO, 2004 – 2017);
  4. Twentieth Century Fox - Rupert Murdoch (CEO 1985 – 2019);
  5. Warner Bros - Barry Meyer (Oct 1999 – 2013) 
  6. NBCUniversal - Edgar Bronfman (1995 - 2001)

       But in December 2001, something monumental happened in America: Gerald M Levin (a Jewish business man who had been the CEO of Time-Warner) resigned, after the bad AOL/Time-Warner merger, and Richard Parsons (a Black American businessman) was appointed as his successor. 

       Thus, in or around January 2002, for the first time in history, a Black American was the CEO of one of the Big 6 film studios (Time-Warner Bros). Well, technically, Richard Parsons was the CEO of Time-Warner, which is the parent company of Warner Bros movie company. So, although Parsons was not necessarily running Warner Bros directly, he was Barry Meyer’s boss (Meyer was the CEO of the subsidiary Warner Bros). Richard Parson would not last long. But about 12 curious events would transpire before Parson’s 5 year reign ended:

  1. In 2004 NBC and Universal Pictures merged, becoming NBCUniversal (NBCU), and Robert Wright would be named CEO.
  2. In 2004, Dan Glickman was appointed CEO of the MPA.
  3. May 2005, I finished the first version of Butterfly Driver (Uberopolis), and I began emailing and giving it to a few family and friends. 
  4. A few months later, September 2005, Michael Eisner resigned at Disney, and Bob Iger became the new CEO.
  5. Two months later, November 2005 MovieLabs was created. 
  6. December 2005, I registered my script with the Writers Guild of America, west (the WGAw is closely connected to the Big 6).
  7. That same month, December 2005, Time-Warner (the only communication giant with a Black CEO) promoted Jeff Bewkes to President, directly under Richard Parsons. This allowed Bewkes to interact with Barry Meyer (CEO of Warner Bros) without involving Richard Parson. 
  8. Also, that same month, December 2005, NBCU promoted Jeff Zucker to CEO of NBCUniversal Television Group, under CEO Robert Wright.
  9. July 2006, around the same time that I revised my screenplay and renamed it "Butterfly Driver", MovieLabs named Steve Weinstein as MovieLabs' first CEO.
  10. One year later, December 2006, I published the “aggregated data” version of Butterfly Driver, which started the aggregated data race.
  11. Two months later, on February 6, 2007, Jeff Zucker was promoted to CEO of NBCUniversal, replacing Robert Wright. 

       At that point, February 2007, ALL of the CEOs of the Big 6, AND the CEOs of the MPA and MovieLabs, and Steven Mnuchin and Stephen Margolis (Future Films) were all Jewish:

  1. Disney - Bob Iger;
  2. Paramount and CBS - Sumner Redstone;
  3. Sony Pictures - Michael Lynton;
  4. Twentieth Century Fox - Rupert Murdoch;
  5. Warner Bros - Barry Meyer;
  6. NBCUniversal - Jeff Zucker;
  7. The Motion Picture Association - Daniel Glickman;
  8. MovieLabs - Steve Weinstein.

       At that point, of all of the Big 6 CEOs, only Barry Meyer, at Warner Bros, had a superior in America. Parson was Barry Meyer’s superior. (Note: Michael Lynton, of Sony Pictures, had a superior in Japan). That’s when the twelfth and final event happened:  October 24-26, 2007, the Lobby convention occurred.

       Monday, November 5, 2007, just 9 days after The Lobby event, CNBC announced that Richard Parson, the only Black CEO in Big 6 history, was “stepping down.” (See HERE.) Jeff Bewkes was promoted to CEO of Time-Warner. 

       I’m confident that Parson was released because the other Big 6 CEOs worried that if Parson found out that MovieLabs was stealing the ideas of a Black American, he would not comply. But in fairness to Parson, he —like all good Americans— would not comply if he knew anyone, of any race, was being robbed and exploited. 

       You see why this is so troubling... It looks like subset of Jewish CEOs stole the ideas of a Black American; then gave those stolen ideas to a subset of White big-tech business owners, who used those stolen ideas to engineer aggregated data policing systems that would unfairly target Blacks and dark skinned minorities. 

       If you’re a small-minded racist, intent to see Jewish people as bad or evil, you might read the last page of Morons Don’t Ride Harleys (click HERE). It reminds us that the group that was perhaps most helpful to Blacks during the civil rights era was the American Jewish Community, who lost many lives defending the rights of Blacks.

Dozens of Big Tech & Big Media Film Companies’

CEOs Suddenly Resign, Due To Briggs v Cameron

       As explained in the BvC Complaint, I began composing the Complaint in August, 2019. By late August or early September, 2019, I became aware that hackers were hacking into my laptop (the evidence of this is provided in the BvC Complaint). From the time that I began writing the Complaint (August 2019), to the time I submitted it to the court (March 2020), then to the time that I published this website (February 2021), 18 months, the following ELEVEN major big tech and big media CEOs resigned:

  1. Larry Page (CEO, Google) resigned Dec 3, 2019;
  2. Sergey Brin (CEO, Google) resigned Dec 3, 2019;
  3. Emma Watts (President, Twentieth Century Fox) resigned Jan 30, 2020;
  4. Bob Iger (CEO Disney) resigned Feb 25, 2020.
  5. Bill Gates (resigned from the board of Microsoft and Berkshire Hathaway), March 13, 2020;
  6. Joe Ianniello (CEO of the CBS Entertainment Group) resigned March 23, 2020;
  7. Ronald Meyer (President, Universal Pictures) resigned Aug 18, 2020;
  8. Kevin Tsujihara (CEO Warner Bros) resigned September 2020;
  9. Steve Burke (CEO NBCUniversal) resigned Dec 31, 2020;
  10. Phil Griffin (President, MSNBC) resigned January 2021;
  11. Jeff Bezos (CEO, Amazon.com) resigned Feb 2, 2021.
  12. Jack Dorsey (CEO, Twitter) resigned November 29, 2021.

  • In addition to the 11 CEOs named above, at least 100 more executives resigned or were fired (related to their knowledge of, and participation in the theft of my intellectual property). Click HERE to see 30 news articles naming 36 of these 100+ Big 6 film studio executives to resign of be fired in 2020 (these headlines do not include those CEOs named above). ​

       Also, as I wrote the Complaint, the following events occurred:

  1. In October 2019, former President Trump’s Attorney General, William Barr, met with Rupert Murdoch (owner of Fox News, and the former owner of Briggs v Cameron defendant Twentieth Century Fox). (See HERE.) As the article indicates, there was a great deal of speculation about why Barr met with Murdoch
  2. After 13 years, Future Service  Inc closed, September 27, 2019. (See HERE.)
  3. After 11 years, Michael Pierce (co-owner of Zero Gravity Management, Inc) closed 212 Degrees Fahrenheit Corporation, January 3, 2020. (See HERE.)
  4. Karyn Temple, the Register of Copyrights, left the Copyright Office in January 2020, and took a job at the Motion Picture Association. 

  • Also, Jeff Zucker, the CEO of CNN (who was the CEO of NBCU during much of NBCU’s theft of my work, 2005-12), announced he would resign from CNN at the end of 2021. 

       Rather than holding these corporations and their CEOs criminally and civilly accountable, under Donald Trump, the Justice Department just let these CEOs resign.

  • Immediately after I filed my BvC Complaint, March 4, 2020, Bill Gates emerged from what seemed like a years long absence, and went on a months long talk-show tour, presenting himself as a Covid-19 and an environmental wellness “expert” (although he has no such credentials). In all of these speaking engagements he had the host ask him about an absurd Covid-19 conspiracy theory that Gates has placed molecular microchip tracking devices in the Covid-19 vaccines. His intent was to use this absurd microchip story to encourage viewers not to believe conspiracy theories that involve Gates. 
  • Two months after I filed the BvC Complaint (and about a month after George Floyd was murdered by police), Hollywood began donating hundreds of millions of dollars to black causes, and hiring Black writers and producers --at a time when Hollywood was losing billions, and laying off thousands, due to the Covid-19 theatre closures. Hollywood and big-tech did not explain why they ignored police murders of Blacks for generations before then (Amadou Diallo, Eric Garner, Philando Castile), including the murder of Black children (Trayvon Martin, Eric Garner, Philando Castile). Nor did Hollywood and big-tech explain why they did not support Colin Kaepernick's fight against police brutality and for Blacks' basic right to protest for their own survival. This change was due to my Briggs v Cameron Complaint. (Meaning: everything that the Hollywood and big-tech did after I filed the BvC Complaint, every gesture of support for Blacks and multiculturalism,  was done only to mitigate damages.) 

​

  • HACKING

(See the "Stuxnet" section, near the end of this article, to read the most serious and stunning hacking facts and evidence.)

       I began working on the Briggs v Cameron (BvC) Complaint in mid August 2019, but did not submit it to the court until almost 7 months later, March 4, 2020. Page 56 of the BvC Complaint describes some of the first signs that my laptop and phone were being hacked, which I first observed in late August or early September 2019; culminating with myself videotaping a hacking on January 14, 2020 (roughly three months before I filed the complaint). But by summer 2020, I would learn that the conspirators began hacking my computer and phones two decades earlier.

  • You will find several videos on this website. One of these videos is from October 11, 2019. This video shows the strange way Internet Archive crawls of key pages began redirecting to other addresses, and is included to show that I began to suspect that I was being hacked, many months before my complaint was filed.
  • Hacking Caught On Video Tape

       On January 14, 2020, I discovered how the conspirators’ fake Google URL and fake Internet Archive crawl scheme worked, by comparing the URLs in my Google browser to my Explorer browser. Immediately after I discovered how the conspirators’ scheme worked, Google stopped manipulating its Chrome browser, and displayed the correct URLs. However, although the actual URLs were now visible, the URLs in question all had fraudulent elements in them. 

       Quickly, I began making a video for the court, to explain how the fake Chrome URL and fake Internet Archive crawl scheme worked. Then, while making a video, I happened to film the hackers (Weinstein and MovieLabs) permanently remove a web document that I had just filmed and described to the court. This video can be viewed on this site, below, or at  https://www.youtube.com/watch?v=5pUX3T37iTY . (Reading page 100 of the BvC Complaint will help to understand the video.) Evidence of the hacking occurs about 7 minutes and 15 seconds in. The BvC Complaint also describes and explains the Internet Archive app’s improper URLs and improper redirecting, and more. See BvC Complaint, pp 100 and 115; and see:

  1. https://www.youtube.com/watch?v=b-j5SQ4_NHg  
  2. https://www.youtube.com/watch?v=lKxuSUXEsQc&t=23s 

  • The NSA Announced A Major Google Vulnerability,

Jan 14, 2020, The Day I Videotaped The Hacking

       January 14, 2020 (the same day that I solved Google’s and Internet Archive’s fake URL and fake crawl scheme, and the same day that I videotaped the hackers hack into my computer), the National Security Agency (NSA) announced, in several news outlets, the discovery of a new "serious vulnerability” that could be used to create malicious software that appeared to be legitimate. The flaw “makes trust vulnerable.” (See HERE.)  (See Briggs v Cameron Complaint, pp 96 and 100.) The conspirators ostensibly exploited this vulnerability.​

  • Microsoft’s Hacking & Business Fraud

       On June 6, 2007, a fictitious business named South East Film Association/Club sent a viral email to my computer, which erased 2 years of my outgoing Microsoft Hotmail email, from May 2005 to June 2007. (See BvC Complaint p 56, 57.) This was an ill-conceived effort to try to erase all evidence of my screenplay (with the new aggregated data and GenLab elements). Bill Gates and Paul Allen (who owned Hotmail) directed this virus, or faux-virus, attack. I suspect this because I am unfamiliar with a virus that erases outgoing email—although I am no cyber-virus expert. To this day I have never erased any email sent from any of my email accounts.

       The Complaint (p 56, 57) explains how the conspirators used Register.com and Corporate Service Company (CSC) to expunge and erase all ICANN WHOIS internet registry information on South East Film Association/Club, and reset the ICANN registry to indicate that the company/site was created in October 22, 2019 (the very time that I was investigating the website), to indicate that South East Film Association/Club did not exist until 2019; despite the fact that it existed in 2007—and sent me an email that survives to this day. At the time of this email “hacking,” Microsoft’s business certificate showed that it used CSC as its agent for service of process.

  • Almost immediately after the Biden administration took office, February 26, 2021, the ICANN (Internet Corporation for Assigned Names and Numbers) website announced that ICANN had revoked the credentials of “Net 4 India Limited”. Net 4 India Limited is the webservice the conspirators used to fraudulently alter web documents, and falsify the WHOIS internet registry information for South East Film Association/Club (described above). You can see this announcement HERE.  I believe, the Biden administration took this action as a result of my court filings.​​​
  • Google & Internet Archive’s Internet Fraud & Abuse

       The Internet Archive produced countless demonstrably falsified website crawls of dozens of fake web articles created by the conspirators. The Internet Archive modified it's web app, so that when a user enters the web address of one of the conspirators’ fake websites into the Internet Archive’s search bar, the app redirects to the fraudulent and fake crawl pages, which displayed improper URLs. 

       To support this scheme, Google manipulated its Chrome browser to display fraudulent URLs (which appeared valid) of the falsified Internet Archive crawls. (See BvC Complaint, pp 26-50, and 96 to 121.) ​

Steve Weinstein (photo from US 16th Air Force Website).

​

  • Disappearing Federal Webpages Concerning Steve Weinstein


       On several occasions, after I attached web documents concerning Steve Weinstein to my legal filings (with accurate and valid URLs), the web pages later changed, significantly. Most recently, on December 16, 2020, I filed my Opening Brief with the Ninth Circuit; on Page 3 of this brief, I provided a screenshot of the US Sixteenth Air Force website (at: https://www.16af.af.mil/News/Photos/igphoto/2001899947/ ), which featured a photo and caption of Steve Weinstein teaching a group of adults at Stanford's “Hacking for Defense” class. After I filed the opening brief, this web page was removed, and the URL redirected to an archival address (at: https://www.16af.af.mil/News/Legacy/?Page=66 ). Weinstein’s photo was buried on the new archival URL, and the photo no longer featured the original caption. The site was clearly created to hide what “Hacking for Defense” is. Moving this Sixteenth Air Force page could only have been ordered by Donald Trump or someone at the US DoD. 

       Because of the alteration of these webpages, I requested permission from the Ninth Circuit to submit a Corrected Opening Brief, to report this alteration to the court. The Ninth Circuit denied this request, but I have uploaded a PDF of the corrected brief on this site, for verification. 

  • Thankfully, after I published this website, February to March, 2021 (shortly after Joe Biden took office), the first Sixteenth Air Force webpage, linked above, was restored. The second webpage, on the archival site, is still there, and appears even more elaborate. I suspect this archival page was created to give Steve Weinstein cover, as a US Defense Department agent. It is shameful that the US government would provide cover to people who are engaged in stealing honest Americans’ intellectual property.
  • Immediately after I reported to the court that Steve Weinstein teaches “Hacking for Defense” at Stanford University (see Aug 25, 2020, Amended Second Declaration, and Third Motion in Limine), new web pages concerning Weinstein began to pop up online. These new webpages suggested that “Hacking for Defense” is part of an innocuous youth environmental entrepreneurial mentoring program. It is not. 

In Court Filings, Google Admits to Sabotaging My Personal

Film Marketing Efforts --As Their First Amendment Right

       In 2012, Google arranged to make my online efforts to market my own film projects and screenplays (on services such as KickStarter and Indiegogo) NOT appear in Google’s Chrome search results. (See BvC Complaint p 57, 58.) Google’s manipulation and control of search results can also be seen in The Amended Second Motion In Limine, pages 5 and 6. Google admitted to these charges in its motion to dismiss, filed May 22, 2020 (see HERE), stating:

  • “...Google’s choices in omitting certain websites from search results while allowing others to appear is protected by the First Amendment.” (p 9)
  • “Again, designing an algorithm that results in some pages being shown and not others is not actionable under First Amendment principles,...” (p 10)


MOVIELABS - PART 2:


MovieLabs Patents Its Method For Hacking Me 

& Distributing The Stolen Property To The Big 6

Above: Text and an image from Movielabs'

(Motion Picture Laboratories) Hacking Patent

​

       MovieLabs called itself an “R&D” (research and development) company for 14 year (see HERE.), but after I alerted the court, in August and September of 2020, of the evidence that MovieLabs and Steve Weinstein are an organization of hackers, MovieLabs suddenly changed its California business statement of information, and now, as of January 11, 2021, MovieLabs claims to be a not-for-profit Trade Association (see: HERE.). Although MovieLabs claimed to be an R&D company for 14 years, it only applied for three patents those 14 years, in 2007 and 2009 (and two of the patents appear simplistic and fraudulent, and one appears unlawful). Meanwhile, most technologies companies (like Sony) apply for dozens, even hundreds of patents EVERY year. MovieLabs is not an R&D company or a trade association. It is a hacking company.

       Bizarrely, the Big 6 and MovieLabs were so confident that they would make huge money from hacking into my computer and phone(s), that they actually patented their method of hacking into my computer(s) and phone and giving the ideas stolen from my screenplays, shorts, books—and even my conversations, to the Big 6 film companies.

       You can read brief abstracts to MovieLabs three patents HERE. 

       MovieLabs first patent (2007), number 8655826, is a very generic verification system. I found no evidence that anyone is using MovieLabs technology. It appears as if this patent was submitted just to make the company appear credible.

       The third patent (2009), number 7979464, is a patent for putting data in a simple software folder when downloaded. This is not patentable because it had been done, automatically and free of charge, for two decades before MovieLabs.

       But the second patent (2009), number 8015283, is MovieLabs’ patent for their method of hacking me and sharing the data with Big 6 film studios. The abstract reads: 


  • “Abstract:  Particular embodiments include cooperative monitoring of peer-to-peer activity on a network including maintaining communication between a local monitoring process and a network monitoring process such that a process can use both network monitoring and local monitoring. The cooperative monitoring includes monitoring a local peer using local monitoring of a point in the network by monitoring packets passing through the point, monitoring the network using network monitoring by a monitoring system or agent coupled to the network, and analyzing the result of network monitoring and local monitoring to determine at least one file transfer association with the local peer.”

       You can read MovieLabs patent for hacking me on the Patent Office website, HERE.   

       You can see the illustration that MovieLabs created for its system, at the bottom of the first page. The illustration looks exactly as you may have imagined. In the illustration, I am represented by the entity named “Local peer,” and MovieLabs (and Steve Weinstein and his cohorts) are the “Local monitor.” The patent itself explains that the “local monitor” collects the information (AKA “packets”) stolen from me (“local peer”), then distributes this stolen information through “a network address translation (NAT) router,” which then delivers the stolen information to the “Remote peers”.

  • See the "Stuxnet" section, near the end of this article, to understand what this patented hacking system is (hint: this patent is based on the Stuxnet spyware).

MovieLabs' Email Declares How Valuable

My Ideas Are To The Film Industry, And Shows 

MovieLabs Derives No Legitimate Income


       In 2014, Wikileaks released an email from Mitch Singer (Sony Pictures’ CSO and a MovieLabs board member) to Leah Weil (Sony Pictures’ legal counsel), in which Singer states how important stealing my ideas were to the film industry. Singer wrote:

  • “Leah, I'm in a Movielabs Board meeting and based on the increase in the number projects and the importance of many of their projects to the industry, they will be asking for a 5 percent increase in their budget for an additional research engineer.” 

        Singer is discussing the fact that stealing my ideas was vitally important to the industry. No, he does not use my name. But there is no other explanation, as MovieLabs’ patents show that they have not produced ANY technology that the industry uses, and shows that MovieLabs has patented a hacking system. The Big 6 make about $300-Billion per year. If MovieLabs had a deserving technology they would be mega-millionaires, or billionaires. MovieLabs hacks. Further proof that MovieLabs is illegitimate is found in the remainder of this email, as Singer asks Weil for a budget increase. Singer writes:

  • “...they will be asking for a 5 percent increase in their budget for an additional research engineer. There is support from the Movielabs Board for the increase, including me. No formal vote was taken. Movielabs budget for 2013 was 4.8M. Historically it has averaged 5.4M. they will be asking for slightly more than 5M. More than happy to discuss in more detail.” 

       It is illegal for a parent corporation to pay a subsidiary’s budget (see Opening Brief, pp 4, 34). A company buys a subsidiary because that subsidiary has a client base and is making money. But MovieLabs has no clients, and is begging the parent for money. [NOTE: In this email MovieLabs is seeking another hacker (“researcher”) to monitor me, because, in October 2013, I sued Sony Pictures and Neill Blomkamp (Briggs v Blomkamp), and the Big 6 wanted to observe my work on this lawsuit.] This email can be seen HERE.

​

HOW I CAME TO WORK IN A GOOGLE/FACEBOOK MAKERSPACE, 

WHERE I TWICE DIRECTLYENCOUNTERED STEVE WEINSTEIN, IN 2017/2018


       In 2016, to write my book, Morons Don’t Ride Harleys, and to attend some legal affairs (copyright), I left my job at a high school in Redwood City.

        In 2017, finished with my book, I began looking for a new job. I primarily used Indeed.com in my job search.  Away from writing, I’ve always worked with at-risk and emotionally troubled kids. Although Indeed sent me a reasonable variety of job listings, clearly the best fit was a makerspace ”Tinkerer” position, in the Ravenwood school district, an under income, minority district in East Palo Alto, California (just a few miles from Stanford University). In the end, I accepted this position in September 2017, and worked as a “tinkerer” in the Ravenswood school, from September 2017 to around July 2018.         The roughly six Ravenswood makerspace classes (at 6 different schools) were all sponsored by Stanford University and Facebook, and were largely funded/supported by Google (Alphabet Inc). You might recall that Steve Weinstein teaches “Hacking for Defense,” at Stanford University. [To see that Stanford, Facebook & Google all finance Ravenswood’s makerspaces, see HERE, and HERE, and HERE, and other online sources (or see PDFs HERE, and HERE, and HERE).]         While I was working as a tinkerer in the makerspaces in Ravenswood’s “Cesar Chavez” and “Los Robles” schools, I and the other tinkers were required to attend various trainings and makerspace “conventions,” which were all held a few miles from Ravenswood, at Stanford University. These trainings occurred about every 4-6 weeks. At least two of these trainings were multiple day trainings, 2-5 days. And one of these multiple day trainings (which I believe was a 3 day training), involved makerspace leaders and pioneers from around the world, and Steve Weinstein was very certainly at this training. The main training room at this particular training was fairly large (able to accommodate about 200 visitors), and the seats were positioned in semi-circular rows. Weinstein did not speak, as I recall, but he sat in the front row, where most of the leadership and speakers tended to sit. And for at least 2 days he positioned himself where he could see me (I tended to sit in the middle or back rows, toward the outer wings). I remember this quite clearly, because I am decidedly aware of my surroundings, and I found his semi-regular glances in my direction uncomfortable and unusual. After one of the breaks, I moved to another location in the classroom, hoping to sit a few rows behind him, where he’d have more difficulty glancing at me; but Weinstein also moved, to a position where he could glance at me, at will.

       Perhaps more curious, during my first 2 months as a Ravenwood makerspace tinkerer, I was told that a group of international visitors wanted to come visit my makerspace, to see the kids, the tools and crafts, and to see me work with the kids. I welcomed the guests, a large group of 12-20 adults. Although my students were probably 90% minorities (Latinos, Pacific Islanders, Blacks), the visitors were disproportionately White (from around the nation, and the world, as I recall). But in this group of visitors was Steve Weinstein. Of course, I had no idea, then, that he was involved in hacking and stealing my property.​


THE U.S. BECOMES INVOLVED UNTIL EARLY 2006


         Steve Weinstein's career indicates that he has worked on and off with, and for, the U.S. Government for much of his adult life. However, although I believe Steve Weinstein began hacking me, for Liberate Technologies (who gave the hacked information to the Big 6: Warner Bros, DreamWorks, Twentieth Century Fox, and Sony Pictures), perhaps as early as 1996, I don't think that the U.S. government was aware of what Steve Weinstein and Liberate technologies were doing until much later. I don't think the U.S. became aware and involved until early 2006, or late 2005 (the U.S. likely learned of my ideas while I had my screenplay posted on InkTip.com and/or TriggerStreet.com). I believe this because of the new and unexpected directions that NASA and Elon Musk suddenly embarked upon in early 2006, which follows ideas I put forth in my screenplay and depart from NASA's previously and publicly established goals (more on this under the heading "THE SPACE TOURISM INDUSTRY"). I don't think the US became aware of my ideas until early 2006, because, as explained earlier, in 2004, US federal investigators accused Liberate Technologies of fraud. If the U.S. were involved with Liberate Technologies then (2004), they would not have initiated that high-profile action against Liberate. But I don't think that the US became aware of Steve Weinstein and MovieLab's awareness of my work until late 2006 or early 2007. I suspect that once Steve Weinstein left/closed Liberate Technologies, formed MovieLabs, and hacked into the Accelerator/Genlab version of my screenplay (late 2006, early 2007), he saw the actionable potential of those new ideas, and inform U.S. Department of Defense, in late 2006 or early 2007. Once the U.S. was aware of my ideas, they were obligated to inform me, and pay me for the substantial value of those ideas. Rather, the U.S. appears to have authorized Steve Weinstein and MovieLabs to expand their hacking and stealing operation, as the facts indicate, as you will see.

​

Fraud At The US Copyright Office


        Pages 4 to 11 of the Fifth Motion In Limine, and pages 9 to 14 of the Amended Second Declaration, as well as the Second Request for judicial notice (see PDF below, and other BvC filings), provide some of the many verifiable examples of fraud committed by the US Copyright Office, much of which occurred under Carla Hayden (Librarian of Congress, who presides over the US Copyright Office) and Karyn Temple (former Register of Copyrights).  Carla Hayden is/was listed/featured as a speaker on the All American Entertainment's "Speakers" website, at https://www.allamericanspeakers.com/speakers/403804/Carla-Hayden . The details of Hayden's and Temple's involvement in using the copyright office to falsify documents in the infringement of my work should interest anyone hoping to keep the US from becoming a corrupt, irrelevant, second-tier power. Click the previous mentioned links to see details and evidence of Hayden's and Temple's engagement in these unlawful activities. However, I will not explicate those matters here, as the central focus of this article is the aggregated data caper. Specifics related to the infringement of my intellectual property are, and will be, addressed, in greater detail, in other venues. (NOTE: As an Obama and Biden supporter, it is disappointing that Barack Obama appointed Hayden, and Temple was also appointed under Obama. It is equally disappointing that Hayden continues to serve under Biden. Disturbingly, after Karyn Temple left the US Copyright Office, January 2020, she took a job with the Motion Picture Association, which owns MovieLabs, and which is owned by the Big 6 film studios.) 

​

EVIDENCE THAT 9TH CIRCUIT CHIEF JUDGE

SIDNEY R THOMAS IS ENGAGED WITH THE CONSPIRATORS

AND HAS FALSIFIED HIS ARIZONA BUSINESS FILINGS

TO HIDE HIS CONNECTION TO THE CONSPIRATORS


       Because of the unusual rulings that I experienced at the hands of the Ninth Circuit (Briggs v Blomkamp, 2018), I decided to do some routine investigation on a few Ninth Circuit Judges. I chose to start with Chief Judge Sidney R. Thomas because he is the Chief Judge, so who chooses which judges will hear each appeal; thus, he is, by far, the most powerful judge on the Ninth Circuit. 

       My investigation into Thomas was simple: I entered his name into the OpenCorporates.com app, to see if his name popped up on any business registrations. There, I found “Sidney R. Thomas” listed as a manager or agent on two Arizona (AZ) businesses: Thomas-Hume Holdings, LLC, and Trinity Property Development, LLC.

       Amazingly, the first of these businesses, Thomas-Hume Holdings, LLC, was formed September 2006, just 6 months after ZGM accessed my work. (See HERE.)  

       More amazingly, the second company was formed on January 11, 2007, just weeks after the new revised version (the aggregated data version) of my script appeared on TriggerStreet.com. (See HERE.)

       At the Arizona Corporation Commission’s website I noticed that some of the listings for Sidney R. Thomas did not have the “R” in the name, and some added the suffix “III” ("the third") to the name. Thus, some of the listings appeared “Sidney R Thomas III.” So, for example, on the second link (above) Trinity Property Development, LLC, both names appear on the webpage; at the top of the page the name is “Sidney R Thomas III”, but at the bottom of the page the name is “Sidney Thomas”. This was curious because when I searched on OpenCorporates.com, I didn’t notice a “III” suffix on the names returned.

       On the Thomas-Hume Holdings webpage, I clicked on the “Document History” link. The link took me to an “entity information” page with links to two documents: 1. “Articles of Organization” and 2. “Miscellaneous Document”. But both links showed the same document, the “miscellaneous” document, an “Application for Registration of Corporate Name.” About 90-120 minutes later, when I clicked on the “Articles” link, again, the Articles of Organization document suddenly appeared.

       Even more amazingly. Trinity Property Development LLC was formed Jan 11, 2007, a month after I introduced the concept of “data aggregation,” and introduced the idea of scanning human bodies and brains to make perfect digital reproductions (to insert into a massive universe simulation, the “GenLab” or “The Accelerator”). Why does this matter? Because the second page of Trinity Property’s Articles names 3 partners: Sidney Thomas, Randy White, and Chris Jaska. Chris Jaska is an engineer for Spectra-Physics, a company that makes bio-imaging lasers. See Spectra-Physics’ bio-imaging lasers HERE. See Chris Jaska HERE, and HERE (scroll down, you’ll see Jaska has been with Spectra-Physics since 2001).

       Bio-imaging lasers take extremely detailed 3D images of people’s bodies (and brains). They’re the lasers you’d want to use if you planned to make 3D cyber copies of a body and/or brain. Spectra-Physics’ YouTube page actually shows its laser doing some brain and body scans: https://www.youtube.com/watch?v=MaGhrF7AotA . Eighteen seconds into the video you’ll see footage of a scan of a mouse striatum (center of a brain).

Clear Proof Of Fraud & Falsification (#1)

       So, what follows are links to the PDFs of the Articles of Organization (business registrations) for Sidney R. Thomas’ businesses, posted on the Arizona Corporation Commission’s website. Then I'll show you verifiable evidence that they are fake. 

       Thomas-Hume Holdings LLC’s Article of Organization link led to this document: HERE. 

       Thomas-Hume Holdings LLC’s “Miscellaneous” link led to this document: HERE.

        Trinity Property Development, LLC’s “Article of Organization” link led to this document: HERE. 

       Trinity Property Development, LLC’s “Miscellaneous” link led to this document: HERE.

       (For safety and verification, I have created a combined PDF of these 4 filings: HERE. You can verify the PDFs you find on the Arizona Corporation Commission's website, against the PDFs that I found.)

       So, what is the evidence of document falsification and fraud in these documents?

       There is lots of it. But I’ll start with the catastrophic fraud and falsification.

       Look at the upper left corners of the Articles of Organization for both

Thomas-Hume Holdings, LLC and Trinity Property Development, LLC. You will see short dash lines below the Arizona Corporation Commission's barcode; as if someone stuck a barcode sticker on the document, or cut out a barcode in a photo editor and added the barcode to the document with the same photo editor. That’s because someone DID use a photo editor to add the barcode from the original documents to these fake PDFs.

       How can I prove this? By comparing the fake AZ Articles to valid AZ Articles.

       The Arizona Corporation Commission uses a neat and efficient stamping system that leaves a very clean and distinct barcode, with no lines or smudges. Consider the following 11 documents that were filed at the same time as the fake documents. 

1. See CHC, LLC’s Articles of Organization from September 1, 2006; See HERE. 

2. See GLOBAL BENEFITS CONSULTANTS, LLC’s Articles of Organization, Jan 10, 2007; see HERE. 

3. See MOUNTAIN PARK RENTALS, LLC’s Articles of Organization from Jan 10, 2007; see HERE.

4. See STRENGTH-N-LENGTH PILATES, LLC’s Articles of Organization from Jan 10, 2007: HERE.  

5. See FOLEY PATENT CONSULTING, LLC’s Articles of Organization from Jan 10, 2007: HERE.

6. See UV INDUSTRIES LLC’s Articles of Organization from February 12, 2007: HERE. 

7. See BUTTERFIELD TRAIL, LLC’s Articles of Organization from January 10, 2007: HERE.

8. See FM INVESTMENTS LLC’s Articles of Organization from January 30, 2007: HERE.

       These following final three Articles of Organization are particularly telling because they were filed by Randy White, who is named as a “vested manager” (partner), along with Sidney Thomas and Chris Jaska, in the Articles for Trinity Property Development, LLC. These filings are for three businesses that White owns, without Sidney Thomas or Chris Jaska. 

9. See PRAISE COMMUNITY CHURCH’s Affidavit of Publication from October 5, 2009: HERE. 

10. See PCIC INC’s Articles of Organization from May 25, 2011: HERE. 

11. See NKB TECHNICAL SOLUTIONS, LLC from November 25, 2014: HERE.  

       I have made a combined copy of all 11 PDFs of the Articles of Organization, just as I found them on the Arizona Corporation Commission's website. See 11 valid AZ filings HERE. 

More Clear Evidence Of Fraud & Falsification (#2)

       If you compare both pages of the Articles of Organization for Trinity Property Development LLC (HERE), you will notice that the margins on the left side of the page (the portion where it says: “DO NOT PUBLISH THIS SECTION NOTE” at the top) are at a slight, but noticeable, angle on the first page. And you’ll notice, on the second page, this angle is much sharper. You will also notice that there is a grey background in this left margin area on the second page; but on the first page, the background in the left margin area is white. This indicates that these pages were printed on different printers, or on different settings 

       Now, if you compare this fraudulent document to the 11 other legitimate filings that I’ve linked, above, you’ll notice that:

  1. All of pages in those 11 separate filings are consistent and uniform (meaning, each page has the same duplication quality):
  2. All of the valid filings that use the AZ Corporation Commission’s forms (with writing in the left margin) are consistent and uniform, none of them have  a white background on one page and grey on another. (See valid docs #2,3,4,5,7.)
  3. On the few valid documents that were duplicated at a slight angle, all of the pages of those documents were duplicated at the same angle (with the exception of documents that are composed of multiple documents; in which case, all of the separate documents were duplicated at the same consistent angle).

       The fact that the Articles of Organization of Trinity Property Developers LLC are inconsistent in printing quality—between the two pages, AND the fact that the angles that the pages were printed at are noticeably different, shows that these pages were not printed by the Arizona Corporation Commission, and they are fake.

Below: The fake Stamp on Thomas' documents, 

compared to a real ACC stamp

A Few Smaller Signs of Fraud (#3)

       There are about 3 more problems with the Trinity Property Development LLC page.

       ONE. In the Articles of Organization of Trinity Property Development, LLC, on page one, section 3. Line 1 and 4, the person who filed this document carefully wrote “Sidney R. Thomas, III”, twice, on lines 1 and 4, of section 3. But on page 2, section 6, line 4, a person claiming to be Thomas, writes his name “Sidney Thomas,” and writes “Sidney Thomas,” again, after his signature (bottom of page 2). That’s a curious inconsistency, because the two pages do NOT appear to have been printed from the same printer.

       TWO. The signatures don’t match. There is a signature at the bottom of page one, and another at the bottom of page 2. They don’t match. 

       THREE. Trinity Property Development LLC is composed of three partners (Sidney R Thomas, Chris Jaska and Randy White). The Articles of Organization for Trinity Property Development was signed and submitted by Sidney R. Thomas, on January 11, 2007. But Trinity Property Development’s “Application For Reservation of a Corporate Name” was filed by Randy  White on Jan 11, 2007. See HERE; or HERE & HERE.

       It is unlikely that two different partners would fill out these two forms and file them separately. Logically, only one partner would file these forms.

       I suspect someone unlawfully changed the first page, to add “III” to the end of Thomas’ name.

What Does The Evidence Regarding Sidney R Thomas'

Arizona Business Statements Indicate?

       The preceding evidence suggests that Sidney R Thomas, who appears to be the same Sidney R. Thomas who serves as Chief Judge of the Ninth Circuit, opened two Arizona businesses, under his correct name: "Sidney R. Thomas". But at some point, Thomas or his business partners falsified the business filings, and changed the name on the filing, by adding the suffix "III" (the third). This was done to fraudulently make the filings appear to have been filed by a man named Sidney R Thomas III, rather than Sidney R Thomas (the Ninth Circuit Chief Judge).

#3

 

JANUARY 2022 UPDATE:

SIDNEY R. THOMAS STEPS DOWN


The preceding information about Sidney R. Thomas was first published in this web-article in March 2021. Nine (9) months later, Sidney R Thomas quietly stepped down from his post as chief judge of the Ninth Circuit. His departure was almost unreported. See HERE. I am confident that Thomas was pressured out related to the information contained in this article. It is not sufficient, and it is not justice, that corrupt US lawbreakers are allowed to simply resign. This lack of accountability is why America has lost much of it international standing.


BIGGER PROBLEMS IN THE COURTS

         May 2007, only 1.5 years after Zero Gravity Management asked me for a copy of my screenplay, and only about 7 months after I introduced the concept of "aggregated data," the U.S. Supreme court passed Bell Atlantic Corp. v. Twombly. Then, a year and a half later, on December 10, 2008, the Bush Administration made its Ashcroft v Iqbal argument to the Supreme Court. Six months later, May 2009, the Supreme Court would rule in favor of the Bush administration, and judges around the U.S., would suddenly have vast new power, and zero accountability.

         These cases gave US judges unlimited discretionary power to dismiss cases, without reason or accountability, and without needing to report the case facts. This power has been used, almost exclusively, to dismiss two types of cases, (1) civil rights cases (as a lawless, hate-based, supremacist court system might want these types of cases killed early), and (2) Copyright Infringement and intellectual property cases. Because of the enormity of what the conspirators were trying to do with my ideas, and because of the scale of the conspirator's depravity and corruption, I believe the conspirators (suspecting that eventually I would discover the theft of my intellectual property and take legal action) passed Iqbal v Twombly to effortlessly and silently dismiss any legal action I might bring.

       Perhaps more corruptly, three of the five SCOTUS justices who supported Iqbal owned shell corporations between 2006 and 2020. A person named John G Roberts Jr owned/owns five (5) Maryland based companies (Maryland, of course. is right next door to Washington D.C., home of the U.S. Supreme Court). A person named Anthony Kennedy owned/owns three (3) Maryland based companies. And a person named Antonin Scalia owned 4 companies in Ohio (justice Antonin Scalia was from Ohio).

       These secret shells can only be perceived as improper, if not wholly corrupt, in nature, as they provide a conduit for SCOTUS justices to anonymously receive bribes.


THE SPACE TOURISM INDUSTRY


(The details under this heading were added May 2-11, 2022)

  • This section was added to show that after I created my vision of a future where space tourism is one of the dominant future market/technology, shortly thereafter, Jeff Bezos and Richard Branson took action to create their own space tourism companies, and Elon Musk and NASA departed from their original goals

        As shown earlier, from 1999 to 2005 the Conspirators hacked into my files and monitored me using the hacking company Liberate Technologies. From 2005 to the present, the hacking and spying company was Movielabs (same hackers, based in the same area of California). In about May or June of 2003, I began tireless work on a screenplay, first called (if only to myself) "Terminal Load"; I then played with the title "Blood Red Sky," until arriving on the title "Uberopolis: City of Light," in May 2005, at a time where I final felt ready to share the script. However, I continued my passionate re-writing of the script, roughly 8 hours a day, for another 2 years. In late 2006, I changed the name of the script to "Butterfly Driver." The Conspirators infringed all versions of that script, via hacking, from the moment I began working on it in 2003.

  • NOTE: In my BvC Amended Second Declaration, I estimated that I began working on the script between November 2003 and January 2004. After looking back at my story notes, etc, I started writing the script between May and June 2003.

       That screenplay ("Uberopolis: City of Light" or "Butterfly Driver"), inspired ALL of the modern push for private, billionaire-owned space tourism companies. Various space tourism concepts appeared in print prior to my script, of course; however, my ideas were actionable, and capture the imagination, and motivated powerful parties to acr, and act immediately, as you you will see. My script's villain, Peter Vitale (later named Peter Drexler), was a genius, mega-billionaire, who owned and created the giant Earth orbiting satellite city for the super-rich, Uberopolis (featuring casinos, museums, golf courses, harbors, forests...); where the wealthy citizens of Earth, who could not afford to live on the fantastic orbiting city, took trips (like TOURISTS), to take advantage of the amazing medical technologies and procedures available there.

       This boggling new vision of space changed film, and it changed how modern, rich nations imagine space, and it started a new private space tourism race. My vision of a private entrepreneur creating the ultimate city, and countless lateral technologies, including new visions of space transport (space trains). was so compelling that soon, the US government dumped its vision of building a new national spacecraft, a directive that former President George W. Bush gave to NASA on January 14, 2004 ("Our second goal is to develop and test a new spacecraft, the Crew Exploration Vehicle, by 2008, and to conduct the first manned mission no later than 2014..." Watch former US President Bush's speech HERE.), and was so compelling that after the U.S. Space Shuttle program was retired, in 2011, the U.S., under President Obama, gave Elon Musk $2.9-billion to finance SpaceX (to date, SpaceX has received around $5.5-billion in federal subsidies). More on Elon Musk and SpaceX later.

        Not only did my ideas end NASA's "Crew Exploration Vehicle," but NASA would take my ideas (and proffer them as their own) and announce two new NASA and U.S. goals: asteroid mining and lunar mining. In 2003 through 2005, I introduced many new concepts for establishing mass space colonies, etc., and I explained the practical technology behind these ideas. But in mid-late 2006, in Butterfly Driver, I showed how establishing lunar (moon) mining and refining would be necessary to create a massive, attractive space colony, and how comet mining might also be necessary (asteroid mining is a less ambitious variation of this thought).  Then, 6-7 years later, April 11, 2013, NASA announced its plan to capture a large asteroid and bring it closer to Earth, for entrepreneur's to mine. (See HERE or HERE); then, in 2015, NASA announced how how lunar mining could be done (see HERE and/or HERE), as if they had conceived these ideas. And in 2020, NASA announced many of the companies it had selected to mine the moon, with other related announcements. (See HERE.) And in 2021, NASA announced it had awarded $500,000 to multiple teams to develop moon mining technology, with other related announcements. (See HERE and HERE.) All of this follows ideas added to my screenplay play in mid-late 2006 --and these ideas/projects have nothing to do with the ideas and goals that George W. Bush put forth for NASA in 2004.

(Below: Photos of the passages of Butterfly Driver, contemplating moon & comet mining; pages 73 and 78.

The passages below are from a 2007 script version. Surviving earlier versions are/were a bit more elaborate.)


        Related to this, 3-4 years after I started my screenplay, Jeff Bezos and Richard Branson would both announce their intent to create space tourism companies -and at least one of them would unlawfully backdate their space tourism companies --to try to claim credit for my vision. 

       A person can unlawfully backdate a company by buying a company name (that was created some number of years earlier) from the original company name owner, then building a new company around that existing name.

       As shown earlier, Jeff Bezos formed Blue Origin in September 2006, then unlawfully backdated the company by connecting it to a company named Blue Operations, formed in 2000. (See HERE, pages 44 and 45 of BvC Amended Second Declaration, with business statement exhibits.)  Immediately after I discovered this and reported it to the court, in 2020,  the Washington state Secretary of State's Office closed Washington's online business records; and suddenly required and account and password (and I think a fee) to gain access.​

       The company that Richard Branson created to pursue his sudden interest in being a billionaire space tourism hotshot, is called The Spaceship Company, or TSC. The earliest company entities with these names (or associated with this/these companies) were both formed in February 2006. (See HERE, and HERE.) Branson's Wikipedia page claims he announced his Space Tourism company in September 2004 (over a year after I began work on my screenplay). The article also explains the company was connected to Microsoft co-founder Paul Allen. This is problematic because Paul Allen was one of the first hackers/infringers of my work (in cooperation with Rupert Murdoch, in 1999), as I explained the BvC court, on pages 24-26 of my Amended Second Declaration, in 2020 (see HERE).


  • NOTE: While working on this section I happened upon several news articles from Spring and Summer 2005 (about the same time that I first emailed my screenplay to friends and family), when Jeff Bezos allegedly first announced his intent to start a space tourism company; however, the articles were not crawled by the Internet Archive until 2012, 2015 and 2020 (although the Internet Archive is not a credible or reliable service).


Elon Musk & SpaceX


       Elon Musk's SpaceX was credibly formed, to create low cost rockets (see https://spacenews.com/web-entrepreneur-eyes-small-launcher-market/ ). However, the company did not generate any traction until after my ideas became available, and the company changed it's objectives. Around 2011 (years after the creation and access of my work), Musk shifted, and announced SpaceX's new goal was to establish a Mars colony. I'm confident I influenced this shift --but mankind has long dreamed of travel to Mars; I can't, and wouldn't, claim credit for that vision.

        But here is where Elon Musk's role in the U.S. government's theft of my ideas becomes problematic.

        In 2003 I showed a private mega-billionaire villain (Peter Vitale, later renamed Peter Drexler), who owned a private satellite city for the super-rich, who used his private wealth to ship cargo to his orbiting city. I showed that cargo could be shipped, privately, to a space station (or orbiting city), via a private company, using a "cargo" or "resupply" shuttle to transport the cargo to a "low orbit" station. This can be seen in the May 2005 version of my screenplay, "Uberopolis: City of Light," which I emailed to friends and family, on May 25, 2005, with that clear email date-stamp. For example, on page 27, a character says, "So, the right shuttle is just a low orbit shuttle. I've taken that one down, for may appeal. You'll be on that one next week, 'cause you haven't been sentenced yet. It takes the passengers to the low orbit link where they transfer to a resupply cargo shuttle, because the cargo shuttles are too big to dock up here. So they use the prisoners to unload the cargo shuttle and refill the low orbit shuttle. Then the emptied cargo shuttle takes them home. So that shuttle on the right always comes back full of food and supplies. But the right shuttle is a direct run -to Earth and back. That run that should take at least eighteen hours if you let the shuttle cool off from re-entry and everything." That May 2005 screenplay can be seen HERE.

(Below: page 27 of the May 25, 2005 script.)

​

       This dialogue can also be seen on pages 28 and 29 in the January 2006 version of my screenplay, which was also emailed to myself, recording a date stamp on it: "Mon 1/16/2006 9:35 PM." (See HERE.)

        18 months after I emailed my screenplay to my friends and family (May 2005), in August 2006, the US government announced it had awarded Elon Musk's SpaceX (a private company), and a company named "Rocketplane Kistler,"a contract to build a private "cargo" transport. (See HERE or HERE.) This is something that neither NASA nor President George W. Bush had previously discussed as a goal or vision for NASA. Then, eight months later, April 19, 2007, the U.S. announced that SpaceX and Rocketplane Kistler had won a $500,000,000 NASA contract to create a private cargo delivery system to the International Space Station; a first: "RocketplaneKistler is developing its K-1 reusable rocket and cargo module as part ofNASA's Commercial Orbital Transportation Services (COTS) program to spur thedevelopment of PRIVATE CARGO and crew delivery systems for the ISS. The firm issharing a $500 million NASA award with fellow COTS contender Space ExplorationTechnologies (SpaceX), which is developing its own Falconrocket family and Dragon crew capsules."  (See HERE or HERE.)  In former U.S. President George W. Bush's ambitious January 14, 2004 "Vision For Space Exploration" speech and directive to NASA, there was no contemplation of private contractors constructing NASA's projects, and no mission to construct cargo delivery crafts -after all, the Space Shuttle, which had just been phased out, was a cargo delivery craft. The mission was to build the new Crew Exploration Vehicle. (See former President George W, Bush's complete Jan 14, 2004 speech to NASA HERE​.) A year and a half later, December 29, 2008, NASA announced that it had selected SpaceX to provide cargo delivery service for the International Space Station -this is exactly what the Space Shuttle did. (See HERE and HERE,  HERE, and HERE or HERE.)  My vision of the private sector innovating space cargo transport (and other space technologies) captivated Bush and NASA; thus, NASA awarded a new and unnecessary private cargo contract to Musk and SpaceX.

#4

  

STUXNET

The Data Caper Goes Global

​

  • This “Stuxnet” portion of this article was researched and written from April 11, 2021 to April 19, 2021, and the following closing sections (re George W Bush, Twitter and "In Sum") were researched and written in the final days of April 2021; while the preceding portions of this article were written in February and March 2021. 

​

        In 2010, the world was introduced to the “Stuxnet” computer virus. But, as Kaspersky Lab reported in 2010, the Stuxnet virus secretly dated back to 2009—to the moment when the virus was first inserted into my computer.

        Stuxnet was such an advanced and unprecedented virus that it is uniformly believed to have been made by the US government, perhaps with Israel (the US government does not deny this); but all experts agree that only an extremely advanced government (not a single corporation or person) could have created Stuxnet. (See https://en.wikipedia.org/wiki/Stuxnet .) 

Here are a few comments about Stuxnet, from Wikipedia: 

  • “Kaspersky Lab concluded that the sophisticated attack could only have been conducted "with nation-state support." F-Secure's chief researcher Mikko Hyppönen, when asked if possible nation-state support was involved, agreed "That's what it would look like, yes."”
  • “On 1 June 2012, an article in The New York Times said that Stuxnet is part of a US and Israeli intelligence operation named Operation Olympic Games, devised by the NSA under President George W. Bush and executed under President Barack Obama.”

       To this day, Stuxnet is regarded as one of the most innovative and sophisticated viruses ever —perhaps only rivaled by the SolarWinds virus of 2020—which was inspired by Stuxnet. One of the most amazing things about Stuxnet is that it contained 4 zero day exploits (you may recall that the January 14, 2020 hacking of my computer, which I videotaped and reported to the court in the BvC Complaint, also involved a zero day exploit). As Kim Zetters explained in Ars Technica “Out of more than 12 million pieces of malware that antivirus researchers discover each year, fewer than a dozen use a zero-day exploit.” The fact that Stuxnet used four zero day exploits suggests that Microsoft (and Bill Gates and Paul Allen) helped the US government create Stuxnet—-which only targeted Windows computers. The Stuxnet virus was unprecedented because of its functionality: it allowed the controllers/creators to observe an infected computer, take files, take control of the computer, or destroy all files and hard-drives.

         You might wonder how the conspirators got the US involved in making Stuxnet, and why? That answer flows from the primary facts previously presented in this article. I’ll explain, with abundant evidence...

         After conspirators saw the December 2006 version of Butterfly Driver screenplay (which introduced the world to the concept of defense and policing systems based on aggregated data, etc.), which they accessed either on TriggerStreet.com or via Steve Weinstein’s hacking apparatus, “MovieLabs,” the conspirators contacted the US government about my new ideas. But rather than simply asking me if they could use my ideas, the US government chose to erase all digital evidence of my ideas from my computers and storage drives. (To be clear, I would not have agreed to allow the US to create this advanced spying and data collection system, because these ideas were created to showcase the evil potential of government without morality.) Thus, sometime in early 2007 (perhaps mid 2007) I was besieged by a very aggressive and destructive virus, which destroyed many files. However, this 2007 virus was not Stuxnet. But, like Stuxnet, it travelled via USB, so it may have been a Stuxnet prototype. This 2007 virus, “.Trashes”, is discussed at the end of this Stuxnet segment.

        Shortly after this 2007 virus, around August 2007, I decided that I would begin making my own films, so I wrote a film called “The Amazing Mr. Excellent,” which I thought I’d be able to film for under $20,000. By January of 2008, I had assembled a film crew. We began filming around May 2008. But during post production, late 2008, I began experiencing technical problems which severely delayed production. These technical problems may have been related to computer viruses. If so, these viruses were less destructive than the 2007 virus, and FAR less destructive than the coming 2009 Stuxnet virus. 

       Production of The Amazing Mr, Excellent moved forward. Then abruptly, in December 2009, while I was working on the score and soundtrack for the Amazing Mr. Excellent, the Stuxnet virus launched on my computer. The virus was so severe that it destroyed about 4-5 hard-drives and 3-4 external hard-drives, destroyed 8 years of my music composition files, almost ruined the film The Amazing Mr. Excellent, and almost ended an important friendship. 

       Around January of 2010, after the 2009 Stuxnet virus destroyed several hard-drives, a friend and film crew member (named Matt) offered to let me use his external hard drive. I accepted. The virus immediately destroyed Matt’s hard-drive. In April 2010, I sent the first of several emails to The Amazing Mr Excellent cast and crew, explaining the devastating impact of this virus, spreading through my USB drive. (Stuxnet spreads exclusively via USB drive.) The first such email was sent on April 6, 2010, two months BEFORE the Stuxnet virus was first discovered. My first email about the virus can be seen HERE. (This email went out to about 100 cast and crew members, whose email addresses have been redacted; thus, the first portion of the email is blacked out, but none of the actual email text, below, is omitted). As you can see from the Gmail time and date stamp on the email, this first email was sent out on April 6, 2010. And, as you can see from reading the email, the virus caused a serious argument between Matt and me. And, as you can read on page 2 of the email, I explained that the virus hit me in December 2009 —although evidence, presented later, suggests the virus was installed on my computer over 9 months earlier. 

       But before we further examine Stuxnet’s origins, please briefly re-examine my April 6, 2010 cast and crew email. You will notice in paragraphs 2, 4, 6, 9, 12, 13, I never referred to the film as “The Amazing Mr. Excellent”; rather, I (and the cast crew) simply called the film “Mr. X”. In fact, as you can see, HERE, in this PDF screenshot of my Hotmail inbox from 2008, by November 2008, the cast, crew and I almost exclusively called the film “Mr. X”. This is essential, because the original name for Stuxnet was MRx, a variation of “Mr. X.”


STUXNET GETS ITS NAME


          Stuxnet was originally named “MRx”, or Mr. X. Microsoft, a centralconspirator in this matter, re-named the virus “Stuxnet,” in September 2010. 

         As Wikipedia explains, Stuxnet was first discovered by the Belarusian antivirus company VirusBlokAda, on June 17, 2010. VirusBlokAda did not call the virus “Stuxnet”; the virus had no name. VirusBlokAda ONLY reported that the virus had two main files, named mrxnet.sys and mrxcls.sys. The original VirusBlokAda report can be seen at http://anti-virus.by/en/tempo.shtml . This article was crawled by the Internet Archive (see: https://web.archive.org/web/20100722095105/http://anti-virus.by/en/tempo.shtml ) . The evidence indicates that Internet Archive’s Wayback Machine is no longer a reliable service, and should not be trusted; however this crawl is legitimate.

       The VirusBlokAda report reached few people, because VirusBlokAda is an antivirus company, with a limited audience. The Stuxnet virus was next reported, semi-broadly, 28 days later, July 15, 2010, in Brian Krebs’ blog “Kreb on Security.” But, once again, the virus had no name. Brian Krebs’ original article can be read at: https://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ . As you see, the ONLY file names that are mentioned in Krebs’ report are mrxnet.sys and mrxcls.sys. 

       The word “Stuxnet” did not appear in print until September 14, 2010, when Microsoft’s Jerry Bryant (Group Manager, Response Communications) used the name “Stuxnet” in a web posting about the virus, which can be seen at: https://msrc-blog.microsoft.com/2010/09/13/september-2010-security-bulletin-release/ . That same day, Brian Krebs also used the name “Stuxnet” in his second blog about the virus. But Krebs’ article referred to, and linked to, Jerry Bryant’s posting. Thus, Microsoft’s Jerry Bryant’s post was the first use of the name “Stuxnet.”  

        Wikipedia’s Stuxnet entry cites a July 11, 2011, Ars Technica article “How Digital Detectives Deciphered Stuxnet, The Most Menacing Malware In History,” by Kim Zetters, which further explains how Microsoft allegedly gave Stuxnet its name: “...dubbed Stuxnet by Microsoft from a combination of file names (.stub and MrxNet.sys) found in the code.” 

       Microsoft named Stuxnet.


Why “Stuxnet”?


       In all of my reading on the Stuxnet virus, the previously cited Kim Zetters article, in Ars Technica, is the only article that mentions a meaningless “.stub” file that was allegedly found in the code. I believe Microsoft and the conspirators gave the virus the absurd name “Stuxnet” to give the virus a name that I would NOT associate with my film. Because, after all, I had suffered an extreme viral attack, while making Mr. X, in late 2009 —by a virus that behaved exactly like the Stuxnet virus. But the reason that Microsoft had to publicly change the virus’ name is because the virus was rapidly spreading through USB drivers—because I was unwittingly giving the virus to other people connected to the Amazing Mr Excellent (who, in turn, were infecting other systems). Thus, a few months after I got the virus and unwittingly unleashed it on the world, the virus was being discussed in major antivirus circles. Microsoft and the conspirators reasoned that if I happened to hear of a virus named MRX or Mr. X, or of a virus’ whose main files were named “MRx”, and if I learned that this virus allowed the controllers to observe infected computer, steal files, take control of the infected computer, and destroy all files and the hard drives, I might realize that the creators of the MRx virus created that virus to hack into my system, steal my work, and destroy my files and hard-drives.

​

The Stuxnet Code Shows It Was Named “Mr. X”


       F-Secure.com explains the central importance of MRxNet and MRxCls drivers, in the “Technical Details” section, at the bottom of a Stuxnet web-page, at: https://www.f-secure.com/v-descs/trojan-dropper_w32_stuxnet.shtm , I have paraphrased part of the F-Secure.com’ article (underlined): 

“On execution, the malware drops two files onto the system: mrxcls.sys and mrxnet.sys, which are dropped in C:\Windows\System32\Drivers folder. The registry keys associated with the 2 dropped drivers are visible:

  • HKLM\System\CurrentControlSet\Services\Services\MRxNet
  • HKLM\System\CurrentControlSet\Services\Services\MRxCls”

         As F-Secure explained, the visible registry key NAMES the two files: MRxNet and MRxCls. In BOTH key names the “MR” is capitalized to set the MR apart from the lower case “x”; then, the N (in the “Net” suffix) is capitalized to set the suffix apart from the “X”, and the C (in the “Cls” suffix) is capitalized to set the suffix apart from the lowercase “x”. Thus, by all rights, the virus was meant to be called the Mr X virus.

FUNCTIONALITY. The F-Secure.com website also explains Stuxnet’s functionality (paraphrased, underlined): “The injection is performed by the mrxcls.sys file, which is responsible for attaching and copying the DLL into the target process. The rest of the injection routine is carried out by 2 additional components embedded in the mrxcls.sys file, which are also loaded into the same process space. The file mrxnet.sys checks for files on the system with the following extensions: .TMP, ~WTR, .LNK . If a match is found, the files are hidden by modifying the FileInfo structure…. If the targeted files are not found, Stuxnet will save copies of itself as TMP files onto an available removable drive, using the following filenames: ~WTR4132.tmp - Main installer from the USB drive…”


Stuxnet’s Earliest History;

When Stuxnet First Infected My Computer


       In Wikipedia’s Stuxnet article, Kaspersky Lab (a world leader in antivirus) speculated that a variant of the Stuxnet worm first appeared in June 2009. Specifically Kaspersky stated:

  • “Kaspersky Lab experts at first estimated that Stuxnet started spreading around March or April 2010, but the first variant of the worm appeared in June 2009.”

Evidence Stuxnet Installed On My Computer, Feb & March 2009

         Steve Weinstein and MovieLabs could have inserted Stuxnet on my computer, at any time in 2009. However, evidence suggests that the Stuxnet spyware virus was first installed on my computer in mid February, 2009 (roughly when Kaspersky estimated Stuxnet was released). I believe this because of a strange virus that hit my computer in February 18, 2009, which caused a severe "meltdown". This meltdown is described in an email I sent to the Mr X film replacement cinematographer, Nigel Ellis. (See a PDF of this Feb 18, 2009 email HERE .  NOTE: The computer "meltdown" is mentioned at the end of the first paragraph; the rest of the email is redacted for privacy reasons.) I believe MovieLabs, Weinstein and Google re-installed the virus 11 days later, on March 1, 2009 (precisely when Kaspersky speculates the worm first appeared). This email was not responsive to anything that I sent Google. It just appeared in my email box. I first opened my Google email (Gmail) account 6 weeks earlier, in January 2009. A PDF screenshot of the March 1, 2009 email from Google, in my Gmail box, can be seen HERE. (As explained in the attached articles, the Stuxnet spyware/virus allowed the operators to spy as long as they liked, then initiate destruction whenever they wished.)

My Laptop/Computer Mysteriously Stolen,

April 24, 2008 (Out of a Company Van)

       Perhaps, not surprisingly, on April 24, 2008 (during the period that I was shooting the Mr X film), my laptop was stolen. But the bizarre part is: The computer was stolen out of a crappy old company van that my employer was letting me use at the time. MORE BIZARRELY, the laptop was stolen while the van was parked at the SF Exploratorium, while I was inside the Exploratorium with my son and my late father. At the time, this seemed bizarre to me, my dad and my son, because the Exploratorium is in a very upscale part of San Francisco, and in the Exploratorium's parking lot there are always any number of very nice cars. Why a car thief would target a 1994 Ford van, amid all of the many nice cars, just seemed crazy. (To get in, the thieves broke the van window out.) It also seemed strange that only my $200 used laptop was stolen, but my son's expensive gaming system, games, etc, in the backseat, were untouched. The next day, I mentioned that my laptop had been stolen in an email to some of the Mr X cast and crew. (See the email PDF HERE , or see the redacted screenshot of the email, from my Hotmail Outlook box, below. NOTE: In the email, for brevity, I referred to the van as a "car," and I didn't explain that the van belonged to my employer.) To be clear, although, at the time, I thought the theft was just a random, bizarre incident, I now believe the people responsible were connected to MovieLabs, and they were motivated to steal any of my intellectual properties that might be on/in the laptop (particularly any ideas connected to the concept of aggregated data-based policing and predictive military applications, AND any screenplays). This break in was not connected to the Stuxnet virus, but it was motivated by my concept of aggregated data policing, which I introduced approximately 15 months before the break-in, in Dec 2006, or Jan 2007.

​

Why Would The US & The Conspirators Make Such A Boneheaded 

Mistake As To Name Both Of The Primary STUXNET Files “MRx”?


         It’s hard to guess why the US government and the conspirators would make such an obvious mistake as to name the primary virus files MRX. But I think there were two reasons.

        First, the development of the Mr X virus (later named the Stuxnet virus) started under President George Bush (in early 2007). The fact that the virus was launched onto my computer on March 1, 2009, only 6 weeks after Barack Obama took office, suggests that Barack Obama was not aware of the MR X virus (Stuxnet) or the plan to unleash it to erase all of my files. However, other parties who were still in the US government, leftover from the Bush administration, likely wanted to release the virus before the Obama administration killed the plan. So the conspirators may have been working too quickly to change the MRx files names.

        Second, I don’t think the US government and the conspirators thought that Stuxnet would go beyond my computer. I think the conspirators thought that the virus would destroy my computer(s), then I would realize that the infection was on my USB drive and I would stop using the USB drive, and destroy it. At that point, the conspirators would have destroyed all evidence of my files, and the Mr X virus could be retired. Unfortunately, for everyone, since my USB drive was fairly new, I was slow to realize that the infection was on the USB drive. Complicating matters, I had several other important files on the USB drive (including Mr. X music files). So, after the virus destroyed my computer(s), I unwittingly infected other friends and associates computers, as I worked to complete the Mr. X soundtrack and fight the insanely aggressive virus.

​Why Stuxnet Works On USB

       As explained earlier, in early 2007, shortly after I introduced the collected concepts of defense and policing systems based on data aggregation, I was suddenly hit with a severe virus that wiped out many files, erased many 3.5-inch floppies, and may have destroyed a hard drive. As a result, moving forward, I made an effort to disconnect my computer(s) from the internet, and I tried to keep one computer offline. Thus, I believe it became harder for the conspirators to hack into my system, or to know if I might have another computer that they weren’t aware of. Once the conspirators decided to destroy all possible evidence of the December 2006 version of my Butterfly Driver screenplay, they resolved that the best way to execute that plan was to infect whatever computer I connected to the internet with a virus that would attach itself to any storage drive that attached to a USB port (because I sometimes transported files between the two computers). By creating a virus that moved this way, and by observing my activities (using the new Stuxnet spying utilities), the conspirators could see what files I was transferring, if any, then trigger the destruction of any hard-drives and files they wished.


The Stuxnet Suffix Names


         My theory on the suffix names (three ending letters) of the MRx virus driver files is pretty simple: I believe that when the US government first conceived the MRx virus (Stuxnet), it was one single virus file, named MRxNet (or mrxnet.sys). This virus was created to spy on me and eventually destroy all of my files and hard-drive. This virus was named MRxNet, because it was designed to infect a computer that I often connected to the internet. 

       However, as the US designed the virus, they observed that my internet behavior had changed (because of the 2007 virus), and I appeared to be using more than one computer, and one of these computers was rarely, or never, online; it was on a closed system. And this closed system computer seemed to be the computer that I used for creative writing; so any evidence of the December 2006 version of Butterfly Driver (which the conspirators hoped to erase) was likely on the closed system computer. The US and the conspirators also likely noticed that sometimes I transferred files between the two computers. Thus, the US and the conspirators hatched the idea of a virus that could be transferred by USB drive, to infect the closed system computer. Thus, the suffix “Cls” in the name MRxCls, likely stand for closed.


BACKDATING STUXNET


      In 2017, eight years after the MRx (Stuxnet) virus appeared on my computer, the US tried to fraudulently backdate the origin of Stuxnet by releasing a fake Wikileaks “Note”, which reads: "Serious nuclear accident may lay behind Iranian nuke chief's mystery resignation". The “note” claims that Stuxnet may have begun destroying Iranian nuclear labs as early as June 2009. But the quickest way to show this document if fraudulent is by clicking on Wikipedia reference link, which leads to this Internet Archive crawl page: https://web.archive.org/web/20101230121529/http://mirror.wikileaks.info/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief's_mystery_resignation/ 

       But, if one enters this article’s web address in the Internet Archive’s Wayback Machine, the fraudulence is revealed. As you can see above (if you understand Wayback URLs) the article’s root address is: http://mirror.wikileaks.info/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief's_mystery_resignation/ 

But that page does not exist, or can’t be reached. But when you enter that same address into the Wayback Machine, rather than going to a valid crawl page, the Wayback Machine improperly adds four digits (“2017”) to the URL, and redirects in an invalid URL crawl. A valid Internet Archive Wayback crawl of the address should lead to this address:

https://web.archive.org/web/*/http://mirror.wikileaks.info/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief's_mystery_resignation/ 

However, the Internet Archive Wayback machine redirects to:

https://web.archive.org/web/2017*/http://mirror.wikileaks.info/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief's_mystery_resignation/ .

By clicking on the first address (without the “2017” in the address) you can watch the Wayback Machine improperly add the “2017” to URL, then redirect to a fake crawl. A valid Wayback search is composed only of the Internet Archive’s uniform and standard prefix https://web.archive.org/web/*/ , followed by the address that the user enters into the search bar. Thus, if you enter www.paypal.com into the Wayback search app, the app will direct to https://web.archive.org/web/*/www.paypal.com. 

        So, why would the US government and the conspirators try to backdate the Stuxnet virus? Because, as shown earlier, the the Stuxnet virus was originally called the Mr X, or the MrXnet virus: but if I became aware of Stuxnet, and learned that the primary drivers were named “MRx”, I might suspect Stuxnet was related my film “Mr. X”. So, I my guess is that the conspirators determined that if they released a story that the virus was created before I and the crew and cast began calling the film “Mr X,” then I wouldn't suspect Stuxnet was created to destroy my files and sabotage my film. Unfortunately, for the conspirators, their falsified websites/pages can't be verified.


THE STUXNET IRAN NUCLEAR FACILITY ATTACK STORY


       One of the most unusual things about the Stuxnet virus is that shortly after Stuxnet was discovered, rumours and reports began to leak that Stuxnet was created to attack the Natanz nuclear plant in Iran. These reports were leaked MONTHS BEFORE Stuxnet actually attacked the Natanz nuclear power plant in Iran. Please read the previous underlined section again.

        Why would the US create a virus to attack a nuclear facility in Iran, but release news reports about the planned attack, in American publications, BEFORE THE VIRUS ACTUALLY ATTACKED ITS TARGET? Is America so feckless that it would create the most advanced virus ever conceived, then bone-headedly tell the world what it had done months before the virus attacked the intended target? Of course not. The US did this to hide why the government originally created the Stuxnet virus. Stuxnet’s payload—two files— were created to destroy my  files. The government did this, NOT because I am important or interesting, they did this simply because they were preparing to invest hundreds of billions into an unprecedented aggregated data collection-base defense and policing system (which I conceived), and they wanted to eliminate all cyber evidence that these ideas ALL came from me. Even if the virus cost a few million to create, the aggregated data defense systems that it would help secure would generate hundreds of billions, eventually trillions, of dollars.

          As far as the Natanz nuclear facility… Somehow the US got an infected USB driver into Natanz, briefly took control of the facility, and interrupted enrichment for a few weeks. This provided a reasonable explanation as to why the US had created an amazing new virus (which only did a few million dollars in damage to Natanz). 


DISINFORMATION


        As you may have observed in the previous portions of this article, the conspirators have no respect for facts, and they seem to believe it is reasonable to produce false documents, and fraudulently backdate documents. Keeping with this, I found an unusual Russian report called “Stuxnet Under The Microscope,” at https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf . This report attempted to date the origin of Stuxnet mrxnet and mrxcls drivers. However, when I entered the documents into the Internet Archive’s Wayback Machine, the Internet Archive redirected to a demonstrably fake crawl. Thus, when you enter the URL of the Russian report into the Wayback app, the Wayback adds four digits to the URL (“2020”), then redirects to a fake crawl page. Thus, the Wayback should direct to: https://web.archive.org/web/*/https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf , however the Wayback improperly adds “2020” and directs to:

https://web.archive.org/web/2020*/https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf . Click the first URL (without the “2020” in the URL) to see the URL add “2020” and redirect to a fake crawl.  


ALARM

       It is alarming that, in MovieLabs 16 year history, it just so happens that the same year that Stuxnet attacked my computer, 2009, MovieLabs applied for its only valid patent—a hacking system that allows MovieLabs to monitor and spy on a targeted “peer”. See this patent HERE. The patent describes functionality that is precisely what Stuxnet’s operators would need to monitor a hacked computer system. This patent was granted 2.5 years later, September 6, 2011. (NOTE: In MovieLabs 16 year history, it only has applied for 3 patents, two of which appear fraudulent, as explained earlier in this article). 

         This suggests that the US government created a monster hacking system (now called Stuxnet) which features fantastic spyware and destructive tools, then gave MovieLabs the patent for this system. This is, at a minimum, implicit permission for MovieLabs to continue to unlawfully monitor me, with the MR X (Stuxnet) hacking/virus system, for the remainder of my life. This is also, at a minimum, implicit permission for MovieLabs (which is owned by the Big 6 film companies and the Motion Picture Association) to unlawfully distribute my ideas amongst Big 6 film studios, their news companies, and their big-tech conspirator associates, to claim as their own.

The Conspirators' Still Use Stuxnet (MRx) To Hack Me Today

          This charge that the hackers continue to hack me to this very day is more than just a theory. As F-Secure.com explained earlier, Stuxnet hides the MRx virus drivers in the C:\Windows\System32\Drivers folder. Thus, as I completed this “Stuxnet” section, I found 5 mrx drivers in my C:\Windows\System32\Drivers folder. (See screenshot HERE). The suffixes of these MRx drivers have changed, indicating that the MovieLabs and the US government have updated and improved this virus. I purchased my current computer in March or April 2019. But, as you can see from the screenshot, all of the mrx drivers were installed in my computer AFTER the purchase date, and as recently as April 15, 2021, while I was writing this Stuxnet section. Four of the mrx files may be innocuous files, but one of the "mrxdav" files is a well-known hacking tool that gives hackers complete background access and control of the computer. Here is the evidence.

         As you can see (HERE) in this screenshot of these mrx files' general properties, unlike the other mrx files, the mrxdav file does not have a digital signature, and, more importantly, if you examine the "details" of these mrx files (HERE), just like the original Stuxnet drive files, the mrxdav file adheres to the Stuxnet nomenclature, using a capitalized M and R, followed by a lowercase "x", while all of the other files capitalize all three letters (MRX). 

         After observing that the MRxDAV file adhered to the Stuxnet nomenclature (capitalized MR, lowercase x), I noticed that the in the "details" of this file the file description read "Windows NT WebDav Minirdr". Thus, I put this file description in quotes and performed a Google Chrome search. The results of this search can be seen HERE. As you can see in this Google search, the first search results seem innocuous enough, but after about the 8th result, the search results begin to suggest that the MRxDAV (Windows NT WebDav Minirdr) file is a virus of some sort. But the 12th result ( https://www.hackercoolmagazine.com/ms16-016-webdav-privilege-escalation-in-windows/ ) is A WEBSITE THAT ACTUALLY INSTRUCTS HACKERS ON HOW TO USE THIS HACKER CODE, with screenshots. The Hackcool Magazine article explains that the hacking code/virus gives hackers background (invisible) access, and complete control of the targeted/hacked computer (just like Stuxnet). Because some readers of this web-article may be uncomfortable visiting a website that is for hackers (although the website passes "Norton Safe Web" standards), I have upload three screenshots of this Hackercool webpage in a single PDF HERE (I had to create a screenshot composite PDF, rather than a conventional PDF of the page, because of formatting anomalies with the website).

         All of this unlawful conduct, which appears executed with the awareness and approval of former Presidents George W Bush and Donald Trump, is a betrayal of American values, is an evil disgrace. 

The 2007 Pre-Stuxnet ".Trashes" Virus Attack 

        In 2007 I experienced two severe hacks/viruses. On page 56 of the BvC Complaint, I discussed one of these 2007 hacking/viruses, which erased all of my Hotmail email from May 2005 to September 2007 (this was an effort to erase all records of the December 2006 Butterfly Driver script). In the BvC Complaint, I speculated that this email virus was unleashed by an infected email, sent by a company named SE Film Club, or SE Film Association, which erased all history of itself as I wrote the BvC Complaint (see BvC Complaint, p 56, and exhibits F5, G5, H5). However, the SE Film Club email may have released countless virus types. And Microsoft, a central conspirator, likely erased the emails themselves, without need of some email-erasing subcontractor.

         But the 2007 “.Trashes” computer virus (which, as I recall, manifested in January 2007, but may have manifested as late as Summer 2007), erased 7-12 of my 3.5-inch floppy drives and destroyed one hard drive. The 2007 virus that was injected into my computer (likely via Steve Weinstein and MovieLabs) was the first “.Trashes” virus. 

       “.Trashes” can also be a type of Mac/Apple file extension, which can sometimes be loaded onto Windows USB and floppy drives, if they are inserted into a Mac/Apple computer. The “.Trashes” virus that I was infected with was designed to appear as if a Mac/Apple “.Trashes” folder had been loaded on a Window 3.5-inch floppy or USB drive. Like Stuxnet, “.Trashes” attacks hard-drives, USB drives, and 3.5-inch floppy drives, and replicates itself onto those drives. 

       The “.Trashes” virus was unknown until 2008 or 2009. But one or two years before then, the conspirators first released the “.Trashes” virus onto my computer, around January 2007. This is proven by doing a basic Google Chrome search for “.Trashes virus” (in quotes); see HERE, a PDF of this modified Google Chrome search. Examining the PDF, you will see various blogs about the virus going back to 2008. 

        If you modify this Google search, using Google Chrome’s special search “Tools,” then using the drop-down menu to select the “Custom range” time parameters of January 2006 to December 2007; see HERE, a screenshot of this modified Google search. As you can see in the screenshot, this virus was not discussed anywhere before 2008 or 2009. 

       However, if you expand this custom range search parameters to January 2006 to December 2009; see HERE, a PDF of this custom range Chrome search. The single search result, displayed in the previous PDF, shows that, suddenly, in 2009, the world first began discussing a “.Trashes” virus that attaches to USB (and floppy) drives.

       However, one or two years before the world knew about the “.Trashes” virus, I had the “.Trashes” virus destroy one hard-drive and many 3.5-inch floppy drives—and I still possess several of these infected floppies. The contents of one of these floppies, showing the “.Trashes” virus folder, can be seen HERE. Regrettably, to produce the previous screenshot of the “.Trashes” virus folder on one of my old floppies, I had to connect an infected floppy, via an external 3.5-inch floppy drive, to my computer. In doing so, I re-infected my current, modern computer with the 2007 “.Trashes” virus. Although this infection did not destroy my hard-drive, the old “.Trashes” virus now replicates itself and attaches to USB drives inserted into my computer. You can see a screenshot of this new “.Trashes” virus now on one of my USB drives HERE. (As you can see in screenshot, the “.Trashes” virus created three folders on this USB drive, which all have the strange future date-of-creation year of 2106.)

       Further proof that this “.Trashes” virus was infecting my computer in early 2007, can be seen HERE, a screenshot of the virus on a floppy from 2007. This screenshot is the only floppy drive that the “.Trashes” virus folder manifested but did not erase all other files. I suspect that the hackers who installed the “.Trashes” virus on my computer wanted this disk to survive. I suspect this because the “.Trashes” virus is designed to steal and/or destroy all files, then leave the “.Trashes” folder, to make the hacking appear as if the owner of the hacked computer/drive caused the erasure or disappearance of his/her work by mistakenly connecting his/her Windows drive to a Mac/Apple computer. I suspect the hackers wanted this one disk to survive, as it is, because on this disk the “.Trashes” virus appears with a “.DS_Store” file, which is another Mac/Apple format file. From what I’ve read, a “.Trashes” folder with a “.DS_Store” file sometimes appears on Windows USB and floppy drives when they are inserted into Mac/Apple computer ports. This did not happen with my floppies. I exclusively used Windows computers, from 2002 to the present. Period.


Why Would George W. Bush Allow The US

(And The Conspirators) To Hack Me?


       An argument can be made that my ideas were so compelling that the US felt it had to "commandeer" my ideas, in the interest of national security. Of course, at that point, the US would need to inform me, and pay me market value (billions). But the US did not do this. Rather, as you have seen, between 2007 and 2007, the US government (likely via Steve Weinstein and MovieLabs) released two never-before-used computer viruses on me, which allowed the government and the conspirators to observe my activities, steal my works and ideas, then destroy all of my works and my hard-drive (which they did numerous times). This invites the question: why would the Bush administration allow this plainly evil attack and theft of a patriotic US citizen? The despicable nature of this action is amplified by the fact that the hero of the Butterfly Driver/Uberopolis screenplay (that featured the aggregated-data ideas that the US government and the conspirators determined to steal) is a proud American soldier, who, after America loses World War III and is incorporated into a larger new world government, lives as a fugitive because he refuses to renounce his American identity. So... Why would George W. Bush allow this sort of attack on an American patriot? It could be that George Bush and the conspirators have no moral structure. It could be that Bush despised my African lineage. But it also could be because my screenplay blamed Bush and his administration for the downfall of America. See pages 12-14 of the May 25, 2005 version of the screenplay (see HERE). In fact, I was so emphatic that Bush's actions would eventually lead to the fall of America that I put the dialogue that blamed Bush for the fall of the US in BOLD print. This was the only section of the 2005 script that I put in bold text. The character "John Carlos" explained:


JOHN CARLOS:

"There was once a free land called America. The wealthiest most powerful

nation the world had ever known, a country that once led industry in environmental

protection, led the world in human rights and garnered the respect of the world.

But in the early 21st century the new American government ended key environmental

protection, in the interest of business, prompting the collapse of the ozone

and the outer atmosphere. Simultaneously, they staged numerous ill-advised

military invasions into other sovereign nations and threatened even more.

At the time, the world's most powerful nations were beholden to America -since

its economy was so robust that it supported all of the world's economies.

America also employed millions of talented, educated people whom its companies

paid well. But under the new government corporations were encouraged to seek

greater profits abroad. American businesses sent millions of pivotal jobs over-seas.

The loss of these jobs destabilized the American economy. The economy was

worsened by border control problems -which politicians wouldn't secure for fear of

losing the immigrant vote. When America's economy finally collapsed the world's

economy collapsed with it. No longer economically beholden to America, the

nations of the world turned and rose up with military force against America -whom

they blamed for unjust military aggression and the fall of the world's economies,

This was the beginning of the Unification War. America survived the ten year war

-only after sustaining heavy nuclear damage and unleashing it's nuclear arsenal

on fourteen nations. The war left America a poor, third world economy. With the

world boycotting all American business, America eventually agreed to pay trillions

in war reparations and give up its munitions. After which America was granted

state status in the Unified World Nation, the new unrestricted business centered

world government."


​?  The 2021 Return of George W Bush -As A Progressive?


       I originally published this Stuxnet (and .Trashes) section on April 19. 2021, and this "STUXNET" section, and the entire article, ended under the "The 2007 Pre-Stuxnet ".Trashes" Virus Attack " heading, with the final sentence reading: "Period." I am updated this article because the day after I published the article, I learned that on April 19 (the day that I completed this Stuxnet section, which indicated that George W Bush was directly involved in the theft of my property), former President Bush just happened to release a heart-warming story, in USA Today, about his little-known friendship with Michelle Obama (see HERE). This was George W Bush's first interview in 3 years (see HERE). This would start a media blitz that would include interviews with CBS (see HERE), and NBC (see HERE) on April 21, 2021. Bush has been unusually silent in the 12 years since he left office, so his sudden re-emergence is curiously similar to Bill Gates's re-emergence and his Covid-19 media blitz that started a few days after I filed the BvC Complaint, March 4, 2020. But oddly, the April 19, USA Today story ends with Bush discussing an art book he authored, featuring 43 paintings of immigrants, which will be released soon. Hmm.... A lot of Americans don’t remember Bush doing much for Blacks or immigrants when he was in office. Many Americans remember George W. Bush doing little or nothing for New Orleans Blacks as they baked in the Louisiana sun, in the aftermath of Katrina; American Blacks remember being singled-out for heightened security checks when travelling, for years, in the aftermath of 911; many Americans remember Bush's military strapping electrodes to the testicles of war prisoners in Abu Ghraib; many Americans remember Bush locking up ONLY brown-skinned detainees in Guantanamo Bay; many Americans remember Bush authorizing water-board torture of ONLY brown-skinned war prisoners, throughout the Middle East. 

  • Again, I introduced the concept of "aggregated data" (or data aggregation) to the world between December 2006 and January 2007. JUST ONE MONTH LATER, February 13, 2007, President George W Bush, appointed Mike McConnell as the new Director of National Intelligence, overseeing all US intelligence, and Bush transferred and demoted the previous Director of National Intelligence, John Negroponte, to DEPUTY Secretary of State. Wikipedia explains about Mike McConnell: ""As one of McConnell's last acts as DNI, he signed ICD501 "Discovery and Dissemination or Retrieval of Information Within the Intelligence Community" to dramatically increase access to several databases held by various agencies in the community."" This is aggregating data. After Negroponte (who does not have a military background) was removed, for the next 10 years, all Directors of National Intelligence would have military backgrounds. and they would all be White. I believe McConnell was selected to this post, because he shared George Bush's opinion that it was in the US's national interest to steal these concepts, spy on me, and to continue to steal any interesting concepts that I produced. Since this conduct is such an embarrassing betrayal of morality and the Constitution, it's fair to assume that Bush, McConnell and all subsequent Directors of National Intelligence believed that minorities, particularly Blacks, must be heavily surveilled. (This logic follows from the fact that existing surveillance systems, used by the US, have shown pronounced biases against Blacks and minorities --and from the fact that the infringers of my intellectual property, and designers of the data-collection and surveillance systems, all participated in an all-White conference called "The Lobby") The fact that a Black man conceived ALL of the ideas necessary to this system, and conceived the system itself (and he considered such a system unforgivably evil), did not bother any of the government or private participants. (You can see the appointment and departure dates of all US Directors of National Intelligence at: https://en.wikipedia.org/wiki/Director_of_National_Intelligence , or click HERE to see a pdf.)

A pic of my Hotmail inbox, showing that the cast and crew began referring to our movie as "MrX" back

Some of the corrupt and incompetent people employed at the US copyright office. 

#5

 

  • Director of National Intelligence under Trump. As stated earlier, and as much of the evidence presented earlier suggests, Donald Trump was aware of the theft of my intellectual property, and supported using these stolen ideas to develop systems to spy on and surveil Americans. Circumstantial evidence of Trump's involvement and awareness of MovieLabs' hacking, spying and stealing from me can be seen by looking at the Wikipedia's list of Directors of National Intelligence (see the last link, or click HERE). As explained above and in the attached PDFs, I began researching and writing the Briggs v Cameron complaint around August 14, 2019, and I became aware that my computer was being hacked (to monitor my activities) by late August or early September 2019. In the 17 months from the time that I began working on that complaint (under Trump), to the end of President Biden's FIRST WEEK in office, there were SIX Directors of National Intelligence -FIVE changes of Director. I believe that these departures occurred because once these directors knew that I was preparing to file a legal complaint which documented the unthinkable and unlawful activity that I was observing, they did not want to be held responsible for this corrupt and un-Constitutional scheme, which started 12 to 14 years earlier.
  • Although all of the parties named in this articles will surely avoid any comment and deny any knowledge of any of this, there is no explaining how the US granted Steve Weinstein and MovieLabs TWO hacking patents -one of which is specifically designed to hack just one person (me) -and share that hacked information with any and all approved parties. It is harder still to explain why the Stuxnet virus's install files begin with MrX (the Stuxnet Virus appeared at the very time that I was working on a filmed nicknamed "Mr X"). It is harder still to explain why the US would leak, long in advance, news of its intent to use the Stuxnet (MrX) virus/spyware to hack an Iranian nuclear facility (again, this was just a lie, to hide the fact that the US invented advanced spyware to steal from an American, then destroy his computer, and much of his life's work). But, inevitably, it is impossible to explain why none of them have responded to my efforts to contact US Intel agencies, to have them examine these facts (and others) and to analyze the many hard drives that their Stuxnet virus destroyed (I still have about 8 of these hard drives). If they thought a criminal group or foreign actors were responsible they would have responded over a year ago. At some point, the US's failure to admit the obvious destroys its international credibility, and undermines democracy.

​

IN SUM


       Should anyone have a misconception, this website is not a sour-grapes website. This site was created to inform the public about issues that betray American values and compromise America's security and global standing, AND to let future defendants (people I intend to sue for stealing my intellectual property) know some of what's coming. This website is an invitation for you to stay tuned. The corporations might survive, but their executives won't. My work was stolen, and I expect justice, and every penny paid back, with interest and exceptional damages. But this is about much more than my lost profits. It's about US institutions respecting truth, and not spying on and stealing from Americans, and defending and celebrating minority creators and innovators (particularly one who conceived what are inarguably the most compelling technological concepts and literary approaches/ideas in generations) with the same zeal that the US celebrates White creators and innovators. I expect to file 4-7 new actions in the next 18 months or so, and I will say every name, and post all future central filings here. But before filing, I intend to post information concerning the infringement of many of my screenplays below; so Americans know the extent of the theft. If you are an American, US corporations stealing from a private, law-abiding American should sicken you and should matter to you, because America once alleged that it stood for fair play and fair competition; but now it appears that America prospered from intellectual property theft, and US courts misapplying law, while accusing other nations of not playing by the rules. If you believe in the American free press, investigative journalism, and accountability, all of this should matter to you because the companies that have reaped staggering wealth from my ideas are also the companies that own America's major news outlets [e.g., again, among the biggest infringers of my ideas were WarnerMedia (who owns CNN), Twentieth Century Fox (previously owned by News Corp -who owns FOX News, currently owned by Disney -who owns ABC News, etc.), and NBCUniversal (who owns MSNBC); thus, it is in their interests that their corrupt activities.]  A truly free press requires that all details of any litigation against the parent corporation, or any subsidiary, be reported, regularly. All of this should also matter to you, if you are an American, because these events are a major reason why nations like China and Germany, who seem committed to promoting corporate ethics, transparency and accountability, are rising, while America, currently, is falling. And of course, if you are NOT American, all of this should matter to you because the US insists that all other nations play by the rules, while US corporations have been allowed to play without a rulebook, protected by US courts.

        Finally, I encourage you all to "google" US billionaires buying doomsday mansions in New Zealand (yep, that's been happening). That matters because what it indicates: US billionaires know that their own corrupt practices are unsustainable and leading to disastrous consequences, and if and/or when things collapse, they intend to move to New Zealand; apparently ceding the US to America's adversaries. But I don't think it's too late to act. Americans should demand severe corporate accountability, and demand that US courts apply law (particularly IP law) as our Founding Fathers intended.


Reason To Worry


        I am not an alarmist, but this article should cause you to worry.

         First, the idea that a bunch of dumb, wealthy, White Supremacist stealing the brilliant ideas of a Black (bi-racial) man, to create an exact replica of the evil, tyrannical future government methods envisioned by this Black man in a sci-fi screenplay is as unthinkably evil as it is embarrassingly stupid.

         Second, the degree of hate that exists in the hearts of these conspirators, and the fact that they appear so devoid of any morality or humanity, should embarrass America for generations.

         Perhaps a greater reason to worry is… it appears that the conspirators mistakenly allowed Russia and China to infiltrate this scheme, AND it appears that Russia and China understood how to use these ideas far better than the American thieves and conspirators—who handicapped themselves by not consulting the conceiver of these ideas (although, if I knew they were planning to create a White supremacist, hate-based surveillance system, I wouldn’t have helped). 

          So, why do I say it appears that Russia and China understood how to use these ideas far better than the American conspirators? Because April 8, 2009 (only 2 years after the conspirators stole my ideas about aggregated data surveillance and predictive technologies, and only 17 months after the Lobby Convention), U.S. media reports first surfaced that Russia and China had hacked into the U.S. power grid, and other U.S. tech and critical infrastructures, and had uploaded software technologies that they planned to activate later. The first report of this appeared in the Wall Street Journal and Reuters (April 8, 2009). https://waterfall-security.com/wp-content/uploads/2009/11/ElectricityGridInUSPenetratedBySpiesApr08.pdf , http://online.wsj.com/article/SB123914805204099085.html , https://www.reuters.com/article/us-cyberattack-usa-idUSN0850385920090408 ) The next day, CNN and Scientific America reported the story. (See: http://www.cnn.com/2009/TECH/04/08/grid.threat/index.html , and https://blogs.scientificamerican.com/news-blog/spies-hack-us-electricity-grid-2009-04-09/ .) Siobhan Gorman explained, in the Wall Street Journal (underlined): 


TECHNOLOGY APRIL 8, 2009 

Electricity Grid in U.S. Penetrated By Spies 

By SIOBHAN GORMAN

WASHINGTON -- Cyber spies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system , according to current and former national-security officials. 

The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven 't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war....


"The espionage appeared pervasive across the U.S. and doesn't target a particular company or region , said a form er Department of Homeland Security official. "There are intrusions, and they are growing," the former official said, referring to electrical systems. "There were a lot last year.".... 

"Authorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, "If we go to war with them , they will try to turn them on."


       Although these reports could have just been leaked, to get the U.S. to invest heavily in aggregated data based predictive systems and surveillance, I believe the stories are accurate. I believe that Russia and China learned about the U.S.’s new massive aggregated data surveillance and predictive systems, and they smartly concocted methods to infiltrate those systems, and these were the earliest signs that Russia and China were far ahead of the U.S. in knowing how to use and exploit such a system. Perhaps the greatest evidence that Russia was far ahead of the U.S. in its ability to defeat such a system is how, in recent years, Russia has created countless fake Russian Facebook and Twitter accounts. A predictive system relies on reliable information; by producing endless streams of fake data, Russia defeats this concept. Also, Russia has been feeding American fake news for years. This is vastly more dangerous and unpredictable than fake user accounts, as it creates huge, unpredictable ripples and waves within the U.S. But the problems are worse.

        It appears that after U.S. tech giants, military and aerospace officials, became so consumed with actualizing these stolen concepts that they failed to pursue other more immediate and pragmatic technologies. Why do I say this? Because, in late 2021, China and Russia both announced they had long-range hypersonic weapons. Later, in December 2021, we learned that China's capabilities were so advanced that their hypersonic missile actually fired a second missile (read more here: https://www.the-sun.com/news/4116304/hypersonic-nuke-china-fires-second-missile-mid-flight/ ). And in January 2022, North Korea announced they too had developed hypersonic weapons. 

        Meanwhile, you may recall that in 2020 and 2021, U.S. tech titans Amazon and Microsoft (both of whom were present at the 2007 Lobby convention) were engaged in a huge mega billion dollar battle to win a U.S. defense contract (a system based on data aggregation). (See: https://www.theguardian.com/us-news/2019/jul/09/amazon-microsoft-war-cloud-pentagon-contract-battle ).

         No, I don't have insider knowledge. But, among other things, the facts indicate that if the U.S. military had been properly focused on pragmatic military technology (e.g., missiles) China, Russia and North Korea would not have so easily surpassed the U.S. in missile technology. If you are wondering, at the time that this passage was written (January 2022) the U.S. still did not have hypersonic missile technology. My read on things is: the U.S military fell behind Russia, China and North Korea because they were focused on the moronic, racist agenda of surveilling American minorities. You can't correct such deep, moral problems without holding people accountable. Yet, currently, U.S. officials show no interest in holding the Conspirators accountability. Worry is appropriate.

        [NOTE: The preceding 4 paragraphs were added to this closing section in mid January, 2022. A week later, January 24, 2022, as the US contemplated helping Ukraine in its conflict with Russia, the U.S. Department of Homeland Security announced that if the US intercedes in Ukraine's dispute with Russia, Russia may launch a considerable cyber attack against the U.S. (See https://abcnews.go.com/Politics/dhs-warns-russian-cyberattack-us-responds-ukraine-invasion/story?id=82441727 ; see https://thehill.com/policy/national-security/591074-dhs-warn-russia-could-launch-cyberattack-on-us?rl=1 , and https://www.cnn.com/2022/01/24/politics/russia-cyberattack-warning-homeland-security/index.html .) Clearly, this supports my belief that corrupt US defense contractors (Microsoft, Amazon, Google) compromised US defensive capacity by stealing and implementing my ideas about aggregated data. 

​

         That's about it. The solution to this mess is absolute accountability and transparency. Accountability means bad actors (private, political and military) face punishment (and pay all civil penalties). You'll find some updates and interesting supplemental information below -and very specific details regarding upcoming infringement claims against Harry Potter, Gravity Falls and Hunger Games.

​

​

​

​

​


​

----------------------------------END

​







​

POSTSCRIPT

​

​

PDFs added March 2023:

"Origin Stories" PDF added March 8th, 2023

Head Start Bullet-Points PDF

Berkeley Master Plan (Volume 1)

Berkeley Master Plan (Volume 2)

U.C. and the Public Schools

​


January 3, 2022 Update:


       When I created this article/website (January to March 2021) I did not intend to include many details about my specific infringement claims, and what motivated the conspirators actions. However toward the end of the year (2021), I observed a huge uptick in commercials and news outlets promulgating certain aspects of my screenplay(s). I believe this was/is an effort to make these aspect seem less extraordinary than they were at the time that I conceived them. Thus, I have decided to upload PDFs of some of the infringement claims that I will be making against the Harry Potter series, the Hunger Games series, the Gravity Falls animated TV series, and Ultraviolet: Code 044. I may upload more in the near future. You will notice that the hero in each of these series represents the embodiment of hope, and represents hope to others (although Harry Potter did not represent hope until the final book or two). (In 2021 you may have noticed that hope was suddenly a constant topic. You may have also noticed other things, like the Salvation army suddenly changed its slogan to "Hope Marches On".) One of the curious things that you will observe in my screenplay ("Uberopolis: City of Light" AKA "Butterfly Driver") is the villain speaks of doing his terrible actions "for the greater good." "For the greater good" was my unique corruption of philosopher Jeremy Bentham's philosophy, which is usually distilled down to "The greatest good for the greatest number" (although Bentham actually said "The greatest happiness of the greatest number"). Thus, because I reworked the phrase into something, perhaps, a bit more lyrical, suddenly Hollywood and major publisher (owned by or connected to the Big 6 film studios) began to release works that contained my phrase "the greater good." Although Harry Potter infringes huge and major story elements, it also included this smaller, but substantial detail. But this detail is particularly telling because it is a phrase that is directly taken from my work; and idiosyncratic elements, such as this, give added weight to infringement (theft) claims. The reason I explain this is, in 2021, a few times, I heard the expression "the greater good" being promulgated on news outlets (outlets owned by the infringers of my works). I found this curious, if not concerning. Then, in January 2022, Dodge released a commercial for its "Ram" truck, claiming the Ram was "built to serve the greater good." This refrain was the punchline (final line) of the whole commercial. So, upon seeing this, I decided to publish some of my coming infringement claims here; so any dutiful, interested citizens, following this case, can witness the conspirators criminality, collusion, and utter lack of conscience, in real time. To be clear, if the conspirators can so promulgate falsehoods that they may persuade all future jurors that all previous heroes represented hope to the world, and they may also convince them that they have always heard people speaking of "the greater good" (rather than "the greatest good" or "the greatest happiness") that makes my case about 1% weaker. However, the fact that American businesssmen and corporations are this corrupt should dismay us all, as it betrays our Founders and our national values. 

       (NOTE: The first 3 Harry Potter books do not infringe my work, the fourth book infringes, but I may not take action against it. My Infringement claims, currently, are only against the final three books.)

       That said, you can read six of my coming infringement claims below. They are in very presentable form, but they are not quite finished. If you compare them, you will notice that most of them infringe similar aspects of my works. You will also notice that Harry Potter and Gravity Falls infringe many of the same aspects of TWO different works of mine. These rough infringement claims include photos from the infringing films. This is done to illustrate the infringement, and is done under "fair use" doctrine. I do not own these right protected images, and I derive no income from these images or from this website. Below, you will find links to six PDFs of forthcoming infringement actions. 

   1. Harry Potter vs Butterfly Driver

   2. Harry Potter vs 13 Gates of Rane

   3. Hunger Games vs Butterfly Driver

   4. Gravity Falls vs Butterfly Driver

   5. Gravity Falls vs 13 Gates of Rane

   6. Ultraviolet vs Butterfly Driver

         I'll put the rough claims against DEATH NOTE up here soon. The conspirators hacked me, in real-time, and wrote Death Note, as they hacked. Thus, Death Note is the earliest work to infringe Uberopolis and/or Butterfly Driver. The American Conspirators intended to use Death Note to protect their other works that infringe my work. Consider this... Death Note was released in Japan, in 2004 to 2006. Death Note, like all Japanese manga and anime, had no copyright registered in the U.S., because it was registered in Japan (if it was registered at all). But in 2014, Death Note's creators registered "Death Note" (all 12 manga volumes, in 12 U.S. copyright registrations). You can see the first of these twelve 2014 U.S. Copyright Office registrations HERE, and see the 12th copyright registration HERE. There is nothing that can explain why the creators would suddenly register in the U.S., 10 years after publication -especially if you understand that the Death Note manga series was already released in English, from 2005 to 2007 (and even then there was no copyright registered in the U.S.). The reason the Conspirators suddenly began registered Death Note, in the U.S., beginning in March 2014, is because in October 2013, I sued Neill Blomkamp and Sony Pictures (et al), for making Elysium (which also infringed Butterfly Driver). I believe that Sony Pictures (who co-owns Mad House and Animax - the producer and distributor of the Death Note anime) had Shueisha Inc (the Death Note series owner) register Death Note in the U.S., so Sony Picture could claim that all of the ideas I alleged Elysium infringed were already done in the Japanese publication, Death Note, which Sony Picture was also a co-producer and co distributor of. This would have been a devastating strategy in 2014 (because, back in 2014, I would have had no idea how Death Note's creators could have accessed my work).


September 13, 2022 Update:


       Shortly after I uploaded PDFs of my forthcoming claims against Harry Potter, Hunger Games and Gravity Falls (see the Jan 3, 2022 update, above) the BBC and many US news outlets (owned by the infringers and corporate conspirators) began to propagate terminology related to these forthcoming claims. Thus, in 2022,  as you may have observed, news outlets and other content providers began a very pronounced increase in their use of the terms "symbolic," "symbol" and "symbolism", almost hourly. These outlets also began to propagate the term "the greater good," which I coined, in one of the contested screenplays, in 2003. (The conspirators further propagated the term "greater good" on trusted sources, such as Wikipedia.) These outlets and conspirators also dramatically increased their use of the very common term "hope" (a concept owned by all of humanity, which had been under appreciated and under utilized, until I pioneered an expansive, thematic use of the concept, 2005-2006). These outlets hope to create a social sense that "haven't we always frequently talked about 'symbolism' on the news and TV series?" and "haven't we always obsessively spoken about importance of 'hope,'" and "hasn't the phrase 'the greater good' always been part of the American fabric?" The answer to each of these questions is: no.  These points may seem like minutia (as they just expand on conduct I reported in my January 3, 2022 update, above), but I've addressed them here, because these events show US corporations abusing their power and responsibility, for no other reason but to protect their criminally obtained "interests."

​

Jan 2022 Update #2


       On 1/14/22 I filed my Writ of Certiorari to the U.S. Supreme Court. I'm posting it here because I worry about the defendants/Conspirators/respondents engaging in some sort of foul play to prevent the document (Writ) from reaching its destination or being published. I'm concerned about this because on January 11, 2022, I brought the Writ to Minuteman Press, in Santa Rosa, to be printed for the U.S. Supreme Court (the printing requirements are very irregular and unusual: 6.125" x 9.25" booklet, double sided, etc., with special binding requirements...). After delivering the document to Minuteman Press and paying for printing, later that evening, I decided I should look,, again, at the Google Docs file of the document, to triple check that the document complied with all Supreme Court requirements. I was concerned about Google Docs, because Google LLC is one of the Respondents/defendants in this particular suit, and I worried about Google using its ability to hack my documents/computer to alter the document. If you read the "Aggregated Data Caper" article (above), you understand that the Complaint in this case (Briggs v Cameron) shows that Google LLC, and certain of the defendants/Conspirators, hacked into my computer for years. 

        The Supreme Court's word limit for a writ of certiorari is 9000. I made my Writ of Certiorari exactly 9000 words (originally, the document was about 8950 words, so I added 50 words, just to make it an even 9000). However, when I tripled checked the document on Google Docs, suddenly the Google Docs word counter was no longer working at all. Thus, I cut and pasted the entire document into the WordCounter.net word counter. WordCounter.net indicated that the document was about 350 words over the limit (around 9,350 word). So, for some number of days, my Google word counter had been sending me false information (I'm confident this was a deliberate effort to sabotage the filing). Thus, the document that I had given Minuteman to print would be disqualified, if I mailed it to the Supreme Court.

       Thus, I spent a few hours editing the document. I had to shorten the document by almost two pages. (Oddly, as I neared completion of the re-edited writ, my Google Docs word counter began to work again; only this time it was showing a much lower word count). In the end, WordCounter.net indicated that the re-edited writ was 9000 words, while Google Docs indicated it was 8686 words.

        The next day (January 12, 2022), I hurried to Minute man to ask them to stop the presses, and print the new version. Because Minuteman had already printed 29 of the 50 copies, I had to pay an extra $110 for the new order (the Supreme Court requires 40 copies of every writ submitted). You can see a copy of the January 11, 2022, Minuteman receipt HERE. You can see the January 12, 2022, Minutemen receipt HERE. You can see a photo of the final page of the January 11 version of the Writ, showing that it was originally 47 pages long, HERE. You can see a copy of the January 12 version of the Writ, showing that is was 45 pages (two pages shorter than it had been), HERE.

        If you are wondering, in addition to informing the public, this section of this post-script is also intended to document on-going violations, as l intend to sue certain of the defendant/Conspirators (like Google) again, for these on-going infractions. 

       If you are interested, you can read the final Writ of Certiorari to the U.S. Supreme Court HERE. 

​

12/01/2021 TWITTER UPDATE:


​       On November 27, 2021, I discovered what an MSNBC news article, which I believed to be fake, which had been linked into Twitter and fraudulently backdated into Twitter's timeline. I suspected the article was fake for two reasons: (1) the article, which claimed to be from 2019, had never been crawled by the Internet Archive, and (2) because, for some inexplicable reason, Twitter had no search results for "investigative journalism" (my quoted search terms) that pre-dated 2019 -which means that from when Twitter formed in 2006 to 2021 none of the hundreds of millions of Twitter-users ever used the phrase "investigative journalism" (this is virtually impossible).  I immediately tweeted about the article the fake article. That tweet, which links to the fake article, can be seen at https://twitter.com/SteveWilsonBri1/status/1464787717871398912 . That same Saturday evening (11/27/21) I sent out two more tweets about the fake article. These articles can be seen at https://twitter.com/SteveWilsonBri1/status/1464802203986644999 and  at https://twitter.com/SteveWilsonBri1/status/1464804703766601732 . Again, that was Saturday evening, 11/27/21.

       Two days later, Monday morning, November 29, 2021, Twitter's CEO, Jack Dorsey resigned, without notice or reason (see BBC article: https://www.bbc.com/news/technology-59465747 ). Later that day (11/29/21), I released two tweets, stating my belief that Dorsey resigned due to my tweets about the fake article. One of those two tweets I attached to a Reuters article, which can be seen here: https://twitter.com/SteveWilsonBri1/status/1465442920635396099 . [NOTE: To be clear, I think the DoJ, asked Dorsey to step down     (I think all of the CEOs mentioned in this article, who suddenly resigned, did so at the request of the DoJ). Resignation is insufficient. Accountability means returning the value of all stolen ides, and facing criminal court for any criminal infractions.]

        It's important to note here, to that point, Nov 29, 2021, all Twitter search results were arranged by relevance (thus, the results for your  search words would yield older tweets (going back many years) mixed in with newer tweets. However, two days later (Dec 1, 2021), when I performed a few searches on Twitter, suddenly none of my search results went back further than 2021. I immediately tweeted about this. The first tweet about this can be seen here: https://twitter.com/SteveWilsonBri1/status/1466252204487049231 . I suspect Twitter changed its search results to prevent diligent users from discovering similar disinformation and fraud. It should be observed that some of this activity occurred under Parag Agrawal, Twitter's new CEO. A a day later, December 2, 2021, I discovered a fake web-article that appeared to attempt to explain why Twitter search results were changing, due to a "bug". The tweets that I released, about the fake article and explaining the evidence of fraud, can be seen HERE. 

​

Update Re US Copyright Office


          On September 1, 2021, I tried using the US Copyright website, but it was being updated or redesigned, and if was difficult to find the "search" bar to search copyright records. The "update" or "redesign" felt questionable. Eventually I found the search bar, in a strange location on a different page (no longer on the home page). If you choose to search the Copyright Office website records, and have trouble finding the search bar, try here: https://cocatalog.loc.gov/cgi-bin/Pwebrecon.cgi?DB=local&PAGE=First . The fact that the Copyright Office is making records harder to find is alarming, and a step in the wrong direction. Additionally, the copyright office has hired a woman named Shira Perlmutter to replace Karyn Temple. Hayden is still the Librarian of Congress. (Not a promising sign.) 

​

China Takes Monumental Advantage

Of US Failure to Uphold Copyright Law


        On pages 45 to 47 of my Opening Brief I provided a few examples of how my work appeared to influence US politics and industry. (See HERE.) And on pages 22 to 24 of my BvC reply brief provided a few examples of how US and international decision-makers seemed to be influenced by my ideas. (Click HERE.)  I share this because on page 122 of the Briggs v Cameron complaint I warned of the dangers of US failure to properly implement copyright law:

  • “Our Founding Fathers’ belief that intellectual property rights laws should reward and inspire excellence , led to our Constitution’s Copyright Clause , modeled after Great Britain’s Statute of Anne —enacted because wealthy publishers were stealing poor writers’ stories. 
  • “150 years later, as Hitler trammeled human and creative rights, Germany’s greatest thinkers immigrated to the US, and helped create the technologies that would stop Hitler.” [sic]

       Two pages a later, on page 124 of the BvC complaint, I explained:

  • “Corporate attorneys have perverted copyright law so that it now protects the same powerful infringers it was created to rebuff. If the Defs’ actions are allowed, US creators will be forced to protect their works abroad—as US creators can register and protect their works in any Berne Convention country (90% of the world).”

       Why do I bring these facts up in closing? Because in 2021, as US courts and agencies ignored warnings of the severe risks of failing to uphold copyright law, China began a quiet and smart international campaign to let creators know that China respected copyright law, and the rights of creators. An interesting example of this can be seen in a Chinese made anime called “Call Star”. In episode 5 of this short Chinese anime series, a deceitful older character (probably representing corrupt businesses) steals the intellectual property of a sweet and idealistic young character. At the end of this episode there is a statement explaining that creators own their ideas, and that copyright law is intended to protect creators (not businesses). (See screenshots below.) The point? America's failure to protect it's citizen's intellectual property,  like it's failure to protect US citizen's privacy and data and its failure to protect the values stated and implied in the Constitution (in favor of protecting Nationalism and corporate theft and recklessness) are having profound international consequences.

​

Above: Screenshots from episode 5 of the Chinese anime "Call Star", promoting

awareness that copyright law was created to protect creators (not corporations);

notifying the world's creators that China stands ready to protect creator's rights.

​

       The fact that China is aggressively defending copyright law is a great thing. However, as illustrated earlier, the US is not properly defending copyrights, and is not properly applying copyright law and has been using the copyright office to assist US corporations and FOREIGN corporations to falsify copyright registrations, to steal the intellectual property of Americans (to see actual evidence of fraud at the US Copyright office, scroll up to the section "Fraud At The US Copyright Office). This fraud now threatens US global standing, and severely threatens the US dollar, because, as explained on page 58 of the Amended Second Declaration (click link), "The American dollar is the global standard because America is regarded as the world’s most trusted nation...". Thus, once other nations can no longer trust US institutions (such as the Copyright Office and US Courts), the Chinese Yuan and Renminbi (Chinese currency) will supplant the US Dollar as the world's currency.





DISCLAIMER: Everything written, said or presented on this website, or the documents attached to this website, is/are just allegations, not  necessarily facts. Although I, Steven Kenyatta Briggs (AKA: Steve K Wilson Briggs)  the owner of this website, wholeheartedly believe every allegation to be true, and although all of the articles posted on the website present seemingly overwhelming evidence  in support of every allegation, everything presented on this  website, no matter how persuasive, is/are just allegations and opinions.


The preceding disclaimer is made for legal reasons.


ZODIAC EVIDENCE FOR "The Zodiac Killer's Identity Revealed'

I ran out space for the Zodiac evidence on the "Zodiac's ID Revealed" page, zo I had to use the space below for evidentiary storage.

#8

Letter #8 : To Melvin Belli

#9

#9  : The Bus Bomb Letter

#10

#10 : The Dragon Card

#11 : The Mount Diablo Map Code; and #12

#11: The Mount Diablo Map Code is probably the most important letter for solving the Zodiac's  ID.
#12 : The Johns letter.

#13 : The Little List Letter

#13 : The Little List Letter

#14 & 15

Letters #16 & 17

Copyright © 2025 Zone Resistance - Todos los derechos reservados.

Con tecnología de

Este sitio web utiliza cookies

Usamos cookies para analizar el tráfico del sitio web y optimizar tu experiencia en el sitio. Al aceptar nuestro uso de cookies, tus datos se agruparán con los datos de todos los demás usuarios.

Aceptar