ðH geocities.com /dbdoggle/index.htm?200528?20061?20063?200610 geocities.com/dbdoggle/indexae1a.htm elayed x ûDÔJ ÿÿÿÿ ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÈ @š¶ ìÔ OK text/html ÀÃg ìÔ ÿÿÿÿ b‰.H Sun, 03 May 2009 05:48:29 GMT º Mozilla/4.5 (compatible; HTTrack 3.0x; Windows 98) en, * ÷DÔJ ìÔ
dbdoggle@yahoo.com
Generally, subliminal harassment involves creating a subliminally hostile environment, playing upon common guilt trips, use of fud, scoping out unpleasant or useless tasks for workers or sometimes light forms of traditional overt harassment.
In later sections of this document, scenarios and techniques will be outline that you can implement in your company or organizations that will allow you to selectively employ subliminal harassment against anyone you desire. You will learn about many techniques such as the putting the mark in an physically uncomfortable high velocity seat or moving them to death row, banging and loud noises, talking or laughter, bogus department wars or conversations with upsetting information meant to be overheard by the mark that make for a more hostile workplace environment. There are not set rules, you just need to follow the basic outline but improvise as needed. Properly executed subliminal harassment will leave the mark disoriented, angry, lonely, confused and vulnerable but unable to prove that they has been targeted for harassment.
A common question is: Why would a company do this? Why would a company go to the trouble of hiring someone even giving them a higher wage or salary and then turn around and harass them into quitting? Where's the profit in that? Here are some of the reasons.
Prior to WWII(World War II), most Americans were employed on farms, ranches, factories and small business that supported these types of businesses. Between the Civil War and WWII this system began to break down with the low point being the Great Depression. Contrary to what liberals might says, it was not the New Deal that brought the US out of the Depression, it was WWII. WWII created almost full employment putting all Americans to work in defense factories for the war effort. War worked well to build prosperity. Defense spending in the post WWII period creating an era of great prosperity for most Americans. Following the WWII, defense spending and a succession of smaller wars, lead to an extended period of middle class growth. Because wealth had to be re-distributed to individuals in a selective, controlled manner, job slots in multi-tiered companies were created. Defense companies formed the prototype for these types of companies. This is called the corporate slot system. It involves a multi-tier system: entry level, level 1, level 2 and etc with each successive level paying higher than the previous one. In theory, people would come in at entry level and if successful, eventually flow up into the higher levels allowing for upward mobility.
The corporate slot system has been the major wealth distribution system in the US since WWII. Rather than follow the course of European countries that created a wealth distribution system containing social entitlement programs like national healthcare, social insurance programs and unions, the U.S opted to continue being the world police man and continue the government funded corporate slot system as its primary social economic distribution system. American tax payer now subsidizes this practice through its de facto successor the tech and e-commerce boondoggles. The problem is that at its core, it is pure socialism and almost half of the jobs in the workplace are give aways and not necessary for the functioning of the economy. It is important to distinguish between a job for which there is legitimate demand and one that is just a give away designed to prop up the tax base. See: Washington Eugenics. It is important to keep this a dirty little secret: if this become general knowledge, there would be a massive movement to change immigration policy. Therefore, it is important not to let on to college bound kids and the general public that, contrary to what the media has been programmed to say, there is no real "pool of demand" for computer generalists. Just slots for fictional rare workers. This is why Google and Microsoft can say that they have x number of empty positions that they cannot fill while there are 1.5 million permanent Americans residents with technical degrees who are unemployed or under-employed This lie will keep the racket going and keep kids going into the CS and EE programs of the university corporations even though they will not get jobs or only work a few years doing bogus work before they end up flipping burgers.
However, the most important aspect of the tiered corporate slot system is that it allows for increased profitability through labor arbitrage and cheap help. Once established, entire layers of workers can be easily outsourced to cheaper labor countries. Likewise, by shunting the work of the higher level workers into the lowest levels, profitability can be greatly increased by effectively eliminating the high overhead created by the more expensive upper level workers. It also facilitates the ability to drive out older workers(over 30) through preemptive agism. In this case, subliminal harassment is an important technique to maintain high turn-over in the entry level workers preventing them from moving up into the more expensive levels. An even bigger increase in profitability can be obtained by using cheap immigrant labor through government sponsored visa scams and kiting to drive out native workers and depress wages even further.
Every company and organization from churches to large multinational corporations have turn-over. It is a part of the natural order in nature and in human social organizations. People go into organizations and industries and they have to leave them. Its only a matter of who goes and when. Japan's failed experiment in lifetime employment demonstrates the importance of it. The single greatest cost to any business is labor so it is important to keep workers cheap and moving. That is the great advantage of disposable visa workers: cheap, disposible, pliable, easily dominated and they won't be sticking around too long. Despite what right-wing demagogues say about it, the real purpose of the corporate system is to concentrate and keep most of the wealth in the upper one to two percent of the population re-distributing the what's left of it among the other ninety-eight percent. High turn-over in the workplace keeps the other ninety-eight percent of the population moving from job to job with enough purchasing power to keep the economy moving along but never allowing them to acquire significant wealth. While this policy may decrease a company's profit margin slightly, it benefits the overall business environment enormously which more than compensates for the loss. Besides, many tech companies are generally very well funded and can afford eccentricities like this that normally would not be allowed in industries that have legitimate business models, are not government subsidized boondoggles and must respond to legitimate market demands.
The new economy(Clintonomics) and the desperate labor shortage for workers with software and programming (after 1995: math and science) skills were complete frauds. In reality, the tech, telecom and Internet industries are the de facto successor to the defense industry boondoggles of the 1960s and 1970s that used lucrative government contracts to siphon money out of the government, drive up real estate prices, provide bogus jobs to prop up the tax base, employee ex-military people and enriched the military industrial complex. One of the side effects of American capitalism and corporate welfare is that the government will allow you to run a profitable business by just being a startup and doing nothing else: you don't have to produce a product or added value to anything. During the late 1980s and early 1990s, corporate block grants, legal exceptions and other subsidies including a generous expansion of the Federal R&D Tax Credit, where used to encourage innovation in the legitimate technology industry. Since almost any business could take advantage of the giveaways even if they were not in the traditional technology or defense sectors of the economy, this lead to the blurring of the actual definition of a legitimate technology company into the "bastardized" tech company. The commercialization of the Internet and the Dot Com hysteria allowed almost anyone with a little capital and government connections to emulate the Silicon Valley startup and create little side business running the startup scam. The problem is that although the flow of capital and government subsidies into the industry increased, the actual amount of actual work for IT workers to perform did not increase very much. As a result, almost all of the tech jobs created after 1992 were not created in response to legitimate market demand for new workers but by government incentives and did not really exist to begin with. As the bubble grew and more and more people jumped on the bandwagon to exploit the system, the universities pumped out more graduates and the government flooded the market with cheap visa workers from foreign countries resulting in massive over capacity. With no real legitimate market driven demand for the new workers, companies running the startup scam were forced to hire in workers to get the giveaways but have no legitimate work for them to perform. As a result, companies found it mutually beneficial to keep kiting people from job to job. They have a financial incentive to hire people away from each other indiscriminately and turn them over right away to mutually spread the costs and risks. To use a metaphore: to handle the resulting massive over capacity companies must "play muscial chairs" with employees, subliminal harassment must be applied to dupes who are employed merely to prop up the tax base to keep them job hopping until enough "chairs have been removed from the game" and they finally cannot get another job and are forced to voluntarily leave industry.
It is a good cover for companies and industries which engages in systematic discrimination against workers over 35 years old (under thirty rule) that is actually a continuation of the government eugenics and give away policies of the big military defense contractors. This practice in often accelerated during periods when the government and corporate America initiate a jobless recovery to keep the actuaries in balance.
The myth of the Silicon Valley startup purposely only includes "kids" in garages and twenty something, pony tailed millionaires. This myth of only "young" people being innovative, trendy and up on the latest trends and technologies can be used to exclude "older" workers. This has to be done before the age of 40 at which it becomes illegal. For example, if companies only hired workers under 35 it would be clear that they are discriminating against "older" workers. But by hiring in "older" workers, excluding them from the legitimate operations of the company so that their skill sets do not stay current and turning them over quickly, it appears that they are not discriminating against "older" workers. After being turned over a few times, "older" workers will be discouraged from trying to get another job since they are just going to get turned over again and their work related skills are not longer in demand (See: Proprietary Upgrades or Excessive License Fees). Kiting workers like this prunes "older" workers from the labor pool but gets employees off the legal liability hook. All the employer has to do it point to their own statistics, they are not discriminating against anyone we just have a hight rate of turn-over that's all. The ability to selectively exclude anyone over 35 and have the government pay them to do it is, in part, responsible for the exportation of the tech business model to other parts of the general economy.
The company may be running a jerk farm training the new generation of jerk management. A jerk farm is a small company, division, subsidiary or department of a large multinational or one of the Big Five consulting firms that is used as a training ground for jerks (management trainees) that is staffed with high velocity seats. Very often it doubles as a money laundering front with lots of billable seats. In the year 2000, the greatest number of Americans in history turned 40. As workers get older the costs for health care increases exponentially and productivity drops. This means that all of baby boomers and generation-x people are going to have to be moved out of high paying jobs and replaced with younger workers or disposable visa workers. A new generation of young managers, recruiters and headhunters adept at kiting people from job to job and eventually "retiring" them (coercing them to voluntarily leave industry) will be increasingly important and in future demand. This periodical generational dumping is usually referred to as a jobless recovery or structural unemployment. As part of the training, the company may have setup a death row or dead pool front company, subliminal harassment techniques are always applied people in these situations to move them out of the company as soon as possible.
Revenge could be another motive. In recent years, it has become harder for employers to retaliate against former employees for whistle blowing and sexual harassment due to the explosion of frivolous law suits. Rather than retaliate against the employee while they are employed by their current company, they will have them hired away by some other company and let the new company management do the job. Contrary to common sense, companies that outwardly appear to be competitors are really "brothers under the skin". Companies in mortgages and home loans,real estate, gaming, finance, health care and software all share the common "people problems" and mutually benefit from high turn-over. Very often one company will be more than happy to take a "problem" employee off another company's hands by hiring them in and then using subliminal harassment to apply a little psychological rape and torture and dump them to maintain the industry status quo. Exchanges like this between companies often takes the form of favors and kick backs. It is cleaner than firing someone since there is no legal liability problem for the previous employees because the mark quits the second job or leaves industry "voluntarily."
All the fun of sexual assault but none of the legal liabilities. Hiring in protected class people, whistle blowers or other industry offenders who threaten the status quo, harassing and humiliating them into quitting gives certain personality types a feeling of satisfaction and superiority. Since it is possible to create conditions in which anyone will fail no matter how smart, motivated and well trained they may be, this gives great opportunities for company jerks to hire in members of their favorite hated underclass, give them a position then use subliminal harassment to completely sabotage and humiliate them- all at tax payer expense. There are three additional benefits to using subliminal harassment for politically motivated psychological rape. You have:
The HB1 and L1 visa programs were created back in the 1950s before the Internet, transcontinental air travel, video conferencing, over night mail and FAXs existed. The ability to move personal between division or import workers was arguably necessary for businesses to operate. But, by the 1990s, these programs had become unnecessary and essentially turned into direct government subsidies. This allowed companies to use the desperate labor shortage; myth as an excuse to use the loopholes provided by the visa H-1B and L1 programs to bring in cheap workers to crowd out native workers to increase profitability. Countries like India and China could now setup visa immigration "mills" to colonize the United States displacing native American workers replacing them with their own people and have the U.S tax payer foot the bill.
Employers have the Constitutional right to the perfect employee or have the government import a cheap, disposable immigrant worker at tax payer expense if they can't find one. The H-1B Visa Worker Program is a tax payer sponsored immigrant adoption scam crafted by Washington tech Internationalist lobbyists, the big software monopolies and the U.S intelligence agencies to bring in cheap immigrant laborers into the U.S. under the pretext that:
Many companies try to maintain a tough corporate image with tight social control. High turn-over, hiring people in and moving them out as quickly as possible, perpetuates that image among corporate peers. For a manager, being a "people mover" enhances their reputation among their peers.
Firing someone directly opens up the possibility of a lawsuit. However, if you subliminally coerce an individual into quitting by themselves, you side step the problem completely.
The company hired an individual but then decided for some reason decides to dump them. For example:
In union shops, managers are often limited to the conditions on which they may discharge individuals: subliminal harassment maybe the only alternative.
A person who is target for high turn-over diverts attention from the organization as a whole and offers a "scape-goat" that can be blamed for inefficiencies or a bad business model. Having high-turnover covers that fact that there are some people who are sticking around for a long time.
Many managers like to keep on person on their department who is in the process of being turned over. It improves morale by playing to the herd mentality of long term company employees.
Since the foundation of the United States as a colonial power, the military has been the biggest employer in the U.S.. The mind set of the Washington elite bureaucrats and special interests that make money ripping off the governement is that the government needs to create entry level jobs for ex-military and immigrant people with what they consider good genenomes. These are government give-aways that are used to prop up the tax base, provide customers for new housing and give young government approved families a safe environment mostly in government and military rip-off save zones. This has historically favored heterosexual wasps with military backgrounds.
The typical lifecycle is:
You can turn it into a kind of game, it can be fun to hire people in and see how fast you can harass them into quitting. Open up a betting pool in the HR or boardroom and make bets on which techniques will work on which individuals and how long it will take to break them. Your tax dollars at work!
The profitable techniques outlined in this document are often used by government or corporate dirty tricks departments to eliminate the organization's political enemies or rat fuck whistle-blowers.
The Dirty Tricks department or division of a company or organization responsible for planning and implementing attacks to destroy the credibility, reputation and sometimes the lifes of individuals who pose a threat to the status quo of the organization (e.g whistle-blowers). In the private sector, individuals in these departments are often recruited from government organizations such as the C.I.A..
Rat fucking is the use of anonymous tips to law enforcement, employers, news media a politician's political enemies and etc. designed to undermine the credibility of an individual. These "tips" generally involve allegations of misconduct such as sexual indiscretion, drug use, computer hacking or tax evasion. These are most effective when use against members of an underclass since they are already unpopular and people are looking for more reasons to hate them (See: Make Them a Threat and Final Solution).
These are generational socialistic eugenics "giveaways" in the form of profitable government subsidies to companies to create bogus jobs used to prop up the tax base, raise the value of real estate and subsidize government approved families. Note that these types of jobs do not represent legitimate private sector economic growth, are short-term and dis-appear rapidly(See: Jobless Recovery). The criteria used to select applicants for these types of jobs are ussually based on age demographics, scores on paper IQ tests, sexual orientation,race, military status or affiliation with the special interests that actually run the Federal government. Historically, this has been done through defense related government boondoggles and spending allocated in a post war period for contracts with defense companies that employ returning veterans(and exclude anyone else). The replacement in the post cold war era are the tax payer subsidized tech industry or defense funded "government divisions" of software, wireless, telecom or Internet companies. Offshoots of Federalized racketeering such as Indian Gaming, homeland defense and healthcare are begining to replace these as political support for tech boondoggles is waning. These so called new economy replacements required high turn over managment policies as outlined in this document to make sure that they only go to "young" people under 35 and to keep undesirable underclasses locked out.
Expansion of these types of programs outside of the defense industry in the 1990s lead to the DotCom debacle, bogus startups and the tech and visa immigration mills that allowed countries like China and India to colonize the U.S and replace native workers with their own people - all at tax payer expense. In the future expect increased Federalized racketeering in homeland defense,home mortgage/real estate,Indian gaming and health care industries to facilitate the reproduction of government approved families.
With regards to subliminal harassment there are two types of lawyers:
Most lawyers in private practice have to put up the constant irritant of people coming to them with their "petty problems". They are looking for the big money cases. Many would love to be one of the high priced corporate attorneys that defend companies in discrimination or harassment lawsuits; therefore, lawyers have little or no sympathy for people who are targeted for subliminal harassment.
One line of defense relies on the myth that it is expensive and difficult to recruit and hire new employees. For most individuals, especially the ones who are seated on juries, a few thousand dollars is a lot of money, often the more than they will ever see at one time. These types of individuals have no comprehension of the wealth of even a modestly sized company. So, if they hear that it may cost a few thousand dollars to hire an employee, they can never believe that any company would spend what they perceive as a "large" sum of money just to bring someone into a company with the intent of harassing them out of the company.
Since subliminal harassment is often a group in a small office or department, it is often difficult to place blame on any particular individual where the herd mentality may be at work. With no solid proof of collusion, when the mark describes what is going on it will sound like paranoia not a deliberate attempt to drive them out of the company.
Often when a new employee comes into a company there will be a period of "hazing" where other employees will test the new employee with all sorts of unpleasantness. This is a perfect cover for subliminal harassment.
Law firms are very often large corporate money laundering fronts themselves with lawyers using these techniques in their own practices, and afraid to publicly admit that the techniques exists. Since many lawyers have contracts with corporate interests engaged in government racketeering involving defense contracts, real estate and home mortgages, they will not help the typical victim of subliminal harassment.
Litigation is very expensive. Lawyers will not take a case that they cannot win or settle. Most cases of subliminal harassment would require a lot of work without a sure outcome unless someone on the inside goes "on the record."
Discrimination laws only apply to members of protected classes and discrimination is seldom overt: it is masked by levels of accommodation. This is the loophole that lawyers and politicians have deliberately left in all of the anti-discrimination laws: discrimination is not defined as giving preferential treatment to people you want to keep and witholding it from people you are discriminating against.
The only way an employee would be able to work around the legal loopholes exposed in this document would be to have clauses in the Letter of Agreement prohibiting the employer from engaging in the harassment techniques outlined in this document. If they succeed it will compromise the employer's ability to harass and intimidate them after they have been hired.
In any event, the people you will be targeting are worthless nobodies that greedy lawyers ignore by default and are not making enough money that loss of their career would make it worth suing anyway.
The techniques described in this document often result in unfortunate phenomenon and, in the last several years, there have been several highly publicized incidents of violence in the workplace where the management was using subliminal harassment to create a subtle hostile workplace environment that resulted in the deaths of many innocent bystander employees. Fortunately, the incidents was chalked up to another crazy person on the rampage and never traced back to the companies or their .management This is the ultimate proof that psychologically vulnerable people can be pushed "over the edge" and that curn-and-burn and subliminal harassment, if properly implemented, can be virtually undetectable and used freely with no legal liability at all.
But, if in doubt, ask the company attorney: It is their responsibility to review the company's employee turn-over and harassment policy to make sure it is legal and absolve the company and its managers from any liability from employee lawsuits.
Reality: The visa programs have been created delibrately with NO protection for native workers therefore crimes like these are not covered by RICO.
Reality: There are no state or Federal laws prohibiting companies from performing pyschological experiments on indivduals without their explicit consent.
Reality: Under state law, a salaried at-will exempt employee is required at all times to match each hour worked to a billable account. If the employee cannot find enough billable hours to meet their weekly quota, the employer is not legally required to pay the employee their salary agreed to in the letter of agreement.
Reality: If the employer stops giving the employee work or paying the employee their salary, the employee is legally required under state law to unilaterally terminate the employment agreement from their side by quitting.
Reality: The employer can treat the employee anyway they want to without any legal liability. There are no state, Federal laws or case legal precedents that require any party in the contract to act in good faith.
Reality: The employer can deliberately deceive the employee into believing that they will provide the employee with work that they are qualified and capable of performing and then simply not do it with no legal liability at all. The employer can harass an employee by assigning them a tractionless task such as out the door task regardless of their ability to get it done and fire them if they can't do it. Even if the employee perceives it to be menial, humiliating and demeaning or so ambiguously defined that they cannot even develop a plan for completing the task. The employer has no legal responsibility to make sure that the employee is qualified for the job that they will be assigned. An employer can hire a plumber to build a fence, a carpenter to fix a car, tailor to treat the sick, a doctor to fit suits or a waitress to practice law or a software engineer to reverse engineer a non-existent product.
Reality: The at-will agreement does not specify that the employer agreed to give the employee work to perform. They only agreed to give them a job, not jobs to perform. The employer can expect that the employee to creatively "invent" their own work to keep busy or quit if there is nothing to do.
Reality: The employer is not legally required to communicate to the employee that they are unilaterally terminating the at-will agreement. The employee can be virtually fired. Being shunned by everyone in the company or department or not being given work to be performed are sufficient under law to terminate the at-will agreement with the employee. The employer can just stop paying the employee their salary without explanation.
Reality: Subtle harassment described in this document is not illegal even if the employer knows about it or is encouraging a hostile work environment where other employees consciously or unconsciously try to make another employee uncomfortable. Companies engaged in this type of behavior cannot be sued by a former employee for creating a hostile work environment.
Reality: The at-will agreement does not state that the employer will provide information, trade secrets, tools and additional training that an employee my need to perform an assigned task. In fact, the employer may deliberately neglect to do any security and background checks at the time the employee was hired and use this as an excuse to withhold agree to work entirely
Reality: The employer can uni-laterally terminate the employment agreement for any reason or no reason with no legal liability.
Reality: The Know Your Customer Rule only applies to banks and financial institutions not private companies or protected Federal government front companies. Employees of other types of companies have NO responsibility to report crimes committed by other employees, management, or their customers. Furthermore, employees or customers of protected government front companies engaged in activities such as money laundering, drug dealing or smuggling are not committing crimes and local city, county and state law enforcement agencies are not allowed to investigate or prosecute them. (See:Government Ripoff Save Zone)
Reality: The courts have found determined that things such as flag burning in public, excluding gays from the Boy scouts and hiring and preferentially promoting younger workers to send a message that older workers are not welcome is constitutionally protected form of free speech and is not discrimination.
Guilt trips are subconsciously fears, phobias and social taboos that can be aroused within and individual to agitate, harass or make more vulnerable to manipulation. They can very according to race, religion, cultural background. They include: age, sexuality, job competency, financial security, standing in the community, health status, mental stability or vulgar social stereotypes to name a few.
The easiest way to arouse them and bring them to the surface is to use verbal techniques outlined in Subtle Verbal Harassment. Here are the most common ones used on your most common victim - the stereotypical middle aged white male W.A.S.P:
There are two tracks to follow: discomfort with being to young and the more common exclusion for being too old. In some societies, old persons are respected and give a greater social status that younger people. However, most American companies maintain a policy of preemptive ageism. An older person who is still working and is not financially independent or a member of high management is looked down upon as having failed in some manner of another and should just disappear. In the software industry, success if often achieved before the age of thirty so individual still working above that age are considered failures. Packing a department with really young people is a good way to arouse the age guilt trip and send a message that "older" workers (over 35) are not welcome. You can also use embarrassment meetings to realize the age guilt trip by asking the mark their age publicly in front of the whole group. The corporate media helps re-inforces the practice of preemptive ageism. Most news programs and print articles will emphasize the age of the people involved if they are under twenty but never feature anyone over thirty unless they are working in government or education.
For heterosexuals, being perceived of as gay can be extremely frightening and arouse greater anger that can be used to manipulate them. For gays and Lesbians, the fear of the disclose of their sexual orientation can also cause great distress and fear that can be used to manipulate them. Being perceived of as sexually impotent can be used to undercut someone's credibility and effectiveness. Perception of being overly sexually active can used to portray someone as being a "pervert". These are most effective in religious communities.
The fear of being unable to perform ones work due changes in the environment or changes in task assignment. A well crafted tractionless task can be used to realize this fear. Also see, Embarasment Meetings.
Fear of "falling off the planet", that is loosing their job and not being able to get another job; or having to get one that pays less and is less prestigious
In the United States which doesn't have a national health care system, people with long term health care problems are considered a financial burden on business.
Being perceived of a crazy, eccentric or having brain oriented medical problems directly challenge the perception that the individual is capable of performing their work or continuing in their current position.
Within the W.A.S.P. majority in the United States, there are still strong racial stereo-types in popular culture. Members of these racial groups are still confronted with these unpleasant images and perception that people might see them in themselves can cause great anxiety, fear and resentment.
People a gregarious, social animals. The fear of being shunned by family and community is a very powerful fear.
Creating a subliminally abusive environment evolves to two separate steps:
Fortunately, for the first task, the software engineering process is at best poorly defined and in popular culture, the default definition appears to be "just sitting at a computer and typing." Since tech businesses generally have non-existent or crooked business models to begin with, management can create tractionless tasks "on the fly" since their companies do not have to response to legitimate customer or shareholder demands. Even better, some gullible software engineers can even be duped into believing that the reverse process, reverse engineering, is the same as the forward process. Coupled with the genius fallacy, this leaves ample room for scoping out really unpleasant out the door tasks even if they have nothing to do with legitimate software engineering at all. If you can brainwash the mark to buy into the lie that they are responsible for completing any task that you assign them, they will be at your mercy. Best of all, the entire process can be broken creating a whole chain of useless and unproductive tasks. By not coding and releasing a demonstrable working model, everyone else in the development chain afterwards is forced to waste time reverse engineering the broken working model of the product in order to carry out their tasks greatly increasing the effort required and artificially driving up the costs.
For the second task, the goal is to create a hostile environment where targeted individuals in the work area is constantly nervous, distressed and in fear of loosing their job or being humiliated by not being given work to perform. Due to the massive labor over capacity created by the government and the basic fears and guilt trips that are already present, you can use the techniques outlined in the Typical Scenarios will allow management to create an environment where they are subconsciously realized.
When hiring the mark, lie to them and give them the impression that you think their skill set matches you company's needs and that you have a specific position for them and you will accommodate them fully. Then on the first day the mark starts their new job, suddenly inform them that there has been a change and that they will be working for a different boss other than the one that you lead them to believe they would. Have the new boss tell them that they don't have any work for them or that there has been a change in job description and duties. The build up and then sudden drop in expectations is designed to create a deep psychological shook which hopefully will cause the mark to quit. If the mark doesn't quit, scope out a large or ambiguous out the door task. When the mark is not even able to define the task much less complete it, he will be in a constant state of not knowing what to do and feelings of inferiority. Then have your accomplices reinforce this notion. Make sure that everyone else that the mark sees is busy and completing their work. Have your accomplices say things like, "Yeah, we need to hire someone with such and such skills to get you job done". This will reinforce the feeling of inferiority in the mark and will isolate them further.
If the mark wises up to what is going on, give the impression that in the company, "one hand not knowing what the other is doing" as an excuse for reneging on the agreement. Subtle verbal harassment is very useful in this situation. During the hiring setup, the mark was lead to believe that you will provide work for him that he could complete, so give the mark the impression that he is being "out of line" but expecting you, the employer, to act fairly and accommodate him.
Setup the mark during the interview process, to believe that you will accommodate them fully and have a position for which they are fully qualified and that you will always have plenty of work for them to perform. However, once hired, give the mark the perception that all hours worked must be matched to a billable customer account or they won't get paid. Since you lead them to believe that you have plenty of work for them, they will not know what to do when they find out that they are somehow responsible for filling a quota for hours a week and must somehow "invent" his own work. You will be surprised at the number of guillable people who buy into turning captialisim "upside down" like this: workers setting the goals instead of managment. It is also a good cover for a non-existent business model.
Use peer pressure to increase discomfort by making sure that all of your accomplices have legitimate work. You can tell that this method is succeeding and that the mark has bought into the lie, if they become defensive and stressed out on the day that time sheets are due. Use embarrassment meetings or status reports to further embarrass the mark.
This is most effective against a dupe that has never worked at a government subsidized money laundering front company before and have bought into the genius fallacy. People of this ilk don't want to admit that they are not "smart" enough to figure out how to complete the vaguely defined task that you have scoped out for them. It is less effective against someone who has been "through the mill" a few times.
Finally, set the hook in. When the mark finally comes to you and complains that he doesn't have anything to do slam him with some kind of statement like: "Well, Joe, then I don't know what else we can have you do around here." At this point the feeling of betrayal will be complete and you will have the mark should be completely broken and ready to go out the door.
This works the best with a new hire. The mark's former boss, the HR person or company attorney at the mark's previous company will be the point man here. Since the mark probably has distributed his resume to other companies and these other companies have contacted the mark's pervious employer, the previous employer is in a good position to put you in contact with other companies who have the mark's resume. Starting on a Monday, gradually increase the subliminal harassment, and on Thursday, have one of the other companies call the mark and ask him in for an interview. On the final Friday before the weekend, get brutal and bring up the intensity. If you have been successful, the mark will not show up on Monday and probably quit thinking he has more opportunities. At this point call up the other individuals at the other companies and tell them that they can withdraw their offers for interviews. Call up the mark's previous boss and have a good laugh together!
In this scenario, the mark placed in a high velocity seat like a small, stuffy office that's air-conditioning unit is controlled from another office. The mark's work space is kept either too cold or more commonly more hot than the other room(See: Gas Chamber). Since the only way to change the temperature of the mark's environment requires changing the environment of the other room where the thermostat is located, the will create conflict. Since discomfort is somewhat subjective, this creates opportunities to play games with the mark by claiming that it is or is not too cold or too hot. This will put the mark in conflict with the other person. This will entrap the mark in a situation in which he will be induced to be hostile with the people in the other room. In many cases, the environment can be made so inhospitable that the mark will voluntarily quit. If this does work, try having the maintenance people rig the air ducts so that hot or cold air is continuously pumped into the room or area. Adding mold or toxins to the air is also a plus. Remember, the employer has no legal responsibility to make the employee comfortable and can place an employee in any environment even if it is unhealthy.
This works best in large companies and was a favorite for aerospace and defense contractors in the 1960s and 1970s to turn over dupes on scams running on non cost plus contract government deals. Create bogus department wars and have a upper level manager issue a written termination notice for the mark. Have it suddenly delivered to the individual for best effect. The sudden shock of having the fear of loosing the job realized, leaves the mark open to more manipulation. The individual will be forced to go to his boss for an explanation. This gives an opportunity to use further subliminal harassment techniques to distress the mark when the mark is most vulnerable.
Have your accomplices walk by the employee and "throw" facial expressions or disgust, fear or hatred toward the mark. This is intended to intimidate and arouse reciprocal hostile responses in the mark. This give the subliminal impression that something is wrong with the mark. This will bring up deep seated fears and guilt trips. This is especially effective if the mark is a member of an underclass. For example, walk up to the mark and put an expression of fear or disgust on your face. Hopefully, this will cause the mark to react this fear and hostility toward you. Which is what you want. Variation on the above, if you are the mark's manager or boss, every time you see the mark, put a shocked, disgusted or fearful look on your face.
Using The Old Bait and Switch to brainwash a gullible mark into believing that they do not know what they are doing or not qualified to for the job you just interviewed and hired them for, can be very helpful in humiliating them and making the work environment more hostile. The most effective way to do this is to fool the mark into skipping the legitimate software engineering process of using discovery and disclosure and brainwash them into thinking they need to have pre-existing knowledge of a particular domain to complete their assigned task. Fortunately, many university computer science programs don't require courses in mind-reading and remote viewing and many people are not born with clairvoyance skills.
For, example, you hire in a dupe to design a automated loan processing application. Withhold access to the loan officers and agents that are experts in the domain area and try to convince the mark that they are inadequate because they don't possess pre-existing knowledge about how the experts perform their tasks (See: Make Bricks Without Straw). This technique was developed by the jerks in the software consulting wings of the Big Five and is used extensively to launder money and turn-over employees in their partnerships or e-commerce front companies.
Putting targeted individuals in poorly ventilated offices or areas or ergonomically uncomfortable positions can also be effective in creating a subtly hostile environment. Generally, this will mean little or no air circulation, heat and lots of mold and dust laying around. This will cause mild heat-stroke and increased allergies. Make sure the monitor is either much higher or lower that eye level and at an oblique angle to the front of the desk. This will stress the neck since they have to constantly move their head up and down or keep it turned to the right or left when seated at the desk. If possible set the monitor refresh rate down to where it is just perceptible - this will cause headaches. Only provide chairs without lumbar support, this will increase stress on the back. Use cheap computers, monitors, keyboardsand mice that are not designed to be ergonomically safe. Very slow computers and network connections that crash frequently will also increase frustration. Wise employers should always keep a few of these high velocity seats open and available just in case it becomes necessary to move someone into one right away. Inspired by the gas chambers used by the Nazis to kill many underclass members.
Hold closed door meetings from which the mark is excluded. This will play on their paranoia that they are the topic of the meeting. Then after the meeting pull the mark into your office with a stern look on your face like he is about to be fired or disciplined. If you can see fear or nervousness in his face then you have succeeded in manipulating him. Variation: invite the mark into the meeting, but then ask him to leave for the remainder.
This technique can also be useful when "crashing" candidates during the administration of a preemployment screening tests. Have your victims take the test in a office where your accomplices can make loud noises by banging on the roof or walls of adjacent offices. This will upset and intimidate the test taker and hopefully facilitate them to break off the interview and leave.
Be careful when assigning a task like this. You are dead if the mark knows what they are doing and asks you for a demo first. If they do that they will have you on the defensive because you have a non-product and no working model to demonstrate. They can reject the task claiming that they would have to have detailed design documents or build the product up from scratch.
Here is an explanation of why they can do this:
The explicit definition and creation of the demonstrable unit in the legitimate software engineering process make this impossible since you are transferring the demonstrability between steps. The underlying processes in the model must be transparent; meaning, that during turn over between steps in the legitimate development process, the input data, output data, underlying processes, objects, interactions and interface operation are understood in the context of the working model when it is being demonstrated. You will seldom find the broken working model from a company with a legitimate business model.
This is very similar to situations when you are talking to a potential customer about vaporware and they ask the dreaded question: Can you give me a demo? There is no simple way out of the situation . Try butzing them; however, if jargon and bogus intellectualization doesn't work; tell them that you need to talk to some else for the explanation. Leave the room then come back and tell the that the individual you need to talk to is not available and you will get back to them.
The lesson here is that if the company markets an enterprise type of software product, make sure that there is never a working model or demonstrable prototype generally available; none of the basic functionality should ever be demonstrable. There are several reasons to do this:
You can also use this as an opportunity to ambush the mark with other forms of public humiliation with guilt trips. These meetings ofter you the element of surprise. For example, you can use meetings to realize the age guilt trip by asking the mark their age in front of the entire group. Gays and Lesbians are good target for the sexuality guilt trip at such times. For example, ask them about their marital status. In both cases, have your accomplices snicker, laugh or cough when they answer. The more you expose your victims to these kinds of public humiliations infront of their peers, the less likely they are to stick around.
The type of suggestive and irritating messages to be vectored onto the background will depend on the profile of your victim, e.g. sexual orientation, psychological weaknesses, patterns of drug or alcohol use and etc. The company lawyer, security department, local law enforcement or outside security consultants will be able to set this up for you.
In the future this technology will be expanded to subliminal visual images displayed on computer monitors, cell phones and TV screens to manipute a much larger group of people.
Never let the mark finish a sentence. When he starts to talk, interrupt him before his second or third word. This may take some practice. But, pretty soon the mark will give up and be frustrated or outburst of anger toward you, which is a good result.
Draw the mark into a conversation about a subject that you know makes them anxious. During the conversation, make the mark repeat themselves by pretending not to understanding of what they are saying.
The following is a list of short phrases which can be directed to the mark to intimidate or "prick" the above mentioned guilt trips. These should be targeted at the mark when under stress when they are more vulnerable:
This is the other half of the job. Now that the person has been harassed out of their previous job, it is now your job to humiliate the mark who has now come to you looking for a job. You will be re-inforcing all of the ugly experiences to really put the message to the mark that they are not welcome in industry anymore. Your goal is to make the interviewing experience so embarrassing and hostile that they will not want to repeat the experience. Since all of your real employees will be immigrants on visas or recent college graduates who where recruited just out of the major universities., your victims will be people of no consequence - nobodies who sent you blind resumes as a result or newspaper ads, online research or bulletin boards.
Although the techniques in this section are designed to be used onsite in one-on-one interviews you can also apply them to other situations such as job fairs where you are trying to discourage a large number of job seekers at one time.
Remember, you are not interviewing this individual because you are seriously interested in giving them a job: you are merely confirming your preconceived notion that they are not qualified so you can be justified in hiring a cheap visa worker and discouraging them from continuing further job search. (The exception to this rule might be if you think they are attractive and you are hiring them so you can have sex with them. When hiring non essential personal, think of it as if you are hiring a sexual partner. Don't even consider hiring them if you would'nt mind having sex with the every night for the rest of your life.)
You might consider giving them a preemployment screening test to humiliate them before the formal interview begins.
Once the mark has filled out the application and check the box that says its OK for you to contact the previous employee, give a call to the human resources person, company attorney or former boss at the mark's previous employer. Ask them about age, religious affiliations, quirks, fears, sexual orientation, partner preference, drug or alcohol use or what indiscretions the mark is guilty of and the most effective harassment techniques to use on them. Remember, there are no legal restrictions on what information the previous employer can give you. Human resources personal have special legal immunity from civil and criminal prosecution for passing deliberately false, damaging information about previous employees to potential employers. Even if they knowingly give you a bad review that is later proved to be false, there is no legal liability on your or the previous employer's part. Human resources personal can deliberately pass damaging false information about an former employee to a potential employer under the cover of alleging that the former employee engaged in criminal conduct (e.g hacking, theft or corporate espionage) without any proof.
If possible, contact the department of the college or university that the individual graduated from. The computer science departments of most colleges and universities are essentially just divisions of local corporate interests and the form of government racketeering being practiced in that area. Try to get a hold of the department jerk or spook who are willing to put you into contact with previous employers who have grievances against this individual or give you more useful information to use against this perspective employee.
In some rare cases, one of the former employers of the mark or a Federal law enforcement agency will ask for your help to find out:
If is not apparent how old the mark is check their age. Although, it is illegal to directly ask them how old they are, there are several loopholes:
During the interview process, send in younger people to interview the perspective new employee. They will see a bunch of "younger" people and be intimidated and this will trigger the age guilt trip. Since all the people in authority seem to be "very young", they will hopefully get the message that "older" workers are not welcome.
Concentrate on why the mark left his previous job, since he was humiliated out of the previous one, forcing them to confront the issue again during the interview will increase the discomfort of the experience.
Based on their resume, find out what their language of exclusion is and query them extensively about it concentrating on the more esoteric and obscure aspects. The official propaganda fed to the politicians and supported by the universities is that softwares engineers should be generalists who can pick up new skills on the job, so you need to double-cross them by demanding previous experience in specific skills. Therefore, the trick here is to be able to gloss over the fact that they could be re-trained or pick up the new skillls with a little self study pretty quickly. You could do this but you just don't want to.
In a similar manner you can use their previous experience in creating documentation as an excuse to exclude a individual. In the defense sector of the economy, a lot of defense related tax payer rip-off involves the processing bogus customer bug reports or creation of bogus documentation to skim or launder money. This is most common in the tax payer subsidized boondoggle "think tank" eugenics wings of the big defense contractors. In many cases, this is the only activity of a government boondoggle. Contrast this with legitimate companies where there often is no "formal" documenation standards- the type and form of documentation will vary widely - only enough documentation is created to get the job done. During the interview ask them if they have ever "done documentation" (translation: money laundering or skimming). Try to convince them that because they have never done documentation like your organization does it, they are not qualified to have the job. Surprisingly, a lot of weak minded dupes can be convinced that they could not pick up the new documentation skills even though they have obviously done so in the past.
Use the techniques outlined in Subtle Verbal Harassment. Increase the humiliation with verbal repetition asking about things outside their area of expertise. Make them repeat themselves by asking the same questions in slightly different forms over and over during the interview especially if you find subject that make them anxious. Keep going at them until they finally break down. Alternate, between verbal repetition and steam roller for maximum effect.
Ask them why they are doing so much job hopping even if their resume indicates steady employment.
As you are reading through their resume, laugh or giggle periodically. This is intended to make them think you are laughing at their accomplishments or qualifications.
If your department or company is Federally protected DOJ, C.I.A. or D.O.D. money laundering front and you have any visa workers on salary for intelligence purposes, bring them in to intimidate the individual. Seeing immigrants getting big salaries while they are still out "pounding the pavement" hopefully will increase the level of frustration in native workers.
It is during this period that you will be sizing up the mark in the event you decide to take on the challenge of bringing them in and using subliminal harassment on them.
Review the topics outlined in the Introduction to this document, during the interview ask yourself the following questions:
If you decide to pass on the individual, jerk them around as much as possible before you send them on their way. Pass them around managers and executives who have been trained in the techniques outlined in this document. The goal is to make the memories of the interview as unpleasant and embarrassing as possible and make them fearful of repeating the process.
If you decide to take them on, then you need to make a decision about salary. If you are planning to move them out quickly, then give them a fairly large increase in salary. This has two benefits because it:
If you plan to be harassing them for a somewhat longer period then give them less of a boost or even a cut in salary since it saves a little money and they are desperate for job and at your mercy.
If you are just going to blow them off, you might try one of the techniques used extensively by defense contractor jerks: the "D.O.D. goodbye": You escort them to the door keeping a indignant look on your face and show them out without any cordial salutation. Abruptly showing them the door and sending them on their way with little or no comment can often cause psychological hostility. An added touch is to have company security standing around looking intimidating.
In any event, build up their expectations up by making them believe that you are seriously interested in their career and that you have interesting fofilling work that they are ideally suited for. All of this, of course, is a lie. You are just setting them up for the harassment scenarios outlined in the beginning of this document.
If all else fails and the employee is still sticking around, the final solution is to use a combination of effort by the employer and local law enforcement to criminalize the employee by their concerted action. The company lawyer or attorney can help here. Most lawyers have worked with the county or state attorney generals offices and local law enforcement. Given the word from a powerful company, they can put the machinery into motion to have the mark setup-up, framed for a crime or otherwise rat fucked. This is especially effective if they are gay or a recreational drug user since most law enforcement agencies target them anyway. The public humiliation, costs of defense and time involved including time in jail make it extremely unlikely that the mark will be able to continue in your employment.
However, there a several gave threats to creative accounting and corporate welfare:
401K: financial instrument that allows a company to pretend to pay its employees but actually keep the money or give it to the insiders on Wall Street if the stock market crashes.
aggressive: fraudulent. For example, aggressive accounting or aggressive hiring.
baby boomers: people born in the rapid expansion of the U.S. population after WWII-generally, between the years of 1945 and 1964. These individuals are now approaching retirement.
Big Five (Accounting Firms): the five largest corporate accounting conglomerates in the U.S. which each have large "puppet" software consulting wings. Since Federal and state governments have contracts with them, the jerks that run these companies actually control the politicians and set government policy. They are often directed by Wall Street insiders and depend on accountants and lawyers to drive the process of creating new and innovative technology rather than legitimate R&D. They pioneered the concept of the corporation as abstract accounting entity that paved the way for the tech boom and Dot Com debacle.
billable seat: a position in a company that is used as an creative accounting trick to funnel money in from a customer account into the organization. Tasks assigned to individuals in these types of seats are scoped for failure or designed to have as little traction as possible to make them tedious and frustrating. Since the work performed in these positions is not essential for the actual operation of the company and workers are easily replaceable, they are generally high velocity seats with the individuals occupying them the targets of subliminal harassment or victims of jerk farm type of corporate training mills.
body-shop: a bogus consultancy company setup in a foriegn country like India or China that uses loopholes in the L1 inter-company transfer program to import cheap IT workers into the U.S. and then "farms" them out to American companies displacing American workers.
billable: adjective that generally describes an individual whose work within the organization that is not part of any legitimate revenue stream but used to fill slots for tax purposes or launder money with tax payer subsidized scams such as fix and shuffle.(See: dupe) This type of person is generally being subjected to the techniques outlined in this document to make their work environment hostile.
boondoggle or "pork barrel": a valueless project funded by the government solely as a political favor to enrich the special interests that actually run the Federal government with the added side effect of proping up the tax base(See: Giveaways). Often referred to as "pork barrel" spending. Federal front companies formed in the 1960s would have names like Boondoggle Aerospace scamming money out of the government for bogus radar/sonar systems and aircraft that never fly. In the 1980s it would have been Boondoggle Software scamming money off the government for bogus military wireless and logistics systems. In the future as the new economy tech government sponsored corporate scams loose their political appeal, you will see the void filled by Federal boonedoggles with names like:
Modern versions of the old "cold war" boondoggles are now showing up as the "government" divisions of wireless, telecom, software and Internet companies. You will see bogus ads for jobs given to returning service men at these types of setups after each successive middle east war(See:Washington Eugenics). Likewise, the new Department of Homeland Security will provide new opportunities for the "good old boys" to profit from new Federal spending in the aftermath of "911".
bug: a variation of a previously defined working model that deviates form the definition of the demonstrable unit defined during the software engineering process.
business model: logical or accounting organization of a business or company based on how money or revenue enters, flows through and leaves an organization. Legitimate business models provide services, physical products or add value to existing products or services. Examples of illegitimate business models are:
butz or butzing: from Professor Butz - Rube Goldbergs intellectual alter ego that found the most absurdly complicated ways to accomplish the most simple tasks. The verb "butzing" refers to using jargon and bogus intellectualization as a "smoke screen" to cover for the lack of a demonstatable prototype when discussing a broken working model or vaporware. As a general rule, you can make any simple problem difficult by intellectualizing it and using lots of jargon as a "smoke screen". Object oriented programing jargon from proprietary software vendor products (like Java and UML) are often very effective at doing this.
capitalism(American): finding clever ways to rip-off the U.S. government, become wealthy at tax payer expense and then pretend that you did it all by yourself. Later, as an added bonus, you can out source your company off shore to make even more money by dumping American workers.
Central Intelligence Agency: the U.S. government agency responsible for intelligence gathering outside the United States. They have lots of money, little or no oversight and no transparency. Aerospace companies and divisions of large multi-national corporations are often fronts for C.I.A operations. It is ironic, that to fight communism, the U.S. actually setup a form of American socialism with a system of government run companies.
cheap help: corporate cost cutting technique that involves the practice of keeping labor in the lowest paying tier. This is done by creating high rates of turnover that effectively keeps workers from advancing to the higher paying levels.
clinton jobs or gentile jobs: bogus jobs used to prop up the tax base that were created during the Clinton presidency and represented most of the job growth in the US during the 1990s and the IT build up. They all disappeared with the dot-com crash in 2000 leaving millions of American workers, who were stupid enough followed Clinton's advice and get technical degrees, destitute and unemployed. Thanks, Bill!
computer generalist: mythological job description prompted by Microsoft chairman Bill Gates and others during the early part of the IT build out in the mid to late 1980s which was supplanted by the math and science myth circa 1995. In its simplest form, this lie maintains that ideal employees were "generalist" who could quickly pick up new skills or be retrained on the fly. However, by the mid-1990s the domestic American labor market had become super saturated with expensive aging native born workers with CS and EE degrees, so a new myth for the politicans had to be invented to discriminate against them. Therefore, the new buzz work became shortage of math and science skills although studies by all the major thinks tanks showed that no such shortage of scientists existed either.
conditioned response: a physiological response to outside stimulus programmed into an animal or human by associating a external stimulus with some experience that generates the response. The pioneering work done by Pavlov and his dogs is an example. By associating the ringing of a bell with feeding, he was able to make his dogs salivate even though no food was present.
corporate block grant: the successor to defense contracts of the 1960s and 1970s used as form of corporate welfare involving Federal government handouts to corporations and used by politicians to funnel money into the coffers of their political supporters and to fund "pork barrel" or boondoggle projects. Since these corporations need officers and boards of directors, these type of grants are used to employ women and minorities in bogus front companies that are actually run by "good old boy" executives and lawyer lobbist types from the established companies.They are perfect for laundering and skimming money from government sources or setting up partnerships. During the Dot Com boom, politicians used these grants to fund startups for their supporter's "pet" projects or immigrant visa mills for their favorite nationality.
corporate welfare or American socialism: Federalization of the economy through direct government subsidies given to corporations and industries through a complicated network of lobbyists and Federal front companies. By the beginning of the 21st century, the boundary between civil political governance and corporate governance had completely disappeared. The executives that represent the special interest that actually run the government, just spend their careers jumping between goverment jobs and corprate jobs. Historically, this was done by allocating lucrative defense contracts for bogus military systems but with the end of the Cold War it was replaced with corporate block grants in the tech, software, telecom and Internet boondoggles. A popular modern version of the old boondoggles used to employ returning veterens from the middle eastern wars are the "government" divisions of wireless, telecom and software companies. You see ads for these positions targeted tword military people at the ends of these conficts.
cost plus contract:in the golden era of aerospace, the government would set aside a chuck of cash and companies were allowed to bill the government for additional costs to fofill the contract. The alternative (see billable) put in place in the 1970s after the space race concluded, is to force employees to match hours worked against a billable account - essentially pulling work out of nowhere. This effectively turns salaried worker into wage workers for accounting purposes. Most often used with the Time Sheet Harassment turn-over technique.
creative accounting: the use of stock options and intricate tax deals to hide debt, sham transactions and software licensing scams to inflate publicly reported profits and mask money laundering and skimming operations through off the book partnerships and startups. It thrives in the U.S. economy due to the deliberate lack of transparency in corporate and government accounting and cold war era defense and intelligence boondoggle spending.
curn and burn: polite term of the management style used in companies to maintain a high turn-over usually to dump workers after mergers or acquisitions.
dead pool or death/concentration camp: a small company or division of larger company where problem employees or older workers are dumped. Often this is the last stop for workers who are being harassed out of the labor pool(See: Jobless Recovery). High turnover tactics like those outlined in this document are used to create a hostile work environment. When locked into this type of environment and with no ability to get out, workers will often behave in a hostile manner tword each other(See: herd mentality). These were developmed as part of Washington corporate government eugenics policies of the cold war era. The American tax payer now subsidizes this practice through its de facto successor the tech and e-commerce boondoggles.
death row: a row of cubicles or section of an office where people who are being turned-over or being disciplined are placed. The area should be carefully chosen so that the various techniques discussed in this document and be implemented easily. Very often this area will be covered by some form of electronic surveillance and activities recorded for later review. Send out your accomplices to practice the various technique outlined in this document on the individuals you have placed here. Afterwards, you can review the video tapes, critique their performance and give them tips and helpful feedback. Very useful for setting up a jerk farm for training a new generation of corporate jerks.
desperate labor shortage: myth created by Washington tech lobbyists and software executives to justify perjury before Congressional hearings in which they gave false testimony that there is a desperate shortage of workers with programming and software engineering (after 1995: math and science) or rare worker skills. Used as an excuse to flood the American labor market with cheap visa workers under the pretext that native workers are poorly educated and motivated. This served four purposes, it:
Department of Defense (D.O.D): the government agency responsible for financing, maintaining the military and intelligence capabilities of the United State of America. People in this organization are fofilling and important role in maintaining a freedom and democracy worldwide. But they have an unlimited budget, little or no oversight or accounting transparency and love to spend tax payers money often inventing threats when none exists to keep busy. The D.0.D. also represents the closed system eugenics wing of the colonial American social system creating a safe reproductive environment for government approved genenomes.
Dot Com (Internet Bubble): an expansion of the Silicon Valley startup model to the general economy as a result of commercialization of the Internet and the expansion of the Federal R&D Tax Credit, government subsidies, tax incentives, legal exceptions, corporate block grants and educational grants during the 1990s. This was done by gullible politicians and individuals at all levels of government with the delusion that a wider, national expansion of the Silicon Valley startup model would create new jobs and wealth. The frenzy to join in on the expanding scam had the side effect of giving insiders who owned large blocks of telecom and technology stocks, an opportunity to feed the media hype and drive up stock prices and then pump and dump them at huge profits before the bubble burst wiping out retirement funds and leaving the innocent tax payer, investor and retiree with reduced services and higher taxs in the years to come. In fact, all of the so called new economy jobs and wealth generated during this time just disappeared.
drive by capitalism:
term used to describe the dot-com era phenomenon of creating bogus companies
and then "blowing them out".
dupe: a individual who is unaware that
they are being used solely as an excuse to bring revenue into the organization
and to prop up the tax base. The universities
make money off them when they get their degree, then the companies make
money off them by using them in billable slots for
three or four jobs after which they are locked out and never work in industry
again. At the same time these individuals are being kited
around, visa workers are doing the actual work -
in preparation for out sourcing the jobs at a
later date. In the golden era of aerospace racketeering,
entire divisions of boondoggle companies
of dupes would be kept on staff and then laid off to blackmail politicians
into funding lucrative defense contracts. e-commerce or e-business-to-business company
or Internet division: front company or division of a large
national or multi-national company used for money laundering and skimming
operations with strategic partners often setup
by one of the Big Five consulting companies. Many
traditional brick and mortar companies setup e-commerce divisions or departments
during the height of the Dot Com hysteria as a place to dump all of their problem employees
- substance abusers, mentally ill or just physically ugly people - and
run side businesses running the startup scam.
ethnocentrism: the view that
ones own culture is inherently superior to that of all other cultures
and societies. fight or flight response: the physiological
state of distress and panic that results for stress in the environment.
The typical subjective sensations are accelerated heart rate, sweating,
dilation of the eyes, release of adrenaline and a general feeling of panic
and fear. In closed offices or areas of poor ventilation, pheromones released
by the sweat glands can caused the effect to spread from individual to
individual and room to room. When this is triggered in primates like humans,
very often the reaction is to become hostile toward individuals perceived
as vulnerable within the group(See: herd mentality).
generation X: term coined by Douglas
Copeland's his book "Generation X" which describes Americans born between
1964 and 1980. This individuals are now approaching middle age. genius fallacy: the mis-guided
notion that if person is "smart enough" and motivated enough, any task
they are assigned is completable. It does not take into account artificially
contrived situations in which the employee is being setup for failure.
Any tractionless task can be scoped out so that it appears to be a legitimate
task but the problem is so vaguely defined or a solution is not possible
or the tools to carry out the task are withheld. People who subscribe to
this philosophy are good targets for subliminal
harassment, since they have subconsciously absolved management of all
responsibility for determining employee skill sets and assigning
employees appropriate, legitimate work or re-training them with new skill sets. goon: in organizations like the mafia,
the military, certain religious groups or defense contractors, an individual
who is employed to intimidate, harass or physically harm targeted individuals
who pose a threat to the organization or the industry status quo. government ripoff save zone:
these are areas of the United States like Washington, DC, Orange County, CA,
San Diego, CA, the Bay Area of California, Arliington, VA and Charlotte, NC where
there is an established corporate political machine to aid and
abet in organized goverment racketeering and ripoff.
headhunter : these are the vampires
of the IT and software world and in many respects similar to lawyers in
their ethical behavior. They are basically freelance spies for employers
who will screw you under if you are not a hot IT commodity. You will find
these organizations masquerading as legitimate companies in newspaper ads
and on job hunting websites. Rest assured that if one of these leeches
gets a hold of your resume from an online service, the first call they make
will be to your boss. When doing job search, keep lots of garlic, wooden
stakes and crosses with you because these unfortunate individuals are out
there. There are no laws governing this profession and corporate recruiting
is unregulated. These guys can destroy careers. herd mentality: the property
of herding animals to behave as a group especially in targeting weaker
members of their herd for sacrifice when a predator is near by.In the office
environment this phenomena can be observed in humans, when individuals
are being tarred with subliminal harassment
to be driven out of the company, the other individuals in the office will
sense that the mark is being harassed and will either
willfully or subconsciously engage in the process and be relieved when
the mark finally quits. By helping dump the mark, others will feel more secure because while someone
else is being the target, they themselves cannot be a target and they
feel more secure. Herds of wild animals when being chased by a predator
will often pick the weakest member of the heard and try to feed it to
the predators to save the rest of the herd. Pheromones
enhanced in a closed space can trigger hysteria
and hostility toward the mark. For some reason, groups
of individuals who are driving individuals out of their group seem to
collectively think that the targeted individual has a responsibility
to leave just because the others want them to leave. If the individual is
stubborn and refuses to leave voluntarily, the group will often perceive
that the targeted individual is acting in a hostile manner towards them
simply because they won't take the hint and go. This can be used to provoke
the targeted individual into reciprocal hostility towards the group even
if it did not exist previously. See: Dead Pool
high velocity seat: a physical
location such as a cubicle, office or desk that is located in a part of
the building that has a hostile physical environment. Individuals are placed
in these locations to facilitate the person who is occupying it departure
from the company as quickly as possible(See: Gas Chamber). The work performed is generally
irrelevant
idiot savant: an individual that possess exceptional skills in narrow areas such as music or math but major deficits in other areas. Due to government eugenics policies and because they often show high IQs on paper tests, defense companies often have entire departments staff with these types of people under the mis-guided notion that helping mentally deficient people reproduce is beneficial to American society. These were the autistic nerds or mentally abnormal people who in the 1970s and 1980s hid out in the school computer room; and through a unfortunate quirk of fate ended up in positions of authority in the DotCom era. They often double as company jerks and are ussually supporting antiquated 30 year old technology like UML, C++, Java, Wireless Systems and M68000 processors at tax payer expense.
jerk: an individual, idiot savant, corporate goon or line manager type of person who uses intimidation, harassment to manipulate, psychologically molest and control workers, subordinates or customers; however, their primary job is to turn-over employees. Besides throwing fits, they often accomplish this by using psychological rape or other techniques to build up the mark's expectations and then "crash" them. Generally, they put forth a image of the kind of people you want to avoid. The jerk is the "front soldier" for corporate America. The store managaer, department head, snobby receptionist, the company bureaucrat, claim adjuster, account manager, these are the human "obstacles" that are used to slow you down and discourage you from getting what ever it is you want from corporate America. They also maintain the status quo and "lock out" members of underclasses from the main stream economy. They are as important as the "brain trust" and there is always demand for them at all levels of the private and public sector. The term may have originated from the retarded, jerky body language of mentally abnormal individuals that they use (sometimes subconsciously) to intimidate, molest, frighten, harasses or disgust others. Individual who are autistic, schizophrenic, neurotic, psychopathic, pathological liars, alcoholic, drug addicts or have other behavioral abnormalities are often unpleasant or intimidating to be around and are ideally suited for these positions. These types of mental fuck cases are most useful in dead pools where problem workers can be dumped. The "mother of all" jerk farms is the military which trains it members to harass, exclude and discriminate against members of many under classes - all at tax payer's expense. These people enter the civilian corporate management through many D.O.D. to civilian feeder systems.
However, jerks in the software world often come from the computer room rather that the military. In the 1970s and 1980s, the mentally abnormal individuals described above were often sent to the computer room in high school to keep busy since idiot savant types seem to respond to computers. Therefore, a lot of mental fuck cases found there way into the corporate structure where, though a unfortunate quirk of fate, were put in charge of making decisions for a large segment of the economy. (See: DotCom) The emergence of the IT departments managed by private corporations in state and Federal government has lead to unelected bureaucrats with mental problems actually running the government - the gullible politicians merely "rubber stamp" their decisions on public policy.
hysteria: a contagious mental condition which manifests itself with delirium, rage, incoherence and other forms of irrational behavior.
job hopping: moving from job to job in an attempt to build up work experience in whatever new language of exclusion is currently being used to discriminate against workers. Although, the people doing the hopping think they are doing it voluntarily they are more likely being kited from job to job.
jobless recovery(structural unemployment): generational dumping of workers by the government and big business in which large segments of the American workforce become unemployed during a down-turn in the economy but are not hired back into their former profession when the recovery is complete. This is also referred to as structural unemployment. It it implemented by demographic shifting - moving older workers into positions or companies that are eliminated completely and back filled by immigrants on visas or outsourcing to foriegn countires. After periods of expansion in the economy and after corporations have made lots of money and the government sponsored scams and giveaway programs have lost their appeal, workers are fired and layed-off in large numbers to kick off the recession or put it in high gear. Since the beginning of the era of government give-aways and corporate welfare, this has occurred twice:
kick back: an illegal, secret payment made in return for a referral or favor which resulted in a transaction or contract. Used extensively, in the software, defense, casino gaming, healthcare and mortgage/real estate industry to repay favors related to kiting employees between companies.
kiting: similar to kiting checks in banking and used in bogus startups. This involves hiring and then turning over an employee as quickly as possible so that it appears that the individual is moving quickly from job to job but not staying anywhere too long. This is used to effectively destroy their careers by making sure that they are never given real responsibility or legitimate training in newer technologies. HR can spot an individual being kited because there will be many jobs of short duration and periods of unemployment on the resume. The politically correct term to cover up the practice is job hopping. This technique was perfected by corporate governance during the 1950 and 1960s when defense spending was used to prop up the tax base for the WW2 baby boom genteration.
know your customer: banking policy in the U.S. implemented by the F.D.I.C to comply with international laws designed to detect illegal money transfers ( money laundering) and the identification of tax evasion attempts. Under KYC regulations, every financial transaction will be monitored, and all banking activity will require identification. Anyone who will not provide identification will not be allowed access to banking services and the institution must make a suspicious transaction report. It is interesting to note that tech scams and bogus startups rely heavily on the R&D Tax Credits so the U.S. government is actually subsidizing the money laundering that it implemented the KYC rules to stop. Since many other nations including nations hostile to the U.S. have intelligence gathering tech front companies inside the U.S., this makes the U.S. the only nation whose tax policy, loose immigration policies and accounting standards are used to deliberately give sensitive personal information about native Americans to foreign intelligence services and to subsidize the intelligence gathering and terrorist operations of it's enemies. Note: Tax payer subsidized US governemnt money laundering front companies are exempt from these laws.
L1 Visa: intra-company visa transfer program similar to the H 1B Visa program. Used more within companies that have divisions in different countries. Corporate America has setup "body shops" using companies based in places like India, to use the L1 loophole to import cheap IT workers and then "farming" them out to American companies at greatly reduced wages effectively crowding out native American workers.
fuddlabor arbitrage:
the corporate practice of using progressively cheaper labor to increase profitability.
This is most often done my moving production of tangible items into dirt cheap third world countries.
The difference between the labor costs between US based operation and foreign operations can be booked
as revenue using the same capital and technology that formally employed workers in the US.
Another form of arbitrage, is the use of the corporate slot system to keep most routine
work at the lowest level tier and reduce costs by maintaining high language of exclusion:
a new computer programming language introduced by one of the big software
monopolies and used by the big defense companies to discriminate against
programmers already working in industry. The first was C++ which replaced
ANSI C which was the standard for over 15 years before 1990. The second
was Sun's Java which was released in 1995. Currently, Microsoft C#/.NET
is the new language of exclusion. This works because for two reasons: As the big software monopolies fade, look for discrimination based on
different criteria. For example, platform: look for words in ads like
"wireless", "embedded", or "M8600" and etc. as an excuse to exclude workers
from consideration.
legal telepathy: the method
used by lawyers to communicate information about clients and cases to
other lawyers or outside parties like companies circumventing attorney
client privilege. In most cases it involves a lawyer "tipping off" and employer
when a disgruntled employee consults them about workplace harassment.
mark: a victim who is hired and then targeted
for subliminal or overt harassment
to be quickly driven from the company. These individuals of are oftem used as
dupes to fill billable slots to prop
up the tax base in money laundering and
skimming operations of government sponsored corporate
scams or to "pad" out the front of startup or
ecommerce scams. It is best not to think of them as
human beings since you are destroying their lives. From the slang term for the target
of a "sting" or confidence scam. math and science labor shortage myth: myth created after 1995 to supplant desperate labor shortage myth of computer generalist. It began to appear in perjured testimony of corporate executives and lobbyists about 1995 at the same time the profitable digital divide myth was invented.
money laundering: the covert
movement of funds circumventing the scrutiny of conventional banking
system and its auditors under strict Know
Your Customer Rules. It is the third largest industry worldwide
and has been historically this has been associated with money obtained
from illegal sources such as drugs; however, large corporations and government
agencies often use partnerships and software license scams to distribute
funds to avoid oversight by regulators and foreign governments, hide profits
or loses from investors or the IRS or as cover to keep D.O.D.
projects in the "black" and fund covert operations aboard. mooning: the act of bending over to
expose the buttocks to cause sexual arousal. Generally used with male
homosexuals. For heterosexual males or Lesbians, a variation used the
female breast showing cleavage as well as the buttocks. napkin: a powerful design tool
that does NOT require 128MB of memory, 20G hard disk space, a Pentium
II or higher processor and an ungodly grotesquely wasteful high license fee paid
to a bunch of greedy, brain-dead, has-been Silicon Valley crooks.
Doodles and designs scribbled onto napkins has lead to the invention or
development of more than a few important gadgets and concepts including:
the transistor,the PC, the DNA double helix, the integrated circuit, the FAT file system,
the El Torrito standard and television to name a few. It does, however, require a few other "peripherals"
to function: open intelligent conversation and collaboration, and often, caffeine,
good food and sweets to facilitate intelligent thinking. Difficult to give
people in government boondoggles busy work with this tool.
To do that, use UML.
NASA(National Aeronautics and Space Administration:
a tax payer subsidized eugenics program to facilitate
the reproduction of people of European desent in the Texas area. It's mission is
to help frogs and spiders colonize outer space.
nervous vocal edge: a human
voice that sound anxious or frightened with a high frequency "edge"
to it can create a reciprocal response in the hearer. With practice this
can be used to trigger the fight or flight response
in individuals or groups. new economy or Clintonomics:
a mythological segment of the economy separate from defense and the other traditional
brick and mortar types of industries that experts predicted was non-cyclical
and would provide thousands of new long-term high paying jobs every year
for decades to come.
However, it turned out to be an social delusion invented
by the media, Sillicon Valley and Wall Street insiders characterized by expansion of the
Silicon Valley startup scam, pump and dump stock scams and general expansion
of the type of government subsidized money
laundering and eugenics giveaway policies that were formally
only found in the defense industry. As
you can see there was nothing new in the new economy just the same
old government scams with new names. All of the paper wealth and bogus
short term jobs it produced "just disappeared" leaving hundreds of thousands
careerless. It's proponents exaggerated
changes in the American economy, overestimated the benefits of technology,
and abandoned careful analysis in favor of blissed-out utopianism while
insiders cynically made millions off the public's delusion. The web sites
of e-commerce companies running various types of
money laundering and skimming operations use this term copiously. out source: the process of moving
high paying jobs to third world countries where the labor costs are significantly
less. out-the-door task: a tractionless task whose unit of work is deliberately
designed to be menial, tedious and unpleasant inorder to create a hostile
work environment designed to facilitate the individual's departure from
the company. Individuals targeted for these kinds of tasks are generally
placed in high velocity seats. oxymoron: contradiction of terms.
Classic examples are "military intelligence" and "computer science".
The former because many individuals cannot find intelligence in the military
and the latter because there is no real science in "computer
science" as practiced in the software industry. A true science requires
repeatability, independent verification and full disclosure -
three things would mean a lot less work for software engineers and destroy
the big proprietary software monopolies running software licensing scams that depend
on the broken working model and bogus intellectual property rights
for their business model to work. Additionally, a true
science pits the intellect of the scientist against the inscrutability
of nature that make no conscious attempt to hide information from
them or give them bogus work to keep them busy. partnerships: the companies
and individuals that a bogus front company engages in money laundering or skimming
operations with usually in the form of sham
transactions or software licensing
scams. The ones listed on official company documents are the legitimate
parts of the front used to mask the secret partnerships that are not
disclosed to regulators. If you go to the website of any of the so-called
new economy companies, there is usually a link
to a page listing them. Pantomime horse: a slot or
position in an organization used sole to employ individuals such as the
kids or in-laws of executives, lobbyists or other individuals who the organization
my find useful to keep on payroll but cannot find a legitimate position
for and cannot perform useful work. From the the Monty Python sketch of
the same name. These individuals are generally not targets of subliminal harassment. peer pressure: subtle social
pressure (generally non-verbal) exerted by members of a group to make
individual members conform by arousing fear within the non-conforming individual
that if they don't conform their behavior to what the group perceives
it should be, they will be ostracized from the group. For example, in
an office where the management coerces individual to work late hours without
extra pay, individuals leaving early might get dirty
looks from other member of the department when leaving the office.
Another example, would be keeping everyone in a department busy with work
but withholding work from specific individuals. pheromones: airborne hormones
or chemical messengers responsible for triggering feelings of hysteria, sudden fear or panic often in a closed poorly
ventilated space such as an office. They are similar to blood borne
hormones such as adrenalin; however, these chemical messengers move
through the air and effect large groups of people even creating a "chain
reaction". It is believed that they are responsible for group behavior
such as mob violence in riots and hysteria. See
Herd Mentality. protected class: any group
of underclass people designated as such by Federal
and state civil rights legislation. Currently includes ethic minorities,
women, religious groups, the handicapped, gays and Lesbians. professional services organization or software consulting:
a business organization that does not provide a distinct product or service
but provides services to other companies. They offer office space and
personal to projects out-sourced to them from
other companies. Basically a bunch of rich "old boy" lawyer accountant
types playing with people and bank accounts. These organizations are the
perfect cover for smuggling, money laundering,
skimming, e-commerce and
other illegitimate operations where legitimate activities and creative accounting and software license scams can be used to
mask illegitimate ones. The Big Five accounting
firms and their "consulting wings" driven by Wall Street insiders
often engage in this type of racketeering.
programmer as celebrity :
the phenomenon of the Dot Com era to treat
computer programmers as celebrities. Every generation has one educated
class that it venerates. As a result, the government will often create
incentives to encourage people to enter these professions and import them
with visa programs. The universities
are happy to help by turning them out in large numbers. Inevitably, Washington
corporate governance will use these professions to prop up the tax base
and create bogus jobs for government eugenics purposes.
During the Second World War it was mathematicians and code breakers. During
the space race of the 1950s and 1960s, it was the "rocket scientist" or
aerospace engineer. Computer programmers and software engineers were their
successors in the 1990s. pump and dump: scheme to fraudulently
drive up the price of a stock so that insiders can sell their shares at the
peak and reap big profits before the price of the shares plummets and gullible
investor loose their money. During the Dot Com
boom, many tech companies were setup to rip-off small
inventors caught up in the hype. put out for it: slang term
that refers to engaging in sexual relationships to be hired, continue
employment or advancement. put out policy: unofficial
company policy on quid-pro-quo sex for work, advancement, salary or work.
racketeering: a illegitimate
business model that purports to be
a legitimate business that provides legitimate products and services on
an open market but are actually just launders
or skims money of of public universities, government corporations in defense
or mortgages and home loans or healthcare with little or no added value
often using software licensing scams.
rare worker:
a mythological worker with special or "hard to find" skills
that employeers use as an excuse to give preference to
visa workers and exclude native applicants.
Often lobbyist and executives will use the "rare worker"
myth to confuse the issue and redirect attention away from the fact that
they are using L1 and HB1 Visa workers to replace native workers
with more common skills with cheap disposable visa
workers.
research and development tax credit:
U.S. companies are now allowed to claim 150% of any research and development
costs as a deduction. This means that anyone that can incorporate and
set up a bogus R&D department and get an additional 50% relief for
any costs they will incur, including staff costs and rent on workshops and
offices. This has led to the U.S. government actually subsidizing
the money laundering operations of foreign
intelligence agencies and criminal and terrorist organizations at the tax
payer's expense. reverse engineering:
this is reputed to be the opposite of the forward engineering process. The forward
process take a observed process and creates software to automate it.
The reverse process is to take the working model demonstrated by
the software working model and logically deduce the originally defined
process from it. Thus, reverse engineering is not possible with out a transparent
demonstrable working model. An simplistic example of a forward process
would be something like: I performed an operation and got the number
4. A reverse engineering task might be: The number is 4; how did I get
it? This leaves the engineer with only E.S.P or divine intervention to
solve the problem since without a working description or transparent working
model, the answer is an infinite number of operations and numbers. This
can be used to generate useless, unproductive tasks in conjunction with The Broken Working Model. A non software related real
world example might be to take a immigrant lawyer with no knowledge of
the U.S. Constitution then give them a copy of a divorce case and a personal
injury case, then instruct them to reconstruct the Constitution of the
United States word for word based on just the two documents given. Somewhere
out in the infinite universe there might be someone smart (psychic) enough
to do it, but is the a legitimate task for a lawyer? Probably not. But,
many software engineers afflicted with the genius
fallacy can be fooled into treating reverse engineering like a legitimate
task even if there is no working model to reverse engineer. R.I.C.O: stands for Racketeer Influenced Corrupt
Organizations and the civil and criminal penalties are set forth in 18 U.S.C. 1963 through 18 U.S.C.
1965. RICO is generally a violation of these Federal statutes which define RICO, provide for civil and
criminal actions based on RICO and set the damage standard.
sham transactions: transfers
of funds from one company to another or within the same company for bogus
products or services as part of creative
accounting schemes or money laundering
operations. The type of bogus products or services that serve no legitimate
business include software licenses,
dark fiber bandwidth and Internet advertising slots. skimming: the corporate welfare process of siphoning off
funds from one company such as: companies in bankruptcy, charitable organizations,
tax payer subsidized "cash cows" like state colleges and university corporations or Federal government companies
in the mortgage, home loan or healthcare business with the all individual
involved in the process "skimming off" part of the money along the way.
One popluar method to achive this is to license a propriatory enterprise
type of software product to strategic partners such that the
partnering company pays(in addition to the orginal site license fee
and fees for bug fixes(See: Fix and Shuffle) additional fees based on
the volume of transactions at a customer site. This allows for funds to be
siphoned off at a predicable rate.
software: software is consensus
that you can demonstrate. It is not intellectual property but the mutual
agreement about how people interact with the complicated technological artifacts that they collectively develop.
software engineering:
the collaborative process involving at least two individuals (engineer
and end user) of observing and documenting information flow, transfer and
modification by human agents or natural processes then creating and disclosing
machine code and user interfaces to automate the process in a repeatable
and independently verifiable manner. The legitimate process
generally involves the following steps: scoping a task: the process
of creating job tasks with little traction
that are designed to be difficult and unpleasant. In a legitimate business model, there is a effort to set and
achieve goals; however, to keep people busy doing useless "busy work",
this must never happen. Specifically, when creating tasks to harass workers
you must NEVER: smuggling: the covert movement of
valuable physical items such as jewels, precious, metals, valuable works
of art, religious items or possibly contraband items across international
or state borders to avoid taxes, fees and tariffs. Used by "shadow government"
front companies and the U.S. Department of State through its network
of embassies to finance covert operations, provide additional income
for entrepreneurial government employees, and fund government sponsored
drug deals. software license scams:
these are money laundering or skimming
scams that involves sham transactions (often using scams like
fix and shuffle) between companies involving
sale of proprietary software licenses often in the form of discounts
for licenses, service contracts or transaction volume fees that allow another company to book
a sale or record revenue that they don't really have or to mask fund transfers.
spook: an employee of a government front
company who works for the intelligence apparatus but has no visible ties
to the civil government. These individual may engage in activities that
are proscribed by laws that apply to government employees. startup: a business model pioneered in Silicon Valley in
the 1970s and 1980s used to take advantages of the R&D Tax Credit, corporate block grants, educational grants
and legal exceptions enacted by the government to encourage new legitimate
technologies. It is usually fronted by a
twenty-something or younger individual to: startup scam: a scam business
in which a company or division of a larger company "spins off"
a startup that never goes public but runs continually
in startup mode, sucking up corporate
block grants, government subsidies, educational grants and the ever
popular R and D Tax Credit. The goal is to
setup partnerships for skimming
and money laundering operations. If
successful it will evolve into a full fledged tech
company. Used extensively by the Big Five to setup
off the books partnerships and other instruments
to inflate profits and hide debt and to turn-over
problem employees. The most common implementation of this type of scam
is the e-commerce company. tech: business racket characterized by government subsidized money laundering that is the de facto successor
of defense and aerospace boondoggles from
the Vietnam/Cold War era. It is generally characterized as small company
or independent division of a larger national or multinational company usually
staffed by military or government corporate types
(often called "government divisions").
Other characteristics include high turn-over of native workers, an abundance
of H-1B visa workers (mostly waiting to get their green
cards and then U.S citizenship), money laundering,
skimming and creative
accounting. These type of companies pretend to produce legitimate
products or services, but produce little or no added value to anything.
Employees spend most of their time filling out time sheets, being obsessive
about charge codes, going to meetings and running up frequent flyer miles
rather than doing real work. Bogus fronts like these generally have words
like "Technologies", "Industries" or "Enterprises", in their company names.
Even Washington lobbyists and lawyers have setup these kinds of fronts -
your tax dollars at work!
technology: the legitimate business model of companies using legitimate
research and development to create new complicated artifacts that
allow humans to either alter the environment in their favor or enhances
their ability to favorably interact with the environment. Contrast this with
tech which was the 1990s bastardization of this model
used to the Washington insider corporate elite to prop up the tax base and siphon
of tax payer money into the pockets of their corporate friends on Wall Street and
in the industrial military complex. transparency: the property
of a corporate or government accounting systems that minimizes waste, fraud
and abuse by allowing easy external oversite and review and not allowing
creative counting tricks to hide
debt and inflate profits and cover up money
laundering and skimming operations. Next to
accounting reform it is the greatest threat to government rip-off in boondoggle C.I.A and D.O.D intelligence operations and corporate welfare. traction: the property of a work assignment
that allows the individual assigned to it to define the problem and come
up with a realistic plan to solve it. Tasks that are scoped for failure have very little traction.
turn-over: the rate at which employees
enter and leave a job over a given period of time or the probability
that a given individual will continue in the job for a given period of
time. It is how Washington eugenics worker turn over
policy is implemented. High rates of turn-over can increase profitability
because employees are not around long enough to become expensive. More
experienced workers also tend to know all the tricks are less easily manipulated
than "fresh" employees. Remember, there is never a shortage of people
with technical skills; the U.S. government will bring
in as many cheap visa workers as you need
at tax payer expense. UML(Unified Modeling Language):
a theoretical dead-end similar to the symbolic AI debacle. It
attempted to use graphical modeling of "real" world
systems in an attempt to discover unknown or hidden relationships
that could be used to create new real world software applications.
Acedemic types though it might be a new "calculus" that could lead
to new discoveries; however, none of the theoretical reseach
ever produced marketable products. The company that sponsored it was disolved
and now it is used only in government
boondoggles to keep workers doing busy work at tax payer's expense.
For a legitimate CAD tool see napkin.
underclass: a subclass of the
dominant society whose members are group together because of common characteristics
such as race, religion, gender, political affiliation, sexual orientation,
age, national origin, physical handicap or educational background who
are often subject to discrimination, vulgar or ugly
social stereotypes, violence and abuse because their common characteristics
are considered immoral, repugnant or unpleasant the majority members
of the society. Members of these classes tend to be under constant stress
and have a high rate of turn-over. under thirty rule: no
one over thirty is to be hired, promoted or given meaningful work. Individuals
in the mid-career and older are to be keep billable
and kited from job to job until they voluntarily
leave industry. university: the base of the corporate
feeder system and dumping grounds for corporate jerks
whose job it is to prevent underclass individuals
from entering the corporate system, economic main stream and high paying
jobs. It is the first stop in the software industry "food chain" where people
go to get harassed and discriminated against before they enter the workplace.
These public corporations are often the source of funds for the startup scam and the target of skimming operations. Historically, they were created
to educate people so as a side effect it is possible for people attending
these institutions to get skills that allow they to join professions that
provide legitimate products and services. vaporware: nonexistent software
products that are created on the fly by sales or marketing people to land
customer contracts. virtually fired: a legal term
that refers to the termination of the at-will agreement on the part
of the employer having the manager intellectually decide that the
employee no longer works for them and simply stops giving them work. The
employer not required to communicate to the employee that their services
are no longer wanted. The courts have held that this is still legal even
if the employee does not have mind reading skills. W.A.S.P(White Anglo-Saxon Protestant):
a citizen of the United States of Northern European descent who is member
of or who family was affiliated with a Protestant Christian denomination.
These individuals are generally affluent, not very "street wise" but
not gay or Lesbian. Of all cultural groups, they tend to be the most un-imaginative,
predictable and generally intolerant of other individuals who are different
than themselves. They tend to be politically and socially conservative.
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave,
Cambridge, MA 02139, USA. Everyone is permitted to copy and distribute
verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom
to share and change it. By contrast, the GNU General Public License
is intended to guarantee your freedom to share and change free software--to
make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation's software and
to any other program whose authors commit to using it. (Some other Free
Software Foundation software is covered by the GNU Library General Public
License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Our General Public Licenses are designed to make sure that you have
the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone
to deny you these rights or to ask you to surrender the rights. These
restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis
or for a fee, you must give the recipients all the rights that you have.
You must make sure that they, too, receive or can get the source code.
And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software,
and (2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free software.
If the software is modified by someone else and passed on, we want its
recipients to know that what they have is not the original, so that any
problems introduced by others will not reflect on the original authors'
reputations. Finally, any free program is threatened constantly by software patents.
We wish to avoid the danger that redistributors of a free program will
individually obtain patent licenses, in effect making the program proprietary.
To prevent this, we have made it clear that any patent must be licensed
for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification
follow. GNU GENERAL PUBLIC LICENSE 0. This License applies to any program or other work which contains
a notice placed by the copyright holder saying it may be distributed
under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language.
(Hereinafter, translation is included without limitation in the term "modification".)
Each licensee is addressed as "you". Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of running
the Program is not restricted, and the output from the Program is covered
only if its contents constitute a work based on the Program (independent
of having been made by running the Program). Whether that is true depends
on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source
code as you receive it, in any medium, provided that you conspicuously
and appropriately publish on each copy an appropriate copyright notice
and disclaimer of warranty; keep intact all the notices that refer to this
License and to the absence of any warranty; and give any other recipients
of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy,
and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and distribute
such modifications or work under the terms of Section 1 above, provided
that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating
that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any part
thereof, to be licensed as a whole at no charge to all third parties
under the terms of this License. c) If the modified program normally reads commands interactively when
run, you must cause it, when started running for such interactive use
in the most ordinary way, to print or display an announcement including
an appropriate copyright notice and a notice that there is no warranty
(or else, saying that you provide a warranty) and that users may redistribute
the program under these conditions, and telling the user how to view a
copy of this License. (Exception: if the Program itself is interactive
but does not normally print such an announcement, your work based on the
Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Program, and can be reasonably
considered independent and separate works in themselves, then this License,
and its terms, do not apply to those sections when you distribute them
as separate works. But when you distribute the same sections as part
of a whole which is a work based on the Program, the distribution of
the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every
part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or collective
works based on the Program. In addition, mere aggregation of another work not based on the Program
with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under the
scope of this License. 3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source
code, which must be distributed under the terms of Sections 1 and 2
above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years,
to give any third party, for a charge no more than your cost of physically
performing source distribution, a complete machine-readable copy of
the corresponding source code, to be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange;
or, c) Accompany it with the information you received as to the offer
to distribute corresponding source code. (This alternative is allowed only
for noncommercial distribution and only if you received the program in object
code or executable form with such an offer, in accord with Subsection
b above.) The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control
compilation and installation of the executable. However, as a special
exception, the source code distributed need not include anything that
is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which
the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access
to copy from a designated place, then offering equivalent access to
copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the
source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt otherwise
to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties
who have received copies, or rights, from you under this License will
not have their licenses terminated so long as such parties remain in full
compliance. 5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are prohibited
by law if you do not accept this License. Therefore, by modifying or
distributing the Program (or any work based on the Program), you indicate
your acceptance of this License to do so, and all its terms and conditions
for copying, distributing or modifying the Program or works based on
it. 6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the original
licensor to copy, distribute or modify the Program subject to these
terms and conditions. You may not impose any further restrictions on
the recipients' exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or otherwise)
that contradict the conditions of this License, they do not excuse you
from the conditions of this License. If you cannot distribute so as to
satisfy simultaneously your obligations under this License and any other
pertinent obligations, then as a consequence you may not distribute the
Program at all. For example, if a patent license would not permit royalty-free
redistribution of the Program by all those who receive copies directly
or indirectly through you, then the only way you could satisfy both it
and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under
any particular circumstance, the balance of the section is intended
to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any
patents or other property right claims or to contest validity of any
such claims; this section has the sole purpose of protecting the integrity
of the free software distribution system, which is implemented by public
license practices. Many people have made generous contributions to the
wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to
decide if he or she is willing to distribute software through any other
system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed
to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in
certain countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Program under this License may add an explicit
geographical distribution limitation excluding those countries, so that
distribution is permitted only in or among countries not thus excluded.
In such case, this License incorporates the limitation as if written in
the body of this License. 9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail
to address new problems or concerns. Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Program does not specify a version number
of this License, you may choose any version ever published by the Free
Software Foundation. 10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this. Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK
AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD
THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES. END OF TERMS AND CONDITIONS
The legitimate forward software
engineering process has a series of well defined steps to follow.
The trick is to get the mark to ignore all that. Allude
to a problem but never define it, hint at requirements and processes but
never disclose them,use vague lists of items but never allude to a process
that can be easily analyzed, documented and coded. The key here is to
use poorly written documents (or not documents at all) to trap the mark into the genius fallacy
or into wasting time reverse engineering
a useless broken model. As a general rule, you can
make any simple problem difficult by intellectualizing it and using lots
of jargon as a "smoke screen"(See: butzing).
In most cases these companies are set up not to create new
long term businesses but to merely skim off venture
capital and launder money between partners or provide a pipeline for visa workers to become U.S. citizens (visa, green card
then citizenship). A very important part of the job of this type of setup
is to turn-over native workers to maintain the industry
status quo. Very often back in some room you will
find people hunched over computers and packet snifters eavesdropping on
employees, reading their private communications and engaging in other
forms of domestic spying. In government front companies people are hired
in hopes they will engage in criminal activity or to be framed for a crime
as part of government sting operations. Some startup are started by foreign
interests just to create a front to pipeline people from their own country
into the U.S. using the lax visa laws and government
subsidies to finance the whole operation.
14. Copyright, Disclainer & Credits
The General Public License (GPL)
Version 2, June 1991
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION