ðHgeocities.com/dbdoggle/index.htm?200528?20061?20063?200610geocities.com/dbdoggle/indexae1a.htmelayedxûDÔJÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÈ@š¶ìÔOKtext/htmlÀÃgìÔÿÿÿÿb‰.HSun, 03 May 2009 05:48:29 GMTºMozilla/4.5 (compatible; HTTrack 3.0x; Windows 98)en, *÷DÔJìÔ Subliminal Harassment HOWTO

Subliminal Harassment HOWTO

Daniel Boone-Doggle dbdoggle@yahoo.com

v5.00 November 2007


SUBLIMINAL HARASSMENT which is known by several other terms such as head games, mind-fucking, jerking around and psychological rape works by causing the mark, the individual being targeted, to be made so uncomfortable, irritated, depressed, intimidated or frightened that they can be manipulated into doing things they normally would not do voluntarily but not be consciously aware of the fact that they are being harassed or manipulated. It has developed because traditional overt harassment is harder and harder to get away with due to the expansion of protected classes, explosion of related frivolous lawsuits and increased ussage of labor arbitrage in corporate cost cutting. Properly executed subliminal harassment give all the benefits of traditional overt harassment but none of the legal liabilities since it difficult or impossible to prove that is has occurred. Best of all, there are a variety of government sponsered new economy giveaways, scams and cons such as the tech company, the startup scam or strategic partnering that allow you to do it, dodge the know your customer and R.I.C.O statues to skim money and defraud workers at the same time. Check for updates to this page by visiting the official online location for this page here.

1. Introduction

2. Legal Liability

3.Myth vs.Reality

4. Guilt Trips

5. Creating a Hostile Environment

6. Typical Scenarios

7. Typical Techniques

8. Subtle Verbal Harassment

9. Signs That It Is Working

10. Job Interviews

11.The Final Solution

12.Looking Toward the Future

13. Glossary of Terms

14. Copyright, Disclaimer & Credits


1. Introduction

Although this document concentrates on how subliminal harassment is used in the software and tech industries it can be applied in other segments of the economy. As employment becomes more and more a matter of corporate discretion rather than response to market forces, the future for highly trained corporate jerks will remain strong for many years to come.

Generally, subliminal harassment involves creating a subliminally hostile environment, playing upon common guilt trips, use of fud, scoping out unpleasant or useless tasks for workers or sometimes light forms of traditional overt harassment.

In later sections of this document, scenarios and techniques will be outline that you can implement in your company or organizations that will allow you to selectively employ subliminal harassment against anyone you desire. You will learn about many techniques such as the putting the mark in an physically uncomfortable high velocity seat or moving them to death row, banging and loud noises, talking or laughter, bogus department wars or conversations with upsetting information meant to be overheard by the mark that make for a more hostile workplace environment. There are not set rules, you just need to follow the basic outline but improvise as needed. Properly executed subliminal harassment will leave the mark disoriented, angry, lonely, confused and vulnerable but unable to prove that they has been targeted for harassment.

A common question is: Why would a company do this? Why would a company go to the trouble of hiring someone even giving them a higher wage or salary and then turn around and harass them into quitting? Where's the profit in that? Here are some of the reasons.

1.1 Corporate Slot System

Prior to WWII(World War II), most Americans were employed on farms, ranches, factories and small business that supported these types of businesses. Between the Civil War and WWII this system began to break down with the low point being the Great Depression. Contrary to what liberals might says, it was not the New Deal that brought the US out of the Depression, it was WWII. WWII created almost full employment putting all Americans to work in defense factories for the war effort. War worked well to build prosperity. Defense spending in the post WWII period creating an era of great prosperity for most Americans. Following the WWII, defense spending and a succession of smaller wars, lead to an extended period of middle class growth. Because wealth had to be re-distributed to individuals in a selective, controlled manner, job slots in multi-tiered companies were created. Defense companies formed the prototype for these types of companies. This is called the corporate slot system. It involves a multi-tier system: entry level, level 1, level 2 and etc with each successive level paying higher than the previous one. In theory, people would come in at entry level and if successful, eventually flow up into the higher levels allowing for upward mobility.

The corporate slot system has been the major wealth distribution system in the US since WWII. Rather than follow the course of European countries that created a wealth distribution system containing social entitlement programs like national healthcare, social insurance programs and unions, the U.S opted to continue being the world police man and continue the government funded corporate slot system as its primary social economic distribution system. American tax payer now subsidizes this practice through its de facto successor the tech and e-commerce boondoggles. The problem is that at its core, it is pure socialism and almost half of the jobs in the workplace are give aways and not necessary for the functioning of the economy. It is important to distinguish between a job for which there is legitimate demand and one that is just a give away designed to prop up the tax base. See: Washington Eugenics. It is important to keep this a dirty little secret: if this become general knowledge, there would be a massive movement to change immigration policy. Therefore, it is important not to let on to college bound kids and the general public that, contrary to what the media has been programmed to say, there is no real "pool of demand" for computer generalists. Just slots for fictional rare workers. This is why Google and Microsoft can say that they have x number of empty positions that they cannot fill while there are 1.5 million permanent Americans residents with technical degrees who are unemployed or under-employed This lie will keep the racket going and keep kids going into the CS and EE programs of the university corporations even though they will not get jobs or only work a few years doing bogus work before they end up flipping burgers.

However, the most important aspect of the tiered corporate slot system is that it allows for increased profitability through labor arbitrage and cheap help. Once established, entire layers of workers can be easily outsourced to cheaper labor countries. Likewise, by shunting the work of the higher level workers into the lowest levels, profitability can be greatly increased by effectively eliminating the high overhead created by the more expensive upper level workers. It also facilitates the ability to drive out older workers(over 30) through preemptive agism. In this case, subliminal harassment is an important technique to maintain high turn-over in the entry level workers preventing them from moving up into the more expensive levels. An even bigger increase in profitability can be obtained by using cheap immigrant labor through government sponsored visa scams and kiting to drive out native workers and depress wages even further.

1.2 Maintain Status Quo

Every company and organization from churches to large multinational corporations have turn-over. It is a part of the natural order in nature and in human social organizations. People go into organizations and industries and they have to leave them. Its only a matter of who goes and when. Japan's failed experiment in lifetime employment demonstrates the importance of it. The single greatest cost to any business is labor so it is important to keep workers cheap and moving. That is the great advantage of disposable visa workers: cheap, disposible, pliable, easily dominated and they won't be sticking around too long. Despite what right-wing demagogues say about it, the real purpose of the corporate system is to concentrate and keep most of the wealth in the upper one to two percent of the population re-distributing the what's left of it among the other ninety-eight percent. High turn-over in the workplace keeps the other ninety-eight percent of the population moving from job to job with enough purchasing power to keep the economy moving along but never allowing them to acquire significant wealth. While this policy may decrease a company's profit margin slightly, it benefits the overall business environment enormously which more than compensates for the loss. Besides, many tech companies are generally very well funded and can afford eccentricities like this that normally would not be allowed in industries that have legitimate business models, are not government subsidized boondoggles and must respond to legitimate market demands.

1.3 Bogus Startups

The new economy(Clintonomics) and the desperate labor shortage for workers with software and programming (after 1995: math and science) skills were complete frauds. In reality, the tech, telecom and Internet industries are the de facto successor to the defense industry boondoggles of the 1960s and 1970s that used lucrative government contracts to siphon money out of the government, drive up real estate prices, provide bogus jobs to prop up the tax base, employee ex-military people and enriched the military industrial complex. One of the side effects of American capitalism and corporate welfare is that the government will allow you to run a profitable business by just being a startup and doing nothing else: you don't have to produce a product or added value to anything. During the late 1980s and early 1990s, corporate block grants, legal exceptions and other subsidies including a generous expansion of the Federal R&D Tax Credit, where used to encourage innovation in the legitimate technology industry. Since almost any business could take advantage of the giveaways even if they were not in the traditional technology or defense sectors of the economy, this lead to the blurring of the actual definition of a legitimate technology company into the "bastardized" tech company. The commercialization of the Internet and the Dot Com hysteria allowed almost anyone with a little capital and government connections to emulate the Silicon Valley startup and create little side business running the startup scam. The problem is that although the flow of capital and government subsidies into the industry increased, the actual amount of actual work for IT workers to perform did not increase very much. As a result, almost all of the tech jobs created after 1992 were not created in response to legitimate market demand for new workers but by government incentives and did not really exist to begin with. As the bubble grew and more and more people jumped on the bandwagon to exploit the system, the universities pumped out more graduates and the government flooded the market with cheap visa workers from foreign countries resulting in massive over capacity. With no real legitimate market driven demand for the new workers, companies running the startup scam were forced to hire in workers to get the giveaways but have no legitimate work for them to perform. As a result, companies found it mutually beneficial to keep kiting people from job to job. They have a financial incentive to hire people away from each other indiscriminately and turn them over right away to mutually spread the costs and risks. To use a metaphore: to handle the resulting massive over capacity companies must "play muscial chairs" with employees, subliminal harassment must be applied to dupes who are employed merely to prop up the tax base to keep them job hopping until enough "chairs have been removed from the game" and they finally cannot get another job and are forced to voluntarily leave industry.

1.4 Preemptive Agism

It is a good cover for companies and industries which engages in systematic discrimination against workers over 35 years old (under thirty rule) that is actually a continuation of the government eugenics and give away policies of the big military defense contractors. This practice in often accelerated during periods when the government and corporate America initiate a jobless recovery to keep the actuaries in balance.

The myth of the Silicon Valley startup purposely only includes "kids" in garages and twenty something, pony tailed millionaires. This myth of only "young" people being innovative, trendy and up on the latest trends and technologies can be used to exclude "older" workers. This has to be done before the age of 40 at which it becomes illegal. For example, if companies only hired workers under 35 it would be clear that they are discriminating against "older" workers. But by hiring in "older" workers, excluding them from the legitimate operations of the company so that their skill sets do not stay current and turning them over quickly, it appears that they are not discriminating against "older" workers. After being turned over a few times, "older" workers will be discouraged from trying to get another job since they are just going to get turned over again and their work related skills are not longer in demand (See: Proprietary Upgrades or Excessive License Fees). Kiting workers like this prunes "older" workers from the labor pool but gets employees off the legal liability hook. All the employer has to do it point to their own statistics, they are not discriminating against anyone we just have a hight rate of turn-over that's all. The ability to selectively exclude anyone over 35 and have the government pay them to do it is, in part, responsible for the exportation of the tech business model to other parts of the general economy.

1.5 Jerk Farm

The company may be running a jerk farm training the new generation of jerk management. A jerk farm is a small company, division, subsidiary or department of a large multinational or one of the Big Five consulting firms that is used as a training ground for jerks (management trainees) that is staffed with high velocity seats. Very often it doubles as a money laundering front with lots of billable seats. In the year 2000, the greatest number of Americans in history turned 40. As workers get older the costs for health care increases exponentially and productivity drops. This means that all of baby boomers and generation-x people are going to have to be moved out of high paying jobs and replaced with younger workers or disposable visa workers. A new generation of young managers, recruiters and headhunters adept at kiting people from job to job and eventually "retiring" them (coercing them to voluntarily leave industry) will be increasingly important and in future demand. This periodical generational dumping is usually referred to as a jobless recovery or structural unemployment. As part of the training, the company may have setup a death row or dead pool front company, subliminal harassment techniques are always applied people in these situations to move them out of the company as soon as possible.

1.6 Retaliation

Revenge could be another motive. In recent years, it has become harder for employers to retaliate against former employees for whistle blowing and sexual harassment due to the explosion of frivolous law suits. Rather than retaliate against the employee while they are employed by their current company, they will have them hired away by some other company and let the new company management do the job. Contrary to common sense, companies that outwardly appear to be competitors are really "brothers under the skin". Companies in mortgages and home loans,real estate, gaming, finance, health care and software all share the common "people problems" and mutually benefit from high turn-over. Very often one company will be more than happy to take a "problem" employee off another company's hands by hiring them in and then using subliminal harassment to apply a little psychological rape and torture and dump them to maintain the industry status quo. Exchanges like this between companies often takes the form of favors and kick backs. It is cleaner than firing someone since there is no legal liability problem for the previous employees because the mark quits the second job or leaves industry "voluntarily."

1.7 Psychological Rape

All the fun of sexual assault but none of the legal liabilities. Hiring in protected class people, whistle blowers or other industry offenders who threaten the status quo, harassing and humiliating them into quitting gives certain personality types a feeling of satisfaction and superiority. Since it is possible to create conditions in which anyone will fail no matter how smart, motivated and well trained they may be, this gives great opportunities for company jerks to hire in members of their favorite hated underclass, give them a position then use subliminal harassment to completely sabotage and humiliate them- all at tax payer expense. There are three additional benefits to using subliminal harassment for politically motivated psychological rape. You have:

Some executives will spend thousands of dollars a week on recreational drugs and prostitutes so why not spend a fraction of that to get the opportunity to beat-up and humiliate a member of their favorite hated underclass? It makes for great conversation at the country club or corporate sauna. You've shown all those civil liberty ACLU types that members of you favorite hated underclass are unfit to work and you have an example to prove it - and your lawyers can now back you up. Jerks and spooks graduated from the major D.O.D./military jerk farms are great at this type of tax payer subsidized harassment.


1.8 Visa Scams

The HB1 and L1 visa programs were created back in the 1950s before the Internet, transcontinental air travel, video conferencing, over night mail and FAXs existed. The ability to move personal between division or import workers was arguably necessary for businesses to operate. But, by the 1990s, these programs had become unnecessary and essentially turned into direct government subsidies. This allowed companies to use the desperate labor shortage; myth as an excuse to use the loopholes provided by the visa H-1B and L1 programs to bring in cheap workers to crowd out native workers to increase profitability. Countries like India and China could now setup visa immigration "mills" to colonize the United States displacing native American workers replacing them with their own people and have the U.S tax payer foot the bill.

Employers have the Constitutional right to the perfect employee or have the government import a cheap, disposable immigrant worker at tax payer expense if they can't find one. The H-1B Visa Worker Program is a tax payer sponsored immigrant adoption scam crafted by Washington tech Internationalist lobbyists, the big software monopolies and the U.S intelligence agencies to bring in cheap immigrant laborers into the U.S. under the pretext that:

But, the actual reasons few native workers choose these professions is: This means that disposable immigrant labor is an attractive alternative to hiring or re-training native workers who silly enough to expect that they have a right to high standard of living and that their government should be looking out for their best interests. In order to cover up this practice, companies have to use subliminal harassment to keep the number of native worker dupes at a minimum by maintaining a constant turn-over of native employees. It is also effective at keeping immigrant labor in a state of fear.


1.9 Image

Many companies try to maintain a tough corporate image with tight social control. High turn-over, hiring people in and moving them out as quickly as possible, perpetuates that image among corporate peers. For a manager, being a "people mover" enhances their reputation among their peers.


1.10 Avoid Liability

Firing someone directly opens up the possibility of a lawsuit. However, if you subliminally coerce an individual into quitting by themselves, you side step the problem completely.


1.11 Second Thoughts

The company hired an individual but then decided for some reason decides to dump them. For example:

Rather than risk the possibility of lawsuits, the manager may choose to employ subliminal harassment to facilitate the new employee's departure from the company. Surprisingly, some people find it emotionally draining and unpleasant to discharge individuals. For them subliminal harassment is a cowardly way do to what they are afraid to do overtly.


1.12 Unions

In union shops, managers are often limited to the conditions on which they may discharge individuals: subliminal harassment maybe the only alternative.


1.13 Decoy

A person who is target for high turn-over diverts attention from the organization as a whole and offers a "scape-goat" that can be blamed for inefficiencies or a bad business model. Having high-turnover covers that fact that there are some people who are sticking around for a long time.


1.14 Morale Boosting

Many managers like to keep on person on their department who is in the process of being turned over. It improves morale by playing to the herd mentality of long term company employees.


1.15 Washington Eugenics

Eugenics is the government reproduction policy set and implemented by the US military and government defense contractors that dictate who will get the steady high paying jobs that facilitate safe reproduction in the United States. These policies also dictate when a person will no longer be employed in their chosen profession. These policies actually filter out of the industrial military complex when military jerks are recruited into other segments of the economy such as, for example, Navy people into the retail industry.

Since the foundation of the United States as a colonial power, the military has been the biggest employer in the U.S.. The mind set of the Washington elite bureaucrats and special interests that make money ripping off the governement is that the government needs to create entry level jobs for ex-military and immigrant people with what they consider good genenomes. These are government give-aways that are used to prop up the tax base, provide customers for new housing and give young government approved families a safe environment mostly in government and military rip-off save zones. This has historically favored heterosexual wasps with military backgrounds.

The typical lifecycle is: Of course, underclasses individuals run a high chance of being locked out of the system entirely and being life long victims of turn over.


1.16 Fun and Games

You can turn it into a kind of game, it can be fun to hire people in and see how fast you can harass them into quitting. Open up a betting pool in the HR or boardroom and make bets on which techniques will work on which individuals and how long it will take to break them. Your tax dollars at work!


1.17 Dirty Tricks/Rat Fucking

The profitable techniques outlined in this document are often used by government or corporate dirty tricks departments to eliminate the organization's political enemies or rat fuck whistle-blowers.

The Dirty Tricks department or division of a company or organization responsible for planning and implementing attacks to destroy the credibility, reputation and sometimes the lifes of individuals who pose a threat to the status quo of the organization (e.g whistle-blowers). In the private sector, individuals in these departments are often recruited from government organizations such as the C.I.A..

Rat fucking is the use of anonymous tips to law enforcement, employers, news media a politician's political enemies and etc. designed to undermine the credibility of an individual. These "tips" generally involve allegations of misconduct such as sexual indiscretion, drug use, computer hacking or tax evasion. These are most effective when use against members of an underclass since they are already unpopular and people are looking for more reasons to hate them (See: Make Them a Threat and Final Solution).


1.18 Government Give-aways

These are generational socialistic eugenics "giveaways" in the form of profitable government subsidies to companies to create bogus jobs used to prop up the tax base, raise the value of real estate and subsidize government approved families. Note that these types of jobs do not represent legitimate private sector economic growth, are short-term and dis-appear rapidly(See: Jobless Recovery). The criteria used to select applicants for these types of jobs are ussually based on age demographics, scores on paper IQ tests, sexual orientation,race, military status or affiliation with the special interests that actually run the Federal government. Historically, this has been done through defense related government boondoggles and spending allocated in a post war period for contracts with defense companies that employ returning veterans(and exclude anyone else). The replacement in the post cold war era are the tax payer subsidized tech industry or defense funded "government divisions" of software, wireless, telecom or Internet companies. Offshoots of Federalized racketeering such as Indian Gaming, homeland defense and healthcare are begining to replace these as political support for tech boondoggles is waning. These so called new economy replacements required high turn over managment policies as outlined in this document to make sure that they only go to "young" people under 35 and to keep undesirable underclasses locked out.

Expansion of these types of programs outside of the defense industry in the 1990s lead to the DotCom debacle, bogus startups and the tech and visa immigration mills that allowed countries like China and India to colonize the U.S and replace native workers with their own people - all at tax payer expense. In the future expect increased Federalized racketeering in homeland defense,home mortgage/real estate,Indian gaming and health care industries to facilitate the reproduction of government approved families.


2. Legal Liability

With regards to subliminal harassment there are two types of lawyers:

The latter type will just attribute the mark's problems to paranoia or assume that the mark somehow deserves the abuse they are receiving, tell them to "either talk to your boss about it" or "get a new job" and send them on their way. The former lawyer, who is in the loop, will more than likely tell the mark the same thing, send them on their way and then tip off the mark's company's that harassment is working with legal telepathy.

Most lawyers in private practice have to put up the constant irritant of people coming to them with their "petty problems". They are looking for the big money cases. Many would love to be one of the high priced corporate attorneys that defend companies in discrimination or harassment lawsuits; therefore, lawyers have little or no sympathy for people who are targeted for subliminal harassment.

One line of defense relies on the myth that it is expensive and difficult to recruit and hire new employees. For most individuals, especially the ones who are seated on juries, a few thousand dollars is a lot of money, often the more than they will ever see at one time. These types of individuals have no comprehension of the wealth of even a modestly sized company. So, if they hear that it may cost a few thousand dollars to hire an employee, they can never believe that any company would spend what they perceive as a "large" sum of money just to bring someone into a company with the intent of harassing them out of the company.

Since subliminal harassment is often a group in a small office or department, it is often difficult to place blame on any particular individual where the herd mentality may be at work. With no solid proof of collusion, when the mark describes what is going on it will sound like paranoia not a deliberate attempt to drive them out of the company.

Often when a new employee comes into a company there will be a period of "hazing" where other employees will test the new employee with all sorts of unpleasantness. This is a perfect cover for subliminal harassment.

Law firms are very often large corporate money laundering fronts themselves with lawyers using these techniques in their own practices, and afraid to publicly admit that the techniques exists. Since many lawyers have contracts with corporate interests engaged in government racketeering involving defense contracts, real estate and home mortgages, they will not help the typical victim of subliminal harassment.

Litigation is very expensive. Lawyers will not take a case that they cannot win or settle. Most cases of subliminal harassment would require a lot of work without a sure outcome unless someone on the inside goes "on the record."

Discrimination laws only apply to members of protected classes and discrimination is seldom overt: it is masked by levels of accommodation. This is the loophole that lawyers and politicians have deliberately left in all of the anti-discrimination laws: discrimination is not defined as giving preferential treatment to people you want to keep and witholding it from people you are discriminating against.

The only way an employee would be able to work around the legal loopholes exposed in this document would be to have clauses in the Letter of Agreement prohibiting the employer from engaging in the harassment techniques outlined in this document. If they succeed it will compromise the employer's ability to harass and intimidate them after they have been hired.

In any event, the people you will be targeting are worthless nobodies that greedy lawyers ignore by default and are not making enough money that loss of their career would make it worth suing anyway.

The techniques described in this document often result in unfortunate phenomenon and, in the last several years, there have been several highly publicized incidents of violence in the workplace where the management was using subliminal harassment to create a subtle hostile workplace environment that resulted in the deaths of many innocent bystander employees. Fortunately, the incidents was chalked up to another crazy person on the rampage and never traced back to the companies or their .management This is the ultimate proof that psychologically vulnerable people can be pushed "over the edge" and that curn-and-burn and subliminal harassment, if properly implemented, can be virtually undetectable and used freely with no legal liability at all.

But, if in doubt, ask the company attorney: It is their responsibility to review the company's employee turn-over and harassment policy to make sure it is legal and absolve the company and its managers from any liability from employee lawsuits.


3. Myth vs.Reality

3.1 Myth 1

Companies and enterprises commiting predicate acts such using government subsidises, grants and immigration visa programs with the common objective to import cheap labor to crowd out and defraud native workers and later ship the jobs over seas are violations of the RICO statues.

Reality: The visa programs have been created delibrately with NO protection for native workers therefore crimes like these are not covered by RICO.

3.2 Myth 2

The harassment techniques outlined in this document to create a subliminally hostile environment are subjecting individuals to pyschological experiments without their explicit consent and are illegal.

Reality: There are no state or Federal laws prohibiting companies from performing pyschological experiments on indivduals without their explicit consent.

3.3 Myth 3

An at-will exempt employee-unlike a wage earner-is one who's salary does not vary with the amount of work they are required to perform.

Reality: Under state law, a salaried at-will exempt employee is required at all times to match each hour worked to a billable account. If the employee cannot find enough billable hours to meet their weekly quota, the employer is not legally required to pay the employee their salary agreed to in the letter of agreement.

3.4 Myth 4

The at-will agreement is a legal contract between the employer and employee which either side can unilaterally terminate. If the employer wishes to terminate the agreement the employer must communicate to the employee that their services are no longer required.

Reality: If the employer stops giving the employee work or paying the employee their salary, the employee is legally required under state law to unilaterally terminate the employment agreement from their side by quitting.

3.5 Myth 5

The at-will agreement is a legal contract between the employer and employee and like all legal contracts both parties are required to act in good faith.

Reality: The employer can treat the employee anyway they want to without any legal liability. There are no state, Federal laws or case legal precedents that require any party in the contract to act in good faith.

3.6 Myth 6

The employer is responsible for determining the employee's ability to perform work and skill sets prior to hiring them and to provide employees with work that they are capable of performing and comfortable with.

Reality: The employer can deliberately deceive the employee into believing that they will provide the employee with work that they are qualified and capable of performing and then simply not do it with no legal liability at all. The employer can harass an employee by assigning them a tractionless task such as out the door task regardless of their ability to get it done and fire them if they can't do it. Even if the employee perceives it to be menial, humiliating and demeaning or so ambiguously defined that they cannot even develop a plan for completing the task. The employer has no legal responsibility to make sure that the employee is qualified for the job that they will be assigned. An employer can hire a plumber to build a fence, a carpenter to fix a car, tailor to treat the sick, a doctor to fit suits or a waitress to practice law or a software engineer to reverse engineer a non-existent product.

3.7 Myth 7

The employer is responsible with providing the employee work during the period of your employment.

Reality: The at-will agreement does not specify that the employer agreed to give the employee work to perform. They only agreed to give them a job, not jobs to perform. The employer can expect that the employee to creatively "invent" their own work to keep busy or quit if there is nothing to do.

3.8 Myth 8

Your employment period is indefinite and the employer must directly communicate to you that they are terminating their employment agreement with the employee.

Reality: The employer is not legally required to communicate to the employee that they are unilaterally terminating the at-will agreement. The employee can be virtually fired. Being shunned by everyone in the company or department or not being given work to be performed are sufficient under law to terminate the at-will agreement with the employee. The employer can just stop paying the employee their salary without explanation.

3.9 Myth 9

Being jerked around at work is a form of workplace harassment and is illegal and your accomplices who co-operatively engage in it are involved in a conspiracy.

Reality: Subtle harassment described in this document is not illegal even if the employer knows about it or is encouraging a hostile work environment where other employees consciously or unconsciously try to make another employee uncomfortable. Companies engaged in this type of behavior cannot be sued by a former employee for creating a hostile work environment.

3.10 Myth 10

The employer is required to provide the employee with all the information, tools and additional training that an employee my need to perform an assigned task.

Reality: The at-will agreement does not state that the employer will provide information, trade secrets, tools and additional training that an employee my need to perform an assigned task. In fact, the employer may deliberately neglect to do any security and background checks at the time the employee was hired and use this as an excuse to withhold agree to work entirely

3.11 Myth 11

The employer can only discharge the employee for "just cause".

Reality: The employer can uni-laterally terminate the employment agreement for any reason or no reason with no legal liability.

3.12 Myth 12

An employer that is a protected Federal government front or corporate block grant company is covered by the Know Your Customer Rule and if employees know about money laundering, smuggling, skimming or drug dealing they must report it to the proper authorities.

Reality: The Know Your Customer Rule only applies to banks and financial institutions not private companies or protected Federal government front companies. Employees of other types of companies have NO responsibility to report crimes committed by other employees, management, or their customers. Furthermore, employees or customers of protected government front companies engaged in activities such as money laundering, drug dealing or smuggling are not committing crimes and local city, county and state law enforcement agencies are not allowed to investigate or prosecute them. (See:Government Ripoff Save Zone)

3.13 Myth 13

Packing a company with younger workers, not hiring older workers, denying them access to assignments that enhance their on the job skill sets and turning over older workers is age discrimination.

Reality: The courts have found determined that things such as flag burning in public, excluding gays from the Boy scouts and hiring and preferentially promoting younger workers to send a message that older workers are not welcome is constitutionally protected form of free speech and is not discrimination.


4. Guilt Trips

Guilt trips are subconsciously fears, phobias and social taboos that can be aroused within and individual to agitate, harass or make more vulnerable to manipulation. They can very according to race, religion, cultural background. They include: age, sexuality, job competency, financial security, standing in the community, health status, mental stability or vulgar social stereotypes to name a few.

The easiest way to arouse them and bring them to the surface is to use verbal techniques outlined in Subtle Verbal Harassment. Here are the most common ones used on your most common victim - the stereotypical middle aged white male W.A.S.P:

4.1 Age

There are two tracks to follow: discomfort with being to young and the more common exclusion for being too old. In some societies, old persons are respected and give a greater social status that younger people. However, most American companies maintain a policy of preemptive ageism. An older person who is still working and is not financially independent or a member of high management is looked down upon as having failed in some manner of another and should just disappear. In the software industry, success if often achieved before the age of thirty so individual still working above that age are considered failures. Packing a department with really young people is a good way to arouse the age guilt trip and send a message that "older" workers (over 35) are not welcome. You can also use embarrassment meetings to realize the age guilt trip by asking the mark their age publicly in front of the whole group. The corporate media helps re-inforces the practice of preemptive ageism. Most news programs and print articles will emphasize the age of the people involved if they are under twenty but never feature anyone over thirty unless they are working in government or education.

4.2 Sexuality

For heterosexuals, being perceived of as gay can be extremely frightening and arouse greater anger that can be used to manipulate them. For gays and Lesbians, the fear of the disclose of their sexual orientation can also cause great distress and fear that can be used to manipulate them. Being perceived of as sexually impotent can be used to undercut someone's credibility and effectiveness. Perception of being overly sexually active can used to portray someone as being a "pervert". These are most effective in religious communities.

4.3 Job Competency

The fear of being unable to perform ones work due changes in the environment or changes in task assignment. A well crafted tractionless task can be used to realize this fear. Also see, Embarasment Meetings.

4.4 Financial Security

Fear of "falling off the planet", that is loosing their job and not being able to get another job; or having to get one that pays less and is less prestigious

4.5 Health Status

In the United States which doesn't have a national health care system, people with long term health care problems are considered a financial burden on business.

4.6 Mental Stability

Being perceived of a crazy, eccentric or having brain oriented medical problems directly challenge the perception that the individual is capable of performing their work or continuing in their current position.

4.7 Race

Within the W.A.S.P. majority in the United States, there are still strong racial stereo-types in popular culture. Members of these racial groups are still confronted with these unpleasant images and perception that people might see them in themselves can cause great anxiety, fear and resentment.

4.8 Loss Of Standing in the Community

People a gregarious, social animals. The fear of being shunned by family and community is a very powerful fear.


5. Creating a Hostile Environment

5.1 Environment

Creating a subliminally abusive environment evolves to two separate steps:

Fortunately, for the first task, the software engineering process is at best poorly defined and in popular culture, the default definition appears to be "just sitting at a computer and typing." Since tech businesses generally have non-existent or crooked business models to begin with, management can create tractionless tasks "on the fly" since their companies do not have to response to legitimate customer or shareholder demands. Even better, some gullible software engineers can even be duped into believing that the reverse process, reverse engineering, is the same as the forward process. Coupled with the genius fallacy, this leaves ample room for scoping out really unpleasant out the door tasks even if they have nothing to do with legitimate software engineering at all. If you can brainwash the mark to buy into the lie that they are responsible for completing any task that you assign them, they will be at your mercy. Best of all, the entire process can be broken creating a whole chain of useless and unproductive tasks. By not coding and releasing a demonstrable working model, everyone else in the development chain afterwards is forced to waste time reverse engineering the broken working model of the product in order to carry out their tasks greatly increasing the effort required and artificially driving up the costs.

For the second task, the goal is to create a hostile environment where targeted individuals in the work area is constantly nervous, distressed and in fear of loosing their job or being humiliated by not being given work to perform. Due to the massive labor over capacity created by the government and the basic fears and guilt trips that are already present, you can use the techniques outlined in the Typical Scenarios will allow management to create an environment where they are subconsciously realized.

5.2 Do It Selectively

The trick is doing it selectively. People crave stability in their lives, they want to feel that their jobs and careers are stable, so you must make every effort to keep them "off balance". For employees you want to keep you need always signal that you will accommodate them and deal honestly and fairly with them. For individuals you want to target for high turn-over you need to do the opposite: target them with unfavorable or unfair treatment whenever possible especially when it comes down to legitimate work assignments, on the job training for hot new skills and a comfortable work environment.

5.3 Golden Rule

Pack your company with "younger" workers. Keep "older" native workers billable but never give them an assignment that will enhance their skill set and keep kiting them from job to job; keep the "kids" or visa workers busy with interesting work work assignments, training in hot new skills, perks and frequent raises.


6. Typical Scenarios

6.1 Do Nothing

After you have hired the mark don't give him anything to do - it is that simple. Make sure your accomplices have plenty to do or appears to be busy to apply peer pressure. This will leave the mark feeling "left-out", isolated and feeling neglected and uncomfortable but you are NOT DOING anything TO them. You will of course have to scope out some sort of vague task with little traction, but in everything you do make it clear that are not going to accommodate them or make them feel comfortable. Software engineering by its very nature is a collaborative process. If the engineer is stuck in a cubicle somewhere with no interaction with other engineers or end users they can never succeed. Increase the mark's discomfort by using the techniques outlined in the Typical Techniques.

6.2 The Old Bait and Switch

When hiring the mark, lie to them and give them the impression that you think their skill set matches you company's needs and that you have a specific position for them and you will accommodate them fully. Then on the first day the mark starts their new job, suddenly inform them that there has been a change and that they will be working for a different boss other than the one that you lead them to believe they would. Have the new boss tell them that they don't have any work for them or that there has been a change in job description and duties. The build up and then sudden drop in expectations is designed to create a deep psychological shook which hopefully will cause the mark to quit. If the mark doesn't quit, scope out a large or ambiguous out the door task. When the mark is not even able to define the task much less complete it, he will be in a constant state of not knowing what to do and feelings of inferiority. Then have your accomplices reinforce this notion. Make sure that everyone else that the mark sees is busy and completing their work. Have your accomplices say things like, "Yeah, we need to hire someone with such and such skills to get you job done". This will reinforce the feeling of inferiority in the mark and will isolate them further.

If the mark wises up to what is going on, give the impression that in the company, "one hand not knowing what the other is doing" as an excuse for reneging on the agreement. Subtle verbal harassment is very useful in this situation. During the hiring setup, the mark was lead to believe that you will provide work for him that he could complete, so give the mark the impression that he is being "out of line" but expecting you, the employer, to act fairly and accommodate him.

6.3 Time Sheet Harassment

Setup the mark during the interview process, to believe that you will accommodate them fully and have a position for which they are fully qualified and that you will always have plenty of work for them to perform. However, once hired, give the mark the perception that all hours worked must be matched to a billable customer account or they won't get paid. Since you lead them to believe that you have plenty of work for them, they will not know what to do when they find out that they are somehow responsible for filling a quota for hours a week and must somehow "invent" his own work. You will be surprised at the number of guillable people who buy into turning captialisim "upside down" like this: workers setting the goals instead of managment. It is also a good cover for a non-existent business model.

Use peer pressure to increase discomfort by making sure that all of your accomplices have legitimate work. You can tell that this method is succeeding and that the mark has bought into the lie, if they become defensive and stressed out on the day that time sheets are due. Use embarrassment meetings or status reports to further embarrass the mark.

This is most effective against a dupe that has never worked at a government subsidized money laundering front company before and have bought into the genius fallacy. People of this ilk don't want to admit that they are not "smart" enough to figure out how to complete the vaguely defined task that you have scoped out for them. It is less effective against someone who has been "through the mill" a few times.

Finally, set the hook in. When the mark finally comes to you and complains that he doesn't have anything to do slam him with some kind of statement like: "Well, Joe, then I don't know what else we can have you do around here." At this point the feeling of betrayal will be complete and you will have the mark should be completely broken and ready to go out the door.

6.4 The Squeeze Play

This works the best with a new hire. The mark's former boss, the HR person or company attorney at the mark's previous company will be the point man here. Since the mark probably has distributed his resume to other companies and these other companies have contacted the mark's pervious employer, the previous employer is in a good position to put you in contact with other companies who have the mark's resume. Starting on a Monday, gradually increase the subliminal harassment, and on Thursday, have one of the other companies call the mark and ask him in for an interview. On the final Friday before the weekend, get brutal and bring up the intensity. If you have been successful, the mark will not show up on Monday and probably quit thinking he has more opportunities. At this point call up the other individuals at the other companies and tell them that they can withdraw their offers for interviews. Call up the mark's previous boss and have a good laugh together!

6.5 Thermostat War

In this scenario, the mark placed in a high velocity seat like a small, stuffy office that's air-conditioning unit is controlled from another office. The mark's work space is kept either too cold or more commonly more hot than the other room(See: Gas Chamber). Since the only way to change the temperature of the mark's environment requires changing the environment of the other room where the thermostat is located, the will create conflict. Since discomfort is somewhat subjective, this creates opportunities to play games with the mark by claiming that it is or is not too cold or too hot. This will put the mark in conflict with the other person. This will entrap the mark in a situation in which he will be induced to be hostile with the people in the other room. In many cases, the environment can be made so inhospitable that the mark will voluntarily quit. If this does work, try having the maintenance people rig the air ducts so that hot or cold air is continuously pumped into the room or area. Adding mold or toxins to the air is also a plus. Remember, the employer has no legal responsibility to make the employee comfortable and can place an employee in any environment even if it is unhealthy.

6.6 Bogus Department Wars

This works best in large companies and was a favorite for aerospace and defense contractors in the 1960s and 1970s to turn over dupes on scams running on non cost plus contract government deals. Create bogus department wars and have a upper level manager issue a written termination notice for the mark. Have it suddenly delivered to the individual for best effect. The sudden shock of having the fear of loosing the job realized, leaves the mark open to more manipulation. The individual will be forced to go to his boss for an explanation. This gives an opportunity to use further subliminal harassment techniques to distress the mark when the mark is most vulnerable.

6.7 Throwing Dirty Looks

Have your accomplices walk by the employee and "throw" facial expressions or disgust, fear or hatred toward the mark. This is intended to intimidate and arouse reciprocal hostile responses in the mark. This give the subliminal impression that something is wrong with the mark. This will bring up deep seated fears and guilt trips. This is especially effective if the mark is a member of an underclass. For example, walk up to the mark and put an expression of fear or disgust on your face. Hopefully, this will cause the mark to react this fear and hostility toward you. Which is what you want. Variation on the above, if you are the mark's manager or boss, every time you see the mark, put a shocked, disgusted or fearful look on your face.

6.8 Brainwash Them

Using The Old Bait and Switch to brainwash a gullible mark into believing that they do not know what they are doing or not qualified to for the job you just interviewed and hired them for, can be very helpful in humiliating them and making the work environment more hostile. The most effective way to do this is to fool the mark into skipping the legitimate software engineering process of using discovery and disclosure and brainwash them into thinking they need to have pre-existing knowledge of a particular domain to complete their assigned task. Fortunately, many university computer science programs don't require courses in mind-reading and remote viewing and many people are not born with clairvoyance skills.

For, example, you hire in a dupe to design a automated loan processing application. Withhold access to the loan officers and agents that are experts in the domain area and try to convince the mark that they are inadequate because they don't possess pre-existing knowledge about how the experts perform their tasks (See: Make Bricks Without Straw). This technique was developed by the jerks in the software consulting wings of the Big Five and is used extensively to launder money and turn-over employees in their partnerships or e-commerce front companies.

6.9 Gas Chamber

Putting targeted individuals in poorly ventilated offices or areas or  ergonomically uncomfortable positions can also be effective in creating a subtly hostile environment. Generally, this will mean little or no air circulation, heat and lots of mold and dust laying around. This will cause mild heat-stroke and increased allergies. Make sure the monitor is either much higher or lower that eye level and at an oblique angle to the front of the desk. This will stress the neck since they have to constantly move their head up and down or keep it turned to the right or left when seated at the desk. If possible set the monitor refresh rate down to where it is just perceptible - this will cause headaches. Only provide chairs without lumbar support, this will increase stress on the back. Use cheap computers, monitors, keyboardsand mice that are not designed to be ergonomically safe. Very slow computers and network connections that crash frequently will also increase frustration. Wise employers should always keep a few of these high velocity seats open and available just in case it becomes necessary to move someone into one right away. Inspired by the gas chambers used by the Nazis to kill many underclass members.


7. Typical Techniques

7.1 F.U.D.(Fear, Uncertainty and Doubt)

F.U.D. was formally a technique for companies to keep customer from drifting to competitors. However, the technique is very useful for subliminal harassment. Your goal is keep the mark in a state of fear (e.g fear of loosing their job, reputation), in a state of uncertainty (e.g about their future and skill set) and in a constant state of doubt (e.g that they can perform their job and their skill set). The easiest way to do this is to use target verbal barbs as outlined in Subtle Verbal Harassment.

7.2 Use Protected Class

Very often you will find it useful to use the member of a protected class to harass a member of a non-protected class. For example, a young Asian woman to harass a middle aged white male. The idea is here that when the subliminal harassment has reached a critical level the mark may be tricked into acting in a hostile manner toward the harasser. When he does, it looks like he is victimizing the woman making him look like the villian. This very effective at handling the Gloria Allred dyke lawyer types, since they will favor the woman over the ugly old white male wasp every time!

7.3 Throwing Fits of Anger

This is a classic jerk intimidation routine. It is very effective creating feelings of guilt, unpleasant memories and desire to avoid contact with you. Sooner or later your victim will do something wrong or make a mistake, so use it as a pretext to get angry at them and seem somewhat justified. Throw small fits of anger in the presence of the mark include throwing things like papers and pens and slamming things down for good effect. The trick it not to make the mark look like a victim but make you look like a victim if they react to your sudden outburst in a hostile manner.

7.4 Over-heard Remarks

Have your accomplices go into the work area and make remarks to other workers that are specifically to be overheard by the mark. These remarks should arouse emotions such as fear, jealously and insecurity by mentioning subjects of interest such as job assignments,  layoffs, skillsets or withholding of billable hours. You might find the techniques in Subtle Verbal Harassment useful here.

7.5 Make Bricks Without Straw

Withhold trade secrets, business logic or any other vital information necessary for the mark to perform their job. You can use the pretext that you cannot give this information to a uncleared employee. Most employees mistakenly assume that the employer is responsible for doing background checks and etc. if the employee will need to access company or trade secrets, proprietary information or confidential customer information to perform their job. This is a favorite technique for cold war era government front companies and works even if the only trade secret is that the company is a government front company. From the incident in the Old Testament where the Pharaoh orders the Hebrews to make bricks without straw as punishment.

7.6 Use Laughter

Use laughter (like in the next room) to play on the mark's paranoia by thinking that "everyone" is laughing at them. This can be combined with the closed door meetings. Good for increasing paranoia. Can also be effective during job interviews where you are trying to "blow-off" job seekers: when reviewing their resume, snicker or laugh periodically to give them the impression that you are lauging at their qualifications or accomplishments. Also, effective when used in embarasssment meetings with surprise guilt trip attacks.

7.7 Shipwrecking

Assign the mark to a project with a group of several individuals and setup a reasonable schedule for the group to complete the project. Then after a few days, pull the other members away under some bogus pretext leaving the mark complete responsibility. This technique can be used as a cover for moving the mark into a useless billable slot or out the door task but still give the appearance that of living up to a agreement of assigning them legitimate work. Most effective when used with Moving Deadlines.

7.8 Moving Deadlines

After the deadlines for completion of tasks have been set, suddenly move them all up. Since the mark is doing bogus work it doesn't matter anyway but this will increase the anxiety. Most effective when used with Shipwrecking. This technique is also used with Trainwrecking; but in this case the deadlines are continuously moved further out each time.

7.9 Trainwrecking

Assign the mark the responsibility to modify a relatively large program or application. Periodically and arbitrarily have the developer add new undocumented features or meet new conflicting requirements. Since government boondoggles and tech fronts don't have legitimate business models and do not have to respond to legitimate customer or shareholder demands, you can pretty much invent as many bogus new "features" as you like. The goal is to turn the program in to a mass of useless code and frustrate the developer who is responsible for "making it work". Properly done the mark should be more and more frustrated until they quit. Harassing them with competency guilt trips will enhance the effect here. For example, say things like, "Well, if your out of your depth maybe we should get someone who can get the job done." Be sure to keep a copy of the pristine "seed" code so you can repeat it on the next dupe.

7.10 Fix and Shuffle

A money laundering and skimming technique that involves having the dupe attempt to fix bugs in a broken working model of a proprietary software product. The result of fixing one bug is the generation of more bugs which when fixed generates more bugs that need to be fixed and so on in an endless cycle. Since, most of the charges to customers after the sale of a  proprietary software product are in this mmaintenance period, this is an excellent way to create sham transactions to launder money between strategic partners on demand since there are always bugs to be "fixed". If this doesn't produce enough bugs consider sabotaging version control to generate more bugs. Since this type of work can be very frustrating, it doubles as an effective employee harassment technique and can be extended to people in outside sales or support who are sent to customer sites to install upgrades and fixes.

7.11 Packing Younger Workers

Hire younger accomplices (under 22) to make the older workers feel insecure and trigger the age guilt trip. Implement the Under Thirty Rule by setting up a jerk farm or money laundering front company by partnering with one of the Big Five consulting companies. Bring in really young outside people to do the legitimate work. Set up a death row and shipwreck the older workers into billable slots or out the door tasks. This is most effective at deliberately stressing out against middle aged white males who have family  responsibilities and mortgages to cover.

7.12 Inducing Psychosomatic Illness

Try to induce psychosomatic illnesses. For example, in the presence of the mark, have your accomplices pretend to have a cold - sneeze or cough or show symptoms of other illnesses. Many weak-minded individuals will pick up the subtle queues and develop a psychosomatic illness from the behavior of others. You might find the techniques in Subtle Verbal Harassment useful.

7.13 Performance Reviews or Evaluations

Arrange to have a performance review and call the mark into your office. Use criticisms that could be generally applied to almost anyone in any work situations but in a form that is designed to be a harsh criticism of the mark.

7.14 Closed Door Meetings

Hold closed door meetings from which the mark is excluded. This will play on their paranoia that they are the topic of the meeting. Then after the meeting pull the mark into your office with a stern look on your face like he is about to be fired or disciplined. If you can see fear or nervousness in his face then you have succeeded in manipulating him. Variation: invite the mark into the meeting, but then ask him to leave for the remainder.

7.15 Banging and Loud Noises

During the morning keep the pacing of the office slow and calm. The at an appointed time, instruct your accomplices, to begin to speed up remarkably. By rushing around with jerky motions, banging, making noise and talking loudly with nervous "edge" in the voices and acting nervous, you will create a fight or flight response in the mark, and increase their nervousness and discomfort.

This technique can also be useful when "crashing" candidates during the administration of a preemployment screening tests. Have your victims take the test in a office where your accomplices can make loud noises by banging on the roof or walls of adjacent offices. This will upset and intimidate the test taker and hopefully facilitate them to break off the interview and leave.

7.16 Psychosomatic Pain

During conversations with the mark, have your accomplices try to inflict psychosomatic pain in the mark by simulating a spasm of abdominal pain in yourself. Do a grunt-moan as if you are experiencing pain and pull in the diaphragm slightly like simulating a pain spasm when the mark says something you don't like. This should cause a sympathetic reaction of pain in the mark. This will make a pain memory association with what ever the mark was saying at the time.

7.17 Simulated Setup

Have your accomplices leave money, jewelry or other valuables in conspicuous places. Try to make it obvious to the mark that they are being left there as an opportunity to for someone to steal them and that you are trying to "set up" the mark. The obviously attempt to criminalize them will humiliate them even more since you are falsely broadcasting to others that they are criminals.

7.18 Crocodile Tears

Often a single person in the office, possibly using the protected class pretext, will be delegated the role of chief harasser assigned to a particular employee and for organizing the campaign to harass an individual out of the company. If the mark wises up and realizes that this person is using fear and hostility to manipulate him, you can try to use this in a back-handed sort of way to make them feel guilty about not quitting. Have the harasser look sad and on the verge of tears whenever the harasser sees the harassee. Try to make them feel guilty about sticking around when the harassers job is to get rid of him.

7.19 Vulgar Social Stereotypes

Verbal or graphic representations of racial, social or religious stereotypes such as the mugger African American man, the lazy Latino, the greedy Jew, overly aggressive feminist/Lesbian, the child molester gay male or AIDS victim can be very effective in the workplace for undermining the credibility and reputations of targeted individuals. They are also very useful for portraying the mark as a threat. Have your accomplices leave drawings or effigies on white boards or on the stalls in the bathroom. Crude dolls representing the individual in a noose and hung above their desk can also be effective.

7.20 Sabotage Version Control

Secretly rollback changes to bugs that have already been fixed to frustrate workers and generate more work. This forces workers to fix the same bugs over and over and creates new ones. Useful in implementing fix and shuffle. CVS is cumbersome and appears to be the one version control system that is easiest to screw up and leave no trace.

7.21 Make Them A Threat

It is possible to undermine the credibility of a even very sympathetic individuals and turn them into an object of hatred, disgust and derision by portraying them as a threat. Historically this has been most effective when used as a political tool against members of unpopular underclasses by associating individual members with vague paranoid threats such as: the International Jewish Conspiracy, the Gay Agenda or "a vast right wing conspiracy." In the office setting the most effective way to do this is to spread rumors that the mark is violent, mentally ill, a sexual predator or harasser, a stalker, a child molester or possess some other attributes that will frighten or disgust others. Vulgar social stereotypes can be very effective here. Avoid legal liability by choosing accomplices from individuals that appear to be out of management's control such as local law enforcement, outside contractors or customers that come onsite; this will shift responsibility away from the company. Another way of implementing this technique is by inventing a problem that is solved when the is eliminated.

7.22 Proprietary Upgrades or Excessive License Fees

Unlike open source software which is a open, collaborative effort, the closed source proprietary products of the big software monopolies typically are redesigned for each new release antiquating the skills of the currently trained users making their skill set useless. Therefore, only individuals you want to keep should be retrained; deny others access to hands on experience. Then, use this as an excuse to lock them out of legitimate activities at your company- claim that what ever self study they have done it not adequate. This stunts career growth by forcing IT workers to engage in job hopping to seek an entry level position each time them leave a job. Since this is something they cannot continue to do forever eventually they will be excluded from the labor pool. This is how a language of exclusion is used to eliminate workers from the labor pool in the defense industry. Likewise, the excessively large license fees of many of the indemand proprietary products are so large that typical users cannot get copies of them, effectively locking them out of the labor market since they cannot train themselves without company sponsorship. The proprietary software development model guarantees easy discrimination and high turn-over for selected workers as will as supporting continuation of profitable software license scams.

7.23 Assign Broken Working Model

The "broken working" model is the classic oxymoron in the software industry to generate busy work to keep native workers occupied while giving legitmate training and work to cheap disposable visa workers. Give the mark a bunch of code or documentation and the vague task of "making it work" - whatever that means. This is most effective if they are afflicted with the genius fallacy. Since there is no description of the working model and no working model to demonstrate, they are forced to re-create the non-product from scratch with no idea of what is supposed to do. This is the classic tractionless task in a software money laundering, defense contractor or government boondoggle front company.

Be careful when assigning a task like this. You are dead if the mark knows what they are doing and asks you for a demo first. If they do that they will have you on the defensive because you have a non-product and no working model to demonstrate. They can reject the task claiming that they would have to have detailed design documents or build the product up from scratch.

Here is an explanation of why they can do this:

The explicit definition and creation of the demonstrable unit in the legitimate software engineering process make this impossible since you are transferring the demonstrability between steps. The underlying processes in the model must be transparent; meaning, that during turn over between steps in the legitimate development process, the input data, output data, underlying processes, objects, interactions and interface operation are understood in the context of the working model when it is being demonstrated. You will seldom find the broken working model from a company with a legitimate business model.

This is very similar to situations when you are talking to a potential customer about vaporware and they ask the dreaded question: Can you give me a demo? There is no simple way out of the situation . Try butzing them; however, if jargon and bogus intellectualization doesn't work; tell them that you need to talk to some else for the explanation. Leave the room then come back and tell the that the individual you need to talk to is not available and you will get back to them.

The lesson here is that if the company markets an enterprise type of software product, make sure that there is never a working model or demonstrable prototype generally available; none of the basic functionality should ever be demonstrable. There are several reasons to do this:

7.24 Preemployment Screening Tests

A good way to selectively exclude anyone you want from employment is to require that they pass a preemployment screening test. Contrary to what the politicians have been told and the official university propoganda that software engineers should be generalists who can pick up new skills "on the fly", employers can always demand previous experience in specific skills as a reason to discriminate against job applicants. Employers have no legal responsibility to hire and train native workers to get the government subsidies provided by the visa scam and government giveaway programs. By the time most software engineers are in their mid-thirties, it has been twenty years or more since they have done basic high school math and physics. You can lie to applicants and tell them that the test will cover basic material. just don't tell them that the material will be things they've never used professionally much less seen in several decades. This will make the experience more humiliating for them since they will feel  inadequate for not being about to do basic junior high school math. This is most useful for discriminating against "older" workers or circumventing the EOE laws by dismissing native applicants to justify hiring in a cheap disposable visa worker. The trick is to only bring in applicants you feel sure will fail these kinds of tests. Try using Banging and Loud Noises to faciliate test failure.

7.25 Embarrassment Meetings

These are departmental meeting called specifically for the purpose of publicly  humiliating the mark who is being harassed out of the company where the individual being targeted has been purposefully assigned a tractionless task that has been scoped for failure. Call a group meeting and ask all the members to speak to the group and give the status of their work. Your accomplices will have glowing reports of their progress and the mark who has probably not figured out what they are supposed to do much less how to do it or get it done will have nothing to report or be forced to make excuses. A variation on this, it to have the mark give his boss frequent status reports or keep a log of work performed. This is most effective in scenarios like Do Nothing or Bait and Switch where you have deliberately lied to the individual by telling them you have plenty of work for them to perform.

You can also use this as an opportunity to ambush the mark with other forms of public humiliation with guilt trips. These meetings ofter you the element of surprise. For example, you can use meetings to realize the age guilt trip by asking the mark their age in front of the entire group. Gays and Lesbians are good target for the sexuality guilt trip at such times. For example, ask them about their marital status. In both cases, have your accomplices snicker, laugh or cough when they answer. The more you expose your victims to these kinds of public humiliations infront of their peers, the less likely they are to stick around.

7.26 Subliminal Messaging

Subliminal messaging is the modulation of background noise or music in the ambient environment just above the threshold of normal human hearing with messages intended to subconsciously irritate, harass or manipulate specific individuals or groups of people. This technology was developed in the private sector and the U.S. military and has been in general use in the retail industry, the military and law enforcement for over thirty years. It has been shown if to be very effective at targeting psychologically vulnerable groups such as homosexuals, women and people experiencing emotional distress. Since the phenomenal effectiveness of this technology is one of the industry's best kept secrets, there is very little case law on it except bogus work in the area of subliminal messages in rock music tracks. This is primarily because the Constitutional right to privacy has not been extended to the individual's own mind and private thoughts; it is perfectly legal for the government and employeers to reach into it citizen's minds and manipulate their thoughts. Law enforcement will often use it in sting operations in gyms, bars and supermarkets to entrap alleged suspects into committing crimes-usually drug or sex related. Sometimes local radio stations are equiped to send out broadcasts with subliminal messages to aid in larger wide area sting operations. This is very useful if you are co-ordinating your harassment with local law enforcement agencies (See: Final Solution).

The type of suggestive and irritating messages to be vectored onto the background will depend on the profile of your victim, e.g. sexual orientation, psychological weaknesses, patterns of drug or alcohol use and etc. The company lawyer, security department, local law enforcement or outside security consultants will be able to set this up for you.

In the future this technology will be expanded to subliminal visual images displayed on computer monitors, cell phones and TV screens to manipute a much larger group of people.

7.27 Call Late

This technique is similar to preemployment screening tests. It is most useful to frustrate job seekers or exclude candiates for a position when you need an excuse to exclude native candidates from consideration but must appear to be meeting EOE regulations. Here's how it works. The night before the interview process is to begin, line up all of the candidates you really want to hire and setup their interview appointments. After that wait until very late in the afternoon(like after 5:00pm) and call up your victim. Tell them that you want to arrange an interview but they have already setup the appointments and that the hiring manager( or whom ever ) has left for the day. Tell them to call back the next morning early( say, 8:00am ) to see if they can fit them in. When they call the next morning; tell them that the manager doesn't have any time to see them or just ignore their calls. Hanging up on them is also effective.

7.28 Invent A Problem

This technique is special case application of making them a threat. A bogus non-existent problem is invented which is conveniently solved when your target has been eliminated. An instructive historical example would be the "Jewish Problem" invented by the Nazis to justify the Holocaust. More recent usages of this techniques by lobbyists like Jack Abramoff include the desparate labor shortage for computer generalists to flood the market with cheap help and the current industry lie: the shortage of math and science graduates. First, a bogus problem is proposed and circulated in the company or media. Then, once everyone believes that your bogus problem actually exists, you implement the solution in which the problem is eliminated by your proposed solution e.g. the mark is fired or legislation is passed. Not only do you appear justified but people will reward you for your hard work of making them aware of the problem and eliminating it. Be careful though, there is always the danger that someone realize that the problem does not exists. Be as general as possible and give no details; just play on the insecurity and fears of others. Don’t settle for little “white lies” tell big “whoppers”. The bigger and broader the lie, the harder it is to prove it isn’t true since you can always invent examples to support it. The key here is reputation and intensity at telling the lie. Follow the advice of Adolf Hitler: "If you tell a big enough lie and tell it frequently enough, it will be believed."

7.28 Additional Techniques

The following are additional techniques you can do to make the work environment more hostile and create physiological stress and hysteria by triggering the fight or flight response or pheromones releases to damage the health of and well being of vulnerable individuals in the workplace.


8. Subtle Verbal Harassment

The techniques outlined in this section represent the common classsic jerk routines to use on your victims to help create a suble hostile unpleasent work environment.

8.1 Steam Roller

Never let the mark finish a sentence. When he starts to talk, interrupt him before his second or third word. This may take some practice. But, pretty soon the mark will give up and be frustrated or outburst of anger toward you, which is a good result.

8.2 Verbal Repetition

Draw the mark into a conversation about a subject that you know makes them anxious. During the conversation, make the mark repeat themselves by pretending not to understanding of what they are saying.

8.3 Verbal Barbs

The following is a list of short phrases which can be directed to the mark to intimidate or "prick" the above mentioned guilt trips. These should be targeted at the mark when under stress when they are more vulnerable:


10. Signs That It Is Working

Here are some of the unfortunate phenomenon that you can use to gauge the effectiveness your implementation of the techniques outlined in this document:

10.1 They Quit

That's what we wanted!

10.2 Increased Paranoia

As the level of fear and disappointment increase, mild to severe paranoia is generated. This is the goal of subliminal harassment.

10.3 Increased Tardiness

This is a very good sign that the mark is not motivated to go to work; very often a good sign that subliminal harassment is working.

10.4 Degradation of Physical Appearance

If subliminal harassment is working you will of tend to see the mark coming into work in disheveled and tired. The cloths could be dirty, undressed or the mark may smell of body order, cigarettes or alcohol.

10.5 Agitation

Look for an increase of nervous and other tell tail signs such as avoiding eye contact. Time sheet harassment is an example of technique where a result like this would be expected.

10.6 Substance Abuse

Excessive or increased drinking, smoking or drug use are often a good sign that subliminal harassment is increasing the level of anxiety in the mark.

10.7 Violence

Fits of anger or violence are a good sign that subliminal harassment working. When these occur, try to look victimized . Even though you have been working to provoke the mark, try to make his actions look like they were unprovoked.

10.8 Spousal or Child Abuse

Very often as the harassment continues or builds up at work, a vulnerable mark may vent his anger on his or her spouse or children. Reports of increased violence in the home are a good sign that the techniques you are using against the mark are working.

10.9 Death

It is not uncommon to have people in the mid thirties to die from heart attacks in the workplace; however, you are most likely to see this result when driving out older workers.

10.10 Suicide

Subliminal harassment can enhance depression and result in suicide. You know you are good if you get this result.


10. Job Interviews

This is the other half of the job. Now that the person has been harassed out of their previous job, it is now your job to humiliate the mark who has now come to you looking for a job. You will be re-inforcing all of the ugly experiences to really put the message to the mark that they are not welcome in industry anymore. Your goal is to make the interviewing experience so  embarrassing and hostile that they will not want to repeat the experience. Since all of your real employees will be immigrants on visas or recent college graduates who where recruited just out of the major universities., your victims will be people of no consequence - nobodies who sent you blind resumes as a result or newspaper ads, online research or bulletin boards.

Although the techniques in this section are designed to be used onsite in one-on-one interviews you can also apply them to other situations such as job fairs where you are trying to discourage a large number of job seekers at one time.

Remember, you are not interviewing this individual because you are seriously interested in giving them a job: you are merely confirming your preconceived notion that they are not qualified so you can be justified in hiring a cheap visa worker and discouraging them from continuing further job search. (The exception to this rule might be if you think they are attractive and you are hiring them so you can have sex with them. When hiring non essential personal, think of it as if you are hiring a sexual partner. Don't even consider hiring them if you would'nt mind having sex with the every night for the rest of your life.)

You might consider giving them a preemployment screening test to humiliate them before the formal interview begins.

Once the mark has filled out the application and check the box that says its OK for you to contact the previous employee, give a call to the human resources person, company attorney or former boss at the mark's previous employer. Ask them about age, religious affiliations, quirks, fears, sexual orientation, partner preference, drug or alcohol use or what indiscretions the mark is guilty of and the most effective harassment techniques to use on them. Remember, there are no legal restrictions on what information the previous employer can give you. Human resources personal have special legal immunity from civil and criminal prosecution for passing deliberately false, damaging information about previous employees to potential employers. Even if they knowingly give you a bad review that is later proved to be false, there is no legal liability on your or the previous employer's part. Human resources personal can deliberately pass damaging false information about an former employee to a potential employer under the cover of alleging that the former employee engaged in  criminal conduct (e.g hacking, theft or corporate espionage) without any proof.

If possible, contact the department of the college or university that the individual graduated from. The computer science departments of most colleges and universities are essentially just divisions of local corporate interests and the form of government racketeering being practiced in that area. Try to get a hold of the department jerk or spook who are willing to put you into contact with previous employers who have grievances against this individual or give you more useful information to use against this perspective employee.

In some rare cases, one of the former employers of the mark or a Federal law enforcement agency will ask for your help to find out:

In this case the only modification to the interview process, is it ask them about their knowledge of internal documents and accounting procedures of their former employer sometime during the interview. The former employer or Federal agent will tell you what to ask about and how to report back to them.

If is not apparent how old the mark is check their age. Although, it is illegal to directly ask them how old they are, there are several loopholes:

During the interview process, send in younger people to interview the  perspective new employee. They will see a bunch of "younger" people and be intimidated and this will trigger the age guilt trip. Since all the people in authority seem to be "very young", they will hopefully get the message that "older" workers are not welcome.

Concentrate on why the mark left his previous job, since he was humiliated out of the previous one, forcing them to confront the issue again during the interview will increase the discomfort of the experience.

Based on their resume, find out what their language of exclusion is and query them extensively about it concentrating on the more esoteric and obscure aspects. The official propaganda fed to the politicians and supported by the universities is that softwares engineers should be generalists who can pick up new skills on the job, so you need to double-cross them by demanding previous experience in specific skills. Therefore, the trick here is to be able to gloss over the fact that they could be re-trained or pick up the new skillls with a little self study pretty quickly. You could do this but you just don't want to.

In a similar manner you can use their previous experience in creating documentation as an excuse to exclude a individual. In the defense sector of the economy, a lot of defense related tax payer rip-off involves the processing bogus customer bug reports or creation of bogus documentation to skim or launder money. This is most common in the tax payer subsidized boondoggle "think tank" eugenics wings of the big defense contractors. In many cases, this is the only activity of a government boondoggle. Contrast this with legitimate companies where there often is no "formal" documenation standards- the type and form of documentation will vary widely - only enough documentation is created to get the job done. During the interview ask them if they have ever "done documentation" (translation: money laundering or skimming). Try to convince them that because they have never done documentation like your organization does it, they are not qualified to have the job. Surprisingly, a lot of weak minded dupes can be convinced that they could not pick up the new documentation skills even though they have obviously done so in the past.

Use the techniques outlined in Subtle Verbal Harassment. Increase the humiliation with verbal repetition asking about things outside their area of expertise. Make them repeat themselves by asking the same questions in slightly different forms over and over during the interview especially if you find subject that make them anxious. Keep going at them until they finally break down. Alternate, between verbal repetition and steam roller for maximum effect.

Ask them why they are doing so much job hopping even if their resume indicates steady employment.

As you are reading through their resume, laugh or giggle periodically. This is intended to make them think you are laughing at their accomplishments or qualifications.

If your department or company is Federally protected DOJ, C.I.A. or D.O.D. money laundering front and you have any visa workers on salary for intelligence purposes, bring them in to intimidate the individual. Seeing immigrants getting big salaries while they are still out "pounding the pavement" hopefully will increase the level of frustration in native workers.

It is during this period that you will be sizing up the mark in the event you decide to take on the challenge of bringing them in and using subliminal harassment on them.

Review the topics outlined in the Introduction to this document, during the interview ask yourself the following questions:

If you decide to pass on the individual, jerk them around as much as possible before you send them on their way. Pass them around managers and executives who have been trained in the techniques outlined in this document. The goal is to make the memories of the interview as unpleasant and embarrassing as possible and make them fearful of repeating the process.

If you decide to take them on, then you need to make a decision about salary. If you are planning to move them out quickly, then give them a fairly large increase in salary. This has two benefits because it:

If you plan to be harassing them for a somewhat longer period then give them less of a boost or even a cut in salary since it saves a little money and they are desperate for job and at your mercy.

If you are just going to blow them off, you might try one of the techniques used extensively by defense contractor jerks: the "D.O.D. goodbye": You escort them to the door keeping a indignant look on your face and show them out without any cordial salutation. Abruptly showing them the door and sending them on their way with little or no comment can often cause psychological hostility. An added touch is to have company security standing around looking intimidating.

In any event, build up their expectations up by making them believe that you are seriously interested in their career and that you have interesting fofilling work that they are ideally suited for. All of this, of course, is a lie. You are just setting them up for the harassment scenarios outlined in the beginning of this document.


11. The Final Solution

If all else fails and the employee is still sticking around, the final solution is to use a combination of effort by the employer and local law enforcement to criminalize the employee by their concerted action. The company lawyer or attorney can help here. Most lawyers have worked with the county or state attorney generals offices and local law enforcement. Given the word from a powerful company, they can put the machinery into motion to have the mark setup-up, framed for a crime or otherwise rat fucked. This is especially effective if they are gay or a recreational drug user since most law enforcement agencies target them anyway. The public humiliation, costs of defense and time involved  including time in jail make it extremely unlikely that the mark will be able to continue in your employment.


12. Looking Toward the Future

As was pointed out earlier in this document, corporate welfare began with: In the late 1970s, as the space race and the Vietnam war boondoggles ended, the Washington Elite, Wall Street insiders, the Berekley Class of '68 Democrat and the creative accounting wonks with the Big Five developed the tech industry to replaced it. As politicians and  lobbyists lose interest in tech, look for increased Federalized racketeering in the form of the same types of tax proping government sponsored scams, cons and rackets in the homeland defense,home loan/mortgages, real estate development, Indian casino gaming and government health care industries. Therefore, the demand for highly trained subliminal harassers and corporate jerks will continue for many years to come.

However, there a several gave threats to creative accounting and corporate welfare:

Have your lawyers and lobbyist do all they can to sabotage these efforts at both the state and Federal level. It is important to leave all of the loopholes amd set-asides in place so they can be used to setup up future profitable government rip-off scams after the current generation of dupes have died, disapperared or otherwise been driven out of the labor pool (See: Jobless Recovery).


13. Glossary of Terms

401K: financial instrument that allows a company to pretend to pay its employees but actually keep the money or give it to the insiders on Wall Street if the stock market crashes.

aggressive: fraudulent. For example, aggressive accounting or aggressive hiring.

baby boomers: people born in the rapid expansion of the U.S. population after WWII-generally, between the years of 1945 and 1964. These individuals are now approaching retirement.

Big Five (Accounting Firms): the five largest corporate accounting conglomerates in the U.S. which each have large "puppet" software consulting wings. Since Federal and state governments have contracts with them, the jerks that run these companies actually control the politicians and set government policy. They are often directed by Wall Street insiders and depend on accountants and lawyers to drive the process of creating new and innovative technology rather than legitimate R&D. They pioneered the concept of the corporation as abstract accounting entity that paved the way for the tech boom and Dot Com debacle.

billable seat: a position in a company that is used as an creative accounting trick to funnel money in from a customer account into the organization. Tasks assigned to individuals in these types of seats are scoped for failure or designed to have as little traction as possible to make them tedious and frustrating. Since the work performed in these positions is not essential for the actual operation of the company and workers are easily replaceable, they are generally high velocity seats with the individuals occupying them the targets of subliminal harassment or victims of jerk farm type of corporate training mills.

body-shop: a bogus consultancy company setup in a foriegn country like India or China that uses loopholes in the L1 inter-company transfer program to import cheap IT workers into the U.S. and then "farms" them out to American companies displacing American workers.

billable: adjective that generally describes an individual whose work within the organization that is not part of any legitimate revenue stream but used to fill slots for tax purposes or launder money with tax payer subsidized scams such as fix and shuffle.(See: dupe) This type of person is generally being subjected to the techniques outlined in this document to make their work environment hostile.

boondoggle or "pork barrel": a valueless project funded by the government solely as a political favor to enrich the special interests that actually run the Federal government with the added side effect of proping up the tax base(See: Giveaways). Often referred to as "pork barrel" spending. Federal front companies formed in the 1960s would have names like Boondoggle Aerospace scamming money out of the government for bogus radar/sonar systems and aircraft that never fly. In the 1980s it would have been Boondoggle Software scamming money off the government for bogus military wireless and logistics systems. In the future as the new economy tech government sponsored corporate scams loose their political appeal, you will see the void filled by Federal boonedoggles with names like:

Modern versions of the old "cold war" boondoggles are now showing up as the "government" divisions of wireless, telecom, software and Internet companies. You will see bogus ads for jobs given to returning service men at these types of setups after each successive middle east war(See:Washington Eugenics). Likewise, the new Department of Homeland Security will provide new opportunities for the "good old boys" to profit from new Federal spending in the aftermath of "911".

bug: a variation of a previously defined working model that deviates form the definition of the demonstrable unit defined during the software engineering process.

business model: logical or accounting organization of a business or company based on how money or revenue enters, flows through and leaves an organization. Legitimate business models provide services, physical products or add value to existing products or services. Examples of illegitimate business models are:

Remember what Deep Throat said in All The Presidents Men: Follow the money. If you really want to know what business a company is in, just watch where the money comes from and where it goes.

butz or butzing: from Professor Butz - Rube Goldbergs intellectual alter ego that found the most absurdly complicated ways to accomplish the most simple tasks. The verb "butzing" refers to using jargon and bogus intellectualization as a "smoke screen" to cover for the lack of a demonstatable prototype when discussing a broken working model or vaporware. As a general rule, you can make any simple problem difficult by intellectualizing it and using lots of jargon as a "smoke screen". Object oriented programing jargon from proprietary software vendor products (like Java and UML) are often very effective at doing this.

capitalism(American): finding clever ways to rip-off the U.S. government, become wealthy at tax payer expense and then pretend that you did it all by yourself. Later, as an added bonus, you can out source your company off shore to make even more money by dumping American workers.

Central Intelligence Agency: the U.S. government agency responsible for intelligence gathering outside the United States. They have lots of money, little or no oversight and no transparency. Aerospace companies and divisions of large multi-national corporations are often fronts for C.I.A operations. It is ironic, that to fight communism, the U.S. actually setup a form of American socialism with a system of government run companies.

cheap help: corporate cost cutting technique that involves the practice of keeping labor in the lowest paying tier. This is done by creating high rates of turnover that effectively keeps workers from advancing to the higher paying levels.

clinton jobs or gentile jobs: bogus jobs used to prop up the tax base that were created during the Clinton presidency and represented most of the job growth in the US during the 1990s and the IT build up. They all disappeared with the dot-com crash in 2000 leaving millions of American workers, who were stupid enough followed Clinton's advice and get technical degrees, destitute and unemployed. Thanks, Bill!

computer generalist: mythological job description prompted by Microsoft chairman Bill Gates and others during the early part of the IT build out in the mid to late 1980s which was supplanted by the math and science myth circa 1995. In its simplest form, this lie maintains that ideal employees were "generalist" who could quickly pick up new skills or be retrained on the fly. However, by the mid-1990s the domestic American labor market had become super saturated with expensive aging native born workers with CS and EE degrees, so a new myth for the politicans had to be invented to discriminate against them. Therefore, the new buzz work became shortage of math and science skills although studies by all the major thinks tanks showed that no such shortage of scientists existed either.

conditioned response: a physiological response to outside stimulus programmed into an animal or human by associating a external stimulus with some experience that generates the response. The pioneering work done by Pavlov and his dogs is an example. By associating the ringing of a bell with feeding, he was able to make his dogs salivate even though no food was present.

corporate block grant: the successor to defense contracts of the 1960s and 1970s used as form of corporate welfare involving Federal government handouts to corporations and used by politicians to funnel money into the coffers of their political supporters and to fund "pork barrel" or boondoggle projects. Since these corporations need officers and boards of directors, these type of grants are used to employ women and minorities in bogus front companies that are actually run by "good old boy" executives and lawyer lobbist types from the established companies.They are perfect for laundering and skimming money from government sources or setting up partnerships. During the Dot Com boom, politicians used these grants to fund startups for their supporter's "pet" projects  or immigrant  visa mills for their favorite nationality.

corporate welfare or American socialism: Federalization of the economy through direct government subsidies given to corporations and industries through a complicated network of lobbyists and Federal front companies. By the beginning of the 21st century, the boundary between civil political governance and corporate governance had completely disappeared. The executives that represent the special interest that actually run the government, just spend their careers jumping between goverment jobs and corprate jobs. Historically, this was done by allocating lucrative defense contracts for bogus military systems but with the end of the Cold War it was replaced with corporate block grants in the tech, software, telecom and Internet boondoggles. A popular modern version of the old boondoggles used to employ returning veterens from the middle eastern wars are the "government" divisions of wireless, telecom and software companies. You see ads for these positions targeted tword military people at the ends of these conficts.

cost plus contract:in the golden era of aerospace, the government would set aside a chuck of cash and companies were allowed to bill the government for additional costs to fofill the contract. The alternative (see billable) put in place in the 1970s after the space race concluded, is to force employees to match hours worked against a billable account - essentially pulling work out of nowhere. This effectively turns salaried worker into wage workers for accounting purposes. Most often used with the Time Sheet Harassment turn-over technique.

creative accounting: the use of stock options and intricate tax deals to hide debt, sham transactions and software licensing scams to inflate publicly reported profits and mask money laundering and skimming operations through off the book partnerships and startups. It thrives in the U.S. economy due to the deliberate lack of transparency in corporate and government accounting and cold war era defense and intelligence boondoggle spending.

curn and burn: polite term of the management style used in companies to maintain a high turn-over usually to dump workers after mergers or acquisitions.

dead pool or death/concentration camp: a small company or division of larger company where problem employees or older workers are dumped. Often this is the last stop for workers who are being harassed out of the labor pool(See: Jobless Recovery). High turnover tactics like those outlined in this document are used to create a hostile work environment. When locked into this type of environment and with no ability to get out, workers will often behave in a hostile manner tword each other(See: herd mentality). These were developmed as part of Washington corporate government eugenics policies of the cold war era. The American tax payer now subsidizes this practice through its de facto successor the tech and e-commerce boondoggles.

death row: a row of cubicles or section of an office where people who are being turned-over or being disciplined are placed. The area should be carefully chosen so that the various techniques discussed in this document and be implemented easily. Very often this area will be covered by some form of electronic surveillance and activities recorded for later review. Send out your accomplices to practice the various technique outlined in this document on the individuals you have placed here. Afterwards, you can review the video tapes, critique their performance and give them tips and helpful feedback. Very useful for setting up a jerk farm for training a new generation of corporate jerks.

desperate labor shortage: myth created by Washington tech lobbyists and software executives to justify perjury before Congressional hearings in which they gave false testimony that there is a desperate shortage of workers with programming and software engineering (after 1995: math and science) or rare worker skills. Used as an excuse to flood the American labor market with cheap visa workers under the pretext that native workers are poorly educated and motivated. This served four purposes, it:

Department of Defense (D.O.D): the government agency responsible for financing, maintaining the military and intelligence capabilities of the United State of America. People in this organization are fofilling and important role in maintaining a freedom and democracy worldwide. But they have an unlimited budget, little or no oversight or accounting transparency and love to spend tax payers money often inventing threats when none exists to keep busy. The D.0.D. also represents the closed system eugenics wing of the colonial American social system creating a safe reproductive environment for government approved genenomes.

Dot Com (Internet Bubble): an expansion of the Silicon Valley startup model to the general economy as a result of commercialization of the Internet and the expansion of the Federal R&D Tax Credit, government subsidies, tax incentives, legal exceptions, corporate block grants and educational grants during the 1990s. This was done by gullible politicians and individuals at all levels of government with the delusion that a wider, national expansion of the Silicon Valley startup model would create new jobs and wealth. The frenzy to join in on the expanding scam had the side effect of giving insiders who owned large blocks of telecom and technology stocks, an opportunity to feed the media hype and drive up stock prices and then pump and dump them at huge profits before the bubble burst wiping out retirement funds and leaving the innocent tax payer, investor and retiree with reduced services and higher taxs in the years to come. In fact, all of the so called new economy jobs and wealth generated during this time just disappeared.

drive by capitalism: term used to describe the dot-com era phenomenon of creating bogus companies and then "blowing them out".

dupe: a individual who is unaware that they are being used solely as an excuse to bring revenue into the organization and to prop up the tax base. The universities make money off them when they get their degree, then the companies make money off them by using them in billable slots for three or four jobs after which they are locked out and never work in industry again. At the same time these individuals are being kited around, visa workers are doing the actual work - in preparation for out sourcing the jobs at a later date. In the golden era of aerospace racketeering, entire divisions of boondoggle companies of dupes would be kept on staff  and then laid off to blackmail politicians into funding lucrative defense contracts.

e-commerce or e-business-to-business company or Internet division: front company or division of a large national or multi-national company used for money laundering and skimming operations with strategic partners often setup by one of the Big Five consulting companies. Many traditional brick and mortar companies setup e-commerce divisions or departments during the height of the Dot Com hysteria as a place to dump all of their problem employees - substance abusers, mentally ill or just physically ugly people - and run side businesses running the startup scam.

ethnocentrism: the view that ones own culture is inherently superior to that of all other cultures and societies.

fight or flight response: the physiological state of distress and panic that results for stress in the environment. The typical subjective sensations are accelerated heart rate, sweating, dilation of the eyes, release of adrenaline and a general feeling of panic and fear. In closed offices or areas of poor ventilation, pheromones released by the sweat glands can caused the effect to spread from individual to individual and room to room. When this is triggered in primates like humans, very often the reaction is to become hostile toward individuals perceived as vulnerable within the group(See: herd mentality).

generation X: term coined by Douglas  Copeland's his book "Generation X" which describes Americans born between 1964 and 1980. This individuals are now approaching middle age.

genius fallacy: the mis-guided notion that if person is "smart enough" and motivated enough, any task they are assigned is completable. It does not take into account artificially contrived situations in which the employee is being setup for failure. Any tractionless task can be scoped out so that it appears to be a legitimate task but the problem is so vaguely defined or a solution is not possible or the tools to carry out the task are withheld. People who subscribe to this philosophy are good targets for subliminal harassment, since they have subconsciously absolved management of all responsibility  for determining employee skill sets and assigning employees appropriate, legitimate work or re-training them with new skill sets.

goon: in organizations like the mafia, the military, certain religious groups or defense contractors, an individual who is employed to intimidate, harass or physically harm targeted individuals who pose a threat to the organization or the industry status quo.

government ripoff save zone: these are areas of the United States like Washington, DC, Orange County, CA, San Diego, CA, the Bay Area of California, Arliington, VA and Charlotte, NC where there is an established corporate political machine to aid and abet in organized goverment racketeering and ripoff.

headhunter : these are the vampires of the IT and software world and in many respects similar to lawyers in their ethical behavior. They are basically freelance spies for employers who will screw you under if you are not a hot IT commodity. You will find these organizations masquerading as legitimate companies in newspaper ads and on job hunting websites. Rest assured that if one of these leeches gets a hold of your resume from an online service, the first call they make will be to your boss. When doing job search, keep lots of garlic, wooden stakes and crosses with you because these unfortunate individuals are out there. There are no laws governing this profession and corporate recruiting is unregulated. These guys can destroy careers.

herd mentality: the property of herding animals to behave as a group especially in targeting weaker members of their herd for sacrifice when a predator is near by.In the office environment this phenomena can be observed in humans, when individuals are being tarred with subliminal harassment to be driven out of the company, the other individuals in the office will sense that the mark is being harassed and will either willfully or subconsciously engage in the process and be relieved when the mark finally quits. By helping dump the mark, others will feel more secure because while someone else is being the target, they themselves cannot be a target and they feel more secure. Herds of wild animals when being chased by a predator will often pick the weakest member of the heard and try to feed it to the predators to save the rest of the herd. Pheromones enhanced in a closed space can trigger hysteria and hostility toward the mark. For some reason, groups of individuals who are driving individuals out of their group seem to collectively think that the targeted individual has a responsibility to leave just because the others want them to leave. If the individual is stubborn and refuses to leave voluntarily, the group will often perceive that the targeted individual is acting in a hostile manner towards them simply because they won't take the hint and go. This can be used to provoke the targeted individual into reciprocal hostility towards the group even if it did not exist previously. See: Dead Pool

high velocity seat: a physical location such as a cubicle, office or desk that is located in a part of the building that has a hostile physical environment. Individuals are placed in these locations to facilitate the person who is occupying it departure from the company as quickly as possible(See: Gas Chamber). The work performed is generally irrelevant billable tasks. The physical environment is generally extremely hot or cold with poor circulation often with molds, pollens or other toxic substances left deliberately to cause allergic reactions and mild health problems. People assigned to these seats are generally given out the door tasks

idiot savant: an individual that  possess exceptional skills in narrow areas such as music or math but major deficits in other areas. Due to government eugenics policies and because they often show high IQs on paper tests, defense companies often have entire departments staff with these types of people under the mis-guided notion that helping mentally deficient people reproduce is beneficial to American society. These were the autistic nerds or mentally abnormal people who in the 1970s and 1980s hid out in the school computer room; and through a unfortunate quirk of fate ended up in positions of authority in the DotCom era. They often double as company jerks and are ussually supporting antiquated 30 year old technology like UML, C++, Java, Wireless Systems and M68000 processors at tax payer expense.

jerk: an individual, idiot savant, corporate goon or line manager type of person who uses intimidation, harassment to manipulate, psychologically molest and control workers, subordinates or customers; however, their primary job is to turn-over employees. Besides throwing fits, they often accomplish this by using psychological rape or other techniques to build up the mark's expectations and then "crash" them. Generally, they put forth a image of the kind of people you want to avoid. The jerk is the "front soldier" for corporate America. The store managaer, department head, snobby receptionist, the company bureaucrat, claim adjuster, account manager, these are the human "obstacles" that are used to slow you down and discourage you from getting what ever it is you want from corporate America. They also maintain the status quo and "lock out" members of underclasses from the main stream economy. They are as important as the "brain trust" and there is always demand for them at all levels of the private and public sector. The term may have originated from the retarded, jerky body language of mentally abnormal individuals that they use (sometimes subconsciously) to intimidate, molest, frighten, harasses or disgust others. Individual who are autistic, schizophrenic, neurotic, psychopathic, pathological liars, alcoholic, drug addicts or have other behavioral abnormalities are often unpleasant or intimidating to be around and are ideally suited for these positions. These types of mental fuck cases are most useful in dead pools where problem workers can be dumped. The "mother of all" jerk farms is the military which trains it members to harass, exclude and discriminate against members of many under classes - all at tax payer's expense. These people enter the civilian corporate management through many D.O.D. to civilian feeder systems.

However, jerks in the software world often come from the computer room rather that the military. In the 1970s and 1980s, the mentally abnormal individuals described above were often sent to the computer room in high school to keep busy since idiot savant types seem to respond to computers. Therefore, a lot of mental fuck cases found there way into the corporate structure where, though a unfortunate quirk of fate, were put in charge of making decisions for a large segment of the economy. (See: DotCom) The emergence of the IT departments managed by private corporations in state and Federal government has lead to unelected bureaucrats with mental problems actually running the government - the gullible politicians merely "rubber stamp" their decisions on public policy.

hysteria: a contagious mental condition which manifests itself with delirium, rage, incoherence and other forms of irrational behavior.

job hopping: moving from job to job in an attempt to build up work experience in whatever new language of exclusion is currently being used to discriminate against workers. Although, the people doing the hopping think they are doing it voluntarily they are more likely being kited from job to job.

jobless recovery(structural unemployment): generational dumping of workers by the government and big business in which large segments of the American workforce become unemployed during a down-turn in the economy but are not hired back into their former profession when the recovery is complete. This is also referred to as structural unemployment. It it implemented by demographic shifting - moving older workers into positions or companies that are eliminated completely and back filled by immigrants on visas or outsourcing to foriegn countires. After periods of expansion in the economy and after corporations have made lots of money and the government sponsored scams and giveaway programs have lost their appeal, workers are fired and layed-off in large numbers to kick off the recession or put it in high gear. Since the beginning of the era of government give-aways and corporate welfare, this has occurred twice:

kick back: an illegal, secret payment made in return for a referral or favor which resulted in a transaction or contract. Used extensively, in the software, defense, casino gaming, healthcare and mortgage/real estate industry to repay favors related to kiting employees between companies.

kiting: similar to kiting checks in banking and used in bogus startups. This involves hiring and then turning over an employee as quickly as possible so that it appears that the individual is moving quickly from job to job but not staying anywhere too long. This is used to effectively destroy their careers by making sure that they are never given real responsibility or legitimate training in newer technologies. HR can spot an individual being kited because there will be many jobs of short duration and periods of unemployment on the resume. The politically correct term to cover up the practice is job hopping. This technique was perfected by corporate governance during the 1950 and 1960s when defense spending was used to prop up the tax base for the WW2 baby boom genteration.

know your customer: banking policy in the U.S. implemented by the F.D.I.C to comply with international laws designed to detect illegal money transfers ( money laundering) and the identification of tax evasion attempts. Under KYC regulations, every financial transaction will be monitored, and all banking activity will require identification. Anyone who will not provide identification will not be allowed access to banking services and the institution must make a suspicious transaction report. It is interesting to note that tech scams and bogus startups rely heavily on the R&D Tax Credits so the U.S. government is actually subsidizing the money laundering that it implemented the KYC rules to stop. Since many other nations including nations hostile to the U.S. have intelligence gathering tech front companies inside the U.S., this makes the U.S. the only nation whose tax policy, loose immigration policies and accounting standards are used to deliberately give sensitive personal information about native Americans to foreign intelligence services and to subsidize the intelligence gathering and terrorist operations of it's enemies. Note: Tax payer subsidized US governemnt money laundering front companies are exempt from these laws.

L1 Visa: intra-company visa transfer program similar to the H 1B Visa program. Used more within companies that have divisions in different countries. Corporate America has setup "body shops" using companies based in places like India, to use the L1 loophole to import cheap IT workers and then "farming" them out to American companies at greatly reduced wages effectively crowding out native American workers.

fudd

labor arbitrage: the corporate practice of using progressively cheaper labor to increase profitability. This is most often done my moving production of tangible items into dirt cheap third world countries. The difference between the labor costs between US based operation and foreign operations can be booked as revenue using the same capital and technology that formally employed workers in the US. Another form of arbitrage, is the use of the corporate slot system to keep most routine work at the lowest level tier and reduce costs by maintaining high turn over. See: cheap help. Although originally developed in traditional brick and mortar unionized industries with graduated pay scales, it has become the technique of choice in tech companies.

language of exclusion: a new computer programming language introduced by one of the big software monopolies and used by the big defense companies to discriminate against programmers already working in industry. The first was C++ which replaced ANSI C which was the standard for over 15 years before 1990. The second was Sun's Java which was released in 1995. Currently, Microsoft C#/.NET is the new language of exclusion. This works because for two reasons:

As the big software monopolies fade, look for discrimination based on different criteria. For example, platform: look for words in ads like "wireless", "embedded", or "M8600" and etc. as an excuse to exclude workers from consideration.

legal telepathy: the method used by lawyers to communicate information about clients and cases to other lawyers or outside parties like companies circumventing attorney client privilege. In most cases it involves a lawyer "tipping off" and employer when a disgruntled employee consults them about workplace harassment.

mark: a victim who is hired and then targeted for subliminal or overt harassment to be quickly driven from the company. These individuals of are oftem used as dupes to fill billable slots to prop up the tax base in money laundering and skimming operations of government sponsored corporate scams or to "pad" out the front of startup or ecommerce scams. It is best not to think of them as human beings since you are destroying their lives. From the slang term for the target of a "sting" or confidence scam.

math and science labor shortage myth: myth created after 1995 to supplant desperate labor shortage myth of computer generalist. It began to appear in perjured testimony of corporate executives and lobbyists about 1995 at the same time the profitable digital divide myth was invented.

money laundering: the covert movement of funds circumventing the scrutiny of conventional banking system and its auditors under strict Know Your Customer Rules. It is the third largest industry worldwide and has been historically this has been associated with money obtained from illegal sources such as drugs; however, large corporations and government agencies often use partnerships and software license scams to distribute funds to avoid oversight by regulators and foreign governments, hide profits or loses from investors or the IRS or as cover to keep D.O.D. projects in the "black" and fund covert operations aboard.

mooning: the act of bending over to expose the buttocks to cause sexual arousal. Generally used with male homosexuals. For heterosexual males or Lesbians, a variation used the female breast showing cleavage as well as the buttocks.

napkin: a powerful design tool that does NOT require 128MB of memory, 20G hard disk space, a Pentium II or higher processor and an ungodly grotesquely wasteful high license fee paid to a bunch of greedy, brain-dead, has-been Silicon Valley crooks. Doodles and designs scribbled onto napkins has lead to the invention or development of more than a few important gadgets and concepts including: the transistor,the PC, the DNA double helix, the integrated circuit, the FAT file system, the El Torrito standard and television to name a few. It does, however, require a few other "peripherals" to function: open intelligent conversation and collaboration, and often, caffeine, good food and sweets to facilitate intelligent thinking. Difficult to give people in government boondoggles busy work with this tool. To do that, use UML.

NASA(National Aeronautics and Space Administration: a tax payer subsidized eugenics program to facilitate the reproduction of people of European desent in the Texas area. It's mission is to help frogs and spiders colonize outer space.

nervous vocal edge: a human voice that sound anxious or frightened with a high frequency "edge" to it can create a reciprocal response in the hearer. With practice this can be used to trigger the fight or flight response in individuals or groups.

new economy or Clintonomics: a mythological segment of the economy separate from defense and the other traditional brick and mortar types of industries that experts predicted was non-cyclical and would provide thousands of new long-term high paying jobs every year for decades to come. However, it turned out to be an social delusion invented by the media, Sillicon Valley and Wall Street insiders characterized by expansion of the Silicon Valley startup scam, pump and dump stock scams and general expansion of the type of government subsidized money laundering and eugenics giveaway policies that were formally only found in the defense industry. As you can see there was nothing new in the new economy just the same old government scams with new names. All of the paper wealth and bogus short term jobs it produced "just disappeared" leaving hundreds of thousands careerless. It's proponents exaggerated changes in the American economy, overestimated the benefits of technology, and abandoned careful analysis in favor of blissed-out utopianism while insiders cynically made millions off the public's delusion. The web sites of e-commerce companies running various types of money laundering and skimming operations use this term copiously.

out source: the process of moving high paying jobs to third world countries where the labor costs are significantly less.

out-the-door task: a tractionless task whose unit of work is deliberately designed to be menial, tedious and unpleasant inorder to create a hostile work environment designed to facilitate the individual's departure from the company. Individuals targeted for these kinds of tasks are generally placed in high velocity seats.

oxymoron: contradiction of terms. Classic examples are "military intelligence" and "computer science". The former because many individuals cannot find intelligence in the military and the latter because there is no real science in "computer science" as practiced in the software industry. A true science requires repeatability, independent verification and full disclosure - three things would mean a lot less work for software engineers and destroy the big proprietary software monopolies running software licensing scams that depend on the broken working model and bogus intellectual property rights for their business model to work. Additionally, a true science pits the intellect of the scientist against the inscrutability of nature that make no conscious attempt to hide information from them or give them bogus work to keep them busy.

partnerships: the companies and individuals that a bogus front company engages in money laundering or skimming operations with usually in the form of sham transactions or software licensing scams. The ones listed on official company documents are the legitimate parts of the front used to mask the secret partnerships that are not disclosed to regulators. If you go to the website of any of the so-called new economy companies, there is usually a link to a page listing them.

Pantomime horse: a slot or position in an organization used sole to employ individuals such as the kids or in-laws of executives, lobbyists or other individuals who the organization my find useful to keep on payroll but cannot find a legitimate position for and cannot perform useful work. From the the Monty Python sketch of the same name. These  individuals are generally not targets of subliminal harassment.

peer pressure: subtle social pressure (generally non-verbal) exerted by members of a group to make individual members conform by arousing fear within the non-conforming individual that if they don't conform their behavior to what the group perceives it should be, they will be ostracized from the group. For example, in an office where the management coerces individual to work late hours without extra pay, individuals leaving early might get dirty looks from other member of the department when leaving the office. Another example, would be keeping everyone in a department busy with work but withholding work from specific individuals.

pheromones: airborne hormones or chemical messengers responsible for triggering feelings of hysteria, sudden fear or panic often in a closed poorly ventilated space such as an office. They are similar to blood borne hormones such as adrenalin; however, these chemical messengers move through the air and effect large groups of people even creating a "chain reaction". It is believed that they are responsible for group behavior such as mob violence in riots and hysteria. See Herd Mentality.

protected class: any group of underclass people designated as such by Federal and state civil rights legislation. Currently includes ethic minorities, women, religious groups, the handicapped, gays and Lesbians.

professional services organization or software consulting: a business organization that does not provide a distinct product or service but provides services to other companies. They offer office space and personal to projects out-sourced to them from other companies. Basically a bunch of rich "old boy" lawyer accountant types playing with people and bank accounts. These organizations are the perfect cover for smuggling, money laundering, skimming, e-commerce and other illegitimate operations where legitimate activities and creative accounting and software license scams can be used to mask illegitimate ones. The Big Five accounting firms and their "consulting wings" driven by Wall Street insiders often engage in this type of racketeering.

programmer as celebrity : the phenomenon of the Dot Com era to treat computer programmers as celebrities. Every generation has one educated class that it venerates. As a result, the government will often create incentives to encourage people to enter these professions and import them with visa programs. The universities are happy to help by turning them out in large numbers. Inevitably, Washington corporate governance will use these professions to prop up the tax base and create bogus jobs for government eugenics purposes. During the Second World War it was mathematicians and code breakers. During the space race of the 1950s and 1960s, it was the "rocket scientist" or aerospace engineer. Computer programmers and software engineers were their successors in the 1990s.

pump and dump: scheme to fraudulently drive up the price of a stock so that insiders can sell their shares at the peak and reap big profits before the price of the shares plummets and gullible investor loose their money. During the Dot Com boom, many tech companies were setup to rip-off small inventors caught up in the hype.

put out for it: slang term that refers to engaging in sexual relationships to be hired, continue employment or advancement.

put out policy: unofficial company policy on quid-pro-quo sex for work, advancement, salary or work.

racketeering: a illegitimate business model that purports to be a legitimate business that provides legitimate products and services on an open market but are actually just launders or skims money of of public universities, government corporations in defense or mortgages and home loans or healthcare with little or no added value often using software licensing scams.

rare worker: a mythological worker with special or "hard to find" skills that employeers use as an excuse to give preference to visa workers and exclude native applicants. Often lobbyist and executives will use the "rare worker" myth to confuse the issue and redirect attention away from the fact that they are using L1 and HB1 Visa workers to replace native workers with more common skills with cheap disposable visa workers.

research and development tax credit: U.S. companies are now allowed to claim 150% of any research and development costs as a deduction. This means that anyone that can incorporate and set up a bogus R&D department and get an additional 50% relief for any costs they will incur, including staff costs and rent on workshops and offices. This has led to the U.S. government actually subsidizing the money laundering operations of foreign intelligence agencies and criminal and terrorist organizations at the tax payer's expense.

reverse engineering: this is reputed to be the opposite of the forward engineering process. The forward process take a observed process and creates software to automate it. The reverse process is to take the working model  demonstrated by the software working model and logically deduce the originally defined process from it. Thus, reverse engineering is not possible with out a transparent demonstrable working model. An simplistic example of a forward process would be something like: I performed an operation and got the number 4. A reverse engineering task might be: The number is 4; how did I get it? This leaves the engineer with only E.S.P or divine intervention to solve the problem since without a working description or transparent working model, the answer is an infinite number of operations and numbers. This can be used to generate useless, unproductive tasks in conjunction with The Broken Working Model. A non software related real world example might be to take a immigrant lawyer with no knowledge of the U.S. Constitution then give them a copy of a divorce case and a personal injury case, then instruct them to reconstruct the Constitution of the United States word for word based on just the two documents given. Somewhere out in the infinite universe there might be someone smart (psychic) enough to do it, but is the a legitimate task for a lawyer? Probably not. But, many software engineers afflicted with the genius fallacy can be fooled into treating reverse engineering like a legitimate task even if there is no working model to reverse engineer.

R.I.C.O: stands for Racketeer Influenced Corrupt Organizations and the civil and criminal penalties are set forth in 18 U.S.C. 1963 through 18 U.S.C. 1965. RICO is generally a violation of these Federal statutes which define RICO, provide for civil and criminal actions based on RICO and set the damage standard.

sham transactions: transfers of funds from one company to another or within the same company for bogus products or services as part of creative accounting schemes or money laundering operations. The type of bogus products or services that serve no legitimate business include software licenses, dark fiber bandwidth and Internet advertising slots.

skimming: the corporate welfare process of siphoning off funds from one company such as: companies in bankruptcy, charitable organizations, tax payer subsidized "cash cows" like state colleges and university corporations or Federal government companies in the mortgage, home loan or healthcare business with the all individual involved in the process "skimming off" part of the money along the way. One popluar method to achive this is to license a propriatory enterprise type of software product to strategic partners such that the partnering company pays(in addition to the orginal site license fee and fees for bug fixes(See: Fix and Shuffle) additional fees based on the volume of transactions at a customer site. This allows for funds to be siphoned off at a predicable rate.

software: software is consensus that you can demonstrate. It is not intellectual property but the mutual agreement about how people interact with the complicated technological artifacts that they collectively develop.

software engineering: the  collaborative process involving at least two individuals (engineer and end user) of observing and documenting information flow, transfer and modification by human agents or natural processes then creating and disclosing machine code and user interfaces to automate the process in a repeatable and independently  verifiable manner. The legitimate process generally involves the following steps:

Notice that the legitimate process requires NO pre-existing knowledge of the domain being analyzed. It is important that the developers analyze the domain without any  preconceived ideas about how end users and experts perform their activities. The central unit of work is the "demonstrable unit" defined during the analysis phase, implemented by coders and verified by the QA people. Software is what you can demonstrate: if you can't demonstrate it, it does NOT exist. Variations of a previously existing working model that deviates form the definition of the demonstrable unit are called bugs.

scoping a task: the process of creating job tasks with little traction that are designed to be difficult and unpleasant. In a legitimate business model, there is a effort to set and achieve goals; however, to keep people busy doing useless "busy work", this must never happen. Specifically, when creating tasks to harass workers you must NEVER:

The legitimate forward software engineering process has a series of well defined steps to follow. The trick is to get the mark to ignore all that. Allude to a problem but never define it, hint at requirements and processes but never disclose them,use vague lists of items but never allude to a process that can be easily analyzed, documented and coded. The key here is to use poorly written documents (or not documents at all) to trap the mark into the genius fallacy or into wasting time reverse engineering a useless broken model. As a general rule, you can make any simple problem difficult by intellectualizing it and using lots of jargon as a "smoke screen"(See: butzing).

smuggling: the covert movement of valuable physical items such as jewels, precious, metals, valuable works of art, religious items or possibly contraband items across international or state borders to avoid taxes, fees and tariffs. Used by "shadow government" front companies and the U.S. Department of State through its network of embassies to finance covert operations, provide additional income for entrepreneurial government employees, and fund government sponsored drug deals.

software license scams: these are money laundering or skimming scams that involves sham transactions (often using scams like fix and shuffle) between companies involving sale of proprietary software licenses often in the form of discounts for licenses, service contracts or transaction volume fees that allow another company to book a sale or record revenue that they don't really have or to mask fund transfers.

spook: an employee of a government front company who works for the intelligence apparatus but has no visible ties to the civil government. These individual may engage in activities that are  proscribed by laws that apply to government employees.

startup: a business model pioneered in Silicon Valley in the 1970s and 1980s used to take advantages of the R&D Tax Credit, corporate block grants, educational grants and legal exceptions enacted by the government to encourage new legitimate technologies. It is usually fronted by a twenty-something or younger individual to:

In most cases these companies are set up not to create new long term businesses but to merely skim off venture capital and launder money between partners or provide a pipeline for visa workers to become U.S. citizens (visa, green card then citizenship). A very important part of the job of this type of setup is to turn-over native workers to maintain the industry status quo. Very often back in some room you will find people hunched over computers and packet snifters eavesdropping on employees, reading their private communications and engaging in other forms of domestic spying. In government front companies people are hired in hopes they will engage in criminal activity or to be framed for a crime as part of government sting operations. Some startup are started by foreign interests just to create a front to pipeline people from their own country into the U.S. using the lax visa laws and government subsidies to finance the whole operation.

startup scam: a scam business in which a company or  division of a larger company "spins off" a startup that never goes public but runs continually in startup mode, sucking up corporate block grants, government subsidies, educational grants and the ever popular R and D Tax Credit. The goal is to setup partnerships for skimming and money laundering operations. If successful it will evolve into a full fledged tech company. Used extensively by the Big Five to setup off the books partnerships and other instruments to inflate profits and hide debt and to turn-over problem employees. The most common implementation of this type of scam is the e-commerce company.

tech: business racket characterized by government subsidized money laundering that is the de facto successor of defense and aerospace boondoggles from the Vietnam/Cold War era. It is generally characterized as small company or independent division of a larger national or multinational company usually staffed by military or government corporate types (often called "government divisions"). Other characteristics include high turn-over of native workers, an abundance of H-1B visa workers (mostly waiting to get their green cards and then U.S citizenship), money laundering, skimming and creative accounting. These type of companies pretend to produce legitimate products or services, but produce little or no added value to anything. Employees spend most of their time filling out time sheets, being obsessive about charge codes, going to meetings and running up frequent flyer miles rather than doing real work. Bogus fronts like these generally have words like "Technologies", "Industries" or "Enterprises", in their company names. Even Washington lobbyists and lawyers have setup these kinds of fronts - your tax dollars at work!

technology: the legitimate business model of companies using legitimate research and development to create new complicated artifacts that allow humans to either alter the environment in their favor or enhances their ability to favorably interact with the environment. Contrast this with tech which was the 1990s bastardization of this model used to the Washington insider corporate elite to prop up the tax base and siphon of tax payer money into the pockets of their corporate friends on Wall Street and in the industrial military complex.

transparency: the property of a corporate or government accounting systems that minimizes waste, fraud and abuse by allowing easy external oversite and review and not allowing creative counting tricks to hide debt and inflate profits and cover up money laundering and skimming operations. Next to accounting reform it is the greatest threat to government rip-off in boondoggle C.I.A and D.O.D intelligence operations and corporate welfare.

traction: the property of a work assignment that allows the individual assigned to it to define the problem and come up with a realistic plan to solve it. Tasks that are scoped for failure have very little traction.

turn-over: the rate at which employees enter and leave a job over a given period of time or the probability that a given individual will continue in the job for a given period of time. It is how Washington eugenics worker turn over policy is implemented. High rates of turn-over can increase profitability because employees are not around long enough to become expensive. More experienced workers also tend to know all the tricks are less easily manipulated than "fresh" employees. Remember, there is never a shortage of people with technical skills; the U.S. government will bring in as many cheap visa workers as you need at tax payer expense.

UML(Unified Modeling Language): a theoretical dead-end similar to the symbolic AI debacle. It attempted to use graphical modeling of "real" world systems in an attempt to discover unknown or hidden relationships that could be used to create new real world software applications. Acedemic types though it might be a new "calculus" that could lead to new discoveries; however, none of the theoretical reseach ever produced marketable products. The company that sponsored it was disolved and now it is used only in government boondoggles to keep workers doing busy work at tax payer's expense. For a legitimate CAD tool see napkin.

underclass: a subclass of the dominant society whose members are group together because of common characteristics such as race, religion, gender, political affiliation, sexual orientation, age, national origin, physical handicap or educational background who are often subject to discrimination, vulgar or ugly social stereotypes, violence and abuse because their common characteristics are considered immoral, repugnant or  unpleasant the majority members of the society. Members of these classes tend to be under constant stress and have a high rate of turn-over.

under thirty rule: no one over thirty is to be hired, promoted or given meaningful work. Individuals in the mid-career and older are to be keep billable and kited from job to job until they voluntarily leave industry.

university: the base of the corporate feeder system and dumping grounds for corporate jerks whose job it is to prevent underclass individuals from entering the corporate system, economic main stream and high paying jobs. It is the first stop in the software industry "food chain" where people go to get harassed and discriminated against before they enter the workplace. These public corporations are often the source of funds for the startup scam and the target of skimming operations. Historically, they were created to educate people so as a side effect it is possible for people attending these institutions to get skills that allow they to join professions that provide legitimate products and services.

vaporware: nonexistent software products that are created on the fly by sales or marketing people to land customer contracts.

virtually fired: a legal term that refers to the termination of the at-will agreement on the part of the  employer having the manager intellectually decide that the employee no longer works for them and simply stops giving them work. The employer not required to communicate to the employee that their services are no longer wanted. The courts have held that this is still legal even if the employee does not have mind reading skills.

W.A.S.P(White Anglo-Saxon Protestant): a citizen of the United States of Northern European descent who is member of or who family was affiliated with a Protestant Christian denomination. These individuals are generally affluent, not very "street wise" but not gay or Lesbian. Of all cultural groups, they tend to be the most un-imaginative, predictable and generally intolerant of other individuals who are different than themselves. They tend to be politically and socially conservative.

14. Copyright, Disclainer & Credits

The General Public License (GPL)

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.

Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.

b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.

c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.

10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS