As a protégé of Andrew Breitbart, James O'Keefe believes that he is at #WAR with the progressive movement. Accordingly, Project Veritas primarily targets politicians, activists, and institutions of the Left, such as Barack Obama, Hillary Clinton, ACORN, Planned Parenthood, and unions in general, but teachers' unions in particular. Common themes are voter fraud, immigration, environmentalism, gun reform, attacks on the mainstream media, and since O'Keefe obtained funding from the Donald Trump Foundation in 2015, increasingly the defense of Donald Trump.
Since O'Keefe created Project Veritas Action, the 501(c)4 political advocacy arm of his organization, he has escalated the tactic of embedding his operatives within political campaigns. This is political espionage, and it poses a major threat to election integrity. This activity and other major operations of relevance are listed below.
Veritas Operatives Embedded Within Political Campaigns
Infiltrations Bolstering Donald Trump
1. 2017 Roy Moore False Rape Sting Washington Post Jaime Tennille Phillips, "Karl Bradley," "Michael Condon"
2. 2017 American Pravda CNN, New York Times Christian Hartsock, Kiera Holding, et al.
3. 2017 CNN Leaks CNN ---
4. 2017 Disrupt #J20 Inauguration protesters Seija Drake, "Max Hunt," Marisa Jorge, Allison Maass, Tarah Price, Trevor Kendrick
5. 2017 10 Hours of Walking in NYC trolling Appears to be Seija Drake in video.
as a Black Trump Voter
6. 2016 Rigging the Election Series Democracy Partners, Allison Maass, Christian Hartsock, Dan Sandini,
the DNC, orgs aligned Brittney Rivera, likely Mike Rogers
with Clinton campaign IDs from Lauren Windsor (a victim and the producer of this website) et al.
DISCLOSURE: This website is a project of The Undercurrent, which is produced by Lauren Windsor and sponsored by American Family Voices. In 2016, Project Veritas operatives infiltrated Democracy Partners, an affiliated organization with which we share an office. In the aftermath, we launched an investigation into what happened. The fruits of that investigation spawned ProjectVeritas.Exposed.
Other Notable Operations
1. 2017 Currently unpublished due to litigation AFT Michigan Marisa Jorge
On September 27, 2017 the Michigan affiliate of the American Federation of Teachers (AFT Michigan) filed suit against Project Veritas and its undercover operative Marisa Jorge in the U.S. District for the Eastern District of Michigan. The complaint alleges Jorge, at the behest of Project Veritas and O’Keefe, misrepresented her identity, engaged in unlawful surveillance of AFT Michigan staff, leaders and associates, and gathered confidential information from them. In response, Michigan Circuit Court Judge Brian R. Sullivan granted the group’s request for an emergency injunction and issued a temporary restraining order prohibiting Jorge, her agents, and anyone acting in concert with her from releasing private and confidential information gathered from any unlawful surveillance. Initial reporting from The Intercept.
U.S. Judge Linda Parker lifted the restraining order and denied AFT a temporary injunction on December 27, 2017. However, the judge also stated that AFT would likely win in court if it pursued a claim for breach of fiduciary duty, per The Washington Post.
2. 2017 Currently unpublished due to litigation CA League of Conservation Voters, Christian Hartsock, Dan
CA Senate Pro Tem Kevin De Leon Sandini, Ann Vandersteel
On August 4, 2017 the League of Conservation Voters (LCV), an environmental non-profit organization, wrote to the California Attorney General’s Office requesting a criminal investigation after the organization discovered they had been infiltrated by operatives associated with Project Veritas. In their letter, LCV states the three operatives used fake identities to gain access to the organization and then sought and obtained confidential information about the organization’s operations and strategic goals. The letter also expressed concerns that the operatives may have surreptitiously recorded meetings because two of the operatives were revealed to be known associates of Project Veritas and had worked on projects involving surreptitious recordings. To date, no such footage as yet to be released. Reported by Jane Mayer of The New Yorker.
3. 2014 Hollywood Fracking Documentaries Susan Sarandon, Mariel Hemingway, Travis Irvine, Rich Valdes,
& Mid-East Oil Investors Ed Begley Jr., Josh Fox, Rebecca and Chris Heneghan
4. 2014 Battleground Texas/Voter Fraud Battleground Texas/Obama --
5. 2011 NPR/Muslim Brotherhood sting Shaughn Adeleye, Ken Larrey
6. 2010 CNN sex boat sting O'Keefe, Ben Wetmore, Isabel Santa, et al.
7. 2010 Mary Landrieu phone tampering Joe Basel, Stan Dai, Robert Flanagan
8. 2009 ACORN stings Hannah Giles et al.
9. 2008 Planned Parenthood stings Lila Rose
Project Veritas operatives use a variety of approaches to conduct stings: casual social interaction at protests, bars, conferences, and fundraising receptions; fundraising pitches wherein the operative is an investor, donor consultant, or donor who just happens to want to fund your project or organization; and embeds within organizations and campaigns as volunteers and interns.
The latter two approaches entail building social media profiles for their aliases, a front group or company where the operative allegedly works, and relationships with people associated with the relevant issue or organization being targeted.
Some tips to avoid infiltration:
1. At the end of the day, you won’t be able to remember all the faces in this dossier, so you have to be alert to O’Keefe’s methodology.
2. Operatives will concoct elaborate covers and often write pitch e-mails introducing themselves and requesting a meeting. They might present themselves as consultants, donors, investors, students, etc. ALWAYS VET people you don’t already personally know.
Check their Facebook/Twitter/LinkedIn/company website.
Do you have mutual connections?
How many friends/followers/connections are there?
Was the account set up in the last six months? If yes – proceed with caution.
Are there lots of personal photos with other people, or is it sparsely populated?
Have you heard of their organization before? Look it up on LinkedIn. Look at the website. Are the pages suspiciously
bland or recently set up?
3. Sometimes, the operatives have already developed relationships with people you trust. Ask these people how long they have known this person. Less than six months? Proceed with caution.
4. Did they give you a business card? Do they have a business e-mail? Does the card look suspicious?
5. Always get a copy of a government-issued ID and a resumé with verifiable references. CALL the references.
6. Be suspicious if the person does not have a government ID – often moles use student IDs.
7. Consider also getting a signed non-disclosure or non-surveillance agreement.
8. When operatives are not pitching targets via e-mail, they often set up shop at hotel bars for conferences. Why? Because people are drinking and it’s a public space – you usually can’t get into meetings without credentials, BUT that does not mean that operatives can’t get their hands on them.
They are often attractive women. They often work in teams of two.
They often pose as progressive political consultants with donors looking to fund YOUR issue. Every progressive
organization I know is always hungry for cash. Don’t believe anyone you’ve never heard of offering easy money.
9. They will lure you into hypothetical conversations about illegal, unethical, or politically contentious behavior. You don’t actually have to condone it, but your willingness to entertain the conversation can be deceptively cut to make you and your organization look terrible.
Do not engage in personal conversations about contentious subject matter with strangers!
10. Be on the lookout for suspicious behavior that looks like fidgeting with hidden cameras, affecting absurd accents, and wearing outlandish costumes like lederhosen and kilts.
11. If you are suspicious - report it to management.
12. ALWAYS document encounters that make you suspicious. Be sure to note physical characteristics of the suspected mole, their names, and all of the details of their cover stories. Preserve all text and e-mail correspondence you may have had with them. Screenshot social media accounts like Facebook or LinkedIn that may have been used in their cover stories. Try to take a picture of the suspect.
13. Send all of your documentation to your campaign's or organization's attorney for safekeeping. Consider sharing that information with ProjectVeritas.Exposed - we are happy to help identify possible operatives.
Contact if you encounter suspected agents of Project Veritas.