GitHub Wire Fraud - opensupporter/osdi-docs GitHub Wiki
GitHub Wire Fraud is a set of tactics that people use to misrepresent the apparent authorship, labor and activity when viewed through GitHub blame and insights.
Intro
I created and led this project after the 2012 election, which functioned as an Standards Development Organization (SDO), based on common practices at other SDOs like IETF, DMTF, W3C, ISO, etc. The project functioned as a democracy through 2019, with over 300 committee meetings taking place.
The bulk of the authorship and labor that created the specification and evangelized adoption (which created the largest REST based App ecosystem) were my contributions. There are other contributors, but the overwhelming majority of work and authorship is mine. However, due to the GitHub fraud tactics described below, the authorship appears to be the work of others.
Action Network and AFL-CIO, and their joint development effort Action Squared, were passing the work off as their own, to use for their own proprietary API and ecosystem, which is contrary to the mission of interoperability standards. From the beginning, along with Nathan Woodhull and subsequent co-conspirators, they engaged in racketeering conspiracies to gain control of the project, operate it, and invest the proceeds of their racketeering activity into their own enterprises. The predicate acts include wire fraud, extortion, copyright infringement. The enterprises include Action Squared as well as venture capitalist Higher Ground Labs' portfolio companies.
In simple terms, Defendants were were exploiting my labor, proficiency, and retirement savings for over 7 years. I did the work, which helped everyone as much as myself. Defendants misappropriated the value and profited from it, using it as a proprietary app store (Action Squared) and to secure venture capital.
The intellectual property in OSDI specification is at the core of my complaint in federal court against Action Squared, Action Network, AFL-CIO, DNC, MoveOn.org, Civitech and Nathan Woodhull. The claims include racketeering, copyright infringement, and violation of section 1 of the Sherman Antitrust Act.
The complaint can be found at this URL. https://storage.courtlistener.com/recap/gov.uscourts.nysd.611005/gov.uscourts.nysd.611005.29.0.pdf
The most important part is the unfair competition section, beginning on paragraph 425, page 52. because Defendants' unlawful conduct in a market that constitutes essential resources for candidates running for election makes primary elections less fair, since Defendants used the proceeds of their racketeering to create gatekeeper powers.
Github Fraud Tactics
Git Blame Game
One tactic used is making commits that include more changes that don't constitute authorship than those that do.
GitHub "blame" shows the last person to make a change to a line in a file. That's different from authorship. A recent committer can add a period, change indentation, or copy/paste, which will change the "blame" attribution.
OSDI Core
When the OSDI specification is viewed in blame mode, the authorship appears to be that of Action Network's Director of Technology, Jason Rosenbaum, user "j-ro"
https://github.com/opensupporter/osdi-docs/blame/gh-pages/README.md
However, the underlying authorship for the essential IP in the specification is largely mine (joshco). Seeing the fraud in its entirety requires stepping through the commit history.
However, to see the highlights, here is an early version of the specification, which was sole authorship by me, emailed to the committee in 2013.
https://groups.google.com/g/osdi-dev/c/GxbZciz7dk4
Next, here is the version of the specification just before Action Network joined in November 2013.
https://github.com/opensupporter/osdi-docs/tree/precan
It can be viewed in "blame" view, which shows my underlying authorship:
https://github.com/opensupporter/osdi-docs/blame/precan/README.md
An example commit that contains a significant amount of this fraud is a commit made by j-ro on Feb 17, 2015.
Prior to that commit, the blame view of the readme shows:
https://github.com/opensupporter/osdi-docs/blame/2ecd98eb02bd14d132e55568c8c7ef29d46bc161/README.md
J-ro's commit reorganizes existing content and makes small tweaks.
"introduction update" https://github.com/opensupporter/osdi-docs/commit/4660ed9cb680c43727a42c0461386d968f662ac7
The effect of this resets the blame attribution to j-ro. An easy example to see is how j-ro moved the contributors list from the top to the bottom of the file.
These tactics are spread across many commits. Another "updating examples" makes changes to the JSON examples, but the blame for entire examples are set to j-ro.
"updating examples" https://github.com/opensupporter/osdi-docs/commit/230b3a07bddf046bf79ed31a4eafc3530e0f14d4
At this point, it should be clear that anyone who has been led to believe that Action Network is responsible for the authorship should realize that they have been misled.
For those with the energy, here is an exhibit which lays out the evolution of the authorship for each section in the README, which is the core of the specification.
https://joshco-public.s3.amazonaws.com/exhibit_2_osdi_published.pdf
OSDI Person Signup Helper
OSDI Person Signup Helper is the most commonly used part of the OSDI specification. OSDI uses Helpers to optimize common scenarios that would normally require multiple REST based operations. From the spec:
OSDI also allows a client to perform a number of operations at once that in a traditionally RESTful API would take multiple requests through the use of helpers. For example, helpers can be used to create a new Person resource and register that this new person also signed a petition at the same time, something that with REST would require two operations (first creating the person, then associating them with the petition).
The original authorship of Person Signup Helper is mine, beginning Apr 30, 2014. in the following two commits. The first is the original authorship, the second is a change to the hierarchical structure of the message.
https://github.com/opensupporter/osdi-docs/commit/e4f894def976ee35851d8bf70360ec5b9c0eee21
https://github.com/opensupporter/osdi-docs/commit/a1e290416326f5a9f604fbe4152c936359705b88
On Dec 29, 2014, Jason Rosenbaum (j-ro), copied and pasted the authorship, tweaked it, and placed it in a new file. In his commit message he states: "person signup helper first draft", which is an act of wire fraud.
https://github.com/opensupporter/osdi-docs/commit/8a50587649f12f37fcc25a76ccfc0ad2656b517a
Busywork Commits
Another tactic used was busywork activity. If you look at the insights page, it appears that Dan Ryan is a significant contributor to the work and its value.
https://github.com/opensupporter/osdi-docs/graphs/contributors
However, if his pull requests and commits are reviewed, there is little authorship. For example this pull request was to add a Ruby Gemfile, which is a build file unrelated to authorship. Within the pull requests there are 11 commits which pad his activity level.
https://github.com/opensupporter/osdi-docs/pull/324/commits
What's the point?
You may now be asking yourself, what made the specification valuable enough to put in the effort to engage in this behavior?
In early 2012, I started evangelizing the idea of an SDO project to define a standard API for all to use. The common wisdom at the time was that OSDI would fail quickly as previous efforts had. One conversation was with Matt Debergalis, ActBlue founder:
https://joshco-public.s3.amazonaws.com/d565_i.pdf
I created the project, recruited and led the team, chaired the meetings until Defendants' racketeering conspiracy to gain control of it succeeded in mid 2018. Throughout the entire length of the project, I contributed the bulk of the labor and authorship. Defendants were fraudulently inducing my labor, which I was generously funding from my savings.
Its initial governance policy was adopted in August 2013, which stipulated that derivative works of the specification, memberships, leadership positions and other decisions were made democratically, by majority vote.
The policy was adopted in August 2013:
https://groups.google.com/g/osdi-dev/c/pxHKkOGPNlc/m/PWYWbJOgwj8J
https://joshco-public.s3.amazonaws.com/D483.pdf
Motions and other committee business are saved on the committee Google Groups.
Governance decisions made by motion happened in the Governance Committee, these included approving memberships, electing leadership positions, and updates to the governance policy. These are saved on the committee google group:
https://groups.google.com/g/osdi-governance
A subset of governance was the executive committee of officers including Chair (myself) and VP of Outreach (Jason Rosenbaum). Exec focused on execution of decisions made by governance, as well as preparing proposals for governance. The exec committee met fortnightly. That business is saves on the committee google group:
https://groups.google.com/g/osdi-exec/
Technical work on the specification occurred in the tech committee, which met weekly. Derivative works of the specification, usually in the form of GitHub Pull Requests of the specification were decided by majority vote. Meeting agendas, minutes and other discussions are saved on the google group:
https://groups.google.com/g/osdi-dev
A calendar of committee meetings is below:
Racketeering Begins
When Action Network joined in November 2013, it agreed to the governance policy, which was provided via email reviewed with via a telephone meeting.
https://joshco-public.s3.amazonaws.com/D208_i.pdf
After joining, Action Network implemented the specification using source code I provided for their Rails application and copied parts of the specification into their product documentation. In summer 2014, Action Network and Woodhull attempted to undermine the project by antagonizing NGPVAN, causing them to step back from OSDI and launch their own proprietary API at their Innovation Platform Event (instead of implementing OSDI), which would make OSDI Action Network's API by default. After NGPVAN's Innovation Platform Event, I chatted with Rosenbaum via SMS, where he stated Action Network's goal of being "one of two" widely used API's in the market. (which is the opposite of the mission of a standard)
https://joshco-public.s3.amazonaws.com/D420_i.pdf
Nathan Woodhull hoped to use OSDI to secure venture capital to build a "universal adapter", which would not be viable if OSDI succeeded.
https://joshco-public.s3.amazonaws.com/D1991_i.pdf
By 2017, the set of applications that were compliant with the OSDI specification was the largest REST based application ecosystem in the market for Digital Microtargeting Platforms. The platforms and applications are essential tools needed by people who run for elections and ballot initiatives.
In digital platform markets, which this market is, an app stores model (vs the WWW) results in concentration. Like the mobile space, there will likely be a few dominant app stores and new app stores will be unlikely to gain a critical mass.
Reid Hoffman Enters the Market
In 2017, Reid Hoffman entered the market. His political director, Dimitri Mehlhorn disbursed Hoffman's money. In August 2017 Mehlhorn pitched me to fund OSDI but use it as a proprietary asset by what would become VC Higher Ground Labs. I refused because I was only interested building a level playing field.
https://joshco-public.s3.amazonaws.com/D676_i.pdf
https://joshco-public.s3.amazonaws.com/D672_i.pdf
https://joshco-public.s3.amazonaws.com/D1873_i.pdf
Extortion
In the end, Higher Ground Labs' portfolio ultimately used OSDI for their own proprietary benefit. How that happened was trough racketeering using predicate acts of wire fraud, extortion, and copyright infringement.
The extortion scheme began in summer 2016, trying to coerce me to abandon my copyrights by concealing the fact that I am gay, framing me as an example of sexual harassment and violence towards women. This allowed Defendants to apply "the man's side doesn't matter" to a gay male's property rights, and disguise a robbery by extortion by portraying themselves as holding another man accountable.
Their scheme used deception to inflict serious unjust harm to my economic viability and created a foreseeable risk if inciting violence against me. This scheme can be used as a pretext for a third party to commit a hate crime against a gay male.
Defendants' engaged in reckless endangerment in plain sight.
Abuse of Process
I chose to endure the extortion, and in summer 2017, the window for Action Network to gain dominant control of the ecosystem was about to close. Defendants conspired to provoke a false-flag lawsuit that they could misrepresent. Action Network and others used that as a pretext to gain control of OSDI and try to coerce me to resign. I insisted that Action Network keep its agreement to democracy as a governance structure. If they wanted me out, they could make a motion and secure majority vote, which they had the power to do. Instead they resorted to coercion.
https://www.youtube.com/watch?v=iy9jQYpJ9rY
Weaponized Disinformation Tactics
The participants in the racketeering conspiracy also engage in other, sophisticated fraud:
https://www.nytimes.com/2018/12/26/us/reid-hoffman-alabama-election-disinformation.html
Where did the proceeds of their racketeering go?
Misappropriating the essential IP in the specification allows the recipient to use the OSDI application ecosystem to get a head start on their proprietary ecosystems. In order to do that, Defendants engaged in copyright infringement. Defendants engaged in racketeering conspiracies to gain control of OSDI, operate it, and invest the proceeds of their racketeering into their own enterprises. RICO laws are designed to prevent this type of criminal behavior. The two main enterprises places this IP ended up was the portfolio companies of venture capitalist Higher Ground Labs and Action Squared, a joint effort between Action Network and AFL-CIO.
Action Squared
Action Network's use of the OSDI IP can be found at:
- https://web.archive.org/web/20201216013651/https://actionnetwork.org/docs/v2/
- https://web.archive.org/web/20201216022013/https://actionnetwork.org/docs/v2/person_signup_helper
In Summer 2022, ActionBuilder released their API, which is published at:
https://web.archive.org/web/20220914003447/https://www.actionbuilder.org/docs/v1/index.html
Higher Ground Labs portfolio company Civitech
Civitech's infringement is the most harmful to the fairness of primary elections, so I've focused on that. Civitech's API definition copies parts of the OSDI specification. Defendants also used a shell game to essential launder the IP. The original product was called LightRail, funded by VC Acronym, renamed Shadow, divested and renamed Bluelink, then acquired by Civitech.
Reviewing their documentation shows copying of OSDI Person. Though it is obfuscated, their API spec is OSDI person signup helper.
Since filing my complaint, Bluelink has deleted their API specification, which is destorying evidence to prevent discovery. However, in 2023, I archived the page on the Internet Archive. It's URL is
https://web.archive.org/web/20230528101658/https://bluelinkdata.github.io/docs/BluelinkApiGuide
The Internet Archive doesn't preserve the rendering of Markup, so it is text based. I took screenshots (prior to their deletion) and paired it with the parts of the OSDI spec they copied. Bluelink's API copies parts of OSDI and includes small, incompatible changes. This facilitates exploitative behavior. With little extra coding, Bluelink can be compatible with OSDI implementations, allowing it to get a head start. By adding proprietary, incompatible changes, developers who write code according to Bluelink's documentation will be incompatible with OSDI and locked in to Bluelink's proprietary API (which is really obfuscated OSDI). Developers will not know that they are using OSDI.