Beware of the Internet Troll

Beware of the Internet Troll

 


WRITTEN BY A TRUTH SOLDIER

HTTP://DANIELTOWSEY.WORDPRESS.COM

I ASSUME MANY OF YOU HAVE NEVER HEARD OF AN INTERNET TROLL.

I WILL NOW CAUTION THOSE OF YOU IN THE TRUTH REVOLUTION AND THOSE OF YOU WHO ARE NEW

 TO THE TRUTH MOVEMENT AS TO

WHAT A TROLL IS, WHAT THEY DO AND HOW THEY DO IT..

FIRST OF ALL A TROLL IS ONE THAT IS TRAINED IN WORD WARFARE AND THEY ARE PAID TO SIT AT THEIR

 COMPUTERS ALL DAY SEARCHING

OUT TRUTH TELLERS WHO ARE IN PUBLIC FORUMS OR ANY OTHER ON-LINE PLACES WHERE PEOPLE

 WILL GO TO TO TRY AND SEEK TRUTH,

IN THE QUEST TO UNDERSTAND THE EVILS OF THE NEW WORLD ORDER BANKSTERS THAT ARE TRYING

 TO NOT ONLY CONTROL THE WORLD.

THEY WANT TO OWN IT ALL.

SOME TROLLS ARE ASSIGNED KNOWN TARGETED TRUTH ACTIVISTS, WRITERS, TRUTH SOLDIERS,

 TRUTH WARRIORS ETC.

OKAY MANY OF YOU UNINFORMED MIGHT ALREADY HAVE STOPPED READING THIS..

I CAN NOT HELP THE DROP OUTS.

BUT FOR THE REST OF YOU WHO HAVE ENOUGH MENTAL STRENGTH TO HANDLE THE OCCULT KNOWLEDGE.

HERE GOES..

THE NWO IS ALWAYS ABOUT CONTROLLING WHAT IS TERMED AS YOU THE SHEEPLE.

THE NWO MONITORS ALL PUBLIC SENTIMENTS..

THEY ALWAYS MONITOR ALL PUBLIC ACTIVITIES AND REBELLIONS AGAINST THE NWO MATRIX

CONTROL SYSTEM.

SO IT IS VERY EASY TO UNDERSTAND THAT THEY MOST DEFINITELY HAVE PROFESSIONAL

SABOTEURS NOW KNOWN AS TROLLS INVOLVED IN

THE SABOTAGING AND DESTRUCTION OF ALL FREE THINKING INDIVIDUALS AND MOVEMENTS.

SO THE TROLL WELL JOIN IN A DISCUSSION OR LEAVE DISCREDITING RESPONSE TO TRUTH ACTIVISTS

POSTS..

THESE TROLLS (MEMBERS) WILL HAVE A FAKE NAME, BUT PLEASE UNDERSTAND THAT TROLLS ARE

ASSIGNED A PARTICULAR JOB TO DO OR

ARE ASSIGNED TO TARGET CERTAIN SPECIFIC INDIVIDUALS.

SOME TRUTH ACTIVISTS MAYBE LURED INTO PRE-STRUCTURED TROLL TRAPS.

SITES THAT WERE CREATED BY TROLLS TO ENTRAP INDIVIDUALS AND AT BARE MINIMUM THESE SITES

ARE ENGINEERED TO WASTE THE

ACTIVIST VALUABLE TIME.

TROLLS WILL BE IN ON-LINE SKYPE RELATED RADIO CHAT ROOMS.

SOME OF THESE ON-LINE RADIO COMMUNITIES MAY ACTUALLY HAVE NO LISTENERS AT ALL.

THESE TROLLS ARE EXPERTS AT ATTACKING KNOWN TRUTH SOLDIERS.

THE TROLLS WILL DIG THEIR WAY DEEP INTO THE TRUST OF THE GROUP.

IF A TROLL IS VERY SUCCESSFUL IT WILL GET INTO POSSIBLY THE CONTROL OF THE GROUP OR THE DISCUSSION.

THE REAL GOAL OF ANY TROLL IS TO KILL FREE AND INDEPENDENT INTELLECTUAL CRITICAL THOUGHT.

A TROLLS JOB IS TO SIDE TRACT AND DESTROY ALL INTELLIGENT DISCOURSE.

WHEN THESE TROLLS SIGN IN THEY IN FACT CAN BE ANYONE IN THE TROLL COVERT BUSINESS.

SO THAT MEANS JUST BECAUSE YOUR SCREEN SAYS IT IS SUCH AND SUCH IT DOES NOT MEAN IT IS

ACTUALLY THE SAME INDIVIDUAL THAT IS

DOING THE TROLLING.

TROLLS ARE IN THE ESPIONAGE BUSINESS.

I THINK I HAVE NOW EXPLAINED ENOUGH TO ENLIGHTENING YOU ABOUT THIS VERY DANGEROUS

ANTI FREE SPEECH

AND ANTI FREEDOM ACTIVITY..

SO BEWARE OF THE TROLLS..

STAYED TUNED FOR MY NEXT ARTICLE TO BE ENTITLED. “BEWARE OF THE FAKE TRUTHER SITES”

READ AND DOWNLOAD A TRUTH SOLDIER ARTICLES AT

HTTP://WWW.SCRIBD.COM/DANIELTOWSEY

FOLLOW A TRUTH SOLDIER ON

HTTP://WWW.TWITTER.COM/DANIELTOWSEY

Twenty-Five Ways To Suppress Truth: The Rules of Disinformation

http://ca.groups.yahoo.com/group/TheTruthSoldiersClub/message/12279

http://vaticproject.blogspot.com/2009/07/twenty-five-ways-to-suppress-truth.html

RIGHT CLICK SAVE AS BEWARE OF THE INTERNET TROLL.PDF

C.I.A. Sponsored Trolls Monitor Internet &

Interact With Users to Discredit Factual Information

http://worldtruth.tv/c-i-a-sponsored-trolls-monitor-internet-interact-with-users-to-discredit-factual-information/

CIA Logo

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as officialCenters of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by theNational Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

Source:

http://www.liveleak.com/

I Was a Paid Internet Shill: How Shadowy Groups Manipulate Internet Opinion and Debate

Written by Alcyone January 8, 2013 in Corporate Controlled Media

Update 1/12/2013: CLN has received a takedown notice asking us to remove this article on the basis that “It is libelous and utterly false” from someone claiming to be a legal agent of Above Top Secret’s parent company. We are currently investigating and will post status updates as they become available. The original thread now appears to have vanished from Above Top Secret’s website.

Update 1/17/2013: We have requested clarification regarding the takedown request and have not received a response. We will provide updates on any new developments.

Update 4/3/2012: Above Top Secret’s legal agent never responded to our request for clarification of their takedown request. The original thread has now been moved to the “Hoax” category of the website, as ATS claims the author admitted it was a hoax in a private exchange. To the best of our knowledge, this private exchange or the details thereof have not been posted publicly to substantiate this claim. Regardless, we believe that covert operations to manipulate online opinion and debate do exist (and indeed have been publicly acknowledged in many of the supporting links below). Whether this specific case is true or not, it remains a valuable and provocative dialogue still worthy of consideration.

____________________

CLN Editor’s Note: The type of propaganda strategy described in the article below occurs across a wide range of topics and is employed by various corporate, political, and governmental groups to promote a variety of agendas. It is called astroturfing, and it is far more common than most would imagine. 

This post is not about Israel, and it is not partisan. It is simply an illustration of the mechanics of how online debate can be manipulated. As this is an anonymous post, we have no way of verifying the information contained herein, and it is presented only for your consideration.

Our intent in posting this is not to spread paranoia or incite shill witch hunts, but merely to encourage readers to view what they read and engage with online with a more discerning eye.

This alleged confession is presented verbatim from its original thread to preserve its integrity. As such, you may notice some minor typographical errors.

——

Thread is close and hoaxed. The author admitted in a private exchange that the entire story was fabricated.
I am writing here to come out of the closet as a paid shill. For a little over six months, I was paid to spread disinformation and argue political points on the Internet. This site, ATS, was NOT one that I was assigned to post on, although other people in the same organization were paid to be here, and I assume they still walk among you. But more on this later.

I quit this job in the latter part of 2011, because I became disgusted with it, and with myself. I realized I couldn’t look myself in the mirror anymore. If this confession triggers some kind of retribution against me, so be it. Part of being a real man in this world is having real values that you stand up for, no matter what the consequences.

My story begins in early 2011. I had been out of work for almost a year after losing my last job in tech support. Increasingly desperate and despondent, I jumped at the chance when a former co-worker called me up and said she had a possible lead for me. “It is an unusual job, and one that requires secrecy. But the pay is good. And I know you are a good writer, so its something you are suited for.” (Writing has always been a hobby for me). She gave me only a phone-number and an address, in one of the seedier parts of San Francisco, where I live. intrigued, I asked her for the company’s URL and some more info. She laughed. “They don’t have a website. Or even a name. You’ll see. Just tell them I referred you.” Yes, it sounded suspicious, but long-term joblessness breeds desperation, and desperation has a funny way of overlooking the suspicious when it comes to putting food on the table.

The next day, I arrived at the address – the third floor in a crumbling building. The appearance of the place did not inspire confidence. After walking down a long, filthy linoleum-covered corridor lit by dimly-flickering halogen, I came to the entrance of the office itself: a crudely battered metal door with a sign that said “United Amalgamated Industries, Inc.” I later learned that this “company” changed its name almost monthly, always using bland names like that which gave no strong impression of what the company actually does. Not too hopeful, I went inside. The interior was equally shabby. There were a few long tables with folding chairs, at which about a dozen people were tapping away on old, beat-up computers. There were no decorations or ornaments of any type: not even the standard-issue office fica trees or plastic ferns. What a dump. Well, beggars can’t be choosers.

The manager, a balding man in his late forties, rose from the only stand-alone desk in the room and came forward with an easy smile. “You must be Chris. Yvette [my ex-co-worker] told me you’d be coming.” [Not our real names]. “Welcome. Let me tell you a little about what we do.” No interview, nothing. I later learned they took people based solely on referral, and that the people making the referrals, like my ex-colleague Yvette, were trained to pick out candidates based on several factors including ability to keep one’s mouth shut, basic writing skills, and desperation for work.

We sat down at his desk and he began by asking me a few questions about myself and my background, including my political views (which were basically non-existent). Then he began to explain the job. “We work on influencing people’s opinions here,” is how he described it. The company’s clients paid them to post on Internet message boards and popular chartrooms, as well as in gaming forums and social networks like Facebook and MySpace. Who were these clients? “Oh, various people,” he said vaguely. “Sometimes private companies, sometimes political groups.” Satisfied that my political views were not strong, he said I would be assigned to political work. “The best people for this type of job are people like you, without strong views,” he said with a laugh. “It might seem counterintuitive, but actually we’ve found that to be the case.” Well, OK. Fine. As long as it comes with a steady paycheck, I’d believe whatever they wanted me to believe, as the guy in Ghostbusters said.

After discussing pay (which was much better than I’d hoped) and a few other details, he then went over the need for absolute privacy and secrecy. “You can’t tell anyone what we do here. Not your wife, not your dog.” (I have neither, as it happens.) “We’ll give you a cover story and even a phone number and a fake website you can use. You will have to tell people you are a consultant. Since your background is in tech support, that will be your cover job. Is this going to be a problem for you?” I assured him it would not. “Well, OK. Shall we get started?”

“Right now?” I asked, a bit taken aback.

“No time like the present!” he said with a hearty laugh.

Continued in the next post – See more at: http://www.abovetopsecret.com/forum/thread826545/pg1#sthash.EGrlcV4k.dpuf

——

Thread is close and hoaxed. The author admitted in a private exchange that the entire story was fabricated.

I am writing here to come out of the closet as a paid shill. For a little over six months, I was paid to spread disinformation and argue political points on the Internet. This site, ATS, was NOT one that I was assigned to post on, although other people in the same organization were paid to be here, and I assume they still walk among you. But more on this later.

I quit this job in the latter part of 2011, because I became disgusted with it, and with myself. I realized I couldn’t look myself in the mirror anymore. If this confession triggers some kind of retribution against me, so be it. Part of being a real man in this world is having real values that you stand up for, no matter what the consequences.

My story begins in early 2011. I had been out of work for almost a year after losing my last job in tech support. Increasingly desperate and despondent, I jumped at the chance when a former co-worker called me up and said she had a possible lead for me. “It is an unusual job, and one that requires secrecy. But the pay is good. And I know you are a good writer, so its something you are suited for.” (Writing has always been a hobby for me). She gave me only a phone-number and an address, in one of the seedier parts of San Francisco, where I live. intrigued, I asked her for the company’s URL and some more info. She laughed. “They don’t have a website. Or even a name. You’ll see. Just tell them I referred you.” Yes, it sounded suspicious, but long-term joblessness breeds desperation, and desperation has a funny way of overlooking the suspicious when it comes to putting food on the table.

The next day, I arrived at the address – the third floor in a crumbling building. The appearance of the place did not inspire confidence. After walking down a long, filthy linoleum-covered corridor lit by dimly-flickering halogen, I came to the entrance of the office itself: a crudely battered metal door with a sign that said “United Amalgamated Industries, Inc.” I later learned that this “company” changed its name almost monthly, always using bland names like that which gave no strong impression of what the company actually does. Not too hopeful, I went inside. The interior was equally shabby. There were a few long tables with folding chairs, at which about a dozen people were tapping away on old, beat-up computers. There were no decorations or ornaments of any type: not even the standard-issue office fica trees or plastic ferns. What a dump. Well, beggars can’t be choosers.

The manager, a balding man in his late forties, rose from the only stand-alone desk in the room and came forward with an easy smile. “You must be Chris. Yvette [my ex-co-worker] told me you’d be coming.” [Not our real names]. “Welcome. Let me tell you a little about what we do.” No interview, nothing. I later learned they took people based solely on referral, and that the people making the referrals, like my ex-colleague Yvette, were trained to pick out candidates based on several factors including ability to keep one’s mouth shut, basic writing skills, and desperation for work.

We sat down at his desk and he began by asking me a few questions about myself and my background, including my political views (which were basically non-existent). Then he began to explain the job. “We work on influencing people’s opinions here,” is how he described it. The company’s clients paid them to post on Internet message boards and popular chartrooms, as well as in gaming forums and social networks like Facebook and MySpace. Who were these clients? “Oh, various people,” he said vaguely. “Sometimes private companies, sometimes political groups.” Satisfied that my political views were not strong, he said I would be assigned to political work. “The best people for this type of job are people like you, without strong views,” he said with a laugh. “It might seem counterintuitive, but actually we’ve found that to be the case.” Well, OK. Fine. As long as it comes with a steady paycheck, I’d believe whatever they wanted me to believe, as the guy in Ghostbusters said.

After discussing pay (which was much better than I’d hoped) and a few other details, he then went over the need for absolute privacy and secrecy. “You can’t tell anyone what we do here. Not your wife, not your dog.” (I have neither, as it happens.) “We’ll give you a cover story and even a phone number and a fake website you can use. You will have to tell people you are a consultant. Since your background is in tech support, that will be your cover job. Is this going to be a problem for you?” I assured him it would not. “Well, OK. Shall we get started?”

“Right now?” I asked, a bit taken aback.

“No time like the present!” he said with a hearty laugh.

Continued in the next post – See more at: http://www.abovetopsecret.com/forum/thread826545/pg1#sthash.EGrlcV4k.dpuf

For more information on this important topic, see:

– Alcyone @CLN


http://danieltowsey.wordpress.com/2010/12/21/beware-of-the-internet-troll/

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s