It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


A Clear & Present Danger to ATS

page: 4
<< 1  2  3   >>

log in


posted on Mar, 18 2011 @ 02:29 PM
Darkk, first off I have noticed you respond only it seems to very tiny bits of info here such as in my reply, not in a way that truly seems interested but rather it appears at some attempt soley to undermine. I have noticed this seems to be a recurring pattern on multiple posts and I bet I am not the only one who has noticed this. Care to wager on that?

I think it's fine to be a sceptic and ask reasonable questions, I simply am interested what brings people like you to these forums. Obviously, I would be far too premature to say anyone specifically had 'ulterior' motives for joining these forums, but as this is the topic of this thread I think it's fair to say I hope everyone is watching out for this kind of behavior in general and never think for a moment those type of people mentioned in this very thread don't stick out like sore thumbs.

Now as to your question, the list of Alphabet soup agencies was posted to contributers of the site I mentioned ironically because they had a thread there just like this one and most all of us noted the same problems occurring at the site that I mentioned. If you want to find out exactly who those were I expect you can go to the site start a thread and probably someone there will,be kind enough to fill you in. In all honesty, this was years ago, my recollection is the site used a program to identify and track back who the site was visited by, I do not know exactly how they did this (perhaps moderators here know how that works) but I recall the list had a very impressive amount of visits from all sorts of gov. type agencies that one would little expect would want to spend so much type at a 'conspiracy theory' site if it truly only WAS just a 'theory'. Hope that helps.
edit on 18-3-2011 by Tecumte because: spelling

posted on Mar, 19 2011 @ 07:26 PM

Originally posted by Hefficide
2) Sock puppets are an issue period, governmental or not. And the ATS staff is pretty darn good at rooting them out and banning them. Even if the sock puppets use TOR or proxies, we quite often can root them out by other means. From our POV GI Troll is no different than any other troll and they'll suffer the same fate.

I agree with you that sock puppets are an issue. However I do not believe that ATS is on top of this at all - the man power just isn't available to make the use of sock puppet software that uses proxy IPs difficult. In fact Springer says that IPs aren't even looked at routinely unless there is a specific issue raised.

I'm not suggesting that I think ATS should be on top of this. It's not a straight forward thing to deal with.

posted on Mar, 19 2011 @ 09:29 PM
reply to post by Pimander

I do not understand how anyone can think that ATS is going to be somehow immune to this sock puppet army. The software is sophisticated enough to avoid detection of their agents. The government knows that their IP addresses are going to be detected so if they wish to influence the discussion on this or other forums they will need private contractors or at the very least fool proof IP spoofing technology or proxies set up on private networks. They have this and they use it and they are involved in directing the discussion both here in the online space and using the MSM as they have for decades.

Why does anyone doubt they will seek to remain the primary influence in the global discussion? Of course they will.

posted on Mar, 19 2011 @ 09:43 PM
I haven't read all the replies, but I think that no matter what forum there is always "danger".

Whether offline or on, you can never tell what someone is really thinking or trying to do to you. Such is the veil of human interaction.

So, if someone is spying/psying on you online, who is to say your coworker isn't doing the same without you realizing?

There is no way to know or tell, just stand by your words and let the truth decide your fate.

(But be smart about it.)

posted on Mar, 26 2011 @ 10:51 PM
Here's a great link showing just how some of this disinfo works, this particular ruse was used over at a site called chemtrail central to try and discourage, marginalize, and disinform that large (and growing) group of people who have realized the reality of atmospheric enineering. Never doubt for a second, that for every person who is trying to get to the bottom of things, there may be another trying to keep them from getting there. I DO seem to notice this right here at ATS as well, while there will always be closed minded people and those hopelessly trapped in the box of being naive, alot of the attempts at missteering people here really do appear 'professional (though often poor and sloppy) when one has spent enough time to actually become aquainted the the ebb and flow of things here. I imagine other very astute and awake people here have noticed this as well. Here's that thread I promised, I think many TURE researchers will find it very interesting and eye opening about how some of this works:

posted on May, 1 2011 @ 08:14 AM

Originally posted by whyamIhere
It cracks me up people getting worried about Social Media.

Take a look here mate. I have added a snippet of my contribution below.

Basically these documents are relevant because they show that intelligence strategists were planning to use blogs (and almost certainly other important media like large forums) for operations. Remember that intelligence operations are not solely conducted abroad in war theatres.

In one of the documents a program called Megaphone was mentioned as a cyber op tool. Have you ever wondered how certain subject matter is posted and then teams literally show up almost unbelievably quickly to blast you or destroy your thread. This program or one like it could be the reason. Among other things, it alerts the user when a post is made containing user defined keywords.

it has been criticized by Independent Television News, and others for stuffing the ballot of online polls, generating excessive comments and 'spam' on internet message boards, and stifling online discussion.

That tool coupled with a sock puppet manager would allow an organisation to stifle lots of debate with very few staff.

Here are the documents. There are more but I can't find them now. Hopefully they are still out there and I will retrieve them.

Blogs and Military Information Strategy by James B. Kinniburgh, Major, USAF, and Dr. Dorothy E. Denning



Influence Operations and the Internet: A 21st Century Issue Legal, Doctrinal and Policy Challenges in the Cyber World Rebecca A. Keller, Lt Col, USAF

Finally there is this conclusion made by the author of this article on a formerly secret now declassified document. There is a link to the document in the article.

Does the Pentagon define any real limits to information warfare? Information operations can be used on both domestic and foreign audiences, in non-permissive or semi-permissive environments, on adversary and non-adversary, during peace, crisis and war, and in denied areas. Should we really expect anything less? They did tell us that their goal was full spectrum dominance. (emphasis mine)
Information Operatiions Roadmap by Brent Jessop

Should we expect any less from any other powerful organisations? Probably not.

posted on May, 1 2011 @ 08:35 AM

Originally posted by Pimander
reply to post by JBA2848

For interested parties here are three important threads. You may find them enlightening.

top topics

<< 1  2  3   >>

log in