posted on Feb, 24 2014 @ 10:00 PM
The Conspiracy Theory Is True: Agents Infiltrate Websites Intending To "Manipulate, Deceive, And Destroy Reputations"
In the annals of internet conspiracy theories, none is more pervasive than the one speculating paid government plants infiltrate websites, social
network sites, and comment sections with an intent to sow discord, troll, and generally manipulate, deceive and destroy reputations. Guess what: it
was all true.
And this time we have a pretty slideshow of formerly confidential data prepared by the UK NSA equivalent, the GCHQ, to confirm it, and Edward Snowden
to thank for disclosing it. The messenger in this case is Glenn Greenwald, [who says]: "... these agencies are attempting to control, infiltrate,
manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself."
The Conspiracy
Theory Is True: Agents Infiltrate Websites Intending To "Manipulate, Deceive, And Destroy Reputations"
Shills are real! They walk among us. SHILL GATES ARE REAL!
This article is a real eyefull. It confirms your worst, most paranoid fantasies. The depth and and scope of the operations being played out on the
internet are mindboggling. You owe it to yourself to read this...to know what we are all up against.
Many times I have thought accusations of shilling were over-the-top and paranoid. No more! While calling somebody a "shill" is often just an easy,
lazy way of shutting down an opposing viewpoint, after reading this I will never doubt that THEY WALK AMONG US.
Below are some screenshots from the government-made materials discussed in the article; they give an idea of the operations but are by no means
exhaustive.
And I quote...
"..Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to
destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate
outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends:
“false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a
victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums..."
edit on 24-2-2014 by Never Despise because: (no reason given)