poorraisins replied to your post “I’ve noticed a dedicated presence of someone on /pol/ who types exactly like Lemwon. Same kinda angle of attack, same kinda rhetoric, same kind of argumentation.”
do the agencies really have anything to gain by all this or do they enjoy trolling as much as the next guy
Oh yes, they really do. It’s been suspected for years now that the U.S. government runs counter-intelligence operations online against regular citizens, but only recently has concrete evidence started to surface. For example, remember that internet virus which 'framed users' for child porn? How could people forget Operation Flicker so easily? The fucking Department of Homeland Security (Immigration and Customs Enforcement) openly states:
“Child pornography files may have to be shared from CPS servers in order to execute these new methods [of catching pedophiles]”
"The purpose of these [trojan] programs is to infect anyone whom is added to our suspected child-pornographer lists then use them to download child pornography then distribute them with other users onP2P file sharing networks to be able to flag the IP Address then sent it to the National Center for Missing and Exploited Children (NCMEC).”
You might be wondering to yourself, “where do they obtain all of that child porn?” It’s simple: they hang on to the pornography they acquire when they make arrests. They use it for baiting purposes! They acknowledge outright that if anyone got word of what they were doing, “civil liberties organizations” would be upset. Straight from the leaked Operation Flicker documents:
Risks and Issues:
The use of these methods may create constitutional and legal issues which may drive radical civil liberties organizations to attempt to fight these new methods upon discovery of them, which is the reason why this document remains classified,however the benefits of fighting sex tourism and child exploitation make these new methods acceptable in the modern age of telecommunications. The few risks in addition to the above are identified below:
- If ICE and FBI are not coordinated in their attempts using these new methods to deter and catch potential child pornographers, there may be data consistency issues between the agencies and data leaks from potential whistleblowers.
- Child pornography files may have to be shared from CPS servers in order to execute these new methods which will help criminal investigators determine if whom they are investigating could engage in distribution and transmission of child pornography images and moving images.
The U.S. government has the capacity and will to frame anyone for anything. Another project has also come to light recently;
launched in 2008 – the year of the global banking crisis – the Department of Defense ‘Minerva Research Initiative’ partners with universities “to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US.”
Among the projects awarded for the period 2014-2017 is a Cornell University-led study managed by the US Air Force Office of Scientific Research which aims to develop an empirical model “of the dynamics of social movement mobilisation and contagions.”
The implications for the Minerva Research Initiative go way beyond research — it’s obvious the United States has been applying every scrap of data it collects. You see, on June 3rd, Attorney General Eric Holder announced the revival of the ‘domestic terror task force.’ The plans are in full swing to begin broad, far-reaching purges of 21st ‘undesirables’ and high on that list are independent names in social media, activism, and politics.
Last year, the DoD’s Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with “supporters of political violence” who are different from terrorists only in that they do not embark on “armed militancy” themselves. The project explicitly sets out to study non-violent activists:
"In every context we find many individuals who share the demographic, family, cultural, and/or socioeconomic background of those who decided to engage in terrorism, and yet refrained themselves from taking up armed militancy, even though they were sympathetic to the end goals of armed groups. The field of terrorism studies has not, until recently, attempted to look at this control group. This project is not about terrorists, but about supporters of political violence.”
Glenn Greenwald confirmed that many of their targets are “self-radicalized” web users, outing the United States’ active attempts to subvert online discourse and grassroots campaigns.
The US National Security Agency (NSA), for example, has been tracking the online activities of people because they were believed to express “radical” points of view, according to a memo from the Snowden files. The document, dated October 2012, discusses six Muslims in particular, described as mere “exemplars.”
Meanwhile, the Government Communications Headquarters (GCHQ), the UK equivalent of the NSA, has been attacking hacker activist group Anonymous with viruses, “honeytraps” and information operations aimed at damaging the reputation of the hacktivists, according to a PowerPoint presentation by the agency officials cited by Greenwald.
Such discrediting tactics include changing photos on social network websites, writing blogs under the names of invented victims and luring Anonymous members to compromising sites. Deleting online presence of the target and using denial of service attacks are also among the GCHQ’s tactics.
These actions aren’t just limited to the digital world. Acts of subversion are quite commonplace — haven’t you ever wondered how many times a law enforcement official has posed as an anarchist just to cause trouble and make them look bad in the media? Because it happens way more often than you think.
The U.S. created an entire platform in Cuba and other countries just to fuck with public political discourse and stir civil unrest. The ATF actually convinced a handful of individuals afflicted with mental illness to commit crimes; the Feds will go online and try to stir controversy where others are trying to mend. They will try to induce people into saying, supporting, or committing terrible things.
If you still aren’t convinced that Federal government wouldn’t “have anything to gain” by infiltration and deception, here are a few more headlines which indicate a clear prerogative:
Keep in mind, I didn’t even bother to talk about the time the FBI and DHS organized attempts to infiltrate Occupy Wall Street protests, planned to assassinate organic figureheads, and induced a couple of losers to think they were going to blow up a bridge.