POLICE AND GOVERNMENT INVASIONS HAPPENING EVERYWHERE ( Archived) (4)

Sep 2, 2015 8:03 PM CST POLICE AND GOVERNMENT INVASIONS HAPPENING EVERYWHERE
Swedish2015
Swedish2015Swedish2015Philadelphia, Pennsylvania USA69 Threads 294 Posts
Power To The People.......
September 2, 2015

We were contacted today by several friends of ours living within Memphis, Tn., and was told to go to the Action News 5 website afterwards. Not only were we informed how law enforcement has been raiding homes and businesses, but also how they have been raiding non-profit organizations. It appears that there has been a war on Thrift Stores across the U.S. which is concerning many low income citizens. Even though news medias are designed to report riddled news, in which you have to distinguish whats rue from whats false, many have failed to inform Americans about invasions on Thrift Stores.



It appears that the creators of the police state and the surveillance state think that Americans are not capable of understanding that they are attempting to push us further into a hole of despotism, totalitarianism, and fascism, where information becomes political drivel and nothing more. Information outsourcing seems to be a vital tool in collecting information today. Finding mainstream news sources that give you information rather than political opinion polls and opinions, are now archaic as news reporters are being replaced with editorializing radio hosts and state department spokespeople that hide in plain sight. The policy of the unbalanced media is to uphold Orwellian doublespeak when topics such as government corruption, police violence, brutality against citizens, and double standards and intolerance. It is homogenized and watered-down national security speech that at the end of day, supports the militarized police state apparatus.

Information outsourcing is becoming more risky now because there are government paid disruptors who muddy the pool of information provided on the internet. When Ed Snowden revealed the extensive spy and surveillance apparatus being employed by our government against its citizens, there was something else he revealed that was overlooked by the media. Snowden reportedly said that western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. This should mean something to everyone who reads material on the internet and is weary of so-called, real truth websites, that lead people into believing all sorts of planted stories that are mostly posted by covert military operatives.
------ This thread is Archived ------
Sep 2, 2015 8:04 PM CST POLICE AND GOVERNMENT INVASIONS HAPPENING EVERYWHERE
Swedish2015
Swedish2015Swedish2015Philadelphia, Pennsylvania USA69 Threads 294 Posts
For example, if you type in the words 'False Flag', youcome up with approximated 42 million hits, that is a huge number which needs to be assessed with intellectual honesty. This would mean that if all of these websites were correct, then we would have to conclude that all of our recent history is nothing more than a series of prefabricated incidents. That every shooting, bombing, terrorist event, murder, and scandal, is all one big comic book plot designed to always enable the government to grab more power, and take away our rights. Just because a government or some special interest group exploits an event for a political agenda doesn’t always mean that it is a false flag. What it means is that our leaders are political vampires that don’t always wait for the smoke to clear. The bodies will go cold before they speak up about their sadness and regret, and then push the latest ideas for gun control. There appears to be a conspiracy to claim fakery and hoaxing of current events in order to create an extreme and unfavorable view of most independent sources for news. Further complicating matters, false flags are a very real phenomenon. But the term is being misused and thrown around like a dirty shirt, and truly one should suspect that this appears to be a covert operation to discredit information you receive from the internet.

It’s important to define what a false flag actually is, however, the covert ops in charge of manipulating information have lead most conspiracy seekers into thinking that a false flag applies to everything that happens from true crime to mass shootings. False flag operations are covert operations conducted by governments, corporations, or other organizations, which are designed to appear as if they are being carried out by other entities. We must understand there are events which happen that seem to have no deliberate deception, and therefore aren’t false flag attacks, but simply attacks that involve real people who lose real family members, and deserve at least some time to cope with their losses. Just like the politicians, there are those so-called truth seekers that don’t wait for the smoke to clear and the bodies to go cold before they leap into declaring a false flag event, which is very telling as to who is behind the disinformation. Reporters wait for the information to be delivered in order for it to be assessed. Then it is decided, if the public has a right to know, and then as much as can be expected, there is some evidence to demonstrate malfeasance.
------ This thread is Archived ------
Sep 2, 2015 8:04 PM CST POLICE AND GOVERNMENT INVASIONS HAPPENING EVERYWHERE
Swedish2015
Swedish2015Swedish2015Philadelphia, Pennsylvania USA69 Threads 294 Posts
However, the political agendas exploited by politicians can be compared to the exploitations of rush to judgment false flag allegations provided by so-called conspiracy theorists. Therefore, these are behaviors that is part of an electronic jackboot or deliberate COINTELPRO operation as indicated by Snowden. A previous secret unit called, Joint Threat Research Intelligence Group, and other groups that are in the employ of the alphabet agencies, are allegedly attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself. According to information provided by Glenn Greenwald, among the core self-identified purposes of the Joint Threat Research Intelligence Group, are two tactics. One, is to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and the other to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.

Now in order to understand how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. According to its playbook, the Joint Threat Research Intelligence Group uses the following to get its desired disinformation to spread on the internet:

Infiltration Operations

Ruse Operations
Set Piece Operations
False Flag Reporting Operations
Disruption Operations
------ This thread is Archived ------
Sep 2, 2015 8:05 PM CST POLICE AND GOVERNMENT INVASIONS HAPPENING EVERYWHERE
Swedish2015
Swedish2015Swedish2015Philadelphia, Pennsylvania USA69 Threads 294 Posts
The Main Core database is alleged to have originated with the Federal Emergency Management Agency (FEMA) in 1982, following Ronald Reagan’s Continuity of Operations plan outlined in the National Security Directive (NSD) 69 / National Security Decision Directive (NSDD) 55, entitled “Enduring National Leadership,” implemented on September 14, 1982. It is believed that Main Core is a federal database containing personal and financial data of millions of United States citizens believed to be threats to national security. The data which is believed to come from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community. It is important to note that websites you visit, things you post on Facebook, Twitter and even books you check out of a library gives the alphabet agencies a picture of who you are.

Most of the online trolling has to be carried out by the feds. Other proof that trolling and the recent spate of so called false flag generating conspiracy sites are a government conspiracy is that the government monitors and influences internet communications like Time Warner Communications, Comcast Communications, Century Link Communications, North State Communications, or Verizon Communications, et cetera, and covertly infiltrates online communities in order to sow dissension and disseminate false information. Harvard Law Professor, Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-“independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House. With the internet, a government lie can run a race that stretches from coast to coast even before the truth hears the starting gun. You have been warned....
------ This thread is Archived ------
Post Comment - Post a comment on this Forum Thread

This Thread is Archived

This Thread is archived, so you will no longer be able to post to it. Threads get archived automatically when they are older than 3 months.

« Go back to All Threads
Message #318

Stats for this Thread

464 Views
3 Comments
by Swedish2015 (69 Threads)
Created: Sep 2015
Last Viewed: May 11
Last Commented: Sep 2015

Share this Thread

We use cookies to ensure that you have the best experience possible on our website. Read Our Privacy Policy Here