CIA Trolls Infect the Net

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information


by Susanne Posel –  Occupy Corporatism


In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

YouTube - Veterans Today -

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

  •  Finances
  • Stock transactions
  •  Business deals
  • Foreign military
  • Diplomatic secrets
  • Legal documents
  • Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks • Developing a digital strategic advantage • Collaboration with the US government on cyber issues • Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

The views expressed herein are the views of the author exclusively and not necessarily the views of VT, VT authors, affiliates, advertisers, sponsors, partners, technicians, or the Veterans Today Network and its assigns. LEGAL NOTICE - COMMENT POLICY

Posted by on December 1, 2012, With Reads Filed under Veterans. You can follow any responses to this entry through the RSS 2.0. Both comments and pings are currently closed.

20 Responses to "CIA Trolls Infect the Net"

  1. MConcernedCitizen  December 3, 2012 at 6:06 am

    The NSA must be screwing with this sight . I just posted a comment and it has been put in the middle of some old comments . ??

    This is also been an experience on the TOO sight . If you make a sage observation , the trolls usually jump in and start an inane discussion to bury and distract , the younger minds .

  2. MConcernedCitizen  December 3, 2012 at 5:55 am

    This line is very true in Aust :
    Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

    On the Weekends Multicultural trolls are sent out to bars to ‘socialize’ Aust by playing the extra confident bragger & swagger . They stand out like dogs balls and to my inspection are designed to intimidate white Ozies and ’empower’ minorities to push us around ie intimidate anyone white person who is acting with territorial confidence . That is like you are an Australian ! This my friends is the future nightmare these nutto’s are designing for the world .

  3. Aine  December 2, 2012 at 5:13 pm

    If your banning posts that are “childish and disruptive,” I would appreciate it if you would consider banning TJ Bronco.

  4. Howard T.Lewis III  December 2, 2012 at 5:03 pm

    The interference in open communication of concepts and references of evidence must be extensive AND high tech. The troll garbage is simple to block out, should that be the desire. Sometimes an obscene word really IS the only method of expressing a given distasteful situation. As in, “My. What a distasteful event that was.” Or, “That person insists on distasteful misinformation which could lead to confusion or damage to a case.” Worse than the trolls is the propensity for people to put their uninformed opinion up in comparison to what is known by witnesses. A friend of mine is still raving about Judy Woods. Poor thing. An expensive, high quality text book production and numerous photographs has the poor lad convinced Woods is correct in her assertions and conclusions and not the most destructive lying troll in the entire truth movement. Her credentials help her with more sophisticated lies. Too bad. The credentials are bad enough to compete with. Her logic is intentionally ‘Chinese fire drill’. This makes the truth movement has to negotiate her as a serious obstacle. I tell people to put light bulbs in a microwave oven with a chicken pot pie. The bulbs go off and destruct long before the pie is even warm. High radiation nukes do the same thing.
    Such ordnance, thermitic charges, and the rest, brought the buildings down and the government has been methodically and gradually been overthrown by agents loyal to Britannia. I suggest we get with arresting the swine. New videos prove special preparations were made at the WTCs for the 9-11 event. They built those three buildings to blow them up as ‘Day 1’ of an offensive. Skilling and Assoc. personnel were extremely pissed about the belated addition during construction of the preset demolition apparatus.
    This offensive is manifest in the actions of Skull and Bones, BP, freemasons with their ‘Grand Patron’ ‘queen lizard’, etc.. Throwing in a few Israeli mercenaries complemented the New York City individuals in authority and the WTC developers engaging in economic war against the rest of the American public.

    Obscenity trolls are like a dirty carpet. It is the sophisticated troll coordinated efforts brainwashing people that really need to disappear. I am the only person I have seen on the net explain the fix Skilling and Associates found themselves in after the preset was added a few months after construction began. I also am the only person who I have heard of who documented the preset and resulting NYC lobbying effort in 1969 to have preset demolition systems banned. One thing is certain. The Port Authority of NJ/NYC knew, the heads of the fire department and police knew, and someone got in WTCs I, II, and 7 and set and inefficiently spread around a huge amount of 1998 vintage nanothermate to cover for the fact that the computerized older vintage thermitic material based system was in place. There should be no question of this, unless Harrit, et al, are lying about the availability of that nano-ordnance back in 1968. In which case, the jets penetrated the ridiculously thin exterior steel of the upper floors of the WTCs I and II and fatally damaged the cores through ignition of some of the old computer connected thermitic material and other demolition charges. This is evidenced in many videos and stills. See the burnt horizontal areas along the sides of the WTCs I and II at the impact levels. Here, the exterior steel panels were only 1/4″ thick of convoluted steel bound, bolted and welded with only slightly thicker integral horizontal spandrel members. Those large flashes of white light from the jets’ first moment of contact must have been a high voltage discharge. Diodes in the demolition apparatus circuitry contained the electrical feed.

    The Chicago Sears tower, which Silverstein & Co. briefly owned and renamed the Willis tower in 2004, was soon sold to a rabbi friend of Silverstein’s. Buying the officially condemned (2007 demolition mandated for safety reasons. WTCs were falling apart) WTCs off of the Port Authority for about $150 million and reinsuring it removed a $4.5-$5.5 billion liability from the Port Authority and insurers. Bush41 fraud dwarfed any insurance fraud. Silverstein was the queen duck-taped to the front of the pirate ship. Quite a payoff to tolerate a period of name calling.and risk for being charged with accessory to 3,000 counts of premeditated murder..

    After leaving the presidency, Bush43 moved his residence in Texas to a house just down the street from the CEO of Turner Construction, the resident contractor who refurbished the fireproofing on the floors impacted by the jets in the three years previous. The moral here? Read your Leviticus 20 in the Old Testament. Never do a job for a guy nicknamed ‘Molloch’ just because he has the money. And don’t do business with sickos who fly the Jolly Roger. And above all, don’t vote for the vermin This should be intuitively obvious.
    Thanx for cleaning up the carpet.

  5. Howard T.Lewis III  December 2, 2012 at 4:32 pm

    What have I written in that you claim to be false, verbosity aside?

  6. Rob13  December 2, 2012 at 3:59 pm

    That was a reply to Judgeredd, regarding his post…seems like there is a problem in the comment section..

  7. Rob13  December 2, 2012 at 3:57 pm


  8. Judgedredd  December 2, 2012 at 3:26 pm

    Personally I’ve found VT to be a site that is well balanced, with articles from a wide range of political views. I like that it encourages you to weed out the truth for yourself,there’s plenty of posts that disagree with the articles written here.
    Try posting on the BBC site if you want to see how much freedom of speech you really have.
    Great site thanks Mr Dean.

  9. Gary Walker  December 2, 2012 at 2:11 pm

    I’m still preying for you Tyron.


  10. Jim W. Dean  December 2, 2012 at 1:26 pm

    Yusef has been baned from VT for repeated terms of service violations, which he admittted, due to some ‘issues’, and promised to reform. He broke he word…several times…so he can no longer disrupt the boards with his childish behavior. He is gone. Let there be peace among all men…here ye, hear ye.

  11. Excalibur  December 2, 2012 at 10:52 am

    Agreed there Tyron.

  12. Excalibur  December 2, 2012 at 10:49 am

    “The further a society drifts from the truth – the more it will hate those that speak it.”

    Mr. George Orwell.

  13. DaveE  December 2, 2012 at 9:38 am

    Well put. I HOPE the dirty bastards read my emails. Free publicity, the way I see it. The Jews think they can outsmart the truth, but that belief really shows how stupid (and arrogant) the Jews are.

    Truth will win if we’re not afraid to speak it.

  14. Gordon Duff  December 2, 2012 at 9:04 am

    the comment section is overseen by software

  15. stephanaugust  December 2, 2012 at 3:09 am

    People can be this stupid. If I try to explain this cyber control thing everyone thinks I’m crazy.

  16. K7KTR  December 1, 2012 at 8:11 pm

    Most replies I receive are ad-hoc, they leave a stupid comment but nothing in the world to back up what they claim. They do this to diffuse the actual issue by drawing attention from the main subject to some petty piece of info about your post. That is when you let the have it because you intentionally placed that there for them to attack so you can pour the gas onto it with facts.

    I recall recently in the Housing “Explosion” in Indiana a comment was left that a “White Van” was seen at the time. They added… Who do we know that uses White Van’s? Since this brings in the 9/11 Hoax Terror event it opens peoples minds to think.

    Yet, I still say, When we read of the Atlanta Journalist who called for the “US BASED” Mossad to assassinate Obama. We know that had an American said that and not a Jew that “WE” would be in a Jail for making a threat on a sitting president.

    What gets me is how Israel can Kill with impunity and break International Laws, US Domestic Laws and UN Resolutions and not one word is said. This is either because “They” have so much dirt on our representatives and they are being held hostage for the truth or that they are just that dumb and don’t see the flagrant violations of LAW!

    No one is exempt from Laws, It will catch them in some way. KARMA.

  17. The Rahnameh  December 1, 2012 at 7:44 pm

    Dear VT Staff and Editors, excuse the multiple posts, but this is a very important topic and my thoughts are coming together piecemeal. Is there anyway we can organize a VT brigade for the same purposes? It’s time we fought fire with fire. I would be glad to provide the ammunition.

  18. The Rahnameh  December 1, 2012 at 7:41 pm

    Don’t be afraid to be a one-man army. Create multiple names. Control the discussion. That’s what Abraham Lincoln used to do! (pen letters to famous publications under pseudonyms attacking his political opponents)

    They don’t fight fair, why should we? Game Theory 101.

  19. The Rahnameh  December 1, 2012 at 7:40 pm

    I can rightfully brag that I may be the “Red Baron” of hasbara killers. This is a page right from the Zionist playbook.

    The easiest way to counter these trolls is not to address their purported arguments directly, but to counter with several haymakers of your own. For instance, during the recent Gaza massacre, Israel sent out its hasbarists to minimize the damage. They would use one-liners like, “How can you deal with a terrorist organization, Hamas?” My response was to show the audience that it was Israel that helped spawn Hamas (with link to WSJ article supporting this) with the same exact charter. Then I would put them on their back feet. For example, by producing Dr. Alan Sobrosky’s video regarding 9/11 or asking how we can trust Israel when they’ve been lying about Iran’s nuclear program for 10 years and dragged us into the Iraq war just the same (with supporting evidence)?

    Then, a synopsis of the real history of Israel, speaking to the roots of Israeli terrorism, the Lehi, Irgun, Hagganah, and Stern gangs, including a request from readers to Google terms like “Jonathon Pollard” “AIPAC espionage” “Lavon Affair” “USS Liberty” (with brief synopsis) or even “Israel taped 9/11”

    The results were fantastic. If they open the door to their impeachment by trying to label you, do no resort to the tactic of simply asking for a substantive argument and that the labels be eschewed. Counter-punch, counter-punch, HAYMAKER.


    With all due respect to the REAL CIA, Internet trolls achieve the opposite effect in a PR campaign, particularly when people can disintegrate their arguments with one simple Google search.

  20. K7KTR  December 1, 2012 at 6:43 pm

    After hours of research and studying the lies and deception of THIS Government, It would be an interesting question to have that asked of me if I personally know of anyone planning to destroy property or cause harm to others.

    The U.S. Government is in clear VIOLATION of the NDAA, Patriot Acts as well as the Lugar-Obama Act in Arming the very “Terrorist’s” that they have used as a plot against the American People by the lies of “Fighting Al Qaeda” the Boogieman whom they Armed in Libya and now Syria.

    They have De-listed the Mujaheddin from the Terrorist’s list, and V.P. Biden said that the Taliban ISN’T an enemy of the US and this was confirmed by the White House and Welcomed by the Taliban while the U.S. releases top leaders of the Taliban from Bagram Prison and soon GITMO.

    Then the US Government has sent 1.5+Billion to the Muslim Brotherhood. So in a Nut shell, Since the US support all 4 of these Terrorist Groups, Who is the ENEMY that PFC. Bradley Manning is alleged to have AIDED? Name them!

    For the U.S. by Arming these Al Qaeda, Rebel’s, NTC, FSA, has “CAUSED” the Death’s of tens of thousand of people in Libya, Syria and over 1 Million in Iraq. So WHO has Manning killed? The release of the War Crimes information killed WHO?

    Yet our Media calls Manning a traitor and not those in power who ordered the mass murders throughout the Middle East and then wants to say that WE “American’s” are hated for our freedoms as they Bomb Emergency Aid workers and Funeral’s too. This in clear violation of the Geneva RULES of WAR. For a Injured Soldier/Combatant is considered OUT of the conflict. Or…..

    Should the alleged enemies of the US and Coalition Forces have their M.A.S.H. Units, Hospital’s, and Air Ambulances BOMBED since the U.S. wants TOTAL KILL and no survivors with zero morals in bombing funerals in which the CIA was quoted as saying, “We really don’t positive ID a Target” and Obama said, “If their in the AREA they are probably up to no good.” Which is why we see the lists of Dead CIVILIAN’S whom the US simply has changed the name of Collateral Damage to “Militants” to get away with the direct targeting of Civilian’s…. A WAR CRIME!

    Do I know of anyone that wants to cause harm or destroy property? YES. Watch what a Hellfire Missile does. Fail!

You must be logged in to post a comment Login

From Veterans Today Network