Scamsters, Spies and Trolls, an Internet Story

Intelligence Organizations Partner with Internet Crime

By Gordon Duff, Senior Editor

Paid $25 Per Hour to Infect Your Life

A recent investigation carried out by Veterans Today in concert with international agencies tasked with investigating computer crimes has made some startling discoveries. 

Computer intelligence specialists, some formerly to level “hackers” themselves, have “backtracked” the careers of “internet personalities,” including but not limited to comment board “trolls” from key websites, top Wikipedia editors, policy makers at Yahoo, Google, AOL, YouTube.

What we found was a direct correlation between these individuals and some members of these organizations and lobbying groups with suspected ties to espionage and terrorism, corrupt “think tanks,” actual intelligence agencies, radically biased press organizations and widespread “419” internet scams that have cheated people around the world out of hundreds of millions of dollars.

Moreover, we came across the footprints of organizations that hacked the computers of journalists and political leaders, intelligence and law enforcement officials, not just infecting their computers with sophisticated spyware but systematically placing highly encrypted illegal child pornography onto the computer systems of many.

Behind this even still, we discovered foreign intelligence agencies working directly with local police “child pornography task forces,” relationships based on bribery, that have been used to blackmail, intimidate and silence.

The underlying criminal activities being protected include the operation of terrorist groups inside governments, as outlined in President Obama’s November 21, 2012, (Insider Threat Memorandum) and terror acts such as the Benghazi attack or terrorist operations inside Syria.

The trail also leads to terrorist threats against the UK, Kenya, Nigeria, South Africa, Japan, threats that, when discovered by law enforcement or intelligence sources, show patterns of protection against investigation and prosecution, with terrorists and fraudsters having a virtual stranglehold on the “wheels of justice.”

Evidence, which can and will never be accepted, another discovery of our investigation, shows full and absolute penetration of court systems, prosecutorial authorities and ministerial/legislative branches tasked with dealing with the threats and “actors” who operate with brazen openness.


The lowest level of players are many among the ranks of “internet trolls,” individuals long dedicated to stalking, harassment or sabotage, making the internet a hostile environment and subjecting those who participate in forums to the rough equivalent of imprisonment in the “violent ward” of an insane asylum.

Among the genuinely mentally ill who act independently, there is a paid group, carefully screened and recruited, chosen for their narcissistic personality disorders, delusions and desire for empowerment through participation in very real conspiracies.

These individuals have varying degrees of technical competence though most receive both training and broad technical support.  Most use multiple identities, some with, not only dozens of screen names but multiple IP addresses as well.

Some are employed by internet companies such as Google or Yahoo, others received support or “blind proxy” email and “shifting IP’s” through these companies and a network of service providers.

Key social networking sites are fully, not just infiltrated, but appear to be complicit at every level of planning and operation.


The strongest correlation is between “trolls” and “419 scammers.”  Individuals who sit online from 16 to 20 hours a day, moving through comment boards across the internet, spewing propaganda, profanity and selected conspiracies meant to advance the cause of some governments, are also the source of many of the endless scams usually blamed on Nigerians.

Dozens were found to use “chatroom IP addresses” to send out millions of emails, some claiming to be from government agencies such as the IRS or FBI, still more, lotteries, or varying endless frauds of every description.

It was always part of the Mossad model that intelligence operations be “privatized” and “self funding.”  I am not saying that these are real “Mossad” operations but systematic internet trolling that originates either from Israel or from AIPAC related lobby groups and think tanks has been proven to be financed through internet financial fraud.

One group was traced from offices in Mountain View and another from Sunnyvale, then run through Nigeria, then to Singapore for banking and then to Tel Aviv.

Imagine all this planning and bother to run an internet scam to fund a sociopath to stalk people on the internet who uses the word “anti-Semite” in every other sentence.


In each of the cases we looked at, we were able to quickly identify the individuals involved, penetrate their cloaked IP addresses and identify them as criminals.  Yet these same individuals, many who sit at desks or “cubes” at major internet related companies, are never arrested or investigated though they are “findable” even through use of search engines (some they help manage), findable without using proprietary and restricted code designated for law enforcement use only.

Those programs, which, by the way, are most often used by scamsters themselves, including COFEE, a common forensics program for police, illegal for private use.

Moreover, backdoor “Trojan” programs are used to load “COFEE” onto the computers of others along with illegal pornography.

Even more dangerous is access to full email archives of the largest internet providers which allow altered and fabricated email and documentation to be inserted into the “internet history” of targeted individuals, subjecting them to potential prosecution for everything from sex crimes to terrorism.

Combine this with full penetration of the justice system and we see a pure “police state” in existence.


The primary source of all attacks on activists, free speech advocates and other commonly targeted individuals is Wikipedia.

While living off contributions from the public, Wikipedia has systematically given over thousands of key controversial areas to organizations within Israel who publish outlandish and clearly libelous accusations, almost invariably based on Israeli publications as source material, publications with no “standing” in regards to credibility.

Once a Wikipedia page is adequate turned into garbage and propaganda, it is “locked down.”

Wikipedia, the singularly largest information source in the world, despite lawsuits and consistent violation of every one of its own policies, either submits or is actively involved in suppression of vital information and bizarrely worded and childishly written biographical assaults on, not just public figures but private individuals as well.

In each and every case, the issue involves an agenda that seems to tie to Israel.  The part of this that causes the most “push back” from the Israel lobby, Mossad, the ADL and SPLC, is that there seems to be nothing “Jewish” about Israeli interests which, through analysis, seem to gravitate toward financial crimes, drug and human trafficking and terrorism.

Thus, an attack on narcotics production in Afghanistan can elicit a charge of “anti-Semitism,” thus revealing, through clumsy ignorance ties between propagandizing and disinformation, supposedly in defense of “Jewishness.” as actually being systematic complicity in organized crime.


Connecting internet “trolls” to intelligence organizations, the Mossad, MI 6, the CIA and others is most easily done through using pattern analysis programs to recognize the use of “talking points” that reflect three specific areas:

  1. The output of key publication, both internet and print, such as or Canada’s “National Post,” which are obvious outlets for disinformation and are editorially biased to support positions either inconsistent with even the most rudimentary intellect while demonstrating consistent moral repugnancy. Add to these groups like the National Rifle Association and “Tea Party,” and issues of affiliation between internet espionage, “black propaganda” and foreign based psychological operations (PSYOPS) become clear.
  2. Endless “Think Tanks,” the largest and most “ham handed” of which are the CATO Institute and the Heritage Foundation, establish, not only the “talking points” used by paid “trolls,” but often take a more active hand.  CATO has been tied to the Benghazi attacks through their funding of the distribution of the “cover operation,” the Terry Jones telethon and the Islamophobic film clip he simulcast at great cost around the world.  One of these organizations, “Project for a New American Century” openly planned, not only the 9/11 attacks, publishing papers that demonstrate ties to the conspiracy, but also the planned invasion of Iraq, now listed by the International Criminal Court as a war crime.
  3. To close the loop, Fox News, Clear Channel and CNN “info-media” sources continually parrot the same messages, using typical PSYOPS methodologies of constant “branding and repetition” to blur the lines between reality, rational discernment and “approved” conspiracies meant to support, not only organized crime but very real terrorist organizations as well, organizations that use terrorism as a tool to support financial agendas.  (95% of all terrorist attacks fall under this category)

With the “revolving door” system in place, not just Washington and London, but around the world, corrupted political leaders leave office, corrupted military leaders leave their careers and commands, and assume positions that provide the insulation of an appearance of stately credibility, adding to the mosaic of the “fifth column” inside government, the “Insider Threats,” and the consensus and support they get through those who mold the public opinion of the fearful and weak minded, the “lunatic fringe,” (never to be underestimated…perhaps a majority in some regions of the US) and the end clients, who operate through rogue nation states and extremist political movements.


If one is unfamiliar with the revelations about 9/11 over the past decade, indicating, not only that it is a proven “inside job” but that the chorus that denies this is and has been fully complicit in the crime itself, one can look to endless other evidence.

In Britain, a series of enquires about the Iraq War and news media involvement in blackmail, treason and espionage, joined with investigations showing pedophile rings at the highest levels of government and society, present an unavoidable mosaic hardly subject to doubt.

Everything proven in Britain has a mirror image in the US, with a government controlled by espionage rings that have operated through foreign controlled press organizations for over two decades.

Drug cartels operating at a “street value” of up to three trillion dollars per year, Afghanistan, Iraq, Kosovo/Albania, Colombia and Mexico, control every level of American government, not just state, local and, of course, Washington, but police agencies, the courts and have penetrated the legal profession, law schools, universities and all major financial institutions.

Control is maintained through rigged elections, “Gerrymandering” which allows a minority party with few votes a vast majority of seats in congress (though unconstitutional through the “Equal Protection” provision, a 5/4 majority in the Supreme Court, again an institution controlled by drug dealers, insures justice will never prevail), and systematic assassinations of officials, US Senators (Paul Wellstone was one, there were more), rigged prosecution of others, (Don Siegleman for one) and blackmail.

The electoral process itself, now driven entirely by drug money through “Super-Pacs,” has guaranteed that the public will be permanently cooperative and compliant or subjected to imprisonment or extermination.  Anyone not believing that this eventuality has long been prepared for is not paying attention.


Becoming a targeted individual is simple.  Attempts to call for redress on issues that threaten criminal or financial interests may make any individual a target.  Harassment and stalking by paid “trolls” is enough to discourage most.

For others, being threatened with prosecution, threats, pornography, classified documents placed on your computer and discovered through “convenient” police investigations, is a daily occurrence.

All the while, members of our government and the Washington establishment amuse themselves with kidnapped children, later slain and disposed of and have for a long time.  The Franklin Affair was only a shadow of what is really there and more than enough officials have come forward about this.

Time and time again, the FBI and Department of Justice has been asked to prosecute major sex traffickers tied to the powerful “overlords” only to turn away.  Law enforcement officials who push “too hard” are retired, fired or are discovered with drugs or accidentally lose computers filled with classified information.

Some simply disappear.

Others have been infected with weaponized anthrax from Ft. Detrick or wake up “dead” on a garbage dump.

Key to remember is that, for each and every American, the connection to treason, to espionage, to world organized crime is as close as a Facebook post or that crazy person who keeps sending emails.  Too often, it is in the wild accusations received from a “patriotic” website said to be run by former “Black Ops” or “Swift Boaters.”

No, sitting there with your “tablet, smartphone or laptop,” you are quite probably touching the most hare-brained and malevolent tentacles of the world’s intelligence community, a “community” that, in reality, is the heart and soul of very real terrorism.

It isn’t your children that need protecting from the internet, not hardly.



The views expressed herein are the views of the author exclusively and not necessarily the views of VT, VT authors, affiliates, advertisers, sponsors, partners, technicians, or the Veterans Today Network and its assigns. LEGAL NOTICE - COMMENT POLICY

Posted by on December 9, 2012, With Reads Filed under Veterans. You can follow any responses to this entry through the RSS 2.0. Both comments and pings are currently closed.

31 Responses to "Scamsters, Spies and Trolls, an Internet Story"

  1. johnsholtes  December 27, 2012 at 8:50 pm

    This site like Lasha Darkmoon and Informationunderground requires me to go to the search engine and clickn the link to get to it.. You tube prevents non kosher responses ad when they o get through a few days later they all deleted and of course 99% of the internet would never even let people who know about the jewish problem evenn post.

  2. stephanaugust  December 16, 2012 at 11:43 am

    “… establishment amuse themselves with kidnapped children, later slain and disposed of …”

    Please write more about this.

  3. Howard T.Lewis III  December 12, 2012 at 2:47 pm

    Patriotism need be made of sterner stuff.

  4. Howard T.Lewis III  December 12, 2012 at 2:46 pm

    99.8% of readers can not tell the difference between a source and a webmaster, preferring to ride in the ship rather than free swim with the sharks and a pool toy.

  5. cj  December 11, 2012 at 2:26 pm

    What about the children gordon?

    what will be done about all the children

  6. blakehamilton  December 11, 2012 at 6:05 am

    Completely off ya rocker.

  7. blakehamilton  December 11, 2012 at 1:34 am

    Just like the hasbara bots you provoke then play the victim. Just like the hasbara bots everything you bleat about is what you are guilty of.

  8. blakehamilton  December 11, 2012 at 1:33 am

    You have definitely lost the plot. Every comment section you have turned into the rahnameh hasbara show.

  9. blakehamilton  December 10, 2012 at 5:11 pm

    Gosh you are getting more loony by the day.

  10. blakehamilton  December 10, 2012 at 4:52 pm

    More projection on your part. You are just exposing yourself at being a deluded annoying anti social creep.

  11. stephanaugust  December 10, 2012 at 1:44 pm

    I knew it!

    Thank you for the article.

    And now, as we see how these people use the internet, we have an idea on how they use the media. The only question is for how many decades?

    What to do:

    People should start discussions in pubs where they know each other and not in the internet where they cannot see their “friends”.

  12. blakehamilton  December 10, 2012 at 11:54 am

    Wow well said and you did not even have to mention names.

  13. xx  December 10, 2012 at 8:40 am

    One who “provides” information follows through with hotlines and other critical information to provide some assistance to victims. One who “pursues” information, the above stated is commonly the last thing on their mind.

    One only has to ask, “What are they pursuing?” And sometimes may follow through with….well could be simple mistake. I’m sure.

  14. xx  December 10, 2012 at 5:51 am

    Online, or offline? your choice.

  15. xx  December 10, 2012 at 5:50 am

    There’s a difference between articles used to “pursue” information, and articles used to “provide” information? A distinct difference.

    Do you know how to determine this difference, this detail, and would you like me to tell you?

  16. xx  December 10, 2012 at 4:49 am

    Has nothing to do with reading, have been fighting this for over 10 years. It’s about being aware. You clearly have no experience with truth…

  17. Aletheia  December 10, 2012 at 4:08 am

    Oh so true uncle Gordy. Being a simple nobody that I am, and yet having gone through some of the stuff you pen here, In can only confirm. I can better understand what happened to me now, thoughnot fully yet. I’ve often wondered, why me and/or what would face any other influential person. I get some answers from what you posted here, and so much more is my realization that, truth indeed matters and scares its deflectors, regardless of who fosters it.

    Keep going. May God continue to bless and keep you and yours, may he keep VT and defeat all evil.

  18. Gordon Duff  December 10, 2012 at 3:31 am

    it not only has been happening, but I can name several people…

  19. kristtheking  December 9, 2012 at 11:44 pm

    BRILLIANT Gordon. You mention COFEE and files. I do believe some innocent persons may have, or WILL be, infected with inappropriate files onto their computers, remember we are dealing with LIARS here so they will bear false witness. Imagine a decent father, implicated in some images “found” on his computer. Disastrous! Also this makes interesting reading Israeli IDF “Cyber warriors” link says they’re “good guys” but I think they use their skills in creative ways. Another: OK, so we have the IDF and some infiltrators in the DoD- whaddya got? a monster. Maybe I should follow Judy Scheindlin’s advice and “not use the machine”- she makes 50 mil a year and never touches one.

    Gordon, this is a very important article and I hope the right people see it and take note. As usual you post another very intelligent article. Thank you

  20. Warlord Moneybags  December 9, 2012 at 11:35 pm

    This is a bit off track but I think it is interesting nonetheless as there was an article here about Anonymous recently.


    I guess many of you have heard about the prank call by two announcers from an Australian radio station to a London Hospital concerning the admission of Princess Kate for ‘severe morning sickness’, and one of the nurses who took the call committing suicide ?


    Anyway, I just read that Anonymous posted this video on YouTube.


    It looks like a fake to me, the voice is different and it would be easy to do as there are no lips to read.

    Maybe to discredit Anonymous ?

    If it is real then they are almost certainly bad guys posing as good guys. Otherwise, why would they bother with something as inane as this ?

  21. xx  December 9, 2012 at 8:53 pm

    And Gordon,
    If concerned about emails sent to you. What was sent was developed by me, it’s for you, so use with care. I will not develop weapons……..and never will. signing out.

  22. xx  December 9, 2012 at 8:28 pm

    And how was international cyber warfare promoted, by stopping so many investigations as to allow perpetrators to learn, study, and exploit system with few deterrents. Apparently someone threw in large smoke screen so they could walk through the front door.

  23. xx  December 9, 2012 at 8:18 pm

    So prior to year 2000, investigators had some chance of pinpointing these perpetrators committing electronic crimes. After 2001, and newly created laws, many investigators task became more difficult because the door was opened further for exploitation. However, through advances in technology they had some success; but again, criminal operations were moved abroad. Now, the task of investigation becomes even more difficult, and the door was opened for international cyber warfare. When too many investigators were told to ignore complaints being filed officially, the door was opened for international exploitation and new business types, and finally international cyber warfare.

  24. joesigur  December 9, 2012 at 7:58 pm

    I think this behavior causes moderately informed ppl not to look closer at the issue- they want to discourage scrutiny- if an idea can be labeled anti semitic- the casual political observer is satisfied to look no further

  25. xx  December 9, 2012 at 7:31 pm

    And Gordon, the above mentioned are not shills as you say, their desire is murder people.

  26. xx  December 9, 2012 at 7:29 pm

    The elaborate scheme is often performed from abroad; its simple paid electronic kill service. During the early 2000’s they would break into emails and sometimes due in part to high level court cases (steal case information), however, during this time certain laws were implemented by the last administration to cover-up these crimes committed by cartel executives. However, in last 15 years or so, it’s becoming paid to kill service, as past laws implemented opened the door for extreme exploitation and crime (maybe planned as so by some). The new cyber stalking task groups and companies are out sourced from abroad, meaning large companies are now involved in this activity. I am aware some of this activity being performed by groups (companies) in India; however, they are connected with several other countries. They also use extremely sophisticated software, and attack people 24/7. They have absolutely no problem contacting you “personally”. They use phony front end companies in the US, UK, and other, promoting one business while performing another as well. Some Federal Agencies refuse to investigate these groups “companies”, I believe it’s due to knowledge of their sponsors and connections (our country is fragmented). They have many phony “front ends” in the US, and often small enough to simply change their names’ when they receive some exposure. They seem to be targeting people who presented evidence of crimes during last administration, and with regards to certain executives connected to top level.

    And yes, they plant information by stealing identifications and persons name to exploit them. Their using the very system they created to electronically attack those who were exposing their activity, even though they were not “completely” prosecuted (meaning fines were paid). They simply paid fine, and investigations stopped, and thereafter continued performing the same activities. They understand eliminating witnesses was necessary for them, and developed the “perfect system” to exploit these people electronically. They can send thousands of mails from anyone’s personnel email, with no risk of investigation. Their intention is to create phony profiles, and harass people, and then use the system to make the kill. I can imagine those who were unaware, likely having no idea why they were attacked so aggressively (phony profile made electronically). Because “contracted group” (company) created fake profile of them and exploited their electronic systems using their email and identification, and other.

    They would simply make them criminal “electronically”, through identification theft, then exploiting and sending emails while knowing all this would be collected. Some Federal Agencies (in states) are continually being told to stand down and this clearly due to their earlier involvement and knowledge of crimes during last administration. They know when party changes again, they will become targets as well. So the system, as many would believe was created to protect the US peoples, but hidden within the system are those whose intention is to exploit this system as tool for crimes.

    I observed an executive some time back (about 2003), who sat in office most of day going through personnel home email accounts of people who worked for him, he hired young computer science engineer to break into their email accounts. Do you know why?

    To make certain no one was making reports about his unlawful activities. Just the opposite of why this system was implemented, maybe. And further, imagine being in high level law suit against extremely wealthy family, who had no problem going through all your communications, from abroad paid services. One wealthy family owned toxic waste businesses, the 50 gallon barrel type. I wonder why, apparently so did one agency.

    Would you wonder why they were operating this type of business as well?

  27. Martin Maloney  December 9, 2012 at 5:08 pm

    Here’s what can happen to someone who goes after a member of the protected clas:

    Dutch pedophile exposer to stand trial, high-ranking pedophile still walking free

    December 10 marks the trial of investigative journalist, activist and foremost Dutch Bilderberg Group hunter Micha Kat. The 49-year-old faces the Court in the Hague for alleged insults to the Dutch royal family, alleged discrimination of a lawyer whose fraudulent and corrupt activities he exposed, two alleged false bomb threats, alleged death threats against a journalist of Dutch mainstream newspaper Telegraaf, overall “instigation”, and for writing “danger: pedophile” in Dutch language on the house of known Dutch pedophile Joris Demmink who has been the most powerful man of the Netherlands for the last decade.


  28. Gerry  December 9, 2012 at 5:05 pm

    How have I evaded detection so long 😉

  29. duay khwaam nap theuu  December 9, 2012 at 4:30 pm

    We used to do it by observation and by hand in “the old days.”

    Textbooky stuff:
    In Britain the development and growth of anthropology was deeply connected to colonial administration. As early as 1908, anthropologists began training administrators of the Sudanese civil service. This relationship was quickly institutionalized: in 1921, the International Institute of African Languages and Cultures was established with financing from various colonial governments, and Lord Lugard, the former governor of Nigeria, became head of its executive council. The organization’s mission was based on Bronislaw Malinowski’s article, “Practical Anthropology,” which argued that anthropological knowledge should be applied to solve the problems faced by colonial administrators, …

    Anthropological knowledge was frequently useful, especially in understanding the power dynamics in traditional societies. In 1937, for example, the Royal Anthropological Institute’s Standing Committee on Applied Anthropology noted that anthropological research would “indicate the persons who hold key positions in the community and whose influence it would be important to enlist on the side of projected reforms.” In the words of Lord Hailey, anthropologists were indeed “of great assistance in providing Government with knowledge which must be the basis of administrative policy.”

    The more things change…

  30. dalethorn  December 9, 2012 at 4:21 pm

    It’s gotta be tough running trolls. You can’t get quality writers unless they’re crazy, which tends to negate the quality. Then you get someone really good and they turn out to be a loose cannon. Makes me appreciate my boring corporate job.

  31. lawrencedickerson  December 9, 2012 at 3:05 pm

    I post the most meaningful editorials and articles over on the Amazon Discussion Boards in the History and Judea forums.It gets read all over the world even though participation is limited because of a few who lambaste any disagreement over Israel or Judaism for that matter as being “rabidly antisemite”,plus a few other choice insults and inflammatories.

    I am of the opinion that they feel that tossing verbal hand grenades hurts my and other’s feelings and cause fear.Little do they know that they are painting a racial picture full of hatred of themselves thus I get more bang for my buck.Already several of the regulars have abandoned their position of these boards so we are having an effect,little by little.

You must be logged in to post a comment Login

From Veterans Today Network