PDF file of this article: Vortex - The threat that keeps us apart
The threat that keeps us apart
Outpost of Freedom
May 24, 2012
Noun: 1. a mass of whirling fluid or air, esp. a whirlpool or whirlwind.
2. Something regarded as a whirling mass.
So, why Vortex? Well, when something goes down into the bottom of a vortex, it is spun around and emitted in a different form than when it went in.
A recent discussion brought up an issue that has been close to me, for quite some time. I have seen many succumb to entrapment, or, just plain deceived, by agents, informants, infiltrators and other such ilk.
It seems that many think the government is squeaky clean, or, that issues, not being of national security levels of interest, don’t warrant the effort that would be necessary to ‘move in' on the patriot community.
A few years ago, I learned that as many as fifty percent of the members of Richard Butler’s Aryan Nation Church (Randy Weaver country), and of the old Posse Comitatus, were people who, for whatever reason, had changed sides, or were not quite honest in their dealings with the respective organizations.
I had read the following memorandum, which is included in the Appendix of Congressman George Hansen’s book, “To Harass Our People”, while traveling through the Washington, D.C. area, after Waco. I met with an associate of George Hansen. He gave me a Xerox copy of the memorandum, and I have no doubt as to its authenticity.
As you read the excerpts from the memorandum, take note of the extent in which the government is willing to ‘get involved’ in the “Tax Rebellion Movement” (see note 5 to District Directors). Remember, also, that this memo was written nearly 40 years ago. It would be ludicrous to think that they have not enlarged and perfected their program. [Emphasis, mine]
* * * * * * * * * * * * * *
FEB 26, 1973
to: Participants in Conference on Tax Rebellion Movement
from: Western Region
subject: Tax Rebellion in California
I am sending you the minutes of our meeting of February 9, 1973, on the Tax Rebellion Movement. These minutes enumerate action items for the Los Angeles and San Francisco District Directors and for Regional Office officials.
I appreciate your past attention to this serious matter, and feel confident that all of us working together can successfully overcome this challenge to our tax system.
Homer O. Crossman
Mr. Howard advised he has been conferring with state tax officials who are anxious to cooperate with IRS in the attack on tax rebels who also do not pay state taxes; often the state can move quickly to close up a tax rebel's business or revoke his license; that we should see that the State uses its enforcement machinery on those cases which are not our targets.
Mr. Crossman reported on his discussions with Assistant U.S. Attorney Courts and Judge Crocker, Fresno, and of their interest in enforcement of the law in tax rebel cases. Mr. Hansen commented on the problem of federal judges appearing to be anti-IRS based on a belief that IRS is "highhanded". Mr. Howard reported on a change of attitude in federal judges in San Francisco after he met with a number of them and discussed the gravity of the Tax Rebellion Movement and the importance of giving prison sentences as deterrents.
There was a general discussion of the importance of meeting with U.S. Attorneys and federal judges to acquaint them with the full picture of the tax rebellion movement. Mr. Crossman pointed out that after his meeting with Mr. Couris and Judge Crocker, they requested background information on the Movement which was furnished them.
Mr. Kingman suggested the possibility of requesting religious leaders to warn their following against participation in the movement, pointing to the beneficial effects of Mormon Church President Lee's message.
Mr. Krause pointed out the importance of close planning on common targets by the tax rebellion project supervisors of the Los Angeles and San Francisco districts with planning meetings as needed.
Action items for District Directors:
1. Maintain the initiative in the attack on the tax rebels.
2. Know their plans before they arrive at our door to execute them.
3. Identify the leaders of the Movement and concentrate on them.
4. Have a plan of action in coordination with the Region rather than hit and miss defensive reactions.
5. Continue to step up the infiltration in-depth of the Movement.
6. Use all available federal, state, and local laws.
7. Use civil penalties on Porth-type cases.
8. Wage a campaign to educate U.S. Attorneys and federal judges with the importance of prison sentences on cases.
* * * * * * * * * * * * * *
At the same time that the IRS was acting out the above to deal with what the termed "tax rebels", the federal government also had to contend with the anti-war (Vietnam) movement. In dealing with what was going on at the time, infiltration into that movement was also a part of the government's program.
One of the larger groups that were active in the anti-war movement was a broad based group known as Student for a Democratic Society (SDS). They were of so much concern to the government that the government actually started some of the SDS chapters so that they had a degree of control, and, received intelligence from other SDS chapters. If they didn't start them, they, at least, had agents and informants join the various chapters.
Another target of the government, during the anti-war movement, was Vietnam Veterans against War (VVAW). Some of the VVAW members were from Gainesville, Florida. Among them, however, were informants and agents. The agents fed them information that the 1972 Republican National Convention (Miami Beach) was being set up to set up the anti-war demonstrators. They were told that the police would shoot some protesters. This would lead to sealing off Miami Beach by raising all of the drawbridges, trapping the protesters, and making for shooting fish in a barrel. To counter this tactic, the Eight made plans to attack government buildings, police and fire stations, and then force the lowering of the drawbridges. This was to draw the police away from the Beach and allow the demonstrators to leave the Beach, avoiding the catastrophic scenario that had been fed to them. Of course, the informants and agents testified against them, however, their correspondence (which was seen by the jury) said that their plan was "for defensive purposes, only", which lead to an acquittal. However, it does demonstrate that forty years ago, the ability, means, and practice, of infiltration and entrapment were standard government tools.
For a detailed study of the infiltration of the anti-war movement, see http://www.outpost-of-freedom.com/library/provoca.pdf
Who are the agents and informants?
There are any number of reasons and means by which some people will become agents of the government, or informants for the government. Though there are variations of each of these, we will cover the more general types of people and what their relationship to government is.
Starting at the top, we have undercover agents. They can be undercover agents for nearly any branch of the federal or state government. Most often, they are very well trained, to include psychology, so that they can get close to the people they are supposed to encounter and infiltrate. They generally receive very explicit instructions when they go on an operation, though they can also adjust, quite well, when a "Target of Opportunity" arises. They are full time agents (Type I) and will become very close to those in leadership. They will engross themselves in their work, often living a life outside of what would be normal for an FBI agent. They have "handlers" that are often, for months or years, the only contact they have with the parent organization.
There is second type of agent, Type II, who is called in for support; for example, the FBI agent who alleged to have explosives and other material for sale in the Georgia Militia bust. Often they have desk or other duties and are called only when needed.
A good example of the Type I is FBI agent Steven Haug. Haug, who went by "Jersey Steve", had infiltrated the Hutaree Militia. He got so close to the Hutaree leader, David Stone, he was asked to be the best man at Stone's wedding. Later, he would testify against Stone.
Another was a man, back in the nineties, who went by the name of Bob Chapman. Later, when he testified against the Florida Common Law Court, he identified himself as Robert Quigley, "IRS deep undercover agent" and instructor at the IRS undercover school. (See "Let me tell you about a man named Quigley")
These agents are often 'wired', and the recorded conversations are transcribed to be used for evidence, when their task is completed and they have turned witness against former 'friends'. A partial transcription of such a recording can be found at "Record of Activity". BC = Bob Chapman = S/I Quigley is the agent. You may note how he tries to blend in but does ask some questions attempting to entice information that can be used against the parties, later. This is from the 1995 investigation of the Florida Common Law Court that sent all but one of the defendants to prison for 12 years.
These paid agents, regular employees of the government, on special duty, are a blight on our concept of self-government. Though such agents go back to the Revolutionary War, where Washington had a staff of agents that mingled with the British to gain intelligence information, they did not join the British army or other government forces. It wasn't until early in the 20th century that the practice became common, to deal with organized crime. However, currently, the government claims to have thousands of agents working within various patriot or political groups. Must we assume that political activism is now criminal?
The other form of agent is the paid agent of a private organization. These are best described as "infiltrators". One such organization using this tactic is the Southern Poverty Law Center (SPLC) that claims to have many infiltrators within the various patriot groups, from militia to Tea Party groups, and everything in between. Their primary purpose is strictly information gathering, though if given the opportunity, they will exploit a situation.
Informants come in different varieties. Some are induced into informing on friends and associates when they are charged with a crime, themselves. They will sign a "plea agreement" (plea agreement informants) and exchange their efforts for, most often, a "withheld adjudication" -- meaning that so long as they provide good information (not necessarily truthful), and testimony, if required, they will not be prosecuted for the crime that they are alleged to have committed. See "Informants Amongst Us?" for an explanation of this process. In desperation, these informants are capable of lying (since they have already given up their integrity) and participate in entrapment, to 'save their own skin'. They are, by nature, weak and unwilling to stand up for their convictions.
A lesser version of this is the "states evidence" witness that will tell all to save his own neck. Though not an agent, active informant, or infiltrator, he is often the source of conviction of patriots because he does not have the fortitude to be a true patriot. An example of this is one of Schaeffer Cox's fellow Alaska Peacemaker Militia members, Michael O. Anderson. Cox, Lonnie Vernon, and Coleman Barney are currently (May 2012) on trial. Anderson, who was arrested, along with the other, in March 2011, has had his charges dropped and will be testifying for the state, against the other three. (Reference: Alaska Militia Trial Opens With Former Defendant as Key Witness)
Others might become informants in custody (jailhouse informants), seeking favor, or reduction of sentence. These jailhouse informants will usually testify to anything that is requested of them, to bring "jailhouse confessions" to trial. They are often used to 'enhance' the evidence against a defendant to assure conviction.
Volunteer informants come in two categories. First are those who have been charged with, or know that they have charges pending, for a crime. They will contact a government agency and offer their services, hoping for a reduction, withheld adjudication, or dismissal of charges. This is the probable scenario in the Joe Sims involvement with the Georgia Senior Militia, this past year. Joe, according to an Esquire magazine article, was in jail pending child abuse charges. He contacted the FBI and volunteered to provide information about members of the Georgia Militia.
Other volunteer informants are often James Bond wannabes or government employees seeking beneficial treatment by freelance work to aid law enforcement. There was the Viper Militia, Phoenix, Arizona, in 1996, where about a dozen concerned patriots prepared for a Red Dawn type of event. An aspiring firefighter joined the group. In his John Wayne machismo, he began suggesting more active pursuits. Later, he brought in an undercover Sheriff's Deputy, and both encouraged testing bombs, often made with materials provided by the informant or agent, and making plans to attack government buildings. Prison was the outcome for those that followed the lead of the informant and agent. What bright future lay in store for the informant, we do not know. Presumably, however, he was rewarded favorably.
Another type of informant, though not always intentional, is the "easily swayed informant". These sort don't usually have any idea that they are an informant, though they are, just the same, because they pass on information that might have destructive ends, or, they are duped into passing information that is erroneous and, potentially, destructive to the patriot community. They have, usually, been contacted by a law enforcement agent (often FBI Special Agents), or even others down the chain, including others who have been easily swayed, who convince them that they are really good guys, and an asset to their country. They are then beguiled, and act in concert with agents against the best interest of the patriot community, most often thinking that they are doing right to the community. Often, they will sway others (usually larger numbers) away from any activity that is not easily controlled. If the person is susceptible to the charms of the agent, he can go beyond that easily swayed and become a de facto agent, and never realize that he is being used. It is the psychological training that the agent uses to manipulate the person and use him to influence others, most often away from a professed course. He is, in essence, a sleeper, and can always be put to greater purpose, if the need arises. These relationships tend to be long-term, and quite congenial between the parties.
Of these last, a friend refers to them as "useful idiots". However, I think it more appropriate that they should be referred to as "guess what I know" types. Often, they pass on information just because they have found it and think that everyone should be apprised of this "wonderful;" or "dreadful" information. Rumors of foreign troops across the Mexican border, for example, have been circulating for twenty years, each time, with new adherents and a new life, with only minor revisions to the original story, and, most often, without any identifiable source.
All of those described above are contrary to the Framers concept of government. They are, by their very practice, violating the concept of the Fourth Amendment, the right to "be secure in their persons, houses, papers, and effects".
How do they function in the patriot community?
All of the above identified sources of benefit to the government enter the patriot community, though they do so in various ways.
First is the coward who turns state's evidence, but began by believing in a cause. Once the chips were down, he cowers and turns against those that do hold the principles highly. The turncoat, in a sense, is the worst of those who find themselves on the wrong side of the battle. There is nothing, except his nature, that would lead one to believe that he is not really on the right side -- since he was on the right side until imminent threat to his future freedom caused him to turn against those who had every reason to believe that he was as sincere as they were, and had nothing to hide.
Next, are those who become paid informants. Often, they have joined with a true belief that something is wrong; however, somewhere along the line they change ideologies. It may be the result of less conviction toward the cause; the fear of doing something 'illegal' (as the Founders did); or simply a change of heart. However, they are in and, perhaps, they can make a little money by offering their services to the government. This sort is as bad as the first; perhaps even worse, for he continues to gather and pass on intelligence, and may even go further, acting against the best interest of the Patriot Community and those he has gotten to know.
Next are those informants who have been charged with a crime and decide to "cop a plea" and become an informant for the government. Like the first, those that turn state's evidence, they are cowards and will send others to prison to avoid their own stay in the "gray bar hotel". However, since they continue to "play along" with you, they can pass on even more information, and often will set traps for you to fall prey.
Finally, in the informant category, are those who have joined in hopes of increasing their "job opportunities" with the government. Most often, they are already employees of government, as noted above, but they are playing the "spy game" in hopes of enhancing their resume. (Reference: My Life as a White Supremacist)
Now, we get into the realm of professional spies. These are the agents whose job is to invade your privacy, get dirt on you, and even more, which will be discussed later. We'll begin with the Type II agent. His job is to be available and act the part, when the need arises. Otherwise, he is just an employee with other duties. He will be a witness only to what transpired during the course of his brief interlude with the subject of the investigation.
Next comes the Type I agent. His dress, his manner, his whole life, revolves around his active participation in the group that is the target, or contains the target, of an investigation. Since his job is playing spy, he will do whatever is necessary to obtain the accolades he will get for obtaining a conviction and getting the job "well done", regardless of what techniques he uses to achieve that end.
Often, this person, let's call him the Vortex, will use others to insulate himself from exposure, if things don't go smoothly. He will also use others to achieve specific ends. He is, however, the point of contact between the government and the patriot community, hence, Vortex. The information swirls in and out, on the patriot side of the Vortex. His job is to sort out, manipulate, control that information, and pass it thorough to the government for their nefarious purposes. He is also the source of misinformation, coming from the government side, and then thrown into the swirl on the patriot side, though more about this, later.
Often, the Vortex will never even see a patriot, though he could be directing the operation from a distance. This is common with certain types of informants, where the Vortex is most often referred to as the "handler". However, for any such investigation, there will always be a Vortex; the agent or other government employee who passes information in both directions; plans, or passes on plans, for the control or expansion of the operation; and is the person, who, if exposed by the patriot community, damages or defeats the government's operation.
These agents have a plan when they go into their job. That plan can be revised to meet the exigency when circumstances warrant a change, or an expansion, of an investigation. They will also know who most of, if not all of, those who are lower level informants involved in any case they are working on. However, the informants will seldom, if ever, know who the agents are, until both find themselves on the witness stand. (Reference for Type I and Type II agents: Patriot Games)
Agents, especially Type I, will seldom be used to testify, if informants can became the "fall guys" and provide sufficient testimony to obtain a conviction. Once an agent testifies, he has probably blown his cover and will have to retire to some other duties. His effectiveness is lost, so he is a commodity that has to be protected, unless exposure is absolutely necessary.
Often, these agents will create an organization to give itself legitimacy within the patriot community. In so doing, they have established their "credentials", though you may have never heard of the organization before meeting the agent. If he can demonstrate that he has created a following, you will drop you guard, as he has apparently, achieved what all are trying to accomplish. (See Patriot Games link, above)
In all cases, if the abilities of the individual, in whatever capacity, are such that he can move up the chain of command of an organization, he will do so. This allows him to obtain access to information that others might not have access to. It allows him to obtain information from individuals in casual conversation, when that individual doesn't suspect that anything he says is going beyond the two of them. It also allows him to move upward in command, and perhaps, replace the existing command, once it is taken out because of his efforts.
Objectives of infiltration - Surveillance, profiling, disruption
We must begin to understand just what capabilities the government's has to keep track of patriots. They have an identification program that includes anybody who is likely to read this article. It will include most militia members, even those who have never gone on line, through use of informants and other means. It will include almost any attendee at a Tea Party gathering, and, probably, anybody who had gone to a Ron Paul rally, if the participant gave a name, by any means. Intelligence gathering is the source/foundation of the entire government verses the people program.
Once they get the information, they have to retain, store, manipulate, and provide access, to that information. They also have to sort that information into meaningful data. So, we'll begin by looking at what the sorting aspect entails.
The government has developed a program for categorization of everybody in this country (except, perhaps, illegal immigrants). The program is called "C3CM". It defines three major categories, though we will only concern ourselves with the first one. That is those who have, to some degree, expressed their disenchantment with government -- the patriot community. This doesn't require disobedience, or even advocacy. It only requires that you don't believe that the government is working the way that it should be.
If you are among this group, you will be categorized into one of three sub-categories. Those who are simply dissatisfied, those who are prone to act because of their dissatisfaction, and, those who are capable of leading others into exerting effort to effect change. It doesn't matter if those leaders are of a violence oriented militia, or a group that encourages voter registration and voting outside of the mainstream agenda. The fact that they are leaders and can obtain followers poses a problem for government, though the government may direct more resources at the more militant. This does not mean that the peaceful sorts are beyond efforts of government to affect their ability to lead. On the contrary, each of us has entered the patriot community rather naive, and has learned, as time went on, which can move us, inevitably, toward the more extreme means of dealing with the despotic government that we find in control of our country. If someone can influence large numbers, he is more of a threat than a few isolated die-hards.
Where would the government be able to store and manipulate such a large amount of data? Well, that goes back to a story from the past. Inslaw, Inc., had a contract with the Department of Justice to develop some tracking software -- "Promis" could be plugged into the 12 petabyte (if you were wondering about the next level, a petabyte is 1,024 terabytes) database that Sybase (the company that developed SQL for Microsoft) is developing. So, once all of the pieces fall into place, there will be little that you can do to keep from being tracked, along with almost everything that you do, by the government. (References: see http://www.profoundstates.com/promis.htm)
Now, as they take out any leadership, if they have moved their resource up into the upper echelons of any organization, they have attained a position that may soon leave the government resource in charge of the organization.
We began this article with a memo from the IRS Western Division, nearly forty years ago, about a tactic to be used to disrupt the "tax rebels'. Not that this was the beginning of government efforts to manipulate both people and truth, only to demonstrate, with a provable piece of evidence, that influencing, by whatever means, including judges and churches, is and has been a part of the plan for total control of the people and their actions. Would we be doing ourselves any favors to think that they would not use these same tactics, today, enhanced by both technology and experience?
Methods of Disruption
So, now, let's look at objectives that the government might pursue through their various types of informant, agents, and infiltrators:
- Discredit, or, take out, leadership or those who pose a threat to the continuation of the government's effort to gain absolute control over the people, removing them from their means of influence over those who might follow them.
- Discredit those who might bring attention to government tactics by suggesting questionable behavior, or, accusations, that will occupy them and remove them from any effective contribution to the patriot community.
- Move those who are within government control or influence into positions of influence within the patriot community
- Create division, wherever possible, any organization that begins to grow and may become effective. If possible, splinter the group into two, or more, factions, so that they don't flee elsewhere, and the government can retain controlling interest, or at least positions of influence, within each faction.
- Use of a group the government has control of to create conflict with another group, creating doubt, disenchantment, and, perhaps, dissolution of the targeted group.
- If a group has a structure (rules) that would make it more difficult to create disenchantment, challenge, ridicule, or ignore the rules, to create as much disturbance as possible -- hopefully to disrupt any group that might really organize into a cohesive and effective group working together for a common goal.
- Stimulate discussion of controversial subjects (Waco, Oklahoma City bombing, 911, Birth Truthers, etc.) to bring division and, perhaps, conflict, oral or physical, between adherents of each side of the issues.
- Promote identification of theoretical enemies (Rothschild, Illuminati, Free Masons, etc.) so that members pursue un-provable resolution, thereby creating endless squandering of time on insignificant objectives.
- For those with legal pursuit as means of attacking the government, direct them on fanciful flights with erroneous objectives such as Admiralty Law, Maritime Law, Uniform Commercial Code, United States government is a corporation, etc. (reference for the last three items: Divide and Conquer)
- Use of "trolls" on Internet discussion groups and other forums to detract from discussions that might cause some to think; includes ridiculing opponent, specious arguments, diversion from the subject of discussion, and other tactics intended to discourage active participation in what might otherwise be productive discussions.
The consequence of the government meddling in our affairs, if we are truly self-governed (We the People), is that the government manipulates us to achieve an increase in power and control over us. It is not our disenchantment with government that is the problem; it is the government overreaching its authority that has caused us to be concerned as to the direction of the government and its impact on us and our posterity.
To achieve their goals, they must devise means for keeping the will of the people from being manifest and force them into compliance with that will. By their efforts to fragment the patriot community, they have achieved their goal and will continue to do so.
When their efforts have identified targets of any effort at political change, outside of the two controlling parties (Democrats and Republicans), and have manipulated the others into ineffectiveness, they have effectively created a one party system, not unlike the Soviet Union's Communist Party where all power was granted only to party members.
Effectively, the government has become the master and we have been subjected to their will -- through the divisive means explained herein.
The solution to this otherwise overwhelming problem is to resist the infiltration, by whatever means necessary.
To begin with, look in to the background of all who join your organization. In the modern world that we live in, we are obliged to provide a Social Security Number (SSN) to arrange for utilities to be turned on, to borrow money or establish credit, and for many other purposes. If we wish to get a job, we are obliged to provide background information regarding previous work history, education, criminal and military records.
Why should something as important as our Liberty not require at least such evidence of background and personal history as our daily lives do? After all, there is far more at stake than whether I can buy something when I don't have the money, or even having electricity at my home.
Thorough background information should be required of all who wish to join any patriot organization, even those currently members. If someone is reluctant to provide such information, then you must wonder if they have something to hide from you that they don't have to hide from their employer or bank. If the position they are seeking might have potential risk to others, then not only the background information, but a review of records* would be in order. If any questions arise that are not properly addressed, then realize that absent satisfactory answers, you may be subjecting yourself to influence that is not in your best interest, or, worse, being set up to take a fall..
[*There are a number of sites on the Internet where court, criminal, and other records can be purchased for very nominal fees – perhaps a good investment for the security of your organization]
If someone has been charged with a crime and adjudication withheld, then they may have worked a deal with the government. Don't put them in a position that would allow them to work a deal with you.
If someone demonstrates any characteristics that lend to the possibility that they are pursuing any of the "Objectives" listed above, there may not be an indication that they have someone else's interest at heart, though the method by which they pursue such objectives should be carefully considered.
Disagreement can be resolved through reasoned discussion/debate. It should be organized and open to all, or many, of the existing members. It should be void of both personal attacks and unsubstantiated (with real evidence) accusations.
Any organization would be wise to adopt some rules and methods of evaluating all of its personnel, including existing officers and members, as well as recruits. They should be based upon the above information as well as interviews with the individual concerned.
Any organization should include within their structure a means to evaluate new members, investigate any member who comes into question, and, establish a review procedure that includes a review board, composed of already approved members, to evaluate any information, conduct hearings, and, proscribe remedies, including removal of membership.
There is no doubt that on occasion, someone may have the appearance of having the characteristics that would lead one to believe that their interest is elsewhere, though it may only be that the person's personality brings about such suspicion. However, is it better to exclude someone by error rather than allow a potential risk to the entire organization. Weigh the risk against the lesser objection to hurting someone's feelings.
These are the times that try men's souls. The summer soldier and the sunshine patriot will, in this crisis, shrink from the service of his country; but he that stands it NOW, deserves the love and thanks of man and women. Tyranny, like hell, is not easily conquered; yet we have this consolation with us, that the harder the conflict the more glorious the triumph. What we obtain to cheap, we esteem too lightly -- Tis dearness only that gives every thing its value. Heaven knows how to put a proper price upon its goods; and it would be strange indeed if so celestial an article as FREEDOM should not be highly rated.
Tom Paine, The American Crisis (December 19, 1776)
Absent our policing ourselves, our groups, and, our own patriot community, we only leave ourselves open to the disruption that the government has desired to create.
At this point in time, we have many thousands of people being deprived of their productive time and participation by "chasing ghosts" created by the government to do just that -- deprive us of time and confuse us with distractions.
At the same time, they have addressed and attacked many who would be useful to our purpose by accusations of crime, as explained in the IRS letter, in violation of federal, state, or local laws. The have, thorough seminars, advised judges to "throw the book at" patriots charged with made up crimes, removing them from any active participation in our cause.
The time has come for us to change the game. They laugh at us, now, because they are far more in control than we want to recognize. We don't recognize it because we have faith in the government -- we just want some changes that return us to the Constitutional government that is our birthright.
They, however, are playing a serious, and often deadly, game, with every intention of winning.
We fear them, yet they have no reason to fear us -- because they have subverted most elements of our movement, and have at least some influence or control on the reminder.
It is time for us to change the game around and get them to fear us. Not through violence, rather, through exposure and removal of those who would seek to undermine our ability to function productively. It is time for us to be as serious about ridding ourselves of these subversive elements as we are about our individual causes, for all are doomed to failure unless we regain control of our own activities.
* * * * * * * * * * * * *
Addendum to Vortex (added April 16, 2014):
The following is from COINTELPRO Techniques for Dilution, Misdirection and Control of an Internet Forum:
There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’
Technique #1 – ‘FORUM SLIDING’
If a very sensitive posting of a critical nature has been posted on a forum – it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.
Technique #2 – ‘CONSENSUS CRACKING’
A second highly effective technique (which you can see in operation all the time at http://www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made – but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’
Technique #3 – ‘TOPIC DILUTION’
Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.
Technique #4 – ‘INFORMATION COLLECTION’
Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.
Technique #5 – ‘ANGER TROLLING’
Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes – without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.
Technique #6 – ‘GAINING FULL CONTROL’
It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings – and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.
PDF file of this article: Vortex - The threat that keeps us apart PDF
Return to Outpost of Freedom