Who's A Rat - Largest Online Database of Informants and Agents
HomeMembers LoginLatest NewsRefer A LawyerMessage BoardOnline StoreAffiliatesAbout UsContact Us
Who's A Rat - Largest Online Database of Informants and Agents Worldwide!
Site Navigation
Visit Our Store
Refer A Lawyer
Link To Us
Latest News
Top Secret Documents
Make A Donation
Important Case Law
Members Login
Message Board
Legal Information
Advertise your AD, Book or Movie

Informants and Agents?Who's a Rat Message Board

Sign up Calendar

  Author   Comment  

Posts: 1,194
Reply with quote  #1 

pass this along to friends....... 


The Gentleperson's Guide To Forum Spies (spooks, feds, etc.)


1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression

COINTELPRO Techniques for dilution, misdirection and control of a internet forum..

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a 'uncontrolled forum.'

Technique #1 - 'FORUM SLIDING'

If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to 'age.' Each of these misdirectional forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.


A second highly effective technique (which you can see in operation all the time at
http://www.abovetopsecret.com) is 'consensus cracking.' To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'

Technique #3 - 'TOPIC DILUTION'

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a 'gossip mode.' In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to 'drive in the wedge.' By being too far off topic too quickly it may trigger censorship by a forum moderator.


Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a 'show you mine so me yours' posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your 'favourite weapon' and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite 'technique of operation.' From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 - 'ANGER TROLLING'

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to 'stage' a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to 'lead' the forum by replying to your own posting with your own statement of violent intent, and that you 'do not care what the authorities think!!' inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.


It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a 'honey pot' gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.


Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it -- especially if you are a public figure, news anchor, etc. If it's not reported, it didn't happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the 'How dare you!' gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such 'arguable rumors'. If you can associate the material with the Internet, use this fact to certify it a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary 'attack the messenger' ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual deviates', and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning -- simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough 'jargon' and 'minutia' to illustrate you are 'one who knows', and simply say it isn't so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man -- usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with - a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues -- so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the 'high road' and 'confess' with candor that some innocent mistake, in hindsight, was made -- but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, 'just isn't so.' Others can reinforce this on your behalf, later, and even publicly 'call for an end to the nonsense' because you have already 'done the right thing.' Done properly, this can garner sympathy and respect for 'coming clean' and 'owning up' to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can 'argue' with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how 'sensitive they are to criticism.'

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the 'play dumb' rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations -- as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Eight Traits of the Disinformationalist

1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial. They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.

Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo.

With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.

c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.


How to Spot a Spy (Cointelpro Agent)

One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

1) The message doesn't get out.
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished.

FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.

Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.

Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.

The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.

This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.

It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.

In some situations, to get control, the agent will tell the activist:

"You're dividing the movement."

[Here, I have added the psychological reasons as to WHY this maneuver works to control people]

This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.

The agent will tell the activist:

"You're a leader!"

This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.

The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.

The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."

Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.

The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

It can usually be identified by two events, however:

First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.

As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.

The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.

A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

Some agents take on a pushy, arrogant, or defensive manner:

1) To disrupt the agenda
2) To side-track the discussion
3) To interrupt repeatedly
4) To feign ignorance
5) To make an unfounded accusation against a person.

Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.


Some saboteurs pretend to be activists. She or he will ....

1) Write encyclopedic flyers (in the present day, websites)
2) Print flyers in English only.
3) Have demonstrations in places where no one cares.
4) Solicit funding from rich people instead of grass roots support
5) Display banners with too many words that are confusing.
6) Confuse issues.
7) Make the wrong demands.
Cool Compromise the goal.
9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.


1) Want to establish "leaders" to set them up for a fall in order to stop the movement.
2) Suggest doing foolish, illegal things to get the activists in trouble.
3) Encourage militancy.
4) Want to taunt the authorities.
5) Attempt to make the activist compromise their values.
6) Attempt to instigate violence. Activisim ought to always be non-violent.
7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.


1) Want everyone to sign up and sing in and sign everything.
2) Ask a lot of questions (gathering data).
3) Want to know what events the activist is planning to attend.
4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.


Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.


ALWAYS assume that you are under surveillance.

At this point, if you are NOT under surveillance, you are not a very good activist!

Scare Tactics

They use them.

Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.

If an agent is "exposed," he or she will be transferred or replaced.

COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.

The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.


Seventeen Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it's not reported, if it's not news, it didn't happen.

2. Wax indignant. This is also known as the "How dare you?" gambit.

3. Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like "conspiracy theorist," "nutcase," "ranter," "kook," "crackpot," and, of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as "old news."

9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal "mistakes." This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster "suicide" note was forged, they would have reported it. They haven't reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.

15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.





A TAINTED DEAL http://www.motherjones.com/politics/1998/06/tainted-deal

 LA DEA; Murder of Kiki Camarena http://www.laweekly.com/news/how-a-dogged-la-dea-agent-unraveled-the-cias-alleged-role-in-the-murder-of-kiki-camarena-5750278  

"Several informed sources have told me that an appendix to this Report was removed at the instruction of the DOJ at the last minute. This appendix is reported to have information about a CIA officer, not agent or asset, but officer, based in the LA Station, who was in charge of Contra related activities. According to these sources, this individual was associated with running drugs to South Central L.A., around 1988. Let me repeat that amazing omission. The recently released CIA Report Vol II contained an appendix, which was pulled by the DOJ, that reported a CIA officer in the LA Station was hooked into drug running in South Central Los Angeles." Maxine Waters Oct, 1998


Posts: 797
Reply with quote  #2 


Doug Valentine tells Lew about massive CIA, DEA, Pentagon and State Department propaganda.





Test your connection for leaks:


How to boot from USB and other great stuff:

Open pdf and word files online instead of on your puter'

USE the net more securely:


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"

Posts: 797
Reply with quote  #3 

Download now by clicking a format in the left column.

These days, law enforcement at all levels -- from the local cop shop to obscure federal agencies -- uses snitches to trap ordinary people. Snitches tell lies that send their friends to jail. Paid agents provocateurs talk or trick otherwise harmless people into committing crimes. In many places, Snitch culture has virtually replaced real investigation of real crimes.

Don't think you're exempt if you're a "law-abiding citizen." The most trusting, naive, innocent people often make the easiest targets for these weaselly, lying, opportunistic vermin. Snitches specialize in targeting the vulnerable.

You may be in danger if you are:

  • A political activist
  • A recreational drug user
  • A hobbyist or business person who works with "sensitive" materials
  • A member of an unpopular religion
  • A gun owner or dealer
  • A participant in the underground economy
  • A photographer or videographer
  • A controversial thinker or writer
  • Or you just happen to hang out with the wrong people

Snitches are everywhere and they're hard to detect. This brief, FREE ebook, Rats, can help you:

  • Identify a snitch
  • Protect yourself against snitches and agents provocateurs
  • Protect your friends or colleagues
  • Know how to handle yourself if you get arrested

It could even help you avoid being pressured into becoming a snitch, yourself.

Rats is the work of ex-cops, lawyers, security experts, experienced activists, outlaws, former outlaws, trained interrogators, and more. In the hour or so it takes you to read their information, you'll gain a lifetime's worth of armor against snitches, informers, informants, agents provocateurs, narcs, finks, and similar vermin.

Download the Rats ebook now. Five electronic formats. All absolutely FREE. Download below or top of page left.

Share it with your friends. Spread it around. Offer copies for download you your own site or mirror this entire page. All we ask is that you provide a link back to http://rats-nosnitch.com/. Information is power -- the power of free people against a growing police state.

If you want to read the book in one of the ereader formats but don't own a Kindle or a Nook, you can download free reader software for phones, Windows and Mac computers, and other devices. Free Kindle apps from Amazon.com. Free Nook apps from Barnes & Noble.


Rats! Your guide to protecting yourself
against snitches, informers, informants,
agents provocateurs, narcs, finks,
and similar vermin

By Claire Wolfe
with the Commentariat of the Living Freedom blog

Rats is issued under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. You may make copies and distribute them for any non-commercial purpose, as long as you keep the original attribution. You may not alter the text in any way, and you may not distribute the book commercially

Test your connection for leaks:


How to boot from USB and other great stuff:

Open pdf and word files online instead of on your puter'

USE the net more securely:


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"

Posts: 797
Reply with quote  #4 

I Was a Paid Internet Shill, page 1

Test your connection for leaks:


How to boot from USB and other great stuff:

Open pdf and word files online instead of on your puter'

USE the net more securely:


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"

Posts: 797
Reply with quote  #5 


You will help the network speed up bandwidth.
You will help people living under oppressive political regimes have freedom of speech and communications.
You can help cause regime change in China, Iran and Syria.
A non-exit TOR Relay allows encrypted data to flow through the network smoothly and it starts automatically when you log in. It does not affect your normal use of TOR.

Download here:


Use the Vidalia bundle for your personal encrypted web surfing

Use the relay bundle or bridge bundle TO HELP EXPAND THE NETWORK

Test your connection for leaks:


How to boot from USB and other great stuff:

Open pdf and word files online instead of on your puter'

USE the net more securely:


"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes......"

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information.... it's all about the information!"

Posts: 8,863
Reply with quote  #6 

FBI Steroid Rage


Records: FBI agent who shot at Grand Rapids officer was on trip from Las Vegas
FBI agent in custody after shooting at Grand RFBI agent arrested after allegedly shooting at police

December 06, 2016

GRAND RAPIDS, MICH. - An FBI agent is in custody after police say he shot at a Grand Rapids officer outside a gym.

It happened around 1:30 a.m. Tuesday, Dec. 6, at Planet Fitness on 28th Street in Grand Rapids. 

While investigating this incident, WZZM 13 found through Kent County court records that the 35-year-old suspect is FBI agent Rueben Hernandez. He was in town from Las Vegas on business. Court records indicate he arrived in Grand Rapids on Monday and was booked Tuesday into the Kent County Jail.

According to Grand Rapids police, Hernandez walked into the Planet Fitness gym and showed off a gun. Reports indicated that he fired three shots near Lake Eastbrook Boulevard.

At the time, about seven people were inside the gym -- no one was hurt. When Grand Rapids police arrived on scene, police say Hernandez fired at a Grand Rapids sergeant and the officer did not return fire.

Link du jour



Taiwan paid Bob Dole law firm $20G a month to court Trump

Tuesday, December 6, 2016,


NYPD sergeant suspended after Long Island drunken driving arrest
Tuesday, December 6, 2016, 1:48 PM

Lynda Chervoni, 39, was suspended after a drunk driving arrest. (ANTHONY DEPRIMO/STATEN ISLAND ADVANCE)
An NYPD sergeant whose job is to screen department candidates has been suspended after she was arrested for drunken driving in Long Island, officials said.

Sgt. Lynda Chervoni, 39, was pulled over on the Long Island Expressway in Roslyn Heights after several people complained she was swerving

Robert E. Hecht Sr., savings and loan executive, dies
Baltimore Sun-
Beginning in 1954, he was an FBI special agent until being injured in a gun incident in 1959 at Quantico, Va. In 1959, Mr. Hecht joined what was then Baltimore ...


SEE IT: NYPD cop caught on video playing dice on Bronx street
with suspect unattended in cruiser
Tuesday, December 6, 2016, 2:26 PM



Donald Trump and his intended attorney general signal a dramatic shift for reforms
Trump’s Department of Justice could kill police reform
Dec 5, 2016
If and when Alabama Sen. Jeff Sessions assumes the role of United States attorney general in Donald Trump’s new administration, he will inherit a Department of Justice that has devoted considerable attention and resources to police reform over the past eight years

Roy Cohn Mentor of Donald Trump


The Ghost of Roy Cohn
by Paul David Collins ©, May 7th, 2007

Her name is Deborah Jeane Palfrey and she has Washington circles worried. Why are powerful and important people breaking into a sweat when they hear Palfrey’s name? Deborah Jeane Palfrey’s former company, Pamela Martin and Associates, was a prostitution service that was patronized by people high up on the American political totem pole . Furthermore, Palfrey is in a position to ruin a lot of political careers. Her lawyer, Montgomery Blair Sibley, claims he has:

been contacted by five lawyers recently, asking whether their clients’ names are on Palfrey’s list of 10,000 to 15,000 phone numbers. Some, Sibley said, have inquired about whether accommodations could be made to keep their identities private.

The Palfrey scandal has already cost one person his job. Randall L. Tobias resigned from his position as deputy secretary of state after admitting to ABC’s Brian Ross that he was a client of Pamela Martin and Associates . Deborah Jeane Palfrey is definitely in a position to blackmail the powerful and influential. This begs a question: Is Palfrey’s outfit part of an operation connected to the intelligence community that keeps politicians in line with the Establishment agenda through a system of sexual rewards and punishments?

In an interview with former NYPD detective James Rothstein, this author discovered that such operations do exist and go far back into America’s secret history. Rothstein is no conspiracy theorist. He is a legend in American law enforcement and speaks from experience. Furthermore, he gave me two notable examples from his time as a detective. Rothstein had an opportunity to have a sit-down with infamous McCarthy committee counsel Roy Cohn. During this sit-down, Cohn admitted to Rothstein that he was part of a rather elaborate sexual blackmail operation that compromised politicians with child prostitutes (Rothstein, no pagination). Cohn told Rothstein that this operation was being carried out as part of the anticommunist crusade of the time

Rothstein also had an opportunity to speak to infamous Watergate burglar Frank Sturgis. During this conversation, Sturgis revealed one of the reasons for breaking into the Watergate. According to Sturgis, there was a “Pedophile Book” hidden away at the Democratic National Committee headquarters The book was supposed to have a list of pedophiles on the American political scene . One can only imagine the power G. Gordon Liddy would have held over the government if he had such a book in his possession.

I asked Rothstein if Roy Cohn was a real anticommunist or just using the fear of communism to justify his sex ring. It seemed like a fair question. After all, Cohn had argued against homosexuals being schoolteachers when he himself was a homosexual. Perhaps Cohn’s hypocrisy extended to his anticommunism. Rothstein made it clear that Cohn was a genuine anticommunist . Anticommunist sentiments aside, evidence suggests that the sex ring operation started by Cohn was used for more than fighting the threat of domestic communists. Fugitive ex-CIA officer Frank Terpil has claimed that sexual blackmailing operations directed by the CIA were intensive in Washington during the Watergate era (DeCamp 179). Terpil also asserts that his former partner, Ed Wilson, was coordinating one of these sexual blackmail operations (179). In a letter to author Jim Hougan, Terpil revealed Wilson’s modus operandi:

“Historically, one of Wilson’s Agency jobs was to subvert members of both houses [of Congress] by any means necessary…. Certain people could be easily coerced by living out their sexual fantasies in the flesh…. A remembrance of these occasions [was] permanently recorded via selected cameras…. The technicians in charge of filming… were TSD [Technical Services Division of the CIA]. The unwitting porno stars advanced in their political careers, some of [whom] may still be in office.” (Qtd. in DeCamp 179)

According to John DeCamp, a former Nebraska Senator and Vietnam War hero, Wilson’s operation was merely a continuation of the one set up by Cohn When I asked James Rothstein if Palfrey’s outfit was a continuation of the sexual blackmail rings that began with Cohn, he answered in the affirmative .The NYPD veteran made it clear that Palfrey’s outfit could not exist in Washington unless it was a tool for the power elite and sinister factions of the intelligence community .Somewhere in a Queens cemetery, the corpse of a high-powered attorney is smiling in his grave.

Sources Cited

DeCamp, John. The Franklin Cover-Up: Child Abuse, Satanism, and Murder in Nebraska. 1992. Lincoln, Nebraska: AWT Inc., 1996.
Montes, Sue Anne Presley. “I Abhor Injustice,” Alleged Madam Says.” Washington Post 29 April 2007
Rothstein, James. Telephone interview. 1 May 2007.
About the Author

Paul David Collins is the author of The Hidden Face of Terrorism and the co-author of The Ascendancy of the Scientific Dictatorship. In 1999, he earned his Associate of Arts and Science degree from Clark State Community College. In 2006, he received his bachelor’s degree with a major in Liberal Studies and a minor in Political Science from Wright State University. He worked as a professional journalist for roughly four years.

From 2008 to 2012, Paul covered local news for several Times Community News publications, including the Enon Messenger, the New Carlisle Sun, the Tipp City Herald, the Kettering/Oakwood Times, the Beavercreek News Current, the Vandalia Drummer, the Springboro Sun, the Englewood Independent, the Fairborn Daily Herald, and the Xenia Daily Gazette.

Paul also wrote for other local papers, including the Enon Eagle, the New Carlisle News, and the Lusk Herald. In addition to his work in the realm of mainstream, Paul has published several articles concerning


Dec. 6, 2016
L.A. can resume shipping sewage sludge to Kern County after judge overturns voters' ban

A judge has ruled that the Los Angeles Bureau of Sanitation can continue to ship tons of treated sewage to Kern County’s Green Acres Farm, seen on a chilly morning in 2006.
December 6, 2016, 5:40 p.m.
A judge has struck down a voter initiative passed in 2006 that banned dumping Southern California shipments of about 450,000 tons a year of treated human waste on Kern County farmlands.

Tulare County Superior Court Judge Lloyd Hicks, in a 48-page opinion issued Monday, ruled that Measure E “is invalid and void for all purposes, for the dual reasons that it exceeds Kern’s police power and is preempted by state law.”

He also ruled that “there is no evidence of risk to human health” posed by the shipments of treated waste used as fertilizer and soil amendment on Green Acres, a 4,700-acre farm the city of Los Angeles bought in 1999 for $15 million.

The sludge is tilled into the farm’s soil to fertilize crops, including corn and wheat.


Foundation for Economic Freedom: DEA’s War on Painkillers to Blame for Many Deaths

By The Foundation for Economic Freedom
Value Walk

Many of these deaths result not from painkillers, but from the DEA’s war on painkillers.

Heroin overdose rates doubled in 28 states between 2010 and 2012, according to the Centers for Disease Control and Prevention. A record-breaking 28,000 Americans died of opioid overdoses in 2014. In 2000, the age-adjusted drug overdose death rate was 6.2 per 100,000 persons. By 2014, it had more than doubled, to 14.7, according to the CDC.

What happened?

The truth is that many of those deaths are completely preventable and result not from painkillers, but from the Drug Enforcement Administration’s war on painkillers.

This week, the Senate is likely to pass the 21st Century Cures Act. Among other things, it allocates $1 billion to help states “combat heroin and painkiller addiction and recovery.” Policymakers would be wise to make sure that states don’t use that $1 billion to make the problem worse.

Who’s Taking Opioids?
Marine corporal Craig Schroeder served in Iraq. In the so-called “Triangle of Death” region, south of Baghdad, a makeshift-bomb explosion


December 05, 2016 - 10:56 AM EST
Watchdog wants FBI's notes from Obama interview in Blagojevich probe

A conservative watchdog group that made headlines hounding Hillary Clinton over her private email setup is renewing a fight over a former Illinois governor's efforts to receive favors in return for President Obama’s empty Senate seat.

In 2011, Rod Blagojevich (D) was convicted on more than a dozen corruption charges for trying to sell the president’s former seat in the Senate for campaign contributions and other perks.

As part of the federal investigation into the former governor, the FBI interviewed several high-profile figures, including Obama and his aides Valerie Jarrett and Rahm Emanuel, who is now mayor of Chicago.
On Monday, the watchdog group Judicial Watch filed a new lawsuit to make the FBI’s notes about those interviews public.

“The public should not be forced to wait any longer” to see the interview summaries, the group said in its filing.

Judicial Watch had previously filed a lawsuit to obtain the material, but the suit was tossed out as Blagojevich was in the midst of a resentencing process, following action by an appeals court. The former governor is currently ser


December 5, 2016
DEA refuses to release evidence backing Kratom ban
Agency responds to request for hard data with press releases and copies of federal laws
Written by anthony roberts
Edited by JPat Brown
A version of this article appeared on Medium.com

On August 30th, 2016, the DEA filed a notice of intent to temporarily designate Kratom (specifically its alkaloids mitragynine and 7-hydroxymitragynine) as a schedule 1 drug. That notice listed 33 footnotes/references, but the actual references themselves were not included in the document itself.

Later that day, I filed a FOIA request for all of the data and documents referenced in the 33 footnotes.

This is a fairly straightforward request. The DEA wants to make this stuff illegal, and I want the public to have access to the same information as the DEA. Tens of thousands of people signed the petition to keep kratom legal (over 100k in the first week), and as a result, the DEA opened up a comment period for the public to respond. But in order to respond fully, we need to know what we are responding to. This means we need to see the information referenced in their footnotes, which is the evidence they’re relying on to ban kratom.

In the case of some of the footnotes, I was asking for specific data they’d collected (from footnote (17 and 18, for example):

“abuse of kratom/mitragynine [17] were analyzed by Federal, State, and local forensic laboratories.[18] According to data from the System to Retrieve Information from Drug Evidence (STRIDE) and STARLiMS (a web-based, commercial laboratory information management system), from January 2006 through March 2016, there were 293 records for kratom and/or mitragynine”
In other words, I was asking for the actual data references in footnotes 17 and 18, respectively, i.e. if there are 293 records on kratom abuse from January 2006 through March 2016, and those records were considered when the DEA attempted to schedule kratom, then the public should be able to inspect them.

But the DEA has refused to provide us with their evidence. In fact, they provided absolutely none of the data they referenced. Instead, they provided documents that were already available (FDA press releases, copies of federal laws and regulations, etc), none of which I didn’t already

1 out of 3 KKK members are FBI informants


Dec. 6, 2016
California KKK leader arrested in North Carolina stabbing before Trump victory parade


The FBI and the KKK

Although on the face of it the Federal Bureau of Investigation and the Ku Klux Klan seem to be very different organizations, they have more in common than one might imagine. In fact, the Bureau and the Klan share a long and complicated history.

Beginning with their first confrontation in 1922, this book examines the similarities, covert collaborations and common goals of the FBI and the KKK. After briefly describing the history of each, it explores the development of their association and the specific ways in which each organization furthered the other's goals. The book traces eighty years of parallel development and the conservative attitudes that drew the FBI and the KKK together, especially in the area of civil rights. Political, societal and historical contributions to the atmosphere that encouraged this complicity are explored in detail. Statistics regarding Klan membership, racial violence and a suspicious lack of federal involvement lend support to the author's analysis of events. Special emphasis is placed on the leaders of each group, especially J. Edgar Hoover, who shaped the very foundation of the FBI. The final chapters cover more recent events, up to and including those following the 1995 bombing of the federal building in Oklahoma City

The FBI Police State is in Final Stages


Dec. 6, 2016
L.A. subway commuters encounter bag searches, heavily armed deputies as city responds to terrorism threat

L.A. commuters encounter heightened security as city responds to terrorism threat
December 6, 2016, 3:30 p.m.
Los Angeles subway commuters were met by heavily armed deputies, dogs and bag searches Tuesday as authorities responded to a report of a possible terrorist attack on the Metro Red Line’s Universal City station.

Increased security was visible across the Los Angeles County transit system as the FBI, LAPD and Sheriff’s Department dealt with what they characterized as imminent threat of unknown credibility following a report from an overseas tip line.

Los Angeles Police Cmdr. Horace Frank, a top department counter-terrorism expert, said word of a potential attack came from a public tip line in Australia. Analysts are still trying to assess the credibility of the information, he said.

“It was very specific and detailed, and given it was imminent, the decision was made to make it public," he said, “If they are testing us or turns out not to be credible, we have shown we have the ability to gather information from overseas and respond rapidly in Los Angeles.”

At a hastily called news conference Monday night, the FBI as well as Los Angeles-area law enforcement leaders, said the threat was considered specific and imminent, but investigators were still examining its credibility

At the Universal City station, a sign warned riders they would not be allowed to use the Red Line subway system to downtown L.A. without their bags being searched.

Since early Tuesday morning, sheriff's bomb squad teams with K-9s have combed the station and other areas of the transit systems.

Los Angeles County Sheriff Jim McDonnell said beyond the visible presence, undercover deputies will be a presence on trains across the system.

Speaking at Universal City Metro station, Lo


LAPD sergeant broke city rules by leaking recording of 'Django Unchained' actress, ethics group says


The FBI Is Investigating Me Because I Tweeted A Joke About Fake ...
Huffington Post-
This is a story about how the FBI came to investigate a joke I tweeted .... 4, I received a call from someone who said he was an FBI agent and ...


FBI uses animal abuse data to study correlation to crimes against ...
Charleston Gazette
“There's a direct correlation between animal abuse and crimes against people,” said Nelson Ferry, program analyst for the FBI's Clarksburg-based Crime .


Dog Killing FBI Agent Gets a “Slap on the Wrist” VIDEO - For the Love of the Dog
fortheloveofthedogblog.com › dog-killin...
Jul 12, 2009 - Lovett Leslie Ledger indicted for shooting dead of neighbor's dog ... Last February, a Waco, TX FBI agent, a sniper and member of the FBI SWAT .


FBI agent shoots dog in Glen Burnie Park | WTOP
WTOP.com › Latest News
Dec 28, 2014 - WASHINGTON — Authorities say they are investigating an incident in which a federal agent walking his dog shot and killed another dog in a park ...

The F.B.I. Deemed Agents Faultless in 150 Shootings - The New York Times
The New York Times › 2013/06/19 › in-...
Jun 18, 2013 - The F.B.I. Deemed Agents Faultless in 150 Shootings .... It also contends that the dog may have been shot instead by the F.B.I. agents and the gun ...

20 Years Ago at Ruby Ridge: FBI Sniper Slays Mother Holding her Baby - ...
jimbovard.com › blog › 2012/08/22 › 2...
Aug 22, 2012 - The FBI sniper fired again and hit Vicki Weaver in the temple, killing her .... Most American dog-owners would consider the shooting of their dog a ...


Cop Shoots Dog With an AR-15 During a 5-Year-Old’s Birthday Party


Posts: 8,863
Reply with quote  #7 

NYPD bosses allegedly put heat on injured cop to lie about fight with fellow officer
NEW YORK DAILY NEWS Saturday, January 27, 2018, 10:58 PM


Amid fierce protest, Honduras inaugurates a president accused of stealing the election

Kate Linthicum
JAN 27, 2018 | 3:20 PM


Should we be scared of Teflon? A new Sundance documentary investigates

First she took on BPA. Then sugar. Now, documentary filmmaker Stephanie Soechtig is going after Teflon — the chemical that coats so many of our nonstick pans.
In her latest expose, "The Devil We Know" — which premiered at the Sundance Film Festival this week — Soechtig investigates how harmful Teflon is to our health. First introduced to consumers in 1945 by the corporation DuPont, Teflon was marketed as something that could make life easier. "It was supposed to liberate women from the kitchen," Soechtig explains. " 'Look, you don't have to stay scrubbing your pans all day long!' "
Teflon would go on to become so ubiquitous that as the documentarian discovered, the chemical can now be found in the bloodstream of 99.7% of Americans. So why is that a problem? Just look at Parkersburg, W.Va., the city where DuPont was headquartered. As Soechtig explores in the film, hundreds of local residents who were exposed to the chemical — also referred to as C-8, or PFOA — through their drinking water became extremely ill, suffering from cancer, facial deformities at birth and immunodeficiency. In February, the corporation was forced to pay $670.7 million to 3,550 plaintiffs whose water had been contaminated, though it has never admitted to any wrongdoing. (The corporation, which is now owned by Dow Chemical Co., did not respond to a request for comment.)
Despite the massive class action settlement, perfluorinated chemicals like C-8 continue to turn up in our cookware — just with different names. Soechtig is no stranger to this kind of controversy: In 2009, her film "Tapped" looked into our potentially dangerous plastic water bottles, and 2014's "Fed Up" researched the link between the processed food industry and obesity. In May, a judge dismissed a $12-million lawsuit aimed at the filmmaker and producer Katie Couric over 2016's Sandy Hook documentary, "Under the Gun," in which the Virginia Citizens Defense League felt they were depicted unfairly while discussing gun control.

Link du jour









The FBI kept tabs on Roger Ailes for nearly three decades. Here’s what it found.
By Eli Rosenberg January 27 at 8:30 AM


The Massive Case Of Collective Amnesia: The FBI Has Been Political From The Start

January 26, 20185:00 AM ET


Super Bowl brings massive security resources to Minneapolis
Peoria Journal Star
Joe Rivers, assistant special agent in charge of the FBI in Minneapolis, said a threat assessment for the game has included analyzing attacks around the world. He cited the May bombing of an Ariana Grande concert in Manchester, England, the Oct. 1 shooting at an outdoor concert in Las Vegas and the Oct. 31 vehicle ...


Fear:The Foundation of Every Government’s Power


Dent: There’s No Illuminati at the FBI
Comes as Republican members talk about a secret society in FBI



J. Edgar Hoover's hidden wordsmiths


Conte's Focus on Media: Jack Anderson relished muckraking
TRIBUNE-REVIEW | Saturday, Jan. 27, 2018, 9:00 p.m.


Court Documents Show Mueller Involved in 9/11 Cover-up


Boulder County's Brady list: 13 current and former cops with findings of untruthfulness

POSTED: 01/27/2018 02:04:49 PM

Jack Gardner, left, a former Boulder police detective, speaks to his attorneys during his sentencing hearing at the Boulder County Justice Center on Nov.
Jack Gardner, left, a former Boulder police detective, speaks to his attorneys during his sentencing hearing at the Boulder County Justice Center on Nov. 13, 2015. Gardner was convicted of being an accessory to a crime, which landed him on the Boulder district attorney's Brady list.
Getting on Brady list 'like a scarlet letter' for Boulder County law enforcement officers
The Boulder County District Attorney's Office maintains a list of at least 13 law enforcement officers since 2014 who were found, through internal affairs investigations, to have been untruthful or violated codes of conduct.

Most of those officers and deputies subsequently resigned or were fired, but a few remain in uniform. At least one has been hired by another police department after landing on the DA's Brady list.

This list includes what is known from public records about why each of the officers is on the list; that information varies, as most Boulder County police agencies declined to release internal affairs reports or discuss the cases.

The Times-Call and Daily Camera reached out to each of the current and former officers on the Boulder DA's list; most either declined to comment, could not be reached

Ismael Aldana

Department: Former Boulder County sheriff's deputy assigned to undercover duty with the countywide drug task force

Accusation: Lied to his supervisors about travel. Detained at Chicago airport on April 12, 2014, with $70,000 while traveling with a person suspected of being a drug trafficker, according to his internal affairs file.

Aftermath: Resigned May 1, 2014, prior to discipline; became Mead's code enforcement and animal control officer

Current job: First officer hired by the Mead Police Department last March

Kevin Averill

Department: Former Boulder County sheriff's deputy

Accusation: Failed to appear as a witness in a trial. After working until 6 a.m., Averill drank a few beers and took a sleeping pill. When called by a prosecutor asking him to appear in court. Averill refused to drive or testify under the influence. The defendant was acquitted.

Aftermath: Fired on March 11, 2015

Current job: Provision agent at Southwest Airlines

Comment: "I just think they pick and choose (who goes on the list) regardless of how good of a job they do."

Kelly Boden

Department: Current Boulder County sheriff's deputy

Accusation: Cited on June 30, 2015, and subsequently charged with failure to report child abuse, according to her Brady letter

Aftermath: Pleaded guilty to failure to report child abuse; received 24-month deferred sentence and 24 hours community service in January 2016. Case was dismissed in August after successful completion of the sentence, according to the Boulder County District Attorney's Office.

Current job: Still a deputy in Boulder County

Robert Buswold

Department: Former Longmont police officer

Accusation: Information that may bear on his credibility following an internal investigation relating to a DUI arrest, in which he was the arresting officer, according to his Brady letter.

Aftermath: Unclear when he left the department, and whether he resigned or was fired

Current job: Realtor associate with Keller Williams Preferred Realty in Westminster

Shane Curtis

Department: Former Erie police officer

Accusation: Lied in a report, according to Chief Kim Stewart.

Aftermath: Resigned two days after the launch of an internal investigation, on Dec. 17, 2016, prior to that investigation's conclusion.

Current job: Unknown

Lanie Delong

Department: Former Boulder County sheriff's deputy

Accusation: Gave untruthful testimony in a case in which she was a witness in Weld County Court, unrelated to her duties as a deputy.

Aftermath: Fired; unclear when

Current job: Investigator at a private investigations and security company based in Berthoud

Comment: "I'm actually in the process of possible litigation with the county over this. It's a complicated situation. I'm not at liberty to go into too much and discuss a lot due to that."

Jack Gardner

Department: Former Boulder police detective

Accusation: Tipped off a suspect who was being investigated for internet sexual exploitation of a child in September 2014. Gardner was convicted of being an accessory to a crime, obstructing a peace officer and misdemeanor first-degree official misconduct in September 2015. He was sentenced to three years of supervised probation.

Aftermath: Resigned in October 2014

Current job: Unknown

Cindy Lawley

Department: Former Longmont crime scene technician

Accusation: Integrity violation on Oct. 5, 2016, according to her Brady letter

Aftermath: Unclear when she left, and whether she resigned or was fired

Current job: Unknown

Richard Mafera

Department: Current University of Colorado police officer

Accusation: Allegations that he was biased against a Middle Eastern student during a false bomb threat report in April 2015, along with posting potentially offensive religious, racial and ethnic remarks on his personal Facebook page.

Aftermath: Unclear if any

Current job: Still employed

Gene McCausey

Department: Former Louisville police commander

Accusation: Findings involving credibility, according to his Brady letter

Aftermath: Resigned April 7, 2017

Current job: Unknown

Ronald Perea

Department: Former Boulder police officer

Accusations: Failed to comply with department values, rules and general order; was untruthful in reports and statements while working in an official capacity; and used excessive force, according to an internal administrative investigation completed Dec. 13, 2016.

Aftermath: Resignation in lieu of termination, unknown date

Current job: Law enforcement tactics and firearms instructor, according to his LinkedIn profile

Ryan Wagner

Department: Former Boulder police officer

Accusation: Arrested on Oct. 2, 2014, and charged with three counts of felony stalking in Arapahoe County. Convicted on all three counts in February 2016 and sentenced to six years of probation and 90 days in jail for each count. An arrest warrant was issued in February 2017 for failure to comply with probation, according to the 18th Judicial District.

Aftermath: Resigned Oct. 2, 2014

Current job:


Advocates of ranked-choice voting mount campaign to override legislative delay
The Committee for Ranked Choice Voting needs 61,123 signatures of registered voters for a referendum to stop the delay and allow the new system to go into effect in June.


Brother of kidnapping victim killed in botched FBI rescue demands answers
NEW YORK DAILY NEWS Saturday, January 27, 2018, 1:43 PM

The brother of a kidnapping victim who was fatally shot by an FBI agent during a failed rescue attempt is demanding answers in the wake of his sibling's death.

“I’m waiting for them to call me and to tell me how everything happened,” Ernesto Valladares told KTRK. “They have the responsibility to tell me what happened to my brother. Detail by detail.”

His brother, Ulises Valladares, was still bound with duct tape when he was shot to death by an FBI agent as law enforcement attempted to rescue him from a Houston home on Thursday.


FBI will decide if fatal shooting of kidnapping victim was justified
The FBI's Shooting Incident Review Team continues to investigate an accidental shooting where an agent killed the kidnapping victim he was trying to save. Suspects Jimmy Sanchez, Nicholas Cunningham and Sophia Heath are accused of kidnapping Ullises Villadares and holding him for ransom. FBI agents raided the ...


The F.B.I. Deemed Agents Faultless in 150 Shootings

WASHINGTON — After contradictory stories emerged about an F.B.I. agent’s killing last month of a Chechen man in Orlando, Fla., who was being questioned over ties to the Boston Marathon bombing suspects, the bureau reassured the public that it would clear up the murky episode.

“The F.B.I. takes very seriously any shooting incidents involving our agents, and as such we have an effective, time-tested process for addressing them internally,” a bureau spokesman said.

But if such internal investigations are time-tested, their outcomes are also predictable: from 1993 to early 2011, F.B.I. agents fatally shot about 70 “subjects” and wounded about 80 others — and every one of those episodes was deemed justified, according to interviews and internal F.B.I. records obtained by The New York Times through a Freedom of Information Act lawsuit.

The last two years have followed the same pattern: an F.B.I. spokesman said that since 2011, there had been no findings of improper intentional shootings.

In most of the shootings, the F.B.I.’s internal investigation was the only official inquiry. In the Orlando case, for example, there have been conflicting accounts about basic facts like whether the Chechen man, Ibragim Todashev, attacked an agent with a knife, was unarmed or was brandishing a metal pole. But Orlando homicide detectives are not independently investigating what happened.

“We had nothing to do with it,” said Sgt. Jim Young, an Orlando police spokesman. “It’s a federal matter, and we’re deferring everything to the F.B.I.”

Occasionally, the F.B.I. does discipline an agent. Out of 289 deliberate shootings covered by the documents, many of which left no one wounded, five were deemed to be “bad shoots,” in agents’ parlance — encounters that did not comply with the bureau’s policy, which allows deadly force if agents fear that their lives or those of fellow agents are in danger. A typical punishment involved adding letters of censure to agents’ files. But in none of the five cases did a bullet hit anyone
Differing accounts have emerged about the shooting of Mr. Toadschev
Critics say the fact that for at least two decades no agent has been disciplined for any instance of deliberately shooting someone raises questions about the credibility of the bureau’s internal investigations. Samuel Walker, a professor of criminal justice at the University of NebraskaOmaha who studies internal law enforcement investigations, called the bureau’s conclusions about cases of improper shootings “suspiciously low.”


FBI agent admits error in ex-senator corruption case
El Dorado News-Times-Jan 26, 2018
FBI Special Agent Robert Cessario testified that the audio files downloaded using the laptop were transferred to discs and provided to attorneys in the case. But defense attorneys discovered gaps in the record provided. Cessario was ordered to turn the laptop over to computer experts at the FBI's state headquarters in Little ...
Secret recordings included many officials, Neal testifies


Trump's refrigerator upgrade for Air Force One set to cost $24m
Officials sign deal with Boeing to replace two food chilling systems
Plane’s fridges must be equipped to handle 3,000 meals per day

Link du jour





Massachusetts cop could face 10 years in federal prison for breaking man’s nose, falsifying police report
NEW YORK DAILY NEWS Updated: Friday, January 26, 2018, 8:40 PM


Interior cancels decades-old protections for migratory birds
The rollback prompts broad opposition from former officials from both political parties.
Elizabeth Shogren DC DISPATCH ANALYSIS Jan. 26, 2018


January 26, 2018
The CIA college tour: Campus protest round-up
Agency’s recruitment efforts at colleges met with heavy resistance in the form of citizen’s arrests, paint-throwing, and even poetry
Written by Corlyn Voorhees
Edited by JPat Brown
The Central Intelligence Agency needs the best of the best to serve the agency, people who are well-educated, talented and discreet. Or as one recruiter put it:

Where better to find new members than colleges and universities?

While the CIA had recruited students before on a smaller scale, they launched a more aggressive recruitment plan, the “100 Colleges/Universities Program,” in 1963 to find and enlist potential candidates.

A 1965 memo noted that they were still having difficulty finding enough people, so the agency considered advertising more, but only “as a last resort.”

These recruitment efforts received very little public attention until a 1966 protest against CIA recruitment at Grinnell College, consisting of only nine picketers, garnered media coverage. Thanks to that, the CIA got the advertising they needed to find more candidates, but it came at a price: a growing number of student protests over the next few decades.

Here are some of the most notable antics from CIA recruitment protesters over the years:

When CIA recruiter Linda Iacelli visited Ohio State University in January 1979, she was greeted by more than chants and signs when protesters splashed red paint on her to symbolize the “blood of people around the world.” The paint “covered [Iacelli’s] back and splashed on the walls, floors, papers, desks and several bystanders.”


NYPD detective used fake names and addresses in crime reports to avoid doing any work — and he’s still on the job



people have been shot and killed by police in 2018
Read about our methodology. Download the data. See the 2017, 2016 and 2015 database


Northern Indiana deputies kill man who was stabbing himself

Blink Tank

Link du jour





New Mexico cop axed for stealing gas from colleagues busted with gun at Queens Midtown Tunnel
NEW YORK DAILY NEWS Saturday, January 27, 2018, 3:14 PM

A disgraced New Mexico state police officer who was drummed off the force for stealing gasoline from his fellow cops was busted at the Queens Midtown Tunnel for trying to pass himself off as law enforcement when a gun was found in his pick-up truck, police sources said.

Police are now trying to determine if Justin Romero is involved in gun trafficking crew that transports illegal weapons from New Mexico to New York, the sources said.


-FBI Agent: NSA Unlikely to Be Punished for Illegal Data Destruction
Sputnik International
Ex-FBI Agent: NSA Unlikely to Be Punished for Illegal Data Destruction ... Security Agency officials are unlikely to face any punishment or censure for defying a court order and destroying data they had broken the law to collect in the first place, former FBI special agent and whistleblower Colleen Rowley told Sputnik.
The NSA was under court order to hold on to information that was linked to warrantless wiretapping during the George W. Bush administration, but instead the agency got rid of data it had been specifically asked to retain, according to US media reports.

"What should be shocking about this news is that it's about the illegal deletion of the previously illegally collected data on US citizens in the Presidential Surveillance Program," Rowley said.

There was no accountability for the government's prior destruction of evidence, including the CIA's destruction of the "torture tapes," Rowley noted.

Consequently, "I don't think there is much chance of any accountability of NSA officials for any of their official negligence or malfeasance that led to these intercepted communications being destroyed and not preserved for purposes of this court proceeding," she said.

The data was gathered during the administration of President George W. Bush under an illegal program called the "Presidential Surveillance Program," Rowley recalled.

NSA Unlikely to Be Held Accountable for Violating Court Order to Preserve Data
However, "When the Pulitzer-prize winning news of the illegal program was finally released by New York Times writers, [President] George Bush misled the US public by downplaying it and calling it his ‘Terrorist Surveillance Program,’" she said.
The illegal surveillance of Americans had been secretly "legalized" just as the CIA’s practice of torture as so-called "enhanced interrogation" techniques had been Bush’s Office of Legal Counsel (OLC) attorney John Yoo and his senior OLC partner Robert Delahunty, Rowley noted.

Yoo and Rowley justified the secret surveillance program "shortly after 9-11 in dozens of secret memos claiming the President had inherent "Commander in Chief" powers to violate the Bill of Rights, a form of martial law," she said.

The NSA's interception of communications was illegal in the first place and was in violation of the Foreign Intelligence Surveillance Act (FISA) statute and the entire program was also possibly unconstitutional, Rowley pointed out.

Rowley also said much of the deleted material might have contained details of secret sexual activities that could have proven highly embarrassing to US military and diplomatic personnel who were involved.

"From some of my prior readings, I also suspect that these previously illegally intercepted communications after 9-11 contained a lot of ‘pillow talk’ between American spouses/girlfriends/boyfriends of military members and State Department
Experts Point at NSA Data Loss Fitting US Intelligence Pattern of Destroying Evidence
Had the secret data not been destroyed, it might have exposed the falsehood of many statements and assurances by President George W. Bush that claimed the surveillance program was responsible and limited in scope, Rowley remarked.
"So this content that apparently no longer exists would have proved very embarrassing if it had ever been made public… contradicting George Bush's descriptions that his program only targeted ‘terrorists,’" she said.

The destroyed NSA data would have angered the important constituency of US military and Foreign Service members as well as other American travelers whose privacy and rights were violated, Rowley noted.

Rowley sent a May 2002 memo to then-FBI Director Robert Mueller that exposed some of the FBI’s pre- September 11, 2001 failures. She was named one of TIME magazine’s "Persons of the Year" in 2002. Mueller is now the Special Counsel investigating President Donald Trump's alleged collusion with Russia. Both Trump and Russia have denied colluding during the 2016 US presidential campaign.


ADRIANA COHEN: Holding the FBI to account


Man imprisoned for decades sues police, FBI after release
Sentinel & Enterprise-
Perrot, whose conviction was based in part on a single strand of hair, was released from prison in 2016 after a judge said he's "reasonably sure" Perrot is innocent and found an FBI agent's testimony about microscopic hair evidence to be flawed. Perrot's attorneys say in the lawsuit filed Thursday that law enforcement ...


Albany native looks back on FBI years, comments on current state of affairs
Other observers agree, GOP eroding FBI's credibility
| January 26, 2018 Updated 11:36 AM
ALBANY — It was nearly a half-century ago now when former FBI agent Bernard F. Conners wrote his first novel, "Don't Embarrass the Bureau." It was a catchy title then, and the message is one that still resonates with him now more than ever, especially as President Trump and some Republican members of Congress continued to question the FBI's credibility.



Costa Rica adopts electric transport law to reduce emissions

January 26, 2018

Costa Rica adopted a new law Thursday to incentivize electric transport with a long-term view to eliminating hydrocarbon-powered vehicles in the country, responsible for most of Costa Rica’s greenhouses gas emissions.
The initiative eliminates sales, customs and circulation taxes for electric vehicles and allows them to use municipal parking facilities free of charge.
“This law will make it possible to transform Costa Rica’s vehicle fleet in just a few years, from cars, cargo vehicles, trains and buses, replacing them with 100 percent electric vehicles,” said President Luis Guillermo Solís when he signed the law at the headquarters of the Costa Rican Electricity Institute (ICE).
He added, “Costa Rica has all the conditions to spearhead this effort, unprecedented in Latin America.”
Environment Minister Edgar Gutierrez noted at the ceremony that the country’s percentage of renewable energy gen
Previous Topic | Next Topic

Easily create a Forum Website with Website Toolbox.

? ?
Copyright ? 2001-2004 Who?s A Rat. All Rights Reserved.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.