It appears that the creators of the police state and the surveillance state think that we are not capable of understanding that they are attempting to push us further into a hole of despotism, totalitarianism and fascism where information becomes political drivel and nothing more.

Information outsourcing seems to be a vital tool in collecting information today. Finding mainstream news sources that give you information rather political opinion polls and opinions are now archaic as news reporters are being replaced with editorializing radio hosts and state department spokespeople that hide in plain sight.

The policy of the unbalanced media is to uphold Orwellian doublespeak when topics such as government corruption, police violence and brutality against citizens, double standards and intolerance. It is homogenized and watered-down national security speech that at the end of day supports the militarized police state apparatus.

Information outsourcing is becoming more risky now because there are government paid disruptors who muddy the pool of information provided on the internet.

When Ed Snowden revealed the extensive spy and surveillance apparatus being employed by our government against its citizens, there was something else he revealed that was overlooked by the media. Snowden reportedly said that western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.

This should mean something to everyone who reads material on the internet and is weary of so-called “real truth “ websites that lead people into believing all sorts of planted stories that are mostly posted by covert military operatives.

For example, if you type in the words “False Flag” you get and approximated 42 million hits – that is a huge number that needs to be assessed with intellectual honesty.

This would mean that if all of these websites were correct then we would have to conclude that all of our recent history is nothing more than a series of prefabricated incidents. That every shooting, bombing, terrorist event, murder and scandal is all one big comic book plot designed to always enable the government to grab more power, and take away our rights.

Just because a government or some special interest group exploits an event for a political agenda doesn’t always mean that it is a false flag. What it means is that our leaders are political vampires that don’t always wait for the smoke to clear and the bodies to go cold before they speak up about their sadness and regret and then push the latest ideas for gun control.

What I am trying to say is that there appears to be a conspiracy to claim fakery, and hoaxing of current events in order to create an extreme and unfavorable view of most independent sources for news.

Further complicating matters, false flags are a very real phenomenon. But the term is being misused and thrown around like dirty shirt, and truly one should suspect that this appears to be a covert operation to discredit information you receive from the internet.

It’s important to define what a false flag actually is, however, the covert ops in charge of manipulating information have lead most “conspiracy seekers” into thinking that a false flag applies to everything that happens from true crime to mass shootings.

False flag operations are covert operations conducted by governments, corporations, or other organizations, which are designed to appear as if they are being carried out by other entities.

We must understand there are events which happen that seem to have no deliberate deception, and therefore aren’t false flag attacks, but simply attacks that involve real people who lose real family members and deserve at least some time to cope with their losses.

Just like the politicians, there are those so-called “truth seekers” that don’t wait for the smoke to clear and the bodies to go cold before they leap into declaring a false flag event, which is very telling as to who is behind the disinformation.

Reporters, who have respect, wait for the information to be delivered in order for it to be assessed. Then it is decided if the public has a right to know, and then as much as can be expected, there is some evidence to demonstrate malfeasance.

However, the political agendas exploited by politicians can be compared to the exploitations of rush to judgment false flag allegations provided by so-called conspiracy theorists.

Therefore, I am realizing that these behaviors that appear as if they are part of an electronic jackboot or deliberate COINTELPRO operation as indicated by Snowden.

A previous secret unit called Joint Threat Research Intelligence Group and other groups that are in the employ of the alphabet agencies are allegedly attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

According to information provided by Glenn Greenwald, among the core self-identified purposes of the Joint Threat Research Intelligence Group are two tactics.

One, is to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and the other to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.

Now in order to understand how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

According to its playbook the Joint Threat Research Intelligence Group uses the following to get its desired disinformation to spread on the internet:

Infiltration Operations

Ruse Operations

Set Piece Operations

False Flag Reporting Operations

Disruption Operations

Targets are lined up online in order to discredit them as well. Tactics for individuals are simple.

They can set up a Honey Trap – meaning that they use an attractive plant to trick a target into indulging in sex talk or sexting so that there can be a record of lewd language used against a target in order to destroy credibility.

Vandalizing or creating false information on a Wikipedia page in order to destroy credibility of a target.

Leak confidential information about the target on Facebook or Twitter.

Disrupt Facebook news feeds by using paid “Trolls” to bully or otherwise deliver deliberate false and misleading information about the target.

Posting hyperlinks to false or misleading information in order to trick target’s followers into going to websites with Malware and viruses.

Utilize what are known as the 4 “D”‘s: DENY/DISRUPT/DEGRADE/DECEIVE.

Now, you may think that these so-called “targets” of reputation destruction – are limited to hostile nations and their leaders, military agencies, and intelligence services.

This is not the case —in fact, a lot of what is happening is an organized effort to not only push a disinformation agenda to target conspiracy theory sites and those who use their website for protests and political criticism, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity by deliberately controlling and manipulating information in order to observe who is actually buying into their plans.

Sometimes just perusing a 9/11 truth site can get you flagged for possible harassment by the feds. The sad thing is you will not be charged with any crime – you will sometimes find yourself electronically harassed and in some cases become a victim of electronic gang stalking.

Once caught in the web of the gang stalking program, a target is subject to full on electronic and psychological harassment that invades every aspect of their life and is calculated to destroy that person.

The process is highly formulaic programmatic, systematic and systemic.

Key to the destruction of a gang stalking target is a full penetration and infiltration of their environment, including their constant surveillance and harassment in their home, workplace/school mobbing of the target, and target’s isolation from friends and family members.

Believe it or not, you have a dossier that the government keeps on every American citizen this is called a Main Core list. There are some on the list that are not as important as others who are supposed threats to the United States and their continuity of government processes. There are allegedly 8 million that are being singled out as possible targets for this type of electronic jackbooting.

Main Core is the code name of an American governmental database that is believed to have been in existence since the 1980s.

The Main Core database is alleged to have originated with the Federal Emergency Management Agency (FEMA) in 1982, following Ronald Reagan’s Continuity of Operations plan outlined in the National Security Directive (NSD) 69 / National Security Decision Directive (NSDD) 55, entitled “Enduring National Leadership,” implemented on September 14, 1982.

It is believed that Main Core is a federal database containing personal and financial data of millions of United States citizens believed to be threats to national security. The data which is believed to come from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders.

The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.

It is important to note that websites you visit, things you post on Facebook, Twitter and even books you check out of a library gives the alphabet agencies a picture of who you are.

That is why I have to conclude that most of the online “trolling” has to be carried out by the feds—because I wouldn’t want a record of trolling on a Facebook page part of my electronic dossier.

Another proof that trolling and the recent spate of so called “false flag” generating conspiracy sites are a government conspiracy is that the government monitors and influences internet communications, and covertly infiltrates online communities in order to sow dissension and disseminate false information.

Harvard Law Professor, Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-“independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government.

Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House.

Mark Twain once said “A lie can travel half way around the world while the truth is still putting on its shoes.”

With the internet, a government lie can run a race that stretches from coast to coast even before the truth hears the starting gun.