JOIN TEAM VT | SIGN UP DAILY NEWSLETTER
VETERANS TODAY ON : FACEBOOK | TWITTER | VT FORUM
|

Scamsters, Spies and Trolls, an Internet Story

Intelligence Organizations Partner with Internet Crime

By Gordon Duff, Senior Editor

Paid $25 Per Hour to Infect Your Life

A recent investigation carried out by Veterans Today in concert with international agencies tasked with investigating computer crimes has made some startling discoveries. 

Computer intelligence specialists, some formerly to level “hackers” themselves, have “backtracked” the careers of “internet personalities,” including but not limited to comment board “trolls” from key websites, top Wikipedia editors, policy makers at Yahoo, Google, AOL, YouTube.

What we found was a direct correlation between these individuals and some members of these organizations and lobbying groups with suspected ties to espionage and terrorism, corrupt “think tanks,” actual intelligence agencies, radically biased press organizations and widespread “419” internet scams that have cheated people around the world out of hundreds of millions of dollars.

Moreover, we came across the footprints of organizations that hacked the computers of journalists and political leaders, intelligence and law enforcement officials, not just infecting their computers with sophisticated spyware but systematically placing highly encrypted illegal child pornography onto the computer systems of many.

Behind this even still, we discovered foreign intelligence agencies working directly with local police “child pornography task forces,” relationships based on bribery, that have been used to blackmail, intimidate and silence.

The underlying criminal activities being protected include the operation of terrorist groups inside governments, as outlined in President Obama’s November 21, 2012, (Insider Threat Memorandum) and terror acts such as the Benghazi attack or terrorist operations inside Syria.

The trail also leads to terrorist threats against the UK, Kenya, Nigeria, South Africa, Japan, threats that, when discovered by law enforcement or intelligence sources, show patterns of protection against investigation and prosecution, with terrorists and fraudsters having a virtual stranglehold on the “wheels of justice.”

Evidence, which can and will never be accepted, another discovery of our investigation, shows full and absolute penetration of court systems, prosecutorial authorities and ministerial/legislative branches tasked with dealing with the threats and “actors” who operate with brazen openness.

TROLLS AND SCAMS

The lowest level of players are many among the ranks of “internet trolls,” individuals long dedicated to stalking, harassment or sabotage, making the internet a hostile environment and subjecting those who participate in forums to the rough equivalent of imprisonment in the “violent ward” of an insane asylum.

Among the genuinely mentally ill who act independently, there is a paid group, carefully screened and recruited, chosen for their narcissistic personality disorders, delusions and desire for empowerment through participation in very real conspiracies.

These individuals have varying degrees of technical competence though most receive both training and broad technical support.  Most use multiple identities, some with, not only dozens of screen names but multiple IP addresses as well.

Some are employed by internet companies such as Google or Yahoo, others received support or “blind proxy” email and “shifting IP’s” through these companies and a network of service providers.

Key social networking sites are fully, not just infiltrated, but appear to be complicit at every level of planning and operation.

SELF FUNDING

The strongest correlation is between “trolls” and “419 scammers.”  Individuals who sit online from 16 to 20 hours a day, moving through comment boards across the internet, spewing propaganda, profanity and selected conspiracies meant to advance the cause of some governments, are also the source of many of the endless scams usually blamed on Nigerians.

Dozens were found to use “chatroom IP addresses” to send out millions of emails, some claiming to be from government agencies such as the IRS or FBI, still more, lotteries, or varying endless frauds of every description.

It was always part of the Mossad model that intelligence operations be “privatized” and “self funding.”  I am not saying that these are real “Mossad” operations but systematic internet trolling that originates either from Israel or from AIPAC related lobby groups and think tanks has been proven to be financed through internet financial fraud.

One group was traced from offices in Mountain View and another from Sunnyvale, then run through Nigeria, then to Singapore for banking and then to Tel Aviv.

Imagine all this planning and bother to run an internet scam to fund a sociopath to stalk people on the internet who uses the word “anti-Semite” in every other sentence.

PROTECTED CRIMINALS

In each of the cases we looked at, we were able to quickly identify the individuals involved, penetrate their cloaked IP addresses and identify them as criminals.  Yet these same individuals, many who sit at desks or “cubes” at major internet related companies, are never arrested or investigated though they are “findable” even through use of search engines (some they help manage), findable without using proprietary and restricted code designated for law enforcement use only.

Those programs, which, by the way, are most often used by scamsters themselves, including COFEE, a common forensics program for police, illegal for private use.

Moreover, backdoor “Trojan” programs are used to load “COFEE” onto the computers of others along with illegal pornography.

Even more dangerous is access to full email archives of the largest internet providers which allow altered and fabricated email and documentation to be inserted into the “internet history” of targeted individuals, subjecting them to potential prosecution for everything from sex crimes to terrorism.

Combine this with full penetration of the justice system and we see a pure “police state” in existence.

CHARACTER ASSASSINATION

The primary source of all attacks on activists, free speech advocates and other commonly targeted individuals is Wikipedia.

While living off contributions from the public, Wikipedia has systematically given over thousands of key controversial areas to organizations within Israel who publish outlandish and clearly libelous accusations, almost invariably based on Israeli publications as source material, publications with no “standing” in regards to credibility.

Once a Wikipedia page is adequate turned into garbage and propaganda, it is “locked down.”

Wikipedia, the singularly largest information source in the world, despite lawsuits and consistent violation of every one of its own policies, either submits or is actively involved in suppression of vital information and bizarrely worded and childishly written biographical assaults on, not just public figures but private individuals as well.

In each and every case, the issue involves an agenda that seems to tie to Israel.  The part of this that causes the most “push back” from the Israel lobby, Mossad, the ADL and SPLC, is that there seems to be nothing “Jewish” about Israeli interests which, through analysis, seem to gravitate toward financial crimes, drug and human trafficking and terrorism.

Thus, an attack on narcotics production in Afghanistan can elicit a charge of “anti-Semitism,” thus revealing, through clumsy ignorance ties between propagandizing and disinformation, supposedly in defense of “Jewishness.” as actually being systematic complicity in organized crime.

CLIMBING THE FOOD CHAIN

Connecting internet “trolls” to intelligence organizations, the Mossad, MI 6, the CIA and others is most easily done through using pattern analysis programs to recognize the use of “talking points” that reflect three specific areas:

  1. The output of key publication, both internet and print, such as FamilySecurity.org or Canada’s “National Post,” which are obvious outlets for disinformation and are editorially biased to support positions either inconsistent with even the most rudimentary intellect while demonstrating consistent moral repugnancy. Add to these groups like the National Rifle Association and “Tea Party,” and issues of affiliation between internet espionage, “black propaganda” and foreign based psychological operations (PSYOPS) become clear.
  2. Endless “Think Tanks,” the largest and most “ham handed” of which are the CATO Institute and the Heritage Foundation, establish, not only the “talking points” used by paid “trolls,” but often take a more active hand.  CATO has been tied to the Benghazi attacks through their funding of the distribution of the “cover operation,” the Terry Jones telethon and the Islamophobic film clip he simulcast at great cost around the world.  One of these organizations, “Project for a New American Century” openly planned, not only the 9/11 attacks, publishing papers that demonstrate ties to the conspiracy, but also the planned invasion of Iraq, now listed by the International Criminal Court as a war crime.
  3. To close the loop, Fox News, Clear Channel and CNN “info-media” sources continually parrot the same messages, using typical PSYOPS methodologies of constant “branding and repetition” to blur the lines between reality, rational discernment and “approved” conspiracies meant to support, not only organized crime but very real terrorist organizations as well, organizations that use terrorism as a tool to support financial agendas.  (95% of all terrorist attacks fall under this category)

With the “revolving door” system in place, not just Washington and London, but around the world, corrupted political leaders leave office, corrupted military leaders leave their careers and commands, and assume positions that provide the insulation of an appearance of stately credibility, adding to the mosaic of the “fifth column” inside government, the “Insider Threats,” and the consensus and support they get through those who mold the public opinion of the fearful and weak minded, the “lunatic fringe,” (never to be underestimated…perhaps a majority in some regions of the US) and the end clients, who operate through rogue nation states and extremist political movements.

WILLINGNESS TO KILL LONG PROVEN

If one is unfamiliar with the revelations about 9/11 over the past decade, indicating, not only that it is a proven “inside job” but that the chorus that denies this is and has been fully complicit in the crime itself, one can look to endless other evidence.

In Britain, a series of enquires about the Iraq War and news media involvement in blackmail, treason and espionage, joined with investigations showing pedophile rings at the highest levels of government and society, present an unavoidable mosaic hardly subject to doubt.

Everything proven in Britain has a mirror image in the US, with a government controlled by espionage rings that have operated through foreign controlled press organizations for over two decades.

Drug cartels operating at a “street value” of up to three trillion dollars per year, Afghanistan, Iraq, Kosovo/Albania, Colombia and Mexico, control every level of American government, not just state, local and, of course, Washington, but police agencies, the courts and have penetrated the legal profession, law schools, universities and all major financial institutions.

Control is maintained through rigged elections, “Gerrymandering” which allows a minority party with few votes a vast majority of seats in congress (though unconstitutional through the “Equal Protection” provision, a 5/4 majority in the Supreme Court, again an institution controlled by drug dealers, insures justice will never prevail), and systematic assassinations of officials, US Senators (Paul Wellstone was one, there were more), rigged prosecution of others, (Don Siegleman for one) and blackmail.

The electoral process itself, now driven entirely by drug money through “Super-Pacs,” has guaranteed that the public will be permanently cooperative and compliant or subjected to imprisonment or extermination.  Anyone not believing that this eventuality has long been prepared for is not paying attention.

WHAT THE INTERNET BRINGS TO YOUR HOME

Becoming a targeted individual is simple.  Attempts to call for redress on issues that threaten criminal or financial interests may make any individual a target.  Harassment and stalking by paid “trolls” is enough to discourage most.

For others, being threatened with prosecution, threats, pornography, classified documents placed on your computer and discovered through “convenient” police investigations, is a daily occurrence.

All the while, members of our government and the Washington establishment amuse themselves with kidnapped children, later slain and disposed of and have for a long time.  The Franklin Affair was only a shadow of what is really there and more than enough officials have come forward about this.

Time and time again, the FBI and Department of Justice has been asked to prosecute major sex traffickers tied to the powerful “overlords” only to turn away.  Law enforcement officials who push “too hard” are retired, fired or are discovered with drugs or accidentally lose computers filled with classified information.

Some simply disappear.

Others have been infected with weaponized anthrax from Ft. Detrick or wake up “dead” on a garbage dump.

Key to remember is that, for each and every American, the connection to treason, to espionage, to world organized crime is as close as a Facebook post or that crazy person who keeps sending emails.  Too often, it is in the wild accusations received from a “patriotic” website said to be run by former “Black Ops” or “Swift Boaters.”

No, sitting there with your “tablet, smartphone or laptop,” you are quite probably touching the most hare-brained and malevolent tentacles of the world’s intelligence community, a “community” that, in reality, is the heart and soul of very real terrorism.

It isn’t your children that need protecting from the internet, not hardly.

 

 

Bookmark and Share

Short URL: http://www.veteranstoday.com/?p=232160

The views expressed herein are the views of the author exclusively and not necessarily the views of VT or any other VT authors, affiliates, advertisers, sponsors, partners and technicians. Legal Notice

Posted by on Dec 9 2012, With 0 Reads, Filed under Editor, WarZone. You can follow any responses to this entry through the RSS 2.0. Both comments and pings are currently closed.

COMMENTS

To post, we ask that you login using Facebook, Yahoo, AOL, or Hotmail in the box below.
Don't have a social network account? Register and Login direct with VT and post.
Before you post, read our Comment Policy - Feedback

Comments Closed

44 Comments for “Scamsters, Spies and Trolls, an Internet Story”

  1. This site like Lasha Darkmoon and Informationunderground requires me to go to the search engine and clickn the link to get to it.. You tube prevents non kosher responses ad when they o get through a few days later they all deleted and of course 99% of the internet would never even let people who know about the jewish problem evenn post.

  2. “… establishment amuse themselves with kidnapped children, later slain and disposed of …”

    Please write more about this.

  3. Howard T.Lewis III

    Patriotism need be made of sterner stuff.

  4. Howard T.Lewis III

    99.8% of readers can not tell the difference between a source and a webmaster, preferring to ride in the ship rather than free swim with the sharks and a pool toy.

  5. COFEE is nothing to be remotely concerned about – within 24 hours of each new iteration of COFEE, a new release of DECAF quickly follows: you can run DECAF in “Spill the COFEE” mode to test how it would perform if COFEE was resent. I first wrote about it in 2009 in a post called “Why we can’t lose”.

    Here’s the thing: the best hackers have an innate contempt for political structures and for law enforcement. Only “nappies” take the King’s Shilling (but nappies are good enough to put a hurtin’ on the uninitiated).

    Hackers of my vintage grew up recording songs from the radio onto cassettes (ZOMFG copyright infringement!) from Casey Kasem’s “American Top 40″, then swapping cassette versions of early video games like Archon (srsly – I still have a box of about 100 c64 cassettes), and so on and so forth. We were on BBSes in the late 80s; we used Mosaic as a browser in the 90s; we saw Morpheus and napster come and go; we watch the rise of P2P and freenet and TOR and Anonymous and LulzSec and AntiSec and the darker phyles (like Baph0met).

    We sat quite close to the folks who performed the famous WANK hack (part-payback for the Rainbow Warrior act of terror) of the DoE and a bunch of other places. We are the ‘elder statesmen’ of this shit, and not a single one of us works for “.gov” or “.mil”.

    Do not be afraid of .gov’s “haxx0rs”: they are incompetent, and countermeasures that totally freeze them are ubiquitous and free. .gov-tards can smear, they can seek to intimidate… but they’re actually really awful at what they’re supposed to do (people like Lame-o, Mudge and the rest of the ‘domesticated’ hackers are to hacking what a poodle is to a timberwolf).

    The entire government security apparatus is ALREADY what I refer to as “the Other iOs” – involuntary Open Source. They are reduced to getting the NYPost to run stories about how some Secret Service dummy “left a laptop containing SS personnel private details on a subway” (same cover story as was used in the UK in 2003 to cover for a hack of MI5’s personnel).

    TL;DR: anybody who’s a snitch for .gov, or an undercover pig, or a clandestine ‘asset’ of an intelligence agency needs to know this: the internet hate machine already has your home address, bitch.

    You have tro be a porcupine, folks: you have to have material that will be released in the event that anything happens to you. A global “dead man’s switch” is what protects about 200 of the best grey-hats (many of whom are now grey-beards as well) who know full well that the intelligence services of the entire planet dare not act against them without doing such monumental damage to intel sources and personnel that it woud be a Pyrrhic victory at best.

    Kim Dotcom was invited into the circle but thought he didn’t need it. Sometimes smart people do dumb things.

    TL;DR II: We win this thing in the end, yo. Yeah, bitch! MAGNETS! (and yes – we are all fifteen years old in our minds).

  6. What about the children gordon?

    what will be done about all the children

  7. Another great commentary piece, Mr Duff.

    This is a thought-provoking site. The writers are generally very good to excellent. A couple more female vet writers could be cool. 

    About readership numbers, I need a little sugar with my cereal, so I take breaks from the criticism of Jews (not just Zionists are criticized). Name one article where VT thanked a Jew for anything, please, I missed it. 

    There is a lot of serious criticism of anyone who isn’t a Democrat, and yet your king of the Dems was Bush’s protege & has cartels at his command.  When it comes to this tidbit … crickets …

    However, I thoroughly appreciate that VT is here … Love guys/gals who keep a pair of billiards around. It’s the American way, or used to be. 

  8. I knew it!

    Thank you for the article.

    And now, as we see how these people use the internet, we have an idea on how they use the media. The only question is for how many decades?

    What to do:

    People should start discussions in pubs where they know each other and not in the internet where they cannot see their “friends”.

  9. Oh so true uncle Gordy. Being a simple nobody that I am, and yet having gone through some of the stuff you pen here, In can only confirm. I can better understand what happened to me now, thoughnot fully yet. I’ve often wondered, why me and/or what would face any other influential person. I get some answers from what you posted here, and so much more is my realization that, truth indeed matters and scares its deflectors, regardless of who fosters it.

    Keep going. May God continue to bless and keep you and yours, may he keep VT and defeat all evil.

  10. BRILLIANT Gordon. You mention COFEE and files. I do believe some innocent persons may have, or WILL be, infected with inappropriate files onto their computers, remember we are dealing with LIARS here so they will bear false witness. Imagine a decent father, implicated in some images “found” on his computer. Disastrous! Also this makes interesting reading http://www.eurasiareview.com/24102012-idf-to-double-unit-8200-cyber-war-manpower-oped/ Israeli IDF “Cyber warriors” link says they’re “good guys” but I think they use their skills in creative ways. Another: http://readersupportednews.org/news-section2/317-65/11067-usa-today-journalists-targeted-after-report-on-dod-propaganda-program OK, so we have the IDF and some infiltrators in the DoD- whaddya got? a monster. Maybe I should follow Judy Scheindlin’s advice and “not use the machine”- she makes 50 mil a year and never touches one.

    Gordon, this is a very important article and I hope the right people see it and take note. As usual you post another very intelligent article. Thank you

  11. Warlord Moneybags

    This is a bit off track but I think it is interesting nonetheless as there was an article here about Anonymous recently.

    ***http://www.veteranstoday.com/2012/11/17/anonymous-winning-cyber-war-over-israel/

    I guess many of you have heard about the prank call by two announcers from an Australian radio station to a London Hospital concerning the admission of Princess Kate for ‘severe morning sickness’, and one of the nurses who took the call committing suicide ?

    ***http://edition.cnn.com/2012/12/07/world/europe/uk-royal-hospital-death/index.html

    Anyway, I just read that Anonymous posted this video on YouTube.

    ***http://www.youtube.com/embed/MhnuFeQqrpM

    It looks like a fake to me, the voice is different and it would be easy to do as there are no lips to read.

    Maybe to discredit Anonymous ?

    If it is real then they are almost certainly bad guys posing as good guys. Otherwise, why would they bother with something as inane as this ?
    .

  12. The elaborate scheme is often performed from abroad; its simple paid electronic kill service. During the early 2000’s they would break into emails and sometimes due in part to high level court cases (steal case information), however, during this time certain laws were implemented by the last administration to cover-up these crimes committed by cartel executives. However, in last 15 years or so, it’s becoming paid to kill service, as past laws implemented opened the door for extreme exploitation and crime (maybe planned as so by some). The new cyber stalking task groups and companies are out sourced from abroad, meaning large companies are now involved in this activity. I am aware some of this activity being performed by groups (companies) in India; however, they are connected with several other countries. They also use extremely sophisticated software, and attack people 24/7. They have absolutely no problem contacting you “personally”. They use phony front end companies in the US, UK, and other, promoting one business while performing another as well. Some Federal Agencies refuse to investigate these groups “companies”, I believe it’s due to knowledge of their sponsors and connections (our country is fragmented). They have many phony “front ends” in the US, and often small enough to simply change their names’ when they receive some exposure. They seem to be targeting people who presented evidence of crimes during last administration, and with regards to certain executives connected to top level.

    And yes, they plant information by stealing identifications and persons name to exploit them. Their using the very system they created to electronically attack those who were exposing their activity, even though they were not “completely” prosecuted (meaning fines were paid). They simply paid fine, and investigations stopped, and thereafter continued performing the same activities. They understand eliminating witnesses was necessary for them, and developed the “perfect system” to exploit these people electronically. They can send thousands of mails from anyone’s personnel email, with no risk of investigation. Their intention is to create phony profiles, and harass people, and then use the system to make the kill. I can imagine those who were unaware, likely having no idea why they were attacked so aggressively (phony profile made electronically). Because “contracted group” (company) created fake profile of them and exploited their electronic systems using their email and identification, and other.

    They would simply make them criminal “electronically”, through identification theft, then exploiting and sending emails while knowing all this would be collected. Some Federal Agencies (in states) are continually being told to stand down and this clearly due to their earlier involvement and knowledge of crimes during last administration. They know when party changes again, they will become targets as well. So the system, as many would believe was created to protect the US peoples, but hidden within the system are those whose intention is to exploit this system as tool for crimes.

    I observed an executive some time back (about 2003), who sat in office most of day going through personnel home email accounts of people who worked for him, he hired young computer science engineer to break into their email accounts. Do you know why?

    To make certain no one was making reports about his unlawful activities. Just the opposite of why this system was implemented, maybe. And further, imagine being in high level law suit against extremely wealthy family, who had no problem going through all your communications, from abroad paid services. One wealthy family owned toxic waste businesses, the 50 gallon barrel type. I wonder why, apparently so did one agency.

    Would you wonder why they were operating this type of business as well?

    • And Gordon, the above mentioned are not shills as you say, their desire is murder people.

      • So prior to year 2000, investigators had some chance of pinpointing these perpetrators committing electronic crimes. After 2001, and newly created laws, many investigators task became more difficult because the door was opened further for exploitation. However, through advances in technology they had some success; but again, criminal operations were moved abroad. Now, the task of investigation becomes even more difficult, and the door was opened for international cyber warfare. When too many investigators were told to ignore complaints being filed officially, the door was opened for international exploitation and new business types, and finally international cyber warfare.

        • And how was international cyber warfare promoted, by stopping so many investigations as to allow perpetrators to learn, study, and exploit system with few deterrents. Apparently someone threw in large smoke screen so they could walk through the front door.

          • And Gordon,
            If concerned about emails sent to you. What was sent was developed by me, it’s for you, so use with care. I will not develop weapons……..and never will. signing out.

          • Has nothing to do with reading, have been fighting this for over 10 years. It’s about being aware. You clearly have no experience with truth…

          • There’s a difference between articles used to “pursue” information, and articles used to “provide” information? A distinct difference.

            Do you know how to determine this difference, this detail, and would you like me to tell you?

          • Online, or offline? your choice.

          • One who “provides” information follows through with hotlines and other critical information to provide some assistance to victims. One who “pursues” information, the above stated is commonly the last thing on their mind.

            One only has to ask, “What are they pursuing?” And sometimes may follow through with….well could be simple mistake. I’m sure.

  13. Here’s what can happen to someone who goes after a member of the protected clas:

    Dutch pedophile exposer to stand trial, high-ranking pedophile still walking free

    December 10 marks the trial of investigative journalist, activist and foremost Dutch Bilderberg Group hunter Micha Kat. The 49-year-old faces the Court in the Hague for alleged insults to the Dutch royal family, alleged discrimination of a lawyer whose fraudulent and corrupt activities he exposed, two alleged false bomb threats, alleged death threats against a journalist of Dutch mainstream newspaper Telegraaf, overall “instigation”, and for writing “danger: pedophile” in Dutch language on the house of known Dutch pedophile Joris Demmink who has been the most powerful man of the Netherlands for the last decade.

    *****https://worldmathaba.net/items/2083-dutch-pedophile-exposer-to-stand-trial-high-ranking-pedophile-still-walking-free

  14. How have I evaded detection so long ;-)

  15. duay khwaam nap theuu

    https://en.wikipedia.org/wiki/Social_network_analysis#Modelling_and_visualization_of_networks

    We used to do it by observation and by hand in “the old days.”

    Textbooky stuff:
    In Britain the development and growth of anthropology was deeply connected to colonial administration. As early as 1908, anthropologists began training administrators of the Sudanese civil service. This relationship was quickly institutionalized: in 1921, the International Institute of African Languages and Cultures was established with financing from various colonial governments, and Lord Lugard, the former governor of Nigeria, became head of its executive council. The organization’s mission was based on Bronislaw Malinowski’s article, “Practical Anthropology,” which argued that anthropological knowledge should be applied to solve the problems faced by colonial administrators, …

    Anthropological knowledge was frequently useful, especially in understanding the power dynamics in traditional societies. In 1937, for example, the Royal Anthropological Institute’s Standing Committee on Applied Anthropology noted that anthropological research would “indicate the persons who hold key positions in the community and whose influence it would be important to enlist on the side of projected reforms.” In the words of Lord Hailey, anthropologists were indeed “of great assistance in providing Government with knowledge which must be the basis of administrative policy.”

    The more things change…

  16. It’s gotta be tough running trolls. You can’t get quality writers unless they’re crazy, which tends to negate the quality. Then you get someone really good and they turn out to be a loose cannon. Makes me appreciate my boring corporate job.

  17. I post the most meaningful editorials and articles over on the Amazon Discussion Boards in the History and Judea forums.It gets read all over the world even though participation is limited because of a few who lambaste any disagreement over Israel or Judaism for that matter as being “rabidly antisemite”,plus a few other choice insults and inflammatories.

    I am of the opinion that they feel that tossing verbal hand grenades hurts my and other’s feelings and cause fear.Little do they know that they are painting a racial picture full of hatred of themselves thus I get more bang for my buck.Already several of the regulars have abandoned their position of these boards so we are having an effect,little by little.

    • I think this behavior causes moderately informed ppl not to look closer at the issue- they want to discourage scrutiny- if an idea can be labeled anti semitic- the casual political observer is satisfied to look no further

  18. Yes, you are correct, and I cannot understand why the management allows this blog to be transformed into a cheap bar brawl. Hey, MEH?

  19. Wow well said and you did not even have to mention names.

  20. TJ

    Rarely, when you are not on the juice, I read from you some intelligent comments, however very rarely.
    I think you should be barred from this blog, unless you learn how to be civil.

  21. More projection on your part. You are just exposing yourself at being a deluded annoying anti social creep.

  22. You have definitely lost the plot. Every comment section you have turned into the rahnameh hasbara show.

  23. Gosh you are getting more loony by the day.

  24. Just like the hasbara bots you provoke then play the victim. Just like the hasbara bots everything you bleat about is what you are guilty of.

Comments are closed

 

Email Newsletter icon, E-mail Newsletter icon, Email List icon, E-mail List icon Join Our Daily Newsletter
  View Newsletter ARCHIVE

WHAT'S HOT

  1. US beginning to ‘disengage’ from Israel: Analyst
  2. US deliberately refused to rebuild Iraq’s military: Analyst
  3. Custom Tactical Weapon Specials (updated today)
  4. NEO – Has the US Nuked Syria?
  5. Netanyahu is a ‘chickenshit,’ Obama official says – Updated twice
  6. Israelis kill Americans with impunity
  7. Harry Hun’s Ebola Program Runs Into Difficulties
  8. US Army withheld promise from Germany that Ebola virus wouldn’t be weaponized
  9. Truthers as Terrorists: Who are the terrorists today?
  10. NEO – The US and ISIL Nexus
  11. Israeli Air Force is the Best in the World
  12. Turkey says FSA must be equipped and trained to rule in Kobani
  13. Does the VA Have a Women Veterans Problem?
  14. Reinventing Vietnam War History
  15. Topless FEMEN activists protest in front of Iranian embassy
  16. Veterans Today Radio News Reports Stew Webb Host (New Hours)
  17. Check out anytime you want but Nobody’s leaving ’til the fat girls dance
  18. Understanding Health from Individual Psychology
  19. RT – 25 EU banks fail ‘stress test’, exposing $31bn shortfall
  20. State plan is aimed at helping Alabama veterans
  1. Dan: To NC below, you've made many good points in your short comment. TV's "usurping the role of parents and community," "turning adults into children and children into adults," and now ...
  2. Old Jules: The US didn't do anything to Germany and Japan. Although they did lay them to waste and then rebuild them and their industry at the expense of US taxpayers.
  3. Old Jules: One heck of an airplane. Those Turks are doing whatever they think is going to turn out best for Turkey everything else being equal in a lousy game the ...
  4. cynthiamaccioli: A female woman? Thank God. Or maybe the woman won't be female.
  5. cynthiamaccioli: Look what the US did to Germany and Japan. This is no surprise to me. All strong countries have to be laid impotent, how else could the US ...

Veterans Today Poll

For over 60 years, US Taxpayers have been funding Israel, Palestine and Middle East. Are you happy with return on investment or would you prefer those monies be invested at home instead?

View Results

Loading ... Loading ...

Archives