I sent the FBI a tip and included a link to the article.
I doubt it will be dealt with, but you do what you gotta do.
I sent the FBI a tip and included a link to the article.
I doubt it will be dealt with, but you do what you gotta do.
But first, it important to note that Feds at the mere informant level are seldom told by their handlers of the presence of other government informants around them. From each individual informant’s perspective, the agitators around them would look as lawless to them as they did to the crowd.
This exact strange situation played out in the climax of the Whitmer Kidnapping Plot. The car that prosecutors say “cased” the Governor’s house had five passengers—two homeless patsies, and three secret Feds. But only the agent-level Fed in the car had total operational awareness. Each of the two informants in the car probably thought the other was a legitimate insurrectionist.
So it is not necessary for all or any of the individuals covered in this report to know each other or to have affirmatively “worked together” to have formed a “team” through collective effort. A simple text message from a federal handler to “Be at the Peace Monument at 12:45 p.m. and flush out the crazies” would be all that’s needed for a large ring of provocateurs to simultaneously be in the same place, at the same time, contributing to the same breach.
A number of years ago I wrote a research paper on how gang-stalkers operate to target individuals (such as myself) who have been blacklisted by the police or whoever else, using their wide array of informants in the community who don't have to know each other but are connected through a cell phone communications network handled by higher-ups. The method I worked out for how they were doing this was tested by myself over a number of years while experiencing the targeting, using counter-tactics to confirm that it was going on and that my observations were correct. It made me realize how wide-ranging these stalking networks are and how many different types of people are used within them, whether knowingly or not.
Here's a link to my paper, for anyone who's interested:
https://exposinginfragard.blogspot.com/2016/02/the-network-look-inside-targeting-system.html
Thanks for posting this, btw. Revolver does a fantastic job of putting the pieces together.
(post is archived)