Saturday 26 December 2009

Introduction and Explanation

First of all, this link shows how to remain reasonably anonymous online. It is worth a read.

This blog is all about the comments.
Comments that give information and ideas, that is. Comments that abuse, denigrate and vilify won't be published, unless it is necessary to show the world how unreasonable or abusive someone is being.

Medawar intends to use this blog as a reporting tool, so he can research how and why extremist (and criminal) groups cross-pollinate with other extremist groups, mainstream pressure groups, major political parties and even government itself.

Pretty well every entry urges readers to post comments anonymously unless they are confident that their web identity isn't traceable back to their real identity. A couple just tell readers to post comments anonymously. This isn't melodrama, it really is possible to find oneself being stalked, merely for expressing an opinion.

Although this exercise arose out of a particular discussion in comments to Medawar's Cornflakes about a specific movement being infiltrated by neo-nazis, it occurs to Medawar that there was no reason why infiltration is practised only by neo-nazis, and neither is there any reason why they should seek to join one pressure group and not others, even those directly opposed to the first. If what they are doing is advancing their own cause and agenda rather than those of the groups they join.

This has widened (and hardened) into a wary interest in infiltration and political manipulation generally. Please read through the posts, each post describes a category of political extremist and/or criminal, and see if you have anything to add. Medawar gives examples of some groups perhaps attempting some specific things, and others doing something else. But it's always possible that someone will have experience of one group using a tactic that Medawar ascribes to another, and that would be interesting, so your comments (on appropriate categories), please.

No comments: