Virginia hoge

Original NSA Comments

[Posted July 26, 2013]

The tying in of my fate with the NSA, came in November of 2010, when comments were posted to my first Open Salon post Something way funky is going on over at Topix. com.

I wrote up the warnings of the NSA being given the user’s personal data of all who visited Topix’s forums.

Is Topix giving out users personal data to the NSA?

I was extremely heavily trolled on Topix over the post, ignored by the many media outlets I tried to contact. I never wrote up Howard’s allegations about Wikileaks, but apparently, they saw the comments. They ignored my many appeals to them, warning them about what the NSA was doing.

In 2012, Open Salon mistakenly took down this blog. When it was put back up, all of the original posts were there, with only my comments left though.

Here are the original Jack Howard comments which I had saved.

These guys at Topix somehow tapped my phone and then began to post my phone conversation. 

Jack Howard 
November 27, 2010 05:30 PM

wow, Jack, thats awful. I have had my Topix PM’s hacked, my computer threatened to be hacked, my life has been threatened many times. I am so sorry to hear of your experience.

Virginia Hoge
 November 28, 2010 11:20 AM

Yes, these trolls are quite resourceful. They always let me know that they know where I live, my name, and as I stated they posted a short blurb to let me know they have listened into phone calls.

Is there organized crime on Topix? You bet there is.

Jack Howard
 November 28, 2010 10:19 PM

This booklet “Is the Devil in your laptop”? is a great way to understand the “social engineering” being done on Topix.

Jack Howard
 November 28, 2010 10:22 PM

 Another good read. Topix poses a real threat.

Jack Howard 
November 28, 2010 10:32 PM

wow. Yes, there sure is Jack, I can vouch for this as well. Its one thing to say you support an atmosphere of absolute free speech, its another entirely to manipulate this atmosphere in service of real deviance.

Virginia Hoge
 November 29, 2010 11:12 AM

My stalker troll is able to censor comment replies, she is able to block comments entirely, she is able to rig Topix polls. She is empowered, apparently by the company unless I here from them otherwise, and she is super-mean and directed.

Virginia Hoge 
November 29, 2010 11:14 AM

Appropriate breaking news story regarding Wikileak

Jack Howard
 November 29, 2010 01:52 PM

Like Wikileak, Topix is also a terrorist organization

Jack Howard
 November 29, 2010 01:55 PM

What, Wikileak is a terrorist organization? I thought they were being persecuted?

Virginia Hoge
 November 29, 2010 02:52 PM

Julian Assange- Australia
 Hacking and charges 
In the late 1980s, he was a member of a hacker group named “International Subversives,” going by the pen-name “Mendax” (derived from a phrase of Horace: “splendide mendax,” or “nobly untruthful”).[5] He was the subject of a 1991 raid of his Melbourne home by the Australian Federal Police.[9] He was reported to have accessed computers belonging to an Australian university, a Canadian telecommunications company Nortel,[5] and other organisations, via modem.[10] In 1992, he pleaded guilty to 24 charges of hacking and was released on bond for good conduct after being fined AU$2100.[5][6] The prosecutor said “there is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what’s the expression—surf through these various computers

Jack Howard 
November 29, 2010 03:31 PM

Starting in 1994, Assange lived in Melbourne as a programmer and a developer of free software.[6] In 1995, Assange wrote Strobe, the first free and open source port scanner.[12][13] He contributed several patches to the PostgreSQL project in 1996.[14] He helped to write the 1997 book Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier which credits him as a researcher and reports his history with International Subversives.[15] Starting around 1997 he co-invented the Rubber hose deniable encryption system, a cryptographic concept made into a software package for Linux designed to provide plausible deniability against rubber-hose cryptanalysis,[16] which he originally intended “as a tool for human rights workers who needed to protect sensitive data in the field.”[17] Other free software that he has authored or co-authored includes the Usenet caching software NNTPCache[18] and Surfraw, a command-line interface for web-based search engines. In 1999, Assange registered the domain; “But,” he says, “then I didn’t do anything with it.”

Jack Howard
 November 29, 2010 03:33 PM

Assange has said he is constantly on the move, living in airports.[39] He has lived for periods in Australia, Kenya and Tanzania, and began renting a house in Iceland on 30 March 2010, from which he and other activists, including Birgitta Jónsdóttir, worked on the ‘Collateral Murder’ video

Jack Howard
 November 29, 2010 03:35 PM

wow. see, its the immunity from prosecution that people are not getting when they cannot comprehend the danger of cyber-criminals. For instance, if an anonymous troll posts a death threat to me on Topix, Topix will protect the identity of that troll, not delete the comment, and declare no responsibility for it. I can go to law enforcement and they say there is nothing they can do because the poster is anonymous. So, until I am dead, no crime has happened, none.

Virginia Hoge
November 29, 2010 04:19 PM

that is fascinating about Julian Assange, Jack

Virginia Hoge
 November 29, 2010 04:45 PM

 This “Topix” operation isnt about “ad revenues” or money at all really. This is a top down fascist operation where Topix is able to spy on citizens, profile them, invasion of privacy, etc. This is what is really going on. 

The “Tolle Trolls” can observe the habits of millions of Americans, perhaps report them to law enforcement, mess with their credit report, etc. 

The Justice Department should shut Topix down, but the problem there is the organized crime interests that run Topix, enjoy a very high level of support and protection inside the Justice Department.

I have been watching this for over a year. They have hacked all my information and are not shy about letting me know. They also intentionally “hint” or make a deliberate “mistake” when “taunting” me. This allows them a degree of deniability. Instead of feeding back my address they’ll intentionally list a residence that is just slightly off the truth.

Jack Howard
 November 30, 2010 10:01 AM

WIKILEAKS whistleblower Julian Assange has been placed on an Interpol “red list” over allegations of rape, federal Attorney-General Robert McClelland confirmed yesterday. 

As the website mastermind set his sights on the corporate sector, his elevation to the red list places him in the highest category under Interpol’s international wanted list.

But in an interview published in Forbes magazine, Assange said his next set of secret documents focused on a large US bank. “It will give a true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms,” Assange told the magazine, adding: “For this, there’s only one similar example. It’s like the Enron emails.”

Jack Howard 
November 30, 2010 10:47 AM

wow, Jack, that is so scary. do you have links of where you post? 

I have had my stalker troll threaten to have access to my bank account and all my computer passwords. she uses threats and fear to try to bully me off Topix, but it hasn’t worked, I call her my motivator, it has spurred me on to keep going. If Topix had one bit of sense, they would pull this troll off my back because she just makes me angry and that motivates me. 

I have actually found some great writers on Topix, incredible writers, I have urged Topix to market this creativity.

Virginia Hoge 
November 30, 2010 10:55


Still think you’re dealing with “trolls”, then read these bios.

Richard “Rich” Skrenta (b.1967 in Pittsburgh, Pennsylvania) is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.
In 1982, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II machines. It is widely believed to be the first large-scale self-spreading personal computer virus ever created
After his stint at AOL he went on to cofound Topix LLC, a Web 2.0 company in the news aggregation & forums market.[2] In 2005, he and his fellow cofounders sold a 75% share of Topix to a newspaper consortium made up of Tribune, Gannett, and Knight Ridder. Currently, he heads the startup company Blekko Inc, an internet search engine,[3] which began public beta testing on November 1, 2010[4] and recently gained Marc Andreessen as an investor.[5]
Marc Andreessen:
MarNetscape’s IPO in 1995 propelled Andreessen into the public’s imagination. Featured on the cover of Time[8][9] and other publications,[10] Andreessen became the poster-boy wunderkind of the Internet bubble generation: young, twenty-something, high-tech, ambitious, and worth millions (or billions) of dollars practically overnightc Andreessen-
Andreessen is an investor in social news website Digg and several other early-stage technology startups, like Plazes, Netvibes, CastTV and Twitter. His latest project is Ning, which launched in October 2004. (actually its the RockMelt browser launched in 2010 see below)[11]
He serves on the board of Facebook,[2] eBay, Kno, Hewlett-Packard, and Open Media Network, a combined Kontiki (VeriSign) client and media player, launched in 2005.
Andreessen married Laura Arrillaga in 2006.[16] She is the founder of the Silicon Valley Social Venture Fund,[17] and the daughter of Silicon Valley real estate billionaire John Arrillaga.

Jack Howard 
November 30, 2010 11:05


 The creators of Topix all come out of the AOL milieu. Don’t forget that narco terrorist group known as FARC had always used a special AOL account to communicate, launder drug money, etc.

 AOL was essentially aiding the FARC in their cocaine and terrorist operations.

Jack Howard
 November 30, 2010 11:12 AM

Look at the latest “Highschool” hostage story out of Wisconsin. I’ll guarantee you the suspect was a devotee of these “point and shoot” video games.
The suspect shot and killed himself as police were approaching. 

This was same thing with the Columbine shootings and all the other school shootings. The shooter had become a brainwashed “game player”. 

The same interests that created these “video games” also created TOPIX.

Jack Howard
 November 30, 2010 11:32 AM

wow, so scary Jack. I have long wondered about the violence of video game playing. Wow, interesting.

Virginia Hoge 
November 30, 2010 12:19 PM

Whats going on in the Silicon Valley Jack??? And is it connected to the Hoover Institute at Stanford?

Virginia Hoge
 November 30, 2010 01:19 PM

The key to understanding what Topix is all about:

LSD Freaks Meet Cyber-Hackers 
In 1974, Stewart Brand, chief propagandist for both the psychotropic drug revolution and the personal computer revolution, published a collection of his previously published essays under the title, II Cybernetic Frontiers. Two of the essays consisted of interviews he had conducted with Gregory Bateson, one of the architects of the psychedelic revolution in America, through his posting at the Palo Alto Veterans Hospital, where much MK-Ultra experimentation took place. Bateson was one of the four or five most influential members of the Cybernetics Group. The other, longer essay in the book, “Fanatic Life and Symbolic Death Among the Computer Bums,” was first published in the December 1972 issue of the leading counterculture publication, Rolling Stone.

Brand began the Rolling Stone piece with the startling boast: “Ready or not, computers are coming to the people. That’s good news, maybe the best since psychedelics.” He continued, “It’s way off the track of the `Computers–Threat or Menace?’ school of liberal criticism but surprisingly in line with the romantic fantasies of the fore-fathers of the science, such as Norbert Wiener, Warren McCulloch, J.C.R. Licklider, John von Neumann, and Vannevar Bush. The trend owes its health to an odd array of influences: the youthful fervor and firm dis-Establishmentarianism of the freaks who design computer science; an astonishingly enlightened research program from the very top of the Defense Department; an unexpected market-flanking movement by the manufacturers of small calculating machines; and an irrepressible midnight phenomenon known as Spacewar.”

Brand provided a detailed explanation of Spacewar, perhaps the very first computer war game to be designed. “Ah, Spacewar. Reliably, at any night-time moment (i.e., non-business hours) in North America, hundreds of computer technicians are effectively out of their bodies, computer-projected onto cathode ray tube display screens, locked in life-or-death space combat for hours at a time, ruining their eyes, numbing their fingers in frenzied mashing of control buttons, joyously slaying their friends and wasting their employers’ valuable computer time.”
Beginning in 1963, when the U.S. space program was moved out of the military and housed under NASA, J.C.R. Licklider convinced his boss at ARPA (what would later be called DARPA) to devote a fraction of the agency’s budget to computer research. At the time, the Department of Defense was the world’s largest consumer of computers. Licklider became the director of an ARPA unit called IPTO (Information Processing Techniques Office), and, over the next years, disbursed millions of dollars to a wide range of computer and Artificial Intelligence research centers.

Until 1969, when the Mansfield Amendment placed restrictions on how the Pentagon could spend its research and development money, there were no boundary conditions on the kinds of projects that IPTO could bankroll. Billions of dollars went into the early development of computer networking, computer graphics, “virtual reality,” simulation, and other key facets of what, today, is a $9-11 billion-a-year commercial industry of point-and-shoot video games. The Media Lab at MIT and the Stanford Artificial Intelligence Lab were two of the magnets for this money and the research work which fueled both the Pentagon training-simulation programs and the evolving video-game industry.

In his book On Killing, Lt. Col. David Grossman recounts how the advent of high-speed computers allowed the social engineers, responsible for training soldiers to overcome their aversion to killing, provided an unsurpassed technology for stimulus-response behavior modification. The increasingly realistic video graphics, the advanced work on neurological processes–all hallmarks of the cybernetic “man-machine” project–transformed the U.S. military into a force of programmed killers, and ultimately became the social engineers’ “weapon of choice” for twisting the minds of millions of America’s youth.

The social engineers seeking to fulfill Adorno, Horkheimer, Russell, and Huxley’s visions of a perfectly engineered society, led by a “scientific dictatorship,” were never far removed from the computer and AI labs where the technologies were being developed and tested.

Jack Howard
 November 30, 2010 02:16 PM

Wow. So do you believe this is all about the encouraging of inhuman behavior to produce a scientific dictatorship? also to use Topix to spy on and to gather personal data on people?

Virginia Hoge
November 30, 2010 02:31 PM

Ddid you see this Jack?

Virginia Hoge 
November 30, 2010 03:33 PM

Virginia, the banks are already bankrupt. Look at the 100,000 person protest in Ireland over the last week. Besides it is these same bankrupt financial interests that created TOPIX and other social networking sites. 
It is definitely “mind control” and “social control”.

The events on TOPIX leave no doubt that there is a “gang” of souless cyber hackers running loose with sophisticated software, used to target the population.

The government should shut down TOPIX and confiscate all the infrastructure.

Jack Howard 
November 30, 2010 05:21 PM

Wow. scary Jack. its explains a lot though. For instance, did you see my post about the death threat to Obama that took 31 days to remove?

Virginia Hoge 
November 30, 2010 05:46 PM

Another thing Jack, if what you are saying is true, is that I have had a Monster troll on my back my entire time on Topix. 

This human beast has done literally everything possible to demean, threaten and scare me in thousands of comments, its absolutely ridiculous the trolling I have endured on Topix. She changes names/characters all the time to mass troll me day and night with vile threats, name-steals, the works. She is a sadist.

No one could have endured, Jack, what I have on Topix, or few. I was one of the rare people, all that abuse made stronger and stronger.

Virginia Hoge
 November 30, 2010 06:03 PM

Jack Howard 
November 30, 2010 06:24 PM

The TOPIX trolls are very similiar. 

Good for you for standing up to them. 

What I don’t like is they are able to spy on you.

Jack Howard
 November 30, 2010 06:26 PM

According to Crowell, the NSA has a great deal of expertise in
securing communications, and it wants to ensure that 
products bought by the Defense Department meet NSA standards. “In addition, as part of the NSA’s intelligence mission, [the agency needs] to have a thorough understanding of where commercial products are headed.”

Taher Elgamal, author of the Netscape data-recovery plan, who
recently left Netscape to start his own venture, said Netscape had no choice but to maintain constant contact with the NSA. “They’re costing the industry a lot of money,” Elgamal said. Others agree. 

”Everyone in Silicon Valley, including us, has to have specific staff – highly paid experts – to deal with them,” said Chris Tolles, security group product manager at Sun.

”Their job is to wrangle this from a policy standpoint.”
Sun has had run-ins with the NSA in the past. Two years ago, the NSA objected to Sun including encryption in the exportable version of Java 1.1. The end result was that Sun stripped encryption out of Java 1.1 and the software was delayed by about six months.

Jack Howard 
November 30, 2010 06:44 PM

oh no. just great, Jack. its bad enough when they threaten invasion into your personal life, it’s scary to think it could go further.

Virginia Hoge
November 30, 2010 07:10 PM

can you explain what encryption means Jack?

Virginia Hoge 
November 30, 2010 07:12 PM

I guess this says it all:

”The NSA wants software vendors to make sure that any product with strong encryption have some way for the government to tap into the data.”

Virginia Hoge
 November 30, 2010 07:13 PM

I knew the severity of the bullying I was enduring was wrong. I was like “the hell with you, you are not going to bully me off Topix”. But I have been continually surprised, by the ferocity of it.

Virginia Hoge
November 30, 2010 07:17 PM

People are forged by their circumstance.


You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *