bojangles said:Is the faux outrage on here equivalent to feminists?
Girl's dad teaches girl about holocaust, girls dad dies before they can make a trip to Poland. A year on, on the anniversary of his death, she's there and takes a picture so she can show her family and twitter followers that she actually got there and 'made her dad proud (?)'.
Natural reaction for girls taking photos of themselves is to smile or pout, its pre programmed
Earphones? You get them on most tours in Europe as the tour guide is normally not speaking English.
The abuse is unwarranted but as usual its a load of keyboard warriors sending her stuff.
These Two Minutes' Hate things on Twitter are coming out of what I think Rollo Tomassi described as women's addiction to indignation.
If not that, or in addition to that, could be meta-propaganda related to Israel bombing Gaza, just to put the Auschwitz story out on social and mainstream media right now. Subtle countermeasure to pictures of dead Arab kids. Could also be related to someone's Ukraine objectives in some way.
That's another reason for these Two Minutes' hate - covertly pushing agendas for government and business. One of the Snowden documents just showed how GCHQ (the British NSA) could do the following, among other things:
• “Change outcome of online polls” (UNDERPASS)
• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
• “Find private photographs of targets on Facebook” (SPRING BISHOP)
• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
• “Ability to spoof any email address and send email under that identity” (CHANGELING)
• CLEAN SWEEP which "masqueradeFacebook wall posts for individuals or entire countries".
http://www.theguardian.com/uk-news/2014/jul/14/gchq-tools-manipulate-online-information-leak
https://firstlook.org/theintercept/...lls-ways-british-spies-seek-control-internet/
