Many Targeted Individuals wonder how they could be placed on a list in the first place? Who has the power or the authority to do such a thing? If you live in a country such as the U.K. your local councils have this ability as displayed in the Jane Clift case. If you live in the U.S. or Canada it might be the task of what’s called a threat assessment team.
This team can be comprised of just a few individuals, to a team of individuals. It depends on the company, educational facility, or community they are representing and what the specific needs are.
Some examples include members of Human Resource, Police Officers, Psychiatrists, Mental Health Professionals, Senior members of the department or division. In some cases there might be just a small team, who then liaison with various other departments. The team members are pre selected, so the team is already in place. The team should generally be trained in assessing workplace violence, violence on campus, what to do, who to call, and they might also be trained in profiling an individual, to enable them to make an assessment of wither an individual is a threat vs a none threat to the environment around them.
The threat assessment teams and who they are comprised of seem to make no concessions or allowances for being evaluated by a team of peers. Eg. In court cases they try to encourage a variety of jurors, so that a person being judged can be evaluated by a peer of their jurors. This in theory allows for fairer trials and outcomes. With the threat assessment teams there are no such guidelines for who the team is comprised of, or what the make up of the team should be. This may or may not account for why the Targeted Individual community has seen an above average targeting of females and minorities. In addition dissenters such as whistle-blowers, extremist site members, and conspiracy site members are also starting to show up above average.
Once in place the team is ready to take tips from the community around them. Generally the team will liaison with Human Resources, The police, Employee Assistance Program, Mental health, and when a report comes in they use these other resources to assist with their assessment of the Target.
Reports can be filed via a form, the reports can be filed anonymously. This means that the person making the accusation need not have any accountability for making a false report. This might not be the case in every area, but in most of the threat assessment guidelines I came across, reports could be filed anonymously. Keep in mind that report are likely primarily initiated by human resources, campus resources, etc. However anonymous reporting of any kind leaves an organization open to abuses of the system that might be difficult to identify or remedy.
The threat assessment team works in a four part process.
1. Identify persons of concern
2. Gather information/investigate
3. Assess information and situation
4. Manage the situation
Identification of person of concern
Once a target is chosen, or a concern is forwarded to the threat assessment team it’s time for them to liaison and start to profile and assess if that target is a concern for further evaluation or monitoring, or if the case can be closed.
A. Expression of bizarre and inappropriate thoughts. B. Excessive absenteeism without prior approval or rationale. C. Degenerating physical appearance. D. Acts of insubordination. E. Poor work performance. F. Poor workplace relationships with others. G. Indications of alcohol/substance abuse. H. Excessive complaining.
Once an assessment is initiated information is gathered on the Target in question.
Gathering of information and Investigating
To gather information on the target, these threat assessment teams use a variety of sources. They use the persons friends, family, social networking circles, co-workers, neighbours, and other resources.
Triage questions can include:
• Has there been indications of suicidal thoughts,
plans, or attempts?
• Has there been indications of thoughts/plans of
violence?
• Does the person have access to a weapon or are
they trying to gain access?
• Are there concerns about the well-being of the
subject?
• Are there concerns about the safety of the
community?
• If yes, a full inquiry is recommended.
Gather Information (Full Inquiry)
• Think broadly and creatively about those who
might have information:
• Co-workers
• Other staff
• Friends
• Family
• Online friends, web sites, etc.
• Previous schools / employers
• Others?
• Document information and use it to answer the
Key Investigative Questions.
Many Targeted Individuals express concerns often that their families, friends, people online, others are playing a role in their monitoring, or are taking part. That they are somehow in on it, well according to what this threat evaluation guideline dictates, they are often in on it, and asked to be a part of the monitoring and evaluation process.
Need for Collaboration
“Most important, dangerous people rarely show all of
their symptoms to just one department or group on
campus. A professor may see a problem in an essay,
the campus police may endure belligerent
statements, a resident assistant may notice the
student is a loner, the counseling center may notice
that the student fails to appear for a follow-up visit.
Acting independently, no department is likely to solve
the problem. In short, colleges must recognize that
managing an educational environment is a team
effort, calling for collaboration and multilateral
solutions.”
They use a variety of sources in the targets environment, but because reports do come in remotely, there is cause for error, or even false reporting of events. These reports are used to keep targets on monitoring for years to come.
Many people believe that the social networking sites that they use are harmless, but when it comes to being evaluated as to wither you are a threat to your social circle, you will see that these sites have now begun to play a critical and integral role in assisting these teams to make their initial assessments.
If unaware of the guidelines being used to assess them, targets could well be entrapped or tricked into making suggestive statements. Also once those around the target perceive that the target is under investigation, normal everyday behaviours that would have been brushed aside, become significant, and everything the target does is cause for alarm.
2. Have there been any communications
suggesting ideas or intent to attack?
• What, if anything, has the person
communicated to someone else (targets,
friends, co-workers, others) or written in a
diary, journal, email, or Web site concerning
his or her grievances, ideas and/or intentions?
• Has anyone been alerted or “warned away”?
Source: U.S. Secret Service and U.S. Department of Education, (2002)
Guide to Managing Threatening Situations and Creating Safe School Climates.
Key Investigative Questions
The threat assessment team will also circumvent laws such as FERPA and HIPAA to get around laws that would usually prevent an invasion of the targets rights and privacy.
Information Sharing: FERPA
• FERPA is not an impediment to effective threat
assessment and case management.
• FERPA governs records only, not observations,
communications, etc.
• FERPA does not govern police records.
• If created & maintained by law enforcement, for
law enforcement purpose.
• New guidance from ED encourages information
sharing where public safety is a concern.
• FERPA does not permit a private right of action.
Information Sharing: HIPAA
• Check with legal counsel as to which laws
govern counseling center records.
• Confidentiality is held by client, not MH provider.
• In cases where privacy laws apply, can try these
strategies:
• No legal prohibition against providing
information to health/MH professionals.
• Inquire about Tarasoff – type duty.
• Ask subject for permission to disclose.
Record Keeping
• Centralized incident tracking database;
• Document reports and actions – include date,
time, subjects, targets, behaviors of concern,
witnesses;
• Data;
• Assessment;
• Plan;
• Preserve evidence: Keep copies of email,
memos, etc.
Record Keeping
Incident tracking database;
• Incident Information:
• Date, location, nature of incident, means of approach;
• Subject information:
• Name, DOB, sex, description, affiliation, status, etc.
• Target / Victim Information;
• Name, DOB, sex, description, affiliation, status, etc.
• Witness/Reporting Party Information:
• Name, DOB, sex, description, affiliation, status, etc.
Assessing Information and Situation
Once all the reports are in from the eyes and ears around the target, then the assessing of information begins.
Think creatively about resources, as well as
“eyes and ears.”
• Anticipate likely change in the short and midterm,
and how the subject may react.
• Monitor using available resources. Who sees
the person regularly, inside work/campus,
outside, on weekends, online, etc.?
The threat assessment team use the information gathered together to determine if the target should be referred any third parties, this could include law enforcement, Employee Assistant Program, Mental Health Workers or others.
They evaluate if the person might be a danger to themselves or others, if the person is able to take care of themselves. Eg. Do they pay rent on time, do they buy groceries, are the suicidal, a threat to others, etc. If these criteria are not met, they might try to convince a judge or other health care worker that a mental health hold is required, or some other form of intervention.
Information is recorded and reported 24/7 and often stored in some form of centralized database. The records are crossed referenced with police and other contacts.
Now this procedure was in place well before the fusion centers ever came into existence, however it is not out of the question to assume that fusion centers might well be used in future or linked into this process, even if they were not initially used.
Once a Targeted is listed for monitoring, even if they move away from the university, place of employment, or community, if they are still perceived to be a threat to others the remote monitoring, or case management will continue.
While the case is open the team should:
• Continue to monitor and modify the plan as long as the individual still poses a threat
• Recognize that a person can continue to pose a threat even after he/she ceases to be a Closing a Case
member of the campus community
• Continue to monitor the situation through its relationship with local law enforcement agencies and mental health agencies, as well as in direct cooperation with the person, if possible
The Target will be monitored as long as they are perceived as a threat. There is no current limit to how many years the state can continue this monitoring, imposition and disruption of the targets life.
If someone who has been reviewed by the Threat Assessment Team leaves the area, do you continue to monitor him/her?
If the situation warrants reviewing the case after the subject leaves the area, the team will continue to do so. It is important to remember that when the subject has relationships in his/her life, there is a lesser chance for violence to occur. A failure to communicate or interact with a subject encourages problems to fester, which could lead to violence.
Also under many of these occupational health and safety guidelines, the Targets information can and will be shared with those that they are likely to come in contact with.
“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.
The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.
Remember as the case is being monitored, any incidents, perceived threats, strange behaviour, anything at all can be reported to this team for assessment and evaluation. If the team feels that a change in behaviour constitutes a threat the team might upgrade the targets to something along the lines of medium risk, danger to self or others, should only be seen in pairs.
Manage The Situation
The threat assessment team might also add specific quirks of the target to their files, things that the general public might be made aware of, such as if the target starts to pace it could be a sign of imminent attack.
Assessment: Case Priority Levels
PRIORITY 1 (Extreme Risk): Poses clear/immediate threat of violence or self-harm and requires immediate containment, law enforcement involvement, target protection, and case management plan.
PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.
PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.
PRIORITY 4 (Low Risk): Does not pose threat of violence or self-harm at this time, but may exhibit some disruptive behavior and/or need for assistance. Requires passive monitoring. Utilize case management and referrals as appropriate.
PRIORITY 5 (No Identified Risk): Does not pose threat of violence or self-harm nor is there evidence of disruption to community. No case management or monitoring required.
It can be clearly shown that monitoring is indeed a part of the guidelines that these threat assessment teams do follow.
Once the plan is developed, it needs to be
implemented and monitored.
• Team should include implementation and
monitoring responsibilities as part of the case
management plan.
• Further referrals may be necessary.
• Team should continue to follow up as
necessary.
What targets may wish to do in future is redirect F.O.I.A. (Freedom Of Information Act) requests to these agencies.
Targets may also wish to have their lawyers make a cease and desist request to these threat assessment teams in regards to the overly invasive monitoring that is allowed. In future Targeted Individuals might even be able to come together and aim class action lawsuits or individual, and human rights lawsuits at these teams. Slander suits and others might also be suitable.
What would also be nice is to gain some statistics on who is being monitored via these threat assessment teams. Which case files were closed, vs which are still open. How many years does the average case stay open for? Ages, genders, race, how many were whistle-blowers, or belonged to a dissident, extremist, conspiracy or protest group. How many cases ended in suicide? Incarceration? Institutionalization? Homelessness?
These might be things that future Targeted Individuals look into as they seek assistance in stopping the monitoring, surveillance, and life disruptions, and curtailling the abuses that are being experienced under these programs.
With these threat assessment teams it’s extremely important to realize that if the threat assessment team is composed of one group, and they are assigned to make a threat assessment of another group or individual, you might not have fair and balanced assessments, because these teams than do not take into considerations cultural norms, gender, racial, sexual, or other biases that might be present, or underlying within the assessment team. The assessment team is essentially playing judge, jury, and executioner with their assessments of these individuals, thus if courts are required in many cases to use a fair and balanced jury of peers, should Threat Assessment Teams be morally or legally required to do the same in future?
Posted by Samuel Milgrom, Washington Legislative Office at 5:01 pm
[quote]
Mass Con-Fusion
You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?
[/quote]
This is exactly what we have been saying. Also this was first reported over 12 years ago, even before fusion centers were in existence.
[quote]
“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”
See they listed the full spectrum of what was happening. Informant, cops, community groups, local companies, private foundations, federal agencies, and we have only seen this grow and get worst.
Also yes, there are little to no guidelines, and yes it’s not clear who they report to. This is because each little area does it’s own thing, just like terrorist cells.
So now that we are all on the same page, let’s start to find out what can be done, before they start making people wear arm bans ok.
The surveillance apparatus is working, but it’s working separate angles so you won’t see the full program till it’s all in place. Different areas are seeing different implementations and they just won’t get it.
30/2009 08:15 PM
Quote:
NYPD Announces New Stop And Frisk Pilot Program
By: NY1 News
After accusations of racial profiling, the New York City Police Department told the City Council Thursday that it is trying out a new Stop and Frisk program in certain neighborhoods.
On the advice of the RAND Corporation, the department is now giving an explanation to pedestrians that officers stop in Harlem, the South Bronx, and East New York.
Anyone who is stopped by police in those neighborhoods will receive a palm card detailing the officers’ motives.
[/quote]
After they get this normalised in these communities, they will spread this to other communities, till you all have to show your papers upon request. The best way to fight this, stop it before it happens. If it’s not acceptable for these communities, then it’s not acceptable for yours, by sitting back and giving your quite accent and saying that it is, you ensure your own fate.
NYPD Accused of Racial Profiling in Subway Bag Searches
The NYCLU filed a lawsuit yesterday on behalf of a Brooklyn man who says the NYPD has stopped him in the subway and searched his bag an excessive number of times because he looks Middle Eastern. 32-year-old Jangir Sultan was born in Brooklyn, where he currently resides, but he accuses NYPD officers of racial profiling, stopping him 21 times over three years. Police began searching subway riders’ bags at checkpoints in 2005 in the wake of the London subway bombings, but the department insists the checks are race-neutral and conducted randomly. [/quote]
Once they take those rights they never give them back. Once they scare you, and you give up your rights, you never get them back.
The way this guy got the harassment to stop was by taking down the names of the officers and filing a complaint. Other wise they would have just continued. They are all the same, little bully attitudes. If you video tape them, document them, or report them, it’s the only time that they fall back into where they came from. We see the same thing with the Informant force that harass us. That or in some cases just ignore them, different situations call for different approaches.
There is lot’s more news, but this is the need to know stuff.
I was just thinking about the ABC.com article that came out recently asking what is behind the Internet Conspiracy Empires? I think it’s a good question, and so I thought I would take you back through some of the conspiracies that we have looked at over the last couple of years. They will not all be conspiracies, but they will help to show why I have drawn my conclusion about our current conspiracy, and what is behind Gang Stalking. The Snitching System.
[quote]”The history of the snitch is long and inglorious, dating to the common law. In old England, snitches were ubiquitous.Their motives, then as now, were unholy. In the 18th Century, Parliament prescribed monetary rewards—blood money—for snitches, who were turned back onto the streets where they were, in the words of one contemporary commentator,“the contempt and terror of society.”
“The system produced a cycle of betrayal in which each snitch knew he might find himself soon in the dock confronted by another snitch.”
“If all cases ended so poetically, perhaps informant dependent prosecutions would be more humorous than objectionable. In real life, however, O. Henry endings are rare.”
“The snitch system probably arrived in the New World with the Pilgrims.The first documented wrongful conviction case in the United States involved a snitch.The case arose in Manchester, Vermont, in 1819. Brothers Jesse and Stephen Boorn were suspected of killing their brother-in-law, Russell Colvin. Jesse was put into a cell with a forger, Silas Merrill, who would testify that Jesse confessed. Merrill was rewarded with freedom.
The Boorn brothers were convicted and sentenced to death but saved from the gallows when Colvin turned up alive in New Jersey.”[/quote]
With the advent of modern day society can we assume that the Snitching System became obsolete, or would it be better to rightfully conclude that it was and still is an integral part of society and as relevant today as it was yesterday? It is also just as much a concern for this time period as it has been in others?
The Secret Persuaders
During WWII before America agreed to join the war, the United Kingdom set up a secret agency inside of America, designed to convince the entire nation it was a good idea to join the war. This was back in 1940 and this agency had almost 3000 operatives. They sent out false media stories, via newspapers and other mediums they had set up within America. To the individuals that were anti-war they had a game that they played called VIK. http://www.guardian.co.uk/uk/2006/aug/19/military.secondworldwar
[quote]BSC invented a game called “Vik“, described as “a fascinating new pastime for lovers of democracy”. Printed booklets described up to 500 ways of harassing and annoying Nazi sympathisers. Players of Vik were encouraged to ring up their targets at all hours of the night and hang up. Dead rats could be put in water tanks, air could be let out of the subject’s car tyres, anonymous deliveries could be made to his house and so on. In the summer of 1941, BSC sent a sham Hungarian astrologer to the US called Louis de Wohl. At a press conference De Wohl said he had been studying Hitler’s astrological chart and could see nothing but disaster ahead for the German dictator. De Wohl became a minor celebrity and went on tour through the US, issuing similar dire prognostications about Hitler and his allies. De Wohl’s wholly bogus predictions were widely published.[/quote]
I have never been able to locate the booklet with the 500 ways of harassing those that were anti-war, but I am sure some of those methods survived to this time period.
Here are some more amazing details about this agency that was set up by a foreign body on U.S. soil for the sole purpose of manipulating the population intogoing to war. This would have continued, but conveniently ended when the Japanese hit pearl harbour, what a unique coincidence.
[quote]BSC was set up by a Canadian entrepreneur called William Stephenson, working on behalf of the British Secret Intelligence Services (SIS). An office was opened in the Rockefeller Centre in Manhattan with the discreet compliance of Roosevelt and J Edgar Hoover of the FBI. But nobody on the American side of the fence knew what BSC’s full agenda was nor, indeed, what would be the massive scale of its operations. What eventually occurred as 1940 became 1941 was that BSC became a huge secret agency of nationwide news manipulation and black propaganda. Pro-British and anti-German stories were planted in American newspapers and broadcast on American radio stations, and simultaneously a campaign of harassment and denigration was set in motion against those organisations perceived to be pro-Nazi or virulently isolationist (such as the notoriously anti-British America First Committee – it had more than a million paid-up members).
Stephenson called his methods “political warfare”, but the remarkable fact about BSC was that no one had ever tried to achieve such a level of “spin”, as we would call it today, on such a vast and pervasive scale in another country. The aim was to change the minds of an entire population: to make the people of America think that joining the war in Europe was a “good thing” and thereby free Roosevelt to act without fear of censure from Congress or at the polls in an election.
BSC’s media reach was extensive: it included such eminent American columnists as Walter Winchell and Drew Pearson, and influenced coverage in newspapers such as the Herald Tribune, the New York Post and the Baltimore Sun. BSC effectively ran its own radio station, WRUL, and a press agency, the Overseas News Agency (ONA), feeding stories to the media as they required from foreign datelines to disguise their provenance. WRUL would broadcast a story from ONA and it thus became a US “source” suitable for further dissemination, even though it had arrived there via BSC agents. It would then be legitimately picked up by other radio stations and newspapers, and relayed to listeners and readers as fact. The story would spread exponentially and nobody suspected this was all emanating from three floors of the Rockefeller Centre. BSC took enormous pains to ensure its propaganda was circulated and consumed as bona fide news reporting. To this degree its operations were 100% successful: they were never rumbled. [/quote]
That is an amazing conspiracy that very few knew anything about. Are branches of this program still operational in some capacity on foreign soil today? It’s hard to say.
Operation Gladio
An actual operation that hired agents and had them in keeping in such a time as when they were needed. This is another jewel that came to light while doing research into Gang Stalking.
[quote]Emblem of NATO’s “stay-behind” paramilitary organizations.After World War II, the UK and the US decided to create “stay-behind” paramilitary organizations, with the official aim of countering a possible Soviet invasion through sabotage and guerrilla warfare behind enemy lines. Arms caches were hidden, escape routes prepared, and loyal members recruited: i.e. mainly hardline anticommunists, including many ex-Nazis or former fascists, whether in Italy or in other European countries. In Germany, for example, Gladio had as a central focus the Gehlen Org — also involved in ODESSA “ratlines” — named after Reinhard Gehlen who would become West Germany’s first head of intelligence, while the predominantly Italian P2 masonic lodge was composed of many members of the neofascist Italian Social Movement (MSI), including Licio Gelli. Its clandestine “cells” were to stay behind (hence the name) in enemy controlled territory and to act as resistance movements, conducting sabotage, guerrilla warfare and assassinations.
However, Italian Gladio was more far reaching. “A briefing minute of June 1, 1959, reveals Gladio was built around ‘internal subversion’. It was to play ‘a determining role… not only on the general policy level of warfare, but also in the politics of emergency’. In the 1970s, with communist electoral support growing and other leftists looking menacing, the establishment turned to the ‘Strategy of Tension’ … with Gladio eager to be involved.”[
[/quote]
A secret paramilitary army that exists in many European countries and has since the end of WWII, set up by the U.S. and the U.K.? Kept secret all the way up to 1990 when the Italian wing was exposed, and then the other branches were exposed as well. This secret army might have remained secret to this day, except for the extreme involvement of the Italian wing in local policy.
[quote]“Coordinated by the North Atlantic Treaty Organization (NATO), {the secret armies} were run by the European military secret services in close cooperation with the US Central Intelligence Agency (CIA) and the British foreign secret service Secret Intelligence Service (SIS, also MI6). Trained together with US Green Berets and British Special Air Service (SAS), these clandestine NATO soldiers, armed with underground arms-caches, prepared against a potential Soviet invasion and occupation of Western Europe, as well as the coming to power of communist parties. The clandestine international network covered the European NATO membership, including Belgium, Denmark, France, Germany, Greece, Italy, Luxemburg, Netherlands, Norway, Portugal, Spain, and Turkey, as well as the neutral European countries of Austria, Finland, Ireland, Sweden and Switzerland.
‘The existence of these clandestine NATO armies remained a closely guarded secret throughout the Cold War until 1990, when the first branch of the international network was discovered in Italy. It was code-named Gladio, the Latin word for a short double-edged sword [gladius]. While the press said the NATO secret armies were ‘the best-kept, and most damaging, political-military secret since World War II’, the Italian government, amidst sharp public criticism, promised to close down the secret army. Italy insisted identical clandestine armies had also existed in all other countries of Western Europe. This allegation proved correct and subsequent research found that in Belgium, the secret NATO army was code-named SDRA8, in Denmark Absalon, in Germany TD BJD, in Greece LOK, in Luxemburg Stay-Behind, in the Netherlands I&O, in Norway ROC, in Portugal Aginter, in Switzerland P26, in Turkey Counter-Guerrilla, In Sweden AGAG (Aktions Gruppen Arla Gryning, and in Austria OWSGV. However, the code names of the secret armies in France, Finland and Spain remain unknown.
[/quote]
The promised that they would close down these secret armies. We however know that with other similar programs they are never shut down, they are just repackaged and start up again. That is one heck of a conspiracy. Secret armies in many European countries set up by the U.S. and the U.K.
[quote] The cops love these free-wheeling, elite units. They were ostensibly created to combat terrorism, but have been used mostly to infiltrate and suppress liberal and radical political organizations and civil rights groups. They lift their members out of the routine of police work into something of a James Bond life. As Frank Donner points out in this excellently researched, thoughtful and well-detailed study of police spying, their excesses have been many. But Donner, who directed the American Civil Liberties Project on Political Surveillance, concludes with the chilling thought that the Red squads will be around long after there are any Reds.[/quote]
These groups go back over a hundred years, as each new wave of immigrant population introduced themselves Red Squads were there, using informants to infiltrate, get information and help to disrupt these groups, movements, and unions. With other infiltration programs the idea is to try to get the corportion of members of the infiltrated groups, by asking some of them to become informants. Once you are an informant for the system, you are always considered an informant for the system.
[quote]Worse yet, the information, and misinformation, gathered by these sleuths is fed into the growing number of intelligence networks maintained by federal, state and local law-enforcement organizations. In the computer age, if you attend a left-wing meeting in Echo Park, your name is likely to be spread as far as New York.
As Donner points out, the squads are not a recent invention. One of his most important contributions is tracing the history of the Red squads, showing how deeply rooted they are in American political, social and economic life….
…That set the pattern for the Red squads, a pattern that continues today. Whatever the city, said Donner, the goal and tactics are much the same: “police behavior motivated or influenced in whole or in part by hostility to protest, dissent and related activities perceived as a threat to the status quo.”
[/quote]
Elite branches of the police designed to squash dissident and protect against perceived threats to the status quo.
[quote]In New York, former City Police Commissioner Patrick Murphy traced their origin there to an “Italian Squad” formed in 1904 to monitor a group of Italian immigrants under suspicion[1]. However, it is their association with fighting communism which provides the basis for the name “Red Squad.” They became more commonplace in the 1930s, often conceived of as a countermeasure to Communist organizers who were charged with executing a policy of dual unionism – namely, building a revolutionary movement in parallel with membership in above-ground labor organizations. Similar units were established in Canada in this period, although only the Toronto police used the name.
In the late 1960s, as the protests against Vietnam and the general domestic upheaval intensified, the Red Squads augmented their focus, to include dissidents largely outside the labor movement, including therein not just war resisters, but protest movements of all political stripes, including Neonazis, Native American movements, the women’s movement, environmentalists, the civil rights movement, and others. The methods employed ranged from simple surveillance to isolated incidents of assassination. Anti-activist police operations were expanded under the Johnson and Nixon administrations, particularly in concert with, and within the cadre of the FBI’s COINTELPRO surveillance program, but also including domestic spying by the CIA.
[/quote]
This very rarely discussed unit of the police apparently were in and still are in existence in many cities, some going by different names, but the same concept applies, squash dissidence. Alexandra Natapoff http://www.aclu.org/images/asset_upload_file744_30623.pdf
[quote]
The use of criminal informants in the U.S. justice system has become a flourishing socio-legal institution. Every year, tens of thousands of criminal suspects, many of them drug offenders concentrated in inner-city neighborhoods, informally negotiate away liability in exchange for promised cooperation, while law enforcement at the local, state and federal levels rely on ever greater numbers of criminal actors in making basic decisions about investigations and prosecutions. While this marriage of convenience is fraught with peril, it is nearly devoid of judicial or public scrutiny as to the propriety, fairness, or utility of the deals being struck. At the same time, it is a quintessential expression of some of the most contentious characteristics of the modern criminal system: law enforcement discretion, secrecy, and the increasing informality of the adjudication process.
The informant institution is also an under-appreciated social force in low-income, high-crime, urban communities in which a high percentage of residents – as many as fifty percent of African American males in some cities – are in contact with the criminal justice system and therefore potentially under pressure to snitch. By relying heavily on snitching, particularly in drug-related cases, law enforcement officials create large numbers of informants who remain at large in the community, engaging in criminal activities while under pressure to provide information about others. These snitches are a communal liability: they increase crime and threaten social organization, interpersonal relationships, and socio-legal norms in their home communities, even as they are tolerated or under-punished by law enforcement because they are useful.
The Article also hypothesizes the harms imposed by the informant institution on socially disadvantaged, high-crime communities in which snitching is common. These harms may include increased crime, the erosion of trust in interpersonal, familial and community relationships and other psychological damage created by pervasive informing, the communal loss of faith in the state, and the undermining of law-abiding norms flowing from law enforcement’s rewarding of and complicity in snitch wrongdoing.[/quote]
Many people see this article and assume it’s an inner city problem, but it’s not. This is a societal problem. These informant programs are not just going after African American males, they are going after the females, and they are going after other communities. They started in these communities, and these communities currently have higher ratios of Informants, but then it branches out.
Imagine a society where over 50% of your community is a potential snitch? Imagine what that does to the heart and soul of a society? Some people don’t have to imagine because they have already been through something very similar.
[quote]
“As summer travel ebbed, I dove into the study of the informant system, as pertains to those whom the police arrest, then pressure to go back into their places of home and work and set others up for arrest.”
How many informants do we have in communities? We can’t measure it because of this secret system, but experts have some guesses.
“Because researchers know what is behind the search warrants granted, they know that almost 98% of the time the police don’t have any goods on anyone, just a confidential informant. A lot of informing is going on, and it’s escalating.”
“So they squeeze these people into rolling on their mother. Our family involved my brother’s girlfriend; it was her brother who turned her in, and so we went through this ourselves. And it is hard to try to explain to people this part — people do 20, 30 years and they get through it. Somehow, I don’t know how. I’ve never been to prison, but they get through
it, and what dogs them all of the time is this — how could my sister do that to me? How could my friend do this to me? That stays with them.
That psychological damage never goes away.
And it spreads to everyone in the family, just like anything traumatic does, and you get a bunch of sick people.”
When I grew up, the Russians were doing it a lot, the informant system throughout all the communities. A person could be hauled off and interrogated and taken off to the ice fields. It terrified me, those Russian people. We studied these communities in Russia after that period because there was a lot of mental illness. Our country went over there to help them with all their crazy people. And do you know what our country found out? Our scientists and doctors went over there and came back and said, “It was all those informants. It made them crazy to live among people, and nobody knew who was going to rip them off, or who needed to ‘get in good,’ or some favor. And so turn someone in, and that person gets hauled off to Siberia. It made people crazy. Well, that’s what is happening in our communities now.”
[/quote]
The new face of snitching might surprise you. As mentioned they started in ethnic communities, but they have branched out so much further then this.
Meet Rachel Hoffman she was a 23-year-old Florida State psychology graduate, she is also the face of snitching. Rachel earlier this year agreed to become an Informant to lower her sentence for a drug conviction. She was killed while making a drug purchase for the police to help reduce her drug sentence. Informants come from a variety of social and economical backgrounds and once caught up in the system, many will do anything to escape prison sentences normally offered for much more severe crimes. http://november.org/stayinfo/breaking08/FinalNight.html
[quote]Immediately after Tallahassee police raided her apartment April 17, Hoffman went to her boyfriend’s house and told him about the deal she’d cut. Over the next three weeks, she would tell him and Liza all about her work as a confidential informant.
“They wanted her to turn in her friends, and she wouldn’t do that,” said Liza, a 24-year-old FSU graduate student. “She said she wanted to get some grimy people off the street. She wanted to get bad guys.”
At first she agreed to give up a guy she knew who dealt drugs and sometimes bought pot from her, her friends said. But after one controlled call from the police station, she confessed to him she was working for the police and asked him to help her find someone else to turn in.[/quote]
She was killed during a sting that went wrong. She was an inexperienced 23 year old, who didn’t want to go to jail, didn’t want her parents to find out, and thought this would be a cool way to work off her sentence. She paid the ultimate price for it. This story is not that uncommon in today’s modern society, but many of us, like myself, were previously unaware of the extent to which citizen informants are being used in society.
She should no more have been turned into an Informant than many of these young urban men and woman, who also don’t want to spend years in jail, vs living outside for minor drug possessions, these people exchange their freedoms for a type of slavery and servitude to the system that is unimaginable. These situations are becoming too common, and they are contributing to the detriment and moral fiber of our societies.
Fusion Centers and TLO
The informant system is not just using paid informants. They are also using an army of volunteer Informants. The Citizen Informants who are parts of various community programs, or who were inducted via their place of employment.
The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases.
This number of 800,000 is outside of other Informant programs that are already in place within America. Informants working via Citizen Corps, and other sub programs.
There are informant programs for local businesses, informant programs for truckers, boats, and so many others.
[quote]If you attended a Canadian university in the past eighty years, it’s possible that, unbeknownst to you, Canadian security agents were surveying you, your fellow students, and your professors for ‘subversive’ tendencies and behaviour. Since the end of the First World War, members of the RCMP have infiltrated the campuses of Canada’s universities and colleges to spy, meet informants, gather information, and on occasion, to attend classes. [/quote]
[quote]RCMP spies kept secret files on hundreds of Canadian Politicians and bureaucrats at all three levels of government as part of a project known as the “VIP program,”[/quote]
[quote]The book, a thorough examination of RCMP surveillance of the academic world, also discusses the Mounties’ efforts to keep tabs on other
elements of society, including government, the media and women’s groups.
The RCMP created security files on 800,000 Canadians, and it has long been known the force took an active interest in politicians and public
servantswith links to Communist organizations or other pursuits deemed subversive.[/quote]
Talk about conspiracy. The Canadian government for over 80 years spied on it’s citizens and opened files on many of it’s citizens just because they attended a university or college? If the Canadian government was willing to do this, what about other nations?
This program after 80 years of operation within Canadian Universities and Colleges, when exposed supposedly formally ended. That is the official story that the public is suppose to believe.
These spying programs were not content to just watch the universities, the research shows that they branched out into the community, because after graduating, these people might still have subversive ideas.
Within the last 10 years since the program supposedly ended, it’s hard to imagine how many new files might have been opened on unsuspecting students.
Stasi
What happened to these people who were former spies for the East German state?
[quote]More East Germans were spying on their neighbors, colleagues, family and friends when the Berlin Wall fell than had previously been thought. According to a report published Monday, 189,000 people were informers for the Stasi — the former Communist secret police — when East Germany collapsed in 1989 — 15,000 more than previous studies had suggested.[/quote]
The C.I.A. were handed the list of these names after the Berlin Wall fell. How many went to other countries and were asked to continue with their domestic spying is unclear.
The above scenarios are just a few of the conspiracies, intrigues, and surprising information I have come across when researching Gang Stalking.
what I am seeing is a continual and consistent pattern of something that is systemic, with many absorption points. This means that citizens are being incorporated into these programs through many different venues, some via their families. Other through educational institutions, others via their places of employment, other through religious institutions, etc.
I am also seeing a link to some people that are being mobbed and bullied out of this system. I am also seeing the same patterns of collusion that has been reported elsewhere, by others.
That’s part of the conspiracy that I am seeing, and this conspiracy has been ongoing within society for some time now. Many communities have been affected by this and some are very aware of the level of snitching and informing that is ongoing in society, paid and unpaid. Others have had very limited or no exposure to these concepts, and therefore are not aware of what is ongoing in society.
I think a lot of information has come out in the last couple of weeks. I think it’s up to Targeted Individuals to review the information, research for yourselves and then if you find the information to be valid, please share it with others.
The following article will try to put into perspective some of the societal structures that are most likely responsible for the targeting some of those in the Targeted Individual community are experiencing.
For years Targeted Individuals have been saying that they are being followed around, stalked, monitored while at home, and out in public. They have complained about a system that is capable of 24/7 surveillance, able to harassment at home, work, in the community, and even while traveling abroad. For several years there has been a great deal of disbelief that such occurrences could even be possible. The follow article, will try to explain referencing sources already available and documented how this could be happening.
The following article represents the views and opinions of the http://www.GangStalkingWorld.com website and does not necessarily reflect the views of any other person, or website in the community.
It has long been a widely expressed view that the monitoring is being done by various groups of citizen informants, members of various community policing type programs. Based on recent research conducted it seems most likely that the people being used to follow Targeted Individuals around are what society and the government in some countries refer to as, “covert human intelligence sources”. They can also be known as own as Citizen Informants. Another slang terms that is often used to describe these individuals is the term Snitch or Snitches.
Covert human intelligence sources
A recent article came out in the London Telegraph, saying that Children as young as 8 are being employed by the state as “Covert human intelligence sources” aka Snitches. Targeted Individuals often complain that the harassment is being perpetrated by all members of the community including children.
Children are being hired and used by the government to spy on their neighbors in the Uk. and “being encouraged to photograph or video neighbors guilty of dog fouling, littering or “bin crimes” The article says there are “hundreds of Junior Streetwatchers, aged 8-10 years old, who are trained to identify and report enviro-crime issues such as graffiti and fly-tipping.” The adult spies according to authorities are recruited via newspaper ads.
Quote:
“Other local authorities recruit adult volunteers through advertisements in local newspapers, with at least 4,841 people already patrolling the streets in their spare time.
Some are assigned James Bond-style code numbers, which they use instead of their real names when they ring a special informer’s hotline.
This escalation in Britain’s growing surveillance state follows an outcry about the way councils are using powers originally designed to combat terrorism and organised crime to spy on residents. In one case, a family was followed by council staff for almost three weeks after being wrongly accused of breaking rules on school catchment areas.” 1
Community Oriented Policing
Though the article primarily focuses on the United Kingdom, it should be noted that other countries are setting up such community structures, via community oriented policing programs. These programs are a
Quote:
“a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policing—the redistribution of traditional police resources; (2) neighborhood-oriented policing—the .interaction of police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms. ” 2
Fusion Centers
The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughtout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases. These linked databases are not just emerging in the United States, they have already emerged in many countries around the world in the wake of implied terrorist threats.
Quote:
“We pointed out that, while diverse and often still in the early stages of formation, they often seem to be characterized by ambiguous lines of authority, excessive secrecy, troubling private-sector and military participation, and an apparent bent toward suspicionless information collection and datamining.” 3
The article then goes on to point out that in a short space of many of the warning in the report had come to pass. The article talks about the fact that this apparatus is responsible for watching and recording the everyday activity of a growing number of individuals. The reports are then gathered together and then they are accessible to any law enforcement agency that is a part of these fusion centers.
Quote:
“In the six months since our report, new press accounts have borne out many of our warnings. In just that short time, news accounts have reported overzealous intelligence gathering, the expansion of uncontrolled access to data on innocent people, hostility to open government laws, abusive entanglements between security agencies and the private sector, and lax protections for personally identifiable
information.
Overall, it is becoming increasingly clear that fusion centers are part of a new domestic intelligence apparatus. The elements of this nascent domestic surveillance system include:
• Watching and recording the everyday activities of an ever-growing list of individuals
• Channeling the flow of the resulting reports into a centralized security agency
• Sifting through (“data mining”) these reports and databases with computers to identify individuals for closer scrutiny
Such a system, if allowed to permeate our society, would be nothing less than the creation of a total surveillance society.” 3
These fusion center will have the capacity to circumvent laws that are in place to limit federal vs local authorities and the access that each has to specific information.
Quote:
“Even more troubling is the fact that these centers are networked together and seamlessly exchange information with the intelligence community through the Director of National Intelligence’s Information Sharing Environment (ISE). The Washington Post report was based on a document produced from a survey of fusion centers, which shows their intent to maximize the access each of the fusion centers has to the various databases. This would allow a state fusion center that under state law or local policy is prohibited from buying credit reports, as an example, to circumvent its own restrictions by simply calling a
fusion center in Pennsylvania to and asking Pennsylvania authorities to access the records it wants to analyze. This “policy shopping” process guts state and local privacy protections and gives the participating agencies, including the federal intelligence community, access to information they may not legally have on their own.” 3
These centers if allowed to expand will create a one way justice system. Your information, even your daily activities will be allowed to be gathered, collected, and possibly used against you. When you then request information to confirm if you are a target of surveillance, the information will be stored in a secret database and not available for you to access.
Quote:
“Even as fusion centers are positioned to learn more and more about the American public, authorities are moving to ensure that the public knows less and less about fusion centers. In particular, there appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws.31 For those living in Virginia, it’s already too late; the Virginia General Assembly passed a law in April 2008 exempting the state’s fusion center from the Freedom of Information Act.32
According to comments by the commander of the Virginia State Police Criminal Intelligence Division and the administrative head of the center, the federal government pressured Virginia into passing the law, with the threat of withholding classified information if it didn’t.33 Such efforts suggest there is a real danger
fusion centers will become a “one-way mirror” in which citizens are subject to ever-greater scrutiny by the authorities, even while the authorities are increasingly protected from scrutiny by the public.” 3
Public Employees
The next aspect of the targeted that has been reported by the Targeted Individual community is the fact that public servants seem to be taking a part in the continuous monitoring and harassment private citizens. American Civil servants, firefighters, police officers, Corporate Employees, learning to collect data and spy. The information then goes into secret data bases. They will also communicate in code. Many targets have expressed a belief not only that they are being tracked, but that their stalkers are communicating via a one handed sign language similar to that which the Stasi used.
“They are entrusted with hunting for “suspicious activity,” and then they report their findings, which end up in secret government databases.
What constitutes “suspicious activity,” of course, is in the eye of the beholder. But a draft Justice Department memo on the subject says that such things as “taking photos of no apparent aesthetic value” or “making notes” could constitute suspicious activity, Finley wrote. ” 4
Not only will this program used the civil servant already mentioned, but it will expand who is used in the program. They will have secret sources of communication available to them. The members of these programs will connect with the fusion centers. None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected.
Quote:
“And the private sector would be involved, too. “The program would eventually be expanded to include Health Care personnel and representatives from private, critical infrastructure entities, with communication systems specifically tailored to their needs.”
In this regard, Terrorism Liaison Officers resemble InfraGard members. (See “The FBI Deputizes Business”.) This FBI-private sector liaison group now consists of more than 26,000 members, who have their own secure channels of communication and are shielded, as much as possible, from scrutiny.
Terrorism Liaison Officers connect up with so-called “Fusion Centers”: intelligence sharing among public safety agencies as well as the private sector. The Department of Justice has come up with “Fusion Center Guidelines” that discuss the role of private sector participants.
“The private sector can offer fusion centers a variety of resources,” it says, including “suspicious incidents and activity information.”
It also recommends shielding the private sector. “To aid in sharing this sensitive information, a Non-Disclosure Agreement may be used. The NDA provides private sector entities an additional layer of security, ensuring the security of private sector proprietary information and trade secrets,” the document states.” 4
Other than the United States many other countries have similar programs in place where they have requested that public servants in the course of doing their day to day activities keep an eye out on what is happening.
Stalking and Monitoring.
Though I do not in believe the family in this video are targets of Gang Stalking I will say that the example shown explains very well how someone could be stalked, monitored and spied on 24/7 as this family was. I do not believe they are targets of Gang Stalking, because Gang Stalking is often covert, what this family experienced was extremely overt and left behind lot’s of verification and proof, the harassment targeted individuals experience does not often offer any overt evidence.
The stalking they believe was done primarily using their cell-phone. They were followed 24/7. Their phone conversations listened to. When the mother was in the kitchen making lemonade, the phone rang, and the caller told her, he preferred limes. When the family heard someone at their door in the middle of the night banging, they called the police, when the police arrived the invaders had already left. After the police left this happened again, the family called the police, the invaders had left, this happened a third time and finally the family stopped trying. After filing a complaint with the police, the family were sent a recording of their conversation with the police, by the stalker. They installed a camera system, the stalker called to say that he already knew the code.
The list goes on, and apparently there were a total of three families in the area that the cell phone stalking happened to. The case has received wide media attention, including the Tyra Banks show. There is technology out there designed to do this. A company which I will not name in this report, has a service for cheating spouses, where you can use a phone to know where they are and listen into their conversations. There are also programs which will allow the camera on a phone to be used to spy on the person with the camera phone.
“The families say the calls come in at all hours of the night, threatening to kill their children, their pets and grandparents. Voice mails arrive, playing recordings of their private conversations, including one with a local police detective. “
“The caller knows, the families said, what they’re wearing and what they’re doing. And after months of investigating, police seem powerless to stop them. ”
“It got worse. The Kuykendalls and two other Fircrest families told ABC News that they believe the callers are using their cell phones to spy on them. They say the hackers know their every move: where they are, what they’re doing and what they’re wearing. The callers have recorded private conversations, the families and police said, including a meeting with a local detective. ” 5
Not all members of the Targeted Individual community have a cameraphone, but this example is just to show how one family could be terrorized by an encounter such as this. What we experience is ongoing, and often just as upsetting, but we often do not have the same proof that this family had, which enabled them to go to the police.
Quote:
“Recently, the stalkers have begun to come to their home in the early hours of the morning, banging on their doors. The mother said that the first time they came, she immediately called 911, but as soon as the police arrived, the stalkers had fled. The police, unable to do anything, left, and the stalkers returned right away. She said every time this happens she contacts the police, but after about the third call and then the third return, she just stops trying.” 6
Regulation of Investigatory Powers
Regulation of Investigatory Powers is a United Kingdom law, which enables public bodies to carry out investigations and surveillance on individuals. Authorities can use directed surveillance or intrusive surveillance for months or years. These types of operations often employ “covert human intelligence sources’. Recently these laws were abused by using them to spy on families for anti-social behaviours and noise complaints.
Quote:
“Directed surveillance’ is covert surveillance of individuals during a specific but non-intrusive investigation’ (our emphasis). Surveillance is covert where it is carried out in such a way to ensure that those targeted are unaware that it is taking place (cl.25(8)). ‘Surveillance’ is defined as including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications. It also includes any recording of such activity and surveillance by or with assistance of a device.”
” Intrusive surveillance’ is defined as covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside” 7
Secret Databases
A new story also came out this year claiming that information is being kept on Canadians, in secret databases that they have no access to.
Quote:
“Jennifer Stoddart, the Privacy Commissioner of Canada, has released a 48-page report warning that the RCMP (Canada’s national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused.
One of the many disturbing facets of Stoddart’s report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter’s school neighborhood saw him entering a rooming house and—believing drugs were involved—called the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later.
Another incident cited in the Stoddart report involved a neighbour who saw two men carrying “something that resembled a large drum, wrapped in canvas” into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it “could potentially affect someone trying to obtain an employment security clearance, or impede an individual’s ability to cross the border.” 8
I recently came across two articles that took me for a bit of a surprise.
I admit I was a little bit taken aback when I came across the articles. The articles much like the mind games article that came out over a year ago focus on people with delusions, but this one tries to take no prisoners, it tries to go for the juggler, however I would like to see it fail and be right back where it belongs.
It’s coming out around the time of the Mark M. Rich book, which I still think is well written and should be used to further what we are saying about what is happening to us. http://www.TheHIddenEvil.com
These articles are good because the Targeted Individual community needs to be aware of some of the obstacles we are going to be facing as we try bring more awareness about what is happening to us, to a main stream audience.
Here is an excerpt from the first article.
[quote]
Psychosis in the 21st century looks something like this: You think your every move is being filmed for a reality television show starring you, and that everyone in your life is an actor.
Or you think you are under intense surveillance by an army of spies, whom you refer to as the “www people,” as in the World Wide Web, and they wiretap your furniture and appliances.
Or else you refuse to drink water because you fear that another cup drawn from your faucet will, once and for all, deplete the world’s water supply.
Those thoughts are from three case studies of what psychiatrists interested in the intersection of mental illness, culture and society are calling, respectively, Truman Show delusion, Internet delusion and climate change delusion; all of them a window, through madness, into the modern world.
[/quote]
Just like the other article this in many ways is also a mind game. Now don’t get me wrong, I am sure there are people in society that might be delusional etc, but we are a community of people who know what we are talking about. We not only know what we are talking about, but in the last two years, a great deal of research has come out to show the structures of these programs that are in place. Targets have started to expose this system of control and conformity and in many ways it’s doing what it has always done, it’s fighting back.
Just like any other time period the only way to fight back is with truth and light. For the few victories that we get, they will try to limit our success, we must not let them. The information is there, we just have to gather it and try to use it to our advantage. The more information we can gather about the programs that are in place the better we are.
Here are just a few things we have learnt over the last two years.
1.
We have learnt that the FBI has issued over thousands of Nation Security Letters to many individuals in society. We have learnt that of the thousands of National Security Letters issued, everyone received a gag order. They could not say anything without the penalty of going to jail. We now know that out of all those people that received those letters, those organisations, those entities that we are suppose to trust in many cases. Only a few fought back. To be correct I know of only three cases. One was the Internet Archive, the other was another online library, and the third was an ISP provider who won the case to not have to give up the information, but still has a life long gag order, and can not say anything to friends, family, co-workers etc.
[quote]NSL Statistics
The Inspector General’s report detailed the FBI’s use of NSLs from 2003 to 2005. All of the below statistics were taken from this report.
Total number of NSL requests from 2000 (prior to passage of the Patriot Act): about 8,500.
Total number of NSL requests from 2003-2005 (after passage of the Patriot Act): 143,074.
2003: 39,346
2004: 56,507
2005: 47,221
Percentage of NSL requests generated from investigations of U.S. Persons:
2003: about 39%
2004: about 51%
2005: about 53%
Type of investigation connected to NSL requests (2003 through 2005):
Counterterrorism: 73.6%
Counterintelligence: 26%
Foreign Cyber Investigations: 0.4% [/quote]
Why have more people not tried to speak up and challenged the system? If everyone took the same steps that these three companies did, we would all be a lot further along.
[quote]
Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case — including the mere fact that I received an NSL — from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie.
[/quote]
Similar types of gag orders may well be used with our friends, family, co-workers, and others to keep hushed.
In my research I have been lucky to have a couple people here and there share with me the fact that they can not say anything. I appreciate that. The way the companies are being silenced, many in society are being silenced the same way and don’t know how to fight back, they don’t have the resources to fight back, or really don’t want to against a system this powerful.Seeing what is happening to us, can leave people feeling complacent and fearful.
This is where we can help, they can not talk about what is happening in many cases, but we can. By researching and learning more, we can shine a light on what is happening. I have had a few people express their gratitude for this, but it’s not enough, I feel that we can do more. I believe we can each do our part, but we should realise our struggle is just as great as any other time period. The only difference is the face of our opposition. In the past the oppression was clearly laid out for us, this time it’s not as clear, but just as destructive.
With the National Security Letters the main thing that I have learnt is that if you do nothing, you will get nothing, if you fight back you might still not win, but at least you have a chance. These people fought back and they won. http://www.eff.org/press/archives/2008/05/06
[quote]
San Francisco – The FBI has withdrawn an unconstitutional national security letter (NSL) issued to the Internet Archive after a legal challenge from the American Civil Liberties Union (ACLU) and the Electronic Frontier Foundation (EFF). As the result of a settlement agreement, the FBI withdrew the NSL and agreed to the unsealing of the case, finally allowing the Archive’s founder to speak out for the first time about his battle against the record demand.
[/quote]
2.
We have learnt a great deal about Community Oriented Policing programs. Many countries around the world not foster and host such programs. The community themselves identify problems that they see in the community, depending on what is happening, data is collected, sometimes a covert or overt investigation takes place, and then a solution is often presented.
[quote]
There is little doubt that this paradigm in policing has captured the attention of both citizen and police, mayors and police chiefs, state government and national government officials, and has worked its way into becoming a household name.
[/quote]
[quote]
A key debate within the central understanding of the systemic approach to policing is whether community-oriented policing is a philosophy or a program.
[/quote]
[quote]a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policing—the redistribution of traditional police resources; (2) neighborhood-oriented policing—the .interaction of
police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms.
[/quote]
These programs have been adapted in many countries around the globe. The structure and functionality of these programs are a potential match for some of what we have experienced.
3.
We have in the last two years learnt that it’s become a common workplace practice to silence outspoken workers, whistle blowers, etc with the threat of a psychiatric evaluations if they don’t stop being outspoken, often about legitimate issues.
[quote]
On October 5, 1998, Norm Crosty sent a letter to the labor relationsdepartment at his plant. Crosty, for thirteen years an electrician at Ford Motor Company’s Wixom, Michigan, assembly plant, complained that he could not do his job because so many of his bosses were taking the necessary equipment out of the plant to work on their homes or personal businesses.
The next day, the plant director of human resources invoked a Ford program for combating workplace violence to bar Crosty from the factory and ordered him to see a company-paid psychiatrist or lose his job.
A little more than fourteen months later, and 725 miles away, officials at Emory University cited a similar concern about violence to justify using armed guards to escort Dr. James Murtagh off university property when Dr. R. Wayne Alexander, chairman of the department of medicine at Emory, ordered him to see a company-selected psychiatrist or lose his job. Six weeks earlier, Murtagh, a professor of pulmonology at Emory, had filed a false claims suit against the university, alleging that it had misspent millions of dollars in federal grant money. He claimed the university diverted money from research grants in order to pay for salaries and trips for administrators and some staff. The specific allegations were sealed by order of the federal judge.
Crosty and Murtagh don’t know each other. It is unlikely their worlds would ever intersect, but they have at least one thing in common. They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.
[/quote]
4.
we have learnt or at least I have learnt, that these are citizen informants doing this. I have on a personal level interacted with a few of them. I have personally provided dozens of articles about local programs, how they function, how they operate. I have spoken to at least two law enforcement officers who confirmed to me that this does exist, I have spoken to many others who deny any knowledge.
5.
Mark on his website has a great deal of information about the structure of these types of programs. It matches the structures that I had also found in my research. Federal programs with local appendages, and then communities taking part. Various countries around the world are adapting these models.
Recently I have started to investigate fusion centers. Fusion Centers are multi level government centers with several appendages, that will be in every American city, if they are not already.
[quote]
If the federal government announced it was creating a new domestic intelligence agency made up of
over 800,000 operatives dispersed throughout every American city and town, filing reports on even the
most common everyday behaviors, Americans would revolt. Yet this is exactly what the Bush administration
is trying to do with its little-noticed National Strategy for Information Sharing, which establishes
state, local and regional “fusion centers” as a primary mechanism for the collection and dissemination
of domestic intelligence.
[/quote]
6.
I have also been researching the training of TLO’s. Terrorism Liaison Officers. Some great articles came out recently about these fire fighters, police officers, civil servants, Corporate Executives that are being trained to be the eyes and ears of the state. The information mentioned that they will be communicating in code.
[quote]We’re simply providing information on crime-related issues or suspicious circumstances,” said Denver police Lt. Tony Lopez, commander of Denver’s intelligence unit and one of 181 individual TLOs deployed across Colorado.
“We don’t snoop into private citizens’ lives. We aren’t living in a communist state.”
Local watchdogs
Among recent activities the Colorado contingent detailed:
• Thefts of copper that could be used in bomb-making.
• Civilians impersonating police officers and stopping vehicles — of particular concern with the pending Democratic National Convention in Denver.
• Graffiti showing a man holding an AK-47 rifle.
• Men filming the Dillon dam that holds Denver’s water.
• Overheard threats.
• Widespread thefts of up to 20 propane gas tanks.
[/quote]
For me personally I have had a lot of things hitting closer to home. I really feel at this stage a lot of the information gathered is hitting closer to home than I had anticipated.
I feel this way, because there have been several recent attempts to take my website offline. There was one domain name stolen which was recovered, but the domain name was purposely targeted, and a domain name company appears to have possibly been complacent with the attempt to keep the domain name.
I have had someone that I believe was deliberately compromised.
I do begin to realise that it’s the same dirty tricks. We are a generation that is learning how the state operates. We are learning this again because as we have learnt in the last two years, when I say we, I mean you my audience who read my blogs. (I hope you do read my blog.) We have learnt that they have wiped out the leaders that have come before, they have run them into the ground, destroyed their lives, hopes dreams. Many of us are now experiencing the same opposition.
Unlike what has gone before, our opposition has primarily been silent and covert, with many of the people, the agencies, organisations, political leaders we should be able to trust unavailable. We have ourselves and we have a community that is making some headway, more than I realised. That’s good, but that also means the bag of dirty tricks are going to come out, and we do have to find a way to mount up some kind of resistance, or we can choose to just sit back and let them continue to do this.
For many of us, we have lost family, friends, jobs, careers, etc. Let’s not to the best of our abilities let them take anything else from us.
I do fully believe these people want us to feel that we are powerless. That we have to take this, that there is nothing better for us, but I don’t believe that. I do believe as ever they are worried that the truth will come to the surface. I believe it can, but more targets do need to step up to the plate. Use the resources that are there. Use the websites that speak the truth, the books, the articles. Do what we have been doing, but more of it.
We really do hang around ourselves a lot, we need to go out into the mainstream arenas and be able to have credible conversations. If you don’t know how to converse, start by posting a same quote from a site that you trust, or feel comfortable using. Start by asking if anyone has heard of Gang Stalking, Targeted Individuals?
Have a main stream discussion about Fusion Centers, community policing, community action, etc. Talking amongst ourselves is great, but they own and control the media and we have the Internet as our primary resource but not necessarily for that much longer.
We need to take the battle not just online, but offline to a degree. Even if it’s to hand out flyer’s saying, what is Gang Stalking? What are Targeted Individuals? Direct people to the websites, while we still can. Mark’s book is out. You can use that as an offline resource, but we must do what we can, for as long as we can, and as quick as we can.
Keep the faith, pray, meditate, fortify yourselves. We are up against some big odds, a corrupt society that is moving towards a very big agenda. We must do what we can.
This blog is going to be about my adventures with gang stalking. I really didn’t choose this adventure, it choose me about six years or so ago. I didn’t ask for it, but I am living it, and so now I will share my adventures with you all.
I am not on facebook, or myspace. I get asked this question a lot. You can visit the following links to see some of the progress that is being made. I did create a twitter account.