REPORTING

CIVIL RIGHTS ABUSE, TRANSIT SECURITY HARASSMENT, STALKING & PROVOCATEURS.

Police and Transit Security view the daily journeys of millions of citizens passing through a system of porous security zones. 

Surveillance and plain clothed security services at these times will make superficial assessments regarding your health and suitability.

 

SECURITY PERSONNEL LOOK LIKE THESE

        


Professional bias can turn allergic histamine reactions into substance abuse or injury strain and pain responses into anger issues.

The apparently low cost expedient solution to deal with targeted persons without incurring liability and congestion of the judicial system is to covertly harass & interfere, degrade & seriously endanger.

Since most of the techniques of state harassment are either distasteful to the public or completely illegal, forth right communication will always be ham strung.
 

CIVIL RIGHTS ABUSE


Where does surveillance end and interference begin?

Harassment as referred to here is conducted by police forces, private security agencies and recruited community members, not the jealous motivated type. There are many domestic security firms supplying training, equipment and personnel (Intercon, Kroll, Black Cube etc).

The extent to which security agencies use domestic covert operations to exert political control varies by country and political system. Such operations can include surveillance, infiltration, and disruption of dissident groups, attempts to publicly discredit dissident figures, and even assassination or extrajudicial detention and execution. Security agencies are constrained in some countries by a mesh of judicial and legislative accountability, whereas in others they may answer only to a single leader or executive committee. Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Security_agency

more...

Stalking is a type of overt surveillance which is a step up from basic bullying. It utilize psychological, physical and economic harm tactics just like a cold war.  Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. 2002 report by the U.S. National Center for Victims of Crime
"Virtually any unwanted contact between two people that directly or indirectly communicates a threat or places the victim in fear can be considered stalking", although in practice the legal standard is usually somewhat stricter.
Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Stalking#Stalking

more...


Undercover security come in all shapes, sizes and ages. Some of the best cover stories are crazy, angry, vulnerable or dim. 

The function of a provocateur is plausible deniability for governments, municipalities and businesses from charges of assault, interference and scamming.
In partnership, the apparent function of the visible uniform is to hinder redress for the target.



more...


Social engineering in security refers to obtaining confidential information by manipulating and/or deceiving individuals.

Social engineering in political science is a means of influencing particular attitudes and social behaviours on a large scale.
Wikipedia, Retrieved Oct 23, 2018 https://en.wikipedia.org/wiki/Social_engineering

Examples of social engineering are: gossip overheard or some elements inserted into the nightly news.

Propaganda can be overt, emotional and memorable, were S.E. might be subtle and unnoticed.  



more...

A set piece is a scene or sequence of scenes whose execution requires serious logistical planning. Set pieces are very often planned meticulously using storyboard. Wikipedia, Excepts retrieved Oct 23, 2018 https://en.wikipedia.org/wiki/Set_piece

Set Pieces in this sense refer to more elaborate scenarios such as traffic accidents. Stings etc are out of my purview.
For graphical examples (from statements) of real Set Pieces go to the MEDIA page under the PDF section.

more...
 

THE CIVIL RIGHTS DON'T LIST

Tactics To Suppress, Disenfranchise Or Maim Citizens

"Provocation" (Legal) events that might cause a reasonable person to lose self control. A legal defence which claims the actions were provoked. Used against you... injuries received but no charges laid or the attacker disappears.
"Agent Provocateur" (Political) Enticing another to commit an illegal or rash act or falsely implicate them. They may be employed by the police or other entity to discredit or harm an individual, peaceful protest or demonstration.  Wikipedia. Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Agent_provocateur

more...


"Soliciting a Response" (Security) A tactic used to imply a response or defensive reaction is required either out of fear or social convention. This tactic is associated with the social sciences, "social engineering" is an act of psychological manipulation having caught on among information security professionals. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Social_engineering_(security)

more...


"Indication of Harm" (Overt) Threatening by demeanour, proximity or words of unwanted physical contact or attempt to commit such an action. e.g. Assault vs Battery. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Assault

"Indication of Harm" (Covert) Persons, entities and locations used to imply harm. Examples: Worker displaying or waving tools, open flames (e.g. cigarettes in face) or a car charging a stop-line while your in a crosswalk.

more...


"Intentional Interference" (Legal), also known as Tortious Interference. When a person intentionally damages someone's business, employment or education causing economic harm. (fake phone calls, cancelling agreements or appointments).
e.g. Using blackmail or extortion to induce a contractor to break a contract or obstruct ability to honour a contract, deliberately refusing to deliver necessary goods. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Tortious_interferenc...

more...


"Endangerment" (criminal) Conduct that is wrongful and reckless or wanton and likely to produce death or grievous bodily harm to another person.
e.g. Expose to danger, imperil.

Wikipedia.com, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Endangerment

more...
 
 

DISCOVER

The Transparency Project

The Discover quiz will help confirm if you're a target of extra-judicial stalking and how social engineering is impacting your life.

Undercover harassment is where you work & live.

 

PROGRAMS

Lend your expertise or skill to help grow social programs.

Learn more about our developing programs on the Support page.

 


Please support our development efforts by making small monthly donations or a one time gift.

 

   

NEWSLETTER SIGN-UP

Receive updates about programs in your area.

Stay informed about the major issues in these volatile times.

powered by TinyLetter

 

ENCRYPTED EMAIL

  Read about encrypted email security protocols Here and about receiving & sending secure emails Here.

 To protect your identity install Tor web browser or a VPN before sending request.

 Never include sensitive information unencrypted. Always use the REPLY SECURELY button.