REPORTING

EXTRA-JUDICIAL CIVIL RIGHTS ABUSE,
TRANSIT SECURITY HARASSMENT,
STALKING & PROVOCATEURS.

Police and Transit Security view the daily journeys of millions of citizens passing through a system of porous security zones. 


Surveillance and plain clothed security services at these times will make superficial assessments regarding your health and suitability.


Most security personnel look like this.

        


Most victims of police & community harassment are unaware of the belligerent judgments against them.

Allergies, injuries and pain may often be labelled as substance abuse. Along with false allegations or associations can follow you for decades being perpetuating by further accusations like a game of Telephone.


Superficial observations motivated by professional bias can influence insurance outcomes and hinder access to services just like the dark side of the emerging social credit system.


Below are short lists of activities and tactics used to suppress, disenfranchise or maim citizens.

 

  CIVIL RIGHTS ABUSES


Where does surveillance end and interference begin?

Harassment as referred to here is conducted by police forces, private security agencies and recruited community members, not the jealous motivated type. There are many domestic security firms supplying training, equipment and personnel (Intercon, Kroll, Black Cube etc).

The extent to which security agencies use domestic covert operations to exert political control varies by country and political system. Such operations can include surveillance, infiltration, and disruption of dissident groups, attempts to publicly discredit dissident figures, and even assassination or extrajudicial detention and execution. Security agencies are constrained in some countries by a mesh of judicial and legislative accountability, whereas in others they may answer only to a single leader or executive committee. Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Security_agency

more...


Stalking is a type of overt surveillance which is a step up from basic bullying. It utilize psychological, physical and economic harm tactics just like a cold war. 

Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. 2002 report by the U.S. National Center for Victims of Crime

"Virtually any unwanted contact between two people that directly or indirectly communicates a threat or places the victim in fear can be considered stalking", although in practice the legal standard is usually somewhat stricter. Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Stalking#Stalking

more...


Undercover security come in all shapes, sizes and ages. Some of the best cover stories are crazy, angry, vulnerable or dim. 

The function of a provocateur is plausible deniability for governments, municipalities and businesses from charges of assault, interference and scamming.
In partnership, the apparent function of the visible uniform is to hinder redress for the target.



more...


An example of social engineering is "gossip overheard"


more...
 

  CIVIL RIGHTS DON'T LIST

"Provocation" (Legal) events that might cause a reasonable person to lose self control. A legal defence which claims the actions were provoked. Used against you... injuries received but no charges laid or the attacker disappears.
"Agent Provocateur" (Political) Enticing another to commit an illegal or rash act or falsely implicate them. They may be employed by the police or other entity to discredit or harm an individual, peaceful protest or demonstration.  Wikipedia. Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Agent_provocateur

more...


"Soliciting a Response" (Security) A tactic used to imply a response or defensive reaction is required either out of fear or social convention. This tactic is associated with the social sciences, "social engineering" is an act of psychological manipulation having caught on among information security professionals. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Social_engineering_(security)

more...

"Indication of Harm" (Overt) Threatening by demeanour, proximity or words of unwanted physical contact or attempt to commit such an action. e.g. Assault vs Battery. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Assault

"Indication of Harm" (Covert) Persons, entities and locations used to imply harm. Examples: Worker displaying or waving tools, open flames (e.g. cigarettes in face) or a car charging a stop-line while your in a crosswalk.

more...

"Intentional Interference" (Legal), also known as Tortious Interference. When a person intentionally damages someone's business, employment or education causing economic harm. (fake phone calls, cancelling agreements or appointments).
e.g. Using blackmail or extortion to induce a contractor to break a contract or obstruct ability to honour a contract, deliberately refusing to deliver necessary goods. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Tortious_interferenc...

more...



"Endangerment" (criminal) Conduct that is wrongful and reckless or wanton and likely to produce death or grievous bodily harm to another person.
e.g. Expose to danger, imperil. Wikipedia.com, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Endangerment

more...
 

The exercise of their volition we construe as*
indifference to the trammels of diligence and care*.

*G. Meredith / *Transit Report.org

 
 

DISCOVER

Transparency Project

The Discover quiz will help reveal if you are a target for extra-judicial stalking and how social engineering is impacting your life.

Undercover harassment is where you work & live.

 

PROGRAMS

Lend your expertise or skill to help grow social programs.

Learn more about our developing programs on the Support page.

 

SUPPORT

Transit Report depends on your generosity. 

Please support our development efforts by making smaller monthly donations or a one time gift.

 

   

NEWSLETTER SIGN-UP

Stay informed about major social issues in these volatile times.

Keep up with programs in your area & relevant news.

powered by TinyLetter

 

END to END ENCRYPTED
SECURE EMAIL

How to request a link

  Read about encrypted email security protocols Here and about receiving & sending secure emails Here.

❷  To protect your identity install Tor web browser or a VPN before sending request.

 Never include sensitive information unencrypted. Always use the REPLY SECURELY button.