Surveys, Discussions and Case Studies of Police, Security, Community Covert Harassment, Interference & Suppression

Police and Transit Security view the daily journeys of millions of citizens passing through a system of porous security zones. 

Surveillance and plain clothed security services at these times will make superficial assessments regarding your health and suitability.

Transit Report conducts independent research, surveys and reports in support of transparency in order to cultivate balanced dialogue and advance typologies of social repression.






Where does surveillance end and interference begin?

Harassment as referred to here on Transit Report is conducted by police forces, private security agencies and recruited community members, not the jealousy motivated type. There are many domestic security firms supplying training, equipment and personnel (Intercon, Kroll, Black Cube etc).

"The extent to which security agencies use domestic covert operations to exert social control varies by country and political system. Such operations can include surveillance, infiltration, and disruption of individuals, dissident groups, attempts to publicly discredit dissident figures, and even assassination or extrajudicial detention and execution. Security agencies are constrained in some countries by a mesh of judicial and legislative accountability, whereas in others they may answer only to a single leader or executive committee."
Wikipedia, Retrieved Oct 3, 2018


"Stalking is a type of overt surveillance which is a step up from basic bullying. It utilize psychological, physical and economic harm tactics just like a cold war.  Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. "
2002 report by the U.S. National Center for Victims of Crime
"Virtually any unwanted contact between two people that directly or indirectly communicates a threat or places the victim in fear can be considered stalking", although in practice the legal standard is usually somewhat stricter.
Wikipedia, Retrieved Oct 3, 2018


Undercover security and participants come in all shapes, sizes and ages. Some of the best cover stories are crazy, angry, vulnerable, very young or dim. 

The function of a provocateur is plausible deniability for governments, municipalities and businesses from charges of assault, interference and scamming.
In partnership, the apparent function of the visible uniform is to hinder redress for the target.


Social engineering in security refers to obtaining confidential information by manipulating and/or deceiving individuals.

Social engineering in political science is a means of influencing particular attitudes and social behaviours on a large scale.
Wikipedia, Retrieved Oct 23, 2018

Examples of social engineering are: gossip overheard or some elements inserted into the nightly news.

Propaganda can be overt, emotional and target a whole population. Social Engineering is more personalized, manipulative and in the background.  


A set piece is a scene or sequence of scenes whose execution requires serious logistical planning. Set pieces are very often planned meticulously using storyboard. Wikipedia, Excepts retrieved Oct 23, 2018

Set Pieces in this sense refer to more elaborate scenarios such as traffic accidents. Stings etc are out of my purview.
For graphical examples (from statements) of real Set Pieces go to the MEDIA page under the PDF section.



Tactics To Suppress, Disenfranchise Or Maim Citizens

"Provocation" (Legal) events that might cause a reasonable person to lose self control. A legal defence which claims the actions were provoked. Used against you... injuries received but no charges laid or the attacker disappears.
"Agent Provocateur" (Political) Enticing another to commit an illegal or rash act or falsely implicate them. They may be employed by the police or other entity to discredit or harm an individual, peaceful protest or demonstration.  Wikipedia. Retrieved August 21, 2018


"Soliciting a Response" (Security) A tactic used to imply a response or defensive reaction is required either out of fear or social convention. This tactic is associated with the social sciences, "social engineering" is an act of psychological manipulation having caught on among information security professionals. Wikipedia, Retrieved August 21, 2018


"Indication of Harm" (Overt) Threatening by demeanour, proximity or words of unwanted physical contact or attempt to commit such an action. e.g. Assault vs Battery. Wikipedia, Retrieved August 21, 2018

"Indication of Harm" (Covert) Persons, entities and locations used to imply harm. Examples: Worker displaying or waving tools, open flames (e.g. cigarettes in face) or a car charging a stop-line while your in a crosswalk.


"Intentional Interference" (Legal), also known as Tortious Interference. When a person intentionally damages someone's business, employment or education causing economic harm. (fake phone calls, cancelling agreements or appointments).
e.g. Using blackmail or extortion to induce a contractor to break a contract or obstruct ability to honour a contract, deliberately refusing to deliver necessary goods. Wikipedia, Retrieved August 21, 2018


"Endangerment" (criminal) Conduct that is wrongful and reckless or wanton and likely to produce death or grievous bodily harm to another person.
e.g. Expose to danger, imperil., Retrieved August 21, 2018



Transparency Project

The Discover quiz will help YOU confirm if you're a target of extra-judicial harassment and how social engineering is impacting your life.

Undercover harassment is where you work & live.



Lend your expertise or skill to help grow social programs.

Learn more about our developing programs on the Support page.


Please support our development efforts by making small monthly donations or a one time gift.




Receive updates about programs in your area.

Stay informed about the major issues in these volatile times.

powered by TinyLetter



  Read about encrypted email security protocols Here and about receiving & sending secure emails Here.

 To protect your identity install Tor web browser or a VPN before sending request.

 Never include sensitive information unencrypted. Always use the REPLY SECURELY button.