... a macro theory of crime and victimization. It requires motivated offenders, but does not explain how such offenders become motivated... or even if they are motivated and not just labelled as such.
REPORTING & RESEARCH
EXTRAJUDICIAL CIVIL RIGHTS ABUSES
Surveys, Discussions and Case Studies of Police, Security, Community Covert Harassment, Interference & Suppression
Police and Transit Security view the daily journeys of millions of citizens passing through a system of porous security zones.
and plain clothed security services at these times will make
superficial assessments regarding your health and suitability.
Transit Report conducts
independent research, surveys and reports in support of transparency
in order to cultivate balanced dialogue and advance typologies of
SECURITY PERSONNEL LOOK LIKE THESE
CIVIL RIGHTS ABUSE
Where does surveillance end and interference begin?
Harassment as referred to here on Transit Report is conducted by police forces, private security agencies and recruited community members, not the jealousy motivated type. There are many domestic security firms supplying training, equipment and personnel (Intercon, Kroll, Black Cube etc).
"The extent to which security agencies use domestic covert operations to
exert social control varies by country and political system. Such operations can include surveillance, infiltration, and disruption
of individuals, dissident groups, attempts to publicly discredit dissident figures,
and even assassination or extrajudicial detention and execution.
Security agencies are constrained in some countries by a mesh of
judicial and legislative accountability, whereas in others they may
answer only to a single leader or executive committee."
Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Security_agency
"Stalking is a type of overt surveillance which is a step up from basic bullying.
psychological, physical and economic harm tactics just like a cold war.
Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. "
2002 report by the U.S. National Center for Victims of Crime
"Virtually any unwanted contact between two people that directly or indirectly communicates a threat or places the victim in fear can be considered stalking", although in practice the legal standard is usually somewhat stricter.
Wikipedia, Retrieved Oct 3, 2018 https://en.wikipedia.org/wiki/Stalking#Stalking
Undercover security and participants come in all shapes, sizes and ages. Some of the best cover stories are crazy, angry, vulnerable, very young or dim.
The function of a provocateur is plausible deniability for governments, municipalities and businesses from charges of assault, interference and scamming.
In partnership, the apparent function of the visible uniform is to hinder redress for the target.
Social engineering in security refers to obtaining confidential information by manipulating and/or deceiving individuals.
Social engineering in political science is a means of influencing particular attitudes and social behaviours on a large scale.
Wikipedia, Retrieved Oct 23, 2018 https://en.wikipedia.org/wiki/Social_engineering
Examples of social engineering are: gossip overheard or some elements inserted into the nightly news.
Propaganda can be overt, emotional and target a whole population. Social Engineering is more personalized, manipulative and in the background.
A set piece is a scene or sequence of scenes whose execution requires serious logistical planning. Set pieces are very often planned meticulously using storyboard. Wikipedia, Excepts retrieved Oct 23, 2018 https://en.wikipedia.org/wiki/Set_piece
Set Pieces in this sense refer to more elaborate scenarios such as traffic accidents. Stings etc are out of my purview.
For graphical examples (from statements) of real Set Pieces go to the MEDIA page under the PDF section.
THE CIVIL RIGHTS DON'T LIST
Tactics To Suppress, Disenfranchise Or Maim Citizens
"Provocation" (Legal) events that might cause a reasonable person to lose self control.
A legal defence which claims the actions were provoked. Used against you... injuries received but no charges laid or the attacker disappears.
"Agent Provocateur" (Political) Enticing another to commit an illegal or rash act or falsely implicate them. They may be employed by the police or other entity to discredit or harm an individual, peaceful protest or demonstration. Wikipedia. Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Agent_provocateur
"Soliciting a Response" (Security) A tactic used to imply a response or defensive reaction is required either out of fear or social convention. This tactic is associated with the social sciences, "social engineering" is an act of psychological manipulation having caught on among information security professionals. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Social_engineering_(security)
"Indication of Harm" (Overt) Threatening by demeanour, proximity or words of unwanted
physical contact or attempt to commit such an action. e.g. Assault vs
Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Assault
"Indication of Harm" (Covert) Persons, entities and locations used to imply harm. Examples: Worker displaying or waving tools, open flames (e.g. cigarettes in face) or a car charging a stop-line while your in a crosswalk.
"Intentional Interference" (Legal), also known as Tortious Interference. When a person intentionally damages someone's business, employment or
education causing economic harm. (fake phone
calls, cancelling agreements or appointments).
e.g. Using blackmail or extortion to induce a contractor to break a contract or obstruct ability to honour a contract, deliberately refusing to deliver necessary goods. Wikipedia, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Tortious_interferenc...
"Endangerment" (criminal) Conduct that is wrongful and reckless or wanton
and likely to produce death or grievous bodily harm to another person.
e.g. Expose to danger, imperil.
Wikipedia.com, Retrieved August 21, 2018 https://en.wikipedia.org/wiki/Endangerment
The Discover quiz will help YOU confirm if you're a target of extra-judicial harassment and how social engineering is impacting your life.
Undercover harassment is where you work & live.
Lend your expertise or skill to help grow social programs.
Learn more about our developing programs on the Support page.
Please support our development efforts by making small monthly donations or a one time gift.
Receive updates about programs in your area.
Stay informed about the major issues in these volatile times.