It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
Many Targeted Individuals wonder how they could be placed on a list in the first place? Who has the power or the authority to do such a thing? If you live in a country such as the U.K. your local councils have this ability as displayed in the Jane Clift case. If you live in the U.S. or Canada it might be the task of what’s called a threat assessment team.
She sensed that, everywhere she went, there was “whispering, collaboration, people scurrying about”. “Everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.”
“These people have this ability to do this and they can abuse it. Not many people know, I didn’t even know, that such a register existed.
n such a notification system.
Workers have the ’ right to know ‘ all risks and safe work procedures associated with the job. This may involve identifying individuals with a history of unpredictable or violent behaviour.
Training workers to recognize escalating behaviour that has the potential to result in violence is a common way to minimize risk. Five warning signs of escalating behaviour and possible responses are listed in Appendix C.
In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behaviour in the store, bar, mall or taxi.
The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed. 3
A. Expression of bizarre and inappropriate thoughts. B. Excessive absenteeism without prior approval or rationale. C. Degenerating physical appearance. D. Acts of insubordination. E. Poor work performance. F. Poor workplace relationships with others. G. Indications of alcohol/substance abuse. H. Excessive complaining. 4
Originally posted by Harassment101
Though Gang Stalking has been discussed, this article about Threat Assessment Teams is likely the first time that there is solid proof that citizens are being put on lists, and having family, friends, co-workers contacted. It's also proof that cases are being left open for years at a time, and proof that remote monitoring is ongoing. There is also now proof that social networking sites, and those Targets interact with online are being used as Eyes and Ears. This affects a lot of people, so it's an important breaking story.
gangstalkingworld.com
(visit the link for the full news article)
rems.ed.gov...
This document comes directly from Virginia Tech.edit on 19-10-2010 by Harassment101 because: (no reason given)
Gathering of information and Investigating
To gather information on the target, these threat assessment teams use a variety of sources. They use the persons friends, family, social networking circles, co-workers, neighbours, and other resources.
Triage questions can include:
• Has there been indications of suicidal thoughts, plans, or attempts?
• Has there been indications of thoughts/plans of violence?
• Does the person have access to a weapon or are they trying to gain access?
• Are there concerns about the well-being of the subject?
• Are there concerns about the safety of the community?
• If yes, a full inquiry is recommended.
Gather Information (Full Inquiry)
• Think broadly and creatively about those who might have information:
• Co-workers
• Other staff
• Friends
• Family
• Online friends, web sites, etc.
• Previous schools / employers
• Others?
• Document information and use it to answer the Key Investigative Questions.