It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
FAQ
Below are some questions, comments are popular believes that the aveage person often has to overcome in order to believe that Gang Stalking is happening to other citizens.
It’s Costly. Who has the time?
1: When you think about it, gang stalking is illogical. First, it is costly. Secondly, who has the time, unless they’re paid a lot, which brings us back to “it’s costly.”
(Skipp Porteous. www.Sherlockinvestigations.com...)
A: The reality is that Gang Stalking is not costly. The network for surveillance and monitoring a Targeted Individual is already in place. When a name is added to the notification registry all that has to be done is send out the targets information. Resources are simply reallocated to keep the latest target under surveillance.
The Stasi were successfully able to control and monitor East Germany society using this method. The citizens have the time to monitor their communities, and to protect their communities from what they believe are dangerous, or unstable people in their neighborhoods.
The listings work the same way that listings do for violent offenders, in the U.K. Jane Clift was placed on the exact same list for violent sex offenders, she was listed as medium risk only to be seen in pairs, even though her offense was primarily writing an unkind letter, with strong wording.
gangstalking.wordpress.com...
Someone would blow the whistle
2. If my own files were tagged “violent individual, only approach in twos or more” I know that my GP would be questioning it, sor starters.I don’t believe that we yet live in a world where some ‘entity’ could contact everyone I know and make them believe that I’d flipped my lid and must therefore be watched and reported on 24/7 without SOMEONE saying something directly to me about it, or querying it with authorities sufficiently to raise questions about the origin of the flagging/notification.
(marrya. www.message.snopes.com...)
A: The reality is that if you recieve a notification letter you are bound by a none disclosure agreement and are forbidden from saying anything to the person the letter is pertaining to or discussing the details with everyone else. Think of it as the same way others have found themselves bound to secrecy due to the national security letters. When the request is from an authority figure, and it comes with a possible penalty, people will keep silent.
In the scenario above your GP would be bound by law to not give you the details. Though your GP may have questions, they may not be able to do anything other than trust the system to conduct it’s own investigation. If you were flagged as medium risk, only to be seen in pairs. Your GP would simple ask an assistant to accompany them during your visit.
Many targets falsely believe that friends and family would disclose something like this, but the reality is many do not. Many follow the directions that they have been given.
gangstalkingworld.com...
Originally posted by Harassment101
There are like about 15 FAQ's in all, try it, you just might like it. At the very least they should solve some of the repetitive questions that keep popping up in these threads.
www.threatassessment.vt.edu...
rems.ed.gov...
The threat assessment team works in a four part process.
1. Identify persons of concern
2. Gather information/investigate
3. Assess information and situation
4. Manage the situation
Gather Information (Full Inquiry)
• Think broadly and creatively about those who
might have information:
• Co-workers
• Other staff
• Friends
• Family
• Online friends, web sites, etc.
• Previous schools / employers
• Others?
• Document information and use it to answer the
Key Investigative Questions.
Initial Screening
Helpful Internet sites include:
Google.com Bebo.com
MySpace.com Xanga.com
Facebook.com Snopes.com
YouTube.com thehoodup.com
Technorati.com
(searches blogs)
craigslist.com
(search the relevant city/town)
Twitter.com JuicyCampus.com
Blackplanet.com RateMyProfessor.com
MiGente.com Cuil.com
2. Have there been any communications
suggesting ideas or intent to attack?
• What, if anything, has the person
communicated to someone else (targets,
friends, co-workers, others) or written in a
diary, journal, email, or Web site concerning
his or her grievances, ideas and/or intentions?
• Has anyone been alerted or “warned away”?
Source: U.S. Secret Service and U.S. Department of Education, (2002)
Guide to Managing Threatening Situations and Creating Safe School Climates.
Key Investigative Questions
Information Sharing: HIPAA
• Check with legal counsel as to which laws
govern counseling center records.
• Confidentiality is held by client, not MH provider.
• In cases where privacy laws apply, can try these
strategies:
• No legal prohibition against providing
information to health/MH professionals.
• Inquire about Tarasoff – type duty.
• Ask subject for permission to disclose.
Record Keeping
• Centralized incident tracking database;
• Document reports and actions – include date,
time, subjects, targets, behaviors of concern,
witnesses;
• Data;
• Assessment;
• Plan;
• Preserve evidence: Keep copies of email,
memos, etc.
Record Keeping
Incident tracking database;
• Incident Information:
• Date, location, nature of incident, means of approach;
• Subject information:
• Name, DOB, sex, description, affiliation, status, etc.
• Target / Victim Information;
• Name, DOB, sex, description, affiliation, status, etc.
• Witness/Reporting Party Information:
• Name, DOB, sex, description, affiliation, status, etc.
Assessing Information and Situation
Once all the reports are in from the eyes and ears around the target, then the assessing of information begins.
Think creatively about resources, as well as
“eyes and ears.”
• Anticipate likely change in the short and midterm,
and how the subject may react.
• Monitor using available resources. Who sees
the person regularly, inside work/campus,
outside, on weekends, online, etc.?
While the case is open the team should:
• Continue to monitor and modify the plan as long as the individual still poses a threat
• Recognize that a person can continue to pose a threat even after he/she ceases to be a Closing a Case
member of the campus community
• Continue to monitor the situation through its relationship with local law enforcement agencies and mental health agencies, as well as in direct cooperation with the person, if possible
If someone who has been reviewed by the Threat Assessment Team leaves the area, do you continue to monitor him/her?
If the situation warrants reviewing the case after the subject leaves the area, the team will continue to do so. It is important to remember that when the subject has relationships in his/her life, there is a lesser chance for violence to occur. A failure to communicate or interact with a subject encourages problems to fester, which could lead to violence.
www.wcb.pe.ca...
“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.
The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.
Assessment: Case Priority Levels
PRIORITY 1 (Extreme Risk): Poses clear/immediate threat of violence or self-harm and requires immediate containment, law enforcement involvement, target protection, and case management plan.
PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.
PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.
PRIORITY 4 (Low Risk): Does not pose threat of violence or self-harm at this time, but may exhibit some disruptive behavior and/or need for assistance. Requires passive monitoring. Utilize case management and referrals as appropriate.
PRIORITY 5 (No Identified Risk): Does not pose threat of violence or self-harm nor is there evidence of disruption to community. No case management or monitoring required.