Monday, January 25, 2016

V2k threat assessment group

V2k

The cells in our brain, the long part like spaghetti, has a bulb on the end are called neurons, the space between the bulb and the next cell is called a synapse,,, 

along the long end, a charge of electricity is sent,,, this is a thought,,,

At the space between the synapse,and the next neuron,  is where the electricity is changed to chemical and this is where memory is stored, in these chemicals for longevity because the electrical part of the thought is not long term,,

A Radio broadcast goes through walls,, right?  You all can hear radios within the home, using a radio frequency,, the same type of frequency as in the brain, maybe faster or more powerful but its still a frequency and if you go to wikipedia and look it up it will explain more clear than I could ,if you are curious about any of these words  use wikipedia and you tube. 

The older analog TV, worked with antennas,,, the TV station sent out a wireless broadcast in 360 degrees around its antenna,in certain frequencies, , each home had an antenna which picked up the signals from the station, an antenna on the roof, ,a wire went from the antenna  to  a receiver that brought these signals into your TV, this antenna system is called Analog,, 

digital which most of us have now is a wired system, your cable,,, digital is a more precise system,,,working on dots  of energy rather than  waves . 

V2K is similar to the analog system it uses antennas, thats why its so portable,,,

your cell phone each one has an antenna,, it transmits and receives, and has been used as harassment devices,,,I was told years ago it is an App.

V2K  instead of broadcasting in a complete circle around the antenna, 360 degrees it only broadcasts in one degree, that is called directed energy,,,

From what I understand V2K is two frequencies one inside the other,,, it has a carrier frequency and the video and audio just like old fashioned TV,,, that has audio and video as well…
the carrier goes through walls and brings in the second frequency ill say thats the audio and video aspect,. for instance if you take a piece of paper and try to throw it through a window it won’t go.. but if you wrap it around a rock it will go through the window, this kinda works like that..

This is pulsed at your head with whatever information they want, they can make you howl at the moon, commit suicide , murder, thievery , and they walk away unscathed,,, they steal from us all the time. 
The subconscious picks this pulsed information up and it registers with the subconscious as a command , this is what is overridden,, these are called triggers,,, pulses.  The brain has the subconscious,, that has the flight or fight mode,,,on the plains of africa in our ancient paste we need to survive and that is how our mind was programmed,, other animals have it also. To alert the body to danger and have the mind make one quick decision, do I fight this or run,, “flight or fight.” This program, this aspect of our brain,
 controls and overrides all else..

 this is the basic element of our brain,,, our body, our selves,, the brain body does not think about it but instantaneously reacts without doubt,,, for instance if we see a car hurtling toward us, do we flight or fight..That kind of decision. 

If you tap into this subconscious mode you control the person because these ideas sent to your brain via V2K superimposes itself over everything else,,,, and they control you, deTocqueville a French philosopher once said “If you control a mans habits you control the man.”


Woody Norris’s company ATC, AmericanTechnology corp,, has a office in Maine,, I went up to see them and they demonstrated LRAD and their version of audio spotlight,,, they called it HSS hypersonicsilentsound.

 The military aspect does go through walls,,,We know this , we as targets experience this. V2K is also portable and long distance,, the pulse itself is a weapon. When you get hit with it,,, big pulse or pinpoint you feel beat up. It has force.. 

V2K can also be a beam and can stay on you for a while,,, I know they used to play movies as I went to sleep , and I would watch on the back of my eyelid, as they played different movies,, mostly fractals I always wondered if it had a hypnotic effect. I’m sure it did. 


Triggers ae short intense pulses,, with audio sometimes video, with anything they want,,, for a command,,, these triggers work too, , I was triggered, My neighbor has a drive way and I was walking home from the bus stop,,, I took a right hand turn into this neighbors driveway,, I have never been on his property before or since,,, he was standing with this man and a little girl with white blond hair,,, I walked up to them commented on the little girls hair and walked away,, as I did , the man turned to my  neighbor and said, “See I told you what she would say.” I heard him as I walked away.
 That is how pulses/triggers work and it cane very serious,, car wrecks,,, leave your house unlocked so they can enter and steal anthill you own…
I want to finish this talk off with  naming this program,,,


threat assessment group
.entry-meta
.entry-header
I’m copy pasting this from here (://www.theblackvault.com/phpBB3/topic4814.html – link resource removed). It is great insight into how you could be targeted in the first place if you really haven’t had any conflicts, no real or perceived crime or terrorism connections. Even though these guidance is for academic institutions and universities it’s possible that local communities and municipalities have similar teams in place. Again no safeguards for accused to clear their name.
Many Targeted Individuals wonder how they could be placed on a list in the first place? Who has the power or the authority to do such a thing? If you live in a country such as the U.K. your local councils have this ability as displayed in the Jane Clift case. If you live in the U.S. or Canada it might be the task of what’s called a threat assessment team.
This team can be comprised of just a few individuals, to a team of many individuals. It depends on the company, educational facility, or community they are representing and what the specific needs are.
Some examples include members of Human Resource, Police Officers, Psychiatrists, Mental Health Professionals, Senior members of the department or division. In some cases there might be just a small team, who then liaison with various other departments. The team members are pre selected, so the team is already in place. The team should generally be trained in assessing workplace violence, violence on campus, what to do, who to call, and they might also be trained in profiling an individual, to enable them to make an assessment of wither an individual is a threat vs a none threat to the environment around them.
The threat assessment teams and who they are comprised of seem to make no concessions or allowances for being evaluated by a team of peers. Eg. In court cases they try to encourage a variety of jurors, so that a person being judged can be evaluated by a peer of their jurors. This in theory allows for fairer trials and outcomes. With the threat assessment teams there are no such guidelines for who the team is comprised of, or what the make up of the team should be. This may or may not account for why the Targeted Individual community has seen an above average targeting of females and minorities. In addition dissenters such as whistle-blowers, extremist site members, and conspiracy site members are also starting to show up above average.
Once in place the team is ready to take tips from the community around them. Generally the team will liaison with Human Resources, The police, Employee Assistance Program, Mental health, and when a report comes in they use these other resources to assist with their assessment of the Target.
Reports can be filed via a form, the reports can be filed anonymously. This means that the person making the accusation need not have any accountability for making a false report. This might not be the case in every area, but in most of the threat assessment guidelines I came across, reports could be filed anonymously. Keep in mind that report are likely primarily initiated by human resources, campus resources, etc. However anonymous reporting of any kind leaves an organization open to abuses of the system that might be difficult to identify or remedy.
.entry-meta
.entry-header

Another little discussed police doctrine is “third party policing” that has been around for quite some time and described as a major shift in contemporary crime control practices. The purpose of it is to shift policing to new state where ” regulation becomes a layered web, with strands contributed by public agencies, professional and community organisations and individuals, and increasingly international organisations as part of globalised regulatory networks (Braithwaite & Drahos 2000). In essence it’s a global network of police informants where person has no choice, but to comply or else. Maybe snitch is not a right word – if it’s a new norm of forced public duty.

Thursday, January 21, 2016

very sad day for me 21 Jan. 16,,, Thursday ,, Day Kelly got arrested to A&B...

They took Kelly out in handcuffs,,, bloody, bandaged, swearing and cursing at me boy is she mad at me about James,,, James came to me filthy dirty, street homeless, my oldest grandson,, how could I refuse to take him in no matter what...he did,,, I don't care he is James... Anyway its been all summer , here it is January,, 8 months clean,,,he worked hard and its been tough for him,,, he loves his girlfriend.   Jess, So he's gonna behave to keep her.  He wants her,, she will be the best he could do and he does not want to be alone anymore he wants to be a success.I think in some way....
Anyway,,, I think early morning,,, yeah,, I was still awake 2:00 am,,, when I heard this yelling,, don't call my husband again,,, I guess bud started up again, I think he slipped he said he got 3 txts from her,,,, she was having problems with a boyfriend,,,I guess he beat her up or hit her... I don't recall that,,, but Kelly freaked,,, out of her mind,,, between having  James here with Jess, ,, see they want full access to me and mine and if James is here they don't.... They gotta keep an eye out for him they can't pulse, and DAVid and Francisco and Yaikus and Anderson can't pulse the house with them here ,, because they can testify as to the  pulses and my perps are real careful when they are around,,,wouldn't do to have several people with the same ELF problems,,, Anyway Kelly left yelling,,," get out,,, he wants my house.." to Bud,, AT Me "she just frothed at the mouth",,,,and swore and cursed,,, she was so mad,,, I don't think I ever seen her so mad,,,I came upstairs when it sounded like thumping on the floor,,, so Kelly was lying on the couch with her hands grabbing Bud's sweater...
I really think Bud is planning on putting Kelly away,,, I have long thought that,,,,he wants the house... I asked if the mortgage was paid,,, he said he was late  it was due the 16,,, why is it late,,,, he did not go to work today. whose,,, a total pussy in my opinion... I told the cop it was not Kellys fault,,,, it was his for not blocking her,,,,, He could of easily blocked her....and he did not.
So , he said she txtd Bud,,, for help and they read it together ,, you never know he always twists stories in his favor...So she goes before the judge,, and the DA called and asked if we were afraid,, I said no,, no restraining order...she owns the house..A slight Pause in the DA's voice... Anyway,,, he should of not accepted it,, Kelly lost it,,, and I guess she had been drinking,,,, I don't know what but she gets shiftaced when she does...I mean staggering drunk,,, Kelly wanted to fight and has wanted to fight with someone , she acts out her anger,,, always has or her joy,, when she was joyous as a kid ,, it was cartwheels,, when she was sad,, combatant,,
anyway James moved in and stole anything not lying down as he continued his drug rage,,he started to quiet down,, to relax, he felt safe and desperate,,, and when he got overwhelming to me I would call Jack,,, Jack would talk to him,, and reason with him and tell him NO,,, he dearly loves his father and will do anything he says,,so we started to turn him around,,, slow but sure and we are not even sure he is turned around yet,,, he still smokes pot,, Pills? Heroin is gone,,, and we are working on his thievery. Channeling that, so its good at least now he's working for his money.
David Diachision is parked out side his house,, this is the second time this morning,,, I bet he was checking on his camera,,,he has them set up,, boy he ran up the stairs,,, so now he is home early for lunch,,,, Im sure him and his cronies will get a kick out of the tape,,,, I hate you perps,,,, this is all your fault,, you set this up,, I know you did,,,,mean malicious son of a bitches,,, good,, you keep it up,,, this war,, The community Protection Program,,, we are not allowed to be able to go to court to get off it,,, it has escalated,,,,,into this program of suicides,,, hospitalizations,,,now they want to be able to give us ECT's anytime the shrinks decree.... The sparkler,, spark gap has destroyed my jaw..continuously in one spot,,, making holes in the bone,,,, weakening it,,, right now David has the vibratory effect on me,,,
and oh yeah they changed the sound program Audacity,, making it much harder to understand and use I used to be able to but it on a timer and I set it for 3:30 to 7 am so I could catch the perps on tape and play it back,,, I also would have it on a spectrogram,,,,they changed it,,,very hard to figure out how to use it,, ,and  I was not able to put it on a timer like the perps put their devices on timers...David puts his on tape and he comes home to change it , whatever he has to do to it,,, Anyway,,, second time I got punched in the face years ago some guy kidnapped a girl , she managed to get away and was in the next phone booth,,, and they were yelling,, but not to loud,,,, I didn't pay attention ,,, I was intent on my own call, so my friend wanted to pick me up, I had no idea where I was,,so I looked out asked the street and the guy started jiggling up and down,, and then punched me in the eye,,, wrong place wrong timed,,, like I said he just kidnapped the girl,,, and she got away,,,,I wanted him in jail,,, my police adviser told me to take the 1000, a year later,,,,at least I would have that,,,, so I did,, I have no idea what I did with it,, I had just arrived in San Diego,,,welcome,,, to the pleasure dome,,,",Frankie goes to Hollywood",,, favorite,,
that was the first time I ever got hit and ,so Kelly drunk heartbroken,, beset by perps,,,,and freaking out about James,,,,James kinda borrowed some metal , copper,,, but now I walk him in, and I walk him out,,, and he is with me all the time in my apartment,, he spends it with Jess.

she is working on him too and pussy is a great big initiative,, for any man,,, give him pussy and most of the time they both are happy. sorta
anyway it was a bad time had by all, Im sure the perps and neighborse,,, all got a good laugh out of things,,,Next time I wallop a person,,,its gonna be a good one...11:59 David just left,,,,I should of been keeping track of this long ago, but you know I don't care about anything anymore,,, not really...nope they beat all the caring right out of you,, maybe they consider it a weakness.I think Kelly knows about Buds indiscretion,, is perp manipulated,,,,and its because of me,,, maybe that is the problem or Bud wants me gone,, so he pulled the phone number to manipulate Kelly,,, boy was she drunk,,, she wants to fight when she gets drunk all that bottled up anger.... so maybe I should get her a punching bag....no way she's got a mean right hook,,, I got her too,,,I hit her on the top of the head,, with the frying pan she came through the blanket at me,,, so I grabbed the fy pan and bonked her on the head,,,, I used something else to ,, it cut her,,,,she had blood streaming down her face,,, I kept telling her to wipe it off and she ignored it,, and stood there talking to me as I looked at her in horror,, i think she was enjoying the look on my face, she wanted to hurt me in anyway she could... Why did she hate James so,, it was because of Bud,,,, she got mad over it too,,,he was taking metal,,,, I asked her several times,, HOW DID IT FEEL, Bud and her used to come in here all the tne and take what get wanted,, it was hard to get around,,, they never offered me a ride in the car,, because I think they knew what the perps would do,,,wreck it,, anyone who gave me a ride ended up with a totaled care but they were unhurt....always,, they did to same to me several times,,,,,Anyway Bud and I had a talk,,, he's such a pussy in the broadest sense,,,the other thing is that the pulses are hitting the pellet stove and effecting it from David Diachision and Franciso Sousas house,,,I think this added to anxiety,, so after this snowstorm this weekend I will leave fEB. 32016,, its to much for the family living here, much of this would not happen if I was not here,,,,,I think.. not sure...anyway,,, more tomorrow.. I hope I make it to the 3rd...//

Wednesday, January 20, 2016

Reverse engineering

****************************************************************
DSHS doesn’t advertise the Community Protection program. The names of residents and their histories are confidential. Even their addresses are confidential. Workers aren’t supposed to tell anyone about the program, according to most company guidelines.

Threat Assessment Teams

I’m copy pasting this from here (://www.theblackvault.com/phpBB3/topic4814.html– link resource removed). It is great insight into how you could be targeted in the first place if you really haven’t had any conflicts, no real or perceived crime or terrorism connections. Even though these guidance is for academic institutions and universities it’s possible that local communities and municipalities have similar teams in place. Again no safeguards for accused to clear their name.
Many Targeted Individuals wonder how they could be placed on a list in the first place? Who has the power or the authority to do such a thing? If you live in a country such as the U.K. your local councils have this ability as displayed in the Jane Clift case. If you live in the U.S. or Canada it might be the task of what’s called a threat assessment team.
This team can be comprised of just a few individuals, to a team of many individuals. It depends on the company, educational facility, or community they are representing and what the specific needs are.
Some examples include members of Human Resource, Police Officers, Psychiatrists, Mental Health Professionals, Senior members of the department or division. In some cases there might be just a small team, who then liaison with various other departments. The team members are pre selected, so the team is already in place. The team should generally be trained in assessing workplace violence, violence on campus, what to do, who to call, and they might also be trained in profiling an individual, to enable them to make an assessment of wither an individual is a threat vs a none threat to the environment around them.
The threat assessment teams and who they are comprised of seem to make no concessions or allowances for being evaluated by a team of peers. Eg. In court cases they try to encourage a variety of jurors, so that a person being judged can be evaluated by a peer of their jurors. This in theory allows for fairer trials and outcomes. With the threat assessment teams there are no such guidelines for who the team is comprised of, or what the make up of the team should be. This may or may not account for why the Targeted Individual community has seen an above average targeting of females and minorities. In addition dissenters such as whistle-blowers, extremist site members, and conspiracy site members are also starting to show up above average.
Once in place the team is ready to take tips from the community around them. Generally the team will liaison with Human Resources, The police, Employee Assistance Program, Mental health, and when a report comes in they use these other resources to assist with their assessment of the Target.
Reports can be filed via a form, the reports can be filed anonymously. This means that the person making the accusation need not have any accountability for making a false report. This might not be the case in every area, but in most of the threat assessment guidelines I came across, reports could be filed anonymously. Keep in mind that report are likely primarily initiated by human resources, campus resources, etc. However anonymous reporting of any kind leaves an organization open to abuses of the system that might be difficult to identify or remedy.
http://rems.ed.gov/docs/EMHETraining_SATX08_ThreatAssessmentTeams.pdf(local copy)
Once a target is chosen, or a concern is forwarded to the threat assessment team it’s time for them to liaison and start to profile and assess if that target is a concern for further evaluation or monitoring, or if the case can be closed.
Unless otherwise prohibited by law, the duty to inform workers under subsection (1) includes a duty to provide information related to the risk of violence from persons who have a history of violent behavior and who may be encountered by a worker in the course of his or her work.
This threat assessment guide from the post office is interesting. Here are some of the criterias it uses to assess if a target could be a threat.
Obsessive focus on grudge — often quick to perceive unfairness or malice in others, especially supervisor.
Especially for males, great concerns or emphasis on sexual fidelity of mate.
Recent stressful events or severe losses.
Perceived loss of options.
Direct or veiled threats of bodily harm toward supervisory personnel, coworkers, or customers.
Physical deterioration (head injuries, cancer, disability, kidney failure, etc.).
Extreme sense of moral righteousness about things in general as well as believing that the organization does not follow its own policy and procedures.
Inability to handle constructive criticism well and projecting blame on others.
Demonstrated disregard for safety or coworkers.
Tendency to be a loner with little family or social support and often having an excessive investment in the job.
Another University uses these criteria for their threat assessment and fit for duty guidelines.
A. Expression of bizarre and inappropriate thoughts. B. Excessive absenteeism without prior approval or rationale. C. Degenerating physical appearance. D. Acts of insubordination. E. Poor work performance. F. Poor workplace relationships with others. G. Indications of alcohol/substance abuse. H. Excessive complaining.
Once an assessment is initiated information is gathered on the Target in question.
Gathering of information and Investigating
To gather information on the target, these threat assessment teams use a variety of sources. They use the persons friends, family, social networking circles, co-workers, neighbours, and other resources.
Triage questions can include:
• Has there been indications of suicidal thoughts, plans, or attempts?
• Has there been indications of thoughts/plans of violence?
• Does the person have access to a weapon or are they trying to gain access?
• Are there concerns about the well-being of the subject?
• Are there concerns about the safety of the community?
• If yes, a full inquiry is recommended. Gather Information (Full Inquiry)
• Think broadly and creatively about those who might have information:
  1.  Co-workers
  2.  Other staff
  3.   Friends
  4.   Family
  5.   Online friends, web sites, etc.
  6.   Previous schools / employers
  7.   Others?
  8.   Document information and use it to answer the
Key Investigative Questions.
Many Targeted Individuals express concerns often that their families, friends, people online, others are playing a role in their monitoring, or are taking part. That they are somehow in on it, well according to what this threat evaluation guideline dictates, they are often in on it, and asked to be a part of the monitoring and evaluation process.
Need for Collaboration
“Most important, dangerous people rarely show all of their symptoms to just one department or group on campus. A professor may see a problem in an essay, the campus police may endure belligerent statements, a resident assistant may notice the student is a loner, the counseling center may notice that the student fails to appear for a follow-up visit. Acting independently, no department is likely to solve the problem. In short, colleges must  recognize that managing an educational environment is a team effort, calling for  collaboration and multilateral solutions.”
They use a variety of sources in the targets environment, but because reports do come in remotely, there is cause for error, or even false reporting of events. These reports are used to keep targets on monitoring for years to come.
Many people believe that the social networking sites that they use are harmless, but when it comes to being evaluated as to wither you are a threat to your social circle, you will see that these sites have now begun to play a critical and integral role in assisting these teams to make their initial assessments.
If unaware of the guidelines being used to assess them, targets could well be entrapped or tricked into making suggestive statements. Also once those around the target perceive that the target is under investigation, normal everyday behaviours that would have been brushed aside, become significant, and everything the target does is cause for alarm.
2. Have there been any communications
suggesting ideas or intent to attack?
• What, if anything, has the person communicated to someone else (targets, friends, co-workers, others) or written in a diary, journal, email, or Web site concerning his or her grievances, ideas and/or intentions?
• Has anyone been alerted or “warned away”? Source: U.S. Secret Service and U.S. Department of Education, (2002) Guide to Managing Threatening Situations and Creating Safe School Climates. Key Investigative Questions
The threat assessment team will also circumvent laws such as FERPA and HIPAA to get around laws that would usually prevent an invasion of the targets rights and privacy.
Information Sharing: FERPA
• FERPA is not an impediment to effective threat assessment and case management.
• FERPA governs records only, not observations,communications, etc.
• FERPA does not govern police records.
• If created & maintained by law enforcement, for law enforcement purpose.
• New guidance from ED encourages information sharing where public safety is a concern.
• FERPA does not permit a private right of action.
Information Sharing: HIPAA
• Check with legal counsel as to which laws govern counseling center records.
• Confidentiality is held by client, not MH provider.
• In cases where privacy laws apply, can try these strategies:
• No legal prohibition against providing information to health/MH professionals.
• Inquire about Tarasoff – type duty.
• Ask subject for permission to disclose.
Record Keeping
• Centralized incident tracking database;
• Document reports and actions – include date, time, subjects, targets, behaviors of concern, witnesses;
• Data;
• Assessment;
• Plan;
• Preserve evidence: Keep copies of email, memos, etc.
Record Keeping
Incident tracking database;
• Incident Information:
• Date, location, nature of incident, means of approach;
• Subject information:
• Name, DOB, sex, description, affiliation, status, etc.
• Target / Victim Information;
• Name, DOB, sex, description, affiliation, status, etc.
• Witness/Reporting Party Information:
• Name, DOB, sex, description, affiliation, status, etc.
Assessing Information and Situation
Once all the reports are in from the eyes and ears around the target, then the assessing of information begins.
Think creatively about resources, as well as
“eyes and ears.”
• Anticipate likely change in the short and midterm, and how the subject may react.
• Monitor using available resources. Who sees the person regularly, inside work/campus, outside, on weekends, online, etc.?
The threat assessment team use the information gathered together to determine if the target should be referred any third parties, this could include law enforcement, Employee Assistant Program, Mental Health Workers or others.
They evaluate if the person might be a danger to themselves or others, if the person is able to take care of themselves. Eg. Do they pay rent on time, do they buy groceries, are the suicidal, a threat to others, etc. If these criteria are not met, they might try to convince a judge or other health care worker that a mental health hold is required, or some other form of intervention.
Information is recorded and reported 24/7 and often stored in some form of centralized database. The records are crossed referenced with police and other contacts.
Now this procedure was in place well before the fusion centers ever came into existence, however it is not out of the question to assume that fusion centers might well be used in future or linked into this process, even if they were not initially used.
Once a Targeted is listed for monitoring, even if they move away from the university, place of employment, or community, if they are still perceived to be a threat to others the remote monitoring, or case management will continue.
While the case is open the team should:
• Continue to monitor and modify the plan as long as the individual still poses a threat
• Recognize that a person can continue to pose a threat even after he/she ceases to be a Closing a Case member of the campus community
• Continue to monitor the situation through its relationship with local law enforcement agencies and mental health agencies, as well as in direct cooperation with the person, if possible
The Target will be monitored as long as they are perceived as a threat. There is no current limit to how many years the state can continue this monitoring, imposition and disruption of the targets life.
If someone who has been reviewed by the Threat Assessment Team leaves the area, do you continue to monitor him/her?
If the situation warrants reviewing the case after the subject leaves the area, the team will continue to do so. It is important to remember that when the subject has relationships in his/her life, there is a lesser chance for violence to occur. A failure to communicate or interact with a subject encourages problems to fester, which could lead to violence.
Also under many of these occupational health and safety guidelines, the Targets information can and will be shared with those that they are likely to come in contact with.
“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.
The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.
Remember as the case is being monitored, any incidents, perceived threats, strange behaviour, anything at all can be reported to this team for assessment and evaluation. If the team feels that a change in behaviour constitutes a threat the team might upgrade the targets to something along the lines of medium risk, danger to self or others, should only be seen in pairs.
Manage The Situation
The threat assessment team might also add specific quirks of the target to their files, things that the general public might be made aware of, such as if the target starts to pace it could be a sign of imminent attack.
Assessment: Case Priority Levels
PRIORITY 1 (Extreme Risk): Poses clear/immediate threat of violence or self-harm and requires immediate containment, law enforcement involvement, target protection, and case management plan.
PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.
PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.
PRIORITY 4 (Low Risk): Does not pose threat of violence or self-harm at this time, but may exhibit some disruptive behavior and/or need for assistance. Requires passive monitoring. Utilize case management and referrals as appropriate.
PRIORITY 5 (No Identified Risk): Does not pose threat of violence or self-harm nor is there evidence of disruption to community. No case management or monitoring required.
It can be clearly shown that monitoring is indeed a part of the guidelines that these threat assessment teams do follow.
Once the plan is developed, it needs to be
implemented and monitored.
• Team should include implementation and monitoring responsibilities as part of the case management plan.
• Further referrals may be necessary.
• Team should continue to follow up as necessary.
What targets may wish to do in future is redirect F.O.I.A. (Freedom Of Information Act) requests to these agencies.
Targets may also wish to have their lawyers make a cease and desist request to these threat assessment teams in regards to the overly invasive monitoring that is allowed. In future Targeted Individuals might even be able to come together and aim class action lawsuits or individual, and human rights lawsuits at these teams. Slander suits and others might also be suitable.
What would also be nice is to gain some statistics on who is being monitored via these threat assessment teams. Which case files were closed, vs which are still open. How many years does the average case stay open for? Ages, genders, race, how many were whistle-blowers, or belonged to a dissident, extremist, conspiracy or protest group. How many cases ended in suicide? Incarceration? Institutionalization? Homelessness?
These might be things that future Targeted Individuals look into as they seek assistance in stopping the monitoring, surveillance, and life disruptions, and curtailling the abuses that are being experienced under these programs.
With these threat assessment teams it’s extremely important to realize that if the threat assessment team is composed of one group, and they are assigned to make a threat assessment of another group or individual, you might not have fair and balanced assessments, because these teams than do not take into considerations cultural norms, gender, racial, sexual, or other biases that might be present, or underlying within the assessment team. The assessment team is essentially playing judge, jury, and executioner with their assessments of these individuals, thus if courts are required in many cases to use a fair and balanced jury of peers, should Threat Assessment Teams be morally or legally required to do the same in future?

Friday, January 8, 2016

The bus /sick

I'm an old fart so I take the old peoples bus to the grocery store, there is a woman who they are using to perp me, I don't fault her I know whose doing what. Who am I going to complain too, the cops! Hahahahahaaasha. Right, anyway when I get hit through the skull and it goes through my head my whole head turns into a mess, liquid everywhere swelling , face burnt and dry, throat swollen and eyes can't focus,coughing , sneezing and peeing my pants because the loosen your pee valve. Yes they are sickos, Nazi morons.
This for a week I'm in bed , , I emailed a fellow on the bus and he said this woman who the perps are using to perp me was also very ill,she thought she had pneumonia, she didn't I'm sure she was attacked the same way I was. Women haters, like Kat Williams said, "lot of haters out there"why. I don't know. RN , the son in law of the former mayor now deceased informed me via V2K that his father in law started this elderly program this bus I ride on, and because I , they feel, maligned his saintly reputation , by telling everyone what a thug he really was, that I didn't deserve to ride on this bus, when in reality it was Dukakis who started it . I go to the market on wed, same time , I was reading a magazine getting ready to check out, when I got pulsed, I immediately followed it as it was strong I wanted to see who it was, so who is in front of me at the check out blocking my way but Russ Lewis , and on the other side of him quickly walking out , but Rick the dick Nelson. That was visual intimidation that he had already triggered me as a warning not to ride the bus because of his thug wife and dead father in law. I couldn't make this shit up if I tried. Morons Nazis, sickos. I wish the son of a bitch was alive I'd punch that ugly , very ugly man , inside and out , he looked like a horse, in the face.

Thursday, January 7, 2016

7 Jan 16

Here we go again,, woken up at 0400,, the cycle begins,,, sleeps disturbed and if you try to get back to sleep they hit you, and my neck is a mess, they continuously twist it,,, and twist it and twist it and weaken the muscles with pinpoint pulses. The pulse it to turn your head continuously to the left... its fun battling this shit all day. New level of harassment and targeting and torture it makes you want to kill them... but you can't because you will end up in jail... but I still want to kill them,, one day I might get pushed to far and then that will be it,, I will be taken off the street and my mouth closed and that is what the perps want to do... so far so good,,,
I sent 6 coments to regulations. gov for harassment and human experimentation, believe me this is no experiment,,, this is torture.. and one day their names will be judged...bjg.

Wednesday, January 6, 2016

james 6 January 16

Already it is stressful,,, the gremlins at work,,, I was told that James is not wanted in Peabody,,, last summer the son's of Stacia came to clean out her house...she is no longer staying the summer here and for that I am glad,, they decided to keep the house for a summer home,,, for one of her sons..
I introduced myself and asked if I could take some of the stuff they had put out in the yard for disposable, the son told me to take whatever I wanted so I did,,, some dishes,I love them,,, I use the all the time,, and a hose and some other stuff... anyway,,, someone a woman was speaking to them on the other side of the house,,, and she was talking about James,,, she told them he was a thief and I think it was LeGault,,,

 lots of pulsing from their house all the time...The father died,,, he being a staunch Catholic, hating me because I am an Atheist. I think they used his insurance money to build up the house and I think Matt? moved in with wife and child... I think the old lady lives their to.. Anyway I think she was the one who told them about James. So this summer when they come back I will question staccias sons  about it,,, and see what they say,,

James had a fight with his mother,, rather she flipped out on him as is her usual...and he left, to go to Lynn this follows with what I was told,, V2K,, that this person ? Does not want James in Peabody. At all. so they drive him to make him homeless....they have been working on Kelly and Bud,,, He can't keep a job or couldn't because of his drug habit,,, and since he has given that up he can't find a job.

The regulations for human experimentation has come up for reevaluation and I have been sending in several comments.. I don't give a shit what they think,,, I wrote this morning the names of those responsible for this terrorism,,,I also told them the story of Torigian, Eastman Gelatin, Crowningshield et. al. terrorism is targeting and targeting is terrorism..

James is on his way over here to pick up a few dollars to go to Lynn with his dad.

I think Eastman Gelatin gave a sum of money to Torigian so they could build this golf course over this toxic dump,,, upstream from our water supple,, and the bad thing about that is that toxic dumps tend to move...Our water supply is downhill from the dump and years ago there was a cancer cluster in this area.. so now because of all of this,,, I suffer , my family suffers for their corrupt actions.
James was stopped in the cemetery by this kid name of Matt Rosa and Jeff Aulson, i guess Matt was up for manslaughter james  let him frisk him he said he carried a gun, and had murdered someone...

,, who stopped and told him he was working for the feds and started to frisk him, looking for drugs..., james called the cops on him..hes been clean and has a plan to get his life back on track and I am glad to hear it,, the most positive speech he has made, thee is hope yet.
Cherie Rathbun who is related to Chris, Jillians boyfriend was told and his father was told, stories about me , how crazy I was,, she is also responsible for David  Diachisiion success in court as well.so she is her and there with her nasty gossipy tongue,,
when we were friendly, she had a visitor who seemed like he was friends with her, I gave him some money for a task,, and had not heard from him in a while,,,,this was all done through cherie,,, as I said it was quite a while,, not hearing from him,,, so I gave her a sealed letter with his name on it,,, She blatantly  opened it,,,and came out screaming, as I made some comments about jews and how they are money orientated and cheaters and asked him if he was one... She should not of opened the letter , since them our relationship went downhill, so now they the local neighborhood watch group has set their eyes on James,, as revenge to me.