It is true that when pushed into a corner and having no clue as to what is happening, you tend to search for an answer to your problems in whatever spheres you can. If a person is perfectly sane and there is no history of mental ailments in his family he would be hard put to believe that he is suddenly going crazy without any particular reason what so ever. These would rack their brains to find an answer to the bizarre and unheard of things happening to them. Because electronic harassment is so subtle and unrelenting the sufferer would be the only person in the midst of it. None in his family or friends are directly involved and they would probably think him neurotic if he ever blurts out what is happening to him.
So the responsibility of finding a reason for the torture and finding its perpetrators rests solely with him unless he is able to find some one suffering from the same kind of victimization. There is an internet community of victims and it might be a good idea to get in touch with some of them. But the symptoms and methods of harassment may not be similar in all the cases. As the development in the fields of invasion into the human mind is kept under lock and key and is always vigorously denied of ever existing by the powers that be there are no methods to verify if the torture instruments used are the same in similar cases even. Also there could be disinformation agents acting as sufferers in the internet community for safeguarding the interests of the perpetrators. If equipment developed at a considerable cost can’t be used that would reflect badly on the persons in charge. Misleading information, false claims and misdirection can be expected from these. Internet is not a closed sphere any one can enter it and broadcast their thoughts. They would make use of this opportunity and are likely to pump the internet with a million mega bytes of useless information to confuse you and sap your remaining energy.
Cultivating friendships on the internet could be tricky. And every sites containing information would be closely monitored and watched. Even search engines like the Google is capable of looking into a site and determining its orientation within seconds. You could then imagine the capability of experts in the field of collecting information and the kind of sophisticated tools they may have in their hands. Yet no one can shut down the internet just like that so there is hope of finding useful information and finding genuine people too. Be very wary though.
It is known that at first the perpetrators picked slightly disturbed individuals to practice their technique of harassment. But the recent trend seems to be other wise. Normal healthy individuals with no emotional disturbances are being targeted more and more. Ultimately these instruments are developed for control populations and the mentally disturbed individuals are already out of the game. What these demons without conscience want to do is to control healthy individuals in the society and not it’s out casts. So there is going to be more such incidents of targeting the healthy guy as time goes on.
Finding your concealed opponent is not easy, but one should not leave things at that, for the freedom of humanity is at stake.
2 comments:
Terrorism and Counter Terrorism
We were warned of its public use.
The authors are Russell D. Howard (Colonel USA) and Reid L. Sawyer
> (captain USA) and was written/copywrited in 2003 by McGraw-
> Hill/Dushkin
> and is listed in the Library of Congress with Control Number
> 2002106286
>
> Essentially, the book as quoted as written for this reason by the
> Editor:
> "This superbly researched book reflects the experiences of Colonel
> Russ Howard and Captain Sawyer in teaching security-related courses
> in the Department of Social Sciences at Westpoint. Colonel Howard
> and Captain Sawyer have refined their thinking on th etopic by
their
> experimentation wit the curriculum in these national security
> courses. We suggest that students of national security poity will
> find this book to be a unique combination of well-known and astute
> thinkers who have articulated the current and future policy
> implications of terrorism. The relevant experience ofboth Howard
and
> Sawyer as editors places them in the best postion to "connect the
> dots" of this wide ranging material.".. .......General Bary R.
> McCaffrey
>
> page 543
> Business Versus Terror
>
> Only a new kind of alliance can win the war on terrorism. This
> alliance will not be one between nations nor will it be bounded by a
> treaty. Instead, it will be unconventional, involve millions of
> disparate actors, and be guided by rules that will be constantly
> rewritten. It will be an alliance of a motley army of horizontal
> partnerships, with a nontraditional leadership structure. Its best
> troops will be the regiments of geeks rather than the special
forces
> that struck the first blows against the Taliban in Afghanistan.
These
> pocket-protector brigades live on rations of cold pizza and coffee,
> not MRE's (the military ready to eat). They take orders not from
> generals or admirals but from markets and stockholders.
>
> Th members of this fighting force are scientists and doctors,
> venture capitalists and corporate project managers--the private-
> sector army that is the United States, not-so-secr4et- weapon and
> best hope. These unlikely warriors will provide the software,
> systems and analytical resources that will enable the United States
> to track terrorists. It is they who will develop the sensing
systems
> to detect biological, chemical and cyber threats. And it is they
who
> will perfect the biometric devices, such as retinal scanners or
thumb-
> print readers or facial-recognition technologies, that will be
> critical components of next-generation security systems and that
will
> close the gaps Mohammed Atta and his associates revealed.
>
> The Bush administration and terrorism experts know this group is
> critical. The enormous Pentagon aquisition apparatus has already
> begun to direct funds to new private-sector ventures that can
satisfy
> immediate and longer term tactical and strategic needs. Governor
Tom
> Ridge, director of the Office of Homeland Security, has taken the
> first steps toward institutionalizing the public-private
partnership
> that is absolutely critical to achieving US domestic defense goals.
Thanks C for providing insights into the current US domestic defense strategies and public-privet partnership in the offing in the US. It made me think a bit, thanks man.
Post a Comment