Tuesday, June 18, 2013

Suspicious-less Investigations

Suspicious-less Investigations

OK say you are a computer expert hired by a contractor of the U.S. Gov’t. Your job is to monitor the electronic & digital surveillance of targets that have graduated to #valuable targets.

You observe that the logic doesn’t stack-up for one U.S. citizen who is placed in the #valuedtarget category. Other #valedtargets add up as far as background goes and it’s logical to see how they were first labeled #suspicious which led to #target which led to #valuedtarget. It ads-up and may have even thwarted a threat to “overseas contingencies” (not Benghazi & not the domestic Boston lone wolf incident).

However your monitoring of activities and systems clearly shows there is no logic or evidence that supports this U.S. citizen to get labeled #suspicious which led to #target which led to #valuedtarget.

The switch was turned on on this U.S. Citizen however after a few years of this targeted surveillance and monitoring logic does not support it.

You may see a pattern with a few others too and then it becomes more frequent. It is alarming because on principle you know there is no right reason for this to have occurred & keep occurring.


Someone, some people, have obviously abused the power. Created friction & heat where there should have been none.

What do you do?

Do you blow the whistle or just let things go like you don’t know what’s going on?


Or traitor?

(I would say “we report you decide” = however, most of us our kept in the dark and are not allowed to learn the facts).


Best of the Roses but not rose colored glasses,


No comments: