Suspicious-less Investigations
OK say you are a computer expert hired by a contractor of
the U.S. Gov’t. Your job is to monitor the electronic & digital surveillance
of targets that have graduated to #valuable targets.
You observe that the logic doesn’t stack-up for one U.S. citizen
who is placed in the #valuedtarget category. Other #valedtargets add up as far
as background goes and it’s logical to see how they were first labeled
#suspicious which led to #target which led to #valuedtarget. It ads-up and may
have even thwarted a threat to “overseas contingencies” (not Benghazi & not
the domestic Boston lone wolf incident).
However your monitoring of activities and systems clearly
shows there is no logic or evidence that supports this U.S. citizen to get
labeled #suspicious which led to #target which led to #valuedtarget.
The switch was turned on on this U.S. Citizen however after
a few years of this targeted surveillance and monitoring logic does not support
it.
You may see a pattern with a few others too and then it
becomes more frequent. It is alarming because on principle you know there is no
right reason for this to have occurred & keep occurring.
#Abuse.
Someone, some people, have obviously abused the power.
Created friction & heat where there should have been none.
What do you do?
Do you blow the whistle or just let things go like you don’t
know what’s going on?
Hero?
Or traitor?
(I would say “we report you decide” = however, most of us
our kept in the dark and are not allowed to learn the facts).
Best of the Roses but not rose colored glasses,
#BIGnewEdayMedia