|
Slow Burn to DarknessAnonyme, Wednesday, June 6, 2007 - 21:03
anonymous
Slow Burn to Darkness There is an article on one of the gang-stalker sites that describes a slow, methodical takeover of business in the U.S. (and of other parts of the world). The article describes a syndicate that uses gang stalking crews as the enforcement arm of a crime organization that slowly usurps, over a period of many years, control of most U.S. and foreign business. The description is so elaborate, so very detailed, that the author must indeed be the ex-member of the syndicate that he claims he is, truly deluded, or preparing to be a genuinely spectacular author of crime fiction. The author describes a hierarchy of:
It's at least partially true ... Certainly, anyone who has been the target (literal word) of gang-stalking in this or any other country would agree that criminals control the last tier of the just described hierarchy. Why would they not use this or any other facility to take control of all the businesses and all the money? A few years ago I worked for what I considered to be a company of substantial size, as a computer software contractor. This particular company was (during my contract time) being readied for an IPO, and I suspect that (potentially) hundreds of millions of dollars were about to enrich owner/employees and shareholders. I had already, by this time, become quite familiar with the look of and the tactics used by gang-stalkers, and I was able to discern that the place was over-run with them: I mean wall-to-wall carpeted with them. I couldn't help thinking that the entire IT floor was engaged in a massive espionage effort. The main thrust of the attack seemed to be to do nothing. Day after day, cubicle after cubicle, nothing was accomplished except for the ridiculous machinations of the stalking crews, all hired into the business at rates approaching, or in excess of, six figures. A year later, under mysterious circumstances, the IPO was canceled and the entire company dissolved. The IT department is responsible for maintaining the data lifeblood of a company. The data that underlies the operation of the business is more valuable than even high level managers admit. And the unauthorized access to that data is key to covert takeover plans. Not the hostile takeover bid of years past, but a new, more sinister, behind-the-scenes and below the table takeover wave. The IT positions that I believe I witnessed the usurpation of, were the type of positions that could be described in the aforementioned paragraph as the "Moneybag" positions of the syndicate: relatively high paying "control" positions within the business. After I left the doomed business, I believe that perhaps I had developed eyes and ears for the detection of the same type of activity. Going forward, it seems that every position that I took was cause for me to be gripped by that odd feeling that something was going on, something was not quite right ... |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ceci est un média alternatif de publication ouverte. Le collectif CMAQ, qui gère la validation des contributions sur le Indymedia-Québec, n'endosse aucunement les propos et ne juge pas de la véracité des informations. Ce sont les commentaires des Internautes, comme vous, qui servent à évaluer la qualité de l'information. Nous avons néanmoins une
Politique éditoriale
, qui essentiellement demande que les contributions portent sur une question d'émancipation et ne proviennent pas de médias commerciaux.
|