Tuesday, May 13, 2008

For the select few

In the rush of events that have filled the past few weeks' schedule I've found time to review a number of postings to the blog moderator (Me!) that were not ready for prime-time. Some of them contained puerile rants, of course, but I set aside those with specific threats, to examine them more closely. Electronic documents are terrific, but putting them on paper is sometimes useful for purposes of cross-reference and a study that borders on the forensic.

The threatening messages are authored by three to four individuals, but no more than two of them appear to coordinate on any single message. The hierarchy of information access bears this out, and sometimes points to the distribution of authorship between the messages. I can identify targets of the threats in some messages, and have obtained contact information--or at least for a conduit to those people--so they're informed of the nature of the menace.

An additional benefit from this process has been the feedback the targets of these threats have provided, which has proved invaluable in tracing the thought patterns and genesis of many of the messages. Although no fewer than three individuals have been "outed" as Frank Serpico in these messages, I'm actually still "in." Threats against me are especially impotent when "me" is obviously unknown to the aggressors, but I can not discount the threat they pose to people they think are me, or working directly with me. The shotgun approach continues its spread, though, as several other people are named in more than one of the messages, and can be inferred as objects of the wrath in several others. Thus have I made efforts to contact or send word to those named--and implied--as subjects of the threats. These people are not only best able to determine the source of the threats, but also the most effective response to them.

They've told me that the publicity here generated--up to four hundred unique visitors a day--and the "personalized" information I've gathered have provided them with adequate resources. The details regarding what has been retained as official records, what has been subjected to legal audio recording, and what merely witnessed by other employees are not familiar to me. I'll encourage those with whom I've shared correspondence at the email address created for this purpose to share that address with those who need additional information. If they wish, they can pass blind correspondence on to me from others who do not wish to reveal their email address.

Because the victims have informed me that they have sufficient information from my input and their own sources, I'm suspending publication and posting on this blog site. Their next steps in their defense I can not take with them to any cumulative effect, so they'll direct their own actions as they see fit. Knowing your enemy is an important prelude to a successful battle, and several have informed me that they've learned a great deal about the capabilities and willful malevolence of their enemies. Judo's principles of using an opponent's actions to multiply the force you can apply to him are evident here.

I have exposed the rot within the management at EPD, and passed on numerous solutions and tactics suggested by contributors here. As the sci-fi show of a few years ago said, "The truth is out there." That genie can't be put back in the bottle any more than toothpaste can be put back in the tube. Until there is proof that the rot has been excised, the knowledge that it burrows still within the highest level at EPD will remain in the public mind. Those who threaten others they believe involved in exposing their mendacity do their effort no credit and, in fact, may succeed only in pulling the walls down upon their own heads.

No comments: