They are used for multiple activities. They are used to probe target subjects to determine their status in various respects, to check in with them, to see what they are up to, their state of mind, their vulnerability, to provide preliminary information about their vulnerability to being accosted if there is a need to take direct action against them. Or they are used for purposes of abduction or other manipulations. Or they are used to seize personal effects (such as important documents or data of some other kind), either to learn about a person's doings or to undo their work by destroying their records and set them back, and to serve as a warning and so on. Any confrontation with a sinister being gives notice something is afoot. This is an effective tool to silence many would-be whistleblowers. These beings are also used for more violent actions: for acts of sabotage, to carry out physical attacks and assassinations of people deemed to be a threat and needing to be eliminated. They are the infamous "men in black" who discourage people spotting extraterrestrial activities from coming forward and creating a stir and most importantly to commandeer any physical evidence that might make their story convincing with promise of its return (which of course does not happen). They also serve as agent provocateurs to stir up trouble by spreading false information, innuendo, rumor, and inject poisonous ideas in people's minds while claiming to have the inside track or specialized knowledge, or personal involvement. And then they may walk away and be untraceable, but the damage has been done because the seeds have been planted and people will begin to think along those lines and perhaps pursue things, and stir up trouble. And in many cases people even find some circumstantial evidence that might be true and then apply the conjecture that was told to them by a seemingly reliable source. Coupling that conjecture with circumstantial evidence creates many false news accounts of wrongdoing and raises levels of suspicion and contributes to human turmoil on multiple levels.
Many informants and would-be whistleblowers are human clones pressed into service as imposters, pretending to be employees or agents of government and military organizations who are "in the know" but have a struggle ongoing in their conscience and wish to unburden themselves. In many cases they will take the name and identity of a real person. But in almost every instance they can go out and about and interact with people in the press, for example, by meeting them on neutral territory to tell their stories. And, never having met before, their targeted subject, to be duped, will have no reason to disbelieve the identity as given, and will not put two and two together, in most cases. This is because, for the most part, it is their information that becomes spread and their identities are protected as confidential sources. There will often be a way to contact them again should that be needed, to bypass a direct inquiry for reasons of "security," through their place of work, for example, or residence, claiming that phones are tapped and they are under office surveillance by security cameras at all times and the only safe contact would be via a special cell phone number, for instance, or a coded email account. And claiming that another face-to-face meeting would be too dangerous, they may state they would not be willing to do so again but only allow this secondary access, ostensibly for security reasons but, in reality, as a way to cover up that they are imposters.
So you can see from these examples, there can be an extremely wide array of uses for such beings. The limitation, of course, is that these are clones and not true humans. But when there is a need to convey certain information it is not hard to program them to be reliable data reporters and to have a series of programmed responses to the many predictable questions their information might trigger. When things are kept within the boundary of being "all business" there would be no need to act like a person and begin to have the usual "small talk" interchange of human-level interplay about family, friends, current events, and so on, that reveal things about a person's makeup and personality, if not deep inner beliefs. Those are areas that would be difficult for the clones to mimic in a highly convincing way when people interact with them for any length of time. But in a setting where the intention is to have a brief encounter for reasons of security and to convey certain specific information, they can pass muster readily and will be highly effective.
They can be used as sexual lures in a "Mata Hari" fashion to entice men into compromising positions, who are then photographed and recorded to provide material for future blackmail purposes to use as a weapon to silence them, intimidate them, and keep them under higher control, and neutralize their effectiveness as opponents, and for assisting with legal and legislative matters opposing interests of the Extraterrestrial Alliance.
Please login or Register to submit your answer