PDF Printout			      Home




		History of Intentional Misuses of Genetics
		and Modern Bio-Chem-Rad-Technologies


		    May man keep a watchful eye
		    that these crimes against humanity
		    will never reoccur again.














	1) Projects

	2) Political constellation from 1939 on

	3) Enforcement concepts from 1945 on

	4) B-C-G-R-N weapon development from 1945 on

	5) Some US/Clients activities from 1945 - 89

	6) Spreading awareness and reactions from Victgim Associations,
	Private, Independent Defence Leagues
	and a loose coalition of Third World Countries from 1989 - 2001

	7) Some US/Clients/Global activities from 1989 - 2001

	8) Escalation into a clandestine, global dirty war from 9/11 2001 on

	9) Constitutionality 






			   Udo Frentzen		   1999/2020
(Texts originate out of Public Postings at Neuengamme 09 04 99 and 05 09 06)

			PDF Printout		1		Home

					1) Projects

1a) The US
The US CIA investigates from its formation on systematically naturally found venoms and synthesized 
toxins for their incisive effects on the human body, drawing on research in Europe from before WW I - II, 
in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-medical ex-
periments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to press 
ahead with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, groups 
and entire populations. They synthesized in their bio-chem labs new classes of toxins to manipulate 
physiological and psychological functions. Radiation weapons are developed in their physical-bio-chem 
labs to manipulate climate, equipment, psychological and physiological functions.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies 
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-
chem-gen weapons of mass destruction.
1a1) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of 
the central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic 
fields in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical 
processes, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric 
and sexual behavior.
1a2) The genome
Another large scale project researches structures and mechanisms of the human genome in intentional 
misapplication of mutagenic, hybridization and recombinant DNA technologies to cause with incisions 
into the genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up 
the construction of the first 'biological bomb' for peace time employment of gene altering agents in 
graded to blanket mass poisoning of food and water supplies as well as target and mass poisoning of 
home and foreign populations and over regions for control of individual psychological, physiological and 
enetic processes and political-social structures over the sum of all single catalogued, G-pellet prepared 
targets.
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man 
as a product of natural evolution into a progammable cyborg – cloned chimera with special augmented 
capabilities by electro-magnetic-mechanical and bio-chemical-genetic means.
1a3) N-weapons
Developed are N-weapons, utilizing nano-sciences and -technologies for ‘molecular engineering’ in the 
range of 1 to 100 nanometers to enhance analytics, inorganic and organic solid, liquid, gas, plasma ma
terials, miniaturization, performance, safety and handling. Since the 80s, employed are nano-machines 
and placed as programmable nano-robots in body tissue to manipulate their anatomy, morphology, 
physiology and environment and with it the level of functional capabilities.

1b) Russia
Russia developed a B-C-G-R weapon arsenal by its political-military-security-industrial complex starting 
before 1941 and after the war massively scaled up its research, testing and pilot runs in security labs of 
the KGB, chemical industry, colleges, medical dissection chambers of mental institutions, the Gulag and 
on populations at large. Their deployment structure, command centers, production, stockpiles and deliv-
ery systems match those of the NATO forces for overkill deterrence.

1c) Results
Out of the advances in modern bio-chemical sciences, which are comparable to the progresses in phy-
sics in the first half of the 20th century, the criminal intent of the political-military secret policy goals 
and the security agencies’ laboratories has realized with B-C-G-R-N technologies, extending the radius 
of action over space, time and nature as man's vulnerable physiological base, new, devastating dangers 
to man. Threatened to come are spreading planetary catastrophes through contamination of the human 
gene pool with eg miscarriages, malformations and crippledom for hundreds of years and eradication of 
billions of people and the possible self-extinction of mankind.

						2

			2) Political constellation from 1939 on
2a) War Objectives from 1939 - 1945
The political-military efforts of the Allied Forces during WW II were concentrated on their war objectives: 
unconditional surrender of the fascistic Achsenmächte and Japan, border revisions, division of Ger-
many, administration by an Allied Control Council, demilitarization, denazification, democratization and 
reparations. (Teheran Conference 28. 11. - 01. 12. 1943; Jalta Conference 04. - 11. 02. 1945; Potsdam 
Conference 17. 07. - 02. 08. 1945) Military actions were eg cranked up armament research and pro-
duction, securement of supply lines, invasion of Western Europe and a war on multiple fronts.

2b) Nuernberg Trials
2b1) The political-military opponents were fascist governments, which pursued total warfare with propa-
ganda, racist ideology, militarism, non-recognition of international conventions, labor/concentration 
camps, mass murder and genocide.
2b2) The trials (1945-47) gave impulses to international law, addressing the Geneva Conventions, geno-
cide, war crimes, limitations, human rights and established the Nuernberg Principles and Code.

2c) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and 
Russia advanced to superpowers of a new world order over war and peace in possession of atomic 
weapons, the US since 1945, the USSR since 1947. They extended the imperial policies of the 19th 
century for profit and control of geo-political power structures into the 20th and turned their war objectives 
after the capitulation of the fascists to ideological concepts of man, society and progress, ideologocal-
political-social block formation with satellite states, new borders and spheres of influence, free access to 
resources, advantageous international division of labor and terms of trade. WW II lead without a peace 
treaty in a poisoned atmosphere to the Cold War up to 1989. The NATO was founded on 04. 04. 1949 
and the Warsaw Pact on 05. 05. 1955.
The US leadership transformed the political-social character of their country corruptively along secret 
policy goals into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax 
Americana, while formally adhering to a constitutional democracy, human rights and freedoms.

2d) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, propa-
ganda, block formation, arms, space, resources, applications, geo-political-social structures, corruption 
and fornication. Cold War objectives of propaganda and military battlefields spread beyond politics, re-
ligion and culture to all legal-scientific-technological-economic-financial and social fields, especially the 
information technologies and life sciences with anthropology, psychology, sociology, medicine, biology, 
zoology, bio-chemistry, electro-biology, genetics and also ecology and climate. All professional and non-
professional fields were tied into ideological competition and all means allowed except direct employ-
ment of A-weapons.
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with 
overkill ABC weapons and aggressive security R&D programs with technological superiority.

2e) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions, 
foundations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA, 
NSA, FBI, DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the 
National Security Act of 1947 with the CIA, drawing out the power lines for home based global predomi-
nance of all branches of the military with foreign sided dependencies and also global secret policy goals 
to cover all civilian domains by social programming with eg control over larger R&D programs and high 
tech applications, surveillance, false fronts, control of public media, manipulation of individual psycholo-
gical profiles, social structures, processes und beyond of demographic structures of entire populations.
They are authorized by executive order hypocritically under the label 'security', though they realize a 
clandestine revolution in violation against the consent of the governed, constitutional standards and 
international conventions: Looming charges against the responsible parties of this despotic perversion 
are eg massive human rights violations, seditious conspiracy and treason.

						3

				3) Enforcement concepts from 1945 on

Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite 
states and are carried by infiltration over to the clients of ideologically opposite camps.

3a) Security planning receives priority over general national and international interests of the Community 
of Nations. The security apparatus is justified by public relation campaigns, lobbying contacts, institution-
alized relations and supportive diplomatic networks like transatlantic and -pacific partnerships for con-
tinuous collaborative co-ordination of interests.

3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only 
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, - 
not the mobilization of the masses for political-social action.
The traditional goals of military forces to successfully invade a foreign country and of intelligence ser-
vices to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and 
1963 in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without 
alternative.
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy 
goals, operations, methods, installations, equipment, data banks and image.
A global communication/surveillance system with satellites, ground receiver stations, interception of data 
high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with 
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitu-
tional framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media', 
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Elimination of dissent
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total 
secrecy and unaccountability, their political agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting 
out from public opinion any ideologically non-acceptable statements. An intelligence review panel has 
power over life and death.

3c) Technologies are seen as the 'key to power' in the 21st/22nd centuries.
They are the practical tools of the operational arms. US/NATO research panels of the military and se-
curity agencies like at the Defence Advanced Research Projects (DARP) develop the arsenal of compact 
weapon architectures over the spectrum of conflicts out of an array of large scale research, development, 
test and employment programs, which are offered, awarded, tested, set up for operation, departmen-
severer, more direct and precise, be more effectively guided and shielded than foregone ones and to ex-
haust human-material, scientific-technological capabilities in space, air, at sea, land from single to large 
scale, non-lethal to lethal, intercepting to retaliating tools and in cyberspace from data scanning to mis-
informing to infrastructure crippling hacks, mainly in misuses of physics, chemistry, biology, genetics, 
medicine and computer science. They corrupt as totalitarian tools in first line human living environments, 
where it cannot be perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of 
research, testing and employment with command centers and a system of labor camps. Developed are 
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like con-
taminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radiation 
and neurologically coded misinformation.

						4

		  4) B-C-G-R-N weapon development from 1945 on

B-C-G-R-N weapon development in the US and Russia are conducted as highly classified operations, 
especially life tests on selected targets.

4a) Tests
Test series on R guns and bio-chem-genetic toxins are conducted in the security agencies’ laboratories 
and training areas by modeling, simulation, war games and also for combat exposure in life tests to col-
lect representative samples from populations at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed 
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psy-
chologic latent, present and long term effects over a wide spectrum, eg affected tissue and function, de-
gree of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining factors, 
counter-poisons, recuperation times, measurability, visibility and traceability.
The data are sent directly from the target via microchip sensor, emitter, amplifier and satellite to the high 
capacity computers at the agency’s command center for evaluation by the R&D team.

4b) Worth analysis
Active warfare agents undergo a comprehensive military worth analysis according to present and desired 
performance standards in their eg bio-chemical-genetic components, production, safety precautions, 
handling, training, weapon concept, equipment, infrastructure, cover, costs, target vulnerability, opera-
tional engagement, mission accomplishment and plausible deniability. Employment ready weapon sys-
tems are handed over to the operative command structure of the armed forces.

4c) Legal situation
4c1) The Common Rule, safeguarding against experimenting on the public without its consent in the US, 
allows for non-consensual experimentation by intelligence agencies.
US DoD Directive 5240 1.R saved 882013, Ch 4, Procedure 13 says: 'Experimentation is allowed on hu-
man subjects for intelligence purposes.'
4c2) The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
4c3) Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce 
them. Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences hu-
man, population, pharma, behavior genetics and gene technology. They serve life and not in inversion of 
human dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed weapons 
always lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
The civilized world; customary international law; The Hague Land Warfare Convention (The Hague 
1899); the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacteriological 
Methods of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention (UN Ge-
neva 1972) and The Chemical Weapons Convention (UN Geneva 1992) outlaw their development, pro-
duction, stockpiling as a means of warfare and call for their disarmament.

4d) Public investigations
Public investigations revealed some past pseudo-medical experimentation at eg the San Antonio AFB 
TX, the Army Special Forces Center NC, the Los Alamos National Laboratory NM and private institutions 
in successive sub-projects of MK Ultra, but the operations have then been farmed out for deeper cover 
because of sensitivity to public resistance and not to implicate the security services directly.
The CIA siphoned off funds from defrauding the government, collaboration with criminal organizations, 
weapon trading, security contractors, proprietaries, recycling of radioactive materials, market manipula-
tions, economic data trading and extortion.

4e) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diag-
nosis. Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned 
down for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are 
to recover and in all cases the death certificate claims an apparently natural cause of death.

						5

		  5) Some US/Clients activities 1945 - 1989

5a) Labor camps
A system of labor camps is operated globally and expanded continually.
Camp guards are employed as spot, select, walk by, tag, decoy, stalk, harass and hit teams.
5a1) By the late 50s, set up were high tech command centers like the Special Operational Command 
(SOC). They are located within security bases and supervise a satellite communication/surveillance 
system, research, testing, production, procurement, deployment and employment of B-C-G-R-N micro-
weapons, the toxins, set off systems, equipment, training of special forces and agents.
5a2) By the early 80s, security research and industry supported, systematic, area covering employment 
of non-genetic, electro-magnetic-bio-chem toxins manipulates the psychologic-social profiles of more 
than a hundred million people of all groups of society a year worldwide.
5a3) The Global System of Labor Camps comprises
 ◦ Surveillance camps: spies record for information control the data flow in its entirety worldwide.
 ◦ Deception camps: multi media presents a Potemkin village.
 ◦ Extermination camps: executioners eliminate more than one thousand people a year.
 ◦ Gas chambers: hit teams spray with nerve gases thousands of people a year.
 ◦ Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
 ◦ Harassment camps: Intelligence trainees strike down on millions of people a year.
 ◦ Sadism and sodomy camps: hit teams execute a billion druggings a year.
 ◦ Behavior manipulation camps: hit teams mass drug millions of people a year.
 ◦ Client camps: agents commit gross human rights violations around the world.
 ◦ Dissection camps: hit teams test new toxins on millions of people a year.
 ◦ Genetic camps: hit teams test genetic toxins on thousands of people a year.
 ◦ Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge them-
   selves for bestialities of the Super Powers.

5b) Some special operations
5b1) US military-intelligence stay behind forces in occupied territories of Germany after WW II (1945) 
have systematically targeted anti US/Cold War - pro disarmament activists.

5b2) The FBI, responsible for counter-intelligence, established under J. Edgar Hoover in the 50s with the 
Project Cointelpro (COunter INTELligence PROgram) surveillance, infiltration and disruption of activist 
groups and organizations, deemed to be government critical and possibly foreign influenced. To forestall 
mass movements of progressive groups as for civil rights, disarmament, environment and immigrants, 
they employ in the gist of the McCarty area (1950 - 54) psychological warfare like intimidation and 
extralegal force like fabricated charges, false arrests, suicide blackmail, drugging and assassination.

5b3) The US, Britain and France conducted with their atmospheric nuclear test programs 1945 - 62 life 
tests for fall out studies until the Limited Test Ban Treaty (LTBT) from 1963.

5b4) France and Israel developed their nerve gas agents with test series on FLN and Palestinian 
freedom fighters, taken prisoners, - none survived, and their ashes were scattered over the deserts.

5b5) The Manson family founded 1968 a hippy community near Los Angeles with up to 100 members. 
Out of racial ideology and CIA ties members were psychologically, physically and by drugs enslaved and 
in 1969 programmed in their behavior up to the point to commit a series of murders.

5b6) Major Assassinations
 ◦ Marilyn Monroe died on Aug 5th 1962 by administered drugs by people close to J. F. Kennedy.
 ◦ J. F. Kennedy was shot on Nov 22nd 1963 in Dallas TX to forestall an internal CIA clean up.
 ◦ Dr. Martin Luther King was shot on Apr 4th 1968 in Memphis TN to break the civil rights movement.

						6


5b7) Coups d'état
 ◦ The CIA/MI5 coup in Iran 1953 against Mohammad Mossaddegh reinstalled the Shah.
 ◦ The CIA/MI5 coup in Iraq 1963 against Abd al-Karim Qasim supported the Ba'ath Party.
 ◦ The CIA coup in Chile 1973 against Salvador Allende set A. Pinochet with a military junta in power.

5b8) Vietnam War 1955 - 75
   b8,1) US military-intelligence forces employed in detention and interrogation B-C-R weapons.
   b8,2) The chemical defoliation program from 1961 - 75 employed among others Agent Orange with 
   highly noxious traces of dioxin from its manufacture at Dow Chemicals to cause dioxin poisoning of 
   more than 4 million victims.
   b8,3) The Phoenix Program, succeeding similar efforts, was conceived by the White House in 1965, 
   supported by the CIA, DoD and US Military Assistance Command Vietnam (MACV) with intelligence 
   liaison officers, Green Beret and Navy Seal troops in operation. As a terror campaign against the ci-
   vilian population it was to infiltrate and break the Viet Cong infrastructure of VC sympathizers. With 
   over 3o ooo recruited informers it eliminated by democide over 1 5oo people a month, over 4o ooo to 
   the end of the war.

5b9) Public investigations
In wake of the Vietnam War followed a series of news paper leaks and investigative commissions like the 
 Church and Pike Committees (1975), giving evidence about illegal surveillance, torture, pseudo-medical 
experiments and assassination attempts of foreign heads of state by the CIA, FBI and NSA.

5b10) Star Wars
   b10,1) The Strategic Defence Initiative (SDI) of 1983 was to set up an effective shied against inter-
   continental ballistic missiles by space based radiation weapons and anti-rocket rockets. In 2002 it was 
   consolidated in the National Missile Defence Project.
   b10,2) This initiative has been undertaken against the UN Outer Space Treaty from 1967, banning the 
   placing of weapons of mass destruction in outer space as a basis for international space law. It is 
   ratified by the mayor powers and 107 countries are full party to the treaty.

5b11) End of the Cold War
In autumn of 1989 the Berlin Wall fell, the USSR broke up und reunification of Germany followed. The 
methods of the Cold War appeared to have been 'justified'.



















						7

		6) Spreading awareness and reactions from 
		Victim Associations, Private, Independent Defence Leagues
		and a loose coalition of Third World Countries from 1989 - 2001

6a) Spreading awareness 
6a1) Spreading awareness within the Administration
In December 1989 the Bush I Administration (1989-93), the President, National Security Council and 
Justice Department gained detailed knowledge of some 'black projects' of B-C-G micro-weapons with 
their secret policy goals, research, testing, organization, employment and massive CIA/FBI human rights 
violations against entire population groups. In February 1990 the US Senate Intelligence Committee ob-
tained a corresponding report. Some information circulated through several administrative departments.
6a2) Spreading awareness in the public
Throughout the general public at home and abroad the knowledge about human rights violations by 
government, industry and private agencies' security personnel with the most advanced micro-weapon 
technologies started to spread slowly and usually point like. The new threats were mostly not fully re-
alized with their incisive consequences, by demonization of critics defended, in cynicism belittled, with 
mock arguments diffused, in apparently safe distance by-passed or with round about bestiality outdone, 
but mostly passed on by word of mouth, mail and electronic media like phone, fax and internet. Some 
private investigations determined by clinical tests some toxins, side effects, counter-toxins, therapies and 
protective measures. Active hit teams, schreibtischtäter, scientists, technicians, their allotted tasks and 
employed equipment have been recorded and in parts stored on private, digital data banks.

6b) Initial reactions
Spreading knowledge and politicization of covered B-C-G-R micro-weapon operations generated new 
political-military-intelligence-social-cultural forces around the world. Most visibly, power ambitions and 
security interests of all global players and professional fields stepwise duplicate, proliferate and intensify 
the employment of micro-weapons to feed a spiral of hate and bestiality, a clandestine, global dirty B-C-
G-R war between all fractions and new emerging groups and a fornication race for predominance in their 
technologies, production and employment for control over population groups with their structures and 
processes.

6c) Victim associations
Several victim associations and self-help groups, calling themselves targeted individuals (TIs), organize 
themselves in alternate media, mostly the WorldWideWeb, conduct information campaigns about live 
tests of military-intelligence B-C-G-R-N research projects, writing to eg government offices, legislatures, 
non-government organizations (NGO), medical associations, the press, handing in petitions and law suits 
at the responsible government offices for violations of rights to life, security, health and liberty by delib-
erate assault on non-combatants. There they are altogether ignored, turned down, send to psychiatric 
treatment, put under surveillance, infiltrated, instrumentalized as false fronts, shown off as warning ex-
amples and neutralized in labor camps. They are hardly supported by established caritas organizations.

6d) Defence leagues
Private, independent defence leagues spring up mostly as smaller parties out of individual security con-
cerns, organize themselves for collective protection and are, driven by spreading awareness of micro- 
weapon operations, continuously multiplying beyond several thousand groups worldwide. They investi-
gate parallel to the Third World Countries the security-intelligence services first of their local region, 
then successively of their home country and neighboring states.
Most defence leagues pretend to clean up the misuses of modern B-C-G-R technologies and to protect 
the general population. However, their operational interests unfold like those of the Third World Countries 
into information, protection, predominance, counter-leverage, total secrecy, revenge and indignation. 
They arm themselves with communication/surveillance systems, stolen equipment, plundered stockpiles, 
intercepted supplies, copied operational know-how and recruit their own undercover hit teams.
In all, they copy the Major Powers’ system of labor camps.

						8


6e1) Coalition
The majority of the medium and larger Third World Countries formed a loose coalition for information 
sharing and initiated, supported by Russia, in depth investigations of the intelligence agencies of the 
Western Atomic Powers and NATO, Japan, Germany, Israel and eg Saudi Arabia, especially their de-
velopment of compact weapon architectures and employment against dissidents and entire population 
groups. Their political goals branch out widely:
 ◦ Information about the developmental status of B-C-G-R-N micro-weapon systems.
 ◦ Protection against threats from B-C-G-R-N micro-weapons.
 ◦ Predominance in B-C-G-R-N micro-weapons with global employment.
 ◦ Political-military-social counter-leverage against the Western Powers.
 ◦ Suppression of any attempt towards publication of undercover operations.
 ◦ Revenge for torture, murder and 500 years of dehumanizing treatment.
 ◦ Indignation to lay waste depraved political-social leadership.
6e2) Counter actions
The Third World Countries retreated one by one from their initially pledged support for public, reliable 
international safeguards against misuses of modern B-C-G-R-N technologies to protect the dignity of 
man, right to life, basic freedoms and a community of nations, free of war. Suggested was the enactment 
of special legislation to ban the development, possession and use of devices, which can manipulate the 
human nervous system and of toxins, which can manipulate the human genome, excepting analogous in 
concept to the abortion indication rule some diagnosis methods, prostheses, production of medication 
and therapies with informed consent. - Instead they caved in to the policy of total secrecy for undercover 
security operations.
They increasingly counter-attacked US Military/CIA/FBI and German BND/MAD/AVS personnel to con-
tain their massive nerve gas and drugging operations in the US and Europe and soon scaled them up, 
copying the Major Powers’ labor camps, against hostile agents worldwide.

6f) Minority position
Only a diminishing minority fraction realizes the extreme vulnerability of human nature to transgressions 
of boundaries that will inevitably lead to planetary catastrophes. They appeal to the human spirit of the 
times to initiate the long winding procedures of the mills of justice with a public investigation, prosecution, 
sentencing and legal safeguarding measures to stop the killing by
 ◦ An information campaign about possible misuses of positions of power.
 ◦ An information campaign about the nature and consequences of B-C-G-R-N misuses.
 ◦ A public investigation into past and present B-C-G-R-N misuses.
 ◦ Supplementation of international conventions.
 ◦ International supervision over positions of power.
 ◦ Empowering of national-international law enforcement.
 ◦ An international disarmament operation.
 ◦ Reestablishment of national constitutionality.
 ◦ Recompensation for injuries and damages.












						9

		7) Some US/Clients/Global activities 1989 - 2001

7a) Positions by the Bush I and Clinton Administrations
7a1) The Bush I Administration, in line with hegemonic policies and a powerful lobby of the Security 
Community, continued on executive order R&D projects with bi-chem-genetic toxins. US CIA, Military 
and NATO laboratories stepped up their research of recombinant DNA technologies with the goal to 
modernize the present state of the art of behavior programming, attacking causes and not only sym-
ptoms by stable, sustainable transferal of modelled genetic strains to succeeding generations and also 
to improve its economy by centralized supervision of a lean network of undercover operatives.
7a2) Surveillance of groups, regarded as dissidents, was tightened. All security matters in public discus-
sion are to be defused by plausible denial and then with all their fibers removed from public awareness.
7a3) In March 1990, some in the Republican leadership pressed the Democrats to drop the matter and to 
hide CIA/FBI micro-weapon misuses to their full extent. The Office of the President contacted several na-
tional papers to intercede with publication of any of these CIA/FBI misuses.
7a4) After the election in November 1992, B. Clinton continued his predecessor's policy of total secrecy.
In line fell M. Thatcher of Great Britain, F. Mitterand of France, H. Kohl of Germany and ilater also 
J. Mayor of Great Britain.
7a5) In January 1998 W. Renquist of the US Supreme Court took the part to suppress any legal evidence 
of undercover security operations within the federal, state and local US justice system.
7a6) The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
7a7) In March 1999 B. Clinton, having just survived impeachment procedures in Congress, declared pub-
lication of these crimes to be the world's No 1 terror threat. He started a billion dollar program to tighten 
up all major US institutions against counter-attacks and to insure their support.

7b) Activities oversees
7b1) In May 1993 B. Jelzin of Russia condoned the Western Atomic Powers’ policy of total secrecy. He 
employed B-C-R weapons by way of his own security services systematically under cover.
7b2) Early 1994 some of German industry reinforce BND/AVS nerve gas attacks with industrial toxins.
7b3) In August 1994 the Government of Israel reaffirmed its support for Mossad operations, employing 
nerve gases and bio-chemical drugs.
7b4) In fall 1994 the Holy See in Rome yielded to bribery and extortion to drop opposition to human rights 
violations by the Western Powers’ intelligence operations.
7b5) In early 1996 the leaders of the Governments of the US, Great Britain, France, Germany and 
Russia reaffirmed their decision to contain the further spreading awareness of their massive human 
rights violations by any means, including assassination.
7b6) On 11 28 1996 the European Commission of Human Rights turned down a suit against CIA/BND 
mass nerve gas and drugging operations, violating the European Charter’s Art 2,1 Right to Life; Art 3 
Degrading Treatment; Art 5,1 Freedom and Security; and Art 8,1 Privacy (Application No 33445/96).
7b7) In May 1997 T. Blair of Great Britain continued the policy of total secrecy.
7b8) Since then NATO military security employs measurement of brain wave patterns area covering 
across countries in their early warning system against security threats.
7b9) In May 1998 the Government of Japan pledged its support to the Western Atomic Powers to assist 
in the enforcement of total secrecy.
7b10) In July 1998 NATO military security services became broad based active to suppress the spread-
ing awareness of micro-weapon operations.
7b11) In October 1998 on initiative of G. Schröder of Germany, predominant forces of German and US 
Industries reinforced total secrecy with their own security organizations.
7b12) Also in fall 1998 the Russian Military agreed to execute assassinations on contract.
7b13) In January 1999, the European Parliament passed resolution Eg A4-0005/99 EP, calling for disar-
mament of A-weapons, destruction of B-C stockpiles and an international convention to ban all weapons, 
which might enable any form of manipulation of human beings.
7b14) Dismissed were two law suits against illegal BND activities: Staatsanwaltschaft Bonn, 09 13 2000 
(AZ 50 Js 898/00); European Court of Human Rights, Strasbourg 07 16 2002 (Application Nr. 6456/02).

						10

		8) Escalation into a clandestine, global dirty war from 9/11 2001 on

8a) Driving forces
8a1) Power
The Global Players of the Industrialized Nations, the majority of the Private, Independent Defence 
Leagues and the medium and larger Third World Countries act out of lower power instinct, the most de-
vastating archaic notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despo-
tic perversion social values, constitutional structures and processes. They are not capable to fill human 
dignity with content, but oscillate without a base between the poles of illusion and bestiality.
Out of one negative motive, misuse of power, they have escalated mass human rights violations with B-
C-G-R-N compact weapon systems in all areas of life along the states of investigation, subversion, cor-
ruption, fornication, stirring up of hate and incitement to bestialities under cover of image fascism into 
a clandestine, global dirty war, fraction against fraction, interlocked in a fornication race for 1st place.
Justification of hegemonic policies by an ideology of competing social systems and instigated terrorism 
gives evidence of incomprehension of God and responsibility, nature and reason, man and maturity, 
society and ethics. Perversion of God given institutions are crimes against humanity and the creation.
8a2) Security concerns
Private individuals are left standing without legal defence against arbitrary assassination, nerve gas at-
tack, toxic drug attack, radiation attack or any illegal listening or video device. In a global system of 
labor camps millions of people are being manipulated out of their lives each year.
However, the Predominant Powers, Defence Leagues and Third World Coalition rely blindly for their per-
sonal and collective security on gapless information control, electronic shielding and deterrence by bes-
tial retaliation and can maintain the apparently calm political surface of image fascism with pretended 
ethical political-social standards only by all round escalating repressions, which chase themselves in ex-
cesses of hate and violence.
8a3) Crime
Worldwide spreading awareness of clandestine operations with B-C-R-G micro-weapons without being 
subject to legal prosecution has opened up opportunities for illegal activities across the board. Infor-
mation skimming has become an integrate technical part of organized crime. The issues of micro-
weapons, their technologies, precise employment, protection against, use in extortion and as revenge 
have been passed around through underground scenes worldwide.
8a4) Terror
Worldwide spreading awareness of the Western Atomic Powers' open and covered hegemonic policies 
with gross inequities, their clandestine operations with B-C-R-G micro-weapons with massive torture also 
against population groups at large induced an increasing series of terrorist attacks by militant groups 
mostly against soft targets of the US and their Allies, eg:
Jul 1996 Lockerbee
Aug 1998 Kenia
Sep 1998 Kairo
Sep 2003 Beslan
Nov 2003 Istanbul
Mar 2004 Madrid
Apr 2004 Saudi Arabia
The series of terrorist attacks continues, but gradually decreasing, as more and more militant groups arm 
themselves with micro-weapon systems to pursue their political causes. Increasing are sexual offences 
and killings, amok runs and unexplained deaths like of J. Möllemann in 2003, due to an B-C-G-R attack.
8a5) Anti-terror war
On September 11th 2001 the Twin Towers in NYC and the Pentagon in Washington DC were attacked by 
al-Qaida terrorists, hijacking civilian passenger jets on routine flights to steer them into the buildings.
The attacks were intentionally allowed to proceed by the Bush II Administration's Security Planning 
Group as a fabricated political event to extend belligerent global hegemonic policies beyond the Cold 
War into a war against terrorists and their possession of weapons of mass destruction.

						11


8b) Escalation by US/Clients
8b1) Die Busch II Administration (2001-2005) mit ihren Verbündeten und NATO erklärten den Krieg gegen den 
internationalen Terrorismus und die Kontrolle von Terroristen über Massenvernichtungswaffen. Im Kongress 
wurde der US Patriot Act am 25. 10. 2001 verabschiedet, dem der US Freedom Act am 01.07. 2015 folgte und 
den Ermittlungsbehörden erweiterte Rechte auf Kosten bürgerlicher Freiheiten geben. Die nachrichtendienst-
lichen, militärischen und administrativen Antiterrorkräfte wurden reorganisiert. Um ihren 'Limes' gegen Import 
von Instabilität, Bürgerkrieg, Krieg und Terrorismus zu festigen und das al-Qaida Terrornetzwerk zu zerschla-
gen, schmiedete sie eine globale politische Allianz mit UN Mandat, fiel von US Truppen geführt im Nov 2001 in 
Afghanistan ein und besiegten das Taliban Regime. Um die mörderische Diktatur S. Husseins zu stürzen, fielen 
US Truppen ohne UN Mandat, aber mit Unterstützung von Groß Britannien, Türkei, Spanien und Polen im März 
2003 im Irak ein, das das Land in einen Bürgerkrieg mit täglich Toten durch irakische Widerstandskämpfer und 
militante Gruppen stürzte.
8b2) Die Bush II und III Administrationen (2001-2009) und ihren Verbündeten heizten die Propaganda gegen 
den internationalen Terrorismus an, seine Ideologien, Gefahren und Untergrundaktivitäten. Angesprochen 
wurde meistens das unterste emotionale Niveau nach dem Motto: 'Patriotische Verbrechen in Verteidigung 
der Freiheit sind keine Schande'. 
8b3) Sie verstärkten ihr globales System der Arbeitslager als ‘Limes‘ gegen ’soziale Unterwanderung‘. Sie ver-
besserten die totale Informationskontrolle; Einbruchs-, Korruptions-, Sabotage-, Vergiftungs- und Mordtech-
niken; internationale Zusammenarbeit mit verbündeten Sicherheitsorganisationen; Abschirmung von staatlichen 
und privaten Institutionen gegen Gegenangriffe; Rekrutierung von Einsatzkräften durch Beschattung, Korrup-
tion, Erpressung und Eingliederung in ein Agentennetzwerk, um alle Lebensbereiche der Gesellschaft von den
Kirchen, Hilfsorganisationen, Künsten, Medizin-, Wirtschafts-, Finanzinstitutionen bis zur Justiz einzubinden. 
Sie bauten auch mehrere ausgelagerte, Auftrag gebundene, aber formal unabhängige Identifizierungs-, Über-
wachungs- und Einsatzgruppen unter dem Anschein auf, verdeckte Terroroperationen auszuräumen.
Friedliche Proteste werden mit sodomitischer Bestialität zerschlagen wie zB G. Schröder von Deutschland 
seinen Amtssitz in Bonn wie mit SS-Methoden mit Nervengas- und Giftkugeltrupps absicherte.
8b4) Militärisch-geheimdienstlich-private F&E Anstrengungen treiben das Projekt einer von 'Menschenhand ge-
steuerten Evolution' voran, um den Menschen als Produkt der natürlichen Evolution durch eine klonbare, pro-
grammierbare Cyborg-Chimäre mit gesteigerten Fähigkeiten durch elektro-magnetisch-mechanische und bio-
chemisch-genetische Mittel zu ersetzen.
8b5) Entwickelt werden N-Waffen, die Nano-Wissenschaften und -technologien zur ‘Molekülkonstruktion‘ im Be-
reich von 1 – 100 Nanometern einsetzen, um Analyse, anorganische und organische feste, flüssige, gas- und 
plasmaförmige Materialien, Miniaturisierung, Leistung, Sicherheit und Handhabung zu verbessern.
Seit den 80ern werden Nano-Maschinen eingesetzt und als programmierbare Nano-Roboter im Körpergewebe 
platziert, um deren Anatomie, Morphologie, Physiologie und Umfeld und damit das Niveau funktionaler Fähig-
keiten zu manipulieren.
8b6) In 2012 erhielt die EU als langjährige Zone des Friedens, Stabilität, Toleranz und Wohlstandes den Frie-
densnobelpreis.
8b7) Gegensteuernde Maßnahmen
 ◦ In 2001, 2002 und 2005 brachte Kongressabgeordneter D. J. Kuchinich das Weltraumschutzgesetz zur 
   Lesung, das die Stationierung von Waffen im Weltraum verbietet und an die House Science, Armed Services 
   und International Affairs Committees weitergeleitet wurde, aber ohne das weitere Aktionen folgten. 
   Aufgelistet wurden
   - Elektronische, psychotronische oder Informationswaffen.
   - Chemtrails.
   - In höherer Atmosphäre stationierte, extrem niederfrequente Waffensysteme.
   - Plasma, elektro-magnetische, akustische oder Ultraschallwaffen.
   - Laser Waffensysteme.
   - Strategische, theater und taktische nicht-erdgebundene Waffen.
   - Chemische, biologische, ökologische, klimatische oder tektonische Waffen.
 ◦ In 2002 stieß das Internationale Komitee des Roten Kreuzes das Thema Gerichtete Energiewaffen auf dem 
   Genfer Forum an, auch 2009 auf dem 5. Europäischen Symposium für nicht-tötende Waffen und wieder auf 
   seiner Europäischen Konferenz.
 ◦ Seit 2002 publiziert Korruptionsaufdecker J. Assange via WikiLeaks gehackte Regierungsdokumente, die 
   Rechtsverletzungen auf Grund von politischen Richtlinien und konkreten Handlungen aufzeigen.
 ◦ Im Mai und August 2011 verübte die Gruppe Individuals Tending to Savagery (ITS) Anschläge gegen 
   Wissenschaftler an dem Instituto Politécnico Nacioni und Instituto Technólogico y de Estudios Superiores de 
   Monterri in Mexiko, um die Nano-Forschung mit ihren unkontrollierten Gefahren für das Leben auf der Erde 
   zu blockieren.
 ◦ Seit 2013 veröffentlicht Korruptionsaufdecker E. Snowden via Zuspielungen an die Presse interne NSA Doku-
   mente, die ihre globalen Überwachungsaktivitäten belegen.

						12


8c) Escalation by Private, Independent Defence Leagues
The Private, Independent Defence Leagues continue their investigations, starting out from households, 
workplaces, public institutions and the electronic equipment of their local area and widen them out to 
cover the Major Powers' military and intelligence activities in their region and neighboring states.
Most victims’ reactions lead to self-imprisoning, deeply burnt in abhorrence and hate.
8c1) Their political intentions remain spread out widely: information, protection, predominance, counter-
leverage, total secrecy, revenge and indignation.
8c2) They strive for local and regional predominance in B-C-G-R-N micro-weapons and not for inter-
nationally guaranteed safeguards, multiplying the new, devastating dangers for mankind.
8c3) They are growing beyond several thousand groups worldwide, recruiting themselves via under-
ground channels out of various population groups
 ◦ Close to crime, to secure their illegal operations.
 ◦ Close to communication/surveillance systems, following undercover operations.
 ◦ Close to security systems, following advanced security technologies.
 ◦ Victims, their relatives and friends, to defend and revenge themselves.
 ◦ Threatened citizens, to defend themselves out of private security concerns.
 ◦ Upset citizens, to vent their indignation over depraved political-social leadership.
 ◦ Cynical citizens, to profiteer from private security concerns.
 ◦ Hypocritical citizens, to make victims under false flag illusionary hopes.
 ◦ Engaged citizens, who want to stop the killing.
8c4) They ally and organize themselves in global information sharing and collaborating networks. They 
set up several defensive lines, farm out operative tasks and go for deeper cover in far away places to 
erase tracks. They draw under pretense of security all professional fields, societal institutions and the 
entire population into complicit, sodomitic roped parties. Undercover operations have multiplied them-
selves into a peoples' movement and become with their perversions, excesses, security circus, costs 
and dangers in a highly technological environment a political-social topic in all circles of society.
8c5) They expand their local, regional and also global undercover micro-weapon operations.
 ◦ Formally they tolerate the security agencies’ secret policy goals, enforcement concepts, deployment 
   structures, weapon development, financing, political propaganda and most undercover operations.
 ◦ They set up their own command centers, communication/surveillance systems, steal equipment, plun-
   der stockpiles, intercept supplies, copy operational know-how and recruit their own hit teams.
 ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
 ◦ They suppress any attempt towards publication of their B-C-G-R undercover operations.
 ◦ They often attack with government and foreign agencies any hostile person or group.
 ◦ They hypocritically pretend to clean up the misuses of modern bio-technologies, however
   They lie about life and creation, procreation and causes of procreation, death and causes of death, 
   constitutionality and human rights, perverting faith, reason, maturity and ethics.
   They do not pass on objective political education to the general public.
   They do not inform the general public about possible misuses of power.
   They do not exercise constitutional oversight over positions of power by the people.
   They do not activate the public authorities against human rights violations of mass rape and murder.
   They do not help a single victim with advice, a doctor or a lawyer.
 ◦ They strive for breakthroughs in fornication, their executioners way laying in first line advocates of pub-
   lication, prosecution and public trial of the perpetrators according to penal law to sodomize them to 	
   death by first shooting in bio-chem-gen-electro-magnetic-thermal-acoustic microchip sensors and ra-
   dio emitters, then pumping in depot poison pellets, then crippling their inner freedoms of thought and 
   movement, last breaking their physical strength, - all under the perversity label of direct help with 
   medication or emergency medical care for the victims.




						13


8d) Escalation by Third World Countries
The governments of the Third World Countries continue their investigations into the Major Powers' and 
Clients' military and intelligence activities and widen them out to screen all their political-social forces, 
decision making elites, public and secret policy goals, social structures and processes, resources, 
government and private security personnel and area covering single households.
They penetrated electronically most political-military-intelligence high security areas and often leaked 
show off successes into open channels.
Also, with ongoing investigations they are again and again fed with disgust. Behind the image fascism of 
the Industrialized Nations yawns a social fabric without credibility, without any basic values of life and es-
pecially truth in its generation, management and leadership role.
8d1) Their political intentions remain spread out widely: information, protection, predominance, counter-
leverage, total secrecy, revenge and indignation.
8d2) At home they screen all foreign past and present intelligence activities in all areas of their countries' 
life from covered operations to environmental damages. They rolled back and protect themselves against 
further foreign subversion and corruption, also cutting off the fuel for up to then hardly heeded fornication 
as cultural and economic weapon, degrading social fabrics by internally bleeding wounds.
8d,3) They strive in a loose coalition with exchange of data and alignment of interests for global predo-
minance in B-C-G-R-N micro-weapons and not for internationally guaranteed safeguards, multiplying 
the new, devastating dangers for mankind.
8d4) They expand their global undercover micro-weapon operations.
 ◦ Formally they tolerate foreign hostile secret policy goals, enforcement concepts, deployment struc-
   tures, weapon development, financing, political propaganda and most undercover operations.
 ◦ They expand their own military-intelligence infrastructure, often drawing on scientific, technological, lo-
   gistic and data support from Russia.
 ◦ They expand their own global system of labor camps with a network of affiliated groups.
 ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
 ◦ They suppress any attempt towards publication of their B-C-G-R undercover operations.
 ◦ They incapacitate foreign communication/delivery systems, equipment and toxin stockpiles.
   Some hostile operations continue as sham successes, defused under hand, while backgrounds are 
   uprooted throughout all ramifications.
 ◦ They have pumped up with depot poison pellets all political, military and civic leaderships in the 
   Western Industrialized Nations, especially the personnel of their security organizations as well as the 
   activists of the Private, Independent Defence Leagues to neutralize them as security threats.
 ◦ Equally targeted are any hostile person or group or fraction of a population.
 ◦ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, to 
   impair their ability to work and to enslave them physically and psychologically.
 ◦ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and 
   present Heads of State like G. Bush Senior and Junior, B. Obama, D. Trump, J. Biden, G. Schröder 
   and A. Merkel have been or are being sodomized regularly, who in a public position see no alternative 
   but to hit back.












						14

				9) Constitutionality

Constitutionality comprises principles, constitutional reality, historical and legal evaluation and legal cor-
rection.

9a) Principles
9a1) Based on human dignity, all universal object and framework values branch out from it.
Its scaled up intent is to further telos of mind with sound mental concepts in ethical freedom.
9a2) Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision, man can have.
9a3) Ethics' task is to solve cases of gross corruption with disastrous consequences, that not a major 
criminal potential runs to its self-destructive end.
Method is conflict solving by language, enlightenment, regulation, task, means and supervision.
It overcomes with spiritual-political-social will any hostile, inhibiting factor.

9b) Constitutional reality
The Predominant Powers and their Allies, most Private, Independent Defence Leagues and Third World 
Countries conduct with their security services a clandestine, global dirty B-C-G-R-N war among all par-
ties and their populations. Together, they operate global systems of labor camps for electro-magnetic-
bio-chem-genetic programming of social-psychological-physiological profiles to transform man into a 
programmable cyborg - cloned chimera and to eliminate human roots of dissenting, opposing and moral 
voices.

9c) Historical evaluation
The Predominant Powers and their Allies, most Private, Independent Defence Leagues and Third World 
Countries do not heed the historic warnings of colonialism, two world wars and genocide, but have 
promoted power madness, greed, subversion, corruption and fornication to the predominant forces of
present day history, which will lead with modern technologies of unlimited destruction to spreading pla-
netary catastrophes, enslavement and collapse of political-social systems and self extinction of mankind.

9d) Legal evaluation
The Predominant Powers and their Allies, most Private, Independent Defence Leagues and Third World 
Countries have realized a clandestine constitutional revolution in violation against the consent of the 
citizens, constitutional standards and international conventions.
They are terrorist organizations according to §129a StGB (German Penal Code). They are like special 
governmental detachments illegal combatants, who are violating martial law and are not protected by
the Geneva Conventions of International Law of the Community of Nations.
Looming charges against the responsible parties are eg massive human rights violations, seditious con-
spiracy and treason.

9e) Legal correction
It is the right of the people to correct misdevelopments, leading to planetary catastrophes and injustices, 
leading to political enslavement and collapses and to reverse a clandestine or open constitutional revo-
lution and to institute a new government with the principle of constitutionality to draw power out of po-
litical life.







			PDF Printout		15			Home