PDF Printout Home
Benfleet Str. 13
50858 Köln Germany
about misuses of modern biological, chemical, genetic, radiation and nano-technologies.
Dear Madam, Sir,
I write to inform you about global misuses of modern biological, chemical, genetic, radiation and nano-
technologies. They are employed by security agencies of the Major Powers, a coalition of Third World
Countries and Private, Independent Defence Leagues in a clandestine, dirty B-C-G-R-N war.
The present state of micro B-C-G-R-N weapon technology with industrial production and systematic area
covering employment of non-genetic toxins has realized electro-magnetic-bio-chemical programming of
political-social profiles of more than a billion people of all groups of society a year worldwide.
PDF Printout 1 Home
||Third World Countries
||Private, Independent Defence Leagues
||Global System of Labor Camps
||with misuses of genetics
The US CIA investigates from its formation on systematically naturally found venoms and synthesized
toxins for their incisive effects on the human body, drawing on research in Europe from before WW I - II,
in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-medical experi-
ments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to press ahead
with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, groups and
entire populations. They synthesized in their bio-chem labs new classes of toxins to manipulate psycho-
logical and physiological functions. Radiation weapons are developed in their physical-bio-chem labs to
manipulate climate, equipment, psychological and physiological functions.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-
chem-gen weapons of mass destruction.
1a) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of
the central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic
fields in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical
processes, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric
and sexual behavior.
1b) The genome
Another large scale project researches structures and mechanisms of the human genome in intentional
misapplication of mutagenic, hybridization and recombinant DNA technologies to cause with incisions
into the genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up
the construction of the first 'biological bomb' for peace time employment of gene altering agents in graded
to blanket mass poisoning of food and water supplies as well as target and mass poisoning of home and
foreign populations for control of individual psychological, physiological and genetic processes and mass
manipulation of population groups and over regions over the sum of all single catalogued, G-pellet pre-
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man
as a product of natural evolution into a cloned cyborg-chimera with programmable, augmented capabili-
ties by electro-magnetic-mechanical and bio-chemical-genetic means.
Developed are N-weapons, utilizing nano-sciences and -technologies in mechano-syntheses to enhance
analytics, solid, liquid, gas and plasma materials, miniaturization, performance, safety and handling.
Since the 80s, employed are nano-machines and placed as programmable nano-robots in body tissue to
manipulate their anatomy, morphology, physiology and environment and with it the level of functional
2a) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and
Russia advanced to superpowers of a new world order over war and peace in possession of atomic
weapons, the US since 1945, the USSR since 1947. They extended the imperial policies of the 19th into
the 20th century for profit and control of global power structures and extended their war objectives be-
yond the capitulation of the fascists towards political-ideological block formation with satellite states, new
borders and spheres of influence, free access to resources, advantageous international division of labor
and terms of trade. WW II lead without a peace treaty in a poisoned atmosphere to the Cold War up to
1989. The NATO was founded on 04. 04. 1949 and the Warsaw Pact on 05. 05. 1955.
The US leadership transformed the political-social character of their country corruptively along secret
policy goals into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax
Americana, while formally adhering to a constitutional democracy, human rights and freedoms.
2b) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, pro-
paganda, block formation, arms, space, geo-political-social structures, resources, sciences, technolo-
gies, applications, trade, corruption and fornication. Cold War objectives of propaganda and military
battlefields spread beyond religion and culture to all fields to dominate especially the information tech-
nologies and life sciences with anthropology, psychology, sociology, medicine, biology, zoology, bio-
chemistry, electro-biology, genetics and also ecology and climate. All professional and non-professional
fields were tied into hegemonic competition and all means allowed except direct employment of A-
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with
overkill ABC weapons and aggressive security R&D programs with technological superiority.
2c) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions,
foundations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA,
NSA, FBI, DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the
National Security Act of 1947 with the CIA, drawing out global power lines for home based pre-
dominance in all military fields with foreign sided dependencies and also secret policy goals to cover all
civilian domains, the political-legal-social-spiritual-scientific-technological-economic structures and pro-
cesses by social programming with eg worldwide control over larger R&D programs and high tech appli-
cations, surveillance, false fronts, control of public media, manipulation of individual psychological
profiles und beyond of demographic structures of entire populations.
They are authorized by executive order hypocritically under the label 'security', though they realize a
clandestine revolution in violation against the consent of the governed, constitutional standards and
international conventions: Looming charges against the responsible parties of this despotic perversion
are eg massive human rights violations, seditious conspiracy and treason.
3) Enforcement Concepts
Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite
states and are carried by infiltration over to the clients of ideologically opposite camps.
3a) Security planning receives priority over general national as well as international public interests of the
Community of Nations. The security apparatus is justified by public relation campaigns, lobbying con-
tacts, institutionalized relations and supportive diplomatic networks like transatlantic and -pacific partner-
ships for collaborative co-ordination of interests.
3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, -
not the mobilization of the masses for political-social actions.
The traditional goals of military forces to successfully invade a foreign country and of intelligence ser-
vices to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and
1963 in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy
goals, operations, methods, installations, equipment, data banks and image.
A global surveillance/communication system with satellites, ground receiver stations, interception of
data high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitu-
tional framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media',
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Protection of assets
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total
secrecy and unaccountably, their agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting
out from public opinion any ideologically non-acceptable statements. An intelligence review panel has
power over life and death.
3c) Technologies are seen as the 'key to power' in the 21st century.
They are the practical tools of the operational arms. US/NATO research panels of the military and secu-
rity agencies like the Defence Advanced Research Projects (DARP) develop the arsenal of compact
weapon architectures over the spectrum of conflicts out of an array of large scale research, de-
velopment, test and employment programs, which are offered, awarded, tested, set up for operation,
departmentalized and institutionalized. Weaponizing of modern technologies is to hit progressively easi-
er, faster, severer, more precise, be more effectively guided and shielded than foregone ones and to ex-
haust human-material, scientific-technological capabilities in space, air, at sea, land from single to large
scale, non-lethal to lethal, intercepting to retaliating tools and in cyberspace from data scanning to misin-
forming to infra-structure crippling hacks, mainly in misuses of physics, chemistry, biology, genetics,
medicine and computer science. They corrupt as totalitarian tools in first line human living environments,
where it cannot be perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of
research, testing and employment with command centers and a system of labor camps. Developed are
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like
contaminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radia-
tion and neurologically coded misinformation.
4) Command Centers
The intelligence-security agencies of the Western Powers, eg the USSS/DoD/CIA/NSA/FBI/DHS, the
British MI 5-6, the French DGSE and the German BND/MAD/AVS have set up their command centers
within security bases of NATO countries to enforce the secret policy goals according to their intelligence
agreements in division of labor by region, social group and field. Military intelligence controls military
personal and within the population groups like anti-war activists and draft dodgers. Non-military govern-
ment security controls federal, state and city employees and within the population all groups, perceived
as dissidents like sympathizers of opposite ideological camps. Security agencies of industrial ssocia-
tions control white and blue collar workers and within the population work and consume conform behav-
The US Special Operational Command (SOC), formed 1987 at the MacDill AFB FL with a number of sub-
centers, is tied into a global satellite surveillance/communication system with data retrieval and evalua-
tion and supervises research, testing, production, procurement and employment of micro B-C-G-R-N
weapons/equipment, the toxins, delivery and set off systems, the training of special forces in tactics,
techniques and operations and the personnel of single agents, teams, networks and fronts.
4b) Poison pellets
Poison dispensers in form of microscopically tiny pellets, containing toxins in gelatin skin or foil, a micro-
chip, receiver, emitter and a nano-robot as well as tiny listening and video devices and bio-chemical-
electrical-thermal-genetic sensors are produced in microchip precision engineering by the millions. As
depot poison pellets they are implanted directly or placed on a carrier like an unknowing person or any
object of daily use or a drink water reservoir or any stage of the food chain or a space based gliding
capsule - flying drone device to be guided electronically into the vicinity of the target. They can be spun
off several times out of multiple layers of equally tiny, hair like pneumatic guns with an effective range of
about 30 feet to be shot into the skin of the target. After activation they operate maintenance free for
years, while their batteries recharge by body movements. Nobots, programmable, mechanical nano-
robots, channel the pellets into site specific body tissue. They are applied single and massive, concen-
trated and blanket, random and selective, narrow and wide, scattered and systematic, limited and open
ended, in closed and open mediums, contained and epidemic, preparatory and acute. The gelatin mem-
brane dissolves in body fluid, a foil membrane is opened electronically, time locked, by a preprogrammed
code signal or sound or voice or within the body toxin concentration or neurological process recognition.
5) Third World Countries
The larger and the majority of smaller Third World Countries formed a coalition and initiated, supported
by Russia, an in depth investigation of the intelligence agencies of the Western Atomic Powers and
NATO, Japan, Germany, Israel and eg Saudi Arabia. Their goals branch out widely:
5a) Information about the developmental status of B-C-G-R-N micro weapon systems.
5b) Protection against threats from B-C-G-R-N micro weapons.
5c) Predominance with global employment of B-C-G-R-N micro weapons.
5d) Political-military-social counter-leverage against the Western Powers.
5e) Suppression of any attempt towards publication of undercover operations.
5f) Revenge for torture, murder and 500 years of dehumanizing treatment.
5g) Indignation to lay waste depraved political-social leadership.
In all, they copy the Major Powers’ system of labor camps.
6) Private, Independent Defence Leagues
6a) Victim associations
Several victim associations and self-help groups, calling themselves targeted individuals (TIs), organize
themselves in alternate media, mostly the WorldWideWeb, conduct information campaigns about live
tests of military-intelligence B-C-G-R-N research projects, writing to eg government offices, legislatures,
the press, medical associations, handing in petitions and law suits at the responsible government offices
for violations of rights to life, health and liberty by deliberate assault on non-combatants. There they are
altogether ignored, turned down, send to psychiatric treatment, put under surveillance, infiltrated, instru-
mentalized as false fronts and neutralized in labor camps. They are hardly supported by established
6b) Defence leagues
Private, independent defence leagues spring up mostly as smaller parties out of individual security con-
cerns, organize themselves for collective protection and are, driven by spreading awareness of micro
weapon operations, continuously multiplying beyond several thousand groups worldwide. They investi-
gate parallel to the Third World Countries the security-intelligence services first of their local region, then
successively of their home country and neighboring states. Their operational interests unfold like those of
the Third World Countries into information, protection, predominance, counter-leverage, total secrecy,
revenge and indignation. They arm themselves with surveillance/communication systems, stolen equip-
ment, plundered stockpiles, copied operational know-how and recruit their own undercover hit teams.
In all, they copy the Major Powers’ system of labor camps.
7) Global System of Labor Camps
Camp guards are employed as spot, walk by, stalk, decoy and hit teams.
7a) Surveillance camps: spies record for information control the data flow in its entirety worldwide.
7b) Deception camps: multi media presents a Potemkin village.
7c) Extermination camps: executioners eliminate more than one thousand people a year.
7d) Gas chambers: hit teams spray with nerve gases thousands of people a year.
7e) Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
7f) Harassment camps: Intelligence trainees strike down on millions of people a year.
7g) Sadism and sodomy camps: hit teams execute a billion druggings a year.
7h) Behavior manipulation camps: hit teams mass drug millions of people a year.
7i) Client camps: agents commit gross human rights violations around the world.
7j) Dissection camps: hit teams test new toxins on millions of people a year.
7k) Genetic manipulation camps: hit teams test genetic toxins on thousands of people a year.
7l) Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge them-
selves for bestialities of the Super Powers.
7a) Surveillance camps
Goal is total information control by recording the data flow in its entirety worldwide.
To be penetrated are foremost foreign military and security services, terrorist organizations, political-
legal-scientific-commercial-financial-social communication systems and then populations at large.
To be gained are precise, reliable, up to date information for project planning and supervision.
To be shielded by an early warning system are all intelligence assets: personnel, policy goals, technolo-
gies, installations, equipment, methods and operations.
7a1) Intercepted are land/sea based cable and air bound radio traffic.
7a2) Plugged into are public and work places, buildings, equipment and households.
7a3) Wired up are individuals. Technical steps are identification, marking, connecting, tracking, data
transmission, collection, storage and evaluation.
Every person is wired up with multi-sensor chips to pursue him in all his prayers, travels, intellectual,
professional and social activities throughout all phases of the day from his childhood to his demise.
The chips with electro-magnetic-acoustic-thermal-biological-chemical-genetic sensors and radio emitters
are placed cell specific into the body, the scull and all cortexes of the brain, eg the visual, hearing, smell-
ing, tasting, language, mental processing, emotion and motoric regions to record neurological processes
as coded EEG brain wave patterns with sensual perceptions, thoughts, memories, moods and are also
placed along nerve strands and their axons to other organs, glands, muscles, skin, digestive tract, male
or female reproductive system to record physiological processes.
Genetic fingerprints list the complete gene sequences of the chromosomes. They are read by a micro-
chip, whose tweezers pick out tiny strings of DNA and insert them into an ultra slender channel, etched
on the plastic chip with tiny electrodes to detect along the serpentine genetic macromolecule the code's
chemical letters. Established are the identity of the person with his hereditary dispositions, genetically
determined diseases, genetic factors of the phenotype, especially in development and differentiation of
the brain with inclination towards various intellectual fields.
7a4) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for communication, weather, navigation, exploration,
surface imaging, tapping of resources, reconnaissance and surveillance. In the US they are launched
from Cape Kennedy FL or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year busi-
ness, led by eg Lockheed, General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Air-
craft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
7a4) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for exploration, weather, communication, navigation,
surface imaging, reconnaissance and surveillance. In the US they are launched from Cape Kennedy FL
or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year business, led by eg Lockheed,
General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Aircraft, Rockwell International,
Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
There are several hundred US spy satellites in orbit largely under direction of the US Global Strategic
Command (USGSC), its National Space Center located at Offutt AFB NE and developed in charge of the
Advanced Research Projects Agency (ARPA), an arm of the Pentagon.
7a5) The intercepted and space derived data are collected mostly by the DoD, CIA, FBI, DHS and NSA,
which was founded under direction of the DoD 1952 at Crypto City, Fort Meade MA with branches in
NATO countries together with the US Cyber Command and Central Security Services. The NSA employs
over 50 000 administrators, scientists, technicians, analysts and operatives, utilizing supercomputers
with arrays of modules, nano-technology, artificial intelligence and very high speed integrated circuits,
processing more than a quadrillion (1024) calculations/sec to handle the global electronic data flow. Like
Big Data in the professional fields, big in volume, velocity, variety, validity and actuality, they are inter-
cepted, collected, stored, deciphered, translated, screened, evaluated, presented and distributed. Fur-
ther processing like analysis or manipulation increases their commercial or security value through eg
personal profile generation, technology development, process optimization, trend analysis and as data
bases for service providers.
7a6) Spin offs of scientific-technological knowledge are sold mostly in the fields of security and law en-
forcement, corporate and private research, medicine, communication, industrial production, traffic and
7b) Deception camps
Presented is a Potemkin village, inviting onto a wide green field of opportunities.
Political-legal-social framework, political-scientific-technological-social education and the present agenda
of issues are largely shaped by the powers of government, public education, public media and direct
intervention by the security agencies. Most visible is the public press with press agencies, publishing
houses, TV, radio, newspapers, magazines, journals and books to reach everyone at home, at school,
at work and in his spare time.
7b1) Political-legal-social framework
b1,1) Suggested are
◦ Constitutionality with guaranteed basic human rights.
◦ Democratic means of conflict solving.
◦ Solidarity, fairness, sound traditions and political correctness.
b1,2) Provided are
◦ Non-realizable basic human rights.
◦ Non-information and -supervision about possible misuses by positions of power.
7b2) Political-scientific-technological-social education
b2,1) Suggested are
◦ Communication of scientific-technological-social knowledge and skills by the educational system.
◦ Participation of all citizens with their knowledge in public democratic processes.
b2,2) Provided are
◦ Illusions of human capabilities and convenience to go faster, higher, bigger, easier and better.
◦ Satisfaction of the population as consuming, non-questioning, -probing, -knowing assenter to remain
bare of convictions, ethics, reason, maturity and life experience with legal means of defence.
◦ Not addressing political-social intentions, conceptions and backgrounds as after the attack on the
Twin-Towers 9/11 2001, which was allowed to proceed for justification of the anti-terror war.
7b3) Present agenda of issues
b3,1) Suggested are
◦ Up to date, objective, non-partisan information by the public press.
◦ Public discussion of the present day agenda of practical and theoretical tasks.
b3,2) Provided are
◦ Reduction of the niveau of mass media below that of politically substantial contributions.
◦ Minimalization of sensitive issues like uncertainties, risks and dangers.
◦ Amelioration of negative issues, eg a war overseas is seen as a local intervention.
◦ Sidetracking of critical issues by public relation campaigns and misinformation.
◦ Pushing to the outskirts the misery and death of millions of people through hunger, catastrophes,
epidemics, exploitation, expulsion, human rights violations, war and mass murder
7b4) Security interventions are eg
◦ Corruption of regulating, supervising, controlling and inspecting authorities.
◦ Discrediting of government adverse political-social leaderships.
◦ Suppression of moral voices with national and international renown.
◦ Cut out of any arising attempt towards publication of a victim's medical and legal evidence.
◦ Elimination of whistleblowers, critics of system/security and dissidents.
7b5) Immediate consequences are
b5,1) Expectations for the improvement of the human lot remain superficial.
b5,2) Gone is the informed citizen, who thinks independently over the full spectrum of his mind.
b5,3) The psychological underpinnings of society have become polished formalism, stupor, disorienta-
tion, distrust, paranoia, hypocrisy, cynicism and burned in human rights abuses.
b5,4) Contorted are historic records, which are to reflect the achievements and failures of the times.
7c) Extermination camps
There is not one security service of a major power that does not have its killing fields.
7c1) The military security department of NATO operates an assassination squad to eliminate terrorists,
who are intercepted in preparations, foreign agents, who penetrate security areas, traitors, who sell se-
curity information, deserters, who are caught up with behind hostile lines, security risks, who threaten to
impair essential assets, left behind scientists from shut down projects and critics, who become a formi-
dable voice in public.
7c2) The assassinations are priority operations, well organized and quiet. A small intelligence court
reviews the evidence, the target is pumped up with depot poison pellets, electronically marked, send to
a remote area or a longer journey is waited for, death follows in an accident or break down, the death
certificate cites an apparently natural cause of death. Where isolation is not possible, it is discredited,
demonized and eliminated over time by a terminal disease like cancer.
7c3) Uncovered foreign operatives and own double agents are eg by NATO hit teams tortured to death.
Nazi concentration camp butchers hung up their victims at back-wards crossed arms over a wall urinal in
a basement of a remote station to be tortured by mechanical and toxic means until their human body was
totally disfigured and finally dead, when all body fluids had stopped dripping.
NATO butchers detain their victims at undisclosed prisons to be tortured or 2 – 8 days by electrical, ra-
diative and bio-chemical-genetic means, eg CIA psycho and sodomy drugs, until their human body and
mind are totally disfigured and finally dead, when all brain activities have ceased.
7d) Gas chambers
For gas chambers targeted are mainly people, working with the mind and propagating system non-
conform messages like the leadership of an opposite ideological movement, dissenting journalists,
lawyers, doctors, scientists and artists.
7d1) Military nerve gases attack the central nervous system in specific functions like wake awareness,
memory, concentration, reaction, coordination and balance, the peripheral nervous system with loss of
physical power, endurance, flexibility, agility and sensitivity.
7d2) Industrial toxic gases often are carcinogens, reducing first the pulmonary system, then other physi-
ological functions and inducing in the long run tumorous growth.
7d3) In debasement of the dignity of man and his mind, crippled are intellectual and physical strengths
to the point of disability to perform tasks of every day life.
7d4) From cartridges gassed are entire streets, buildings, trains, busses, cars, assembly halls and swim-
ming pools. Nerve gas pellets are attached to any object of daily use like packaging, newspapers, books,
clothing and tools, the set off signal is timed for maximum toxic concentration at time of expo-sure. The
target's home is laced mostly with by odor imperceptible dosages for long term effects, if not the bed-
room itself is used as death chamber. H. Kohl and B. Netanjahu operated gas chambers in churches and
at sites near to former Nazi concentration camps.
7e) Radiation camps
Radiation camps entrap mostly insurgents, fugitives, secret bearers and serve as secret prisons for ter-
rorists and undesirables. They manipulate individuals, groups and populations up to programmable
cyborgs and also climate and equipment.
7e1) Radiation devices
e1,1) Radiation devices have been developed since before WW II for civilian and military applications
and are common today in all professional fields from astronomy to food preparation. US Military re-
search has utilized several thousand civilian patents and covered them under the US Inventions Se-
e1,2) R weapons utilize the energy flow of spherical waves and directed, concentrated beams. Lasers
radiate light and heat, speakers acoustic waves, antennas electro-magnetic photon-waves and accel-
erators of atomic/subatomic particles eg α-, β-, γ-radiation. They are adjusted in direction, focal point,
cross section, intensity, wavelength, frequency, duration and pulse pattern in combinations.
e1,3) R-Guns are mostly compact and reach any open place wirelessly to hit precisely with and with-
out implant, non-lethal to lethal over large distances with the speed of light.
However, they are heavy on equipment, infra-structure, manpower, energy consumption and cannot
be miniaturized all around as tracelessly as the more universal B-C-G-N micro- and nano-devices.
7e2) Individual targets
e2,1) Any person can be anywhere telemetrically spot pointed, identified, tracked, brain linked, read
and manipulated without a mark on the body.
e2,2) Radiation of low to extremely low frequencies under 50 Hz with neurologically coded firing pat-
terns stimulate, alter or depress the bio-electro-magnetic fields and processes of cell tissues to cause
health complications from nausea to heart attack and psychological disorders from depression to
break down and neurological disfunctions from altered consciousness to forced behavior and memory
incisions from accurate recollection to total loss.
e2,3) A psychotronic R-weapon restrains a target within a hyperprison to be psychologically robotized.
e2,4) Brain to computer linkage via a MEG - Neurophone bypasses the senses to allow real time two
way physiological communication of informing as well as misinforming noises, words, images and
thoughts. It accelerates in common military praxis the ground station - pilot observation, communica-
tion and reaction times.
7e3) Group and population targets
Crowds can be non-bodily, non-lethally manipulated to cause eg sedation/incitement in riot con-
trol/fabrication. Insurgents can be disoriented and blocked in their motor controls by area covering l
aser scans in barrier and invasion warfare.
A Cyborg is a trans-human biological-technical blend and has a micro-chip implanted in the central nerv-
ous system as a neuro-biological - data processing interface. It allows eg movement of a prostheses in
compensation of a lost limb or augmentation or reduction in the level of a physiological function.
Individual or a groups or populations of cyborgs can be area covering bio-electro-magnetically pro-
grammed in their health, capabilities, intellectual activities, convictions and behavior.
High energy radiation in excess of trillions of W/sec can alter layers of the atmosphere to disrupt radio
communication, break shielding against cosmic winds, generate harmful compunds, reflect back to earth
and trigger earth-weather catastrophes. A geo-engineering research station has been set up at eg Ga-
kona AK under the High Frequency Active Auroral Research Project (HAARP).
Stationary and mobile objects can be spotted, identified, tracked and measured.
Electronic equipment can be read at all data input, processing and output points and programmed.
Entire systems can be manipulated, disrupted, shut down, burnt out, molten and pulverized.
7f) Harassment camps
Selected targets for a camp are put under surveillance to enter it through the front yard of harassment.
Trainees of intelligence services acquire here the techniques to strike down on their victims.
Surveillance is executed 24/7/52 a year in all areas of life to engineer stress events.
With covert entry follow physical damage, tempering with records, theft and contamination.
With street theater follow stalking, blocking, mobbing and run around at the authorities.
As extra judicial measures follow deception, fraud, entrapment, wrongful commitment to a mental insti-
tution, judicial paternalism, unlawful arrest and denial of charitable, medical, police and legal help.
7g) Labor camps of sadism and sodomy
Targeted for labor camps of sadism and sodomy to be sifted out are people of faith, conviction, culture
and achievements, activists of political-social movements like human rights workers in defence of un-
popular causes, environment and animal rights campaigners, violence pillorying pacifists, critical voices
of system, market and the press, radical groups of minorities, bloggers of alternate media, drop outs from
the rat race, defectors from opposite ideological camps and soldiers, who object out of second thoughts.
7g1) There is not a psychic or physical function in the body that cannot be electro-magnetic-bio-che-
mically manipulated to be stimulated and boosted, supported and stabilized, sensibilized and broadened,
narrowed and worn out, relaxed and dampened, disrupted and distorted:
▫ Chemical rape at any place and time reduces by blocking agents the target's level of mental and physi-
cal capabilities, which are then eclipsed by a variety of sodomy drugs to manipulate in succession
sexual drive, erotic sensations, emotions, sensibility of genital parts, secretion of sweat glands, speed,
endurance, exhaustion, sleep, dream and hang-over.
Erotic stimulants are often individually designed according to previously taken brain wave patterns and
are added by induced pornographic images to incite perversities.
The offspring is being monitored in its further development.
▫ Induced physiological impairments are eg drop-in-your-tracks fatigue, myocardial insufficiency,
back and muscle pains, restriction of motion, sleep disruption, hyper-stress, total relaxation and
▫ Induced emotional states range from anticipation to saturation, blind hope to despair, elation to anger,
boldness to fear, overconfidence to diffidence, concern to indifference, hypersensitivity to insensitivity.
A 'joy of death frenzy' can supplant every agony of torture.
▫ Induced mental distortions affect consciousness, intention, conception, memory and operations to the
point of dysfunction with non-resistance against adversities, hardships and threats. Specific functions
ike abstract reasoning, language, computation, logic and specific mental interests can be crippled.
Stimulation towards 'blasphemy of the Holy Spirit' is achieved by boosters of fixed, eccentric theolo-
gical themes and a desire to communicate.
▫ In long term mental-psychological terror several neurological processes are periodically stimulated to
extremes, eg seizure, hallucination or delirium, not to allow any recuperating relaxation times.
▫ In all the target's personal development, identity and character, especially its political-ethical stand-
ards, are worn down, debased and suffocated in the suds of prostitution to cause traumatization, irra-
tional behavior, self-destructive habits, which then run on to total personality collapse.
The victim, often with a depot poison pellet exacerbated preexisting disease, induced sterilization and
creeping ailment like tumorous growth in the genitals, is blocked in its professional work, socially iso-
lated, disenfranchised, severed from welfare-family safety nets and diagnosed with a mental illness.
It is forced into suicide or to die on the streets.
7g2) Hit teams mass drug with depot poison pellets for years entire water and food supplies from the
start of the food chain to the selected target, at the reservoirs, agricultural producers, suppliers, food
processors, wholesalers, supermarkets, restaurants, in transport via repackaging-resealing facilities and
in the target's home.
Contaminated with toxins, taken up with skin contact, are objects of daily use like magazines, books, tex-
tiles, tools, first aid supplies, hygiene articles and dryers.
7g3) Labor camps of sadism and sodomy have been set up around the whole world and have blanketed
in mass applications entire regions, ethnic groups and political-social fractions with sodomy drugs. Eg
US stay behind forces in occupied territories as in Germany after WW II (1945) have systematically tar-
geted anti US/Cold War - pro disarmament activists.
7h) Labor camps of behavior manipulation
Targeted for labor camps of behavior manipulation are mostly political-socially non-conform skilled peo-
ple of all fields for their independence of mind, asperity of manner, eccentricity and pursuit of alternate
ways in life and the population at large.
7h1) On the first level individual behavior is suppressed or stimulated in its elementary physical needs, in
exercise, relaxation and sleep requirements, appetite and thirst, hygiene and beauty care.
7h2) On the second level the emotional state is manipulated from thrift to the urge to go shopping and
from stress, anger, frustration to the desire to achieve social recognition up to power madness.
7h3) On the third level the motivation is capped to listlessness and lethargy or boosted into over-ambition
and go-on efforts in face of failure.
7h4) On the forth level intellectual interests are selectively dampened or stimulated, while ethical aware-
ness and inhibition is dampened down to the point of unscrupulousness.
7h5) Communicative and social competences like cooperation in teams and hierarchical structures are
manipulated out of the emotional state from diffidence to hostility, out of motivation from dropping out
to intriguing and through inducement of unrest, nervousness, stammering or trembling.
7h6) In all the target's physical and metal fitness, personal development, education, professional and
social careers are predetermined.
7h7) The toxins are administered mostly from depot poison pellets in small dosages over longer periods
to form out unconsciously habitual self-sustaining or -destructing behavior patterns. Eg Exxon stabilizes
plant employees and their families for long term productive, reliable job performance.
7i) Client camps
Client camps of subversion, corruption and control are set up in foreign countries.
7i1) The Major Powers’ intelligence agencies realize their foreign policy goal of block building for global
dominance and control first within their client states, also those regarded as time proven political part-
ners. Their roles are to provide support for political-military defence and interventions and to open mar-
kets for advantageous international division of labor with free access to man power, raw materials and
half-finished goods, while home markets are protected by hurdles of eg advanced technologies and their
patents, infra-structure, finance and professional standards. They are not to develop vital scientific, tech-
nological, economic and financial fields of their own. Foreign aid projects largely flow back home, eg 86%
of the US EXIM Bank's $7.7 billion new foreign export credits in 2000 went to 10 larger US companies.
7i2) The model is expanded geo-politically to non-client states to achieve global dominance by one's own
superiority with determination, resources, mass, size, means, diversity and reserves. The intelligence,
counter- intelligence and security agencies are scaled up to the required size to realize their directives
and if necessary hiked up.
7i3) Methods of subversion and corruption are eg
▫ The first tool always is the covered operation in all hazard areas with research, detection, identifica-
tion, tracking, gaining of access, securing, recovery, retreat, exploitation and if necessary mitigation
▫ Surveillance by a global satellite communication system.
▫ Infiltration of the political-social structure by contacts with recruitment, counselling, disinformation,
forgery, theft, bribery, extortion, prostitution, financial sponsoring and partnerships.
▫ Sold are proprietary information, low cost credits, logistical supplies, user rights, telecommunication
systems, special technologies, bio-, chem- and rad-tech weapons.
▫ Rented are grounds for air bases and training camps.
▫ Fragmentation of political alliances.
▫ Permanent excessive indebtedness.
▫ Incitement to civil strife.
▫ Profit from their wars.
▫ Manipulation of the public press.
▫ Pacification of moral institutions.
▫ Distortion of social fabrics.
▫ Wash out of cultural identity.
▫ A system of labor camps controls the broad base of the population.
7j) Dissection camps
Caught in dissection camps to serve as guinea pigs for non-consensual, covert, illegal pseudo-medical
life experiments for the development of B-C-G-R-N weapon systems, often with deterring, degrading
torture, are terrorist suspects, captured freedom fighters, prisoners in undisclosed detention centers,
prisoners in civilian jails, convicted of a heinous crime, tenacious dissidents for punitive action, the vul-
nerable like civilians in war torn regions, minorities in underdeveloped regions, suicidal persons, mental
patients, the dying in nursing homes and intensive care wards, people considered to be expendable like
estranged, uprooted, isolated, long term jobless, homeless and lone fighting individuals.
The CIA selected also targets from their childhood on at manipulable, closed social environments like
cults, sects, lodges, churches, foreign partisan groups and training camps.
Test series on R guns and bio-chem-genetic toxins for a worth analysis are conducted in the laboratory
and training area with modeling, simulation, war games and also for combat exposure in life tests to
collect representative samples from a population at large at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psy-
chologic latent, present and long term effects over a wide spectrum, eg affected function and tissue,
degree of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining
factors, counter-poisons, recuperation times, measurability, visibility and traceability.
The data are send directly form the target via microchip sensor, emitter, amplifier and satellite to the high
capacity computers at the agency's command center for evaluation by the R&D team.
Active warfare agents undergo a comprehensive military worth analysis according to present and desired
performance standards in their bio-chemical-genetic components, production, safety precautions, han-
dling, training, weapon concept, equipment, infra-structure, cover, costs, target vulnerability, operational
engagement, mission accomplishment and plausible deniability.
Employment ready weapon systems are handed over to the operative command structure of the armed
7j3) Legal situation
The Common Rule, safeguarding against experimenting on the public without their consent in the US, al-
lows for non-consensual experimentation by intelligence agencies.
US DoD Directive 5240 1.R saved 882013, Ch 4, Procedure 13 says: 'Experimentation is allowed on hu-
man subjects for intelligence purposes.'
The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
7j4) Public investigations
Past public investigations revealed pseudo-medical experimentation at eg the San Antonio AFB TX, the
Army Special Forces Center NC, the Los Alamos National Laboratory NM and private institutions in
successive sub-projects of MK Ultra, but the operations have been largely farmed out for deeper cover,
because of sensitivity to public resistance and not to implicate the security services directly.
The CIA siphoned off funds from defrauding the government, collaboration with criminal organizations,
weapon trading, security contractors, proprietaries, re-cycling of radioactive materials, market manipula-
tions, economic data trading and extortion.
7j5) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diagno-
sis. Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned
down for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are
to recover and in all cases the death certificate claims an apparently natural cause of death.
Eg the governments of France and Israel developed their nerve gas agents with test series on FLN and
Palestinian freedom fighters, taken prisoners, - none survived and their ashes were scattered over the
Misuses of Genetics
7k) Genetic manipulation camps
Selected for genetic manipulation camps, a branch of dissection camps, are especially younger men and
women from childhood into child bearing age from all classes of society, taken mostly as singular, dis-
persed, unrelated samples with accompanying psychological stabilization under deepest cover.
(About active agents, diagnostic tests and procedures are no data available here.)
7k1) International conventions
Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce them.
k1,1) Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences hu-
man, population, pharma, behavior genetics and gene technology. They serve life and not in inversion
of human dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed wea-
pons always lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
k1,2) The civilized world; customary international law; The Hague Land Warfare Convention (The
Hague 1899); the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacte-
riological Methods of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention
(UN Geneva 1972) and The Chemical Weapons Convention (UN Geneva 1992) outlaw their develop-
ment, production, stockpiling as a means of warfare and call for their disarmament.
7k2) Biological bomb
Today's Major Military Powers press ahead with the further improvement of clandestine micro B-C-G-R-N
weapon systems to gain global predominance in the field. Set goal of the US National Security Council in
collaboration with NATO is the construction of the first biological bomb and its peace time employ-ment. It
is to realize control of individual behavior patterns, political-social structures and processes efficiently
population wide, long term plannable and short term adjustable.
'Scientific rational base' is population genetics to render a group’s or population's allele composition with
its genetic and physiological functions designable and programmable by bio-chem-technological site
specific strain manipulations and to enable a 'human hand directed evolution of mankind'.
7k3) Design criteria of genetic weapons
k3,1) Political goal is genetic programming of complex human behavior patterns.
k3,2) Military goal is the capability of single and mass applications with selection of targets, kind and
degree of impairments, fixing of place, time and conditions.
k3,3) Modernization goal is increased efficiency of present state of the art techniques of behavior
channeling by attacking causes and not only symptoms with coverage of entire regions and population
groups by stable, sustainable transferal of altered genetic strains to succeeding generations and in
their economy by centralized supervision of a lean network of undercover operatives.
k3,4) Economic goal is determination of economic structures and processes by individual basic needs,
drives and emotions, affecting the key economic parameters of eg corporate - labor force relations, net
domestic product by kind of economic activity, private and public investments, consump-tion expendi-
tures, net savings, labor peace, work ethics and productivity.
k3,5) Social goal is determination of social structures and processes, especially the professional elites
by manipulation of sexual behavior, motivations, traits of intellectual interests and capabilities and with
it personal development, education, identity, character, professional and social careers.
k3,6) Demographic goal is channeling of the rates of still born, life birth, infant mortality, disease, disa-
bility, invalidity, death and with it key population parameters, base of and leverage on social-economic
structures like population size and density, age group distribution, growth trends, health standards,
care, insurance and further statistics like average work years, retirement age and life expectancy.
k3,7) Indicators of general health according to registered individual causes and external factors like
environmental conditions have become insignificant.
7k4) Deployment structure
k4,1) In the first stage set up is an infra-structure of depot poison pellet delivery systems.
It builds largely on the existing command centers of the major powers' intelligence agencies within en-
closed security bases, enforcing the present non-genetic state of the art social programming with a
global telecommunication/surveillance system, procurement of equipment and toxins, operating per-
sonell, undercover agents and data evaluating scientists. It allows for alternate delivery options
▫ by a commissioned agent, manually implanting or pneumatically injecting pellets.
▫ by an electronic guidance system, navigating pellets from water reservoirs, the food chain, locations
in public places or from space based gliding capsule - flying drone devices into the vicinity of the tar-
get to be shot in.
k4,2) The second stage realizes genetic identification, marking and tracking of every single person in
every country by a network of undercover agents.
A data bank stores the personal profiles with their genetic fingerprints.
k4,3) In the third stage every profile is by a computer program selected, scanned and matched against
the desired model of allele frequencies of the common gene pool and allotted a charge of gene alter-
ing, correcting or impairing agents or toxins to form out the desired traits.
k4,4) In the forth stage every single person is pumped up with their allotted charge, a microchip with
sensors and a sender/emitter, mostly bypassing surgical implantation and awareness of the victim.
The operations are performed systematically on every foetus, youth and adult of the target group.
k4,5) In the fifth stage an electronic guidance and set off mechanism is installed at the command
center similar to that of present social programming and guided drone attacks on individual targets.
k4,6) In the sixth stage recorded, supervised and evaluated is the introduction of desired and modifica-
tion or elimination of undesired dominant and recessive traits in the target's allele composition with a
decision on further steps of
▫ No action by adequate allele composition.
▫ Repeated incision by deficient allele composition.
▫ Target elimination by geno-deviant, 'substandard' traits.
▫ Mass elimination of population groups and over regions is realized over the sum of all single poison
pellet prepared targets.
7k5) Insertion paths
k5,1) Transport packaging for delivery into the body of the target is by tiny poison pellets of gelatine or
foil skin, where the gelatine dissolves in body fluid and a foil is opened by an electronic set off mecha-
nism. Tiny nano-robots carry the pellets to the desired body tissue.
k5,2) Preparatory packaging of gnome altering segments into suitable genetic envelopes is by ligation,
covalently bonding the active passenger DNA into a passive carrier DNA strand to form a vector sys-
tem, fusing the genetic materials into a heterologous product with defined parameters As a mobile,
transposable genetic element it can insert, exit or relocate into non-homologous DNA independent of
the host's recombinant functionality.
As carriers serve mostly bacterial and viral envelopes: bacterial, transposable genetic elements are eg
IS elements (insertion sequence), TN elements (transposon), transposable phages; viral elements are
eg classical transposons, retroposons, alu-like sequences; with mammals polyomaviruses, vaccinia vi-
ruses and retroviruses.
k5,3) Within the desired body tissue, insertion of the vector system into the host chromosome for final
in vivo transformation is by transposition, a change of position of a transposable genetic element from
one site of the genetic material to another: By cutting, strand transfer, joining of ends, added by cata-
lyzing enzymes, the passenger and carrier DNA are covalently fused into the host chromosome.
k5,4) The gene targeting rate, the frequency of integration of an exogenously added DNA sequence
into the nucleus per quantity of host DNA per added sequence, depends mainly on: transfer and trans-
position methods, homology between exogenous and host DNA, vector system, length of the inserted
string, accessibility of a target locus and environmental factors.
7k6) DNA technologies
Employed DNA technologies are mutation, hybridization and DNA combination
▫ An induced ploid mutation is almost always a lethal defect, because of abnormally developing, non-
functional cells leading to cell death, death of organism or still birth.
▫ An induced chromosome mutation with a change in the order of genes between two or within a chro-
mosome by addition, elimination or rearrangement of a region results in a bio-chemical mutation,
leading to a replication dysfunction with loss of an entire trait out of the phenotype or to transcription
or translation dysfunction with growth disorders like tumorous growth.
▫ An induced gene mutation, a change in a base sequence of a gene, a structure or regulation chang-
ing, amplifying or repressing, forward or backward, single or complementary (synonymous), expres-
sive or conditional, sometimes point, also nonsense (neutral) mutation, can destroy the function of a
gene at the site of incision, or cause additional large scale rearrangements of adjacent DNA se-
quences, or alter the efficiency of gene expression (gene penetrance), the degree of trait formation
also in growth, differentiation and final structuring of a function.
Meiotic poisons can cause in cell division and recombination processes: partial or perfect misalign-
ment and misassortment of chromosomes, chromosome deformation and fragmentation, cytoplasma
deformation, phase inhibition, cell death and sterility. Mitotic poisons affect like meiotic poisons: chro-
mosome alignment and assortment, cell division processes, nucleic and cytoplastic morphology and in
consequence cell functions with phase inhibition, cell death and sterility. Aside from noxious agents,
hybridization is affected by heat, radiation, insertion of a function disrupting DNA strand and can lead
with impairment of regulatory processes to tumorous growth and death of organism.
k6,3) DNA recombination
In vitro manipulated targeting sequences can contain elements to manipulate genome structures and
genetically controlled processes in their entire spectrum: any parameter affecting gene expression,
leading to amplification, depression, destabilization, dysfunction, toxin production, cell death and
disablement of a function; any singular phase in meiotic and mitotic cell division, leading to irregular
chromosome assortment, chromosome deformation and fragmentation, phase inhibition, cell and cell-
line dysfunction, cell death, sterility and malignant tumorous growth; any regulatory process of onto-
genesis, mainly controlled by the homoeobox, leading to a change in development in timing, rate, lo-
cation with de- and malformation of cell morphology, diverging growth and differentiation of functions,
causing changes in functional capacity, cell unit dysfunction, uncontrolled growth and death of organ-
7k7) Levels of Impairment
k7,1) Death through disablement of a vital function or through a morphological malformation.
k7,2) Disease through a temporal, local, graded manipulation of a physiological function by eg activa-
tion, stimulation, depression, deactivation, alteration and dysfunction.
k7,3) Change in the level of a specific physiological capacity like doping or crippling.
k7,4) Altered growth and differentiation of a specific physiological, often neurological capacity.
k7,5) Change in the effectiveness of medication, vaccination, diagnostics and therapy.
7k8) Overall effects
A genetic incision affects a selected trait directly, when the phenotype with a morphological or functional
distinction is traceable to a specific hereditarily passed on genotype and the individual gene or gene
group as functional unit is identified with its bio-synthetic pathway. With it affected are the anatomy,
morphology and physiology of the organism and massive, population wide manipulations show first in the
demographic structure. Genetic incisions to determine a specific trait in the public psychological profile
gaplessly, stably, time effectively will result due to the long causal chains, large number of variables,
interdependencies and codetermining factors in an almost irreversible shift of frame in several allele
frequencies of the world population's gene pool with uncontrollable, catastrophic side effects.
7l) Revenge camps
7l1) The governments of the Third World Countries continue their investigations into the Major Powers'
and Clients' military and intelligence activities and widen them out to screen all their political-social
forces, decision making elites, public and secret policy goals, social structures and processes, re-
sources, government and private security personnel and area covering single households.
l1,1) Their political intentions remain spread out widely: information, protection, predominance, counter-
leverage, total secrecy, revenge and indignation.
l1,2) They strive in a loose coalition for global predominance in B-C-G-R-N micro-weapons and not for in-
ternationally guaranteed safeguards, unleashing multiple new dangers for mankind.
l1,3) They expand their global undercover micro-weapon operations.
▫ They formally tolerate foreign hostile secret policy goals, enforcement concepts, deployment struc-
tures, weapon development, financing, political propaganda and undercover operations.
▫ They expand their own military-intelligence infra-structure, often drawing on scientific, technological,
logistic and data support from Russia.
▫ They expand their own global system of labor camps with a network of affiliated groups.
▫ They keep a close watch for early warning and protection on hostile security services and the global
information flow in its entirety.
▫ They incapacitate foreign communication systems, equipment, toxin stockpiles and delivery systems.
▫ They have pumped up with depot poison pellets all political, military and civic leaderships in the
Western Industrialized Nations, especially the personnel of their security organizations as well as the
activists of the Private, Independent Defence Leagues to neutralize them as security threats.
Equally targeted are any hostile person or group or fraction of a population.
▫ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, to
impair their ability to work and to enslave them physically and psychologically.
▫ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and
present Heads of State like G. Bush Senior and Junior, B. Obama, G. Schröder and A. Merkel are be-
ing sodomized regularly, who in a public position see no alternative but to hit back.
7l2) The Private, Independent Defence Leagues continue their investigations, starting out from house-
holds, work places, public places and electronic equipment of their local area and widen them out to
cover the Major Powers' military and intelligence activities in their region and neighboring states.
They are growing beyond several thousand groups worldwide, recruiting themselves mostly via under-
ground channels out of various population groups and extend undercover operations into a peoples
l2,1) Their political intentions equally remain spread out widely: information, protection, predominance,
counter-leverage, total secrecy, revenge and indignation.
l2,2) They strive often in data exchange for local and regional predominance in B-C-G-R-N micro-wea-
pons and not for internationally guaranteed safeguards, unleashing multiple new dangers for mankind.
l2,2) They expand their local, regional and also global undercover micro-weapon operations.
▫ They do not exercise constitutional oversight over positions of power according to law by the people,
but tolerate their secret policy goals, enforcement concepts, deployment structures, weapon develop-
ment, financing, political propaganda and most covered operations.
▫ They set up their own command centers, surveillance/communication systems, steal equipment, plun-
der stockpiles, copy operational know-how and recruit their own undercover hit teams.
▫ They keep a close watch for early warning and protection on hostile security services and the global
information flow in its entirety.
▫ They hypocritically pretend to clean up the misuses of modern bio-technologies, however
They lie about life and creation, procreation and causes of procreation, death and causes of death,
constitutionality and human rights, perverting faith, reason, maturity and ethics.
They do not provide political education about possible misuses of power to the general public.
They do not activate the public authorities against human rights violations of mass rape and murder.
They do not help a single victim with advice, a doctor or a lawyer.
▫ They attack often in collaboration with government and foreign agencies any hostile person or group.
▫ They strive for break throughs in fornication, their executioners sodomizing their targets to death most-
ly in psychological terror under the perversity label of emergency help for the victims.
6) Power Plots
We make a profit from our labors.
We employ our knowledge and skills,
Recruiting into our corporation,
Institutionalizing our social system,
Prospering: Le système, c'est moi.
We surf with the crest of waves.
We enjoy unscatheable privileges,
Owing the media with her stories,
Blue collars don't have any say,
Spelling out: La réalité, c'est plaisir.
Where shall we march from here?
Where to shall we turn our attention?
Persecute them and their children,
Letting everything hang out below,
Deciding: Liberté toujours.
Hit teams work with clandestine sciences,
Turning their attention to monies earned,
Poisoning slowly their eat, drink and wear,
Stealing their perverse self, life and future,
Confirming: Unité de la gênealité.
Our trickeries are our Achilles heels.
Sparrows in droves jostle on rooftops,
Call with the voices of the slaughtered.
We have no place to go,
But to run for the ropes.
9a) Hegemonic policies
The Global Players of the Industrialized Nations, a coalition of the larger Third World Countries and the
Private, Independent Defence Leagues act out of lower power instinct, the most devastating archaic
notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despotic perversion
social values, constitutional structures and processes. They are not capable to fill human dignity with
content, but oscillate without a base between the poles of illusion and bestiality.
9a1) Not recognized are the historic warnings of colonialism, two world wars and genocide, today as
escalating gross corruptions with modern technologies of mass destruction to lead inevitably to planetary
catastrophes, enslavement and collapse of political-social systems and self-extinction of mankind.
9a2) Instead, the governments of the 1st, 2nd and 3rd Worlds and the Private, Independent Defence
Leagues, responsible to uphold constitutionality and human rights and the people, the sovereign with
general responsibility, commit a crime against creation itself by lying about life and creation, perverting
the succession of generations, faith, reason, maturity and ethics.
9a3) Global misdevelopments, injustices and threats are eg
a2,1) Continuing famines, epidemics, inequities of life essentials, overpopulation, environmental de-
struction lead as mass effective misdevelopments to planetary catastrophes.
a2,2) Continuing exploitation, polarization of wealth, human rights violations lead as mass effective
power tools to refugee streams, terrorism, mass murder, war and destruction of social fabrics.
a2,3) Threatened is a 'human hand directed evolution' to transform man into a cloned cyborg-chimera
with augmented capabilities by programmable electro-magnetic-mechanical-bio-chemical-genetic means.
a2,4) Threatened is by military ABC overkill build-up eradication of life on earth ten or more times over.
Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision and guide, man can have.
9b1) Based on human dignity, all universal framework and object values branch out from it.
Its scaled up intent is to expand sound theology’s, maturity’s, reason’s and ethic's freedoms.
Its long term intent is to project a spiritual hope with a real prospect into cosmic dimensions.
9b2) Ethics' task is to solve cases of gross corruption with disastrous consequences, that not a major
criminal potential runs to its self-destructive end.
Methods are problem/conflict solving by language, enlightenment, laws and supervision.
They overcome with spiritual-political-social will any hostile, inhibiting factor.
9b3) It is the right of the people to correct misdevelopments, leading to planetary catastrophes and in-
justices, leading to political enslavement and collapses and to reverse a clandestine or open constitu-
tional revolution and to institute a new government with the principle of constitutionality to draw power
out of political-social life.
9c) The standard for local actions is transposed to cosmic dimensions (Gen 18,19 TNIV):
For I have chosen him, so that he will direct his children and his household after him
to keep the way of the Lord by doing what is right and just,
so that the Lord will bring about for Abraham what he has promised him.
PDF Printout 19 Home