PDF Printout			      Home
Udo Frentzen
Benfleet Str. 13
50858 Köln   Germany
Version 2019

					Open Letter

   about misuses of modern biological, chemical, genetic, radiation and nano-technologies.

Dear Madam, Sir,

I write to inform you about global misuses of modern biological, chemical, genetic, radiation and nano-
technologies. They are employed by security agencies of the Major Powers, a coalition of Third World 
Countries and Private, Independent Defence Leagues in a clandestine, dirty B-C-G-R-N war.

The present state of micro B-C-G-R-N weapon technology with industrial production and systematic area 
covering employment of non-genetic toxins has realized electro-magnetic-bio-chemical programming of 
political-social profiles of more than a billion people of all groups of society a year worldwide.

1) Projects Page 2
2) Political Constellation 3
3) Enforcement Concepts 4
4) Command Centers 5
5) Third World Countries 6
6) Private, Independent Defence Leagues 6
7) Global System of Labor Camps 6
with misuses of genetics 14
8) Power Plots 18
9) Prospects 19
PDF Printout 1 Home

					1) Projects

The US CIA investigates from its formation on systematically naturally found venoms and synthesized 
toxins for their incisive effects on the human body, drawing on research in Europe from before WW I - II, 
in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-medical experi-
ments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to press ahead 
with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, groups and 
entire populations. They synthesized in their bio-chem labs new classes of toxins to manipulate psycho-
logical and physiological functions. Radiation weapons are developed in their physical-bio-chem labs to 
manipulate climate, equipment, psychological and physiological functions.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies 
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-
chem-gen weapons of mass destruction.

1a) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of 
the central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic 
fields in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical 
processes, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric 
and sexual behavior.

1b) The genome
Another large scale project researches structures and mechanisms of the human genome in intentional 
misapplication of mutagenic, hybridization and recombinant DNA technologies to cause with incisions 
into the genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up 
the construction of the first 'biological bomb' for peace time employment of gene altering agents in graded 
to blanket mass poisoning of food and water supplies as well as target and mass poisoning of home and 
foreign populations for control of individual psychological, physiological and genetic processes and mass 
manipulation of population groups and over regions over the sum of all single catalogued, G-pellet pre-
pared targets.
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man 
as a product of natural evolution into a cloned cyborg-chimera with programmable, augmented capabili-
ties by electro-magnetic-mechanical and bio-chemical-genetic means.

1c) N-weapons
Developed are N-weapons, utilizing nano-sciences and -technologies in mechano-syntheses to enhance 
analytics, solid, liquid, gas and plasma materials, miniaturization, performance, safety and handling. 
Since the 80s, employed are nano-machines and placed as programmable nano-robots in body tissue to 
manipulate their anatomy, morphology, physiology and environment and with it the level of functional 


2a) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and 
Russia advanced to superpowers of a new world order over war and peace in possession of atomic 
weapons, the US since 1945, the USSR since 1947. They extended the imperial policies of the 19th into 
the 20th century for profit and control of global power structures and extended their war objectives be-
yond the capitulation of the fascists towards political-ideological block formation with satellite states, new 
borders and spheres of influence, free access to resources, advantageous international division of labor 
and terms of trade. WW II lead without a peace treaty in a poisoned atmosphere to the Cold War up to 
1989. The NATO was founded on 04. 04. 1949 and the Warsaw Pact on 05. 05. 1955.
The US leadership transformed the political-social character of their country corruptively along secret 
policy goals into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax 
Americana, while formally adhering to a constitutional democracy, human rights and freedoms.

2b) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, pro-
paganda, block formation, arms, space, geo-political-social structures, resources, sciences, technolo-
gies, applications, trade, corruption and fornication. Cold War objectives of propaganda and military 
battlefields spread beyond religion and culture to all fields to dominate especially the information tech-
nologies and life sciences with anthropology, psychology, sociology, medicine, biology, zoology, bio-
chemistry, electro-biology, genetics and also ecology and climate. All professional and non-professional 
fields were tied into hegemonic competition and all means allowed except direct employment of A-
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with 
overkill ABC weapons and aggressive security R&D programs with technological superiority.

2c) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions, 
foundations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA, 
NSA, FBI, DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the 
National Security Act of 1947 with the CIA, drawing out global power lines for home based pre-
dominance in all military fields with foreign sided dependencies and also secret policy goals to cover all 
civilian domains, the political-legal-social-spiritual-scientific-technological-economic structures and pro-
cesses by social programming with eg worldwide control over larger R&D programs and high tech appli-
cations, surveillance, false fronts, control of public media, manipulation of individual psychological 
profiles und beyond of demographic structures of entire populations.
They are authorized by executive order hypocritically under the label 'security', though they realize a 
clandestine revolution in violation against the consent of the governed, constitutional standards and 
international conventions: Looming charges against the responsible parties of this despotic perversion 
are eg massive human rights violations, seditious conspiracy and treason.


					3) Enforcement Concepts

Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite 
states and are carried by infiltration over to the clients of ideologically opposite camps.

3a) Security planning receives priority over general national as well as international public interests of the 
Community of Nations. The security apparatus is justified by public relation campaigns, lobbying con-
tacts, institutionalized relations and supportive diplomatic networks like transatlantic and -pacific partner-
ships for collaborative co-ordination of interests.

3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only 
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, - 
not the mobilization of the masses for political-social actions.
The traditional goals of military forces to successfully invade a foreign country and of intelligence ser-
vices to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and 
1963 in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without 
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy 
goals, operations, methods, installations, equipment, data banks and image.
A global surveillance/communication system with satellites, ground receiver stations, interception of 
data high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with 
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitu-
tional framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media', 
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Protection of assets
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total 
secrecy and unaccountably, their agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting 
out from public opinion any ideologically non-acceptable statements. An intelligence review panel has 
power over life and death.

3c) Technologies are seen as the 'key to power' in the 21st century.
They are the practical tools of the operational arms. US/NATO research panels of the military and secu-
rity agencies like the Defence Advanced Research Projects (DARP) develop the arsenal of compact 
weapon architectures over the spectrum of conflicts out of an array of large scale research, de-
velopment, test and employment programs, which are offered, awarded, tested, set up for operation, 
departmentalized and institutionalized. Weaponizing of modern technologies is to hit progressively easi-
er, faster, severer, more precise, be more effectively guided and shielded than foregone ones and to ex-
haust human-material, scientific-technological capabilities in space, air, at sea, land from single to large 
scale, non-lethal to lethal, intercepting to retaliating tools and in cyberspace from data scanning to misin-
forming to infra-structure crippling hacks, mainly in misuses of physics, chemistry, biology, genetics, 
medicine and computer science. They corrupt as totalitarian tools in first line human living environments, 
where it cannot be perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of 
research, testing and employment with command centers and a system of labor camps. Developed are 
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like 
contaminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radia-
tion and neurologically coded misinformation.


					4) Command Centers

4a) Organization
The intelligence-security agencies of the Western Powers, eg the USSS/DoD/CIA/NSA/FBI/DHS, the 
British MI 5-6, the French DGSE and the German BND/MAD/AVS have set up their command centers 
within security bases of NATO countries to enforce the secret policy goals according to their intelligence 
agreements in division of labor by region, social group and field. Military intelligence controls military 
personal and within the population groups like anti-war activists and draft dodgers. Non-military govern-
ment security controls federal, state and city employees and within the population all groups, perceived 
as dissidents like sympathizers of opposite ideological camps. Security agencies of industrial ssocia-
tions control white and blue collar workers and within the population work and consume conform behav-
The US Special Operational Command (SOC), formed 1987 at the MacDill AFB FL with a number of sub-
centers, is tied into a global satellite surveillance/communication system with data retrieval and evalua-
tion and supervises research, testing, production, procurement and employment of micro B-C-G-R-N 
weapons/equipment, the toxins, delivery and set off systems, the training of special forces in tactics, 
techniques and operations and the personnel of single agents, teams, networks and fronts.

4b) Poison pellets
Poison dispensers in form of microscopically tiny pellets, containing toxins in gelatin skin or foil, a micro-
chip, receiver, emitter and a nano-robot as well as tiny listening and video devices and bio-chemical-
electrical-thermal-genetic sensors are produced in microchip precision engineering by the millions. As 
depot poison pellets they are implanted directly or placed on a carrier like an unknowing person or any 
object of daily use or a drink water reservoir or any stage of the food chain or a space based gliding 
capsule - flying drone device to be guided electronically into the vicinity of the target. They can be spun 
off several times out of multiple layers of equally tiny, hair like pneumatic guns with an effective range of 
about 30 feet to be shot into the skin of the target. After activation they operate maintenance free for 
years, while their batteries recharge by body movements. Nobots, programmable, mechanical nano-
robots, channel the pellets into site specific body tissue. They are applied single and massive, concen-
trated and blanket, random and selective, narrow and wide, scattered and systematic, limited and open 
ended, in closed and open mediums, contained and epidemic, preparatory and acute. The gelatin mem-
brane dissolves in body fluid, a foil membrane is opened electronically, time locked, by a preprogrammed 
code signal or sound or voice or within the body toxin concentration or neurological process recognition.



					5) Third World Countries

The larger and the majority of smaller Third World Countries formed a coalition and initiated, supported 
by Russia, an in depth investigation of the intelligence agencies of the Western Atomic Powers and 
NATO, Japan, Germany, Israel and eg Saudi Arabia. Their goals branch out widely:
5a) Information about the developmental status of B-C-G-R-N micro weapon systems.
5b) Protection against threats from B-C-G-R-N micro weapons.
5c) Predominance with global employment of B-C-G-R-N micro weapons.
5d) Political-military-social counter-leverage against the Western Powers.
5e) Suppression of any attempt towards publication of undercover operations.
5f) Revenge for torture, murder and 500 years of dehumanizing treatment.
5g) Indignation to lay waste depraved political-social leadership.
In all, they copy the Major Powers’ system of labor camps.

					6) Private, Independent Defence Leagues

6a) Victim associations
Several victim associations and self-help groups, calling themselves targeted individuals (TIs), organize 
themselves in alternate media, mostly the WorldWideWeb, conduct information campaigns about live 
tests of military-intelligence B-C-G-R-N research projects, writing to eg government offices, legislatures, 
the press, medical associations, handing in petitions and law suits at the responsible government offices 
for violations of rights to life, health and liberty by deliberate assault on non-combatants. There they are 
altogether ignored, turned down, send to psychiatric treatment, put under surveillance, infiltrated, instru-
mentalized as false fronts and neutralized in labor camps. They are hardly supported by established 
caritas organizations.
6b) Defence leagues
Private, independent defence leagues spring up mostly as smaller parties out of individual security con-
cerns, organize themselves for collective protection and are, driven by spreading awareness of micro 
weapon operations, continuously multiplying beyond several thousand groups worldwide. They investi-
gate parallel to the Third World Countries the security-intelligence services first of their local region, then 
successively of their home country and neighboring states. Their operational interests unfold like those of 
the Third World Countries into information, protection, predominance, counter-leverage, total secrecy, 
revenge and indignation. They arm themselves with surveillance/communication systems, stolen equip-
ment, plundered stockpiles, copied operational know-how and recruit their own undercover hit teams.
In all, they copy the Major Powers’ system of labor camps.

					7) Global System of Labor Camps

Camp guards are employed as spot, walk by, stalk, decoy and hit teams.
7a) Surveillance camps: spies record for information control the data flow in its entirety worldwide.
7b) Deception camps: multi media presents a Potemkin village.
7c) Extermination camps: executioners eliminate more than one thousand people a year.
7d) Gas chambers: hit teams spray with nerve gases thousands of people a year.
7e) Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
7f) Harassment camps: Intelligence trainees strike down on millions of people a year.
7g) Sadism and sodomy camps: hit teams execute a billion druggings a year.
7h) Behavior manipulation camps: hit teams mass drug millions of people a year.
7i) Client camps: agents commit gross human rights violations around the world.
7j) Dissection camps: hit teams test new toxins on millions of people a year.
7k) Genetic manipulation camps: hit teams test genetic toxins on thousands of people a year.
7l) Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge them-
selves for bestialities of the Super Powers.


7a) Surveillance camps
Goal is total information control by recording the data flow in its entirety worldwide.
To be penetrated are foremost foreign military and security services, terrorist organizations, political-
legal-scientific-commercial-financial-social communication systems and then populations at large.
To be gained are precise, reliable, up to date information for project planning and supervision.
To be shielded by an early warning system are all intelligence assets: personnel, policy goals, technolo-
gies, installations, equipment, methods and operations.
7a1) Intercepted are land/sea based cable and air bound radio traffic.
7a2) Plugged into are public and work places, buildings, equipment and households.
7a3) Wired up are individuals. Technical steps are identification, marking, connecting, tracking, data 
transmission, collection, storage and evaluation.
Every person is wired up with multi-sensor chips to pursue him in all his prayers, travels, intellectual, 
professional and social activities throughout all phases of the day from his childhood to his demise.
The chips with electro-magnetic-acoustic-thermal-biological-chemical-genetic sensors and radio emitters 
are placed cell specific into the body, the scull and all cortexes of the brain, eg the visual, hearing, smell-
ing, tasting, language, mental processing, emotion and motoric regions to record neurological processes 
as coded EEG brain wave patterns with sensual perceptions, thoughts, memories, moods and are also 
placed along nerve strands and their axons to other organs, glands, muscles, skin, digestive tract, male 
or female reproductive system to record physiological processes.
Genetic fingerprints list the complete gene sequences of the chromosomes. They are read by a micro-
chip, whose tweezers pick out tiny strings of DNA and insert them into an ultra slender channel, etched 
on the plastic chip with tiny electrodes to detect along the serpentine genetic macromolecule the code's 
chemical letters. Established are the identity of the person with his hereditary dispositions, genetically 
determined diseases, genetic factors of the phenotype, especially in development and differentiation of 
the brain with inclination towards various intellectual fields.
7a4) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from 
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for communication, weather, navigation, exploration, 
surface imaging, tapping of resources, reconnaissance and surveillance. In the US they are launched 
from Cape Kennedy FL or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year busi-
ness, led by eg Lockheed, General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Air-
craft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
7a4) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from 
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for exploration, weather, communication, navigation, 
surface imaging, reconnaissance and surveillance. In the US they are launched from Cape Kennedy FL 
or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year business, led by eg Lockheed, 
General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Aircraft, Rockwell International, 
Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
There are several hundred US spy satellites in orbit largely under direction of the US Global Strategic 
Command (USGSC), its National Space Center located at Offutt AFB NE and developed in charge of the 
Advanced Research Projects Agency (ARPA), an arm of the Pentagon.
7a5) The intercepted and space derived data are collected mostly by the DoD, CIA, FBI, DHS and NSA, 
which was founded under direction of the DoD 1952 at Crypto City, Fort Meade MA with branches in 
NATO countries together with the US Cyber Command and Central Security Services. The NSA employs 
over 50 000 administrators, scientists, technicians, analysts and operatives, utilizing supercomputers 
with arrays of modules, nano-technology, artificial intelligence and very high speed integrated circuits, 
processing more than a quadrillion (1024) calculations/sec to handle the global electronic data flow. Like 
Big Data in the professional fields, big in volume, velocity, variety, validity and actuality, they are inter-
cepted, collected, stored, deciphered, translated, screened, evaluated, presented and distributed. Fur-
ther processing like analysis or manipulation increases their commercial or security value through eg 
personal profile generation, technology development, process optimization, trend analysis and as data 
bases for service providers.
7a6) Spin offs of scientific-technological knowledge are sold mostly in the fields of security and law en-
forcement, corporate and private research, medicine, communication, industrial production, traffic and 


7b) Deception camps
Presented is a Potemkin village, inviting onto a wide green field of opportunities.
Political-legal-social framework, political-scientific-technological-social education and the present agenda 
of issues are largely shaped by the powers of government, public education, public media and direct 
intervention by the security agencies. Most visible is the public press with press agencies, publishing 
houses, TV, radio, newspapers, magazines, journals and books to reach everyone at home, at school, 
at work and in his spare time.
7b1) Political-legal-social framework
   b1,1) Suggested are
   ◦ Constitutionality with guaranteed basic human rights.
   ◦ Democratic means of conflict solving.
   ◦ Solidarity, fairness, sound traditions and political correctness.
   b1,2) Provided are
   ◦ Non-realizable basic human rights.
   ◦ Non-information and -supervision about possible misuses by positions of power.
7b2) Political-scientific-technological-social education
   b2,1) Suggested are
   ◦ Communication of scientific-technological-social knowledge and skills by the educational system.
   ◦ Participation of all citizens with their knowledge in public democratic processes.
   b2,2) Provided are
   ◦ Illusions of human capabilities and convenience to go faster, higher, bigger, easier and better.
   ◦ Satisfaction of the population as consuming, non-questioning, -probing, -knowing assenter to remain
     bare of convictions, ethics, reason, maturity and life experience with legal means of defence.
   ◦ Not addressing political-social intentions, conceptions and backgrounds as after the attack on the
     Twin-Towers 9/11 2001, which was allowed to proceed for justification of the anti-terror war.
7b3) Present agenda of issues
   b3,1) Suggested are
   ◦ Up to date, objective, non-partisan information by the public press.
   ◦ Public discussion of the present day agenda of practical and theoretical tasks.
   b3,2) Provided are
   ◦ Reduction of the niveau of mass media below that of politically substantial contributions.
   ◦ Minimalization of sensitive issues like uncertainties, risks and dangers.
   ◦ Amelioration of negative issues, eg a war overseas is seen as a local intervention.
   ◦ Sidetracking of critical issues by public relation campaigns and misinformation.
   ◦ Pushing to the outskirts the misery and death of millions of people through hunger, catastrophes,
     epidemics, exploitation, expulsion, human rights violations, war and mass murder
7b4) Security interventions are eg
   ◦ Corruption of regulating, supervising, controlling and inspecting authorities.
   ◦ Discrediting of government adverse political-social leaderships.
   ◦ Suppression of moral voices with national and international renown.
   ◦ Cut out of any arising attempt towards publication of a victim's medical and legal evidence.
   ◦ Elimination of whistleblowers, critics of system/security and dissidents.
7b5) Immediate consequences are
   b5,1) Expectations for the improvement of the human lot remain superficial.
   b5,2) Gone is the informed citizen, who thinks independently over the full spectrum of his mind.
   b5,3) The psychological underpinnings of society have become polished formalism, stupor, disorienta-
   tion, distrust, paranoia, hypocrisy, cynicism and burned in human rights abuses.
   b5,4) Contorted are historic records, which are to reflect the achievements and failures of the times.


7c) Extermination camps
There is not one security service of a major power that does not have its killing fields.
7c1) The military security department of NATO operates an assassination squad to eliminate terrorists, 
who are intercepted in preparations, foreign agents, who penetrate security areas, traitors, who sell se-
curity information, deserters, who are caught up with behind hostile lines, security risks, who threaten to 
impair essential assets, left behind scientists from shut down projects and critics, who become a formi-
dable voice in public.
7c2) The assassinations are priority operations, well organized and quiet. A small intelligence court 
reviews the evidence, the target is pumped up with depot poison pellets, electronically marked, send to 
a remote area or a longer journey is waited for, death follows in an accident or break down, the death 
certificate cites an apparently natural cause of death. Where isolation is not possible, it is discredited, 
demonized and eliminated over time by a terminal disease like cancer.
7c3) Uncovered foreign operatives and own double agents are eg by NATO hit teams tortured to death. 
Nazi concentration camp butchers hung up their victims at back-wards crossed arms over a wall urinal in 
a basement of a remote station to be tortured by mechanical and toxic means until their human body was 
totally disfigured and finally dead, when all body fluids had stopped dripping.
NATO butchers detain their victims at undisclosed prisons to be tortured or 2 – 8 days by electrical, ra-
diative and bio-chemical-genetic means, eg CIA psycho and sodomy drugs, until their human body and 
mind are totally disfigured and finally dead, when all brain activities have ceased.

7d) Gas chambers
For gas chambers targeted are mainly people, working with the mind and propagating system non-
conform messages like the leadership of an opposite ideological movement, dissenting journalists, 
lawyers, doctors, scientists and artists.
7d1) Military nerve gases attack the central nervous system in specific functions like wake awareness, 
memory, concentration, reaction, coordination and balance, the peripheral nervous system with loss of 
physical power, endurance, flexibility, agility and sensitivity.
7d2) Industrial toxic gases often are carcinogens, reducing first the pulmonary system, then other physi-
ological functions and inducing in the long run tumorous growth.
7d3) In debasement of the dignity of man and his mind, crippled are intellectual and physical strengths 
to the point of disability to perform tasks of every day life.
7d4) From cartridges gassed are entire streets, buildings, trains, busses, cars, assembly halls and swim-
ming pools. Nerve gas pellets are attached to any object of daily use like packaging, newspapers, books, 
clothing and tools, the set off signal is timed for maximum toxic concentration at time of expo-sure. The 
target's home is laced mostly with by odor imperceptible dosages for long term effects, if not the bed-
room itself is used as death chamber. H. Kohl and B. Netanjahu operated gas chambers in churches and 
at sites near to former Nazi concentration camps.


7e) Radiation camps
Radiation camps entrap mostly insurgents, fugitives, secret bearers and serve as secret prisons for ter-
rorists and undesirables. They manipulate individuals, groups and populations up to programmable 
cyborgs and also climate and equipment.
7e1) Radiation devices
   e1,1) Radiation devices have been developed since before WW II for civilian and military applications 
   and are common today in all professional fields from astronomy to food preparation. US Military re-
   search has utilized several thousand civilian patents and covered them under the US Inventions Se-
   crecy Act.
   e1,2) R weapons utilize the energy flow of spherical waves and directed, concentrated beams. Lasers 
   radiate light and heat, speakers acoustic waves, antennas electro-magnetic photon-waves and accel-
   erators of atomic/subatomic particles eg α-, β-, γ-radiation. They are adjusted in direction, focal point, 
   cross section, intensity, wavelength, frequency, duration and pulse pattern in combinations.
   e1,3) R-Guns are mostly compact and reach any open place wirelessly to hit precisely with and with-
   out implant, non-lethal to lethal over large distances with the speed of light.
   However, they are heavy on equipment, infra-structure, manpower, energy consumption and cannot 
   be miniaturized all around as tracelessly as the more universal B-C-G-N micro- and nano-devices.
7e2) Individual targets
   e2,1) Any person can be anywhere telemetrically spot pointed, identified, tracked, brain linked, read
   and manipulated without a mark on the body.
   e2,2) Radiation of low to extremely low frequencies under 50 Hz with neurologically coded firing pat-	
   terns stimulate, alter or depress the bio-electro-magnetic fields and processes of cell tissues to cause 
   health complications from nausea to heart attack and psychological disorders from depression to 
   break down and neurological disfunctions from altered consciousness to forced behavior and memory 
   incisions from accurate recollection to total loss.
   e2,3) A psychotronic R-weapon restrains a target within a hyperprison to be psychologically robotized.
   e2,4) Brain to computer linkage via a MEG - Neurophone bypasses the senses to allow real time two 
   way physiological communication of informing as well as misinforming noises, words, images and 
   thoughts. It accelerates in common military praxis the ground station - pilot observation, communica-
   tion and reaction times.
7e3) Group and population targets
Crowds can be non-bodily, non-lethally manipulated to cause eg sedation/incitement in riot con-
trol/fabrication. Insurgents can be disoriented and blocked in their motor controls by area covering l
aser scans in barrier and invasion warfare.
7e4) Cyborg
A Cyborg is a trans-human biological-technical blend and has a micro-chip implanted in the central nerv-
ous system as a neuro-biological - data processing interface. It allows eg movement of a prostheses in 
compensation of a lost limb or augmentation or reduction in the level of a physiological function.
Individual or a groups or populations of cyborgs can be area covering bio-electro-magnetically pro-
grammed in their health, capabilities, intellectual activities, convictions and behavior.
7e5) Climate
High energy radiation in excess of trillions of W/sec can alter layers of the atmosphere to disrupt radio 
communication, break shielding against cosmic winds, generate harmful compunds, reflect back to earth 
and trigger earth-weather catastrophes. A geo-engineering research station has been set up at eg Ga-
kona AK under the High Frequency Active Auroral Research Project (HAARP).
7e6) Equipment
Stationary and mobile objects can be spotted, identified, tracked and measured.
Electronic equipment can be read at all data input, processing and output points and programmed.
Entire systems can be manipulated, disrupted, shut down, burnt out, molten and pulverized.


7f) Harassment camps
Selected targets for a camp are put under surveillance to enter it through the front yard of harassment.
Trainees of intelligence services acquire here the techniques to strike down on their victims.
Surveillance is executed 24/7/52 a year in all areas of life to engineer stress events.
With covert entry follow physical damage, tempering with records, theft and contamination.
With street theater follow stalking, blocking, mobbing and run around at the authorities.
As extra judicial measures follow deception, fraud, entrapment, wrongful commitment to a mental insti-
tution, judicial paternalism, unlawful arrest and denial of charitable, medical, police and legal help.

7g) Labor camps of sadism and sodomy
Targeted for labor camps of sadism and sodomy to be sifted out are people of faith, conviction, culture 
and achievements, activists of political-social movements like human rights workers in defence of un-
popular causes, environment and animal rights campaigners, violence pillorying pacifists, critical voices 
of system, market and the press, radical groups of minorities, bloggers of alternate media, drop outs from 
the rat race, defectors from opposite ideological camps and soldiers, who object out of second thoughts.
7g1) There is not a psychic or physical function in the body that cannot be electro-magnetic-bio-che-
mically manipulated to be stimulated and boosted, supported and stabilized,  sensibilized and broadened, 
narrowed and worn out, relaxed and dampened, disrupted and distorted:
 ▫ Chemical rape at any place and time reduces by blocking agents the target's level of mental and physi-	
   cal capabilities, which are then eclipsed by a variety of sodomy drugs to manipulate in succession 	
   sexual drive, erotic sensations, emotions, sensibility of genital parts, secretion of sweat glands, speed, 	
   endurance, exhaustion, sleep, dream and hang-over.
   Erotic stimulants are often individually designed according to previously taken brain wave patterns and 
   are added by induced pornographic images to incite perversities.
   The offspring is being monitored in its further development.
 ▫ Induced physiological impairments are eg drop-in-your-tracks fatigue, myocardial insufficiency, 
   back and muscle pains, restriction of motion, sleep disruption, hyper-stress, total relaxation and 
   accelerated aging.
 ▫ Induced emotional states range from anticipation to saturation, blind hope to despair, elation to anger, 	
   boldness to fear, overconfidence to diffidence, concern to indifference, hypersensitivity to insensitivity.
   A 'joy of death frenzy' can supplant every agony of torture.
 ▫ Induced mental distortions affect consciousness, intention, conception, memory and operations to the 	
   point of dysfunction with non-resistance against adversities, hardships and threats. Specific functions 	
   ike abstract reasoning, language, computation, logic and specific mental interests can be crippled. 
   Stimulation towards 'blasphemy of the Holy Spirit' is achieved by boosters of fixed, eccentric theolo-	
   gical themes and a desire to communicate.
 ▫ In long term mental-psychological terror several neurological processes are periodically stimulated to 	
   extremes, eg seizure, hallucination or delirium, not to allow any recuperating relaxation times.
 ▫ In all the target's personal development, identity and character, especially its political-ethical stand-	
   ards, are worn down, debased and suffocated in the suds of prostitution to cause traumatization, irra-	
   tional behavior, self-destructive habits, which then run on to total personality collapse.
   The victim, often with a depot poison pellet exacerbated preexisting disease, induced sterilization and 	
   creeping ailment like tumorous growth in the genitals, is blocked in its professional work, socially iso-	
   lated, disenfranchised, severed from welfare-family safety nets and diagnosed with a mental illness.
   It is forced into suicide or to die on the streets.
7g2) Hit teams mass drug with depot poison pellets for years entire water and food supplies from the 
start of the food chain to the selected target, at the reservoirs, agricultural producers, suppliers, food 
processors, wholesalers, supermarkets, restaurants, in transport via repackaging-resealing facilities and 
in the target's home.
Contaminated with toxins, taken up with skin contact, are objects of daily use like magazines, books, tex-
tiles, tools, first aid supplies, hygiene articles and dryers.
7g3) Labor camps of sadism and sodomy have been set up around the whole world and have blanketed 
in mass applications entire regions, ethnic groups and political-social fractions with sodomy drugs. Eg 
US stay behind forces in occupied territories as in Germany after WW II (1945) have systematically tar-
geted anti US/Cold War - pro disarmament activists.


7h) Labor camps of behavior manipulation
Targeted for labor camps of behavior manipulation are mostly political-socially non-conform skilled peo-
ple of all fields for their independence of mind, asperity of manner, eccentricity and pursuit of alternate 
ways in life and the population at large.
7h1) On the first level individual behavior is suppressed or stimulated in its elementary physical needs, in 
exercise, relaxation and sleep requirements, appetite and thirst, hygiene and beauty care.
7h2) On the second level the emotional state is manipulated from thrift to the urge to go shopping and 
from stress, anger, frustration to the desire to achieve social recognition up to power madness.
7h3) On the third level the motivation is capped to listlessness and lethargy or boosted into over-ambition 
and go-on efforts in face of failure.
7h4) On the forth level intellectual interests are selectively dampened or stimulated, while ethical aware-
ness and inhibition is dampened down to the point of unscrupulousness.
7h5) Communicative and social competences like cooperation in teams and hierarchical structures are 
manipulated out of the emotional state from diffidence to hostility, out of motivation from dropping out 
to intriguing and through inducement of unrest, nervousness, stammering or trembling.
7h6) In all the target's physical and metal fitness, personal development, education, professional and 
social careers are predetermined.
7h7) The toxins are administered mostly from depot poison pellets in small dosages over longer periods 
to form out unconsciously habitual self-sustaining or -destructing behavior patterns. Eg Exxon stabilizes 
plant employees and their families for long term productive, reliable job performance.

7i) Client camps
Client camps of subversion, corruption and control are set up in foreign countries.
7i1) The Major Powers’ intelligence agencies realize their foreign policy goal of block building for global 
dominance  and control first within their client states, also those regarded as time proven political part-
ners. Their roles are to provide support for political-military defence and interventions and to open mar-
kets for advantageous international division of labor with free access to man power, raw materials and 
half-finished goods, while home markets are protected by hurdles of eg advanced technologies and their 
patents, infra-structure, finance and professional standards. They are not to develop vital scientific, tech-
nological, economic and financial fields of their own. Foreign aid projects largely flow back home, eg 86% 
of the US EXIM Bank's $7.7 billion new foreign export credits in 2000 went to 10 larger US companies.
7i2) The model is expanded geo-politically to non-client states to achieve global dominance by one's own 
superiority with determination, resources, mass, size, means, diversity and reserves. The intelligence, 
counter- intelligence and security agencies are scaled up to the required size to realize their directives 
and if necessary hiked up. 
7i3) Methods of subversion and corruption are eg
 ▫ The first tool always is the covered operation in all hazard areas with research, detection, identifica-
   tion, tracking, gaining of access, securing, recovery, retreat, exploitation and if necessary mitigation 
   and neutralization.
 ▫ Surveillance by a global satellite communication system.
 ▫ Infiltration of the political-social structure by contacts with recruitment, counselling, disinformation,
   forgery, theft, bribery, extortion, prostitution, financial sponsoring and partnerships.
 ▫ Sold are proprietary information, low cost credits, logistical supplies, user rights, telecommunication 
   systems, special technologies, bio-, chem- and rad-tech weapons.
 ▫ Rented are grounds for air bases and training camps.
 ▫ Fragmentation of political alliances.
 ▫ Permanent excessive indebtedness.
 ▫ Incitement to civil strife.
 ▫ Profit from their wars.
 ▫ Manipulation of the public press.
 ▫ Pacification of moral institutions.
 ▫ Distortion of social fabrics.
 ▫ Wash out of cultural identity.
 ▫ A system of labor camps controls the broad base of the population.


7j) Dissection camps
Caught in dissection camps to serve as guinea pigs for non-consensual, covert, illegal pseudo-medical 
life experiments for the development of B-C-G-R-N weapon systems, often with deterring, degrading 
torture, are terrorist suspects, captured freedom fighters, prisoners in undisclosed detention centers, 
prisoners in civilian jails, convicted of a heinous crime, tenacious dissidents for punitive action, the vul-
nerable like civilians in war torn regions, minorities in underdeveloped regions, suicidal persons, mental 
patients, the dying in nursing homes and intensive care wards, people considered to be expendable like 
estranged, uprooted, isolated, long term jobless, homeless and lone fighting individuals.
The CIA selected also targets from their childhood on at manipulable, closed social environments like 
cults, sects, lodges, churches, foreign partisan groups and training camps.
7j1) Tests
Test series on R guns and bio-chem-genetic toxins for a worth analysis are conducted in the laboratory 
and training area with modeling, simulation, war games and also for combat exposure in life tests to 
collect representative samples from a population at large at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed 
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psy-
chologic latent, present and long term effects over a wide spectrum, eg affected function and tissue, 
degree of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining 
factors, counter-poisons, recuperation times, measurability, visibility and traceability.
The data are send directly form the target via microchip sensor, emitter, amplifier and satellite to the high 
capacity computers at the agency's command center for evaluation by the R&D team.
7j2) Evaluation
Active warfare agents undergo a comprehensive military worth analysis according to present and desired 
performance standards in their bio-chemical-genetic components, production, safety precautions, han-
dling, training, weapon concept, equipment, infra-structure, cover, costs, target vulnerability, operational 
engagement, mission accomplishment and plausible deniability.
Employment ready weapon systems are handed over to the operative command structure of the armed 
7j3) Legal situation
The Common Rule, safeguarding against experimenting on the public without their consent in the US, al-
lows for non-consensual experimentation by intelligence agencies.
US DoD Directive 5240 1.R saved 882013, Ch 4, Procedure 13 says: 'Experimentation is allowed on hu-
man subjects for intelligence purposes.'
The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
7j4) Public investigations
Past public investigations revealed pseudo-medical experimentation at eg the San Antonio AFB TX, the 
Army Special Forces Center NC, the Los Alamos National Laboratory NM and private institutions in 
successive sub-projects of MK Ultra, but the operations have been largely farmed out for deeper cover, 
because of sensitivity to public resistance and not to implicate the security services directly.
The CIA siphoned off funds from defrauding the government, collaboration with criminal organizations, 
weapon trading, security contractors, proprietaries, re-cycling of radioactive materials, market manipula-
tions, economic data trading and extortion.
7j5) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diagno-
sis. Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned 
down for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are 
to recover and in all cases the death certificate claims an apparently natural cause of death.
Eg the governments of France and Israel developed their nerve gas agents with test series on FLN and 
Palestinian freedom fighters, taken prisoners, - none survived and their ashes were scattered over the 


					Misuses of Genetics

7k) Genetic manipulation camps
Selected for genetic manipulation camps, a branch of dissection camps, are especially younger men and 
women from childhood into child bearing age from all classes of society, taken mostly as singular, dis-
persed, unrelated samples with accompanying psychological stabilization under deepest cover.
(About active agents, diagnostic tests and procedures are no data available here.)
7k1) International conventions
Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce them.
   k1,1) Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences hu-
   man, population, pharma, behavior genetics and gene technology. They serve life and not in inversion 
   of human dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed wea-
   pons always lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
   k1,2) The civilized world; customary international law; The Hague Land Warfare Convention (The 
   Hague 1899); the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacte-
   riological Methods of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention 
   (UN Geneva 1972) and The Chemical Weapons Convention (UN Geneva 1992) outlaw their develop-
   ment, production, stockpiling as a means of warfare and call for their disarmament.
7k2) Biological bomb
Today's Major Military Powers press ahead with the further improvement of clandestine micro B-C-G-R-N 
weapon systems to gain global predominance in the field. Set goal of the US National Security Council in 
collaboration with NATO is the construction of the first biological bomb and its peace time employ-ment. It 
is to realize control of individual behavior patterns, political-social structures and processes efficiently 
population wide, long term plannable and short term adjustable.
'Scientific rational base' is population genetics to render a group’s or population's allele composition with 
its genetic and physiological functions designable and programmable by bio-chem-technological site 
specific strain manipulations and to enable a 'human hand directed evolution of mankind'.
7k3) Design criteria of genetic weapons
   k3,1) Political goal is genetic programming of complex human behavior patterns. 
   k3,2) Military goal is the capability of single and mass applications with selection of targets, kind and 
   degree of impairments, fixing of place, time and conditions.
   k3,3) Modernization goal is increased efficiency of present state of the art techniques of behavior 
   channeling by attacking causes and not only symptoms with coverage of entire regions and population 
   groups by stable, sustainable transferal of altered genetic strains to succeeding generations and in 
   their economy by centralized supervision of a lean network of undercover operatives.
   k3,4) Economic goal is determination of economic structures and processes by individual basic needs, 
   drives and emotions, affecting the key economic parameters of eg corporate - labor force relations, net 
   domestic product by kind of economic activity, private and public investments, consump-tion expendi-
   tures, net savings, labor peace, work ethics and productivity.
   k3,5) Social goal is determination of social structures and processes, especially the professional elites 
   by manipulation of sexual behavior, motivations, traits of intellectual interests and capabilities and with 
   it personal development, education, identity, character, professional and social careers.
   k3,6) Demographic goal is channeling of the rates of still born, life birth, infant mortality, disease, disa-
   bility, invalidity, death and with it key population parameters, base of and leverage on social-economic 
   structures like population size and density, age group distribution, growth trends, health standards, 
   care, insurance and further statistics like average work years, retirement age and life expectancy.
   k3,7) Indicators of general health according to registered individual causes and external factors like 
   environmental conditions have become insignificant.


7k4) Deployment structure
   k4,1) In the first stage set up is an infra-structure of depot poison pellet delivery systems.
   It builds largely on the existing command centers of the major powers' intelligence agencies within en-
   closed security bases, enforcing the present non-genetic state of the art social programming with a 
   global telecommunication/surveillance system, procurement of equipment and toxins, operating per-
   sonell, undercover agents and data evaluating scientists. It allows for alternate delivery options
   ▫ by a commissioned agent, manually implanting or pneumatically injecting pellets.
   ▫ by an electronic guidance system, navigating pellets from water reservoirs, the food chain, locations 
     in public places or from space based gliding capsule - flying drone devices into the vicinity of the tar-
     get to be shot in.
   k4,2) The second stage realizes genetic identification, marking and tracking of every single person in 
   every country by a network of undercover agents.
   A data bank stores the personal profiles with their genetic fingerprints.
   k4,3) In the third stage every profile is by a computer program selected, scanned and matched against 
   the desired model of allele frequencies of the common gene pool and allotted a charge of gene alter-
   ing, correcting or impairing agents or toxins to form out the desired traits.
   k4,4) In the forth stage every single person is pumped up with their allotted charge, a microchip with 
   sensors and a sender/emitter, mostly bypassing surgical implantation and awareness of the victim.
   The operations are performed systematically on every foetus, youth and adult of the target group.
   k4,5) In the fifth stage an electronic guidance and set off mechanism is installed at the command 
   center similar to that of present social programming and guided drone attacks on individual targets.
   k4,6) In the sixth stage recorded, supervised and evaluated is the introduction of desired and modifica-
   tion or elimination of undesired dominant and recessive traits in the target's allele composition with a 
   decision on further steps of
   ▫ No action by adequate allele composition.
   ▫ Repeated incision by deficient allele composition.
   ▫ Target elimination by geno-deviant, 'substandard' traits.
   ▫ Mass elimination of population groups and over regions is realized over the sum of all single poison 
     pellet prepared targets.
7k5) Insertion paths
   k5,1) Transport packaging for delivery into the body of the target is by tiny poison pellets of gelatine or 
   foil skin, where the gelatine dissolves in body fluid and a foil is opened by an electronic set off mecha-
   nism. Tiny nano-robots carry the pellets to the desired body tissue.
   k5,2) Preparatory packaging of gnome altering segments into suitable genetic envelopes is by ligation, 
   covalently bonding the active passenger DNA into a passive carrier DNA strand to form a vector sys-
   tem, fusing the genetic materials into a heterologous product with defined parameters As a mobile, 
   transposable genetic element it can insert, exit or relocate into non-homologous DNA independent of 
   the host's recombinant functionality.
   As carriers serve mostly bacterial and viral envelopes: bacterial, transposable genetic elements are eg 
   IS elements (insertion sequence), TN elements (transposon), transposable phages; viral elements are 
   eg classical transposons, retroposons, alu-like sequences; with mammals polyomaviruses, vaccinia vi-
   ruses and retroviruses.
   k5,3) Within the desired body tissue, insertion of the vector system into the host chromosome for final 
   in vivo transformation is by transposition, a change of position of a transposable genetic element from 
   one site of the genetic material to another: By cutting, strand transfer, joining of ends, added by cata-
   lyzing enzymes, the passenger and carrier DNA are covalently fused into the host chromosome.
   k5,4) The gene targeting rate, the frequency of integration of an exogenously added DNA sequence 
   into the nucleus per quantity of host DNA per added sequence, depends mainly on: transfer and trans-
   position methods, homology between exogenous and host DNA, vector system, length of the inserted 
   string, accessibility of a target locus and environmental factors.


7k6) DNA technologies
Employed DNA technologies are mutation, hybridization and DNA combination
   k6,1) Mutations
   ▫ An induced ploid mutation is almost always a lethal defect, because of abnormally developing, non-
     functional cells leading to cell death, death of organism or still birth.
   ▫ An induced chromosome mutation with a change in the order of genes between two or within a chro-
     mosome by addition, elimination or rearrangement of a region results in a bio-chemical mutation, 
     leading to a replication dysfunction with loss of an entire trait out of the phenotype or to transcription 
     or translation dysfunction with growth disorders like tumorous growth.
   ▫ An induced gene mutation, a change in a base sequence of a gene, a structure or regulation chang-
     ing, amplifying or repressing, forward or backward, single or complementary (synonymous), expres-
     sive or conditional, sometimes point, also nonsense (neutral) mutation, can destroy the function of a 
     gene at the site of incision, or cause additional large scale rearrangements of adjacent DNA se-
     quences, or alter the efficiency of gene expression (gene penetrance), the degree of trait formation 
     also in growth, differentiation and final structuring of a function.
   k6,2) Hybridization
   Meiotic poisons can cause in cell division and recombination processes: partial or perfect misalign-
   ment and misassortment of chromosomes, chromosome deformation and fragmentation, cytoplasma 
   deformation, phase inhibition, cell death and sterility. Mitotic poisons affect like meiotic poisons: chro-
   mosome alignment and assortment, cell division processes, nucleic and cytoplastic morphology and in 
   consequence cell functions with phase inhibition, cell death and sterility. Aside from noxious agents, 
   hybridization is affected by heat, radiation, insertion of a function disrupting DNA strand and can lead 
   with impairment of regulatory processes to tumorous growth and death of organism.
   k6,3) DNA recombination
   In vitro manipulated targeting sequences can contain elements to manipulate genome structures and 
   genetically controlled processes in their entire spectrum: any parameter affecting gene expression, 
   leading to amplification, depression, destabilization, dysfunction, toxin production, cell death and 
   disablement of a function; any singular phase in meiotic and mitotic cell division, leading to irregular 
   chromosome assortment, chromosome deformation and fragmentation, phase inhibition, cell and cell-
   line dysfunction, cell death, sterility and malignant tumorous growth; any regulatory process of onto-
   genesis, mainly controlled by the homoeobox, leading to a change in development in timing, rate, lo-
   cation with de- and malformation of cell morphology, diverging growth and differentiation of functions, 
   causing changes in functional capacity, cell unit dysfunction, uncontrolled growth and death of organ-
7k7) Levels of Impairment
   k7,1) Death through disablement of a vital function or through a morphological malformation.
   k7,2) Disease through a temporal, local, graded manipulation of a physiological function by eg activa-
   tion, stimulation, depression, deactivation, alteration and dysfunction.
   k7,3) Change in the level of a specific physiological capacity like doping or crippling.
   k7,4) Altered growth and differentiation of a specific physiological, often neurological capacity.
   k7,5) Change in the effectiveness of medication, vaccination, diagnostics and therapy.
7k8) Overall effects
A genetic incision affects a selected trait directly, when the phenotype with a morphological or functional 
distinction is traceable to a specific hereditarily passed on genotype and the individual gene or gene 
group as functional unit is identified with its bio-synthetic pathway. With it affected are the anatomy, 
morphology and physiology of the organism and massive, population wide manipulations show first in the 
demographic structure. Genetic incisions to determine a specific trait in the public psychological profile 
gaplessly, stably, time effectively will result due to the long causal chains, large number of variables, 
interdependencies and codetermining factors in an almost irreversible shift of frame in several allele 
frequencies of the world population's gene pool with uncontrollable, catastrophic side effects.


7l) Revenge camps
7l1) The governments of the Third World Countries continue their investigations into the Major Powers' 
and Clients' military and intelligence activities and widen them out to screen all their political-social
forces, decision making elites, public and secret policy goals, social structures and processes, re-
sources, government and private security personnel and area covering single households.
   l1,1) Their political intentions remain spread out widely: information, protection, predominance, counter-
   leverage, total secrecy, revenge and indignation.
   l1,2) They strive in a loose coalition for global predominance in B-C-G-R-N micro-weapons and not for in-
   ternationally guaranteed safeguards, unleashing multiple new dangers for mankind.
   l1,3) They expand their global undercover micro-weapon operations.
   ▫ They formally tolerate foreign hostile secret policy goals, enforcement concepts, deployment struc-
     tures, weapon development, financing, political propaganda and undercover operations.
   ▫ They expand their own military-intelligence infra-structure, often drawing on scientific, technological, 
     logistic and data support from Russia.
   ▫ They expand their own global system of labor camps with a network of affiliated groups.
   ▫ They keep a close watch for early warning and protection on hostile security services and the global 
     information flow in its entirety.
   ▫ They incapacitate foreign communication systems, equipment, toxin stockpiles and delivery systems.
   ▫ They have pumped up with depot poison pellets all political, military and civic leaderships in the 
     Western Industrialized Nations, especially the personnel of their security organizations as well as the 
     activists of the Private, Independent Defence Leagues to neutralize them as security threats.
     Equally targeted are any hostile person or group or fraction of a population.
   ▫ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, to 
     impair their ability to work and to enslave them physically and psychologically.
   ▫ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and 
     present Heads of State like G. Bush Senior and Junior, B. Obama, G. Schröder and A. Merkel are be-
     ing sodomized regularly, who in a public position see no alternative but to hit back.
7l2) The Private, Independent Defence Leagues continue their investigations, starting out from house-
holds, work places, public places and electronic equipment of their local area and widen them out to 
cover the Major Powers' military and intelligence activities in their region and neighboring states.
They are growing beyond several thousand groups worldwide, recruiting themselves mostly via under-
ground channels out of various population groups and extend undercover operations into a peoples 
   l2,1) Their political intentions equally remain spread out widely: information, protection, predominance, 
   counter-leverage, total secrecy, revenge and indignation.
   l2,2) They strive often in data exchange for local and regional predominance in B-C-G-R-N micro-wea-
   pons and not for internationally guaranteed safeguards, unleashing multiple new dangers for mankind.
   l2,2) They expand their local, regional and also global undercover micro-weapon operations.
   ▫ They do not exercise constitutional oversight over positions of power according to law by the people, 
     but tolerate their secret policy goals, enforcement concepts, deployment structures, weapon develop-
     ment, financing, political propaganda and most covered operations.
   ▫ They set up their own command centers, surveillance/communication systems, steal equipment, plun-
     der stockpiles, copy operational know-how and recruit their own undercover hit teams.
   ▫ They keep a close watch for early warning and protection on hostile security services and the global 
     information flow in its entirety.
   ▫ They hypocritically pretend to clean up the misuses of modern bio-technologies, however
     They lie about life and creation, procreation and causes of procreation, death and causes of death, 
     constitutionality and human rights, perverting faith, reason, maturity and ethics.
     They do not provide political education about possible misuses of power to the general public.
     They do not activate the public authorities against human rights violations of mass rape and murder.
     They do not help a single victim with advice, a doctor or a lawyer.
   ▫ They attack often in collaboration with government and foreign agencies any hostile person or group.
   ▫ They strive for break throughs in fornication, their executioners sodomizing their targets to death most-
     ly in psychological terror under the perversity label of emergency help for the victims.


		6) Power Plots

		We make a profit from our labors.
		We employ our knowledge and skills,
		Recruiting into our corporation,
		Institutionalizing our social system,
		Prospering: Le système, c'est moi.

		We surf with the crest of waves.
		We enjoy unscatheable privileges,
		Owing the media with her stories,
		Blue collars don't have any say,
		Spelling out: La réalité, c'est plaisir.

		Where shall we march from here?
		Where to shall we turn our attention?
		Persecute them and their children,
		Letting everything hang out below,
		Deciding: Liberté toujours.

		Hit teams work with clandestine sciences,
		Turning their attention to monies earned,
		Poisoning slowly their eat, drink and wear,
		Stealing their perverse self, life and future,
		Confirming: Unité de la gênealité.

		Our trickeries are our Achilles heels.
		Sparrows in droves jostle on rooftops,
		Call with the voices of the slaughtered.
		We have no place to go,
		But to run for the ropes.


					9) Prospects

9a) Hegemonic policies
The Global Players of the Industrialized Nations, a coalition of the larger Third World Countries and the 
Private, Independent Defence Leagues act out of lower power instinct, the most devastating archaic 
notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despotic perversion 
social values, constitutional structures and processes. They are not capable to fill human dignity with 
content, but oscillate without a base between the poles of illusion and bestiality.
9a1) Not recognized are the historic warnings of colonialism, two world wars and genocide, today as 
escalating gross corruptions with modern technologies of mass destruction to lead inevitably to planetary 
catastrophes, enslavement and collapse of political-social systems and self-extinction of mankind.
9a2) Instead, the governments of the 1st, 2nd and 3rd Worlds and the Private, Independent Defence 
Leagues, responsible to uphold constitutionality and human rights and the people, the sovereign with 
general responsibility, commit a crime against creation itself by lying about life and creation, perverting 
the succession of generations, faith, reason, maturity and ethics.
9a3) Global misdevelopments, injustices and threats are eg
a2,1) Continuing famines, epidemics, inequities of life essentials, overpopulation, environmental de-
struction lead as mass effective misdevelopments to planetary catastrophes.
a2,2) Continuing exploitation, polarization of wealth, human rights violations lead as mass effective 
power tools to refugee streams, terrorism, mass murder, war and destruction of social fabrics.
a2,3) Threatened is a 'human hand directed evolution' to transform man into a cloned cyborg-chimera 
with augmented capabilities by programmable electro-magnetic-mechanical-bio-chemical-genetic means.
a2,4) Threatened is by military ABC overkill build-up eradication of life on earth ten or more times over.

9b) Constitutionality
Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision and guide, man can have.
9b1) Based on human dignity, all universal framework and object values branch out from it.
Its scaled up intent is to expand sound theology’s, maturity’s, reason’s and ethic's freedoms.
Its long term intent is to project a spiritual hope with a real prospect into cosmic dimensions.
9b2) Ethics' task is to solve cases of gross corruption with disastrous consequences, that not a major 
criminal potential runs to its self-destructive end.
Methods are problem/conflict solving by language, enlightenment, laws and supervision.
They overcome with spiritual-political-social will any hostile, inhibiting factor.
9b3) It is the right of the people to correct misdevelopments, leading to planetary catastrophes and in-
justices, leading to political enslavement and collapses and to reverse a clandestine or open constitu-
tional revolution and to institute a new government with the principle of constitutionality to draw power 
out of political-social life.

9c) The standard for local actions is transposed to cosmic dimensions (Gen 18,19 TNIV):
      For I have chosen him, so that he will direct his children and his household after him
      to keep the way of the Lord by doing what is right and just,
      so that the Lord will bring about for Abraham what he has promised him.


Udo Frentzen

		PDF Printout		19		Home