PDF Printout			      Home
    
Udo Frentzen
Benfleet Str. 13
50858 Köln   Germany
www.bio-misuses.info
Version 2021





					Open Letter

   about misuses of modern biological, chemical, genetic, radiation and nano-technologies.



Dear Madam, Sir,

I write to inform you about global misuses of modern biological, chemical, genetic, radiation and nano-
technologies. They are employed by security agencies of the Major Powers, a coalition of Third World 
Countries and Private, Independent Defence Leagues in a clandestine, dirty B-C-G-R-N war.

The present state of B-C-G-R-N micro-weapon technologies with industrial production and systematic 
area covering employment of synthesized toxins has realized electro-magnetic-bio-chemical program-
ming of political-social profiles of more than a billion people of all groups of society a year worldwide.


1) Projects Page   2
2) Political Constellation 3
3) Enforcement Concepts 4
4) Command Centers 5
5) Third World Countries 6
6) Private, Independent Defence Leagues 6
7) Global System of Labor Camps 6
with misuses of genetics 14
8) Power Plots 19
9) Prospects 20
PDF Printout 1 Home


					1) Projects

The US CIA investigates from its formation on systematically naturally found venoms and synthesized 
toxins for their incisive effects on the human body, drawing on research in Europe from before WW I - II, 
in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-medical experi-
ments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to press ahead 
with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, groups and 
entire populations. They synthesized in their bio-chem labs new classes of toxins to manipulate physiolo-
gical and psychological functions. Radiation weapons are developed in their physical-bio-chem labs to 
manipulate climate, equipment, psychological and physiological functions.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies 
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-
chem-gen weapons of mass destruction.

1a) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of 
the central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic 
fields in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical 
processes, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric 
and sexual behavior.

1b) The genome
Another large scale project researches structures and processes of the human genome in intentional mis-
application of mutagenic, hybridization and recombinant DNA technologies to cause with incisions into the 
genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up the con-
struction of the first 'biological bomb' for peace time employment of gene altering agents in graded to blan-
ket mass poisoning of food and water supplies as well as target and mass poisoning of home and foreign 
populations and over regions for control of individual genetic, physiological and psychological processes 
and political-social structures over the sum of all single catalogued, G-pellet prepared targets.
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man 
as a product of natural evolution into a progammable cyborg – cloned chimera with special augmented 
capabilities by electro-magnetic-mechanical and bio-chemical-genetic means.

1c) N-weapons
Developed are N-weapons, utilizing nano-sciences and -technologies for ‘molecular engineering’ in the 
range of 1 to 100 nanometers to enhance analytics, inorganic and organic solid, liquid, gas, plasma ma-
terials, miniaturization, performance, safety and handling. 
Since the 80s, employed are nano-machines and placed as programmable nano-robots in body tissue to 
manipulate their anatomy, morphology, physiology and environment and with it the level of functional 
capabilities.












						2


					2) Political Constellation

2a) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and Russia 
advanced to superpowers of a new world order over war and peace in possession of atomic weapons, the 
US since 1945, the USSR since 1947. They extended the imperial policies of the 19th century for profit and 
control of geo-political power structures into the 20th and turned their war objectives after the capitulation 
of the fascists to ideological concepts of man, society and progress, ideologocal-political-social block for-
mation with satellite states, new borders and spheres of influence, free access to resources, advantageous 
international division of labor and terms of trade. WW II lead without a peace treaty in a poisoned atmos-
phere to the Cold War up to 1989. The NATO was founded on 04. 04. 1949 and the Warsaw Pact on 05. 05. 
1955.
The US leadership transformed the political-social character of their country corruptively along secret 
policy goals into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax 
Americana, while formally adhering to a constitutional democracy, human rights and freedoms.

2b) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, pro-
paganda, block formation, arms, space, resources, applications, geo-political-social structures, corrup-
tion and fornication. Cold War objectives of propaganda and military battlefields spread beyond politics, 
religion and culture to all legal-scientific-technological-economic-financial and social fields, especially the 
information technologies and life sciences with anthropology, psychology, sociology, medicine, biology, 
zoology, bio-chemistry, electro-biology, genetics and also ecology and climate. All professional and non-
professional fields were tied into ideological competition and all means allowed except direct employ-
ment of A-weapons.
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with 
overkill ABC weapons and aggressive security R&D programs with technological superiority.

2c) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions, 
foundations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA, NSA, 
FBI, DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the 
National Security Act of 1947 with the CIA, drawing out the power lines for home based global predomi-
nance of all branches of the military with foreign sided dependencies and also global secret policy goals 
to cover all civilian domains by social programming with eg control over larger R&D programs and high
tech applications, surveillance, false fronts, control of public media, manipulation of individual psychologi-
cal profiles, social structures and processes und beyond of demographic structures of entire populations.

They are authorized by executive order hypocritically under the label 'security', though they realize a 
clandestine revolution in violation against the consent of the governed, constitutional standards and inter-
national conventions: Looming charges against the responsible parties of this despotic perversion are eg 
massive human rights violations, seditious conspiracy and treason.









						3


					3) Enforcement Concepts

Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite 
states and are carried by infiltration over to the clients of ideologically opposite camps.

3a) Security planning receives priority over general national and international interests of the Community 
of Nations. The security apparatus is justified by public relation campaigns, lobbying contacts, institution-
alized relations and supportive diplomatic networks like transatlantic and -pacific partnerships for contin-
uous collaborative co-ordination of interests.

3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only 
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, - 
not the mobilization of the masses for political-social action.
The traditional goals of military forces to successfully invade a foreign country and of intelligence ser-
vices to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and 
1963 in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without 
alternative.
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy 
goals, operations, methods, installations, equipment, data banks and image.
A global surveillance/communication system with satellites, ground receiver stations, interception of 
data high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with 
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitu-
tional framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media', 
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Protection of assets
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total 
secrecy and unaccountably, their agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting 
out from public opinion any ideologically non-acceptable statement. An intelligence review panel has 
power over life and death.

3c) Technologies are seen as the 'key to power' in the 21st century.
They are the practical tools of the operational arms. US/NATO research panels of the military and se-
curity agencies like at the Defence Advanced Research Projects (DARP) develop the arsenal of com-
pact weapon architectures over the spectrum of conflicts out of an array of large scale research, de-
velopment, test and employment programs, which are offered, awarded, tested, set up for operation, 
departmentalized and institutionalized. Weaponizing of modern technologies is to hit progressively easi-
er, faster, severer, more precise, be more effectively guided and shielded than foregone ones and to ex-
haust human-material, scientific-technological capabilities in space, air, at sea, land from single to large 
scale, non-lethal to lethal, intercepting to retaliating tools and in cyberspace from data scanning to misin-
forming to infrastructure crippling hacks, mainly in misuses of physics, chemistry, biology, genetics,
medicine and computer science. They corrupt as totalitarian tools in first line human living environments, 
where it cannot be perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of 
research, testing and employment with command centers and a system of labor camps. Developed are 
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like 
contaminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radia-
tion and neurologically coded misinformation.

						4


					4) Command Centers

4a) Organization
The intelligence-security agencies of the Western Powers, eg the USSS/DoD/CIA/NSA/FBI/DHS, the 
British MI 5-6, the French DGSE and the German BND/MAD/AVS have set up a number of command 
centers within security bases of home and NATO countries to enforce the secret policy goals according 
to their intelligence agreements in division of labor by region, professional field and social group. Military 
intelligence controls military personal and within the population groups like anti-war activists and draft 
dodgers. Non-military government security controls federal, state and city employees and within the 
population all groups, perceived as dissidents like sympathizers of opposite ideological camps. Security 
agencies of industrial associations control white and blue collar workers and within the population social 
and consume conform behavior.
The US Special Operational Command (SOC), formed 1987 at the MacDill AFB FL with a number of sub-
centers, is tied into a global satellite surveillance/communication system with data retrieval and evalua-
tion stations and supervises research, testing, production, procurement and employment of B-C-G-R-N
micro-weapons/equipment, the toxins, delivery and set off systems, training of special forces in tactics, 
techniques and operations and the personnel of single agents, teams, networks and fronts. Operatives 
are consensually – non-consensually, knowingly – unknowingly directed, manipulated and programmed 
via chip implanted brain – computer linkage, often by hard to trace minute, ultra-low frequency impulses. 

4b) Poison pellets
Poison dispensers in form of microscopically tiny pellets, containing toxins in gelatin skin or foil, a micro-
chip with receiver, emitter as well as nano-robots and tiny listening and video devices and bio-chemical-
electrical-thermal-genetic sensors are produced in microchip precision engineering by the millions. As 
depot poison pellets they are implanted directly or placed on a carrier like an unknowing person or any 
object of daily use or a drink water reservoir or any stage of the food chain or a space based gliding 
capsule - flying drone device to be guided electronically into the vicinity of the target. They can be spun 
off several times out of multiple layers of equally tiny, hair like pneumatic guns with an effective range of 
about 30 feet to be shot into the skin of the target. After activation they operate maintenance free for 
years, while their batteries recharge by body movements. Nobots, programmable, mechanical nano-
robots, channel the pellets into site specific body tissue. They are applied in the modes of single and 
massive, concentrated and blanket, random and selective, narrow and wide, scattered and systematic, 
limited and open ended, in closed and open mediums, contained and epidemic, preparatory and acute. 
The gelatin membrane dis-solves in body fluid, a foil membrane is opened electronically, time locked, by a 
preprogrammed code signal or by sound or voice or within the body toxin concentration or neurological 
process recognition.


 













						5


					5) Third World Countries

The larger and the majority of smaller Third World Countries formed coalitions for information sharing 
and initiated, supported by Russia, in depth investigations of the intelligence agencies of the Western 
Atomic Powers and NATO, Japan, Germany, Israel and eg Saudi Arabia. Their goals branch out widely:
5a) Information about the developmental status of B-C-G-R-N micro-weapon systems.
5b) Protection against threats from B-C-G-R-N micro-weapons.
5c) Predominance in B-C-G-R-N micro-weapons with global employment.
5d) Political-military-social counter-leverage against the Western Powers.
5e) Suppression of any attempt towards publication of undercover operations.
5f) Revenge for torture, murder and 500 years of dehumanizing treatment.
5g) Indignation to lay waste depraved political-social leadership.
In all, they copy the Major Powers’ system of labor camps.


					6) Private, Independent Defence Leagues

6a) Victim associations
Several victim associations and self-help groups, calling themselves targeted individuals (TIs), organize 
themselves in alternate media, mostly the WorldWideWeb, conduct information campaigns about live tests 
of military-intelligence B-C-G-R-N research projects, writing to eg government offices, legislatures, non-
government organizations (NGO), medical associations, the press, handing in petitions and law suits at 
the responsible government offices for violations of rights to life, security, health and liberty by deliberate 
assault on non-combatants. There they are altogether ignored, turned down, send to psychiatric treatment, 
put under surveillance, infiltrated, instrumentalized as false fronts, shown off as warning examples and 
neutralized in labor camps. They are hardly supported by established caritas organizations.
6b) Defence leagues
Private, independent defence leagues spring up mostly as smaller parties out of individual security con-
cerns, organize themselves for collective protection and are, driven by spreading awareness of micro-
weapon operations, continuously multiplying beyond several thousand groups worldwide. They investigate 
parallel to the Third World Countries the security-intelligence services first of their local region, then suc-
cessively of their home country and neighboring states. Their operational interests unfold like those of the 
Third World Countries into information, protection, predominance, counter-leverage, total secrecy, revenge 
and indignation. They arm themselves with surveillance/communication systems, stolen equip-ment, plun-
dered stockpiles, intercepted supplies, copied operational know-how and recruit their own undercover hit 
teams. In all, they copy the Major Powers’ system of labor camps.


					7) Global System of Labor Camps

Camp guards are employed as spot, select, walk by, tag, decoy, stalk, harass and hit teams.
7a) Surveillance camps: spies record for information control the data flow in its entirety worldwide.
7b) Deception camps: multi media presents a Potemkin village.
7c) Extermination camps: executioners eliminate more than one thousand people a year.
7d) Gas chambers: hit teams spray with nerve gases thousands of people a year.
7e) Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
7f) Harassment camps: Intelligence trainees strike down on millions of people a year.
7g) Sadism and sodomy camps: hit teams execute a billion druggings a year.
7h) Behavior manipulation camps: hit teams mass drug millions of people a year.
7i) Corruption camps: agents commit gross human rights violations around the world.
7j) Dissection camps: hit teams test new toxins on millions of people a year.
7k) Genetic camps: hit teams test genetic toxins on thousands of people a year.
7l) Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge them-
selves for bestialities of the Super Powers.

						6


7a) Surveillance camps
Goal is total information control by recording the data flow in its entirety worldwide.
To be penetrated are foremost foreign military and security services, terrorist organizations, political-
legal-scientific-commercial-financial-social communication systems and then populations at large.
To be gained are precise, reliable, up to date information for policy and project planning.
To be shielded by an early warning system are all intelligence assets. Also, the image of the welfare 
state is to be protected and the pathological character of undercover operations to be suppressed.
7a1) Intercepted are land/sea based cable and air bound radio traffic.
7a2) Listened into are households, work- and public places, buildings and vehicles.
7a3) Plugged into are all, especially electronic devices at their interfaces.
7a4) Wired up are individuals. Technical steps are identification, marking, connecting, tracking, data 
transmission, collection, storage and evaluation. Every person is wired up with microscopically tiny multi-
sensor chips to pursue him in all his prayers, travels, intellectual, professional, social and spare time activities 
throughout all phases of the day from his childhood to his demise.
The chips with electro-magnetic-acoustic-thermal-biological-chemical-genetic sensors and radio emitters 
are placed cell specific into the body, the scull and all cortexes of the brain, eg the visual, hearing, smell-
ing, tasting, language, mental processing, emotion and motoric regions and are placed along nerve strands 
and their axons to other organs, glands, muscles, skin, digestive tract, male or female reproductive system 
to record all physiological, psychological and mental processes also with the EEG brain wave patterns of eg 
sensual perceptions, thoughts, memories and moods.
Genetic fingerprints list the complete gene sequences of the chromosomes. They are read by a micro-
chip, whose tweezers pick out tiny strings of DNA and insert them into an ultra slender channel, etched 
on the plastic chip with tiny electrodes to detect along the serpentine genetic macromolecule the code's 
chemical letters. Established are the identity of the person with his hereditary dispositions, genetically 
determined diseases, genetic factors of the phenotype, especially in development and differentiation of 
the brain with inclination towards various intellectual fields.
Over a life time collected data run up to over 1oo ooo entries/dossier.
7a5) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from 
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for communication, weather, navigation, exploration, 
surface imaging, tapping of resources, reconnaissance and surveillance. In the US they are launched 
from Cape Kennedy FL or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year busi-
ness, led by eg Lockheed, General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Air-
craft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
There are several hundred US spy satellites in orbit, developed in charge of the Advanced Research 
Projects Agency (ARPA), an arm of the Pentagon, and operated largely under direction of the US Global 
Strategic Command (USGSC), its National Space Center being located at Offutt AFB NE.
7a6) Collected are the intercepted and space derived data mostly by the DoD, CIA, FBI, DHS and the 
NSA, which was founded under direction of the DoD 1952 at Crypto City, Fort Meade MA with branches 
in NATO countries together with the US Cyber Command and Central Security Services. The NSA em-
ploys over 5o ooo administrators, scientists, technicians, analysts and operatives, utilizing supercomput-
ers with arrays of modules, nano-technology, artificial intelligence and very high speed integrated cir-
cuits, processing more than a quadrillion (1024) calculations/sec to handle the global electronic data flow. 
Like Big Data in the professional fields, big in volume, velocity, variety, validity and actuality, they are 
intercepted, collected, stored, deciphered, translated, screened, evaluated, presented and distributed. 
Further processing like analysis or manipulation increases their commercial or security value through eg 
personal profile generation, technology development, process optimization, trend analysis and as data 
bases for service providers.
7a7) Spin offs of scientific-technological knowledge are sold mostly in the fields of security and law en-
forcement, corporate and private research, medicine, communication, industrial production, traffic and 
trade.

						7


7b) Deception camps
Presented is a Potemkin village inmidst of flourishing landscapes.
Political-legal-social frameworks, political-scientific-social education and the present agenda of public is-
sues are largely shaped by the powers of government, public education, public media and direct interven-
tion by the security agencies. Most visible is the public press with press agencies, publishing houses, TV, 
radio, newspapers, magazines, journals and books to reach everyone at home, at school, at work and in 
his spare time.
7b1) Political-legal-social framework
   b1,1) Suggested are
   ◦ Constitutionality with guaranteed basic human rights.
   ◦ Democratic means of conflict solving.
   ◦ Solidarity, fairness, time honored traditions and political correctness.
   b1,2) Not provided are
   ◦ Blockage of claims for basic human rights.
   ◦ Corruption of supervision, publication and prosecution of misuses by positions of power.
7b2) Political-scientific-social education
   b2,1) Suggested are
   ◦ Communication of founded political-scientific-social knowledge and skills by the educational system.
   ◦ Participation of all citizens with their knowledge in public democratic processes.
   b2,2) Provided are
   ◦ Illusions of human capabilities and convenience to go faster, higher, bigger, easier and better.
   ◦ Satisfaction of the population as consuming, non-questioning, -probing, -knowing assenters to re-
     main bare of convictions, ethics, reason, maturity and life experience with legal means of defence.
   ◦ Not addressed are political-social intentions, conceptions and backgrounds as after the attacks on
     the Twin-Towers 9/11 2001, which were allowed to proceed for justification of the anti-terror war.
7b3) Present agenda of issues
   b3,1) Suggested are
   ◦ Accurate, objective, up to date information by government agencies and the public press.
   ◦ Public discussion of the present day agenda of practical and theoretical tasks.
   b3,2) Provided are
   ◦ Reduction of the niveau of mass media below that of politically substantial contributions.
   ◦ Minimalization of sensitive issues like uncertainties, risks and dangers.
   ◦ Amelioration of negative issues, eg a war overseas is presented as a local intervention.
   ◦ Sidetracking of critical issues by misinformation and public relation campaigns.
   ◦ Pushing to the outskirts the misery and death of millions of people through hunger, catastrophes,
     epidemics, exploitation, expulsion, human rights violations, war and mass murder.
7b4) Security interventions are eg
   ◦ Justification of hegemonic aggressiveness and demonization of conflict-solving policies.
   ◦ Corruption of regulating, supervising, inspecting and correcting authorities.
   ◦ Discrediting of government adverse political-social leaderships.
   ◦ Suppression of moral voices with national and international renown.
   ◦ Erasure of any arising attempt towards publication of a victim's medical and legal evidence.
   ◦ Elimination of dissidents, whistleblowers, critics of system and security.
7b5) Immediate consequences are
   b5,1) Expectations for the improvement of the human lot remain superficial.
   b5,2) Gone is the informed citizen, who thinks independently over the full spectrum of his mind.
   b5,3) The psychological underpinnings of society have turned into polished formalism, stupor, dis-
   orientation, distrust, paranoia, hypocrisy, cynicism and burned in human rights abuses.
   b5,4) Contorted are historic records not to reflect the true achievements and failures of the times.



						8


7c) Extermination camps
There is not one security service of a major power that does not have its killing fields.
7c1) The military security department of NATO operates an assassination squad to eliminate terrorists, 
who are intercepted in preparations, foreign agents, who penetrate into security areas, traitors, who sell 
security information, deserters, who are caught up with behind hostile lines, security risks, who threaten 
to impair basic assets, left behind scientists from shut down projects and critics, who become a formida-
ble voice in public.
7c2) The assassinations are priority operations, well organized and quiet. A small intelligence court 
reviews the evidence, the target is electronically marked, pumped up with depot poison pellets, send to 
a remote area or a longer journey is waited for, death follows in an accident or break down, the death 
certificate cites an apparently natural cause of death. Where isolation is not possible, it is discredited, 
demonized and eliminated over time by a terminal disease like cancer.
7c3) Uncovered foreign operatives and own double agents are eg by NATO hit teams tortured to death. 
Nazi concentration camp butchers hung up their victims at backwards crossed arms over a wall urinal in 
a basement of a remote station to be tortured by mechanical and toxic means until their human body was 
totally disfigured and finally dead, when all body fluids had stopped dripping.
NATO butchers detain their victims in remote undisclosed prisons to be tortured for 2 – 8 days by electri-
cal, radiative and bio-chemical-genetic means, eg CIA psycho and sodomy drugs, until their human body
and mind are totally disfigured and finally dead, when all brain activities have ceased.

7d) Gas chambers
For gas chambers targeted are mainly people, working with the mind and propagating system non-
conform messages like the leadership of an opposite ideological movement, dissenting journalists, law-
yers, doctors, scientists and artists.
7d1) Military nerve gases attack the central nervous system in specific functions like wake awareness, 
memory, concentration, reaction, coordination and balance, the peripheral nervous system with loss of 
physical power, endurance, flexibility, agility and sensitivity.
7d2) Industrial toxic gases often are carcinogens, reducing first the pulmonary system, then other physio-
logical functions and inducing in the long run tumorous growth.
7d3) In debasement of the dignity of man and his mind, crippled are intellectual and physical strengths to 
the point of disability to perform tasks of every day life.
7d4) From cartridges gassed are entire streets, buildings, trains, busses, cars, assembly halls and swim-
ming pools. Nerve gas pellets are attached to any object of daily use like packaging, newspapers, books, 
clothing and tools, the set off signal is timed for maximum toxic concentration at time of exposure. The 
target's home is laced mostly with by odor imperceptible dosages for long term effects, if not the bed-
room itself is used as death chamber. H. Kohl and B. Netanjahu operated gas chambers in churches and 
at sites near to former Nazi concentration camps.















						9


7e) Radiation camps
Radiation camps entrap mostly insurgents, fugitives, carriers of secrets and serve as electronic prisons 
for terrorists and undesirables. They manipulate individuals, groups and populations up to programmable 
cyborgs and also climate and equipment.
7e1) Radiation devices
   e1,1) Radiation devices have been developed already before WW II for civilian and military applications 
   and are common today in all professional fields from astronomy to food preparation. US Military re-
   search has utilized several thousand civilian patents and classified them under the US Inventions Se-
   crecy Act.
   e1,2) R weapons utilize the energy flow of spherical waves and directed, concentrated beams. Lasers 
   radiate light and heat, speakers acoustic waves, antennas electro-magnetic photon-waves and accel-
   erators of atomic/subatomic particles eg α-, β-, γ-radiation. They are adjusted in eg direction, focal 
   point, cross section, intensity, wavelength, frequency, duration and pulse pattern in combinations.
   e1,3) R-Guns are mostly compact and reach any place on earth wirelessly to hit precisely with and 
   without implant, non-lethal to lethal with the speed of light over large distances.
   However, they are heavy on equipment, infra-structure, manpower, energy consumption and cannot 
   be miniaturized all around as tracelessly as the more universal B-C-G-N micro- and nano-devices.
7e2) Individual targets
   e2,1) Any person can be anywhere telemetrically spot pointed, identified, tracked, brain linked, read
   and manipulated without a mark on the body.
   e2,2) Radiation of low to extremely low frequencies up to 50 Hz and of neurologically coded firing 
   patterns stimulate, alter or depress the bio-electro-magnetic fields and processes of cell tissues to 
   cause health complications from nausea to heart attack and psychological disorders from depression 
   to break down and neurological disfunctions from altered consciousness to forced behavior and 
   memory incisions from accurate recollection to total loss.
   e2,2) A psychotronic R-weapon restrains a target within a hyperprison to be psychologically robotized.
   e2,3) Brain to computer linkage via a MEG - Neurophone bypasses the senses to allow real time two 
   way physiological communication of informing as well as misinforming noises, words, images and 
   thoughts. It accelerates in common military praxis the ground station - pilot observation, communica-
   tion and reaction times.
7e3) Group and population targets
Crowds can be non-bodily, non-lethally manipulated to cause eg sedation/incitement in riot control/
fabrication. Insurgents can be disoriented and blocked in their motor controls by area covering laser 
scans in barrier and invasion warfare.
7e4) Cyborg
A Cyborg is a trans-human biological-technical blend and has a microchip implanted in the central nerv-
ous system as a neuro-biological - data processing interface. It allows eg movement of a prostheses in 
compensation of a lost limb or augmentation or reduction in the level of a physiological function.
Individual or a groups or populations of cyborgs can be area covering bio-electro-magnetically pro-
grammed in their basic health, physiological capabilities, intellectual activities, convictions and behavior.
7e5) Climate
High energy radiation in excess of trillions of W/sec can alter layers of the atmosphere to disrupt radio 
communication, thin out shielding against cosmic winds, generate harmful compunds, reflect back to 
earth and trigger earth-weather catastrophes. A geo-engineering research station has been set up at eg 
Gakona AK under the High Frequency Active Auroral Research Project (HAARP).
7e6) Equipment
Stationary and mobile objects can be spotted, identified, tracked and measured.
Electronic equipment can be read and programmed at all data input, processing and output points.
Entire systems can be manipulated, disrupted, shut down, burnt out, molten and pulverized.



						10


7f) Harassment camps
Selected targets for a camp are put under surveillance to enter it through the front yard of harassment.
Trainees of intelligence services acquire here the techniques to strike down on their victims.
Surveillance is executed 24/7/52 a year in all areas of life to engineer stress events.
With covert entry follow physical damage, tempering with records, theft and contamination.
With street theater follow mobbing, denial of services and run around at the authorities.
As extra judicial measures follow fraud, entrapment, wrongful commitment to a mental institution, judicial 
paternalism, unlawful arrest, denial of insurance claims and charitable, medical, police, legal help.

7g) Labor camps of sadism and sodomy
Targeted for labor camps of sadism and sodomy to be sifted out are people of faith, conviction, culture 
and achievements, activists of political-social movements like human rights workers in defence of un-
popular causes, environment and animal rights campaigners, violence pillorying pacifists, critical voices 
of system, market and the press, radical groups of minorities, bloggers of alternate media, drop outs from 
the rat race, defectors from opposite ideological camps and soldiers, who object out of second thoughts.
7g1) There is not a psychic or physical function in the body that cannot be electro-magnetic-bio-che-
mically manipulated to be stimulated and boosted, supported and stabilized, sensibilized and broadened, 
narrowed and worn out, relaxed and dampened, disrupted and distorted:
 ◦ Chemical rape at any place and time reduces by blocking agents the target's level of mental and physi-	
   cal capabilities, which are then eclipsed by a variety of sodomy drugs to manipulate in succession 
   sexual drive, erotic sensations, emotions, sensibility of genital parts, secretion of sweat glands, speed, 
   endurance, exhaustion, sleep, dream and hang-over.
   Erotic stimulants are often individually designed according to previously taken brain wave patterns and 
   are added by induced pornographic images to incite perversities.
   The offspring is being monitored in its further development.
 ◦ Induced physiological impairments are eg drop-in-your-tracks fatigue, myocardial insufficiency, 
   back and muscle pains, restriction of flexibility and motion, sleep disruption, hyper-stress, total re-
   laxation and accelerated aging.
 ◦ Induced emotional states range from anticipation to saturation, blind hope to despair, elation to anger, 
   boldness to fear, overconfidence to diffidence, concern to indifference, hypersensitivity to insensitivity.
   A 'joy of death frenzy' can supplant every agony of torture.
 ◦ Induced mental distortions affect consciousness, intention, conception, memory and operations to the 	
   point of dysfunction with non-resistance against adversities, hardships and threats. Specific functions 
   like abstract reasoning, language, computation, logic and specific mental interests can be crippled.
   Stimulation towards 'blasphemy of the Holy Spirit' is achieved by boosters of fixed, eccentric theologi-
   cal themes and a desire to communicate.
 ◦ In long term mental-psychological terror several neurological processes are periodically stimulated to 
   extremes, eg seizure, hallucination or delirium, not to allow any recuperating relaxation times.
 ◦ In all the target's personal development, identity and character, especially its political-ethical stand-
   ards, are worn down, debased and suffocated in the suds of prostitution to cause traumatization, irra-
   tional behavior, self-destructive habits, which then run on to total personality collapse.
   The victim, often with a depot poison pellet exacerbated preexisting disease, induced sterilization and 
   creeping ailment like tumorous growth in the genitals, is blocked in its professional work, socially iso-
   lated, disenfranchised, severed from welfare-family safety nets and diagnosed with a mental illness.
   It is forced into suicide or to die on the streets.
7g2) Hit teams mass drug with depot poison pellets for years entire water and food supplies from the 
start of the food chain to the selected target, at the reservoirs, agricultural producers, suppliers, food 
processors, wholesalers, supermarkets, restaurants, in transport via repackaging-resealing facilities and 
in the target's home.
Contaminated with toxins, taken up with skin contact, are objects of daily use like magazines, books, tex-
tiles, tools, first aid supplies, hygiene articles and dryers.
7g3) Labor camps of sadism and sodomy have been set up around the whole world and have blanketed 
in mass applications entire regions, ethnic groups and political-social fractions with sodomy drugs. Eg 
US stay behind forces in occupied territories as in Germany after WW II (1945) have systematically tar-
geted anti US/Cold War - pro disarmament activists.

						11


7h) Labor camps of behavior manipulation
Targeted for labor camps of behavior manipulation are mostly politically-socially non-conform skilled 
people of all professional fields for their independence of mind, asperity of manner, eccentricity and 
pursuit of alternate ways in life and the population at large.
7h1) On the first level individual behavior is suppressed or stimulated in its elementary physical needs, in 
exercise, relaxation and sleep requirements, appetite and thirst, hygiene and beauty care.
7h2) On the second level the emotional state is manipulated from thrift to the urge to go shopping and 
from stress, anger, frustration to the desire to achieve social recognition up to power madness.
7h3) On the third level the motivation is capped to listlessness and lethargy or boosted into over-ambition 
and go-on efforts in face of failure.
7h4) On the fourth level intellectual interests are selectively dampened or stimulated, while ethical aware-
ness and inhibition is dampened down to the point of unscrupulousness.
7h5) Communicative and social competences like cooperation in teams and hierarchical structures are 
manipulated out of the emotional state from diffidence to hostility, out of motivation from dropping out to 
intriguing and through inducement of unrest, nervousness, stammering or trembling.
7h6) In all the target's physical and metal fitness, personal development, education, professional and 
social careers are predetermined.
7h7) The toxins are administered mostly from depot poison pellets in small dosages over longer periods 
to form out unconsciously habitual self-sustaining or -destructing behavior patterns. Eg Exxon stabilizes 
plant employees and their families for long term reliable, productive job performance.

7i) Client camps
Client camps of subversion, corruption and control are set up in foreign countries.
7i1) The Major Powers’ intelligence agencies realize their foreign policy goal of block building for global 
dominance and control first within their client states, also those regarded as time proven political partners. 
Their roles are to provide support for political-military defence and interventions, to open markets with free 
access to man power, raw materials and half-finished goods and cooperate in advantageous international 
division of labor, while home markets are protected by hurdles of eg advanced technologies, patents, in-
frastructure, finance and professional standards. They are not to develop vital scientific, technological, 
economic and financial fields of their own. Foreign aid projects largely flow back home, eg 86% of the US 
EXIM Bank's $7.7 billion new foreign export credits in 2000 went to 10 larger US companies.
7i2) The model is expanded geo-politically to non-client states to achieve global dominance by one's own 
superiority with determination, resources, mass, size, means, diversity and reserves. The intelligence, 
counter-intelligence and security agencies are scaled up to the required size to realize their directives 
and if necessary hiked up.
7i3) Methods of subversion and corruption are eg
 ◦ The first tool always is the covered operation in all hazard areas with research, detection, identifica-
   tion, tracking, gaining of access, securing, recovery, retreat, exploitation and if necessary mitigation 
   and neutralization.
 ◦ Surveillance by a global satellite communication system.
 ◦ Infiltration of the political-social structure by contacts with recruitment, counselling, disinformation, 	
   forgery, theft, bribery, extortion, prostitution, financial sponsoring and partnerships.
 ◦ Sold are proprietary information, low cost credits, logistical supplies, user rights, telecommunication 
   systems, special technologies and bio-, chem-, rad-tech weapons.
 ◦ Rented are grounds for air, naval and army bases and training camps.
 ◦ Fragmentation of political alliances.
 ◦ Permanent excessive indebtedness.
 ◦ Incitement to civil strife.
 ◦ Profit from their wars.
 ◦ Manipulation of the public press.
 ◦ Pacification of moral institutions.
 ◦ Distortion of social fabrics.
 ◦ Wash out of cultural identity.
 ◦ A system of labor camps controls the broad base of the population.

						12


7j) Dissection camps
Caught in dissection camps to serve as guinea pigs for non-consensual, covert, illegal pseudo-medical 
life experiments for the development of B-C-G-R-N weapon systems, often with deterring, degrading 
torture, are terrorist suspects, captured freedom fighters, prisoners in undisclosed detention centers, 
prisoners in civilian jails, convicted of a heinous crime, tenacious dissidents for punitive action, the vul-
nerable like civilians in war torn regions, minorities in underdeveloped regions, suicidal persons, mental 
patients, the dying in nursing homes and intensive care wards, people considered to be expendable like 
estranged, uprooted, isolated, long term jobless, homeless and lone fighting individuals.
The CIA selected also targets from their childhood on at easily controllable, closed social environments 
like cults, sects, lodges, churches, foreign partisan groups and training camps.
7j1) Tests
Test series on R guns and bio-chem-genetic toxins are conducted in the security agencies’ laboratories 
and training areas by modeling, simulation, war games and also for combat exposure in life tests to col-
lect representative samples from populations at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed 
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psy-
chologic latent, present and long term effects over a wide spectrum, eg affected tissue and function, 
degree of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining fac-
tors, counter-poisons, recuperation times, measurability, visibility and traceability.
7j2) Evaluation
Active warfare agents undergo a comprehensive military worth analysis according to present and desired 
performance standards in their eg bio-chemical-genetic components, production, safety precautions, han-
dling, training, weapon concept, equipment, infrastructure, cover, costs, target vulnerability, operational 
engagement, mission accomplishment and plausible deniability.
Employment ready weapon systems are handed over to the operative command structure of the armed 
forces.
7j3) Legal situation
The Common Rule, safeguarding against experimenting on the public without their consent in the US, al-
lows for non-consensual experimentation by intelligence agencies.
US DoD Directive 5240 1.R saved 882013, Ch 4, Procedure 13 says: 'Experimentation is allowed on hu-
man subjects for intelligence purposes.'
The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
7j4) Public investigations
Public investigations revealed some past pseudo-medical experimentation at eg the San Antonio AFB 
TX, the Army Special Forces Center NC, the Los Alamos National Laboratory NM and private institutions 
in successive sub-projects of MK Ultra, but the operations have then been farmed out for deeper cover 
because of sensitivity to public resistance and not to implicate the security services directly.
The CIA siphoned off funds from defrauding the government, collaboration with criminal organizations, 
weapon trading, security contractors, proprietaries, recycling of radioactive materials, market manipula-
tions, economic data trading and extortion.
7j5) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diagno-
sis. Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned 
down for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are 
to recover and in all cases the death certificate claims an apparently natural cause of death.
Eg the governments of France and Israel developed their nerve gas agents with test series on FLN and 
Palestinian freedom fighters, taken prisoners, - none survived and their ashes were scattered over the 
deserts.

						13


					Misuses of Genetics

7k) Genetic manipulation camps
Selected for genetic manipulation camps, a satellite of the dissection camps, are especially younger men 
and women of average physical condition from all classes of society, who are planning for offspring. They
are picked always as singular, random, unrelated, dispersed samples without much record keeping under
deepest cover and accompanied by secondary hit teams for psychological stabilization in unquestioning 
medical environments.
(About active agents, diagnostic tests and procedures are no data available here.)
7k1) International conventions
Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce them.
   k1,1) Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences hu-
   man, population, pharma, behavior genetics and gene technology. They serve life and not in inversion 
   of human dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed wea-
   pons always lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
   k1,2) The civilized world; customary international law; The Hague Land Warfare Convention (The 
   Hague 1899); the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacte-
   riological Methods of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention 
   (UN Geneva 1972) and The Chemical Weapons Convention (UN Geneva 1992) outlaw their develop-
   ment, production, stockpiling as a means of warfare and call for their disarmament.
7k2) Biological bomb
Today's Major Military Powers press ahead with the further improvement of clandestine B-C-G-R-N micro- 
weapon systems to gain global predominance in the field. Set goal of the US National Security Council in 
collaboration with NATO is the construction of the first biological bomb and its peace time employment. It 
is to realize control of individual behavior patterns, political-social structures and processes efficiently po-
pulation wide, long term plannable and short term adjustable.
'Scientific rational base' is population genetics to render a group’s or population's allele composition with 
its genetic and physiological functions designable and programmable by bio-chem-technological site spe-
cific introduction of desired, modification of inferior and elimination of undesired strains and to initiate a 
'human hand directed evolution of man' for engineering of cyborg-chimeras according to orders.
7k3) Design criteria of genetic weapons
   k3,1) Political goal is genetic programming of human behavior patterns to exhaust its political-military-
   economic-social potentials.
   k3,2) Military goal is the capability of single and mass applications with selection of targets, choice of 
   agents, kind and degree of impairments, fixing of place, time and conditions.
   k3,3) Modernization goals are increased efficiency of present state of the art techniques of behavior 
   channeling by attacking causes and not only symptoms with coverage of entire regions and population 
   groups by stable, sustainable transferal of altered genetic strains to succeeding generations and also
   increased economy by centralized supervision of a lean network of undercover operatives.
   k3,4) Economic goal is determination of economic structures and processes by individual basic needs, 
   drives and emotions, affecting the key economic parameters of eg corporate - labor force relations, net 
   domestic product by kind of economic activity, private and public investments, consumption expendi-
   tures, net savings, labor peace, work ethics and productivity.
   k3,5) Social goal is determination of social structures and processes, especially the professional elites 	
   by manipulation of sexual behavior, motivations, traits of intellectual interests and capabilities and with 
   it personal development, education, identity, character, professional and social careers.
   k3,6) Demographic goal is channeling of the rates of still born, life birth, infant mortality, disease, dis-
   ability, invalidity, death and with it general key population parameters as base of and leverage on so-
   cial-economic structures: population size and density, age group distribution, growth trends, health 
   standards, -care, -insurance, average work years, retirement age and life expectancy.
   k3,7) Health statistics of individual causes of diseases and death and external factors like environmen-
   tal conditions have become insignificant.

						14


7k4) Deployment structure
   k4,1) In the first stage set up is an infrastructure of depot poison pellet delivery systems.
   It builds largely on the existing command centers of the major powers' intelligence agencies within en-
   closed security areas, enforcing the present non-genetic state of the art social programming with a global 
   telecommunication/surveillance system, procurement of equipment and toxins, undercover agents, sup-
   porting scientists, technicians and operating personnel.
   It allows for direct and indirect ways of delivery
   ◦ by a commissioned agent, manually implanting or pneumatically injecting pellets.
   ◦ by an electronic guidance system, navigating pellets from water reservoirs, the food chain, locations 	
     in public places or from space based gliding capsule - flying drone devices into the vicinity of the tar-	
     get to be shot in, bypassing any possible sensual awareness of the victim.
   ◦ by an automated electronic guidance system, employing AI out of big data, correct predictions within 
     uncertainties and self-optimizing algorithms to execute all single steps from marking to follow up of 
     actual and desired results with more precision, speed and breadth.
   k4,2) The second stage realizes marking, tracking and genetic identification of every single person of 
   the target group by a microchip with a bio-chemical sensor and sender, aiming to catalogize the world 
   population with their personal profiles and genetic fingerprints in high capacity data banks. 
   k4,3) In the third stage every fingerprint is by a computer program selected, scanned and matched 
   against the desired model of dominant and recessive allele frequencies of the common gene pool and 
   allotted a charge of gene enhancing, correcting or neutralizing agents to form out the desired traits.
   k4,4) In the fourth stage every single foetus, youth and adult of the target group is systematically 
   pumped up with their allotted charge of genome altering agents.
   k4,5) In the fifth stage an electronic guidance and set off mechanism is installed at the command 	
   center similar to that of present social programming.
   k4,6) In the sixth stage recorded and evaluated is the introduction of desired and modification or elimi-
   nation of undesired traits in the target's allele composition, which can also be handled precisely by an
   AI control mechanism in cases of uncertainties by self-optimizing algorithms to decide on further steps
   ◦ No action by adequate allele composition.
   ◦ Repeated incision by deficient allele composition.
   ◦ Target elimination by geno-deviant, 'substandard' traits.
   ◦ Mass elimination of population groups and over regions by the sum of all pellet prepared targets.
7k5) Insertion paths
   k5,1) Transport for delivery into the body of the target is by tiny poison pellets of gelatine or foil skin, 
   where the gelatine dissolves in body fluid and a foil is opened by an electronic set off mechanism. Tiny
   nano-robots carry the pellets to the desired body tissue.
   k5,2) A ‘gen taxi’, a passive carrier DNA strand, envelopes the active passenger DNA and forms by 
   ligation, covalently bonding passive and active DNA, a vector system, the genetically fused heterolo-
   gous product with defined parameters.
   As ‘gen taxis’ serve mostly bacterial and viral envelopes: bacterial, transposable genetic elements are 
   eg IS elements (insertion sequence), TN elements (transposon), transposable phages; viral elements 
   are eg classical transposons, retroposons, alu-like sequences; with mammals polyomaviruses, vac-
   cinia viruses and retroviruses.
   As a mobile, transposable genetic element it can insert, exit or relocate into non-homologous DNA in-
   dependent of the host's recombinant functionality.
   k5,3) Within the desired body tissue, insertion of the vector system into the host chromosome for final 
   in vivo transformation is by transposition, a change of position of a transposable genetic element from 
   one site of the genetic material to another: By cutting, strand transfer, joining of ends, added by cata-
   lyzing enzymes, the passenger and carrier DNA are covalently fused into the host chromosome.
   k5,4) The gene targeting rate, the frequency of integration of an exogenously added DNA sequence 
   into the nucleus per quantity of host DNA and per added sequence, depends mainly on: transfer and 
   transposition methods, homology between exogenous and host DNA, vector system, length of the in-
   serted string, accessibility of a target locus and environmental factors.

						15


7k6) DNA technologies
Employed DNA technologies are mutation, hybridization and DNA combination
   k6,1) Mutations
   ◦ An induced ploid mutation is almost always a lethal defect, because of abnormally developing, non-
     functional cells leading to cell death, death of organism or still birth.
   ◦ An induced chromosome mutation with a change in the order of genes between two or within a chro- 
     mosome by addition, elimination or rearrangement of a region is a bio-chemical mutation, leading
     to a replication dysfunction with loss of an entire trait out of the phenotype or to transcription or 
     translation dysfunction with growth disorders like tumorous growth.
   ◦ An induced gene mutation, a change in a base sequence of a gene, a structure or regulation chang-
     ing, amplifying or repressing, forward or backward, single or complementary (synonymous), expres-
     sive or conditional, sometimes point, also nonsense (neutral) mutation, can destroy the function of 
     a gene at the site of incision, or cause additional large scale rearrangements of adjacent DNA se-
     quences, or alter the efficiency of gene expression (gene penetrance), the degree of trait formation 
     also in growth, differentiation and complete structuring of a function.
   k6,2) Hybridization
   Meiotic poisons can cause in cell division and recombination processes: partial or complete misalign-
   ment and misassortment of chromosomes, chromosome deformation and fragmentation, cytoplasma 
   deformation, phase inhibition, cell death and sterility. Mitotic poisons affect like meiotic poisons: chro-
   mosome alignment and assortment, cell division processes, nucleic and cytoplastic morphology and in 
   consequence cell functions with phase inhibition, cell death and sterility.
   Aside from noxious agents, hybridization is affected by heat, radiation, insertion of a function disrupt-
   ing DNA strand and can lead with impairment of regulatory processes to malformation, cripplement 
   and death of organism.
   k6,3) DNA recombination
   In vitro manipulated targeting sequences can contain elements to manipulate genome structures and 
   genetically controlled processes in their entire spectrum: any parameter affecting gene expression, lead-
   ing to amplification, depression, destabilization, dysfunction, toxin production, cell death, sterility and 
   disablement of a function; any singular phase in meiotic and mitotic cell division, leading to irregular 
   chromosome assortment, chromosome deformation and fragmentation, phase inhibition, cell and cell 
   line dysfunction, cell death, sterility and malignant tumorous growth; any regulatory process of onto-
   genesis, mainly controlled by the homoeobox, leading to a change in development in timing, rate, 
   location with de- and malformation of cell morphology, diverging growth and differentiation of func-
   tions, causing changes in functional capacity, cell unit dysfunction, uncontrolled growth and death 
   of organism.
7k7) Levels of Impairment
   k7,1) Death through cripplement or disablement of a vital function.
   k7,2) Disease through temporal, local, graded manipulation of a physiological function by eg activa-
   tion, stimulation, depression, deactivation, alteration and dysfunction.
   k7,3) Change in the level of a physiological capacity by eg augmentation and reduction.
   k7,4) Altered growth and differentiation of a physiological, often neurological capacity.
   k7,5) Change in the effectiveness of medication, vaccination, diagnostics and therapy.
7k8) Overall effects
A genetic incision affects a selected trait directly, when the phenotype with a morphological or functional 
distinction is traceable to a specific hereditarily passed on genotype and the individual gene or gene group 
as functional unit is identified with its bio-synthetic pathway. With it affected are the anatomy, morphology 
and physiology of the organism and massive, population wide manipulations show first in the demographic 
structure. Genetic incisions to determine a specific trait in the public psychological profile gaplessly, stably, 
time effectively will affect the demographic structure with all co-determining genetic factors and result due 
to the long causal chains, large number of variables and interdependencies in an almost irreversible shift 
of frame in several allele frequencies of the world population's gene pool with uncontrollable, spreading
catastrophic side effects.

						16


7l) Revenge camps
7l1) The governments of the Third World Countries continue their investigations into the Major Powers' 
and Clients' military and intelligence activities and widen them out to screen all their political-social forces, 
decision making elites, public and secret policy goals, social structures and processes, resources, govern-
ment and private security personnel and area covering single households.
They penetrated electronically most political-military-intelligence high security areas and often leaked 
show off successes into open channels.
Also, with ongoing investigations they are again and again fed with disgust. Behind the image fascism of 
the Industrialized Nations yawns a social fabric without credibility, without any basic values of life and 
especially truth in its generation, management and leadership role.
   l1,1) Their political intentions remain spread out widely: information, protection, predominance, counter-
   leverage, total secrecy, revenge and indignation.
   l1,2) At home they screen all foreign past and present intelligence activities in all areas of their countries' 
   life from covered operations to environmental damages. They rolled back and protect themselves against 
   further foreign subversion and corruption, also cutting off the fuel for up to then hardly heeded fornication 
   as cultural and economic weapon, degrading social fabrics by internally bleeding wounds.
   l1,3) They strive in a loose coalition with exchange of data and alignment of interests for global predom-
   inance in B-C-G-R-N micro-weapons and not for internationally guaranteed safeguards, multiplying the 
   new, devastating dangers for mankind.
   l1,4) They expand their global undercover micro-weapon operations.
   ◦ Formally they tolerate foreign hostile secret policy goals, enforcement concepts, deployment struc-
     tures, weapon development, financing, political propaganda and most undercover operations.
   ◦ They expand their own military-intelligence infrastructure, often drawing on scientific, technological, 
     logistic and data support from Russia.
   ◦ They expand their own global system of labor camps with a network of affiliated groups.
   ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
   ◦ They suppress any attempt towards publication of their B-C-G-R undercover operations.
   ◦ They incapacitate foreign communication/delivery systems, equipment and toxin stockpiles.
     Some hostile operations continue as sham successes, defused under hand, while backgrounds are up-
     rooted throughout all ramifications.
   ◦ They have pumped up with depot poison pellets all political, military and civic leaderships in the West-
     ern Industrialized Nations, especially the personnel of their security organizations as well as the 
     activists of the Private, Independent Defence Leagues to neutralize them as security threats.
   ◦ Equally targeted are any hostile person or group or fraction of a population.
   ◦ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, 
     to impair their ability to work and to enslave them physically and psychologically.
   ◦ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and 
     present Heads of State like G. Bush Senior and Junior, B. Obama, D. Trump, J. Biden, G. Schröder and 
     A. Merkel have been or are being sodomized regularly, who in a public position see no alternative 
     but to hit back.












						17


7l2) The Private, Independent Defence Leagues continue their investigations, starting out from house-
holds, workplaces, public institutions and the electronic equipment of their local area and widen them out 
to cover the Major Powers' military and intelligence activities in their region and neighboring states.
Most victims’ reactions lead to self-imprisoning, deeply burnt in abhorrence and hate.
   l2,1) Their political intentions remain spread out widely: information, protection, predominance, coun-
   terleverage, total secrecy, revenge and indignation.
   l2,2) They strive for local and regional predominance in B-C-G-R-N micro-weapons and not for inter-
   nationally guaranteed safeguards, multiplying the new, devastating dangers for mankind.
   l2,3) They are growing beyond several thousand groups worldwide, recruiting themselves via under-
   ground channels out of various population groups
   ◦ Close to crime, to secure their illegal operations.
   ◦ Close to communication/surveillance systems, following undercover operations.
   ◦ Close to security systems, following advanced security technologies.
   ◦ Victims, their relatives and friends, to defend and revenge themselves.
   ◦ Threatened citizens, to defend themselves out of private security concerns.
   ◦ Upset citizens, to vent their indignation over depraved political-social leadership.
   ◦ Cynical citizens, to profiteer from private security concerns.
   ◦ Hypocritical citizens, to make victims under false flag illusionary hopes.
   ◦ Engaged citizens, who want to stop the killing.
   l2,4) They ally and organize themselves in global information sharing and collaborating networks. 
   They set up several defensive lines, farm out operative tasks and go for deeper cover in far away places to 
   erase tracks. They draw under pretense of security all professional fields, societal institutions and the 
   entire population into complicit, sodomitic roped parties. Undercover operations have multiplied them-
   selves into a peoples' movement and become with their perversions, excesses, security circus, costs 
   and dangers in a highly technological environment a political-social topic in all circles of society.
   l2,5) They expand their local, regional and also global undercover micro-weapon operations.
   ◦ Formally they tolerate the security agencies’ secret policy goals, enforcement concepts, deployment 
     structures, weapon development, financing, political propaganda and most undercover operations.
   ◦ They set up their own command centers, communication/surveillance systems, steal equipment, plun-
     der stockpiles, intercept supplies, copy operational know-how and recruit their own hit teams.
   ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
   ◦ They suppress any attempt towards publication of their B-C-G-R undercover operations.
   ◦ They often attack with government and foreign agencies any hostile person or group.
   ◦ They hypocritically pretend to clean up the misuses of modern bio-technologies, however
     They lie about life and creation, procreation and causes of procreation, death and causes of death, 
     constitutionality and human rights, perverting faith, reason, maturity and ethics.
     They do not pass on objective political education to the general public.
     They do not inform the general public about possible misuses of power.
     They do not exercise constitutional oversight over positions of power by the people.
     They do not activate the public authorities against human rights violations of mass rape and murder.
     They do not help a single victim with advice, a doctor or a lawyer.
   ◦ They strive for breakthroughs in fornication, their executioners way laying in first line advocates of 
     publication, prosecution and public trial of the perpetrators according to penal law to sodomize them 
     to death by first shooting in bio-chem-gen-electro-magnetic-thermal-acoustic microchip sensors and 
     radio emitters, then pumping in depot poison pellets, then crippling their inner freedoms of thought 
     and movement, last breaking their physical strength, - all under the perversity label of direct help with 
     medication or emergency medical care for the victims.





						18





		6) Power Plots


		Profit
		We make a profit from our labors.
		We employ our knowledge and skills,
		Recruiting into our corporation,
		Institutionalizing our social system,
		Prospering: Le système, c'est moi.

		Privileges
		We surf with the crest of waves.
		We enjoy unscatheable privileges,
		Owing the media with her stories,
		Blue collars don't have any say,
		Spelling out: La réalité, c'est plaisir.

		Persecution
		Where shall we march from here?
		Where to shall we turn our attention?
		Persecute them and their children,
		Letting everything hang out below,
		Deciding: Liberté toujours.

		Perversities
		Hit teams work with clandestine sciences,
		Turning their attention to monies earned,
		Poisoning slowly their eat, drink and wear,
		Stealing their perverse self, life and future,
		Confirming: Unité de la gênealité.

		Proof
		Our trickeries are our Achilles heels.
		Sparrows in droves jostle on rooftops,
		Call with the voices of the slaughtered.
		We have no place to go,
		But to run for the ropes.











						19


					9) Prospects

9a) Power
The Global Players of the Industrialized Nations, the majority of the medium and larger Third World 
Countries and Private, Independent Defence Leagues act out of lower power instinct, the most devastat-
ing archaic notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despotic 
perversion social values, constitutional structures and processes. They are not capable to fill human 
dignity with content, but oscillate without a base between the poles of illusion and bestiality.

9b) Failures
9b1) Hardly addressed are the zeitgeist issues in substance.
 ◦ Man does not practice cognition to see himself, his intentions, conceptions, convictions, values, re-
   sponsibilities and expressions with positive and negative consequences.
   He is largely a brutal creature, applying any tool of power for his advancement.
 ◦ He does not see the service functions of society. He cannot overcome inhibiting factors by enlighten-
   ment or handle conflict solving between hostile parties efficiently.
 ◦ He does not see his position against nature and God. He does not project himself into the future, 
   combining a spiritual hope with a real prospect in cosmic dimensions.
9b2) Hegemonic policies
 ◦ Continuing are overpopulation, famines, epidemics, inequities of life essentials, environmental pollu-
   tion and destruction, leading as mass effective misdevelopments to planetary catastrophes.
 ◦ Continuing are exploitation, polarization of wealth, human rights violations, leading as mass effective 
   power tools to destruction of social fabrics, refugee streams, terrorism, mass murder and war.
9b3) Dirty war
A clandestine, global dirty B-C-G-R-N war is being waged between government and private, independent 
defence leagues' security services of the 1st, 2nd and 3rd Worlds and their populations. Together, they 
operate global systems of labor camps for electro-magnetic-bio-chem-genetic programming of social-
psychological-physiological profiles to transform man into a programmable cyborg - cloned chimera and 
to eliminate human roots of dissenting, opposing and moral voices.
9c) Constitutionality
9c1) Based on human dignity, all universal object and framework values branch out from it.
Its scaled up intent is to further telos of mind with sound mental concepts in ethical freedom.
9c2) Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision, man can have.
9c3) Ethics' task is to solve cases of gross corruption with disastrous consequences, that not a major 
criminal potential runs to its self-destructive end.
Method is conflict solving by language, enlightenment, regulation, task, means and supervision.
It overcomes with spiritual-political-social will any hostile, inhibiting factor.
9c4) It is the right of the people to correct misdevelopments, leading to planetary catastrophes and injus-
tices, leading to political enslavement and collapses and to reverse a clandestine or open constitutional 
revolution and to institute a new government with the principle of constitutionality to draw power out of 
political-social life.

9d) The standard for local actions is transposed to cosmic dimensions (Gen 18,19 TNIV):
	   For I have chosen him, so that he will direct his children and his household after him
	   to keep the way of the Lord by doing what is right and just,
	   so that the Lord will bring about for Abraham what he has promised him.


Sincerely

Udo Frentzen

			PDF Printout		20    	Home