PDF Printout			      Home




		History of Intentional Misuses of Genetics

		and Modern Bio-Chem-Rad-Technologies


		    May man keep a watchful eye
		    that these crimes against humanity
		    will never reoccur again.














	1) Projects

	2) Political constellation from 1939 on

	3) Enforcement concepts from 1945 on

	4) B-C-G-R-N weapon development from 1945 on

	5) Some US/Clients activities from 1945 - 89

	6) Spreading awareness of B-C-G-R micro-weapon operations
	
	7) Initial reactions from US/Clients, Third World Countries
	and the Public from 1989 - 2001

	8) Escalation into a clandestine, global dirty war from 9/11 2001 on

	9) Constitutionality 






			   Udo Frentzen		   1999/2020
(Texts originate out of Public Postings at Neuengamme 09 04 99 and 05 09 06)

			PDF Printout		1		Home


					1) Projects

1a) The US
The US CIA investigates from its formation on systematically naturally found venoms and synthesized 
toxins for their incisive effects on the human body, drawing on toxicological research in Europe from 
before WW I - II, in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-
medical experiments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to 
press ahead with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, 
groups and entire populations. They synthesized in their bio-chem labs new classes of toxins to ma-
nipulate psychological and physiological functions. Radiation weapons are developed in their physical-
bio-chem labs to manipulate psychological and physiological functions and also equipment and climate.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies 
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-
chem-gen weapons of mass destruction.
1a1) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of 
the central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic 
fields in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical 
processes, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric 
and sexual behavior.
1a2) The genome
Another large scale project researches structures and mechanisms of the human genome in intentional 
misapplication of mutagenic, hybridization and recombinant DNA technologies to cause with incisions 
into the genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up 
the construction of the first 'biological bomb' for peace time employment of gene altering agents in 
graded local to blanket poisoning of food and water supplies as well as targeted and mass poisoning of 
home and foreign populations and over regions over the sum of all single catalogued, B-C-G-pellet 
prepared targets
for control of individual psychological, physiological and genetic processes and political-social-demogra-
phic structures.
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man 
as a product of natural evolution into a programmable cyborg – cloned chimera with special augmented 
capabilities by electro-magnetic-mechanical and bio-chem-genetic means.
1a3) N-weapons
Developed are N-weapons, utilizing nano-sciences and -technologies for ‘molecular engineering’ in the 
range of 1 to 100 nanometers to enhance analytics, inorganic and organic solid, liquid, gas, plasma ma-
terials, miniaturization, performance, safety and handling. Since the 80s, employed are nano-machines 
and placed as programmable nano-robots in body tissue to manipulate their anatomy, morphology, phy-
siology and environment and with it the level of functional capabilities.

1b) Russia
Russia developed a B-C-G-R weapon arsenal by its political-military-security-industrial complex starting 
before 1941 and after the war massively scaled up its research, testing and pilot runs in the security labs 
and dissection chambers of the KGB and also mental institutions, the Gulag, the chemical-pharmaceu-
tical industry, colleges and on populations at large. Their deployment structure, command centers, pro-
duction, stockpiles and delivery systems match those of the NATO forces for overkill deterrence.

1c) Results
Out of the advances in modern bio-chemical sciences, which are comparable to the progresses in phys-
ics in the first half of the 20th century, the criminal intent of the political-military secret policy goals and the 
military-intelligence agencies’ research projects has realized with B-C-G-R-N technologies, extending the 
radius of action over space, time and nature as man's vulnerable physiological base, new, devastating 
dangers to mankind. Threatened to come are spreading planetary catastrophes through contamination of 
the human gene pool with eg miscarriages, malformations and crippledom for hundreds of years and era-
dication of billions of people and the possible self-extinction of mankind.

						2


			2) Political constellation from 1939 on

2a) War Objectives from 1939 - 1945
The political-military efforts of the Allied Forces during WW II were concentrated on their war objectives: 
unconditional surrender of the fascistic Achsenmächte and Japan, border revisions, division of Germany, 
administration by an Allied Control Council, demilitarization, denazification, democratization and repa-
rations. (Teheran Conference 11 28 - 12 01 1943; Jalta Conference 02 04 – 02 11 1945; Potsdam Con-
ference 07 17 - 08 02 1945) Military actions were eg cranked up armament research and production, 
securement of supply lines, invasion of Western Europe and a war on multiple fronts.

2b) Nuernberg Trials
2b1) The political-military opponents were fascist governments, which pursued total warfare with propa-
ganda, racist ideology, militarism, non-recognition of international conventions, labor/concentration 
camps, mass murder and genocide.
2b2) The trials (1945-47) gave impulses to international law, addressing the Geneva Conventions, geno-
cide, war crimes, limitations, human rights and established the Nuernberg Principles and Code.

2c) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and 
Russia advanced to superpowers of a new world order over war and peace in possession of atomic 
weapons, the US since 1945, the USSR since 1947. They extended the imperial policies of the 19th cen-
tury for profit and control of geo-political power structures into the 20th and turned their war objectives 
after the capitulation of the fascists to ideological concepts of man, society and future progress, ideo-
logical-political-social block formation with satellite states, new borders and spheres of influence, free 
access to resources, advantageous international division of labor and terms of trade. WW II lead without 
a peace treaty in a poisoned atmosphere to the Cold War up to 1989. The NATO was founded on 04. 04. 
1949 and the Warsaw Pact on 05. 05. 1955.
The US leadership transformed the political character of their country corruptively along secret policy 
goals into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax Americana, 
while formally adhering to a constitutional democracy, human rights and freedoms.

2d) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, propa-
ganda, block formation, arms, space, resources, sciences, technologies, applications, geo-political-social 
structures, corruption and fornication. Cold War objectives of propaganda and military battlefields spread 
beyond politics, religion, culture, key-sciences, economy and finance to all scientific disciplines and legal-
social fields, especially the information technologies and life sciences with anthropology, psychology, 
sociology, medicine, biology, zoology, bio-chemistry, electro-biology, genetics and also ecology and cli-
mate. All professional and non-professional fields were tied into ideological competition and all means 
allowed except direct employment of A-weapons.
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with 
overkill ABC weapons and aggressive security R&D programs with technological superiority.

2e) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions, 
foundations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA, 
NSA, FBI, DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the 
National Security Act of 1947 with the CIA, drawing out the power lines for home based global pre-
dominance of all branches of the military with foreign sided dependencies and also global secret policy 
goals to cover all civilian domains by social programming with eg control over larger R&D programs and 
high tech applications, surveillance, false fronts, control of public media, manipulation of individual psy-
chological profiles, social structures and processes und beyond of demographic structures of entire po-
pulations.

						3


				3) Enforcement concepts from 1945 on

Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite 
states and are carried by infiltration over to the clients of ideologically opposite camps.

3a) Security planning receives priority over general national and international interests of the Community 
of Nations. The security apparatus is justified by institutionalized relations, public relation campaigns, 
lobbying contacts and supportive diplomatic networks like transatlantic and -pacific partnerships for 
continuous collaborative co-ordination of interests.

3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only 
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, - 
not the mobilization of the masses for political-social action.
The traditional goals of military forces to successfully invade a foreign country and of intelligence services 
to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and 1963 
in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without alter-
native.
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy goals, 
operations, methods, installations, equipment, data banks and image.
A global communication/surveillance system with satellites, ground receiver stations, interception of data 
high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with 
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitutional 
framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media', 
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Protection of assets
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total 
secrecy and unaccountably, their agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting 
out from public opinion any ideologically non-acceptable statements. An intelligence review panel has 
power over life and death.

3c) Technologies are seen as the 'key to power' in the 21st century.
They are the practical tools of the operational arms. US/NATO research panels of the military and security 
agencies like at the Defence Advanced Research Projects (DARP) develop the arsenal of compact weapon 
architectures over the spectrum of conflicts out of an array of large scale research, development, test and 
employment programs, which are offered, awarded, tested, set up for operation, departmentalized and 
institutionalized. Weaponizing of modern technologies is to hit progressively easier, faster, severer, more 
precise, be more effectively guided and shielded than foregone ones and to exhaust human-material, 
scientific-technological capabilities in space, air, at sea, land from single to large scale, non-lethal to lethal, 
intercepting to retaliating tools and in cyberspace from data scanning to misinforming to infrastructure 
crippling hacks, mainly in misuses of physics, chemistry, biology, genetics, medicine and computer 
science. They corrupt as totalitarian tools in first line human living environments, where it cannot be 
perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of 
research, testing and employment with command centers and a system of labor camps. Developed are 
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like 
contaminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radi-
ation and neurologically coded misinformation.

						4


		  4) B-C-G-R-N weapon development from 1945 on

B-C-G-R-N weapon development in the US and Russia are conducted as highly classified operations, 
especially life tests on selected targets.

4a) Tests
Test series on R guns and bio-chem-genetic toxins are conducted in the security agencies’ laboratories 
and training areas by conceptualization, modeling, simulation, war games and also for combat exposure 
in life tests to collect representative samples from populations at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed 
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psycho-
logic latent, present and long term effects over a wide spectrum, eg affected tissue and function, degree 
of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining factors, count-
er-poisons, recuperation times, measurability, visibility and traceability.

4b) Worth analysis
Active warfare agents undergo a comprehensive military worth analysis according to present and desired 
performance standards in their eg bio-chemical-genetic components, production, safety precautions, 
handling, training, weapon concept, equipment, infrastructure, cover, costs, target vulnerability, opera-
tional engagement, mission accomplishment and plausible deniability.
Employment ready weapon systems are handed over to the operative command structure of the armed 
forces and security services.

4c) Legal situation
4c1) The Common Rule, safeguarding against experimenting on the public without its consent in the US, 
allows for non-consensual experimentation by intelligence agencies. US DoD Directive 5240 1.R saved 
882013, Ch 4, Procedure 13 (1998) says: 'Experimentation is allowed on human subjects for intelligence 
purposes.'
4c2) The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
4c3) Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce them. 
Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences human, po-
pulation, pharma, behavior genetics and gene technology. They serve life and not in inversion of human 
dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed weapons always 
lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
The civilized world; customary international law; The Hague Land Warfare Convention (The Hague 1899); 
the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacteriological Methods 
of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention (UN Geneva 1972) 
and The Chemical Weapons Convention (UN Geneva 1992) outlaw their development, production, stock-
piling as a means of warfare and call for their disarmament.

4d) Public investigations
Public investigations, eg the Church and Pike Committees, revealed some past pseudo-medical experi-
mentation at eg the San Antonio AFB TX, the Army Special Forces Center NC, the Los Alamos National 
Laboratory NM and private institutions in successive sub-projects of MK Ultra, but the operations have 
then been farmed out for deeper cover be-cause of sensitivity to public resistance and not to implicate the 
security services directly. The CIA siphoned off funds from defrauding the government, collaboration with 
criminal organizations, weapon trading, security contractors, proprietaries, recycling of radioactive mate-
rials, market manipulations, economic data trading and extortion.

4e) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diagnosis. 
Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned down 
for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are to re-
cover and the death certificate claims in all cases an apparently natural cause of death.

						5


		  5) Some US/Clients activities 1945 - 1989

5a) Labor camps
A system of labor camps is operated globally and expanded continually.
Camp guards are employed as spot, select, walk by, tag, decoy, stalk, harass and hit teams.
5a1) By the late 50s, set up were high tech command centers like the Special Operational Command 
(SOC). They are located within security bases and supervise a satellite communication/surveillance 
system, research, testing, production, procurement, deployment and employment of B-C-G-R-N micro-
weapons, the toxins, set off systems, equipment, training of special forces and agents.
5a2) By the early 80s, security research and industry supported, systematic, area covering employment 
of non-genetic, electro-magnetic-bio-chem toxins manipulates the political-social profiles of more than a 
hundred million people of all groups of society a year worldwide.
5a3) The Global System of Labor Camps comprises
 ◦ Surveillance camps: spies record for information control the data flow in its entirety worldwide.
 ◦ Deception camps: multi media presents a Potemkin village.
 ◦ Extermination camps: executioners eliminate more than one thousand people a year.
 ◦ Gas chambers: hit teams spray with nerve gases thousands of people a year.
 ◦ Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
 ◦ Harassment camps: Intelligence trainees strike down on millions of people a year.
 ◦ Sadism and sodomy camps: hit teams execute a billion druggings a year.
 ◦ Behavior manipulation camps: hit teams mass drug millions of people a year.
 ◦ Client camps: agents commit gross human rights violations around the world.
 ◦ Dissection camps: hit teams test new toxins on millions of people a year.
 ◦ Genetic camps: hit teams test genetic toxins on thousands of people a year.
 ◦ Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge 
   themselves for bestialities of the Super Powers.

5b) Some special operations
5b1) US military-intelligence stay behind forces in occupied territories as in Germany after WW II (1945) 
have systematically targeted anti US/Cold War - pro disarmament activists.

5b2) The FBI, responsible for counter-intelligence, established under J. Edgar Hoover in the 50s with the 
Project Cointelpro (COunter INTELligence PROgram) surveillance, infiltration and disruption of activist 
groups and organizations, deemed to be government critical and possibly foreign influenced. To forestall 
mass movements of progressive groups as for civil rights, disarmament, environment and immigrants, they 
employ in the gist of the McCarty area (1950 - 54) psychological warfare like intimidation and extralegal 
force like fabricated charges, false arrests, suicide blackmail, drugging and assassination.

5b3) The US, Britain and France conducted with their atmospheric nuclear test programs 1945 - 62 life 
tests for fall out studies until the Limited Test Ban Treaty (LTBT) from 1963.

5b4) France and Israel developed their nerve gas agents with test series on FLN and Palestinian freedom 
fighters, taken prisoners, - none survived and their ashes were scattered over the deserts.

5b5) The Manson family founded 1968 a hippy community near Los Angeles with up to 100 members. Out 
of racial ideology and CIA ties members were psychologically, physically and by drugs enslaved and in 
1969 programmed in their behavior up to the point to commit a series of murders.

5b6) Major Assassinations
 ◦ Marilyn Monroe died on Aug 5th 1962 by administered drugs by people close to J. F. Kennedy.
 ◦ J. F. Kennedy was shot on Nov 22nd 1963 in Dallas TX to forestall an internal CIA audit and clean up.
 ◦ Dr. Martin Luther King was shot on Apr 4th 1968 in Memphis TN to break the civil rights movement.

						6


5b7) Coups d'état
 ◦ The CIA/MI5 coup in Iran 1953 against Mohammad Mossaddegh reinstalled the Shah.
 ◦ The CIA/MI5 coup in Iraq 1963 against Abd al-Karim Qasim supported the Ba'ath Party.
 ◦ The CIA coup in Chile 1973 against Salvador Allende set A. Pinochet with a military junta in power.

5b8) Vietnam War 1955 - 75
   b8,1) US military-intelligence forces employed in detention and interrogation B-C-R weapons.
   b8,2) The chemical defoliation program from 1961 - 75 employed among others Agent Orange with 
   highly noxious traces of dioxin from its manufacture at Dow Chemicals to cause dioxin poisoning of 
   more than 4 million people.
   b8,3) The Phoenix Program, succeeding similar efforts, was conceived by the White House in 1965, 
   supported by the CIA, DoD and US Military Assistance Command Vietnam (MACV) with intelligence 
   liaison officers, Green Beret and Navy Seal troops in operation. As a terror campaign against the ci-
   vilian population it was to infiltrate and break the Viet Cong infrastructure of VC sympathizers. With 
   over 3o ooo recruited informers it eliminated by democide over 1 5oo people a month, over 4o ooo to 
   the end of the war.

5b9) Public investigations
In wake of the Vietnam War followed a series of news paper leaks and investigative commissions like the 
 Church and Pike Committees (1975), giving evidence about illegal surveillance, torture, pseudo-medical 
experiments and assassination attempts of foreign heads of state by the NSA, FBI and CIA. 

5b10) Star Wars
   b10,1) The Strategic Defence Initiative (SDI) of 1983 was to set up an effective shied against inter-
   continental ballistic missiles by space based radiation weapons and anti-rocket rockets. In 2002 it was 
   incorporated into the National Missile Defence Project.
   b10,2) This initiative has been undertaken against the UN Outer Space Treaty from 1967, banning the 
   placing of weapons of mass destruction in outer space as a basis for international space law. It is 
   ratified by the mayor powers and 107 countries are full party to the treaty.

5b11) End of the Cold War
In autumn of 1989 the Berlin Wall fell, the USSR broke up und reunification of Germany followed. The 
methods of the Cold War appeared to have been 'justified'.



















						7


		6) Spreading awareness of covered B-C-G-R micro-weapon operations 

6a) Victim associations
Several victim associations and self-help groups, calling themselves also targeted individuals (TIs), formed 
themselves since the 70s, organized themselves in small action groups and since the 80s in alternate 
media of the WorldWideWeb. They conduct information campaigns about live tests of military-intelligence 
B-C-G-R-N research projects, especially the development of R-guns, writing to eg government offices, 
legislatures, non-government organizations (NGO), medical associations, the press, handing in petitions 
and law suits at the responsible government offices for violations of rights to life, security, health and liberty 
by deliberate assault on non-combatants. There they are altogether ignored, turned down, send to psy-
chiatric treatment, put under surveillance, infiltrated, instrumentalized as false fronts, shown off as warning 
examples and neutralized in labor camps. They are hardly supported by established caritas organizations.

6b) The Bush I administration
In December 1989 the Bush I Administration (1989-93), the President, National Security Council and 
Justice Department gained detailed knowledge of some 'black projects' of B-C-G micro-weapons with their 
secret policy goals, research, testing, organization, employment and massive CIA/FBI human rights 
violations against entire population groups. In February 1990 the US Senate Intelligence Committee ob-
tained a corresponding report. Some information circulated through several administrative departments.

6c) Third World Countries
The governments of a large number of Third World Countries were equally informed about US military-
intelligence ‘black projects’ of B-C-G micro weapon research and employment and the issue has been 
reviewed by their secretaries of defence and chiefs of intelligence.

6d) The public
Throughout the general public at home and abroad the knowledge about human rights violations by 
government, industry and other private agencies' security personnel with the most advanced micro-wea-
pon technologies started to spread slowly and usually point like. The new threats were mostly not fully re-
alized with their incisive consequences, by demonization of opponents defended, in cynicism belittled, with 
mock arguments diffused, in apparently safe distance by-passed or with round about bestiality outdone, 
but mostly passed on by word of mouth, mail and electronic media like phone, fax and internet. 
Some private investigations determined clinical tests for some toxins, side effects, counter-toxins, thera-
pies and protective measures. Active hit teams, institutions, schreibtischtäter, scientists, technicians, their 
allotted tasks and employed equipment have been recorded and in parts stored on private, digital data banks.

6e) New political forces
Spreading knowledge and politicization of covered B-C-G-R micro-weapon operations generated new po-
litical-military-intelligence-social-cultural forces around the world. Most visibly, power ambitions and se-
curity interests of all global players and professional fields stepwise duplicate, proliferate and intensify the 
employment of micro-weapons to feed a spiral of hate and bestiality, a clandestine, global dirty B-C-G-R 
war between all fractions and new emerging groups and a fornication race for predominance in their tech-
nologies, production and employment for control over individuals and population groups with their struc-
tures and processes.








						8


	7) Initial reactions from US/Clients, Third World Countries and the Public from 1990 - 2001

7a) Positions by the Bush I and Clinton Administrations
The Bush I Administration, in line with hegemonic policies and a powerful lobby of the Security Com-
munity, continued on executive order R&D projects with bi-chem-genetic toxins. US CIA, Military and 
NATO laboratories stepped up their research of recombinant DNA technologies with the goal to exhaust 
their political-military-economic-social potentials, especially to modernize the present state of the art of be-
havior programming, attacking causes and not only symptoms by stable, sustainable transferal of modelled 
genetic strains to succeeding generations and also to improve its economy by centralized supervision of a 
lean network of undercover operatives.
7a1) Activities at home
 ◦ Surveillance of groups, regarded as dissidents, was tightened. All security matters in public discussion 
   are to be defused by plausible denial and then with all their fibers removed from public awareness.
 ◦ In March 1990, some in the Republican leadership pressed the Democrats to drop the matter and to 
   hide CIA/FBI micro-weapon misuses to their full extent. The Office of the President contacted several 
   national papers to intercede with publication of any of these CIA/FBI misuses.
 ◦ After the election in November 1992, B. Clinton continued his predecessor's policy of total secrecy.
   In line fell M. Thatcher of Great Britain, F. Mitterand of France, H. Kohl of Germany and later also 
   J. Mayor of Great Britain.
 ◦ In January 1998 W. Renquist of the US Supreme Court took the part to suppress any legal evidence of 
   undercover security operations within the federal, state and local US justice system.
 ◦ In March 1999 B. Clinton, having just survived impeachment procedures in Congress, declared pub-
   lication of these crimes to be the world's No 1 terror threat. He started a billion dollar program to tighten 
   up all major US institutions against counter-attacks and to insure their support.
7a2) Activities oversees
 ◦ In May 1993 B. Jelzin of Russia condoned the Western Atomic Powers’ policy of total secrecy. He em-
   ployed B-C-R weapons by way of his own security services systematically under cover.
 ◦ Early 1994 some of German industry reinforce BND/AVS nerve gas attacks with industrial toxins.
 ◦ In August 1994 the Government of Israel reaffirmed its support for Mossad operations, employing nerve 
   gases and bio-chemical drugs.
 ◦ In fall 1994 the Holy See in Rome yielded to bribery and extortion to drop opposition to human rights 
   violations by the Western Powers’ intelligence operations.
 ◦ In early 1996 the leaders of the Governments of the US, Great Britain, France, Germany and Russia 
   reaffirmed their decision to contain the further spreading awareness of their massive human rights vio-
   lations by any means, including assassination.
 ◦ On 11 28 1996 the European Commission of Human Rights turned down a suit against CIA/BND mass 
   nerve gas and drugging operations, violating the European Charter’s Art 2,1 Right to Life; Art 3 
   Degrading Treatment; Art 5,1 Freedom and Security; and Art 8,1 Privacy (Application No 33445/96).
 ◦ In May 1997 T. Blair of Great Britain continued the policy of total secrecy.
 ◦ Since then NATO military security employs measurement of brain wave patterns area covering across 
   countries in their early warning system against security threats.
 ◦ In May 1998 the Government of Japan pledged its support to the Western Atomic Powers to assist in 
   the enforcement of total secrecy.
 ◦ In July 1998 NATO military security services became broad based active to suppress the spreading 
   awareness of micro-weapon operations.
 ◦ In October 1998 on initiative of G. Schröder of Germany, predominant forces of German and US In-
   dustries reinforced total secrecy with their own security organizations.
 ◦ Also in fall 1998 the Russian Military agreed to execute assassinations on contract.
 ◦ In January 1999, the European Parliament passed resolution Eg A4-0005/99 EP, calling for disarma-
   ment of A-weapons, destruction of B-C stockpiles and an international convention to ban all weapons, 
   which might enable any form of manipulation of human beings.
 ◦ Dismissed was a law suit against illegal BND activities: Staatsanwaltschaft Bonn, 09 13 2000 (AZ 50 
   Js 898/00).

						9


		7) Some US/Clients/Global activities 1989 - 2001

7b) Third World Countries
7b1) Loose coalitions
The majority of the smaller and larger Third World Countries formed coalitions for information sharing and 
initiated, supported by Russia, in depth investigations of the intelligence agencies of the Western Atomic 
Powers and NATO, Japan, Germany, Israel and eg Saudi Arabia, especially their development of compact 
weapon architectures and employment against opponents, dissidents and entire population groups.
Their political goals branch out widely
 ◦ Information about the developmental status of B-C-G-R-N micro-weapon systems.
 ◦ Protection against threats from B-C-G-R-N micro-weapons.
 ◦ Predominance in B-C-G-R-N micro-weapons with global employment.
 ◦ Political-military-economic-social counter-leverage against the Western Powers.
 ◦ Suppression of any attempt towards publication of undercover operations.
 ◦ Revenge for torture, murder and 500 years of dehumanizing treatment.
 ◦ Indignation to lay waste depraved political-social leadership.
 ◦ In all, they copy the Major Powers’ system of labor camps.
7b2) Counter actions
The Third World Countries retreated one by one from their initially pledged support for public, reliable 
international safeguards against misuses of modern B-C-G-R-N technologies to protect the dignity of man, 
right to life, basic freedoms and a community of nations, free of war. Suggested was the enactment of 
special legislation to ban the development, possession and use of devices, which can manipulate the 
human nervous system and of toxins, which can manipulate the human genome, excepting analogous in 
concept to the abortion indication rule some diagnosis methods, prostheses, production of medication and 
therapies with informed consent. - Instead they caved in to the policy of total secrecy for undercover se-
curity operations.
They increasingly counter-attacked US Military/CIA/FBI and German BND/MAD/AVS personnel to con-
tain their massive nerve gas and drugging operations in the US and Europe and soon scaled them up 
against hostile agents worldwide. In all, they copy the Major Powers’ system of labor camps.

7c) The Public
Driven by spreading awareness of micro-weapon operations, Private, Independent Defence Leagues 
spring up mostly as smaller parties out of individual security concerns, organize themselves for collective 
protection and are continuously multiplying beyond several thousand groups worldwide. They investigate 
parallel to the Third World Countries the security-intelligence services first of their local region, then suc-
cessively of their home country and neighboring states. Their operational interests unfold like those of the 
Third World Countries into information, protection, predominance, counter-leverage, total secrecy, revenge 
and indignation. They arm themselves with communication/surveillance systems, stolen equipment, plun-
dered stockpiles, intercepted supplies, copied operational know-how and recruit their own undercover hit 
teams. In all, they copy the Major Powers’ system of labor camps.

7d) Minority position
Only a diminishing minority fraction realizes the extreme vulnerability of human nature to transgressions 
of boundaries that will inevitably lead to planetary catastrophes. They appeal to the human spirit of the 
times to initiate the long winding procedures of the mills of justice with a public investigation, prosecution, 
sentencing, compensation and legal safeguarding measures to stop the killing by
 ◦ An information campaign about possible misuses of positions of power with the employment of B-C-G-
   R-N weapon systems, legal regulations, establishment of medical-legal evidence, enforcement and 	
   compensation procedures for injuries by every citizen.
 ◦ A public investigation into past and present B-C-G-R-N misuses in every country around the globe.
 ◦ Supplementation of international conventions, empowering of national-international law enforcement for 	
   compliance with conventions and regulations, an international disarmament operation and global super-
   vision of military-intelligence weapon development projects, their testing, production, stockpiling, de-
   ployment and employment.

						10


		8) Escalation into a clandestine, global dirty war from 9/11 2001 on

8a) Escalating forces
8a1) Power
The majority of the Global Players of the Industrialized Nations, of the medium and larger Third World 
Countries and of the Private, Independent Defence Leagues act out of lower power instinct, the most de-
vastating archaic notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despotic 
perversion social values, constitutional structures and processes. They are not capable to fill human dignity 
with content, but oscillate without a base between the poles of illusion and bestiality.
Out of one negative motive, misuse of power, they have escalated mass human rights violations with B-C-
G-R-N compact weapon systems in all areas of life along the states of investigation, subversion, cor-
ruption, fornication, stirring up of hate and incitement to bestialities under cover of image fascism into a 
clandestine, global dirty war, fraction against fraction, interlocked in a fornication race for 1st place.
Justification of hegemonic policies by an ideology of competing social systems and instigated terrorism 
gives evidence of incomprehension of God and responsibility, nature and reason, man and maturity, 
society and ethics. Perversion of God given institutions are crimes against humanity and the creation.
8a2) Security concerns
Private individuals are left standing without legal defence against arbitrary assassination, nerve gas at-
tack, toxic drug attack, radiation attack or any illegal listening or video device. In global systems of labor 
camps millions of people are being manipulated out of their lives each year.
However, the Predominant Powers, Third World Coalitions and Defence Leagues rely blindly for their per-
sonal and collective security on gapless information control, electronic shielding and deterrence by bes-
tial retaliation and can maintain the apparently calm political surface of image fascism with pretended 
ethical political-social standards only by all round escalating repressions, which chase themselves in ex-
cesses of hate and violence.
8a3) Crime
Worldwide spreading awareness of clandestine operations with B-C-R-G micro-weapons without being 
subject to legal prosecution has opened up opportunities for illegal activities across the board. Information 
skimming has become an integrate technical part of organized crime. The issues of micro-weapons, their 
technologies, precise employment, protection against, use in extortion and as revenge have been passed 
around through underground scenes worldwide.
8a4) Terror
Worldwide spreading awareness of the Western Atomic Powers' open and covered hegemonic policies 
with gross inequities, their clandestine operations with B-C-R-G micro-weapons with massive torture also 
against population groups at large induced an increasing series of terrorist attacks by militant groups 
mostly against soft targets of the US and their Allies, eg:
Jul 1996 Lockerbee
Aug 1998 Kenia
Sep 1998 Kairo
Sep 2003 Beslan
Nov 2003 Istanbul
Mar 2004 Madrid
Apr 2004 Saudi Arabia
The series of terrorist attacks continues, but is gradually decreasing, as more and more militant groups 
arm themselves with micro-weapon systems to pursue their political causes.
Increasing are sexual offences and killings, amok runs, suicide bombings and unexplained deaths like of 
J. Möllemann in 2003 due to an B-C-R attack.
8a5) Anti-terror war
On September 11th 2001 the Twin Towers in NYC and the Pentagon in Washington DC were attacked by 
al-Qaida terrorists, hijacking civilian passenger jets on routine flights to steer them into the buildings.
The attacks were intentionally allowed to proceed by the Bush II Administration's Security Planning Group 
as a fabricated political event to extend belligerent global hegemonic policies beyond the Cold War into a 
war against terrorists and their possession of weapons of mass destruction.

						11


8b) Escalation by US/Clients
8b1) The Bush II Administration (2001 - 2005) together with its Allies and NATO declared war on inter-
national terrorism and terrorists' control over weapons of mass destruction. In Congress the US Patriot Act 
passed on 10 25 2001, which was followed by the US Freedom Act on 07 01 2015, empowering the in-
vestigative authorities with more rights at the expense of civil liberties. The intelligence, military and ad-
ministrative anti-terror forces were restructured. To fortify its 'limes' against imports of instabilities, civil 
strife, war and terrorism and to eradicate the al-Qaida terrorist network, it forged a global political alliance 
with UN mandate and led by US military forces invaded in Nov 2001 Afghanistan, defeating the Taliban 
regime. To topple S. Hussein's murderous dictatorship, US troops, without a UN mandate, but with sup-
port of Great Britain, Turkey, Spain and Poland, invaded in March 2003 Iraq, throwing the country into a 
civil war with daily casualties by Iraqi resistance forces and partisan groups.
8b2) The Bush II & III Administrations (2001 - 2009) and their Allies boosted the propaganda against in-
ternational terrorism, its ideologies, dangers and underground activities. Addressed was mostly the low-
est emotional level with the motto: 'Patriotic crimes in defence of liberty are no vice'.
8b3) They reinforced their global system of labor camps as a ‘limes’ against ‘social infiltration’. They im-
proved total information control; entering, corruption, sabotage, drugging and assassination techniques; 
international co-operation with allied security organizations; shielding of government and private insti-
tutions against counter-attacks; recruitment of undercover staff by observation, corruption, extortion and 
incorporation into an agents’ network to instrumentalize all vital areas of society from the churches, 
charities, arts, medical associations, economic-financial institutions to the courts. They also set up a 
number of farmed out, mission responsible but formally independent identification, surveillance and hit 
teams under pretense to clean up clandestine terror operations.
Peaceful protests are crashed with sodomitic bestiality, as Kanzler G. Schröder of Germany operated SS 
like nerve gas and poison pellet hit team to guard his office grounds in Bonn.
8b4) Military-intelligence-private R&D efforts press ahead with the project of a 'human hand directed evo-
lution' to transform man as a product of natural evolution into a programmable cyborg – cloned chimera 
with special augmented capabilities according to orders on the ‘scientific rational base’ of population ge-
netics by electro-magnetic-mechanical and bio-chemical-genetic means.
8b5) Developed are N-weapons, utilizing nano-sciences and -technologies for ‘molecular engineering’ in 
the range of 1 - 100 nanometers to enhance analytics, inorganic and organic solid, liquid, gas, plasma 
materials, miniaturization, performance, safety and handling. Since the 80s, employed are nano-machines 
and placed as programmable nano-robots in body tissue to manipulate their anatomy, morphology, phy-
siology and environment and with it the level of functional capabilities.
8b6) Dismissed was a law suits against illegal BND activities by the European Court of Human Rights, 
Strasbourg on 07 16 2002 (Application Nr. 6456/02).
8b7) In 2012, the EU received as long term zone of peace, stability, tolerance and prosperity the Nobel 
Peace Prize.
8b8) Counter-steering efforts
 ◦ In 2001, 2002 and 2005 Congressman D. J. Kuchinich introduced the Space Preservation Act, pro-
   hibiting the stationing of weapons in space, which was referred to the House Science, Armed Services 
   and International Affairs Committees, but no further action ensued. Weapons listed were
   Electronic, psychotronic or information weapons; Chemtrails; High altitude ultra low frequency weapon 
   systems; Plasma, electromagnetic, sonic or ultrasonic weapons; Laser weapon systems; Strategic, 
   theater and tactical extraterrestrial weapons; Chemical, biological, environmental, climate or tectonic 
   weapons.
 ◦ In 2002, the International Committee of the Red Cross raised the issue of Directed Energy Weapons at 
   the Geneva Forum, also 2009 at the 5th European Symposium on Non-Lethal Weapons and again at its 
   European Conference.
 ◦ Dismissed was a law suit against illegal BND activities; European Court of Human Rights, Strasbourg 
   07 18 2002 (Beschwerde Nr. 6456/02).
 ◦ Since 2006, whistleblower J. Assange publicizes via WikiLeaks hacked government documents, poin-
   ting to violations of law by administrative policies and actions.
 ◦ In May and August 2011 the group Individuals Tending to Savagery (ITS) committed attacks against 
   scientists at the Instituto Politécnico Nacionl and Instituto Technólogico y de Estudios Superiores de 
   Monterry in Mexico to block nano-research with its uncontrolled dangers for life on earth.
 ◦ Since 2013 whistleblower E. Snowden publicizes via press leaks internal NSA documents, giving evi-
   dence of its global surveillance activities.

						12


8c) Escalation by Third World Countries
The governments of the Third World Countries continue their investigations into the Major Powers' and 
their Satellites’ military and intelligence activities and widen them out to screen all their political-social 
forces, decision making elites, public and secret policy goals, social structures and processes, resources, 
government and private security personnel and area covering single households.
They penetrated electronically most political-military-intelligence high security areas and often leaked 
show off successes into open channels.
Also, with ongoing investigations they are again and again fed up with disgust. Behind the image fascism 
of the Industrialized Nations yawns a social fabric without credibility, without any basic values of life and 
especially truth in its generation, management and leadership role.
8c1) Their political intentions remain spread out widely: information, protection, predominance, counter-
leverage, total secrecy, revenge and indignation.
8c2) At home they screen all foreign past and present intelligence activities in all areas of their countries' 
life from covered operations to environmental damages. They rolled back and protect themselves against 
further foreign subversion and corruption, also cutting off the fuel for up to then hardly heeded fornication 
as cultural and economic weapon, degrading social fabrics by internally bleeding wounds.
8c3) They strive in loose coalitions with exchange of data and alignment of interests for global predomi-
nance in B-C-G-R-N micro-weapons and not for internationally guaranteed safeguards, multiplying the 
new, devastating dangers for mankind.
8c4) They expand their global undercover micro-weapon operations.
 ◦ Formally they tolerate foreign hostile political propaganda, secret policy goals, enforcement concepts, 
   deployment structures, weapon development, financing and most undercover operations.
 ◦ They expand their own military-intelligence infrastructure, often drawing on scientific, technological, 
   logistic and data support from Russia.
 ◦ They expand their own global system of labor camps with a network of affiliated groups.
 ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
 ◦ They combine their in-depth investigations with political-military-scientific-commercial espionage.
 ◦ They undermine foreign communication/delivery systems along the entire chain from raw materials, pro-
   duction, storage, deployment, employment to follow up by eg theft, tampering, degradation, early set off, 
   electronic interference/shielding, counter-attacks on hostile personnel to thin out, fend off and incapa-	
   citate an increasing number of poison pellet operations.
   Some hostile operations continue as sham successes, defused under hand, while backgrounds are up-
   rooted throughout all ramifications.
   Some isolated local regions have become poison pellet free zones.
 ◦ They suppress any attempt towards publication of their B-C-G-R-N undercover operations.
 ◦ They have pumped up with depot poison pellets all political, military and civic leaderships in the Western 	
   Industrialized Nations, especially the personnel of their security organizations as well as the activists of 
   the Private, Independent Defence Leagues to neutralize them as security threats.
 ◦ Equally targeted are any hostile person or group or fraction of a population.
 ◦ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, to 
   impair their ability to work and to enslave them physically and psychologically.
 ◦ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and 
   present Heads of State like G. Bush Senior and Junior, B. Obama, D. Trump, J. Biden, G. Schröder and 
   A. Merkel have been or are being sodomized regularly, who in a public position see no alternative but 
   to hit back.







						13


8d) Escalation by Private, Independent Defence Leagues
The Private, Independent Defence Leagues continue their investigations, starting out from households, 
workplaces, public institutions and the electronic equipment of their local area and widen them out to cover 
the Major Powers' military and intelligence activities in their region and neighboring states.
Most victims’ reactions lead to self-imprisoning, deeply burnt in abhorrence and hate.
8d1) Their political intentions remain spread out widely: information, protection, predominance, counter-
leverage, total secrecy, revenge and indignation.
8d2) They strive for local and regional predominance in B-C-G-R-N micro-weapons and not for inter-
nationally guaranteed safeguards, multiplying the new, devastating dangers for mankind.
8d3) They are growing beyond several thousand groups worldwide, recruiting themselves via under-
ground channels out of various population groups
 ◦ Close to crime, to secure their illegal operations.
 ◦ Close to communication/surveillance systems, following undercover operations.
 ◦ Close to security systems, following advanced security technologies.
 ◦ Victims, their relatives and friends, to defend and revenge themselves.
 ◦ Threatened citizens, to defend themselves out of private security concerns.
 ◦ Upset citizens, to vent their indignation over depraved political-social leadership.
 ◦ Cynical citizens, to profiteer from private security concerns.
 ◦ Hypocritical citizens, to make victims under false flag illusionary hopes.
 ◦ Engaged citizens, who want to stop the killing.
   Some semi-anonymous, regional lists of perpetrators are being circulated in public.
8d4) They ally and organize themselves in global information sharing and collaborating networks. They set 
up several defensive lines, farm out operative tasks, go under deeper cover and to remote areas to erase 
tracks. They draw under pretense of security all professional fields, societal institutions and the entire po-
pulation into complicit, sodomitic roped parties. Undercover operations have multiplied themselves into 
a peoples' movement and become with their perversions, excesses, security circus, costs and dangers in 
a highly technological environment a political-social topic in all circles of society.
8d5) They expand their local, regional and also global undercover micro-weapon operations.
 ◦ Formally they tolerate the security agencies’ political propaganda, secret policy goals, enforcement con-
   cepts, deployment structures, weapon development, financing and most undercover operations.
 ◦ They set up their own command centers, communication/surveillance systems, steal equipment, plunder 
   stockpiles, intercept supplies, copy operational know-how and recruit their own hit teams.
 ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
 ◦ They combine their in-depth investigations with political-military-scientific-commercial espionage.
 ◦ They undermine foreign communication/delivery systems along the entire chain from raw materials, pro-
   duction, storage, deployment, employment to follow up by eg theft, tampering, degradation, early set off, 
   electronic interference/shielding, counter-attacks on hostile personnel to thin out, fend off and incapa-
   citate an increasing number of poison pellet operations.
   Some isolated local regions have become poison pellet free zones.
 ◦ They suppress any attempt towards publication of their B-C-G-R-N undercover operations.
 ◦ They often attack with government and foreign agencies any hostile person or group.
 ◦ They hypocritically pretend to clean up the misuses of modern bio-technologies, however
   They lie about life and creation, procreation and causes of procreation, death and causes of death, 
   constitutionality and human rights, perverting faith, reason, maturity and ethics.
   They do not pass on objective political education to the general public.
   They do not inform the general public about possible misuses of power.
   They do not exercise constitutional oversight over positions of power by the people.
   They do not activate the public authorities against human rights violations of mass rape and murder.
   They do not help a single victim with advice, a doctor or a lawyer.
 ◦ They strive for breakthroughs in fornication, their executioners way laying in first line advocates of 
   publication, prosecution and public trial of the perpetrators according to penal law to sodomize them to 
   death by first shooting in bio-chem-gen-electro-magnetic-thermal-acoustic microchip sensors and radio 
   emitters, then pumping in depot poison pellets, then crippling their inner freedoms of thought and move-
   ment, last breaking their physical strength, - all under the perversity label of direct help with medication 
   or emergency medical care for the victims.

						14


				9) Constitutionality

Constitutionality comprises principles, constitutional reality, historical and legal evaluation and political-
legal correction.

9a) Principles
9a1) Based on human dignity, all universal object and framework values branch out from it.
Its scaled up intent is ethical awareness in telos of mind with correction of inhibiting factors.
9a2) Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision, man can have.
9a3) Ethics' task is to arrest gross corruption with major criminal potential that its disastrous consequences 
do not run to their self-destructive end.
Method is conflict solving by language, enlightenment, regulation, task, means and supervision.
It overcomes with spiritual-political-social will any hostile, inhibiting factor.

9b) Constitutional reality
The Predominant Powers and their Allies, most Third World Countries and Private, Independent Defence 
Leagues conduct with their security services a clandestine, global dirty B-C-G-R-N war among all parties 
and their populations. Together, they operate global systems of labor camps for electro-magnetic-bio-
chem-genetic programming of social-psychological-physiological profiles to transform man into a pro-
grammable cyborg - cloned chimera and to eliminate human roots of dissenting, opposing and moral voices.

9c) Historical evaluation
The Predominant Powers and their Allies, most Third World Countries and Private, Independent Defence 
Leagues do not heed the historic warnings of colonialism, two world wars and genocide, but have pro-
moted power madness, greed, subversion, corruption and fornication to the predominant forces of present 
day history, which will lead with modern technologies of unlimited destruction to spreading planetary catas-
trophes, enslavement and collapse of political-social systems and self extinction of mankind.

9d) Legal evaluation
The Predominant Powers and their Allies, most Third World Countries and Private, Independent Defence 
Leagues have realized a clandestine constitutional revolution in violation against the consent of the gov-
erned, constitutional standards and international conventions.
They are terrorist organizations according to 18 US Code Chapter 113B and according to §129a StGB 
(German Penal Code). They are like special governmental detachments illegal combatants, who are vio-
lating martial law and are not protected by the Geneva Conventions of International Law of the Community 
of Nations.
Looming charges against the responsible parties are eg massive human rights violations, terroristic activi-
ties, seditious conspiracy and treason.

9e) Political-legal correction
It is the right of the people to correct misdevelopments, leading to planetary catastrophes and injustices, 
leading to enslavement and collapse of political-social systems and to reverse a clandestine or open con-
stitutional revolution and to institute a new government with the principle of constitutionality to draw power 
out of political-social life.






			PDF Printout		15			Home