PDF Printout			      Home
Udo Frentzen
Benfleet Str. 13
50858 Köln   Germany
Version 2021

					Open Letter


	misuses of modern biological, chemical, genetic, radiation and nano-technologies

Dear Madam, Sir,

I write to inform you about global misuses of modern biological, chemical, genetic, radiation and nano-
technologies. They are employed by security agencies of the Major Powers, a coalition of Third World 
Countries and Private, Independent Defence Leagues in a clandestine, dirty B-C-G-R-N war.

The present state of B-C-G-R-N micro-weapon technologies with industrial mass production and system-
atic, global employment of synthesized toxins has realized electro-magnetic-bio-chemical programming 
of political-social profiles of more than a billion people of all groups of society a year.

1) Projects Page   2
2) Political Constellation 3
3) Enforcement Concepts 4
4) Command Centers 5
5) Third World Countries 6
6) Private, Independent Defence Leagues 6
7) Global System of Labor Camps 6
with misuses of genetics 14
8) Power Plots 19
9) Prospects 20
PDF Printout 1 Home

					1) Projects

The US CIA investigates from its formation on systematically naturally found venoms and synthesized 
toxins for their incisive effects on the human body, drawing on toxicological research in Europe from be-
fore WW I - II, in Japan before WW II and also on exotic plants and animals, voodoo rites and pseudo-
medical experiments in Nazi concentration camps. They scaled up their R&D efforts in the 50s rapidly to 
press ahead with their B-C-G-R weapon projects and to cover humans, animals and plants, individuals, 
groups and entire populations. They synthesized in their bio-chem labs new classes of toxins to manipu-
late psy-chological and physiological functions. Radiation weapons are developed in their physical-bio-
chem labs to manipulate psychological and physiological functions and also equipment and climate.
Concurring with US Military, NATO and private research centers, today incorporating nano-technologies 
(N), developed is an arsenal of compact, non-conventional, non-lethal to lethal electro-magnetic-bio-chem-
gen weapons of mass destruction.

1a) The nervous system
In one large scale project with a multitude of sub-projects they research the anatomy and neurology of the 
central, enteral and peripheral nervous systems with their coded bio-neuro active electro-magnetic fields 
in intentional misapplication of neurological technologies to manipulate the bio-chemical-electrical process-
es, determining spiritual, ethical, social, intellectual, motivational, emotional, sensual, motoric and sexual 

1b) The genome
Another large scale project researches structures and mechanisms of the human genome in intentional 
misapplication of mutagenic, hybridization and recombinant DNA technologies to cause with incisions into 
the genotype changes in the phenotype and shifts in the human gene pool. As goal has been set up the 
construction of the first 'biological bomb' for peace time employment of gene altering agents in graded 
local to blanket poisoning of food and water supplies as well as targeted and mass poisoning of home and 
foreign populations and over regions over the sum of all single catalogued, B-C-G-pellet prepared targets
for control of individual psychological, physiological and genetic processes and political-social-demogra-
phic structures.
Since the 70s the project has been widened out into a 'human hand directed evolution' to transform man 
as a product of natural evolution into a programmable cyborg – cloned chimera with special augmented ca-
pabilities by electro-magnetic-mechanical and bio-chem-genetic means.

1c) N-weapons
Developed are N-weapons, utilizing nano-sciences and -technologies for ‘molecular engineering’ in the 
range of 1 to 100 nanometers to enhance analytics, inorganic and organic solid, liquid, gas, plasma ma-
terials, miniaturization, performance, safety and handling. Since the 80s, employed are nano-machines 
and placed as programmable nano-robots in body tissue to manipulate their anatomy, morphology, physi-
ology and environment and with it the level of functional capabilities.


					2) Political Constellation

2a) From imperial to hegemonic policies
With the surrender of the Achsenmächte on May 8th and Japan on September 2nd 1945 the USA and Russia 
advanced to superpowers of a new world order over war and peace in possession of atomic weapons, the 
US since 1945, the USSR since 1947. They extended the imperial policies of the 19th century for profit and 
control of geo-political power structures into the 20th and turned their war objectives after the capitulation 
of the fascists to ideological concepts of man, society and future progress, ideological-political-social block 
formation with satellite states, new borders and spheres of influence, free access to resources, advanta-
geous international division of labor and terms of trade. WW II lead without a peace treaty in a poisoned 
atmosphere to the Cold War up to 1989. The NATO was founded on 04. 04. 1949 and the Warsaw Pact on 
05. 05. 1955.
The US leadership transformed the political character of their country corruptively along secret policy goals 
into a militant nationalistic state, envisioning a stable, enduring, prosperous global Pax Americana, while 
formally adhering to a constitutional democracy, human rights and freedoms.

2b) Cold War
The US accepted the challenge of the USSR for first place and started was a race in ideology, propaganda, 
block formation, arms, space, resources, sciences, technologies, applications, geo-political-social struc-
tures, corruption and fornication. Cold War objectives of propaganda and military battlefields spread be-
yond politics, religion, culture, key-sciences, economy and finance to all scientific disciplines and legal-
social fields, especially the information technologies and life sciences with anthropology, psychology, so-
ciology, medicine, biology, zoology, bio-chemistry, electro-biology, genetics and also ecology and climate. 
All professional and non-professional fields were tied into ideological competition and all means allowed 
except direct employment of A-weapons.
Backbones remain worldwide military presence, massive use of force doctrine, credible deterrence with 
overkill ABC weapons and aggressive security R&D programs with technological superiority.

2c) Driving forces
Driving forces are the political-military-intelligence-scientific-industrial power elites, their institutions, foun-
dations and think tanks, in first line the Office of the President, USSS, DoD, JCS, DIA, DoJ, CIA, NSA, FBI, 
DHS, Majority and Minority Leaders of Congress and the Supreme Court.
Decision making organ of the Security Community is the National Security Council, established in the Na-
tional Security Act of 1947 with the CIA, drawing out the power lines for home based global predominance 
of all branches of the military with foreign sided dependencies and also global secret policy goals to cover 
all civilian domains by social programming with eg control over larger R&D programs and high tech appli-
cations, surveillance, false fronts, control of public media, manipulation of individual psychological profiles, 
social structures and processes und beyond of demographic structures of entire populations.

They are authorized by executive order hypocritically under the label 'security', though they realize a clan-
destine revolution in violation against the consent of the governed, constitutional standards and interna-
tional conventions: Looming charges against the responsible parties of this despotic perversion are eg mas-
sive human rights violations, terroristic activities, seditious conspiracy and treason.


					3) Enforcement Concepts

Secret policy operations realize cold war objectives in all fields of a nations life as well as in the satellite 
states and are carried by infiltration over to the clients of ideologically opposite camps.

3a) Security planning receives priority over general national and international interests of the Community 
of Nations. The security apparatus is justified by institutionalized relations, public relation campaigns, lob-
bying contacts and supportive diplomatic networks like transatlantic and -pacific partnerships for continu-
ous collaborative co-ordination of interests.

3b) Social programming
Social programming desires a manipulable, stable, public environment of opinions and actions with only 
security goals supporting, conform, illusions guided, non-questioning, non-probing general populations, - 
not the mobilization of the masses for political-social action.
The traditional goals of military forces to successfully invade a foreign country and of intelligence ser-
vices to topple it without outer force by corruption in collapse from within have been superseded.
The CIA/MI5 coups 1953 in Iran against Mohammad Mossaddegh with reinstallation of the Shah and 
1963 in Iraq against Abd al-Karim Qasim in support of the Ba'ath Party were deemed operations without 
3b1) Early warning system
A gapless early warning system is to spot security threats against essential assets: personnel, policy 
goals, operations, methods, installations, equipment, data banks and image.
A global communication/surveillance system with satellites, ground receiver stations, interception of  
data high ways and wiring up of entire populations records the information flow in its entirety.
3b2) The public press
The public press shapes the public social reality and its rooms of political-social-cultural movement with 
its facades, public issues, discussions and opinions. As facades serve friable curtains like a constitu-
tional framework, old fashioned etiquettes, political correctness, illusions and misinformation.
The political representatives are promoted as leaders of progress with growing wealth and welfare.
W. Colby, CIA director (1973-76), stated 'The CIA controls everyone of significance in the major media', 
where it spent about 30% of its budget on covered press personnel and programs.
3b3) Protection of assets
In image fascism, means of deception are enforced by means of power.
Shielded from public scrutiny are most political transaction, while intelligence operations proceed in total 
secrecy and unaccountably, their agendas being in goals, execution and cover closely interwoven.
The apparently natural, calm, public political-social surface is kept clean by the security services, cutting 
out from public opinion any ideologically non-acceptable statement. An intelligence review panel has 
power over life and death.

3c) Technologies are seen as the 'key to power' in the 21st century.
They are the practical tools of the operational arms. US/NATO research panels of the military and se-
curity agencies like at the Defence Advanced Research Projects (DARP) develop the arsenal of com-
pact weapon architectures over the spectrum of conflicts out of an array of large scale research, de-
velopment, test and employment programs, which are offered, awarded, tested, set up for operation, 
departmentalized and institutionalized. Weaponizing of modern technologies is to hit progressively easi-
er, faster, severer, more precise, be more effectively guided and shielded than foregone ones and to ex-
haust human-material, scientific-technological capabilities in space, air, at sea, land from single to large 
scale, non-lethal to lethal, intercepting to retaliating tools and in cyberspace from data scanning to misin-
forming to infrastructure crippling hacks, mainly in misuses of physics, chemistry, biology, genetics,
medicine and computer science. They corrupt as totalitarian tools in first line human living environments, 
where it cannot be perceived by the senses in the very small, very distant and difficult to detect.
About 40% of the US military budget with total secrecy goes into more than 50 000 black projects of 
research, testing and employment with command centers and a system of labor camps. Developed are 
B-C-G-R-N as the 4th generation of weapons after spears, guns, rockets, now armed with toxins like 
contaminants, bio-chemical-genetic agents, electrical current, electro-magnetic-thermal-acoustic radia-
tion and neurologically coded misinformation.


					4) Command Centers

4a) Organization
The intelligence-security agencies of the Western Powers, eg the USSS/DoD/CIA/NSA/FBI/DHS, the 
British MI 5-6, the French DGSE and the German BND/MAD/AVS have set up a number of command 
centers within security bases of home and NATO countries to enforce the secret policy goals according 
to their intelligence agreements in division of labor by region, professional field and social group. Military 
intelligence controls military personal and within the population groups like anti-war activists and draft 
dodgers. Non-military government security controls federal, state and city employees and within the 
population all groups, perceived as dissidents like sympathizers of opposite ideological camps. Security 
agencies of industrial associations control white and blue collar workers and within the population social 
and consume conform behavior.
The US Special Operational Command (SOC), formed 1987 at the MacDill AFB FL with a number of sub-
centers, is tied into a global satellite communication/surveillance system with data retrieval and evalua-
tion stations and supervises research, testing, production, procurement and employment of B-C-G-R-N
micro-weapons/equipment, the toxins, delivery and set off systems, training of special forces in tactics, 
techniques and operations and the personnel of single agents, teams, networks and fronts. Operatives 
are consensually – non-consensually, knowingly – unknowingly directed, manipulated and programmed 
via chip implanted brain – computer linkage, often by hard to trace minute, ultra-low frequency impulses. 

4b) Poison pellets
Poison dispensers in form of microscopically tiny pellets, containing toxins in gelatin skin or foil, a microhip 
with tiny listening and video devices, bio-chemical-electrical-thermal-genetic sensors, a receiver, emitter 
as well as nano-robots are produced in microchip precision engineering by the millions. They are implanted 
directly or placed on a carrier like an unknowing person or any object of daily use or a drink water reservoir 
or any stage of the food chain or a space based gliding capsule - flying drone device to be guided elec-
tronically into the vicinity of the target. As depot pellets they can be spun off several times time controlled
out of multiple layers of equally tiny, hair like pneumatic guns with an effective range of about 30 feet to be 
shot into the skin of the target. After activation they operate maintenance free for years, while their batteries 
recharge by body movements. Nobots, programmable, mechanical nano-robots, channel the pellets into 
site specific body tissue. They are applied in the modes of single and massive, concentrated and blanket, 
random and selective, narrow and wide, scattered and systematic, limited and open ended, in closed and 
open mediums, contained and epidemic, preparatory and acute. The gelatin membrane dis-solves in body 
fluid, a foil membrane is opened electronically, time locked, by a preprogrammed code signal or by sound 
or voice or within the body toxin concentration or neurological process recognition.



					5) Third World Countries

The majority of the smaller and larger Third World Countries formed coalitions for information sharing and 
initiated, supported by Russia, in depth investigations of the intelligence agencies of the Western Atomic 
Powers and NATO, Japan, Germany, Israel and eg Saudi Arabia. Their goals branch out widely:
5a) Information about the developmental status of B-C-G-R-N micro-weapon systems.
5b) Protection against threats from B-C-G-R-N micro-weapons.
5c) Predominance in B-C-G-R-N micro-weapons with global employment.
5d) Political-military-economic-social counter-leverage against the Western Powers.
5e) Suppression of any attempt towards publication of undercover operations.
5f) Revenge for torture, murder and 500 years of dehumanizing treatment.
5g) Indignation to lay waste depraved political-social leadership.
In all, they copy the Major Powers’ system of labor camps.

					6) Private, Independent Defence Leagues

6a) Victim associations
Several victim associations and self-help groups, calling themselves also targeted individuals (TIs), organ-
ize themselves in alternate media, mostly the WorldWideWeb, conduct information campaigns about live 
tests of military-intelligence B-C-G-R-N research projects, writing to eg government offices, legislatures, 
non-government organizations (NGO), medical associations, the press, handing in petitions and law suits 
at the responsible government offices for violations of rights to life, security, health and liberty by deliberate 
assault on non-combatants. There they are altogether ignored, turned down, send to psychiatric treatment, 
put under surveillance, infiltrated, instrumentalized as false fronts, shown off as warning examples and 
neutralized in labor camps. They are hardly supported by established caritas organizations.
6b) Defence leagues
Private, independent defence leagues spring up mostly as smaller parties out of individual security con-
cerns, organize themselves for collective protection and are, driven by spreading awareness of micro-
weapon operations, continuously multiplying beyond several thousand groups worldwide. They investigate 
parallel to the Third World Countries the security-intelligence services first of their local region, then suc-
cessively of their home country and neighboring states. Their operational interests unfold like those of the 
Third World Countries into information, protection, predominance, counter-leverage, total secrecy, revenge 
and indignation. They arm themselves with communication/surveillance systems, stolen equipment, plun-
dered stockpiles, intercepted supplies, copied operational know-how and recruit their own undercover hit 
teams. In all, they copy the Major Powers’ system of labor camps.

					7) Global System of Labor Camps

Camp guards are employed as spot, select, walk by, decoy, tag, stalk, harass and hit teams.
7a) Surveillance camps: spies record for information control the data flow in its entirety worldwide.
7b) Deception camps: multi media presents a Potemkin village.
7c) Extermination camps: executioners eliminate more than one thousand people a year.
7d) Gas chambers: hit teams spray with nerve gases thousands of people a year.
7e) Radiation camps: hit teams cripple by wave-particle beams thousands of people a year.
7f) Harassment camps: Intelligence trainees strike down on millions of people a year.
7g) Sadism and sodomy camps: hit teams execute a billion druggings a year.
7h) Behavior manipulation camps: hit teams mass drug millions of people a year.
7i) Corruption camps: agents commit gross human rights violations around the world.
7j) Dissection camps: hit teams test new toxins on millions of people a year.
7k) Genetic camps: hit teams test genetic toxins on thousands of people a year.
7l) Revenge camps: Third World Countries and Private, Independent Defence Leagues revenge them-
selves for bestialities of the Super Powers.


7a) Surveillance camps
Goal is total information control by recording the data flow in its entirety worldwide.
To be penetrated are foremost foreign military and security services, terrorist organizations, political-
legal-scientific-commercial-financial-social communication systems and then populations at large.
To be gained are precise, reliable, up to date information for policy and project planning.
To be shielded by an early warning system are all intelligence assets. Also, the image of the welfare 
state is to be protected and the pathological character of undercover operations to be suppressed.
7a1) Intercepted are land/sea based cable and space/air bound radio traffic.
7a2) Listened into are households, work- and public places, buildings and vehicles.
7a3) Plugged into are all, especially electronic devices at their interfaces.
7a4) Wired up are individuals. Technical steps are identification, marking, connecting, tracking, data 
transmission, collection, storage and evaluation. Every person is implanted a microscopically tiny multi-
sensor chip to pursue him in all his prayers, travels, intellectual, professional, social and spare time ac-
tivities throughout all phases of the day from his childhood to his demise.
The chips with electro-magnetic-acoustic-thermal-biological-chemical-genetic sensors and radio emitters 
are placed cell specific into the body, the scull and all cortexes of the brain, eg the visual, hearing, smell-
ing, tasting, language, mental processing, emotion and motoric regions and are placed along nerve strands 
and their axons to other organs, glands, muscles, skin, digestive tract, male/female reproductive system 
to record all physiological, psychological and mental processes also with the EEG brain wave patterns of eg 
sensual perceptions, thoughts, memories and moods.
Genetic fingerprints list the complete gene sequences of the chromosomes. They are read by a micro-
chip, whose tweezers pick out tiny strings of DNA and insert them into an ultra slender channel, etched 
on the plastic chip with tiny electrodes to detect along the serpentine genetic macromolecules the code's 
chemical letters. Established are the identity of the person with his hereditary dispositions, genetically 
determined diseases, genetic factors of the geno/phenotype, especially in development and differentiation 
of the brain with inclination towards various intellectual fields.
Over a life time collected data run up to over 1oo ooo entries per dossier.
7a5) The data are sent via emitter, often with amplifier, to a satellite with an up and down link dish, from 
where the source is tracked and the data relayed to the security agencies' ground stations.
There are today several thousand satellites in orbit for communication, weather, navigation, exploration, 
surface imaging, tapping of resources, reconnaissance and surveillance. In the US they are launched 
from Cape Kennedy FL or Vandenberg AFB CA. Satellites are in the US an over $30 billion/year busi-
ness, led by eg Lockheed, General Dynamics, RCA, GE, Westinghouse, Comsat, Boeing, Hughes Air-
craft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
There are several hundred US spy satellites in orbit, developed in charge of the Advanced Research 
Projects Agency (ARPA), an arm of the Pentagon, and operated largely under direction of the US Global 
Strategic Command (USGSC), its National Space Center being located at Offutt AFB NE.
7a6) Collected are the intercepted and space derived data mostly by the DoD, CIA, FBI, DHS and the 
NSA, which was founded under direction of the DoD 1952 at Crypto City, Fort Meade MA with branches 
in NATO countries together with the US Cyber Command and Central Security Services. The NSA em-
ploys over 5o ooo administrators, scientists, technicians, analysts and operatives, utilizing supercomput-
ers with arrays of modules, nano-technology, artificial intelligence and very high speed integrated cir-
cuits, processing more than a quadrillion (1024) calculations/sec to handle the global electronic data flow. 
Like Big Data in the professional fields, big in volume, velocity, variety, validity and actuality, they are 
intercepted, collected, stored, deciphered, translated, screened, channeled, evaluated, presented and 
distributed. Further processing like analysis, profile generation, technology development, process opti-
mization and trend forecast increases their security/scientific/commercial data value.
7a7) Spin offs of scientific-technological knowledge are sold mostly in the fields of security and law en-
forcement, corporate and private research, medicine, communication, industrial production, traffic and 


7b) Deception camps
Presented is a Potemkin village inmidst of flourishing landscapes.
Political-legal-social frameworks, political-scientific-social education and the present agenda of public is-
sues are largely shaped by the powers of government, public education, public media and direct interven-
tion by the security agencies. Most visible is the public press with press agencies, publishing houses, TV, 
radio, newspapers, magazines, journals and books to reach everyone at home, at school, at work and in 
his spare time.
7b1) Political-legal-social framework
   b1,1) Suggested are
   ◦ Constitutionality with guaranteed basic human rights.
   ◦ Democratic means of conflict solving.
   ◦ Solidarity, fairness, time honored traditions and political correctness.
   b1,2) Realized are
   ◦ Blockage of claims for basic human rights.
   ◦ Corruption of supervision, publication and prosecution of misuses by positions of power.
7b2) Political-scientific-social education
   b2,1) Suggested are
   ◦ Communication of founded political-scientific-social knowledge and skills by the public and private edu-
     cational systems.
   ◦ Participation of all citizens with their knowledge in public democratic processes.
   b2,2) Provided are
   ◦ Illusions of human capabilities and convenience to go faster, higher, bigger, easier and better.
   ◦ Satisfaction of the population as consuming, non-questioning, -probing, -knowing assenters to re-
     main bare of convictions, ethics, reason, maturity and life experience with legal means of defence.
   ◦ Watered down political-social intentions, conceptions and backgrounds as after the attacks on the
     Twin-Towers 9/11 2001, which were allowed to proceed for justification of the anti-terror war.
7b3) Present agenda of issues
   b3,1) Suggested are
   ◦ Accurate, objective, up to date information by government agencies and the public press.
   ◦ Public discussion of the present day agenda of practical and theoretical tasks.
   b3,2) Furthered are
   ◦ Reduction of the niveau of mass media below that of politically substantial contributions.
   ◦ Minimalization of sensitive issues like uncertainties, risks and dangers.
   ◦ Amelioration of negative issues, eg a war overseas is presented as a local intervention.
   ◦ Sidetracking of critical issues by misinformation and public relation campaigns.
   ◦ Pushing to the outskirts the misery and death of millions of people through hunger, epidemics, catas-
     trophes, exploitation, expulsion, human rights violations, war and mass murder.
7b4) Security interventions are eg
   ◦ Justification of hegemonic aggressiveness and demonization of conflict-solving policies.
   ◦ Corruption of regulating, supervising, inspecting and correcting authorities.
   ◦ Discrediting of government adverse political-social leaderships.
   ◦ Suppression of moral voices with national and international renown.
   ◦ Erasure of any arising attempt towards publication of a victim's medical and legal evidence.
   ◦ Elimination of dissidents, whistleblowers, critics of system and security.
7b5) Immediate consequences are
   b5,1) Expectations for the improvement of the human lot remain superficial.
   b5,2) Gone is the informed citizen, who thinks independently over the full spectrum of his mind.
   b5,3) The psychological underpinnings of society have turned into polished formalism, stupor, disorien-
   tation, distrust, paranoia, hypocrisy, cynicism and burned in human rights abuses.
   b5,4) Contorted are historic records not to reflect the true achievements and failures of the times.


7c) Extermination camps
There is not one security service of a major power that does not have its killing fields.
7c1) The military security department of NATO operates an assassination squad to eliminate terrorists, 
who are intercepted in preparations, foreign agents, who penetrate into security areas, traitors, who sell 
security information, deserters, who are caught up with behind hostile lines, security risks, who threaten to 
impair basic assets, left behind scientists from shut down projects, who might insert classified information 
into public research and critics, who become a formidable voice in the media.
7c2) The assassinations are priority operations, well organized and quiet. A small intelligence court reviews 
the evidence, the target is electronically marked, pumped up with depot poison pellets, send to a remote 
area or a longer journey is waited for, death follows in an accident or break down, the death certificate cites 
an apparently natural cause of death. Where isolation is not possible, it is discredited, demonized and elim-
inated over time by a terminal disease like cancer.
7c3) Uncovered foreign operatives and own double agents are eg by NATO hit teams tortured to death. 
Nazi concentration camp butchers hung up their victims at backwards crossed arms over a wall urinal in a 
basement of a remote station to be tortured by mechanical and toxic means until their human body was 
totally disfigured and finally dead, when all body fluids had stopped dripping.
NATO butchers detain their victims in remote undisclosed prisons to be tortured for 2 – 8 days by electrical, 
radiative and bio-chemical-genetic means, eg CIA psycho and sodomy drugs, until their human body and 
mind are totally disfigured and finally dead, when all brain activities have ceased.

7d) Gas chambers
For gas chambers targeted are mainly people, working with the mind and propagating system non-conform 
messages like the leadership of an opposite ideological movement, dissenting journalists, lawyers, doctors, 
scientists and artists.
7d1) Military nerve gases often attack the central nervous system in specific functions like wake awareness, 
memory, concentration, reaction, coordination and balance, the peripheral nervous system with loss of phy-
sical power, endurance, flexibility, agility and sensitivity.
7d2) Industrial toxic gases often are carcinogens, reducing first the pulmonary system, then other physio-
logical functions and inducing in the long run tumorous growth.
7d3) In debasement of the dignity of man and his mind, crippled are intellectual and physical strengths to 
the point of disability to perform every day tasks of life.
7d4) From cartridges gassed are entire streets, buildings, trains, busses, cars, assembly halls and swim-
ming pools. Nerve gas pellets are attached to any object of daily use like packaging, newspapers, books, 
clothing and tools, the set off signal is timed for maximum toxic concentration at the time of exposure. The 
target's home is laced mostly with by odor imperceptible dosages for long term effects, if not the bedroom 
itself is used as death chamber. H. Kohl and B. Netanjahu operated gas chambers in churches and at sites 
in the vicinity of former Nazi concentration camps.


7e) Radiation camps
Radiation camps entrap mostly insurgents, fugitives, carriers of secrets and serve as electronic prisons for 
terrorists and undesirables. They manipulate individuals, groups and populations up to programmable cy-
borgs and also climate and equipment.
7e1) Radiation devices
   e1,1) Radiation devices have been developed already before WW II for civilian and military applications 
   and are common today in all professional fields from astronomy to food preparation. US Military re-
   search has utilized several thousand civilian patents and classified them under the US Inventions Se-
   crecy Act.
   e1,2) R weapons employ the energy flow of spherical waves and concentrated, directed beams. Lasers 
   radiate light and heat, speakers acoustic waves, antennas electro-magnetic photon-waves and accel-
   erators of atomic/subatomic particles eg α-, β-, γ-radiation. They are adjusted in eg direction, focal point, 
   cross section, intensity, wavelength, frequency, duration and pulse pattern in combinations.
   e1,3) R-Guns are mostly compact and reach any open place wirelessly to hit with and without implant 
   precisely, non-lethal to lethal over large distances with the speed of light.
   However, they are without an implant at the target heavy on equipment and energy consumption and 
   cannot be miniaturized all around as tracelessly as the more universal B-C-G-N micro/nano-devices.
7e2) Individual targets
   e2,1) Any person can be anywhere telemetrically spot pointed, identified, tracked, brain linked, read 
   and manipulated without a mark on the body.
   e2,2) Radiation of low to extremely low frequencies under 50 Hz with neurologically coded firing pat-
   terns stimulate, alter or depress the bio-electro-magnetic fields and processes of cell tissues to cause 
   health complications from nausea to heart attack and psychological disorders from depression to break
   down and neurological disfunctions from altered consciousness to forced behavior and memory inter-
   ventions from accurate recollection to total loss.
   e2,3) Brain to computer linkage via a MEG - Neurophone with implanted electrodes bypasses the senses 
   to allow real time two way physiological communication of words, images and thoughts. It accelerates 
   in common military praxis the ground station - pilot observation, communication and reaction times.
   e2,4) Psychological-mental programming induces thoughts ‘softly’, but repeatedly and persistently to 
   form out an ideology, idiosyncrasy and behavior pattern up to belligerent and self-destructive habits.
   e2,5) A psychotronic R-weapon restrains a target within a hyperprison to be psychologically robotized.
7e3) Group and population targets
Crowds can be non-bodily, non-lethally manipulated to cause eg sedation/incitement in riot control/fabri-
cation. Insurgents/protective forces can be disoriented and blocked in their motor controls by area covering 
laser scans in barrier/invasion warfare.
7e4) Cyborg
A Cyborg is a trans-human biological-technical blend and has a microchip implanted in the central nervous 
system as a neuro-biological - data processing interface. It allows eg movement of a prostheses in compen-
sation for a lost limb or augmentation or reduction in the level of a physiological function.
An individual or a group or a population of cyborgs can be area covering bio-electro-magnetically program-
med in their basic health, physiological capacities, intellectual activities, convictions and behavior.
7e5) Climate
High energy radiation in excess of trillions of W/sec can alter layers of the atmosphere to disrupt radio 
communication, thin out shielding against cosmic winds, generate harmful compounds, reflect back to 
earth and trigger earth-weather catastrophes. A geo-engineering research station has been set up at eg 
Gakona AK under the High Frequency Active Auroral Research Project (HAARP).
7e6) Equipment
Stationary and mobile objects can be spotted, identified, tracked and measured.
Electronic equipment can be read and programmed at all data input, processing and output points.
Entire systems can be started, manipulated, disrupted, shut down, burnt out, molten and pulverized.


7f) Harassment camps
Selected targets for a labor camp enter it through the front yard of harassment.
Trainees of intelligence services acquire there the techniques to strike down on their victims.
Surveillance is executed 24/7/52 a year in all areas of life to engineer stress events.
With covert entry follow eg physical damage, tempering with records, theft and contamination.
With street theater follow eg stalking, mobbing, denial of services and run around at the authorities.
As extra judicial measures follow eg fraud, entrapment, wrongful commitment to a mental institution, judi-
cial paternalism, unlawful arrest, denial of insurance claims and charitable, medical, police and legal help.

7g) Labor camps of sadism and sodomy
Targeted for labor camps of sadism and sodomy to be sifted out are people of faith, conviction, culture 
and achievements, activists of political-social movements like human rights workers in defence of un-
popular causes, environment and animal rights campaigners, violence pillorying pacifists, critical voices 
of system, market and the press, radical groups of minorities, bloggers of alternate media, drop outs from 
the rat race, defectors from opposite ideological camps and soldiers, objecting out of second thoughts.
7g1) There is not a psychic or physical function in the body that cannot be electro-magnetic-bio-che-
mically manipulated to be stimulated and boosted, supported and stabilized, sensibilized and broadened, 
narrowed and worn out, relaxed and dampened, disrupted, distorted and discontinued
 ◦ Chemical rape at any place and time reduces by blocking agents the target's level of mental and physi-	
   cal capabilities, which are then eclipsed by a variety of sodomy drugs to manipulate in succession 
   sexual drive, erotic sensations, emotions, sensibility of genital parts, secretion of sweat glands, speed, 
   endurance, exhaustion, sleep, dream and hang-over.
   Erotic stimulants are often individually designed according to previously taken brain wave patterns and 
   are added by induced pornographic images to incite perversities.
   The offspring is being monitored in its further development.
 ◦ Induced physiological impairments are eg drop-in-your-tracks fatigue, myocardial insufficiency, back 
   and muscle pains, reduction of flexibility and motion, sleep disruption, hyperstress, total relaxation 
   and accelerated aging.
 ◦ Induced emotional states range from anticipation to saturation, blind hope to despair, elation to anger, 
   boldness to fear, overconfidence to diffidence, concern to indifference, hypersensitivity to insensitivity.
   A 'joy of death frenzy' can supplant every agony of torture.
 ◦ Induced mental distortions affect consciousness, intention, conception, memory and operations to the 	
   point of dysfunction with non-resistance against adversities, hardships and threats. Specific functions 
   like abstract reasoning, language, computation, logic and individual mental interests can be crippled.
   Stimulation towards 'blasphemy of the Holy Spirit' is achieved by boosters of fixed, eccentric theologi-
   cal themes and a desire to communicate.
 ◦ In long term mental-psychological terror neurological processes are stimulated repetitively in short cy-
   cles to extremes, eg seizure, hallucination or delirium, not to allow any recuperating relaxation times.
 ◦ In all the target's personal development, identity and character, especially its political-ethical stand-
   ards, are worn down, debased and suffocated in the suds of prostitution to cause traumatization, irra-
   tional behavior, self-destructive habits, which then run on to total personality collapse.
   The victim, often with a depot poison pellet exacerbated preexisting disease, induced sterilization and 
   creeping ailment like tumorous growth in the genitals, is blocked in its professional work, socially iso-
   lated, disenfranchised, severed from family-welfare safety nets and diagnosed with a mental illness.
   It is forced into suicide or to die on the streets.
7g2) Hit teams mass drug from depot for years entire water and food supplies from the start of the food 
chain to the selected target, at the reservoirs, agricultural producers, suppliers, food processors, whole-
salers, supermarkets, restaurants, in transport via repackaging-resealing facilities and in the target's home.
Contaminated with toxins, taken up with skin contact, are objects of daily use like magazines, books, tex-
tiles, tools, first aid supplies, hygiene articles and dryers.
7g3) Labor camps of sadism and sodomy have been set up around the whole world and have blanketed 
in mass applications entire regions, ethnic groups and political-social fractions with sodomy drugs. Eg 
US stay behind forces in occupied territories as in Germany after WW II (1945) have systematically tar-
geted anti US/Cold War - pro disarmament activists.


7h) Labor camps of behavior manipulation
Targeted for labor camps of behavior manipulation are mostly politically-socially non-conform skilled pro-
fessionals of all fields for their independence of mind, asperity of manner, eccentricity and pursuit of alter-
nate ways in life and the population at large.
7h1) On the first level individual behavior is suppressed or stimulated in its elementary physical needs, in 
exercise, relaxation and sleep requirements, appetite and thirst, hygiene and beauty care.
7h2) On the second level the emotional state is manipulated from thrift to the urge to go shopping and from 
stress, anger, frustration to the desire to achieve social recognition up to power madness.
7h3) On the third level the motivation is capped to listlessness and lethargy or boosted into over-ambition 
and go-on efforts in face of failure.
7h4) On the fourth level intellectual interests are selectively dampened or stimulated, while ethical aware-
ness and considerations are brought down to the point of unscrupulousness.
7h5) Communicative and social competences like cooperation in teams and hierarchical structures are 
manipulated out of the emotional state from diffidence to hostility, out of motivation from dropping out to 
intriguing and through inducement of unrest, nervousness, stammering and trembling.
7h6) In all the target's physical, psychological and metal fitness, personal development, education, profes-
sional and social careers are predetermined.
7h7) The toxins are administered mostly from depot poison pellets in small dosages over longer periods to 
form out unconsciously habitual self-sustaining or -destructing behavior patterns. Eg Exxon stabilizes plant 
employees and their families for long term reliable, productive job performance.

7i) Client camps
Client camps of subversion, corruption and control are set up in foreign countries.
7i1) The Major Powers’ intelligence agencies realize their foreign policy goal of block building for global 
dominance and control first within their client states, also those regarded as time proven political partners. 
Their roles are to provide support for political-military defence and interventions, to open markets with free 
access to man power, raw materials and half-finished goods and cooperate in advantageous international 
division of labor, while home markets are protected by hurdles of eg terms of trade, advanced technologies, 
patents, infrastructure, finance and professional standards. They are not to develop vital scientific, techno-
logical, economic and financial fields of their own. Foreign aid projects largely flow back home, eg 86% of
the US EXIM Bank's $7.7 billion new foreign export credits in 2000 went to 10 larger US companies.
7i2) The model is expanded geo-politically to non-client states to achieve global dominance by one's own 
superiority with determination, resources, mass, size, means, diversity and reserves. The intelligence, coun-
ter-intelligence and security agencies are scaled up to the required size to realize their directives and if nec-
essary hiked up.
7i3) Methods of subversion and corruption are eg
 ◦ The first tool always is the covered operation in all hazard areas with eg reconnaissance, research, de-
   tection, identification, tracking, gaining of access, securing, recovery, retreat, exploitation and if neces-
   sary mitigation and neutralization.
 ◦ Surveillance by a global satellite communication system.
 ◦ Infiltration of the political-social structure by contacts with recruitment, counselling, disinformation, forg-	
   ery, theft, bribery, extortion, prostitution, financial sponsoring and partnerships.
 ◦ Sold are proprietary information, low cost credits, logistical supplies, user rights, telecommunication sys-
   tems, special technologies and bio-, chem-, rad-tech weapons.
 ◦ Rented are grounds for space, air, naval and army bases and training camps.
 ◦ Fragmentation of political alliances.
 ◦ Permanent excessive indebtedness.
 ◦ Incitement to civil strife.
 ◦ Profit from their wars.
 ◦ Manipulation of the public press.
 ◦ Pacification of moral institutions.
 ◦ Distortion of social fabrics.
 ◦ Wash out of cultural identity.
 ◦ A system of labor camps controls the broad base of the population.


7j) Dissection camps
Caught in dissection camps to serve as guinea pigs for non-consensual, covert, illegal pseudo-medical 
life experiments for the development of B-C-G-R-N weapon systems, often with degrading, deterring  
torture, are terrorist suspects, captured freedom fighters, prisoners in undisclosed detention centers, 
prisoners in civilian jails, convicted of a heinous crime, tenacious dissidents for punitive action, the vul-
nerable like civilians in war torn regions, minorities in underdeveloped regions, suicidal persons, mental 
patients, the dying in nursing homes and intensive care wards, people considered to be expendable like 
estranged, uprooted, isolated, long term jobless, homeless and lone fighting individuals.
The CIA selected also targets from their childhood on at easily controllable, largely closed social environ-
ments like cults, sects, lodges, churches, foreign partisan groups and training camps.
7j1) Tests
Test series on R guns and bio-chem-genetic toxins are conducted in the security agencies’ laboratories 
and training areas by conceptualization, modeling, simulation, war games and also for combat exposure 
in life tests to collect representative samples from populations at home and abroad.
Bio-chem-genetic toxins are screened under controlled conditions of application, media, path and speed 
of epidemic spread with advanced analytical methods for their pathological anatomic, physiologic, psy-
chologic latent, present and long term effects over a wide spectrum, eg affected tissue and function, 
degree of impairment, efficiency, selectivity, dosages, incubation times, side effects, codetermining fac-
tors, counter-poisons, recuperation times, measurability, visibility and traceability.
7j2) Evaluation
Active warfare agents undergo a comprehensive military worth analysis according to present and desired 
performance standards in their eg bio-chemical-genetic components, production, safety precautions, han-
dling, training, weapon concept, equipment, infrastructure, cover, costs, target vulnerability, operational 
engagement, mission accomplishment and plausible deniability.
Employment ready weapon systems are handed over to the operative command structure of the armed 
forces and security services.
7j3) Legal situation
The Common Rule, safeguarding against experimenting on the public without its consent in the US, al-
lows for non-consensual experimentation by intelligence agencies.
US DoD Directive 5240 1.R saved 882013, Ch 4, Procedure 13 (1998) says: 'Experimentation is allowed
on human subjects for intelligence purposes.'
The US District Court in Washington DC dismissed in September 1998 a lawsuit by the International 
Committee on Offensive Microwave Weapons (ICOMW), sponsored by several US human rights groups,
asking to enforce a presidential memorandum, which bans involuntary research on human subjects.
7j4) Public investigations
Public investigations, eg the Church and Pike Committees, revealed some past pseudo-medical experi-
mentation at eg the San Antonio AFB TX, the Army Special Forces Center NC, the Los Alamos National 
Laboratory NM and private institutions in successive sub-projects of MK Ultra, but the operations have 
then been farmed out for deeper cover because of sensitivity to public resistance and not to implicate 
the security services directly.
The CIA siphoned off funds from defrauding the government, collaboration with criminal organizations, 
weapon trading, security contractors, proprietaries, recycling of radioactive materials, market manipula-
tions, economic data trading and extortion.
7j5) Help denied
Today, not a single target is allowed to present evidence of employment of B-C-G-R-N weapons.
Answers and help seeking citizens are denied medical treatment. A doctor does not give a true diagno-
sis. Medical tests return normal. Instead, a delusional disorder is attested. Criminal charges are turned 
down for insufficient evidence. Reports in public are discredited and cut out. None of the guinea pigs are 
to recover and the death certificate claims in all cases an apparently natural cause of death.
Eg the governments of France and Israel developed their nerve gas agents with test series on FLN and 
Palestinian freedom fighters, taken prisoners, - none survived and their ashes were scattered over the 


					Misuses of Genetics

7k) Genetic manipulation camps
Selected for genetic manipulation camps, a satellite of the dissection camps, are especially younger men 
and women of average physical constitution from all classes of society, who are planning for offspring. 
They are picked always as singular, random, unrelated, dispersed samples in non-questioning medical 
environments without much record keeping under deepest cover and accompanied by secondary hit teams 
for psychological stabilization.
(About active agents, their synthesis, diagnostic tests and methods are no data available here.)
7k1) International conventions
Genetic manipulations misuse the life sciences not to cure diseases, but to intentionally induce them.
   k1,1) Overall affected are biology, zoology, chemistry, medicine and in specific the base sciences hu-
   man, population, pharma, behavior genetics and gene technology. They serve life and not in inversion 
   of human dignity, reason, maturity and ethics as a weapon to kill. Out of life sciences developed wea-
   pons always lead to inexpensive, perfidious weapons of mass destruction, penetrating all areas of life.
   k1,2) The civilized world; customary international law; The Hague Land Warfare Convention (The 
   Hague 1899); the Protocol for the Prohibition of Asphyxiating, Poisonous or other Gases and of Bacte-
   riological Methods of Warfare (League of Nations Geneva 1925); The Biological Weapons Convention 
   (UN Geneva 1972) and The Chemical Weapons Convention (UN Geneva 1992) outlaw their develop-
   ment, production, stockpiling and employment as a means of warfare and call for their disarmament.
7k2) Biological bomb
Today's Major Military Powers press ahead with the development of clandestine micro B-C-G-R-N weapon 
systems to gain global predominance in the field. Set goal of the US National Security Council in collabo-
ration with NATO is the construction of the first biological bomb and its peace time employment. It is to 
render control of individual behavior patterns with their political, military, performance, economic, social 
and demographic aspects efficiently, population wide long term plannable and short term adjustable.
'Scientific rational base' is population genetics to render a group’s or population's allele composition with 
its genetic and physiological functions designable and programmable by bio-chem-technological site spe-
cific introduction of desired, modification of inferior and elimination of undesired strains and to initiate a 
'human hand directed evolution of man' for engineering of cyborg-chimeras according to orders.
7k3) Design criteria of genetic weapons
   k3,1) Political goal is genetic programming of human behavior patterns to exhaust its political-military-
   economic-social potentials.
   k3,2) Military goal is the capability of single and mass applications with selection of targets, choice of 
   agents, kind and degree of impairments, fixing of place, time and conditions.
   k3,3) Modernization goals are increased efficiency of present state of the art techniques of behavior 
   channeling by attacking causes and not only symptoms with coverage of entire regions and population 
   groups by stable, sustainable transferal of altered genetic strains to succeeding generations and also 
   increased economy by centralized supervision of a lean network of undercover agents.
   k3,4) Economic goal is determination of economic structures and processes by individual basic needs, 
   drives and emotions, affecting economic parameters like corporate - labor force relations, net domestic 
   product by kind of economic activity, private and public investments, consumption expenditures, net 
   savings, unemployment, work ethics, productivity, balance of trade and payments.
   k3,5) Social goal is determination of social structures and processes, especially the professional elites 
   by manipulation of motivations, intellectual interests and capabilities and sexual behavior and with it per-
   sonal development, education, identity, character, professional and social careers.
   k3,6) Demographic goal is channeling of the rates of still born, life birth, infant mortality, disease, work 
   accidents, disability, invalidity, death and with it general key population parameters as base of and lev-
   erage on social-economic structures: population size and density, age group distribution, growth trends, 
   health standards, -care, -insurance, average work years, retirement age and life expectancy.
   k3,7) Health statistics of individual causes of diseases and death and external factors like environmental 
   conditions have become insignificant.


7k4) Deployment structure
   k4,1) In the first stage set up is an infrastructure of depot poison pellet delivery systems.
   It builds largely on the existing command centers of the major powers' intelligence agencies within en-
   closed security areas, enforcing the present non-genetic state of the art social programming with a global 
   telecommunication/surveillance system, procurement of equipment and toxins, undercover agents, sup-
   porting scientists, technicians and operating personnel.
   It allows for direct and indirect ways of delivery
   ◦ by a commissioned agent, manually implanting or pneumatically injecting pellets.
   ◦ by an electronic guidance system, navigating pellets from water reservoirs, the food chain, locations 	
     in public places or from space based gliding capsule - flying drone devices into the vicinity of the tar-	
     get to be shot in, bypassing any possible sensual awareness of the victim.
   k4,2) The second stage realizes marking, tracking and genetic identification of every single person of 
   the target group by a microchip with a bio-chemical sensor and sender, aiming to catalogize the world 
   population with their personal profiles and genetic fingerprints in high capacity data banks.
   k4,3) In the third stage every fingerprint is by a computer program selected, scanned and matched 
   against the desired model of dominant and recessive allele frequencies of the common gene pool and 
   allotted a charge of gene enhancing, correcting or neutralizing agents to form out the desired traits.
   k4,4) In the fourth stage every single foetus, youth and adult of the target group is systematically pumped 
   up with their allotted charge of genome altering agents.
   k4,5) In the fifth stage an electronic guidance and set off mechanism is installed at the command 
   center similar to that of present social programming.
   k4,6) In the sixth stage recorded and evaluated is the introduction of desired and modification or elimi-
   nation of undesired traits in the target's allele composition, which can be handled precisely by an AI con-
   trol mechanism to decide by self-optimizing algorithms also in cases of uncertainties on further steps
   ◦ No action by adequate allele composition.
   ◦ Repeated incision by deficient allele composition.
   ◦ Target elimination by geno-deviant, 'substandard' traits.
   ◦ Mass elimination of population groups and across regions over the sum of all pellet prepared targets.
7k5) Insertion paths
   k5,1) Transport for delivery into the body of the target is by tiny poison pellets of gelatine or foil skin, 
   where the gelatine dissolves in body fluid and a foil is opened by an electronic set off mechanism. Tiny 
   nano-robots carry the pellets with the bloodstream to the desired body tissue.
   k5,2) A ‘gen taxi’, a passive carrier DNA strand, envelopes the active passenger DNA and forms by 
   ligation, covalently bonding passive and active DNA, a vector system, the genetically fused heterologous 
   product with defined parameters.
   As ‘gen taxis’ serve mostly bacterial and viral envelopes: bacterial, transposable genetic elements are 
   eg IS elements (insertion sequence), TN elements (transposon) and transposable phages; viral ele-
   ments are eg classical transposons and retroposons, alu-like sequences; with mammals polyoma-
   viruses, vaccinia viruses and retroviruses.
   As a mobile, transposable genetic element it can insert, exit or relocate into non-homologous DNA in-
   dependent of the host's recombinant functionality.
   k5,3) Within the desired body tissue, insertion of the vector system into the host chromosome for final 
   in vivo transformation is by transposition, a change of position of a transposable genetic element from 
   one site of the genetic material to another: By cutting, strand transfer, joining of ends, added by cata-
   lyzing enzymes, the passenger and carrier DNA are covalently fused into the host chromosome.
   k5,4) The gene targeting rate, the frequency of integration of an exogenously added DNA sequence into 
   the nucleus per quantity of host DNA and per added sequence, depends mainly on: transfer and trans-
   position methods, homology between exogenous and host DNA, vector system, length of the inserted 
   string, accessibility of a target locus and environmental factors.


7k6) DNA technologies
Employed DNA technologies are mutation, hybridization and DNA recombination.
   k6,1) Mutations
   ◦ An induced ploid mutation is almost always a lethal defect, because of abnormally developing, non-
     functional cells leading to cell death, death of organism or still birth.
   ◦ An induced chromosome mutation with a change in the order of genes between two or within a chro- 
     mosome by addition, elimination or rearrangement of a region is a bio-chemical mutation, leading
     to a replication dysfunction with loss of an entire trait out of the phenotype or to transcription or 
     translation dysfunction with growth disorders like tumorous growth.
   ◦ An induced gene mutation, a change in a base sequence of a gene, a structure or regulation chang-
     ing, amplifying or repressing, forward or backward, single or complementary (synonymous), expres-
     sive or conditional, sometimes point, also nonsense (neutral) mutation, can destroy the function of 
     a gene at the site of incision, or cause additional large scale rearrangements of adjacent DNA se-
     quences, or alter the efficiency of gene expression (gene penetrance), the degree of trait formation 
     also in growth, differentiation and complete structuring of a function.
   k6,2) Hybridization
   Meiotic poisons can cause in cell division and recombination processes: partial or complete misalign-
   ment and misassortment of chromosomes, chromosome deformation and fragmentation, cytoplasma 
   deformation, phase inhibition, cell death and sterility. Mitotic poisons affect like meiotic poisons: chro-
   mosome alignment and assortment, cell division processes, nucleic and cytoplastic morphology and in 
   consequence cell functions with phase inhibition, cell death and sterility.
   Aside from noxious agents, hybridization is affected by heat, radiation, insertion of a function disrupt-
   ing DNA strand and can lead with impairment of regulatory processes to malformation, cripplement 
   and death of organism.
   k6,3) DNA recombination
   In vitro manipulated targeting sequences can contain elements to manipulate genome structures and 
   genetically controlled processes in their entire spectrum: any parameter affecting gene expression, lead-
   ing to amplification, depression, destabilization, dysfunction, toxin production, cell death, sterility and 
   disablement of a function; any singular phase in meiotic and mitotic cell division, leading to irregular 
   chromosome assortment, chromosome deformation and fragmentation, phase inhibition, cell and cell 
   line dysfunction, cell death, sterility and malignant tumorous growth; any regulatory process of onto-
   genesis, mainly controlled by the homoeobox, leading to a change in development in timing, rate, 
   location with de- and malformation of cell morphology, diverging growth and differentiation of func-
   tions, causing changes in functional capacity, cell unit dysfunction, uncontrolled growth and death 
   of organism.
7k7) Levels of Impairment
   k7,1) Death through cripplement or disablement of a vital function.
   k7,2) Disease through temporal, local, graded manipulation of a physiological function by eg activa-
   tion, stimulation, depression, deactivation, alteration and dysfunction.
   k7,3) Change in the level of a physiological capacity by eg augmentation and reduction.
   k7,4) Altered growth and differentiation of a physiological, often neurological capacity.
   k7,5) Change in the effectiveness of eg medication, vaccination, diagnostics and therapy.
7k8) Overall effects
A genetic incision affects a selected trait directly, when the phenotype with a morphological or functional 
distinction is traceable to a specific hereditarily passed on genotype and the individual gene or gene group 
as functional unit is identified with its bio-synthetic pathway. With it affected are the anatomy, morphology 
and physiology of the organism and massive, population wide manipulations show first in the demographic 
structure. Genetic incisions to determine a specific trait in the public psychological profile gaplessly, stably, 
time effectively will affect the demographic structure with all co-determining genetic factors and result due 
to the long causal chains, large number of variables and interdependencies in an almost irreversible shift 
of frame in several allele frequencies of the world population's gene pool with uncontrollable, spreading
catastrophic side effects.


7l) Revenge camps
7l1) The governments of the Third World Countries continue their investigations into the Major Powers' 
and Clients' military and intelligence activities and widen them out to screen all their political-social forces, 
decision making elites, public and secret policy goals, social structures and processes, resources, govern-
ment and private security personnel and area covering single households.
They penetrated electronically most political-military-intelligence high security areas and often leaked 
show off successes into open channels.
Also, with ongoing investigations they are again and again fed up with disgust. Behind the image fascism 
of the Industrialized Nations yawns a social fabric without credibility, without any basic values of life and 
especially truth in its generation, management and leadership role.
   l1,1) Their political intentions remain spread out widely: information, protection, predominance, counter-
   leverage, total secrecy, revenge and indignation.
   l1,2) At home they screen all foreign past and present intelligence activities in all areas of their countries' 
   life from covered operations to environmental damages. They rolled back and protect themselves against 
   further foreign subversion and corruption, also cutting off the fuel for up to then hardly heeded fornication 
   as cultural and economic weapon, degrading social fabrics by internally bleeding wounds.
   l1,3) They strive in loose coalitions with exchange of data and alignment of interests for global predomi-
   nance in B-C-G-R-N micro-weapons and not for internationally guaranteed safeguards, multiplying the 
   new, devastating dangers for mankind.
   l1,4) They expand their global undercover micro-weapon operations.
   ◦ Formally they tolerate foreign hostile political propaganda, secret policy goals, enforcement concepts, 
     deployment structures, weapon development, financing and most undercover operations.
   ◦ They expand their own military-intelligence infrastructure, often drawing on scientific, technological, 
     logistic and data support from Russia.
   ◦ They expand their own global system of labor camps with a network of affiliated groups.
   ◦ They keep a close watch on hostile security services and the global information flow in its entirety.
   ◦ They combine their in-depth investigations with political-military-scientific-commercial espionage.
   ◦ They undermine foreign communication/delivery systems along the entire chain from raw materials, 
     production, storage, deployment, employment to follow up by eg theft, tampering, degradation, early 
     set off, electronic interference/shielding, counter-attacks on hostile personnel to thin out, fend off and 
     incapacitate an increasing number of poison pellet operations.
     Some hostile operations continue as sham successes, defused under hand, while backgrounds are up-
     rooted throughout all ramifications.
     Some isolated local regions have become poison pellet free zones.
   ◦ They suppress any attempt towards publication of their B-C-G-R undercover operations.
   ◦ They have pumped up with depot poison pellets all political, military and civic leaderships in the West-
     ern Industrialized Nations, especially the personnel of their security organizations as well as the 
     activists of the Private, Independent Defence Leagues to neutralize them as security threats.
   ◦ Equally targeted are any hostile person or group or fraction of a population.
   ◦ Targets are hit over stages to soften them up, to break their resistance, to render them manipulable, 
     to impair their ability to work and to enslave them physically and psychologically.
   ◦ As the B. Clinton White House sex affairs in 1997-99 had been induced by sodomy drugs, former and 
     present Heads of State like G. Bush Senior and Junior, B. Obama, D. Trump, J. Biden, G. Schröder and 
     A. Merkel have been or are being sodomized regularly, who in a public position see no alternative 
     but to hit back.


7l2) Die Privaten, Unabhängigen Bürgerwehren führen ihre Untersuchungen fort, starten bei Haus-
halten, Arbeitsplätzen, öffentlichen Institutionen und deren elektronischen Geräten in ihrer Umge-
bung und weiten sie aus, um die militärischen und geheimdienstlichen Aktivitäten der Großmächte 
in ihrer Region und den Nachbarstaaten einzubeziehen.
Die Reaktionen der Opfer führen meistens zu blinder, tief sitzender Verachtung und Hass.
   l2,1) Ihre politischen Absichten bleiben weit gefächert: Information, Schutz, Vorherrschaft, Ge-
   gengewicht, totale Geheimhaltung, Rache und moralische Entrüstung.
   l2,2) Sie zielen auf örtliche und regionale Vorherrschaft in B-C-G-R-N Mikrowaffen und nicht auf 
   international garantierte Sicherheitsvorkehrungen, das die neuen, verheerenden Gefahren für 
   die Menschheit vervielfacht.
   l2,3) Sie wachsen weltweit über mehrere tausend Gruppen hinaus und rekrutieren sich via Unter-
   grundkanälen aus verschiedenen Gruppen der Bevölkerung
   ◦ Nahe der Kriminalität, um ihre illegalen Operationen abzusichern.
   ◦ Nahe Kommunikations/Überwachungssystemen, verdeckte Operationen zu verfolgen.
   ◦ Nahe Sicherheitssystemen, moderne Sicherheitstechnik zu untersuchen.
   ◦ Opfer, ihre Angehörigen und Freunde, um sich zu schützen und zu rächen.
   ◦ Bedrohte Bürger, um sich aus privatem Sicherheitsbedürfnis zu schützen.
   ◦ Aufgebrachte Bürger, ihrer Entrüstung über verworfene politisch-soziale Führung Luft zu machen.
   ◦ Zynische Bürger, um von privaten Sicherheitsbedürfnissen zu profitieren.
   ◦ Heuchlerische Bürger, um Opfern unter falscher Flagge illusionäre Hoffnungen zu machen.
   ◦ Engagierte Bürger, die das Morden beenden wollen.
     Einige halb-anonyme, regionale Listen von Tätern werden in der Öffentlichkeit herumgereicht.
   l2,4) Sie verbünden und organisieren sich in globalen Daten- und Kooperationsnetzwerken. Sie 
   ziehen mehrere Verteidigungslinien auf, lagern operative Aufgaben aus, verbessern ihre Tarnung 
   und gehen in abgelegene Gebiete, um Spuren zu verwischen. Sie binden unter Vorwand der 
   Sicherheit alle Berufsfelder, soziale Institutionen und die ganze Bevölkerung in sodomitische 
   Seilschaften ein. Verdeckte Operationen haben sich zu einer Volksbewegung ausgeweitet und 
   sind mit Perversionen, Exzessen, Sicherheitszirkus, Kosten und Gefahren in einer hoch techno-
   logisierten Umwelt ein politisch-soziales Thema in allen Kreisen der Gesellschaft geworden.
   l2,5) Sie weiten ihre örtlichen, regionalen und globalen verdeckten Mikrowaffeneinsätze aus.
   ◦ Formal tolerieren sie der Sicherheitsagenturen politische Propaganda, geheimpolitische Ziele, 
     Durchsetzungskonzepte, Einsatzstrukturen, Waffenentwicklung, Finanzierung und die meisten 
     verdeckte Einsätze.
   ◦ Sie richten ihre eigenen Kommandozentralen mit Überwachungs/Kommunikationssystemen
     ein, stehlen Geräte, plündern Lager, fangen Nachschub ab, kopieren Einsatzanleitungen und 
     rekrutieren ihre eigenen verdeckten Einsatzkommandos.
   ◦ Sie überwachen gegnerische Sicherheitsdienste und den globalen Informationsfluss hautnah.
   ◦ Sie verbinden ihre Untersuchungen mit politischer-militärischer-wissenschaftlicher-wirtschaft-
     licher Spionage.
   ◦ Sie untergraben ausländische Kommunikations/Einsatzsysteme entlang der ganzen Kette von 
     Rohstoffen, Produktion, Lagerung, Stationierung, Einsatz bis Kontrolle durch zB Diebstahl, 
     Beschädigung, Zersetzung, Frühzündung, elektronische Störung/Abschirmung, Gegenangriffe 
     auf gegnerisches Personal, um eine wachsende Zahl von Giftkugeloperationen auszudünnen, 
     abzuwehren und zu vereiteln.
     Vereinzelte örtliche Bereiche sind Giftkugel freie Zonen geworden.
   ◦ Sie unterdrücken jedweden Versuch der Veröffentlichung ihrer B-C-G-R Geheimoperationen.
   ◦ Sie greifen oft in Absprache mit staatlichen Agenturen feindselige Personen und Gruppen an.
   ◦ Sie geben heuchlerisch vor, Missbräuche moderner Biotechnologien auszuräumen, aber
     Sie lügen über Leben und Schöpfung, Zeugung und Ursachen der Zeugung, Tod und Ursachen 
     des Todes, Rechtsstaatlichkeit, Menschenrechte, Glaube, Vernunft, Reife und Ethik.
     Sie geben keine objektiven politischen Informationen an die allgemeine Öffentlichkeit.
     Sie informieren die allgemeine Öffentlichkeit nicht über mögliche Machtmissbräuche.
     Sie üben keine verfassungsmäßige Kontrolle über Machtpositionen durch das Volk aus.
     Sie setzen nicht die zuständigen Behörden zur Strafverfolgung von Massenmord in Gang.
     Sie helfen keinem einzigen Opfer mit Rat, Arzt oder Anwalt.
   ◦ Sie zielen auf Rekorde in der Unzucht, ihre Scharfrichter lauern in erster Linie Befürwortern 
     der Veröffentlichung, öffentlichen Anklage und Strafverfolgung der Täter nach dem Gesetz auf, 
     um sie zu Tode zu sodomieren. Zuerst werden bio-chem-genetisch-elektro-magnetisch-ther-
     misch-akustische Mikrochipsensoren und -sender eingeschossen, dann werden sie mit Depot-
     giftkugeln aufgepumpt, dann ihre inneren Freiheiten von Gedanke und Bewegung zersetzt und 
     zuletzt ihre Körperkräfte gebrochen, - alles unter dem Perversionsetikett der direkten Hilfe mit 
     Medikamenten oder Notfallhilfe für die Opfer.


		6) Power Plots

		We make a profit from our labors.
		We employ our knowledge and skills,
		Recruiting into our corporation,
		Institutionalizing our social system,
		Prospering: Le système, c'est moi.

		We surf with the crest of waves.
		We enjoy unscatheable privileges,
		Owing the media with her stories,
		Blue collars don't have any say,
		Spelling out: La réalité, c'est plaisir.

		Where shall we march from here?
		Where to shall we turn our attention?
		Persecute them and their children,
		Letting everything hang out below,
		Deciding: Liberté toujours.

		Hit teams work with clandestine sciences,
		Turning their attention to monies earned,
		Poisoning slowly their eat, drink and wear,
		Stealing their perverse self, life and future,
		Confirming: Unité de la gênealité.

		Our trickeries are our Achilles heels.
		Sparrows in droves jostle on rooftops,
		Call with the voices of the slaughtered.
		We have no place to go,
		But to run for the ropes.


					9) Prospects

9a) Power
The majority of the Global Players of the Industrialized Nations, of the medium and larger Third World 
Countries and of the Private, Independent Defence Leagues act out of lower power instinct, the most dev-
astating archaic notion, narrow, vile, hateful, persistent, clinching, scheming, instrumentalizing in despotic 
perversion social values, constitutional structures and processes. They are not capable to fill human dignity
with content, but oscillate without a base between the poles of illusion and bestiality.

9b) Failures
9b1) Hardly addressed are the zeitgeist issues in substance.
 ◦ Man does not practice cognition to see himself, his intentions, conceptions, convictions, priorities, val-
   ues, responsibilities and expressions with positive and negative consequences.
   He is largely a brutal creature, applying any tool of power for his advancement.
 ◦ He does not see the service functions of society. He cannot overcome inhibiting factors by enlighten-
   ment or handle conflict solving between hostile parties efficiently.
 ◦ He does not see his position against nature and God. He does not project himself into the future, 
   combining a spiritual hope with a real prospect in cosmic dimensions.
9b2) Hegemonic policies
 ◦ Continuing are overpopulation, famines, epidemics, inequities of life essentials, environmental pollu-
   tion and destruction, leading as mass effective misdevelopments to planetary catastrophes.
 ◦ Continuing are exploitation, polarization of wealth, human rights violations, leading as mass effective 
   power tools to destruction of social fabrics, refugee streams, terrorism, mass murder and war.
9b3) Dirty war
A clandestine, global dirty B-C-G-R-N war is being waged between government and private, independent 
defence leagues' security services of the 1st, 2nd and 3rd Worlds and their populations. Together, they 
operate global systems of labor camps for electro-magnetic-bio-chem-genetic programming of social-
psychological-physiological profiles to transform man into a programmable cyborg - cloned chimera and 
to eliminate human roots of dissenting, opposing and moral voices.

9c) Constitutionality
9c1) Based on human dignity, all universal object and framework values branch out from it.
Its scaled up intent is ethical awareness in telos of mind with correction of inhibiting factors.
9c2) Constitutionality serves as essential, aspirational red thread for the long term future of man.
It is the furthest in the future pointing vision, man can have.
9c3) Ethics' task is to solve cases of gross corruption with disastrous consequences, that not a major 
criminal potential runs to its self-destructive end.
Method is conflict solving by language, enlightenment, regulation, task, means and supervision.
It overcomes with spiritual-political-social will any hostile, inhibiting factor.
9c4) It is the right of the people to correct misdevelopments, leading to planetary catastrophes and injus-
tices, leading to collapse of political-social systems and to reverse a clandestine or open constitutional rev-
olution and to institute a new government with the principle of constitutionality to draw power out of political-
social life.

9d) The standard for local actions is transposed to cosmic dimensions (Gen 18,19 TNIV):
	   For I have chosen him, so that he will direct his children and his household after him
	   to keep the way of the Lord by doing what is right and just,
	   so that the Lord will bring about for Abraham what he has promised him.


Udo Frentzen

			PDF Printout		20    	Home