Remote Control Electronic Brain Punishment

Remote Control Electronic Brain Punishment?

Gleaned from Usenet

October 18, 1988

Dear Sir:

I am currently involved in a crisis of a bizarre nature which I’m sure will be of utmost interest, providing you can find credence in what I relate and not summarily dismiss me as being a fantasy-stricken space case.

I’m being subjected to some type of remote control electronic brain punishment, in severity nothing less than outright torture, and the technology being utilized to execute this questionable action is not only highly specialized and sophisticated, but causes me to wonder whether knowledgeable authorities are even aware that a device of this nature exists. The credentials I can offer as to the veracity of these allegations are slim and none. I’m standing in a bad light to begin with, as I am a 38 year old inmate serving a 1 to 15 year sentence for 2nd degree burglary at the Utah State Prison, and the information contained within is in regard to my substantial problems with prison officials who would gladly have it believed that my word merits no credibility whatsoever. They have, in fact, gone to extreme lengths to insure that such is the case, and you will presently understand why. I have never been afflicted with psychological disorders of any kind, and am not given to fabricating stories with which to bother busy people or cause unnecessary commotion. I’m a convicted thief, not a liar.

It is a difficult story to tell–and though a bit long winded as presented, I feel it important to explain these events in their entirety so as to give the reader a proper picture. Although not well educated, I am reasonably intelligent and able to recount the sequences and details to incidents with a great deal of accuracy, and I swear to you that what is written on these pages is unembellished and 100% true. I ask you to please read and evaluate my letter and hope you will see fit to assist me with any pertinent information you might possess. Should it prove to be that you cannot offer an explanation as to what is happening here, then I’m afraid there is much more amiss than what I had suspected and would make my position appear most precarious.

Eleven months ago I unfortunately ran afoul of prison officials as a result of a minor altercation with other inmates and what was then deemed to be a poor attitude on my part. It has since been a battle of wills, and what they have done to me for my failure kow tow to them is incomprehensible. The hostilities commenced with guards being ordered to launch an intensive campaign of harassments against me. Day after day they tampered with my food, smashing and removing items from my tray, and threatened to poison me with carcinogens and diseases. My mail received similar treatment, I was constantly verbally badgered as well as physically assaulted, and was told my parents would be murdered should I fail to maintain silence. These methods were employed to provoke me into losing my temper and acting out, giving them sufficient cause to impose disciplinary measures and isolate me in the maximum security unit where I could be dealt with without their having to be concerned about witnesses. I have since discovered that these set-up tactics are standard operating procedure at this prison, and believe me, no one could undergo the systematic and intense harassment routine I was subjected to and not lose their temper.

Once isolated, some extremely peculiar things began to occur. I became disoriented to the extent that my cell and surrounding area would take on a surrealistic appearance as though I were under the influence of a hallucinogenic drug, and I was plagued by severe headaches and insomnia for weeks at a time. I had absolutely no inkling of what was happening, and after a couple months of having some fantastically cruel games played with my mind ultimately reducing me to a state of anxiety, the psychiatric squad was called in to play their roles in this colossal “set up” and I was declared to be suffering from a mental illness after undergoing a farcical and cursory interview in duration of no more than 15 minutes. Delusional persecution and paranoia was, I believe, how they so conveniently labeled me. It was obviously a deliberate and prearranged plan, and throughout these actions the staff would make malicious comments as to, “How are you enjoying your headaches?” Need some aspirin?” and “Are you sleeping well, Mr. Fratus?” The use of this fraudulent and adverse psychiatric classification was just one more nail in my coffin, and intended as a means to cast suspicion on my credibility, as well as further enable them to keep me isolated. Now that the frame-up prerequisites were satisfactorily out of the way, they were able to proceed with their campaign of mental terrorism.

I began to receive, or hear, high frequency tones in my ears. Like the test pattern on a TV set. The volume or intensity of these frequencies is adjustable and some are so high and piercing that they’ve literally had me climbing the walls. When I plug my ears with cotton or fingertips, the tones are still inside and become amplified. It’s as if they had become electrified echo chambers with the sounds coming from the inside out. When I complained or acted out, I was beaten and thrown into a strip cell with no clothes, mattress, toilet paper or drinking water. Nothing–and the intensity of these frequency transmissions would be crescendoed to maddening levels. Much mental distress! This is still being done to me three shifts, 24 hours a day, and the combination of these demoralizing mental torments and sleep deprivation for weeks on end has exacted a heavy toll on me.

I began to write letters of complaint and question to various medical and legal associations after the first four months. It proved futile to complain to prison and state officials, as they are aware of, and sanctioning this treatment, and did nothing but use my complaints as a vehicle to further ridicule and aggravate me. It required upwards of 50 letters before I finally acquired information which gave me a clue as to just what kind of a predicament I was in. Most people, it seems, are understandably reluctant to offer assistance to a convicted person no matter how serious the situation, and the majority of my letters went unanswered. No telling if these letters were actually mailed, however, as prison officials are notorious for misplacing inmate mail, and these people are definitely trying to hinder my quest for information and support in this matter. I subscribe to “U.S. News and World Report” which recently printed an article concerning the workings of the human mind. I did not receive this particular issue and became suspicious after hearing guards make comments like, “I’ll be damned if I’ll give it to him,” so I had my father, who resides in New Hampshire, mail me the article which contained the names of several brain research scientists and their respective universities. The administration obviously doesn’t want me advising research people of my situation here–and so that is just what I intend to do. Getting back to the letters I had written requesting information, I was fortunate in that the folks at the “Coalition for Prisoners’ Rights Newsletter” located in Santa Fe, New Mexico, were concerned enough by word of my plight to conduct a little research which resulted in their sending me reprints of three articles dealing with: Electromagnetic, and Non-Ionizing Electromagnetic Radiation, and Radio Frequency Weapons–which were published by “U.S. News,” “The Nation” and “The Atlantic” back in March 1987. I received this information September 22, 1988, and thanks to those kind and conscientious people, I now have some idea of how such things are being done to me, and most importantly that such technology does exist.

These articles cover most of the mental and physical maladies I’ve been experiencing for the past eleven months, with one major exception, and I’ll hopefully be able to use this information to gain further insight as to what is going on, and to alleviate the hostilities being waged against me. You cannot imagine what it has been like confined to a cell 24 hours a day for almost a rear now, being brain blasted by high frequency impulses–no respite, no place to hide, and having not the lightest notion what was going on. All three of these articles, “U.S. News” in particular, describe dire consequences as a result of over exposure to various radiation and frequency hazards, and I’m now most apprehensive as to how eleven months of constant application, by whichever of these means it is being done, might be affecting my cell chemistry and vital organs.

I’m sure you’ll agree that I’ve stumbled headlong into the proverbial hornets nest, but what I have told you thus far is only the lull before the storm and is quite unremarkable in comparison to what comes next. What they proceeded to do to me from approximately the fifth month on is the exception I spoke of–and is so unimaginable and seemingly preposterous that its very ludicrousness is obviously one of their primary defense assets. Even though I have been living with this incredible phenomenon for months on end and have grown somewhat accustomed to what is being done, as well as having resigned myself to the inevitability that I have no escape from this torment as long as they choose to inflict it, I still find great difficulty in believing this can be reality. Getting an outsider to accept my allegations is going to be something else altogether, and that’s just what prison officials are counting on.

For the climax in this series of weird events, I began to hear voices in my ears. Voices that change pitch and timbre in contrast from being a cartoonish high and squeaky, descending through the octaves, including everything from sinister Darth Vadorish to basically normal characteristics. The reception of these voices into my inner ears is as vivid as though I were listening to a set of stereo headphones, and they are able to mix, match, and blend them in conjunction with the frequency tones creating a raucous cacophony of audio discord that disheartens the soul. Now for the clincher.

The various effects of this device have been progressively increased throughout this eleven-month onslaught, finally arriving at full potential with the end result being that I am now having my brain monitored by an omnipotent computerized mind reading or scanning machine of some sort. No hoax, no illusion to what I’m experiencing. These people have devised or acquired a specialized unit that reads absolutely everything–physical as well as mental functions, and are able to cause severe impairments and dysfunctions via this remote-control scanning device. I have no memory of having had anything of a physical nature done to me, but it has somehow been contrived to “wire” me up to where they have access to instant, and unerringly accurate comprehension of even my most fragmented and fleeting thoughts. They are attempting radical behavior modification and thought control by means of an incessant, round the clock monitoring of my brain–imposing the various punishments when my thinking or physical actions fail to conform to what they are demanding of me. Interesting concept, isn’t it? “Big Brother” and the “Thought Police” have most assuredly become reality.

This scheme of sleep deprivation, headaches, and audio torments is relentless and being used to break down my resistance and wear me to a mental frazzle, permitting no mental privacy, berating and picking my thoughts apart, and attacking my mind with an insidious tirade of sickening innuendo and threats. They are going into my subconscious, or memory bank, bringing forth unpleasant memories long ago forgotten, and I am being punished for past as well as present indiscretions. I can think of anything from the past–a friend or situation from 30 years ago for instance, and the voices will provide names and particulars. I have repeatedly tested and attempted to trick them on this. No way. They have better access to what’s in my head with this nefarious invention than I do. I can converse with my antagonists merely by thinking what I wish to say…. and I welcome you to the Twilight Zone!! How the hell is this being done?? They are using those frequency impulses to perpetrate some very vicious maltreatment on me. With the apparent ease of manipulating a keyboard, they can, with a flick of the switch, strip me of all energy and motivation to where I’m forced to lie on my bunk and stare at the wall like a-zombie. I’ve been left in this state for weeks at a time–literally chained to my bed without the actual use of physical restraints, having not the energy to walk back and forth in my cell even a few times. For almost the entire eleven months I have continuously been made to feel low down and chronically depressed. The effects of this device have been cancelled on several occasions, instantly returning me to my normal self, only to have the voices laugh and taunt, then reducing me to the former state of despondent misery and confusion after an all too brief reprieve. The most powerful of these frequency impulses is jokingly referred to as the “Death Ray” by guards, and is so potent it causes an intense physical sensation of having an electrical, or magnetic force field combined with a vibrating tuning fork in my head. Different parts of my brain are targeted by this thing, causing a variety of mental and physical reactions. Sometimes I can feel it at the base of my brain where it joins the spinal cord, other times up in the frontal lobes, and it is in fact comparable to a lobotomy, as it causes my brain to lock up and malfunction to where I cannot concentrate or spell simple words. It actually blurs my eyesight and fouls the air I expel from my lungs, giving it a metallic sulfurish taste and odor. It’s a God-awful feeling, I can tell you. They have, at times, assailed me with this “Death Ray” in bursts ranging from seconds to minutes, causing me to psychologically bounce up and down like a human yo-yo. Lobotomies may have been outlawed in the U.S.A., but they’ve sure found the perfect replacement, and I don’t see how this treatment can possibly be construed as anything other than torture.

It is inconceivable to me that the technology of this awesome device can be unique and possessed solely by the State of Utah, but I may very well be wrong. When I first entered the prison in May, 1986, one of the psychologists who conducted my initial classification interview inquired as to whether I had ever heard “voices.” That seems to be the key word around here. This question was posed almost a year before the “U.S. News” and other articles were published, which seems unlikely, as the proficiency of the apparatus I’m dealing with is sophisticated far beyond anything scientists had apparently imagined in use at that time. I, of course, didn’t attach any significance to the question of voices back then, but remember it well, and have since heard many references made to people hearing “voices” by both inmates and staff, which would indicate that these people were in possession of, and employing this technology at least that far back. This is what prompts me to wonder how they could have had such an innovative piece of equipment in use, operating with apparent perfection of technique, without the scientific and medical community in general being aware of it. Quite a puzzle.

In defense of both my sanity and the veracity of my allegations, I now relate part of a conversation I recently had with a prison paid, but supposedly independent and neutral paralegal advisor. He stated that he has received similar complaints from other inmates, but that nothing can be done for lack of evidence. He said that one inmate in particular has been placed on forced medication (Prolixin) because of his hearing “voices,” and unless I’m greatly mistaken, I believe his words carried an unofficial warning for me. At least two inmates that I know of have been badgered to the point of having attempted suicide as a result of this mental torment, and something stinks to the high heavens here! All of the staff, as well as a number of inmates, are aware of what is happening, so I can’t fathom how it can remain, or even at this time, be a kept and closed secret human nature being what it is. For the most part, I believe the other knowledgeable inmates are intimidated and cowed for fear of retaliation in the form of a mental torture routine such as I’m being subjected to should they complain. Threats of additional time being imposed by the Parole Board are also being used to coerce silence. Tough odds to buck.

Prison officials deny that they are perpetrating any such activities in response to formal inquiry but will grin and smugly indicate full awareness when no witnesses are present. “Yes, we are doing this to you, but no one will believe it, and you can do nothing to deter us.” This is the attitude they project, and they are engaging in a conspiracy of inmate experimentation and exploitation that defies description. The outside authorities who even made a pretense of investigating my allegations were told I’m a habitual trouble maker with a history of psychological problems, and that effectively frustrates my attempts to have this situation looked into right there. Who is to dispute the word of my law-abiding and honorable keepers? How to verify and impress upon investigators the honesty of my accusations? What concrete evidence do I have? Even a group of inmates alleging corresponding facts are subject to skepticism as prison officials will simply accuse them of collusion. I’m being deliberately isolated from the inmates who would collaborate my story, by the way–and legal organizations such as the A.C.L.U., due to lack of substantiated proof and the absurdity of this horror show, are hesitant to invest the time and effort necessary to determine what is actually taking place at the hands of these pious Mormon inquisitioners. I’ve seen them in action and they are possessed of exceptional finesse in their ability to conceal the true nature of matters and mislead outsiders with their upright and holier than thou pretentiousness. It has been eleven months of deception by prison officials, of nonstop elaborate harassments and vicious mind games, and I would surely like to know just what provocation I gave to warrant the infliction of such insane mistreatment. No rhyme or reason–nor justification–either legal or moral, to any of this. They are so very smug and secure in the belief that they cannot be brought to account for these blatantly illegal acts due to their well rehearsed methods of official denial, isolation, and absence of witnesses, bogus psychiatric evaluations, and of course, the fact that this mental torment is being accomplished by a faceless machine, operated by anonymous antagonists from an unknown location and distance. I overheard one guard boast that the tactics they’ve employed have been so extensive that no one would believe me anyway.

I was an Air Force brat, born in New Foundland and stubborn as a Missouri mule. I suppose I could capitulate and eventually get these people to cease and desist in this mental warfare, but I vehemently resent and object to this flagrant invasion of the sanctity of my mind and will be damned if I’ll just sit here and allow them to go unchallenged in this attempted programming and manipulation of my brain and personality as though I were an experimental laboratory animal. The judge sentenced me to serve an atonemental amount of time for my crime and said nothing of corporal punishments or mental torment and abuse when he passed judgment. It is plain enough why they went to such extremes to set me up for isolation and discredit my word. I have to shake my head in incredulous dismay when I picture the outrageousness of the circumstances I’ve been maneuvered into. I recently signed a release form and obtained, acting through the paralegal I previously mentioned, partial copies of both my administrative and medical prison files. I was denied access to all of this material and told to get a court order if I wished to see what was withheld. What I did see, however, was enough to convince me that I’m dealing with some highly unscrupulous people who will stop at nothing to protect their conspiracy. The chronological notes contained in these files bore a contrived and twisted mass of outright lies pertaining to alleged conversations between myself and both psychological and correctional staff. This deceit was expressly woven in harmony by the various contributors to detract from my credibility and make me appear unstable. There was, in fact, mention of obtaining a court order to force treatment on me (Prolixin?), and I find it very sad, and hard to believe, that this type of atrocious inhumanity is being practiced in this country in this day and age. Equally hard to understand is the fact that the state officials I have advised of this situation, including the Governor, Attorney General, State Senate, County Attorney, and Department of Corrections Personnel, all choose to ignore and make light of these allegations, even though there is strong indication of foul play due to the numerous individual complaints made by inmates at this institution. I even went so far as to challenge Warden Gerald Cook, and Gary Deland, who is the Executive Director of the Department of Corrections, to a $1500.00 wager as to the outcome of a polygraph test between myself and prison officials to determine who is speaking the truth. They have declined my invitation, of course, and I was threatened with the possibility of disciplinary action for my proposal of illicit gambling. This is a Mormon state, and there is a deep-rooted conspiracy going on which apparently encompasses most, if not all of the governmental structure. Can nothing be done?

It may very well prove impossible to bring legal action against these people for what they’re doing to me, but I fully intend to continue my pursuit of the answers–and shall endeavor to expose this malignant corruption for what it is. I firmly believe the truth must eventually surface.

Any consideration you can give this matter–either assisting me with information, suggesting responsible authorities from whom I might elicit assistance, or possibly forwarding this letter to someone who could cause investigation, and perhaps act to prevent further retaliation by these people, would be ever so greatly appreciated. This letter has been written in good faith, and I sincerely hope you will treat it as such. If nothing else, I ask that you at least accord me the courtesy of acknowledging receipt.

Sincerely,

David James Fratus
17886 Box 250
Draper, Utah 84020

Five Reasons to Unplug the TV Now!

Posted by Dr Stuart Jeanne Bramhall on @ 5:31 pm

URL to article: http://blogs.alternet.org/refugee/2010/03/09/civil-liberties-and-corporate-messaging/

Commentators from all parts of the political spectrum are increasingly vocal about overwhelming public passivity in the face of far-reaching legislation, by both the Bush and the Obama administration, that strips Americans of important Constituional protections. I’m sure much of this passivity relates to Americans’ overall alienation from the political process – by the powerful corporations who fund elections and whose army of lobbyists drives most major legislation.

Nevertheless the corporate media also plays a significant role in reinforcing public passivity and apathy. This can be seen by a careful breakdown of specific ideological messages (also known as propaganda) that continually bombard the American public. These messages can be found in direct advertising, “news and information” reporting and the so-called “entertainment” content of TV, films, books magazines and newspapers.

The notion of using carefully crafted psychological messages to condition Americans’ thinking and behavior isn’t new. As Australian born psychologist Alex Carey has traced, it grew out of a decision by the National Association of Manufacturers decision in the 1930s to foster the development of a “public relations” industry. However over time the science and techniques employed have become increasingly sophisticated and new players – (predominantly right wing) think tanks and government (Pentagon and intelligence) agencies – have quietly entered the arena.

At present the “messages” Americans are bombarded with on a daily basis fall into five broad categories:

Category 1: Pro-war messages.

These are messages occurring repeatedly both in “news” reporting and both TV and film crime and spy dramas (both TV and film) which portray the US is under threat of imminent terrorist attack. This includes regular reporting that US intelligence, on the basis of secret information, has upgraded the US alert status from yellow to orange (high). Obama, like Bush, uses these messages to justify a continual escalation of the war in the Middle East and apparent plans for an imminent attack on Iran.

Category 2: Anti-civil liberties messages

There are fear-inspiring messages used to make Americans so fearful of imminent terrorist attack that they willingly surrender their own civil liberties to prevent it. Both Bush and Obama have used similar messages to convince the American public to surrender their right to habeas corpus (guarantees review by a judge whenever anyone is detained by law enforcement), their protection against warrant less search and seizure, government surveillance of phone conversations and emails, torture and extrajudicial assassination of so-called terrorists (unfortunately this could potentially include anyone who criticizes the government, as there is no burden to prove the victim’s guilt). These messages figure prominently in a raft of national news reporting and a raft of crime and espionage dramas that have dominated TV and movie entertainment in the past decade (24 and Without a Trace are good examples). It is common in similar programs (which often employ Pentagon consultants) to portray warrants and non-violent interrogation techniques as an “inconvenience” and a threat to public security. (As an aside the original Patriot Act was directed towards the growing anti-globalization movement and not towards towards Middle East terrorists.)

Category 3: Messages promoting fear of dark skinned people

Government propaganda aimed at minority scapegoats dates back to the Middle Ages and the systematic persecution of Jews in Europe – with Hitler’s “Final Solution” the most extreme example. It serves two main purposes – to deflect popular anger from a corporate elite (in Hitler’s case to conceal the German, British and US corporate backers who promoted his rise to power) and to promote distrust between various sections of the working class that might otherwise unite and rebel. Recent racist media messages largely take the form as anti-immigrant hysteria directed against Hispanic immigrants from Mexico (who are portrayed as welfare cheats and a threat to American jobs) and dark skinned people from Middle East and Asia (who are portrayed as potential terrorists). However there continues to be a disproportionate portrayal of African Americans as angry, violent and criminally inclined, both in unbalanced news reporting and racial stereotypes in TV and film entertainment.

Category 4: Messages promoting US exceptionalism (the belief that that US has the fairest, most democratic and most open political system in the world)

The media carefully conceal corporate interference with elections and the legislative process (all the perks – gifts, meals, cocktail parties, free trips and free use of corporate aircrafts – corporate lobbyists dispense as an inducement for favourable legislation). They also systematically concealed the massive electoral fraud which occurred in the 2000 and 2004 presidential elections.

Category 5: Messages encouraging ordinary people to disengage from the political process because it’s too complicated and too corrupt

(Yes, the government and the public relations industry deliberately portray politics as corrupt to persuade the public to stay out of it). This message is driven in part by the name, blame and shame focus that dominates political reporting – Americans are most likely to hear their lawmakers mentioned in the mainstream media as a result of immoral, illegal or unethical contact. However this message is mainly driven home via distraction – by making other aspects of modern life (such as Tiger Wood’s infidelity) vastly more prominent than demanding a voice in whether the US gives two trillion dollars in bail outs to banks or engages in an unwinnable war with Iraq, Afghanistan, Pakistan and Iran.

Read more at http://stuartbramhall.aegauthorblogs.com

CONGRESS ASLEEP AT THE SWITCH AGAIN

Secretly the reality of a totally controlled society has been emplaced. While we were looking at political control, the technological mechanisms for a Big Brother state are being installed, secretly in the hope no one will notice.

Congress once again is at fault, it allowed vast billion dollar “black budgets” to escape oversight control. For decades, research and development on population control systems has been funded by a complacent Congress, and the Intelligence Committees in the House and Senate have allowed these systems to go operational. We are going to give you hard information and hard proof. This is not guesswork, it is reality. And Congress is to blame for lack of oversight.

Fortunately (for the United States), Sweden has applied these control systems overtly to entire segments of the population (in the U.S. apparently only selected individuals are under control.)

Our information comes from a Swedish researcher who has followed the Swedish system of people control i.e., the replacement of individual values, standards and beliefs by state authority.

Our Swedish source says, “We have (been led) out of the industrial society to enslavement in the Information Society” and “there are frightening developments concerning the use of data surveillance, known as biomedical telemetry, mind control, optical electronic surveillance and brain-computer interaction.”

Then comes the clincher:

“The properties of this technology enable the monitoring of mental functions, thought, deed and associated cerebral neurophysiological changes as well as the manipulation of behavior, values and personality from limitless geographical distance.”

These systems form the basis of the Information Society (so beloved by Newt Gingrich) and eliminate the power of the individual to make personal decisions. Maybe Newt Gingrich is not aware of this, but his emphasis on individuality is a fraud so long as control mechanisms exist to over ride individual values and decision making. (We are not accusing Gingrich, he may not know. We’ve spent a lifetime following these developments and only now can visualize the technology emerging.) These are black budget systems hidden from the public and ignored by the leadership in Congress.

Let’s summarize the information we received from our Swedish source, then we can sketch development in the U.S.

Cyber is the science of control. It consists of transmission of electromagnetic wavelengths for cerebral radio communication. The subordinate technologies include brain-computer interfacing, data surveillance, mind control, biomedical telemetry, man-machine interaction, all designed to transmit the basic ideology of the Information Society. (That’s why Gingrich’s mentor Alvin Toffler says the Constitution is “out of date.”)

Telemetry requires transmission of data not normally available i.e., your thoughts and plans. It is a two way communication system enabling remote control of individuals. (Official U.S. terminology-RNM or “remote neural monitoring.”)

This (our source continues) is a global system. (Is that why we have hundreds of satellites up there?) It operates at the speed of light and over any distance.

The surveillance system is operated by implanted transmitters in the head or electrodes in the brain but also injectable microchips, substances or micro transmitters implanted in any part of the body.

These implantations take place “in unwitting patients” during hospital operations, in patients at psychiatric clinics. In Sweden all elderly persons are implanted when “taken into long term care” (ah ha, Clinton’s universal health care!) and in all persons taken into police custody or in prison. Implants are also in the form of dental material and false teeth, and can be mixed into pharmacological products (i.e., medicine.)

Therefore, the Toffler school futurist’s emphasis on nanotechnology–the devices are hardly seen in x-rays.

These implants are, up to now, inserted into persons under state control (i.e., mental patients, prisoners, elderly sick.) This program has been funded, developed and implemented in complete secrecy. Experience has been that when governments hide something, it’s probably not to our benefit.

So how do the systems work?

The implant receives radio signals via satellites. These have known and specific effect on the brain. Many years of research on effects of radio signals on monkey and human behavior is in the open nonclassified literature. The black budgets have generated more advanced systems given the sophistication of the implants we know about.

The returned signals, from the individual brain through the satellite are processed by a central computer and the information presented on a screen to the controller. The technology has advanced to the stage where individual dreams or vision (i.e., mental picture) can be monitored on a three dimensional screen. So that as you read this and have a mental image of Big Brother at a screen this image in your mind can be (or is being) relayed back to a central processing facility.

The Militarization of Neuroscience

When military scientists begin to combine “cognitive engineering” and neuroscience with genetic engineering, we could see a nightmarish new generation of biological weapons and nerve agents that radically alter the minds, emotions, memories and beliefs of everyone on earth.

That’s the opinion of Mark Wheelis and Malcolm Dando, authors of “Neurobiology: A Case Study of the Imminent Militarization of Biology” published September 30, 1995 in the International Review of the Red Cross. See this site for a PDF of the full article:

http://www.icrc.org/Web/Eng/siteeng0.nsf/html/review-859-p553

Abstract: The revolution in biology, including advances in genomics, will lead to rapid progress in the treatment of mental illness by advancing the discovery of highly specific ligands that affect specific neurological pathways. The status of brain science and its potential for military application to enhance soldier performance, to develop new weapons and to facilitate interrogation are discussed. If such applications are pursued, they will also expand the options available to torturers, dictators and terrorists. Several generic approaches to containing the malign applications of biology are shown, and it is concluded that success or failure in doing so will be significantly dependent on the active involvement of the scientific and medical communities.

Translation: The medical community has got to stop sitting on its duff and get some international legislation passed prohibiting the development of these bioweapons NOW.

I would add: An equally serious effort needs to be made to block military application of EM weapons to the human brain. The pretence that such weapons are “less than lethal” is a serious misunderstanding of the immense threat that they pose to the privacy and civil liberties of every man, woman and child on the face of the globe.

Thought Police: The Next Logical Step in a Total Surveillance Society

George Orwell introduced the concept of the “Thought Police” in his dystopian novel 1984. See the Wikipedia article on Thought Police here:

http://en.wikipedia.org/wiki/Thought_Police


According to Kathleen Taylor in her own book, Brainwashing: The Science of Thought Control (Oxford University Press, 2006) “It is the job of the Thought Police to uncover and punish thoughtcrime and thought-criminals, using psychology and omnipresent surveillance from telescreens to find and eliminate members of society who were capable of the mere thought of challenging ruling authority.”

Does such a system exist in the United States today? Signs point to yes.

Granted, the United States remains a republic, and it has just completed a new cycle of elections. Its liberal constitution and principles of democratic representation seem to be standing firmly in place. Its flag waves proudly.

But there is a growing body of evidence that this country, once “conceived in liberty and dedicated to the proposition that all men are created equal,” has devolved into a paranoid police state, much like the authoritarian state described by George Orwell in 1984.

One may find, simply by searching the internet, plenty of evidence that the United States government is actively involved in all the basic activities of the “Thought Police” exactly as listed above:

1. The uncovering and punishment of thought crime and thought criminals
2. The use of psychology to profile and identify “potential” criminals, terrorists and subversives within society; and
3. the use of “omni present surveillance from telescreens” to create what Harlan Girard calls “an Electronic Concentration Camp System” — a grid or matrix from which no person can escape.

In each of these activities, the new mind-invasive technologies known collectively as artificial telepathy play a key role.

Uncovering and Punishing Thought Crime

As documented in many other posts on this blog, mind-invasive technologies have begun to play a key role in the uncovering and punishment of “thoughtcrime.”

The prime example is the Department of Homeland Security’s new Malintent program mentioned in the previous post (q.v.) By scanning the faces of people at airports and reading other vital signs like heart rate, temperature and blood pressure, new sensors and computer algorithms can be used to read the intentions of airplane passengers — and presumably to prevent “potential terrorists” from boarding planes by means of “pre-emptive arrest.”

One must emphasize here that reading a person’s intentions with a camera and a computer is probably not much more reliable than a classic lie detector test, and very little scientific evidence exists to support the claims that these machines are accurate. The important thing to note is that the Department of Homeland Security seriously intends to use these machines as a pretext for pre-emptive arrest — that is, they intend to arrest people for crimes not yet committed.

Arresting a person for a crime not yet committed, on the basis of perceived intent, amounts to arresting people for thought crimes.

Use of Psychological Profiling to Detect and Detain “Potential” Criminals

As Jim Marrs points out in his new book The Rise of The Fourth Reich: The Secret Societies That Threaten to Take Over America (William Morrow, 2008), these “mind reading” computer systems are “reminiscent of prewar Nazi plans to preempt crime and dissent.” (p. 333)

For example, Nazi psychologists used pseudo-scientific examinations and the doctrine of preemption to remove “uneducable” children from grade schools. If a number of symptoms indicated that a child was “bad student material,” their name would be registered on a list. It was stated that “genetic and national health considerations recommend their preventative registration.”

“Of course,” says Marrs, “such registration led to the euthanasia centers.”

Marrs rightly calls “disturbing” the new trend to identify and detain potential troublemakers before they have actually committed a crime.

Terrorist Watch List — or Black List?

In its efforts to intercept “suspected terrorists,” the Department of Homeland Security has added more than one million names to its terrorist watch list. The American Civil Liberties Union suggests this number is way too high.

“Terrorist watch lists,” it says, “must be tightly focused on true terrorists who pose a genuine threat. Bloated lists are bad because they ensnare many innocent travelers as suspected terrorists, and because they waste screeners’ time and divert their energies from looking for true terrorists.”

Among the individuals whose names were found on the list by 60 Minutes and other media organizations: Sen. Edward Kennedy, Nelson Mandela, Bolivian President Evo Morales, Saddam Hussein (in custody at the time), Rep. John Lewis, James Moore (author of Bush’s Brain), and John William Anderson, age 6.

http://www.aclu.org/privacy/spying/watchlistcounter.html

Now one must admit that certain children really are terrible brats, who ought to be watched more closely by their parents, but is it really necessary for the secret police to become involved? And if a United States Senator can be listed as a “suspect,” then who is above suspicion?

A “terrorist” watch list that includes the names of more than one million people seems to be clear evidence that the Department of Homeland Security is either a) very paranoid indeed, or b) very interested in using terrorism as a pretext for spying on U.S. citizens who have committed no crimes.

That is, they have established a system that allows them to “find and eliminate members of society who are capable of the mere thought of challenging existing authority.”

FTAC: The Fixated Threat Assessment Center

Psychological profiling, black listing and preemptive arrests are “Thought Police” tactics used in Europe, too, not just in the U.S. The British have their own system, called FTAC.

In a chapter titled “Psychology and Public Control,” Jim Marrs writes: “The British government, in May 2007, responding to news accounts, acknowledge it had secretly established a new national antiterrorist unit to protect VIPs by first profiling, then arresting persons considered to be potentially dangerous. Amazingly, this power to detain suspects even before they actually committed a crime was based on mental health laws.”

Marrs cites a news story by London Times reporter Joanna Bale. She reports that “until now it has been up to mental health professionals to determine if someone should be forcibly detained, but the new unit uses the police to identify suspects, increasing fears that distinctions are being blurred between criminal investigations and doctors’ clinical decisions.”

Experts believe that this arrangement “is set to reignite controversy over the detention of suspects without trial.”

“There is grave danger of this being used to deal with people where there is insufficient evidence for a criminal prosecution,” said Gareth Crossman, policy director for Britain’s National Council for Civil Liberties.

“This blurs the line between medical decisions and police actions. If you are going to allow doctors to take people’s liberty away, they have to be independent. That credibility is undermined when the doctors are part of the same team as the police. This raises serious concerns. First, that you have a unit that allows police investigation to lead directly to people being sectioned without any kind of criminal proceedings. Secondly, it is being done under the umbrella of antiterrorism at a time when the government is looking for ways to detain terrorists without putting them on trial.”

Scotland Yard has refused to discuss how many suspects have been forcibly hospitalized by the team, because of “patient confidentiality.” Meanwhile, conservative members of the British government have hailed FTAC as the first joint mental health – police unit in the United Kingdom and a “prototype for future joint services” in other areas. They are introducing legislation to broaden the definition of mental disorders to give doctors — and now police — more power to detain people.

Mass Surveillance and the ‘Electronic Concentration Camp’

Jim Marrs worries that joint psychologist-police units like the FTAC in Britain might serve as a prototype for similar units in the U.S. “Is this coming to America soon?” Marrs asks.

Harlan Girard would probably answer: “It’s already here!”

Mr. Girard is the Managing Director of the International Committee Opposing Microwave Weapons (ICOMW), and he firmly believes that the United States government has already established what he calls an “Electronic Concentration Camp System.”

See the homepage of his website here: http://www.icomw.org/

Essentially, the ECCS is a network of microwave towers and broadcast centers that can virtually imprison any citizen of the United States that the Thought Police wish to target. It’s a people zapping system, used to track, torture and psychologically harrass inconvenient people who, for one reason or another, have been placed on the government’s long list of enemies.

To support this claim, Girard has amassed an impressive collection of documents, posted at the website’s archive, here: http://www.icomw.org/archive.asp

The documents in this archive clearly indicate that the U.S. government has no need of the small FTAC units used by the British Government. The number of peace protestors and politically “inconvenient” people who have suddenly begun to hear voices in their heads strongly suggests that the U.S. government has built and fielded something much bigger, much more powerful, and much more scary: a fully developed and fully operational Electronic Concentration Camp System.
If the secret police, operating under the umbrella of counterterrorism, wish to “section” an inconvenient citizen “without any criminal proceedings,” they simply enroll that individual into the ECCS.

Technically, the “Targeted Individuals” remain free, but they are tortured 24/7 with microwave weapons, often to the point of losing their minds. They hear voices and experience a wide variety of horrible sensations. If they voluntarily turn themselves in to a psychiatric hospital, they are immediately diagnosed as schizophrenic and sectioned. Thus they are discredited and stigmatized for life. Those who turn to mainstream media are openly mocked.

In 2007, The Washington Post did a profile on Mr. Girard and other voice hearers, who are commonly called “wavies.” (See the link among the News links lists to the left.)

While the reporter kept a skeptical distance from Mr. Girard, she did at least do some background research on mind-invasive technologies. The Post filed an FOIA request with the U.S. Air Force and did manage to obtain documents showing that the Air Force Research Laboratory (AFRL) has conducted several “voice to skull” experiments during the past decade.

It may be interesting to note that AFRL is also one of the primary research sponsors (along with the Navy) for the High-Frequency Active Auroral Reasearch Project (HAARP) — a 35-acre antenna farm near Fairbanks, Alaska, that is powerful enough to focus microwave beams anywhere on the face of the earth.

According to Dr. Nick Begich, author of the book Angels Don’t Play This HAARP (http://www.earthpulse.com/), the Air Force can broadcast from these antennae at frequencies that match the frequency range of the human brain.

In Chapter 23 “Psychocivilized Society and the CIA,” Dr. Begich explores “the use of electromagnetic waves for mind manipulation,” and concludes that it would be very possible to use HAARP as a non-lethal weapon that could be rationalized as an alternative to military force.

Whether HAARP acts as the hub of the ECCS is another question. HAARP certainly operates as part of the Air Force’s “Star Wars” ballistic missile early warning system, scanning for Soviet Missile launches. That means it is a subordinate wing of NORAD, the North American Air-Defense Command — an underground city buried beneath Cheyenne Mountain near Colorado Springs.

NORAD is a “hardened” and extremely secure underground site, equipped with supercomputers and direct uplinks to a wide variety of top secret space platforms and space-based beam weapons. It makes an excellent candidate for the HQ of the kind of “Electronic Concentration Camp” that Harlan Girard has envisioned.

NORAD certainly does have full access to the kinds of spy satellites and laser beams that worry the “wavies.” It may incorporate many other systems besides HAARP, and it may be no accident that the Sci-Fi series “Stargate” is supposedly set in NORAD’s underground bunker.

Given NORAD’s vast array of high-tech toys and its direct links to the Pentagon and the NSA, the possiblity that it might be HQ for a top secret “Thought Police” unit does not seem to be entirely out of the question.

Total Information Awareness

Civil liberties groups cried “Thought Police” in 2002 when they first discovered the U.S. Defense Department’s Information Awareness Office and its Total Information Awareness doctrine. Run for the Defense Advanced Research Projects Agency (DARPA) by former Vice Adm. John Poindexter, the TIA “counterterrorism” program caused quite a brouhaha because it advocated pre-emptive policing through use of a massive data mine that would interconnected a wide array of powerful surveillance systems:

http://en.wikipedia.org/wiki/Information_Awareness_Office

DARPA’s own website tells us that “The goal of the Total Information Awareness program is to revolutionize the ability of the United States to detect, classify and identify foreign terrorists — and decipher their plans — and thereby enable the U.S. to take timely action to successfully pre-empt and defeat terrorist acts.”

http://infowar.net/tia/www.darpa.mil/iao/TIASystems.htm

See also this article on the “Homegrown Terrorism Prevention Act” from Project Censored (The Top 25 Censored Stories of 2009):

http://www.projectcensored.org/top-stories/articles/6-the-homegrown-terrorism-prevention-act/

Under this act, which nearly became law in 2007, local police departments might have been given legal cover for the use of nonlethal, mind-invasive technology against their own populace. They could zap “suspects” in the name of preventing “homegrown terror.”

Indeed, pre-emptive policing can be used to rationalize almost every form of privacy violation. One need simply argue that the rights of the individual can and must be overriden by police in order to protect and defend the physical safety of society as a whole. It’s for the greater good.

Conclusion

What Orwell did was simply to carry the twin doctrines of total information awareness and preemptive policing to their logical extreme. He imagined a world in which no one had any right to privacy whatever. None. All personal privacy is sacrificed on the altar of national security — for the greater good.

In the sacred name of “national security,” the technocrats who run the nightmarish police state of 1984 arrogantly assume the right to invade the inner sanctum of the mind itself. They read the thoughts of every citizen, dabble their fingers in the stuff that souls are made of, and sit in arrogant, authoritarian judgement over all.

Perhaps the vision of such a police state being realized in 1984 may cause people to smirk. That was, after all, more than 25 years ago, and we don’t have such a police state now, do we?

To those who smirk, however, one might call attention to the many patents on mind-invasive technology that may be found listed in the left-hand column of this blog. One must also point out that the U.S. Department of Defense did not necessarily do away with DARPA’s Information Awareness Office or its Total Information Awareness doctrine.

As with most black programs that are discovered by Congress and the media, these programs have been given new names and parked under the camouflage of other departments within the intelligence community. They still exist.

See Schneier on Security “Total Information Awareness Is Back”

http://www.schneier.com/blog/archives/2006/10/total_informati.html

“Report: NSA’s Warrantless Spying Resurrects Banned Total Information Awareness Program” http://www.blog.wired.com/27bstroke6/2008/03/nsas-warrantles.html

Now consider this: If the doctrines of pre-emptive policing and total information awareness remain in place, can the massive use of mind-invasive technology be far behind?

Orwell may have been off by a few years. But his understanding of the basic arrogance of intelligence agencies and his vision of a nightmarish police state were frightfully accurate. With the quiet advent of mind-reading technologies, the chilling age of the Thought Police has secretly, stealthily and finally arrived.

Remote Neural Monitoring

How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM)
John St. Clair Akwei
vs.
NSA, Ft. Meade, MD, USA

Table of Contents

Cover Page
NSA Mission & Operations
Communications Intelligence
Signals Intelligence
Domestic Intelligence
Independently Operating Personnel Target Citizens
NSA’s Domestic Electronic Surveillance Network
Signals Intelligence Remote Computer Tampering
Detecting EMF Fields in Humans for Surveillance
NSA Signals Intelligence Use of EMF Brain Stimulation
Capabilities of NSA operatives using RNM
NSA Signals Intelligence Electronic Brain Link Technology
Table: An example of EMF Brain Stimulation
NSA Techniques and Resources
Remote RNM Devices
Spotters and Walk-Bys in Metropolitan Areas
Chemicals and Drugs
Intelligence/Anti-Terrorist Equipment
Resources
Further Resources

________________________________________

Cover Page

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.
(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure, national security activities, proprietary technology,and covert operations to monitor individual citizens.

Table of Contents

________________________________________

The NSA’s mission and the NSA’s domestic Intelligence operation.

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.
Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.
Individual citizens occasionally targeted for surveillance
by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
Table of Contents

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).
Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.
Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

Table of Contents

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Table of Contents

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

Table of Contents

National Security Agency Signals Intelligence
Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

Table of Contents

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.
Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.

b) [Information missing from original]

c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.

c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S.

Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).

Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980’s.

Organized Stalking Described

Organized Stalking is a crime thats not accepted or addressed by law enforcement. It is a framework of social control. This is used by government to control some targeted individuals without doing anything that’s illegal in the control framework. It includes combination of bogus covert investigation and systemic harassment that involves intelligence agencies, law enforcement, businesses and communities. Organized stalking is a set of techniques used to destroy unwanted persons both mentally and physically without doing anything illegal in the process. The people involved in organized stalking know about law enforcement. The actions in organized stalking are designed considering the loopholes within the law to achieve the goal of destroying the person.

Oftentimes organized stalking is initiated after an informant or Covert Human Intelligence Source flags the targeted individual. Other times profile information of the targeted individual places them on government black lists and community notification lists.

The crimes committed through Organized stalking on an individual are covertly done, hence little in evidence is left behind of the crime, and the target is left with little in the way of recourses to defend himself or herself. The systemic harassment is illegal and the bogus covert investigation provides means to keep the target under surveillance 24/7.

Isolation, through disrupting socio-familial ties in an intense slander campaign, is usually achieved once the actual stalking begins. A pervasive slandering campaign takes place, painting the target as an unstable individual, child molester, a person with hidden dark secrets, or a person prone to psychopathic behavior. All the perceptions of the targeted individual’s life are turned negative. The Organized stalking is done in such a way that all aspects of the targeted individual’s life remain negative permanently and is never given time for cure.

The criminals planning a Organized stalking endeavor study the target long before the stalking begins. Psychological profiling is done, and this is to assist in the overall campaign that includes intense psychological harassments and demoralizations. Tactics used go well beyond fear, demoralization and psychological harassment.

The tactics used have been the protocol in campaigns against common people implemented by the KGB in Soviet Russia, Nazis of Nazi Germany, and the KKK in the early to middle of last century in America.. The accumulation of all the tactics and events in this dangerously hurtful organized crime against an innocent human being can led to trauma and will emotionally bankrupt the targeted individual, and may lead to death, as suicide is often induced through the assaults.

The perpetrators of organized stalking are serious criminals who do great damage, and the acts done are very serious crimes by any measure. Organized stalking is a highly criminal campaign, one directed at a target individual, and one that aims to destroy an innocent persons life through covert harassments, malicious slander and carefully crafted and executed psychological assaults.

Organized stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a persons life. What drives such campaigns may be revenge for whistleblowing, or for highly critical individuals, as outspoken people have become targets. Other reasons why a person may become a target individual for stalking: ex-spouse revenge, criminal hate campaigns, politics, or racism.

Organized stalking may be part of a larger phenomena that may have loose threads that extend into a number of differing entities, such as intelligence agencies, military, and large corporations, though it is certain that organized crime is one of Organized stalking’s primary sources, or origins.

The goals of Organized stalking are many. To cause the target to appear unstable mentally is one, and this is achieved through a carefully detailed assault using advanced psychological harassment techniques, and a variety of other tactics that are the usual protocol for Organized stalking, such as street theater, mobbing, and pervasive petty disrespecting.

Targets experience the following:

1. A total invasion of privacy
2. Pervasive and horrific slander
3. Isolation through alienation that is caused by the slander
4. Destruction of, or alienation from all things that the target holds dear.

A discrediting campaign is initiated long before the target is actually stalked. They, the criminal perpetrators, twist and fabricate reality through such a campaign, displaying lies that paint the target as a child molester, a person with hidden dark secrets, a highly unstable individual who may be a threat to society, a prostitute, or a longtime drug user, etc. The slandering or discrediting campaign sets the stage for the target to become alienated in just about every social-familial- work environment, once the actual stalking begins.

This slandering campaign is instrumental in eliminating all resource and avenue of defense for the target, before the actual stalking begins. This stage is one that sees people close to the target, family, friends, neighbors, and co-workers recruited by the perpetrator criminals, who will pose as law enforcement officials, private investigators, or groups of concerned citizens.

The Organized stalking is aimed at achieving one or all of the follow:

1. Induced suicide
2. Financial devastation
3. Homelessness
4. Institutionalization in psyche wards.

Once actual stalking begins:

The target will endure a vast array of tactics: gaslighting, street theater, drugging, gassing, scent harassment, mobbing, subtle but frequent destruction of property, killing of pets.

Psychological profiling will be done so as to initiate an intense psychological harassment assault. Staged happenings and planned or directed conversations will take place around the target in public or places of work, and serves not only to undermine the targets psychology, but also may be used to cause the target to thinking that he or she is under investigation for horrific crimes.

Stalkers will have studied the target to such a level that they know and can predict the persons behavior. Again, often the target will think that they are being investigated for crimes that would be absurd for the target to have actually commited. Not knowing what actually is happening, the target is isolated and lives through a never ending living nightmare.

Once the target finds out that they are a target individual for Organized stalking, or multi stalking, they may have some relief, but from what I have read, the stalking simply changes dimensions a bit, and continues.
Identifying the exact people who initiated Organized stalking campaigns is difficult, or near impossible, and this makes it very difficult for people researching this phenomena to discover, in certainty, the roots and genealogy of the crime. Investigation of a Organized stalking crime would require a great deal of resources, and intensity similar to murder investigations.

What are the motivations for the targeted individual organized stalking system?

1. Organized stalking system is used by the government as a virtual jail for the targeted individual. The O.S. system isolates targeted individual from the community and creates barriers for the targeted individual within the community.

2. The targeted individual’s actions are severely limited to survival. He/she loses confidence in the community and cannot do anything dramatic or revolutionary to impact his/her environment or the community.

3. The targeted individual thinks about the problem of O.S., other pressing life issues are ignored or planned the least.

4. The O.S. system destroys the ego and identity of the targeted individual and stops him/her from pursuing successful life or influential life that cannot be controlled.

5. If the targeted individual complains about O.S. system, he/she will be misdiagnosed with mental illness as the O.S. techniques used mimic the symptoms of paranoid schizophrenia. The intelligence agencies have perfected this technique of using the mental health system to destroy targeted individuals after 50 years of research. Thus the intelligence agencies achieve perfect deniability in their crimes.

Zersetzung (Ministerium für Staatssicherheit)

Zersetzung (Ministerium für Staatssicherheit)

Die Zersetzung als vom Ministerium für Staatssicherheit (MfS) der DDR eingesetzte geheimpolizeiliche Arbeitstechnik diente zur Bekämpfung vermeintlicher und tatsächlicher politischer Gegner. Die im Rahmen einer 1976 erlassenen Richtlinie definierten Zersetzungsmaßnahmen wurden vom MfS vornehmlich in den 1970er und 1980er Jahren in Operativen Vorgängen gegen oppositionelle Gruppen und Einzelpersonen eingesetzt. Zumeist konspirativ angewandt, ersetzten sie den offenen Terror der Ära Ulbricht. Durch gezielte Beeinträchtigung oder Schädigung versuchte das MfS Gegnern die Möglichkeiten für feindliche Handlungen zu nehmen. Als repressive Verfolgungspraxis beinhaltete die Zersetzung dabei umfangreiche Steuerungs- und Manipulationsfunktionen bis in die persönlichsten Beziehungen der Opfer hinein. Das MfS griff hierbei auf das Netz an „Inoffiziellen Mitarbeitern“ (IM), staatliche Einflussnahmemöglichkeiten sowie „Operative Psychologie“ zurück. Durch die Offenlegung zahlreicher Stasi-Unterlagen in Folge der politischen Wende in der DDR ist der Einsatz von Zersetzungsmaßnahmen durch das MfS besonders gut dokumentiert.
Inhaltsverzeichnis

* 1 Begriffsherkunft und MfS-Definition
* 2 Politische und gesellschaftliche Rahmenbedingungen
* 3 Praktische Anwendung
* 4 Zielgruppen für Zersetzungsmaßnahmen
* 5 Gesellschaftliche und juristische Aufarbeitung
* 6 Literatur
* 7 Film
* 8 Weblinks
* 9 Siehe auch
* 10 Einzelnachweise

Begriffsherkunft und MfS-Definition

Neben der chemischen Bedeutung des Verbs zersetzen bezeichnet Zersetzung auch die Zerstörung einer Gemeinschaft, Ordnung oder politischen Partei.[1] Die Herkunft des Wortes im MfS-Gebrauch stammt aus der Militärsprache: „Zersetzung“ bezeichnet eine strategische Maßnahme aus der psychologischen Kriegsführung, um die Kampfmoral gegnerischer Soldaten zu schwächen. Während der Weimarer Republik wurde der Begriff für die gegenseitige Unterwanderung politischer Organisationen sowie der Reichswehr mit dem Ziel ihrer inneren Schwächung gebraucht.[2] Das MfS verwendete den Begriff erstmals umfassend in ihrer als „Geheime Verschlusssache“ eingestuften Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge (OV). Diese beschrieb auf insgesamt vier Seiten die „Anwendung von Maßnahmen der Zersetzung“.

Eine Definition der Zersetzung einschließlich deren Ziele und Methoden lieferte das MfS im Rahmen der zweiten Auflage ihres 1981 erarbeiteten und 1985 erschienenen Wörterbuchs zur politisch-operativen Arbeit. Die erste Auflage aus dem Jahr 1970 enthielt diesen Begriff noch nicht.[3]

„[Die operative Zersetzung ist eine] operative Methode des MfS zur wirksamen Bekämpfung subversiver Tätigkeit, insbesondere in der Vorgangsbearbeitung. Mit der Z. wird durch verschiedene politisch-operative Aktivitäten Einfluß auf feindlich-negative Personen, insbesondere auf ihre feindlich-negativen Einstellungen und Überzeugungen in der Weise genommen, daß diese erschüttert und allmählich verändert werden bzw. Widersprüche sowie Differenzen zwischen feindlich-negativen Kräften hervorgerufen, ausgenutzt oder verstärkt werden.

Ziel der Z. ist die Zersplitterung, Lähmung, Desorganisierung und Isolierung feindlich-negativer Kräfte, um dadurch feindlich-negative Handlungen einschließlich deren Auswirkungen vorbeugend zu verhindern, wesentlich einzuschränken oder gänzlich zu unterbinden bzw. eine differenzierte politisch-ideologische Rückgewinnung zu ermöglichen.

Z. sind sowohl unmittelbarer Bestandteil der Bearbeitung Operativer Vorgänge als auch vorbeugender Aktivitäten außerhalb der Vorgangsbearbeitung zur Verhinderung feindlicher Zusammenschlüsse. Hauptkräfte der Durchführung der Z. sind die IM. Die Z. setzt operativ bedeutsame Informationen und Beweise über geplante, vorbereitete und durchgeführte feindliche Aktivitäten sowie entsprechende Anknüpfungspunkte für die wirksame Einleitung von Z.-Maßnahmen voraus.
Die Z. hat auf der Grundlage einer gründlichen Analyse des operativen Sachverhaltes sowie der exakten Festlegung der konkreten Zielstellung zu erfolgen. Die Durchführung der Z. ist einheitlich und straff zu leiten, ihre Ergebnisse sind zu dokumentieren.
Die politische Brisanz der Z. stellt hohe Anforderungen hinsichtlich der Wahrung der Konspiration.“

– Ministerium für Staatssicherheit: Wörterbuch zur politisch-operativen Arbeit, Stichwort: „Zersetzung“[4]

Politische und gesellschaftliche Rahmenbedingungen

Während der ersten zehn Jahre der DDR wurde politische Opposition überwiegend als Kriegs- und Boykotthetze mit Methoden des Strafrechtes bekämpft.[5] Mit der Abschottung der DDR in Folge des Mauerbaus wurde ab 1963 auch der justizielle Terror aufgegeben.[6] Vor allem seit Beginn der Ära Honecker 1971 verstärkte das MfS seine Bemühungen, oppositionelles Verhalten ohne Anwendung des Strafrechtes zu sanktionieren.[7] Wichtige Anlässe hierfür waren das Streben der DDR nach internationaler Anerkennung und die deutsch-deutsche Annäherung ab Ende der 1960er Jahre. So hatte sich die DDR sowohl im Grundlagenvertrag mit der BRD[8] als auch mit dem Beitritt zur UN-Charta[9] und der Unterzeichnung der KSZE-Schlussakte[10] zur Achtung der Menschenrechte verpflichtet beziehungsweise diese Absicht bekundet. Da letztere auch im Neuen Deutschland publiziert wurde, stand deren Umsetzung – insbesondere in Bezug auf die beschlossene Verbesserung der Ausreiseregelung – auch innenpolitisch zur Diskussion. Zudem versuchte das SED-Regime, die Zahl politischer Häftlinge zu reduzieren und hierzu die versprochenen Konzessionen durch Repressionspraktiken unterhalb der Schwelle von Verhaftung und Verurteilung zu kompensieren.[11][12]

Praktische Anwendung

Das MfS setzte die Zersetzung vor allem als psychologisches Unterdrückungs- und Verfolgungsinstrument ein.[13] Es nutzte die an der Juristischen Hochschule der Staatssicherheit (JHS) gewonnenen Erkenntnisse der „Operativen Psychologie“ gezielt,[14] um das Selbstvertrauen und Selbstwertgefühl der Opfer zu untergraben. Diese sollten verwirrt oder verängstigt, permanenten Enttäuschungen ausgesetzt und durch Störung der Beziehungen zu anderen Menschen sozial entwurzelt werden. Auf diese Weise sollten Lebenskrisen hervorgerufen werden, die politische Gegner verunsichern und psychisch belasten sollten, sodass dem Opfer die Zeit und Energie für staatsfeindliche Aktivitäten genommen wurde.[15] Das MfS als Drahtzieher der Maßnahmen sollte hierbei nicht erkennbar sein.[16][2] Der selbst betroffene Schriftsteller Jürgen Fuchs sprach deshalb auch von „psychosozialen Verbrechen“ und einem „Angriff auf die Seele des Menschen“.[15]

Wenngleich sich bereits für die späten 1950er Jahre Methoden der Zersetzung nachweisen lassen, wurde die Zersetzung als Methode erst Mitte der 1970er Jahre „wissenschaftlich“ definiert und vornehmlich in den 1970er und 1980er Jahren angewendet.[17] Die Zahl der betroffenen Personen kann nur schwer ermittelt werden, da die Quellenlage wegen bewusster Verschleierung oft lückenhaft ist, die angewendeten Methoden jedoch vielfältig und die beteiligten Abteilungen zahlreich waren. Insgesamt dürften eine vier- bis fünfstellige Zahl an Personen in Gruppen, sowie eine dreistellige Zahl an Einzelpersonen mit Zersetzungsmaßnahmen belegt worden sein.[18] Andere Quellen gehen von etwa 5000 betroffenen Personen aus.[19] An der Juristischen Hochschule wurde eine zweistellige Zahl an Dissertationen zu Themen der Zersetzung vorgelegt.[20] Zudem existiert ein etwa 50 Seiten umfassendes „Lehrmaterial“ zur Zersetzung mit zahlreichen praktischen Beispielen.[21]

Angewandt wurden die Maßnahmen von nahezu allen Abteilungen des MfS, vor allem jedoch von der Hauptabteilung XX des MfS in Berlin sowie den Abteilungen XX der Bezirksverwaltungen und Kreisdienststellen des MfS. Mit der Überwachung von Religionsgemeinschaften, Kultur- und Medienbetrieben, Blockparteien und gesellschaftlichen Organisationen, des Bildungs- und Gesundheitssystems sowie des Sports deckte die Linie XX praktisch das gesamte öffentliche Leben in der DDR ab.[22] Das MfS nutzte hierbei die Möglichkeiten, die sich aus der geschlossenen Gesellschaftsform der DDR ergaben. Durch politisch-operatives Zusammenwirken besaß das MfS umfangreiche Eingriffsmöglichkeiten wie beispielsweise berufliche oder schulische Strafen, Ausschluss aus Massenorganisationen und Sportvereinen, zeitweise Verhaftungen durch die Volkspolizei[2] sowie die Nichtgewährung von Reisegenehmigungen ins sozialistische Ausland bzw. das Zurückweisen an den visafreien Grenzübergängen zur Tschechoslowakei und Volksrepublik Polen. Zu den „Partnern des operativen Zusammenwirkens“ zählten ferner die Räte der Kreise, Universitäts- und Betriebsleitungen, Wohnungsverwaltungen, Sparkassenfilialen oder unter Umständen behandelnde Ärzte.[23] Wichtige Grundlagen für die Ausarbeitung von Zersetzungsmaßnahmen lieferten die Linie VIII (Observation) sowie die Abteilungen 26 (Telefon- und Raumüberwachung) und M (Postkontrolle) des MfS, notwendige Technik beschaffte die Abteilung 32.[24]

Das MfS wendete die Zersetzung vor, während, nach oder an Stelle einer Inhaftierung der „Zielperson“ an. Die operativen Vorgänge verfolgten hierbei in der Regel nicht das Ziel, Beweise für eine strafbare Handlung des Opfers zu erbringen, um ein Ermittlungsverfahren zu eröffnen. Vielmehr betrachtete das MfS Zersetzungsmaßnahmen als eigenständiges Instrument, welches zum Einsatz kam, wenn strafrechtliche Maßnahmen aus politischen oder „politisch-operativen“ Gründen (beispielsweise um das internationale Ansehen der DDR nicht zu gefährden) nicht erwünscht waren.[25][26] In einigen Fällen versuchte das MfS jedoch einzelne Personen bewusst zu kriminalisieren, indem es beispielsweise Wolf Biermann Minderjährige zuführte, mit dem Ziel ihn später strafrechtlich belangen zu können.[27] Als Delikte für eine derartige Kriminalisierung wurden unpolitische Vergehen wie Drogenbesitz, Zoll- und Devisenvergehen, Diebstahl, Steuerhinterziehung oder Vergewaltigungen angestrebt.[28]

Als bewährte Formen der Zersetzung nennt die Richtlinie 1/76 unter anderem:

„systematische Diskreditierung des öffentlichen Rufes, des Ansehens und des Prestiges auf der Grundlage miteinander verbundener wahrer, überprüfbarer und diskreditierender, sowie unwahrer, glaubhafter, nicht widerlegbarer und damit ebenfalls diskreditierender Angaben; systematische Organisierung beruflicher und gesellschaftlicher Misserfolge zur Untergrabung des Selbstvertrauens einzelner Personen; […] Erzeugung von Zweifeln an der persönlichen Perspektive; Erzeugen von Misstrauen und gegenseitigen Verdächtigungen innerhalb von Gruppen […]; örtliches und zeitliches Unterbinden beziehungsweise Einschränken der gegenseitigen Beziehungen der Mitglieder einer Gruppe […] zum Beispiel durch […] Zuweisung von örtlich entfernt liegender Arbeitsplätze“

– Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge vom Januar 1976[29]

Mit dem durch Bespitzelung erlangten Wissen erstellte das MfS Sozio- und Psychogramme und wendete diese für persönlichkeitsorientierte Formen der Zersetzung an. Dabei wurden gezielt persönliche Eigenschaften und Neigungen sowie charakterliche Schwächen der „bearbeiteten Feindperson“ – beispielsweise berufliches Versagen, Vernachlässigung elterlicher Pflichten, Homosexualität, pornographische Interessen, Ehebruch, Alkoholismus, Abhängigkeit von Medikamenten, Neigung zu kriminellen Handlungen, Sammler- und Spielleidenschaften sowie Kontakte zu rechtsextremen Kreisen – aufgegriffen, oder diese wurden zur Bloßstellung des Opfers als Gerücht in dessen Umfeld gestreut.[30][31] Aus Sicht des MfS waren die Maßnahmen umso erfolgreicher, je persönlichkeitsbezogener sie angewendet wurden, jeglichen „Schematismus“ galt es zu vermeiden.[30]

Im Namen der Opfer schaltete das MfS Kontakt- oder Kleinanzeigen, löste Warenbestellungen aus oder setzte Notrufe ab, um diese zu terrorisieren.[32][33] Zur Drohung bzw. Einschüchterung sowie zur Erzeugung von Psychosen verschaffte sich das MfS Zugang zu den Wohnungen der Opfer und hinterließ dort offensichtliche Spuren der Anwesenheit, indem Gegenstände hinterlassen, entfernt oder verändert wurden.[28]

Freundschafts-, Liebes-, Ehe- und Familienbeziehungen manipulierte das MfS durch anonyme Briefe, Telegramme und Telefonanrufe sowie (oftmals gefälschte) kompromittierende Fotos[34]. Auf diese Weise sollten Eltern und Kinder systematisch entfremdet werden.[35] Zur Provokation von Beziehungskonflikten sowie außerehelicher Beziehungen unternahm das MfS mittels sogenannter Romeo-Agenten gezielte Umwerbungsversuche.[27]

Für die Zersetzung von Gruppen wurden gezielt (auch minderjährige[36]) IM innerhalb der Gruppe angeworben und eingesetzt. Oppositionelle Gruppen wurden in ihrer Arbeit behindert, indem durch IM permanent Korrekturen und Gegenvorschläge in deren programmatische Diskussionen eingebracht wurden.[37] Um Misstrauen innerhalb der Gruppe zu erzeugen, erweckte das MfS gelegentlich nur den Eindruck, einzelne Gruppenmitglieder seien als IM tätig. Neben der Verbreitung von Gerüchten oder manipulierten Fotos[38] fingierte das MfS hierbei Indiskretionen über angebliche IM-Treffen oder lud einzelne Gruppenmitglieder zu staatlichen Stellen vor, um den Eindruck einer IM-Tätigkeit zu erwecken.[2] Auch durch die gezielte Gewährung von Privilegien – zum Beispiel bei Urlaubs- und Reisegenehmigungen oder der Zuteilung von Wohnungen oder PKW – sollte der Eindruck einer MfS-Tätigkeit einzelner Gruppenmitglieder erzeugt werden.[27] Zweifel entstanden zudem durch die Inhaftierung nur einiger Mitglieder einer Gruppe.[37]

Ferner gehörten zu den Zersetzungsmethoden offene, verdeckte oder vorgetäuschte Bespitzelung, Brief- oder Telefonkontrolle, das Beschädigen privaten Eigentums, Manipulationen an Fahrzeugen bis hin zur Vergiftung von Lebensmitteln, falscher medizinischer Behandlung und strategisch gezieltem Treiben in den Suizid.[39]

Nicht abschließend geklärt werden konnte, ob das MfS Röntgenstrahlung einsetzte, um bei politischen Gegnern gesundheitliche Langzeitschäden hervorzurufen.[40] So starben mit Rudolf Bahro, Gerulf Pannach und Jürgen Fuchs im Abstand von zwei Jahren drei zum gleichen Zeitpunkt inhaftierte, prominente DDR-Dissidenten an Krebserkrankungen.[41] Eine Studie der BStU schloss jedoch auf Grundlage der vorhandenen Akten eine derart vorsätzliche Anwendung von Röntgenstrahlung aus und dokumentierte stattdessen nur einzelne Fälle fahrlässiger gesundheitsgefährdender Verwendung von radioaktiver Strahlenquellen, beispielsweise zur Markierung von Dokumenten.[42]

Das MfS setzte Zersetzungsmaßnahmen auch in Zusammenarbeit mit Bruder-Geheimdiensten anderer Ostblock-Staaten um. So leitete beispielsweise der polnische Geheimdienst gemeinsam mit dem MfS ab Anfang der 1960er Jahre gezielte Maßnahmen gegen die Zeugen Jehovas ein, welche als „innere Zersetzung“[43] bezeichnet wurden.[44]
Zielgruppen für Zersetzungsmaßnahmen

Maßnahmen der Zersetzung wurden seitens des MfS gegen Einzelpersonen und Personengruppen angewandt. Es existierte jedoch keine homogene Zielgruppe für Zersetzungsmaßnahmen, da oppositionelles Verhalten in der DDR vielfältig in Erscheinung trat und das MfS daher differenzierte Maßnahmen zu dessen Bekämpfung ergriff.[45] Dennoch nannte das MfS als Hauptzielgruppen:[2]

* Zusammenschlüsse von Ausreiseantragsstellern
* feindliche Gruppen unter kritischen Künstlern
* kirchliche Oppositionsgruppen
* Gruppierungen von Jugendlichen
* sowie deren Unterstützer (Menschenrechts- und Fluchthilfeorganisationen, ausgereiste und ausgebürgerte Oppositionelle).

Zudem setzte die Stasi vereinzelt Methoden der Zersetzung auch gegen missliebige unpolitische Organisationen wie die Wachtturm-Gesellschaft ein.[46]

Zu den prominentesten Opfern von Zersetzungsmaßnahmen zählten Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, die Eheleute Gerd und Ulrike Poppe, sowie Wolfgang Templin.
Gesellschaftliche und juristische Aufarbeitung

Sofern ihnen dies bewusst wurde, versuchten DDR-Oppositionelle wie Wolfgang Templin zum Teil erfolgreich die Zersetzungstätigkeiten des MfS über westliche Journalisten öffentlich zu machen.[33] Der Spiegel veröffentlichte 1977 die fünfteilige Serie Du sollst zerbrechen! des exilierten Jürgen Fuchs, in der er die „operative Psychologie“ der Stasi beschrieb.[47] Das MfS versuchte derartigen Veröffentlichungen entgegen zu wirken, indem es Fuchs in Redaktionen als Stasi-Paranoiker diskreditierte,[48] sodass der Spiegel und andere Medien davon ausgingen, Fuchs leide an Verfolgungswahn.[49][33] Dies konnte erst durch die Einsicht der Stasi-Akten nach der politischen Wende in der DDR widerlegt werden.

Im Wesentlichen gelten Methoden der Zersetzung auf Grund des Rückwirkungsverbots auch nach 1990 als nicht strafwürdig, eine Beteiligung an der Planung oder Durchführung von Zersetzungsmaßnahmen zog daher in der Regel keine juristischen Folgen nach sich.[50] Da ein eigener Straftatbestand der Zersetzung nicht existiert,[51] müssen Zersetzungsmaßnahmen einzeln zur Anzeige gebracht werden. Handlungen, die auch nach DDR-Recht Straftatbestände waren (etwa die Verletzung des Briefgeheimnisses), hätten bereits kurz nach der Tat bei DDR-Behörden angezeigt werden müssen, um einer Verjährung zu entgehen.[52] Erschwerend kam für viele Betroffene hinzu, dass das MfS als Urheber persönlicher Schäden und Misserfolge nicht erkennbar war. Oftmals besitzen zudem Stasi-Unterlagen vor Gericht keine Beweiskraft.

Opfer von Zersetzungsmaßnahmen erhalten – sofern sie nicht mindestens 180 Tage inhaftiert waren – keine Opferpension gemäß §17a des Strafrechtlichen Rehabilitierungsgesetzes (StrRehaG). Bei nachweislicher systematischer, beruflicher und/oder gesundheitlicher Schädigung durch das MfS kann gemäß Unrechtsbereinigungsgesetz (2. SED-UnBerG) eine verwaltungsrechtliche und sowie eine berufliche Rehabilitierung beantragt werden. Diese heben bestimmte Verwaltungsmaßnahmen von DDR-Organen auf und stellen deren Rechtsstaatswidrigkeit fest. Dies ist Voraussetzung für soziale Ausgleichszahlungen nach dem Bundesversorgungsgesetz. Bei einer anerkannten Verfolgungszeit von mindestens drei Jahren und nachgewiesener Bedürftigkeit können zudem Ausgleichszahlungen für Verdienstausfälle und Rentenschäden beantragt werden.[53] Als besondere Hürden erweisen sich in den genannten Fällen jedoch der Nachweis des Eingriffs des MfS in Gesundheit, Vermögen, Ausbildung und Beruf des Betroffenen, sowie die Anerkennung von (zum Teil psychischen) Gesundheitsschäden als direkte Folge von Zersetzungsmaßnahmen.[54]

Implant Issues More than Skin Deep

Implant Issues More than Skin Deep

August 1, 2006 By: Tracy Cozzens GPS World

Applied Digital Solutions created a buzz when it tested a prototype of a GPS implant in the spring of 2003. The disc-shaped personal location device measured more than 6 centimeters in diameter and more than a centimeter deep — about the size of a heart pacemaker.

While Applied Digital Solutions suggested the market for the device would be potential hostage targets and outdoorsmen who want to be found, the GPS implant idea stirred controversy among privacy advocates and skepticism among scientists.

Today, Applied Digital Solutions is concentrating on marketing a much less power-hungry radio frequency identification (RFID) implant.

“VeriChip Corporation conducted R&D on the feasibility of a human-implantable GPS-capable chip but shelved the project after determining that current power source technologies have not yet scaled down to a size compatible with an implantable device,” said company spokesman John Procter. Instead, VeriChip is focused on developing its FDA-approved human-implantable RFID chip, particularly in the health-care market, where it’s used to link patients to their electronic medical records.


A GPS implant might be the size of this VeriChip implant, which uses RFID technology to carry scannable information.

That doesn’t mean the idea of a GPS implant has died. “The justice system is interested in an implantable device,” said Steve Aninye, president of Omnilink Systems of Alpharetta, Georgia. “We’re working with research and manufacturing entities to work through the challenges.”

Omnilink Systems manufactures bracelets and anklets tracking devices used by the justice system to track parolees. The company’s current system uses GPS, cell phones, RFID, and situation-specific sensors to monitor people and objects, and inform clients immediately if their status changes. Besides the justice market, the devices are being used in public safety (such as alerting children and parents to the proximity of sex offenders through a cell phone), healthcare, and emergency response.

While Omnilink hasn’t yet developed a GPS implant, the company is researching the main roadblocks to such a device: power, removal, and impaired environment.
An Omnilink tracking bracelet, now used by numerous justice agencies, could be the forerunner of a GPS implant.
An Omnilink tracking bracelet, now used by numerous justice agencies, could be the forerunner of a GPS implant.

Power. Getting enough power to the implant is probably the largest obstacle. In the traditional areas for tracking, such as fleet optimization, size and power aren’t a problem because the devices are installed in cars or on equipment. But an implant would naturally have to be small.

“Some schools of thought believe you can use biometric readings in humans to generate power,” Aninye said, but such a technology isn’t yet commercially viable.

As for people-tracking bracelets, because they’re external they can be easily recharged. In the justice market, batteries last only three or four days because of intense around-the-clock monitoring. In other markets, the batteries can last 14 days or more. “Our devices are designed to go 21 days between charges,” Aninye said. “Omnilink hopes to achieve a 21-to 30-day life cycle.”

Removal. For a GPS implant to be useful to law enforcement, the recipient should be unable to remove it by picking it from under the skin. “Removal is a critical challenge,” Aninye said. “A person can’t be able to visit a tattoo shop and have it removed.”

Removal isn’t an issue with the wrist and ankle bracelets now in use. Omnilink’s ankle and wristbands detect tampering or any removal attempt. Even if the wearer is crafty enough to slip off the device without tampering with its body or strap, the device detects a change in body temperature and sends an alert to the monitoring system.

GPS-Impaired Environments. A final challenge is ensuring that the GPS implant works reliably in GPS-impaired environments, such as underground subway tunnels that lack direct line-of-sight to GPS satellite signals.

For its external tracking devices, Omnilink works with cell-phone network providers such as Qualcomm to penetrate impaired environments with assisted GPS and advanced forward link trilateration (AFLT), which measures signals from nearby cellular towers.

Privacy Concerns. Assuming the issues of sufficient power, preventing removal, and an unimpaired signal are addressed, another major issue looms for GPS implants: privacy.

“The fact you can covertly figure out where people have been and are going is a huge concern,” Aninye said. “As these issues are being sorted out, Omnilink has decided to focus on markets where people voluntarily opt in, or where community laws require tracking of convicted criminals. “Outside the public safety arena, a person would have to choose to be protected for us to monitor you.”

Omnilink does have such customers. They are required to sign a one-page agreement consenting to monitoring. While the technology could ostensibly be used to monitor people covertly, Omnilink has no plans to use it in such a way, Aninye said. Even people who want to be monitored, such as employees at a secure workplace, are no longer monitored once they leave the office.

Omnilink is participating on a new Location Based Services Action Team sponsored by the CTIA Wireless Internet Caucus. The committee is tussling with privacy issues as it explores the legal and social ramifications of tracking people. Its members plan to recommend best practices, guidelines for terminology, and standards of use.

In the meantime, an implantable GPS device exists only in the realm of speculation.

Binding U.S. law requires prosecutions for those who authorize torture (E-Weapons)

CONVENTION AGAINST TORTURE and Other Cruel, Inhuman or Degrading Treatment or Punishment (signed by the U.S. under Ronald Reagan):

Article 2

1. Each State Party shall take effective legislative, administrative, judicial or other measures to prevent acts of torture in any territory under its jurisdiction.

2. No exceptional circumstances whatsoever, whether a state of war or a threat or war, internal political instability or any other public emergency, may be invoked as a justification of torture.

3. An order from a superior officer or a public authority may not be invoked as a justification of torture. . . .

Article 4

1. Each State Party shall ensure that all acts of torture are offences under its criminal law. The same shall apply to an attempt to commit torture and to an act by any person which constitutes complicity or participation in torture.

Article 7

1. The State Party in territory under whose jurisdiction a person alleged to have committed any offence referred to in article 4 is found, shall in the cases contemplated in article 5, if it does not extradite him, submit the case to its competent authorities for the purpose of prosecution.

Article 15

Each State Party shall ensure that any statement which is established to have been made as a result of torture shall not be invoked as evidence in any proceedings, except against a person accused of torture as evidence that the statement was made.

Ronald Reagan, 5/20/1988, transmitting Treaty to the U.S. Senate:

The United States participated actively and effectively in the negotiation of the Convention. It marks a significant step in the development during this century of international measures against torture and other inhuman treatment or punishment. Ratification of the Convention by the United States will clearly express United States opposition to torture, an abhorrent practice unfortunately still prevalent in the world today.

U.S. Constitution, Article VI:

This Constitution, and the laws of the United States which shall be made in pursuance thereof; and all treaties made, or which shall be made, under the authority of the United States, shall be the supreme law of the land; and the judges in every state shall be bound thereby, anything in the Constitution or laws of any State to the contrary notwithstanding.

Soon-to-be Attorney General Eric Holder, 1/15/2009 (repeatedly):

“No one is above the law.”

Follow

Get every new post delivered to your Inbox.

Join 96 other followers