ZERSETZUNG

DECOMPOSITION

The Ministry for State Security, commonly known as the Stasi, was the official state security service of the German Democratic Republic (GDR, or Communist East Germany) from 1950 to 1990. The Stasi has been described as one of the most brutal, oppressive, and repressive intelligence and secret police agencies to have ever existed.

After decades of using overt brutality and torture against its citizens, the Stasi came to realize that its image in the international arena had become increasingly tarnished. To give itself a superficial “makeover” for the world’s stage, the Stasi created a “scientific” process used to “neutralize” (AKA invisibly murder) political opponents and / or dissidents called Zersetzung – a German term borrowed from chemistry, which means “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim.

Its aim lay explicitly in “breaking” the person through constant, mounting psychological and physiological stress, as well as through financial, professional and psychological sabotage. The security service’s goal was to use Zersetzung to “switch off” regime opponents. After months and even years of Zersetzung, a victim’s domestic problems grew so large, so debilitating, and so psychologically burdensome that they would lose the will to struggle against the East German state — along with the will to continue trying to survive. Best of all, the Stasi’s role in the victim’s personal misfortunes remained tantalizingly hidden. The Stasi operations were carried out in complete operational secrecy.

“The Stasi often used a method which was really diabolic. It was called Zersetzung. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn’t try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions.

-Hubertus Knabe: The Dark Secrets of a Surveillance State, TED Salon, Berlin

The Stasi came to conclude that psychological harassment was far less likely to be recognized for what it was — and while being just as effective as, if not better than, physical harassment. In addition, victims were less likely to be provoked into active resistance, as they would not be aware of the source of their problems, or even its exact nature.

And thus, Zersetzung “no touch” torture was born, replacing the Stasi’s former, overt, violence and repression with covert, psychological warfare tactics, surveillance abuse, smear campaigns, manufactured disappointments and disasters in the lives of its targets, and the deliberate misuse of operational psychology.

“Out with the secret arrests, beatings and physical torture! Enter the ‘Cancel Culture.”

The Stasi would literally “cancel” a citizen of the GDR. The Stasi surreptitiously created conflict in employment, attacked reputations, created conflict in friendships and personal relationships, and created rifts in marriages. Isolating and destroying the target was the goal of Zersetzung. Eventually, many targets committed suicide.

As applied by the Stasi, Zersetzung is a technique to subvert and undermine an opponent. The aim was to disrupt the target’s professional and private lives, so they were unable to continue their “hostile-negative” activities towards the state. Likewise, they became unable to carry out activities of daily living, and ultimately, their lives were left in ruins — they had become “decomposed.”

The Stasi used Zersetzung as a means of psychological oppression, persecution, and “no touch” torture. Findings of operational psychology were formulated into method at the Stasi’s College of Law (Juristische Hochschule der Staatssicherheit, or JHS), and applied to political opponents in an effort to undermine their self-confidence, self-esteem, and overall mental health.

Although its techniques had been established effectively by the late 1950s, Zersetzung was not rigorously defined until the mid-1970s, and only then began to be carried out in a systematic manner through the 1980s.

Typically, the Stasi would use collaborators (informants) to garner details from a victim’s private life. They would then devise a strategy to “disintegrate” the target’s personal circumstances — their career, their relationship with their spouse, their reputation in the community. They would even seek to alienate them from their children. The Stasi established “sociograms” and “psychograms” which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual—for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right—or even the veil of shame from the rumors poured out upon one’s circle of acquaintances. From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all “schematism” had to be avoided.

“Zersetzung, as a concept, involves the annihilation of the inner self, the dissolution or disintegration of the targeted person. It was designed to secretly destroy a target’s personal and professional lives, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors.

One great advantage of the harassment perpetrated under Zersetzung was that its subtle nature meant that it was able to be plausibly denied. This was important given that the GDR was trying to improve its international standing during the 1970s and 80s. The Stasi intentionally concealed their role as mastermind of the operations. Usually, victims had no idea that the Stasi were responsible. Many thought that they were losing their minds, and mental breakdowns and suicide could result.

“The service acted like an unseen and malevolent god, manipulating the destinies of its victims.

Tactics employed under Zersetzung included psychological attacks, such as gaslighting — breaking into homes and subtly manipulating the contents, moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another. Other practices included surveillance of the target; various psychological operations (psy-ops); damage and vandalism of cars, bicycles, and other property; purposely incorrect medical diagnoses and / or treatments; smear campaigns; sending falsified or compromising photos or documents to the victim’s family or employer; job loss and blacklisting; slander and defamation; denunciation; provocation; psychological warfare; psychological subversion; manufactured disasters and disappointments in targets’ lives; and wiretapping and bugging.

“Zersetzung had profound psychological consequences on its victims, such as anxiety and paranoia. The tactic is meant to mimic the effects of mental disease so that victims reporting such attacks would be considered as paranoid by others, especially in their social support relationships.

Operations were designed to intimidate and destabilize victims by subjecting them to repeated disappointment, and to socially alienate them by interfering with and disrupting their relationships with others as in social undermining. The aim was to induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism — and for functioning in their daily lives.

Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi’s actions as:

“Psychosocial crime, and an assault on the human soul.

The use of Zersetzung is well documented thanks to numerous Stasi files published after East Germany’s Wende. Up to 10,000 individuals are estimated to have become victims, 5,000 of whom sustained irreversible damage. Pensions for restitution have been created for the victims.

Former Stasi Chief, Markus Wolf, described Zersetzung as:

“More damaging than any physical program would have been.

His Stasi carried out this widespread repression of and psychological torture against its own people through a network of tens of thousands of informers and “gang-stalkers” using the Zersetzung program.

Shockingly, the U.S. CIA later offered Markus Wolf a new identity and a home in California in return for his help in rooting out Soviet moles. Wolf declined this CIA-sponsored indemnification offer and ultimately turned himself in to West German authorities in 1991. He was tried and found guilty of treason, but the sentence was overturned. He was later convicted on kidnapping-related charges in a second trial and received a two-year suspended sentence.

Even more shocking is that Marcus Wolf was later hired by the fledgling U.S. Department of Homeland Security (“DHS”) in 2003 to re-create and add the final finishing touches to the new governmental agency created in the wake of September 11, 2001. Former President, George W. Bush, selected Markus Wolf, former Stasi Official, along with Yevgenniy Primakov, ex-KGB official (which also used Zersetzung extensively), to serve as key collaborators in the operational design for DHS.

Unfortunately, the use of Zersetzung to destroy “pesky dissidents” was not limited to communist East Germany, nor to other Communist, Authoritarian or Totalitarian regimes. Its use hits a lot closer to home than most realize.

The United States Federal Bureau of Investigation (FBI) came to appreciate and utilize Zersetzung against perceived “subversives” in COINTELRPO (syllabic abbreviation derived from Counterintelligence Program; 1956–1971, and beyond).

COINTELPRO involved a series of covert and illegal projects actively conducted by the FBI aimed at surveilling, infiltrating, discrediting, and disrupting domestic American political organizations and associated individuals. FBI records show COINTELPRO resources targeted groups and individuals the FBI deemed subversive, including feminist organizations, the Communist Party USA, anti–Vietnam War organizers, activists of the civil rights movement and Black power movement movements (e.g. Martin Luther King Jr., the Nation of Islam, and the Black Panther Party), environmentalist and animal rights organizations, the American Indian Movement (AIM), Chicano and Mexican-American groups like the Brown Berets and the United Farm Workers, independence movements (including Puerto Rican independence groups such as the Young Lords and the Puerto Rican Socialist Party), a variety of organizations that were part of the broader New Left, and white supremacist groups such as the Ku Klux Klan and the far-right group National States’ Rights Party.

The FBI has used covert operations against domestic political groups since its inception; however, covert operations under the official COINTELPRO label took place between 1956 and 1971. Many of the tactics used in COINTELPRO are alleged to have seen continued use including: discrediting targets through psychological warfare; smearing individuals and groups using forged documents and by planting false reports in the media; harassment; wrongful imprisonment; illegal violence; and assassination. According to a Senate report, the FBI’s motivation was “protecting national security, preventing violence, and maintaining the existing social and political order”.

Beginning in 1969, leaders of the Black Panther Party were targeted by the COINTELPRO and “neutralized” by being blacklisted, assassinated, imprisoned, publicly humiliated or falsely charged with crimes. Some of the Black Panthers targeted include Fred Hampton, Mark Clark, Zayd Shakur, Geronimo Pratt, Mumia Abu-Jamal, and Marshall Conway. Common tactics used by COINTELPRO were perjury, witness harassment, witness intimidation, and withholding of exculpatory evidence.

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan. Attorney General Robert F. Kennedy personally authorized some of the programs, giving written approval for limited wiretapping of Martin Luther King’s phones “on a trial basis, for a month or so.” Hoover extended the clearance, so his men were “unshackled” to look for evidence in any areas of King’s life they deemed worthy.

Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party USA (CPUSA). Tactics included anonymous phone calls, Internal Revenue Service (IRS) audits, and the creation of documents that would divide the American communist organization internally. An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists. In 1956, Hoover sent an open letter denouncing Dr. T. R. M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other African Americans in the South. When the Southern Christian Leadership Conference (SCLC), an African American civil rights organization, was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and eventually Martin Luther King Jr.

According to attorney Brian Glick in his book War at Home, the FBI used five main methods during COINTELPRO:

Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit, disrupt and negatively redirect action. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.

Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials, and others to cause trouble for activists. They used bad jacketing to create suspicion about targeted activists, sometimes with lethal consequences.

Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.

Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations. The objective was to frighten or eliminate dissidents and disrupt their movements.

Undermine public opinion: One of the primary ways the FBI targeted organizations was by challenging their reputations in the community and denying them a platform to gain legitimacy. Hoover specifically designed programs to block leaders from “spreading their philosophy publicly or through the communications media”. Furthermore, the organization created and controlled negative media meant to undermine black power organizations. For instance, they oversaw the creation of “documentaries” skillfully edited to paint the Black Panther Party as aggressive, and false newspapers that spread misinformation about party members. The ability of the FBI to create distrust within and between revolutionary organizations tainted their public image and weakened chances at unity and public support.

The program was secret until March 8, 1971, when the Citizens’ Commission to Investigate the FBI burgled an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies.

Many news organizations initially refused to immediately publish the information, with the notable exception of The Washington Post. After affirming the reliability of the documents, it published them on the front page (in defiance of the Attorney General’s request), prompting other organizations to follow suit. Within the year, Director J. Edgar Hoover declared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled case by case.

Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” after its chairman, Senator Frank Church (D-Idaho), launched a major investigation of the FBI and COINTELPRO. Many released documents have been partly or entirely redacted.

The U.S. Senate’s Church Committee investigations in the mid-1970s found that, during the COINTELPRO era, FBI agents and their various accomplices systematically spied on, slandered, terrorized, blackmailed, and committed acts of violence (including murder) against American citizens who were deemed to be politically subversive by the FBI’s right-wing director, J. Edgar Hoover.

COINTELPRO’s official goal was:

“To expose, disrupt, misdirect, discredit, or otherwise neutralize individuals and groups deemed to be subversive.

In doing so, the FBI hoped to:

  • Create a negative public image for target groups (for example through surveilling activists and then releasing negative personal information to the public).
  • Break down internal organization by creating conflicts (for example, by having agents exacerbate racial tensions, or send anonymous letters to try to create conflicts).
  • Create dissension between groups (for example, by spreading rumors that other groups were stealing money).
  • Restrict access to public resources (for example, by pressuring non-profit organizations to cut off funding or material support).
  • Restrict the ability to organize protest (for example, through agents promoting violence against police during planning and at protests).
  • Restrict the ability of individuals to participate in group activities (for example, by character assassinations, false arrests, surveillance).

Defending Rights & Dissent, a civil liberties group, cataloged known instances of First Amendment abuses and political surveillance by the FBI since 2010. The organization found that the FBI devoted disproportionate resources to spy on peaceful left-leaning civil society groups, including Occupy Wall Street, economic justice advocates, racial justice movements, environmentalists, Abolish ICE, and various anti-war movements.

In December 2012, the FBI released redacted documents in response to a Freedom of Information Act request from the Partnership for Civil Justice Fund (PCJF). Mara Verheyden-Hilliard, the executive director of PCJF, said the documents showed that FBI counterterrorism agents had monitored the Occupy movement from its inception in August 2011 and that the FBI acted improperly by collecting “information on people’s free-speech actions” and entering it into “unregulated databases, a vast storehouse of information widely disseminated to a range of law-enforcement and, apparently, private entities”. The FBI also communicated with the New York Stock Exchange, banks, private businesses and state and local police forces about the movement. In 2014, the PCJF obtained an additional 4,000 pages of unclassified documents through a Freedom of Information Act request, showing “details of the scrutiny of the Occupy protests in 2011 and 2012 by law enforcement officers, federal officials, security contractors and others.

In April 2018, the Atlanta Black Star characterized the FBI as still engaging in COINTELPRO behavior by surveilling the Black Lives Matter movement. Internal documents dated as late as 2017 showed that the FBI had surveilled the movement. In 2014, the FBI tracked a Black Lives Matter activist using surveillance tactics which The Intercept found “reminiscent of a rich American history of targeting black Americans,” including COINTELPRO. This practice, along with the imprisonment of black activists for their views, has been associated with the new FBI designation of “Black Identity Extremists.”

Alongside COINTELPRO, the U.S. Central Intelligence Agency (CIA) quietly carried out Project MK-Ultra, also called the CIA mind control program. MK-Ultra was an illegal human experimentation program designed and intended to develop procedures and identify drugs that could be used in interrogations to weaken individuals and force confessions through brainwashing and psychological torture. It began in 1953, was reduced in scope in 1964 and 1967, and was halted in 1973. MK-Ultra used numerous methods to manipulate its subjects’ mental states and brain functions, such as the covert administration of high doses of psychoactive drugs (especially LSD) and other chemicals, electroshocks hypnosis, sensory deprivation, isolation, and verbal and sexual abuse, in addition to other forms of torture, including the use of electromagnetic and microwave radiation.

MK-Ultra was preceded by two drug-related experiments, Project Bluebird and Project Artichoke. It was organized through the CIA’s Office of Scientific Intelligence and coordinated with the United States Army Biological Warfare Laboratories. The program engaged in illegal activities, including the use of U.S. and Canadian citizens as unwitting test subjects. Over 7,000 American veterans took part in these experiments non-consensually during the 1950s through 1970s, many of them suing later on. MK-Ultra’s scope was broad, with activities carried out under the guise of research at more than 80 institutions aside from the military, including colleges and universities, hospitals, prisons, and pharmaceutical companies. The CIA operated using front organizations, although some top officials at these institutions were aware of the CIA’s involvement.

MK-Ultra was first brought to public attention in 1975 by the Senate Church Committee of the United States Congress and Gerald Ford’s United States President’s Commission on CIA activities within the United States (also known as the Rockefeller Commission). Investigative efforts were hampered by CIA Director Richard Helms’s order that all MK-Ultra files be destroyed in 1973; the Church Committee and Rockefeller Commission investigations relied on the sworn testimony of direct participants and on the small number of documents that survived Helms’s order. In 1977, a Freedom of Information Act request uncovered a cache of 20,000 documents relating to MK-Ultra, which led to Senate hearings. Some surviving information about MK-Ultra was declassified in July 2001.

Although the investigations succeeded in shining a light on the extreme abuses of power by U.S. intelligence and law enforcement agencies, the reforms that followed were nowhere close to being serious enough to rein in the rogue tendencies of those agencies. With the passage of the Patriot Act, America has transformed into a surveillance state far worse than communist East Germany, and now armed with covert and clandestine technologies, including “non-lethal” weapons (NLW’s) that are so advanced, invisible (i.e., extra-low frequency microwaves), and kept under such tight wraps, that the majority of the general public remains unaware of what our own post-911 secret police force is quietly engaging in.

“Although they are illegal in the U.S., the same covert tactics are quietly used by America’s local and federal law enforcement and intelligence agencies to suppress dissent, silence whistle-blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.

“One common reaction to Edward Snowden’s exposure of the National Security Agency’s pervasive surveillance of Americans and people around the world has been: Well, at least they aren’t doing what US government agents did in the 1960s and 1970s – targeting dissident political activists, spying on and disrupting their constitutionally-protected activities, and seeking to discredit them with programs like COINTELPRO. Except they are, as it turns out. The latest revelations and newly released documents, detailed by Glenn Greenwald in a shocking piece for his new outlet, The Intercept, show that’s exactly what they’re doing. Whereas J. Edgar Hoover’s FBI used old-fashioned methods – primitive bugging devices, poison pen letters, and physical infiltration of “suspect” groups – today’s Thought Police use the Internet to, as Greenwald puts it, “control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the Internet itself.” In a presentation by the British spy agency GCHQ to the NSA, and the Canadian, Australian, and New Zealand intelligence agencies, the top-secret JTRIG unit instructed their allies in the methodology of targeting and destroying political dissidents and countering their influence on the Internet. Their approach is oh-so- “scientific,” citing social science theories about human motivation, giving the whole document the aura of an academic study – albeit one written by someone with a sensibility that veers from the playful to the downright sinister.Read the rest of the article here.

Gang Stalking = Modern-day cyber and community-based, govern-sponsored Zersetzung + COINTELPRO + MK-Ultra + non-consensual human experimentation with “non-lethal” weapons (NLW’s) and mind-control technologies. Overall, Gang Stalking = “No Touch” Torture.

“Gang stalking is a self-harm term for a government no-touch torture and eugenics program.”

-Former FBI Special Agent and Head, Los Angeles FBI, Ted Gunderson

Gang stalking is most likely a disinformation term created by U.S. intelligence agencies. It refers to the intense, long-term, unconstitutional surveillance and harassment of a person who has been designated as a target by someone associated with America’s security industry. Such operations have nothing to do with criminal gangs; this is disinformation. This tactic is used to “neutralize,” subvert, or disrupt the life of the targeted individual.

Based on Google Trends data, the term “Gang stalking” began appearing among online searches circa 2005. Coincidentally or not, that was during the post-9/11 expansion of America’s national security state activities, which included illegal domestic mass surveillance by the NSA, the use of torture at black site prisons by the CIA, the militarization of police departments, etc.

In any case, an extensive review of relevant published news reports and other information suggests that the term “Gang stalking” – and most, but not all, online references to it – is disinformation from the U.S. intelligence community intended to obfuscate the nature of a set of real tactics sometimes referred to in the security industry as “disruption” operations.

Disruption – in the parlance of counterintelligence agents – is a strategy for neutralizing an individual (or group) believed to pose a potential threat to the clients or members of a security agency. For example, if there is no legal basis for arresting and prosecuting someone, and assassination is not a legal or practical option, an alternative is a long-term campaign of intense surveillance and harassment. The goal – at least ostensibly – is to limit the person’s potential to create trouble or function; this is done by keeping him or her distracted, agitated, and preoccupied with various challenges and provocations, by undermining the individual’s social and professional relationships, and by otherwise interfering with the person’s life in various ways.

A disruption strategy seeks to terrorize and socially isolate the victim, and to degrade his or her financial and emotional status – as well as inflicting the various physical effects of perpetual stress. Although disruption operations can be born out of illegitimate motives, such as an informant’s desire for vengeance, or to fulfill de facto quotas – the harassment can, in effect, validate itself through provocation: if you terrorize and spy on someone over a long period, he or she is likely to eventually respond in ways which can be used to rationalize labeling the person as a potential threat.

Short Definition:

Organized stalking-electronic harassment (Gang stalking / covert harassment / organized harassment) is a systematic form of harassment and control done by a group of people in an organized fashion using unethical means to harass and control somebody to have devastating effects in that person’s life.

Purpose of Attacks:

  • To render the targeted individual (TI) homeless, destitute, unemployed, discredited, institutionalized, and incarcerated.
  • To incite the TI to commit a crime or suicide.
  • To use the TI in a behavior modification study.
  • To use the TI in non-consensual human experimentation.
  • Or to kill the TI in a way that cannot be traced to the perpetrators, for example, through continual provocations, “set-ups”, entrapments, radiation torture, and/or mind control/influencing technologies.

The purposes of the continual psychological warfare (i.e., psy-ops and perception management) attacks are to:

  • Constantly keep the TI in a state of fear, confusion, hopelessness.
  • No-touch torture the TI.
  • Continually attack the TI in public without others knowing this is occurring.
  • Turn the TI’s environment and everyday stimuli into his enemy.
  • Get TIs falsely diagnosed with a psychological illness they don’t have.
  • Artificially induce a psychological illness onto TI’s.
  • Make the TI snap, go crazy, and/or commit crimes.
  • Amplify the effects of other components of the Gang stalking attacks.
  • Reduce TIs’ cognitive functions and autonomy.
  • Keep TIs’ focus of attention on the attacks.
  • Distort TIs’ worldview through constantly negative street theater set-ups.
  • And / or separate and isolate TIs from real people and real reality.

Official domestic counterintelligence operations of this type are perpetrated by federal agents, intelligence/security contractors, confidential informants, and often with the support of state and local law enforcement personnel.

Unofficial operations of this type are perpetrated by private investigators and vigilantes – including many former agents and cops, some of whom are members of the quasi-governmental Association of Law Enforcement Intelligence Units (LEIU), sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.

Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.” Many American and British victims, as well as the United Nation’s (UN) Special Rapporteur on torture and other cruel, inhumane or degrading treatment or punishment, describe the process as “No Touch” Torture – a phrase which also captures the nature of the crime: cowardly, unethical, and illegal (universally prohibited under all circumstances as torture), but at the same time, it is difficult to prove legally because it generates minimal forensic evidence. In addition, perpetrators operate above the law.

“These make the FBI’s former COINTELPRO program, which I worked on, including in a supervisory capacity, look like a Sunday school program.

-Former FBI Special Agent and Head, Los Angeles FBI, Ted Gunderson

Tactics include – but are not limited to – unwarranted surveillance; cyber-stalking and cyber harassment; computer and phone hacking; illegal monitoring all communication by phone and computer; phone app and website manipulation; overt stalking; slander and defamation campaign; blacklisting after job loss through “workplace mobbing” (intense, organized, covert harassment, undermining, and gaslighting in the workplace); “black bag jobs” (residential break-ins); abusive phone calls; entrapment and frame-ups; threats; blackmail; friend and intimate partner infiltration (informants / agent provocateurs); vandalism of property, electronics, and vehicles; financial crimes (fraud, identity theft); various cyber-attacks (i.e., passwords changed to prevent accessing computer; important data deleted from PC, etc.); harassment by noises; various psychological operations (psy-ops); “watch listing” (having the target placed on a government watchlist); manufactured disappointments and disasters in the daily lives of targets; and various forms of psychological warfare to create “no touch” torture.

Accounts by numerous victims of organized stalking share common specific details – suggesting that the perpetrators are following a well-tested and standardized playbook of methods that have proven to be easily kept off of the radar of potential witnesses and the mainstream news media.

“One might think that what we are looking at is COINTELPRO 2.0 – an outsourced surveillance state – but in fact it’s worse.

– The Nation (Magazine), June 2013

Accomplices – such as neighbors, co-workers, and even friends or relatives of the victim in some cases – are recruited to participate (often unwittingly) by counterintelligence personnel using various means, such as by telling them that the target is a potential threat or that the target is the subject of an “investigation.”

Workplace Mobbing is a fundamental component of this protocol. Gang stalking involves sabotaging your work at work, spreading false rumors in your workplace, and trying to convince your employer to fire you. Gang stalking targets experience an updated and refined version of McCarthy era blacklisting. This involves being hired, then, soon after, being subject to a hostile work environment, resulting in actual or constructive termination. Gang stalking targets’ “employment problems” start at the same time as their gang stalking starts. Almost all gang stalking targets experience workplace mobbing.

Mobbing, as a sociological term, means bullying of an individual by a group, in any context. Workplace mobbing occurs as emotional (and sometimes physical) abuse in the workplace and involves a “ganging up” by co-workers, subordinates or superiors, to force someone out of the workplace through rumor, innuendo, intimidation, humiliation, discrediting, undermining, sabotage, gaslighting, and isolation. Victims of workplace mobbing frequently suffer from: adjustment disorders, somatic symptoms, psychological trauma (e.g., trauma tremors or sudden onset selective mutism), post-traumatic stress disorder (PTSD), or major depression.

In mobbing targets with PTSD, Dr. Hans Leymann notes that the “mental effects were fully comparable with PTSD from war or prison camp experiences.” Some patients may develop alcoholism or other substance abuse disorders. Family relationships routinely suffer, and victims sometimes display acts of aggression towards strangers in the street. Workplace targets and witnesses may even develop brief psychotic episodes occupational psychosis generally with paranoid symptoms. Leymann estimated that 15% of suicides in Sweden could be directly attributed to workplace mobbing.

Mobbing is a particular type of workplace bullying and harassment that is not as apparent as most, making it difficult for targets to discern because its tactics are commonly covert and involve group gaslighting — this confuses and erodes the victim’s entire sense of reality. A specific tort for Workplace Mobbing exists in Canada and many European nations. No laws exist in the United States unless the harassment involves a protected class (i.e., race, religion, gender, etc.), and if it meets all requirements, it might be addressed legally as a Hostile Work Environment. In the case of federal employment, where a job carries a property right, workplace mobbing can be considered illegal under 18 U.S. Code § 241, the Conspiracy against rights statute. In this context, workplace mobbing involves a conspiracy to deprive someone of their property right (and likely due process rights in being removed from a federal position).

After the target is initially mobbed out of their job, they will go on to experience mobbing in most places where they try to work — and that is if the target can even find work again. Most targets experience email and telephone communication involving employment being blocked to leave the target financially ruined.

Organized Stalking uses ‘Degrading Themes’ to terrorize the target, causing them constant stress and anxiety. A ‘Degrading Theme’ is a form of psychological harassment that stigmatizes the victim and destroys their reputation; the target is often portrayed as an abuser, drug addict, pedophile, etc. The objective is to make the target a social outcast by deliberately spreading lies and distortions to individuals in their personal and professional environment. To effectively assassinate the target’s character, they operate under the guise of bogus police investigations and use statements and quotes from individuals who are often paid or assigned to set-up the target. They even invest considerable effort in manipulating circumstances and staging scenarios to make the victim appear as they want them to appear. ‘Degrading Themes’ are favored by harassers for the ‘Catch 22’ it imposes on the victim. Many targets shy away from talking about the abuse or defending themselves due to fear of further humiliation and stigmatization. They are put in a situation where talking about the harassment contributes to spreading the rumors and lies being told about them.

“Baiting” is used to lure a victim into environments, or situations, which involve tricking a victim into committing a crime or unknowingly engaging in an illegal activity. Perpetrators will try to lure targets into various situations for the sole purpose of setting them up, and for the sake of entrapment. Setting up targets could involve getting them arrested, institutionalized, set up on fake sexual harassment charges, coercing the target into trying addictive drugs so they can
later be set up for drug charges, planting drugs or other contraband in the target’s home, planting illegal pornographic materials on their computers, etc.”

Baiting is any effort to evoke a response by the victim which can be used to discredit or legally ensnare him. In a sense, all gang stalking tactics are forms of baiting because their cumulative effect will eventually drive the victim to respond in ways that will create additional trouble. A surveillance operation can selectively capture evidence of a targeted person responding to harassment. That evidence could then be used to justify the initiation of more formal scrutiny by a government agency. Early on in the protocol, the target’s computers, phones, and most forms of technology are hacked, manipulated, and controlled by their handers; their social media, including dating websites and apps, will be manipulated for the sake of (1) isolating the target from meeting healthy dating partners; and (2) without the target realizing it, dating in the modern age of the internet will result in their life being infiltrated with nothing but perpetrators (mainly informants serving as agent provocateurs). The perpetrators, or informants, are given permission to engage in all the criminal activity they want — dragging the unwitting target into it — and all for the sake of setting the target up for long-term incarceration and trumped-up criminal charges.

Many describe gang stalking as the target’s life being turned into a giant, never-ending entrapment operation much like the original COINTELPRO — only the “dirty tricks” used today involve technology so advanced it remains unknown to the public — and also make escaping it impossible. There will come a point where everyone in the target’s life is a part of this never-ending bogus investigation: friends, family, work colleagues, neighbors, and anyone and everyone will be used as the “eyes and ears” of the state in monitoring, isolating, undermining, demonizing, and often trying to entrap the target.

A pervasive slandering campaign takes place, projecting the target as an unstable individual, child molester, a person with hidden dark secrets, a criminal, a drug addict, a threat, a terrorist, or a person prone to psychopathic behavior. The criminals planning a gang stalking endeavor study the target long before the stalking begins. Psychological profiling is done to assist in the overall campaign that includes intense psychological harassment and demoralization.

Gang Stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a person’s life.

In February 2020, Nils Melzer, professor of international law at the University of Glasgow and the United Nation’s (UN) Special Rapporteur on torture and other cruel, inhumane or degrading treatment or punishment, publicly announced the UN’s findings after investigating this tactic. Melzer warned that its use is widespread and being exploited by states to circumvent the more widely understood ban on physically inflicting pain. The UN calls this tactic “No Touch” torture, Psychological Torture, and Cyber Torture.

The universal prohibition of torture is recognized to be of absolute, non-derogable and even peremptory character and has been restated in numerous international instruments of human rights, humanitarian and criminal law. Since its first proclamation in Art. 5 of the Universal Declaration of Human Rights (1948), the international community has established an impressive normative and institutional framework for its implementation.

At the same time, however, numerous States have invested significant resources towards developing methods of torture which can achieve purposes of coercion, intimidation, punishment, humiliation or discrimination without causing readily identifiable physical harm or traces.

In his UN report, Melzer points out that many countries,

“Deny, neglect, misinterpret or trivialize psychological torture as what could be euphemistically described as ‘torture light’, whereas ‘real torture’ is still predominantly understood to require the infliction of physical pain or suffering. Some states have even adopted national definitions of torture excluding mental pain or suffering, or interpretations requiring that in order to constitute torture, mental pain or suffering must be caused by the threat or infliction of physical pain or suffering, threats of imminent death, or profound mental disruption.”

An alarming development that Melzer contemplates is Cyber Torture. States, corporate actors and organized criminals, he says,

“Not only have the capacity to conduct cyber-operations inflicting severe suffering on countless individuals but may well decide to do so for any of the purposes of torture. Cybertechnology can also be used to inflict, or contribute to, severe mental suffering while avoiding the conduit of the physical body, most notably through intimidation, harassment, surveillance, public shaming and defamation, as well as appropriation, deletion or manipulation of information. Already harassment in comparatively limited environments can expose targeted individuals to extremely elevated and prolonged levels of anxiety, stress, social isolation and depression, and significantly increases the risk of suicide. Arguably, therefore, much more systematic, government-sponsored threats and harassment delivered through cybertechnologies not only entail a situation of effective powerlessness, but may well inflict levels of anxiety, stress, shame and guilt amounting to ‘severe mental suffering’ as required for a finding of torture.

Melzer reports that the practice can misuse medical implants, neurotechnological devices, weaponized psychology, and mobbing – all to achieve the utter destruction of any one individual.

Melzer ends his 2020 UN report with the following:

“In order to ensure the adequate implementation of the prohibition of torture and related international legal obligations in present and future circumstances, its interpretation should evolve in line with new challenges and capabilities arising in relation to emerging technologies not only in cyber space, but also in areas such as artificial intelligence, robotics, nano- and neurotechnology, or pharmaceutical and biomedical sciences including so-called “human enhancement“.

Since organized stalking goes far beyond surveillance – into the realm of psychological terrorism — it is a form of extrajudicial punishment. As such, the harassment is illegal – even when done by the government. Overall, gang stalking clearly violates 18 U.S. Code § 241 – Conspiracy against rights. Section 241 makes it unlawful for two or more persons to agree to injure, threaten, or intimidate a person in the United States in the free exercise or enjoyment of any right or privilege secured by the Constitution or laws of the Unites States or because of his or her having exercised such a right. Unlike most conspiracy statutes, §241 does not require, as an element, the commission of an overt act. The offense is always a felony, even if the underlying conduct would not, on its own, establish a felony violation of another criminal civil rights statute. It is punishable by up to ten years imprisonment unless the government proves an aggravating factor (such as that the offense involved kidnapping aggravated sexual abuse or resulted in death) in which case it may be punished by up to life imprisonment and, if death results, may be eligible for the death penalty.

The Civil Rights Act of 1968 enacted 18 U.S.C. § 245(b)(2), permits federal prosecution of anyone who “willingly injures, intimidates or interferes with another person, or attempts to do so, by force because of the person’s race, color, religion or national origin” or because of the victim’s attempt to engage in one of six types of federally protected activities, such as attending school, patronizing a public place/facility, applying for employment, acting as a juror in a state court or voting.

Administering severe extrajudicial punishment is not only unethical, but also illegal under both federal and state law and is outlawed by the U.S. Constitution. Gang stalking clearly violates countless Constitutional Amendments, for example, the U.S. Constitution’s Fourth Amendment, which prohibits unwarranted searches; the Fifth Amendment, which forbids “double jeopardy,” and protects against self-incrimination. It also requires that “due process of law” be part of any proceeding that denies a citizen “life, liberty or property” and requires the government to compensate citizens when it takes private property for public use. It violates the Sixth Amendment, which says punishment should be preceded by a trial, and the right to be confronted with the witnesses against him; the Eighth Amendment, which prohibits “cruel and unusual punishments”; and the Fourteenth Amendment clause guarantees that no state shall “deprive any person of life, liberty, or property, without due process of law.” The Supreme Court has interpreted the due process clause to provide for “selective incorporation” of amendments into the states, meaning that neither the states nor the federal government may abridge individual rights protected by the Constitution.” Although there’s no enumerated “right to privacy” or “right to be left alone” in the Bill of Rights, since the 1960s the Supreme Court has held that several amendments create a “penumbra” of privacy for individuals’ private beliefs and conduct.

Coordinated stalking operations violates Federal Interstate Stalking – 18 U.S. Code § 2261A; Federal Torture – 18 U.S. Code § 2340; Treason – U.S. Code, 18 U.S.C. § 2381; 18 U.S. Code § 1584 – Human Trafficking / Sale into involuntary servitude.

Various state codes also outlaw many technologies used in gang stalking: Michigan, House Bill 4513 (2003) – Outlaws harmful electronic or electromagnetic devices, including Space-based weapons; Massachusetts: Chapter 170 of the Acts of (2004), Possession of electronic weapons outlawed; Maine, Chapter 264 H.P. 868 – L.D. 1271 (2005) – Criminal uses of electronic weapons outlawed.

International customary law and treaty also make gang stalking illegal. Geneva Convention: Rule 7C, Intentional Targeting of Citizens; Crimes Against Humanity; Weapons of Mass Destruction; and the United Nations (U.N.) Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, 1984.

It is also outlawed by Federal Directives for Human Experimentation: Nuremberg Code, United States Department of Health & Human Services (HHS). Common Law Torts and Civil Torts include Invasion of Privacy – Intrusion Upon Seclusion; Invasion of Privacy – Public Disclosure of Private Facts; Invasion of Privacy -False Light; Assault; Battery; and Intentional and Negligent Infliction of Emotional Distress.

U.S. Rep. Dennis Kucinich, D-Ohio, introduced a Bill in 2001 to outlaw space-based weaponry, Kucinich’s resolution never passed, but versions of it referred to alleged technologies including chemtrails, particle beams, electromagnetic radiation, plasmas, extremely low-frequency or ultra-high-frequency energy radiation and mind control technology. On May 19, 2019, The Richmond, CA City Council approved a resolution supporting the Space Preservation Act and Space Preservation Treaty permanently banning “space-based weapons,” such as microchips planted in people’s bodies and microwaves that supporters believe are used by nefarious sources to harm them. The resolution was written by Councilwoman Jovanka Beckles, who works as a mental health specialist for Contra Costa County and aimed at “making all Richmond residents feel safe,” she said. “I don’t intend to ignore the concerns from residents who say they have been exposed to these attacks that have caused them great emotional and bodily harm,” Beckles said.

The first bill to outlaw organized stalking as a formal crime was introduced to California legislators in 2018. The bill failed to advance due to staunch opposition from, and lobbying efforts on behalf of, law enforcement and intelligence.

One case of organized stalking by federal agents that appeared in mainstream news media was the high-profile case of a cancer research scientist, Arnold Lockshin, who fled with his family to the Soviet Union in 1986 and was granted political asylum. An article in the Gadsen Times – and other newspaper reports – in October 1986 brought national attention to the case. According to Lockshin, he and his family were being intensely harassed by agents because of the socialist political views of Lockshin and his wife. The harassment tactics included many of those associated with organized stalking: slander, spying, break-ins, threats, harassing phone calls, etc.

In December 2005, National Book Award winner Gloria Naylor, wrote a semi-autobiographical book in which she described her experiences as a target of organized stalking. The book’s title, 1996, was the year it became apparent to Naylor that she was being stalked. Apparently, her harassment began after she had a minor dispute with a neighbor whose brother worked for the National Security Agency (NSA).

Hollywood Producer, Harvey Weinstein, hired the acclaimed attorney, David Boies, along with two counterintelligence firms — Black Cube and Kroll — to silence the women accusing him of rape and sexual assault and the journalists covering it using organized stalking tactics. The New Yorker‘s article, Harvey Weinstein’s Army of Spies exposed his wrongdoing and finally vindicated the women who had previously been labeled as “crazy” and “delusional” due to their complaints.

Founder of the “Church” of Scientology, L. Ron Hubbard, has used gang stalking since the “church’s” inception. It calls it “Fair Game,” and Hubbard established the policy in the 1950s in response to criticism both from within and outside his organization. Individuals or groups who are “Fair Game” are judged to be a threat to the Church and, according to the policy, can be punished and harassed using any and all means possible. In 1968, Hubbard officially canceled use of the term “Fair Game” because of negative public relations it caused, although the Church’s aggressive response to criticism continued. Applying the principles of Fair Game, Hubbard and his followers targeted many individuals as well as government officials and agencies, including a program of covert and illegal infiltration of the Internal Revenue Service (IRS) and other United States government agencies during the 1970s. They also conducted private investigations, character assassination and legal action against the Church’s critics in the media. The policy remains in effect and has been defended by the Church of Scientology as a core religious practice.

A Targeted Individual (TI) is a person who has become an unwilling victim of gang stalking AKA illegal terrorism operations which cause many types of harm to the person. This includes psychological harm through stalking, psy-ops, manufactured disappointments and disasters in the target’s life, job loss and blacklisting, loss or property, vandalism, slander, diminished health, isolation from family, friends and any support system, and ultimately, loss of life itself. Sometimes physical harm is introduced through biological, chemical, directed energy, electromagnetic and acoustic weapons. The goal of this terrorism is to eliminate the TI through psychological torture, leading to a final solution — their suicide or death. Some targets have been microwaved to death. Some targets have taken their own lives. Some targets have taken their own lives and others at the same time.

For targets of government-sponsored stalking and electronic harassment, it is alleged that most Targeted Individual (TI’s) have been selected by an agency or private firm associated with America’s now over-reaching security apparatus (AKA America’s Deep State; usually FBI, CIA, DHS, DOD, NSA, etc.) to unwillingly participate in an experimental government torture program that now includes involvement from rogue elements in all federal agencies, including the U.S. Postal Service. It is alleged that Targeted Individuals are placed onto the consolidated terrorist watchlist and followed as non-investigate subjects.

Many respected medical doctors (John Hall, MD; Daniel Lebowitz, MD; Edward Spencer, MD; Beatrice Golomb, MD), government scientists, and former CIA and FBI agents have confirmed that the Targeted Individuals Program is real. Sworn affidavits from FBI agents, Ted Gunderson and Geral Sosbee, are part of this evidence.

Daniel Lebowitz, M.D. has provided testimony before a Senate Committee in 2014, which can be read here.

It is estimated there are about 170,000 Targeted Individuals in the U.S., and more than 1 million worldwide.

Organized Gang Stalking is experienced by the Targeted Individual as a psychological attack that is capable of immobilizing and destroying them over time. Targets have to deal with an abuse engineered to make them appear insane should they complain to authorities. The expressed goal of Organized Gang Stalking is to silence a victim, drive a victim insane and possibly to the point of suicide, and to destroy the victim’s reputation and credibility so the person will be viewed as mentally ill should they report the abuse.

Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so he or she will: have a nervous break-down, become unemployed, incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, entrapment, setups, workplace mobbing, online, vehicular, and community mobbing, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment.

“What is the Targeted Individual program that these people are complaining of? It is many things all at once. It is a discrediting and disruption campaign, similar to COINTELPRO. In some cases (not all) it is a torture/trauma-based brainwashing and mind-control program like MK-Ultra. It is a secret form of repression, persecution and psychological warfare, carried out in the community largely by regular people, along the lines of Stasi or Zersetzung torture. It is a political abuse of psychiatry, as has been carried out in many countries as a way to torture and discredit dissidents. Finally, it is unethical non-consensual human experimentation on unwitting subjects with advanced directed energy and psychotronic weapons systems. Overall, it represents a coming together of the most vicious and effective tools and weapons for covert harassment and political control of dissidents, activists, whistle-blowers, agitators, and other so-called “undesirables” that the world has ever seen. What are the goals and purposes of the program? Again, they are many. But, in a word, the neutralization of the target.

-Dr. Daniel Lebowitz’s Presentation submitted to the Senate Hearing on The State of Civil and Human Rights in the United States

Predatory Gang Stalking is an umbrella term describing a series of techniques used to instill mental instability within a victim with the intent to discredit, sabotage, harass, extort and even drive a victim to suicide. A victim of Predatory Gang Stalking can have their reputation, credibility, careers, relationships and entire life put into ruins. Then there is also workplace and career sabotage; while workplace mobbing and harassment is a problem in the office not just for victims of Gang Stalking, it’s also a technique used with Gang Stalking victims and can be very effective in eroding an individual’s employment. While the tragedies of real Gang Stalking victims are heinous, the sad truth is that many of the techniques, tools and weaponry utilized within Gang Stalking are generally unknown to the public. In full scale “targeting,” a victim is pushed through an optimized pipeline and path towards insanity that leads a victim to incarceration, institutionalization and commonly suicide.

“These are “soft-kill” methods which ruin the lives of innocent American citizens while leaving a “negligible footprint” – i.e., little to no evidence of the harassment and unconstitutional activity perpetrated by the rogue factions within the US Government. The Stasi utilized the same tactics, albeit their reach was more limited than the illegal program being run in the US due to technological limitations since the use of computers at that time and in that area of the world were nearly non-existent. However, in this day and age the high level of integration of smart-phones, computers, and tablets, has facilitated the government’s illegal spying program and helped strip Americans of their constitutional rights. Unfortunately, while countries like Russia (which is still not “perfect” or totally free by any means) have gradually become a bit more democratic and open, the pendulum in the United States is rapidly swinging in the other direction. We now live in a police-style state where innocent Americans can be put on a “pre-crime-styled” watch-list (think Minority Report) as “potential” domestic threats, or “potential” domestic terrorists, via decisions in a closed-door kangaroo court, referred to as the “star chamber.” There is no due process in these decisions, victims have no idea of what they have been accused of, and the DOJ has ordered local and state law enforcement to “stand down” when complaints are made regarding any of the aforementioned illegal activities.”

Gang Stalking is aimed at achieving one or all of the following: induced suicide; financial devastation; incarceration; homelessness; and institutionalization in psyche wards.

“Organized stalking is a very serious crime as the aim is to cause the physical or mental death of a person, it is murder.”

CLICK ABOVE TO READ ABOUT NON-LETHAL WEAPONS

“A rose by any other name is still a rose”

– William Shakespeare, Romeo and Juliet

“Cleverly disguised torture and murder of people thought to oppose the mainstream.”


“Covert, extra-legal human neutralization-disposal-elimination program.”


“Zersetzung (Version 2.0) (German for “decomposition”-“disintegration” of political enemies’ lives and psychological/physical/life-support systems) carried out by Stasi military police in communist East Germany in the 1970’s and 1980’s.”


“Identity suppression”/”de-personing”/”de-platforming”/”cancelling” a citizen via psycho-political warfare by Special Forces’ “Signature Reduction” (SIGREDUX) Program and other civilian-military special forces (USSOCOM).”


“Democide (murder by government/National Security Racketeering Network).”


“Systematic community stalking/harassment/abuse by CitizenCorps and its 5 partners (Community Emergency Response Teams (CERT), Fire Corps, USA on Watch, Medical Reserve Corps, and Volunteers in Police Service).”


“Community-Oriented Policing & Citizens on Patrol (COPs) Federal-, State-, and County-Run Gangstalking Program by Department of Justice (DOJ), FBI, DHS, NSA, CIA, White House, Sheriff’s Departments, local police, etc.”


“Political suppression, retaliation, and persecution of “domestic enemies” (activists, whistleblowers, dissidents, etc.).”


“Psychotronic (psychological + electronic) warfare.”


“Psychopolitical (psychological + political) warfare.”


“Cognitive warfare (CW) (aka neuro/brain/Neocortical warfare) against innocent civilians.”


“Cyber and cybernetic warfare.”


“CIA no-touch torture via soft-kill, slow-kill, silent-kill “non-lethal” and neuroweapons.”


“Electronic concentration camp.”


“Open-air Guantanamo.”


“Covert “cruel and unusual punishment” on civilians and others without due process of law.”


“Bio-hacking.”


“Non-consensual human experimentation for secret, weapons-testing and bio-engineering programs.”


“NSA’s “total population control”


“Covert technological murder.”


“U.S. Government’s Secret, Selective, Depopulation/Culling/Purging Program (Operation Zyphr?).”


“Hybrid warfare against watchlisted (blacklisted) innocent civilians.”


“Total information control.”


“Weapons of mass destruction.”


“Covert neuroweapons (NeuroS/T) testing, research & development, and deployment against nonconsensual civilians as a means of punishment/neutralization.”


“Depopulation by microwave radiation.”


“Mentocaust/Menticide (mind holocaust/mind genocide).”


“Unconventional/asymmetric/hybrid warfare against civilians stripped of civil and reclassified as “enemy non-combatants”/ “potential terrorist threats/ “TIs”.”


“Fourt Generation Warfare (hybrid, unconventional war against non-state actors (i.e., anyone, anywhere, anytime) as justified by “national security” and “war on terrorism”.


“Revolution in Military Affairs” (based on deployment of exotic, “non-lethal,” directed energy and neuroweapons on the “electronic battlefield”).”


“CIA PROMIS/NSA PRISM/ECHELON/PALANTIR computer Tracking/Hunting/Targeting/Murder of Civilians Designated as “enemy non-combatant.”


“Electromagnetic neuro-telecommunications (Dr. Rauni Kilde).”


“Pentagon’s Cloud-Brain (Hive mind) System.”


“Remote mind-influencing technology.”


“Electrical Stimulation of the Brain” (ESB).


“Remote electronic torture.”

CLICK ABOVE TO READ ABOUT NON-LETHAL WEAPONS