Project Manager: Fill & Download for Free

GET FORM

Download the form

How to Edit Your Project Manager Online On the Fly

Follow the step-by-step guide to get your Project Manager edited with ease:

  • Hit the Get Form button on this page.
  • You will go to our PDF editor.
  • Make some changes to your document, like adding checkmark, erasing, and other tools in the top toolbar.
  • Hit the Download button and download your all-set document into you local computer.
Get Form

Download the form

We Are Proud of Letting You Edit Project Manager With a Simplified Workload

Find the Benefit of Our Best PDF Editor for Project Manager

Get Form

Download the form

How to Edit Your Project Manager Online

If you need to sign a document, you may need to add text, complete the date, and do other editing. CocoDoc makes it very easy to edit your form just in your browser. Let's see how to finish your work quickly.

  • Hit the Get Form button on this page.
  • You will go to CocoDoc online PDF editor app.
  • When the editor appears, click the tool icon in the top toolbar to edit your form, like inserting images and checking.
  • To add date, click the Date icon, hold and drag the generated date to the target place.
  • Change the default date by changing the default to another date in the box.
  • Click OK to save your edits and click the Download button to use the form offline.

How to Edit Text for Your Project Manager with Adobe DC on Windows

Adobe DC on Windows is a useful tool to edit your file on a PC. This is especially useful when you like doing work about file edit in your local environment. So, let'get started.

  • Click the Adobe DC app on Windows.
  • Find and click the Edit PDF tool.
  • Click the Select a File button and select a file from you computer.
  • Click a text box to give a slight change the text font, size, and other formats.
  • Select File > Save or File > Save As to confirm the edit to your Project Manager.

How to Edit Your Project Manager With Adobe Dc on Mac

  • Select a file on you computer and Open it with the Adobe DC for Mac.
  • Navigate to and click Edit PDF from the right position.
  • Edit your form as needed by selecting the tool from the top toolbar.
  • Click the Fill & Sign tool and select the Sign icon in the top toolbar to customize your signature in different ways.
  • Select File > Save to save the changed file.

How to Edit your Project Manager from G Suite with CocoDoc

Like using G Suite for your work to complete a form? You can edit your form in Google Drive with CocoDoc, so you can fill out your PDF just in your favorite workspace.

  • Go to Google Workspace Marketplace, search and install CocoDoc for Google Drive add-on.
  • Go to the Drive, find and right click the form and select Open With.
  • Select the CocoDoc PDF option, and allow your Google account to integrate into CocoDoc in the popup windows.
  • Choose the PDF Editor option to open the CocoDoc PDF editor.
  • Click the tool in the top toolbar to edit your Project Manager on the field to be filled, like signing and adding text.
  • Click the Download button to save your form.

PDF Editor FAQ

How do you know whether federal agents are investigating you?

Organized Gangstalking (aka Counterintelligence, Community-Based, and Contract Stalking, and Man-Hunting), Mind Control, Criminal Human Experimentation, Cults, And The Global Police StateI. INTRODUCTION, SUMMARY, AND CONCLUSIONS (updated 1/25/20):Webmaster: Dr. Eric T. Karlstrom (ETK), Emeritus Professor of Geography, California State University, StanislausGangstalking (organized stalking, counter-intelligence/contract stalking/electronic torture): Illegal, state-sponsored, domestic terrorism against and secret torture and murder of innocent civilians.EPIGRAPH QUOTES:Since the 2001 September 11 attacks and Bush’s so-called “war on terror,” there was a soar in the number of Targeted Individuals reporting covert assaults by black operatives, thugs, extremist cells, “stalkers.” Some TIs are reporting assaults with remotely applied, military grade, lethal weaponry. These reports have been from both overseas and U.S. self-identified targets. In early August, 2010, Sharon Weinberger explained the reason for the escalated reports:“After the attacks of September 11, the Pentagon began a shift away from its Cold War-era “two war strategy,” premised on maintaining the ability to conduct two major military operations simultaneously, and began focusing instead on “irregular warfare against individuals and groups.”Weinberger, S. 2010, “Black Ops: Secret Military Technology in the Age of Terrorism;” quoted in “Covert Technological Murder; Big Brother Approved” by Renee Pittman M. (2013)“With so many jews involved with methods of deep psychological torment directed at me for so many years, it is impossible that these methods are not culturally jewish, known by all jews above a certain age…. This culturally jewish method of profiling and stalking someone to ruin would have existed before technology made it easy, perhaps explaining why jews have been exiled from so many lands.The benefits to shadow governments are endless; spy operations, police stings, drug dealing, money laundering drops and black operation terror events where an asset or target are surrounded by nothing but layers of backup in a pre-scripted crowd simulation….What gave away the core of this mob stalking method as culturally jewish was that Israelis always positioned themselves in the lead to appear as a victim, with their terrain cues consistently ordinary, per Mossad and Shin Bet’s mottos of deception and concealment as a strategy.The culturally jewish methods of deception and concealment are mafia tactics, as evidence by the similarity in criminal activities between the American jewish mafia and the Israeli mafia; the embedded Nation of Israel and Israel proper:Jewish-American mafia criminal activities: Narcotics trafficking, racketeering, gambling, loan sharking, bookmaking, contract killing, diamond trafficking, extortion, weapons trafficking, fraud, prostitution & money laundering.Israeli mafia criminal activities: Drug trafficking, diamond trafficking, racketeering, loan sharking, robbery, extortion, money laundering, highjacking, gambling, prostitution, bookmaking, weapons trafficking and human trafficking.”…. CSIS (Canadian Security Intelligence Service), the RCMP (Royal Canadian Mounted Police), the Toronto Police Service and the Nation of Israel embedded within Canada expanded my targeting to develop a GPS terrain surveillance and cueing system. This involves portable biometric gear in backpacks, duffle bags and luggage totes which redundantly biometrically position you amongst plain clothed police, spies and their assets and targets; fed to and through satellite GPS.It’s designed to move the target into a scripted surveillance sequence where anything can happen to them, like a mock collision to take them out while appearing accidental, with all immediate witnesses in on the black operation.If the target has been conditioned to EEG (electroencephalogram) remote influencing, as I was, they can be led along a pre-scripted surveillance path like a marionette; directed, misdirected, and delayed as needed using GPS-positioned cues and resists. The cueing system covertly developed around me uses any object or mark on the terrain, other people in the biometric field, or even GPS-located aircraft in the sky.… As jewish deception and hiding are further finessed to fabricated domestic terror patsies and the events to go with them, more persons seek Israel for the best counter-terrorism training.… Jewish stalkers were so intent on always appearing to be a victim in anything I recorded (with video camera), they gave themselves away as my core predators despite so many government agencies serving as their camouflage.From: “Deceive and Hide- Jewish Mob Stalking Culture” youtube (now removed from the internet) by Stephen O’Keefe, Canadian TI (‘Mafia States’ Targeting Innocent Civilians; 1) “Deceive and Hide- Jewish Mob Stalking Culture”; 2) “TI” As Lone-Wolf Terrorists;” Op Catalyst youtubes and text)This is satanic ritual abuse/satanic ritual murder.Nessa Praf(Webmaster comment: Satanic Ritual Abuse (SRA) and Satanic Ritual Murder = Jewish Ritual Abuse and Jewish/Masonic Ritual Murder)II. ABSTRACT:THE U.S. GOVERNMENT AND OTHER MAFIA STATES ARE SECRETLY DEPLOYING AN EXTREMELY HIGH-TECH HUMAN-DISPOSAL WEAPONS SYSTEM TO ELECTRONICALLY SURVEILLE, STALK, SUPPRESS, HARASS, TORTURE, TERRORIZE, DISCREDIT, ISOLATE, AND ELIMINATE THEIR OWN CITIZENS. THIS INVISIBLE WEAPONS SYSTEM CAUSES PREMATURE AGING AND DEATH BY REMOTELY (ELECTRONICALLY) INDUCING PAIN, CONFUSION, SUICIDE, VIOLENT CRIMINAL BEHAVIOR, SYMPTOMS OF MENTAL ILLNESS, HEART ATTACKS, CANCER, AND OTHER PHYSICAL AND PSYCHOLOGICAL TRAUMAS. POLITICAL ACTIVISTS AND GOVERNMENT CRITICS (SO-CALLED “DISSIDENTS”), WHISTLE-BLOWERS, MINORITIES, MUSLIMS, VETERANS, CHRISTIANS AND OTHERS ARE TARGETED AS “ENEMIES OF THE STATE” AND USED AS NONCONSENSUAL HUMAN TEST SUBJECTS FOR TESTING AND DEPLOYMENT OF EXOTIC DEPARTMENT OF DEFENSE (DOD) DIRECTED ENERGY AND NEUROWEAPONS. MANY TIS ARE DRIVEN INSANE OR TO SUICIDE AND/OR CONVERTED INTO DOMESTIC TERRORISTS AND/OR PATSIES WHO UNWITTINGLY PERFORM KEY ROLES IN SCRIPTED FALSE-FLAG TERROR EVENTS.PERSONNEL AT FBI AND DHS THREAT-FUSION CENTERS COVERTLY AND EXTRA-JUDICIALLY DESIGNATE INNOCENT AMERICAN CITIZENS AS ‘TARGETED INDIVIDUALS’ (‘TIs’) AND PLACE THEM ON THE “TERRORISM WATCH LIST” OR OTHER BLACKLISTS. “TIs” ARE SECRETLY STRIPPED OF THEIR CIVIL LIBERTIES AND SUBJECTED TO CONTINUOUS, COVERT PSYCHOLOGICAL AND ELECTRONIC ATTACKS FROM MANY SEGMENTS OF SOCIETY. GOVERNMENT MILITARY AND INTELLIGENCE AGENCIES IN COOPERATION WITH PRIVATE SECURITY FIRMS HEADED BY EX-CIA, EX-FBI, AND EX-MILITARY PERSONNEL GENERALLY COORDINATE OPERATIONS USING HIGH-TECH MILITARY WEAPONS. CIVILIANS DEPLOYED AS “IRREGULAR FORCES” COMPRISE COVERT PSYCHOLOGICAL WARFARE DEATH SQUADS. FEDERAL, STATE, AND LAW ENFORCEMENT AND FIRST RESPONDERS ARE COMPLICIT. OFFICIAL DOCUMENTS ALSO REFER TO “TIs” AS “CODE 4-NON-INVESTIGATIVE SUBJECTS-SILENT HITS” AND “ANOMALOUS HUMAN POTENTIALITIES.”SATELLITES, SUPER-COMPUTERS, WEAPONIZED PSYCHIATRY, AND NSA’S SIGNALS INTELLIGENCE (SIGINT) ELECTROMAGNETIC FREQUENCIES USED IN COMBINATION WITH NSA’s “BIG DATA” ALLOW GOVERNMENTS AND PRIVATE SECURITY CONTRACTORS, CORPORATIONS, ETC., TO IDENTIFY, PROFILE, AND REMOTELY TRACK, TARGET, AND MANIPULATE THESE “TIs” VIA “ACTIVE (24/7) SURVEILLANCE” AND BIO-TELEMETRY/REMOTE NEURAL MONITORING (RNM). (THE 1983 MOVIE, “BRAINSTORM,” POSTED HERE (Brainstorm) PROVIDES A VERY APPROXIMATE IMPRESSION OF WHAT “THE TECHNOLOGY” MAY BE CAPABLE OF DOING.)THESE SO-CALLED “COUNTERTERRORISM,” “COUNTERINSURGENCY,” “PEACEKEEPING,” AND COUNTERINTELLIGENCE STALKING OPERATIONS ACTUALLY COMPRISE “FOURTH-GENERATION WARFARE,” “HYBRID WARFARE,” “UNCONVENTIONAL WARFARE,” “CIVILIAN-MILITARY WARFARE,” “BRAIN WARFARE,” AND “LOW-INTENSITY CONFLICT.” THIS NEW FORM OF WARFARE SEEKS TO “MASTER THE HUMAN DOMAIN” BY DEPLOYING, IN COMBINATION, NEURO, ELECTRONIC, CYBER, PSYCHOLOGICAL, BIO-TELEMETRY, CHEMICAL, INFORMATION, AND AI WARFARE WEAPONS AGAINST CIVILIAN TARGETS.“TARGETS” ARE HUMAN-TRAFFICKED INTO DEPARTMENT OF DEFENSE (DOD) DIRECTED ENERGY AND NEURO-WEAPONS-TESTING AND DEPLOYMENT PROGRAMS AND USED AS NON-CONSENSUAL HUMAN GUINEA PIGS IN ONGOING MILITARY-CORPORATE-ACADEMIC MIND AND BEHAVIORAL CONTROL PROGRAMS. MANY VICTIMS OF THESE “TERMINAL EXPERIMENTS” ARE TRANSFORMED INTO GOVERNMENT “ASSETS,” SUPER-SPIES, “MANCHURIAN CANDIDATES” (MIND-CONTROLLED ASSASSINS), AND “TERRORISTS.”IN “THE HIDDEN EVIL: THE FINANCIAL ELITES COVERT WAR AGAINST THE CIVILIAN POPULATION” (2013), MARK M. RICH DESCRIBES THIS SYSTEM IS “A VERY CLEVERLY DISGUISED PROGRAM OF TORTURE AND MURDER,” “THE PROGRAM” IS THE MODERN EXTENSION OF TOP-SECRET CIA-MILITARY MKULTRA-MONARCH MIND CONTROL PROGRAMS OF THE 1940’S ONWARD. AS IN EARLIER VERSIONS, IT UTILIZES SATANIC RITUAL ABUSE (SRA), NO-TOUCH TORTURE, AND ELECTROMAGNETIC FREQUENCIES AS TRAUMA TO FRAGMENT AND RE-PROGRAM VICTIMS’ PERSONALITIES. MANY TIs ARE ALSO TARGETED FOR REMOTE, ELECTRONIC, DIGITAL BRAIN AND SOUL MAPPING AND CLONING VIA RNM, BRAIN-TO-COMPUTER AND BRAIN-TO-BRAIN INTERFACE, AND OTHER TECHNOLOGIES.THIS ‘PROGRAM’ DESTROYS “TARGETS'” LIVES, DRIVES THEM INSANE, INDUCES THEM TO COMMIT SUICIDE OR OTHERWISE DIE PREMATURELY, COMMIT VIOLENT CRIMES, AND/OR TRANSFORMS THEM INTO MANCHURIAN CANDIDATE-TYPE KILLERS, SUPER-SOLDIERS, AND “TERRORISTS.” “TARGETS” CUM “TERRORISTS” ARE REMOTELY (MIND) MANIPULATED TO BE SHOOTERS AND/OR PATSIES IN STAGED, STATE-SPONSORED, FALSE-FLAG ‘TERROR EVENTS’ DESIGNED TO TERRORIZE THE PUBLIC INTO SUBMITTING TO THE GLOBAL POLICE SUPERSTATE.THE EXISTENCE OF THIS WEAPONS-WARFARE SYSTEM IS OFFICIALLY DENIED AND ITS VICTIMS ARE ROUTINELY STIGMATIZED AND INSTITUTIONALIZED AS MENTALLY ILL.THIS GLOBALIZED PHOENIX (CIVILIAN “PACIFICATION”) PROGRAM FULFILLS MULTIPLE OBJECTIVES FOR ELITES:1) IT PERPETUATES THE MULTI-TRILLION DOLLAR TERRORISM-NATIONAL SECURITY RACKETEERING NETWORK COMPLEX (MILITARY-CORPORATE-ACADEMIC-CONGRESSIONAL-MAFIA) BY EMPLOYING AND DEPLOYING THOUSANDS OF PRIVATE SECURITY FIRMS AND MILLIONS OF COMMUNITY-BASED AGENTS (CBAs) THAT COMPRISE SECRET ARMIES EMBEDDED WITHIN SOCIETIES,2) CREATION AND COORDINATION OF (DHS) SECRET CIVILIAN ARMIES OF CITIZEN-SPIES, SNITCHES, GANGSTALKERS, ELECTRONIC ZAPPERS, SURVEILLANCE ROLE PLAYERS, CRISIS ACTORS, COUNTERTERRORISM SPECIALISTS, ETC. RADICALLY EXPANDS THE GLOBAL, UBERVEILLANCE, STASI POLICE SUPER-STATE,3) IT COVERTLY AND EXTRA-JUDICIALLY CONSCRIPTS GENERALLY LAW-ABIDING CITIZENS AS “TARGETS” (“TIs”) OF NON-CONSENSUAL HUMAN EXPERIMENTATION IN MILITARY-INTELLIGENCE DIRECTED ENERGY AND NEUROWEAPONS TESTING/DEPLOYMENT PROGRAMS,4) IT DESTROYS (“NEUTRALIZES”) “TIs” BY INTERNING, TORTURING, AND ELIMINATING THEM IN OPEN-AIR “ELECTRONIC CONCENTRATION CAMPS,” “MKULTRA MIND RE-PROGRAMMING,” AND BRAIN-MAPPING AND CLONING PROJECTS,5) IT FACILITATES OFFICIAL SUPPRESSION AND/OR ELIMINATION OF SEGMENTS OF SOCIETY WITH “IMPROPER” OR “POTENTIALLY IMPROPER” THOUGHTS AND BEHAVIORS (FOR EXAMPLE, TRUTH-TELLERS AND “DISSIDENTS”) AND PROMOTION OF ELEMENTS OF SOCIETY WITH “PROPER” THOUGHTS AND BEHAVIORS (THUS, “PACIFICATION,” SOCIAL ENGINEERING, AND MIND CONTROL OF SOCIETIES).6) IT TRANSFORMS MANY “TIs” INTO GOVERNMENT ASSETS, PUPPETS, SUPER-SPIES, MANCHURIAN CANDIDATE ASSASSINS, TERRORISTS, AND SURVEILLANCE EQUIPMENT (SENSING DEVICES) THAT MAY BE DEPLOYED AS BIO-ROBOT SLAVES, SHOOTERS, AND PATSIES IN FALSE-FLAG TERROR EVENTS STAGED TO PERPETUATE THE PHONY “WAR ON TERRORISM,”7) IT ALLOWS INTELLIGENCE AGENCIES, IN COOPERATION WITH THE “INTERNATIONAL ZIONIST CRIMINAL SYNDICATE” (“IZCS” AKA “KHAZARIAN MAFIA” AND “THE ORGANIZATION”) AND OTHER ENTITIES TO COMPLETELY ASSET-STRIP SELECTED “ADVERSARIES” OF THEIR PHYSICAL, INTELLECTUAL, AND CREATIVE PROPERTY, DESTROY THEIR BODIES, AND DIGITALLY CAPTURE (STEAL) THEIR MINDS AND SOULS.8) IT FACILITATES “DISPOSAL” OF NON-CONSENSUAL HUMAN TEST SUBJECTS WHEN THEY HAVE NO FURTHER VALUE TO THE CIA/DHS/FBI, ETC.9) IT FORMS PART OF LARGER, TOTALITARIAN ‘HUMAN ENGINEERING,” “SOCIAL ENGINEERING” AND TRANSHUMANISM/CYBERNETICS PROJECTS TO ESTABLISH AND MAINTAIN “PSYCHO-CIVILIZED (MIND-CONTROLLED) SOCIETIES” AND TO CREATE MAN-MACHINE HYBRIDS.10) IT WILL PROBABLY BE DEPLOYED IN COMBINATION WITH 5G, THE INTERNET OF THINGS (IoT), ARTIFICIAL INTELLIGENCE (AI), AND SMART CITIES TO FULFILL THE UNITED NATIONS AGENDA 21 (2030)’S STATED GOAL OF REDUCING THE WORLD’S HUMAN POPULATION BY TWO-THIRDS.THIS DRACONIAN UBER-POLICE STATE SYSTEM, HERE TERMED “G5” FOR “GLOBAL GOVERNMENT GANGSTALKING-GENOCIDE GESTAPO,” IS RUN BY INTELLIGENCE AGENCIES OF MAJOR NATIONS, PARTICULARLY THE “FIVE EYES” (FVEY) COUNTRIES OF THE U.S., U.K., ISRAEL, CANADA, AUSTRALIA, NEW ZEALAND. CIA, FBI, DOD, DARPA, NSA, DHS, MI6, MI5, GCHQ, MOSSAD, ISRAEL’S UNIT 8200, NASA, NATO, AND THEIR CORPORATE, ACADEMIC, MAFIA, AND LAW ENFORCEMENT PARTNERS ORCHESTRATE THESE OPERATIONS ON BEHALF OF THE INTERNATIONAL JUDEO-MASONIC-ILLUMINATI-SATANIC FINANCIAL ELITE.POSING AS OUR “PROTECTORS,” THESE AND OTHER GOVERNMENT AGENCIES, THEIR PAID “PERPETRAITORS” AT ALL LEVELS, AND ENTIRE SOCIETIES ARE BEING CRIMINALIZED, WEAPONIZED, AND SATANIZED, AS GREATER NUMBERS OF CITIZENS TAKE ON THE ROLES OF NEIGHBORHOOD VIGILANTES, SNITCHES, CITIZEN-SPIES, SPOTTERS, TRACKERS, GANGSTALKERS, “SURVEILLANCE ROLE PLAYERS,” STREET THUGS, THIEVES, LIARS, CHEATERS, “COUNTER-TERRORISTS,” HANDLERS, PSYCHOPATHIC PREDATORS AND HUNTERS OF THEIR NEIGHBORS AND COUNTRYMEN.THE NATIONAL SECURITY RACKETEERING NETWORK OPERATING THIS SYSTEM PROTECTS THE INTERESTS OF THE SUPER-RICH AGAINST THOSE OF THE MAJORITY AND CONSUMES TRILLIONS OF TAX-PAYER DOLLARS IN ONE OF THE GREATEST FRAUDS AND BLACK AND BLACK-MARKET OPERATIONS IN HISTORY.THE G5 SYSTEM IS ENTIRELY ILLEGAL AND UNCONSTITUTIONAL. ALL COVERT PSYCHOLOGICAL WARFARE (STREET THEATRE) AND DIRECTED ENERGY ATTACKS AGAINST TIs COMPRISE COVERT OPERATIONS THAT ARE CRIMINAL FELONIES AT LEAST. THUS, PERPETRATORS AT ALL LEVELS, INCLUDING “SURVEILLANCE ROLE PLAYERS;” “TERRORISM LIASON OFFICERS;” NEIGHBORHOOD WATCH VIGILANTES; HIRED STREET THUGS; FUSION CENTER OPERATIVES; DHS-NSA-FBI-MILITARY PERSONNEL; PRIVATE SECURITY CONTRACTORS SUCH AS INFRAGARD; COOPERATING PSYCHOLOGISTS, PSYCHIATRISTS, NEUROSCIENTISTS, MEDICAL DOCTORS, AND ENGINEERS AT UNIVERSITIES, MILITARY FACILITIES, MEDICAL CENTERS AND IN THE CORPORATE SECTOR; MILITARY SPECIAL FORCES AND INTELLIGENCE OPERATIVES; CONGRESSPERSONS; AND MEMBERS OF FEDERAL, STATE, AND LOCAL POLICE ARE ALL GUILTY OF COMMITTING FELONIES UP TO AND INCLUDING MURDER AS WELL AS TREASON AGAINST THE U.S. CONSTITUTION AND THE AMERICAN PEOPLE. “THE PROGRAM” COMPRISES CRIMES AGAINST HUMANITY, INDEED PERHAPS THE GREATEST CRIME IN HISTORY. FOR THIS REASON, THE ONGOING COVERUP OF THESE CRIMES ITSELF, WHICH INCLUDES THE SMEARING AND DISCREDITING OF VICTIMS, IS A VAST AND ILLEGAL ENTERPRISE. NONETHELESS, IF THE AMERICAN REPUBLIC IS TO SURVIVE, FULL FINANCIAL RESTITUTION TO VICTIMS IS REQUIRED.DR. RAUNI KILDE, FORMER CHIEF MEDIAL OFFICER OF NORTHERN FINLAND, POLITICAL INSIDER, AND ‘TI’ WHO WAS TORTURED BY THE G5 WEAPON SYSTEM FOR 30 YEARS AND THEN MURDERED VIA INDUCED HEART ATTACK IN 2015, STATED THAT THIS G5 PROGRAM “IS THE MOST IMPORTANT POLICY OF THE U.S. GOVERNMENT” AND THAT “NATIONS ARE THE PLAY-THING OF THE ELITE.”TO AVOID A DEPOPULATION-GENOCIDE FAR WORSE THAN BEFELL COMMUNIST SOVIET UNION (66+ MILLION TORTURED AND KILLED), CHINA (100+ TORTURED AND KILLED), CAMBODIA (1/3 OF THE POPULATION KILLED), AND OTHER NATIONS UNDER DESPOTIC DICTATORSHIPS IN THE PAST CENTURY, WE, THE PEOPLE, MUST RECLAIM CONTROL OF OUR NATIONS, BAN THE G5 PROGRAM, PUNISH THE PERPS AT ALL LEVELS, AND DISMANTLE THE GLOBAL MILITARY-INTELLIGENCE-TERRORISM POLICE STATE SYSTEM.HOW DO I, A RETIRED UNIVERSITY GEOGRAPHY PROFESSOR, KNOW ALL THIS? I HAVE BEEN FORCED TO STUDY IT, BOTH FROM AN ACADEMIC PERSPECTIVE AND FROM MY OWN PERSONAL EXPERIENCE, AS A MEANS OF SELF-DEFENSE. FOR I AM BEING EXTRA-JUDICIALLY TARGETED BY THIS WEAPONS SYSTEM. THIS WEBSITE, A DIGITAL LIBRARY OF RESEARCH, INFORMATION AND INSIGHTS WHICH I DEDICATE TO EDUCATING OTHER TIs AND THE PUBLIC REGARDING THIS DIABOLICALLY EVIL G5 PROGRAM IS THE FRUIT MY EFFORTS. NO DOUBT, THIS EXTREMELY COMPLEX, MULTI-LAYERED PROGRAM INCORPORATES INNUMERABLE TOP-SECRET, CLASSIFIED TECHNOLOGICAL SYSTEMS AND INCLUDES MANY NESTED OPERATIONS. THEREFORE, EVEN THOUGH THIS WEBSITE NOW INCLUDES OVER 1200 POSTS OF PERTINENT ARTICLES, OFFICIAL DOCUMENTS, PATENTS, YOUTUBE INTERVIEWS, ETC., INFORMATION PRESENTED HERE IS NECESSARILY INCOMPLETE.NONETHELESS, THESE FINDINGS, AS BASED ON THE RESEARCH OF INNUMERABLE CREDIBLE AND BRILLIANT TIs AND OTHER EXPERTS, PROVIDE KEY INSIGHTS AND INFORMATION WITH WHICH TIs AND SOCIETIES CAN FORMULATE EFFECTIVE “COUNTER-MEASURES” AND BEGIN TO EXPOSE AND DEFEAT THE G5 SYSTEM. THIS DIABOLICAL SYSTEM VIOLATES SO MANY LAWS OF GOD AND MAN AND COMPRISES SUCH A BLATANT BETRAYAL OF AND AFFRONT TO AMERICA’S FOUNDING DOCUMENTS AND PRINCIPLES THAT IT TRULY IS THE GREATEST CRIME OF THE CENTURY. AS SUCH, IT CANNOT SURVIVE EXPOSE TO THE LIGHT OF DAY. TRUTH AND ACCURATE INFORMATION ARE OUR GREATEST WEAPONS AND OUR GREATEST “COUNTER-MEASURE.” HENCE, I AM CONVINCED THAT EDUCATING TIs AND THE PUBLIC ABOUT THIS PROGRAM IS THE MOST EFFICIENT WAY TO DEFEAT THIS DIABOLICAL SYSTEM, RESCUE AMERICA AND THE WORLD FROM TECHNO-FASCIST TYRANNY, AND PRESERVE HUMAN DIGNITY AND FREEDOM OF THOUGHT, SPEECH, AND BEHAVIOR.III. Other websites maintained by webmaster include:naturalclimatechange.org911nwo.comsanluisvalleywaterwatch.comerickarlstrom.comIV. Webmaster’s (ETK) Synopsis (updated January 25, 2020):The purpose of this website is to expose and defeat the global, organized stalking, electronic torture and murder, mind control, non-consensual human experimentation, neuroweapons testing, and psychological warfare operations that governments and private security contractors are now secretly waging against civilian populations. The stakes could not be higher. Freedom of speech, religion, thought, and indeed, free will and the future of humanity are at stake.I initiated this website in the fall of 2016 as an outgrowth of my 911nwo.com website. This website now contains some 1200 posts and includes multitudes of research articles, youtube interviews and lectures, pertinent government documents, laws and patents, and a variety of other means for exposing, explaining, and ultimately defeating these nefarious operations.I, the webmaster of this site, retired from a 30-year university teaching and research career in 2011. In 2013, I underwent the initial “shock and awe” confusion phase of the targeting process and realized then that I was being targeted. I soon discovered that the best “counter-measure” for targeted individuals (TIs) is to gain as accurate and thorough an understanding of “the program” as possible. Thus, my goal for this website is to provide a digital library of important information and insights free to the public. My hope is that this website will help enable many TIs, myself included, to survive and thrive, and, equally importantly, will help the peoples of our nation and world to comprehend and then dismantle this diabolically evil, global, totalitarian, New World Order (UN Agenda 2030?!) program.Organized gangstalking (aka counter-intelligence stalking, community-based stalking, contract stalking, cause stalking, workplace mobbing, gaslighting, uberveillance, bio-telemetry, and Remote Neural Monitoring) comprises psychological-psychotronic warfare operations, torture, terrorism, war crimes, and “crimes against humanity” committed by mafia-terrorist states and their public and private subcontractors against millions of innocent civilians worldwide. Victims (aka “Targeted Individuals” or “TIs”) are secretly and extra-judicially blacklisted, tracked, and targeted with no-touch torture, directed energy (so-called nonlethal) weapons, and mind/behavioral control (neuro) weapons developed since World War II under the CIA and U.S. military-industrial-Congressional-academic complex’s top-secret Project MKULTRA and MONARCH mind control programs, etc. This DOD-CIA-NSA-NASA-NATO-DHS-FBI-DNI program, which I term G5 for “Global Government Gangstalking-Genocide GESTAPO,” is the modern extension of numerous previous “counter-insurgency” programs, most of which have been internationally outlawed. Earlier versions of this program include:1) The “Red Terror” of the Soviet Union’s Cheka (All-Russian Extraordinary Commission for Combating Counter-Revolution and Sabotage) and later, KGB secret police (1917-1989)2) Counterintelligence/terrorism of the Nazi’s secret state police (Gestapo; 1933-1945),3) The East German Stasi’s terrorization and “decomposition” (“Zersetzung”) of domestic enemies/dissidents (1950-1989),4) The FBI’s COINTELPRO (COunter INtelligence PROgram) (1956-1971),5) The CIA and U.S. military’s MKULTRA and MONARCH mind control, behavior modification, and torture technology research-development-and implementation programs (1953 onward), and6) The CIA’s MH/CHAOS (1969-1975?) and the CIA and U.S. military’s Phoenix (1965-1972) counterterrorism and civilian torture, interrogation, and “neutralization” programs waged against domestic enemies in the U.S., internationally, and in Vietnam, respectively.Today’s version of these earlier population-suppression programs, however, also deploys unimaginably sophisticated surveillance, satellite, and supercomputer technologies in combination with a plethora of psychological warfare techniques designed to destroy designated “targets,” “subversives,” “enemies of the state,” etc.Dr. Rauni Kilde, formerly Chief Medical Officer of Northern Finland, explains some of the sophisticated technology involved:“The NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just as we have unique fingerprints. With electromagnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare.Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered “marginal” by the elite experimenters. (Webmaster comment: Individuals placed on the secret, classified “Terrorism Watch List” and other blacklists now predominantly include political activists, environmentalists, so-called “dissidents,” whistleblowers, “enemies of the state,” Muslims, Blacks, etc.- webmaster).Today’s microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillimeters) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS (Remote Monitoring System), a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”Targeted Individual (TI), JB Smith, elaborates: “The biochip works like a sim card. It receives pulsed, modulated laser beams and millimeter waves which it converts into electromagnetic waves that your brain interprets into digital images and sound. It then takes what your brain sees and hears and converts electromagnetic waves into digital and acoustic waves that a computer translates into audio and video. In other words, it allows law enforcement to see what you see, hear what you hear and communicate directly with your brain.”“The Program,” then, actually constitutes Fourth Generation-, Unconventional-, Asymmetric-, Information-, Cyber-, Psychological-, Civilian-military-, Psychotronic-, and Electronic Warfare, Low-Intensity Conflict, Counterterrorism, and domestic terrorism, all justified under the guise of the phony “War on Terrorism” and “National Security.” In “The Hidden Evil; The Financial Elites’ Covert War Against the Civilian Population” (2013), Rich refers to it as “a very cleverly disguised program of torture and murder.”This “program” is unconstitutional and illegal, consumes trillions of taxpayer dollars, and conscripts a large percentage of the Americans populace as citizen-spies, “surveillance role players,” and “counterterrorism specialists.” “Perps” (perpetrators) are paid, enticed, bribed, duped, and/or coerced to participate in the harassment, torture, terrorization, degradation, and destruction of innocent citizens whom government has secretly and extra-judicially designated as “persons of interest,” “potential terrorist threats,” and “political enemies,” etc. In fact, these innocent civilians are then human trafficked by a secret Cold War bureaucracy to become guinea pigs for DOD weapons testing and/or mind/behavioral control and/or brain mapping/digital cloning projects.ALL those involved in executing the G5 program are committing felony crimes up to and including murder. And by depriving other citizens of their Constitutionally-guaranteed civil liberties, ALL perps are guilty of treason. Thus, tragically, the G5 program has already criminalized, weaponized, and yes, satanized huge segments of the population.Millions of whistleblowers, “dissidents,” veterans, Christians, Constitutionalists, and other good people now fill the ranks of the classified, top-secret “Terrorism Watch List” generated at DHS/FBI Fusion Centers and their administrative equivalents in other nations. These generally innocent citizens are labeled “targetes,” “potential terrorist threats,” “non-investigative subjects”/”Code 4: silent hits” and “anomalous human potentialities,” among other terms, in military, intelligence, and police documents. The Deep State/intelligence/militaries now pay billions to trillions of dollars/year to test EM frequency and neuroweapons on non-consensual experimentees, even as they simultaneously eliminate potential opponents of the New World Order and/or remotely transform these individuals into mind-controlled “Manchurian Candidate” assassins, shooters, and “terrorists” and “patsies” utilized in scripted false-flag “terrorist” incidents throughout the world.The G5 weapon system is now being deployed in communities throughout the world. I have personally witnessed that many very low-level perps drive brand new vehicles! (The government’s “missing” $43 trillion in “unaccountable adjustments,” recently “classified” as a State secret under cloak of “National Security,” may be one source of funding for this mammoth, global “black” and “black market” operation, which is the largest in history.)“The program” (G5) fulfills the following objectives for global elites. It:1) provides an invisible, “scalable” weapons system with which elites can covertly control the minds and/or behaviors of and/or eliminate “adversaries” in order to accomplish a wide variety of political, military, economic, and social engineering objectives, ranging from personal revenge to military conquest of entire societies to genocide of 2/3 of the world’s population, a stated goal of United Nations Agenda 21 (now 2030).2) neutralizes and/or eliminates people of conscience or individuals who oppose the permanent warfare state (military-industrial complex), thus ensuring continuation of war profit and wars into perpetuity and the moulding of entire of societies into the image of their psychopathic leaders.3) comprises state-sponsored terrorism that deploys secret military weapons, including directed energy (EMF) and mind control/neuroweapons, no-touch torture, and “crisis actors” against domestic populations. (Weather warfare/geoengineering (ex.: Hurricane Harvey) and staged, false-flag terror events (ex.: Operation 9/11, the massive California EMF (electromagnetic frequency)-fires of 2017 and 2018) are other forms of state terrorism that deploy these or similar weapons.)4) provides a steady stream of non-consenting and often unwitting human subjects (lab rats) who are human trafficked through classified government contracts to corporations, hospitals, and universities for the testing and deployment of these nonlethal- and neuro-(brain) weapons.5) provides the means by which the Deep State (government-military-intelligence-mafia complex) can control and coordinate large portions of the civilian sector to function as a secret army of spies and covert operators to perpetuate their fascist control over society.6) gives elites the technological means to covertly, remotely control, enslave, and/or genocide entire populations.7) helps political, military, and corporate leaders develop and refine their ability to wage present and future wars primarily with psychological operations, mind control, and invisible directed energy (EMF) and neuroweapons.8) produces a steady stream of traumatized, fragmented, and programmed, mind-controlled “shooters” who function as either actual shooters or as “patsies” in Pentagon-funded, false-flag, state-sponsored terror events which are stage-managed to terrorize the public, empower and embolden the military-intelligence-police state, and justify the repeal of Americans’ Second Amendment right to bear arms.9) enriches the corporatocracy, organized crime, and military-intelligence agencies and stimulates the economy by: a) funneling trillions of federal dollars to innumerable public and corporate “security” and “counterterrorism” agencies and enterprises and b) asset stripping the wealth and physical and intellectual property of “targets.”10) comprises an “invisible” civil war in which elites can control both sides of a managed conflict in the American “battlespace” under US NORTHCOM (U.S. Northern Command) and U.S. Air Force mission control that deploys weaponized EM frequencies, AI (artificial intelligence), satellites, the Geographic Information Grid (GIG), telecommunications systems including satellites, cell towers, and cell phones, and advanced supercomputer and computer technology, including mobile, virtual war rooms termed C4ISR (“Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance”), and computer games.11) comprises a silent, covert coup against the civilian population, the US Constitution, the American Republic, and Western Civilization.12) corrupts, controls, criminalizes, militarizes, weaponizes, and satanizes large segments of societies.13) presages a global, techno-fascist, totalitarian, privatized military-intelligence-police state cum New World Order-one-world-government (UN Agenda 2030!?) in which most of humanity can be readily reduced to cyborg-slave status or genocided.14) provides the technological means by which futurists such as Dr. Norbert Weiner, Dr. Ray Kurzweil, Elon Musk, and Bill Gates apparently hope to ensure immortality for themselves and other members of their Judeo-Masonic-Illuminati-satanic cult through the digital replication (i.e., theft) and enhancement (“hive mind”) of human brains and central nervous system characteristics and concomitant production of “transhumanist” cyborgs. We may surmise that a chief goal of the CIA-DOD’s post-WWII “Manhattan Project of the Mind” (Project MKULTRA, etc.) has always been to develop the technological means for the elite to attain “godhood” as per Genesis 3:4-5:“And the serpent said unto the woman, “Ye shall not surely die… ye shall be as gods.””15) helps usher in a Luciferic-Antichrist one-world system: The Hebrew term, “Tikkun Olam” (meaning “reinventing or repairing the world”) expresses this goal. It appears that the long-planned “Jewish Utopia”/”Universal Jewish Empire” may involve the replacing of God’s creation and God’s people with digital, cyborg copies.Although the existence of “the program” is officially denied and its victims are routinely vilified and labeled (and institutionalized!) as paranoid/schizophrenic/delusional, innumerable books, articles, official military documents, patents, and the testimonies of thousands of credible individuals prove it has existed in various forms for well over half a century. Currently, government and media are engaged in covering up “the program” by deploying many of the same psyop-, organized stalking-, information-, and cyber warfare protocols as used in previous coverups, for instance, of Operation 9/11 and the JFK assassination.This website is dedicated to educating the public to the dangers of this evil, totalitarian system. I sincerely hope it will help save the lives and livelihoods of many “targeted citizens” (“TCs” or TIs) and will contribute to the exposure and total dismantling of this diabolical program. The U.S. Constitution is still the law of the land in America as per Madison V. Marbury (1803) which states: “All laws repugnant to the Constitution are null and void.” “Perpetraitors” must be exposed and held accountable; there is no statute of limitations for these crimes.What are the prospects for justice and recompense for innocent citizens who are being illegally used as medical lab rats for military projects? TI, JB Smith, states (2015):Mary E. Schloendorff v. The Society of New York Hospital 105 N. E. 92, 93 (N. Y. 1914): Justice Cardozo states, “every human being of adult years and sound mind has a right to determine what shall be done with his own body; and a surgeon who performs an operation without his patient’s consent, commits an assault, for which he is liable in damages. (Pratt v Davis, 224 Ill. 300; Mohr v Williams, 95 Minn. 261.)This case precedent requires police to falsely arrest you or kidnap you and call you a mental health patient in order to force the implant on you. You can also be forced to have a biochip if you have an infectious disease – like Eboli or Aids. Coalition of Justice vs the City of Hampton, VA settled a case out of court for $500,000 and removal of the biochip. Torture is punishable by $1,000 per day up to $2 million; Medical battery is worth $2.05 million.V. “The Program” Explained In Quotes:1) “What’s happening here is that we’re building a domestic military because it’s unlawful or unconstitutional to use American troops on American soil. So what we’re doing here, and let’s not kid about it, we’re building a domestic army and we’re shrinking the military because the government is afraid of its own citizens. We’re building an Army over here and I can’t believe that people aren’t seeing it. Is everybody blind?”Marine Corps Col. Peter Martino At Concord, NH, Town Council Meeting (2013) We’re Building A Domestic Army:” Marine Corps Colonel Before Concord, NH, Town Council (8/2013)2) NSA-whistleblower, Bill Binney: “NSA decided that with bulk acquisition of data, US citizens would be the first to have (all) their information collected. The rest of the world are now being treated like US citizens.(This) falls back to the principles of totalitarianism and how dictators have operated down through the centuries. It’s know what your people are doing and find the ones who are not conforming to what you want them to do and then get rid of them. And that’s fundamentally what this process does... this goes back to Caesar Augustus. Anybody that opposed him- you needed to know about it first of all, and once that happened, they would disappear. The same was true of the Soviet Union or East Germany with the Stasi. If you said anything out of line, you ended up in jail or in a sanitarium or something or in a gulag somewhere. The same was true of the Nazis and the Gestapo and SS.This is the way totalitarian states operate. This gathering knowledge about people and the entire population is a totalitarian procedure. This is the domestic threat that our Constitution and the oath of office we took was given to prevent. No other country in the world could have done to us what we have done to ourselves.This is the time when all good Americans need to stand up and oppose this. … these agencies are threatening what is fundamental to human rights everywhere. (We) have to ensure that we have some way of verifying and keeping these agencies in line.Ex-NSA’s Bill Binney on Operation “Stellar Wind;” NSA’s Totalitarian, Global, Bulk Data Acquisition Spying Program; How NSA Surveilles You(Webmaster comment: What government spy agencies like the NSA refer to as “surveillance” often refers, in practice, to extra-judicially targeting of anyone for slow-kill, soft-kill, silent-kill, no-touch torture and murder.)3) TI’s (Targeted Individuals) are tracked using the Terrorist Watchlist system. If you are stopped by police for any reason, tell the officer that your name appears on the Terror Watchlist as a “Non-Investigative Subject,” Handling Code 4, Silent Hit. (Source: http://ACLU.org)Targeted Justice for Targeted Individuals website4) Government is not reason; it is not eloquence; it is force! Like fire, it is a dangerous servant and a fearful enemy.George Washington5) The state, with the aid of psychiatrists, can effectively silence people who oppose its policies. State manipulation of psychiatry for political ends is a reality in many countries.– “The Breaking of Bodies and Minds: Torture, Psychiatric Abuse, and the Health Professions” (1985)6) The history of CIA torture runs parallel to CIA neuroscience-based mind control research and also CIA nonlethal weapons research. This is important because mind control allegations include descriptions of techniques that sound like all three CIA programs. It is possible that the related cold war CIA “no-touch” torture, nonlethal weapons and neuroscience-based mind control programs have co-mingled for intelligence uses.…. “Nonlethal weapons” are another outcome of CIA behavior control research. Steven Aftergood wrote about the initial stages of nonlethal weapons in the September/October 1994 Bulletin of the Atomic Scientists: “Details about programs to develop so called “non-lethal ” weapons are slowly emerging from the U.S. government’s secret “black budget.” … The concept of non-lethal weapons is not new; the term appears in heavily-censored CIA documents dating from the 1960s.”Dr. Barbara Hatch-Rosenberg described nonlethal weapons on page 45, “Non-lethal” weapons may violate treaties:”“Many of the non-lethal weapons under consideration utilize infrasound or electromagnetic energy (including lasers, microwave or radio-frequency radiation, or visible light pulsed at brain-wave frequency) for their effects. These weapons are said to cause temporary or permanent blinding, interference with mental processes, modification of behavior and emotional response, seizures, severe pain, dizziness, nausea and diarrhea, or disruption of internal organ functions in various other ways.”In “A Question of Torture: CIA Interrogation, From the Cold War to the War On Terror,” Professor Alfred McCoy explained:“CIA Paradigm: In its clandestine journey across continents and decades, this distinctly American form of psychological torture would prove elusive, resilient, adaptable and devastatingly destructive, attributes that have allowed it to persist up to the present and into the future. …1) Elusive: Unlike its physical variant, psychological torture lacks clear signs of abuse and easily eludes detection, greatly complicating any investigation, prosecution, or attempt at prohibition.2) Resilient: Psychological torture is shrouded in a scientific patina that appeals to policy makers and avoids the obvious physical brutality unpalatable to the modern public.3) Adaptable: In forty years since its discovery, the Agency’s psychological paradigm has proved surprisingly adaptable, with each sustained application producing innovations. …4) Destructive: Although seemingly less brutal than physical methods, the CIA’s ‘no touch’ torture actually leaves searing psychological scars. Victims often need long treatment to recover from a trauma many experts consider more crippling than physical pain.”These characteristics also apply to nonlethal weapons and neuroscience-based mind control. All three are emerging state tools of the future and can neutralize the enemy by controlling the behavior of the enemy. A 2005 book entitled, “Torture, Does it Make Us Safer? Is It Ever OK?” was co-published with Human Rights Watch. Some general reasons for why governments use torture as a state tool include the following. Governments torture because it is a way to obtain coerced confessions. The confessions can be used for propaganda purposes. Torture serves a variety of state purposes: “to terrorize certain elements of the population, to instill a climate of fear in the public more generally, and to break key leaders and members of these groups, uncovering their networks.” Another purpose of torture is to “obtain intelligence by any means,” “annihilate subversives,” and “eliminate the enemy.”Neuroweapons include the CIA’s still classified neuroscience-based mind control research, ‘no touch’ torture and nonlethal weapons. All three are emerging state tools of the future that can reliably neutralize the enemy psychologically or without killing. All are ideal for counterinsurgency warfare, psychological operations and intelligence operations. The characteristics of ‘no touch’ torture, nonlethal weapons and neuroscience-based mind control make them more inhumane than the atomic bomb.McCoy described the principles underlying ‘no touch’ torture:“Through covert trial and error, the CIA, in collaboration with university researchers, slowly identified three key behavioral components integral to its emerging techniques for psychological torture.“Discovery #1: Sensory deprivation. In the early 1950s …Dr. Donald Hebb found that he could induce a state akin to psychosis in just 48 hours. …after just two to three days of such isolation [sitting in a cubicle ..with goggles, gloves and ear muffs on.] “the subject’s very identity had begun to disintegrate.”“Discovery #2. Self-inflicted pain. …Albert Biderman, Irving L. Janis, Harold Wolff, and Lawrence Hinkle, advised the agency about the role of self-inflicted pain in Communist interrogation. …During the 1950s as well, two eminent neurologists at Cornell Medical Center working for the CIA found that the KGB’s most devastating torture technique involved, not crude physical beatings, but simply forcing the victim to stand for days at a time, while the legs swelled, the skin erupted in suppurating lesions, the kidneys shut down, hallucinations began.“Discovery #3. Anyone can torture. …Finally, a young Yale psychologist Stanley Milgram, …conducted his famed obedience experiments, asking ordinary New Haven citizens to torture on command and discovering that, in contravention of conventional wisdom, anyone could be trained to torture. …[Milgram] did controversial research under a government grant showing that almost any individual is capable of torture, a critical finding for the agency as it prepared to disseminate its method worldwide.By the project’s end in the late 1960s, this torture research had involved three of the 100 most eminent psychologists of the 20th century-Hebb, Milgram, and Janis, as well as several presidents of the American Psychiatric Association and the American Psychological Association.That notorious photo of a hooded Iraqi on a box, arms extended and wires to his hands, exposes this covert method. The hood is for sensory deprivation, and the arms are extended for self-inflicted pain. … Although seemingly less brutal than physical methods, no-touch torture leaves deep psychological scars on both victims and interrogators. One British journalist who observed this method’s use in Northern Ireland called sensory deprivation “the worst form of torture” because it “provokes more anxiety among the interrogatees than more traditional tortures, leaves no visible scars and, therefore, is harder to prove, and produces longer lasting effects.”Doerr-Zegers explained that techniques of torture work by creating deception, distrust, fear, disorientation, a “kind of total theater” that leaves the victim disoriented and “emotionally and psychological damaged.” The similarity of the explanation below to “street theater” found in mind control allegations is remarkable:As Doerr-Zegers describes it, the psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction.To make their artifice of false charges, fabricated news, and mock executions convincing, interrogators often become inspired thespians. The torture chamber itself thus has the theatricality of a set with special lighting, sound effects, props, and backdrop, all designed with a perverse stagecraft to evoke an aura of fear. Both stage and cell construct their own kind of temporality. While the play both expands and collapses time to carry the audience forward toward denouement, the prison distorts time to disorientate and then entrap the victim. As the torturer manipulates circumstances to “maximize confusion,” the victim feels “prior schemas of the self and the world … shattered” and becomes receptive to the “torturer’s construction of reality.”Carol Welsh, “Making Sense Of Mind Control and No-Touch Torture: In Contravention of Conventional Wisdom”7) The U.S. government is using mental illness as a cover-up of mind control experimentation. Many of the experiments are designed to mimic mental illness. For example, the mental illness diagnosis manual for psychiatrists states that the mentally ill patient put unusual meaning or interpretations into normal objects. The experimenters can engineer visual and audio patterns and change the amount and timing of any environment in a specific way to make the victim see what a mentally ill person would see. In my case, I have videotaped evidence of this effect.I and most survivors have not been able to obtain help. This is typical in government cover-up situations. And because of the nature of the technology itself, any efforts to stop the experimentation can be sabotaged with the mind control technology itself.Carol Welsh, “Lawsuit by San Quentin prisoner regarding microwave auditory effect in 1965”8) Brains can be stolen and raped. The authorities do it! In 1977, the New York Times published 30 articles about the CIA’s brain control systems. The most important things brought to light were that this project had already begun in the late 1940’s and that with this technology, they had built a state-within-a-state.In April 10, 1967, the New York Times editorial, “Push-Button People,” discussed the ongoing (mind control/cybernetics) experiments and warned about the dangers of this technology. They also mentioned that probably there were countries that already planned to subjugate their people using this technique. Both the U.S. and Sweden were countries that had far-reaching plans to subjugate citizens, beyond their knowledge, in brain control systems.”Also, you should be aware that many of those that sit in the (EU) parliament also have their brains incorporated into the defense departments’ supercomputer control systems. Of course, they become a type of puppet for the will of others.THE EUROPEAN COMMISSION’s ETHICAL BOARD wrote (2005):“Brain-computer interface (BCI) or direct brain control are communication technologies: they take information from the brain and externalize it…. Contemporary society is confronted with changes that have to do with the anthropological (ETK- and spiritual) essence of individuals…To what extent might this technology be misused by the military? The Member States and their ethics councils have a responsibility to create conditions for education and constructive, informed debates in this area.”Throughout the history of mankind, there has never existed anything more totalitarian. There has never been anything more anti-democratic. A dictatorship can never be greater than when its citizens’ brains are linked to computer control.The State has become a cannibal, a rapist who is eating its citizens. Transforming us into biological manipulable components.What happened during over 60 years of brain experimentation? Which doctors, professors, what institutions have been involved in the most anti-democratic project that ever existed? By what kinds of methods has it been possible to keep it off the media and from people’s attention? What is the role of the medical corporations? They are involved. FOI’s (Sweden’s DOD/DARPA) and America’s NSA supercomputers must be turned off. We are all about to become the State’s lab rats and chip-regulated behavior-skulls.(The CIA’s Phoenix Program) in Vietnam in 1970 used this same brain technology to identify and mass murder 33,000 civilians who were identified, by the technology, as Vietcong sympathizers!– Robert Naeslund: The Human Brain Project9) James Angleton summed up his career in the CIA in a mid 1980’s interview with author, Joseph Trento:“You know how I got to be in charge of counterintelligence? I agreed not to polygraph or require detailed background checks on (Wall Street lawyer and spy) Allen Dulles and 60 of his closest friends. The real problem, Angleton concluded, was that “there was no accountability. And without real accountability everything turned to xxxx.You know, the CIA got tens of thousands of brave people killed… (ETK: Actually, the figure is estimated in the range of 6 to 30 million). We played with lives as if we owned them. We gave false hope. We – I – so misjudged what happened.Fundamentally, the founding fathers of U.S. intelligence were liars. The better you lied and the more you betrayed, the more likely you would be promoted. These people attracted and promoted each other. Outside of their duplicity, the only thing they had in common was a desire for absolute power.Allen Dulles, Richard Helms, Carmel Offie, and Frank Wisner were the grand masters. If you were in a room with them you were in a room full of people that you had to believe would deservedly end up in hell. I guess I will see them there soon.”From Joseph Trento’s “The Secret History of the CIA,” (2001) pp. 478-47910) “I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the All-Highest?”-Colonel George Hunter White, overseer of four of CIA’s 149 MKULTRA Subprojects, including “Midnight Climax,” CIA/OSS (Office of Strategic Services)/FBN, in his final report to Dr. Sidney Gottlieb, head of CIA’s TSS (Technical Services Staff),11) Over the course of its 70-year reign of terror, the CIA has overthrown countless governments, started innumerable wars, costing millions of innocent lives, and otherwise subverted and sabotaged friends and foes alike. Despite all this murder and mayhem, it has only lost around 100 officers.…. CIA officers are at the pinnacle of the Brotherhood. Blessed with fake identities and bodyguards, they fly around in private planes, live in villas, and kill with state-of-the-art technology. They tell army generals what to do. They direct Congressional committees. They assassinate heads of state and innocent children equally, with impunity, with indifference.In Afghanistan, CIA officers manage the drug trade from their hammocks in the shade. Opium production has soared since they purchased the government in 2001. They watch in amusement as addiction rates soar among young people whose parents have been killed and whose minds have been damaged by 15 years of US aggression. They don’t care that the drugs reach America’s inner cities.…. The CIA plays the same role in Afghanistan that the Gestapo and SS Einsatzgruppen performed in France in World War Two- terrorizing the urban resistance and partisan bands in the countryside by targeting their friends and families. The CIA’s objective is to rip apart the poor and working class families and, in the process, unravel the fabric of Afghan society, until the Afghan people accept American domination. They don’t care how long it takes either. Afghanistan is a means to get at Russia, similar to how Nixon played the China Card in Vietnam.…. The Afghan people hate the Americans more and more, year after year. And that makes the CIA happy, in so far as it spells protracted war and increased profits for its sponsors in the arms industry.Afghan anger means more resistance. And more resistance provides a neat pretext for the eternal military occupation of a disposable nation strategically located near Russia and China. The Taliban will never surrender, and, for the CIA, that means victory in Afghanistan. But it also means spiritual defeat for America, as it descends ever further into the black hole of self-deception, militarism, and covert operations.Douglas Valentine, “The CIA as Organized Crime, How Covert Operations Corrupt America and the World” (2017)12) “The cadet motto when I was at West Point was: “You will not lie, cheat, or steal, or tolerate those who do.” But then later, when I was CIA director we lied, we cheated, we stole…. We had entire training courses on that. It reminds you of the glory of the American experiment…..”Mike Pompeo, Secretary of State and Former CIA Director, in speech at Texas A&M University, April, 201913) It is Rothschild Zionism’s control over the U.S. Military Intelligence complex, and its total subversion of this complex, which the American citizenry must collectively be made aware of. Especially since this Orwellian complex is being used in secret to brain map the entire U.S. population in the interest of ultimately reducing us to a cybernetic race of beings, whose state of consciousness will come from a neural network of artificial intelligence driven computers.Imagine a race of people all thinking the same thoughts simultaneously while being incapable of having an individual thought – a true slave race – and you can begin to understand the inherent evil which drives those who operate within the very hierarchy of this complex.If we are attempting to unravel the secret of the most perplexing mystery of this century, we should acknowledge that certain segments of mankind, in order to accomplish their power-hungry plans, have often been happy to pull a veil over the eyes of (if not put out the eyes of) their fellows who inhabit this earth.James F. Marino, “The Human Species Is On The Precipice Of Becoming A Race Of Mind-Controlled Cybernetic Slaves”V. Webmaster’s Overview-Summary Paragraph of Three of My Websites: Having explored the topics in this and my other websites (above) extensively over the past years and decades, I can finally summarize my findings in the following paragraph!:The “big lies” of: 1) 9/11, 2) the “Global War on Terrorism” and “National Security Enterprise,” and 3) catastrophic man-caused global warming/climate change are propaganda and coercive PSYOP deceptions designed to justify conquest by global military-police and imposition of totalitarian, world government (UN Agenda 2030). To achieve their long-sought Luciferic empire, Judeo-Masonic-Illuminati-satanists controlling the major nations are waging unconventional-electronic-cyber-netcentric-civil-military, information, and brain (psychotronic) warfare against civilian populations. This “Fourth Generation” warfare deploys special operations forces (SOFs) and psychological operations groups (POGs) of all military branches, government intelligence agencies, FBI, police, private security contractors, first responders, and civilian (“Neighborhood Watch”/”Citizens On Patrol”) and cult-religious groups in conjunction with false-flag, state-sponsored terrorism and weather warfare (geoengineering), “total surveillance/big data,” Global Information Grid (GIG), A.I. (Artificial Intelligence) supercomputers, PSYOPS, satellites, directed energy/”nonlethal” and neuro-weapons, the Global Neural Network (hive mind), no-touch torture, “man-machine integrations,” and “brain-to-computer” interface supercomputers for mind and behavioral control of individuals and populations. This system identifies, tracks, targets, and eliminates innocent civilians, whistle-blowers, critics of government policy, etc. who are secretly and extra-judicially classified as “threats”/”adversaries”/”enemies”/”terrorists,” etc. Elite planners expect that by 2030, these A.I. warfare and brain subjugation systems will be fully automated and will combine the above elements with 5G, the Internet of Things (IoT), SmartCities, Smart devices, and the “one-world brain;” the internet.VI. Short Definitions of Gang Stalking, Mind Control, Cults, and G5 (GISTAPWO-666):A. Gang Stalking:Gang Stalking is the common term for military-intelligence protocols used by the US government, cooperating States, private security firms, and civilian-vigilante and other groups to incrementally and systematically destroy persons secretly designated as “internal enemies/”threats”/terrorists,” “targets,” etc. Most “enemies” are invented to justify and perpetuate the phony, multi-trillion dollar “War on Terrorism”/”National Security Enterprise” system. Many targeted citizens are human trafficked and used as non-consensual human experimentees in military, corporate, and academic neuroweapons and nonlethal weapons testing programs. Synonyms for gang stalking include “Zersetzung” (German scientific term for “decomposition,” “disintegration,” “corrosion”), “counter-intelligence stalking,” “organized stalking,” “workplace mobbing,” etc. This system has been developed and deployed over the past century by “security services;” including the Soviet Cheka and KGB, the East German Stasi police, MI6/CIA/NATO’s Operation Gladio and “Stay Behind Armies” in post-WWII Western Europe, and in the FBI and CIA’s COINTELPRO (“counter-intelligence program”), MKULTRA, MHCHAOS and Phoenix Programs, among others.Gang stalking protocols incorporate covert “soft torture”-“slow kill,” “silent kill,” and “soft-kill” psyop techniques with electromagnetic (psychotronic) weapons that harass, torture, manipulate, and eliminate “targets”/”adversaries.” This global operation is here termed GISTAPWO-666; for “Global Intelligence-Syndicate, Secret, Satanic, Space-based, Surveillance, Stalking, Tracking, Targeting, Torture, Terrorism, Termination, Transhumanism And Psycho-Political, Policing-for-Profit, Psychotronic, and Psychological Warfare Operations.”Today, GISTAPWO-666 is a key component of the totalitarian, UN Agenda 21 (Agenda for the Twenty-First Century) and the U.S. military’s “New (“Unconventional”) World War” cum “full-spectrum dominance” of planet earth.Global Gang Stalking operations (GISTAPWO-666) deploy essentially the same personnel, technologies and objectives as JADE HELM and UWEX, the massive multi-state US military drills for “dissident extraction” carried out in 2015 and 2016. These “assymetrical,” “unconventional,” “network-centric,” “information,” “civil-military,” and “cyber” warfare operations (aka “Military Operations Other Than War” and “Low Intensity Conflict”) are carried out by 1) all military branches and their Special Operations Forces and psychological operations groups, 2) CIA, FBI, DHS, NSA, FEMA, etc. 3) local, federal and state police, 4) private security contracting firms, and 5) many sectors of the civilian population. Victims may be the targets of tens to hundreds of illegal, covert operations per day. These covert operations generally also involve deployment of: 1) GIG (Geographic Information Grid) satellite system, 2) AI-supercomputers, 3) “big data” derived by NSA surveillance, 4) the wireless smart phone-cell tower communication system, and 5) psychological operations (psyops), and 6) plainclothes military and civilian psy-actors, “surveillance role players,” “crisis actors,” etc.All of these operations involve secret targeting of citizens who have been extra-judicially designated as “enemies of the state”/”enemy combatants”/”domestic terrorists” and secretly placed on black lists such as the “Terrorism Watch List,” “Main Core,” and FEMA Detainment Lists. Like Operation 9/11, which provided the pretext for these treasonous activities, these black, “wet” operations are entirely unconstitutional and illegal. We may speculate that these operations are prelude to: 1) imposition of martial law and a totalitarian police state in America and perhaps worldwide, 2) enslavement and mass genocide of humanity, as called for by UN Agenda 21 (2030) documents.B. Mind Control:Since WWII, scores of top-secret mind control experiments and programs, including Projects MKULTRA, Bluebird, Artichoke, Chatter, MKOften, MKDelta, and MKSearch, have been, and are still being conducted by the CIA and the US military in conjunction with psychologists, psychiatrists and cognitive/neuro-scientists at universities, medical facilities and military bases across America. These programs build upon prior research done at the Tavistock Institute in England, in Nazi and pre-Nazi Germany, and elsewhere. They commonly involve the use of non-consenting and unwitting civilians in “terminal experiments.” The principle goal has always been twofold: 1) to “get control of an individual to the point where he will do our bidding against his will and even against such fundamental laws of nature such as self-preservation” (wording from original 1953 MKULTRA documents), i.e., creation of programmed multiple personality “Manchurian Candidates”-mind-controlled assassins, and 2) to create a “pscyho-civilized” (aka “mind-controlled,” bio-robotized) society. To achieve these ends, all manner of chemicals, biologicals, drugs, electro-shock, sleep and sensory deprivation, brain implants, electromagnetic frequencies, and torture techniques have been tested on human subjects.C. Cults:In recent centuries, intelligence services have created innumerable cults, including the Rosicrucians, Freemasons, Illuminati, Theosophy, Mormonism, and a host of UFO, New Age, Christian, and Satanic cults, including Scientology, Jonestown, Children of God, Heaven’s Gate, Church of Satan, Temple of Set, Branch Dividians, etc. These cults are mini-totalitarian systems that provide cover for controllers to advance various secret agendas, including subjugation of cult members through coercion, mind control, traumatic abuse, forced and slave labor, etc. A look at “deep politics” reveals that the “master cult” is the Judeo-Masonic-Illuminati, a satanic cult based on the black magic system of the Jewish Kabbalah. The long-term plan of the “slave masters,” as spelled out in the Old Testament, Talmud, Kabbalah, “Protocols of Zion,” and the Communist Manifesto” among other documents, is global dominion. The phrase, “Tikkun Olam,” Hebrew for “reinvention or repair of the world,” refers to the coming Jewish world empire- the Jewish Utopia. Under Noahide Law (Jewish law for gentiles), all non-Jews (goyim) would be robbed, robotized, enslaved, and/or genocided.D. G5- Global Government Gangstalking-Genocide GESTAPO:The following 13-minute video by DJ Welsh of Level 9 News explains G5’s larger context. The US government/Pentagon is implementing a computer-driven “autonomous warfare system” designed to achieve “full spectrum dominance of the human terrain.” This system regards civilians as “combatants” and “human inventory items,” identifies desirable and undesirable groups and individuals, and deploys “electronic warfare” (EW) and “man-machine integrations” to target and remove “undesirables” in order to “master the human domain.” TCs (“targeted citizens”) are being targeted by this system.In “YOU Are THE ENEMY” (2014), Preston James, Ph.D., of “Veterans Today” identifies America’s rulers as the International Zionist Criminal Syndicate (IZCS). In Revelation 2:9 and 3:9, Jesus Christ refers to this system as the “Synagogue of Satan.” Their goal, in my opinion, is to implement fascist, one-world government/UN Agenda 2030 under the transhumanist, antichrist-BEAST system. The interests of the American people, the American constitutional republic, and humanity itself may be best served by filing a class action lawsuit against the U.S. government. For further information, insights, and clarifications please refer to the nearly 900 posts on this website:VII. Introductory Statement to “TCs” (Targeted Citizens) and Others:If you are a “Targeted Citizen” (TC) (aka “Targeted Individual” (TI)), you have been secretly and extra-legally designated by unknown and unaccountable persons as an “enemy of the state.” The full resources of the State, including the civilian sector, are coordinated by the Department of Homeland Security (DHS) and the FBI to slowly, silently, and secretly torture, terrorize, and kill you. In other words, the Federal-State bureaucracy collectively termed the “Interagency,” which includes the military, intelligence, paramilitary (police, private security and intelligence firms), academic, legal, and civilian sectors, is waging psychological, chemical, and electronic warfare against you. (See: “New World War; Revolutionary Methods for Political Control” by Mark M. Rich, 2011).As “enemy of the state,” you are a non-person, very much like the “detainees” at Guantanamo Bay and the Palestinians. Your constitutionally-guaranteed civil liberties and due process of law have been (illegally) stripped. You have been secretly enrolled in a highly covert program that intelligence services have developed over the past century to terrorize and eliminate political enemies, foreign spies, heads of state, journalists, “dissidents,” critics of government, activists, etc. Unbeknownst to you, your name probably appeared on a classified, secret blacklist, such as the “Terrorism Watch List,” before your targeting/torture began. Bottom line: Officially, you are now an “it,” a “target,” and no longer a legal person.Rather, you are an (illegal) “covert operation” to be executed by military, intelligence, civilian, and any number of non-governmental agencies on behalf of the State. You are a potential “contract” for thousands of private security firms such as the FBI-spinoff, InfraGard, and the Israeli Mossad-spinoff, Black Cube. These and other mercenary and organized crime groups partner with the U.S. government, FBI, DHS, CIA, police agencies and others to wage the phony “war on terrorism” against you and millions of other innocent civilians worldwide. You may also be a non-consensual human guinea pig in one or several of the innumerable DARPA-Pentagon-funded weapons-testing and mind control programs and experiments now being carried out secretly and globally which involve hundreds to thousands of neuroscience-psychology-biology-computer science departments at universities and medical facilities.“Counter-terrorism” is an integral part of the “National Security Enterprise,” the “Global War on Terrorism,” and the Pentagon’s “Fourth Generation Warfare”/”Revolution In Military Affairs” (RMA). Most “targets” are innocent civilians who have been designated as “enemies” to help justify the multi-trillion dollar “National Security”-“Counter-Terrorism” corporate-military-intelligence-police complex which drives the American economy as well as the global “terrorism” economy (which also profits from arms and drugs sales, human trafficking, sex trafficking, child trafficking, etc.). Since 9/11, some $9 trillion in federal funds has been transferred from social programs to the National Security Establishment and over $6 trillion in federal funds have been squandered to prosecute foreign wars of aggression under the pretext of “The War on Terrorism.” These wars primarily benefit (greater) Israel and the corporate-military complex.Many Targeted Citizens are unaware they are being targeted, tracked, and monitored via satellite and supercomputer and on-the-ground government and private security spies and community-based agents (CBA), informants, etc. They are unaware that their day-to-day activities are surveilled, manipulated, disrupted, and controlled by shadowy military special forces operatives and other government and private security agents, vigilantes, paid street thugs, and other “useful idiots” and “useful idiot groups.” They are unaware that hordes of mind and behavioral scientists at hundreds to thousands of universities and medical facilities are essential participants in these operations.Georgetown University neuroscientist and “neuro-ethicists,” Dr. James Giordano, spelled out the rational for these highly treasonous activities in a 2017 lecture at Lawrence Livermore Laboratories in Livermore, CA:“We” (Pentagon-big science-National Security Establishment) need “viable targets” “to test our latest neuroweapons and neurotechnology.” Giordano also noted that “mortality and morbidity (in these programs) is real.”Regardless of his/her level of awareness, the “TC’s” life, freedom, and sovereignty are disrupted, controlled, and effectively, stolen through these operations. TCs now effectively inhabit an unreal, false world, a virtual “electronic concentration camp.” The invisible fence of this cage is comprised of lies, spies, “surveillance role players,” “spotters,” setups, covert ops, psyops, defamation campaigns, betrayal by friends and family, electronic assaults and manipulations, and scripted sabotage and street theater by strangers- all designed to psychologically break down the TC. As noted, many TCs are also “disposable subjects” in (CIA) MKULTRA-style “terminal experiments” that involve torture and/or mind mapping/mind cloning from electromagnetic and neuro-weapons. Similar techniques were deployed against civilian populations by the Soviet Cheka and KGB, Russian FSB, East German Stasi, CIA-MI6-NATO’s Operation Gladio in Western Europe, FBI’s COINTELPRO, CIA’s MHCHAOS and Phoenix Program, etc. Similar technologies were recently deployed against American and Canadian diplomats in Cuba. Luke Harding, journalist with The Guardian, describes his own targeting by the Russian FSB (Federal Security Service) in his book, “Mafia State” (2011).A 2003 Boston Globe article states that the Department of Homeland Security (DHS) plan is to recruit 100 million citizen-spies to fight the “War on Terrorism.” Is it any wonder that unemployment in America today is at its lowest (3.9%) since 1969, when the FBI’s secret COINTELPRO, the CIA’s top-secret MHCHAOS and Phoenix political spying/sabotage/murder programs and the CIA’s MKULTRA mind control programs were in full swing? Is it any wonder that America is falling apart? Effectively, CIA-DOD-NSA-FBI-DHS, etc. are staging a covert civil war here.VIII. The Bigger Picture:I regard the late Dr. Rauni Kilde, former chief medical officer of Northern Finland, political insider, and author of “Bright Light on Black Shadows,” as perhaps the world’s leading expert on organized stalking and mind control. These essential insights of Dr. Kilde provide the much-needed context to help explain G5 operations:a) The elite have plans to get rid of 2/3 of the world’s population with electromagnetic warfare, chemical warfare, and psychological warfare.b) The nations, and by extension, the secret services, militaries, etc., are the “plaything” of the (ETK: Judeo-Masonic-satanic) elite.c) Mind control, MK, is listed as a “non-lethal weapon” by the military. This technology links the brains of people via implanted microchips to satellites controlled by ground-based super-computers.d) All the US military branches are involved in developing this technology, in cooperation with civil institutions like the Department of Health, in what is known as the NEURAL NETWORK ASSOCIATION. At their 1991 conference, it was revealed that they submitted and endorsed over 1000 projects in brain-computer technology at 350 medical centers, universities, etc.e) Cybernetics, full neurological control and communication, has been in use since the 1940s without the knowledge of the public. The objectives are behavior modification and influencing mental and bodily functions, processes, and emotions remotely through computer-satellite links.f) Directed Energy (DE) weapons, mostly EMF (electromagentic frequency) and acoustic weapons, act on the psyche and the body of human beings and all living creatures. They have been called by many names: Psycho-physical weapons, weapons of information warfare, psychotronic weapons, cognitive weapons, neurological weapons, mind-invasive weapons, mind control and electronic harassment weapons, remote neural monitoring, active denial systems, weapons of electronic warfare, means of neuro-linguistic programming, means for behavior modification, means of influence technology, computerized brainwashing machines, devices to zombify people, means to induce mental and physical illness, means for hostile surveillance, people zappers, and weapons of mass destruction.g) On July 21, 1994, the U.S. Department of Defense (DOD) proposed that “non-lethal” weapons be used against anyone engaged in activities that DOD opposed. That could include almost anyone.h) The secret services and their sabotage and terror “departments” are the biggest “terrorists” in the world and work together with the mafia. That was the case even in World War II.i) More crimes against humanity have been committed under the shield of “national security” than people can ever know…. possibly even more than the mafia.j) Mass remote mind control of the population is achieved via the mobile phone network.k) This is the main policy of the United States government.IX. ImplicationsThe implications of the above statements, all of which are documented on this website, are profound and staggering. They include:1) The American corporate-military-intelligence complex’s fraudulent “War on Terrorism” and “National Security Enterprise” system comprises a multi-trillion dollar business. Its perpetuation requires the perpetual destabilization of domestic and foreign populations and continual creation and/or invention of foreign and domestic “enemies,” “adversaries,” “threats,” and “targets.”2) The duly-constituted US government has effectively been overthrown. Criminals controlling the US government have scrapped the US Constitution and are waging war on the American people.3) Through the use of incessant, fear-inducing propaganda and the GISTAPWO-666-organized stalking-electro-terrorism system, government leaders have successfully manipulated millions of American citizens into becoming “perpetrators” who stalk and terrorize their fellow citizens, thus effectively stage-managing a civil war.4) America today is a fascist corporate-civil-military-intelligence-police state,5) The US government is more or less indistinguishable from the international criminal syndicate that controls it. Veterans Today contributor, Dr. Preston James, Ph.D., identifies this group as the International Zionist Criminal Syndicate (IZCS). Thus, the U.S., like Russia and many Third World nations, is a “mafia state,”6) The international criminal syndicate controlling America appears to be behind or at least co-extensive with the Illuminati-New World Order-UN-one-world-government antichrist system.7) The leaders of this international criminal cabal have a long-term plan to genocide the majority of the population and to reduce the rest of us to mind-controlled slaves.8) As noted, the late Dr. Rauni Kilde concludes: “Mass remote mind control of the population is (to be) achieved via the mobile phone network.”9) Thus, among other things, “TCs” could be ‘beta tests’ for the remote, electronic torture, mind and behavioral manipulation, and possibly extermination of the population through the 5G-AI-IoT-internet-cyber warfare system. In 1979, Israel created Operation Talpiot to achieve wireless control over humanity through their control of these technologies.X. Terminology IssuesThe term “gang stalking” is an inadequate descriptor for this monstrously evil system. “Counter-intelligence stalking” better identifies its predatory inventors and primary perpetrators. Here, I often use the more comprehensive term, “GISTAPWO-666,” an abbreviation for “Global Intelligence-Syndicate, Secret, Satanic, Space-based, Surveillance, Stalking, Tracking, Targeting, Torture, Terrorism, Termination, Transhumanism And Psycho-Political, Policing-for-Profit, Psychotronic, and Psychological Warfare Operations.”The terms “Targeted Individual” (TI) and “dissident” are also inadequate and misleading. Rather, we “Targeted Citizens” (TCs) are generally more accurately characterized as “truth-tellers,” “whistleblowers,” “peace activists,” “human rights activists,” “veterans,” retirees,” “Christians,” “patriots,” “constitutionalists,” “critics of government policy,” “individuals thought to represent a particular demographic group, ” i.e., just about anyone.XI. The Following Quotes Help Explain The Logic and Dynamics, and Identify The Perpetrators of the “Global Gestapo” (G5):1) “If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”Page 2 of 2I. Organized Gang Stalking; An Aggressive Campaign That Will Astound You by DT StocktonOrganized Gang Stalking, Electronic Harassment, Psychotronic Tortures by DT StocktonWhat you are about to read will seem paranoid and crazy. What is crazy is that all this information is true and there is a trail of evidence that proves these facts. As you read, you will learn of acts of terrorism and acts of treason being perpetrated against the American people and people around the world by the Intelligence Agencies of many countries. These acts include, but are not limited, to “gang-stalking”–systematic attempts to drive a target crazy (i.e. “gas lighting”) and/or attempts to drive a target to murder and/or suicide. It is a campaign that will astound you.In my investigations, I have discovered that the intelligence agencies not only from the United States, but also from the following countries are involved: Canada, England, Great Britain, France, Germany, Australia, India, Pakistan, Israel, Poland, Czechoslovakia, Jamaica, the Philippines and possibly, Japan, Ireland, Africa, Italy, Monaco, Venezuela, Mexico, Guatemala, El Salvador, China; however, keep in mind that there is a strong possibility that others are also involved. This is being conducted worldwide under the Echelon Project.These agencies are forcing people–homeless and runaway children, homeless adults and mentally and physically-challenged persons, released from institutions under the Reagan-Bush presidencies–through these illegal acts, to become government-controlled informants, and implanting a device called a “burst bug” in their ear. These controlled informants are the people conducting unscrupulous activities, which include gang-stalking, assault, murder, identity theft, break-ins, robberies and the sabotage of automobiles, electronics, especially computers, etc. They are pushing people to commit homicide and suicide. They are also being used to falsely accuse targets of crimes such as child molestation, rape and white collar crimes, framing them for these crimes and then lying in jury trials, etc. This has been the case with Martha Stewart, Michael Jackson and Dan Rather, to name just a few. Many of these controlled informants are also convicted murderers, pedophiles, rapists, etc. The intelligence agencies hide their criminal records and many of them continue to commit the same offenses upon society, where the intelligence agencies turn a blind eye.These crimes are also being conducted so that the Pentagon and the intelligence agencies can convince Congress, by manipulation, to pass legislation, such as the National Identification Card, the Patriot Act II and other bills which contain subsections which are not known to the general public and even the Congress. It is the Pentagon and the intelligence agencies including the military that are conducting these criminal acts and acts of terrorism so that they can pass the necessary legislation to eventually abolish the Constitution and all of our civil liberties and achieve the Military Industrial Complex, and, as former president George Herbert Walker Bush stated, the New World Order, which is a one-world government.Through my investigations and by being a target myself of these informants, I have found that government-controlled informants in the African-American and Hispanic communities are 3 to 4 in 5. In the Middle Eastern and other foreign communities such as Indian, Pakistani, Asian, Africans, Jamaicans, Zimbabwean, etc., it seems much higher. I have found that 4 out of 5 are government-controlled informants and many times 5 out of 5. And in the overall U.S. population, including the white communities, these government-controlled informants are 1 in 5.Many of these foreign individuals are often wanted criminals in their native country and other countries. They often have criminal records and outstanding warrants. And some have been military trained either in foreign countries or the U.S.The burst-bug device is a tracking device and a listening device, which gives the controlled informant the amazing ability to hear at a super human level. Individuals with the burst-bug implant can hear the quietest whisper from across a room; it gives a deaf person the ability to hear. It permits the Pentagon and all other intelligence agencies to hear conversations in real time, which are digitally recorded. Through the burst-bug, the intelligence agencies are conducting voice analysis and voice recognition. The intelligence agencies are giving instructions, in real-time, on how to handle a target situation, or things to say to a targeted person. The government-controlled informants, who are gang-stalking the target will often repeat parts of what is said on a target’s phone conversation from illegal phone taps. This lets the target know that they are being both watched and monitored. This method makes a target feel paranoid or think they are crazy. The use of this device in this manner is also used in courtroom circumstances, guiding the informant on what to say in trials when they are on a witness stand.I have discovered this burst bug in children as young as two years old and seniors as old as 86 years. The intelligence agencies are training these people to be terrorists and to be loyal only to them. With this manipulation comes a great deal of brainwashing and pure fear.For those that want to dispute this, I have several family members and friends of twenty plus years who are forced to be government-controlled informants. I have been attempting to go public with this information for several years, so to get the terrorism against me, my family, friends and the many other targeted people to cease. And to restore freedom as we believe it to be. However, one of many problems that I have had has been that the intelligence agencies have damaged eight computers in an attempt to prevent this from occurring. I have hidden all evidence of this so to preserve itAll of these activities are conducted by the Intelligence Agencies under “The War on Drugs”, “The War on Crime” and “The War on Terror.” This is ironic considering that the intelligence agencies are the criminals and terrorists. The intelligence agencies have been illegally investigating Americans and businesses since 1980, through illegal wire taps, the bugging of homes/offices/ automobiles, the placing of tracking devices on vehicles, and whenever possible, on a target’s person, in items such as a watch or clothing, etc. They are also using GPS in cell phones to track their targets. They have been investigating financial records, often using their controlled informants to do these illegal activities. The premise under which they are conducting illegal activities is that we are all guilty of something. So with that as their starting point, they are launching investigations, violating all federal and state laws, all constitutional rights and all civil liberties. Their behavior and actions are as if we are their property, and they will do with us as they so choose.The War on Drugs is the cover that the Pentagon uses, through the CIA, to take over all aspects of the illegal drug business, from growing and manufacturing, to importing/exporting, to sales. At least 99% of all illegal drug growers/manufacturers and dealers are government-controlled informants with the burst-bug.The burst-bug operates at various frequencies, hence the word “burst.” The frequency range for this device can go as high as 22GHz, and because it is government standard, can go above 22GHz, possibly 24GHZ and higher. This device is most often detectable with detection equipment called OSCOR, which stands for Enhanced Omni-Spectral Correlator, with the 21GHz down converter. However, because of their constant surveillance of me with illegal phone taps, listening device bugs and the sabotage of my computers, they have full knowledge that I am going public with this information; therefore the frequency is expected to be kept at an above 22GHz level for the present.For those being gang-stalked, the burst-bug implant in informants is how they are able to have precise timing accosting targets unexpectedly. They have this down to a science. Keep in mind they have hundreds of billions of taxpayers’ dollars at their disposal. And their budgets have been increasing under these bogus wars for the past 30 years. This will assist you in your ability to prove what is occurring. Gather the evidence against these individuals and intelligence agencies, and it will give you the power to both fight back and to sue under many federal laws including but not limited to The Patriot Act. Keep in mind that both these informants and the intelligence agencies are defined as terrorists under the Patriot Act and other federal laws. This is where The Patriot Act is a double–edge sword. Moreover, they are guilty of treason under our Constitution.Another fact, according to an individual who did work for the CIA under the War on Drugs and several informants who have put their lives on the line to tell me information, is that there is No Paper Trail!They are using these acts of terrorism and acts of treason to achieve the Total Military Industrial Complex. President Eisenhower warned us about this in his last speech before leaving office.Because of their constant terrorism against me dating to 1986, as well as their terrorism against my family, friends and anyone connected to me, I have had to turn the tables and investigate them. And because the intelligence agencies are fully aware of my knowledge, they have launched a campaign to destroy my credibility, which simply will not work. What you are reading is a miniscule drop in the bucket.And now I need your help in exposing these murdering terrorists and to seek justice under our laws. Investigate for yourselves. You will understand that this is the truth. And when you come to realize the terrorism, the treason, the murder, it will shock you, scare you and anger you. So, whatever it takes, gather the resources you need to fight and expose this betrayal to the American people and the illegal use of our tax dollars against us in such a horrendous manner.For those of you that live with rose-colored glasses, and have a difficult time accepting truth and reality—grow up! It is time to face adulthood, to face the realities of life and deal with life as it is. And only together can we fight this evil. All laws are in our favor.Furthermore, if what is stated here is not true then explain why at minimum 90% of all businesses and corporations across this country, and I presume across the world, are owned and controlled by government-controlled informants, giving the Pentagon, FBI, CIA, the NSA and the Military just several years to achieve the Total Military Industrial Complex. The following businesses are just a small example. You will find that all are owned by government-controlled informants and that most, if not all, of the employees are also government-controlled informants, and all are controlled by the intelligence agencies. The intelligence agencies tell them who to hire and who to fire, how much to pay and how many hours to employ them. Every facet is dictated. These controlled informants have been and are still perpetrators in gang-stalking and all other forms of terrorism and acts of treason against this country and its citizens. They get jobs after the intelligence agencies deem that they have earned it and they must continue to earn it. These acts of terrorism are also perpetrated against them by other controlled informants, which is a psychological warfare tactic used to control them. It keeps them living in fear.The burst-bug links all and the digital recordings will prove everything. Evidence shows us the truth.The following information is not bashing foreigners. In my investigations I have found that most, if not all foreigners who have entered this country since 1980, to gain an education and/or work and reside in this country are government-controlled informants. Keep in mind these people do not understand our way of life and our foundation under the Constitution. They simply have no respect for us Americans and our country. They are betraying us right under our noses and are truly enjoying it. As these people gang stalk me, I see the glee in their eyes and the smirk on their faces. It is my belief that they really enjoy the fact that they are taking our money and committing terrorism and acts of treason against us. When doing business with these controlled informants, we are empowering them with our money. They have been taking our jobs and businesses and betraying the American people with acts of terrorism and acts of treason.Under the Patriot Act government-controlled informants are terrorists, who have no rights to own or possess property, businesses nor do they have a right to the custody of their children.Jobs which are being exported to places like India, etc. are their reward for the domestic spying, domestic terrorism (i.e. gang-stalking), which they are conducting while in the United States and other countries.Operation TIPS has been illegally in place under these methods for several decades.Many companies and corporations have been taken over illegally by the intelligence agencies right under the noses of the masses and politicians.All United States Postal, UPS, Fed Ex, DHL, and many courier service companies and employees, that I have met and observed, are government-controlled informants. All postal employees are guaranteed job security for life, so for the intelligence agencies to take over the postal service, they had to place a few of their controlled informants in position so that they could gang-stalk the others who were not under their control. With these tactics they drove some to the breaking point and they snapped, hence “going postal.” The intelligence agencies and their controlled informants committed plain and simple, acts of terrorism.All doormen, maintenance workers, superintendents, management companies, which I have investigated and observed in the past several years are government-controlled informants involved in these unscrupulous and illegal activities. I have also found this to be true with airline and airport employees. Jet Blue is a prime example of what I state here. It is my strong belief that the Founder and ex-CEO David Neeleman is a government-controlled informant.Several other companies and corporations are Con Edison and Time Warner Cable from executives to repair personnel; Amtrak, MTA, PATH, bus drivers, etc. from administrative personnel to train crews to track repair; Parks Departments throughout this country, from executive personnel to maintenance personnel. And Trash Removal Companies, such as Waste Management are another. This continues to occur throughout this country. Parking lot and garage companies and corporations have also fallen prey to these actions. Many security guards and security companies, home security companies are also controlled under the intelligence agencies.Charity organizations such as The Salvation Army, Goodwill, Volunteers of America and Gods Love We Deliver, from administration personnel to thrift store employees, are another small example.Political organizations such as the American Civil Liberties Union are being sabotaged from within. It is my belief that Anthony Romero is a government-controlled informant.All libraries from public, private and universities etc. have been taken over with controlled informants in positions such as security, administration and other aspects of duties. This is how they have been illegally censoring books from their collections. This is how they have been monitoring targeted persons’ reading interests and other behavior such as computer usage and history. All computers have spy ware linked to the intelligence agencies. They also have the ability to take over and control these computers by closing programs and other such activity. I have witnessed this first hand.All professional fields have been infiltrated and often taken over by the intelligence agencies using their controlled informants, such as, hospital workers, physicians, therapists, psychiatrists, ministers, prosecutors, public defenders, judges, police, firefighters, attorneys, paramedics and several politicians and lobbyists, etc.Police departments have many infiltrators in them. Many are foreigners, as well as Americans, who are betraying the confidence and trust of their fellow officers. They are intentionally attempting to setup and often frame their fellow officers for crimes so that the feds can force them to become a government-controlled informant. This is the secret and treasonous building of the military-police-state.Students at universities, colleges and trade schools are being targeted. Some are being recruited to be government informants under the guise of doing the right thing for the country to end crimes such as rape, murder and drug use. After spending the past several decades stiffening the penalties, for drug use/possession and other crimes, the intelligence agencies have utilized these penalties through their government-controlled informants to setup and often frame individuals for such crimes. Since college is where young adults start to experiment, the intelligence agencies are forcing them to become government-controlled informants by lying, scaring and terrorizing them. After 27 years of recruiting among college students, these adults are now career professionals.There are systematic methods used to put businesses out of business and sabotaging businesses from within. One such method is that a government-controlled informant will purchase a building and over inflate the rent so that the existing business cannot afford the large rent increase which drives the business under. Then they lower the rent to something more reasonable for the controlled informant that rents that same space. Another method used is to send a controlled informant building inspector to say that the building needs work and/or is unsafe and the need to put up scaffolding, and/or road construction is needed, which hurts/drives down business. They often take over manufacturing companies and raise the minimum purchase order requirement which is not within the ability of a small business to afford. Slander is another tactic. They will spread lies and rumors about a business or it owner(s). Often they will have controlled informants infiltrate a business, in positions such as cook, bartender, etc. and sabotage the business from within with tactics like bad service, etc.Eminent Domain is another form of domestic terrorism utilized by the intelligence agencies. Investigate all parties involved including the developers and you will see that it is all linked to the Pentagon and the intelligence agencies. I further challenge anyone to prove this information to be untrue.For those that are losing or about to lose their home from a foreclosure, this is the work of the Pentagon and the intelligence agencies. The intelligence agencies have illegally taken over all banks, and their government-controlled informants control and/or own many of the mortgage companies. The agenda is for all of us to live in housing which is controlled under the Military Industrial Complex. This is one of many steps they are taking to achieve the Military Industrial Complex, which is to own and control everything.HAARP, EMP, Pulse and Direct Energy weapons, contrary to the propaganda and lies that the intelligence agencies and the military disclose to the public, are extremely lethal. These weapons are used to take down airplanes and terrorize a targeted person over a period of time. These weapons come in the form of vibrations, which can be used to target a specific organ in the body causing scar tissue to form leading to the death of that organ. These weapons can cause heart attacks and strokes. In my experience, there are approximately 100 plus vibrations that attack the heart. There are vibrations that cause panic attacks and sleep deprivation. There are vibrations which cause a targeted person to go mad and/or crazy, as well as many other capabilities. For various reasons not everyone can feel the vibrations from these weapons, as some people are more sensitive to smells than others and some people are more sensitive to sounds than others. However, a seismograph can record these vibrations, and will prove that they are real and unnatural in nature. And what can be proven is that HAARP, EMP, Pulse and Direct Energy weapons are in use, harmful and lethal. All controlled informants are aware of these weapons which, makes them complicit in these acts of terrorism and murder. Congress is also aware of these weapons and has failed to ban them. Refer to HR2977.These weapons are being used at retirement communities, hospitals, schools, and many other places, killing people. All that would show up in an autopsy is that the person died from natural causes, only because the degree of scar tissue caused by the weapons is overlooked and often never questioned.Anyone disputing what is stated here must be presumed to be a government-controlled informant. This is how the intelligence agencies spread disinformation. Keep in mind that the intelligence agencies have been able to keep this from the masses for the past 27 years by dismissing and discrediting others who have tried to come forward as “conspiracy theorists” and brainwashing the masses with the idea that anyone saying conspiracy is crazy. I am not a conspiracy theorist, nor criminal, nor terrorist. I only base my information on facts which I have gained through years of gathering evidence through my investigations and experiences. Evidence permits us to see the truth.Another method used in domestic spying, since 1980, and utilized in individualized gang-stalking/terrorism is the use of helicopters. The NSA are using helicopters equipped with technology that most people will not believe exists. They are also using heat sensors, which the federal courts have deemed illegal to use in the privacy of our homes, to illegally spy on us. For those individuals that are being gang-stalked, in conjunction with their many other methods, this equipment is being used in conducting noise campaigns. They are using the heat sensors to know what part of your home you are in and notifying the controlled informant(s) which, may live above you or next to you know, as to where to make the noise. And they are also monitoring the illegal phone taps and bugging devices. These helicopters are also illegally tapping into our computers, often interfering with transmissions, attacking it with viruses and Trojans and slowing down the computer with all types of other attacks. They are also relays for the HAARP, EMP, Pulse and Direct Energy weapons. At night the NSA helicopters hover at 26,000 to 39,000 feet. On bad weather they are just above the clouds at 39,000 feet. To the naked eye they look like stars and some people have stated that they look like planets. However, with a telescope you can see that they are only between 26,000 and 39,000 feet and that they are not stars or planets. Not only are NSA helicopters being used in stalking and terrorizing targets, the FBI and local police use their helicopters to take an active role in these activities, for I have witnessed this first hand.During the morning and all during the course of the day the military fly their spy planes over this entire country, including farm and rural towns and communities, breaking down our firewalls and breaking into our computers, including company and corporate computers, which have wireless capabilities. They are also installing spy ware through these wireless means. Microsoft’s Windows XP has three (3) back doors, which Microsoft will not discuss nor will they state as to why they are there. However, I believe I know why they are there; it is for this very purpose, so that the intelligence agencies can illegally spy on us and interfere and repress us Americans. I believe when the government went after Microsoft for unfair business practices, this was part of their settlement agreement with the Bush Administration.It is my belief that because of the close monitoring of me and the intelligence agencies being fully aware that I am now going public with this information, they recently came forward about themselves and their illegal abuses of the Patriot Act with the illegal investigations into many Americans. However, they only told the smallest truth, the rest were lies. The number of persons investigated is in the millions not thousands and they have been doing this for many years prior to the Patriot Act. Not only is the FBI conducting such abuses, the intelligence agencies are far reaching, including the CIA, the NSA and the Pentagon. The IRS is also involved. When it comes to the requests for information from the libraries on a “person of interest,” they have been doing this verbally through the burst-bug, with no paper trail. It is my belief that the requests for information through paper protocol have been recently done to cover their tracks.Politicians are also being targeted by illegal investigations and gang-stalking tactics. Senator Craig is a prime example. Also, many secretaries and receptionists of politicians are controlled informants who are spying on them, often blocking people and information such as deleting emails, voicemails and intercepting letters from getting to the politicians.The Pentagon and the intelligence agencies have been illegally manipulating and interfering with elections in this country by using their controlled informants. All informants are controlled on every level including: if they vote and who they vote for, which is why many do not vote, unless they are told to do so. They have infiltrated all Presidential Candidates Campaigns and have been sabotaging them from the inside. I watched first hand the presidential election in Ohio being sabotaged by these government-controlled informants, at the voter registration offices, campaign offices and at the election polls. And I did collect names. These activities were also done against Grey Davis of California. I was first told in 2001 about what was going to happen to Grey Davis in 2003. Many of the persons who were involved in the proposition of the recall of Grey Davis were government-controlled informants led by the intelligence agencies. And what this has led me to believe is that these events are well orchestrated and planned years in advance regardless of what the majority of the people want. In the case of the Florida presidential election the Feds used their government-controlled informants who happen to be police officers to prevent many black voters from voting. I challenge anyone to investigate those police officers involved and you will find that they have the burst-bug implant.Three last facts: One, all payphones, throughout this country, have been tapped since 1980. Two, the Pentagon is operating various conspiracy websites, one being http://www.911TruthOut.org, using their controlled informants. Three, on Sundays, they run the Truth Movement at St. Marks Episcopal Church, using their controlled informants. Now ask yourselves, why?The terrorism is well orchestrated. The campaign against all Americans and this country from within will astound those who investigate further. It is simply insane how the intelligence agencies will stop at nothing to achieve their goal, which is “Total Control.”Part of a series of articles published by Citizens Against Human Rights AbuseOvert Harassment: Preconditioning for Electronic HarassmentOvert HarassmentOvert Harassment — which obviously is meant to be observed — may be intended to “precondition” individuals for eventual long-term electronic harassment. Persons terrified by unexplained overt harassment are not likely to cope with the sudden onset of electronic harassment in any more reasoned fashion. This phased pattern of harassment is apparent in all of the cases now being investigated. The fact that the overt harassment continues in these cases even after the electronic targeting commences suggest that the objective is to maintain long-term extremes of stress.Many of the overt harassment tactics discussed below are surfacing in cases which (so far) have not involved discernible forms of electronic harassment. These are cases involving so-called “whistleblowers” who, because of their inside knowledge of certain potentially newsworthy events, pose particular threats of embarrassment to the Government or to government-affiliated employers. We have noticed that electronic harassment is beginning to surface as a form of retaliation against persons who try to assist electronic “harassees.” Retaliation suggests loss of control. Under these circumstances, we are not entirely confident that “whistleblowers” will continue to be exempted from this type of harassment in the long term.The individuals now in touch with the Project describe their circumstances as involving most, if not all, of the following overt forms of harassment:* Sudden, bizarrely-rude treatment, isolation and acts of harassment and vandalism by formerly friendly neighbors.* Harassing telephone calls, which continue even after the targeted individual obtains new, unlisted telephone numbers.* Mail interception, theft and tampering.* Noise campaigns.While unrelenting harassing telephone calls might be considered in this context, other tactics are employed. Blaring horns, whistles, sirens, garbage disposal (run concurrently in apartment settings, for excessively prolonged periods of time), and amplified transmissions of recorded “general racket” have been used on a recurrent basis under circumstances intended to persuade the individual that he or she is under surveillance.In all of these cases, the individuals’ neighbors apparently pretend to be oblivious and/or indifferent to these sudden, continuous explosions of noise.Door slamming is also a popular pastime, particularly in apartment buildings. One individual reported that, during a peak period of harassment, the neighbor across the hall began entering and leaving his apartment every 10 minutes, slamming his door loudly on each occasion. This was a daily occurrence, encompassing periods of several hours, over a period of several months. It is apparently served to trigger a door-slamming “chain reaction” on the part of neighbors both on that floor and on the floors immediately above and below. When our contact politely asked her immediate neighbor to close her door more quietly, he slammed the door in her face. Prior to commencement of this harassment, the neighbor had apparently been quite friendly and courteous.In another case, the primary door-slammer is an employee of Radix Systems, Inc., Rockville, MD, a DOD contractor engaged in the “super-secret” research and development of some type of electronic equipment.Several individuals reported recurrent, loud, strange noises in their ventilation systems during the preliminary stages of their harassment. One individual complained of being recurrently awakened in the middle of the night by the sound of wires being fed into his (independent) ventilation system. On checking further, he found that a tubular construction had been built into his vent system which appears to lead to the apartment upstairs. His upstairs neighbor is employed by the Department of Justice.A number of individuals report that occupants of upstairs and downstairs apartments appear to follow them from room to room, tapping on the floor or engaging in other activities which appear intended to advertise an ongoing surveillance.The Justice Department employee mentioned above went as far as to offer an unsolicited apology to her downstairs neighbor for an all- night “pacing about” in her bedroom (in the event he had happened to notice it). She claimed to be an insomniac. The pacing-about continued during her recent 36-hour absence from the area. When her contact politely alerted her to the fact that her apartment had apparently been entered during her absence, she told him, in effect, to mind his own business and then immediately complained to the building manager that he was stalking her.She conveniently forgot to inform the building manager that she had assiduously “courted” this individual for several months, without success; and that she had been stealing his newspapers on a regular basis. (On one occasion, she handed him a week’s accumulation of those papers, claiming that they had been left outside the door of another apartment. Her reason for collecting and saving the newspapers which had not been delivered to her directly is unknown.)* Recurrent confrontations by unusually hostile strangers; and comments by strangers which appear intended to evoke “paranoid” reactions.In this context, we note that several individuals have reported confrontations with “homeless” people who, on closer examination, were found to be fastidiously clean, though garbed in offbeat fashion (wigs included). The same “eccentric” confronted two of the individuals in contact with us, at separate distant locations. He is reported as having feigned mental illness on both occasions, and as having apparently enjoyed creating a public scene.* Entries into the individual’s residence, during late-night hours while he/she is sleeping, and/or during the day when the individual is elsewhere.In virtually all such cases, the burglars leave evidence of their visits, such as relocating objects, or by committing petty and not- so=petty acts of vandalism. In two cases, the burglar’s “calling card” was to slaughter caged pets, leaving the mangled carcasses inside their locked cages.In one case, the burglar stole several pieces of correspondence and left a packet of crack cocaine behind as a “calling card.” Our contact in this case — an individual who has no criminal record and no history of experimentation with drugs — is also being harassed (stalked) by a police officer of her community. One of his recent acts was to “frame” her with a drug possession charge. After pulling her off the road (a frequent pastime) and subjecting her to an illegal search (done, twice, so far), he conveniently managed to find a glassine packet of cocaine eight feet away, in front of his squad car. He retrieved the packet with his fingers and then charged her with Possession. Our contact found the packet of crack cocaine in her apartment shortly after this investigator reminded the attorney handling her case that the police officer had smudged his only piece of evidence with his own fingerprints. It would appear that someone is interested in correcting that police officer’s oversight.In another case, the individual reports that a tremendous amount of money has been stolen from a hiding place in her apartment, within hours after she had withdrawn the money from her bank. There were no obvious signs of entry into her apartment. The police conducted a cursory inquiry which failed to produce evidence of a crime worthy of investigation. (This case is an anomaly. Money is usually not stolen. Documents appear to be the preferred objects of theft, when theft occurs.)In another case, the burglars replaced installed light bulbs with “exploding” bulbs, many of which were ‘Made in Hungary.’ The light bulbs are now in our possession.* Rapidly deteriorating health, generally of a digestive nature.In two cases of the cases reported, massive rectal bleeding accompanied the sudden onset of sever gastrointestinal disturbances. One of these individuals abruptly terminated the deteriorative process simply by changing the locks on her door.* Sleep disruption/deprivationThis is achieved by means of overt and electronic harassment. Sleep deprivation, as a tactic, invariably surfaces when the targeted individual begins exhibiting a strong emotional and irrational response to the other forms of harassment.* Vandalism of privately-owned vehiclesVehicles invite peculiarly ferocious attacks in these harassment campaigns — slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries (frequently involving wildly fluctuating, grounded fuel gages, often within range of weapons research facilities and/or other microwave emitters); and suddenly failed brakes and clutches (possible involving anti-traction polymers, which are also in DOD’s “non-lethal” weapons arsenal). Recurrent auto thefts have also been reported.Two individuals reported finding their oil contaminated immediately after having the oil changed by reputable mechanics. In one of these cases, the oil viscosified (thickened) while the individual was driving through a remote rural area. Her car ground to a halt. Getting the “gunk” cleaned out of her engine proved to be an expensive ordeal. (Viscosification agents are also lauded by the U.S. Global Strategy Council as serving “non-lethal” strategic purposes — a topic discussed in Part I of this publication. Had this woman been assaulted while awaiting help in the said isolated area, the “non-lethal” attributes of viscosfication agents might have required redefinition.)Most of those who have experienced these attacks on a recurring basis have abandoned driving all together — an objective apparently sought by their tormentors as a means of increasing their isolation.* Staged accidents.The majority of those in touch with us have reported these types of experiences. One individual, for example, was tailgated at a high rate of speed by two vehicles, while concurrently being threatened with a gun by one of the vehicles’ occupants. Two others narrowly avoided what happened to be deliberately attempted collisions by drivers who quickly sped away from the scene. One avoided three attempts in four days at being run off the road. One survived by being run off the road in two incidents within a one-week period, which resulted in “totaling” of her two vehicles. Another narrowly avoided being crushed into an expressway retaining wall, on four occasions, by an off-duty metro bus, as well as, within the same time frame, being “fried” by two suddenly-malfunctioned household appliances which subsequently repaired themselves. It should be noted that, in some of these cases, “accidental” deaths do occur. One individual in contact with us reported that his mother drove off a cliff to her death, during a period when he was researching evidence that a still-respected, high level State Department official had passed A-bomb secrets to the Soviet Government during World War II. The accident occurred shortly after her car had undergone routine maintenance. She was returning from a dental appointment when the accident occurred. Witnesses state that it appeared that she had suddenly stepped on the accelerator before running off the road. The accident served to terminate this person’s research project.We also look into the recent death of a woman in Lexington, MO, who was killed when the brakes on her tractor failed. We are informed that she had been collecting affidavits from persons who believe they are the targets of government harassment and experimentation when her “accident” occurred. We are also informed that these affidavits have disappeared.Suicides might also qualify as “staged accidents,” particularly where “plausibly deniable” government involvement has been surfaced. We are currently looking into the recent suicide of a man in Trappe, PA, who, as early as 1981, had asked the FBI and CIA to intervene in his case. We have copies of that early correspondence. The man, a former U.S. Army radar technician, had a highly technical and — given date of his correspondence — “precocious” grasp of the experimental objectives apparently being sought in his case. It is apparent from his correspondence that he had wanted to believe that the Soviets were conducting these experiments. The FBI and CIA, of course, did not intervene. We are informed that members of his family have also been targets of this experimentation.* Isolation of the individual from members of his/her family — virtually assured when highly focused forms of electronic harassment commence.The exception to this is when elderly parents and young children in the family become targets for apparent purposes of intimidation. This situation has been reported in eight of our cases, to date.One individual (driven to extremes of stress by ongoing electronic harassment focusing on her children) killed one child in an effort to protect her from further pain. (2) It appears that lasers were being used in this individual’s case. The targeting intensified after she called the Soviet Embassy to report the harassment, which she believed to be U.S. Government-sponsored. It became even more deadly when, in a further show of defiance, she then called the representative of the Iraqi Government to portray the U.S. Government’s war in the Middle East as “hypocritical.” She is now hospitalized in a Midwestern facility, where, apparently, the experimentation is now continuing.(That psychiatric facility is in a State where a disproportionate number of complaints of electronic harassment are beginning to surface. It is also within range of a U.S. Air Force base which houses a “super secret” research facility. We are currently looking into information that spouses and children of persons employed on that USAF base may be the targets of involuntary experimentation involving direct-energy weapons technologies.)Another individual, during a telephone conversation, was told by an employee of a local power company that, if she valued the lives of her children, she would drop her public opposition to the company’s installation of high power lines. Since receiving that threat, the individual’s 11-year-old daughter has been reduced to extremes of pain, resulting in her recurrent hospitalization for treatment of illnesses which cannot be diagnosed. It is also apparent to this individual that her three-year-old son is on the receiving end of externally-induced auditory input. (DOE figures prominently in this case.)* Progressive financial impoverishment, brought on by termination of the individual’s employment, and compounded by expenses associated with the harassment.The majority of those now in contact with the Project — educated, white-collar professionals — have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers, which coincided with the other overt forms of harassment discussed above.The overt harassment tactics are being described as recurrent, non- sequential and overlapping. As noted above, the overt harassment continues even after the electronic harassment commences.[B]HR 2977 IH107th CONGRESS1st Session [/B]H. R. 2977To preserve the cooperative, peaceful uses of space for the benefit of all humankind by permanently prohibiting the basing of weapons in space by the United States, and to require the President to take action to adopt and implement a world treaty banning space-based weapons.IN THE HOUSE OF REPRESENTATIVESOctober 2, 2001Mr. KUCINICH introduced the following bill; which was referred to the Committee on Science, and in addition to the Committees on Armed Services, and International Relations, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned________________________________________A BILLTo preserve the cooperative, peaceful uses of space for the benefit of all humankind by permanently prohibiting the basing of weapons in space by the United States, and to require the President to take action to adopt and implement a world treaty banning space-based weapons.Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,SECTION 1. SHORT TITLE.This Act may be cited as the `Space Preservation Act of 2001′.SEC. 2. REAFFIRMATION OF POLICY ON THE PRESERVATION OF PEACE IN SPACE.Congress reaffirms the policy expressed in section 102(a) of the National Aeronautics and Space Act of 1958 (42 U.S.C. 2451(a)), stating that it `is the policy of the United States that activities in space should be devoted to peaceful purposes for the benefit of all mankind.’.SEC. 3. PERMANENT BAN ON BASING OF WEAPONS IN SPACE.The President shall–(1) implement a permanent ban on space-based weapons of the United States and remove from space any existing space-based weapons of the United States; and(2) immediately order the permanent termination of research and development, testing, manufacturing, production, and deployment of all space-based weapons of the United States and their components.SEC. 4. WORLD AGREEMENT BANNING SPACE-BASED WEAPONS.The President shall direct the United States representatives to the United Nations and other international organizations to immediately work toward negotiating, adopting, and implementing a world agreement banning space-based weapons.SEC. 5. REPORT.The President shall submit to Congress not later than 90 days after the date of the enactment of this Act, and every 90 days thereafter, a report on–(1) the implementation of the permanent ban on space-based weapons required by section 3; and(2) progress toward negotiating, adopting, and implementing the agreement described in section 4.SEC. 6. NON SPACE-BASED WEAPONS ACTIVITIES.Nothing in this Act may be construed as prohibiting the use of funds for–(1) space exploration;(2) space research and development;(3) testing, manufacturing, or production that is not related to space-based weapons or systems; or(4) civil, commercial, or defense activities (including communications, navigation, surveillance, reconnaissance, early warning, or remote sensing) that are not related to space-based weapons or systems.SEC. 7. DEFINITIONS.In this Act:(1) The term `space’ means all space extending upward from an altitude greater than 60 kilometers above the surface of the earth and any celestial body in such space.(2)(A) The terms `weapon’ and `weapons system’ mean a device capable of any of the following:(i) Damaging or destroying an object (whether in outer space, in the atmosphere, or on earth) by–(I) firing one or more projectiles to collide with that object;(II) detonating one or more explosive devices in close proximity to that object;(III) directing a source of energy (including molecular or atomic energy, subatomic particle beams, electromagnetic radiation, plasma, or extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation) against that object; or(IV) any other unacknowledged or as yet undeveloped means.(ii) Inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person)–(I) through the use of any of the means described in clause (i) or subparagraph (B);(II) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations; or(III) by expelling chemical or biological agents in the vicinity of a person.(B) Such terms include exotic weapons systems such as–(i) electronic, psychotronic, or information weapons;(ii) chemtrails;(iii) high altitude ultra low frequency weapons systems;(iv) plasma, electromagnetic, sonic, or ultrasonic weapons;(v) laser weapons systems;(vi) strategic, theater, tactical, or extraterrestrial weapons; and(vii) chemical, biological, environmental, climate, or tectonic weapons.(C) The term `exotic weapons systems’ includes weapons designed to damage space or natural ecosystems (such as the ionosphere and upper atmosphere) or climate, weather, and tectonic systems with the purpose of inducing damage or destruction upon a target population or region on earth or in space.II. Electronic Harassment. What is Electronic Harassment?From: Electronic HarassmentIf someone uses any electronic device to aid them in invading your person or property for the purpose of gathering information illegally, or for the purpose of causing harm, this is Electronic Harassment.Electronic Harassment comes in many forms and types. We’ll try to explain what they are and what to do about them below.Electronic SurveillanceElectronic Surveillance is the imposed observation of a person’s belongings, person or surroundings through the use of electronic listening devices, video recording or transmitting devices, spectral imaging through heat or infrared, sound or other radiation sources, and any other means of observing a person’s actions, possessions or routines. Not all forms of surveillance use electronic devices and not all forms of surveillance are illegal or considered harassment. Simply observing someone using ones eyes is certainly also considered surveillance and is not illegal in and of itself. Surveillance has become quite advanced and will become more pervasive as our society progresses in technology. Micro recorders, covert hidden video cameras (such as pinhole cameras), ultra tiny microphones, micro transmitters, and other bugging devices are easy to get by anyone at spy novelty shops and online stores.Electronic Sabotage/Interference (Jamming)Electronic sabotage or interference is any sabotage that is intentionally configuring personal property to either be destroyed or malfunction. Any intentional interference such as electronic noise generators, sound generators, light generators, spark gap disrupters, or any other form of EMI (electromagnetic interference) which either destroys, disrupts, causes malfunction or loss of resources is deemed to be electronic harassment.Directed Harmful High Energy DevicesThis is the most dangerous form of electronic harassment and is quite easy to implement against a person. Directed harmful high energy microwave devices and weapons can include such devices and equipment that are easily available almost anywhere in the World where there are people. Microwave ovens can be modified to focus and direct up to 1200 watts or more, depending on the model, of microwave energy at a person or property and are easy to produce. The results of an attack by a high energy device can be lethal, they can kill or at the least disable a human being or other animals. Attacks from high energy microwave weapons leave blisters, cause internal bruising and/or bleeding, stimulate cancer, cause cataracts, encourage tumors to grow, generate boils, or leave red patches on the skin. Directed Harmful High Energy Weapons will have effective ranges from the point of contact to several hundred yards. Directed Harmful High Energy Weapons can be used to destroy electronic devices and cause severe interference in computers and alarm systems which can allow forced entry or destruction of vital data. Radar guns are available from surplus stores most anywhere and can be obtained from ex-military sources or even police departments. Radar gun power outputs range from a two or three watts to 3 Megawatts! Portable radar guns range in size from small hand held devices to vehicle mounted long range high power models. These devices have very long ranges due to their greater power, higher frequencies and shorter wavelength. Radar guns emit long or short pulses of high energy capable of causing instant damage or death to living creatures. Semiconductor destruction or malfunction, brain damage & stopping vehicles are other uses for these devices. Other forms of directed harmful high energy include devices such as tasers, klystron guns (radar guns), ion beam guns, plasma pulse guns, soliton bombs, and many more devices.Directional Microwave EMP Rifle (PARTIAL KIT) Partial kit (shown above). This partial kit will include a 50,000W (yes it says 50KW) Watt X-band military microwave magnetron with complete spec sheets from two manufacturers and operational information to make it work (about 30 pages), EMP rifle plans (over 49 pages), and qty:3 (12KV @ 1A) rectifiers. A device such as this can be made the size of a super soaker water gun, it operates at 9.2GHz and with a properly tuned horn antenna will have an effective range of over 300 yards (possibly more with larger antenna). Such a device could possibly cause semiconductors to burn out, microprocessors to malfunction, inductors to counter induce and create CEMF, induce RF noise, cause ionization of air or gases, cause junction rectification and erase computer data on hard drives, disk and solid state device. Operating such a device may be in violation of State or Federal Laws, consult your Local authority before operating such a device. UPS GROUND SHIPPING ONLY DUE TO INTENSE MAGNETIC FIELD FROM MAGNETRON. Do not purchase this kit if it is illegal to own or operate in your area. (This kit is real and available on the internet. The above photo and description was taken directly from an internet website, but we will not tell you where to find it!)Active Denial WeaponDirected energy weapon for “Active Denial” is now being deployed by the military.Voice/Data/Image inductionThis form of electronic harassment causes an individual to think they are loosing their mind or that they have a mental illness. There are 3 known methods of imposing VDI induction.Microwave Carrier ULF-UHF Induction Method. This method utilizes a modulated microwave signal with either an audio, video, or other form of signal or even data may be used. The microwave energy with the VDI (Voice/Data/Image) carrier signal is then directed to the target area or individual. The reaction to this modulated microwave energy from one individual to another will usually be slightly different making it very difficult to diagnose as electronic harassment. The Voice/Data/Image induction form of harassment causes victims to hear voices in their heads or see random images or lights. Similar technology was developed to enable communication between humans and dolphins or even was purported to be used by secret agencies for the purposes of mind reading and control. A device known as the wireless neurophone has been patented along with other such devices that perform similar functions. A microwave carrier ULF-UHF induction device can be placed at a targets location and operated and monitored remotely. Transmission locations can be concealed in the same ways that cell telephone transmission sites so that they cannot be identified easily.Direct Contact Induction Method. This method requires direct skin contact of the subject. Voice/Data/Image induction (VDI) is induced through the skin, using the natural ability of the skin to conduct energy. The DCI method uses a simple high voltage D.C. carrier, which is modulated with the VDI signal and is coupled to the subject body using capacitive skin pads. The contacts need to contact any part of the skin anywhere on the body. The signal is received and interpreted by the nerves below the skin surface and sent to the brain which processes the information signals, causing the images or sounds or data to appear to the target without the actual use of their eyes or ears. A similar device is also known as the neurophone. There are many patents for similar devices. Evidence of unauthorized use on someone is two or more circular red marks on the skin or two or more blisters.Magnetic Pulse Induction Method. The neurons within the nerves and human brain are very sensitive to magnetic fields. The MPI method uses an induction coil to induce a low to medium magnetic field in and around the brain causing the neurons to misroute, slow down or revert. This form of electronic VDI harassment is often diagnosed as EMI (electromagnetic interference) sensitivity, which is similar to someone getting headaches from prolonged usage of cellular phones or nausea from being around power lines for extended periods of time. Magnetic Pulse Induction Method may be employed by using a device implanted within the targets home or surroundings and can be operated remotely.RadiationRadiation is a very common form of harassment. A potential harasser can easily buy an old x-ray gun from a surplus dealer and with only slight modifications use it to bombard a target with deadly amounts of x-ray radiation. Radiation devices can be battery powered and used for long periods of time. High exposure to x-ray radiation will cause tumors, brain disorders, mental illness, tremors, headaches, cataracts, seizures or even death. Radiation harassment is usually done over long periods of time, ranging from days to years, in order to induce harm. Radiation harassers can also get various radioactive materials such as thorium nitrate, plutonium oxide, uranium nitrate, and uranyl nitrite. Using radioactive materials a harasser can cause a terrible and agonizing death.ImplantsImplants are without a doubt the most invasive form of harassment. Electronic implants consist of transmitters, ESF generators, micro-neurophonic transceivers, tracking devices and other micro sized devices designed to cause harassment by tracking or controlling movement and thought. The most common implant was designed many years ago and is still used to this day. It consists of a unit that is powered by bodily fluids and is capable of transmitting voice signals, high voltage pulses, emitting a small tracking beacon signal, or other unspecified uses (mind control).Newest version of a biochip implant. For more information about this chip go toBiotelemetry Using Implanted Unit To Monitor Preterm LaborMillions may be carrying microchips in their bodies worldwide. The Safe Medical Devices Act, which became a law in 1990, requires USA manufacturers of implants and medical devices, to adopt a method for identifying and tracking their products permanently implanted in humans, and to keep track of the recipients, in case malfunctions arise. Breast implants, pacemakers, replacement heart valves and prosthetic devices implanted in millions worldwide are all to be tracked. And one of the methods used to track these devices is implanting microchips which store data about the manufacturer, the surgeon, the date of implant, etc.Laser Harassment DevicesThe use of simple, easy to procure lasers to harass or “Dazzle” a subject is becoming more prevalent. Subjects of this type of harassment have reported seeing “little red dots” on their curtains, through their windows or on themselves. There have been numerous reports of people being momentarily blinded by red lights (red lasers) while they were driving in their cars. Some of these incidents have resulted in traffic accidents, although no permanent blindness has yet to be reported as a result of being “spotted”.Laser ScopeLaser gun sight, zoom rifle scope, 3-axis adjustable tripod head. The parts that make this device can be purchased at any gun store and the tripod is a standard issue camera tripod.Laser golf scopeHand-held unit with laser gun sight and golf scope United States Patent 5,629,678 Gargano , et al. May 13, 1997Personal tracking and recovery systemAbstractApparatus for tracking and recovering humans utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to remain implanted and functional for years without maintenance. The implanted transmitter may be remotely actuated, or actuated by the implantee. Power for the remote-activated receiver is generated electromechanically through the movement of body muscle. The device is small enough to be implanted in a child, facilitating use as a safeguard against kidnapping, and has a transmission range which also makes it suitable for wilderness sporting activities. A novel biological monitoring feature allows the device to be used to facilitate prompt medical dispatch in the event of heart attack or similar medical emergency. A novel sensation-feedback feature allows the implantee to control and actuate the device with certainty.systemThis is one of 66 low-earth orbiting (LEO) satellites comprising the Iridium satellite system. The original company went bankrupt so the US Department of Defense assisted in making sure the system stayed in operation. The system is currently maintained by the Boeing Company.coverageThis is a diagram of the planetary coverage of the Iridum system. This system has transmit and receive coverage of the entire planet. Each circle is a coverage sector.Symptoms of Electronic Radiation ExposureSymptoms may include but are not limited to: Headache, eye irritation, dizziness, nausea, skin rash, facial swelling, weakness, fatigue, pain in joints and/or muscles, buzzing/ringing in ears, skin numbness, abdominal pressure and pain, breathing difficulty, irregular heartbeat, sexual stimulation and hearing voices (see Patent #4,858,612). Additional symptoms have been reported in some individuals such as paralysis, balance problems, body and/or muscle spasms, convulsions, confusion, depression, difficulty in concentrating, seizure, sleep disturbances, and memory difficulties.What Can Be Done To Protect Against Electronic Harassment?In a legal sense, there isn’t too much that can be done. You could change your venue, relocate or move to avoid the harasser but this isn’t usually a practical method for a variety of reasons. For starters, the best thing to do is give us a call from a secure phone. We will conduct a sweep of the suspect areas to locate the source of the suspected harassment and then assist in a course of action to stop the harassment. Natural obstacles are cheap and effective in blocking most X-rays and microwave or RF (could be a radar gun) signals that a harasser might use. Mountains, caves, desert areas, and large lakes or oceans offer excellent protection and can block or distort most forms of electronic harassment.Shielding signals with Passive or Active shielding can be an effective measure.If harassment is general to an area and not specifically directed to you, simply moving to another location is the easiest method to stop the harassment. If the harassment is specific to you, then you’ll need to employ some sort of shield or cover, such as mountains or a cave. Shielding may be your only alternative to stop the harassment if you cannot employ natural obstacles or shields. Passive shielding is less expensive then Active shielding and consists of special metal materials designed to block high frequency RF energy, X-rays, etc. Active shielding uses sophisticated electronic equipment to jam, capture, redirect, distort or nullify the harmful energy.It isn’t legal for a private individual, a company or a corporation to use electronic harassment on you. The military and law enforcement, however, can use non-lethal weapons (see USC Title 50 Chapter 32 Section 1520a).Further, testing of electronic equipment; discovering unauthorized electronic surveillance; training of intelligence personnel by officers the United States is allowed.50 U.S. Code § 1805 - Issuance of orderNotwithstanding any other provision of this subchapter, officers, employees, or agents of the United States are authorized in the normal course of their official duties to conduct electronic surveillance not targeted against the communications of any particular person or persons, under procedures approved by the Attorney General.Psychotronic Tortures“Pervert FBI and NSA psychopaths are secretly and illegally conducting non-consensual, sadistic, synthetic telepathy experiments and psychotronic weapon attacks on hundreds of thousands of innocent citizens in the United States and elsewhere.Email this to all your friends and peers and spread the knowledge, so all Americans and other citizens elsewhere educate themselves about the latest horrifying and disgusting secret technologies being used by FBI and NSA on hundreds of thousands of innocent citizens worldwide.It would be great if somebody blogs this post and spread the word on internet for the benefit of all freedom loving Americans and all the innocent citizens of the world. Majority of these innocent people do not even know they are torture-victims and are being used as guinea-pigs by these FBI and NSA perverts, torturers and psychopaths.”——————The Pentagon and the U.S. intelligence agencies called the N.S.A. [ National Security Agency ], C.S.S. [ Central Security Service ], D.I.A. [ Defense Intelligence Agency ], D.A.R.P.A. [ Defense Advanced Research Projects Agency ], C.I.A. [ Central Intelligence Agency ], the D.H.S. [ Department of Homeland Security ], and the F.B.I. [ Federal Bureau of Investigation ], COINTELPRO or Counter Intelligence Program unit has extremely top secret technology that can pick up the private thoughts given by individuals in the vibrations produced by the brains electrical impulses, and that these thoughts can be broadcast by means of microwave tranceivers, infrasound and ultrasound tranceivers, satellites, and any other form of technology which uses electromagnetic transfer, i.e. television, radio, the internet, and the telephone. The Pentagon calls this mind reading technology SYNTHETIC TELEPATHY, although there is nothing paranormal about it at all. The N.S.A. or National Security Agency is a part of the U.S. Department of Defense, and a very secretive part at that. The N.S.A. has a black budget, and is always headed by a flag officer from one of the branches of the U.S. military. The top secret technologies available to the U.S. military is usually thirty years or may be even more ahead of the technology which is available to the U.S. civilian economy. Who is to know among the general U.S. public what the level of technological development is within the secret laboratories of the N.S.A. and D.A.R.P.A. [ Defense Advanced Research Projects Agency ]. The headquarters of the National Security Agency is located at Fort George Meade in the U.S. state of Maryland.Today, there are microscopic computer chips based on nanotechnology which can be inserted into a person by means of an injection,capsule, or tooth filling, with or without the knowledge of a doctor or a pharmacist, and these computer chips can track the implanted person by radio or microwaves.These microscopic computer chips can also be made invisible to detection by means of C.A.T. [ Computerized Axial Tomography ], M.R.I. [ Magnetic Resonance Imaging ], and P.E.T. [ Positron Emission Tomography ] scans, by some means of electromagnetic degaussing.With the latest top secret, and rapid technological advancements available to the U.S. military intelligence agencies, the need for microscopic computer implants in conducting synthetic telepathy against targeted persons is obsolete by now.Rather, a system of subliminal, subconscious, wireless microwave remote control is used today against targeted individuals suffering from synthetic telepathy harassment. Synthetic Telepathy is used for conducting torture training and/or experimentation against people as red herring “good cop/bad cop” or tough love acting, diversions, feints, decoys, and smokescreens, as smear campaigns by association, as openly secret intimidation campaigns against targeted dissidents, and as a means of espionage. Once it was believed that claims about C.I.A. agents secretly dumping radioactive material in the slums of U.S. cities during the 1950′s as part of a research program were simply mass conspiracy theories, until the U.S. federal government in the 1990′s publicly admitted that the allegation was true.FBI and NSA agents who are part of a secret US society are genetically inclined sociopaths and psychopaths who work as hit men,torturers, sexual abusers, stalkers, slanderers, and agent provocateurs involved in murders and torture of hundreds of thousands of innocent US citizens for years and years. At the last count there are 50,000 NSA spies who are businessmen, priests, community leaders and in all walks of life who are SPYING and keeping tabs on pretty much all Americans.The synthetic telepathy espionage trainees, sociopaths, sadomasochistic torturers, slanderers, experimenters, and spies, in order to avoid developing any sympathy for their targeted victims, deliberately avoid actually feeling the emotions of their victims by following the squiggly EEG or Electroencephalograph lines on computer monitor screens, as well as the silent words thought by their victims which also appear on the computer monitor screens. Then again, who can feel all of the emotions and thoughts which any given person has undergone every second of their entire lifetime.The emotions and silent words of the victims of synthetic telepathy operators can be broadcast against their will to anyone thesynthetic telepathy torturers choose to broadcast to, and they also have the power to block or censor any emotions and words of their victims which they do not want to be broadcast. The synthetic telepathy spies can also place their own criminal or antisocial, negative emotions and words into their victims by means of subliminal, subconscious, remote control microwave brainwashing technology, and they can change the voice behind their words so as to make it appear that it is the targeted victim and not themselves who are communicating by means of synthetic telepathy. They can also store emotions and silently thought words onto a supercomputer memory bank which they can rebroadcast at a later time. I believe that the synthetic telepathy operators, although having high I.Q.’s, are predisposed towards sociopathic behaviour because of a genetic defect or combination of genetic defects, and that the only way they can sustain enthusiasm in their lives is by engaging in an addictive pattern of sadomasochistic activities and fantasies.If you do not believe that synthetic telepathy exists, then you should look at these following web sites which reveal that part ofelectromagnetic psychological warfare and mind control which today is declassified:I urge the readers to print/save this column as well as the following link where the NSA and their PSYCHOTRONIC WEAPON ATTACKS and SADISTIC TORTURE of hundreds of thousands of innocent American and worldwide citizens (guinea pigs and victims) are explained in detail with diagrams and technology.“Covert Operations of the U.S. National Security Agency” (link unknown).Readers are advised to print the document in the link above and study the pictures and technology.Important things from the above link for Americans and other people to educate and protect themselves and their loved ones from these secret, non-consensual and illegal psychopathic experiments, attacks and tortures by these 100,000 FBI and NSA secret psychopaths and spies.1) The NSA has records on all US citizens. The NSA gathers information on US citizens with over 50,000 NSA agents and spies(HUMINT).2) NSA personnel in the community usually have cover identities such as social workers, priests, church leaders, lawyers and business owners.3) NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses.4) This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of personssimultaneously .5) NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects tobe diagnosed with ill mental health.6) At the present time the NSA has nanotechnology computers that are fifteen years ahead of present computer technology.7) SYNTHETIC TELEPATHY and other psycho-electronic weapon chips can be inserted into the victims’ bodies painlessly without their knowledge in a matter of minutes by FBI and NSA spies.08) NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously.9) For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts.10) NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations, characteristic ofparanoid schizophrenia.11) Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of asubject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing.12) Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.13) The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject.RNM is the ultimate method of surveillance and domestic intelligence.14) Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control. RNM can alter a subject’s perceptions, moods and motor control.15) The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brainby digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.16) Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country. RNM can electronically identify individuals and track them anywhere in the US.17) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.HOW FBI/NSA disables, cripples and murders its own innocent American citizens.God only knows how many of the unsolved murders and diseases are actually committed and spread by these 100,000 FBI and NSA agents and spies.18) Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines. The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs). This is an outgrowth of CIA pharma-psychology (psychopharmacology).19) Victims experience daily break-ins in their homes by FBI and NSA secret society spies. Victims of this endless torture has no way to prove the break-ins and poisoning of food since FBI and NSA spies have technology that can easily disable the video surveillance systems, phone lines and security alarm systems of the torture victims.20) FBI and NSA spies threaten hundreds of thousands of these innocent torture victims in America with accidents, bio-terrorism attacks in the form of measles, chicken pox, small pox and other forms of viruses, life threatening diseases AIDS, debilitating diseases cystic fibrosis, alzheimers etc. FBI and NSA spies post these threatening messages on internet only the mind control victims can understand and knew those threats were meant for the victims. In some cases, unfortunately these torture victims do not even know they are torture victims.PSYCHOPATHIC TORTURE EXPERIMENTS.Reading and broadcasting private thoughts.Frequent break-ins and poisoning of food.Frequent break-ins and enters at home and at work with clothing, furniture, business papers, computer files sabotaged, modified or stolen.Frequent break-ins and movement of items from their original places, lights, tv and other electronic appliances turned on or off.Controlled dreams.Forced waking visions some synchronized with body motion.Microwave hearing.Transparent Eyelids.Artificial Tinnitus.Forced movement of Jaw and clacking of teeth.Forced precision.Manipulation of hands.Forced memory blanking and induced erroneous actions.Induced changes to hearing – both apparent direction and volume and sometimes even content.Sudden violent itching inside eyelids.Forced manipulation of airways, including externally controlled forced speech.Wildly racing heart without cause.Remotely induced violent no-rash itching often during delicate or messy work.Forced nudging of arm during delicate or messy work causing spills or injury.Intense general pain or hot needles pushed deep into flesh sensations.Wild flailing sometimes followed by short periods of “rigor mortis”.Sudden overheating, all body pain, sleep prevention.Forced drop-in-your-tracks sleep inducement.Irresistible “go here, go there” commands.Microwave burns, electric shocks.TORTURE VICTIMS.Impotency caused by secret poisoning of the food by FBI and NSA secret spies.Usually alone in his/her torture.Constant mental rape, insults and humiliation.Has no privacy even for his/her private thoughts.Cannot plan secretly nor hold trade secrets or intellectual property.Is subject to vicious physical and psychological attacks.Does not know how harassment is happening or by whom.Does not know why harassment is happening.May be accused of mental illness, called delusional.Cannot get away, no matter where he/she goes.Mind raped thought streams.Bugged conversations.Gossip, Rumours, Social and Job connections broken.Microwave voices, clicks, pops, brain zapping, direct harassment.Death and disease threats via internet messages from undercover FBI and NSA spies.Mind control means influencing the behaviour of an individual. And to creating or remolding victims personality towards desired state. The desired model human for the elite of the world, or, “the Illuminati” is: Easily steerable mass-human without personal characteristics. A stupefied, dumbed down person. This secures the interests of the elite of the world. So they can lead our lives through changing times the way they want.Apparently growing out of earlier government mind control research programs such as MKULTRA, and government suppression of dissent programs such as COINTELPRO, today’s mind control is covert, finely crafted, around the clock harassment perpetrated against citizens living in their homes and communities.Destruction of family and other relationships by way of lies, bribes, and threats is a goal of the phase of today’s mind control. The current day mind control program has been carefully engineered so that if the target complains, their own words will instantly cause them to be labeled as mentally ill.The mind/body symptoms of current day mind control include: excruciating pain.Exceptionally frequent blanking of recent memories, and truncation of new ideas.– Impotency caused by secret poisoning of the food by FBI and NSA secret spies.– Very unnatural inability to sleep, as if large amounts of caffeine have been consumed.– Sudden forced awakening at precisely the same time in the middle of the night, continuing for at least months, andright on a clock time such as 4 am, zero minutes, zero seconds.– Sudden clumsiness, which can result in spills, spoilage of precise work, or injury .– Attacks of extreme fatigue, sometimes almost to the point of paralysis, when there is no reason for such attacks.– Frequent powerful itching without rash, and which may start as a small electric shock.– Artificial “bee stings”, especially while trying to get to sleep.– Wildly racing heart without any cause.– Sudden overheating, without any cause.– Frequent flailing of arms and legs as you try to sleep.– Fake sounds such as alarm clock going off when it shouldn’t, telephone ringing when there is no incoming call, knocking on the door but no one is there.– Voices, either very insulting, or telling you things that indicate you are under surveillance.– Vibration of body parts when trying to sleep.– High pitched tone in ears, which may change when switching electronic equipment on or off In some cases, statements by strangers indicating they know what you had for supper.– In some cases, statements by strangers indicating they can read your thoughts.– Artificial and powerful sexual stimulation.– Artificial and powerful prevention of sexual stimulation.FBI and NSA spies post messages anonymously on usenet to indicate to the torture victims how they made the victims impotent. Ignore the title in the thread and read the subtle threatening text from FBI and NSA spies.One can imagine how many of the hundreds of thousands of innocent Americans are made impotent by these disgusting, horrifying and sadistic FBI and NSA psychopaths.This is the exterior of mind control. The non-noticeable mind control is more dangerous one. That is the manipulation of our thoughts and emotions without our notice of things.We think we lead our lives but we do not. We have to wake up to take notice on the situation. And try to change the course of history.FBI and NSA secret society imposes us the New world order using mind control. And we can’t shield ourselves from it, which makes us as puppets on strings.“Electromagnetic Weapons and Mind Control”:from CNN’s Special Assignment, about 1985, at http://www.mindcontrolforums.com/cnn-mc.htm , by Chuck De Caro, CNN Special Assignments, and “List of mind control symptoms, in “2005 update:The convergence of the cold war history of mind control and electromagnetic weapons with new post cold war government neuroscience reserch programs,” by Cheryl Welsh, Director, Mind Justice, 2005, at Mind Justice - 2005 Update and Mind Justice - Symptom ListAlso, there is an interesting article called “Brain wave technology could change lives: Imagine controlling a computer using only your thoughts.”This technology already exists in the civilian economy as a means of playing video games, for example. See this link:Outlook, Office, Skype, Bing, Breaking News, and Latest VideosThe article was written by Robert Bazell, correspondent for NBC News, and was updated at 7:31p.m., December 6, 2004. Another web site concerned with gaining information on the electrical activity of brainwaves, and by means of wireless technology, can be found inthe Sunday, 17 November, 2002, 00:41 GMT BBC NEWS World Edition article called “Remote control brain sensor”, atRemote control brain sensorMANCHURIAN CANDIDATES.“4 Elite Airborne commandos Return from a Special Operation in Afghanistan and suddenly torture and murder their wives”.Friday, July 26, 2002 1:33 p.m. EDT FORT BRAGG, N.C. (Reuters)– Four U.S. soldiers stationed at Fort Bragg, including three special operations servicemen who returned home this year after toursof duty in Afghanistan, allegedly killed their wives recently, military officials said on Friday. In two of the cases, the soldiers killed themselves after shooting their spouses, officials said. In the other two, the servicemen have been arrested and are facing charges.“There has been a recent series of instances where soldiers have either committed murder or murder-suicide against their wives,”said Maj. Gary Kolb, a spokesman for the Army Special Operations Command.I wonder how many of the murders and suicides in America were actually remotely manipulated, induced and orchestrated by these FBI and NSA secret mind control and mind manipulation experiments.http://www.projectfreedom.cng1.com/esp.htmlSTARGATEis one of the many names given to the Army’s classified clan of remote viewers. This project was hidden deeply within the government for close to two decades. The work of Harold Puthoff Ph.D., at SRI international …joined with the work of others at the Cognitive Science Laboratory … helped to supply the CIA with the framework of what was then known as Project GRILLFRAME. By 1978 America’s first remote viewers were at work. It is rumored the cold war was responsible for the government’s interest in remote viewing, because Russia had spies not dissimilar to our remote viewers.Psychic Dictatorship in the U.S.A.Alex Constantine(1995) Another bombshell from the fecund furnace of Feral House Press.Constantine, a political researcher in the mold of Mae Brussell, has gathered together a well-documented survey. “Bombing minds rather than bodies is the warfare of the new millennium… Funded under the euphemism of Non-Lethal Technology, the Pentagon has developed the ability to transmit voices, and inflict pain, madness, even death, with the push of a button. Hard to believe? Believe it!Official sources have publicly admitted to the existence of such technology.”Topics covered: Telemetric mind control, hearing voices, false memory hoax, E. Howard Hunt’s Death Squads, The GOP’s Pink Triangle & the CIA, Johnny Carson and the S&L crisis, and let’s not forget the chapter on NutraSweet as crowd control.221 pages,PBPDU$12.95.The term “mind control” comes from former CIA director Allen Dulles.In 1953, Dulles, speaking before a national meeting of Princeton alumni, distinguished two fronts in the then-current “battle formen’s minds”: a “first front” of mass indoctrination through censorship and propaganda, and a “second front” of individual “brainwashing” and “brain changing.” Before an audience of fellow Ivy Leaguers, Dulles skipped the usual pieties about democracy. The same year, Dulles approved the CIA’s notorious MKULTRA project, and exempted it from normal CIA financial controls.A partial list of aggressive promoters of this new technology includes Oak Ridge National Lab, Sandia National Laboratories, ScienceApplications International Corporation, MITRE Corporation, Lawrence Livermore National Lab, and Los Alamos National Laboratory.In 1996, the US Air Force Scientific Advisory Board published a 14-volume study of future developments in weapons called New World Vistas. Tucked away on page 89 of an ancillary 15th volume are some hair-raising insights into the future ‘coupling’ of man and machine in a section dealing with ‘Biological Process Control’. The author refers to an ‘explosion’ of knowledge in the field of neuroscience, adding, ominously:One can envision the development of electromagnetic energy sources, the output of which can be pulsed, shaped, and focused, that can couple with the human body in a fashion that will allow one to prevent voluntary muscular movements, control emotions (and thus actions), produce sleep, transmit suggestions, interfere with both short-term and long-term memory, produce an experience set, and delete an experience set.Translating the words ‘experience set’ from military jargon into plain English, this means, simply, that they envisage the ability to erase your life’s memories and substitute a new, fictitious set.By projecting such developments into the future, the authors of New Vistas are camouflaging present day capabilities. A similar futuristic scenario with many references to mind manipulation is described in The Revolution in Military Affairs and Conflict Short of War (US Army War College, 1994). Authors Steven Metz and James Kievit declare:“Behaviour modification is a key component of peace enforcement” and “The advantage of [using] directed energy systems is deniability.” The authors ask: “Against whom is such deniability aimed?” The direct answer is “the American people”.Edward Tilton, President of Silent Sounds Inc., says this about S-quad in a letter dated 13 December, 1996:“All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details. We make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course. The system was used throughout Operation Desert Storm (Iraq) quite successfully.’By using these computer-enhanced EEGs, scientists can identify and isolate the brain’s low-amplitude “emotion signature clusters”, synthesize them and store them on another computer.In other words, by studying the subtle characteristic brainwave patterns that occur when a subject experiences a particular emotion, scientists have been able to identify the concomitant brainwave pattern and can now duplicate it. “These clusters are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being!”Microwaves can also alter the permeability of the body’s blood-brain barrier,14 which can synergistically increase the effects of drugs, as the military is well aware. “Using relatively low-level RFR, it may be possible to sensitize large military groups to extremely dispersed amounts of biological or chemical agents to which the un-irradiated population would be immune.”15Sound can be transmitted even easier through the use of implants -cochlear implants, implants that send electrical signals into the fluid of the inner ear, or implants that transmit sound vibrations via bone conduction, such as the cases of dental fillings picking up audible radio signals.The stimoceiver, invented by Dr. Jose Delgado, consists of wires running from strategic points in the brain to a radio receiver/transmitter located entirely under the skin. Through this device, Delgado was able to stimulate raw emotions such as arousal, anxiety, and aggression with the turn of a knob.Of course, secret research by the US Government into microwaves and synthetic telepathy has moved on considerably since the end of the Cold War … secret microwave radiation can be used to induce in unsuspecting victims: “Headache, fatigue, perspiring,dizziness, menstrual disorders, irritability, agitation, tension, drowsiness, sleeplessness, depression, anxiety, forgetfulness, and the lack of concentration.”Naval Research Lab Attempts To Meld Neurons And Chips: Studies May Produce Army of ‘Zombies.’Future battles could be waged with genetically engineered organisms, such as rodents, whose minds are controlled by computer chips engineered with living brain cells…. The research, called Hippo-campal Neuron Patterning, grows live neurons on computer chips.“This technology that alters neurons could potentially be used on people to create zombie armies,” Lawrence Korb, a senior fellow at the Brookings Institution, said.Next → Jesse Ventura on Government Mind Control: Who Is Targeted And Why? (3 youtubes and Veterans Today article)

Which are the richest terrorist organizations? How do they get their money? What do they spend most of their money on?

This answer may contain sensitive images. Click on an image to unblur it.PLO,PA,FATAH,HAMAS! HAMAS Control Gaza and all refugee camps supposedly under UN protection its leaders live elsewhere:[ Meet the Hamas billionaires24 Jul, 2014 17:40Ella Levy-Weinrib"Among the Palestinians, they tell you straight out, 'I want to get rich.'"In recent days, various media have been publishing photographs of Hamas leaders in luxurious homes with fitness equipment, at luxury hotels around the world, etc. On the other hand, distressing pictures are being shown of the suffering of the Palestinian people in their rundown houses, whom Hamas says it represents.One of the big mysteries is how much the Hamas leaders, the Arab world's new tycoons, are worth, and how they, born and raised in refugee camps, who raise aloft the cause of their people's welfare, have become so wealthy and reclusive.Col. (res.) Dr. Moshe Elad, a lecturer in the Middle East Department of the Western Galilee Academic College, who served in senior positions in the territories for 30 years, is attempting to answer these questions."The vast majority of Hamas founders and leaders were refugees or second generation refugees, and some of them were the product of marriages between Egyptians and Palestinians. They had no money at all. When they and Hamas were just starting out, the organization (not in its own name) was nurtured by the Israeli military government, which fostered the Islamic associations working in the Gaza Strip as a counterweight to the Palestine Liberation Organization (PLO). Their phenomenal wealth started accumulating when they decided to disassociate themselves from Israel and search for alternative financing sources."Elad explains that the money came from two directions: "Legacies from the deceased; money from charity funds; a donation called zaka, one of the six pillars of Islam; and donations from various countries. It started with Syria and Saudi Arabia, with Iran added later and becoming one of Hamas's biggest supporters, and ended with Qatar, which has now taken Iran's place."Together with the donations from various countries, fundraisers began operating in the US to collect money for Hamas. Here, the Hamas leaders began to get their hands on some really big money. "One of those fundraisers was Dr. Musa Abu Marzook, the number 2 man in Hamas," Elad says. "At the beginning of the 1990s, he began a fundraising campaign in the US among wealthy Muslims, while at the same time founding several banking enterprises. He himself became a conglomerate of 10 financial enterprises giving loans and making financial investments. He's an amazing financier."The US administration ordered Marzook's arrest in 1995 on charges of supporting terrorism. After he spent two years in a US prison, it was decided to expel him without trial. He kept the money. "When he was expelled from the US in 1997, he was already worth several million dollars," Elad says, adding, "Somehow he evaded the clutches of the US Internal Revenue Service and was not charged with financing terrorism. People in the know say he probably became connected to the administration and cooperated with it. There is no proof, but it's hard to think of any other reason why he escaped punishment for such serious offenses. In 2001, in the investigation of the September 11 events, it turned out that he had extensive financial connections with Al Qaeda, including the transfer of funds to the 21 Al Qaeda operatives accused of the attacks."Today, Marzook is considered one of Hamas's wealthiest billionaires. "Arab sources estimate his wealth at $2-3 billion," Elad says.Another Hamas leader-turned-tycoon is Khaled Mashaal. "Estimates around the world are that Mashaal is currently worth $2.6 billion, but the numbers mentioned by the Arab commentators (based on their many sources) are much higher, varying from $2-5 billion invested in Egyptian and Persian Gulf banks, and some in real estate projects in the Persian Gulf countries," Elad adds.The next tycoon on the list is Hamas Prime Minister Ismail Haniyeh. "He is a scion of a family from the Al-Shati refugee camp, and his capital is estimated at $4 million," Elad says, adding, "He registered most of his assets in the Gaza Strip in the name of his son-in-law, Nabil, and in the name of a dozen of his sons and daughters and a few less well known Hamas leaders. They all have homes in good neighborhoods in the Gaza Strip, where the value of every home is at least $1 million."Another wealthy Hamas official - Iman Taha - is not on the organization's highest levels, but he, too, (and other junior managers) is feeding from the trough. According to Elad, "He was a poor rebellious kid from the al-Borg refugee camp, but he recently built a home in central Gaza worth at least $1 million. He's responsible for coordination between oversea Hamas and Hamas in the Gaza Strip, and he's not even a leading figure, but he's already among the millionaires."The question of where these officials got their money exposes the corrupt system used by Hamas through its control of the money pipelines in the Gaza Strip. They treated the money as their own personal possession. "Most of the money that went into the pockets of people in the Gaza Strip was obtained through tunnel deals and the creation of a flourishing smuggling market, which it is believed has created several hundred millionaires in the Gaza Strip, although most of the people there don't live like that. The man pulling the strings from Egypt with the tunnels is none other than the number two man in the Muslim Brotherhood, Khairat el-Shater. His connection with Hamas was ostensibly for Islamic religious purposes, but they actually built a prosperous business, which earned phenomenal profits," Elad says.The Asharq Al-Awsat (Middle East) newspaper, one of the most prestigious in the Arab world, recently reported that at least 600 millionaires were living in the Gaza Strip - the same people sitting on the money pipelines there.Elad describes how the system worked and to how much money (huge amounts) Hamas leaders were exposed: "Senior Hamas leaders charged a 25% 'tax' and $2,000 on every disassembled vehicle coming through the tunnels. There are hundreds of smuggling tunnels from Egypt to Gaza, and these are the types of tunnel Israel has been less busy in destroying, because Egypt has destroyed many of them. From June 2007 until 2010, $800 million in cash was transferred in tunnel deals (according to information from Hamas money traders). Hamas also taxes Gaza merchants on everything traded, from boxes of vegetables to luxury cars, and the leaders scoop the money into their pockets."Another source of wealth for Hamas leaders was taking over land. "They took over land mainly near the sea in good areas, such as the former Gush Katif, then sold it. In effect, they are the cat guarding the cream - the land - so they were able to take over land and loot it for themselves," Elad explains.In addition, there is a system in the Gaza Strip of fictitious recruitment of workers for Hamas for the purpose of obtaining pay slips from people overseas paying for it. "They get the payments from overseas according to the workers' names. It has recently been discovered that there are hundreds of fictitious names of soldiers and officials supposedly in Hamas. Actually, the leaders and officials put the money in their own pockets," Elad asserts.According to various sources, some of Mashaal's money came from the "Syrian fund." Elad explains: "According to these accusations, following an investigation by the US federal authorities, Mashaal was accused of embezzling the entire Syrian fund. There was a separate fund in Syria for Hamas; Mashaal controlled all the movements in the fund when he lived there. As soon as he left Damascus, he took the Syrian fund, which was worth several billion dollars, and distributed it to himself and others. It is believed that Hamas had $1.5-2.5 billion in assets in Syria, which Mashaal took."In summary, Elad says, "This is corruption at the highest level… What has united the Palestinian leaders all throughout the years is the saying, 'We have to get rich quick.' This is how the regime sees it. Their leaders have no shame. Shortly after they got power, they took control of fuel, communications, and any other profitable sectors in the country. There are get-rich-quick schemes and corruption in Western society, too, but there it's done sophisticatedly with envelopes of money and complex structures of bribery and the like. Among the Palestinians, they tell you straight out, 'I want to get rich.'"Published by Globes [online], Israel business news - www.globes-online.com - on July 24, 2014And alsoAndrew Eusebio, B.A. History, University of North Carolina at Chapel Hill (2022)Updated 6h agoYou’re not going to get an unbiased answer on this, but here’s the reality of the situation as best as I can give it.Palestine is a region of the Mediterranean coast in the Middle East which also happens to be the historical home of the Jews until their multiple expulsions from region. Arabs, predominantly Muslim, populated the region for several years under the Byzantine and Ottoman Empires. In World War One, the British promised the Arabs a unified arab state after the defeat of the Ottomans. This was later thrown out by the Sykes-Picot Agreement, which divided the region by arbitrary “lines in the sand” between France and Britain for a number of years.Following World War Two, in which you hopefully know the Holocaust happened, there was a larger calling for a Jewish state. A number of places were considered, including Madagascar. Eventually, the historical home of the Jews, Israel, was chosen in the 1947 Partition of Palestine Plan by the United Nations. It called for a independent Arab and Jewish states (Palestine and Israel respectively) and an internationalized (Think East-West Berlin) Jerusalem. The Jewish Council accepted this plan, but the Arabs rejected http://it.In 1948, the foreign troops in Palestine withdrew the day that Israel declared independence. The following day, every single Arab nation attacked Israel. In a stunning reversal of fate, the Arab armies were defeated by the young nation. Israel not only retained the areas outlined by the 1947 UN agreement, but 60% of the Palestinian territories as well. Palestine is occupied and annexed by a number of Arab states, including the West Bank and Golan Heights.Several times for the next few decades, Israel goes to war with the Arab states and each time wins. In 1967, Israel preemptively attacked a massing Egyptian army at their borders. Egypt convinced Syria and Jordan to attack Israel, but a sweeping Israeli victory allowed them to take Golan Heights, The West Bank, and The Gaza Strip as well as the Sinai peninsula. Jewish settlers were quick to rush into the West Bank and settled in virtually unpopulated areas. The 1995 Oslo II accords between Palestine (established in 1988 and claimed the West Bank and Gaza Strip) agreed the West Bank to be split into 3 zones:Zone A: 2.8 Million Palestinians along with Zone B; under full Palestinian control. It is illegal for Israeli citizens to enter this zone.Zone B: Palestinian civil control (Taxes, Laws, etc.) Israeli military control.Zone C: Israeli settlements and law, numbering about 300,000 Jewish settlers.The Palestinian Authority, the ruling government of Palestine, claims Gaza as its own territory. It is dominated by the Palestinian Liberation Organization, or the PLO; the PLO is dedicated to the Liberation of Palestine from the Jews, which it primarily seeks to obtain by violence against Israeli citizens. Following the 2006 elections in Palestine, the Gaza Strip came under the de facto control of the radical Hamas party. The moderate Palestinian party, Fatah, is the one that Israel negotiates with. Egypt and Israel imposed a blockade of the Gaza Strip in 2007 after the Battle of Gaza in 2007.Hamas is a terrorist organization. They have sworn themselves to the destruction of Israel. They use aid that Israel sends into the Gaza strip for the construction of tunnels into Israel, seeking to kill Israelis. They fire rockets from schools and hospitals into Israeli territory, hoping to provoke Israeli aggression. When the Israelis retaliate, they take as much care as possible. They distribute leaflets, send out text messages, and use ground intel hours before an air strike on the rocket sites.Currently, we are seeing a number of protests along the Gaza border demanding to let Palestinians freely cross into Israel. Make no mistake. Gaza in under the control of Hamas. Of the 62 killed in last week’s protests, 50 were members of Hamas. The Great March of Return is organized by Hamas. There are numerous people interviewed at the March that said they will cross the border and murder Israeli citizens. Israel cannot let a security compromise of this level into their borders. They have pleaded with the Palestinian people to not do this, and have been forced to use deadly force to defend their borders._________________________________________________________Copied From Quora 3 June 2018:Wasn't it strange that the Israel side had barely sustained any injury while the Palestinian side had suffered more than 60 deaths and thousands injured? Is the word "Hamas" bear any significance to this tragedy?The media is ignoring the true culprit of the unprecedented violence in GazaRenato Henrique Marçal de Oliveira, Read quite a lot of stuff on IsraelUpdated May 29So let's see if I got it right…Hamas manages to amass tens of thousands of people at the border, and when these people riot and attempt to breach the border fence with the stated goal of massacring Israeli civilians, it’s Israel who is wrong when they stop these killer wannabes?Posters, banners, flags, loudspeakers - this is a legitimately peaceful protestContrast with the pics belowWhich of these is remotely close to the peaceful protest at the beginning of my answer?The folks at the border fence were rioting, not protesting peacefully.Moreover, what were their goals? I’ll let Yahya Sinwar, Hamas leader, answer that:Source: Interview with Al JazeeraIDF✔@IDFSpokespersonYesterday afternoon, the IDF received intelligence that Hamas operatives were preparing to cross through the security fence from northern Gaza. IDF special forces arrived at the scene, & 8 armed terrorists hurled pipe bombs & grenades at the soldiers & the security fence.Yesterday afternoon, the IDF received intelligence that Hamas operatives were preparing to cross through the security fence from northern Gaza. IDF special forces arrived at the scene, & 8 armed terrorists hurled pipe bombs & grenades at the soldiers & the security fence. pic.twitter.com/8G73DjEvZl— IDF (@IDFSpokesperson) May 15, 2018795Yesterday afternoon, the IDF received intelligence that Hamas operatives were preparing to cross through the security fence from northern Gaza. IDF special forces arrived at the scene, & 8 armed terrorists hurled pipe bombs & grenades at the soldiers & the security fence. pic.twitter.com/8G73DjEvZl— IDF (@IDFSpokesperson) May 15, 2018Twitter Ads info and privacySalah al-Bardawil, a member of Hamas’ political bureau, told a newspaper that in the “most recent event” [i.e., May 14, 2018] 62 shaheeds were killed, 50 of them belonging to Hamas. He added that in the events that took place before May 14 [i.e., since the beginning of the “great return march”] 50% of the Palestinians killed belonged to Hamas. Those are the official numbers, according to Salah al-Bardawil. In addition, Yahya al-Sinwar, head of Hamas’ political bureau in the Gaza Strip, admitted that operatives from the Izz al-Din Qassam Brigades (Hamas’ military wing) participated in the marches. Salah al-Bardawil’s exceptional remark came in answer to a question from the interviewer, who asked about criticism Hamas had received for sending people to die while Hamas “reaped the fruits.” Those remarks illustrated yet again that the rioters in the front line who tried to sabotage the security fence, attack IDF soldiers and penetrate into Israeli territory, were civilian-clad members of the terrorist organizations (primarily Hamas). They were guided by and operated under instructions from the Hamas leadership, which played a dominant role in the marches.Senior Hamas figure Salah al-Bardawil: 50 of the 62 shaheeds of May 14 [about 80%] belonged to Hamas - The Meir Amit Intelligence and Terrorism Information CenterAfter preparations which lasted for about two months, mass riots began to take place every Friday near the border between the Gaza Strip and Israel. The declared purpose of these demonstrations and riots, organized and orchestrated by Hamas, was to break through the border fence and have masses of people enter into Israeli territory. According to the Palestinians, this should symbolically realize what the Palestinians refer to as the “right of return” of the Palestinian refugees (i.e., the destruction of the State of Israel). Another objective was to bring the severe economic situation of the Gaza Strip into public awareness and exert pressure to “break the siege.” The demonstrations and riots still haven’t ended. Hamas intends to pursue them also during the forthcoming weeks, even at the cost of more fatalities.Hamas aspired to mobilize hundreds of thousands of Gaza Strip residents to participate in these events. However, eventually, the number of participants did not exceed several tens of thousands. In the two peak events, on March 30, 2018 (Land Day, the opening events) and on May 14, 2018 (the day on which the US Embassy was relocated to Jerusalem), about 40,000 residents took part in the demonstrations and riots. On other Fridays, Hamas could not mobilize that many residents. During the rest of the week days, several thousands of people took part in the riots and there were also a number of attempts to carry out terrorist attacks.The riots culminated in the events of May 14, 2018, with attempts, halted by IDF soldiers, to penetrate en masse into Israeli territory. The attempts to break into Israeli territory were accompanied by intentionally increased violence, throwing pipe bombs and Molotov cocktails at IDF soldiers; attempting to cut the fence; and sending Molotov kites, which set fire to fields in Israeli communities adjacent to the Gaza Strip. As a result of the increase in the number of rioters and the extensive violence on their part (which was unusual compared to previous incidents), the number of fatalities reached its height. Those fatalities consist of Palestinians who were in the front line of the rioters, most of them Hamas operatives.Findings of the examination of the names of fatalitiesAccording to the findings of examinations carried out by the ITIC, at least 112 Palestinians were killed during the “Great Return March.”In an examination of the names of the fatalities on an individual basis, 93 were identified as terrorist operatives or affiliated with the terrorist organizations, i.e., about 83% of those killed in the “return marches.” Most of the fatalities (63) are from Hamas (about 56% of the total killed in all the marches). Fatah, which had 21 fatalities, played a minor role, with no significant impact on the events. The other organizations, including PIJ operatives (four fatalities) refrained from playing a significant role, maybe because of their awareness that this is a Hamas “project.” The organizational affiliation of 19 of the fatalities is unknown to the ITIC. It may be assumed that these are Hamas operatives or civilians who do not belong to any organization.The findings of the ITIC, which indicate the central role of Hamas among the fatalities, are consistent with the figures provided by two senior Hamas figures in the Gaza Strip: Salah Bardawil said that 50 out of the 62 shaheeds who were killed in the events of May 14, 2018 (about 81%) belonged to Hamas. He added that in the events that took place between March 30, 2018 and May 14, 2018, 50% of the fatalities were Hamas operatives. Yahya Sinwar, head of the Hamas Political Bureau in the Gaza Strip, also said that on May 14, Hamas had over 60 shaheeds, and that “yet other 20 wounded are expected to die at any moment” (Al-Mayadeen Channel’s YouTube account, May 21, 2018).The findings of the examination of the identity of the fatalities carried out by the ITIC, and statements of senior Hamas officials, clearly demonstrate the central role played by Hamas in organizing the “return marches” and orchestrating them. The “return marches” were not “popular,” “peaceful” events, as falsely presented by Palestinian propaganda, but rather a Hamas strategic move accompanied by preplanned violence. This move was intended to free Hamas of its predicaments and achieve political and propaganda objectives (mainly, raising the “right of return” to the awareness of the Arab and international public and relieving the “siege” imposed on the Gaza Strip). Furthermore, the findings of the examination of the identity of the fatalities and reports from the ground clearly demonstrate that IDF soldiers did not shoot indiscriminately at innocent residents but instead hit terrorist operatives. These operatives were the dominant factor among those in the front line who tried to break into Israeli territory.The identities of the fatalities of the “Great Return March” (March 30, 2018 – May 15, 2018)Note: About 83% of the fatalities of the “Great Return March” (92 people) wereterrorist operatives or individuals affiliated with terrorist organizations. At least 67% of them were Hamas operatives. The number of Hamas operatives may increase because it is possible that the category “Without organizational affiliation” (19 fatalities) also includes unidentified Hamas operatives.The identity of the fatalities of the “Great Return March” (March 30, 2018 – May 13, 2018)Note: About 81% of the fatalities of the “Great Return March” until May 14, 2018 (39 people) were terrorist operatives or individuals affiliated with terrorist organizations. Most of the fatalities were members of Hamas or affiliated with it.The identity of the fatalities of the events of May 14 and 15, 2018Note: About 84% of the fatalities on May 14 and 15, 2018 (54 people) wereterrorist operatives or individuals affiliated with terrorist organizations. About 67% of them (43) were operatives of Hamas or affiliated with it. The organizational affiliation of 10 fatalities was not identified. It may be assumed that they include several Hamas operatives or individuals affiliated with Hamas.Findings of the ITIC’s examination of the identity of Palestinians killed in the events of the “Great Return March” (March 30, 2018 – May 15, 2018) - The Meir Amit Intelligence and Terrorism Information CenterNow think about it for a while.Nobody in Gaza Strip dares to do as much as farting without Hamas permissionHamas organized the riots, and incentivized the rioters to be violentSeveral of the casualties were HamasniksIsrael was cronfronted with a bad and a terrible option - either stop the rioters (and take the flak for any noncaombatants harmed) or let them break the fence and massacre civilians; they obviously chose the “lesser evil”Contrast the Israeli response witht a genuine massacre of peaceful unarmed demonstrators:The opponents had decided to stage a demonstration on 28 September against the likely participation of Camara in the next presidential election, and despite the government's ban on protests, they decided to carry on with their scheduled protest. A crowd of around 50,000 people gathered at the Stade du 28 Septembre on the day, carrying signs that read "Down with the army in power" and calling for an end of the "Dadis show".According to eyewitness accounts, the elite Presidential Guard, commonly known as the "Red Berets", came in trucks and threw tear gas on the crowd at first, but later opened fire. In the atmosphere of terror and panic, people started running, falling and getting hit. Youssouf Koumbassa, an eyewitness, claimed that the troops stripped down some female protesters. The equipment of a French journalist was seized and smashed. Protesters fled the stadium and poured into the streets, where they were pursued and fired on by troops.After the shooting incident, soldiers were seen publicly raping women, killing people, and looting stores. According to one eyewitness, soldiers asked people if they supported Camara, and those who did not were summarily executed, that some women were raped with guns, and shot dead, and that civilians were beaten and old men yanked by their beards.The wounded were taken to hospital, where they were visited by human rights activists. Although many had gunshot wounds, some were found to have been severely beaten.2009 Guinea protest - WikipediaSpot the difference? ]

When and how was oil discovered in the Middle East?

Lets dig in the oil history of the world which started by the advent of the cars around 1875s in Germany ( Europe as such) , around the industrial revolution in Europe geared,the greed for energy in Europe increased.Thus sending its businessmen and sea fearers all around the world in search of renewable energy other than coal as coal was not great for cars / transportation !Our search in this history will eventually link the puzzle pieces of the whole game of world politics and economy.It was the day when two companies: the Royal Dutch Petroleum Company(Netherland based) & the Shell Transport & Trading Company( London UK based) – came together over 150 years ago.Samuel was born into an Iraqi Jewish family from Mesopotemia , modern-day Iraq , in 1853 in England.His father who had inherited a small family bussiness, also named Marcus Samuel ( Irani-Jewish) ran a successful import-export business, M. Samuel & Co., trading with the coalition in the Far East, which Marcus carried on with his brother, Samuel Samuel . Shell’s origins have many ties to the Far East that go back to Marcus Samuel Senior’s import/export business which brought oriental sea shells and antiques to London Europe in the mid-19th Century well before 1833 AD.( On another note , also requires a mention here that the then kings sponsored the sails for Trade and business with which Missionaries - thus spread of religion,were mandatory to travel so sailors/ team get support and can establish localities / colonies to stay and trade long term.) Thus the name SHELL!The Samuel & Co companies launched the first Japanese gold sterling loan issued in London, and was largely concerned in the introduction of Japanese municipal loans, and in the development of the coal trade in Japan.When Marcus Samuel senior died in 1870 he passed the business on to his two sons, Marcus junior and Samuel, who began to expand it. In 1878, Marcus’s sons set up in Yokohama in a move that would help to power Japan’s industrial revolution. Before long, business was booming, and large storage depots were needed to allow for bulk imports.In the 1880s they became particularly interested in the oil exporting business but shipping still posed a problem as oil was carried in barrels which could leak and took up a lot of space. To solve the problem, they commissioned a fleet of steamers to carry oil in bulk, including the Murex which, in 1892, became the first oil tanker to pass through the Suez Canal.The Dutch colony of Malacca was ceded to the British in the Anglo-Dutch Treaty of 1824 in exchange for the British trading post of Bencoolen and for British rights in Sumatra. Malacca's importance was in establishing an exclusive British zone of influence in the south east asia region, and it was overshadowed as a trading post by Penang, and later, Singapore.This whole bussiness had been under the banner of British EAST India co. prior to the Sepoy mutiny of 1857 in India.Below is the map to show how deep rooted bussiness and trade flourished between the Europeans ( dutch british french etc even before mid 1800s)Meanwhile, in 1890 a group of Dutch bankers, businessmen, and former colonial administrators formed Koninklijke Nederlandse Maatschappij tot Exploitatie van Petroleumbronnen in Nederlands-Indië (Royal Dutch Company for Exploitation of Oil Wells in the Dutch Indies). That company developed its first pipeline and refinery in Sumatra in 1892, tapping the local oil fields; after 1896, under the leadership of Hendrik W.A. Deterding (1866–1939), it began the construction of tankers and storage facilities and the creation of a sales organization.In 1903 Royal Dutch and Shell company made their first move toward merger by integrating their distributing and sales operations involving Far East sales and East Indies production. In 1907 the more complete merger resulted in the Royal Dutch/Shell Group headed by the two parent companies, with Deterding as general managing director of the group. In 1907, Samuel's company combined with a "Dutch" company of the Netherlands ( Royal dutch petroleum )to create the company today known as Royal Dutch Shell. M. Samuel & Co. Oil transportation thus started to be shipped from Malacca and area to fuel Europe in late 1800s . By 1913 the two companies together, combined with others, had risen to a prominent position among the world’s oil companies, acquiring producing concerns in such areas as Romania, Russia, Iraq, Egypt, Venezuela, Mexico, California, and Oklahoma and enlarging sales operations in Europe, Asia, Australia, Africa, and North and South America. It was Black GOLD !!How ever need was to explore /drill oil close to home .Thus exploration began:Naft Khaneh: The House of OilWhat drew more attention to Mesopotamia's oil was the discovery of the Masjid Sulaiman field in Iran in 1908 by the Anglo-Persian Oil Company (APOC) - thanks to the efforts of an able petroleum engineer and geologist, George Bernard Reynolds (see "Persia 1908: The First Centenary of the First Oil Well in the Middle East" in GEO ExPro, November 2008).In fact, the first oil wells in Iraq were not drilled in Iraq proper but in a Persian territory that was later transferred to the Ottoman Empire under a territorial exchange agreement in 1913. In Chiah Surkh within the "transferred territory," Reynolds drilled his first wells in 1902-1903. The wells encountered oil and gas shows, but were abandoned for more productive prospects further south. However, APOC revisited the area and drilled in an oil-seepage called Naft Khaneh ("House of Oil" in Persian) in 1909 and it hill oil (41.5 API) in Miocene limestone (Jeribe Formation) capped by Miocene evaporites. The field was developed in 1925 by the Khanaqin Oil Company, an APOC subsidiary. This company also built a pipeline to and a refinery in the nearby town of Khanaqin in 1927, the first oil refinery and pipeline in Iraq.A year later, an oil company in the UK, Burmah Oil, created a subsidiary company to develop oil production in Persia, the Anglo-Persian Oil Company (APOC), which started volume production of oil by 1913.Britain’s Royal Navy was under the leadership of Winston Churchill, who wanted to shift its fuel source from coal to oil. The Navy thus became the company’s major customer and a de facto hidden power behind its success.Iranian popular opposition to the APOC’s royalty terms whereby Iran only received 16% of net profits was widespread and created political discontent throughout the country.In 1941, during World War II, Britain and the USSR invaded Iran, exiled Monarch Reza Shah, and put his son, Reza Pahlavi, who was friendlier to their interests, onto the throne, so business gets easier.Following WWII, nationalistic sentiments were on the rise in the Middle East, most notably in Iran, and the Iranian parliament voted to nationalize the oil industry; at the same time, the public elected Mohammed Mossadegh as Prime Minister, causing the Abadan Crisis.Britain was unable to subvert Mossadegh, so British and American intelligence agencies orchestrated a coup d’état to overthrow him and bring Reza Pahlavi back onto the throne.By 1954, now with a pro-Western leader in place, oil production started again under the control of a new cartel named the “Seven Sisters,” completely based outside the Middle East, in Europe.“resource curse”Also known as the paradox of plenty, refers to the fact that countries with an abundance of natural resources, specifically non-renewable resources like minerals and fuels, tend to have less economic growth, less democracy, and worse development outcomes( middle east) than countries with fewer natural resources( UK, or Europe in general).953 Iranian CoupThe overthrow of the Prime Minister Mohammad Mosaddegh in favor of strengthening the monarchical rule of Mohammad Reza Pahlavi on August 19, 1953, orchestrated by the United Kingdom (under the name “Operation Boot”) and the United States (under the name “Operation Ajax”).Red Line AgreementThe name given to an agreement signed by partners in the Turkish Petroleum Company (TPC) on July 31, 1928. The aim of the agreement was to formalize the corporate structure of TPC and bind all partners to a “self-denial clause” that prohibited any of its shareholders from independently seeking oil interests in the ex-Ottoman territory. It marked the creation of an oil monopoly, or cartel, of immense influence, spanning a vast territory. West supremacy !Abadan CrisisOccurred from 1951 to 1954 after Iran nationalized the Iranian assets of the Anglo-Iranian Oil Company (AIOC) and expelled Western companies from oil refineries in the city of Abadan.The Turkish Petroleum Company and "Mr. Five Percent"Map of Iraq’s oil fields in 1939 and main structural features critical to the petroleum systems. The Zagros orogenic belt in southwest Iran formed as two continental plates, Arabia and Asia, collided and the Tethys Sea that once lay between them completely closed.Meanwhile, an Armenian engineer, a shrewd businessman and a citizen of the Ottoman Empire, Calouste Sarkis Gulbenkian, had his eye on the oil prospects of Mesopotamia. The son of an oil trader, Gulbenkian learned the art of negotiation in the bazaars of Istanbul and petroleum engineering at King' College, London. After graduation in 1887, the eighteen-year old Gulbenkian went to help his father's oil industry in Baku. In 1891, the Ottoman government asked him to investigate oil possibilities in Mesopotamia and he prepared a comprehensive report. Thus began Gulbenkian's devotion to Mesopotamian oil for the next decades of his life.In the early 20th century, German, French, British and American businessmen and diplomats were all interested in the oil resources and lucrative commercial prospects of Mesopotamia and were engaged in negotiations with the Ottoman Sultan Abdul Hamid. The Germany of Kaiser Wilhelm was involved in the shape of the Deutsche Bank, which ran the Anatolian Railway Company. In 1905, they dispatched a survey team to northern Iraq led by geologists A. Kissling and Cesare Porro who wrote a promising geological report of the region. The American interests were represented in the person of Rear-Admiral Colby Chester, who worked for the New York Chamber of Commerce and arrived in 1908 in Constantinople (Istanbul) to propose the construction of a new port and a few railways. Although Chester succeeded in theory to obtain the Ottoman government's consent for his projects and even for mineral exploration, these ventures were never materialized or even officially ratified. Shortly later, the Sultan lost his throne and Topkapi Palace in the coup d'état of the Young Turks. The British initially approached the Ottoman officials through APOC led by William Knox D'Arcy, a businessman in London, and strongly supported by British politicians in the region. Alarmed by the new political changes, in 1910, the British pushed for establishment of the Turkish National Bank, which was actually a British-owned entity. Another important player was the Royal Dutch-Shell (known as the Anglo-Saxon Oil Company) which was purely in oil business.In 1912, Sir Ernst Casel, a German-born English banker and with considerable influence in Istanbul, registered the Turkish Petroleum Company (TPC) in London. This enterprise also included the Deutsche Bank and the Royal Dutch-Shell, but not APOC. Moreover, it did not have any oil concession at hand. Gulbenkian, who had become a British citizen in 1902 and was involved in British ventures in Turkey all along, helped to strengthen TPC and gain an oil concession from the Turkish government. In 1914, at the request of the British and German ambassadors, Turkey's Grand Vizir, Said Halim, gave permission to TPC for the exploration of oil in the provinces of Mosul and Baghdad, although legal rights and contractual conditions were not outlined. In 1914 a new TPC emerged with a capital of £160,000 and including 50% British (Turkish National Bank and D'Arcy Group, an APOC subsidiary), 25% Deutsche Bank, and 25% Royal Dutch-Shell. It was agreed that 2.5% of Dutch-Shell's and 2.5% of D'Arcy Group's shares belonged to Gulbenkian who treasured this 5% share in Mesopotamian oil all his life, and thus gained the fame of "Mr. Five Percent." (J. Norwich and B. Henson recount his life in a 1987 book, Mr. Five Percent.)The Iraq Petroleum Company and the Kirkuk FieldTPC was, however, only a company on paper. On 28 July 1914, the very day the Grand Vizir wrote his permission letter to TPC, Austrian prince Franz Ferdinand was assassinated in Sarajevo, triggering World War I that engulfed Europe for the following four years. As the war ended, Germany and Turkey were defeated, and the Ottoman Empire was split into several states of the modern Middle East. Mesopotamia became a separate country under the British mandate called Iraq, an old Persian name (Irak) for this region. Looking for a new ruler for Iraq, the British chose Faisal, a Sunni Arab who had fought against the Ottoman Turks with the help of T. E. Lawrence and had been put in power in Damascus in 1920 by the British but ousted by the French shortly after. In 1921, Sultan Faisal became the first Hashemite monarch of Iraq and was to rule the country until 1933. (He was succeeded by his son Sultan Ghazi and grandson Faisal II until the 1958 coup d'état changed Iraq to a republic government.)While post-war rivalries among Britain, France and the USA were dragging on, two geological expeditions in Mesopotamia took place. The first was led by Edwin Pascoe of the Geological Survey of India during 1918-19, and the second by Shell geologists Arthur Nobel and Ralph Evans during 1919-1920. In 1920, the British and the French came to a simple agreement: The German shares of TPC would be overtaken by the French. This angered the Americans who had, in those years, a serious fear of shortage in their domestic oil resources and production. American companies were, therefore, looking for overseas resources, and the government was urging Britain to adopt an Open Door Policy for economic enterprises in its Middle Eastern colonies. Walter Teagle, president of New Jersey Standard Oil Company, was on constant contact with TPC officials. Eventually, the British concluded that oil ventures in Mesopotamia would actually be easier with American capital, technology and political support.On 24 March 1925, TPC gained a new formal concession from the Iraqi government, and shortly later organized a large geological expedition including several American, British and French geologists and led by Prof. Hugh de Boeckh, a geological advisor to APOC. Ranking of drilling prospects became a matter of dispute among the geologists. Although De Boeckh's official report in 1926 did not recommend the Kirkuk seepage site for drilling, participating field geologists A.H. Noble (for Shell) and E.W. Shaw and A.C. Trowbridge (for the American group) put in writing Palkhana and Kirkuk as their best recommended sites for drilling in the folded zone of northeast Iraq. TPC decided to drill two wells at Palkhana (which started on 5 April, 1927) and four wells at other sites including one at Kirkuk. Of all these, only Baba Gurgur No.1 at Kirkuk became Iraq's first oil gusher. Baba Gurgur ("Father of Flames" in Kurdish) is an oil seep close to the town of Kirkuk (now the administrative center of Iraqi Kurdistan.) The name Kirkuk (or Kurkura) is apparently a variation of "Gurgur." The ancient Assyrian name for Kirkuk was Arraphka (simply "City") and the Kurdish-Persian name is Garmian or Garmakan ("Hot Land").A geological cross-section of the Kirkuk anticline was prepared by A.C. Trowbridge, a professor of geology at the University of Iowa. Location for drilling was selected by John M. Muir, the first Chief Geologist for TPC who had considerable experience in Mexican fields. Baba Gurgur No. 1 was spudded in on 30 June, 1927 and on the early morning of 14 October 1927 the well came in with a bang. The gusher was so forceful that it took nine days to tighten the "Christmas Tree" on the well. By then, it had flowed at 95,000 barrels a day. The producing reservoir was Oligocene limestone (Kirkuk) capped by Miocene salt - a geologic setup similar to the Masjid Sulaiman and Naft Khaneh oil fields. Oil density was 36 API and sulfur content was 2%.In face of the new realties, TPC had to make new arrangements. On 31 July 1928, TPC, although still controlled by the British, came to the following composition: APOC (23.75%), Royal Dutch/Shell (23.75%), Compagnie Francaise des Petroles (23.75%), Near East Development Corporation (a joint venture of American companies - Jersey Standard, Socony, Gulf Oil, Pan-American, and Arco) (23.75%), and Mr. Gulbenkian (5%, of course)(Turkey Monarch!! ).Moreover, in the same company meeting, Gulbenkian took a red pen and drew the boundaries of the former Ottoman Empire (from Turkey as far south as Yemen) and asked the consortium members not to engage in independent exploration or production within that territory. Although the TPC members agreed to the so-called Red Line Agreement, it proved to be cause of bitter conflicts in later years and faded away as American companies withdrew from it.The Kirkuk field discovery was indeed vital for TPC. By the end of 1930, twenty producing wells were drilled at Kirkuk while numerous wells drilled in the other parts of Iraq did not produce oil (until 1937 when the Ain Zaleh field was discovered). Two wells drilled in 1927 at Palkhana to depths of about 2000 feet were suspended because of mechanical difficulties; and two more wells drilled in the following two years met only with water and high-pressure gas. Four wells drilled in the Injana structure, which was on top of De Boeckh's list, did not yield oil, either.This answer is very SYMBOLIC as there were parallel efforts of oil exploration throughout middle east the then Mesopotamia as world there was getting very unstable in terms of world wars in vision ahead ( WW1 N WW2 ).The roots of those wars found in the tug of war for grabbing more and more oil rich lands in the Mesopotamia region and the south eastern asian sub continent . Thus every monarch around Europe was looking for avenues to grab that industry much ahead of time then the other. Mesopotamian Countries were divided according to the oil rich areas found and deals made to exploit them with in the then 3 super powers !!Refer to in depth reading in GEO ExProSequence after this is much easily available on the internet which proves the insecurity of the WEST esp the European countries due to lack of Resources to sustain their own lifestyle, thus constantly impacting the political conditions in the middle east and south east Asian countries so as to facilitate their OWN business/ trade/ economic interests. After the Sun started setting on the colonial Empire around early 1900s ,the strategic plan to PARTITIONING these common wealth countries, making sure there always remains a state of instability in the region so Europe / USA can always have a upper hand in managing their affairs , was thus part of their strategy in controlling the OIL RICH middle east and south eastern Indian sub continent .No wonder cold war was ignited ( in a fight to maintain UK/ USSR/ USA supremacy)and thus Terrorism there after .All in all in-spite of being POWER HOUSE ( oil - resource RICH) Middle East and its people has failed to see the development / WELFARE in the Ratio of the amount of resources worth FOUND under THAT LAND !Only the rulers / puppet heads of the state have become rich since they were put in place TO FACILITATE THE TRADE OF OIL in the favor of the explorers who were either FROM USA OR EUROPE !!

People Like Us

Easy, great for team use, reasonably priced, and powerful. Have used it for years.

Justin Miller