You are on page 1of 331

Targeted Individuals vs the state of Grease FROM [DE]ONTIC SOCIAL CONSTRUCTIVISM TO [DE]ONTOLOGICAL SOCIOCYBERNETICS: COMMUNITARIAN ETHOS AND ITS

OTHER IN THE CONTEXT OF A MULTIPARTICIPANT, MULTIACT ATTEMPTED MURDER CASE OF INDIRECT PERPETRATION IN THE CONTEXT OF THE THIRD REALM D FREEMASONRY AS ORGANIZED INSTITUTIONAL / PRIVATE ALLIANCES AND POWER MECHANISMS

[1]

TABLE OF CONTENTS INTRODUCTIONp9 CHAPTER 1 p12


1.1 Why agenda 21 as a blueprint for societal engineering and a new communitarian ethos through mandating inclusion in social networks constitutes a silently legitimating platform or animus socii for targeting activities? Agenda 21 as a blueprint for microsocial engineering is embedded in a discourse of clouded, highly abstract and not at all actionable language. The case for open system dynamics masking a crypto-totalitarian agenda favoring the dystopian feedback loop hyperreal ecosystem fabricated and imposed on targets 1.2 Agenda 21 is discriminatory regarding social groupings and the demopsychographic profile of participants 1.3 Agenda 21 promotes conspiratorial attempts at redistribution of wealth through the formation of secret microsocial committees that constitute informal referenda against pragmatically overloaded adhocratic rules and is violating of all sorts of local criminal laws, such as violation of the right to privacy and freedom of movement, illicit break-ins in targets property and causing property damage, while promoting psychological warfare and covert operations 1.4 Agenda 21: the cultivation of a new communitarian ethos and the indirect legitimation of transgression of the right to privacy 1.5 An agenda for depopulation 1.6 Agenda 21 as a blueprint for indoctrination on communitarian ideals 1.7 SUSTAINABLE DEVELOPMENT or ANOTHER UTOPIAN VISION? 1.8 IMPLEMENTING THE PLAN THROUGH SOCIAL PYRAMIDS- BOTTOM-UP SOCIAL REENGINEERING 1.9 The historical evolution of the new communitarian ethos 1.10 Microsocial engineering through Local Agenda 21: open system dynamics or groupings of pragmatically driven individuals legitimating their redistribution of wealth interests under a communitarian cloak? Consensus masks ubiquitous psychological mechanisms operative in group decision making (see chapter 3) 1.11 The New Age vs Old system rhetoric: simply a matter of redistribution of power and indirect legitimation for multiparticipant, multiact perpetration in the context of organized power mechanisms (see chapter 4) against an emergent discursive dominant paradigm 1.12 Agenda 21 not by accident contains as part of the project's descriptor the first degree of freemasonry (that is 21) 1.13 Conclusions

[2]

CHAPTER 2 p45
2.1 Introduction: Targeting- the new silent massacre What is targeting and why is it a new phenomenon (or at least an old phenomenon in new clothing) of silent massacre/premeditated murder? 2.2 The phenomenology of the torture situation 2.3 Methods of targeting : the case for a new form of sociocybernetic terrorism 2.3.1 Classical conditioning 2.3.2 Investigations 2.3.3 Surveillance 2.3.4 Gang Stalking 2.3.5 Break-ins & Property damage & petty thefts 2.3.6 Buzzsaw 2.3.7 Framings 2.3.8 Sabotage & Vandalism 2.3.9 Mail interference 2.3.10 Blacklisting 2.3.11 Collisions & Cut-offs 2.3.12 Blocking, Swarming & Space invasion 2.3.13 Synchronization 2.3.14 Convoys of vehicles 2.3.15 Mobbing 2.3.16 Brighting 2.3.17 Noise campaigns 2.3.18 Food tamperring 2.3.19 Sensitivity Programs 2.3.20 Street theater 2.3.21 Electromagnetic weapons: the technological enablers of the slow-kill method 2.4 Usual mode of treatment of targeting allegations on behalf of institutional mechanisms agents and the silent (psychic, discursive, pragmatic) complicity or a complicit multi-referential signifying system: The ontic and the ontological facets, the multiple referential planes, the signifying regimes

[3]

[see chapters 3 and 4] , the latent/background assumptions operative in each referential plane as signifying attractor between linguistic/protosemiotic/corporeal signs and their respective signifieds [see chapter 3]- An instance of circulalry demarcated predespositional causality [ ] or the [de]ontic reinscription of minor premises in a social constructivist/sociocybernetic paradigm of [de]ontological major premises as latent conditionals of multiple signifying regimes [From Parmenides virtuously circular truth to a pragmatically overloaded web of Husserlian noemata as cunningly interwoven minor premises against the background of a collective intentionality] 2.5 The psychological effects of the targeting sociocybernetic mechanism and why/how the reported symptoms often match the diagnostic criteria of DSM (chance or premeditated institutional cover-up of the true causal mechanism that is responsible for generating these effects?)- Another typical instance of discursively complicit cover-up and semantic/pragmatic aleatoric bifurcation of a phenomenon in ever multiplying signifying regimes [see chapter 3] 2.6 A Peircian analysis of how the aforementioned conditioning tactics self-referentially and through the employed sociocybernetic mechanisms model their effects: the pragmatics of sociocybernetic conditioning 2.7 The creation of an institutionally sanctioned exclusionary mechanism. How an abductive stratagem crystallizes in an institutional practice through social constructivism and sociocybernetics : further notes on discursive complicity- a functionalist paradigm as apologetic for systemic dysfunctions or sedation as a way of coping with targeting : its a win-win situation for everyone but the target 2.8 The ontological issue with the notion of the psyche : empirical fact, fact of reason or of epistemological reification against the background of economic interests? 2.9 The legal issues with psychiatric diagnosis: violating freedom of speech for the sake of reducing complexity? For whom?
2.10 omitted

2.11 Reasons for targeting the case for multilayered motives [cf. chapters 3 and 4] 2.12 Who participates in targeting activities? the case for a multiparticipant, multiact crime with composite multiple causality 2.13 How do direct perpetrators communicate and how is communication facilitated by satellite audiovisual surveillance? C.Roxins functional platform as animus auctoris (cf chapter 4) 2.14 What is the organizational structure between direct and indirect perpetrators and how recordings of incidents on behalf of institutional agents act in complicity to the incidents? 2.15 Conclusions APPENDIX I Satellite surveillance & mind control and relevant technological patents APPENDIX II - Microchip Implants, Mindcontrol, and Cybernetics APPENDIX III- A Word for the Wise T.I. - Microwave Targeting and Brain Dysfunction APPENDIX IV John St. Clair Akwei vs.NSA, Ft. Meade, MD, USA

APPENDIX V - Over 100 Ways Of Mind Control

[4]

APPENDIX VI - POLICE ACKNOWLEDGING THE EXISTENCE OF EMF HARASSMENT APPENDIX VII - INSTITUTIONAL INTERDEPENDENCY APPENDIX VIII- Extrajudicial punishment APPENDIX IX- MEDICALIZING MENTAL HEALTH: A PHENOMENOLOGICAL ALTERNATIVE APPENDIX X- INDICATIVE LITERATURE ON ANTIPSYCHIATRY

CHAPTER 3 The epistemological/ontological/pragmatic framework for making sense of targeting in the context of the new communitarian ethos enforced through agenda 21. p170
3.1 Habermas theory of pragmatics of social interaction: Community of rational/disinterested or irrational/interested agents and by implication of social networks as constellations of social agents? Talking non-sense may be of limited truth, but of amplified relational validity 3.2 Social representations as a mechanism for fabricating and filtering information about targeted individuals: between epistemological fallacies and lay discourse perceptual inertia lies the silent legitimation of information as the outcome of social networks members decision making 3.3 Social representations or cognitive/interpretive schemata in action: Accounting for the blind spots in Habermas theory of the pragmatics of social interaction by demonstrating how fabricated social contexts, social situations , scripts and social episodes shape the hyperreal world of a target 3.4 How does ethnomethodology and Conversation/Discourse analysis aid in further elucidating the discourse of targeted individuals whereupon an ontologically coherent lifeworld is imprinted? 3.5 Conversation/discourse analysis in action: Unearthing the experiential building blocks and the ontologically coherent nature of open systems targeting lifeworld in the context of agenda 21 social networking 3.6 The implication of agenda 21 as a platform for effecting sociocybernetic solidarity on a global scale 3.7 Conversion as a change in ones universe of discourse and the legal issue of freedom of will and responsibility (at least for the direct perpetrators) in the context of indoctrination and coercive persuasion 3.8 Agenda 21 and Viral Marketing techniques: A NEW SOCIAL MOVEMENT of pyramidically interdependent formal and informal social networks spreading virally through indoctrination techniques?

Chapter 4

[5]

The legal framework of targeting: A case of premeditated, multiparticipant, multiact murder attempt of indirect perpetration in the context of organized mechanisms of power and institutional/private alliances (agenda 21/third realm) and freemasonry. p287
4.1 Reasons why the silent massacre phenomenon should be typified as an exceptional form of criminal activity in dogmatgic penal law: the analogy with the typified chapter on Duel in the Greek criminal law (Chapter IZ of the Particular Part of the Greek Criminal Law) 4.2 Main findings from chapter 3 and their relationship to the justification for using the proposed legal framework : targeting experiential categories as argumentative third terms and their usefulness in the interpretation and application of dogmatic law concepts 4.3 The informal and formal judiciary aspects of the silent massacre phenomenon as regards separate criminal activities and the ontologically coherent nature of their plenum

4.4 My allegations regarding individual instances of the ontologically coherent plenum of the attempted premeditated murder against me
4.5 What are the apodeictic conditionals for premeditated attempted murder? 4.6 The beginning of the act of attempted premeditated murder as silent massacre (with yet overt and demonstrable objective facets) against me and why it constitutes a multi-act crime with multiple perpetrators 4.7 Why my case constitues an attempt at multi-act premeditated murder with multiple perpetrators? 4.8 Why the multiple acts of perpetration as above cited are not isolated, hence not falling under the umbrella of simple participation? 4.9 Why this is not a case of acting in parallel with others while not being motivated necessarily by the same cause? 4.10 Is it a case of complicity in the context of indirect perpetration carried out through organized mechanisms of power? Whose dolus and who is animus auctoris and who is animus socii? 4.10.2 What is the difference between closed and open system dynamics? 4.11 Legal precedents in criminal activties perpetrated in the context of organized power mechanims (in closed systems) and further elaboration of terms based on precedents 4.12 In a nutshell: Subjective and objective conditionals / Actus reus and mens rea that must be met in order to determine the existence of indirect perpetration in the exceptional case of the silent massacre phenomenon in the context of organized power mechanisms and against the background of the secret societies of agenda 21 and freemasonry 4.13 Intermezzo: Notes on legal argumentation and evidentiary methodological rationale 4.13.1 The necessity of using the silent massacre 10 third terms as nodes iin legal syllogistic chains

[6]

4.13.2 What are the limits between subjectivism and objective facts and between admissible and inadmissible evidentiary materials? 4.13.3 Justification of judiciary decisions: need for applying greater emphasis than usual on particular evidentiary materials as against general evidentiary typologies in order to avoid impressions management propagandist techniques and the complicity of the judiciary in the very methods that favor targeting as silent massacre (even though formally the judiciary is covered for not providing detailed argumentation as to which specific parts of the evidentiary materials and witness testimonies led to the formation of specific premises)- TRUTH OR AXIOLOGICAL JUDGMENTS CONDITIONED BY A COLLECTIVE INTENTIONALITY AS A SUM OF DOXIC POSITINGS? 4.14 Bringing it all together: Formalizing and subsuming under dogmatic criminal law clauses my case of premeditated attempted murder with the aid of Wigmores diagrams 4.15 Summary / conclusions and Demand for compensation.

p464

Chapters Overview
In chapter 1 I provide an exposition of why agenda 21 as a blueprint for societal engineering and a new communitarian ethos through mandating inclusion in social networks constitutes a silently

[7]

legitimating platform or animus socii for targeting activities and draw parallels on a nominal and structural level with freemasonry. In Chapter 2 provide a definition of targeting , alongside the usual methods employed in targeting activities, the reasons for targeting, who participates in targeting activities, the organizational structure of targeting groups and the usual mode of treatment of targeting allegations on behalf of institutional authorities. In Chapter 3 I provide the epistemological framework and the requisiste methodology for making sense of the targeting phenomenon as silent massacre against the background of social networks and the new communitarian ethos of agenda 21 by drawing on the social theory pesrpectives of pragmatics of social interaction, cultural pragmatics, ethnomethodology, conversation analysis and discourse analysis, sociocybernetics, the Christological paradigm and the sociology of coercion/indoctrination while demonstrating their usefulness for understanding individual acts of perpetration as social episodes upon preplanned scripts in the context of a fabricated ontologically coherent empirical reality. In Chapter 4 I provide the legal framework wherein the targeting phenomenon must be approached as multiact, multiparticipant premeditated attempted murder with the involvement of third realm public/private alliances and freemasonry. By drawing on Claus Roxins theory of indirect perpetration in organized power mechanisms, I point to the individual clauses of Greek criminal law and Human Rights Statute clauses that have been violated by individual acts of perpetration against me and justify why the silent massacre phenomenon is not a simple case of coperpetration, joint criminal enterprise and offshoot theories of participation in a criminal activity, but a composite crime with a composite causal pattern, including multiple remote and efficient causes and one causa finalis, viz the completion of the premeditated attempted murder. Additionally the learnings from chapters 2 and 3 are combined with the legal framework and a demonstration is provided as to why the individual acts of perpetration pertinent to my case must be subsumed under the premeditated attempted murder clause, as well as which articles of the Human Rights Statute have been violated. Last, but not least, I conclude with my demand for compensation.

INTRODUCTION

[8]

In this case I seek to establish beyond any reasonable doubt that I have been victmized for over four years with targeting activities, involving land-based and electromagnetic harassment, with view to proving a premeditated murder attempt against me. I will abide by the dogmatic tenets of legal truth finding, while engaging in interpretive exercises where necessary in order to clarify which legal clauses (encompassing Greek Criminal law, International Criminal law and European Human Rights Law) are more pertinent both to individual acts of perpetration, as well as to the ontologically coherent plenum of targeting activities. At the same time, I will point out why certain omissions in formal law may be silently legitimating acts of perpetration under the umbrella of targeting. The arguments and facts backing up my case involve both ad hominem and ad humanitatem facets. Ad hominem insofar as individual perpetrators are involved in discrete spatiotemporally situated acts of perpetration and ad humanitatem insofar as institutional mechanisms are involved as enablers or as perpetrators behind the individual perpetrators, to use a familiar term coined by Claus Roxin, whose applied theory of indirect perpetration and relationship of dominance over individual perpetration acts in the context of organized power mechanisms will be employed in the process of grounding the particularities of this relatively new phenomenon involving a system of multi-agent perpetrators, in dogmatic law. In the course of establishing the validity of my claims as empirical minor premises of which the contents of legal causes as major premises are predicated I shall provide sufficient information alongside both the subjective [mens rea] and objective aspects [actus reus] of the individual criminal activities and shall justify why they constitute a chain of events leading up to a premeditated murder attempt. In parallel, I will point out why certain aspects of the evidentiary rationale rest neither with inductive (that is building the argument bottom-up starting with the plausibility of inferring the validity of linking emprical facts with legal clauses) nor with deductive (that is starting with the assumption of a given legal clause and working backwards in order to unearth the relevant empirical facts that validate the relevant clause), but with abductive reasoning (that is by eliminating other plausible explanations of the causal nexus between empirical facts and their consequences),while reducing to absurdity claims to the opposite by allusion to precedents and to omissions1. Complementary to the above I will provide a robust, valid and reliable epistemological perspective in order to make sense of an ontologically coherent plenum of individual and necessarily interconnected acts of direct perpetration and the provision of sufficient evidence about my lifeworld2 in the context of targeting (coined against the background of the popular approaches of
1

Cf Legal Reasoning, Congress Library, chapter on abductive reasoning and notes, as well as advances on Wigmores method of forming legal chains of syllogisms 2 ... , ; " , , , , status " () ; , , , . , ; E ,

[9]

phenomenology and ethnomethodology, as will be illustrated in Chapter 3), while pointing to systemic aspects of institutional discursive and psychic complicity, favoring targeting activities. One of the primary reasons why this uncommon , exceptional criminal activity of multiple composite causality, alternating perpetrators and their clear relationship to a system of indirect perpetration has not been brought to the attention of the judiciary authorities to such an extent as and with equivalent to the intensity and frequency to the torture cases themselves , which yet are informally reported and vindicated on a daily basis in countless informal associations blogs and individual torture cases consists largely in the fact that it has not yet been engraved in public mores as a despicable act meriting outcry. On the contrary, as it will be demonstrated in due course, the silent massacre phenomenon is part and parcel of a new communitarian ethos that has been informally instituted across the globe over the last 20 years, as a way of affirming communitarian bonds through the formation of a projective relationships with Others upon whom the vices , repressed wishes and all sorts of often implicit and deeply laden mechanisms of desire, demand and repression that have always been actively operative in a collective unconscious and occasionally surface as pathological phenomena of everydayness are transferred either symbolically or in a tactile manner to targets. In essence the phenomenon is not new, but novel in its rendition. The collective pathology underpinning and enabling it has been lucidly described by various scholars in the fields of psychoanalysis, cultural and social anthropology (Freud, Lacan, Moscovici, Lewin to name a few) What is different at this historical juncture is the technologies available for carrying out these practices (eg surveillance mechanisms enabled through technologies such as Haarp and Echelon) and the advanced procedures for coordinating social actors towards their accomplishment (eg secret services directed sociocybernetic mechanisms). What is called for, in order to render this phenomenon descriptively valid and perhaps prescriptively valid in the context of dogmatic criminal law, is an epistemological, methodological and ontological framework for putting these practices in perspective, thus enabling a judiciary committee to recognize them as such by subsuming allegations under the correct legal clauses , while recognizing their ontologically coherent nature, as against seemingly discreet and unrelated activities that violate specific clauses of local and international criminal law. . Attempts have already been made by targeted individuals at synthesizing their experiences under particular experiential categories in an attempt to descriptively encapsulate their lived reality or lifeworld. What is still lacking in the already vast literature, mainly consisting of individual stories and sparse allegations on the particular instances of the silent massacre phenomenon, is a set of interpretive principles that would enhance sense making and would enable outsiders to recognize the implications of this phenomenon both for the individuals concerned as well as for what is revealed through these actions about the members of the community that is carrying them out. Based on the extensive review of numerous targeted individuals allegations, also matching my individual case, , of which a selective portion is cited in chapter 3 as the groundwork for building bpttom-up with the employment of discourse analysis the interpretive framework supporting the dogmatic law apodeictic principles of mens rea and actus reus, a set of targeting conditionals or third terms is provided in chapter 4. The epistemological framework provided in chapter 3 acts as an enabler in meeting the principle of nullum crimen sine lege insofar as in order to make sense of why this multi-perpetrator, multi-act crime, involving organized institutional mechanisms and private/public sectors agents cooperation, we have to synthesize individual acts of perpetration under a coherent epistemological platform and then to subsume them under the relevant clauses of criminal law. The targeting conditionals or interpretive third terms essentially provide nodes in syllogistic chains for enhancing the validity of
( gangstalking world _ .

[10]

the legal inferences drawn in chapter 4 and the subsumption of individual activities and the plenum of these activities under the equivalent clauses of criminal law and the Human Rights Statute. In summary, I hereby allege that there is a new phenomenon of psychosomatic torture termed the silent massacre and that I have been a target of overt and identifiable acts of perpetration and covert, less perfectly evidenced acts of perpetration over the course of the past four years, resulting in serious aggravations with regard to my moral integrity, my professional and personal life and my future prospects. The silent massacre phenomenon constitutes a case of premeditated attempted murder though a multi-stage process spanning a prolonged time period and involving multiple accomplices, while the indirect responsibility or the relationship of domination over the acts of perpetration , in Roxins terms, rests with institutional agencies and in particular secret services that control the involved technologies and the flow of information regarding targeted individuals, whose agents seek to legitimate a state within state with concomitant attempts at redistributing resources and power among them and the legitimation of their decisions at enforcing slow kill methods by complicitly taking on board members of distinctive communities, also involving agenda 21 and freemasonry as secret societies within society.

Chapter 1
A series of paradigmatic shifts have resulted in social networking as the primary source of power; knowledge as once the domain of privileged access gave way to information as privileged access to processing technologies, the popularization of and easy access to

[11]

which gave place to social networks as the only domain where access is by default controllable

1.1 Why agenda 21 as a blueprint for societal engineering and a new communitarian ethos through mandating inclusion in social networks constitutes a silently legitimating platform or animus socii for targeting activities? Agenda 21 as a blueprint for microsocial engineering is embedded in a discourse of clouded, highly abstract and not at all actionable language. The case for open system dynamics masking a crypto-totalitarian agenda favoring the dystopian feedback loop hyperreal ecosystem fabricated and imposed on targets Agenda 21 as a macro/micro societal engineering paradigm emerged in the 1992 UN RIO Declaration as a means for attaining global sustainable development. Since its inception and upon its application in various parts of the golbe, civilian organizations emerged (such as Project Freedom against agenda 21, The North American alliance against agenda 21) making severe allegations against the program as being uncpnstitutionally binding in terms of compulsory social engineering, while masking attempts at redistribution of wealth and land among its participants or change agents. Indeed, as it will be demonstrated, not only this is the very aim of the agenda, as a reading between the lines will confirm, but striking case studies, such as its application in Oregon (US), constitute realizations of this hidden agenda beyond any reasonable doubt. . The notion of sustainability is systemic and does not apply to concrete individuals that constitute the very foundation for the application of legal responsibility. Its mandating participation in undefinable and informal social groupings with fluid boundaries demonstrates its communitarian outlook, which is unconstitutional. No laws mandate participation in informal social groupings. Moreover, there is no prescriptive literature suggesting that participation in informal social groupings by necessity promotes greater welfare for individuals. Hence, the mandatory aspect of participation in informal social groupings constitutes an ungrounded mandate, which is purely pragmatically driven as will be illustrated in due course. The emphasis on localizing the mandate makes things even worse as it assumes that geographical proximity among social actors is a defining demographic variable in the formation of informal social groupings Personally, I dont wish to enter in any informal relationship with geographically proximate actors and I am perfectly entitled not to do so. Thus, passages such as Activities that will contribute to the integrated promotion of sustainable development and environmental protection cover a variety of sectoral interventions involving a range of actors from local to global and are essential at every level, especially the community and local levels. Enabling actions will be necessary at the national and international level, taking full account of regional and subregional conditions to support a locally driven and country specific approach. In general design, the programme should: a. Focus on the empowerment of local and community groups through the principle of delegating authority, accountability and resources to the most appropriate level to ensure that the programme will be geographically and ecologically specific b. Contain immediate measures to enable those groups to alleviate poverty and to develop sustainability

[12]

c.

Contain a long term strategy aimed at establishing the best possible conditions for sustainable local, regional and national development between various population groups. It should assist the most disadvantaged groupsin particular women, children and youth within those groups- and refugees. The groups will include poor smallholders, pastoralists, artisans, fishing communities, landless people, indeginous communities, migrants and the urban informal sector

(Section 3.5 of the UN Conference on Environment & Development, Rio de Janeiro 1992) not only are unconstitutional but the very social groupings designated as change agents by default have an interest in redistribution of land and wealth. So, sustainability by definition concerns particular groups [mostly underprivileged] at the expense [by implication] of property holders who may be also advancing in their careers. Not only the mandate is highly selective, but, in the context of both my targeting case and other similar cases, the multiple perpetrators participating in the targeting activities consist in couriers, women (especially in the workplace) , immigrants, designated in the agenda as change agents and persons from all walks of life. Not only there is a clear and beyond any reasonable doubt causal relationship between the programmatic declarations of agenda 21 and the individuals/groups that participate in the targeting activities, but also with the very mode of carrying out these activities, that is covertly and through participation in social networks, as attested by the concerted mode of operation in targeting activities. In particular (referring to the above quote which is as exemplary as any passage from this and similar agenda 21 declarations) focus on local groups by delegating authority, accountability and resources clearly states and DELEGATES DECISION MAKING POWER AND AUTHORITY to members of such informal groups. In short, they are empowered to take action for alleviating their hardships through targeting others! The latter conclusion is by necessity inferred as no ways whereby their position may be alleviated is explicitly stated save for a generic and in abstracto coceived MEMBERSHIP IN INFORMAL SOCIAL GROUPINGS. A reasonable person might ask, are these members going to generate extra money out of nothing simply by being informally related in an informal grouping? Or is the decision making AUTHORITY granted to these members by default legitimating them through informal referenda to make decisions about others lives, not to mention the natural feelings of envy and remorse for more privileged groups that naturally emerge in making decisions about others who constitute their goal or TARGET? It doesnt take an existential phenomenological account to reliably discern that insofar as ones horizon of possibilities is by default dependent on others horizons and it is precisely at the juncture of conflicting interests that some possibilities materialize at the expense of others, then granting authority to informal and underprivileged groups members essentially legitimates intentional actions geared towards the attainment of redistribution of wealth against the background of adhocratic rules developed in the context of informal social groupings and hidden referenda. Not only this manner of MANDATED social organization contravenes fundamental human rights (in its formal exposition), but in essence and by implication it legitimates members of informal social groupings to engage in illegal activities with view to ameliorating their position. It is no accident that this mode of social reengineering, bottom up and through the formation of informal social groupings has been coupled with an exclusionary lingo and a pragmatic language as a form of life in Wittgensteins terms with view to masking the pragmatic decisions that are made during informal referenda against pseudo moral adhocratic rules aiming at redistributing property and tangible/intangible assets among them. Additionally, directives such as raising awareness of demographic and sustainable developmentinteractions not only are ill-founded, insofar as DEMOGRAPHICS (and here I am

[13]

speaking as professional) are in various instances not overdetermining over psychographics and lifestyle, but restrictive and deterministic about the potential for forming relationships with others, as they reduce interaction to demographic variables. There is no legitimacy in mandating of a civilian to interact informally with particular age groups, nationalities, genders or geographical locations. This is completely unconstitutional. Certainly it is of no wonder that 10 years down the line since the initial RIO programmatic declarations, no STRICT MEASUREMENTS had been determined as to how microsocial bonding through participation in these informal social constellations may be accounted for: Thin et al highlight four key themes within socially sustainable development: a. Social justice (equal opportunity and the achievement of human rights) b. Solidarity: empathy, cooperation and associational life c. Participation : opportunity for everyone to play a meaningful part in development d. Security: livelihood security and safety from physical threats3 So, what has been attained by this microsocial reengineering project is the drafting of a highly abstract (in terms of sustainability principles) blueprint, which upon declaration and with the assistance of social scientists spread virally through uknown to the concerned civilians change agents on a microsocial level, as suggested in the above quoted paper which attempts to gauge quantitative indices as measurement tools of sustainaibility progress, which again is unconstitutional as it restricts flow of movement and goods to a LOCAL paradigm, overdetermined by an assumption of GEOGRAPHICAL PROXIMITY as defining variable for the choice of significant others and social interaction and moreover, THEIR AUTHORITY to confer judgments about proximally situated social actors. . As demonstrated the agenda 21 blueprint delegates by implication and through an uncritical assumption of regulatory hypotheses as first principles (eg geographical proximity, underprivileged groups as focal members determining sustainability), authority to social actors from all walks of life to conspire with informal group peers for carrying out targeting activities against others. This is the pragmatic perspective that will be qualified by the even more cogent ontological perspective in chapter 3, 1.2 Agenda 21 is discriminatory regarding social groupings and the demopsychographic profile of participants Hints about the essentially discriminating aspect of agenda 21 regarding the typologies of social actors suggested as key stakeholders in [a fuzzily, and rather hazily] conceived sustainable development were made in the previous section. In this section I will illustrate that argument from universals is essentially laden with fallacies The key universal category concerns gender. As is well-known in market research literature, gender is just one among many psychodemographic variables that make up the profile of social actors It is defining in certain aspects, but definitely not defining in others. Claiming an overarchnig determining relationship across a logical set of instances where it may potentially apply as a qualifying difference constitutes by definition a fallacy as there is no empirical theory suggesting that all actions are carried out differentially on a gender basis. Moreover, inversing an intuitive proposition about relatively higher instances of gender based inequality in income distribution , which must be further qualified by sector and industry, into a universally applying principle of social action is fallacious, as it amounts to claiming that X are less privileged overall than S, but X are more privileged in sector P than S, therefore all X should become overprivileged over S in all instances. For example, in the professional practice of marketing, advertising and marketing research, women hold more positions than men, and I have experienced conspiratorial attempts at exclusion from my profession mainly from women.therefore, for me, the universal principle and explicit mandate throughout all agenda 21 documents to employ women as primary agents for social reengineering under the auspices of agenda 21 has resulted in an evidently criminal act
3

Indicators for socially sustainable development , Department for International development 2002

[14]

against me, consisting in ongoing conspiratorial attempts at job exclusion, which is corroborated by my current status of long term unemployment. Thus , not only, as demonstrated, arguing from universals constitutes a logical fallacy embedded in the very heart of a universally binding document, but in my particular case it constitutes a causally necessary legitimation for illegal conspiratorial acts against pursuing ones happiness and career objective, which are grounded both in domestic criminal law and the European Statute of Human Rights. As you may gather from my attached resume, which illustrates my professional and academic path, my focus has always rested with an ongoing engagement to the achievement of an Aristotelian eudaimonia by continuously cultivating the necessary virtues and skills necessary for achieving goal oriented actions. Yet, thanks to the informal social groupings and the adhocratic referenda LEGITIMATED by an unsustainable (for me) abstract blueprint, my goals have been brought to a standstill and evidently through the participation of multiple social agents whose profile converges with the MEMBERS profile that are WANTED for participation in agenda 21 INFORMAL SOCIAL GROUPINGS. The very crux of the argument in this section is that (i) argument from universals in this case- is fallacious, hence there is nothing in principle legitimating a sub-species to act as driver for social reengineering, which reengineering is in itself unconstitutional (and the same apparently would apply to men in toto) (ii) it is UNDER THE AUSPICES of agenda 21 that that certain demographically demarcated social groups legitimately engage in conspiratorial attempts at job and social exclusion (which is corroborated by the exact opposite phenomenon I had experienced prior to the popularization and diffusion of the agenda in Greece- for example, I have more positive professional references from women compared to men, if someone wished to draw a conclusion of causal necessity from this point, while, needless to say I never demonstrated, not even had a latent negative predisposition againt women in the workplace) (iii) my targeting (in terms of methods, participants, and reasons for targeting) has been facilitated by agenda 21, therefore, agenda 21 is the Ideological motivator (even under a cloak of pseudo open system dynamics) behind perpetrating activities or the MACHINE, to use Claus Roxins metaphor.. The above claims are evidently backed by allegations on behalf of professional colleagues and particular, clear and distinct incidents demonstrating that participants fit the profile of agenda 21s SOCIAL ACTORS.

1.3 Agenda 21 promotes conspiratorial attempts at redistribution of wealth through the formation of secret microsocial committees that constitute informal referenda against pragmatically overloaded adhocratic rules and is violating of all sorts of local criminal laws, such as violation of the right to privacy and freedom of movement, illicit break-ins in targets property and causing property damage, while promoting psychological warfare and covert operations It is by virtue of the non-concretized and highly abstract character of the programmatic declarations (as regards how specific acts cohere with a sustainability agenda) , the already proved senseless and non-signifying and unrealistic use of metaepistemologically abstract and epistemologically void terms such as sustainability, the fallacy of arguing from universals as a springboard of meaningful and goal oriented action that the complicitly interested and pragmatically driven character of the agenda (as will be further qualified in chapter 3) acts as a psychic motivator for individual social actors who form informal groupings with view to attaining their individual and collective agendas. Also, it is by virtue of the compulsory and clearly mandated PARTICIPATION that non-participants are by default placed in a weak spot, which gives rise or animates the decision for engaging in targeting activities. Therefore, the mandate for participation is tantamount to a violation of the right to not participate, and by implication the far reaching materalization of the participatory mechanism in a co-evolving communities paradigm legitimates members to exert violence on non participants. CLEARLY, VICTIMIZATION IS A LEGITIMATE ACT IN THE CONTEXT OF AGENDA 21.

[15]

1.4 Agenda 21: the cultivation of a new communitarian ethos and the indirect legitimation of transgression of the right to privacy If sustainability really just meant a benign way of healing the planet from corporate poisoning, it would not include so many mandatory principles that govern civilians lives. There is nothing benign about Sustainable Development to civilians. SD is a set of global community laws that supplant individual liberty, formally maintained within national, state and local property and privacy laws. Secondly, communitarian laws always "balance" the rights of the individual against the community; therefore SD only protects a selectively delineated notion of community . Every nation in the world is experiencing a "wrenching transformation" of national laws into compliance with international SD indircetly legitimated principles. What kind of system puts monitors on garbage trucks so that the trucks can scan our garbage cans in order to spot the cans that have recyclable items in the wrong cans? What kind of a system establishes neighborhood groups who monitor their neighbors for SD compliance and report infractions of new community biased regulations? What kind of a system puts RFID trackers in garments and Retinal Scans in Driver's Licenses? What kind of a system builds a huge database of every one's most private and personal information? Further information on anticommunitarian literature: +++++ Niki Raapanas "2020: Our Common Destiny," a short and concise introduction to the emerging global injustice system, available only through ACL Books. http://nord.twu.net/acl/books.html Anti Communitarian League ( http://nord.twu.net/acl/ ) Educational Website & Books, global perspective, primarily research Agenda 21 is Evil ( http://agenda21isevil.com/index.php? option=com_content&view=article&id=5&Itemid=9 ) Freedom Advocates, CA, U.S. emphasis, legal actions, educational pamplets, videos, DVDs, speaking engagements, radio show Democrats Against Agenda 21, CA, U.S. emphasis, legal actions Santa Rosa Neighborhood Coalition, community model Citizens Against ICCLI, model legislation

1.5 An agenda for depopulation The internationally binding SD principles would limit not only the size of the world population but also housing, production, consumption, parenting, communication, and religious expression.Its alarming resemblance to the former USSR Constitution implies far greater restrictions than those specifically stated in the Habitat Agenda. Since many specifics were detailed at previous UN conferences, it cannot be fully understood outside the context of the progressive plan for global governance as outlined in all the documents.

[16]

Traditional beliefs simply dont fit the UN vision for 21st Century communities. To find more universal values, Habitat leaders convened a day-long Dialogue on the meaning of Solidarity at the elegant Ciragan Palace in Istanbul. The official list of 21 panel members included former Jerusalem mayor Teddy Kollek, historian Arthur Schlesinger, Jr, and Maurice Strong who led the 1992 UN conference on environment. I have gathered leaders with tremendous wisdom and prestige, began Habitat SecretaryGeneral Wally NDow. They are bringing the spiritual dimension (???)-the only ingredient that can bind societies together. He had chosen an American moderator who would add credibility to the discussion: Robert MacNeil (of MacNeil-Lehrer), one of the spiritual lights of the media industry today. This hand-picked interfaith group left little doubt that solidarity meant a universal shift to the new globalist-New Age paradigm (or world-view). Change your whole way of thinking, because the new order of the spirit is confronting and challenging you, said Millard Fuller, President of Habitat for Humanity. Citizenship for the next century is learning to live together, said Federico Mayor, Director General of UNESCO. The 21st Century city will be a city of social solidarity. We have to redefine the words [and write a new] social contract. We should stop bemoaning the growth of cities, added Dr. Ismail Serageldin, Vice President of The World Bank. Its going to happen and its a good thing, because cities are the vectors of social change and transformation. Lets just make sure that social change and transformation are going in the right direction. Later he added, The media must act as part of the education process that counters individualism or the very foundation on which formal law is grounded.

1.6 Agenda 21 as a blueprint for indoctrination on communitarian ideals The heart of lifelong education would be spiritual training. ????? Whats needed is an interfaith center in every city of the globe, said James Morton, dean of the Episcopal Cathedral of St. John the Divine, who organized the panel. The new interfaith centers will honor the rituals of every faith tradition: Islam, Hinduism, Jain, Christian and provide opportunity for sacred expressions needed to bind the people of the planet into a viable, meaningful, and sustainable solidarity. 1.7 SUSTAINABLE DEVELOPMENT or ANOTHER UTOPIAN VISION? The guiding principle of the new universal education system is sustainable development. People everywhere must be taught facts about environmental risks that are sensational enough to scare them into compliance. They must be persuaded to accept unthinkable limits on consumption, land use, transportation, and family size. Everyone must protect resources for future generations, say UN leaders, but they agree that the real meaning of sustainability is based on the Es: Environment, Economy, and Equity, which point to a redistribution of the worlds resourcesmoney, energy, water, and people-in order to create global equality.???? Judging from the social groups to which the agenda appeals and the lack of any mention as to HOW these extra funds allowing for less inequalities in distribution of income it is clearly a case of legitimating less privileged socioeconimic groups in targeting others for the sake of redistribution of wealth (well, the funds must be generated somehow) History has shown the emptiness of these promises. Long ago the Communist Manifesto announced a proletarian revolution which would empower the poor by redistributing wealth. Everyone would be equal. Men and women alike would join the socialist workforce, and children

[17]

would be trained by the state, which materialized in a state formation.All but the leaders became equally poor, and all the children were indoctrinated with an anti-Christian socialist philosophy. Morally and economically, the masses sank to the level of the lowest common denominator. 1.8 IMPLEMENTING THE PLAN THROUGH SOCIAL PYRAMIDS- BOTTOM-UP SOCIAL REENGINEERING The US Network for Habitat II is one of a myriad of national and international UN organizations committed to carry out the UN plan in local communities. The Network is a forum for making sure people are heard, explained one of its leaders. Its role is to tie together the messages from all six UN conferences into practical action. The resemblances to the Peoples Government that characterized the local soviets in the former USSR are striking. Lenin knew he couldnt win through representative democracy, so he organized local assemblies called Soviets. Linked through a national federation of Soviets, each local Soviet was ruled by the uneducated proletariat, the raw material to be molded by an audacious leader skilled in the use of propaganda. Private merchants, landlords, and priests were excluded from leadership. The chosen elites were supervised and disciplined by rulers at a higher level. Few dared complain. As Andrei Vishinsky wrote in The Law of the Soviet State, There can be no place for freedom of speech, press, and so on for the foes of socialism. The Local Agenda 21 Planning Guide, the Habitat II action plan based on Agenda 21, the environmental program negotiated at the 1992 UN World Conference on Environment and Development. Sustainable America: A New Consensus, a report by The Presidents Council for Sustainable Development.

The striking similarities amongst these plans consist in the following buzzwords or concepts: partnerships, consensus, lifelong learning, baselines or benchmarks, monitoring, assessment, data gathering, systemic change, system thinking, social development, etc. All stress the need to measure, assess, and monitor progress- THE CASE FOR SELF-LEGITIMATED CO-EVOLVING COMMUNITIES AT THE EXPENSE OF INSTITUTIONAL MECHANISMS. All are designed to bypass traditional government and govern people through a form of citizens or grassroots participation which the Encyclopedia Britannica refers to as totalitarian democracy and Communist leaders have called Peoples Government.

1.9 The historical evolution of the new communitarian ethos From New York to Rio (1992) A heat wave and an extended period of drought the last few years of the decade gave credence to a coordinated media campaign of global environmental disaster. The Union of Concerned Scientists published a Warning to Humanity which said: A great change in our stewardship of the earth and the life on it is required if vast human misery is to be avoided and our global home on this planet is not to be irretrievably mutilated.The annual State of the Planet report, issued by the WorldWatch Institute, predicted progressively worsening environmental disasters. And the mainstream media joined the campaign to convince the world that the planet was on the brink of collapse:

[18]

Charles Alexander, Time magazine: As the science editor at Time, I would freely admit that on this issue [the environment] we have crossed the boundary from news reporting to advocacy; Barbara Pyle, CNN environmental director: l do have an ax to grind . . . . l want to be the little subversive person in television; Dianne Dumanoski, Boston Globe environmental reporter: There is no such thing as objective reporting . . . Ive become even more crafty about finding the voices to say the things I think are true. That is my subversive mission; Bernard Goldberg, CBS 48 Hours: We in the press like to say were honest brokers of information, and its just not true. The press does have an agenda.

To this mix of extravagant propaganda, then-Senator Al Gore added his best-selling book, Earth in the Balance: Ecology and the Human Spirit. Like Rachel Carsons Silent Spring thirty years earlier, what Gores book lacked in scientific accuracy was more than compensated for by an abundance of emotion. He called for a tax on fossil fuels. He called for a global program to accomplish the strategic goal of completely eliminating the internal combustion engine over say, a twenty-five year period.And he called for the reorganization of society: I have come to believe that we must take bold and unequivocal action: we must make the rescue of the environment the central organizing principle for civilization . . . . Adopting a central organizing principle one agreed to voluntarily means embarking on an all out effort to use every policy and program, every law and institution, every treaty and alliance, every tactic and strategy, every plan and course of action to use. In short every means to halt the destruction of the environment and to preserve and nurture our ecological system. Despite significant, legitimate objections from the scientific community, which were ignored by the media and ridiculed by environmental organizations, the public perception of impending environmental disaster was successfully blamed on exploding human population; human-caused global warming; and human-caused loss of biological diversity. The stage was set for the UN Conference on Environment and Development (UNCED) scheduled to be held in Rio de Janeiro in 1992. No previous UN conference had ever received such planning and promotion. Maurice Strong was named to head the conference, which was dubbed Earth Summit II. He had chaired the first Earth Summit in 1972 and had participated in every environmental commission and conference since. (Strong became Chairman of the Board of WRI in 1994). To guide the agenda for the conference, UNEP and its NGO partners published two major documents: Caring for the Earth, (1991 via UNEP/IUCN/WWF), and Global Biodiversity Strategy, (1992 via UNEP/IUCN/WWF/WRI). These documents contained the material from which the revolutionary UNCED documents would be produced. The NGO community, coordinated through the IUCN and the WRI publication Networking, used the igc.apc.org computer networks extensively to funnel information to and from the UNCED agenda planners, and to plan the NGO Forum. UNCED provided an opportunity for the NGOs to perfect the lobbying process. With the blessings of and assistance from the UNEP, the NGOs scheduled a Forum the week immediately preceding the official conference. Nearly 8,000 NGOs were officially certified to participate in the UNCED Forum, and another 4,000 NGOs were observers, swelling the total attendance at UNCED to more than 40,000 people the largest environmental gathering the world has ever known. UNCED may be recorded in history as the most significant event the world has ever known; it was the watershed event that began the final march to global governance. Agenda 21, the underlying conference document, was a distillation of the UNEP/IUCN/WWF/WRI documents. It consisted of 294 pages and 115 specific program recommendations. Agenda 21 was further distilled into another document called The Rio Declaration which was a succinct statement of 27 principles on which the recommendations were based, and which would guide the global environmental agenda. Two major international treaties had also been prepared for presentation at

[19]

UNCED: the Framework Convention on Climate Change and the Convention on Biological Diversity. In the summer of 1992, President George Bush faced a difficult reelection campaign. He expressed little interest in the Rio conference and was savagely ridiculed by then-Senator Al Gore and his own EPA Administrator, William Reilly, who publicly urged Bush to attend. Bush relented and was one of more than 100 heads of state that adopted the UNCED documents. Bush, however, did not sign the Convention on Biological Diversity due to ambiguities relating to the transfer of technology. He told the conference audience: Our efforts to protect biodiversity itself will exceed the requirements of the treaty. But that proposed agreement threatens to retard biotechnology and undermine the protection of ideas, . . . it is never easy to stand alone on principle, but sometimes leadership requires that you do. And now is such a time Agenda 21 and the Rio Declaration are not binding documents. They are soft law documents which are the foundation for future binding documents such as the Framework Convention on Climate Change and the Convention on Biological Diversity. These two treaties contained important new features that are not present in the hundreds of other international treaties that the U.S. has ratified. These treaties do not allow any reservations or exceptions. Other treaties provide for parties to specify particular reservations or exceptions to which they are not bound. The UNCED treaties require all-or-nothing participation. The UNCED treaties created a Conference of the Parties (COP) which is a permanent body of delegates which has the authority to adopt protocols, or regulations, through which to implement and administer the treaty. The UNCED treaties were non-specific. The treaties were actually a list of goals and objectives; the COP was created to develop the protocols necessary to achieve the objectives after the treaties had been ratified. The Framework Convention on Climate Change, for example, binds participating nations to the reduction of carbon dioxide emissions to 1990 levels by the year 2000; the COP develops the protocols necessary to achieve that goal, and the member nations are legally obligated to comply. The Convention on Biological Diversity requires the creation of a system of protected areas. The COP will adopt protocols to define what is an acceptable system of protected areas long after the treaty has been ratified. The binding treaties are written in language that appears to pursue environmental objectives: however, the principles upon which the treaties are based (The Rio Declaration) are in fact a refined re-statement of the principles for social change developed by the various socialist-dominated commission of the 1980s. For example, Principle 1: Human beings are at the center of concerns for sustainable development . . . ; Principle 2: National sovereignty is subject to international law . . . Principle 3: The right to development must be fulfilled so as to equitably meet developmental and environmental needs of present and future generations; Social change is clearly the first objective of the Declaration.Dr. Dixy Lee Ray, who attended the conference, reported: The objective, clearly enunciated by the leaders of UNCED, is to bring about a change in the present system of independent nations. The future is to be World Government with central

[20]

planning by the United Nations. Fear of environmental crises whether real or not is expected to lead to compliance. To assure that the COPs of the respective treaties were properly guided in their discussions of the protocols necessary for implementation, the UNEP/IUCN/WWF/WRI partnership launched a Global Biodiversity Assessment (GBA). Robert T. Watson, NASA chemist and co-chair of UNEPs Ozone Panel, was chosen to chair the project. IUCNs Jeffrey McNeely was selected to produce the important section on Human Influences on Biodiversity, and WRIs Kenton Miller coordinated the critical section on Measures for the Conservation of Biodiversity and Sustainable use of Its Components. The work was begun before the treaty had been ratified by a single nation, and involved more than 2000 scientists and activists from around the world.UNCED adjourned and the thousands of NGO representatives went home to begin the campaign to ratify the treaties and implement Agenda 21 and the principles of the Rio Declaration. A Chicago Tribune article by Jon Margolis, September 30, 1994, said that the Global Biodiversity Assessment was a process that had just begun, that no document existed. A participant in the GBA process had secretly photocopied several hundred pages of the peer-review draft of the document. Summaries of the draft documents were prepared and provided to every member of the U.S. Senate. The shocking details of the bizarre plan to transform societies was sufficient to block a ratification vote in the closing days of the 103rd Congress, despite the fact that the treaty had been approved by the Foreign Relations Committee by a vote of 16 to 3. Agenda 21 called for each nation to create a plan for sustainable development consistent with the principles of the Rio Declaration. The UN created a new Commission on Sustainable Development, and Maurice Strong created a new NGO called Earth Council, based in Costa Rica, to coordinate NGO activity to implement the Rio Declaration principles through national Sustainable Development Programs. Earth Council has produced a directory listing more than 100 nations that have formal sustainable development plans under development. The UN created another program to empower children to help implement the sustainable development program: Rescue Mission: Planet Earth. In a Rescue Mission newsletter Action Update, their work is described as getting governments together who try to make the others feel guilty for not having done what they promised on Agenda 21. To implement Agenda 21 and the principles of the Rio Declaration in America, President Bill Clinton issued Executive Order No. 12852, June 29, 1993, which created the Presidents Council on Sustainable Development (PCSD). Jonathan Lash, President of the World Resources Institute (WRI) was named as co-chair. Jay D. Hair, President of the IUCN, and former President of the National Wildlife Federation was one of eight NGO leaders appointed to the Council. Eleven government officials, along with the eight NGO leaders, easily dominated the discussions and produced a predictable report from the 28-member Council. Not surprisingly, the final report, Sustainable America: A New Consensus, presents 154 action items to achieve 38 specific recommendations that are precisely the recommendations called for in Agenda 21. The most casual reading of the PCSDs 16 We Believe statements, compared with the 27 principles of the Rio Declaration, reveals that the PCSD has simply Americanized the Rio language to form the foundation for implementing the UN agenda in America. PCSD Belief No. 10, for example: Economic growth,, environmental protection, and social equity are linked. We need to develop integrated policies to achieve these national goals sounds very much like Rio Principle No. 3 The right to development must be fulfilled so as to equitably meet developmental and environmental needs of present and future generations.The PCSD is Agenda 21 at work in America. The PCSD also provides a glimpse of the global governance process to come. Public policy is initiated by non-elected officials, massaged into specific proposals by an NGO-dominated stakeholders council, written into regulations administratively by willing bureaucrats (who themselves,

[21]

are frequently former NGO officials), or presented to Congress for approval along with the threat of retaliation at the ballot box from the millions of NGO members represented by the stakeholders council. The UNCED and Agenda 21 covered an extremely wide range of issues that affect virtually every person on the planet. The purpose for the array of policy recommendations put forth for public consumption is, ostensibly, to protect the planet from inevitable destruction at the hands of greedy, uncaring, or unaware humans. At the core, however, the policies recommended are socialist policies, built on the assumption that government is sovereign and must manage the affairs of its citizens. Nothing in Agenda 21, the Rio Declaration, or the PCSD recommendations even acknowledges the idea that humans are born free, and are sovereign over the governments they create. Nothing acknowledges the idea that governments first responsibility is to protect the inherent freedom of its citizens, particularly, the freedom to own and use property. To the contrary, everything about the UNCED documents aims to limit human freedom and to restrict the use of private property until it can be placed in the public domain. As sweeping as the UNCED documents are, they are but the first step in the final march to global governance. The IUCN held its triennial session in Buenos Aires, Argentina, in 1993. Dr. Jay D. Hair assumed Presidency of the organization, as Shirdath Ramphal stepped down to devote more time to his position as co-chair of the UN-funded Commission on Global Governance. His parting message is illuminating: Rio, for all its disappointments, set the seal on a new agenda for the world: the agenda of sustainable development. It was not, of course, new for IUCN, which had blazed a trail for sustainable development since 1980 with the World Conservation Strategy. In the final analysis, it is a matter of equity. There are also other aspects to the claims of equity. If there are limits to the use of some resources, they must be fairly shared. Early users, who have prospered, must not preempt them but must begin to use less so that others may also progress. The rich must moderate their demands on resources so that the poor may raise theirs to levels that allow them a decent standard of living. Equity calls for no less. We need . . . to persuade others that, for the Earths sake consumption, must be better balanced between rich and poor. Equity, or wealth redistribution, is clearly the underlying purpose for sustainable development, in the IUCN agenda. Its influence over UNEP activities and upon the global agenda cannot be overstated. Its membership includes 68 sovereign nations, 103 government agencies, and more than 640 NGOs. Among the government agencies listed as contributors in the 1993 Annual report are: the U.S. Department of State; U.S. Agency for International Development (USAID); and the U.S. Fish and Wildlife Service. The U.S. State Department contributes more than $1 million per year to the IUCN. The IUCN evaluates every proposed World Heritage site and recommends to UNESCO whether or not it should be listed, or listed in danger.George Frampton, Assistant Secretary for Fish and Wildlife and Parks, asked UNESCO specifically to send a representative from IUCN to evaluate Yellowstone Park as a site in danger in 1995.On January 18, 1996, President Clinton issued Executive Order 12986, which says: I hereby extend to the International Union for the Conservation of Nature and Natural Resources the privileges and immunities that provide or pertain to immunity from suit. The IUCN is the driving force behind UNEP and the global environmental agenda. The Convention on Biological Diversity was developed and proposed by the IUCN in 1981 to the World Commission on Environment and Development.The IUCN is the architect and engineer designing the road to global governance.

[22]

From Rio to Vienna (1993) The UN Conference on Human Rights was held in Vienna, June 1993. The primary objective of this conference was to promote the pending Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW). FewAmericans have ever heard of such a treaty and would probably not object on the basis of the title alone. However, as is always the case, the devil is in the details. The treaty would guarantee the right to housing for women, the right to choice, or abortion (Article 16e). Cecilia Acevedo Royals, President of the National Institute of Womanhood, in testimony before the Senate Foreign Relations Committee: This Convention is deeply flawed. It will, in fact, harm women, men and children by establishing an international policy instrument that can be used as a weapon against the family, the institution of marriage, and cultural and religious values, and that can be turned into a tool for the societal control of women. While the Convention aims at guaranteeing certain rights to women, it would, in fact, give to the UN the power to enforce those rights. Instead of empowering women, it would, in fact, empower the state, the global state, the United Nations. The Convention has been ratified by 130 nations, though not by the United States. The Clinton Administration prodded State Department officials to urge Senate ratification.

From Vienna to Uruguay (1994) On April 15, The New York Times carried a full-page ad that hailed the World Trade Organization as the third pillar of the new world order.The World Trade Organization (WTO) sailed through the Senate in the closing days of the 103rd Congress, handing over to the UN system the authority and the mechanism to impose and enforce its agenda on America. The WTO Charter requires the optimal use of the world resources in accordance with the objective of sustainable development (Preamble). It requires the WTO to make appropriate arrangement for effective cooperation with NGOs and intergovernmental organizations (Article V). It requires member nations to change their laws to conform to the WTO: each member shall ensure the conformity of its laws, regulations and administrative procedures with its obligations as provided in the annexed Agreements (Article XVI). Although the U.S. must pay a disproportionate share of the WTO cost, it has only one vote and no veto (Article IX). The WTO may impose trade sanctions on a nation that it determines is not in compliance with any international treaty. It may impose sanctions, fines, and penalties on a nation, or on an industry. Members are bound by the dispute resolutions dictated by the WTO (Section 2, Annex 2). Bilateral trade deals must meet the approval of the WTO. Bilateral or multilateral trade agreements can be changed by a vote of the members of the WTO (Article X (4)). Article XVI says: No reservations may be made in respect to any provision of the Agreement. The WTO could not have survived without the U.S. The UN could not have controlled world trade without the WTO. But now the facility is in place and the bureaucracy is gearing up to become the first-line enforcement mechanism of global governance.

From Uruguay to Cairo (1994) Population control has long been a high priority for the United Nations, though promoted for different reasons, by different names, at different times. Currently, the population explosion is cited as the underlying cause of the human impact on biodiversity and on climate change. Population

[23]

control entered the UN agenda as a eugenics issue by virtue of Julian Huxleys involvement with British Population Investigation Commission and the Eugenics Society. In 1954, the Rome conference promoted the concept of fertility as an economic factor. By 1974, the Bucharest conference integrated population and development issues with the developed nations insisting that population reduction was essential to economic development. When the issue emerged at the Mexico City Conference, it appeared as a matter of womens rights and freedom of choice. In Cairo at the September International Conference on Population and Development (ICPD), population control was seen by some to be a matter of womens empowerment by the statewhile others saw population control as an essential requirement of sustainable development initiatives.The Cairo Programme of Action said: . . . unsustainable consumption and production patterns are contributing to the unsustainable use of natural resources and environmental degradation as well as tosocial inequities and poverty (Chapter 3.1); and Governments should establish the requisite internal institutional mechanisms . . . to ensure that population factors are appropriately addressed within the decisionmaking and administrative processes (Chapter 3.7). The conference agenda focused on gender equality; the eradication of poverty; family in its various forms; childrens rights; education; as well as population policies, human rights, and sustainable development. Population control is critical to the overall global environmental agenda. The Global Biodiversity Assessment concludes that: A reasonable estimate for an industrialized world society at the present North American material standard of living would be 1 billion. At the more frugal European standard of living, 1 to 3 billion would be possible. An agricultural world, in which most human beings are peasants, should be able to support 5 to 7 billion people . . . . The cost of the various UN population programs discussed at the conference was estimated to be between $17 and $75 billion. The World Resources Institute (WRI) reported in the NGO Networker that Zero Population Growth was the NGO coordinating lobbying activities for the Cairo conference.

From Cairo to Copenhagen (1995) In Copenhagen, the UNs World Summit on Social Development was the occasion for advancing the road to global governance. The central theme of the conference was the eradication of poverty. The agenda also included population policies, the reduction of consumption, and elevating NGO participation. More than anything else, the conference was about money, getting it to the UN, and increasing the power of the UN to collect it and spend it. The conference proposed an international 20/20 Compact which would require developing countries and aid donors to allocate 20 percent Official Development Assistance (OAD) to human development priorities. Commitment 8 in the Draft Conference Document calls on nations to target .07 percent of Gross Domestic Product to Official Development Assistance. The conference was used by the UN-funded Commission on Global Governance to float a trial balloon: global taxation. Buried in the UNDPs 1994 Human Development Report was an idea advanced by James Tobin calling for a uniform international tax on international currency transactions. When the UNDP report was presented to the conference, it was heralded as the way to provide substantial reliable funds for sustainable human development. Conference documents describe the proceeds from the tax as immense, over $1.5 trillion per year (150 times the current total UN budget) to be devoted to international and humanitarian purposes and to be placed at the disposal of international institutions.

[24]

Other global taxes were also proposed: international travel; telecommunications; and taxes on resource use especially energy resources. Paragraph 75 of the conference document calls for the strengthening ofnon-government organizations . . . enabling them to participate actively in policy-making . . . involving these organizations in the design, implementation and evaluation of social development strategies and specific programmes. It was clear to Rita Joseph, who attended the conference for Population Research Institute, that The thrust currently behind the latest declarations is to set up not only monitoring bodies, but enforcement agencies, to which individual and group petitions concerning perceived grievances may be mounted. There is a push on to expand international government so that it reaches right down to communities and homes, there to dabble in values reorientation. NGO lobbying activities for this conference were coordinated by the Overseas Development Council in Washington, DC., according to WRls NGO Networker. (The editor of the NGO Networker, Sarah Burns, went to work for the UNDP in Washington as NGO Liaison in 1994).

From Copenhagen to New York (1995) The UN Commission on Sustainable Development held its third meeting in New York, April 1995. This was a Commission meeting rather than a World Conference. The pomp was not as pompous, but the circumstance was as significant as any UN meeting. The agenda focused on land degradation, desertification, forests and biodiversity; patterns of consumption, financial resources, and technology transfer. The Commission is said to be developing a new international Convention on Sustainable Development, but a new strategy is being used. Other Conventions have been developed through a long series of Commission meetings until they are complete. Then they are presented to the world at a World Conference, as was the case with the Framework Convention on Climate Change and the Convention on Biological Diversity. Maurice Strongs strategy is to get individual nations to develop their own sustainable development plan, all of which are developed within the framework of Agenda 21, so that when the Convention on Sustainable Development is finally completed, most of the nations will already be doing what the Convention calls for. Until the Convention is complete and ratified, the sustainable development programs within individual nations will be authorized by national law. When the Convention is ratified, the programs will come under the authority and under the regulatory and enforcement procedures of the United Nations.

From New York to Beijing (1995) All the pomp that was missing in New York was present in Beijing for the fourth World Womens Congress in September 1995, preceded by a week-long NGO Forum. The event was expected to produce a Platform for Action to guide national and international policy on womens issues into the 21st century. The event was the culmination of a 180-Day Local-to-Global-to-Local Womens Empowerment Campaign organized by the NGO WEDO (Women for Environment and Development Organization). WEDOs parent organization, Women U.S.A. Fund, Inc, is headed by Bella Abzug, Congresswomen Patsy Mink and Maxine Waters, and Gloria Steinem. Funding for the NGO comes from the Ford Foundation, the MacArthur Foundation, the Jessie Smith Noyes Foundation and the Turner Foundation. The campaign featured the coordinated release of press kits to the media, boycotts, take over the legislature for a day rallies, forums, lunchtime workshops with fellow

[25]

workers, and a myriad of actions all over the world. The purpose of the campaign was to focus public attention on the Beijing Conference, and more particularly, on WEDOs conference agenda. WEDO called for the tracking of all national and international economic and development programs by social and gender impact studies; restrictions on economic growth in industrialized countries; the transfer of common property (water, forests, grazing lands and fishing waters) to international control; prohibiting ownership of such common property to national or international corporations; national and international strategies to alleviate womens poverty; remuneration for womens unpaid work (housekeeping, child rearing, etc.); taxes shifted from income to consumption; universal guaranteed income and payment for childcare and other socially productive activities; and a universal 50/50 program that would require all business and government entities to have a 50/50 men/women work force. The conference produced more hype, hoopla, and hyperbole than anything else. First there was a flap about having a World Conference on Womens issues in a nation which so severely oppressed women. Then there was a flap about the facilities. Then there was a flap about the extreme security measures. Then there was Hillary Clinton, who put in a personal appearance. Of significance is the reappearance of the Tobin Tax as a recommended way to fund the extravagant programs demanded by the delegates. There reappeared new calls to elevate the status and authority of NGOs in decision-making and in program administration. And there was a new idea advanced the FDR (not Franklin D. Roosevelt). The FDR means Family Dependency Ratio. The idea calls for extensive monitoring of the activities, consumption, and production of every member of every family to determine whether a family is a net consumer or producer. This idea grew out of WEDOs demand to value and remunerate women for their unpaid work. Throughout the Conference, debate on the serious issues as well as the frivolous issues proceeded with virtually no challenge to the appropriateness of UN jurisdiction over a range of issues that should be at least national, if not extremely personal. Taxation, employment policies, and land use policies were all offered up to the UN. Delegates and the NGO lobbyists passed the stage of questioning the appropriateness of global governance; it is now a question of how much and how soon. There is no longer any discussion of freedom, property rights, or national sovereignty. The discussion centers around how best to get the wealth from developed countries into the UN for redistribution to the undeveloped countries. The documents coming from each of the successive World Conferences continue to reflect the assumption that government the United Nations Government should be sovereign, and that nation states are secondary, and individuals are cannon-fodder.

From Beijing to San Francisco (1995) The Beijing Conference had hardly adjourned when Gorbachevs State of the World Forum convened in San Francisco, September 27, 1995. Though not an official UN function, the Forum was designed to advance global governance. Forum President and founder of the Christic Institute, Jim Garrison, told the San Francisco Weekly, We are going to end up with world government . . . we have to govern and regulate human interaction.Gorbachev told the hand-picked audience of celebrities and dignitaries that we are giving birth to the first Global Civilization. Zbigniew Brzezinski, President Carters National Security Advisor, told the audience that regionalism must precede world government. New-age guru, Sam Keen received enthusiastic applause for his pronouncement: If we cut the worlds population by 90%, there wont be enough people left to do ecological damage.

[26]

The Forums agenda called for the transfer of all armaments to the UN, the initiation of global taxation, stricter population control programs, and the elimination of nationalism and national borders. The highlight of the event was a joint presentation by Gorbachev, former President George Bush, and former Prime Minister Margaret Thatcher. Gorbachev is the founding President of Green Cross and the Gorbachev Foundation. He along with Maurice Strong were regarded as candidates to replace Boutros Boutros-Ghali as Secretary-General of the United Nations at the expiration of Ghalis term December 31, 1996.However since UN rules have required that an African hold the position of Secretary-General for another term, Kofi Annan has assumed this position. Maurice Strong has been designated his Senior Advisor for restructuring the United Nations. On 16 July 1997, Kofi Annan released a report on UN reform plans. They coincide with the blueprint drawn in Our Global Neighborhood: Report of the Commission on Global Governance. It is noteworthy that its lead author is Maurice Strong.

From San Francisco to Istanbul (1996) Habitat II, the UN Conference on Human Settlements, convened in Istanbul in June 1996. Despite the fact that Habitat I called for the elimination of private property in 1976, the U.S. has contributed more than $32 million to its operations and sent an enthusiastic delegation to Istanbul to assure the Conference that America is supporting its objectives. The entire agenda was bathed in the ambiguous language of sustainable development. Two of the major issues to emerge through the noise of 4000 delegates and 25,000 NGO representatives, were: (1) the right to housing, and (2) good governance. Although at least three previous UN documents declare the right to housing, two of them have not been ratified by the U.S. Consequently, the universal right to housing is in question. Article 5 of the Convention on the Elimination of All Forms of Racial Discrimination declares a right to housing. The U.S. has ratified that Convention. The International Covenant on Economic, Social, and Human Rights, and the Convention on the Rights of the Child, both of which declare the right to housing, have not been ratified by the U.S. As the leader of one NGO, called the Centre on Housing Rights and Evictions, says: The right to housing is a powerful, mobilizing tool for womens groups, street children and so on. Denying this right would be a great step backwards.If housing is declared to be a universal right, then the UN would have the responsibility of guaranteeing and enforcing that right. And to have meaning, the UN would have to have the authority to collect the money necessary to provide universal housing. Of more direct importance is the issue of good governance. Throughout all the conferences of the 1990s, emphasis has been placed on expanding the role and functions of NGOs in the decisionmaking process and the management and administration of government programs at every level. Habitat II Director-General, Wally NDow, said: The road to Istanbul has been marked by many innovations. One of seminal importance has been a pioneering change in the rules of procedure a change that was initiated during the preparatory process and subsequently endorsed by the General Assembly [Rule 61] in recognition of the important role of local authorities and NGOs. As a result, all the organizations and institutions of civil society will receive unparalleled recognition at a UN conference, nominating their representatives to participate in a formal session . . . . They speak for countless millions of men and women in the cities and towns across the planet, the true constituents of Habitat II. This rule change officially elevates NGOs to participatory status in the policy-making process of the United Nations. It is common in fact expected in socialist countries. Moreover, Rule 61 invites participation by local officials. Heretofore, the UN has served its member nations as represented by official delegates. This rule is the first step toward bypassing the official

[27]

national government to extend UN influence, programs, and eventually money, regulations, and enforcement directly to the people within the nation. This is the essence of governance by civil society, orchestrated by the United Nations. This is the first wave of the reality of global governance.

From Istanbul to Geneva (1996) The second meeting of The Conference of the Parties to the Framework Convention on Climate Change (COPII-FCCC), convened in Geneva, Switzerland July 8-19, 1996. The treaty was presented in 1992 at the Rio Earth Summit, and has now been ratified by 159 nations, including the U.S. The treaty requires participating Annex I (developed) nations to reduce greenhouse gas emissions to 1990 levels by the year 2000. At COPI, however, meeting in Berlin in 1995, the Alliance of Small Island States (AOSIS) proposed that developed nations reduce emissions to a level 20%, less than 1990 levels. The COP did not adopt the proposal, but did adopt the Berlin Mandate which was an agreement to develop a legally binding Protocol by 1997. COPII was designed to negotiate The terms of the Protocol for adoption at COPlII in Kyoto, Japan in 1997. To influence the proceedings, the Intergovernmental Panel on Climate Change (IPCC) released its Second Assessment Report (SAR). For the first time, the official UN body claimed that . . . the balance of evidence suggests a discernible human influence on global climate. Although 100 scientists some of whom were participants in the IPCC process publicly objected to the reports findings in a statement called the Leipzig Declaration, the Conference pushed forward toward a legally binding Protocol. The conference document, called the Ministerial Declaration, endorses The SAR; declares that emissions will eventually have to be reduced by 50%; and calls on developed nations to initiate policies to reduce emissions within specific industries: energy, transportation, agriculture, forestry, waste management, and economic instruments.

From Geneva to Global Governance (1998) When Shirdath Ramphal handed over the IUCN gavel to Jay Hair in 1993, he turned his attention to the Commission on Global Governance which he co-chaired along with Ingvar Carlsson, former Prime Minister of Sweden and then-Leader of the Social Democratic Party in Sweden. Like the Commissions of the 1980s (Brandt, Palme, MacBride, and Brundtland) it was an independent commission, meaning that it was not created by a resolution of the UN General Assembly. It operated officially as an NGO but, as a practical matter, it was an instrument of the United Nations. The Commission on Global Governance received the formal endorsement of Butrous-Butrous Ghali, UN Secretary-General, and funding from the United Nations Development Program. Nine nations and several private foundations also supplied funding. Oscar Arias, former President of Costa Rica was a member of the Commission. Arias won the Nobel Peace Prize for his peace plan which called on nations to direct disarmament savings to the UNs development programs. Adele Simmons, President of the John D. and Catherine T. MacArthur Foundation, and a member of the Council on Foreign Relations, was a member. Maurice Strong also served on the 28-member Commission. Several of the Commissions ideas were advanced experimentally at the various world conferences during the early 1990s. They tested the waters particularly for the several global taxation ideas, and for their ideas about global governance through civil society. Their final report was released in

[28]

conjunction with the 50th anniversary of the United Nations in the fall of 1995, entitled Our Global Neighborhood: The Report of the Commission on Global Governance. The Commission recommended that: the General Assembly should agree to hold a World Conference on Governance in 1998, with its decisions to be ratified and put into effect by 2000. Hereafter, numbers in parentheses indicate the reference page number in Our Global Neighborhood. The Commission bases its recommendations on the belief that human activities have irreversible environmental impacts and that human activities need to be managed to keep the adverse outcomes within prudent bounds (p. 11). Effective and equitable management calls for a systemic, long-term, global approach guided by the principle of sustainable development. Its universal application is a priority among the tasks of global governance (p. 30). The Commission is convinced that the world is ready to accept a set of core values that can unite people of all cultural, political, religious, or philosophical backgrounds. It is fundamentally important that governance should be underpinned by democracy at all levels and ultimately by the rule of enforceable law (p.48). The core values upon which global governance is to be based include liberty. Voluntary acceptance of global governance is the preferred means of achieving it. Education programs to teach the global ethic have been underway by UNESCO and by UNEP for more than 20 years. That the U.S. government, through its representatives to the various UN agencies, has not already crushed this global governance agenda is a testament to the effectiveness of the UNs education program. But the Commission is not content to rely upon voluntary acceptance. An intricate maze of international, enforceable law is encircling the planet in the form of Conventions, Treaties, and Executive Agreements. To implement, administer, and enforce global governance, the Commission has recommended a major restructuring of the UN system. The Commission recommends an Assembly of the People which should consist of representatives of organizations accredited to the General Assembly as Civil Society Organizations . . . . A Forum of 300-600 organs of global civil society would be desirable and practicable (p. 258-259). A new Petitions Council is recommended, to consist of five to seven representatives of civil society, for the purpose of reviewing petitions from NGOs in the field to direct to the appropriate UN agency for enforcement action (p. 260). A new Economic Security Council (ESC) would replace the existing Economic and Social Council. The new ESC would consist of no more than 23 members who would have responsibility for all international financial and development activities. The IMF, the World Bank, and the WTO virtually all finance and development activities would be under the authority of this body. There would be no veto power by any nation, nor would there be permanent member status for any nation (p. 266f). The existing Security Council would be restructured. Veto power of the five permanent members would be eliminated, as would permanent member status over time. With the Secretary-Generals office expanded to include the function of Commander-in-Chief, the Security Council would oversee a new UN standing army, complete with support and transport car capabilities. (p. 100f) The Commission calls for an international convention on curtailment of the arms trade (p. 129), a demilitarization of international society, and disarming of civilians. (p. 131)

[29]

A new International Criminal Court would be created, complete with its own independent prosecutor or a panel of prosecutors of the highest moral character. (p. 324) The International Court of Justice would become compulsory and it would issue binding verdicts in order to strengthen international law. (p.308f) Unconstitutional intrusion into aspects of privacy If the phantasmatic community is entitled to control your lifestyle , then why arent they entitled to break in your house? "...current lifestyles and consumption patterns of the affluent middle class - involving high meat intake use of fossil fuels, appliances, home and work-place air-conditioning, and suburban housing - are not sustainable. A shift is necessary. which will require a vast strengthening of the multilateral system, including the United Nations..." [1] Maurice Strong , opening speech at the 1992 UN Conference on Environment and Development This global contract binds all nations and spreading regions to the the collective vision of "sustainable development." They must commit to pursue the three E's of "sustainability": Environment, Economy and Equity referring to the UN blueprint for environmental regulations, economic regulations, and social equity. Agenda 21, the UN blueprint for global transformation, sounds good to many well meaning people. Drafted for the purpose of creating "sustainable societies", it has been welcomed by nations around the world. Political, cultural, and media leaders have embraced its alluring visions of social justice and a healthy planet. They hide the lies behind its doomsday scenarios and fraudulent science. Relatively few consider the contrary facts and colossal costs. After all, what could be wrong with preserving resources for the next generation? Why not limit consumption and reduce energy use? Why not abolish poverty and establish a global welfare system to train parents, monitor intolerance, and meet all our needs? Why not save the planet by trading cars for bikes, an open market for "self-sustaining communities," and single dwellings for dense "human settlements" (located on transit lines) where everyone would dialogue, share common ground, and be equal? The answer is simple. Marxist economics has never worked. Socialism produces poverty, not prosperity. Collectivism creates oppression, not freedom. Trusting environmental "scientists" who depend on government funding and must produce politically useful "information" will lead to economic and social disaster. This global contract binds governments around the world to the UN plan for changing the ways civilians live, eat, learn, and communicate - all under the noble banner of saving the earth. Its regulations would severely limit water, electricity, and transportation - even deny human access to our most treasured wilderness areas. If implemented, it would manage and monitor all lands and people. This agenda for the 21st Century was signed by 179 nations at the UN Conference on Environment and Development in Rio de Janeiro in 1992. Among other things, it called for a Global Biodiversity Assessment of the state of the planet. Prepared by the UN Environmental Programme (UNEP), this GBA armed UN leaders with the "information" and "science" they needed to validate their global management system. Its doomsday predictions were designed to excuse radical population reduction, oppressive lifestyle regulations, and a coercive return to earth-centered religions as the basis for environmental values and self-sustaining human settlements.

[30]

The GBA concluded on page 763 that "the root causes of the loss of biodiversity are embedded in the way societies use resources." The main culprit? Judeo-Christian values. Chapter 12.2.3 states that"This world view is characteristic of large scale societies, heavily dependent on resources brought from considerable distances. It is a world view that is characterized by the denial of sacred attributes in nature, a characteristic that became firmly established about 2000 years ago with the Judeo-Christian-Islamic religious traditions. "Eastern cultures with religious traditions such as Buddhism, Jainism and Hinduism did not depart as drastically from the perspective of humans as members of a community of beings including other living and non-living elements." Maurice Strong, who led the Rio conference, seems to agree. His ranch in Colorado is a gathering place for Buddhist, Bahai, Native American, and other earth-centered religions. And in his introduction to The Local Agenda 21 Planning Guide, he called local leaders around the world to "undertake a consultative process with their populations and achieve a consensus on 'Local Agenda 21' for their communities." 1.10 Microsocial engineering through Local Agenda 21: open system dynamics or groupings of pragmatically driven individuals legitimating their redistribution of wealth interests under a communitarian cloak? Consensus masks ubiquitous psychological mechanisms operative in group decision making (see chapter 3) Chapter 28 of Agenda 21 specifically calls for each community to formulate its own Local Agenda 21: "Each local authority should enter into a dialogue with its citizens, local organizations, and private enterprises and adopt 'a local Agenda 21.' Through consultation and consensus-building, local authorities would learn from citizens and from local, civic, community, business and industrial organizations and acquire the information needed for formulating the best strategies." (Agenda 21, Chapter 28, sec 1,3.) This tactic may sound reasonable until one realizes that the dedicated "Stakeholder Group' that organizes and oversees local transformation is not elected by the public. And the people selected to represent the 'citizens' in acommunity do not necessarily represent ones legally bound interests. The chosen 'partners', professional staff, and working groups are implementing a new system of governance without asking for clearance and moreover through covert operations, evidenced through exclusionary tactics against the backdrop of pragmatic interests. These are sufficient indications that the plan is moving forward behind the scenes. 1.11 The New Age vs Old system rhetoric: simply a matter of redistribution of power and indirect legitimation for multiparticipant, multiact perpetration in the context of organized power mechanisms (see chapter 4) against an emergent discursive dominant paradigm The ICLEI Planning Guide suggests that Stakeholders select two kinds of people to serve their agenda: (1) ordinary people who don't have "a stake" in the old system and would expect to gain power by establishing a new political system, and (2) media, business, political, church, and education leaders who must be wooed and persuaded to promote the transformation within their sphere of influence. The following ICLEI list includes both: A. Community Residents: women, youth, indigenous people, community leaders, teachers

[31]

B. Community-Based Organizations: churches, formal women's groups, traditional social groups, special interest groups C. Independent Sector: Non-governmental organizations (NGO). academia, media D. Private/Entrepreneurial Sector: environmental service agencies, small business/cooperatives, banks E. Local Government and Associations: elected officials, management staff, regional associations F. National/Regional Government: planning commission, utilities, service agencies, financial agencies.7 All participants must embrace the collective vision of a "sustainable community". They must commit to pursue the three E's of "sustainable development": Environment, Economy and Equity referring to the UN blueprint for environmental regulations, economic controls, and social equity. "Sustainable development is a process of bringing these three development processes into balance with each other," states ICLEID's Agenda 21 Planning Guide on page 21. "The implementation of a sustainable development strategy therefore involves negotiation among the primary interest groups (stakeholders) involved in these development processes. Once an Action Plan for balancing these development processes is established, these stakeholders must each take responsibility and leadership to implement the plan." Meanwhile, opposing voices must be silenced. "Implementing the 'sustainable agenda' requires marginalizing critics," says Craig Rucker, Executive Director of CFACT, a conservative public interest group in Washington, D.C. dealing with consumer and environmental issues. He explains, "Distinguished scientists who disagree with the globalist agenda are ridiculed and said to speak for conservative interests or industry (whether or not they receive industry funding) and their scientific arguments are never heard. Some of these marginalized critics are very distinguished scientists, like Dr. Frederic Seitz, former president of the National Academies of Science and a sharp critic of ozone depletion and global warming theories, Dr. S. Fred Singer, who help establish the satellite and balloon measuring devices to track global warming, and Dr. Edward Krug, who served on NAPAAP, among others. Some, like Dr. William Happer were even fired from their jobs questioning environmental dogma (in his case, on the issue of ozone depletion)."8 Ignoring these facts, nearly two thousand communities around the world are following this blueprint for change with support from ICLEID - and subject to its tracking system. Local Agenda 21-Santa Cruz was birthed in 1993 by the local chapters of the United Nations Association and ACTION (Agenda 21 Community Team Work in Operation). The original stakeholders began to "envision a sustainable future," choose compatible "partners", and organize the twelve Round Tables which evolved into twelve Special Focus Areas (for summaries of each plan, read Local Agenda 21 Pt.2 -Santa Cruz - Key points from the twelve Focus Groups): Agriculture Biodiversity & Ecosystem Management Education Energy Housing Population Public Health Resources and Recycling Social Justice Toxic Technology & Waste Management

[32]

Transportation Viable Economy Each item is linked to special interest groups, non-governmental organizations, who have been given authority (by no elected official) to plan the regulations that will control our lives The list of interest groups, donors and supporters includes feminist, globalist, environmental, and welfare organizations such as the Sierra Club, Earthlinks, Women's International League for Peace and Freedom, Greener Alternatives, Pacific Bell, Peace Child, United Nations Association-USA, Environmental Ecological Services, Change Management System, Countywide Joint Task Force on Sexual Harassment, Prevention and Education, and the Human Care Alliance (about 80 service providers and community groups), and the Welfare and Low-Income Support Network. The National Organization for Women (NOW), The Regional Alliance for Progressive Policy, Women's International League for Peace & Freedom, and Beyond Beijing (primarily feminists who attended the 1995 UN Conference on Women) are all part of a Task Force helping establish the guidelines for the Social Justice (Equity) and welfare branch of the Agenda. According to Local Agenda 21-Santa Cruz, their focus is the exploration of viable means to "alleviate the violence of poverty." "Educational systems encourage relevant, experiential learning and promote a sustainable, healthy life for all beings. Students embrace. global interdependence and the need to adopt fully sustainable practices locally and globally.... Focus is placed on teaching how to learn and how to enjoy learning. This involves:

1.

Cooperative learning in groups which is learner-directed, empowering and participatory 2. Development of an integrated core curriculum at all levels which emphasized the theme of unity and interdependence of humanity, all species and the Earth. 3. Development of an integrated core curriculum at all levels which emphasized the theme of unity and interdependence of humanity, all species and the Earth. 4. Student participation in developing their own curriculum. 5. Mixed age groups in the learning process." Learning that seems "democratic" (in contrast to authoritative) and cooperative (in contrast to individual) is key to winning the consent of the masses. All ages must participate, and each group member becomes accountable to the group - and to the politically correct "science" information used by the trained facilitator to move the dialogue toward the "right" choices and actions. Few realize the extent of the manipulation. In the Soviet Union, this consensus process was used to shift the loyalties of Soviet children from absolute truths to the evolving soviet ideology. Today it is used in American schools, communities, and workplaces - with support and direction from the President's Council on Sustainable Development and other NGOs that share its global vision. Far-reaching Networks. "Encourage networking," states the Santa Cruz Action Plan. No wonder, since networking, helps spread the word virally and COST-EFFICIENTLY. Remember, those who define the terms will write the rules. Those whose "science" will "educate" the masses, will control public beliefs and behavior.

[33]

Social Justice. The PARTICIPATING stakeholders are defining social justice and preparing its standards (AN INCIDENCE OF EXTRAJUDICIOUSNESS, as demonstrated in CHAPTER 4). They include NOW, Beyond Beijing, social welfare leaders, environmental groups - all the voices that demand the abolition of Western culture, male leadership, and biblical absolutes. Look at their vision for Santa Cruz County: 1.12 Agenda 21 not by accident contains as part of the project's descriptor the first degree of freemasonry (that is 21) Freemasonry, as amply demonstrated, is a secret society4 favoring social networking among its members. Over and above, the influence of freemasonry (political5 and institutional6) and its active involvement in shaping political landscapes (from Albert Pikes originating the KKK, presidents as members of the brotherhood, the Italian P2 and recently P3 scandals, the Bavarian Illuminati and the list goes on) its intra network favoritism at the expense of profane has also received considerable attention from both private and public authorities realms. The resemblance of the social networking paradigm imposed by agenda 21 to freemasonry is not only nominal, but in essence structural7.The striking structural similarities between these instances of societies within societies consist in the following: -

mandatory social networking preferential treatment of members vs non members8 concern with overthrowing existing regimes and placing proteges in key places conspiratorial attempts against those judged to be unfit to their standards mentor/student organizational form extra-judicial judiciary systems9 and referenda by raise of hand and adhocratic sanctions imposed on members on the occasion of agreed upon transgressions The cryptic ethos of agenda 21 has been popularized as a point system of ascendance to higher truth levels designated by numerical descriptors and echoing freemasonrys degrees (eg 37 being the equivalent of 23 or master mason, 57 being the equivalent of 25 or most perfect master and so forth) , a highly informal and adhocratic system, depending on a social network mentors extrajudiciary right to grant degress Advanced dissimulation tactics aiming at masking membership , motives and liaisons, evident both in freemasonry and agenda 21 members10 Ritual killings (eg Captain Morgan) and the transposition of symbolically univocal tactics to semiotic ritual killings or mock executions (see chapters 2 & 3) through acts and public spectacles, such as mobbing, street theater etc (see chapters 2 & 3) a structurally homonymous turn from closed/univocally symbolic systems to open, aleatoric signifying systems (see chapter 3 and allusion to Deleuzes multiple regimes of signs from AntiOedipus) ; in Deleuzes terms agenda 21 communicative tropes consist in freemasonrys communicative modes becoming hypermolecular

However, there are also structural differences:


4 5

Cf Michael Moores Secrets of a secret society Cf J.Robinsons seminal book Proofs of a conspiracy See UKs Home Affairs report FREEMASONRY IN THE POLICE AND THE JUDICIARY, the Fraternal order of Police in the US, List of Freemasons in the church etc

Cf paper sStructure and process in secret societies, Noel Gist, University of Missouri and The sociology of secrets and secret societies, Secret Societies and social structures 8 And among members, cf paper The Unbrotherly Brotherhood 9 See paper Yhecourstsystemandfreemasonry 10 See paper The Rhetoric of Freemasonry and the demonstration how theatrics and masked lingo are usual methods of members training

[34]

Open system dynamics (agenda 21) vs closed system dynamics (freemasonry) : no formal degrees and vertically controlled ascent to higher echelons of political power Horizontal vs vertical structures No apparent elitist attitude in members recruitment No strict symbolic language AND SYMBOLIC COLONIZATION OF SOCIAL MILIEUS AND POLITICAL LANDSCAPES11 but openess to perspectival diversity, whose endorsement and level of appeal is incumbent on group decision making during microsocial referenda Wheras freemasonrys extrajudiciary system consists of more formalized principles12 for conferring judgments about normative transgressions, agenda 21 , by virtue to its highly open character favors adhocism. At least it is a form of more attenuated adhocism compared to freemasonry.

The nominal and structural similarities between agenda and freemasonry are beyond any reasonable doubt. However, freemasonry over the centuries has been severely vindicated and repudiated in various countries as promoting favoritism and conspiratorial attempts, from a micro to a macro level of societal organization.

11 12

See Kings Mathematical proof of a conspiracy Cf Mackeys Principles of Masonic Law and paper masonic jurisprudence and related references

[35]

By analogy to freemasonry's being AT LEAST OPENLY vindicated in various parts of the world13, such as in the UK14 (increasing demands especially on behalf of public officials at declaring membership) ,the Italian juridical system, based on antecedents, declaring freemasonry as being an illegal organization and banning judges from joining it on the grounds of potential involvement in criminal activities (which interestingly was overruled by the ECHR), involvement in agenda 21 social networks may lead to conspiratorial attempts at non member societal exclusion and redistribution of assets. From working hypothesis to reality: the examples of Florida and other areas where the program has been used as an excuse for redistribution of wealth among informal council members. The demand for the agendas enforcement on behalf of authorities is suggestive of INSTITUTIONAL

13

Suppression of Freemasonry

Some governments have treated Freemasonry as a potential source of opposition due to its secret nature and international connections. It has been alleged by Masonic scholars that the language used by the totalitarian regimes is similar to that used by some modern critics of Freemasonry.[1] Contents [hide]

1 Papal States 2 United States 3 Hungary 4 Eastern Europe 5 The Islamic world 6 Italy 7 Spain 8 Japan 9 Other countries 10 Nazi Germany and occupied Europe 11 Iraq 12 United Kingdom 13 Notes and references 14 See also [edit] Papal States

15 External links

In 1736 the Florentine Inquisition investigated a Masonic Lodge in Florence, Italy,[2] and the Lodge was condemned in June 1737. The lodge had originally been founded by English Masons, but accepted Italian members. In 1738, Pope Clement XII issued Eminenti Apostolatus Specula, the first Papal prohibition on Freemasonry. A more contemporary call for suppression is found in the encyclical Humanum Genus, which calls Masonry a dangerous sect and demands that all bishops be vigilant on its abuses. [edit] United States After the 1826 disappearance of William Morgan, who was kidnapped by Freemasons[3] after publishing an expose and then apparently killed,[4] the Morgan affair resulted in increased suspicion of Freemasonry and the formation of the Anti-Masonic Party. William A. Palmer of Vermont and Joseph Ritner of Pennsylvania were both elected governor of their respective states on anti-Masonic platforms.

[36]

MECHANISMS complicity, also fleshed out informally through the popularization of community policing and civilian snitching From hypothesis to reality: accounts of listing suspects based on community members' allegations. Thus, the move from an old to a new ethos has been coupled with a return to medieval witchunting phenomena and quite expectedly so insofar as communitarian forms of societal organization have always been grounded on collective representations , originary myths and scapegoatist mechanisms as affirmative of the collectives common intentionality. As it will be demonstrated in chapter 3, the newly old phenomenon of targeting has always functioned sociocybernetically as a method of attaining psychic and discursive complicity among community members and the reflection of communitarian mores on institutional discourses (eg From Malleus Maleficarum to DSM- cf T.Szaszs The Industry of Madness, the Theology of Medicine, the Psychiatric Slavery, M.Foucaults History of Madness, Discipline and Punish etc).
Though few states passed laws directed at Freemasonry by name, laws regulating and restricting it were passed and many cases dealing with Freemasonry were seen in the courts.[5] Antimasonic legislation was passed in Vermont in 1833, including a provision by which the giving and willing taking of an unnecessary oath was made a crime. (Pub. Stat., sec. 5917),[6] and the state of New York enacted a Benevolent Orders Law to regulate such organizations.[5] The former sixth President of the United States, John Quincy Adams, objecting to the oath of secrecy, in particular to keeping undefined secrets, and to the penalties for breaking the oath, declared, "Masonry ought forever to be abolished. It is wrong - essentially wrong - a seed of evil which can never produce any good."[7] [edit] Hungary In 1919, Bla Kun proclaimed the dictatorship of the proletariat in Hungary. This marked the start of raids by army officers on Masonic lodges[8] along with theft, and sometimes destruction, of Masonic libraries, records, archives, paraphernalia, and works of art. Several Masonic buildings were seized and used for anti-Masonic exhibitions. Masonry was outlawed by a decree in 1920. In post war Hungary, lodges were described as "meeting places of the enemies of the people's democratic republic, of capitalistic elements, and of the adherents of Western imperialism."[1] [edit] Eastern Europe Freemasonry was suppressed throughout Eastern Europe and the Soviet Union during the Communist era.[9] [edit] The Islamic world After the condemnation of Freemasonry by Clement XII in 1738, Sultan Mahmut I followed suit outlawing the organization and since that time Freemasonry was equated with atheism in the Ottoman Empire and the broader Islamic world.[10] The opposition in the Islamic world has been reinforced by the anticlerical and atheistic slant of the Grand Orient of France.[10] Perhaps the most influential entity interpreting Sharia, or Islamic law, the Islamic Jurisdictional College on July 15, 1978 issued an opinion regarding Freemasonry asserting that it is a "dangerous" and "clandestine" organization.[10] Freemasonry is illegal in most of the Islamic world. It is prohibited in all Arab countries except Lebanon and Morocco.[10] [edit] Italy Benito Mussolini decreed in 1924 that every member of his Fascist Party who was a Mason must abandon either one or the other organization, and in 1925, he dissolved Freemasonry in Italy, claiming that it was a political organisation. It is worth noting that General Cappello, one of the most prominent Fascists, and who

[37]

This latent complicity or communitarian bonding surfaces either informally through defamatory agreements (or collective doxic positings, in Husserls terms, as will be shown in chapter 3) on pejorative ascriptions predicated of the subject as antonomasias salve communitarian veritate or formally as exclusionary statements echoed in institutional practices and handbooks, such as the psychiatric DSM (as demonstrated in chapter 2). 1.13 Conclusions In this chapter it was shown that Agenda 21, in its localized aspect, evidently and beyond all reasonable doubt: constitutes a blueprint for mandatory social networking is unconstitutionally selective regarding stakeholder groups and change agents

had also been Deputy Grand Master of the Grande Oriente, Italy's leading Grand Lodge, gave up his membership in the Fascist Party rather than in Masonry. He was later arrested on false charges and sentenced to 30 years in jail.[11] However as the membership list of the elite Propaganda Due Masonic Lodge (P2)revealed in 1981 many Italian Fascists and Black Shirt Members later became Freemasons. The Grand Master of P2, Lucio Gelli, was an intelligence officer with the Herman Gring Division and a fervent Mussolini supporter.[12] It is worth noting, however, that P2 had its warrant withdrawn in 1976 and thus was not an officially recognised Masonic Lodge for much of its existence.[citation needed] After the P2 scandal, a special law was issued that prohibited secret lodges.[citation needed] The Grande Oriente d'Italia, after taking disciplinary action against members with P2 connections, distanced itself from Gelli's lodge. Other laws introduced a prohibition on membership in allegedly secret organizations for some categories of state officers (especially military officers).[citation needed] [edit] Spain Franco. It is claimed that the dictator Miguel Primo de Rivera ordered the abolition of Freemasonry in Spain.[13] In September 1928, one of the two Grand Lodges in Spain was closed and approximately two-hundred masons, most notably the Grand Master of the Grand Orient, were imprisoned for allegedly plotting against the government.[14] It is certainly true that Masonic lodges provided a convenient forum for those critical of the dictator, regardless of their political persuasion. Following the military coup of 1936, many Freemasons trapped in areas under Nationalist control were arrested and summarily killed, along with members of left wing parties and trade unionists. It was reported that Masons were shot, tortured and murdered by organized death squads in every town in Spain. At this time one of the most rabid opponents of Freemasonry, Father Jean Tusquets, began to work for the Nationalists with the task of exposing masons. One of his close associates was Francos personal chaplain, and over the next two years, these two men assembled a huge index of 80,000 suspected masons, even though there were little more than 5,000 masons in Spain. The results were horrific. Among other countless crimes, the lodge building in Cordoba was burnt, the masonic temple in Santa Cruz, Tenerife, was confiscated and transformed into the headquarters of the Falange, and another was shelled by artillery. In Salamanca thirty members of one lodge were shot, including a priest. Similar atrocities occurred across the country: fifteen masons were shot in Logrono, seventeen in Ceuta, thirty-three in Algeciras, and thirty in Valladolid, among them the Civil Governor. Few towns escaped the carnage as Freemasons in Lugo, Zamora, Cadiz and Granada were brutally rounded up and shot, and in Seville, the entire membership of several lodges were butchered. The slightest suspicion of being a mason was often enough to earn a place in a firing squad, and the blood-letting was so fierce that, reportedly, some masons were even hurled into working engines of steam trains. By 16 December 1937, according to the annual masonic assembly held in Madrid, all masons that had not escaped from the areas under nationalist control had been murdered.[14]

[38]

is poised to overthrow an old regime by favoring and mandating the cultivation of a new communitarian ethos constitutes an application of sociocybernetics in the context of coevolving, self legitimated communities against the background of pseudo open system dynamics or simulated movements and probabilistic controls in power distribution among predefined social groupings it is covertly spreading with a stated intent to overthrow a hazily conceived of old regime it violates multiple aspects of formal national law and constitutional rights is sheltered in a mystical language and mysticism in terms of belief structures [echoing animistic beliefs, in Webers terms] animates its exponents as a pseudo ideological system of scientifically ill-founded principia acting as enablers behind

After the victory of dictator General Francisco Franco, Freemasonry was officially outlawed in Spain on 2 March 1940. Being a mason was automatically punishable by a minimum jail term of 12 years.[15] Masons of the 18 and above were deemed guilty of Aggravated Circumstances, and usually faced the death penalty.
[16]

According to Francoists, the Republican Regime which Franco overthrew had a strong Masonic presence.[17] In reality Spanish Masons were present in all sectors of politics and the armed forces.[18] At least four of the Generals who supported Franco's rebellion were Masons, although many lodges contained fervent but generally conservative Republicans. Freemasonry was formally outlawed in the Law for the Repression of Freemasonry and Communism.[19] After Franco's decree outlawing masonry, Franco's supporters were given two months to resign from any lodge they might be a member of. Many masons chose to go into exile instead, including prominent monarchists who had whole-heartedly supported the Nationalist rebellion in 1936. The common components in Spanish Masonry seems to have been upper or middle class conservative liberalism and strong anti-clericism.[20] The Law for the Repression of Freemasonry and Communism was not abrogated until 1963.[21] References to a "Judeo-Masonic plot" are a standard component of Francoist speeches and propaganda and reveal the intense and paranoid obsession of the dictator with masonry. Franco produced at least 49 pseudonymous anti-masonic magazine articles and an anti-masonic book during his lifetime. According to Franco: "The whole secret of the campaigns unleashed against Spain can be explained in two words: masonry and communism... we have to extirpate these two evils from our land."[22] [edit] Japan In 1938, a Japanese representative to the Welt-Dienst / World-Service congress hosted by Ulrich Fleischhauer stated, on behalf of Japan, that "Judeo-Masonry is forcing the Chinese to turn China into a spearhead for an attack on Japan, and thereby forcing Japan to defend herself against this threat. Japan is at war not with China but with Freemasonry, represented by General Chiang Kai-shek, the successor of his master, the Freemason Sun Yat-Sen."[1] [edit] Other countries Freemasonry was persecuted in all the communist countries,[9][1] but the organisation has survived in Cuba, allegedly providing safe haven for dissidents.[23] [edit] Nazi Germany and occupied Europe See also: Holocaust, Freemasonry, and Libert chrie (Freemasonry) The Nazis claimed that high degree Masons were willing members of "the Jewish conspiracy" and that Freemasonry was one of the causes of Germany's loss of the First World War. In Mein Kampf, Adolf Hitler writes that Freemasonry has "succumbed" to the Jews and has become an "excellent instrument" to fight for

[39]

their WILL to enforce the agenda and masking pragmatic interests stemming from its enforcement and evidently is coupled with a new lingo it is crypto totalitarian, both as regards strctural/organizational elements, as well as particular ethical principles echoed in pejorative statements about thus far accepted and widely shared lifestyles and habits is nominally and structurally continguous to freemasonry and in fact constitutes its dissemination in the context of open system dynamics through the legitimation of stringent ethical and structural/organizational controls on a microsocial level it aims at bringing forth the latent depopulation agenda the role of secret services consists in enforcing wealth redistribution decisions made during secret referenda by [as denoted in secret services lingo] putting the target in the fridge or freezing the target, or putting the target in the washing

their aims and to use their "strings" to pull the upper strata of society into their alleged designs. He continues, "The general pacifistic paralysis of the national instinct of self-preservation begun by Freemasonry" is then transmitted to the masses of society by the press.[24] In 1933 Hermann Gring, the Reichstag President and one of the key figures in the process of Gleichschaltung ("synchronization"), states "..in National Socialist Germany, there is no place for Freemasonry."[25]

Loge Libanon zu den 3 Zedern in Erlangen, Germany. First meeting after World War II with guests from USA, France and Czechoslovakia, May 1948. The Enabling Act (Ermchtigungsgesetz in German) was passed by Germany's parliament (the Reichstag) on March 23, 1933. Using the "Act", on January 8, 1934 the German Ministry of the Interior ordered the disbandment of Freemasonry, and confiscation of the property of all Lodges; stating that those who had been members of Lodges when Hitler came to power, in January 1933, were prohibited from holding office in the Nazi party or its paramilitary arms, and were ineligible for appointment in public service.[26] Consistently considered an ideological foe of Nazism in their world perception (Weltauffassung), special sections of the Security Service (SD) and later the Reich Security Main Office (RSHA) were established to deal with the Freemasonry.[27] Freemasonic concentration camp inmates were graded as Political prisoners, and wore an inverted (point down) red triangle.[28] In March 1935 According to Joseph Goebbels, the Soviet Union's recent inclusion in the League of Nations was engineered by 300 "members of the Jewish race and conspirators of Freemasonry." On August 8, 1935, as Fhrer and Chancellor, Adolf Hitler announced in the Nazi Party newspaper, Voelkischer Beobachter, the final dissolution of all Masonic Lodges in Germany. The article accused a conspiracy of the Fraternity and World Jewry of seeking to create a World Republic.[29] In 1937 Joseph Goebbels inaugurated an "AntiMasonic Exposition" to display objects seized by the state.[25] The Ministry of Defence forbid officers from becoming Freemasons, with officers who remained as Masons being sidelined.[1] During the war, Freemasonry was banned by edict in all countries that were either allied with the Nazis or under Nazi control, including Norway and France. Anti-Masonic exhibitions were held in many occupied countries. Field-Marshal Friedrich Paulus was denounced as a "High-grade Freemason" when he surrendered to the Soviet Union in 1943.[30]

[40]

machine, meaning isolating him and attempting to reify/realize the social representations that have been predicated of him by powerful members capable of directing decisions during group decision making processes through sociocybernetic methods (as will be demonstrated in chapters 2 and 3)15. Ultimately, it is a blueprint that indirectly legitimates adhocratic power plays among latent interest groups: the case for pseudo open system dynamics.

The preserved records of the RSHA - Reichssicherheitshauptamt Office of the High Command of Security Service pursuing the racial objectives of the SS through Race and Resettlement Office, show the persecution of the Freemasons.[27] The number of Freemasons from Nazi occupied countries who were killed is not accurately known, but it is estimated that between 80,000 and 200,000 Freemasons were murdered under the Nazi regime.[31] [edit] Iraq There was a time when there existed a number of lodges in Iraq when the country was under British Mandate just after the First World War. However the position changed in July 1958 following the Revolution, with the abolition of the Monachy and Iraq being declared a republic, under General Quessiem. The licences permitting lodges to meet were rescinded and later laws were introduced banning any further meetings. This position was later reinforced under Saddam Hussein the death penalty was "prescribed" for those who "promote or acclaim Zionist principles, including freemasonry, or who associate [themselves] with Zionist organizations."[32] With the fall of the Hussein government following the US Invasion of Iraq, there has been a number of Lodges that have met associated with the US and UK Military units. In 2005, the Land, Air and Sea Lodge, No. 1 of the Grand Lodge of New York, was reactivated for the benefit of the US Military. Currently this lodge is not working but there are proposals to reactivate it. [edit] United Kingdom It was the Unlawful Societies Act of 1799 that saw the first statue "for the more effectual suppression of societies established for seditious and treasonable purposes"; once enacted it affected all societies whose members were required to take an oath not authorised by law, shall be deemed "unlawful combinations." It was as a result of the intervention of the Grand Master of the Antients, The 4th Duke of Atholl, and the Acting Grand Master of the Moderns, the earl of Moira that a special exempting clause was inserted into this legislation in favour of societies "held under the Denomination of Lodges of Freemasons" provided that they had been "usually held before the Act" and their names, places and times of meeting and the names of the members were annually registered with the local Clerk to the Justices of the Peace. This continued on until 1967 when this Act was repealed by a section of the Criminal Justice Act which meant that the annual returns of all the Lodges to the authorities ceased. Since 1997, several members of the British Government have attempted to pass laws requiring Freemasons who join the police or judiciary[33] to declare their membership publicly to the government amid accusations of Freemasons performing acts of mutual advancement and favour-swapping. This movement was initially led by Jack Straw, Home Secretary from 1997 until 2001.[33] In 1999, the Welsh Assembly became the only body in the United Kingdom to place a legal requirement on membership declaration for Freemasons.[34] Currently, existing members of the police and judiciary in England are asked to voluntarily admit to being Freemasons.[35] However, all first time successful judiciary candidates "must declare their freemasonry status" before appointment.[35] Conversely, new members of the police are not required to declare their status.[35] In 2004, Rhodri Morgan, the First Minister of the Welsh Assembly, said that he blocked Gerard Elias' appointment to counsel general because of links to hunting and freemasonry[36], although it was claimed by non-Labour politicians that the real reason was in order to have a Labour supporter, Malcolm Bishop, in the

[41]

role.[37] [edit] Notes and references

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

^ a b c d e Paul M. Bessel (November 1994). "Bigotry and the Murder of Freemasonry". http://bessel.org/naziartl.htm. Retrieved 2007-10-22. ^ Fom the biography of Tommaso Crudeli on the website of the Grand Lodge of British Columbia and Yukon ^ Ridley, Jasper;The Freemasons: A History of the World's Most Powerful Secret Society, pp. 180181 (Arcade Publishing 1999). ^ Finney, Charles Grandison; The Character, Claims, and Practical Workings of Freemasonry. ^ a b Mackey, Albert Gallatin and H. L. Haywood [Encyclopedia of Freemasonry Part 3 http://books.google.com/books?id=Shs3fYPy7V0C&dq ], p. 1286, Kessinger Publishing 1909 ^ Vermont Catholic Encyclopedia, 1911, Accessed June 26, 2008 ^ Adams, John Quincy Letters on the Masonic Institution , p. 68-71, 1847 Press of T.R. Marvin ^ Famous Anti-Masons ^ a b " The New Catholic Encyclopedia (1967) Soviet Russia outlawed Masonry in 1922. Freemasonry does not exist today in the Soviet Union, China, or other Communist states. Postwar revivals of Freemasonry in Czechoslovakia and Hungary were suppressed in 1950. ^ a b c d Layiktez, Cecil Freemasonry in the Islamic World Pietre-Stones Review of Freemasonry 1996 ^ 'The Truth Is Stranger Than Fiction', Alphonse Cerza, published by the Masonic Service Association, September 1967 ^ BBC, Italian Press, In God's Name, Yallop, Inside the Brotherhood, Short of Freemasonry in his country." The Anhilation of Freemasonry by Sven G. Lunden by The American Mercury Newspaper, 1941. Hosted by the Grand Lodge of Antient Free and Accepted Masons of Scotland ^ a b [1] "Freemasonry and the Spanish Civil War: Part I, the Path to War" by Matthew Scanlan retrieved 19/08/2009 ^ Freemasonry Banned in Spain by General Franco

12. 13. ^ "In 1925, Spain's first dictator of this generation, General Primo de Rivera, ordered the abolition

14.

15. 16. ^ "Freemasonry and the Spanish Civil War: Part II", by Matthew Scanlan retrieved 19/08/2009 17. ^ "Following the election of the Socialist government in Spain, and the king's withdrawal from the
country, there was an absolute avalanche of public officials who rushed to the Grand Orient Lodges to request entry. They thought they could thus be free of the persecution which had been practiced by the majority of Masons in the government. Their purpose was to give evidence of their republicanism and to prevent the certainty of having their careers ruined." General Mola, Chief of Spanish Internal Security, Tempestad Calma Intriga Y Crisis, quoted in Pawns In The Game by William G. Carr ^ [2] Wayne H. Bowen, Spain during World War II, University of Missouri press, 2006 p249

18.

[42]

Chapter 2
2.1 Introduction: Targeting- the new silent massacre What is targeting and why is it a new phenomenon (or at least an old phenomenon in new clothing) of silent massacre/premeditated murder? Targeting in the context of the new communitarian ethos cultivated by the covertly operating agenda 21 and its Habitat micrcosocial counterpart/correlate onsists in methods of psychosmatic harassment and NEUROLINGUISTIC PROGRAMMING [NLP- see subsequent definition in 2.3.19 Sensitivity Programs] with the aim of social exclusion as the outcome of social networks covert

19. ^ Ruiz, Julius, Franco's justice: repression in Madrid after the Spanish Civil War, p. 25 Oxford Univ.
Press

20. ^ Hugh Thomas, The Spanish Civil War, Penguin, 1965 p47-48 21. ^ Ruiz, Julius, Franco's justice: repression in Madrid after the Spanish Civil War, p. 25 Oxford Univ.
Press

22. ^ "Freemasonry and the Spanish Civil War: Part II", by Matthew Scanlan retrieved 19/08/2009 23. ^ Cuba's muzzled mavericks find haven among Masons, by Gary Marx, published April 14, 2005 24. ^ A. Hitler, Mein Kampf, pages 315 and 320. 25. ^ a b "The Annihilation of Freemasonry". Volume LII, No. 206. The American Mercury. February
1941. http://mill-valley.freemasonry.biz/amermerc.htm. Retrieved 2007-10-22.

26. ^ The Enabling Act Accessed February 23, 2006. 27. ^ a b Documented evidence from the US Holocaust Memorial Museum pertaining to the persecution
of the Freemasons accessed 21 May 2006

28. ^ The Encyclopedia of the Holocaust, volume 2, page 531, citing Katz, Jews and Freemasons in
Europe.

29. ^ Bro. E Howe, Freemasonry in Germany, Quatuor Coronati Lodge, No 2076 (UGLE), 1984
Yearbook.

30. ^ Denslow, Freemasonry in the Eastern Hemisphere, at page 111, citing a letter from Dr. Otto
Arnemann in 1947, cited as Note 22 in Bigotry and the Murder of Freemasonry by Paul M. Bessel

31. ^ Freemasons for Dummies, by Christopher Hodapp, Wiley Publishing Inc., Indianapolis, 2005,
p.85, sec. Hitler and the Nazi

32. ^ "Saddam to be formally charged". Washington Times. 1 July 2004. 33. ^ a b "New judges must declare masonic membership", BBC, March 5, 1998, retrieved Feb 26, 2006 34. ^ [http://news.bbc.co.uk/2/hi/uk_news/wales/1699189.stm "Freemason policy review due "], BBC,
Dec 8, 2001, retrieved Feb 26, 2006

35. ^ a b c "House of Commons Hansard Written Answers for 21 Jul 2005 (pt 69) ", UK House of
Commons, July 21, 2005, retrieved Oct 2, 2007

36. ^ "Morgan criticised over job blocking", BBC, March 22, 2004, retrieved February 26, 2006 37. ^ "Mr Morgan wanted another QC, Malcolm Bishop, who has stood as a Labour candidate and is a
close associate of former Lord Chancellor Derry Irvine." Morgan 'blocked' QC appointment [edit] See also

Freemasonry Anti-Masonry

[edit] External links

The Blue Forget Me Not, Another Side of the Story by W.Bro. Alain Bernheim 33rd

[43]

decision making processes that take place during secret referenda. In the context of a selflegitimated ethos and coevolving communities under the auspices of a generic blueprint for microsocial engineering with the ultimate aim of bringing about the depopulation agenda members of social networks are encouraged to engage in targeting activities for pragmatic, psychological, economic and all sorts of reasons, as will be illustrated in due course. Targeting methods consist in distinct acts of perpetration (covert and overt AS LAID OUT IN MY ALLEGATIONS IN CHAPTER 4) resulting in the targets psychosomatic torture,IN VIOLATION OF ARTICLE 3 OF THE HUMAN RIGHTS STATUTE and are fuelled by pragmatic interests, viz redistribution of TANGIBLE [material things as defined in dogmatic law] AND INTANGIBLE ASSETS [intellectual property, career prospects] among network members. Under the auspices of hypocritical objectives , such as participatory democracy and greater participation of women and other social groupings and NGOs in INFORMAL SOCIAL NETWORKS with fluid boundaries and objectives decisions are made COVERTLY about which individuals will be targeted with view to redistributing their assets among them. Secret services and institutional mechanisms are involved in such attempts at premeditated murder and LEGITIMATELY so insofar as their active involvement in effecting agenda 21 is provided for in the blueprint. 2.2 The phenomenology of the torture situation More detailed exposition of the relevance of phenomenological perspectives and methodologies in accounting for the targeting phenomenon in the context of the new communitarian ethos will be provided in Chapter 3. For the sake of setting the interpretive stage OR METALINGUISTIC RENDERING OF THE ONTOLOGICALLY COHERENT FABRICATED LIFEWORLD OF TARGETS IN THE CONTEXT OF THE COMMUNITARIAN ETHOS AS A METHODOLOGICAL STEP ALLOWING FOR ITS SUBSEQUENT SUBSUMPTION UNDER THE RESPECTIVE CLAUSES OF CRIMINAL LAW AND WITH VIEW TO AVOIDING JURIDICAL DECEPTION (cf CHAPTER 4) BY OMITTING TO DO SO it suffices to allude to the following fundamental traits, listed in C.Walshs 2006 paper The government mind control debate: 1. an asymmetry of power; 2. the anonymity of the torturer to the victim; 3. the double bind of either enduring or betraying others; 4. the systematic falsehood of trumped-up charges, cunning deceptions 5. confinement in distinctive spaces signifying displacement, trapping, narrowness and destruction; and 6. a temporality characterized by some unpredictability and much circularity, having no end.

German Freemasonry and it's Attitudes towards the Nazi Regime, by W. Bro. Alain Bernheim 33rd Degree Masons who were killed by the Nazis for being Masons http://www.masonicinfo.com/famousanti.htm Freemasonry from Spain (Banned by Franco)

14

See Unaccepted Masons - controversy over Freemasons in British police and judiciary - Brief Article _ Reason _ Find Articles at BNET 15 The involvement of secret services (eg MI6 , CIA) in freemasonry has been amply recorded and demonstrated and quite expectedly so, insofar as secret societies in order to operate as such need secret services cf book The masonic history of CIA

[44]

2.3 Methods of targeting : the case for a new form of sociocybernetic terrorism16 or a BLUEPRINT FOR A DYSTOPIAN AGENDA "We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain." Dr. Jose Delgado Key sources:
16

Cf www.gangstalkingworld.com The structure of oppression : The following article will try to put into perspective some of the societal structures that are most likely responsible for the targeting some of those in the Targeted Individual community are experiencing. For years Targeted Individuals have been saying that they are being followed around, stalked, monitored while at home, and out in public. They have complained of a system that is capable of 24/7 surveillance, able to harassment at home, work, in the community, and even while traveling abroad. For several years there has been a great deal of disbelief that such occurrences could even be possible. The follow article, will try to explain referencing sources already available and documented how this could be happening. The following article represents the views and opinions of the GangStalkingWorld.com website and does not necessarily reflect the views of any other person, or website in the community. It has long been a widely expressed view that the monitoring is being done by various groups of citizen informants, members of various community policing type programs. Based on recent research conducted it seems most likely that the people being used to follow Targeted Individuals around are what society and the government in some countries refer to as, "covert human intelligence sources". They can also be known as own as Citizen Informants. Another slang terms that is often used to describe these individuals is the term Snitch or Snitches. Covert human intelligence sources A recent article came out in the London Telegraph, saying that Children as young as 8 are being employed by the state as Covert human intelligence sources aka Snitches. Targeted Individuals often complain that the harassment is being perpetrated by all members of the community including children. Children are being hired and used by the government to spy on their neighbors in the Uk. and "being encouraged to photograph or video neighbors guilty of dog fouling, littering or "bin crimes" The article says there are "hundreds of Junior Streetwatchers, aged 8-10 years old, who are trained to identify and report enviro-crime issues such as graffiti and fly-tipping." The adult spies according to authorities are recruited via newspaper ads. "Other local authorities recruit adult volunteers through advertisements in local newspapers, with at least 4,841 people already patrolling the streets in their spare time. Some are assigned James Bond-style code numbers, which they use instead of their real names when they ring a special informer's hotline. This escalation in Britain's growing surveillance state follows an outcry about the way councils are using powers originally designed to combat terrorism and organised crime to spy on residents. In one case, a family was followed by council staff for almost three weeks after being wrongly accused of breaking rules on school catchment areas." 1

[45]

State sponsored terror campiagns: the hidden evil (by Mark Rich 2006) No touch torture (by Cheryl Welsh 2008) Bridging the gap, by GmB Bailey Psychologicalharassment.com The meaning, techniques, methods of political warfare (declassified secret services document) Human Rights, Terrorism and counter-terrorism (UN Factsheet No32) The 2006 mind control debate (by Cheryl Welsh, Director Mind Justice Dec 2006) US Electromagnetic Weapons and Human Rights, Peter Phillips, Lew Brown and Bridget Thornton, A Study of the History of US Intelligence Community, Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University
Community Oriented Policing Though the article primarily focuses on the United Kingdom, it should be noted that other countries are setting up such community structures, via community oriented policing programs. These programs are a "a systemic approach to policing with the paradigm of instilling and fostering a sense of community, within a geographical neighborhood, to improve the quality of life. It achieves this through the decentralization of the police and the implementation of a synthesis of three key components: (1) strategic-oriented policingthe redistribution of traditional police resources; (2) neighborhood-oriented policingthe .interaction of police and all community members to reduce crime and the fear of crime through indigenous proactive programs; and (3) problem-oriented policing-a concerted effort to resolve the causes of crime rather than the symptoms. " 2

Fusion Centers The ACLU has released a report on Fusion Centers. 800,000 operatives will be dispersed throughtout every American city and town. Set to report on even the most common everyday behaviors which will go into state, local and regional, linked data bases. These linked databases are not just emerging in the United States, they have already emerged in many countries around the world in the wake of implied terrorist threats. "We pointed out that, while diverse and often still in the early stages of formation, they often seem to be characterized by ambiguous lines of authority, excessive secrecy, troubling private-sector and military participation, and an apparent bent toward suspicionless information collection and datamining." 3 The article then goes on to point out that in a short space of many of the warning in the report had come to pass. The article talks about the fact that this apparatus is responsible for watching and recording the everyday activity of a growing number of individuals. The reports are then gathered together and then they are accessible to any law enforcement agency that is a part of these fusion centers. "In the six months since our report, new press accounts have borne out many of our warnings. In just that short time, news accounts have reported overzealous intelligence gathering, the expansion of uncontrolled access to data on innocent people, hostility to open government laws, abusive entanglements between security agencies and the private sector, and lax protections for personally identifiable information. Overall, it is becoming increasingly clear that fusion centers are part of a new domestic intelligence apparatus. The elements of this nascent domestic surveillance system include: Watching and recording the everyday activities of an ever-growing list of individuals Channeling the flow of the resulting reports into a centralized security agency Sifting through (data mining) these reports and databases with computers to identify individuals for closer scrutiny Such a system, if allowed to permeate our society, would be nothing less than the creation of

[46]

www.ffchs.com (freedom from covert harassment and surveillance, of which I am member) www.gangstalkingworld.,com www.fedame.org (federation against mindl control Europe) www.factnet.org www.mindjustice.org 2.3.1 Classical conditioning The target over a period of months, or even years is negatively sensitised to everyday stimuli, which is then used to harass him. Its used out in public to let him know he is constantly being harassed and monitored. Some examples of everyday stimuli that are used include: sounds, colors,
a total surveillance society." 3 These fusion center will have the capacity to circumvent laws that are in place to limit federal vs local authorities and the access that each has to specific information. "Even more troubling is the fact that these centers are networked together and seamlessly exchange information with the intelligence community through the Director of National Intelligences Information Sharing Environment (ISE). The Washington Post report was based on a document produced from a survey of fusion centers, which shows their intent to maximize the access each of the fusion centers has to the various databases. This would allow a state fusion center that under state law or local policy is prohibited from buying credit reports, as an example, to circumvent its own restrictions by simply calling a fusion center in Pennsylvania to and asking Pennsylvania authorities to access the records it wants to analyze. This policy shopping process guts state and local privacy protections and gives the participating agencies, including the federal intelligence community, access to information they may not legally have on their own." 3 These centers if allowed to expand will create a one way justice system. Your information, even your daily activities will be allowed to be gathered, collected, and possibly used against you. When you then request information to confirm if you are a target of surveillance, the information will be stored in a secret database and not available for you to access. "Even as fusion centers are positioned to learn more and more about the American public, authorities are moving to ensure that the public knows less and less about fusion centers. In particular, there appears to be an effort by the federal government to coerce states into exempting their fusion centers from state open government laws.31 For those living in Virginia, its already too late; the Virginia General Assembly passed a law in April 2008 exempting the states fusion center from the Freedom of Information Act.32 According to comments by the commander of the Virginia State Police Criminal Intelligence Division and the administrative head of the center, the federal government pressured Virginia into passing the law, with the threat of withholding classified information if it didnt.33 Such efforts suggest there is a real danger fusion centers will become a one-way mirror in which citizens are subject to ever-greater scrutiny by the authorities, even while the authorities are increasingly protected from scrutiny by the public." 3

Public Employees The next aspect of the targeted that has been reported by the Targeted Individual community is the fact that public servants seem to be taking a part in the continuous monitoring and harassment private citizens. American Civil servants, firefighters, police officers, Corporate Employees, learning to collect data and spy. The information then goes into secret data bases. They will also communicate in code. Many targets have expressed a belief not only that they are being tracked, but that their stalkers are communicating via a one handed sign language similar to that which the Stasi used.

[47]

patterns, actions. eg. red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud clapping of hands together, etc. 2.3.2 Investigations The bogus investigation appears to be the platform used to launch the smear campaign and remove a person s support structure. Bogus investigations orchestrated by the secret services using a person s friends, family and employers appear to be a standard part of the targeting apparatus. The motive is the isolation of the target from friends, family members or employers. When recruiting neighbors they will probably show them this case file and indicate that you are the target of an investigation. This case file will contain a combination of half-truths, setups & outright lies. The case file may contain information about a person or people who have complained about you. These are most likely informants (civilians paid or given favors to help frame the target). Or
Terrorism Liason Officers "They are entrusted with hunting for suspicious activity, and then they report their findings, which end up in secret government databases. What constitutes suspicious activity, of course, is in the eye of the beholder. But a draft Justice Department memo on the subject says that such things as taking photos of no apparent aesthetic value or making notes could constitute suspicious activity, Finley wrote. " 4 Not only will this program used the civil servant already mentioned, but it will expand who is used in the program. They will have secret sources of communication available to them. The members of these programs will connect with the fusion centers. None disclosure agreement or a confidential disclosure agreements will be signed by many in these programs to ensure that the information is protected. "And the private sector would be involved, too. The program would eventually be expanded to include Health Care personnel and representatives from private, critical infrastructure entities, with communication systems specifically tailored to their needs. In this regard, Terrorism Liaison Officers resemble InfraGard members. (See The FBI Deputizes Business.) This FBI-private sector liaison group now consists of more than 26,000 members, who have their own secure channels of communication and are shielded, as much as possible, from scrutiny. Terrorism Liaison Officers connect up with so-called Fusion Centers: intelligence sharing among public safety agencies as well as the private sector. The Department of Justice has come up with Fusion Center Guidelines that discuss the role of private sector participants. The private sector can offer fusion centers a variety of resources, it says, including suspicious incidents and activity information. It also recommends shielding the private sector. To aid in sharing this sensitive information, a NonDisclosure Agreement may be used. The NDA provides private sector entities an additional layer of security, ensuring the security of private sector proprietary information and trade secrets, the document states." 4 Other than the United States many other countries have similar programs in place where they have requested that public servants in the course of doing their day to day activities keep an eye out on what is happening. Stalking and Monitoring. Though I do not in believe the family in this video are targets of Gang Stalking I will say that the example shown explains very well how someone could be stalked, monitored and spied on 24/7 as this family was. I do not believe they are targets of Gang Stalking, because Gang Stalking is often covert, what this family experienced was extremely overt and left behind lot's of verification and proof, the harassment targeted individuals experience does not often offer any overt evidence.

[48]

they may simply claim that the target is under investigation but they can't disclose why for reasons of national security. The "reasons of national security" blanket is used by secret services to help frame people for crimes as well as cover up for mind-control and torture. Their informants may be a single person used to help frame the target, such as a tagger. Or they may be multiple PARTICIPANTS remotely related to each other. Again, these stalking groups usually have hundreds of local members. For example, in the context of Cointelpro operations, there were routine setups and fabrications of evidence used as discrediting campaigns and excuses for incarceration. They may string together arbitrary pieces of unrelated incidents from a targets and arrange them in such a decontextualized way as to legitimate the enforcement of a dystopian loop system on the target. They normally recruit stores , restaurants personnel and PARTICIPANTS from all walks of life. They will sublet, lease, rent property above, below or to the sides of your living space to effect this.
The stalking they believe was done primarily using their cell-phone. They were followed 24/7. Their phone conversations listened to. When the was in the kitchen making lemonade, the phone rang, and the caller told her, he preferred limes. When the family heard someone at their door in the middle of the night banging, they called the police, when the police arrived the invaders had already left. After the police left this happened again, the family called the police, the invaders had left, this happened a third time and finally the family stopped trying. After filing a complaint with the police, the family were sent a recording of their conversation with the police, by the stalker. They installed a camera system, the stalker called to say that he already knew the code. The list goes on, and apparently there were a total of three families in the area that the cell phone stalking happened to. The case has received wide media attention, including the Tyra Banks show. There is technology out there designed to do this. A company which I will not name in this report, has a service for cheating spouses, where you can use a phone to know where they are and listen into their conversations. There are also programs which will allow the camera on a phone to be used to spy on the person with the camera phone. Cellphone Stalking "The families say the calls come in at all hours of the night, threatening to kill their children, their pets and grandparents. Voice mails arrive, playing recordings of their private conversations, including one with a local police detective. " "The caller knows, the families said, what they're wearing and what they're doing. And after months of investigating, police seem powerless to stop them. " "It got worse. The Kuykendalls and two other Fircrest families told ABC News that they believe the callers are using their cell phones to spy on them. They say the hackers know their every move: where they are, what they're doing and what they're wearing. The callers have recorded private conversations, the families and police said, including a meeting with a local detective. " 5 Not all members of the Targeted Individual community have a cameraphone, but this example is just to show how one family could be terrorized by an encounter such as this. What we experience is ongoing, and often just as upsetting, but we often do not have the same proof that this family had, which enabled them to go to the police. "Recently, the stalkers have begun to come to their home in the early hours of the morning, banging on their doors. The said that the first time they came, she immediately called 911, but as soon as the police arrived, the stalkers had fled. The police, unable to do anything, left, and the stalkers returned right away. She said every time this happens she contacts the police, but after about the third call and then the third return, she just stops trying." 6

Regulation of Investigatory Powers

[49]

2.3.3 Surveillance Surveillance (sic) on a residence by using triangulation and satellite based technologies (eg HAARP, Echelon). Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or business band radio. Other members who are patrolling the perimeter will race to the location to begin pursuit. 2.3.4 Gang Stalking Gang Stalking consists in covert surveillance of targets activities in public places. . Gang Stalking is a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Many Targeted Individuals are harassed in this way for months or even years before they realise

Regulation of Investigatory Powers is a United Kingdom law, which enables public bodies to carry out investigations and surveillance on individuals. Authorities can use directed surveillance or intrusive surveillance for months or years. These types of operations often employ covert human intelligence sources. Recently these laws were abused by using them to spy on families for anti-social behaviours and noise complaints. "Directed surveillance is covert surveillance of individuals during a specific but non-intrusive investigation (our emphasis). Surveillance is covert where it is carried out in such a way to ensure that those targeted are unaware that it is taking place (cl.25(8)). Surveillance is defined as including any monitoring, observing and listening to persons, their movements, conversations or other activities or communications. It also includes any recording of such activity and surveillance by or with assistance of a device." " Intrusive surveillance is defined as covert surveillance in relation to anything taking place on residential premises or a private vehicle. It may be carried out either by a person or device inside residential premises or a private vehicle or by a device placed outside" 7

Secret Databases A new story also came out this year claiming that information is being kept on Canadians, in secret databases that they have no access to. "Jennifer Stoddart, the Privacy Commissioner of Canada, has released a 48-page report warning that the RCMP (Canadas national police force) is keeping thousands of files on regular citizens in secret databases which cannot be seen by the accused. One of the many disturbing facets of Stoddart's report are the examples she cites of information for these secret files coming from citizen informants. In one case a man was put into the secret database because a resident of his daughter's school neighborhood saw him entering a rooming house andbelieving drugs were involvedcalled the police. The police investigation concluded that the man had only stepped out of his car to have a cigarette, but the file was still in the national security databank seven years later. Another incident cited in the Stoddart report involved a neighbour who saw two men carrying "something that resembled a large drum, wrapped in canvas" into their house. Police were called to investigate but found nothing resembling the reported item, yet the data was still sitting in a top secret databank five years later. As Stoddart points out in the CBC story on the report, this is potentially disastrous for the individuals named in the files, because it "could potentially affect someone trying to obtain an employment security clearance, or impede an individual's ability to cross the border." 8

References: 1. 8 year old as Covert Human Intellegence Sources.

[50]

that they are being targeted by an organised protocol of harassment. What happens during Gang Stalking is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in ex USSR. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In the USSR it was used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control. Civilian spies are recruited from every level and sector of society. Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic pychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support. For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state its a way to keep the targets in line, control them, or destroy them. The goal is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Other goals involve sensitizing the target to every day stimulis as a form of control, which is used to control targets when they get out of line. The majority of targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues. Every time the target moves, the same lies and slander will be spread and the systemic monitoring and harassment will continue. 2.3.5 Break-ins , Property damage , petty thefts This happens in and around the home as well as the workplace if the target is fortunate enough to be employed. Thefts may be reduced to small inexpensive items. But some targets have reported jewelry, passports and other important items stolen. Small things such as pens, shoes, and silverware are taken or tampered with so that you will seem delusional if you report this to the police. The logic is that a thief would never break into your home and leave a computer, stereo or other valuables and just steal a toothbrush, or pour out a portion of your milk. There is usually no sign of forced entry. This is the case even if there is a Hi-Tech security system in place. Psychological warfare tactics are sometimes employed such as moving bits of furniture or clothing slightly out of place. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot.. This is done to let you know that they ve been in your home. These social networks are obsessed with all aspects of a targeted person s life. Personal items may be passed around to group members and are apparently symbolic of the

2. Community Oriented Policing. A Systemic Approch. 3. ACLU document on Fusion Centers. 4. Terrorism Liaison Officers 5. Cellphone Stalkers harass family. 6. Cellphone Stalkers harass family 2. 7. REGULATION OF INVESTIGATORY POWERS BILL 8. Stasi-style secret police forming in Canada, Britain, US Other Sources: 1. Spying on noisy children 2. Cellphone Stalking

[51]

control the group has over their target. Targets have reported clothing being ripped, milk, coffee and other items poured out . 2.3.6 Buzzsaw The Buzzsaw cuts right through their careers, goals, ambitions, and they are cast out into social isolation, with their once good reputations in taters. Under such circumstances the target of this harassment often do not have anyone that they can turn to, or means of getting the stories out to the public. 2.3.7 Framings Any weakness a person has can be used in one of these setups. A person may not be aware of some of these set-ups, but they may be added to a case file to assist with the smear campaign. They may try to provoke a confrontation when Mobbing the target out in public. Group members also try to entice the target to assault them, but this is never done without having witnesses present. The criminal conviction of the target, following the testimony of numerous concerned citizens can be followed by a civil lawsuit. . 2.3.8 Sabotage & Vandalism (both land based and electrimagnetically induced) Occurs both at home and in the workplace. Electronic equipment may constantly be failing. Projects you ve worked on the previous day may suddenly disappear. This type of vandalism is usually just below what one would report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you re being stalked. However large-scale property damage is also done to vehicles, such as slashed tires, broken windows, tampering with break lines,destruction of electrical equipment.Vandalism and pets being tortured may also be in retaliation for you taking action to expose them. 2.3.9 Mail interference The motive is to get as much information as possible to aid in the harassment and intimidation of the target. Currently some targets also experience tampering with mail, altering, delaying or disappearing, email being filtered/blocked. 2.3.10 Blacklisting Gang Stalking groups will interfere with every personal & business relationship you have.. Insofar as they take place in a public/private alliances framework under the auspices of the new communitarian ethos , they usually deter employment prospects and block advancement opportunities.Most targeted individuals are unemployed. Many would be homeless if it weren t for parents, siblings, or friends. If you re targeted and are lucky enough to still be employed, you may be harassed into leaving by your employer and coworkers. In addition to slander and keeping you unemployed, they may also use companies or recruiters in harassment campaigns (Mobbing). This is particularly the case with recruiters. It appears that they are often used to try to further traumatize a person using Mobbing tactics during interviews. If you re Blacklisted and you re being harassed, you will probably not be able to prove it. Like all Mobbing & Organized Stalking tactics, it will be conducted in a covert manner. 2.3.11 Collisions & Cut-offs The cut-offs are fabricated, but like most Gang Stalking tactics they are designed to look like normal cut-offs that we all experience from time to time. They occur with vehicles, on foot, or a combination of these tactics. This type of space invasion is designed to startle you and create tension. It can be thought of as a virtual slap. They are used in blind areas such as corners, hallways, restrooms, or intersections where you constantly have people or cars cutting you off, or almost hitting you. The perpetrator is unseen until he jumps out in front of you. This happens in stores, buildings and on the street, involving people and vehicles. Generally, anywhere there is a blind corner.

[52]

They will ATTAIN PERFECT SYNCHRONICITY to your movements so that they always meet you at a designated point, so that you will have to squeeze through, stop, or go around because of their deliberate cut-offs. The motive is to grab your attention , make you feel uncomfortable and maintain you in the dystopian loop system. 2.3.12 Blocking, Swarming & Space invasion In parking lots, on foot, on the road, in stores / restaurants. These are staged events that may temporarily prevent you, eg from leaving if youre in a parking lot. THE MODE OF COMMUNICATION IN SUCH INDICDENTS IS USUALLY PROTOSEMIOTIC (cf Chapter 3): 1. Movements, gestures, postures 2. Spatial relationships The study of communication using distance/space is called Proxemics. This type of communication is used to harass a person. For instance, while in stores, restaurants and public places that are not busy, a target will have people crowding around them, invading their personal space. This happens even if there are only two customers in a store. If a person makes a move from one place to another in a store several people may suddenly appear and jump out in front of him from around corners and isles. A common experience reported is the sudden movement of a crowd of people into a checkout line towards which a target is moving. This tactic is implemented indoors and outdoors. Sometimes they may blatantly adjust their timing, or linger for a while until you begin to move again, then they'll continue. This program was tailored to represent a target as someone suffering from schizophrenia when explained to health professionals (cf below and Chapter 3 on discursive complicity) . 2.3.13 Synchronization Synchronization is prevalent in Organized Stalking cases. Groups will try to synchronize their tactics with a targets ordinary activities, such as entering or leaving his residence. Movements are synchronized with noise, vehicles coming or going, people coming or going, or other movements. These synchronization tactics are often times done several times, perhaps three or more. 2.3.14 Convoys of vehicles An unnatural amount of vehicles driving by your house (even if you're on a side or dead-end street) and/or following you while out of home. Common practice is for vehicles to drive by screeching their tires, blowing their horns, playing loud music, yelling as they drive by your residence, also including fire trucks, ambulances, city/utility vehicles and postal vehicles.. Some targets have even mentioned that local police vehicles have participated in the harassment. 2.3.15 Mobbing Mobbing also referred to by some as bullying, psychological terrorism, and organizational violence is described as a collective form of psychological violence in which many individuals unite to persecute an individual by making constant negative remarks, repeated criticism or sarcasm, intimidation, threats, insinuations, attempts at humiliation, circulation of false information concerning the individual, and social isolation. Mobbing is a way of destroying a person without using any physical means. A group attacks an individuals dignity, integrity, self-image, self-confidence, selfesteem, place in doubt of competence, threaten their careers, and means of subsistence. One method used to induce distress or suffering in a person is by systematically isolating them from their peers. 2.3.16 Brighting Vehicular brighting seems to be strategically used in corners. Or, as one walks down a side street there is one or more cars parked on the side, facing his direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby brighting you as you walk by. You may also be followed by convoys of vehicles that have their Hi-beams on during the day..

[53]

2.3.17 Noise campaigns All targets of Organized Stalking are quite familiar with noise campaigns. Basically, there will be a steady stream of noise consisting of a rotation of various types of disturbances around your house. This noise may even follow you wherever you go. This includes car doors slamming, people coming/going, people yelling, car alarms, horns, tires screeching, etc. Your neighbors will probably be bribed with free home repairs that will result in a very noisy construction process.An ongoing noise campaign appears to be most effective. Like the collisions and cut-offs, these noises constitute disorientation tactics. For instance, there will be doors slamming for a few moments, then a motorcycle will drive by and rev its engine outside your house. After that you ll have someone mowing the lawn. Then there will be alarms going on and off. After that you ll hear a loud crowd of people walk by your house. You may then hear fire or ambulance sirens. Then there are hammering & sawing sounds. Then you ll hear car alarms being turned on/off in succession multiple times from multiple vehicles around your house. After that it will switch back to car alarms & horns. Then drilling, & doors slamming.Often, activity such as noise will be synchronized with you coming, going or doing some other type of activity 2.3.18 Food tamperring With psychotroipcs and other undetectable substances, while the target is out of home and while the target orders in public places and in SEVERE DANGEROUSNESS cases in selective retail outlets where the target frequents, based on knowledge on the part of the perpetrators of his eating habits 2.3.19 Sensitivity Programs Cause Stalking groups usually begin their campaigns with sensitivity programs. The goals of a sensitivity program are:to get the person s attention and let them know they re being harassed, anchor damaging emotions to common objects/sounds so a target can then be covertly harassed openly in public These sensitivity programs are based on a science called Neuro-Linguistic Programming (NLP). The parts of this science that groups use are anchors & triggers. We re unconsciously creating anchors in our environment all the time with people, music, places, & objects. Initially, the target may not be consciously aware of the harassment, but this is not necessary.(7) One reason people may not realize that they're targeted or can't remember exactly when it began, is because these groups may slowly & gradually increase the harassment over time. But groups can let you know you're being targeted any time they choose by turning up the volume with a blitz attack. Groups use sensitivity programs in an attempt to create phobias What is a NLP anchor? "A stimulus which is linked to and triggers a physiological state is called an anchor in NLP. (Introducing NLP, Joseph O Connor & John Seymour) How are anchors created? First by repetition. Secondly, and much more importantly, anchors can be set in a single instance if the emotion is strong and the timing is right. In extreme cases an external stimulus can trigger a very powerful negative state. This is the realm of phobias. You can think of NLP as a very powerful tool that can be used to produce rapid, profound change.(NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner) Some of these insults are very subtle (implied), but powerful. For instance, while at a restaurant a couple will sit at a table next to you and start mentioning some events that are taking place in your personal life, in order to grab your attention and then make repeated, indirect references to you by using words such as paranoid, crazy, scared, panic, insane, freak, sad,depressed, etc.This may be done repeatedly while the trigger words are emphasized. The idea is that the words that will invoke your emotions. Not only is this possible, but it works best when you don t know it s being done to you. Some words carry with them a particular weight to potentially trigger an effect on a person s emotional state.Some of these harassment skits are designed to transfer the emotions of those weighted words to affect a negative emotional state upon a target. In addition these words can be emphasized by changing their tone and volume when they are spoken. This is called metacommunication. Metamessages are suggestions hidden in a statement, perhaps a compliment

[54]

(Messages-The Communication Skills Book, Matthew McKay, Ph.D., Martha Davis, PhD., Patrick Fanning) 2.3.20 Street theater Agents on the street mimicking thoughts and actions. Most victims describe a phenomenon they call street theater. For example, people around the victim utter repeated verbatims, echoing the victims immediate thoughts, or harassive and personalized statements are repeated by strangers wherever the victim may go. Street Theater is actually an elaborate psychology experiment. The behaviorist school reduces all human behavior to stimulus and response, looking at human beings without regard to their spiritual capacities. They are treated no differently than mice (AT LEAST THIS IS THE MOTIVE ON BEHALF OF THE PERPETRATORS SYSTEM- THE LEVEL TO WHICH IT IS SUCCESSFULLY INSCRIBED IN A TARGETS BEHAVIORAL COMPORTMENT VARIES ACCORDING TO HIS SYLLOGISTIC POTENTIAL, HIS COGNITIVE CAPACITIES, THE INTENSITY/FREQUENCY OF THE STIMULI etc). The target is walking through a reality construct known as a Grox Box where they are subjected to staged stimuli and their responses are recorded.17 The stalkers are also experimental subjects used to understand what it takes to make perpetrators go past a certain point of antisocial behavior. 2.3.21 Electromagnetic weapons: the technological enablers of the slow-kill method INDICATIVE LEGAL PRECEDENTS AND CASES 1. JESUS MENDOZA CASE IN TEXAS (POSITIVE RULING AGAINST THE GOVERNMENT)

2. John St. Clair Akwei NSA, Ft. Meade, MD, USA (attached in this chapters appendices)
3. JOHN FINCH PETITION TO ECHR AND INTERNATIONAL CRIMINAL COURT

vs.

4. CASE OF VICTOR MONCHAMP vs GREECE DEMAND PRESENTED/DISPLAYED BEFORE THE EUROPEAN COURT OF HUMAN RIGHTS THE 17th OF JULY 2006 Council of Europe Presented/displayed provisional measures in the application of article 39 of the regulation of the European Court of Human rights.
AND COUNTLESS OTHER CASES, AVAILABLE ON DEMAND "Radio Stimulation on different points in the amygdala and hippocampus produce a variety of effects, including pleasant sensations, elation, deep thoughtful concentration, odd feelings, super relaxation (an essential precursor for deep hypnosis) colored visions, and other responses." Non-lethal weapons [NLWs] sound harmless in relation to guns and bombs. However, non-lethal weapons are not just tazers and annoying sounds. Nor are they harmless. In fact, NLWs are such a concern that many countries have treaties demanding transparency[cf APPENDIX I]. On other sources of EMF (electromagnetic frequencies), like cell phones and microwaves, the jury still seems to be out, although directed microwaves at non-ionizing strength can induce all sorts of behavioral changes through direct influence of the nervous system. EMF, used in nefarious ways, can destabilize the brain, and potentially generate feelings of violence or apathy"18
17
18

Journal of Applied Social Psychology (Blass, 1999) Dr. Dean Radin

[55]

In February 1998, I testified before the European Union parliament for an hour and a half and convinced them of the detrimental effects of non lethal weapons on humans, their behavior and their minds. The EU was convinced and passed a resolution banning the use of weapons that can manipulate a person (see Parliament Resolution A4-005/99 entitled "Resolution on the Environment, Security, and Foreign Policy" passed on January 29, 1999).19 Any device that invades a persons mind, either through induction of evoked potentials (EEGs) through electromagnetic means or through the various crazy-making tactics employed in both information warfare and psychological operations is a violation of human rights and cognitive liberty Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted person or group to act against his or her own convictions and best interests. This silent war is being conducted against unknowing civilians and soldiers by military and intelligence agencies. Since 1980 electronic stimulation of the brain (ESB) has been secretly used to control people targeted without their knowledge or consent.20 Dr. John Goldsmith, an epidemiologist from Israel described the Soviet microwave bombardment of the Moscow Embassy from 1953 to 1976. He said the that the Soviets could have been trying to produce radio frequency sickness in the U.S. embassy staff by causing interference with the "ability to think, to concentrate and to sleep". The Soviets conducted scientific studies of workers who were exposed to emr emissions in the 1940s and 1950s and found detrimental health effects such as the above. The Soviets called the set of symptoms `Radiofrequency sickness syndrome'. Dr. Goldsmith believed that the Soviets were experimenting and testing radio frequency radiation as a weapon. The U.S. government's epidemiologist documented high white blood counts, leukemia in two of the Ambassadors and other health problems in the embassy employees. Then the U.S. government ignored the findings.21 The targeted individuals EEG is captured by two pulsed microwaves that intersect with the TIs EEG brain wave and the resulting interference wave pattern is downloaded and demodulated to capture their physiological responses, EKG,galvanic skin response, respiration rate, BP, everything, including their inner voice. This rather improbable feat involving the inner voice was accomplished at the Stanford Research Institute in 1971. The TI [targeted individual] is an open book that represents all future targetsting like them, how they think, how they react, in short how to defeat them. The TI sits down in public and the perpetrating system sends out a stimulus in front of them, say an attractive woman or a directed conversation takes place in front of the TI and thoughts/feelings are recorded22. . Every thought, memory, emotion, and physiological response that the women evokes in the TI is now captured data. Often a TI is observed by a psychology student sitting unobtrusively off to the side to record and link overt behaviors to the data stream collected in real time. The entire arsenal of psychology and medicine is aimed at learning to break and control this one person, such that they represent all future people like them. The technology that renders the TI an open page also allows them to be a blank page to be written on. Thoughts, images, and emotional states can be imposed on the TI remotely with a
Former positions at AT&T Bell Labs and GTE Labs on advanced telecommunications R&D, appointments at Princeton University, University of Edinburgh, University of Nevada, SRI International and Interval Research Corporation, co-founder of the Boundary Institute, Senior Scientist at the Institute of Noetic Sciences. Adjunct appointment at Sonoma State University, Distinguished Consulting Faculty for Saybrook Graduate School. 19 ibid 20 RAUNI KILDE, Finlands former Medical Chief [See Appendix II] 21 CAHRA Russian Book Translation Project Results With related background information on Russian/U.S. mind control technology http://mindjustice.org 22 cf the CIA manual on remote viewing and the plethora of remote viewing training centers around the world

[56]

startlingly diverse tool box of weapons in the electromagnetic spectrum. The TI can be put in stressful situations and agitated with open microwave attacks that physically burn them, or less obvious manipulation of their emotional state. The ability of the technology to secretly obstruct purposeful human behavior should not be underestimated. Targets are often seemingly toyed with, but the ultimate aim of the experiment is the terminal destruction of the TI [Causa Finalis, see Chapter 4]. Not everyone watching the drama on satellite TV, the internet, or listening on radio will understand exactly what it is they are watching. The TI is both a very expensive lab rat for the health effects of microwave weapons, a training tool for a stalking army, a psychology experiment to perfect mind control and fodder for a dozen pschology papers,and a commodity to be sold for entertainment purposes a la reality TV [MULTILAYERED MOTIVES- see chapter 4]. Everyone, everywhere is at risk from this calculated derangement. In addition, all of the results of any satellite surveillance can be computer transferred, and fed to numerous not so innocent agency ghost writers [FABRICATED SCRIPTS, SOCIAL EPISODES, SOCIAL SITUATIONS- see CHAPTER 3] or any criminally corrupt media [eg TV SERIES INVOLVING ACTORS AS PSYCHIATRISTS COMMENTING ON REAL LIFE EVENTS OF THE TARGET AND PRECONDITIONING THE PUBLIC ABOUT THE LEGITIMACY OF PSYCHIATRY AS THE ONLY VALID DISCOURSE CAUSALLY EXPLAINING ORDINARY PHENOMENA AND ACTIVITY PATTERNS] outlet (as well as any operative or dupe) so that they can be intertwined into presented material so as to subtlely/covertly humiliate, terrorise, destroy and discredit targets. The modulations of electromagnetic frequencies produce different effects/symptoms, according to the intention of the handlers in each case [See Appendix IV]: My research has found that microwave weapons are targeted on middle class troublemakers and researchers who cause problems for the establishment. Russian and American research has found that pulse modulated microwaves (as used for mobile phones) can, when modulated with ELF which mimics specific brain patterns change the behaviour of the victim at the flick of a switch. It has been found that UK security police, such as MI5 use the 450 MHz frequency used for this research (legally allowed to be used by the police) for behavioural control. A vast catalogue of mind control frequencies in the MHz range, FM radio, TV and mobile phone frequencies, have been measured, which are used in the UK for mind control and killing or disabling victims: 147, 153, 197, 199, 447, 453, 456, 466, 853, 883, 884, 887... Symptoms can be depression, befuddled thinking, loss of memory, stress, not being able to cope, manic behaviour, schizophrenia, nervous breakdowns, physical collapse, brain and nervous system damage, heart attacks, cancer.....Readings I have taken show that the 750-1000 MHz range is used by the intelligence services for inducing nervous and physical collapse. Microwave ovens give off 1000 MHz. MICROWAVE MIND CONTROL by Tim Rifat (Federation against Mind Control Europe, www.fedame.org ) Dr Persinger wrote an article a few years ago, titled "On the Possibility of Directly Accessing Every Human Brain by Electromagnetic Induction of Fundamental Algorithms". The abstract reads: "Contemporary neuroscience suggests the existence of fundamental algorithms by which all sensory transduction is translated into an intrinsic, brain-specific code. Direct stimulation of these codes within the human temporal or limbic cortices by applied electromagnetic patterns may require energy levels which are within the range of both geomagnetic activity and contemporary communication networks. A process which is coupled to the narrow band of brain temperature could allow all normal human brains to be affected by a subharmonic whose frequency range at about 10 Hz would only vary by 0. 1 Hz." He concludes the article thus: "Within the last two decades a potential has emerged which was improbable, but which is now marginally feasible. This potential is the technical capability to influence directly the major portion of the approximately six billion brains of the human species, without mediation through classical sensory modalities, by generating neural information within a physical medium within which all members of the species are immersed.

[57]

Indicative Bibliography on available psychotronic weapons, case studies, legal cases and and their psychosomatic effects The 2006 Government Mind Control Debate book review Torture-Using-Directed-Energy-and-Neurological-Weapons Silent-Weapons-for-a-Quiet-War no touch torture mind control cybernetics cia_remote_viewing_manual article_censoringthetruth angels-dont-play-this-haarp-advances-in-tesla-technology. Tactical-Employment-of-Nonlethal-Weapons Electromagnetic-Radiation-Emr-Weapons The Freedom for Covert Harassment and Surveillance questionnaire (www.ffchs.com) listing most of the usual targeting methods

[58]

36.

Organized Stalking Activities. Please check all that apply.


Appliance Tampering Helicopter/Airplane home flyovers Being Followed Blacklisting Car Tampering Home Monitoring Community-based Harassment Workplace Harassment Activity Mail Tampering Computer Tampering Noise Campaigns E-mail Monitoring/Interference Street Theater Emergency Vehicle Harassment (police, fire trucks,. ambulances) Targeting of Pets Unexplained Sounds in Home Estrangement of Family or Friends Wiretapping/Electronic Surveillance Food Tampering If other, please specify

37.

Directed Energy Weapons Assaults. Please check all that apply.

[59]

Benign or Malignant Tumors Induced Imagery/Thoughts Ringing in Ears Body Manipulation Holograms Induced Sleep Seizures Chilling of Skin/ Instant Coldness - Generalized or Localized Thermal heating, daytime, discernible "microwave hot spots" on skull Thermal heating, nighttime, severe night sweats Induced Smells Sensation of Blunt Trauma to Head Coughing up Blood Intense Itching Sensation of Electric Current Running through the Body Dehydration Sudden onset asthma Irregular Heartbeat Hyperactive bladder, sudden incontinence Sensation of Objects being Forced into various areas of the Body Deterioration of Cognitive Abilities Jaw or Tooth Pain Severe facial and glandular swelling. Sleep Deprivation Dizziness or Loss of Balance Blackouts or loss of consciousness Severe disorientation while driving Lesions on Internal Organs Sudden Rashes Sudden appearance of large burn marks Dream Manipulation Memory Loss Thought Monitoring/Manipulation Electronic Rape Metallic Taste in Mouth Thyroid Problems Electroshocks Nausea Tingling Extreme Fatigue Nosebleeds Topical & Internal Burning Genital Manipulation Numbness Vision Loss/Impairment Hair Loss If other, please specify

[60]

Also see www.ontarget.co.cc CIA DECLASSIFIED DOCUMENTS ON MIND CONTROL EXPERIMENTS MKULTRA AND OTHERS http://www.wanttoknow.info/mind_control/cia_mind_control_experiments_sex_abuse http://www.opednews.com/articles/STOP-MK-ULTRA-PROGRAMS-NOW-by-Noeline-Clayfield091116-809.html http://www.mkultraconference.com/MK-ULTRA.php PROJECT CENSORED - HUMAN RIGHTS AND FREEDOM OF THOUGHT VIOLATIONS BY US MILITARY/INTELLIGENCE ORGANIZATIONS. http://www.projectcensored.org/articles/story/us-intelligence-community-human-rights-violations/ 1200 + VICTIMS CASE SUMMARIES ASSAULT, TORTURE AND MUTILATION by SATELLITE AND BRAIN WEAPONS see http://www.mydrive.ch USERNAME: johnfinch PASSWORD: TORTURECASES http://www.4shared.com/dir/21674443/75538860/sharing.html http://www.freedrive.com/folder/177784
MIND JUSTICE http://www.mindjustice.org/ http://www.icomw.org/ MINDCONTROL

INTERNATIONAL COMMITTEE ON OFFENSIVE MICROWAVE WEAPONS ILLEGAL HUMAN EXPERIMENTING http://www.netti.fi/~makako/mind/index.html & ELECTROMAGNETIC

GERMANY - VEREIN GEGEN DEN MISSBRAUCH PSYCHOPHYSISCHER WAFFEN in German and English (THE ASSOCIATION AGAINST THE ABUSE OF PSYCHOPHYSICAL WEAPONS) http://psychophysischer-terror.de.tl/ SECRET ILLEGAL SURVEILLANCE http://www.lesliecrawford.cabanova.com/page1.html THE AMERICAN COGNITIVE http://americancognitivelibertiesassoc.org/default.aspx SURVEILLANCE ISSUES AND LIBERTIES ATTACKS ASSOCIATION www.surveillanceissues.com

THE FEDERATION AGAINST MIND CONTROL EUROPE http://www.mindcontrol-victims.eu/ http://www.mydrive.ch USERNAME: johnfinch PASSWORD: TORTURECASES http://www.4shared.com/dir/21674443/75538860/sharing.html http://www.freedrive.com/folder/177784 COMPILACION DE TESTIMONIOS EN ESPAOL:http://rudy2.wordpress.com/ FRANCE INFORMATION DOSSIER http://informationdossier.wordpress.com/ GERMANY STOP MIND http://www.lacoctelera.com/presentation-de-la-situation http://rudy2.wordpress.com/ CONTROL http://stopptmindcontrol.lima-city.de

ITALY - ASSOCIAZIONE ITALIANA, SCIENTIFICA E GIURIDICA, CONTRO GLI ABUSI MENTALI, FISICI E TECNOLOGICI http://www.aisjca-mft.org/

[61]

ITALY ASSOCIAZIONE VITTIME ARMI ELETTRONICHE-MENTALI WEB: http://it.geocities.com/decifircas/ www.associazionevittimearmielettroniche-mentali.org http://www.facebook.com/group.php?gid=91047851866&ref=ts http://www.facebook.com/notes/l-adige-e-il-trentino/mind-kontrol-in-italia-tra-fantascienza-e-realta/344278799541 INDIA NO MORE http://www.mindcontrolvictimsunity.in/ WEB: http://peacepink.ning.com http://soleilmavis.spaces.live.com/ COVERT MIND CONTROL WEAPONS http://www.zshare.net/download/558142082eb3d028/ (IN PEACEPINK CHINESE)

CHINA http://groups.google.com/group/soleilmavis

http://user.99114.com/225990/Cooperate_6
http://mindcontrol.com.cn/

43954.html
CHINA MINDCONTROL

JAPAN STOP MIND CONTROL WEB: http://www5f.biglobe.ne.jp/~terre/index.html http://www.mirai1.com/ (in JAPANESE and ENGLISH) http://www.geocities.jp/techhanzainetinfo/ (in JAPANESE) JAPAN RUSSIA (ASSOCIATION AGAINST THE http://www.volkstribune.de.tl/ RUSSIA THE MOSCOW http://www.moscomeco.narod.ru./ WEB: ABUSE OF HOUSING http://gangstalkinginde.blog59.fc2.com/ PSYCHOPHYSICAL WEAPONS) WEB: ECOLOGY COMMITTEE WEB:

RUSSIA - THE ST.PETERSBOURGH SOCIETY OF PERSONS SUBJECT TO REMOTE CONTROLLED BIOENERGETIC TERROR WEB: http://psyterror.narod.ru/ ABOUT GANG www.freedomfchs.com/ www.multistalkervictims.org http://citizensoulpower.com/2007/09/21/ THE EXOTIC OMINOUS PARALLELS WARFARE.COM & http://www. STALKING www.gangstalkingworld.com/ http://www.stopeg.com/index.html theominousparallels.blogspot. com/

http://exoticwarfare.org/ NATIONAL CARE SOCIETY http://www.nationalcaresociety.com/

ORGANIZED CRIME WAVES http://www.organizedcrimewaves.com/

US GOVERNMENT TORTURE & HEROES OF THE UNITED STATES FOR THEIR STAND AGAINST HUMAN MIND CONTROL TECHNOLOGY, TECHNIQUES & POLITICS http://www.cs.virginia.edu/~alb/ugly/ugly.html http://www.cs.virginia.edu/~alb/misc/truth.html http://www.cs.virginia.edu/~alb/misc/moreMindLinks.html EXPERIMENTATION FASCISM "9-11" MIND http://www.us-government-torture.com/SECRETANGEL.TV.html CONTROL http://www.9-11theofallblackoperations.blogspot.com/ http://www.geocities.com/xposperps/ GANG STALKING (ENGLISH AND DUTCH) http://www.stopeg.nl/

EMF TORTURE CHAMBER http://emftorturechamber.blogspot.com/, STOP ELECTRONIC http://www.stopeg.com/ WEAPONS/STOP

[62]

INTERNATIONAL MOVEMENT TO BAN THE MANIPULATION OF THE HUMAN NERVOUS SYSTEM BY TECHNICAL MEANS http://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm, http://web.iol.cz/mhzzrz/ PETITION - BAN ELECTRONIC WARFARE ON CIVILIANS - 400+ SIGNATURES AND MESSAGES OF VICTIMS & SUPPORTERS http://www.ipetitions.com/petition/synergy/ EMAIL: ti.petition@gmail.com, ti.synergy@gmail.com 600 + VICTIMS' ACCOUNTS FROM THE WHOLE WORLD http://www.mindcontrolforums.com/victm-hm.htm NAFF - ADVOCATING FOR VICTIMS OF MIND CONTROL, TORTURE, SLAVERY & RELATED TERROR http://naffoundation.org/ THE UNITED EMAIL: CITIZENS AMERICAN FREEDOM FOUNDATION http://www.uaff.us/uaffentrancepage.htm bertbrooks@usa.com http://www.healthycitizens.blogspot.com/ & ETHICS (CCLE)

AGAINST

HUMAN

EXPERIMENTATION LIBERTY

THE CENTER FOR COGNITIVE http://www.cognitiveliberty.org/index.html MIKROWELLENTERROR.DE/ FREEDOM FIGHTERS FOR TORTURE SECRETLY BEING

http://www.mikrowellenterror.de/ AMERICA www.freedomfightersforamerica.com http://iamatorturevictim.blogspot.com/ AS RESEARCH MR JEAN RATS http://researchrat.com/ EMAIL:

TECHNOLOGICAL US CITIZENS ARE

USED

THE DECLARATION OF verstraeten.jean@belgacom.net MR MR MR WALDEMAR WALTER DARIUS

ALARMED LOTZ -

CITIZENS EMAIL: -

VERSTRAETEN

wlotz2003@web.de, EMAIL:

wlotz2002@mail.ru, wmadliger@yahoo.de,

MADLIGER MOCKUS

EMAIL:

darius_mockus@yahoo.com,

2.4 Usual mode of treatment of targeting allegations on behalf of institutional mechanisms agents and the silent (psychic, discursive, pragmatic) complicity or a complicit multireferential signifying system: The ontic and the ontological facets, the multiple referential planes, the signifying regimes [see chapters 3 and 4] , the latent/background assumptions operative in each referential plane as signifying attractor between linguistic/protosemiotic/corporeal signs and their respective signifieds23 [see chapter 3]- An instance of circulalry demarcated predespositional causality [ ] or the [de]ontic reinscription of minor premises in a social constructivist/sociocybernetic paradigm of [de]ontological major premises as latent conditionals of multiple signifying regimes [From Parmenides virtuously circular truth to a pragmatically overloaded web of Husserlian noemata as cunningly interwoven minor premises against the background of a collective intentionality]
23

The Saussurian / Lacanian S barre also functions pragmatically and ontologically in the case of a targeted individual as a totemically barred subject, echoing Girards christological paradigm, as a simulacrum of the forbidden or a sociocybernetic inscription (instantiation of a universal cultural anthropological condition of not transgressing the latent rules of a language as form of life also see chapter 3) of forbideness as zero point of the potentiality of transgression; no doubt how the projective relationships formed between scapegoat and the community, the former functioning as a strange attractor for community members vices and transgressions are ontologically conditioned through this prephenomenologically given condition , operative since antiquity in communities

[63]

1. Hear No Evil, See No Evil, Speak No Evil. What the perp institutional agent knows about the T.I.'s perps, he won't discuss. If he doesn't report it, it didn't happen and he doesn't have to deal with the T.I.'s charges/issues. 2.The "How dare you!" gambit/Incredulity and Indignation He will avoid discussing key issues and instead focus on side issues which can be used to show the topic as being critical of some otherwise sacrosanct theme, idea or practice. 3. The perp institutional agent listens to the harassing perps' counter charges/rumors, then avoids discussing the T.I.'s issues by describing all of the harassing perps' counter charges against the T.I. Regardless of venue or evidence, he will treat the harassing perps rumors as truth and T.I.s complaints as wild and unfounded accusations. Derogatory terms, mutually exclusive of truth, will be used against the T.I. This method works especially well when the perp institutional agent writes his Incident Report or talks to his superior officers, the D.A. or judge. And is used by D.A.s during trial or pretrial hearings. If the perp institutional agent can associate the T.I.'s evidence with the Internet, he will use this fact to certify it a "wild rumor" which can have no basis in fact [which doesnt hold as web sites are the only cost effective way of mass communication for informal organizations]. 4. 'Straw Man' argument/selective use of evidentiary and discursive materials. He will find or create a seeming element of the T.I.'s argument which he can easily knock down to make himself look reasonable and the T.I. to look irrational. He will either make up an issue he can safely imply exists based on his interpretation of the T.I.'s situation, or select the weakest aspect of the weakest of the T.I.'s charges. Then, the perp institutional agent will amplify its significance and destroy it in a way which appears to debunk all of the T.I.'s issues, while actually avoiding discussion of the real issues. 5. Attack the Messenger, aka sidetrack the T.I. with name calling and ridicule. The perp institutional agent will associate the T.I. with unpopular titles such as "crazy", "drunk", "drugged", "kook", "rightwing", "liberal", "left-wing", "terrorists", "conspiracy theorist", "radical", "militia", "racist", "religious fanatic", "sexual deviate", and so forth. This makes any others who may be present shrink from supporting the T.I. out of fear of gaining the same label, and the perp institutional agent avoids dealing with the T.I.'s issues. 6. Hit and Run. When the perp institutional agent speaks to the T.I. he will briefly attack the T.I.'s position and then change the subject before the T.I. can make an intelligent or acceptable response. Or, he will ignore any reasonable answer. This works extremely well when the perp institutional agent is in the presence of a gullible new institutional agent, judge or jury, when a steady stream of new questions can be called upon without having to explain the perp institutional agent's reasoning ("Just follow my lead, I've been handling doing this a long time and can tell if a person is crazy/lying"). The perp institutional agent simply accuses or makes more attacks, never discussing issues, and never answering any subsequent response, for that would dignify the T.I.'s viewpoint. 7. Question Motives He will twist or amplify any fact which could be taken to imply that the T.I. operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the T.I. on the defensive. 8. The perp institutional agent will Invoke Authority. Claim for himself or associate himself with authority and present his argument with enough "jargon" and "minutiae" to illustrate he is "one who knows", and simply say the T.I.'s complaints aren't legitimate, without actually discussing the T.I.'s issues. 9. Play Dumb. No matter what evidence or logical argument is offered, he will avoid discussing the T.I.'s issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. He will mix these tactics for maximum effect.

[64]

10. Associate Charges with Old News. A derivative of the 'straw man' arument, in any large-scale matter of high visibility, the T.I. will make charges early on, which can be or were already easily dealt with. Where it can be foreseen, the perp institutional agent will have his own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues -so much the better where the T.I. is or was involved with the harassing perp. 11. Establish and Rely upon Fall-Back Positions. Using a minor matter or element of the facts, he may take the "high road" and "confess" with candor that some innocent mistake, in hindsight, was made -- but that the T.I. has seized on the opportunity to blow it all out of proportion and imply greater criminalities which, "just isn't so." Others will reinforce this on the institutional agent's behalf, later. Done properly, this can garner sympathy and respect for "coming clean" and "owning up" to the institutional agent's mistakes without addressing more serious issues. 12. Enigmas Having No Solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events described by the T.I., the perp institutional agent will paint the entire affair as too complex to solve or be true. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues. 13. Alice in Wonderland Logic. He will avoid discussion of the issues by reasoning backwards with an apparent deductive logic in a way that forbears any actual material fact. 14. Demand Complete Solutions. He will avoid the issues by requiring the T.I. to solve the crime at hand completely 15. Fit the Facts to Alternate Conclusions. This requires being schooled with preplanned contingency conclusions memorized well in advance of confronting the T.I. 16. Vanishing Evidence and Witnesses. If it does not exist, it is not fact, and the perp institutional agent or D.A. won't have to address the issue. 17. Change the subject. Usually in connection with one of the other ploys listed here, he will find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can "argue" with the institutional agent over the new topic and polarize the discussion arena in order to avoid discussing more key issues. 18. Emotionalize, Antagonize, and Goad Opponents. If the perp institutional agent can't do anything else, he will chide and taunt the T.I. and draw him into emotional responses which will tend to make the T.I. look foolish and overly motivated, and generally render the T.I.'s story somewhat less coherent. Not only will the perp institutional agent avoid discussing the issues in the first instance, but even if the T.I.'s emotional response addresses the issue, the perp institutional agent can further avoid the issues by then focusing on how "sensitive the T.I. is to criticism". 19. Ignore Proof Presented, Demand Impossible Proofs. This is perhaps a variant of the "play dumb" rule. Regardless of what material may be presented by the T.I., the perp institutional agent will claim the material irrelevant and demand proof that is impossible for the T.I. to come by (it may exist, but may not be at his disposal, or it may be something which is known to be safely destroyed or withheld. In order to completely avoid discussing issues the perp institutional agent may categorically deny and be critical of media or books as valid sources, deny that the T.I.'s witnesses are acceptable, or even deny that witness or expert statements meaning or relevance.

[65]

20. False evidence. Whenever possible, the perp institutional agent will introduce new facts or clues designed and manufactured to conflict with the T.I.'s presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications. 21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to benefit the D.A. and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, the prosecuting attorney can insure a Grand Jury hears no useful evidence and that the evidence is sealed as unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a T.I.) is achieved, the matter can be considered officially closed. 22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if the perp D.A. must actually address issues, he can do so authoritatively. as happened in Shan's case, when the opposition brought in 20 to 30 homeless witnesses to testify that Shan had been harassing and photographing them.) 23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as a trial in which a T.I. is suing the Government, then create bigger local news stories that will take precedent over coverage. 24. Silence critics.If the above methods do not prevail, the T.I. will be removed from circulation by some definitive solution so that the need to address issues is entirely alleviated. This can be by the T.I.s can be by death (an apparent or real suicide), arrest and detention, blackmail or destruction of their character by release of falsified arrest records or falsified psychiatric determinations, or blackmail information, or merely by proper intimidation with implied or overt blackmail or other threats. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as a trial in which a T.I. is suing the Government, then create discrediting news stories (such as arresting the T.I. on false charges of bank robbery, rape, pediphilia, drug trafficking, drunken and disorderly behavior, or insanity, or treat them as such) to distract the public. 25. Vanish. If the T.I.-supporting witness, harassing perp, or perp institutional agent, who is the key holder of secrets or otherwise overly illuminated and the situation is not going against the T.I. as planned, then that witness, harassing perp or institutional agent perp will be suddenly transfered, or otherwise unavailable. (quoted from the International Alliance against covert abuse web-site) However, thanks to concerted pressure on behalf of international targeted individuals communities authorities and representatives of the psychiatric establishment have recognized the existence of the targeting phenomenon (albeit not in Greece), but fail to take action. Why? Whos pulling the strings of this public spectacle?

[66]

2.5 The psychological effects24 of the targeting sociocybernetic mechanism and why/how the reported symptoms often match the diagnostic criteria of DSM (chance or premeditated institutional cover-up of the true causal mechanism that is responsible for generating these effects?)- Another typical instance of discursively complicit cover-ups and semantic/pragmatic aleatoric bifurcation of a phenomenon in ever multiplying signifying regimes25 [cf chapter 3] Psychotherapist Otto Doerr-Zegers found that victims suffer a mistrust bordering on paranoia, and a loss of interest that greatly surpasses anything observed in anxiety disorders. (not evident in my case as I continued being attracted to my career oriented polar attractor despite the cybernetic noise) . The subject does not only react to torture with a tiredness of days, weeks, or months, but remains a tired human being, relatively uninterested and unable to concentrate.
24

also see www.gangstalkingworld.com , Symptoms of Harassment

These general symptoms of harassment cover a wide range of harassments that individuals might be going through. They are from the Harassment101.com Psychological Reactions to harassment. Depression, anxiety, shock, denial Anger, fear, frustration, irritability, rage Insecurity, embarrassment, feelings of betrayal Confusion, feelings of being powerless Shame, self-consciousness, low self-esteem Guilt, self-blame, isolation Post traumatic stress disorder Loss of concentration Psychological Symptoms. Headaches Lethargy Gastrointestinal distress Dermatological reactions Weight fluctuations Sleep disturbances, nightmares Phobias, panic reactions Sexual problems Career & Economic Symptoms. Decreased job satisfaction Unfavorable performance evaluations Loss of job or promotion Drop in academic or work performance due to stress Absenteeism Withdrawal from work or school Change in career goals Societal Effects. Anti-Social behaviour Drug or alcohol abuse Suicide Homelessness Loss of productivity in schools and work Loss of moral for students and workers who witness harassment.

[67]

These findings led him to a revealing question: What in torture makes possible a change of such nature that it appears similar to psychotic processes and to disorders of organic origin? (Question of Torture, 10-11) Doerr-Zegers explained that techniques of torture work by creating deception, mistrust, fear,disorientation, a kind of total theater that leaves the victim disoriented and emotionally and psychological damaged. The similarity of the explanation below to street theater found in mind control allegations is remarkable;As Doerr-Zegers describes it, the psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victims self-betrayal and destruction. As the torturer manipulates circumstances to maximize confusion, the victim feels prior schemas of the self and the world ... shattered and becomes receptive to the torturers construction of reality. The psychological terror and mistrust bordering on paranoia of torture victims is remarkably similar to the mind control alleged by Naylor and the drug-induced paranoia of Waugh. The street theaterdescribed by most TIs also appears similar to the paranoia of mental illness and most people think street theater sounds crazy. Victims are subjected to various kinds of harassment and torture, twenty-four hours a day, seven days a week, for years on end. Most believe that some type of technology can remotely track, target, and control every nerve in their bodies. Heart and respiration rate can speed up and slow down, and stomach and bowel functions are regulated. Illnesses and all types of pain can turn on and off in an instant. Microwave burns are reported. Most TIs described street theater or similarly staged events in distinctive spaces signifying displacement,trapping, narrowness and destruction. To summarize, the CIAs psychological paradigm [which may have been generated by the secret services, but does not rest for its application exclusively with secret services personnel] fused two new methods, sensory disorientation and self-inflicted pain, whose combination, in theory, would cause victims to feel responsible for their own suffering26 and thus capitulate more readily to their torturers ... The fusion of these two techniques, sensory disorientation and selfinflicted pain, creates a synergy of physical and psychological trauma whose sum is a hammer-blow to the existential platforms of personal identity. Most alleged cases of mind control describe the considerable repetition of seemingly innocuous and banal stimuli in the TIs environment, as if engineered by computer27 2.6 A Peircian analysis of how the aforementioned conditioning tactics self-referentially and through the employed sociocybernetic mechanisms model their effects: the pragmatics of sociocybernetic conditioning The significance of what I term THE PRAGMATICS OF SOCIOCYBERNETIC CONDITIONING rests with what was termed as "pre-designation" by Peirce,insofar as the definition of an inductive inference is that the predicate P [or pejorative/disorderly judgment predicated of the target] must already be known before the sample (S', S'', S''') [the employment of particular targeting methods and individual scripts] is selected from the totality (M) of targeting conditionals If, however, the property to be examined must be defined before the sample is selected, this is only possible on the basis of a conjecture that the property exists in the corresponding totality before the inductive inference is made. How else could the property be known in advance of sample selection?
25

Presumed therapeutics as FINALLY BREAKING THE TARGET , RETERRITORIALIZING HIM TO A STATE OF PASSIVITY AND THROUGH INSTITUTIONAL VIOLENCE LEGITIMATING THE TARGETING MECHANISM THAT HAS BEEN UNLEASHED AT HIS EXPENSE 26 This is similar to J.Butlers psychoanalytic account of the ways whereby guilt was instilled in concentration camp survivors, also echoing the description of the phenomenon as mind camping 27 US Electromagnetic Weapons and Human Rights, Peter Phillips, Lew Brown and Bridget Thornton, A Study of the History of US Intelligence Community, Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University

[68]

Valid induction, therefore, already presupposes as a hypothesis the conclusion that is to be inferred. More precisely, inductive reasoning is based on a given hypothesis (M is P) and then, by means of samples (S', s''), seeks to establish the relative frequency (p) of the property (P) in the totality (M) with regard to that hypothesis...The condition that the property to be examined must be predesignated in advance of sample selection makes Peirce conclude explicity that induction cannot lead to new discoveries. IN ESSENCE, THE PERPETRATING MECHANISM AIMS AT CREATING CLOSED FEEDBACK LOOPS- SYMPTOMS ARE PRE SELECTED FOR GENERATION, THEN THE SUBJECT IS HOOKED BY DISPLAYING SYMPTOMS, WHICH HAVE BEEN GENERATED BY THE PERPETRATING MECHANISM, WHICH, ACCORDING TO THE PERSPECTIVE FROM WHICH THEY ARE VIEWED, ARE INTERPRETED INVARIABLY; THUS, DESPITE THE FACT THAT THEY CONSTITUTE RESPONSES IN THE CONTEXT OF DAILY SOCIAL INTERACTION, IF VIEWED FROM A SOLIPSISTIC PERSPECTIVE, SUCH AS BIOLOGICAL PSYCHIATRY, THEY MAY BE ATTRIBUTED TO INNATE, ATTITUDINAL OR BIOLOGICAL FACTORS THE SAME HOLDS FOR THE MECHANISMS OF NARRATIVE CONSTRUCTION EMPLOYED BY DIFFERENT SCHOOLS OF PSYHIATRY , PSYCHOANALYSIS ETC. IN THE FORMER THE ORDINARY DISCOURSE IS NEVER CHALLENGED, BUT TAKEN AT FACE VALUE, AS AGAINST THE LATTER, WHERE AN ATTEMPT IS MADE TO UNEARTH LATENT INSTITUTIONAL MECHANISMS (IN A POST STRUCTURALIST FASHION) THAT CONDITION SENSE MAKING AND WORLD VIEWS28. This is also the reason why in a state mechanism psychiatry is favored as an institutionally dominant paradigm over and above other disciplines; complementary to the fact that state income from pharmaceuticals is not to be neglected. From a methodological point of view it favors the perpetrating mechanism in that it sanctions institutionally the sedation of those tagged by social networks members pragmatic interests as threats. However, are diagnoses simply inferential or necessarily abductive, while suffering from petitio principii ? Diagnostic inferences are abductive, too. An example of a medical diagnosis, involving inferring : a cause from effects, logically constitutes fallacia consequentis or non sequitur. Every diagnostic statement by a medical expert functions as an abductive inference or the reconstruction of meaning from and in a system of signs. In an abductive inference as semiotic exegesis/interpretation, as a process of finding a premise (hypothesis), abduction is the basis of all hermeneutical procedures, the inference from phenomena (behaviours, actions) to motives/intentions/purposes. If we replace the surprising fact by the incomprehensible behaviour of a person, then an abductive inference may help us to construct an intentionalist explanation through motives (reasons) that makes the behaviour intelligible. All intentionalist or functionalist explanations in psychotherapy thus become interpretable as hypothetical constructions with abduction as their modus operandi. (1) Observation: Person A shows behaviour V in context K, utters x, etc. (2) Hypothetical rule: A behaviour x in context K has the meaning/function (f). (3) Case/conclusion: A's behaviour V has the meaning (f) (is motivated by f). If we consider the mechanism on the semiotic plane, a sign is introduced as an unexplained result to which, by way of the construction of an encoding rule, or the application of a familiar encoding rule, meaning is or can be assigned (contexts, frames, etc. being of significance, too). Abduction, as a cognitive operation, creates the framework which makes it possible to attribute a singular meaning to signs. The interpretation of signs - as the schema shows - is always abductive or in other words: the fundamental constructive principle of all semiotic interpretation is the finding or inventing of a hypothesis (abduction), i.e. the act of semiotic understanding on the part of a hearer can consist only in the attribution of meaning through a 28

See The Struggle of Psychiatry with Psychoanalysis: Who won?, Sander Gilman, Critical Inquiry 13, 1987 and APPENDIX IX- MEDICALIZING MENTAL HEALTH: A PHENOMENOLOGICAL ALTERNATIVE

[69]

his/her - frame of reference (encoding rule).Therefore, abductive inference is the basic principle of all hermeneutical procedures. In terms of cybernetics, and on a 2nd cybernetic [or metaepistemic] order, the intention for interpreting phenomena through a univocal interpretive mechanism [a dominant and state sanctioned discourse, such as psychiatry] may not lie strictly with economic benefits, such as the psychopharmaceutical complex (even though not excluding them), but with maintaining the very univocity of the interpretive schema imposed on automata that replicate it in their behavioral encounters. Again, an instance of maintaiing the Same/Other dialectic through the selective targeting of individuals who function as community totems [for greater detail see Chapter 3] 2.7 The creation of an institutionally sanctioned exclusionary mechanism. How an abductive stratagem crystallizes in an institutional practice through social constructivism and sociocybernetics : further notes on discursive complicity- a functionalist paradigm as apologetic for systemic dysfunctions or sedation as a way of coping with targeting : its a win-win situation for everyone but the target Peirce writes about abduction, that Its only justification is that, if we are ever to understand things at all, it must be in that way.. How do we proceed from seeing to knowing, from the affection of our senses to the description of our perception in language? Here, too, abductive procedures are at work: as soon as I describe my perception linguistically, I interpret non-verbal signs abductively and transform them into language in a rule-governed way. Against the background of abduction theory it is trivial that perceptual judgments are constructive in themselves, as being already interpretations. All perception is, therefore, in principle construction [this is a simplified echo of Kants account of how the sensory manifold is filtered through perception and subsumed under synthetic a posteriori concepts of empirical understanding29]. Carrying out inferences, therefore, does not always involve conscious reflections before we reach our conclusions; frequently these inferential processes take place below our level of awareness, as Peirce himself repeatedly states and defends . Deductive inferences ("inference a priori") do not yield anything new, only abductive reasoning leads to really new paradigms and can, therefore, be considered as knowledge-increasing..Applying the theory of abduction to the brain brings out the precise logic of Maturana's theory of autopoiesis. For the observer, the brain thus becomes comprehensible as an autonomous organ of abduction which, under the control of internal "rules" (cognitive maps, memory) which are not fixed/determined by the external world, neuronally encodes the stimuli (perturbations) impinging upon the sensory receptors (this would quite literally be "in-formare") and so generates information from those stimuli. Again, in logical terms this is a case of non sequitur, but in a cybernetic/pragmatic paradigm,such as Maturanas, it assumes the character of prephenomenological giveness, which will be challenged in Chapter 3 in the context of the pragmatics of social interaction. The seeds of all kinds of ways of worldmaking are contained in abductive inference.In semiotic terms, an abduction functions as the incorporation of a sign into a coding system (minimal theories, hypotheses) the logic of which forms the frame within which the phenomena that have become signs acquire meaning.Abductive inference, in comparison with logical rationality, is para-logical, irrational and yet this mode of inference grounds the majority of causal chains embedded in ordinary discourse, coupled with latent assumptions and pragmatic interests (and from a systemic point of view in maintaining the univocity of an institutional discourse). Psychiatric discourse is still in the first step of the evolution of phenomenology (see chapter 3), where, instead of attempting to reconcile transcendental explanatory schemata with the contingencies of being in the world and the social forces that shape it, it takes even more steps back (towards Descartes, hence suffering from solipsistic fallacy) and attempts to replicate his mechanistic outlook on the functioning of human consciousness by seeking grounding in biological processes. In this context, biological factors are not precluded, but by no means must be assumed as causal factors behind the appearance of phenomena, for reasons that have been extensively covered in the critiques
29

Claiming a posteriori synthetic concepts of empirical understanding to be a priori synthetic concepts of empirical understanding is a logical fallacy BUT VALID IN A SOCIOCYBERNETIC PRAGMATIC PARADIGM

[70]

against evolutionary theory and biological determinism, positivism and which have led epistemologists to differentiate amongst hard natural sciences, soft natural sciences and social sciences. As already explained , the silent massacre is not only clearly a social constructivist phenomenon, but also a political phenomenon, which necessitates delving into institutional aspects, hence it may not be accounted for by a hard science. Psychiatry deals with phenomena, which, by default, are not the object of hard science, which also affirms its reductionist character, while being highly prone to falsificationism (alongside criticisms of positivism and biological determinism). Quoting Feyarbend (from Against Method), In the Logic of Scientific Discovery, Popper argued that a scientific hypothesis could never be proven to be absolutely true. We might observe a thousand white swans but that can never prove beyond doubt the theory that all swans are white. On the other hand, the first black swan observed conclusively 'falsifies' the theory From this basic insight, Popper argued that scientists should spend their time concocting new and radical theories which they then endeavour to disprove. . The project is still metaphysical (ie quest for explanatory grounds in primary principles), while still suffering from the same empirical fallacies encountered n pre-Kantian empiricists, that is reduction of a series of repeated observations among phenomena to a necessary causal nexus between cause and effect, this time rooted in biological processes 30. The positivistic accounts of neuropsychological epistemology remain within the confines of a modernist dualistic/binarist mind/body perspective and indeed the majority of the exemplifications of how representations are fashioned/conditioned concern visible objects, while disregarding any other tactile variables that register alongside the represented object in the memory - classical analytical fallacy. When I see something qua an attributed object it is most likely that I will be hearing , smelling touching something alongside. How can we isolate the representation from the entire spectrum of sensory input that is registered alongside the visual imprint? In fact, as already illustrated, the aim of the perpetrating system in targeting activities is not to enter into a discursive relationship with the target, but to paralyze, disorient and kill it, wherefrom stems the experiential blanketing and oversensitization of the target with seemingly senseless activities (pure experiential noise) , which only afford to bring about automatism, reduction of complexity and confinement (aims that match exactly the sedative purpose of a psychiatric institution, which acts in complicity to the aims of the perpetrating system , therefore participating in the organized system of premeditated murder or the silent massacre). In order to avoid these criticisms the discipline has invented explanatory tactics, such as psychosociodynamics, which attempt to account for the various forces that are operative in the formation of a series of perceptions about being in the world. However, without clear pathways for quantifying the relative contribution of each of these forces in the grand narrative, the project remains highly speculative and indeed grounded on collective opinions [expert agreement], in the same way whereby the alleged disorders are formulated during colloquia31 Functional explanations are found in many scientific contexts, in social and behavioral sciences as well as evolutionary biology. Ethnologists, for example,explain social practices on the basis of their roles in fostering social cohesiveness. Freudian psychologists explain dreams in terms of wish fulfillments. In most, if not all, such cases, functional equivalents alternative mechanisms that would achieve the same resultappear to be possible. I find no reason to suppose that such explanations are acceptable only on the supposition that it is possible in principle to show that one rather than another of these alternatives had to occur in the circumstances. Totemic worship of the wolf can be explained in terms of its social end function even if totemic worship of the bear would have worked as well. Functional explanations do not cease to be explanations just because we cannot rule out functional equivalents32.Even disregarding all pretensions to its being a dominant paradigm, discursive complicity may be discerned by looking attentively at how common discourse axiological judgments are interwoven in a presumed epistemic discourse: The stages of engagement, pattern identification, pattern change, and pattern maintenance are described below and will be illustrated in subsequent chapters with regard to specific personality
30 31

Also see the black swan hypothesis See Feyerbends Against Method 32 Causality and Explanation, Wesley C. Salmon, University Professor of Philosophy, University of Pittsburgh

[71]

disorders [In brief, manufacturing of response patterns through well acted out engagements (eg street theater) attain to manufacture the exact symprtomatology that is needed for labelling an indinvidual under a deductively defined set of disorders] One early indication that engagement has been achieved is the patients willingness to collaborate and take increasing responsibility for making necessary changes in his or her life. Disordered styles are either undermodulated or overmodulated, and the goal of treatment is to achieve some measure of modulation. Modulation is the state in which thought precedes action, spontaneity is experienced without pretense or exaggeration, and coping with problems leads to effective and responsible behavior. Needless to say, many individuals with personality disorders never adequately learned these skills during their formative years. Prognosis will also depend in part on the prominence of the psychobiological dimensions (Siever & Davis, 1993; Reich, 2005): cognitive/perceptual disorganization; impulsivity/ aggression, and affective instability or anxiety/inhibition. To the extent that such dimensions as impulsivity or anxiety respond to medication,concurrent psychosocial intervention efforts should be facilitated.. [.;,] (from Cognitive behavior therapy of dsm iv book It is noticeable in the above exemplary passages how language is purely speculative throughout, starting (AS A GIVEN OR VICIOUSLY CIRCULAR HYPOTHESIS) with intended behavioral modification; then proceeding to attributing this modification to personality traits and temperament, irrespective of the stage setting that has been orchestrated; In fact, allusion to orchestration is met with a ready made explanation of paranoia etc; thus, the system safeguards its intactness by manufacturing opposition and moreover, by labelling opposition under ready made "diseases" The same holds for conditioning.; the repetition of the conditions that give rise to a particular response pattern, once sufficiently repeated at the required intensity will give rise to a patterned behavior that will appear as such even though the initial conditions that triggered them are lacking For example see the DSM IV definition of an attribute falling under the overvigilance umbrella; unrelenting standards/hypercriticalness- yet, in most serious corporate environments, these standards are prescribed in the code of conduct under the heading passion for excellence and in TQM (which is also endorsed in the United Nations code for sustainable development), it is termed as need for self transcendence- also echoed in zen culture- language as a necessary prerequisite for achieving zero-defects! The DSM analytical categories are HIGHLY judgmental, grounded in pseudomorals, adhocist and not at all disinterested and allencompassing with regard to polar opposites , thus legitimating any possible attempt at subsuming phenomena under one of the categories. Unfortunately, it lends itself to some of the most fundamental positivistic premises, such as the attempt to establish a causal chain of events/phenomena that lead to the formation of latent behavioral schemata through a process of elicitation during the interview/observation/report formation stages, where the presumed patient essentially establishes through his own recollections and narrative some of the phenomena, which are part and parcel of the discursive constructions of the manual also see Garfinkels research in clinical discourse cited in chapter 3 33!!!To understand an individual consciousness one must situate it within the broader cultural and historical world in which it lives and breathes. This cultural world consists of language, of social rules and institutions,of cultural objects like houses and city streets and artworks, of ideologies, and so forth,
33

From a chaos theory perspective it is impossible to repliacate in a 100% accurate fashion the conditions that interacted in the formation of a particular perceptual constellation (unless the observed subject is placed in complete isolation and purely conditioned by the surrounding stimuli thath are intended to produce a particular disposition. The problem is that each time a hypothesis is falsified through the rejection of the null hypotehsis, a new set of perceptual tissues has formed in the subject's memory, which functions as the compass for interpreting similar stimuli in the future. This "cultural interpretive repertoire" becomes the self reflective grounding against which new sets of stimuli are evaluated as to the intentions of the agents behind them

[72]

all of which are situated within ongoing historical traditions. Meaning is a broadly historical-cultural phenomenon, not an (individual) psychological one,and the interpretation of meaning (and the search for its source of meaning) must turn from the minds of people to the historically situated public world of shared practice. Moreover, attributions , ascriptions and predications seem to be context independent;again a necessary precondition for the dominance of a solipsistic paradigm. , as if the individual lives in a giant glass jar, while disregarding any orchestrated system of social exclusion, cunning depopulation enforced through pseudo morals and hidden power stuctures (wherein distribution of power has been pre ordained) and masking of a system of inequalities, which are in stark contrast to constitutionally sanctioned freedoms. In other words, and this is the decisive point, there is a transition from fallacious thinking to a different kind of thinking. And it is precisely this sort of transition that cannot be managed with and in traditional logic because it. consists essentially in its violation34. From this point of view, abductive inferences do indeed violate logical laws, but they may be interpreted as creative changes of the semantic content of concepts or conceptual systems (language games), - as is, by the way, the case with all "paradigm changes".35 In informal logic (wherein odrinary discourse is grounded and of which DSM analytical principles constitute a direct and uncritical reflection, masking power plays) , there is no absolute standard for the rationality of thought and action, but only a relational one36. By means of creative abductions where a new "major premise" (hypothesis: M is P) is invented new and different standards are constructed. Standards - like the laws of logic - are not true or false in themselves but only more or less useful in the realisation of particular interests or goals. Here one must distinguish between logical correctness and what is right in the sense of a standard borne out by ordinary practical living, - this is the meaning of fit. It is, therefore, ultimately pragmatic and not logical - criteria that determine whether para-logical thinking permits viable action capable of inductive corroboration. Pure logic is inadequate to judge the rationality or irrationality of an utterance or an action because para-logical (abductive) inferences or hypotheses may, in fact, be rational (i.e. correct). Their rationality, however, is different from the rationality chained to Aristotelian logic (and by implication, apodeictic principles of legal logic, such as beyond all reasonable doubt are reduced by definition to the best possible explanatory hypothesis). If abductively constructed hypotheses are corroborated inductively then the experienceprior rules (logic) of a conceptual system are transformed or adjusted, - as is the case with all "scientific revolutions"37. Such creative abductions must be seen as adjustments of theories, logics, standards and norms of thought, in fact, of our total conceptual universe (or lifeworld, in Husserls terms- see chapter 3), they change our mental map(s) more or less fundamentally. A representationist conception of logic cannot be consistently upheld. Logic does not mirror an independently existing order38, logic, too, and all its "laws", are much rather "posited" , i.e. manufactured by a community in communication, and not discovered. The "laws of logic" may be understood as the discursive rules of a game that cannot be justified "retrogressively" by having recourse to some real or fictitious ontology, but only "pro-gressively", pragmatically, i.e. by their fitting into the discursive and material environment constraining the game (von Wright , Fischer ). that logically false inferences may in fact be right because - in contrast to logical rationality - they actually enlarge our knowledge of the world or fit certain
34 35

A progressive shift from metaphysical to pragmatic and sociocybernetic violence SOS cross refer to Kuhn's structure of scientific revolutions and Feyerbend's Against Method for an account of how paradigmatic shifts are effecyted, that is not through an enlargement of the explanatory scope of paradigms that rest on existing premises / hypotheses, but on the creation of new hypotheses and subsequently subsuming observations (or regluing them) under the newly established encoding system. 36 And insofar as relationality is the dominant mandate of agenda 21 it is highly indicative of its pragmatic orientation (also see analysis on Habermas pragmatics of social interaction in chapter 3) 37 CROSS REFER TO FAYERBENDS AGAINST METHOD 38 For a classic demonstration of this pragmatic outlook cf Rortys Philosophy and the Mirror of Nature

[73]

purposes. This does not only mean that logically true inferences say nothing about the world, but also that all our - logical or paralogical39 - inferences are invented hypotheses the adequacy of which cannot be proved within logic but only pragmatically, i.e. by showing that they improve both our orientation in the world and the way we control or manage our lives. 40 Fischer interestingly continues by claiming that It thus becomes evident, furthermore, that radical constructivism AND SOCIOCYBERNETICS has no need for the idea of 'representation' (re-praesentatio) and an ontology in the classical sense. Moreover, the establishment of a relational / social networking paradigm as the ground of legitimacy of causal patterns among social actors and states of affairs (such as agenda 21) over and above an epistemological one silently does away with the need for grounding empirical inferential chains in metaphysical principles (no need for an Aristotelian causa prima or a Heideggerian ontological horizon as meta-narratives, insofar as a dominant paradigm of radical immanence has been legitimated in practice under the auspices of a communitarian ethos . The validity of a claim or the subsumption of empirically verified events under minor premises and then under major premises or hypotheticals within this paradigm stops at the juncture of network members agreement. Radical constructivism tries to avoid ontological statements about the "real" nature of the world and leaves behind the idealist notion of an immanent essence or an immanent nature of the world which is alleged to be amenable to human knowing, which paves the way to epistemologically frail, yet pragmatically forceful disciplines such as cybernetics and sociocybernetics, of which the silent massacre phenomenon is an outcome, as clarified in Chapter 3 in the context of the arguing why Habermas ideal speech community is unattainable. Thus, the silent massacre phenomenon not only is not a case of the targets responsibility or guilt for being tortured, but the entire dystopian condition that has been fabricated by a system of perpetrators, involving institutional agents, is a clear case of social constructivism, Artificial Intelligence modelling and sociocybernetics and hardly, one may even argue, a case of either opting for an inherentist/reductionist paradigm (such as psychiatry) or an interactionist/intersubjective/structuralist or poststructuralist paradigm (such as social phenomenology and ethnomethodology) . Radical constructivism, as a psychology of knowing, first and foremost discards the loaded concept of representation and specifies knowing as a predominantly self-referential process: human subjects possess no knowledge other than the knowledge they have themselves created through operations within their own cognitive systems41. (or sociocybernetic ecosystems, cf chapter 3) Knowing means inferring, inferring means rulegoverned interpreting, interpreting is a constructive, synthetic act, and a construction that proves adequate (viable- in relation to S.Beers VSM archetype) in the "world of experience" (German: "Wirklichkeit"), in life, in the praxis of living, is, to the constructivist mind, knowledge. It is the practice of living which provides the orienting standards [and this echoes Wittgenesteins empirical linguistic conceptualization of orientation as learning to take turns in a form of language- a maxim that has been reified in the engineered landscape of agenda 21 communitarian ethos and its respective lingo] for constructivist thinking and its judgments of viability. The question of truth is replaced by the question of viability, and viability depends on the (right) kind of experiential fit42.Well, if the notion of viability does not ring any bells about viable sustainable development against the background of self legitimated , co-evolving communities, then something must be definitely interpretively wrong. A more stubborn problem, however, is circularity. Natures or inner purposes were theoretical properties of things that could only be understood by inferring them from their effects43.
39

Indeed! RATIONAL PSYCHOLOGY (OR COGNITIVISIM IN GENERAL] HAS BEEN PROVED TO BE A PARALOGISM OF PURE REASON BY KANT IN HIS FIRST CRITIQUE 40 Abductive Reasoning as a Way of Worldmaking, Hans Rudi Fischer (Heidelberger Institut fr systemische Forschung und Therapie), Foundations of Science, special issue on "The Impact of Radical Constructivism on Science", edited by A. Riegler, 2001, vol. 6, no.4: 361383. 41 ibid 42 ibid 43 As an illustration see the article Classical eyeblink conditioning and schizophrenia: A short review R.E. Lubow Department of Psychology, Tel Aviv University, Ramat Aviv 69978, Israel, Behavioural Brain Research 202 (2009) The null hypothesis of the rsearch (by the way, the results of which were compared to similar research conducted on rats!!!) was disconfirmed, suggesting that there was no correlation between

[74]

Were these inferences bogus, and if so why? The locus classicus for the sense that these were bogus explanations that depended on linguistic flummery to conceal their emptiness is the ridicule heaped upon medics by Molire. He [Moliere] targeted the practice of physicians (which continues to this day) of giving a Latin name for a disease which is nothing more than the name of the unknown condition that is supposed to be the cause of the disease, thus giving the illusion of explanatory knowledge But, in many of the relevant cases, problems posed in these terms could not be solved by science. And in the numerous cases where intrinsic natures and the like could not be identified except in terms of their effects, this causal theory was circular.The problem of circularity and the problem of the arbitrariness of the asymmetries are distinct problems, and they arise in different ways in the later history. To these may be added a third: the natures, powers, and the like which are mysterious inner properties, unobservable, and irreducible to ordinary material features of things. They are, as Descartes put it, attached to substances, like so many little souls to their bodies44 , echoed in metaphysical heuristic terms , such as Kants sensory manifold, Aristotles materia prima Heraclitus flux, Derridas unsublatable exteriority, Levinas wholly other which yet point to a per definitionem impossibility of totalizing experience in a deterministic manner, even under the auspices of a sociocybernetic paradigm. 2.8 The ontological issue with the notion of the psyche : empirical fact, fact of reason or of epistemological reification against the background of economic interests? The soul does not exist as such and as an empirical phenomenon. Its access as such through empirical understanding leads inevitably to an antinomy of Pure Reason, in Kants terms and accprding to the argumentative process deployed in the 3rd Antinomy of Pure Reason in the Critique of Pure Reason. Empirical understanding as a faculty of Reason, in Kantian terms, is charged with synthesizing phenomena according to concepts (whence the critical difference between a priori and a posteriori concepts). All inductively synthesized phenomena constitute empirical concepts, sunthezied against the background of an experiential manifold that appears to the senses, hence all accounts on empirical phenomena constitute a posteriori concepts of empirical understanding. The only thing Reason may grant as objective is the metaepistemological validity of its own functions and faculties, which, according to the Kantian rhetorical topography, reside in the noumenal, rather than in the phenomenal world. By implication, what a rational agent may be objectively certain of is his capacity to reason self-reflexively about the apparatus of Reason (or an epistemological self-referential approach with systemically intertwined concepts), but not about the concepts that are synthesized a posteriori upon reception of fragments of an exterior manifold (or a Heraclitean flux, so to speak). This is the solipsistic approach. The certainty about the existence and the descriptive validity of empirical concepts is yielded only through communicative agreement against the background of interaction with other social agents, hence concepts and judgments of empirical understanding are pragmatically loaded and not at all disinterested. Kant, for example, in the Critique of Practical Reason lays claim to an innner moral sense when acting out of Goodness, which principles may not be qualified or exemplified in empirical terms, save only verified intuitively (based not on intuitus empiricus, but on intuitus purus), which constitutes a cryptic remark and a mystical way-out of a syllogistic aporia, while not being amenable to empirical verification over and above self-centered, intrests.Similar cryptic remarks when it comes to grounding metaepistemologically terms in scientific discourse are more often than
schziph and eye blinking. This is only an example among a plethora of failed attempts to validate (as in rendering deductively valid) diagnostic principles, that is yielding exacvtly the same rwesults every time the same experimental conditions are applied. Even worse, the utter lack of solid epistemological foundations for the discipline urges bogus researchers to brutally misinterpret classics (such as Hegel in the following example) and lay claim to utterly non scientific and deeply rooted in mysticism passages , which in consequence assume the character of an operational framework chracter. Notice the following passage Hegelian program now being taken up by all of our schools of psychiatry and all will indeed be needed if we are to succeed in this greatest of challenges, from the article A new psychiatric epistemology by Edward Hundert, which contains no analysis whatsoever of any Hegelian theses, but only uses one metaphor from The Phenomenology of Spirit as a springboard for making fuzzy and intuitive programmatic declarations. 44 The Blackwell Guide to the Philosophy of the Social Sciences

[75]

not encountered in the philosophical tradition. For example, Wittgensteins definition of language as a form of life constitutes a metaphorical heuristic way out of a lengthy path of formal logical calculi, which paved the way to subsequent attempts at making sense of everyday discourse through informal logic, Austins and Searles speech act theories, discourse analysis, pragmatism and other perspectives. The argumentative thrust concerning the issue of the ontological status of the soul or the possibility for proving its existence is that it is not possible through empirical syllogisms. Hence, in Kantian terms it is a logical fallacy or an antinomy of Pure Reason and in Wittgenesteins terms it does not make sense. The psyche is an abstract schema that was generated abductively by Aristotle in De Anima and through a process of progressive eliminations of plausible arguments about what is that within someone that may be moved without the presence of external stimuli. Thus the concept of the psyche developed as an epistemological schema in an attempt to answer questions about an ontological issue [at this point ontological is conflated with metaphysical, even if a crucial distinction should be made, but this will be clarified in due course] concerning the intuitively verified existence of something that may be moved even in the absence of external stimuli. Its ontological existence may be verified in Heideggerian terms as what appears in the horizon of Being, as mode of appearance, but this would take us into a wholly new field of petitio principii. Not only the psyche is an oblique concept, but it is illusory as it is not biologically situated. Thus, by implication, the very notion of psychiatric disorder is illusory, as a disorder is predicated of something that does not exist or of an abstract schema that became reified through its uncritical adoption in common discourse over the millenia. When a conditional statement is made in order to confer a causal relatiosnhip between two phenomena of empirical understanding, it is assumed that they are both grounded within the horizon of intersubjectively verifiable empirical understanding. For example, I find a eye shaped mark on my oven and clearly someone must have imprinted it in an act of illicit break-in and property damage. The perpetrator is a concrete person and the outcome of his action empirically verifiable. But how can a conditional statement be transformed into a descriptive sentence of an outcome that is predicated of something that does not exist? Thus, insofar as the concept of the psyche does not make sense, the concept of a psychiatric disorder does not make sense either. A recollection or a representation of an event may be distorted or false, but what I can be certain of in strictly epistemological terms is memory as a function of empirical understanding and not the content of the memory or the empirical representation. Again, the descriptive validity of a phenomenon of empirical understanding may be granted only intersubjectively [lets grant validity to this argument provisionally]. Thus, not only is the notion of a disorder predicated on something that does not exist, but the very predicate is illusory as no sense-certainty may be granted to a phenomenon of empirical understanding. Now, the critical turn to intersubjectivity that has taken place in sociology over the past century is an attempt to dispel some of the epistemological impasses with which traditional logic and metaphysics are laden. Notions such as intersubjective reality, collective myths, rituals of passage, empirical accounts constitute an attempt to describe how empirical reality evolves out of the dynamics of social actors and social groups, given that attempts to root the validity of empirical reality in strict epistemological terms has been found to be wanting. However, in parallel to the emergence of descriptive notions about empirical phenomena, notions about power and conflict whereby certain accounts dominate over others in an attempt to solidify collective mindshare as univocally as possible have also appeared as attempts at demonstrating that even though intersubjectively generated, these acounts are far from disinterested, hence objective. The post modern turn, for example, has given priority to narratives of otherness, local narratives as against grand narratives, multivocal viewpoints, how biased judgments emerge as an outcome of stereotyping (especially in the case of minorities), how institutional mechanisms evolve (eg Foucaults Discipline and Punish on the evolution of the punitive system, the History of Madness as the evolution of institutionally sanctioned mechanisms whereby otherness discourses are generated, Goffmans discourse analyses on asylums etc). These accounts of social epistemology , despite their methodological differences and variations in epistemic frameworks, lay claim almost unanimously to relationships of power and conflict out of which distinctive classes of discourse emerge and stabilize through stifling other voices. This is why a distinction is usually made in

[76]

post-modern analyses between dominant paradigms and alternative paradigms45. Psychiatry, as an epistemological paradigm among many (eg Freudian, Lacanian, Kleinian, Guattarian psychoanalysis, social psychology, social phenomenology) managed to solidify as a dominant paradigm and concomitantly a dominant discourse largely thanks to its simplicity.. Ample accounts of participants in decisions about which social phenomena should be tagged as disorders during scientific colloquia report that the decision is made by a raise of hands (!) and by a who manages to speak louder during the meeting (!). Also, official resignation letters by former APA presidents lament the increasing dependendence of the psychiatric community on pharmaceutical companies financial targets, as against a presumed therapeutic mission of the profession. Thus, not only has the psychiatric paradigm been institutionalized at the expense of conflicting paradigms, thanks to its simplicity, but the key value driver or the motivating force behind the epistemological validity of the diagnostic process and the drugging of civilians rests with clear economic interests on behalf of select companies. This is sufficient reason to confirm the powerplay among interest groups hypothesis made by various social theorists in the formation of dominant epistemological paradigms. Intermezzo: Further notes on the political aspects of psychiatry as a legitimately dominant discursive paradigm

The role of the psychiatric establishment and the psychopharmaceutical complex In the context of targeting, if framing fails or in cases where no objective proof of criminal activity is evident, this is a usual method of effecting the massacre the DSM, the witchunt, the epistemological gaps the sedative vs therapeutic aspect, the diagnostic process, the criteria as complexity reducers the DIAGNOSIS method: the questionnaire as washing out mechanism (I'd like to be a gardener), the biased interview process the freemasonry precedents, the Tavistock institute (and its interdependence with Illumisnim and secret agencies, the MK ULTRA archives psychiatrists acknowledging gang stalking psychiatry is not an exact science the FDA drugs approval process the thousands of cases against pharmaceuticals from disgruntled victims/experiments the thousands of legal cases about relatives vying on relatives' property using involuntary commitment as an exclusion mechanism why it is unconstitutional during incarceration which legal breaches are noted (no information on which drugs are committed, no information on potential side effects, selective communication with outside world

45

Kuhn's work attempts to show that incommensurable paradigms can be rationally compared by revealing the compatibility of attribute lists of say a species outlined in a pre-Darwinian and a post-Darwinian milieu accounted for in two incommensurable taxonomies, and that this compatibility is the platform for rational comparison between rival taxonomies (in Rhetoric of Science)- also see Rhetoric in the Age of Cognitive Science

[77]

the epistemological deficits and the grounding in cartesian dualism, the prioritization of inherentist46 and cognitivist / solipsitic theories of truth over more plausible accounts yielded by conventionalist/coherentist paradigms state complicity in favoring the inherentist paradigm thus violating the freedom of speech right and the right to refuse drugging the solipsistic paradigm serves pragmatically the judiciary purpose of individual accountability even where mind control mechanisms are evidently used evidence from the DSM VI reserach agenda that "we are far from establishing a causal chain between symptoms and causes" , also attetsing to the viciously circular relationship bewteen "symptoms" and presumed causes against the background of inexisting illnesses and their merely affording to ratify speculative analytical principles the model is self-referential thus does not escape the petitio principii fallacy

2.9 The legal issues with psychiatric diagnosis: violating freedom of speech, violation of privacy and the right to refuse drugging for the sake of reducing complexity? For whom? Myself being a marketing person with significant experience in business decision making and exposure to a comprehensive set of brand development stages, consumer marketing research, advertsing development and exponent of freedom of trade principles, I fail to see where the freetrade principle applies in cases where a company becomes institutionally sanctioned to forcibly provide its products down consumers throats. Certainly a company or a brand may outwit competitors thanks to the availability of superior investment (R&D , promotion) funds, but at the end of the day it rests with the consumer to either take the product or leave it. Insofar as state institutions are based in principle on least common denominators among citizens in an attempt to secure social peace, complexity should ideally be reduced to such an extent as to avoid conflicts. But this is a subjective value judgment, as valid as any else, thus if the primary reason for selecting
46

Inherentist and solipsistic paradigms are formally (that is in terms of apodeictic reason) fallacious, as they suffer from mental causation reductivism and act as enablers (demonstrably) of all sorts of fallacies of informal logic, yet cogent rhetorical devices for impression management, such as appeal to popularity, appeal to emotion. . Each of the arguments against nonreductive mental causation relies on one or more of the following metaphysical assumptions: 1. The Physical Realization Thesis: A mental property is instantiated only if it is realized by a physical property. If P realizes M, then P is nomologically sufficient for M, and M supervenes on P. 2. The Nomological-Sufficiency Conception of Causation: A causes B only if A is nomologically sufficient for B. 3. The Causal-Realization Principle: If an instance of S occurs by being realized by an instance of Q, then any cause of this instance of S must be a cause of this instance of Q (and of course any cause of this instance of Q is a cause of this instance of S) 4. The Causal-Inheritance Principle: If mental property M is realized in a system at t in virtue of physical realization base P, the causal powers of this instance of M are identical with the causal powers of P. 5. The Causal-Closure Principle: Any physical event that has a cause at t has a complete physical cause at t. 6. The Principle of Causal/Explanatory Exclusion: There is no more than one complete and independent cause (or causal explanation) of any event. , The Metaphysics of everyday life, p100 I. If mental properties are both irreducible and causally efficacious, then there is downward causation by irreducible mental properties.II. If there is downward causation by irreducible higher-level properties, then there are two distinct nomologically sufficient conditions of a single event. III. There are not two distinct nomologically sufficient conditions of a single event. IV. Mental properties are not both irreducible and causally efficacious (p103).

[78]

psychiatry as a dominant and institutionally sanctioned discourse is simplicity and an inherentist paradigm that is appealing to a vast aray of not epistemologically savvy lay people, who would be willing to accept the violence of mean values as normative requirements , not because they make an informed decision to buy the paradigm, but because they are not in a position to exercise their freedom of speech in order to challenge the validity and the legality of the paradigm in case it infringes their rights, then epistemological superiority is not a matter of making more accurate diagnoses to conflicting paradigms, but a matter of an audience not being critically predisposed to the endorsement of a set of principia that constitute a pseudo-epistemic translation of loci communes. In fact, insofar as folkways are more intuitively reflected on a discourse that speaks its language , intuitive endorsement of the discourse by lay members is more easily and uncritically granted. However, this relationship is (i) circular, meaning that it neither legitimates a natural language or form of life that is silently predicated of phantasmatic least common denominators and violating mean values, nor a discursive apparatus that appears self-allegedly as deductively valid, even though it has been generated through a process of empirical abstractions from folkways (ii) epistemologically invalid, as it fails to account for the hidden power play behind the institutional currency of the discourse, as previously exposed (iii) rooted in a maze of pre-phenomenological understanding and by implication of concepts of empirical understanding, of which, as previosuly established, one may not by definition be certain, while recourse to intersubjective agreement (both in terms of lay as well as scientific community members) as a heuristic way out of a syllogistic aporia merely repeats the vicious circle fallacy noted in (i), (iv) common discourse, which constitutes natural language, is laden within logical fallacies, such as the slippery slope argument (or answering in a communicative turn-taking encounter by changing the subject), logical inconsistency, affirming the consequent, modus tollens, modus ponens (where a simple shift in the referential plane leads the equivalence of terms to absurdity), hence an epistemic edifice that is a reflection of a natural language is by default laden with all sorts of fallacies. Therefore, returning to the context of a new communiatrian ethos that imposes interpretive perspectives that are legitimated by informal referenda among members of fluidly conceived of social constellations, not only is natural language as a form of life cryptically legitimated by dominant groups, but the institution of a new lingo and its endorsement by community members as an index of membership point to a cryptic form of sociolinguistic terrorism, insofar as nonmembership to the linguistic community and by implication the non-members non-ec-sistence in that communitys lifeworld (insofar as humans ec-sist linguistically) constitutes a perfect excuse for criminalization, due to being tagged as transgressor of the very linguistic apparatus that grants community members their identity through their participation in language-games as parts of a transcedentally conceived natural language or form of life. Especially when the convivial interests blend with pragmatic ones, such as conflicting career pathways, property issues, the reasons for opting for exclusion through tagging, targeting, incarceration and perhaps criminalization emerge even more forcefully. Thus, a posteriori dystopian empirical concepts based on agreement among pragmatic community members about phenomenal particulars are invoked in order to morally legitimate a priori conceived decisions based on interested judgments. Insofar as a judgment by default and based on existential phenomenology terms, forces a social actot to make a selection among alternative pathways or potentialities of being in the world, it rests with a collective judgment to affirm the openess of its actionable pathways by excluding others from pursuing theirs. Therefore, group decision making does not necessarily concern itself with making a valid judgment (in epistemological terms), but with a beneficial judgment (in pragmatic terms). The more powerful group members are involved in the decision making process with whom the target of the judgment is in either direct conflict or in indirect conflict (insofar as a protg or affiliate member of that person is involved), the less lkely the outcome of the judgment will be for the target. Given that, as already established, the dominant discourse of psychiatry is intuitively endorsed as a reflection of communitarian mores and insofar as communitarianism as a societal organization paradigm has been growing in popularity, appeal to the dominant discourse for exclusion purposes is gaining ground in terms of legitimacy. Acting out of moral sense in the context of an ideal principle of practical reason of goodness is phenomenally unattainable, yet noumenally intuititevely accessible (as established by Kant in his 2nd Critique). Even Kant himself stressed, merely echoing public mores, that no one can verify to

[79]

what extent an actions motives rest with disinterested judgments in so far as the decision making process on an individual level is not accessible. Hence, a more realistic way of making sense of judgments about others is by applying pragmatic criteria. In the context of group interests and collective decision making and especially in the context of hidden from view informal referenda judgments are made for securing group interests. Thus, goodness is equivalent to interests. The more widely and openly an individual is exposed to the public, the more its social representation becomes a concern of public interests. As previously noted, public or folk myths have always helped in enforcing communal bonds, while from Girards christological perspective47, to become branded as challenger to public interests by default paves the way for sacrifice. Especially in the face of a new communitarian ethos, speaking against this ethos as violating basic constitutional rights be default places one in a targeting spot. Thus, a person is secluded as potentially threatening to public security. Thus, membership to the new communitarian ethos and the psychic community formed among members thereupon is potentially complicit to violations of the criminal law and human rights, by virtue of willingly entering a relationship of agreement with peers, part of which is conferring specific judgments about targets who have been cast out as threatening to the interests of group members. In sum, it is by virtue of the existence of the mechanism, as Roxin argues, that members become complicit. Now, such forms of agreement will be counteracted by a target, unless he is a masochist, who will seek to expose the decision making practices on behalf of the community members. The more powerful the members that target specific individuals or the more powerful their affiliates, the more widely they will seek to spread the social representations [see chapter 3] that were created of the target with view to legitimating their decisions. Now, this is the tricky part, insofar as a member, for example, from a weakly linked social network to the one(s) to which the initial members that demanded the mythopoetic opening up of the social representations created of a target , does not necessarily possess knowledge of the precedents that conditioned the mythopoetic opening up of a target. Thus, given that the information that has been diffused about the target not only is not reflective of him and his actions, but has been intentionally falsified [refer to the socalled discrediting campaigns] in order to condition other members perceptions of him in a specfic manner, implying acting upon ones will in agreeing about the specifics of a phenomenon, we may
47

The basic tenets of Girards Christological perspective may be summarized as follows: In mimetic theory Christ is seen as the remedy for the problem of violence. The spectacle of sacrifice acts projectively as a simulacrum of relief from violent instincts upon which societal pacification rests. THE PROPHETS MESSAGE CONDEMNING VIOLENCE AGAINST VICTIMS LEADS TO VIOLENCE AGAINST THOSE WHO REVEAL THE VIOLENCE. THE PROPHET WHO BRINGS THE VICTIMAGE MECHANISM TO LIGHT ALSO TENDS TO BECOME THE VICTIM OF PEOPLE ..THE SERVANTS INNOCENT SUFFERING BECOMES A GUIDELINE FOR THE PEOPLE. THE SUFFERING SERVANT REMINDS ONE OF THE GREEK PHARMAKOS, FUNCTIONING BOTH AS A POISON AND A REMEDY AGAINST THE PEOPLE . - ACT OF VICTIMIZING AND THEN DEIFYING THE VICTIM IS REVEALED AS UNJUSTIFIED MURDER. AS LONG AS THE VICTIM COMES ACROSS AS INNOCENT , TH ACT OF HIDING THE MISDEED BY DEIFICATION DOES NOT SUCCEED. THUS, SACRIFICE HAS FROM A CHRISTOLOGICAL POINT OF VIEW BEEN REVERSED. DEIFICATION IS SEEN AS A DISGUISED MURDER. JESUS WAS SACRIFICED BECAUSE HIS ATTEMPTS TO REPRESENT THE KINGDOM OF GOD MEANT REVEALING VIOLENT SACRIFICIAL SYSTEMS. THESE SACRIFICIAL SYSTEMS CAN BE LOCATED AS THE SACRED FOUNDATION OF CULTURE BY ATTEMPTING TO REPLACE A SACRIFICIAL SYSTEM WITH NON VIOLENCE AND UNDIFFERENTIATED LOVE CHRIST BECAME A DANGER TO THE UPHOLDING OF THE JEWISH SOCIETY. THE PARADOX, HOWEVER, IS THAT WITHIN A NON SACRIFICIAL SOCIETY VIOLENCE RISKS BECOMING WORSE THAN EVER BEFORE Mimetic theory seems to indicate that without a christological approach scapegoating would probably have been seen as something good, keeping a society together by offering one victim in exchange for the benefit of the whole community.

[80]

infer that the lack of symmetric information diffusion waives the existence of a community of rational agents and by implication what is dogmatically formulated as public security is equivalent to a community of irrational agents, driven bv pragmatic requirements.In fact, as attestsed by Lynne Rudder Baker in her book The Metaphysics of Everyday Life (Cambridge University Press 2007), the ascription of properties to an individual is highly dependent on background assumptions, thus a matter of informal logic and arguing in favor of (hence a logical fallacy) and not a matter of rational fact/truth finding, which contravenes the very foundations of legal decision making process. The implications for the evidentiary rationale are immense given that what must be granted as a confirmation to the above is the subjective dimension of the existence of such psychic complicity based on members confessions. However, given the previously established fact that social networking on a microsocial level has spread virally and silently (few people speak oopenly of the microsocial agenda of agenda 21, yet everyone participates in it) members are bound by an oath of silence not to disclose the indoctrination tactics whereby they became members of the new communitarian ethos, in the same vein as secrecy is demanded of members of freemasonry. Alas, actions speak for themselves and the very temporal horizon within which targeting activities have occurred in conjunction with converging accounts from allover the world, also coupled with the programmatic declarations in the relevant Agenda 21 documents favoring social networking and redistribution of resources and with the ethnomethodologically valid method of participant observation of members actions, I can safely speak of a perpetrating mechanism with alternating perpetrators in the context of open system dynamics favoring the establishment of a communitarian ethos which co-evolves alongside shifting power and conflict dynamics of fluidly conceived of social formatiosn. This is the key area for marking the distinction between this communitarian ethos and the ideologically loaded regimes where Roxin;s theory has been applied so far, which consists in the seemingly open character of the new ethos as against the closed system dynamics present in closed totalitarian regimes, which favored vertical organizational structures and decision making and a clear system of top-down command [as illustrated in Chapter 4]. The new ethos, in tandem with the available literature on the new world order, consists of horizontal networks with no clear and distinct power and command structures and no uniform ideology underpinning the legitimacy of decisions and actions, which has paved the way for the emergence of all sorts of conspiracy theories, which do constitute valid proxies for describing the seemingly fluid social reengineering project that has been taking place over the past years (eg the Acquarian conspiracy theory48). However,the very fact that no traceable indirect perpetrators who maintain a relationship of control over discreet acts of direct perpetration in a clear chain of command may be found does not imply that the violations that are allegedly committed do not exist (as lucidly described in tousands of individual targeting accounts and the emergence of a plethora of specialized activist groups and informal communities, while the commonality of the features reported in the accounts confirm beyond any reasonable doubt the existence of the new communitarian ethos). By the same token, the European Court of Human Rights acknowledges compensation for torture victims, even where the perpetrators cannot be tracked down, which implies the acceptability and credibility of ad humanitatem arguments. Given that agenda 21 has attained almost 100% coverage in terms of populations indoctrination, chances are that the vast majority of psychiatrists are bound by an oath of silence not to reveal their membership which otherwise would raise suspicions about their objectivity in making dagnostic claims, in the same vein as judges have been , at least formally, excluded from participating in freemasonry in Italy49 against the background of precedents that suggest that

secret organizations membership is BY NECESSITY conducive to


48

The Aquarian Conspiracy is, in effect, a SPIN of SPINs, a network of many networks aimed at social transformation. The Aquarian Conspiracy is indeed loose, segmented, evolutionary, redundant. Its center is everywhere. Although many social movements and mutual-help groups are represented in its alliances, its life does not hinge on any of them. Ferguson, Marilyn. The Aquarian Conspiracy. Los Angeles, CA: J.P. Tarcher, Inc., 1980, p. 217 49 According to the directive, judges' membership of associations imposing a particularly strong hierarchical and mutual bond through the establishment, by solemn oaths, of bonds such as those required by Masonic lodges raises delicate problems as regards observance of the values enshrined in the Italian Constitution. (CASE OF MAESTRI v. ITALY (Application no. 39748/98))

[81]

conspiratorial acts against the interests of the public and against individual rights embedded in the Human Rights Statute. But the secrecy whereby agenda 21
has spread and the population coverage it has attained, in relationship to the rest proofs that were laid out in chapter 1, are suggestive of the existence of a secret society within society or of societal members entering by oath of secrecy in relationships of alliance with others against the background of various motives (rational and irrational). Therefore, membership of institutionally professional members, such as psychiatrists, may be gauged by the very manner in which they insist about the ascription of disorders based on non members accounts, even when these diagnoses are merely developed by arguing in favor of background assumptions generated by interest groups and circulated to ever widening spheres of public interest, which public interest has been found to be tautologous to irrational agents interests [cf Chapter 3]. This psychic complicity of institutional agents not only affirms the Roxinian thesis on criminal activities carried out in the context of organized instutional networks, but the very manner in which agreement is manufactured on the validity of diagnoses through channeling the fact finding procedure through rhetorical questions, by intentionally omitting to record aspects of the narratives, by the lack of a method of factoring in the narrative generation procedure that the individual is in a state of ecosystemic instability and conditions of incarceration (cf paper on the social manufacture of psychopathy) and given that the pyschiatric episteme as previously established is a rendition of public mores we may infer validly that psychiatry as an institutional practice is an accomplice to the slow kill phenomenon. This argument is further amplified by the clearly mandatorily stated in the programmatic declarations pertaining to the microscocial engineering aspect of the agenda 21 sustainable development project that in case a member does not fit the profile of a social grouping it is advised to spread it in the wider society, which simply welcomes mobbing and falls prey to the asymmetrical information diffusion fallacy as above noted and moreover it constitutes a clear violation of the right to privacy and the right to freedom of action. Furthemore, it displays the cryptototalitarian outlook of agenda 21, given that it promotes the segregation or ghetto-ization of social agents by forcing them to compulsory cobelonging in social networks with unidentified boundaries and with unclear intentions and motives on behalf of fellow-members, especially given that it has already been established that an ideal community of rational and disinterested agents is unattainable [see chapter 3]. In my case and in my profession the ability to synthesize and act on information compiled from multivariate sources constitutes a core competence and I have demonstrable experience and positive references on my ability to add value to business issues. The very fact that the exclusionary methods that have been employed at the expense of my career and my personal life over the past four years in Greek territory, encompassing the entire spectrum of targeting activities and a complicitly and silently acting closed doors phenomenon on behalf of companies, and in marked distinction to my course of life up until that point in time, which is assumed as the beginning of the premidadted murder attempt, and involves perpetrators from all walks of life and from both private/public sectors constitute proof beyond all reasonable doubt that (i) the political and social reengineering program of agenda 21 has functioned at my expense (ii) that agenda 21 is the key
It held, firstly, that the application of Article 18 of the Constitution was limited by the constitutional principles of the impartiality and independence of the judiciary, principles which should be taken to prevail over the right to freedom of association 20. Law no. 17 of 25 January 1982 contains provisions on the implementation of Article 18 of the Constitution (right of association) in respect of secret associations and on the dissolution of the P2 lodge. Section 2 provides that membership of a secret association is a criminal offence. The question is whether, in the case under consideration, the conduct found to be incompatible with that prohibition (membership of a Masonic lodge) in the light of the disciplinary body's factual findings was behaviour which it was reasonably possible would be considered as falling within the scope of the prohibited conduct. (b) Incompatibility between the Masonic and judicial oaths, the hierarchical relationship between Freemasons, the rejection of State justice in favour of Masonic justice and the indissoluble nature of the bond between Freemasons, even in the case of a member who wished to leave the organisation (ibid.).

[82]

perpetrating mechanism, as proven by the involvement of local authorities charged in the agenda 21 documents with enforcing the communitarian ethos, as well as by the involvement of private organizations, such as couriers and female organizations in targeting activities (iii) that by agendas 21 acting as an enabler of diffusing a social agent to the wider socius at the pretext of finding a social network that better matches his needs, aspirations or whatever other abstract and intuitively sensed terms may be used it has promoted at my expense the employment of targeting activities, such as mobbing, gangstalking, gas lighting, violations of property, electromagnetic harassment (iv) it is responsible for the devastating effect on my hard earned career insofar as the social networking imperative has allowed for my construction as a free-floating signifier or a set of social representations circulating in the socius and animating it on the inverse (v) agenda 21 is responsible for my reduction to christological status and as a dystopian sacrificial emblem granting communitarian members their identities by applying a symbolic- yet with clear tactile repercussions on my behalf cannibalistic appropriation of me as social representation whose presumed systemic function as transgressor of a natural language or a form of life merits being sacrificed Further to the above that are backed up with clear and distinct evidence and to the preceding analysis and justification of how targeted individuals are reduced to free floating signifiers circulating as social representations among members of the nouceau communitarian ethos, therefore acting as totemic glueand sacrificial emblems in a political community , the political role of psychiatry is affirmed, hence the process of involuntary commitment is deemed to be an act of political intention and with political significance for a new communitarian republic the identity of which the sacrificial victim has served symbolically and projectively through an arche-signifier of otherness. 2.11 Reasons for targeting the case for multilayered motives [cf. chapters 3 and 4] How are targets chosen? Targets can be chosen because of many reasons. They can be chosen for political views. They can be chosen for whistleblowing.They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy, were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch50 and their names were handed over. These people also want to make the targets of this harassment vulnerable, they want to make
50

IT IS CRUCIAL TO NOTE THAT IN CASES WHERE INDIRECT FISHING FOR INFORMATION POTENTIALLY VALIDATING AND/OR FABRICATING SECRET SERVICES CYCLE OF INFORMATION HYPOTHESES ON BEHALF OF EITHER SECRET SERVICES EMPLOYEES OR CIVILIAN SNITCHES PRESENTS SIGNIFICANT CONSTITUTIONAL AND LEGAL ISSUES, IN FORMAL TERMS AND ISSUES OF ESSENTIAL SOCIAL INTERACTION, SUCH AS THE TRUTHFULNESS OF STATED INTENTIONS ON BEHALF OF A SNITCH WHEN ENGAGING IN A DISCURSIVE RELATIONSHIP WITH THE TARGET, THE PROVEN POSSIBILITY NOT ONLY FOR STEERING THE DISCUSSION IN A RHETORICAL FASHION AS AFFRIRMATIVE OF BACKGROUND ASSUMPTIONS AND INTENTIONS, BUT TO CONDITION ANSWERS AND MOREOVER TO SELECTIVELY ISOLATE PARTS IN A SEEMINGLY INNOCENT NATURAL LANGUAGE TURN-TAKING PROCEDURE. THIS PROBLEMATIC NOT ONLY IS FURTHER AGGRAVATED BY THE DISPOSITIONAL OMNIPRESENCE OF DOLUS INDIRECTUS GROUNDING A PRIORI AND UNCONDITIONALLY THE RELATIONSHIP BETWEEN SNITCHES AND TARGETS, BUT IS RATHER CONFIRMATORY OF THE VERY DISPOSITIONAL INTENTIONALITY ON BEHALF OF SNITCHES WHO FORM THE EVERYDAY INTERSUBJECTIVE COMMUNICATIVE TRAJECTORY OF THE TARGET. REGARDING THE FORMAL LEGALS ISSUES, SEE THE ARTICLE , , , 2, 2003 [POLICE INTRUSION- CONSTITUTIONAL AND LEGAL ISSUES IN A LEGITIMATED INVESTIGATORY PROCEDURE, POINIKOLOGOS, ISSUE 2, 2003. Now, link this to how secret services legitimately act under such conditions through exemptory from criminal law statutes national security acts by seizing PCs, emplying electromagnetic harassment, sociocybernetically conditioning targets into self referential loops [see Rauni Kildes seminal paper] and cross refer to the fact that the role of secret services was particularly of central importance in totalitarian regimes (communist East Germany, Nazi Germany etc) and how shifting from closed, ideologically fuelled systems to open systems required even higher intervention through indirect means, whence the necessity (and not merely incidental character) of dolus indirectus

[83]

them destitute, to make the target homeless, jobless, give them a breakdown, Covert surveillance is also used to rob inventors, writers etc who have been rejected or "excluded". The published, in fact, often feed off the unpublished, especially through editors "sympathetic" with "establishment" organisations and "business" interests. 2.12 Who participates in targeting activities? the case for a multiparticipant, multiact crime with composite multiple causality People from all walks of life are being recruited to be the eyes and ears of this maliciously operating state of affairs. People from all races, ages, genders. Every sector of society one may think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers,the wealthy, bikers, drug dealers, drug users, street people,punks, hip hop culture, activists, church groups,youth groups. Your best friend, lawyer, policeman, doctor,emergency services, neighbour, military forces, family, social services, politician, judge, dentist, tradesman, vet, supermarket,council, postman, religious leader, care worker, etc. 1. Some do it for the sense of power yielded from participation (especially applicable in cases of disempowered and less privileged social actors, coming back to the change agents profile of agenda 21) 2. Others do this as a way to make friends and keep friends. Its something social and fun for them to do. 3. Others are forced or black mailed by the [supra]state or the police into taking part. 4. They are told that they are part of homeland or national security and being used to help keep an eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state. 5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. eg. some may be given the choice of Spying for the State or the police vs going to jail. 6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life. 7. Many are however just average citizens who have been recruited by the state, in the same way citizens were recruited in former totalitarian regimes 2.13 How do direct perpetrators communicate and how is communication facilitated by satellite audiovisual surveillance? C.Roxins functional platform as animus auctoris (cf chapter 4) Thanks to audiovisual surveillance, they attain perfect synchronicity with the targets movements during routine activities (from the point he walks out of his door , while driving, in places he frequents etc). Communication is carried out in a number of ways. When on the street or in cars patrolling, they use Stasi like signals.These include things like tapping the side of the nose, corner of the eye, brushing back the hair , etc. If in the future, an innocent citizen drinks a coke in front of the target they will be triggered again, and may consider the act sinister,even though there is no intent to make the victim of torture relive their experience. In the same way an empirical observation during scientific research gains epistemic currency, once validated due to the frequency of occurrence under certain observational conditions, the stalking tactics may be reduced to research hypotheses. For example, if conversations playing back one's personal life events occur at regular intervals (or even on a daily basis), then this may be cited as a more than plausible validation for the stalking haypothesis. How often would you expect a coincidence between the contents of non significant others' discourse and your personal life events during a normal course of daily life? 51
51

Even better, start with such a commonly agreed upon principle in the form of a rhetorical question. The rhetorical question will function as the starting point for unweaving the rationale and the corroborating phenomena, by using inductive and abductive logic (mainly the latter). Once having proven the validity of the abductively generated hypotheses, employ them as deductive principles for interpreting all correlated

[84]

2.14 What is the organizational structure between direct and indirect perpetrators and how recordings of incidents on behalf of institutional agents act in complicity to the incidents? Evidently, both in the relevant literature and in my case, there is a clear oganizational structure and division of labor among direct and indirect perpetrators. In the context of a perpetrating teams group dynamics there are watchers, direct harassers and senior controllers supervising the deployment of the incident and intervening if necessary (cf July Athens incident involving a group of young mobsters in chapter 4). In the apologetic discourse of a group harassment incidence, the causal chain will be inversed pointing to the target as the perpetrator. The selective and highly directed recording of direct perpetration incidents on behalf of institutional agents are indicative of ongoing attempts at legitimating the univocal rhetoric of the multiact, multiparticipant system, even when this latent intention based on precedents is explicitly mentioned to the institutional agent(s) and warning is given not to indulge in this cover up operation. Actual direct perpetrator involved in targeting activities speaks out regarding the organizational structure of multiparticipant targeting teams

To: eleanor@shoestringradio.net

Subject: inside info on 'gang stalking' Date sent: Tue, 06 Dec 2005 19:22:13 +1100 Hello Eleanor, I have been a "vigilante" (as you call it) for over five years. I would like to take the time to tell you about the gang stalking situation in Xxxxx, Xxxxxx. I first began involved in gang stalking when I worked with animals at Xxxxx's Zoo. I had a string of jobs involving animals at various places, and the referral process was very selective (the first sign of a gang-stalking controlled operation). Basically, even though I was sure that there were a lot of jobs available for somebody with animalrelated expertise, each employer preferred to personally refer me to another employer that they were connected with, rather than just give me a letter and let me find the job
phenomena, including the heavily documented on a global scale harassment literature. Also include in the argumentation the fact that terms such as delusional paranoia etc are systemically sanctioned apologetics for systemically sanctioned violence. In addition, by arguing for the non validity of a discipline (eg psych) through the falsification of some of its key deductive, explanatory premises, a major epistemological blow is fraught on the edifice (back this up with former Apa VP's reasons for quitting- the pharmaceuticals/psych complex , the CCHR literature on the non scientific status of psyhiatry, the damage incurred on the majority of patients who underwent treatment, and all the related arguments. Very important not to forget to mention the sociological, psychological , social psychological, psychoanalytic accounts of the effects reported by harassed individuals, which, far from alluding to delusional paranoia, attribute these effects to all sorts of environmentally and structurally generated factors, such as power plays (esp in the case of a work environment), negative family environment (eg the offspring as petit objet a for the , or fetishistic rendition of the lack of symbolic power: the fact that I functioned as petit objet a for my is attested by the way overwhelming exposure of negative affection , evidenced not as caring for, but as corroborating her omnipotence over me , or her sole spring of power, while being excluded from other social roles; this is a pathological condition, which is the one that should be treated.

[85]

myself. The one time I tried to find my own job, every animal-related employer (I mean everybody, every single animal shelter, national park, zoo, etc.) immediately said that they weren't interested in hiring anybody new when they saw my name on the letter. So I went through a daisy chain of employers, zoos, national parks, vets, and similar employers. Anyway, while I was working with animals I noticed a range of strange happenings. I wasn't actually a victim/TI or a "perp" at this point, but I saw it happening around me, or at least noticed the fact that the employers I worked for seemed to have set aside a certain amount of rescources to gang stalking. When I worked in the zoo, I noticed that several zookeepers would habitually let gorillas loose "by accident" whenever certain people passed by, and then crowd around them, make a fuss, apologize, and goad the animals back into their cages. One of the animal shelters I worked for was concerned with unscrupulously training animals. Dogs (especially dobermans and rottweilers) were trained to bark ferociously, with the loudest and scareist dogs rewarded with biscuits. These dogs were then (as I later learnt) chained, with a long chain, of course, outside certain houses in the suburbs, always when "targets" went outside to take walks. Even more bizarre was the training given to some of the zoo animals. Trainers would be sent in and the zoo keepers would be dismissed on certain nights. The animals would then be trained to leer at selected people. A photograph was usually used to train them, and at other times, film footage was used. All of the photographs were expertly taken, often when the target was sleeping. One woman's photograph was taken while she was under general anesthetic at her dentist. Her eyes were held open, so the animals could be familiar with her, and a high resolution photo was taken, in addition to samples of armpit sweat and hair. Xxxxxs (a bird in Xxxxx which often attacks people when defending its nests) were also trained, and placed in trees for animal "street theatre". Because xxxxxxs are hardly lethal, but can cause minor injury, they prove annoying enough to use. When working at the vet, I sometimes noticed that tracking devices were inserted in some pets, which could then be tracked and mutilated. The absence of a "pet coroner" means that a dog can be dragged from its home at the dead of night, tied down with a brick, run over by a car, and have the bricks and restraints removed without any investigation that would

[86]

reveal foul play. All sorts of unscrupulous activities happened here. Poisons were tested on some animals, some of them slow-acting, and a healthy dog would be taken to a check-up, a "diagnosis" fabricated to explain its decline in health after its visit, while poisons were administered to it. During some operations, heart worms were inserted in the pets of TIs. I was eventually offered a place in the syndicate. The syndicate was presented to me as a kind of fraternity, a masonic-like mutual profit organization with strong policelike overtones. I was told that I was helping to build a better society. However, I have never been given any of the advancement opportunities I was promised. The "advancement system" of the syndicate is a slippery slope. They make you give up your security priveliges, so eventually all of your communications are watched (which is why I composed this email offline where they can't see me, and sent it via an internet cafe) and you have to attend meeting after meeting of mind-numbing pledges and chants. The premise is that if you sign contracts giving up personal liberties for the group, and you are genuinely innocent, then you will be promoted. I have only been promoted once, to the rank of manager, and I don't feel as if it is a rewarding experience. Worse, you are never allowed to leave because they think you will give away secrets. Leaving is only permissible with a special contract that permits the syndicate to destroy your credibility (usually they make sure that the most attention any secrets that you reveal get is from crackpot UFO magazines, or diagnose you with schizophrenia). There are other problems. If you have children, you have to send them to education in syndicate owned schools. If you have a wife, you have to report on her, allow her to be spied upon, and be prepared to target her if they decide to turn her into a TI. The official "compensation" policy is that you will get to keep the children if she lodges a divorce. However, you won't get to keep most of her material goods. They only want her to lose in the divorce proceedings so she gets nothing, not so the husband gets anything, so the syndicate takes it back as a tithe. I suppose I should introduce the syndicate in a little more detail. I'm still not sure precisely what it is trying to do. To everyday citizens, it presents itself as a group trying to monitor terrorists (or any other kind of flavourof-the-month undesirables like gays/communists/witches) and drive them out. To other people, its a rotary club/chamber of commerce type operation. To others still, the most

[87]

twisted conspiratorial minds, it is an organization that pulls the strings behind everything. To the puritan, it is a cleansing force. To the deviant, it is a gang of other deviants where everything is permissible. It's the syndicate to everyone, though. I don't know the extent of what it owns. I do, however, know a great deal about the targeting process. When we get targets, we divide them into four categories: mercenary, practice, planning, and enemy. Mercenary targets are bought by outside parties. We advertise under a range of guises, from ads by "individuals" claiming to be able to kidnap people, to practical jokers. Some groups, like big corporations and some governments (the government of Xxxxxx pays us to keep some people busy, so do the Xxxxxxs when they have too many people protesting whaling) know fully well what sort of services we do, so we don't really hide them. We get a lot of money from them, but we can still muster up a fair bit if worst comes to worst. I'm not sure so much about the NWO theory. Maybe the Xxxxxxx count, but you'd be surprised at how much money we can get from crime. I don't mean that we go out robbing people, but we can outsource money from biker gangs/skinheads/drug dealers pretty easily. Our syndicate gets a lot of support from people in rough areas like Xxxxxx and Xxxx's Xxxx. Because there are areas with a lot of people in genuine need, who would leap at the thought of fighting back at the criminals, we can always find allies to pressure the criminal portions of society. Of course, they are only pressuring them into giving us money, but it's a pretty cozy arrangement. The second type of target is the practice target. We use them to train mobs. The targets don't actually change, because we don't want TOO many people fighting back at us. But we do rotate trainees between practice targets. This stops the person seeing the same people every time there's a street show. Then there are planning targets. These are selected by the syndicate for some reason or rather but aren't paid for by mercenaries. You can usually tell the difference between planning and practice targets because they send people with experience after them. They're still chosen by the same people though. The practice ones are of course chosen for their timidity. I don't know how the planning ones are chosen. Enemy targets are people that decide they've had enough and turn against us. Since they protest and try to foil our plans (which, considering that our jobs are already nervy,

[88]

is a real pain in the arse), we try to really give them hell. The best way, of course, is through the psychs. My supervisor used to say that the Soviets had it right with Sluggishly Progressing Schizophrenia. Some people up-top are proposing that we just kill them and have them declared Natural Causes or Accidental by the coroner. It isn't likely to happen, though. Anyway, I should introduce the main branches of the syndicate. Each branch recruits its own (everybody is a member of one of the branches) instead of people just joining a common pool. This keeps the work separate and stops people from finding stuff out that they shouldn't. My branch is the Scripting, Observation, and Execution Bureau (or "The Theatre" as it is popularly known). By execution, I mean the execution of orders, not the other kind. We do the work that the majority of people with any knowledge of gang stalking will be familiar with: pestering and scripting minor incidents. The Theatre is actually divided into two sub-branches: Scripting Orchestration Officers (or "playwrights" as they call themselves) and Field Officers (or "thespians" as we call ourselves). We have the most variety in our recruits. Popular sources are the police, the fire department, the zoo, and technicians of any kind. But we recruit from all places. Most members are neighborhood watch types (not official Neighborhood Watch, but "concerned people"). Ironically, we make sure that we do a lot of good, just to get some credibility. Then there is the Bureau of Authority ("The Moneybags"). They don't actually control the syndicate, but they have all the right jobs and connections. So, a judge might have control over the judicial process, but he will answer to a superior in the syndicate. Psychiatrists belong here too. The Moneybags are so-called because they raise a lot of the money. It would be suspicious if big corporations funded groups like this, but they can invest money into frontgroups. And the majority of the syndicate's work is done through completely legitimate fronts. We can tap phone lines and access people's records from behind government agencies. Usually, these are the guys that go after Enemy Targets. Normally, harrassment is organized under several "action policies". If a target isn't an enemy, a standard policy is enforced. Low level organizers (the aforementioned "playwrights") play around with the target for a while and

[89]

rotate crews. When a target is an "enemy", the policy doesn't immediately change, but orders filter down from high-level organizers (usually the Supreme Council) which direct 'Thespians' to provoke the target or a similar action, and Moneybags to crack down on them once they get in the way of the system. This is called Mincing, because the thespians lure the "meat" (by making it complain or fight back) into the "mincer". The Bureau also protects members of the syndicate. Normally, in a court case/psych examination or similar situation where a syndicate member is at the mercy of a moneybag, a special order arrives from above telling the moneybag to take it easy on the guy and let him off scott free. The order is always printed in blue, on fancy cherry-blossom paper, but in a very official border/font. "Cherrying" is the name for this secret process. The Bureau of Authority has a very organized system of lawyers, judges, medical officers, etc. Whenever you're committing a crime for the good of the syndicate, you must always report your location. Then they send Cousin Nancy (this is an affectionate term for the police in the employment of the syndicate that they send to arrest you instead of nonsyndicate cops, so you can go straight through the appropriate channels without anything suspicious being seen) to tail you and "arrest" you the moment somebody calls 911. They all follow a minimalist strategy though. For example, the mayor of Xxxxx isn't a member of the syndicate. But several of his advisors and aides are. This way we can get laws passed in a discreet manner, and if a high-profile figure is targeted, our hold on an organization doesn't loosen. We try to arrange elections of mayors that aren't too headstrong. Though the governement is mainly used as a minor nuisance. We prefer the courts for most activities. The Bureau of Technology (Field), BoT(F) is the group in charge of the electrical equipment. They work alongside us thespians and "gaffer" the targets by giving them the usual fatigue/headaches/medical problems. They can also destroy equipment, screw up televisions, the works. I think they are particuarly sadistic. Different crews use different Techs, but they're all unpleasant. The incapacitators come in a lot of different forms. There are ones that come as a lightbulb that slowly gives people eye-strain and makes them tired. You can fit

[90]

some in computer/TV monitors and the glare irritates people. I've heard they're even building fridge magnets with electronic devices in them. That isn't the extent of the BoT(F)'s machinery. They manufacture pills that can cause deformities in the womb, as well as miscarriage and give them to women in their food. They can fake HIV/AIDS so the test shows up positive the first time, but subsequent tests show that it was a false positive. This faux-HIV can be put in the target's food. They usually give the target a few health scares, but they don't like to physically hurt anyone. One Field Tech I knew had a penchant for giving people Syphillis. They could treat it easily enough with pennicillin (and the syndicate always made sure that it would be diagnosed on time), but it showed up on the targets' permanent records for medical treatment. They also conduct extensive testing without the target's knowledge. One TI we were monitoring was found to have a malignant tumor in his head (not our doing). He wasn't experiencing any of the symptoms, so we gave him some through the incapacitators and had a few of his friends warn him about cancer. He had a test done, and just for fun, we had the doctor tell him how dangerous it could be and how he could die soon. We gave him a six month waiting period and told him that by then the tumor could progress so far that it could never be removed. That's a lie, of course. Our BoT(F) had it out in a jiffy by sending one of their brain surgeons to do the job, but it's the fear that counts. The Bureau of Technology (Communications) monitors the target's phone calls, emails, and absolutely everything else. They tend to recruit from the national archives, census takers office, records office, credit card companies, medicare, insurance, etc. They are the logistics branch. As I said, most of the syndicate's work is done from within legitimate areas. What the BoT(C) does (very often) is send a "receptionist applicant" over to a credit card company or government agency pretending she knows nothing about hacking computers or accessing records. We pull a few strings and she's in. She then steals information while nobody is looking. A few old-timers like to have 100% control over the "records farm" but most prefer the minimalist approach. This is the bureau that gives out information and orders to everybody else, and also acts as a communications post for the whole

[91]

syndicate. The Supreme Council delivers orders through them. Outside orders are also taken in through the BoT(C), which advertises as a mercenary group through certain channels. The Bureau of Alliances, or "trading partners" handles our allies. As far as I know, the syndicate is Xxxxxxan only. The only other gang stalking group in this country is a West Xxxxxxxxan organization called the confederacy. Very often they try to move into the xxxxx xxxxx so we have to hold them back, diplomatically or otherwise. However, we have contracts with Xxxxxxan groups whereby we handle their targets when they move into Xxxxxx. The same with the Xxxxan groups and the confederacy. The other groups pay for their targets to be "handled" while they travel here. We make millions of dollars this way. Finally, the Supreme Council controls the entire operation. I have no idea who they are, except that they have a fancy name instead of being a Bureau. They do not recruit their own men. They promote from the other departments. Most of them seem to be wealthy individuals with inheritances that manage to maintain their fortunes from investments. Not one is a CEO, Judge, or Politician. They are all just old money family types that live in the Xxxxxx Xxxxx and seem unusually lucky with their money (no doubt through insider trading). Despite this, they have a lot of spiffy technology. They have a kind of reverse incapacitator that improves their health and increases their performance. Most of them look incredibly young for their age. We don't see them much, though. Often, an audience with one of them is a kind of reward for good service. There are also ranks in our syndicate. The lowest members are pawns. They're not technically members, because there's no permanent service contract and they don't know they're working for us. They take orders from us but they're not expected to attend meetings. We call our pawns "concerned citizens", the Authority bureau has "office boys" or "secretaries", the BoT(F) has "lab rats" (who very often are paid volunteers for experiments, or people who don't know what they're testing), the BoT(C) has "spelunkers", the BoA has "travel agents". Unfortunately, we're not obligated to give protection to any of these people. So, we can give a vet an order to put down a dog, without telling him that it isn't consented to

[92]

by the owner, and he will do the job and get sued without us giving him legal protection. A lot of our street theater is done by people that don't even know they're part of a syndicate. They think they're a grass roots movement and don't know that there are other people harrassing the target. The BoT(C) recruits people that think they're joining l33t hacker groups on the internet, or people that think that they're just following orders from the archives. The BoT(F) does 80% of its research at legitimate agencies like Xxxxxx's XXXXX and its drug companies. The task of pawns is to think that what they're doing is either normal and routine, or criminal in an individual isolated manner. Recruits, however, are aware of a conspiracy. However, they still remain at a misinformed level. We simultaneously maintain teams of "religious" actors and "punk" actors. A person might join us thinking he's going to clean up the community. Another person might join us thinking he's going to cause trouble and anarchy. And they can go about their merry ways. We even deliver information to them in different ways. To the religious ones, it's wrapped up in prophecy and revelation. To the punks, it's given a communist candy coating. However, they're all aware that the group is large. They're also aware of a mutual benefit aspect to the operation. Only greedy un-idealistic people get beyond the recruit rank. All the Bureaus wrap themselves up in different colours. The Moneybags pretend to be a secret club for the elite (and many of them are indeed quite powerful and wealthy, second only to the Supreme Council). The BoT(F) claims to be a "humane" research agency, or a means by which scientists can resist corporate greed, though it still attracts deviants. The BoT(C) is conspiratorially minded, and pretends to be a group searching for the 'secrets of the illuminati' or the illuminati themselves. The BoA claims to be a contract agency, traveller's club, or accounting firm. Recruits perform tasks that they know are illegal, or immoral, but they still generally believe that they're doing it for a reason. Managers like me come above the recruits and do some actual organization, whether leading a crew to a street theater match or planning an attack. Generally,

[93]

managers know everything about the syndicate except what its goal is. Most are greedy enough to accept that it isn't a morally motivated group. We also engage in communication with other Bureaus to co-ordinate our activites. Different terms are used for different MOs. The Theater has "Playwrights" and "Leading Roles". The moneybags have "Success Stories". The BoT(F) has "Research Directors". The BoT(C) has "Information Awareness Officers". The BoA has "Arrangers". Finally, a rare few are promoted to the Supreme Council. GLOSSARY OF TERMS (both coloquial and official): Contract: A TI or Target. This is the official term. Used as "Enemy Contract" or "Planning Contract". Enemy contract is often referred to as "hostile contract". CHERRYING: Getting out of a legal tangle through the syndicate's intervention. NIPPLE-KISSER: a 'deviant' recruit, recruited because of a desire for sadism. HOLY POLY: a 'religious' puritan recruit. THE EFFECT: the fact that greedy and sadistic recruits are selected for managing jobs more readily than anybody with integrity. FBG (fertile breeding ground): a crew of nipple-kissers, based on the idea that they are a fertile breeding ground for future managers. MINCING: Luring a target into the legal system. DEFACING: making faces at a contract, or otherwise intimidating them. XXXXXX XXXXX SYNDROME: having a target so socially unpredictable and badly-off that you can't really think of many ways to make their life much worse. RAINBOW SHOCK: the fact that you have to act nice to the rest of the public immediately after you've stopped defacing a contract. BREAK-A-LEG JOB: a particuarly hostile attack against a

[94]

contract, or a plan which involves appoaching the target and talking to them. SAKURAKAI: a crew that is particuarly overt in its stalking and gets caught too often. In other words, it has to be cherried all the time. CREW: A unit of recruits and pawns under a single MO. In other words, a group of gang stalkers. ZAPPERATING: using electronic devices to affect the health of a target. XXXXXXX XXXXX: rhyming slang. for big mistake, roughly means "we shouldn't have used this method". UNCHAINED, UNCOVERED: authorities that are not pawns or recruits. COVERED: A member of the public that is under the control of the syndicate (as a pawn). PUBLIC FACE: A recruit or manager's official life outside of the syndicate. PRIVATE LIFE: a syndicate member's activities with the syndicate. INCAPACITATOR: a device that affects the sleeping patterns/ stress/fatigue/headaches of a contract. VOODOO: the means of acting hostile to a target (pointing, staring, etc). LOMOSEXUAL: a syndicate member with a knack for photography. ("There's a lomo in every crew!") NYUNKIA: (Not Your Usual Nipple-Kissing Incapacitator Asshole), the "yu" is pronounced as the "oo" in 'moon'. refers to a particuarly sadistic or deviant BoT(F) member. BONER: another word for an enemy target. YELLOW MEAT: criminals, as opposed to "concerned citizens". refers to criminals recruited into the syndicate. XXXXXXXX (verb): to Xxxxxx somebody is to run them over or chase them with a car. GIGOLO-BOP: to make sexual advances to an unattractive

[95]

target, term mainly used by "nipple kisser" deviants. CANCELLING: causing a miscarriage. CRASH TEST DUMMY: a practice target. HANG-JOB: the experience of having a target that one has enjoyed tormenting suddenly commit suicide. Term used mainly by nipple kissers/nyunkias. COUSIN NANCY: a police unit sent to tail a crew and arrest them before an unchained police unit can do it. XXXXXX NECKTIE: a death threat made with no intention of it being carried out. GENERAL LEEING: randomly chasing after a target and threatning to rape them before immediately running away. XXXX'S LAW: a police department that is thoroughly under the syndicate's control. THE GOOD OLD GANG AT THE OFFICE: the Syndicate. SHALLOW THROAT: see NYUNKIA CLITWEED: see NYUNKIA DEJA VOOOO: doing the same skit over and over again. I hope this glossary is of help. If you have any questions, please reply
2.15 Conclusions In this chapter it was demonstrated how a perpetrating mechanism under the auspices of agenda 21 is legitimated and based on asymmetrical information diffusion about individuals from and to individuals by virtue of their participation in informal social groups how it attains to involve seemingly distantly related to the target social actors through group decision making that culminates in unfavorable outcomes for the target.THIS POINT ALSO CONSTITUTES A KEY APORIA FOR ESTABLISHING THE CONNECTEDNESS AMONG SEEMINGLY DISTANT PERPETRATORS IN THE DOGMATIC LEGAL INTERPRETATION OF PHENOMENA OF MULTIPARTICIPANT PERPETRATION AND INDIRECT PERPETRATION, as stressed by Claus Roxin, in his 2008 article in the Poinikologos Greek legal publication Organizational dominance as a self-sufficient form of indirect perpetration, where he stresses that the fact that the direct perpetrator and the one issuing the command are in principle uknown to each other reduces the commonly agreed upon activity to an illusory perception [ ], while proceeding through an abductive turn to render this very lack of [at least demonstrable or stated as such] lack of prior acquaintance between the two parties in the agreement and the existence of MULTIPLE PARTICIPANTS in this particular scheme of perpetration as A NECESSARY APODEICTIC

[96]

CONDITION FOR GROUNDING INDIRECT PERPETRATION. Complementary to this conditional apodeictic statement and in isomorphic validity to its predicative potential I would like to add that the very SILENT and SECRET formation of these social groups and their members engagement in INDIRECT SPEECH lays bare the very insidious foundations of a yet holistic paradigm on social engineering, or, in legal terms, the INHERENT AND INDISPENSABLE ELEMENT OF DOLUS AS A PSYCHIC PRECONDITION FOR PARTICIPATION, WHICH LED ME TO COIN THE TERM ONTOLOGICAL COMMUNITY52 OF DOLUS INDIRECTUS, as will be further illustrated in chapter 4. At the same time it has been demonstrated how perfect synchronicity with a targets movements and conditioning through dystopian experiential loops is enabled by audiovisual surveillance technology, which is owned and operated by secret services, how distinctive social actor typologies participate in common in activities of direct perpetration, the reasons why this phenomenon does not constitute a clear case of conspiracy, but a multiparticipant53 multiact54 novel and exceptional type of co-perpetration and indirect perpetration, as will be further dicsussed in Chapter 4. In summary, my targeting case (just like similar cases in the relevant literature) constitutes a dystopian phenomenon of sociocybernetics and social constructivism, as an inverse reflection and logically validating on the inverse the utopian vision of agenda 21 for microsocial engineering through compulsory participation in informal social groups.

APPENDIX I Satellite surveillance & mind control and relevant technological patents US CONGRESS, EUROPEAN PARLIAMENT & UK PARLIAMENT - BRIEFINGS ON SECRET GEOPHYSICAL WEAPONS & 'MIND CONTROL' http://www.policestateplanning.com/briefings.htm THE EARTHQUAKE BOMBING OF HAITI

http://english.pravda.ru/science/tech/24-01-2010/11180952

, , , , , Bitzilekis as above quoted 53 In fact THE % OF PARTICIPATION IS A KEY INDICATOR OF SOCIALLY SUSTAINABLE DEVELOPMENT (SSD), BASED ON AGENDA 21s key value indicators 54 . 48 . , , . , , . , . . . , , ( ) , , , . , 48, . 49 , , , , , , , .

[97]

russia_says_US_created_earthqua-0 http://www.presstv.ir/detail.aspx?id=116688&sectionid=351020704
http://www.vive.gob.ve/inf_art.php?id_not=15464&id_s=3 HAITI EARTHQUAKE WAS MASS MURDER USING SECRET EARTHQUAKE WEAPON HAARP

http://www.voltairenet.org/article163626.html
http://www.youtube.com/watch?v=Q9QtZkT8OBQ&feature=related THE PENTAGON'S SECRET SPACE http://globalresearch.ca/articles/WOR406A.html http://www.hartford-hwp.com/archives/27a/239.html WEAPONS PROGRAM,

CAMPAIGN FOR COOPERATION IN SPACE - HAARP IS A SPACE-BASED WEAPON OF MASS-DESTRUCTION http://peaceinspace.blogs.com/peaceinspaceorg/2008/05/coopradioorg-le.html#more GLOBAL RESEARCH HAARP IS A WEAPON OF MASS DESTRUCTION HAARP is fully operational and has the ability of potentially triggering floods, droughts, hurricanes and earthquakes. From a military standpoint, HAARP is a weapon of mass destruction http://www.globalresearch.ca/index.php? context=viewArticle&code=CHO20020104&articleId=205 HAARP AND http://peaceinspace.org/ ITS ROLE IN 9/11/ 2001

THE ULTIMATE WEAPON OF MASS DESTRUCTION:"OWNING THE WEATHER" FOR MILITARY USE http://www.globalresearch.ca/articles/CHO409F.html HAARP: MIND CONTROL, WEATHER MANIPULATION, http://www.wired.com/dangerroom/2009/08/haarp-2/ LONG-DISTANCE SPYING

FROM PRAVDA HAARP WEAPON OF MASS DESTRUCTION CAUSING NATURAL DISASTERS AND CATASTROPHES http://english.pravda.ru/main/2003/01/15/42068.html http://english.pravda.ru/russia/20445-0/ RUSSIAN FOREIGN MINISTER SERGEI LAVROV - "THE THREAT OF NEW WEAPONRY" http://english.pravda.ru/science/tech/84544-0/ SECRET GEOPHYSICAL http://www.rense.com/general28/deathray.htm IS IT WEATHER OR GOVERNMENT http://onlinejournal.org/Commentary/102205Mazza/102205mazza.html WEAPONS TERROR?

VIDEO:- CHINA CONSIDERS WAR AGAINST USA OVER EARTHQUAKE ATTACK http://in.youtube.com/watch?v=0VX0JvpW5q0&feature=related http://tinyurl.com/3g4rd5 VIDEO:HAARP: GEOPHYSICAL WARFARE http://www.youtube.com/watch?v=g9WxpB5ekQQ&NR=1 http://www.youtube.com/watch?v=yGZ7Z2LQ7Xc http://www.youtube.com/watch?v=FU_6f_x4qy8&NR=1 & MIND CONTROL

[98]

http://www.youtube.com/watch?v=g9WxpB5ekQQ&NR=1 http://www.youtube.com/watch?v=L8SGzdEOObo&NR=1 http://www.google.com/search? domains=globalresearch.ca&q=haarp&sa=Google+Search&sitesearch=globalresearch.ca http://in.youtube.com/watch?v=dNrL9o7mh-M USA DEPARTMENT OF DEFENSE NEWS BRIEFING: SECRETARY OF DEFENSE WILLIAM S. COHEN SAYS MILITARY CAN CAUSE EARTHQUAKES!

http://current.com/items/92246163_defense-gov-news-transcript-dod-news-briefingsecretary-of-defense-william-s-cohen-says-military-can-cause-earthquakes.htm
HAARP AND BAE SYSTEMS INFORMATION & ELECTRONIC WARFARE SYSTEMS http://www.rense.com/general70/haarp.htm AMERICA'S "WAR ON TERRORISM" by http://www.globalresearch.ca/globaloutlook/truth911.html MICHEL CHOSSUDOVSKY

9/11 WAS DONE BY THE NWO CRIMINALS USING HAARP The "war on terrorism" is bogus. The 911 narrative as conveyed by the 911 Commission report is fabricated. The Bush administration is involved in acts of cover-up and complicity at the highest levels of government........ http://www.globalresearch.ca/index.php?context=va&aid=7718 http://globalresearch.ca/index.php?context=va&aid=12565 TURNING 9/11 REALITIES UPSIDE DOWN: http://globalresearch.ca/index.php?context=va&aid=15147 THE UNSPOKEN TRUTH

ABOUT SATELLITE AND BRAIN WEAPONS - SURVEILLANCE, ASSAULT, TORTURE AND MUTILATION:US SPY AGENCIES SPENT NEARLY http://globalresearch.ca/index.php?context=va&aid=15896 $50 BN by IN John 2009 Fleming

THE SHOCKING MENACE OF SATELLITE SURVEILLANCE http://www.sianews.com/modules.php?name=News&file=article&sid=1068

BRAIN AND SATELLITE SURVEILLANCE AND TORTURE REMOTE NEURAL MONITORING & ELECTRONIC BRAIN LINK (RNM & EBL) http://myweb.cableone.net/mtilton/akwei.html http://www.greatdreams.com/RNM.htm http://www.freedomfchs.com/remoteneuralmonitoring.pdf SYSTEMS OF SURVEILLANCE & REPRESSION http://www.well.com/user/jmalloy/gunterandgwen/resources.html by Judy Malloy

THE AMERICAN CIVIL LIBERTIES UNION - THE SURVEILLANCE-INDUSTRIAL COMPLEX: http://www.aclu.org/FilesPDFs/surveillance_report.pdf US CONGRESS, EUROPEAN PARLIAMENT & UK PARLIAMENT - BRIEFINGS ON SECRET GEOPHYSICAL WEAPONS & 'MIND CONTROL' http://www.policestateplanning.com/briefings.htm STOP ELECTRONIC MURDER/TORTURE http://www.stopeg.com/index.html WEAPONS STOP GANG STALKING

[99]

1200 + VICTIMS CASE SUMMARIES ASSAULT, TORTURE AND MUTILATION by SATELLITE AND BRAIN WEAPONS http://www.mydrive.ch USERNAME: johnfinch PASSWORD: TORTURECASES http://www.4shared.com/dir/21674443/75538860/sharing.html http://www.freedrive.com/folder/177784 ABOUT GANG STALKING (aka www.freedomfchs.com/ www.multistalkervictims.org http://citizensoulpower.com/2007/09/21/ ORGANISED STALKING) www.gangstalkingworld.com/ http://www.stopeg.com/index.html

TARGETED MAN WANTS INVESTIGATION OF CORRUPT 'SECURITY' PROGRAM AND HITECH WEAPONS http://www.examiner.com/human-rights-in-national/targeted-man-wants-investigation-of-corrupt-securityprogram-and-hi-tech-weapons ELECTROMAGNETIC AND INFORMATIONAL WEAPONS: THE REMOTE MANIPULATION OF THE HUMAN BRAIN http://globalresearch.ca/articles/BAB408B.html http://www.exposingalltruth.com/ MIND CONTROL http://www.bibliotecapleyades.net/esp_sociopol_mindcon.htm#menu INDEX

EMERGING COGNITIVE NEUROSCIENCE AND RELATED TECHNOLOGIES by the COMMITTEE ON MILITARY AND INTELLIGENCE RESEARCH http://books.nap.edu/openbook.php?record_id=12177&page=R1 PSYCHIC COMPUTER SHOWS YOUR THOUGHTS http://www.timesonline.co.uk/tol/news/science/living/article6898177.ece ON SCREEN

VIDEO:- THE HISTORY CHANNEL: THATS IMPOSSIBLE SERIES MIND CONTROL http://www.history.com/shows.do?action=detail&episodeId=472844 http://enoughroomvideo.blogspot.com/2009/08/impossible-mind-control-four-parts.html ON THE NEED FOR NEW CRITERIA OF DIAGNOSIS OF PSYCHOSIS IN THE LIGHT OF MIND INVASIVE TECHNOLOGY, CAROLE SMITH, JOURNAL OF PSYCHO-SOCIAL STUDIES , VOL 2(2) NO 3 2003 http://www.globalresearch.ca/index.php?context=va&aid=7123 http://www.raven1.net/newcriteria.html (in Chinese) http://user.99114.com/225990/Cooperate_643954.html VIDEO:MIND CONTROL & ELECTRONIC HARASSMENT http://www.youtube.com/watch? v=ZwoVwbGEw3g&feature=PlayList&p=9155254C145A31AA&index=0&playnext=1 http://www.youtube.com/watch? v=pglfp6oHuC0&playnext_from=PL&feature=PlayList&p=9155254C145A31AA&index=5 VIDEO:- NATIONAL GEOGRAPHIC PRESENTS: CIA SECRET EXPERIMENTS. http://channel.nationalgeographic.com/episode/cia-secret-experiments-3313/Overview#ixzz0VznSqIPm CIA DECLASSIFIED DOCUMENTS ON MIND CONTROL EXPERIMENTS MKULTRA AND OTHERS http://www.wanttoknow.info/mind_control/cia_mind_control_experiments_sex_abuse http://www.opednews.com/articles/STOP-MK-ULTRA-PROGRAMS-NOW-by-Noeline-Clayfield-

[100]

091116-809.html

http://www.mkultraconference.com/MK-ULTRA.php

PROJECT CENSORED - HUMAN RIGHTS AND FREEDOM OF THOUGHT VIOLATIONS BY US MILITARY/INTELLIGENCE ORGANIZATIONS. http://www.projectcensored.org/articles/story/us-intelligence-community-human-rights-violations/ MONARCH: THE NEW PHOENIX PROGRAM http://www.monarchnewphoenix.com/ http://www.monarchnewphoenix.org/ http://video.google.com/videoplay?docid=3106090846619588331 http://www.myspace.com/marsboy683 FASCIST TECHNOLOGICAL POLICE http://www.surveillanceissues.com/article_computerstate.pdf DEMOCRACY GOING DARK: THE http://globalresearch.ca/index.php?context=va&aid=13695 EDUCATE YOURSELF:http://educate-yourself.org/mc/ STATE ELECTRONIC by Paul POLICE Baird STATE

MIND

CONTROL

MIND CONTROL TECHNOLOGY http://www.docstoc.com/docs/36936010/MIND-CONTROL-TECHNOLOGY-EXPOSED MIND CONTROL & SUBLIMINAL SUGGESTION http://www.rexresearch.com/sublimin/sublimin.htm 100 USA

EXPOSED PATENTS

THE HUMAN RESEARCH SUBJECT PROTECTION ACT OF 1997 INTRODUCED BY USA SENATOR JOHN GLENN http://www.ahrp.org/InformedConsent/glennConsent.php OPERATION MIND CONTROL http://d.scribd.com/docs/2aldagk0d36ql3hbr80m.pdf by Walter Bowart GROWS THE CURB

WALL STREET JOURNAL NSA's DOMESTIC SPYING http://online.wsj.com/article/SB120511973377523845.html?mod=hps_us_whats_news SPACE-BASED DOMESTIC SPYING: KICKING CIVIL http://www.globalresearch.ca/index.php?context=va&aid=10864 LIBERTIES TO

AUSTRALIA FIRST TO ADMIT "WE'RE PART OF GLOBAL SURVEILLANCE SYSTEM" ECHELON OUTED BY THE HEAD OF AUSTRALIA'S DEFENCE SIGNALS DIRECTORATE (DSD), MARTIN BRADY. http://www.heise.de/tp/r4/artikel/2/2889/1.html 600 WEB: + VICTIMS' ACCOUNTS FROM THE WHOLE WORLD http://www.mindcontrolforums.com/victm-hm.htm

BAN ELECTRONIC WARFARE ON CIVILIANS PETITION - 400+ SIGNATURES AND MESSAGES OF VICTIMS & SUPPORTERS http://www.ipetitions.com/petition/synergy/ EMAIL: ti.petition@gmail.com, ti.synergy@gmail.com

[101]

SATELLITE AND BRAIN WEAPONS ASSAULT, TORTURE AND MUTILATION - VICTIMS' ORGANISATIONS & FURTHER INFORMATION:FREEDOM MIND FROM COVERT HARASSMENT JUSTICE AND SURVEILLANCE http://freedomfchs.com/ http://www.mindjustice.org/ http://www.icomw.org/ MINDCONTROL

INTERNATIONAL COMMITTEE ON OFFENSIVE MICROWAVE WEAPONS ILLEGAL HUMAN EXPERIMENTING http://www.netti.fi/~makako/mind/index.html & ELECTROMAGNETIC

GERMANY - VEREIN GEGEN DEN MISSBRAUCH PSYCHOPHYSISCHER WAFFEN in German and English (THE ASSOCIATION AGAINST THE ABUSE OF PSYCHOPHYSICAL WEAPONS) http://psychophysischer-terror.de.tl/ SECRET ILLEGAL SURVEILLANCE http://www.lesliecrawford.cabanova.com/page1.html THE AMERICAN COGNITIVE http://americancognitivelibertiesassoc.org/default.aspx SURVEILLANCE ISSUES AND LIBERTIES ATTACKS ASSOCIATION www.surveillanceissues.com

THE FEDERATION AGAINST MIND CONTROL EUROPE http://www.mindcontrol-victims.eu/ http://www.mydrive.ch USERNAME: johnfinch PASSWORD: TORTURECASES http://www.4shared.com/dir/21674443/75538860/sharing.html http://www.freedrive.com/folder/177784 COMPILACION DE TESTIMONIOS EN ESPAOL:http://rudy2.wordpress.com/ FRANCE INFORMATION DOSSIER http://informationdossier.wordpress.com/ GERMANY STOP MIND http://www.lacoctelera.com/presentation-de-la-situation http://rudy2.wordpress.com/ CONTROL http://stopptmindcontrol.lima-city.de

ITALY - ASSOCIAZIONE ITALIANA, SCIENTIFICA E GIURIDICA, CONTRO GLI ABUSI MENTALI, FISICI E TECNOLOGICI http://www.aisjca-mft.org/ ITALY ASSOCIAZIONE VITTIME ARMI ELETTRONICHE-MENTALI WEB: http://it.geocities.com/decifircas/ www.associazionevittimearmielettroniche-mentali.org http://www.facebook.com/group.php?gid=91047851866&ref=ts http://www.facebook.com/notes/l-adige-e-il-trentino/mind-kontrol-in-italia-tra-fantascienza-e-realta/344278799541 INDIA NO MORE http://www.mindcontrolvictimsunity.in/ WEB: http://peacepink.ning.com http://soleilmavis.spaces.live.com/ COVERT MIND CONTROL WEAPONS http://www.zshare.net/download/558142082eb3d028/ (IN PEACEPINK CHINESE)

CHINA http://groups.google.com/group/soleilmavis

http://user.99114.com/225990/Cooperate_6
http://mindcontrol.com.cn/

43954.html
CHINA MINDCONTROL

JAPAN STOP MIND CONTROL

[102]

WEB: http://www5f.biglobe.ne.jp/~terre/index.html http://www.geocities.jp/techhanzainetinfo/ JAPAN RUSSIA (ASSOCIATION AGAINST THE http://www.volkstribune.de.tl/ RUSSIA THE MOSCOW http://www.moscomeco.narod.ru./ WEB:

http://www.mirai1.com/ (in

(in JAPANESE and ENGLISH) JAPANESE) http://gangstalkinginde.blog59.fc2.com/

ABUSE OF HOUSING

PSYCHOPHYSICAL WEAPONS) WEB: ECOLOGY COMMITTEE WEB:

RUSSIA - THE ST.PETERSBOURGH SOCIETY OF PERSONS SUBJECT TO REMOTE CONTROLLED BIOENERGETIC TERROR WEB: http://psyterror.narod.ru/ ABOUT GANG www.freedomfchs.com/ www.multistalkervictims.org http://citizensoulpower.com/2007/09/21/ THE EXOTIC OMINOUS PARALLELS WARFARE.COM & http://www. STALKING www.gangstalkingworld.com/ http://www.stopeg.com/index.html theominousparallels.blogspot. com/

http://exoticwarfare.org/ NATIONAL CARE SOCIETY http://www.nationalcaresociety.com/

ORGANIZED CRIME WAVES http://www.organizedcrimewaves.com/

US GOVERNMENT TORTURE & HEROES OF THE UNITED STATES FOR THEIR STAND AGAINST HUMAN MIND CONTROL TECHNOLOGY, TECHNIQUES & POLITICS http://www.cs.virginia.edu/~alb/ugly/ugly.html http://www.cs.virginia.edu/~alb/misc/truth.html http://www.cs.virginia.edu/~alb/misc/moreMindLinks.html EXPERIMENTATION FASCISM "9-11" MIND http://www.us-government-torture.com/SECRETANGEL.TV.html CONTROL http://www.9-11theofallblackoperations.blogspot.com/ http://www.geocities.com/xposperps/ GANG STALKING (ENGLISH AND DUTCH) http://www.stopeg.nl/

EMF TORTURE CHAMBER http://emftorturechamber.blogspot.com/, STOP ELECTRONIC http://www.stopeg.com/ WEAPONS/STOP

INTERNATIONAL MOVEMENT TO BAN THE MANIPULATION OF THE HUMAN NERVOUS SYSTEM BY TECHNICAL MEANS http://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm, http://web.iol.cz/mhzzrz/ PETITION - BAN ELECTRONIC WARFARE ON CIVILIANS - 400+ SIGNATURES AND MESSAGES OF VICTIMS & SUPPORTERS http://www.ipetitions.com/petition/synergy/ EMAIL: ti.petition@gmail.com, ti.synergy@gmail.com 600 + VICTIMS' ACCOUNTS FROM THE WHOLE WORLD http://www.mindcontrolforums.com/victm-hm.htm NAFF - ADVOCATING FOR VICTIMS OF MIND CONTROL, TORTURE, SLAVERY & RELATED TERROR http://naffoundation.org/ THE UNITED EMAIL: CITIZENS AMERICAN FREEDOM FOUNDATION http://www.uaff.us/uaffentrancepage.htm bertbrooks@usa.com http://www.healthycitizens.blogspot.com/ & ETHICS (CCLE)

AGAINST

HUMAN

EXPERIMENTATION LIBERTY

THE CENTER FOR COGNITIVE http://www.cognitiveliberty.org/index.html

[103]

MIKROWELLENTERROR.DE/ FREEDOM FIGHTERS FOR TORTURE SECRETLY BEING USED AS AMERICA

http://www.mikrowellenterror.de/ www.freedomfightersforamerica.com http://iamatorturevictim.blogspot.com/ RESEARCH MR JEAN RATS http://researchrat.com/ EMAIL:

TECHNOLOGICAL US CITIZENS ARE

THE DECLARATION OF verstraeten.jean@belgacom.net MR MR MR WALDEMAR WALTER DARIUS

ALARMED LOTZ -

CITIZENS EMAIL: -

VERSTRAETEN

wlotz2003@web.de, EMAIL:

wlotz2002@mail.ru, wmadliger@yahoo.de,

MADLIGER MOCKUS

EMAIL:

darius_mockus@yahoo.com,

LIST OF VICTIMS OF SATELLITE AND BRAIN WEAPONS:1200 + VICTIMS CASE SUMMARIES ASSAULT, TORTURE AND MUTILATION by SATELLITE AND BRAIN WEAPONS see http://www.mydrive.ch USERNAME: johnfinch PASSWORD: TORTURECASES http://www.4shared.com/dir/21674443/75538860/sharing.html http://www.freedrive.com/folder/177784 COMPILACION DE TESTIMONIOS EN ESPAOL:http://rudy2.wordpress.com/ It is no exaggeration to say our cases are as horrendous and urgent as people fleeing Nazi or Pol Pot concentration camps specifically Dr Mengele-type torturers and butchers. We urgently need access to SAFE HOUSES to get protection from the directed energy and neurological weapons being used to torture, mutilate and kill us.

LIST OF PATENTS (Judy Wall, Resonance) A listing of various technologies available that can be combined for use in direct or subliminal mind control systems. Please note that these are mainly private inventions intended for positive uses, but could be applied for negative purposes as well. We have no idea what the government may have in classified research. However, it is known that many of these technologies are now satellite based. Silent Subliminal Presentation System. US Patent #5,159,703 Oliver Lowry, October 27, 1992. A silent communications system in which nonaural carriers in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum are amplitude modulated with the desire intelligence and propagated acoustically or vibrationally for inducement into the brain. Hearing System. US Patent #4,877,027 Wayne Brunkan, October 31, 1989. A method for directly inducing sound into the head of a person using microwaves in the range of 100 MHz to 10,000 MHz, modulated with a waveform of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses tightly grouped together; burst width is between 500 nanoseconds and 100 microseconds; pulse width between 10 nanoseconds

[104]

to 1 microsecond. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated. Psycho-Acoustic Projector. US Patent #3,566,347, Andrew Flanders, February 23, 1971. A system for producing aural psychological disturbances and partial deafness of the enemy during combat situations. Noise Generator and Transmitter. US Patent #4,034,741, Guy Adams and Jesse Carden Jnr, July 12, 1977. An analgesic noise generator. Method and Apparatus for Reducing Physiological Stress. US Patent #5,562,597, Robert Van Dick, October 8, 1996. Physiological stress in a human is treated by generating a weak electromagnetic field about a quartz crystal. The subject is positioned in the EM field for a period of time sufficient to reduce stress. (Recall the Russian LIDA patent: by reducing stress, subjects become more vulnerable to hypnosis) Method and Apparatus for Reducing Physiological Stress. US Patent #5,480,374. Robert Van Dick, January 2,1996. Similar to above, a weak electromagnetic field is generated around a grounded electrode. Method and System for Altering Consciousness. US Patent #5,123,899. James Gall, June 23, 1992. A system for altering the states of human consciousness involving the use of simultaneous application of multiple stimuli, preferably sounds, having differing frequencies. Method and System for Altering Consciousness. US Patent #5,123,438. James Gall, February 22, 1994. Similar to above. Subliminal Message Generator. US Patent #5,270,800, Robert Sweet. December 14, 1993. A combined subliminal and supraliminal message generator for use with a television receiver permits complete control of subliminal messages and their presentation. Also applicable to cable television and computers. Superimposing Method and Apparatus Useful for Subliminal Messages. US Patent #5,134,484. Joseph Wilson, July 28, 1992. Data to be displayed is combined with a composite video signal, data read out to determine the frame sync pulses of the video signal, location of data display within the video image etc. Data may be displayed as a subliminal message, may be derived from pre-recorded or live signal. Method of Changing a Person's Behaviour. US Patent #4,717,343. Alan Densky, January 5, 1988. A method of conditioning a person's unconscious mind in order to effect a desired change in the persons behaviour which does not require the services of a trained therapist. The person to be treated views a program of a video pictures appearing on a screen. The program as viewed by the person's unconscious mind acts to condition the person's thought patterns in a manner, which alters that person's behaviour. Sound Recording System. US Patent #4,141,344. Louis Barbara, February 27, 1979. In recording an audio program, such as music or voice, on a magnetic tape recorder, an AC signal generator operating at a frequency below 14 Hz provides an A.C baseline for the audio program signal. This 14 Hz or lower signal is sensed by the listener's ear to create an Alpha or Theta state in the brain when the tape is played back. Auditory Subliminal Message System and Method. US Patent #4,395,600. Rene Lundy and David Tyler, July 26, 1983. An amplitude controlled subliminal message may be mixed with background music. Auditory Subliminal Programming System. US Patent #4,777,529. Richard Schultz and Raymond Dolejs, October 11, 1988. An auditory subliminal programming system includes a subliminal message encoder that generates fixed frequency security tones and combines them with a subliminal message signal to produce an encoded message signal which is recorded on audio tape or the like. The decoder/mixer filters the security tones, if present, from the subliminal message and combines the message signals with selected low

[105]

frequency signals associated with enhanced relaxation and concentration to produce a composite auditory subliminal signal Apparatus for Inducing Frequency Reduction in Brain Wave. US Patent 34,834,701. Kazumi Masaki, May 30, 1989. Frequency reduction in human brain wave is inducible by allowing human brain to perceive 4-16 Hz beat sound. Such beat sound can easily be produced with an apparatus, comprising at least one sound source generating a set of low frequency signals different from each other in frequency by 4-16 Hz. Electroencephalographic study revealed that the beat sound is effective to reduce beta-rhythm into alpha-rhythm, as well as to retain alpha-rhythm. Ultrasonic Speech Translator and Communication System. US Patent #5,539,705. M.A.Akerman, Curtis Ayers, Howard Haynes. July 23, 1996. A wireless communication system undetectable by radio frequency methods for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustical pressure waves across a carrier medium, including gases, liquids, and solids, and reconverting the ultrasonic acoustical pressure waves back to the original audio signal. This invention was made with Government support under contract DE-AC05-840R21400 awarded by the U.S. Department of Energy to Martin Marietta Energy Systems, Inc. Non-Audible Speech Generation Method and Apparatus. US Patent #4,821,326. Norman MacLeod, April 11, 1989. A non-audible speech generation apparatus and method for producing non-audible speech signals which includes an ultrasonic transducer or vibrator for projecting a series of glottal shaped ultrasonic pulses to the vocal track of a speaker. Apparatus for Electrophysiological Stimulation. US Patent #4,227,516. Bruce Meland and Bernard Gindes. October 14, 1980. Apparatus for the electrophysiological stimulation of a patient for creating an analgesic condition in the patient to induce sleep, treat psychosomatic disorders, and to aid in the induction of electrohypnosis and altered states of consciousness. Method and Recording for Producing Sounds and Messages to Achieve Alpha and Theta Brainwave States and Positive Emotional States in Humans. US Patent #5,352,181. Mark Davis. October 4, 1994. Also, US Patent #5,586,967. December 24, 1996. Learning-Relaxation Device. US Patent #4,315,502. Denis Georges. February 16, 1982. A device for relaxing, stimulating, and/or driving brainwave form function in a human subject. Method and Apparatus for Transcutaneous Electrical Stimulation. US Patent #4,503,863. Jefferson Katims. March 12, 1985. A method and apparatus for monitoring and obtaining actual bioelectrical characteristics of a subject under predetermined conditions of evoked response stimuli, and by interaction with a computer, applying cutaneous electrical stimulation to the subject, using a signal generator to modify current amplitude and frequency in a direction to achieve bioelectrical characteristics in the subject related to the actual bioelectrical characteristics monitored. Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States to Control a Musical Instrument. US Patent #4,883,067. Knispel et. Al. November 28, 1989. A method and apparatus for applying a musical feedback signal to the human brain, or any other brain, to induce controllable psychological and physiological responses. A signal representing the ongoing electroencephalographic (EEG) signal of a brain preferably is obtained from the electrode location on the scalp known as CZ or P3 in clinical notation. A signal processor converts the ongoing EEG into electrical signals which are converted into music by synthesisers, The music is acoustically fed back to the brain after a time delay calculated to shift the phase of the feedback in order to reinforce specific or desired ongoing EEG activity. The music is

[106]

comprised of at least one voice that follows the moment-by-moment contour of the EEG in real time to reinforce the desired EEG activity. The music drives the brain into resonance with the music to provide a closed loop or physiological feedback affect. Preferably, the musical feedback comprises additional voices that embody psychoacoustic principles as well as provide the content and direction normally supplied by the therapist in conventional biofeedback. Method of and Apparatus for Inducing Desired States of Consciousness. US Patent #5,356,368. Robert Monroe. October 18, 1994. Improved methods and apparatus for entraining human brain patterns, employing frequency following response (FFR) techniques, facilitate attainment of desired states of consciousness. In one embodiment, a plurality of electroencephalogram (EEG) waveforms, characteristic of a given state of consciousness are combined to yield an EEG waveform to which subjects may be susceptible more readily. In another embodiment, sleep patterns are reproduced based on observed brain patterns during portions of a sleep cycle; entrainment principles are applied to induce sleep. In yet another embodiment, entrainment principles are applied in the work environment to induce and maintain a desired level of consciousness. A portable device also is described. Method of Inducing Mental, Emotional and Physical States of Consciousness Including Specific Mental Activity in Human Beings. US Patent #5,213,562. Robert Monroe, May 25, 1993. A method having applicability in replication of desired consciousness states; in the training of an individual to replicate such a state of consciousness without further audio stimulation; and in the transferring of such states from the one human being to another through the imposition of one individuals EEG, superimposed on desired stereo signals, on another individual, by inducement of a binaural beat phenomenon. Device for the Induction of Specific Brain Wave Patterns. US Patent #4,335,710. John Williamson. June 22, 1982. Brain wave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects. Method and Apparatus for Repetitively Producing a Noise-Like Audible Signal. US Patent #4,191,175. William Nagle, March 4, 1980. A digital pulse generator and shift register repetitively produce bursts of digital pulses at a first adjustable repetition frequency. A low pass amplifier may be connected to the pink noise filter to generate a train of pulses having a repetition frequency near 7 Hz, which pulses a light source in synchronism with the audible noise-like signal. Apparatus for Transforming Voice Using Networks. US Patent #5,425,130. David Morgan. June 13, 1995. An apparatus for transforming a voice signal of a talker into a voice signal having characteristics of a different person. A computer program to read your thoughts : Computer program to interpret EEG patterns that correspond to words, developed by Dr Donald York and Dr Thomas Jensen, University of Missouri. Same idea as above, originally developed in 1974 by Lawrence Pinneo at Stanford Research Institute, California. See "Mind Reading Computer". TIME, July 1st, 1974. Pg67. Same idea as above, Dr. Richard Clark, Flinders University, Bedford Park, South Australia, See GENESIS, Vol.8 #6, December 1991, Pg,1. Apparatus for the Treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation. US Patent #3,773,049. L.Y.Rabichev, V.F.Vasiliev, A.S.Pultin, T.G.Ilina, P.V.Raku and L.P.Kennedy. November 20, 1973. Don't let

[107]

the nice title fool you, this is the patent for LIDA, the infamous Soviet brainwashing machine. The patient or victim receives the four physical stimuli named in the title which are calibrated such that he "experiences psychical relaxation and gradual transference to sleep" and "The whole system of stimuli which is addressed to the patient's organism makes use of the first signal system channels.i.e. the receptor zones of the appropriate analysers so that the second signal system channels (mind, intellect, psyche) are avoided, thereby providing for a curative effect, no matter the patient's psychic condition or his attitude towards the treatment procedure" Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain. US Patent #4,889,526. Elizabeth Rauscher and William Van Bise. December 26, 1989. This invention incorporates the discovery of new principles which utilise magnetic and electric fields generated by time varying square wave currents of precise repetition, width, shape, and magnitude to move through coils and curtaneously applied conductive electrodes in order to stimulate the nervous system and reduce pain in humans. Nervous System Excitation Device, later named the "Neurophone". US Patent #3,393,279. Gills Patrick Flanagan. July 16, 1968. A method of transmitting audio information via a radio frequency signal modulated with the audio info through electrodes placed on the subject's skin causing the sensation of hearing the audio information in the brain. Perhaps the most remarkable thing about this patient is that Flanagan was only 14 years old when he invented it! Uses vacuum tubes. Method and System for Simplifying Speech Waveforms. US Patent #3,647,970. G.Patrick Flanagan. March 7, 1972. A complex speech waveform is simplified so that it can be transmitted directly through earth or water as a waveform and understood directly or after amplification. An upgraded form of the above patient. Uses transistors. Means for Aiding Hearing. US Patent #2,995,663. Henry Puharich and Joseph Lawrence, August 8, 1961. Means for converting audible signals to electrical signals and conveying them to viable nerves of the facial system. Means for Aiding Hearing by Electrical Stimulation of the Facial Nerve System. US Patent #3,170,993. Henry Puharich. February 23, 1965. A radio frequency receiver for receiving transmitted signals corresponding to audible sounds, one terminal of which imparts modulated electrical signals to facial nerve to induce hearing in subject's brain. Similar to Flanagans patents. Hearing Device. US Patent #4,858,612. Philip Stocklin. August 22, 1989. A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex. SYSTEM AND METHOD FOR PREDICTING INTERNAL CONDITION OF LIVE BODY. U.S PATENT #5785653 28/7/98 Tkiyuna et al. To detect the internal condition of surveillance targets in criminal investigations by EEG.

COMMUNICATION SYSTEM AND METHOD INCLUDING BRAIN WAVE ANALYSIS AND/OR USE OF BRAIN ACTIVITY U.S PATENT #6011991 1/4/00 A Mardirossian. To employ word recognition, (i.e. read minds), propose transmitter implants and utilise neural networks (create artificial intelligence).

APPARATUS AND METHOD FOR REMOTELY MONITORING AND ALTERING BRAIN WAVES

[108]

R.G MALECH, U.S PATENT #3951134 20/4/76 TARGET TRACKING

ELECTRONIC LIFE DETECTION SYSTEM, DV HABLOV, U.S PATENT #5448501, 9/5/95. The modulated component of the reflected microwave forms on electronic fingerprint of the target, with features; permitting distinction.

SYSTEM AND METHOD FOR INTRUSION DETECTION USING A TIME DOMAIN RADAR ARRAY, U.S PATENT #6400307. L.W Fullerton et al. Allows detailed imaging not just vital organ monitoring.

INTERACTIVE TRANSECTOR DEVICE COMMERCIAL & MILITARY GRADE, U.S PATENT #4893815, L.Rowan, 16/1/90. Describes the acquisition, locking onto and tracking of human targets. Laser, radar, infrared and acoustic sensor fusion is used to identify, seek and locate targets.

Brain fingerprinting U.S patent #5467777, 21/11/95, Dr Lawrence Farwell.

See also US Patents No. #6,366,272 ; #5,742,748 ; # 5,734,373 ; # 5,850,352 ; # 6,057,846 ; 6,169, 540

Appendix II - Microchip Implants, Mindcontrol, and Cybernetics


SPEKULA 3rd Quarter October 23, 1999 Dr Rauni Kilde

Article
MINORITY RULES
"Hard Evidence" Vol 6, No 4, pp 29-33, 2006. INTRODUCTION It has become a standard clich to declare that, on most matters and in most

[109]

respects, the majority rules. However, after studying the influence and power held by those within certain minority groups you begin to understand that society is, in fact, not ruled by that principle but by a number of small vested interest groups which are largely made up of wealthy criminals. Because of this (on major issues) the only true representatives of the silent majority are often isolated activists, whistleblowers, campaigners and other marginalised figures who are neither in authority nor publicly recognizable persons, of any sort. On other matters where elected officials or famous faces do speak for the majority it's only because it's in their best interests to do so or it's a distraction; an issue of little real importance. The big issues are rarely dealt with fairly, openly or honestly. People who resent this situation (and want the truth told) are scorned, ridiculed and (sometimes brutally) silenced, thus rendering them useless to the majority. Some of the crimes and deceptions used to neutralise these people are mentioned in this article. However, one of the more general means of deception is secrecy. "They" will argue that official state secrets, the existence of high powered advanced technologies, the links between agencies, media and criminal groups and much, much more must remain hidden from public view for the purposes of national security. Of course, that argument is a transparent nonsense. The powers that be and their criminal associates know all of these things already; the only ones kept in the dark are the people. So this secrecy is part of their system of terrorism, theft and control by stealth. The truth is that all involved in any of the practices described herein are criminals and traitors to mankind itself. WHO'S OR WHAT'S TO BLAME? (i) CLUBS AND CLUB MENTALITY People often use clubs to exhibit extreme prejudices In general we are all stereotyped and compartmentalised by ourselves and others based on our views, our lifestyles, our appearances and our beliefs. Some of it is nothing more than identification for the purposes of socialisation but some is far more sinister; eg criminal organisations like the Illuminati, The Club of Rome and The Mafia. Despite the media mafia brainwashing that tells us that we live in a free society and that conspiracy theories are mostly based on paranoia, the truth is that the world is actually run by groups who deliberately organise conspiracies to maintain control. Most such arrangements amount to major criminal activity. An illustrative example is the Illuminati. This "club" is apparently a Masonic, super rich group based in Israel and London boasting member families like the Rothschilds and the Rockefellers. Groups like this organise or foster war, terrorism and so on by secretly sponsoring the enemies of justice. They do so to control the hearts and minds of the general population whilst destroying our world for their short term gains. Those opposing them are dealt with. Such people lust after wealth and control and use their lackies to do their dirty work; corrupt politicians, agency/military madmen, the media mafia etc. They also have a total lack of conscience about their role; being blinded by the rewards. In brief, rather than working for society those plotting and planning in secret inevitably work against it thereby betraying the most important of all clubs: mankind. (ii) THE LAWS So why aren't the laws of the land drafted in such a way as to empower honest law enforcers to deal with hidden crime at this level? Because although elected

[110]

representatives draft the laws "minority" groups effectively lobby/pressure politicians to do their bidding. Also, because these politicians often really don't have a good feel for what the general population expect/deserve, the powerful minorities (with ready access) are all the more likely to be able to present their arguments in isolation. These same secretive groups also control the mainstream media which, in turn, controls citizens views. This then determines the tenure of governments. So, the fact is that on the really big issues the truth has no chance of standing up alongside the lies because it's hidden from view. Remember, people don't really know this because those advocating the truth are belittled by the criminals they oppose. Naturally, criminals are only concerned with their own position and have no regard for how it affects others. (iii) POWERFUL CRIMINALS News Nazis, political puppets, military madmen, soulless spies and a mixture of mobsters all play their part. They work in unison, for mutual advantage, maintaining a code of silence on the important issues that ought to be addressed publicly; thereby betraying most citizens. If the truth were to be known they'd all be imprisoned instead many are trusted, admired, and followed by the unsuspecting majority. Again, the same culprits work together to silence and discredit those who advocate real democratic freedoms and public disclosure of the crimes committed under the guise of "national security". Sadly, rather than working for disclosure of the truth, television terrorists and others also monster and isolate those who try to disturb their corrupt code of silence. (iv) ADVANCED COMPUTER/SATELLITE SYSTEMS Quite simply, far more damage than good is done by secret spy/military technologies. Take, for example, advanced satellite/computer systems. Some can detect, monitor, collect and collate information at a phenomenal rate (over 220 trillion calculations per second). That information can be gleaned from other computers, private conversations/communications, even thought processes. The equipment is set up by government agencies like the DIA (US Defense Intelligence Agency) and the NSA (National Security Agency) in places like Fort Meade, Maryland and by the CIA etc in places like the Langley Research Centre, Richmond, Virginia. The crimes of these organisations are deliberately hidden from the public, protected, as are the technologies, by corrupt secrecy laws. This is so even when they farm out the technology and/or the information to private sector criminals. Anyone opposing/questioning this or other important matters can be placed in one of their electronic Nazi concentration camps where they are slowly killed, by stealth. Vile experiments involving brain rape, neurophone voices and directed energy weapons torture are conducted on the targets to the immense amusement of those involved including the minority elite and their goon squads. (v) COMPLICIT RECEPTORS Audio visual surveillance and brain rape technologies yield ideas, secrets and more. Whether agency or syndicate connected, complicit writers, performers, statesmen and so on can be fed the results in any number of ways. If, like some agents, they're agreeable they can receive someone else's words or thoughts directly via neurophone input (subliminally or audibly). This, like inputting ideas whilst someone is asleep, allows the thief/harasser to delude themselves about how they obtained the information. Similarly, reading off an autocue allows TV/radio presenters to distance themselves

[111]

from the theft/harassment they are affecting when large sections of that material is mixed/matched/inserted (via computer) from surveillance results. Unfortunately, like the spy agencies, the military, politicians and big "business", the mass media mostly attracts and accepts people with limited compassion, social conscience and integrity. If they're asked to do something wrong they rarely hesitate knowing that they cannot be questioned or caught and that their "jobs" depend on it. The hypocrisy of this is that publicly they "ACT" as if they they're caring, responsible people and there are many deceived by that. (vi) THE PSYCHIATRIC FRATERNITY Media brainwashing sets things up so that psychiatrists can be used to discredit those targeted by the technologies involved. By failing to acknowledge that spies and connected criminals use high tech equipment the psych "professionals" can dismiss all victims complaints and label them as paranoid etc.. Eg they'll say that people getting remote messages or feedback from the mass media are delusional, that people hearing voices are schizophrenic and that anyone claiming to be persecuted using remote technologies of any sort must be paranoid. They dutifully apply these diagnoses and often institutionalise the targets. Personally I believe that many of them realise what they're doing but are too selfish/evil to care. In this respect they rank with politicians and journalists. And the worst amongst them are actively involved in destroying decent people to cover for their corrupt masters. In other words, they work for/with corrupt agencies and other criminals before, during and after their foul experiments. It seems to me that if there were any honest psychiatrists we would be better served if they were able to apply themselves to dealing with beaurocratic control freaks, megalomaniacs and corporate fraudsters who, as part of the ruling minority, prey on the rest of society. They do so whilst "acting", of course, but they're outside the reach of the law (as the system stands) and so their power lust goes unchecked. If psychiatrists must meddle with their quackery (to justify their existence) why don't they ever tackle such real problems. The answer, as always, is self interest.

THE TECHNOLOGIES The ruling minority mould society to suit their purposes through brainwashing; propaganda and mushrooming. Again, anyone who questions their actual motives or the truth behind the facades is crushed quietly but thoroughly. Some of the more sinister, oppressive means of doing this involve the use of advanced satellite/computer systems of which the public is unaware. A few of these are: ECHELON SATELLITE SYSTEMS these are NSA systems designed to monitor ALL telecommunications worldwide scanning for persons "of interest". AUDIO-VISUAL SATELLITE MONITORING these target public figures and citizens "of interest", 24/7. TRANSECTOR DEVICES these effect the satellite location, tracking etc of targets (eg US Pat #4893815 16/1/90 L. ROWAN). NEUROPHONE SYSTEMS these allow the satellite or microwave transmissions of voices etc directly to the brain of targets (eg US Pat # 3393279 16/7/68 P. FLANAGAN and US Pat #3647970 7/3/72 P. FLANAGAN).

[112]

BRAINWAVE ANALYSERS these allow satellite brainwave scanning or neural monitoring plus electronic brain link ups with thought - deciphering computer software (eg US Pat #6011991 1/4/00 A. MARDIROSSIAN) DIRECTED ENERGY WEAPONS these are too numerous to list but they allow destruction, movement of objects, personal illness, debilitation, even death (eg US Pat # 5123899 23/6/92 J.GALL & US Pat #5289439 22/2/94 J. GALL allowing control of consciousness/moods of the target). Again, defence of the official secrecy surrounding these technologies is patent nonsense. N.B. properly applied, these technologies could wipe out terrorism, war, crime etc. They're clearly not being used for that purpose but abused to hurt ordinary citizens. It's all completely indefensible, that's the real reason why it's never discussed openly.

THE APPLICATIONS The technologies just listed allow for many crimes/deceptions as well as illegal human experiments. Some of these are as follows:(i) TORTURE Obviously covert torture can be carried out on targets in remote locations or situations without the need for the sort of criminal harassment that might leave evidence. Many writers, whistleblowers and human rights campaigners are marginalised, discredited and destroyed in this manner. (ii) THEFT OF INTELLECTUAL PROPERTY Many well known, published writers work for covert agencies and other criminals. By monitoring those people that the ruling minority wants silenced (people who think freely and honestly) they not only marginalize them but they also steal every idea at its source (ie straight from their minds before the thought is spoken let alone written). They also oppress monitored targets by feeding their own words back to them through the insertion of those words/ideas/"coincidences" into the corruptible medias scripts. This provides a double-barrelled attack on victims and halves the workload for "ghost"/spy writers who need to keep providing material and harass targets at the same time. Effectively, this way, the target helps harass themselves in a cruel, criminal game of cat and mouse. This is a very common practice. Notably, targets react in different ways (at different times) Some targets continue to produce ideas, falling for the fame trap, misinterpreting the maliciousness of all of this because public figures are involved. Some fall apart; believing others (not just public figure criminals) are in on it. Some believe they are inspiring thoughts and changes and so are prepared to endure a lack of privacy for their influence. Whatever the position at whatever time, all targets are victims of one of the cruelest most criminal systems of oppression ever devised. Remember that invasion of a persons own mind (an unimaginably evil crime in itself) allows ideas to be passed to complicit writers (of any sort) directly or indirectly. Again, one indirect method is the voluntary acceptance of neurophone input which relays others thoughts. This could be done subliminally, using silent sound during

[113]

sleep/dreams, or audibly. This would also allow those thieving material to defend any accusation because they have had no contact with those transferring the thoughts/ideas or the victim and can consciously call the thoughts their own. (iii) "PSYCHIC" EXPERIENCES Many let their egoes and imaginations block their minds on this one. Remember that surveillance results/frequencies can be fed to the media leading to almost instantaneous live-to-air feedback if the target is tuned in. So, the gullible, observing media "coincidences", could come to believe that they are psychic. This is worse when mind reading/neurophone input makes one person receive anothers thoughts subliminally (equally the monitors know what events they are about to stage, what news/scripts are about to be presented and can feed you that subliminally). Therefore, in reality, the only real psychic experiences are the result of electronic telepathy. In other words, they're scams arranged courtesy of meddling by military/agency/criminal perps who are stealing, experimenting, deceiving and worse. Intuition and experience form all other explanations (the mind is a powerful instrument) even in the case of dreams or so-called "premonitions". In fact if targets are involved the future (as planned by monitors) can even be fed into their dreams/thoughts. It's all a trick and many are monitored without their knowledge. (iv) PARANORMAL EXPERIENCES Similarly people who honestly believe they've heard/seen ghosts or seen objects move across a room or "know where the bodies are buried" are victims/dupes. They prop up the covers for what's really going on by relaying their eerie tales in a vivid, convincing manner, because they're convinced themselves. The truth is it's all military or agency nonsense designed to manipulate people. Media entertainment focusing on all of this would be harmless fun but for the fact that many believe in the paranormal as a result. The presenters know that man-made hoaxing is rife but the public aren't given that knowledge and so many form their opinions based on limited information. The truth is most "supernatural" experiences are wrongly recorded or staged and the rest are errors of one sort or another. (v) ALIEN ENCOUNTERS Remember, using mind reading and neurophone technologies a non verbal conversation can be conducted. If you have no knowledge of that fact and are mesmerized by drugs (administered without your consent) as well as being presented with a high tech "show" (involving military "spaceships" and costumed "aliens") you could be forgiven for falling for this trick. It's usually a warning, an experiment or propaganda (often all three). As with other scams criticised here, I personally don't believe in anything except heaven and earth and the place the perps will end up. Like provoked/allowable terrorism, alien fairytales foster public approval of an obscene waste of vast amounts of government (and private) money; wasted on weapons of war, space research etc. And most of the funds end up being spent on even more evil technologies (such as those mentioned previously) rather than actual searches for so-called extraterrestrials. Now, certainly radio telescopes and deep space listening devices exist but many more viewing/listening devices are aimed at the earth; tormenting easy targets. (vi) TERRORISM & OTHER CRIMES AGAINST HUMANITY Many "madmen" are "triggered" by remote controlling mechanisms made available to military and agency organisations. Moods, physical pain levels, thought processes

[114]

and so on can be created and altered via satellite using various secret technologies. For example, when neurophone voices are transmitted into the head of a potentially violent person disaster can follow; especially if they're also stupid enough to really believe what the transmissions tell them. Oklahoma city bomber, Timothy McVeigh and the Port Arthur massacre perpetrator, Martin Bryant were both provoked and set up by various agency scum who wanted to create disquiet and raise certain issues on behalf of their masters; our minority rulers. The fact is that these manipulators not only caused these events and many more but they could prevent most similar occurrences if they wanted to, using their surveillance capabilities for good instead of evil. Unfortunately the evil minority profits from war, terrorism, carnage and the insecurity and misery they create. Tens of millions of lives could be lost in a war (eg WWII) and these creatures just reap the rewards without a thought for their fellow man, so it's not surprising that tragedies like the New York twin towers disaster are not only staged but then used. By used I mean used to direct public opinion where they want it to go; to accept reductions in civil liberties, to foster suspicion/hatred of certain ethnic/religious groups etc etc.

(vii) ILLEGAL HUMAN EXPERIMENTS Because the powers that be can now listen, watch, talk, harm etc from remote locations (including satellites) experiments in controlling peoples actions, thoughts, opinions etc are constantly being conducted. Much of it involves media deception (as it always has) but they also stimulate and analyse dreams, provoke and manouvre combatants, use human thoughts for artificial intelligence/robotics research, and even carry out cloning studies. Many missing persons or "alien abductees" are also used in illegal government studies. The public would overwhelmingly oppose any and all of this if they knew but they cannot because they are not told. In turn, those who know and do not try to tell the public are traitors to mankind itself. Nobody's career (or life) is more important. Individually and/or collectively public figures should make a stand but they do not because they have been desensitised, dehumanised and bastardized courtesy of the processes of selection and the system they work within. Equally, to ensure this works, they are all warned not to talk to their victims or people working to raise awareness on the issues in question.

AN OVERVIEW Military power brokers and spy masters are behind all of this. These in turn are working for the minority elite. They target people who know the ugly truth as well as those who can be used as "remote-controlled" assassins, terrorists, etc. They also very effectively cover up the whole thing by manipulating puppets on the world stage through the control they exert over the worldwide, mainstream media. However, to victims those puppets display their master's real paranoia by their reactions to the words/actions of whistleblowers and others who try to alert the majority to the truth. Meanwhile they use terrorism etc to tighten their grip on society.

[115]

The media are more likely to cover up and condition/brainwash the public with things like paranormal/psychic/alien stories and so-called reality TV, making us gullible acceptors of the surveillance society yet to be fully revealed. Also, the media never present the truth on major crime or the really big issues because they are controlled by those responsible. Again, these same people control the surveillance technologies which could all but wipe out major crime but they choose instead to use it to protect themselves from questions, exposure and imprisonment. They do so by training their covert, anti-personnel weaponry on those promoting the truth, to silence and destroy them. The law enforcement agencies are powerless to stop this as they are understaffed, underresourced, undertrained and under the direction of the same government bodies which facilitate and foster the relevant crimes and oppression.

THE BASIC SOURCE OF THE PROBLEM New methods of covert oppression are being discovered all the time. Whilever the laws (and law enforcers) are made to lag behind these advances honest, decent people will be secretly purged from "society" and given no opportunity to publicly address the big issues. Even critical statements from publicly recognizable bodies like the UN (UNIDIR), The European Parliament and the International Red Cross have not been reported openly where covert torture/oppression mechanisms have been highlighted so what chance do isolated groups or individuals have. This veil of secrecy is a disgraceful, treacherous means of dismissing the views of the vast majority of the worlds citizens but again, even if it was raised then new methods would take their place. So whilst the weapons used are of concern the mentality that fosters their use is of even greater concern. The selfish, superior, suppressive and secretive attitude of our minority "rulers" are the real problem. It is the criminal thinking that allows one group of people to believe they are better than others and so have the right to mistreat them. If no one thought that way it couldn't happen. And it's not just atheists or those believing life is some incidental by product of a big bang (caused by no one or nothing in particular) who are to blame. Anyone who can dismiss in their minds and hearts the significance of hurting their fellow human beings (and the consequences) is a potentially dangerous creature. Whilst basic human nature can be used as an excuse these attitudes are taught and are difficult to change so people should be taught otherwise in the first place. Community education on moral and ethical values should encompass the need to face and embrace the truth on all matters, the need to attain and maintain a high level of good character and the acceptance of the common humanity of all people. The extent to which such idealism is rejected or mocked by those who only pay lip service to what is right is the extent to which criminals and hypocrites now rule our societies. Such evil cannot be eradicated but it could be minimized if genuine efforts were made to engender our youth with the necessary values through education, role modeling and so on. For example, current efforts by governments to teach children to respect authority only serve the whole community if those taking on responsibilities (in public and private life) behave in a manner worthy of that respect. If authority figures do not exhibit integrity, morality and goodwill but instead seek control through personal opportunism then they betray the community. You are then looking at concealing their crimes when you ask people to respect them, regardless. You can respect their rights and not respond criminally yourself but the veil of respectability should be lifted before genuine respect is expected of anyone. To do

[116]

otherwise is to foster corruption and this is what our society has been doing for many decades. Everything should be transparent and everyone accountable. No deceptions. No exceptions. Unless and until this is achieved you might as well ask an honest, informed citizen to believe in Santa Claus as to expect him or her to place their faith in authority figures who are clearly corruptible. Now, walking alongside the corruptible we have others who are also part of the problem. These are the apathetic self-servers who may not partake in crimes themselves but are quite happy to assist those that do if it suits their purpose. The principles brought to mind by symbols like national flags and anthems (equality, integrity, justice and freedom) are just words, things to hide behind, for the criminal and his accomplices. Their hearts and minds don't envelop anything but self promotion and deception. And those agreeing to the secrecy surrounding the major betrayals going on today are in no ethical/moral position to judge what the public should or should not know because they are blinded by corruption. The only acceptable option is total disclosure. Only then could majority rule deliver equality, fair play, justice etc. It's totally unacceptable for vested interested groups (incl. the media, churches, govts etc) to talk about free speech, democracy etc yet be prepared to condone and/or commit crimes when it suits them; crimes against those speaking the truth on something that they want hidden. Further to the "friendship/mateship" issue Those associating with criminals must realise that major issues such as human rights, public accountability and truth in reporting are not going to be dealt with whilever they support criminals for their own personal gain. Those not against them are for them and so their associates betray us as well. The media in particular are controlled controllers who set the agenda, cover the truth on major matters and distract us with bread and circuses, beer and skittles, hoo ha and hoopla. For example, many tens of thousands of people die every day due to war, disease, famine and so on yet our emotions are more likely to be focused on isolated acts of terrorism and madness (occasionally) and mundane "cat up a tree" type matters (often) as well as celebrity gossip etc. Even when major events are covered (such as acts of terrorism) there is no reference to the real causes or the real culprits. Everything is presented so as to foster certain beliefs, to hide, to scapegoat and to deceive. Anyone involved in that process is, to one degree or another, a traitor. Once again, there is only one acceptable scenario: the truth in all things. And make no mistake, the agencies and their connections will, like Satan himself, use mockery and more to silence all talk of doing what is right with a "you're playing God" taunt. It's a cheap trick. Since few of us maintain our youthful idealism the sort of morality/ethics we all need to accept the truth can often be lost, especially by those lured by promises made by our minority rulers. Corrupted minds are more likely to promote criminal attitudes or, at least, to accept them; especially in "business" dealings. Such people then bully/harass others into silence or apathy thus removing any obstacles to their criminal empires. To complete the argument, one long term answer is community/youth education; so that there are too many strong willed people of integrity for them to ignore or destroy. At the moment it is all too easy for them to select corruptible persons for influential or authoritative community roles in the media, government, beaurocracy etc. We also need laws and law enforcers to deal with the sort of technological evil referred to in this piece. That can only happen if the balance between good and evil is shifted. Since evil cannot present itself as such but must hide (as our public villains do) they could not openly oppose any suggestion that society, in general, needs to have certain values reemphasised if it is to avoid eventual deterioration. Maybe if we can somehow encourage that we may one day breed enough people of good character to deal with the problems generated by the criminal minority who rule our world.

[117]

APPENDIX III- A Word for the Wise T.I. - Microwave Targeting and Brain Dysfunction

DIAGRAM FROM: Brain Injury BACKGROUND: In an episode of Law and Order: Criminal Intent, a respected criminal psychologist specializing in serial killers himself becomes a serial killer after an event leaves him with brain damage. Intrigued by this concept led to a quick search on traumatic brain injuries, which became the basis for this blog entry. A Targeted Individual (TI) experiences brain function disruption due to a yet to be identified Directed Energy Weapon. The effects of this Electromagnetic Harassment are analogous to symptoms of patients with traumatic brain injuries. The number and nature of the effect depends on the part of brain that is targeted. By looking at the below list the wise TI can clarify and identify which effects are being experienced and take appropriate action to shield his or her head. Target - Frontal Lobe: Forehead: Inability to plan a sequence of complex movements needed to complete multistepped tasks, such as making coffee (Sequencing). Loss of spontaneity in interacting with others. Loss of flexibility in thinking. Persistence of a single thought (Perseveration). Inability to focus on task (Attending). Mood changes (Emotionally Labile). Changes in social behavior. Changes in personality. Difficulty with problem solving. Inability to express language (Broca's Aphasia). Loss of simple movement of various body parts (Paralysis). Target - Parietal Lobe: near the back & top of the head: Inability to attend to more than one object at a time. [118]

Inability to name an object (Anomia). Inability to locate the words for writing (Agraphia). Problems with reading (Alexia). Difficulty with drawing objects. Difficulty in distinguishing left from right. Difficulty with doing mathematics (Dyscalculia). Lack of awareness of certain body parts and/or surrounding space that leads to difficulties in self-care (Apraxia). Inability to focus visual attention. Difficulties with eye and hand coordination. Target - Occipital Lobes: most posterior, at the back of the head: Defects in vision (Visual Field Cuts). Difficulty with locating objects in environment. Difficulty with identifying colors (Color Agnosia). Production of hallucinations. Visual illusions - inaccurately seeing objects. Word blindness - inability to recognize words. Difficulty in recognizing drawn objects. Inability to recognize the movement of object (Movement Agnosia). Difficulties with reading and writing. Target - Temporal Lobes: side of head above ears: Difficulty in recognizing faces (Prosopagnosia). Difficulty in understanding spoken words (Wernicke's Aphasia). Disturbance with selective attention to what we see and hear. Difficulty with identification of, and verbalization about objects. Short term memory loss. Interference with long term memory. Increased and decreased interest in sexual behavior. Inability to categorize objects (Categorization). Right lobe damage can cause persistent talking. Increased aggressive behavior. Target - Brain Stem: deep within the brain: Decreased vital capacity in breathing, important for speech. Difficulty swallowing food and water (Dysphagia). Difficulty with organization/perception of the environment. Problems with balance and movement. Dizziness and nausea (Vertigo). Sleeping difficulties (Insomnia, sleep apnea). Target - Cerebellum: base of the skull: Loss of ability to coordinate fine movements. Loss of ability to walk. Inability to reach out and grab objects. [119]

Tremors. Dizziness (Vertigo). Slurred speech (Scanning Speech). Inability to make rapid movements. Adapted from the following sites:

APPENDIX IV - John St. Clair Akwei vs.NSA, Ft. Meade, MD, USA Table of Contents Cover Page NSA Mission & Operations Communications Intelligence Signals Intelligence Domestic Intelligence Independently Operating Personnel Target Citizens NSA's Domestic Electronic Surveillance Network Signals Intelligence Remote Computer Tampering Detecting EMF Fields in Humans for Surveillance NSA Signals Intelligence Use of EMF Brain Stimulatlon Capabilities of NSA operatives using RNM NSA Signals Intelligence Electronic Brain Link Technology Table: An example of EMF Brain Stimulation NSA Techniques and Resources Remote RNM Devices Spotters and Walk-Bys in Metropolitan Areas Chemicals and Drugs Intelligence/Anti-Terrorist Equipment Resources Further Resources Cover Page Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449) John St.Clair Akwei vs. NSA Ft George G. Meade, MD My knowledge of the National Security Agency's structure, national security activities, proprietary technology,and covert operations to monitor individual citizens. [120]

Table of Contents The NSA's mission and the NSA's domestic Intelligence operation. Communications Intelligence (COMINT) Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960's. NSA technology is developed and implemented in secret from private corporations, academia, and the general public. Signals Intelligence (SIGINT) The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity. Domestic Intelligence (DOMINT) The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public. Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA's electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners. Individual citizens occasionally targeted for surveillance by independently operating NSA personnel. NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control [121]

and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health. Table of Contents NSA's domestic electronic surveillance network

As of the early 1960's the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA's Signals Intelligence (SIGINT) mission. The NSA's electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs. With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals). Signals Intelligence Remote Computer Tampering The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA's EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA's equipment can resonate PC circuits and change data in the PC's. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or antiterrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA's Signals Intelligence (SIGINT) mission. Detecting EMF Fields in Humans for Surveillance. [122]

A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S. Table of Contents NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950's, which included neurological research into "radiation" (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence," defined as "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation." Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. [123]

Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brainprogramming purposes. Table of Contents Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940's. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject's brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject's perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link. Table of Contents National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person's bioelectric fields. The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called "evoked potentials." Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials." The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's [124]

brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain's neural circuits. EMF Brain Stimulation can also change a person's brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation Motor Control Cortex 10 HZ Motor Impulse Co-ordination Auditory Cortex

[125]

15 HZ Sound which bypasses the ears Visual Cortex 25 HZ Images in the brain, bypassing the eyes Somatosensory Cortex 09 HZ Phantom Touch Sense Thought Center 20 HZ Imposed Subconscious Thoughts This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method. Table of Contents NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country.

[126]

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA. Remote RNM Devices a) NSA's RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance. b) [Information missing from original] c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare. Spotters and Walk-Bys in Metropolitan Areas a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel. b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA's thousands of subjects in public. c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject. Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines. a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology. Brief Overview of Proprietary U.S. Intelligence/Anti- Terrorist Equipment Mentioned. Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects. EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research). [127]

Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980's. Table of Contents Resources These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications: The Body Electric Electromagnetism and the Foundation of Life, by Robert Becker, M.D. p. 265/313/318. Monitoringeuroelectric information in the brain. E-M wave E.S.B. Cross Currents, by Robert Becker, M.D. p. 70, p. 78, p. 105/210/216/220/242/299/303 E-M ESB. Simulating auditory hallucinations. p. 274, "Remote computer tampering using the RF emissions from the logic board." Currents of Death by Paul Brodeur p. 27/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado. The Zapping of America by Paul Brodeur DoD E-M ESB Research, simulating auditory hallucinations. Of Mice, Men and Molecules, by John H. Heller. 1963. p. 110, Bioelectricity. probing the brain with E-M waves. The 3-Pound Universe, by Judith Hooper p. 29/132/137. CIA EEG research. EEG's for surveillance. In the Palaces or Memory, by George Johnson E-M emissions from the brain,the brain as an open electromagnetic circuit. The Puzzle Palace, by James Bamford Signals intelligence, most advanced computers in the early Sixties The U.S. Intelligence Community -Glossary terms at National Security Archives: Radiation intelligence - information from unintentionally emanated electromagnetic energy, excluding radioactive sources. The Search for the "Manchurian Candidate," by John Marks p. 327. Electrical or radio stimulation to the brain, CIA R&D in bioelectrics. Secret Agenda, by Jim Hougan National Security cult groups. Crines of the Intelligence Commununity. by Morton Halperin Surreptitious entries; intelligence agents running operations against government workers War in the Age of Intelligent Machines NSA computer supremacy, complete control of information [128]

Alternate Computers, by Time-Life Books Molecule Computers The Mind, by Richard Restak, M.D. p. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer. MedTech, by Lawrence Gallon Triggering events in the brain" direct to auditory cortex signals. Cyborg, by D.S. Halacy, Jr. (1965) Brain-to-computer link research contracts given out by the U.S. Govemment Psychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D. Dr. Cameron, psychic driving. ultraconceptual communications. Journey Into Madness: Ihe True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas p. 127/276/116, 168-69. Intelligence R & D. Delgado. Psychic driving with radio telemetry. Mind Manipulators, by Alan Scheflin and Edward M. Opton MKULTRA brain research for information gathering The Brain Changers, by Maya Pines. p. 19. Listening to brain E-M emissions. Table of Contents Further Resources These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications: Modern Bielectricity Inducing audio in the brain with e-m waves, DoD cover-up, E-M wave ESB. Remote EEGs. Magnetic Stimulation in Clinical Neuropsysiology by Sudhansu Chokroverty Magneto-Phosphenes. Images direct to the visual cortex. The Mind of Man by Nigel Calder U.S. Intelligence brain research Neuroelectric Society Conference - 1971 Audio direct to the brain with e-m waves, two waf remote EEG. Brain Control by Elliot S. Valenstein ESB control of individuals Towards Century 21 by C.S. Wallia p. 21. Brain Stimulation for direct to brain communication. Mind Wars by Ron McRae, associate of Jack Anderson [129]

p 62/106/136. Research into brain-to-brain electronic communications, remote neural e-m detection. Mind Tools by Rudy Rucker Brain tapping, communication with varying biomagnetic fields. p. 82 U.S. News and World Report 1/2/84 p. 88. e-m wave brain stimulation. Intelligence community high tech. Ear Magazine article on extremely low frequency radio emissions in the natural environment, radio emissions from the human body. City Paper article on FCC and NSA "complete radio spectrum" listening posts. 1/17/92. Frontiers in Science - 1958 - by Edward Hutchings, Jr. p. 48 Beyond Biofeedback - 1977 - by Elmer and Alyce Green p. 118 The Body Quantum by Fred Alan Wolf Cloning - A Biologist Reports by Robert Gilmore McKinnell Ethical review of cloning humans. Hoover's FBI by former agent William Turner p. 280. Routines of electronic surveillance work. July 20, 2019 by Arthur C. Clarke Lida, Neurophonics, Brain/Computer Link MegaBrain by Michael Hutchison p. 107/108/117/120/123. Brain stimulation with e-m waves. CIA research and information control. The Cult of Information by Theodore Rosnak - 1986 NSA Directive #145. Personal Files in Computers. Computer automated telephone tapping The Body Shop 1968 implantation of an electrode array on the visual cortex for video direct to the brain and other 1960s research into electronically triggering phosphenes in the brain, thus bypassing the eyes. Evoked Potentials by David Regan Decoding neuroelectric information in the brain __________________

APPENDIX V - Over 100 Ways Of Mind Control


By Marvin (Menachem-Mendl) Mark, Support Systems Specialist BEE, and a Director of the Zionist Organization of America - Israel District

1. 2. 3. 4.

Fooling the emotions. The emotions are quicker than the intellect. Emotions as a faulty reference. Fooling the intellect.

[130]

5. False premises. 6. Intellect as a faulty reference. 7. Co-dependency between Civilized and Anti Civilized people. The apparent need for peace can close the co-dependency. 8. Totalitarian type thinking. 9. Removing free choices, 10. Over generalization. 11. Over specialization. 12. Over Good. 13. Over Bad. 14. Use Mind or Body characteristics for selfish purposes. Lowered health flips mind. Lowered self-esteem flips health. 15. Controlling the norm. 16. Expected roles. 17. Expected behavior. 18. Projections. 19. Identifying with the aggressor. 20. Revolting against Bad. 21. Conditioning to do Bad behavior. Bad is defined as acting against equal rights to life, liberty or pursuit of happiness. 22. Impossible to do good behavior in a reverse bureaucracy. This results in politicians giving promotions to Bad behaving people instead of good behaving people. The good behaving people find themselves flipping to Bad behavior simply by trying too hard to do good behavior in the reverse bureaucracy. 23. Weakening body to help flip mind to Bad behavior in a reverse bureaucracy. 24. Presenting irritations to help flip mind to bad behavior in a reverse bureaucracy. Keep them on edge. 25. Presenting double free zones in a reverse bureaucracy such that permissive sex, homosexuality, or lesbianism are free, where blocks should be. The failure to cope in the reverse bureaucracy causes crashing self-esteem because of the vast difference from an early in life learned value system. This flips the victim to Bad behavior. The reverse bureaucracy allows for induced wrong double free zones by removing guilt, anxiety, and moral codes. An example of a double free zone is good sex in marriage and bad behavior sex in adultery. Both of these behaviors produce a feel good well-being as an emotion. 26. All of these mind control techniques are used in a reverse bureaucracy to flip a good behaving person to Bad behavior or to get him into a self-destruct mode. 27. A P'Kuach Nefesh Shield of David has sharp killing points and acts as a shield before killing. This shield also has killing power. Meanwhile Safeguarded Countermeasures as in King David's shield has two purposes. It safeguards against Anti Civilized practices before countering Anti Civilized people practices. Then, it allows Anti Civilized people to harm themselves unless they stop Anti Civilized behavior. 28. Intentional overwork. 29. Induced anxiety, frustration and fear. 30. Doing Bad behavior for the purpose of Good is a delusion from item 34 below. 31. Using contrary to Good behavior actions to cause failure to cope and loss of self-esteem, flips the mind to Bad behavior. 32. Switching emotions within intellect oriented people. 33. Switching reasoning within emotionally oriented people. 34. Non-Conventional Brainwashing. Induced Mind Enslavement by Anti Civilized people by inducing psychological-cultural Anthropology-Systems Configuration caused illnesses. These illnesses result in irrational capitulation to the Chef Mind Enslaver or irrational selfdestructive behavior. Anti Civilized people joining interdependent Civilized groups and behaving apparently civilized obtain total mind enslavement. The inter-dependency is formed by some interdependent need as Peace or Security. However, the Anti Civilized people's apparently

[131]

civilized behavior is actually Respect-Abuse, with built-in cognitive dissonance as a crazy maker. The crazy behavior is obtained when the Anti Civilized person suddenly switches from apparent Respect behavior to non-stop abusive behavior and never gets out of the Respect-Abuse behavior. Note that an almost mind enslavement trance can be obtained by the 107th technique. UnCivilized people doing the same as Anti Civilized people with one exception obtain it. The un-civilized people reset the trance by sometimes behaving civilized. Once the Anti Civilized people show their true Respect-Abuse behavior, they never get out of their Anti Civilized behavior. This maintains the total mind enslavement trance. Note too that partial mind enslavement can be obtained by inducing cognitive dissonance as in the 67th technique. The problem here is that the induced splits and induced hatred only works with small changes of respect or abuse in the applied Respect-Abuse behavior. While large changes of respect or abuse in the applied Respect-Abuse awaken the entranced victims from their cognitive dissonance trance. 35. Out of sight out of mind. 36. Use of unrevealed knowledge or out of the norm knowledge against the minds of the public. 37. Acting to obtain identification with a Bad behavior oriented context. 38. Triggering psychological defense mechanisms for mind control or mind enslavement purposes. 39. Induced regression for mind control purposes. 40. Triggering passive aggressiveness for mind control purposes. 41. Triggering psychological running for mind control purposes. 42. Induced going against own value system for mind control purposes. 43. Hand is quicker than the eye. 44. A priority switch from life orientation to pleasure orientation. 45. Pecking order syndrome. 46. Use of negative life flow (actions) and positive life pressures or negative life pressures and positive life flow (actions) to trick emotions. 47. Using unawareness by getting peopled to think with a missing part, whole or connection. 48. Multiple context mind switching techniques as in the old lady-young lady psychology experiment. 49. Suggestibility. 50. Persuasion. 51. Tricking hypnotized people to do bad behavior that is against their own value system. 52. Subterfuge. 53. Camouflage. 54. Subversion. 55. Naivet' 56. Take advantage of good in good behaving people. 57. Undermining. 58. Disconfirmation. 59. Deprivation. 60. Induced passions (SEX, LUST, GREED, HATE, JEALOUSY, BEGRUDGE). 61. Prejudice. 62. Convincing people that revolt is the way toward freedom when in fact it is Safeguarded LIFE oriented value for value relationships that is the way. 63. Against Life use of cultural anthropology. Fingering a person means different things in different cultures. The worst use of cultural anthropology, is coupling culture with psychological phenomena to cause total mind enslavement. 64. Presenting double bind scenarios that trigger mind flips within a reverse bureaucracy. 65. Leading the group as in leading the witness towards a specific subject. 66. Philosophical differences.

[132]

67. Induced schizophrenic type splitting by Respect-Abuse that has built-in cognitive dissonance. This is a major cause of so-called Causeless hatred and also of splitting groups so that they no longer consciously hear each other. 68. Induced focusing to miss the big picture, small picture, Etc. 69. Dissociating Society into parts to avoid equal rights to life, liberty and pursuit of happiness oriented pluralism. 70. Induced Idealism, religion, cult, belief, or action, which is not tied to equal rights to life, liberty and pursuit of happiness. 71. Using Decree to bypass bureaucracy to reach the people. 72. People are required to respect bureaucracy rules when attempting to reach government officials. 73. Special privileges for people doing favors for political leaders. Note that accessibility is one such privilege. That means that political leaders block people who require accessibility for self-actualization. This problem must be solved for democracy to work. 74. Planned culture differences between classes. 75. Induced hate of one group toward another group as a diversion. 76. Diversionary tactics. 77. Ostracizing for political purposes. 78. Gas Lighting. 79. Faked loyalty. 80. Undermined security. 81. Treachery. 82. Betrayal. 83. Faked patriotism. 84. Faked obeying of authority. 85. Faked group conformance. 86. False pride. 87. Outright lies. 88. Hidden lies, EXAMPLE: Arbeit Macht's Frei-Death Camps, as an Anti Civilized RespectAbuse crazy maker. 89. False front. 90. Confidence Game. 91. Dissent, Equality, Rebellion, isolated from Patriotism, Authority and Loyalty respectively. 92. Out of context. 93. Switching contexts. 94. Taking advantage of the fact that most good people do not know how to protect from Bad behavior that results from these mind control techniques, even if they knew of their existence. The failure to cope causes loss of self-esteem thereby resulting in a flip to Bad behavior, without conscious awareness it is happening. . 95. Taking advantage of the fact that most good behaving people do not know these mind control techniques. 96. Taking advantage of the fact absorption is overlooked. 97. Taking advantage of the fact that most good behaving people cannot see Bad behavior coming and therefore fail to protect from this Bad behavior. Anti Civilized Respect-Abuse with its built-in cognitive dissonance as a crazy maker causes the psychological blindness to Bad behavior. 98. Group advantages. 99. Presenting apparent double bind blocks resulting in failure to cope. 100. Conditioned ill being via negative emotions. This is countered by disconnecting negative emotions by using NOT WITH tactics. 101. Body's automatic response to how the self behaves. Look for behavior that is contrary to what the person says. 102. Taking advantage of MUSTS (Expectations). 103. Fooling the long-term memory control system. 104. Falling into one's own mind control trap.

[133]

105. Induced emotionality to cause failure to discern or discriminate. Induced hate works fine in this technique. The result is that Haters fail to discern or discriminate. 106. Induced Hate as a mind enslavement tool. This is obtained by getting the person to hate more than his self-rules allow. This causes repression and denial of his own worsethan-self-rules behavior. At that point, that person is mind enslaved. 107. Conventional Brainwashing.

APPENDIX VI - POLICE ACKNOWLEDGING THE EXISTENCE OF EMF HARASSMENT

APPENDIX VII - INSTITUTIONAL INTERDEPENDENCY

[134]

APPENDIX VIII- Extrajudicial punishment


From Wikipedia, the free encyclopedia
(Redirected from Extra-judicial) Jump to: navigation, search This article is missing citations or needs footnotes. Please help add inline citations to guard against copyright violations and factual inaccuracies. (August 2009)

Contents
[hide]

1 Nature 2 Around the world o 2.1 Previously [135]

2.2 Currently 3 Human rights groups 4 Data on human rights violation and state repression o 4.1 Global coverage o 4.2 Regional coverage o 4.3 Selective coverage of state repression o 4.4 Country coverage of state repression 5 See also 6 External links o 6.1 Monitoring organizations
o

7 References

Extrajudicial punishment is punishment by the state or some other official authority without the permission of a court or legal authority. The existence of extrajudicial punishment is considered proof that some governments will break their own legal code if deemed necessary.

[edit] Nature
Extrajudicial punishment is often a feature of politically repressive regimes, but even selfproclaimed or internationally recognized democracies have been known to use extrajudicial punishment under certain circumstances. Although the legal use of capital punishment is generally decreasing around the world, individuals or groups deemed threateningor even simply "undesirable"to a government may nevertheless be targeted for punishment by a regime or its representatives. Such actions typically happen quickly, with security forces acting on a covert basis, performed in such a way as to avoid a massive public outcry and/or international criticism that would reflect badly on the state. Sometimes, the killers are not members of the government, but rather sotto voce, or paid agents, authorized in their activity. For example, this may be done by a criminal organisation (The Cosa Nostra or an outlaw motorcycle club, for instance). Another possibility is for overtly uniformed security forces to punish a victim, but under circumstances that make it appear as self-defense, such as by planting recently-fired weapons near the body, or fabricating evidence suggesting suicide. In such cases, it can be difficult to prove that the perpetrators acted wrongly. Because of the dangers inherent in armed confrontation, even police or soldiers who might strongly prefer to take an enemy alive may still kill to protect themselves or civilians, and potentially cross the line into extrajudicial murder. Only in the most obvious cases, such as the Operation Flavius triple killing or the shooting of Jean Charles de Menezes will the authorities admit that "kill or capture" was replaced with "shoot on sight".

[136]

A "disappearance" occurs where someone who is believed to have been targeted for extrajudicial execution does not reappear alive. Their ultimate fate is thereafter unknown or never fully confirmed. Extrajudicial punishment may be planned and carried out by a particular branch of a state, without informing other branches, or even without having been ordered to commit such acts. Other branches sometimes tacitly approve of the punishment after the fact. They can also genuinely disagree with it, depending on the circumstances, especially when complex intragovernment or internal policy struggles also exist within a state's policymaking apparatus. In times of war, natural disaster, societal collapse, or in the absence of an established system of criminal justice, there may be increased incidences of extrajudicial punishment. In such circumstances, police or military personnel may be unofficially authorised to punish severely individuals involved in rioting, looting or other violent acts, especially if caught in flagrante delicto. This position is sometimes itself corrupted, resulting in the death of merely inconvenient persons, that is, relative innocents who are just in the wrong place at the wrong time.

[edit] Around the world


[edit] Previously
The NKVD troika and Special Council of the NKVD are examples from the history of the Soviet Union, where extrajudicial punishment "by administrative means" was part of the state policy. Other Soviet Bloc secret police organizations like the East German Stasi, Romanian Securitate and Polish ZOMO have also used it from time to time. Most Latin American dictatorships have regularly instituted extrajudicial killings of their enemies; for one of the better-known examples, see Operation Condor. [1] Some[citation needed] consider the killing of Black Panther Fred Hampton to have been an extrajudicial killing ordered by the United States government. Also, the US has been accused of exercising a covert prison system set up by the CIA in several countries, especially Egypt, to evade US jurisdiction.[2] The deaths of the leaders of the leftist urban guerilla group, the Red Army Faction's Ulrike Meinhof, Andreas Baader, Gudrun Ensslin, and Jan-Carl Raspe are regarded as extrajudicial killings by many, a theory partly based on the testimony of Irmgard Mller. During the apartheid years South Africa's security forces were also accused of using extrajudicial means to deal with their political opponents.[citation needed] After his release, Nelson Mandela would refer to these acts as proof of a Third Force. This was denied vehemently by the administration of F.W. de Klerk. Later the South African Truth and Reconciliation Commission, led by Archbishop Desmond Tutu would find that both military and police agencies such as the Civil Cooperation Bureau and C10 based at [137]

Vlakplaas were guilty of gross human rights violations. This led the International Criminal Court to declare apartheid a crime against humanity.

[edit] Currently
In the People's Republic of China a system of administrative detentions called Reeducation through labor (lodng jioyng , abbreviated lojio ) is used to detain persons for minor crimes such as petty theft, prostitution, and trafficking illegal drugs, as well as crimes against the state such as leading unregistered Chinese house churches, for periods of up to four years. In 2001, at least 5,000 Falun Gong adherents were thought to be detained in re-education camps. Re-education through labor sentences are given by police, rather than through the judicial system.

[edit] Human rights groups


Many human rights organisations like Amnesty International are campaigning against extrajudicial punishment.[3] [4] [5] [6] [7]

[edit] Data on human rights violation and state repression


There are currently a wide variety of databases available which attempt to measure, in a rigorous fashion exactly what governments do against those within their territorial jurisdiction. The list below was created and maintained by Prof. Christian Davenport at the University of Maryland. These efforts vary with regard to the particular form of human rights violation they are concerned with, the source employed for the data collection as well as the spatial and temporal domain of interest.

[edit] Global coverage


"CIRI Human Rights Data Project, 1981-2006". by Profs David Cingranelli and David Richards "Freedom in the World, 1976-2006" by Freedom House "Genocide & Politicide, 1955-2005" by Prof. Barbara Harff and the Political Instability Task Force "Political Terror Scale, 1976-2006 by Prof. Mark Gibney "Worldwide Atrocities Dataset, 1995-2007 by the Political Instability Task Force/KEDS "World Freedom Atlas, 1990-2006" - Mapping Program by Prof. Zachary Forest Johnson

[edit] Regional coverage

"European Protest and Coercion, 1980-1995" by Prof. Ron Francisco [138]

[edit] Selective coverage of state repression


"The Kansas Event Data System (KEDS)" by Profs. Deborah Misty Gerner and Phill Schrodt "Intranational Political Interactions Project, 1979-1992" by Profs. David Davis and Will Moore "Minorities at Risk, 1945-2006" by the Center for International Development and Conflict Management

[edit] Country coverage of state repression


"Guatemala, 1960-1996" by the International Center for Human Rights Research "Kosovo, 1999" by the Human Rights Data Analysis Group - Benetech "Rwanda, 1994" by Profs. Christian Davenport and Allan Stam - The Genodynamics Project "Sierra Leone, 1991-2000" by the Human Rights Data Analysis Group - Benetech "Timor-Leste, 1974-1999" by the Human Rights Data Analysis Group - Benetech "United States vs. the Black Panthers, 1967-1973" by Prof. Christian Davenport "Rashomon and Repression" "United States vs. the Republic of New Africa, 1968-1974 by Prof. Christian Davenport - "Out on the Inside"

[edit] See also


Extrajudicial detention Extrajudicial killing Arbitrary arrest and detention Assassination Death squad Extraordinary rendition Lynching Outlaw Human rights Summary execution State of emergency Martial law Posse Prison rape Selective assassination Summary justice Terrorism Torture Vigilante Iraq war The Troubles Camp X-ray [139]

[edit] External links


[edit] Monitoring organizations

Amnesty International Ansar Burney Trust (Pakistan and the Middle East) Human Rights Watch

[edit] References
1. ^ Predatory States. Operation Condor and Covert War in Latin America/When States Kill. Latin America, the U.S., and Technologies of Terror | Journal of Third World Studies | Find Articles at BNET.com 2. ^ CIA Holds Terror Suspects in Secret Prisons - washingtonpost.com 3. ^ Project on Extrajudicial Executions 4. ^ UN independent expert on extrajudicial killings urges action on reported incidents 5. ^ Document Information | Amnesty International 6. ^ Dickey: Iraq, Salvador and Death-Squad Democracy - Newsweek The War in Iraq - MSNBC.com 7. ^ Special Forces May Train Assassins, Kidnappers in Iraq - Newsweek The War in Iraq - MSNBC.com
APPENDIX IX- MEDICALIZING MENTAL HEALTH: A PHENOMENOLOGICAL ALTERNATIVE

[140]

[141]

[142]

[143]

[144]

[145]

[146]

[147]

[148]

[149]

[150]

[151]

[152]

APPENDIX X- INDICATIVE LITERATURE ON ANTIPSYCHIATRY

Prozac: PANACEA OR PANDORA?, by Ann Blake Tracy,

Ph.D.
Prozac: PANACEA OR PANDORA?, by Ann Blake Tracy, Ph.D., is the product of five years of research, and the study of the cases of approximately 1,000 patients on a long-term basis. The author holds a Doctorate in Biological Psychology, and heads the only support group in the state of Utah for those who have suffered [153]

adverse reactions to the SSRI drugs such as prozac, paxil, zoloft, luvox, effexor, serzone, anafranil & the diet pills - fenfluramine, fen-phen & redux. "Brain wave patterns indicate patients [taking psychiatric drugs such as prozac, paxil, zoloft, luvox, effexor, serzone, anafranil & the diet pills - fenfluramine, fen-phen & redux] are in a total anesthetic sleep state while appearing awake and functioning. Increasing serotonin - exactly what these drugs are designed to do - induces both nightmares and sleepwalk. Patients report over and over again that they have lived out their worst nightmare. And as with sleepwalk episodes, many have no recall or little recall of what they have done. Often someone must prove to them what they have done while they where under the influence of these drugs before they will believe it to be true. One patient stated that he could not detect during his two year use of Prozac what was real or what was a dream." "Although initially increasing concentration and energy, patients [on drugs such as prozac, paxil, zoloft, luvox, effexor, serzone, anafranil & the diet pills - fenfluramine, fen-phen & redux] report long-term effects of impaired memory and concentration and mental disability. Learn the reasons why large numbers of Prozac patients report FALSE memories of ABUSE. As disruption of serotonin alters perception, reality and dreams SEEM one and the same, creating a STRONGER hypersuggestable state than hypnotism." "Elevated levels of serotonin (5HT) - exactly the chemical these [SSRI] drugs do increase is the same chemical that LSD, PCP and other psychedelic drugs mimic in order to produce their hallucinogenic effects. Have these drugs turned the 90's upside down for us to relive the 60's? Learn that elevated levels of serotonin are found in schizophrenia, mood disorders, organic brain disease, Alzheimer's, anorexia, autism, bronchial constriction, etc." "As our latest panacea, Prozac and its analogues [such as paxil, zoloft, luvox, effexor, serzone, anafranil & the diet pills - fenfluramine, fen-phen & redux] are being prescribed for everything from headaches and flu to acne and home sickness. Yet, according to FDA spokespersons, there have been more adverse reaction reports on Prozac than any other medical product. As of October, 1993, a total of 28,623 complaints of adverse side effects had been filed with the FDA, including 1,885 suicide attempts and 1,349 deaths. The FDA's general rule of thumb for estimating the true figures is that these reports represent only one to ten percent of the actual figures. This would indicate the staggering amount of 286,230 - 2,862,300 actual adverse reactions, 18,850 - 188,500 actual suicide attempts and 13,490 - 134,900 actual deaths attributed to Prozac by the end of 1993."

Toxic Psychiatry, by Peter R. Breggin, M.D.


In Toxic Psychiatry, Peter R. Breggin, M.D. exposes the hype and false promises surrounding psychiatry, and shows how dangerous and brain-damaging psychiatric drugs are. He demonstrates that: psychiatric drugs such as ssri's, prozac, paxil, zoloft, luvox, effexor, serzone, anafranil, fenfluramine, fen-phen and redux are spreading an epidemic of long-term, permanent brain damage; that mental illnesses have actually never been proven to be [154]

genetic or even physical in origin, and that millions of Americans are being incorrectly labeled with medical diagnosis and treated with mind altering drugs, rather than being patiently listened to, understood, and helped. "Much of today's psychiatric science is based on wish, myth, and politics. Breggin addresses this self-serving pseudoscience head-on." - Loren Mosher, M.D., Former Chief of the Center for Studies of Schizophrenia, The National Institute of Mental Health.

The Myth of Mental Illness, By Thomas S. Szasz, M.D.


Thomas S. Szasz, M.D. demonstrates that what is nowadays accepted as mental illness is whatever psychiatrists say it isand that psychiatry has-with increasing zeal, defined more and more kinds of behavior as "mental illness." What is termed "mental illness" is in fact behavior disapproved of by the speaker. This is a stigmatizing moral judgment, not a medical diagnosis. If there is no mental illness, there can be no "treatment" or "cure" for it. When personal problems are seen for what they are-helplessness and fear, envy and rage, and the many other miseries that beset man-and are not masked under the guise of illness, being "mentally ill" ceases to be a refuge from personal accountability, and the individual's responsibility for his own conduct can then be faced. "It is customary to define psychiatry as a medical specialty concerned with the study, diagnosis, and treatment of mental illness. This is a worthless and misleading definition. Mental illness is a myth. Psychiatrists are not concerned with mental illnesses and their treatments. In actual practice they deal with personal, social, and ethical problems in living."

A Dose of Sanity, by Sydney Walker III, M.D.


If you are currently being treated for depression, anxiety or panic disorder, attention deficit disorder, a sleeping disorder, or any of a wide array of common behavioral disorders, this book could save your life. If you are being given psychiatric SSRI drugs such as prozac, paxil, zoloft, luvox, effexor, serzone, anafranil, fenfluramine, fen-phen & redux, you must read this book. In A Dose of Sanity, Sydney Walker III, M.D. takes us inside the big business of contemporary psychiatry and reveals how, by sacrificing sound medical principals in favor of labeling-by-convenience and brain-damaging quick-fixes like prozac, paxil, zoloft, luvox, effexor, serzone, anafranil, fenfluramine, fen-phen, redux, and [155]

ritalin, psychiatrists cause untold suffering and destroy the physical and mental health of millions of people. Reading like a detective novel, A Dose of Sanity, tells the story of dozens of men and women, many of whom suffered needlessly for years, simply for lack of a sound medical diagnosis. You'll meet the concert musician whose lifelong bouts with "psychosis" were actually due to undiagnosed typhus; the widow who was treated for "panic attacks" that turned out to be a thyroid dysfunction; the "hyperactive" boy whose symptoms were caused by exposure to carbon monoxide; and many others saved by the intervention of Dr. Walker and like-minded colleagues.

They Say You're Crazy, By Paula J. Caplan, Ph.D.


A shocking expose of the process by which the mental-health elite judges us all. How are decisions made about who is normal? Why are people being given psychiatric drugs such as ssri's, prozac, paxil, zoloft, luvox, effexor, serzone, anafranil, fenfluramine, fen-phen and redux? As a former consultant to those who construct the "bible of the mental health professions," the DSM (Diagnostic and Statistical Manual of Mental Disorders), Paula Caplan, Ph.D., offers an insider's look at the process by which decisions about abnormality are made. A longtime specialist in teaching and writing about research methods, Caplan assesses the astonishing extent to which scientific methods and evidence are disregarded as the DSM is developed and revised. The DSM is the guide that most psychiatrists, therapists, and social workers use to determine not only what care will be covered by insurers, but who will be hospitalized against their will and who may be judged incompetent or too disturbed to rear their own children. On a more day-to-day level, the DSM determines how millions of people feel about themselves once they are labeled psychologically "abnormal." And yet this powerful manual, recently released in its fourth edition, is constructed by a tiny clique in the powerful psychiatric establishment, dominated by conservative white males. In They Say You're Crazy, Paula Caplan demonstrated that much of what are labeled "mental disorders" are actually common life problems or the effects of social injustice-and not signs of illness. "Paula Caplan has written a lively, marvelous insider's story of how psychiatric diagnoses are invented-how subjective, political, and personal agendas are dressed up in the lab coats of science and offered to the public as 'truth'. Mental health professionals need to read this book to cure themselves of Delusional Scientific Diagnosing Disorder, and the public needs to read it for self protection.", Carol Tavris, Ph.D.

Psychiatry - The Ultimate Betrayal, By Bruce


[156]

Wiseman for the Citizens Commission on Human Rights


There are reasons why today's high school graduate cannot read, why our elderly are dying prematurely, why racial conflict persists and families are shattering. Something penetrated every aspect of our lives -- our schools, our courts, our homes - doing so without most of us even knowing it. Authoritative and compelling, Psychiatry - The Ultimate Betrayal unmasks those who have betrayed in the name of help. It tracks the destructive bent compelling psychiatry, right from its historical beginnings. It lays bare psychiatry's web of influence, but most importantly lays out a plan of action we must take to survive as a society.

Cruel Compassion, By Thomas Szasz, M.D.


"The truth is that after treatment with neuroleptic drugs, mental patients tend to be sicker and more disabled than before. Many exhibit the toxic effects of the drugs, suffering from a disfiguring neurological disturbance called 'tardive dyskinesia.'" Millions of Americans, diagnosed as mentally ill, are drugged with ssri's, prozac, paxil, zoloft, luvox, effexor, serzone, anafranil, fenfluramine, fen-phen and redux and are confined by doctors for noncriminal conduct, go legally unpunished for the crimes they commit, and are supported by the state-not because they are sick, but because they are unproductive, unwanted, and "mentally ill". While psychiatrists are obsessed with the false ideas that misbehavior is a medical disorder and that the duty of the state is to protect adults from themselves, we have replaced criminal-punitive sentences with civil-therapeutic "programs." The result is the relentless loss of individual liberty, erosion of personal responsibility, and destruction of the security or persons and property. Few contemporary thinkers have done more than Dr. Szasz to expose the myths and misconceptions surrounding insanity and the practice of psychiatry.

Thomas Szasz: Primary Values and Major Contentions, By Thomas S. Szasz, M.D.
In the Myth of Mental Illness Thomas S. Szasz, M.D. exposed and critically evaluated the cherished assumptions and misconceptions at the heart of psychiatry. In Thomas Szasz: Primary Values and Major Contentions he successfully isolates his basic claims and the arguments he offers in their behalf. "By historical and traditional criteria, 'mental illness' is not an illness but a bogus invention that allows behavior, any behavior, to be categorized as 'disease.' Psychiatry is conventionally defined as a medical specialty concerned with the diagnosis and treatment [157]

of mental diseases. I submit that this definition, which is widely accepted, places psychiatry in the company of alchemy and astronomy and commits to the category of pseudoscience. The reason for this is that there is no such thing as 'mental illness'." "In the history of science, thinking in terms of entities has always tended to precede thinking in terms of processes. Alchemists and astrologers thus spoke of mysterious substances and concealed their methods from public scrutiny. Psychiatrists have similarly persisted in speaking of mysterious maladies and have continued to refrain from disclosing fully and frankly what they do." - Thomas Szasz M.D., Primary Values and Major Contentions

The Death of Psychiatry, By E. Fuller Torrey, M.D.


For years psychiatry fought for acceptance as a medical specialty, and since the 19th century it has emerged to hold that position. Dr. Torrey shows why this was a dreadful error, why psychiatry in its present form is destructive and why it must be eliminated. "Diseases are something we have, behavior is something we do." On this premise, Dr. Torrey develops his theory that the vast majority of people whom we call "mentally ill" have problems of living rather than physical disabilities. They are not "sick" and therefore must not be "warehoused" and "treated" on the basis of a medical model. Buttressing his work with interesting case histories, Torrey proposes that the few people with true brain diseases be given back to neurology and that the remainder of people who have problems of living should be taught how to handle their problems and given a system of social supports to help them.

Talking Back to Prozac, By Peter R. Breggin, M.D.


Millions of Americans are on Prozac to treat everything from depression to shyness, obesity, PMS, and back pain. Patients have been told Prozac has few, or no, side effects. But what is the dark side of Prozac? Find out: What Prozac's label won't tell you. The truth about Prozac's serious and lifethreatening reactions. Cases of sexual dysfunction from Prozac. If Prozac can lead to violence, murder, and suicide. The panic and anxiety Prozac can cause--not cure. What prozac has in common with cocaine and amphetamines. [158]

"There is unquestionably a great deal of truth in what Breggin writes. Let the pillswallower beware." - The Los Angeles Times.

Psychiatric Drugs: Hazards to the Brain, by Peter Breggin, M.D.


A scientific analysis of the permanent brain-disabling effects of psychiatric drugs. In-depth analysis is done of neuroleptics and tricyclic antidepressants. Chapter 1: Drug Myths and Their Tragic Consequences Chapter 2: Disabling the Mind with the Major Tranquilizers Chapter 3: Physical Pain, Mental Anguish, and Psychosis Induced by the Major Tranquilizers Chapter 4: The Alleged Therapeutic Effects of the

Major Tranquilizers Chapter 5: Neurotoxicity of the Major Tranquilizers Chapter 6: Parkinsonism and Tardive Dyskinesia as Aspects of Brain Disabling Therapy Chapter 7: Lobotomy, Dementia and Psychosis Produced by the Major Tranquilizers

Beyond Bedlam, By Jeanine Grobe


In Beyond Bedlam, more than two dozen contemporary women write about their experiences with psychiatry: how they were mistreated, how they escaped, how they live now, and what can be done to change the system that abused them. Their voices rise above the clamor of psychiatric jargon, "treatment", and "therapy." "Society blindly regards psychiatry as safe medicine. I found out that the psychiatric institution was not about healing but about the oppression of the human spirit. It taught me to accept being terrorized, tortured, and traumatized because these were 'medicine' and I was 'sick'."

The Tranquilizing of America: Pill Popping and the American Way of Life, By Richard Hughes and Robert Brewin
Dr. Louis Gottschalk states, "We have enough data here that certain of the benzodiazepines [sedatives and tranquilizers] [159]

are capable, after a single dose, of significantly disrupting certain kinds of cognitive and/or intellectual functions. Furthermore, this phenomenon outlasts the antianxiety effect of these drugs. "..People are seeking an easy way out, looking for shortcuts on a path of life that has none; in the end not only will they be disappointed but they will end up by diminishing their humanness, the essence that separates man from animals."

The Myth of the Hyperactive Child & Other Means of Child Control, By Peter Schrag and Diane Divoky
Millions of children have been "diagnosed" as "hyperactive" or having "attention deficit disorder" and millions are now taking amphetamine-type medication, in many cases by order of school officials. Millions of other children have been labeled predelinquent, found to have "deviant" tendencies, or said to exhibit "maladaptive behavior." Can these illnesses be in fact so widespread, or is this a new way the schools have found to deal with healthy children who seem, to parents or teachers, to present some form of difficulty? This shocking and meticulously documented book covers all aspects of the rapidly spreading ideology of "early intervention," demonstrates how common problems become medical ones, and exposes the shoddy research that underlies those practices. Examining the "scientific" literature as well as searching out the underlying causes of this new and frightening trend, Peter Schrag and Diane Divoky document in telling detail the ways in which old-fashioned punishment and control are being replaced by new forms of medical and social treatment, teaching the younger generation that it must trust the state and its new "science" to define and manage the ways it grows up. The information and ideas they examine are critically important and profoundly disturbing.

The Myth of the A.D.D. Child, by Thomas Armstrong, Ph.D.


The Myth of the A.D.D. Child squarely challenges the mislabeling of millions of children as A.D.D., and questions the overuse of powerful mind-altering drugs in treating children's hyperactivity. Not long ago, children who behaved in certain ways were called "bundles of energy", "daydreamers," or "fireballs." Now they're considered "hyperactive," "distractible," or "impulsive"victims of the ubiquitous Attention Deficit Disorder. Tragically, such labeling can follow a child through life. Worse, the mind-altering drugs prescribed for A.D.D. are [160]

unnecessary-and they are harmful.

And They Call It Help, By Louise Armstong


From the best-selling author of Kiss Daddy Goodnight, comes this investigative journey into a multibillion-dollar industry that imprisons America's children-for profit. Here and now, every year, thousands of kids are transported to a locked world where strange rules prevail and language is without meaning. Those in authority are empowered to administer brain-damaging drugs to children, forcibly restrain them, and lock them in isolation. Yet it is the children who are told over and over that they are the weird ones, the psychiatrically incorrect.

Other Links
The Life Extension Foundation International Advocates for Health Freedom Yahoo: Health: Alternative Medicine Yahoo: Business and Economy: Companies: Health: Alternative Yahoo: Business and Economy: Companies: Books: Health: Titles: Alternative Medicine Thomas A. Dorman, M.D. - Toxic Psychiatry Fact, Fiction, and Fraud in Modern Medicine John M. Friedberg, M.D., Board Certified Neurologist Support Coalition&Dendron News Center for the Study of Psychiatry and Psychology The Merrow Report - Attention Deficit Disorder Pseudoscience and Psychobabble Page
The DSM Hoax PSYCHIATRY'S DIAGNOSTIC SYSTEM The Diagnostic and Statistical Manual of Mental Disorders (DSM) is psychiatrys billing bible of so-called mental disorders 2 The American Psychiatric Associations Diagnostic and Statistical Manual of Mental Disorders (DSM) is psychiatrys billing bible of so-called mental disorders. With the DSM, psychiatry has taken countless aspects of human behavior and reclassified them as a mental illness simply by adding the term disorder onto them. While even key DSM contributors admit that there is no scientific/medical validity to the disorders, the

[161]

DSM nonetheless serves as a diagnostic tool, not only for individual treatment, but also for child custody disputes, discrimination cases, court testimony, education and more. As the diagnoses completely lack scientific criteria, anyone can be labeled mentally ill, and subjected to dangerous and life threatening treatments based solely on opinion. Dr. Thomas Dorman, an internist and member of the Royal College of Physicians of the United Kingdom and Fellow of the Royal College of Physicians of Canada, wrote, In short, the whole business of creating psychiatric categories of disease, formalizing them with consensus, and subsequently ascribing diagnostic codes to them, which in turn leads to their use for insurance billing, is nothing but an extended racket furnishing psychiatry a pseudoscientific aura. The perpetrators are, of course, feeding at the public trough. Professors Herb Kutchins and Stuart A. Kirk, authors of Making Us Crazy, conclude: The public at large may gain false comfort from a diagnostic psychiatric manual that encourages belief in the illusion that the harshness, brutality and pain in their lives and in their communities can be explained by a psychiatric label and eradicated by a pill. Certainly, there are plenty of problems that we all have and a myriad of peculiar ways that we struggle...to cope with them. But could life be any different? Far too often, the psychiatric bible has been making us crazywhen we are just human. While psychiatrists have managed for years to make it look, feel, and sound convincingly scientific, their diagnoses are being 3 seen for the dangerous frauds that they really are. Far more than just marketing tools or harmless billing codes for treatment, in the hands of psychiatrists these manuals can literally be used to decide the fate of any individual. Experts Debunk the DSM The scientific validity of the Diagnostic and Statistical Manual of Mental Disorders (DSM) has come under increasing attack from medical professionals and scientific experts such as Herb Kutchins of California State University and Stuart A. Kirk of UCLA, who found that there is ample reason to conclude that the latest versions of DSM as a clinical tool are unreliable and therefore of questionable validity as a classification system. Often tagged junk science, according to an international poll of mental health experts conducted in England in 2001, the DSM-IV was voted one of the 10 worst psychiatric papers of the millennium. The truth is when we try to fit psychiatry into the definition of a true science, it fails the test. The lack of science behind the DSM gives a clear idea of why it has earned such critics as the following small sample. Loren Mosher, M.D., Clinical Professor of Psychiatry: DSM-IV is the fabrication upon which psychiatry seeks acceptance by medicine in general. Insiders know it is more a political than scientific document... DSM-IV has become a bible and a money making bestsellerits major failings notwithstanding. It

[162]

confines and defines practice, some take it seriously, others more realistically. And, It is the way to get paid. Diagnostic reliability is easy to attain for research projects. The issue is what do the categories tell us? Do they in fact accurately represent the person with a problem? They dont, and cant, because there are no external validating criteria for psychiatric diagnoses. There is neither a 4 blood test nor specific anatomic lesions for any major psychiatric disorder. Margaret Hagen, author of Whores Of The Court, summarily dismisses the DSM: Given their farcical empirical procedures for arriving at new disorders with their associated symptoms lists, where does the American Psychiatric Association get off claiming a scientific, research-based foundation for its diagnostic manual? This is nothing more than science by decree. They say it is science, so it is. Dr. Thomas Dorman, internist and member of the Royal College of Physicians of the United Kingdom: In short, the whole business of creating psychiatric categories of disease, formalizing them with consensus, and subsequently ascribing diagnostic codes to them, which in turn leads to their use for insurance billing, is nothing but an extended racket furnishing psychiatry a pseudo-scientific aura. The perpetrators are, of course, feeding at the public trough. Jeffrey A. Schaler, Ph.D.: The notion of scientific validity, though not an act, is related to fraud. Validity refers to the extent to which something represents or measures what it purports to represent or measure. When diagnostic measures do not represent what they purport to represent, we say that the measures lack validity. If a business transaction or trade rested on such a lack of validity, we might say that the lack of validity was instrumental in a commitment of fraud. The Diagnostic and Statistical Manual (DSM-IV) published by the American Psychiatric Association and used by licensed psychotherapists throughout the country is notorious for low scientific validity. Yet it is instrumental in securing insurance reimbursement for psychotherapy services.... Herb Kutchins of California State University, Sacramento, and Stuart A. Kirk of the University of California, Los Angeles, authors of Making Us Crazy: The Psychiatric Bible and the Creation of Mental Disorders: 5 The developers of DSM assume that if a group of psychiatrists agree on a list of atypical [new] behaviors, the behaviors constitute a valid mental disorder. Using this approach, creating mental disorders can become a parlor game in which clusters of all kinds of behaviors (i.e. syndromes) can be added to the manual. there is ample reason to conclude that the latest versions of DSM as a clinical tool are unreliable and therefore of questionable validity as a classification system. There are indeed many illusions about DSM and very strong needs among its developers to believe that their dreams of scientific excellence and utility have come true. The bitter medicine is that DSM has unsuccessfully attempted to

[163]

medicalize too many human troubles. [DSM] cannot be used to distinguish mental disorders from other human problems. In practical terms, this means that many people who do not have any mental disorder (although they may have other difficulties) will be inappropriately labeled as mentally ill and those who have a mental disorder will not have it recognizedIf the unreliability of diagnosis were widely recognized and if there were no scientific patina [surface appearance] to it, the use of everyday behaviors as indicators of mental disorder would be more rigorously questioned by the public. The illusion that psychiatrists are in agreement when making diagnoses creates the appearance of a united professional consensus. Professor Edward Shorter, author of A History of Psychiatry: Rather than heading off into the brave new world of science, DSM-IV-style psychiatry seemed in some ways to be heading out into the desert. 6 Thomas Szasz, M.D., Professor of Psychiatry Emeritus: The Internationally renowned psychiatrist, Dr. Thomas Szasz, writes, The ostensible validity of DSM is reinforced by psychiatrys claim that mental illnesses are brain diseasesa claim supposedly based on recent discoveries in brain imaging techniques and pharmacological agents for treatment. This is not true. He also says, There is no blood or other biological test to ascertain the presence of a mental illness, as there is for most bodily diseases. If such a test were developed, then the condition would cease to be a mental illness and would be classified, instead, as a symptom of a bodily disease. Dr. Sydney Walker, III, psychiatrist, neurologist: [The DSM] has led to the unnecessary drugging of millions of American children who could be diagnosed, treated, and cured without the use of toxic and potentially lethal medications. The nonscientific approach used to create DSM leads to irrational and constantly changing diagnostic criteria: a patient might be perfectly normal according to one version of DSM and mentally ill by the standards of the next. (For instance, narcissistic personality disorderused to describe vain people who are self-centered and frequently take advantage of others was a DSM diagnosis until 1968. It was eliminated from the version used between 1968 and 1980, when it was reinstated. Thus, a self-centered, vain person was mentally ill before 1968, normal for the next twelve years, and then mentally ill again after 1980.) 7 Dr. Harold Pincus, Vice Chairman of the DSM-IV task force admitted, There has never been any criterion that psychiatric diagnoses require a demonstrated biological etiology (cause). Paul R. McHugh, Professor of Psychiatry at Johns Hopkins University School of Medicine and psychiatrist-in-chief at the Johns Hopkins Hospital in Baltimore: ... In the absence of validating conceptions like the six mechanisms of disease in internal medicine, American psychiatry has turned to committees of experts to define mental disorder. Membership on such committees is a mater of

[164]

ones reputation in the APAwhich means that those chosen can confidently be expected to manifest not only a requisite degree of psychiatric competence but, perhaps more crucially, some talent for diplomacy and self-promotion. The new DSM approach of using experts and descriptive criteria in identifying psychiatric diseases has encouraged a productive industry. If you can describe it, you can name it; and if you can name it, then you can claim it exists as a distinct entity with, eventually, a direct treatment tied to it. Proposals for new psychiatric disorders have multiplied so feverishly that the DSM itself has grown from a mere 119 pages in 1968 to 886 in the latest edition; a new and enlarged edition, DSM-V, is already in the planning stages. Embedded within these hundreds of pages are some categories...that are dubious, in the sense that they are more like the normal responses of sensitive people than psychiatric entities; and some that are purely the inventions of their proponents. Paul Genova, M.D., writing in Psychiatric Times, said: the DSM diagnostic system has outlived its usefulness by about two decades. It should be abandoned, not revised. Psychiatrist Matthew Dumont: The humility and the arrogance in the prose are almost indistinguishable, frolicking like puppies at play. They say: ...while this manual provides a classification of mental disorder...no definition adequately specifies precise 8 boundaries for the concept... [APA, 1987]...They go on to say: ...there is no assumption that each mental disorder is a discrete entity with sharp boundaries between it and other mental disorders or between it and no mental disorder [APA, 1987]. Psychologist Renee Garfinkel, a staff member of the American Psychological Association, said of the DSM-III-R work group: The low level of intellectual effort was shocking. Diagnoses were developed by majority vote on the level we would use to choose a restaurant. You feel like Italian, I feel like Chinese, so lets go to a cafeteria. Then its typed into the computer. David Healy, psychiatrist, director of the North Wales Department of Psychological Medicine and author of The AntiDepressant Era: There must inevitably be a struggle, or a dialectical process, to determine the meaning of physical symptoms and where the boundaries of health and disease lie. J. Allan Hobson and Jonathan A. Leonard, authors of Out of Its Mind, Psychiatry in Crisis, A Call For Reform: ...DSM-IVs authoritative status and detailed nature tends to promote the idea that rote diagnosis and pill-pushing are acceptable. Psychiatrist Al Parides: DSM is a masterpiece of political maneuvering. He also observed that what they have done is medicalize many problems that dont have demonstrable, biological causes. Elliot S. Valenstein, biopsychologist, author of Blaming the Brain: DSM-IV is not an exciting document. It is purely descriptive and presents no new scientific insights or any theories about what causes the many mental disorders it lists. Lawrence Diller, M.D., author of Running on Ritalin: [The] search for a biological marker is doomed from the outset because of the contradictions and ambiguities of the diagnostic construct of ADHD as defined by the DSMI liken the efforts

[165]

to discover a markerto the search for the Holy Grail. 9 There's No Science to DSM Arrived at by what psychiatrists call consensus, which in reality is no more scientific or sophisticated than a vote of insider hands, the DSM-IV contains a record 374 so-called mental disorders. Perhaps the best example of psychiatrys scientific pretension in creating and augmenting the DSM is the manner in which new illnesses are added to it. Psychiatrists literally vote on what constitutes a mental illness or disorder by raising their hands at a conference. There is no medical evidence presented, no brain scans, blood tests or any other medical criteria needed to establish a disorder in the DSM; it is 100% subjective. A psychologist attending a DSM hearing noted, The low level of intellectual effort was shocking. Diagnoses were developed by majority vote on the level we would use to choose a restaurant. You feel like Italian, I feel like Chinese, so lets go to the cafeteria. Then its typed into a computer. In the absence of objective, scientific evidence, psychiatry has decreed the following to be mental illnesses: Phonological Disorder Caffeine Related Disorder Conduct Disorder Mathematics Disorder Nicotine Use or Withdrawal Disorder Non Compliance With Treatment Disorder Separation Anxiety Disorder Sibling Rivalry Disorder Phase of life problem Sexual abuse of a child problem and the all-encompassing Unspecified mental disorder 10 The "Chemical Imbalance" Hoax From cradle to the grave, we are bombarded with information pushing us towards a chemical fix. But let's take a closer look at some very important aspects of this new psychoactive, drugcentered philosophy. Psychiatrists claim that a person needs a drug to combat their chemical imbalance in the brain which is causing a person's mental disorder. However, the concept that a brain-based, chemical imbalance underlies mental illness is false. While popularized by heavy public marketing, it is simply psychiatric wishful thinking. As with all of psychiatry's disease models, it has been thoroughly discredited by researchers. Diabetes is a biochemical imbalance. However, as Harvard psychiatrist Joseph Glenmullen states, the definitive test and biochemical imbalance is a high blood sugar balance level. Treatment in severe cases is insulin injections, which restore sugar balance. The symptoms clear and retest shows the blood sugar is normal. Nothing like a sodium imbalance or blood sugar imbalance exists for depression or any other psychiatric syndrome. In 1996, psychiatrist David Kaiser said, ...modern psychiatry has yet to convincingly prove the genetic/biologic cause of any

[166]

single mental illness...Patients [have] been diagnosed with 'chemical imbalances' despite the fact that no test exists to support such a claim, and...there is no real conception of what a correct chemical balance would look like. Today's brain imagery photos, said to prove mental illnesses are physical diseases, are deeply flawed. Indeed, prescribed psychotropic drugs most likely cause the changes seen in the brain. Steven Hyman, director of the National Institute of Mental Health, admits that indiscriminate use of such brain scans produce pretty but inconsequential pictures of the brain. 11 Elliot Valenstein, Ph.D., author of Blaming the Brain, is unequivocal: [T]here are no tests available for assessing the chemical status of a living person's brain. No biochemical, anatomical, or functional signs have been found that reliably distinguish the brains of mental patients. According to Valenstein, The theories are held on to not only because there is nothing else to take their place, but also because they are useful in promoting drug treatment.

CHAPTER 3 The epistemological/ontological/pragmatic framework for making sense of targeting in the context of the new communitarian ethos enforced through agenda 21

[167]

Attempts have already been made by targeted individuals at synthesizing their experiences under particular experiential categories in an attempt to descriptively encapsulate their lived reality. What is still lacking in the already vast literature, mainly consisting of individual stories and sparse allegations on the particular instances of the silent massacre phenomenon, is a set of interpretive principles that would enhance sense making and would enable outsiders to recognize the implications of this phenomenon both for the individuals concerned as well as for what is revealed through these actions about the members of the community that is carrying them out. The need for approaching the silent massacre phenomenon through an epistemological interpretive model55 with the employment of an acute abductive rationale surfaces in the face of its novelty and the new ethos (coupled with a new lingo and new causal patterns among social actors and actions) predicated thereupon. 3.1 Habermas theory of pragmatics of social interaction: Community of rational/disinterested or irrational/interested agents and by implication of social networks as constellations of social agents? Talking non-sense may be of limited truth, but of amplified relational56 validity Why should we assume phenomenology and its offshoots as the main interpretive framework for making sense of and mapping the targeting phenomenon? It is no accident that the most influential constitutive social theory in contemporary social sociology is based on the work of Husserl. For Husserls phenomenology is better suited than Kants transcendental philosophy to expanding the constitutive theory of knowledge into a theory of society. First, Husserl differs from Kant through his recourse to the lifeworld as the level in which the theory of knowledge is grounded. Second, he uses the concept of constitution in a descriptive manner .57 The quality of a perceived phenomenon or its being perceived as such and such is a product of meaningful negotiation on behalf of community members that predicate qualia of a phenomenon Intersubjectively communalized experience is expressed in symbolic systems, especially natural language , in which accumulated knowledge is pregiven to the individual subject as cultural tradition58 Thus, it is within the provinces of a community (either scientific or lay) that agreement as to which qualia will be ascribed to a phenomenon is reached, either a priori, based on the uncritical endorsement of a prephenomenological giveness or a posteriori , as an outcome of synthesizing information into concepts of empirical understanding. Husserl makes us realize that Kant naively took as his starting point the object domain of physics and failed to see that scientific theories of this type are produced in a community of investigators (Peirce)59 In a communitarian setting60 or regime, reduction of the decision making processes that are socially embedded to natural processes constitutes an attempt to mask power plays through a
55

Monton & Van Fraasen, Constructive empiricism and modal nominalism, A theory is empirically adequate iff all actual observable phenomena are directly represented by certain parts (empirical substrates) of some model of the theory" "when it is true it is because a conditional in the contextual background is logically true" 56 A system can be fully understood only by analyzing its parts in the context of the whole, when attention is shifted from objects to the networks of relationships among objects , Ludwig von Bertalanffys General Systems Theory.
57 58

Jurgen Habermas, The pragmatics of social interaction ibid 59 Ibid. THE ATTEMPT NOT ONLY TO DISCOVER NATURAL OR BIOLOGICAL CORRELATES TO SOCIAL PHENOMENA BUT TO REDUCE THE LATTER TO THE FORMER FAVORS SOCIAL DARWINISM AND SOCIAL DETERMINISM , WHICH IS ACCEPTABLE ONLY IN TOTALITARIAN REGIMES AND SCIENTIFIC TEAMS WORKING IN FAVOR OF SUCH REGIMES
60

See Participatory governance: hope or danger for democracy? A case study of Local Agenda 21

[Germany].GEISSEL, Brigitte from a series of 40 articles available on the threats (and rightly so) of co-

[168]

transcendental leap of faith. Social phenomenology and its offshoots allows us to discern how agreement about the lifeworld is reached both among members of scientific and lay communities, thus its scope is also metaepistemic. In legal terms, it also allows us to discern and justify the admissibility of an expansionist approach in discerning remote causes in a criminal activity. Every society that we conceive of as a meaningfully structured system of life has an immanent relation to truth. For the reality of meaning structures is based on the peculiar facticity of claims to validity61 This cryptic remark marks a distinction between disinterested truth claims or claims about the truth value of phenomena and pragmatic truth claims, hence being open to legitimacy questions. Husserl introduces his theory of truth without further justification. He considers it simply the principle of all principles that everything originally offered to us in intuition is to be accepted simply as what it is presented as being.. However, the lifeworld as a whole is also posited . For the meaning structures that constitute the lifeworld exist only in the manifold of validity claims inherent in them62. THIS IS EQUIVALENT TO THE WELL KNOWN FACT IN LAW THAT THERE IS NO DIFFERENCE BETWEEN AXIOLOGICAL JUDGMENTS AND CLAIMS TO TRUTH. But what kind of ontological community conditions agreement among social actors on the features of phenomena or what is it that I know pre phenomenologically about another that allows me to discern sameness to myself? Husserl tries to make the case that the meaning of the appresentation of the others inner life unproblematically gives rise to the community of monads But is the amplification of the Cartesian solipsistic paradigm sufficient ground for recognizing another as same to myself regarding his meriting to participate in the same network? Not at all, as such foundational statements beg the same questions as the solipsistic paradigm. It is through the participation in a common discourse that I am capable of recognizing him as similar to myself and not through an appresentation of his psychic inner life 63 Unlike spatial perspectives , they can be interchanged and objectified as perspectives of a common world only on the assumption of the complete reciprocity of all participating subjects. PHYSICAL SPACE IS REPLACED BY SOCIAL SPACE. ALFRED SCHUTZ DISCERNED THIS WEAKNESS: THE GENERATION OF INTERSUBJECTIVELY COMMUNALIZED EXPERIENCE WHICH IS IDENTICAL FOR ME AND ALL OTHERS CANNOT BE MADE PLAUSIBLE B ASSUMING AS THE STARTING POINT THE NOTION OF A TRANSCENDENTAL EGO. EXPERIENCE THAT IS INTERSUBJECTIVELY COMMUNALIZED IN THE STRICT SENSE CANNOT BE CONCEIVED WITHOUT THE CONCEPT OF MEANING THAT IS COMMUNICATED AND SHARED BY DIFFERENT SUBJECTS. IDENTICAL MEANINGS ARE NOT FORMED IN THE INTENTIONAL STRUCTURE OF A SOLITARY SUBJECT THAT CONFRONTS ITS WORLD IN ISOLATION. FOR MEANING TO BE IDENTICAL IN ANY INTELLIGIBLE SENSE THEY MUST HAVE THE SAME VALIDITY FOR DIFFERENT SUBJECTS. TO ACCOUNT FOR THE IDENTITY OF SEMANTIC CONVENTIONS WITTGENSTEIN PROPOSED THE MODEL OF A RULE THAT AT LEAST TWO SUBJECTS MUST BE ABLE TO FOLLOW. Mead recommends the model of a role that establishes reciprocally INTERCHANGEABLE EXPECTATIONS ABOUT BEHAVIOR FOR AT LEAST TWO SUBJECTS. Habermas seeks to reinstate the epistemological validity of the concept of intentionality as a dispositional state that allows interlocutors who participate in a language game to agree on its rule. Now, this intentionality is tantamount to the legally accepted notion of motive behind an action, as a mental disposition that is conducive towards a particular action. The intended action in the exclusionary language games is the maintenance of a common lingo64
evolving, self-legitimated communities
6 61

ibid ibid 63 Similar transcendental idealist heuristics were used by Kant, eg the Transcendental unity of apperception 64 The ontological issue in subsuming a criminal phenomenon under dogmatic law emerges in the context of a new communitarian ethos with a new language as its form of life. Insofar as the mandate for grounding the form of syllogistic reasoning in dogmatic law is not formally expressed in dogmatic law, but is a matter of
62

[169]

or the sum of rules that enable gamers to make sense of their mutual situation. By positing a person situated in the same social milieu as potentially transgressing the rules of the language games , through the enactment of which they affirm intersubjectively their shared reality, they attain to maintain stability and self sameness. Thus, the motive is dispositionally legitimated , while a tacit agreement on the validity of the motive as conducive to the setting in motion of exclusionary mechanisms affords to maintain the communitarian bond among members of a discursive community. Intentions are meaningfully structured expectations that are oriented to identical meanings and whose content can be understood. As a result interpretive social analysis does not consist of delving into the psyches of individuals but of deciphering the public world of culture which consists of structures of signification. This involves attention not to the experience of social agents hidden in the inner recesses of their minds but to the concrete actions, relations, and objects of particular people in particular places. A crucial conceptual distinction that may allow us to grasp the epistemological difference between formal logic and pragmatic requirements that must be met in order to ascribe validity to a string of statements about facts is between truth value and doxic positing65 *the latter instituted by Husserl. Essentially, the truth value of a statement consists in the similarity of doxic positings on behalf of a linguistic/pragmatic community or the adoption and diffusion of a univocal rhetoric about states of affairs and others. There is nothing strictly physical or metaphysical about positings, save for pragmatic agreement. IN THE CONTEXT OF THE LINGUISATIC TURN AND ACCORDING TO WIITGENSTEIN TO UNDERSTAND AN INTENTION IS TO UNDERSTAND THE ROLE OF A SENTENCE IN A LINGUISTIC SYSTEM. BUT IN WHAT WAY CAN WE SPEAK HERE OF A SYSTEM OF LANGUAGE? What is the difference between rules of language games (and by extension rules of discursive formations alongside paradigmatic and syntagmatic axes) and rules of grammar? The former encompasses the rules according to which situations of possible mutual understandings are brought about. The structure of a language game determines how I can use sentences in utterances that can be subject to consensus The competence that I acquire in learning a rule of a game or a grammatical rule is a generative capacity.66 Language games materialize as speech acts.and it is through engagement in speech acts that the horizon of a commonly shared language surfaces. Therefore, what is deemed to be valid in a communicative/communitarian intersubjective encounter is the use of a speech act as language game and not necessarily the semantic content that slips underneath the speech act. These validity claims that a speaker raises by performing speech acts ground intersubjective relations, that is , the facticity of social facts 67 , AND THE REASON WHY THIS CLASS OF FACTS APPEARS IN THE SOCIAL SPACE AS AGAINST NATURAL SPACE , THAT IS SPACE PRIOR TO BEING COLONIZED BY A PRAGMATIC/SEMANTIC NEXUS AND DEVOID OF ANY COLLECTIVELY INTENTIONAL APPROPRIATION OF ITS COORDINATES. The phenomenological attempt to elucidate the universal structures of the lifeworld returns in the form of an attempt in the philosophy of language to discover and reconstruct the universal structures of the communicative form of life in the universal pragmatics of language games 68 The
laws methodological principles, thus metalinguistic vis a vis dogmatic law (Introduction to law methodology, K.Stamatis, Sakkoulas Publications 1991). [ , , , ., 1991] mandates the exploration and elucidation of the communicative code of the new communitarian ethos lingo, as a new form of life, of which some aspects of the silent massacre phenomenon are predicated. Unless an epistemological framework, such as pragmatics, and a methodology, such as ethnomethodology and discourse analysis, are used for making sense of the new communitarian ethos, it is hardly likely that the subsumption of the criminal facets of the silent massacre phenomenon under the correct clauses of the criminal law is attainable. 65 ibid 66 Habermas, as above 67 ibid 68 Idem, p68

[170]

key phenomenon that a universal pragmatics must explain is the peculiar reflexivity of natural languages. How does the above stated hypothesis of language or discursive games as affording to effect communal bonds in situated discourse materialize in the context of universal pragmatics? As Habermas notes, by shifting the end of communication from simply establishing a common understanding of objects or states of affaiors to effecting an intersubjective relationship.. In other words, it is by virtue of social actors being related in social networks that doxic positings about others come to pass as such and such. There is nothing inherent in a person that causes the doxic positing, it is rather a matter of appropriating another person qua object of collective intentionality69 through doxic positings that it appears in such and such a manner. Does this mean that another person is monadically irresponsible? Not to the extent that it has participated consciously and willingly in the formation of collectively intentioned doxic positings. Otherwise yes. The level of communication that is the end in one case is made into a means in the other. In cognitive language 70 the use of propositional contents are the topic. But communicative use mentions propositional contents only in order to ESTABLISH PERFORMATIVELY an intersubjective relation between speakers-hearers. Therefore the pragmatic aspect of communicative action is primarily relational71, that is as a media res for establishing relationship with others in a context of collective intentionality, while the content of the propositions is of secondary value72. By analogy, the very fact that agenda 21 is so open in terms of potential topics and actions is an attestation to the primarily relational motive behind the blueprint, wherefrom stems the mandate to immerse in social networks or engage in communicative or, rather, COMMUNITARIAN action. The correct use of the denotative system [MY NOTE: OR THE ASCRIPTION OF PREDICATES TO PERSONS AND STATES OF AFFAIRS] seems to depend on integrating language with cognitive schemata [MY NOTE: OR SOCIAL REPRESENTATIONS, cf MOSCOVICI , LEWIN AND MEAD] on the one hand and types of action on the other In short, the motive behind the use of a speech act consists in the activation of a cognitive schema towards the attainment of a goal. Having thus far established that the primary purpose of the use of speech acts against rules determining the ramificatory potential of language games consists in the attainment of relationships among communicative community members, Habermas continues with exposing the five classes of speech acts according to the paradigm of universal pragmatics (pp82-85):

69

intentionality that serves as its basis is an essentially social phenomenon, in a very particular way. I can have intentions only because I am already situated within a web of meaning provided by my language and the culture within which I reside.(Habermas) 70 AND THIS SOULD EXTEND TO ANY COGNIVISTIC, BEHAVIORIST , POSITIVISTIC PERSPECTIVE 71 the opacity of oneself is primarily a result of social dependency, since a subject is in an essential manner relational (J.Butler). r 72 This also explains certain phenomena such as the extent of overdetermination of the semantic content of propositions by paralinguistic or tropical aspects or their mode of utterance or their ex officio/ex positio conferral and the ways whereby (in lay terms) chemistry is attained among social actors. One may be talking utter mambo, but in such a manner and to such an audience as to gain credence, partly through being a more cunning impressions manager and partly through the audiences ignorance of the subject matter. In institutional settings this leads more often than not to witchunt argumentation and fallacies such as arguing from a position to know

[171]

[172]

[173]

[174]

Consensus about the states of affairs and persons in a communicative situation depends on using the above classes of cultural pragmatics. THE PROBLEM IN THE SUGGESTED CLASSIFICATORY SYSTEM IS THAT IT IS QUESTION BEGGING INSOFAR AS IT PURPORTS TO ESTABLISH THE EPISTEMOLOGICAL STATUS OF THE CATEGORIES AND THEN INFERENTIALLY VALIDATE THE EXISTENCE OF A COMMUNITY OF RATIONAL AGENTS INSOFAR AS EVERY SPEECH ACT FALLS UNDER ONE OF THE SUGGESTED UNIVERSAL PRAGMATICS CATEGORIES. IN PRACTICE, THE EMPLOYMENT OF A TYPOLOGY OF SPEECH ACTS BY A COMMUNICATIVE AGENT DOES NOT IMPLY NECESSARILY ITS CORRECT USE THAT IS ITS FULLY ADEQUATE TO THE TYPOLOGY CORRESPONDENCE, WHICH BREACHES THE SERIOUSNESS OR SINCERETY CONDITIONAL . THIS BREACH IS NOT NECESSARILY SELF REFLEXIVE, BUT MAY TURN UP IN THE COURSE OF NATURAL LANGUAGE USE. THUS RECOGNITION OF THE USE OF A SPEECH ACT TYPOLOGY COMES EX POST FACTO AND ONCE UNIVERSAL PRAGMATICS CONDITIONALS HAVE BEEN MET. BUT THIS RESTS WITH THE RECONSTRUCTION OF THE NATURAL LANGUAGE USE PREDICAMENT BY THE UNIVERSAL PRAGMATICIST AND CERTAINLY DOES NOT REFLECT THE FULL DISPOSITIONAL SPECTRUM OF THE INTERLOCUTORS. THUS, CONSENSUS AS THE OUTCOME OF A COMMUNICATIVE RELATIONSHIP ON THE OCCASION OF THE EMPLOYMENT OF A SET OF SPEECH ACTS DOES NOT NECESSARILY AND FULLY ADEQUATELY REFLECT THE COMMON INTENTIONALITY AND THE PHENOMENA TOWARDS WHICH THE SPEECH ACTS ARE ORIENTED , BUT TO A LATENT NEED FOR REACHING CONSENSUS, WHICH IMPLIES THAT IT IS NOT FULLY RATIONAL, IT IS CONSENSUAL, IT IS CONVENTIONALIST , IT IS COHERENTIST, BUT THIS DOES NOT IMPLY THAT IT IS RATIONAL , IN TERMS OF FORMAL LOGIC. IT IS INSTRUMENTALLY RATIONAL, BUT THIS BEGS ANOTHER QUESTION AS TO THE CAUSAL RELATIONSHIP BETWEEN THE TRUTH SEEKING PROCESS AND THE CONDITIONALS THAT HAVE BEEN USED, EITHER IMPLICITLY OR EXPLICITLY. Habermas recognizes the risk of reaching an illusory consensus and attempts to furnish valid justificatory grounds through abductive heuristic mechanisms, that is by excluding certain agents on the grounds of idiocy, non expertise (even though recognizing the inherent conceptual conflict in the employment of these terms) in short of not holding competency traits . This process by default leads to infinite regress , while laying open the frailty of the rational consensus theory. Evidently, methodological issues are more pertinent in resolving validity issues and the choice of methodology is purely an issue of power relationships and not a disinterestedly epistemic one. FOLLOWING CONDITIONAL STATEMENT AS A WAY-OUT OF THE ILLUSORY CONSENSUS APORIA THAT IS GENERATED FROM THE IDEAL SPEECH COMMUNITY HYPOTHESIS SIMPLY AFFIRMS THE UTOPIAN CHARACTER OF THE CULTURAL PRAGMATICS PERSPECTIVE: Only if there is a symmetrical distribution the opportunities for all possible participants to choose and perform speech acts does the structure of communication itself produce no constraints (p98) HOWEVER, ACCESS TO INFORMATION AND DISTRIBUTION TO SOCIAL ACTORS IS BY DEFAULT ASYMMETRICAL. For the previous definitions do not by themselves guarantee that interlocutors not merely imagine themselves to be engaged in a discourse while they are in fact trapped in communication subject to coercion INTERESTINGLY ENOUGH THE IDEAL SPEECH SITUATION REQUIRES DETERMINATIONS THAT REFER DIRECTLY TO HOW CONTEXTS OF INTERACTION ARE ORGANIZED AND ONLY INDIRECTLY TO DISCOURSES (p98) THIS CONDITIONAL IS MORE PLAUSIBLE THAN MERELY ASSUMING AN EQUAL DISTRIBUTION OF INFORM,ATION (WHICH OF COURSE IS DEVOID OF VALUE JUDGMENTS) AS IT POINTS OUT TO THE NECESSITY OF DESCRIBING CONTEXTUAL FACTORS AS ENABLERS (OR INHIBITORS) FOR THE POSSIBILITY OF MEETING THE UNIVERSAL PRAGMATICS SPEECH ACTS CONDITIONALS (cf VAN DIJK, GOFFMAN ON ASYLUM DISCOURSE, FOUCAULT ON INSTITUTIONAL DISCOURSES etc) Irrespective of the technical complexities regarding the details of the universal pragmatics perspective (eg the speech acts classificatory system) , it is of paramount interpretive importance in

[175]

that it opens up the following areas of research/potential criticism of intersubjective communicative action in social networks as processes of rational decision making about states of affairs and others: 1. Is the discourse as horizon wherein prephenomenological relationships among social networks members are maintained,uncritically given and/or endorsed, that is devoid of pragmatic interests? (and the same applies to implicit rules for language games and speech acts)

2. If relationship among members is a prephenomenological or ontological condition for


consensus and insofar as relationship is attained through paralinguistic means either over and above the use of speech acts or in tandem with speech acts, then isnt consensus predicated of irrational73 membership criteria? Validity claims are overdetermined by relationship structures, which ground collective doxic positings and by virtue of which X is predicated of P and motive for predication conflates with collective intentionality for appropriating a person qua part of the collectives lifeworld through cognitive schemata. Insofar as intentionality is prephenomenological causality or an ontological directedness74, yet filled prephenomenologically with meaning, wherefrom stems the importance of cognitive schemata, we may infer that cognitive schemata are causally connected with doxic positings through their very merit of giving directions to collective intentionality- these directions will be further elucidated by recourse to the notions of scripts and social episodes or, in Habermas terms, how the context of interaction is organized and how the targets empirical reality is fabricated with the aid of targeting methods and audiovisual surveillance 3. Insofar as (2) holds cognitive schemata constitute irrational causes for appropriating a person or an object in the lifeworld through doxic positings 4. Even if (2) and (3) were not the case, the perspective assumes that the sincerity conditional is used in all communicative exchanges, which is hardly the case in real settings 5. (4) is further aggravated by the fact that the asymmetry of information and decision making power among members in social networks by default waives the existence of a speech community of rational agents and/or a rational and disinterested process of decision making about states of affairs and others among social actors 6. Therefore, talking non-sense and situating within language games a target may be of paramount relational activity among speech community members, but it is criminally causative of embedding a target in a collective intentionality [by analogy to the way whereby during a criminal case process hearings a suspect is implicated in the criminalization procedure merely by being engaged in the process mechanism- see relevant article from Poinikologos] albeit in an extrajudiciary manner, which affirms, on an
73

cross refer to my notion of the tribal community of affect, to impressions management and to the notion of situational collective or the micro inscription of surveillance society mechanisms (see issues Surveillance and Society)
74
l

Evidenced prototypically at such a fundamental level as the gaze as an embodied and social gaze, learning to see is part of learning to be in the world

[176]

ontological level, one of Roxins objective conditionals for the existence of indirect perpetration in the context of organized power mechanisms. Unfortunately, the unaccounted for social relationships and contexts of interaction in Habermas theory of pragmatics of social interaction constitute key ontological aspects in multiparticipant crimes. N. Bitzilekis75 notes that , [ ] H , , Real world legal precedents are embedded in a complex jurisprudential context that includes the level and jurisdiction of the prior court, the procedural posture of the prior case (ie what formal claim or motion was before the court), and the influence of dissenting opinions. Legal precedents are also embedded in a political context, where competing policies and values are balanced by the courts, and where legal doctrines evolve to accommodate new social and economic realities76. E , , . Bitzilekis main arguments consist in the following: - The ontological dimension of social networking and the ontology of relationships as fundamental modes whereby social meaning is ascribed to both humans and objects may not be unaccounted for by a judge and criminal law Insofar as a crime is ontologically embedded in a network of social relationships its sense and meaning are always already socially mediated The degree of involvement (either as solicitor of an act, or motivator or plain participant) of a member of a social network and his contribution in a causal chain leading up to a criminal incident is not materially reflected77 in criminal law up until the point where that involvement has tactile impact on an individual

One of the most important middle terms grounding the pragmatics of social interaction is cognitive schemata or social representations. In the next section the implications of the notion in the context of targeting activities is further qualified.

75
76

N. Bitzilekis , , 1990,

The role of context in case-based legal reasoning: teleological, temporal and procedural , C.D.Hafner, D.H.Berman, Artificial intelligence and Law 10: 19-64 2002 77 [ , , (regressus ad infinitum)- causae remotae, Bitzilekis, as above

[177]

3.2 Social representations as a mechanism for fabricating and filtering information about targeted individuals: between epistemological fallacies and lay discourse perceptual inertia78 lies the silent legitimation of information as the outcome of social networks members decision making The truth finding procedure behind random allegations and defamatory information stemming from social networks participants as the cycle of information, which, as already quoted from the Handbook of Intelligence studies, is amply used by secret services, is a double-bind situation for targeted individuals. Certainly in cases of involvement in criminal activities it is a useful method in fact finding. However, in the context of using this method for fabricating social representations about targets who have been selected as instantiations of the Christological paradigm or as arche signifiers for the new communitarian ethos of dolus indirectus legitimated by agenda 21 the cycle of information constitutes part of a well thought out and preplanned case of attempted murder (personal, professional, and physical). S.Moscovici, the founder of the theory of social representations79, explains the interpretively systemic function of social representations in every human being. (schemata). , , , 80.
78

In fact, perceptual inertia is considered to be a BONA FIDE virtue for network membership. As Garfinkel argues, The person in managing his daily life affairs assumes a commonly entertained scheme of communication in a different manner than does the scientific theorist. The man in daily life is informed as to the sense of events by using a presupposed background of the natural facts of life that from his point of view any of us is obligated to know and give credence to. The use of such natural facts of life is a condition of continued bona fide membership in the group
79

. (background assumptions) a priori , , . , . , . , , . . , , .


80

, , 1995, S. Moscovici, H

[178]

In a traditional epistemological model as laid out by various philosophers throughout the centuries, what always emerges as a priority is an account or a systemic topography of how fundamental notions of perception, stimuli, memory, imagination cohere and interact in the formation of representations. In social theory, and given the precedence of intersubjective paradigms, this priority shifts to the provision of explanations as to how the validity of information is negotiated through background assumptions. Moscovicis use of social representations as embedded schemata between perception and memory affords to elucidate the background assumptions or information constellations that are embedded in social actors empirical understanding and help filter new perceptual stimuli about the targeted individual according to information that has been stocked about him in memory. The procedure is taxonomical insofar as stimuli about the target are primarily tied up to a generic interpretive schema , such as the category of exclusion. Hence, the target is by definition and by default perceived of as partaking of a specific interpretative schema. Not only do social representations as interpretive schemata allow us to draw uncritical inferences about others , but they mediate in a causal chain as the third term uniting outcomes and causes, therefore acting as sufficient grounds for drawing judgments about the series of events or as efficient causes of events and by virtue of being legitimated by a commonly shared and agreed upon interpretive schema to point to certain individuals as being responsible for setting in motion a series of events or certain individuals of which a series of events are predicated as causal agents. Thus, the series of predicating causality shifts from a primary state of affairs such as agreement among social network participants about the features or attributes of an interpretive schema , which agreement functioned as the causa prima [or the PRIMUS in terms of the locus of decision making responsibility for a criminal activity] of the schemas extrajudiciary formation and predication of the targeted individual, to the SECUNDUS, for whom the schema functions as causa efficiens for engaging in a targeting incident and through a post-incident agreement between PRIMUS and SECUNDUS back to the target in an attempt to cover up their initial PARTAKING OF THE COMMON INTERPRETIVE SCHEMA. What recedes in the background is the group of social network participants who decided to coin this schema and what remains is the schema as such, thus waiving the remote causality that rests with the group decision making and the relative decision making authority of certain individuals within that network. Graumann Sommer . . , , 81. Thus, incidents whose features are filtered or interpreted by virtue of and on the occasion of schemata constitute scripts82 (or episodes as I shall demonstrate in due course by allusion to Van Dijks cultural pragmatics), as Graumann and Sommer point out, which aim at reinscribing in memory a prior situation and to point to an adequate interpretive comportment in the current situation . But what adequacy means and how is it established? It is established as an one-to-one referential correspondence to the features of the targeted individual qua social representation. But insofar as the social representation was coined by participants in social networks it is a matter of convention, thus what is confirmed in an episode as a causal nexus involving the target and
81

ibid The notion of scripts is structurally isomorphic to social episodes and Schutz notion of local scenes . The explication of local scenes of social action as assembled contextures is present in the work of Husserls student A Schutz whose writings had a huge bearing on Garfinkel. Schutz compared gestalt contextures to phenomenological concepts such as noema, which is a perceived intentional object that carries implications through its inner and outer horizons for how each detail of the object achieves its coherence in relationship to that very object as it is formed within the stream of experience. The most transparent connection between phenomenological conceptions of gestalt contextures or noematic relations and ethnomethodological orientations is in Garfinkels well known discussion of the documentary method of interpretation . By way of the documentary method, members consult presumed, institutionalized features of the society as an underlying pattern to make sense of particular behavioral displays and also employ these displays in turn as evidence that the infinite elaborate normative features of the collectivity are in place. The idea that social settings and their constituent elements are contextually coconstitutive by virtue of members methodic sense-making activities is a clear debt to phenomenological themes.
82

[179]

situational factors is the convention of a social representation. The very scripting or fabrication of incidents by secret services is an attempt to perpetuate the social representation as communal bond among social networks participants through a conventionalist or coherenitist truth paradigm. Interestingly, and this is another area of discursive complicity amongst institutional agents in organized mechanisms of power, one of the symptoms of the yet non existent illness of schizophrenia or the manufactured illness of schizophrenia83 is an attempt on behalf of the ill person to establish a relationship among remotely related phenomena. Despite the utterly unfounded claim of this pseudo scientific axiom, which if it held true then all philosophers would be schizophrenic84, it is self defeasible for the very community of psychologists/psychiatrists. The below quote from Moscovici is a striking attestation of the above claim: . CHAPMAN KAI CHAPMAN
83

As is well known all so called psychiatric illnesses are DISCURSIVE DISORDERS. It is through discursive issues that suspicions as to the existence of illness are raised and it is through discursive diagnoses that judgments from the effects to non existent illnesses are conferred, thus begging the fallacy of judging the cause from the consequences. The reason why in this context the syllogism is fallacious (as against a hard science for example) is that there no cause such as schizophrenia, which if posited in a series of events will yield the expected results, Rather it is a bucket concept that legitimates social exclusion upon pragmatically loaded statements. A proof a contrario is that if I turn the heater on the water will boil. By observing the waters boiling I may infer that the heater is on not only inductively, but deductively as an axiom causing univocally the phenomenon, which will have the same effects upon infinite repetitions. But to posit as an axiomatic analytical principle with causal validity a bucket concept such as schizophrenia does not meet the above empirical condition between cause and effect and this is why allegedly no one know what it is that causes the effects. Hence it is an empty signifier. HUNDREDS OF EXPERIMENTS IN VARIOUS STRANDS OF SOCIAL THEORY HAVE BEEN CONDUCTED AS AFFIRMATIVE OF THIS POSITION OR FUNDAMENTAL EPISTEMOLOGICAL FLAW, ranging from the classic 70s experiment in Germany where students faked symptoms in order to be admitted to institutions and were diagnosed as schizophrenic, up until Goffmans and Garfinkels experiments. Not only there is an issue of causality within the heart of the dominant epistemological paradigm and between lay discourse [whereupon discursive disorders are predicated] and epistemic discourse [which yields the axiomatic principles for conferring judgments about discursive disorders] , but also between the axiomatic principles of different epistemic approaches. The following experiment is a striking attestation of the third class of discrepancies [from Moscovici, above quoted]: LAMGER KAI ABELSON (1974) . . . . . . , , . Therefore, not only false social representations that crystallize as interpretive schemata through common discourse act criminally as remote causes for targeting, but 2nd order discursive interpretive schemata, such as epistemic approaches, confer differential judgments on the validity of 1st order schemata, as above illustrated. Do the epistemological impasses that are encountered in dominant and alternative perspectives allow us to legitimate uncritically the 1 st order discursive formations? Certainly not, as this would amount to taking at face value collective representations whose dissemination favors perceptual inertia and automatism. What about if this is the aim on behalf of force fields that seek to reduce complexity in the socius and impose higher controls? It is no secret that scientific teams work for elite mechanisms of power. What if a targets work is regarded as potentially threatening to this automatism,or the targets work has been appropriated by members of these scientific teams? Isnt this a plausible reason for disseminating the target to the mobs , of which mobbing is a striking attestation? Doesnt psychiatry act as complicit in allegations of mobbing ? It is now rendered apparent how legitimated windowsact complicitly to the realization of the silent massacre phenomenon by masking the complexity of social networks actors who favored decision of mobbing and targeting and transposing responsibility to the target whose synapses must be blocked as he has been excluded from the powerplay. Evidently an issue of cultural pragmatics and nothing to do with solipsistic causal patterns .

[180]

- , Not only the very we of a community of self professed scientists practice what they preach against, but lay bare the complicity of POWER MECHANISMS as responsible for deciding WHO IS ENTITLED to draw relationships AMONG WHAT PHENOMENA and MOREOVER BY WHAT METHOD. Not only is this statement unconstitutional , but it violates all methodological innovations in hard and soft sciences. Moreover, it displays how institutional mechanisms avert civilians from discovering CAUSAL CHAINS that may lead to revelations about HIDDEN POWER MECHANISMS and in this case REVEALING THE MECHANISMS of the psychopharmaceutical complex is a PERFECT OCCASION for POLITICAL PSYCHIATRY. In strictly epistemological terms, psychoanalysis as a far more elaborate and advanced social science than institutional psychiatry in establishing relationships among phenomena should by default be WITCHUNTED, which it is, based on the ongoing conflicts among psychiatry and psychoanalysis85. Also, by analogy to journalists investigations and police/secret services investigations, where by default micro and macro phenomena are intertwined as operational hypotheses in truth finding, who legitimates their methodological endeavors? Are they schizophrenic? According to DSM, yes, but who would dare tag them as such? Another clear case of institutional complicity. In my case, parts of my intellectual property have been appropriated (in at least two demonstrable instances) by other self proclaimed scientists. Isnt there a clear motive on behalf of indirect institutional perpetrators to legitimate pejorative judgments against me in the face of cases of intellectual property theft? Not only there is a clear case of discursive complicity, but what is silently legitimated is the existence of perceptual inertia on behalf of lay people , which in itself acts as an enabler of the perpetuation of the targeting phenomenon, which is what social psychologist Ross called a fundamental flaw86. Thus, not only institutional mechanisms act complicitly to social representations fabricated of the target through participants in social networks with demonstrable motives, but in an attempt to cover up their ulterior motives they enhance the complexity of the social context by encouraging to disseminate the target to such an extent, as to waive the possibility of discerning the remote cause that triggered the dissemination of the target qua social

. Fishers Farina (1979) , . , , , . , . , , , . . , . (as above)


84

For example, notice the following passage on interrelatedness In phenomenology the process of intentionality is neither a motivational nor psychological backdrop to consciousness. Instead it points to acts of perception that refer to one another and to some connected whole, where that apperceived whole simultaneously makes sense of those singular acts of which it is comprised. One aspect of the phenomenological sensibility in ethnomethodology is this notion of the perceptual field as intentionally assembled in the manner of a gestalt contexture or what Zimmermann has called an occasioned corpus of features to a social setting. 85 See, for example, paper on Psychoanalysis vs Psychiatry 86 Moscovici, as above

[181]

representation, which is clearly facilitated by common peoples perceptual inertia87 and by the sheer proclivity to engage in Rosss fundamental flaw, that is univocally ascribing causality to the target by disregarding circumstantial evidence or counterevidence. As the below passage suggests, this mode of treatment is false from the perspective of social psychology as it disregards the societal force fields that intervene in the formation of causal chains. 3 , , , . , Lewin, (FORCE FIELD) And yet this falsity or this fundamental flaw constitutes the very basis of inherentist / solipsistic paradigms, which have gained institutional currency not thanks to a discursive superiority (which is not provable) but to their acting complicitly in covering up the complexity of the process of the formation of social representations through social networks and the implicit powerplay inherent thereto. Hence, instead of investigating the complex mechanisms of information diffusion and perceptions management, the solution that is opted for is the reduction of the complexity of the target by blocking his synapses with psychiatric drugs, thus maintaining the balance of the indirect system of perpetration and legitimating scapegoatism and the silent massacre phenomenon. ( ) , . Moscovici concludes with a note on the methodological process whereby the formation of social representations may be accounted for, which amounts to investigating the social groups through which they emerge and the Lingos that shape the intersubjective reality of such social formations, in line with secret societies. More complex sign languages used for secrecy are those employed by religious cults or secret societies where ritual codes are meant to manipulate problematic social relationships between insiders vs. outsiders 88 The concerned subject matter is cognitive systems with a particular rationale and language and theories geared towards the exploration and taxonomical categorization of their reality (Moscovici 1969). [ (Moscovici 1969)]. The way causal patterns and causal chains are embedded in lay discourse is largely through contiguity among phenomena. The process is similarly fallacious to reducing a statistical correlation to a status of causality between the observed phenomena and the judgments of empirical understanding made about this relationship of contiguity. And yet, the way causal statements on contiguously related phenomena and the concomitant observations about them assume common currency is through the phenomenon of illusory correlation89. It is through this phenomenon, coupled with the above mentioned perceptual inertia , that social representations and interpretive schemata crystallize as such. The particular attraction of the illusory correlations effect has been in the explanation of the formulation and development of stereotypes of minorities, largely because minority members are held to be attention grabbing90 As above noted, perceptual inertia is a complexity reduction heuristic intuitively employed in ordinary settings. Again, it is a double-bind insofar as it also functions as an enabler in criminally diffusing information passed among social network members about targets.If stereotypes are seen as energy-saving devices involving erroneous perceptions of people as group members rather than as individuals, then an account of
87

T , . This is a loose account of how collective representations come to pass uncritically, which also lays bare to various irrational facets of agreement on loci communes among rational social actors, as have already been illustrated.
88 89

The Routledge Companion to Semiotics and Linguistics, p16 Cross refer to previously mentioned risk of :reaching an illusory consensus by Habermas 90 Stereotype formation beyond illusory correlation, Craig McGarthy and Anne Marie de la Haye

[182]

stereotype formation as a process of illusory correlation is quite satisfactory. 91. In experimental settings, differential attention toward infrequent events was predictive of illusory correlation. which amounts to the sociological phenomenon of background expectations as grounds of predictability about the emergence of certain phenomena. Therefore, as demonstrated, social representations by default function as reductionist mechanisms that allow us to make sense of states of affairs and others through background assumptions. Perceptual inertia and illusory correlations constitute indispensable mechanisms for the fabrication, diffusion and uncritical endorsement about others. At the same time, they constitute intersubjective dispositional enablers for the perpetuation of scripts that have been coined by powerful agents in social networks about targets. Therefore the social representations that are predicated of targets function as social glue among communitarian members or silent underpinnings of their mythic reality, pointing , on an ontological level, not merely to the shared features of social networks, but on the inverse to the method whereby they have come to pass qua social constellations. This exploratory endeavor to the formation process of social networks by pointing through the inverse to the situational aspects of information diffusion and social representations crystallization among social actors is attainable by the application of cultural pragmatics and ethnomethodology. 3.3 Social representations or cognitive/interpretive schemata in action: Accounting for the blind spots in Habermas theory of the pragmatics of social interaction by demonstrating how fabricated social contexts, social situations , scripts and social episodes shape the hyperreal world of a target What I shall demonstrate is that the essential motivating contribution of animus socii and animus auctoris rests with the provision of the necessary context [AS CUM-TEXT or THE NECESSARY ONTOLOGICAL CONDITIONALS THAT COME ALONGSIDE INDIVIDUAL NARRATIVES ABOUT THE TARGET] to participants, wherein their decision to participate in targeting activities is situated, irrespective of particular motives of direct perpetrators, which do not necessarily coincide with the indirect perpetrators ulterior motive(s) and why contexts are instances of cultural pragmatics rather than disinterested judgmental frameworks animating social actors. Van Dijks recent work Society and Discourse (2009), just like Habermas theory of communicative action and Garfinkels ethnmethodological heritage are instrumental in operationalizing my interpretive approach to the reasons for and the methods whereby targeting activities are carried out. Not only they constitute well known and valid paradigms in social theory, but moreover, thanks to their multidimensional scope they afford to shed light on the multiact, multiparticipant, exceptional type of criminal activity at stake, as against inherentist paradigms or deterministic paradigms starting with macrostructures and while working top down attempting to demonstrate their normative inscription in social actors decisions and notions of selfhood. The aforementioned perspectives commonality that rests with a co-evolving intersubectivity paradigm are more relevant as microsociological approaches to discerning how information about individuals forms into collectively shared social representations through social networking and how daily situations are manufactured around the target with view to maintaining social networks bonds in participants goal directed actions, which goals or motives are multilayered, ranging from affirming group sanctioned selfhood through participation in targeting activities, affirming core selfhood through projecting selfperceived negative traits to a target, reaping material benefits by enacting a role in an situationally located organizational structure of perpetration, while through collective action maintaining inter social networks cohesion (the incidence of multilayered motives). Starting with a definition of social contexts [and continuing from where Habermas analysis stopped], Van Dijk stresses that contexts as ongoing mental models of communicative situations are obviously the result of many processes of social understanding, involving the attribution of social identities, roles, intentions, purposes and goals to social actors, the reduction of complex information about social actors through stereotyping, schema-formation, heuristics, biases92. The shaping of the social context about the target is, according to Bitzilekis terms, the causa remota behind targeting social situations. Its spatiotemporal remoteness and essential hiddeness waives
91 92

ibid Vn Dijk, Society and Discourse, Oxford University Press 2009, p33

[183]

its status as demonstrable sufficient cause or imbued motive to participants engagement in particular targeting activities. However, social situations are demonstrably existent, hence there must be a causa remota or several causae remotae, whose situatedness is even more difficult to discern due to the horizontal networking paradigm over vertical networking, as proven. Now, social situations are embedded within social context. or constitute instantiations of the social context or variations on a theme. This point is crucial in accounting for how flagging and tagging is created through directed conversations, street theater, staged accidents and the rest well known targeting techniques. In fact, the social cybernetics notion of dynamically co-evolving multi-agent normative ecosystems (eg the bottom-up approach) is a quasi-myth, insofar as the goal is reduction of complexity (for targeted individuals) and the application of control sanctions in case a priori conceived flagging is not adhered to. This is facilitated by the application of reductionist models, eg those that draw on cognitivism and offshoots. Situations have goals, and they are not properties of the actors, as would be the case for motivations (p36). This distinction between a cognitive-inherentist perspective and a situationalist/social interactionist one is important in making sense of the enactment of roles on behalf of perpetrators in situations of staged conflict-eg gaslighting, which does not reflect, at least not necessarily, embedded traits of participants core self, but of the situational self, which also waives a stricto sensu motive behind an act of perpetration. The chain from remote to sufficient cause for perpetration and why the linkage between situational participation on behalf of alternating participants and remote causes resting with indirect perpetrators is seemingly broken , hence why, based on the theory of the equivalence of terms [ ] IT MIGHT SEEM to an external judge that discreet phenomena are not directly related is due to the fact that targeting situations constitute a matter of multiple, composite causality [ ] , where (i) alternating direct participants and (ii) indirect perpetrators as selves and motives as reasons for participating for (i) and (ii) respectively rest with different referential planes not only between (i) and (ii)- which in itself does not waive the indirect perpetration hypothesis insofar as both participate and are motivated by a causa finalis, yet differ in terms of causae efficiens- but also among indirect perpetrators themselves and among direct participants themselves and throughout time insofar as the very structure of social networks changes. What remains the same throughout goal oriented situations is the modality of their staging and their causa finalis, that is the extinction of the target. In terms of modality, what evidences itself as a microstructural element across all fabricated social situations is an overarching motive of keeping the target within the contextual loop of social representations and the latent and shifting interaction rules 93, such as the use of indirect speech and the avoidance of causing bodily harm [with striking exceptions as demonstrated in my allegations in Chapter 4]. Language games, such as playback of the targets prior movements inside and outside his home constitute enactments of the above stated motive and attestations of prior and latent agreement on behalf of participating social actors in fabricated social situations about the exclusionary features that are predicated of the actor. Coupled with the employment of a new lingo [consisting of both linguistic signifiers and corporeal pragmatic / protosemiotic signs] as affirmative of the communitarian ethos, and, in Wittgensteinian terms, as a form of life, by inversion the target is employed as a zero limit (in Barthes terms) of collective narratology or the tain of a collectively reflective mirror (in Derridas terms). Thus, coming back to Bitzilekis argument, the admissibility of motive(s) for participants and indirect perpetrators respectively does not rest stricto sensu, or at least exhaustively, with the appropriation and redistribution of material things {in terms of dogmatic law and applied legal practice, such as ones house, kitchen table and other items of value, as well as ones career prospects), but PRIMARILY, FOUNDATIONALLY and overarchingly with the ontological dimension underpinning as the horizon for appropriation of ontic elements, that is with the maintenance of the relationships among social actors in social networks. Thus, the target functions on the inverse as a ground of legitimacy for a nexus of social relationships,albeit informally and as a lacuna in the center of social networks that must be

93

including rules in social situations is like including grammar in the structure of sentences or discourse and cognitively to mix personal (episodic) mental models and social representations (p39)

[184]

closed or ritually annihilated [in terms of Collins interaction ritual chains94] as a systemic sacrifice celebrating the cohesion among group members. The legal technicalities and formal objective/subjective conditionals for affirming this ulterior motive on behalf of a multiparticipant system of indirect perpetration in the context of organized institutional mechanisms and public/private third realm alliances will be proven in Chapter 4 to be operative in open system dynamics, such as, and based on Roxin;s theory, subjectively (i) not-knowingness among multiple participants (ii) participant motive not necessarily the same with the solicitor of the act, objectively (i) alternating direct perpetrators (ii) extrajudicial system conferring decision based on informal referenda and the precedent of similarly covertly operating secret societies, such as freemasonry (iii) institutional mechanisms complicity, where institutional agents act as ex post facto legitimators of prior made decisions through the extra judicial system of informal social networks. Semantics and pragmatics overlap in this case, because the referents of such expressions are part of the communicative situation (p48) Places do not simply constitute physical attributes of buildings etc, but social milieus generated through group interaction (p49) and time is sociocognitive time that is time that participants jointly produce (p61) Overall, the Setting provides the scene of action, sets temporal and spatial constraints that allow social coordination of social interaction in the first place, helps organize the placement and development of the current action and provides a pragmatic time frame for the relative semantics of the events and actions talked or written about as well as the conditions of speech acts (p68), wherein pragmatic schematics or the enactment of shared schemata and social representations are enacted. Therefore, in an already loaded social milieu of pre-given time and pre-given space, the impressions of the target are not created in the social situation, but rather the text [or the narrative fabricated and predicated of the target] comes to life through the contextual circumstances that circumscribe the speech acts. Hence, instead of inferential extrapolation we are confronted with a situation of meaning infusion through the preconceived, preplanned, premeditated staging of performative acts or social episodes. Thus, as previously stressed, it is a clear case of reenactment of universal concepts or flags through their instantiation in particular circumstances. Diachronic analysis of the common elements transpiercing the disparate instantiations may yield a robust interpretive account into the stage setting phenomenon of everyday rituals of exclusion and affirmation, or the ways whereby the mythic identity of social collectives is maintained95., thus pointing to the fabricated character of a targets reality and by implication to the motives 96 behind the fabrications as the subjective conditions of a premeditated97 murder attempt. The ritualistic
94

Collins interaction ritual chains is one of the most promising conceptual tools for ethnomethodological theory Collins is proposing a microsciology to account for macrostructures , converting the traditional concerns of sociology to micro events through a method of microtranslation.Discoverers work solely and completely within microsituations in which they make micro observations, compiling summaries by a series of coding and translating procedures until a text is produced which is taken as representing a macroreality, standing above all the microsituations that produced it. The phenomena Collins proposes , interaction ritual chains, are aggregates of microevents , but not in the way ordinarily conceived by social science. A lifetime [or lifeworld] is , strictly speaking a chain of interaction situations. The macropatterns exist solely and completely through the membership activity that produces the examples; the microexamples are simultaneously produced by the membership activity that generates them as instances of the macro-patterns.Here in fact is the ritual in interaction chains, and by that he means Durkheimian ritual . Each site is an occasion for recelebrating the myth or Durkheimian sacred object, ie reconstituting it as true and real, coterminous with reestablishing group membership Within this terminology , the sacred object of conversation is its content, and the conversant constitute a conversational cult, Ethnomethodology and the micro-macro order, Richard Hilbert, American Sociological Review, 1990, Vol55
95

See Dancing the dilemmas: the mythological enabling of collective action, by E.A.Royrvik and E.Wulff; Creating social glue in the community: a psychologists view, Donald C.Klein, working paper 96 As primarily resting with a collective intentionality , as already demonstrated that by default grounds a communitarian ethos 97 Premeditated in structural homonymy to preplanned; judging from consequences , as is normally done in cases of attempted murder, insofar as there is proof of preplanning behind acts of perpetration there is sufficient indication for the existence of motive. I have already demonstrated that motive rests with multiple layers of intentionality, both as ontologically conditioning collective intentionality [the causa finalis] and as individual pragmatic and other motives behind individual acts of perpetration by individual social networks

[185]

aspect of social situations, social episodes and scripts becomes evident through their encoding in cultural patterns by disciplines and scholars in social/cultural anthropology and with the employment of ethnomethodological/ethnographic methods, such as participant observation. One of the primary tasks of social anthropology is to make sense of rituals and practices that are enacted by group members as part of forming communal bonds. In the majority of the primitive social collectives that have been explored by social anthropologists, interpretive categories, such as animism and totemism have been coined in an attempt to make sense of the teleological framework in which ritual practices are embedded. Complementary to the quest for a rationale behind seemingly irrational practices, individual practices of primitive clans and groups have been extensively recorded as part of mapping out the culturally sanctioned practices and the rituals of passage whereby membership to a clan is granted, as well as how power is distributed among group members. Van Dijk further argues that there are many ways in which the complexity of current context models can be reduced through (a) the previous and ongoing application (instantiation) of general sociocultural knowledge (schemas ) about social roles (b) the previous and ongoing application of socially shared person schemas about a given person (c) the previous and ongoing application of individual, subjective schemas about a given person (d) the previous and ongoing selection of currently relevant characteristics of a participant in the ongoing communicative event (e) the current ideologies, interests, goals etc of the participant. The theory of context accounts for both the static and the dynamic aspects of the social identities of social actors as participants in communicative situations. The ongoing dynamic aspect of social contexts regarding (i) the negotiation of participants selfhood through participation in one or more networks (ii) the negotiation of targets selfhood through shifts in networks membership structures (iii) the negotiation of inter network alliances and boundaries in the context of open system dynamics affords to demonstrate both how targeting tactics tend to change over time, as well as to how social representations and collective myths predicated of targets tend to vary over time. Again, it is a matter of antonomasia salve veritate or the constant changing of exclusionary names against the background of maintaining the self-sameness of a coevolving ontological community. Hence, [my note: dynamic] social context first of all controls the formation of the mental models of the events we talk about, that is the semantics of text and talk. Social contexts not only control what we talk about, but also our representation of the current communicative event itself, our model of ourselves as speakers, as well as of other participants and of what they are doing. Thus far we have made clear by drawing on Van Dijks analysis on the formation of social contexts that (i) they are different to and conditioning of social situations as causae remotae (ii) they are the outcome of social networks participants discursive practices (iii) they are dynamic, in line with dynamics of participants both within and across networks and in themselves What Van Dijk does not display is how semantic negotiations about others in the context of social networks culminate in pragmatic judgments and the inequalities in decision making authority that by default emerge in a social grouping. The decision making process and the relative influence of certain social actors over others on which shared interpretive schemas, heuristics and biases crystallize in social contexts as the outcome of agreement on behalf of social actors remains unaccounted for. In closed systems, the generation of such schemata rests with propaganda services and it is diffused top down through chains of command while their uncritical endorsement is expected. In open systems one would expect more open levels of meaning negotiation. But is this the case in reality? Psychological phenomena in group decision making in open system dynamics , such as the Prisoners Dilemma and the Abilene paradox experiment, where communicative inertia and/or unwillingness to speak against a more powerful member of a group [the so-called red tape phenomenon] or social network forces members to agree on the specifics of a decision making situation, as against engaging in active processing of the presented information, are striking examples of why in essence group decision making processes do not differ that much after all between closed system and open system dynamics. Inertia as a precondition for agreement, brought upon members of the speech community either through fear or other states
participants.

[186]

that would induce someone to act otherwise must be factored in the situational context of decision making. For the purpose of our analysis it suffices to point to the usefulness of Van Dijks approach in making sense microsociologically of how collective experience is structured around social situations and how a streamline of repetitive social episodes conditions the reality of a target against the background of social networks participants agreement. The rationality or irrationality of agreement has already been demonstrated by allusion to Habermas theory of communicative action and by the existence of inertia inducing mechanisms during group decision making. Group dynamics and the formation of identity through group dynamics is another crucial adjacent area. Identities locate a person in social space by virtue of their relationships that these identities imply and are themselves symbols whose meanings vary across actors and situations In line with Goffman, identities are strategic social constructions created through interaction, with social and material consequences. The central tenet of social identity theory is that individuals define their identities along two dimensions, social , defined by membership in various social groups, and personal , the idiosyncratic attributes that distinguish an individual from others. These two are essentially in interplay. Because people are motivated to evaluate themselves positively, they tend to evaluate positively those groups to which they belong and to discriminate against groups they perceive a threat to their social identity. 98 One key question is whether attributional patterns are biased in accord with intergroup identification and allegiances ; many studies show a pattern of ingroup favoritism such that positive behaviors of ingroup members are attributed to internal factors and negative behaviors to external factors. Using conversation analysis Antaki et al (1996) show how identities change as interaction proceeds , that is, how contextual variations shift identity claims. Their examples show speakers not only avowing contradictory identities99 but also invoking both group distinctiveness and similarity100. In the chapter on Social episodes as basic units of social order (p97) Van Dijk demonstrates how within the continuity of the everyday lives of actors or of the histories of collectivities, episodes are flexibly defined by time periods and changes in one of their relevant dimensions, such as participating actors, their intentions or goals, or the constituent action. Also, from classical sociological theory we know that episodes may be more or less repetitive and hence routine in the lives of social actors. Such accumulated experiences will result in the construction of more or less fixed. socially shared schemas that organize the understanding of the communicative situation that frames the interaction. Thus, the motives on behalf of alternating participants in targeting activities do not rest necessarily (or at least exhaustively) with a direct benefit rationally expected from the social situation, but with an affirmation of their empirical continuity qua members of social networks, the cultural pragmatics of which mandate that they engage in ordinary ritual communicative activities whereby their situational self is negotiated in interaction with others. In essence, mutual recognition among participants as partaking of the same symbolic order is activated through putting shared schemata in practice in social situations OR CONSTANTLY REANIMATING SOCIAL CONTEXTS IN DESCRETE SOCIAL SITUATIONS THAT ARE REPEATED AS SOCIAL EPISODES. The inverse (in terms of recognition) is the case of the target, who is part of participants socially shared schemas, therefore a phantasmatic copula granting the hyperreal continuity of social milieus, but not negotiating his situational selfhood, as he is not a recognizable member of the speech community. In more concrete terms, in repetitive social situations as social episodes, such as gaslighting and street theater the target is essentially used as training device on behalf of social networks members for affirming their collective identity through engagement in common discursive rituals. The necessity of the target in discursive ordinary contexts consists in a prephenomenological spectacle of ritual killing wherein the methexis of participants is affirmative of

98
99

Social psychology of identities , J.Howard, Annual Review of Sociology 2000

By definition, then, qua group members individual participant perpetrators would be unlikely to point to their group as conditioning their voluntary commitment to participate in targeting activities 100 ibid

[187]

their unconditional sameness within the differentiating distancing from a zero point of collective narratological continuity. By drawing on the following schematic interpretation of the social situation by Van Dijk an attempt will be made to put all of the above in interactionist practice in the context of targeting incidents, such as gaslighting and street theater, while exposing the private/public third realm complicity in the context of organized mechanisms of power. In legal terms, the gaslighting and street theater instances in the targeting phenomenology are individual acts or repetitive episodes in a multi act crime as attempted ritual killings of the target , as judging from the summative or amplified or multiplicative character of their repetition (or Liptons more of the same principle) in an ontologically coherent continuum in a social context of causae remotae and pragmatic motives resting with indirect perpetrators [secret services] acting as animus socii and maintaining synchronicity in the staging of the events and the targets movements against a background of a communitarian blueprint for social action as animus auctoris that silently legitimates these actions in a social reengineering context coupled with a linguistic and corporeally pragmatic lingo and an extrajudiciary system masking decisions and motives and a set of alternating participants as direct perpetrators who by virtue of a participatory mandate are forced to maintain their hyperreal empirical selfhood through methexis in social situations repetitively rendered as social episodes and including the target projectively as the inverse point zero of their narratological continuity qua community/social networks members. Therefore, the motives for participating in social episodes involving the target do not rest exclusively with stricto sensu pragmatic interests, but also with psychological interests in terms of safeguarding security as members of social networks through participation in exclusionary mechanisms, which resembles the prisoners dilemma, in a stretched rendition [eg inflict harm on the target before the target inflicts harm on you],but not precisely, as that would amount to acting on force and waive the existence of dolus. These are interpretive technicalities resting with group behavior and dynamics. Herebelow I expose by allusion to Van Dijks method for portraying the deployment of social situations, how targeting activities constitute fabricated events aimed at keeping the target within the silent massacre closed loop mechanism:

[188]

The components of a social situation or episode or enactments of scripts are defined by Van Dijk as follows:

[189]

[190]

[191]

Scene settings are natural, there is no knowledge either on behalf of the target or necessarily on behalf of the surrounding social actors about the incident that will be enacted. In short, there is no background expectation regarding the pragmatic context of social interaction

[192]

In the context of the social situation and its pragmatic contours, judging the motive on behalf of the direct perpetrator is not feasible or visible to bystanders, save for the target himself, judging upon precedents. After all, it is an ordinary setting and judging from consequences no materials were removed from the target (eg stealing a wallet while waiting in a cue) and due to the lack of collectively shared background expectations about the outcome of the incident, no one will claim to be witness to a staged incident of a fat lady bumping onto the target. However, based on the similarity of accounts from targeted individuals, this tactic is a matter of course, it is a background expectation and nothing unusual or counterfactual emerges as an explanatory causal pattern, as a result of conditioning mechanisms. In essence it is a win-win situation for the direct perpetrator and the indirect perpetrator who suggested to the fat lady to engage in this activity and the only one who has been aggravated or harassed is the target. What are the conditionals or remote causes that allow this incident to happen? (i) Audiovisual surveillance allowing for perfect synchronicity between the targets movements and the participants actions as animus auctoris (ii)a social reengineering blueprint as animus socii promising benefits to networked social actors. In strict circumstantial sense, has the particular actor managed to augment her wealth by bumping onto the target in a SM queue? No, but it is by virtue of engaging in the particular activity that she managed to maintain her partaking in a social collective that promises higher returns through the participation in similar activities that she legitimated her actions and especially in the face of no one else being able to verify the opposite.

[193]

Thus, through engagement in a social situation for the sake of a causa finalis of maintaining the social representation or interpretive schema of a target qua inversely affirmative of the legitimacy of a communitarian ethos, the core selfhood of the direct perpetrator may not have been altered by committing an act of covert harassment (the encounter did not yield any direct material benefits) , but her situational or extended self has been renegotiated or reaffirmed qua member of social networks that have remotely conditioned through information diffusion the emergence of the target as collective myth or social representation PS: Even though, as already illustrated, in a ritualistic interactionist setting , the mythic entity as pragmatically cultural arche signifier is symbolically appropriated in an act of ritual sacrifice as spectacle of encounter, which is as material as appropriating ones career prospects insofar as the horizon of materiality opens up in a plane of immanent virtuality

[194]

Now if the target responds in an aggressive manner (either on a locutionary level or actionably, eg pushing her back) the interpretive community of surrounding social actors who partake of the interpretive schemas and know of the target qua social representation may agree on the causal pattern leading to an observation of the targets fighting back as in fact having been instigated by him. This is the reason why, as often quoted in the targeting literature, once the target gives in to the perpetrators demands and does not resist, then targeting activities seize, which amounts to saying insofar as the target accepts the dystopian spot reserved through silently complicit communitarian agreement and accepts social representations, then targeting seizes, which is the very end and causa remota of targeting, hence self defeasible. Now, are the participants silently complicit by disseminating the agreed upon description of the incident through their social networks? There is no law prohibiting someone to pass negative information about others to their peers , unless this is accomplished with dolus and with the intention to cause harm by passing defamatory information. But defamatory information is the exact way that kick started the spiralling dystopian feedback loops and the crystallization of interpretive schemas through which the targets actions came to be filtered. Certainly participants did not engage in a rational communicative action to clarify the veracity of these schemas and they were not obliged to do so, BUT THEY PARTICIPATED IN THEIR PERPETUATION, therefore acting with dolus indirectus or dolus eventualis in bringing about a causa finalis and through omission of undercutting the information diffusion. Therefore, the surrounding participants are silently complicit in the dissemination of defamatory information

[195]

[196]

Scene settings are natural, there is no knowledge either on behalf of the target or necessarily on behalf of the surrounding social actors about the incident that will be enacted. In short, there is no background expectation101 regarding the pragmatic context of social interaction . Moreover, the target is driving at a speed that by default would be hardly likely to cause any accidents, while indicating intention to turn Interestingly, upon completion of the accident a manifold group of social actors flocked around the scene, who vanished upon the arrival of the police. No one provided witness testimony, they only cared in collecting information for use in their informal referenda

101

One of the reasons for the unchallenged proliferation of this form of organized crime is that it characteristically takes place in such a way that it is invisible to the untrained eye. It is understandably, therefore, considered to be the perfect crime, as it remains unchallenged and extremely difficult to prove (gang stalking victims report)

[197]

In the context of the social situation and its pragmatic contours, judging the motive on behalf of the direct perpetrator is not feasible or visible to bystanders, save for the target himself, However, there is clear and beyond all reasonable doubt evidence that it was the other partys fault, insofar as the picture taken by the road assistance personnel indicates that only the right hand mirror of my car was smashed and there was no scratch on the right hand side of my car, which is clearly indicative of a parallel movement of the two vehicles, which my lawyer who filed the lawsuit also verified upon display of the picture and relevant videos taken on the scene [OR THE RITUALISTIC EPISODE]. Even one of the two officers that recorded the incident verified this , to whom I displayed the right hand side of my car. However, the chain of events that deployed pursuant to this event , which again displayed perfect synchronocity with my movements, was an attempt with dolus directus to appropriate assets and cause defamation through: 1. The bikers being so thoughtless OR MOTIVATED UPON SUGGESTION ON BEHALF OF LOW LIFE PEERS as to file a lawsuit for reckless driving , to which I replied by demonstrably waiving my responsibility and TO WHICH I SHOULD HAVE FILED A COUNTER LAWSUIT 2. I was informed about the pending lawsuit by the police on Sunday, ACCIDENTALLY two days after having quit from the company I was working for at that time (Sep 09) and despite that the incident had occurred in January 09!!!!

[198]

3. The presumed of the biker obtained my phone number through unidentified sources and called my insurance agent and myself claiming that I had visited her son at the hospital, WHICH I NEVER DID and attempting to fabricate a pseudo moral incident 4. My [THE SOMEHOW UBIQUITOUS COPERPETRATOR] was informed of the incident from an unidentifiable source and stressed be careful without my having displayed any intention of engaging in conversation with her and to my amazement with how such an uncritical statement [IMBUED GUILT] was made 5. I had also filed a negative responsibility claim with my insurance agency, as I had no intention to pay for damages caused by not just reckless driving on behalf of a courier, but WITH CLEAR INTENTION TO CAUSE MATERIAL DAMAGES AND PSYCHOLOGICAL HARASSMENT AGAINST ME 6. The description in the police report was complicit or functioned as an enabler to making his claim as it stressed that I attempted to turn to the right while driving in the middle lane , which EVIDENTLY was FALSE and I WAS AMAZED TO WITNESS THIS DESCRIPTION given that I had displayed the right hand side of my car to the police officer

The mode whereby this act of direct perpetration in the context of a targeting activities continuum was attained and the chain of events that took place subsequently to the accomplishment of the incident clearly demonstrate a staged social episode against an intentionally drafted background script {potentially make the target look like a reckless driver and through the repetition of similarly staged incidents the target could be seen as indeed dangerous to the public, thus confirming the intention behind my commitment and explaining beyond any reasonable doubt my s interest and

[199]

motive in maintaining the univocal blame rhetoric, also transposing through symbolic projection her psychopathology to the target . Thus, through a chain of ritualistic events or fabricated social situations the target could be portrayed [THIS TIME OVERTLY] as indeed meriting THE BLAME BROUGHT UPON HIM THROUGH SECRET REFERENDA and the ritual annihilation would amount to the realization of the causa finalis. In terms of the direct perpetrator in the particular incident, his motive was clearly pragmatically driven, while also communitarian driven as partaking of the causa finalis of a community whose affirmation on the inverse as negative simulacrum is the target at hand. This is where the causative role of collective intentionality as grounding ontologically individual motives comes into play. Is this unconditional communitarian ethos rationally motivating social actors? Judging from this among a plethora of incidents, certainly not.

Proof of agenda 21 as animus socii: Direct perpetrator a courier Coperpetrators (in terms of the subsequent chain of events); women- in fact my had obtained a copy of the incidents description from the police department WITHOUT MY CONSENT AND WITHOUT HAVING MENTIONED TO HER THE INCIDENT!!!! CLEARLY DEMONSTRATING BASED ON PRECEDENTS , THAT IS INVOLUNTARY COMMITMENT, HER ACTIVE INVOLVEMENT ACTING OUT OF DOLUS TO CONTINUE HER ATTEMPTS The silent public/private partnership emerged not only against the background of an evidently falsifiable claim, but through the deployment of consequences of the incident, which are indicative

[200]

of an attempted cover up of the targeting setting through an inversion of the chain of conditionals leading up to the incident. Dual motive: making money (the pragmatic driver), partaking of the collective ethos through targeting its inverse reflection (the ontological driver). Complicity of the perpetrators affiliates in amplifying the event and cloaking the silent agreement about targeting through pseudo moral and false claims , such as he visited in the hospital, which never occurred and taking on board family peers, who submit willfully to the perspective . MOREOVER, with the blessings of a falsified and evidently so recording of the incident by institutional agents. NOW THIS IS A STRIKING EXAMPLE OF HOW AGREEMENT IS FABRICATED OF AN EVENT AND HOW AN ATTEMPT TO LEND CREDIBILITY TO BACKGROUND ASSUMPTIONS AND SOCIAL REPRESENTATIOSN BY HYPOSTASIZING PHANTASMS and REIFYING HYPOTHESES BY PROGRESSIVELY (OR THROUGH REPETITION) PREDICATING THE CAUSE OF THE FABRICATION OF INHERENT ATTRIBUTES OF THE SOCIAL ACTOR IS MADE. This is clearly a crime of fraud and defamation with dolus directus and conspiratorial attempt (insofar as there is overt agreement) regarding private sector agents and complicity on behalf of institutional agents insofar as there is evidence of falsifying evidence with dolus indirectus, insofar as it recognizes the potential harm for the individual (in terms of material compensation and defamation) yet proceeding with legitimating a falsified account. THE VERY FACT THAT THE TIMING OF REPORTING THE INTENT ON BEHALF OF THE PERPETRATOR TO PURSUE A LAWSUIT UPON A PRECEEDINGINCIDENT COINCIDED (IN A LIST OF WEIRD COINCIDENCES) WITH MY QUITTING MY LATEST JOB ROLE AND IN THE FACE OF A TIME LAG OF 9 MONTHS SINCE THE INCIDENT ORIGINALLY OCCURRED IS CLEARLY INDICATIVE OF A FAR WIDER SURVEILLANCE MECHANISM. The involvement of women and couriers is a clear indication of the involvement of agenda 21 , as these groups constitute identifiable agents through which the agenda is fleshed out. Coupled with precedents and the involvement of family members in the shaping of the events with the blessings of institutional agents, it is clear that there is a targeting case. Other noteworthy circumstantial evidence is the advent of an aged man in the location who claimed I heard you saying Im not alright which was clearly false and while I was fully conscious and indeed calm, as I had been accustomed to recognizing similar targeting activities in the targeting apparatus. What is striking is the attempt to imbue a psychological deficit by leveraging a seemingly incidence of weakness through suggestibility. That person looked and acted like a freemason,

[201]

3.4 How does ethnomethodology and Conversation/Discourse analysis102 aid in further elucidating the discourse of targeted individuals whereupon an ontologically coherent lifeworld is imprinted? I use the term ethnomethodology to refer to the investigation of the rational properties of indexical expressions and other practical actions as contingent ongoing accomplishments of organized artful practices of everyday life103 HOW IS AGREEMENT REACHED IN AN ORDINARY SOCIAL SETTING? THROUGH THE USE OF EMPHATIC DESCRIPTORS , SUCH AS ACTUALLY IN THE CONTEXT OF A DESCRIPTIVE SENTENCE. UPON FURTHER ELABORATION OF WHAT ACTUALLY DENOTES, GARFINKEL found through the codification of group decision making process that this assurance would be obtained by seeking to establish the presence in the conversationalists relationship of warranting virtues such as their having spoken honestly, openly, candidly, sincerely 104 and the like. ALL OF WHICH IS TO SAY THAT [MEMBERS] WOULD INVOKE THEIR KNOWLEDGE OF THE COMMUNITY OF UNDERSTANDINGS AND THEIR KNOLEDGE OF SHARED AGREEMENTS TO RECOMMEND THE ADEQUACY OF THEIR ACCOUNTS OF WHAT THE PARTIES HAD BEEN TALKING ABOUT, ie WHAT THE PARTIES UNDERSTOOD IN COMMON. THEY COULD ASSUME THAT I AS A COMPETENT COMEMBER OF THE SAME COMMUNITY SHOULD BE ABLE TO SEE THE CORRESPONDENCE AND ITS GROUNDS
102

There are methodological differences between these two methods, which lie beyond the scope of this lawsuit 103 H. Garfinkel , Studies in Ethnomethodology 1967 104 Remember that this is also a fundamental condition in Habermas theory of communicative action

[202]

From the point of view of sociological theory the moral order consists of the rule governed activities of everyday life. In accounting for the stable features of everyday activities sociologists commonly select familiar settings such as familial households or work places and ask for the variables that contribute to their stable features Recognizable scenes, or fact, or methodic character or objectivity of accounts are not independent of the socially organized occasions of their use (p10). A member uses background expectancies as a scheme of interpretation . With their use actual appearances are for him recognizable and intelligible as the appearances of familiar events. For these background expectations to come into view one must either be a stranger to the life as usual character of everyday scenes or become estranged from them. AS ALFRED SCHULTZ POINTED OUT, A SPECIAL MOTIVE IS REQUIRED TO MAKE THEM PROBLEMATIC. In the sociologists case this special motive consists in the programmatic task of treating a societal members practical circumstances which include from the members point of view the morally necessary character of many of its background features as matters of theoretic interest. In a nutshell, ethnomethodology seeks to decode what is given in ordinary social settings, or latent intentions of individual and group structures, thus laying bare how seemingly accidental105 and circumstantial aspects of ordinary events assume a patterned and goal oriented character or causa finalis motivated and perpetuated by a collective intentionality against (i) fabricated interpretive schemas as the outcome of agreement among social networks participating social actors (ii) fabricated scripts and social situations as observable and verifiable aspects of the targets and the communitys lifeworld. The documentary method and the mental institution diagnostic or coding of empirical reality process constitute two exemplary cases of applied ethnomethodology and particularly pertinent to the decoding, through conversation and discourse analysis of latent intentions behind targeting methods. In the case of the documentary method, the underlying pattern was not only derived from a course of individual documentary evidences but the documentary evidence in their turn were interpreted on the basis of what was known and anticipatorily knowable about the underlying patterns. The sense of the expressions depended upon where the expression occurred in serial order, the expressive character of the terms that comprised it and the importance to the conversationalists of the events depicted. The anticipation that persons will understand , the occasionality of expressions, the specific vagueness of references, the retrospective prospective sense of a present occurrence, waiting for something later in order to see what was meant before are sanctioned properties of common discourse . According to Schultz: the meanings of events are products of a socially standardized process of naming, reification, and idealization of the users stream of experience, ie are the products of language It is not unusual for sociologists to speak of their fact production procedures as processes of seeing through appearances to an underlying reality The suggestion is recommended that when researchers call upon reasonableness in assigning the status of findings to their research results ,they are inviting the use of such features as these as a context of interpretation for deciding sensibility and warrant. Findings as outcomes of documentary work, decided under circumstances of common sense situations of choice, define the term reasonable findings Not only is the underlying pattern derived from its individual documentary evidences, but the individual documentary evidences, in their turn, are interpreted on the basis of what is known about the underlying pattern106. Insofar as social situations and episodes in a targeting empirical continuum depend upon social networks powerful members and an animus auctoris controlling targets activities, the decision
105

Or NECESSARY ACCIDENTS, insofar as CAUSAE PER ACCIDENS pertaining to individuals incidents are reducible to a CAUSA PER NECESSITATEM as the hypostatization of the dystopian narrative pertaining to the target 106 This is a particularly important remark, insofar as it affirms Kastanidous hypothesis of the amplifying nature of individual acts of perpetration in a multiact crime. Social situations, social episodes and scripts create the documentary and the documentary conditions through background assumptions what scripts and episodes will be used. It is a case of co-creation of meaning as explored in my MSc dissertation.

[203]

maker is conceived to have set for himself the task of devising a program of manipulations upon each successive present state of affairs that will alter each present state so that over their succession they are brought into conformity with an anticipated state 107, is the goal, the solved problem. THESE FEATURES MAY BE RESTATED IN TERMS OF THE RULES OF EVIDENCE. In the case of the mental institution coding process, instead of assuming that coders, proceeding in whatever ways they did, might have been in error, in greater or lesser amount , the assumption was made that whatever they did could be counted correct procedure in some coding game. The question was, what were these games? HOW DID THEY DO IT TO GET WHAT THEY GOT? Coding instructions ought to be read instead as consisting of a grammar or rhetoric, they furnish a social science a way of talking so as to drive consensus and action within the practical circumstances of the clinics organized daily activities, a grasp of which members are expected to have as a matter of course. According to conventional reasoning, the amount of agreement furnishes one set of grounds for lending credence to coded events as actual clinic events. A critical feature of conventional reliability of assessments is that the agreement between coders consists of agreement on the end results The reliability: of coded results was addressed by asking how the coders had actually brought folder contents under the jurisdiction of the Coded Sheets items. Garfinkel called these ad hoc considerations adhocism. AD HOCISM OCCURS WHENEVER THE CODER ASSUMES THE POSITION OF A SOCIALLY COMPETENT MEMBER OF THE ARRANGEMENT THAT HE SEEKS TO ASSEMBLE AN ACCOUNT OF AND, WHEN FROM THIS POSITION HE TREATS ACTUAL FOLDER CONTENTS AS STANDING IN A RELATIONSHIP OF TRUSTED SIGNIFICATION TO THE SYSTEM IN THE CLINICs ACTIVITIES. IN SUM, CODING OF EMPIRICAL DATA (MAINLY VERBATIMS) IN AN INSTITUTIONAL SETTING AIMS PRIMARILY AT VALIDATING THE ANALYTICAL CATEGORIES (OR TAGS) OF THE CODE108 SHEET, RATHER THAN MAKING SENSE OF PARTICULAR CONDITIONS AND
107

This confirms the self referentiality between social situations and background assumptions- they are mutually conditioned and self-amplifying in a targeting hyperreal edifice 108 Striking examples of why psychiatry and DSM analytical categories constitute ex post facto legitimations of preconceived decisions in the context of distribution of money and power :

The shifting analytical categories of DSM based on shifting public mores about the legitimacy of certain phenomena (eg homosexuals progressively dropped from being tagged as mentally ill) The selective targeting when ascribing tags and the intentional failure to apply tags when it comes to members interdependent power circles (eg nymphomania is recognized as mental disorder, yet publications about judges proclaiming that sexual orgies alleviate social tensions are not even commented upon) Considerably open and wide scope of the analytical categories in order to cater for even contradictory behaviors (eg a more inward oriented person may be tagged as psychotic as against a more outward oriented person who may be tagged as sociopath)

From an ethnomethodological perspective, and most notably in Garfinkels seminal work, the considerably biased process whereby verbatims and observations and fragments from historical accounts are selectively combined in such a manner as to produce as better fit as possible between data and preconceived analytical principles lay claim to the major violations of human rights laws that are legitimated through a pseudo epistemic process. In the same manner that lay persons driven by pragmatic interests engage in exclusionary value judgments, the psychiatric profession merely affords to legitimate the exclusion process by conducting a pseudo scientific diagnostic process. The fortification of this process is facilitated by value judgments from interdependently related institutional representatives, such as police, secret services and the judiciary. Hence, the role of psychiatry is in essence political as an apparatus for legitimating state sanctioned violence, which especially in the face of public/private partnerships favored by agenda 21 and

[204]

CIRCUMSTANCES LEADING UP TO AND MAKING UP THE VERY FABRIC OF THE EMPIRICAL REALITY OF THE CODED STATEMENTS . THIS IS EVEN MORE EVIDENT IN CASES WHERE EITHER CLAIMS ARE OMITTED OR DISTORTED OR ELLIPTICALLY TRANSCRIBED IN ORDER TO PRODUCE A BETTER FIT BETWEEN THE ANALYTICAL CATEGORIES AND THEIR INSCRIPTION IN PARTICULAR VERBATIMS. In addition to Garfinkels uncovering the coding process and the assumptions relevant thereto in mental illness diagnostic procedures, other ethnomethodologists109 have delved into reasons for ascribing mental illness to individuals, where, strikingly and most relevant to the tagging procedure in targeting cases, membership issues were discerned:

Membership is a central notion in ethnomethodology. Garfinkel uses the term to refer to anyone who has mastery of a natural language. Our concern here is with the relationship between membership , rules and mental illness. Blum characterizes psychiatric troubles as necessarily being a matter of problems of membership.

How are natural language rules learnt? An individual does not learn the common culture, ie membership requisites, by memorizing abstract concepts and rules, but rather by experiencing concrete situations which serve as exemplars, to be relied upon in subsequent situations., Like Schutzs typical situations, cultural exemplars are learned by members through encountering concrete instances of varying situations which can be characterized as typical.. Furthermore, most of the typifications are not exhaustively of the individuals own making, but are handed down as a part of the common culture which he acquires in the learning of a common language. BY THE SAME TOKEN, THE SILENT MASSACRE ACTIVITIES AND THE MASSIVE LITERATURE AND INDIVIDUAL ACCOUNTS ON THE NEW GLOBAL ETHOS POINT TO EXACTLY THE SAME EXCLUSIONARY METHODS AND MECHANISMS, Membership failure itself does not constitute mental illness; rather, it constitutes an occasion for the imputation of mental illness.

How mental illness is manufactured as agenda 21s lingo learning deficit? Cultural paradigms provide exemplars concerning what madness looks like , just as exemplars concerning other forms of behavior are provided. As above stated, agreement on acceptable turn-taking rules and their variations may be granted only against the background of an ideal speech community of rational actors, while the definition of
hidden distribution of power mechanisms favored by secret societies circles , such as freemasonry, remains unquestioned as it constitutes a clear case of targeted extinction through the silent massacre phenomenon.
109

Rules and examples in lay and professional psychiatry: An ethnomethodological comment on the ScheffGove controversy , American Sociological Review 1975)

[205]

what constitutes rationality, especially in lay terms, has been found not only to be wanting and far from disinterested when it comes to conferring value judgments, but to be highly incumbent on situational and contextual aspects and schematic idealizations that constitute background assumptions not only about the pragmatic contours of discrete situations, but also and more importantly about the social actors that engage in these situations. Now, what the targeting phenomenon consists in is the pre planning or the manufacturing of these ordinary encounters and engagements in language and discursive games in such a manner as to preconditionally elicit such responses on behalf of the targeted social actor as to enable the participants in the scene to confer exclusionary judgments about the targeted individual. As already noted, the social constructivist approach to reality generation, which is also largely affirmed by a bottom-up micro sociological approach as ethnomethodology, suggests that a descriptive account of an incident necessarily involves a selection of salient features. What is lacking in the context of targeting , which at the same time poses significant questions about the objectivity and the validity of value judgments that are made about the targeted social actor on the occasion of his having been enmeshed in such encounters is Habermas requirement of symmetrical information distribution among them. Insofar as the targeted social actor is always already laden with background assumptions, which imply that in the manufactured incidents not only is he not participating in an informationally symmetrical manner, but on the contrary is informationally at a disadvantageous position vis a vis the rest participating social actors, the amount of control he can exercise on the outcome of an encounter is by default compromised. Therefore, agreement on behalf of other social actors about the outcome of an encounter does not surface in the context of an ideal speech community, but of evidently pragmatic and not at all disinterested inferential chains or ritual chains, as above quoted. Ethnomethodology since Garfinkels seminal work has been instrumental to systematically accounting for both ordinary social phenomena, as well as institutional discursive practices (including the codification procedure during the justification of judiciary verdicts and the normative constraints in a juridical trial). Several such normative orders can be cited as rules that governed what jurors could correctly treat as the case. Conformity with these orders served thereby to determine jurors satisfaction or dissatisfaction with the verdict. Stated as rules of correct decision making they run as follows: Those decisions on the facts are correct: 1. That are made within a respect for the time that it takes to arrive at them 3. That do not require of the juror as a condition for making them, that he adopt a neutral attitude toward the everyday relationships that exist among the persons on the jury 4. That do not require that the juror call into doubt what anyone knows about the ways in which competence, authority, responsibility and knowledge are usually distributed among and evidenced by social types of persons

5. If the number of variables defining the problem (and thereby the adequacy of the solution)
can be reduced to a minimum by trusting that the other persons on the jury subscribe to the same common sense models 6. If only as much of the situation is called into question as is required for a socially supportable solution to the immediate problem in hand

7. If the jurors emerge from the inquiry with their reputation intact The level of fit between ethnomethodological processes and legal discourse has also been explored to a considerable length,

[206]

The employment of ethnomethodology also has important implications for legal discourse and legal argumentation insofar as it addresses crucial contextual aspects in which social action is situated, thus it is revelatory not only of the semantic aspects of utterances (that more often than not constitute the focal point of dogmatic law interpretation), but, even more importantly, of their pragmatic aspects, those features of the context in which the argument occurs that shape and constrain the proper interpretive reconstruction of its logical form. 110 THE EXPANSION (OR RATHER STRETCHABILITY) OF THE APPLICATION OF RULES OF DOGMATIC LAW IS TRULY TESTED THROUGH THE CONSIDERATION OF PRAGMATIC ALONGSIDE THE SEMANTIC ASPECTS OF ARGUMENTATION AND THE FACTS THEY PORTRAY, INSOFAR AS exemplary reasoning processes that abduce deductively applicable principles operate not just at the level of testing arguments for validity, but also at the deeper level of discerning the very rules of deductive inference that help to define the concept of validity itself111 The dialectical relationship between deductive and abductive logic in the formation of deductive principles has already been illustrated in chapter 2 by allusion to the Peircian approach. Given the above potential of factoring in the interpretive equation pragmatic qualifiers by putting the phenomenon at hand in perspective through an ethnomethodolgical approach (especially useful in the face of (i) radically changing mores demanding a reevalutation of fundamental premises (ii) the novelty , thus indeterminacy based on legal precedents, of the phenomenon under scrutiny both as regards the technicalities whereby it is operationally carried out, as well as the motives and objectives that condition it) what is evidenced is the mandatory task of emphasizing contextual and abductively rich facets. Most often indeterminacy and manipulation surface in STANDARDS OF REVIEW and DEMANDS OF PROCEDURAL DUE PROCESS ( , , , )112 Contemporary jurisprudence approaches claim that in important respects, laws and other legal rules cannot be stable , consistent or unchanging with regard to what particular rules mean and how they should be applied ( , , , , , , , , , directus, indirectus, eventualis, - , , , , ) Context dependent rules are socially constructed in a strong sense: in any given instance , meaning and application can only be ad hoc. Even a contextualizing jurisprudence fails to grasp how people actually use many legal rules in an indeterminate world. To apply a rule, therefore, we often draw on knowledge or competence or interpretations not contained in the rule itself Garfinkel defines rules for orderly social action as tacit background assumptions . The co-evolution paradigm: the generation and maintenance of social order are not available in purely psychological categories of internalization , no more than they are available in purely mechanical categories of rule application free of all interpretive judgments WE STRETCH A RULE TO FIT THE PARTICULAR SITUATION, OR RECONSTRUCT THE RELEVANT EVENTS OF A SITUATION TO FIT THE RULES CRITERIA OR REINTERPRET THE SITUATION TO FIT A RULE OR IGNORE FEATURES AND EVENTS OF A SITUATION THAT CONTRADICT A RULE SO AS TO SUSTAIN THE RULES APPLICABILITY Such behaviors reflects a rules indexicality: the rational properties of indexical expressions and other practical actions are contingent ongoing accomplishments or organized artful practices of everyday life (Garfinkel) . INDIVIDUALS TREAT
110

refer to Exemplary Reasoning: Semantics, Pragmatics, and the Rational Force of Legal Argument by Analogy Author(s): Scott Brewer, Source: Harvard Law Review, Vol. 109, No. 5 (Mar., 1996), pp. 923-1028 111 ibid 112 Using legal rules in an indeterminate world- Overcoming the limitations of jurisprudence, Benjamin Gregg, Political theory Vol27, No3, June 1999, pp357-378

[207]

NEW PHENOMENA AS INDEXES OR MARKERS FOR PHENOMENA ALREADY RECOGNIZED : GROUPS OR COMMUNITIES OF INDIVIDUALS RENDER THE UNFAMILIAR FAMILIAR BY RELATING WHAT THEY NEWLY ENCOUNTER TO WHAT THEY ALREADY KNOW. WHAT THEY ALREADY KNOW PRODUCES AN INDEX IN TERMS OF WHICH THEY EXPLAIN NEW OBJECTS OR EXPERIENCES TO THEMSELVES AND OTHERS . THESE ACCOUNTS THEMSELVES CONSTITUTE THE CONTEXT OR SETTING OR CONDITION THEY PURPORT TO BE DESCRIBING AND OF COURSE THEY THEREBY DESCRIBE THE VERY CONTEXT THEY ARE FACT CONSTITUTING. THE ACCOUNT CONSTITUTES THE SETTING Six ways whereby the ethnomethodological approach is unique and offers insights otherwise unavailable even to contextualizing jurisprudence - What is challenged is conventional jurisprudence, which seems to follow a naturalist/evolutionist paradigm

Competence not correctness :

o
o

If rule application is ad hoc , as it must be when it is indeterminate , then each case of application must have its own, unique standard of correctness Stanley Fish according to whom a legal professional arguing a case of drafting an opinion presupposes specific understandings of the relevant law, its terms and its applications. The difference between reaching political conclusions and beginning with political intentions is that if you are doing the second you are not really doing a job of legal work

Known/uknown not legal/illegal: o The binarism just/unjust is applicable in a set of fully determinate phenomena. WHENEVER THE EXPLICIT PROCEDURES FOR CODING COULD NOT ANSWER QUESTIONS THAT ARE DEVELOPED IN THE COURSE OF CODING , THE PROCEDURES ALLOWED THE ORDER TO IMPROVISE DECISIONS AND THUS GENERATE THE ANSWERS NEEDED TO COMPLETE THE CODING Such a perspective does not presuppose that rules and behavior are directly and causally linked

Rule autonomous procedures not rule needy procedures o Where a judge or a police officer or some other user of legal rules experiences difficulty in correlating a codified general rule with a specific instance of application, he or she cannot appeal to the legal code for clarification: like legal rules in general, a legal code is not self interpreting As Zimmerman stresses, the individual discovers a given rules true meaning and proper application in the course of employing the rule over a series of actual situations [MY NOTE: Or , quoting Wittgenstein, by engaging in language games in the course of life, retaining the epiphenomenological discourse of language as a metaphor of life revealing itself through language games]

Creative non compliance , not narrow compliance

[208]

Practical methods, not abstract principles o Ethnomethodology offers a perspective that can go further and tease out the methods or ways in which indeterminate rules are actually applied by uncovering one or the other calculus for the application of indeterminate rules [MY NOTE, eg BY STARTING FROM CODING EITHER ANALYTICALLY OR SYNTHETICALLY INDIVIDUAL ACCOUNTS IN ORDER TO MICROSOCIOLOGICALLY GENERATE PATTERNS OF LIFEWORLD, WHICH BY ANALOGY MAY BE OF INTREPRETIVE VALIDITY TO MACRO PHENOMENA- see previous notes on the micro/macro mutually supposing evolution of the lifeworld]

Situations applied to rules, not rules to situations o Jurisprudence emphasizes ways in which rules are applied to situations , while ethnomethodology reveals ways not in which rules are applied to situations, but situations to rules Ethnomethodology and conventional jurisprudence agree that rules determine behavior. But only ETHNOMETHODOLOGY RECOGNIZES HOW RULES ARE DEPENDENT ON THE CONTEXT OF THEIR APPLICATION AND HOW RULES ARE RELATED INTERNALLY AND NOT MERELY EXTERNALLY TO THE BEHAVIOR THEY DETERMINE. ONLY ETHNOMETHODOLOGY RECOGNIZES THAT IN PERFORMING A ROLE, RULE USERS DO NOT PASSIVELY FOLLOW RULES AND ROLES BUT ACTIVELY MANIPULATE THEM, EVEN INSTRUMENTALIZE THEM, TOWARD ACHIEVING THEIR GOALS. RULES THEN ARE LIVED FEATURES OF THE SETTINGS IN WHICH THEY FUNCTION NOT NECESSARILY FORMAL RULES OF ACTION, BUT WHAT FISH CALLS INTERPRETIVE COMMUNITIES THAT PROVIDE MEMBERS WITH ACCESS TO PUBLIC MEANINGS AND DELIMIT TO THOSE MEANINGS MEMBERS UNDERSTANDINGS

WHERE ETHNOMETHODOLOGICAL AND JURISPRUDENCE INTERPRETATIONS CONVERGE IS ON THEIR PRAGMATIC ORIENTATION, VIZ. WE CHANGE FROM ONE INTERPRETATION OR APPLICATION TO ANOTHER FOR PRAGMATIC, CONTINGENT REASONS. In terms of method for conducting ethnomethodological research, Conversation and discourse analyses are usually employed. At the most general level , CA is concerned with the methodical construction in and through talk of member productive and analyzable social action. Exemplary topics include the organization of sequences (as perhaps the identifying mark of most conversation analytic studies), the structure of repair, the preference for certain conversational forms as an organizational, rather than psychological phenomenon , the primacy of ordinary conversation and its relation to social structure and institutional environments , the interrelation of vocal and nonvocal activities and others. IT IS A STRATEGY OR METHOD FOR DEALING WITH THE INVISIBILITY OF COMMON SENSE. The organization of summons-answer [or stimulus-response] sequences can be decomposed to appreciate that any comparability of a ringing phone across settings, rather than residing in the nature of phone rings as uniform and context free stimuli, is the outcome of situated work as an

[209]

embodied presence in settings of social action, wherein exists an in vivo coherence to the phenomenal details of which the object of ringing phone originally consists113. For example, noise campaigns (sirens, bikers etc) are customarily employed as targeting methods. Unless they are viewed from a targets experiential plenum, their interdependence with the tactical toolbox is not made apparent. What is unusual about an ambulance driving by ones car with sirens ringing? The frequency with which this tactic is experienced by a target in conjunction with a preplanned experiential blanket of conditional mechanisms. It is of circumstantial validity in an experiential continuum and not of absolute validity in the standalone context of an isolated social situation. It is part of a script in a series of social episodes and not a standalone social situation or in a chain of ritual events in Collins terms. In the following paragraphs I am citing targeted individuals accounts (some among a plethora) prior to applying a conversational or discourse analysis with view to unearthing the latent intentions and assumptions behind seemingly ordinary activities and issues of common sense and common experience: (C1) Max Williams, Board member of the Freedom from covert harassment and surveillance organization (FFCHS) and retired diplomat In recent years, scientists have learned how to locate, focus on, and lock onto a persons brain by remote to manipulate that persons thoughts and thus his actions. Mind control assaults now loom as one of the main challenges of the 21st century. The targeted person often never discovers that he has become a mind control victim, and he ends up hurting others, taking his own life, or simply becoming another Alzheimer statistic. This paper discusses some of the elements of what I call electronic stalking and mind control (ESMC). I am one of the targeted individuals (TIs) of those activities. ESMC does not happen randomly. The powerbrokers behind it identify and attempt to destroy the lives of targets through hirelings, whom I call handlers, for their own purposes. Their handlers in turn seek to neutralize TIs in any possible way. Curtailing the targets ability to communicate aids the handlers in neutralizing the targets. My handlers, who have had access to my computer for years, tried their best to prevent my communicating via this paper. They especially interfered with my writing the section on psychiatrists and their role in ESMC by continually deleting my text, keeping me from saving the text to the computer, and causing countless other mechanical problems. But they failed to silence me, just as they are destined to fail in perpetuating their evil practices. Unfortunately, electronic stalking and mind control has become a science, much of which is still secret. That does not necessarily mean that the science is particularly complicated. It is more likely that it consists of several new technologies that in combination with each other produce the ESMC. Nothing remains a secret forever. We shall know, probably very soon, how the ESMC operates and who does it. In The Silent Massacre, I discuss my particular case, inform readers of what I know for certain about the ESMC, and speculate about other facets of it. Targeted individuals will readily identify with what I talk about in this paper. They understand the veracity of my descriptions of the effects of electronic and mind control attacks, which to others read like science fiction. This paper is written principally for those victims. However, readers who are not TIs but who are intellectually curious about electronic and mind control assault will learn much about a sick attack on tens of thousands

113

Indexical expressions and sequential organization (Garfinkel & Sacks, On formal structures of practical action) What was said will have been understood to have accorded with their relationship of interaction as an invokable rule of their agreement , as an intersubjectively used grammatical scheme for analyzing each others talk

[210]

of targets that also indirectly affects everybody in those targets lives. The attackers are known as the perpetrators, or perps. In recent years, scientists have learned how to locate, focus on, and lock onto a persons brain by remote to manipulate that persons thoughts and thus his actions. Mind control assaults now loom as one of the main challenges of the 21st century The powerbrokers behind it identify and attempt to destroy the lives of targets through hirelings, whom I call handlers, for their own purposes. Targeted individuals will readily identify with what I talk about in this paper. They understand the veracity of my descriptions of the effects of electronic and mind control attacks, which to others read like science fiction The human resources and the enormous cost required to carry out electronic stalking and mind control, re-enforced in many cases by gang stalking, almost certainly limit its use to governments Only governments can mobilize the enormous outlay of funds and successfully camouflage the use of those funds. Only governments have the sophisticated equipment and computers required for electronic abuse and mind control. Only governments can train in secrecy the cadre of handlers who administer the electronic assault and mind control activities, using deception and psychology I know that even back in the mid-1970s somebody was either attempting to take over my mind or that it had already been hooked. The local dentist found in the tooth a tiny cylindrical pin-like object less than a quarter of an inch long that he thought perhaps was the point of a file My computer has been hacked and my phone tapped for years. In recent years, scientists have learned how to locate, focus on, and lock onto a persons brain by remote to manipulate that persons thoughts and thus his actions. Mind control assaults now loom as one of the main challenges of the 21st century The powerbrokers behind it identify and attempt to destroy the lives of targets through hirelings, whom I call handlers, for their own purposes. Although it is now obvious that I had been targeted since the mid-1970s, I did not discover it until December 7, 2005, when my assailants, or handlers, started bombarding me with electrical-like jolts, strong vibrations, and other physical torture. The first electronic vibrations struck me with such force that I could hardly stand on my feet. I gradually learned that the physical electronic effects, although annoying and painful, were simply used to soften or sensitize or pre-condition me for the real objective mind control. As an historian and former government employee, I understand the value of documentation. Thus, on the very day that the electronic effects first pounded me, I started recording a detailed journal in which I recount my experiences and my thoughts concerning that topic. I later realized that my handlers could utilize my journal as a written record of the effects of their torture, could adjust their effects on my mind and body accordingly, and could circulate a written copy of my journal among themselves. Yet, I felt that it was more important to keep a record of those occurrences than to attempt to beguile the handlers. The journal today comprises seven volumes and over a thousand pages of single spaced typescript. Satellites now possess amazing capabilities, all performed by remote, and they may very well be utilized in electronic assaults and mind control. In a 2003 article called Shocking Menace of Satellite Surveillance, John Fleming wrote about the use of satellites in ESMC assault. Discussing the realities of satellite-driven ESMC, Fleming said: The victims movements will be known, his conversations heard, his thoughts picked clean, and his whole life subjected to bogus moralizing, should his tormentor diabolically use the information gained. A sadist could harass his target with sound bites, or audio messages, directly broadcast into his room; with physical assault with a laser; with subliminal audio messages that disturb his sleep or manipulate persons around him into saying something that emotionally distresses him . . . Some evidence also suggests that targets minds can be hooked if the handlers know the targets DNA. If that is true, targets would not necessarily have to have a microchip or other object or substance in his body to be hooked In my case, the handlers often show me holographic pictures of a man in robes who is generally believed by Christians to be Jesus and tell me that I am going to hell

[211]

The phones Caller I.D. showed, Unknown name. Some of those communications providers probably do allow the use of their facilities by the handlers at the request of the Government. Handlers can even hack into targets email accounts to send messages that damage the reputation and credibility of those hapless victims. Several targets have accidentally found some of those fake messages on the internet while communicating with others. One of the handlers favorite deceptions involves sex They use that as a tool to induce anxiety, confusion, fright, frustration, and humiliation in the target. They also deceive targets concerning their food and drink. Many targets complain that the food and beverage kept in the refrigerator taste strange, and they think that their handlers have poisoned it. Here are some of the capabilities of the targets handlers through the types of patents seen above. (1) Monitor movements. The handlers not only know ones vehicular movements but they can also view him and follow his movements on his property and even inside his house. Once they hook the target with their equipment, they have ready access to him at all times. Their torture follows the target wherever he goes, even to other states and abroad. The handlers seemingly track the target within his dwelling, and when the target stands or sits in a particular grid square, the handlers can use their computer software that works with their device to perform various effects on the target (2) Hear and record ones conversations along with those with whom one talks. This can be done even in a moving vehicle or while on foot in a rural area. The harassers occasionally record and play back to the victim excerpts of some of those conversations in his brain (4) View the victims body whether it is clothed or not and zoom in on any part or organ of the body, even in the darkness Those effects include -sensation of pin pricks in the eyes, shoulders, face, feet, elbows, and other areas. The pin prick can be instantaneous or can be prolonged. In my case, the handlers have long caused an enduring pin prick on the rear of my neck, They have also frequently pricked underneath the toenail on my right foot, causing the toenail to recede for a quarter of an inch between it and the skin, much like laser is used for ingrown toenails. restless legs. A sensation begins in the small of the back and extends into the extremities, causing the restless legs syndrome electrical jolts, tremors, or vibrations, zapping in/on the head, clicking in the left ear, stomach aches and pains, indigestion, nausea, and dizziness, sodomizing and virtual rape, lethargy and listlessness. I suspect that many people suffering from Chronic Fatigue Syndrome are actually victims of ESMC, sleep deprivation, intense itching, twitching of the fingers, partial loss of sight. The handlers do something to the eyes that make them feel as if a grain of sand is underneath the eyelid, unnatural salivation, involuntary physical movements, sores in various areas, high and sudden temperature rises in the body The electronic jolts and vibrations also affect domesticated animals (7) Cause the target financial problems Making the target spend thousands of dollars on remedies and gadgets that supposedly neutralize or ameliorate the effects of ESMC and causing him to hire detectives to investigate the ESMC. Destroying expensive household and other items, making targets have to replace them. In my case, they have ruined two printers, two blenders, and other household items. Their device, however, can only affect machines that have small motors or batteries. My coffee makers, which have no motor, are not affected. Fomenting personal and other problems that require that targets hire lawyers. A TI correspondent wrote about her taking videos of neighbors overtly harassing her and then being arrested for that action. She had to hire a lawyer to get out of jail. Of course, nothing happened to the harassers. Moreover, now that law abiding citizen has an arrest record that will follow her to the grave. Robbing targets of their time by harassing them continually with electronic assault and mind control, thus keeping them from tending to their business affairs. Very often targets lose their jobs because of the ESMC distractions in their lives. I have spent countless hours taking notes, recording them in my journal, corresponding with other TIs, researching on the internet, and trying objects and ways to neutralize the ESMC effects, time that I could have spent on home improvement projects and

[212]

other useful activities. I am a very able genealogical researcher, and I used to spend hours a day at that pastime. Now I very seldom do family research because of the many distractions that affect my concentration. Causing targets financial ruin is one of the aims of the handlers. Broke people are usually harmless and defenseless. Many of the targets with whom I have corresponded have depleted their savings and have gone into bankruptcy because of the perverts. Others have become virtually street people. The handlers set out to break targets financially, and they often do. (9) Manipulate the targets computer and telephones. By hacking the computer and tapping the phones, the handlers are able to interfere with the targets communication system and thus harm his relationships with family members and friends. One of the chief aims of the handlers is to totally isolate the target from society. Interference with the targets PC and telephone is designed to annoy the target, isolate him, and find out who his contacts are. Information gained about the target by tapping his phones and hacking his computer is minimal, as the handlers ALREADY know the targets most intimate thoughts, actions, and his life history. (10) Discredit the target by making him appear insane or demented. They will also spread rumors about the target designed to isolate him from neighbors. Those rumors will usually suggest that the target is a drug pusher or user, a child molester (one of their favorites), a wife-beater, a common street walker or male prostitute, a rip-off artist, a closet drunkard, a white collar thief, a racist, an anti-Semite (another of their favorites), and others. In addition to socially isolating the target, the handlers also seek to cause the target anxiety and other psychological problems that drive him to a psychiatrist, who then diagnoses him as schizophrenic. The handlers know that once the target sees a psychiatrist and it becomes a matter of record, the targets sanity becomes an issue. Afterward, whatever the target says will be treated as suspect. This is important to the handlers, as they know that the target will be discredited if he seeks out law enforcement. (11) Register the targets emotions. Their software allows them to use the targets pulse rate and probably other methods to record emotions such as anxiety, panic, fear, frustration, anger, sadness, loneliness, and others. The emotions actually appear in the form of words that surface in your thoughts, e.g., frustration, loneliness, anger. In addition, the perverts continually whisper those words into your brain to actually cause those emotions. Handlers prepare loop play tapes of their talking whose design is to play on the targets emotions. (More about subconscious talking later.) (12) Cause mood swings. The handlers mind control programs can cause moods that range from explosive anger to total complacency. This causes erratic behavior in the target that is seen by many observers as a mental disorder. (13) Transmit voices into the brain that only the victim can hear. Targets usually refer to this as voice-to-skull (V2K), synthetic communication, or microwave hearing. When I first heard the voices, I was driving. Knowing my thoughts also gives the stalkers my computer passwords (and thus control over my communications), information about my business matters, and previous knowledge of my actions and movements. In those skits, the handlers actually direct the actors while looking for signs of phobias, sexual foibles, anxiety, and other human characteristics that they can exploit. The handlers objective is to learn increasingly more about targets weaknesses. What only a few targets realize is that their handlers not only want them to appear mentally disturbed but also physically unappealing. I can only imagine that the handlers receive much sick pleasure out of doing that. However, another reason for wanting targets unattractive is to socially isolate them. Here again psychology plays a role, as a target becomes very self-conscious about his/her looks and stays home alone to avoid people. Here are some of the ways that the handlers accomplish that objective.

[213]

Cause targets either to gain an enormous amount of weight or lose enough weight to look emaciated. They prefer to make targets gain weight. They do this by making suggestions about food and eating by using second layer voices to the targets subconscious. Loop play tapes played to targets brains constantly urge targets to eat sweets and greasy un-nutritious foods. The handlers even show the targets pictures of food in their minds. Moreover, they manipulate the targets senses of taste and smell to choose unhealthy foods over healthy ones. All of this is done neurologically. Cause burn marks and sores on a targets face and arms, the most visible parts of his/her body. This is done physically by whatever the device might be that the handlers employ aided by particular software. This type of electronic harassment suggests some type of laser. I know of several cases in which the faces and arms of very attractive women became scarred and damaged through that process. Reshape a targets nose by making it longer and wider. Yes, that is what I said. By applying continual pressure on the bridge of the nose with facets of their device, the handlers can cause a victims nose to become both longer and wider. The principle is much the same as that of braces on teeth: the continual pressure on the teeth, actually move the teeth. Likewise, continual pressure on the cartlege of the nose, moves the cartlige forward and outward. Cause a target, usually a male, hair loss. The handlers can kill the hair roots on the scalp using their device, causing the loss of hair and preventing its re-growth. Cause a target unsightly psoriasis, usually on very conspicuous places on the body, especially the face and arms. This is different from the burn marks and sores previously mentioned, for psoriasis covers a much larger area and gives an appearance of leprosy or some other equally ugly skin disease. Cause the target to look worn and haggard. This is done through both physical and neurological suggestions that deprive the target of sleep. Dark circles underneath the eyes, wrinkles and frown lines, and pursed lips are all signs of sleep deprivation and make the target unappealing. Cause the targets body to exude offensive odors. One target from the United Kingdom wrote that he was ashamed to go around people, for he smelled very bad. Although a part of that was due to neurological suggestions to his mind, there does indeed appear to be evidence that supports the idea that handlers have the capability of causing those odors. Cause a target to lose much of his/her eyesight and thus force him/her to wear glasses. The handlers can damage targets eyes through aiming pin pricks (again perhaps fine lasers) into particular sections of the targets eyes. With pinpoint precision, the handlers can cause a target nearsightedness or farsightedness or an astigmatism in only a matter of days or weeks. Cause targets to walk in a strange manner by striking pain in targets spinal columns. The pain causes targets to stoop as they walk or to assume very bad posture in sitting. Cause targets to neglect their personal hygiene. The handlers use neurological suggestions to the targets subconscious to make them avoid bathing. Sometimes the handlers do this by making targets actually fear water. Cause targets to appear odd by appearing in ball caps lined with foil and several layers of clothes, even in warm weather, to attempt to shield themselves from the electronic effects. 1) Surveillance. In this sequence, the handlers not only watch and listen to the targets conversations with others and monitor his movements but they also, through their method of hooking the targets brain, silently mine the targets thoughts and memories. The object is to reconstruct the targets entire life, identify all relatives, friends, and acquaintances of the target, and learn any smut and dishonesty connected to the target to later make him feel guilt. In addition to

[214]

mining the targets thoughts and watching their activities, the perpetrators interview people who know the targets, their family members, and their friends. Those people often unwittingly divulge information about the targets through friendly conversations with the perpetrators agents. Sometimes, the agents pose as law enforcement officers and private detectives to intimidate people into telling all they know about targets. Actual law enforcement officers also doubtlessly cooperate in some cases. Only with this knowledge can mind control be used effectively. (2) Voices projected into the targets minds. The target will not be aware of this; yet, handlers are conditioning him or setting him up psychologically for the last and final step of mind control. During this time, the handlers may begin their electronic torture. Mind control is achieved through a combination of psychological trickery and electronic effects. The electronic effects are largely utilized to re-enforce the psychological aspects of mind control. Although the electronic effects are painful and sometimes even debilitating, they are usually bearable. As long as people have control of their minds, they can normally handle pain. On the other hand, mind control seeks to dominate both the mind and the body of targets, to gain absolute control over those persons and manipulate their every thought and action. Make no mistake about it; handlers are highly trained in both psychology and computer/electronics. They may not be very savvy about the field of psychology; yet, theyve been taught how to apply it. They are probably far more adept at applying and understanding the electronics than the psychology. However, whoever wrote the ultra-secret training manual, probably a team of psychiatrists and intelligence interrogators, were masters in psychological application. (3) Humiliation. Humiliation of targets cause a feeling of helplessness in targets. It often occurs in the realm of sex. Male targets experience involuntary erections and female targets, artificiallyinduced orgasms. Again, this is accomplished through a combination of psychology and electronic manipulation. Here is an example: I began experiencing a partial erection throughout the day and night, and I knew that that was not natural. Then, one day while washing my hair I brushed the small hairs at the entrance of the ear canal, and each time I did I heard, Youre horny. ESMC is not peculiar to the United States. People in countries all over the world are reporting electronic and neurological assaults. Many Western targets live in Canada and the United Kingdom. In Asia thousands of Chinese, Indian, and Australian targets are beginning to surface. Most African countries appear to be momentarily free of ESMC. Strangely and perhaps suspiciously, the following Americans appear exempt from electronic harassment and mind control. Congresspersons and high ranking U. S. Government officials, including ambassadors. Lower ranking employees and ex-employees of government, however, are often targeted, especially whistleblowers and those discontented with the status quo. Governors and other high ranking state-level officials. Clergy. However, members of Protestant Fundamentalist, Roman Catholic, Jewish, and other churches often become targets. Some of those victims complain that their churches may be involved in their harassment. Law enforcement officers. Although I have heard obliquely of police officers being electronically assaulted, I have never actually corresponded with or read a complaint by a law enforcement target. The exclusion also applies to prison authorities, U. S. marshals, Border Patrol, DEA, the entire U. S. intelligence community, including the Secret Service, sheriffs, and sheriffs deputies. CEOs and very successful businesspersons. High ranking military officials. On the other hand, enlisted personnel are often targets. The medical community. I have recently learned that there are two doctors who claim to be targeted. I have spoken with one of them. If they are genuine, they are indeed exceptions. The wealthy. I have never known of a millionaire having been victimized by ESMC. Most of the targets are middle-class workers, small business owners, retirees, and sometimes financially- and socially-marginal persons. Judges and lawyers. The perpetrators know that judges and lawyers possess credibility and also know the laws and would thus be able to leverage law enforcement into action.

[215]

Persons with expertise in radio and electronics, who could perhaps eventually figure out what device is being used and how. There are two logical and plausible reasons why most of those particular people are not targeted: (1) Those non-targets are a part of the conspiracy, either directly or indirectly, and thus protected. (2) The perpetrators know that those targeted groups would possess the intellectual credibility and the power to command investigations of their attacks. The strategy will include the following actions. (1) Attack the targets reputation and credibility. The investigation into the victims background by private investigators and persons posing as law enforcement officials first arouses suspicions those friends and neighbors who are interviewed. (2) Isolate the victim by casting suspicions, spreading rumors, interfering with his postal and email communications, causing problems between the target and his friends and family members, and making him look crazy. The Handlers Accomplices Accomplices often aid the handlers electronic and mind control assault by physically stalking the targets. Targets who receive the electronic and mind control effects also often complain of organized stalking in their neighborhoods and other places. The accomplices are normally people of all walks of life who have been enlisted by the handlers to participate in the ESMC by harassing the targets. They are often volunteers who get an adrenalin rush and a perverse sense of pleasure and power in being able to bother others. Some accomplices who live near the targets and render their fulltime services to harass them are paid salaries or receive other benefits from their help. Electronic and mind control assailants also often depend on local accomplices to help with their aims. I classify the accomplices as active and passive. The first group (the actives) participates in street theatrics, gaslighting, and gang stalking; the second group (the passives) knows what is going on but keeps quiet. Unknown persons have entered my house in my absence on several occasions and taken items and rearranged other items. In October of 2008 while I was away on a several-day trip, someone entered my house and took from the center of my bed a round magnet with which I always sleep that measures two inches in diameter by a half inch in thickness. That magnet never leaves my bed and my house. When I change sheets, it goes right back into the bed. I later found the magnet in January, 2009 in the back of a little-used closet. Sometimes the intruders will enter again in the targets absence to replace the object in its original location to make him think that he is losing his mind, one of their main objectives. Targets call that tactic gas lighting. Accomplices of the ESMC perpetrators perform the actual foot work. Many of the accomplices work in legitimate businesses such as delivery organizations. In my case, UPS has failed to deliver at least five items that I ordered or that someone was sending to me. Two of the items were returned to the senders without my being notified. Never once did a UPS driver leave a notice on my door or in my mailbox that he had attempted to deliver packages. Accomplices also work among law enforcement, in the postal system, telecommunications companies, especially local internet providers, and other legitimate businesses. Items taken will often consist of anything that they believe might be helpful in their mind control efforts. For example, on one occasion, intruders stole from my desk a roster of an English-as-aSecond-Language class that I had taught. Although the accomplices are not permanent employees and often are not even paid (except perhaps in favors in fixing traffic tickets, etc.), they play an important support role in electronic and mind control assault. Without the goon squads who openly harass targets, burglarize their houses, sabotage their electricity, water, and appliances, surreptitiously enter their domiciles for gas lighting, strew rumors, collect extraneous information about the targets lives, and interfere with the targets communications, the handlers would probably not be able to operate effectively. Until World War II, psychiatry as a medical science was scarcely known by the general American population. However, in the 1950s people started turning to psychiatrists for their perceived problems. Law enforcement began using psychiatrists to evaluate persons who either committed crimes or were thought to be capable of committing crimes. Anti-depressants for depression and other mental conditions became commonplace. Since then, psychiatric medicine has become a huge business.

[216]

Strangely, the popularity of psychiatry evolved collaterally in the last half of the twentieth century with the Governments obsession with neurological warfare. Those responsible for the development and employment of electronic stalking and mind control have not only fostered the increasing reliance on psychiatry but have also made psychiatry a main facet of their total neurological torture scheme. Targets know that handlers manipulate them to react in what is considered abnormal manners. When they do so, targets are often forced to undergo psychiatric evaluations. The psychiatrists who perform those evaluations almost always diagnose targets as delusional, schizophrenic, or paranoid and treat those victims with mind altering drugs. Once evaluated, targets lose their credibility, and their complaints of electronic stalking and mind control activities are considered delusional ideas. Psychiatrists could be very valuable allies to targets in identifying other victims of electronic stalking and mind control and working with targets to find who is harassing them and how; instead, psychiatrists represent the enemy by cooperating with those who sponsor the ESMC. Whether intentional or otherwise, they act as accomplices of the powerbrokers behind the ESMC. Evidence that psychiatrists know about ESMC and cooperate with the perpetrators in covering it up exists in abundance. Indeed, psychiatrists almost have to support the powerbrokers behind ESMC to maintain their professional credibility. Think about it. If psychiatrists admit that symptoms of schizophrenia and paranoia can be induced from outside the human mind and body by remote, it blows the whole rationale behind psychiatry as a science and repudiates the tenets on which their profession rests, for induced signs of schizophrenia and paranoia cannot be treated with traditional psychological therapy and medicines. Psychiatry as a legitimate branch of medicine is falling under much scrutiny. Doctors and even psychiatrists are becoming increasingly critical of psychiatric practices. If regular medicine is not an exact science; psychiatry is far less exact. Its science is not based on many centuries of dissecting the human body to determine the cause of disease but on less than two centuries of observations and largely inconclusive experiments. Notwithstanding, psychiatric diseases, or labels, have grown from fewer than a dozen in the 1950s to over three hundred today. The count goes on. While conducting online research on psychiatry as a discipline of medicine, I pulled up the review of a book named Pseudoscience in Biological Psychiatry written by Douglas A. Smith. The book is coauthored by Colin A. Ross, a psychiatrist, Alvin Pam, a psychologist, and others. Although I did not read the book, I found Smiths lengthy review very informative. The authors of the book disagree with the mainstream traditional psychiatrists who claim that psychological symptoms stem from biological abnormalities, which suggests that genetics play a major role in those conditions. Smith quotes Dr. Ross as saying, at the present time, there is no proof that biology causes schizophrenia, bipolar mood disorder, or any other functional mental disorder." Dr. Pam, a psychologist, writes that virtually all so-called psychiatric disorders are caused by life experience rather than the theoretical biological abnormalities that biologically oriented psychiatrists say are the causes. Psychiatrists particularly favor the label schizophrenia when diagnosing targets of electronic stalking and mind control. In the cited book, Harry Wiener, M.D., states that "The belief that schizophrenia is a specific organic disease or a group of organic brain diseases has never been confirmed. Dr. Thomas Szasz, Professor Emeritus of Psychiatry at the State University of New, York, Syracuse and author of Exposing Psychiatry as a Pseudo-Science, states flatly, No behavior or misbehavior is a disease or can be a disease. He makes the point in relation to psychitaric treatment of children that Labeling a child as mentally ill is stigmatization, not diagnosis. Giving a child a psychiatric drug is poisoning, not treatment. Dr. Ross observes that, "The dream of biological psychiatrists is that an 'objective' laboratory test for one of the major mental illnesses will be discovered. His statement is an open admission that many tests are continually being conducted to test and prove the psychiatric labels. Many of those tests are probably financed by pharmaceutical companies or probably by contractors in private research institutes working directly for the DOD.

[217]

Psychiatrists . . . have, for hundreds of year[sic], used diagnostic terms, so-called diagnostic terms, to stigmatize and control people. Psychiatrists deal with controlling behavior. Today they treat patients with anti-depressants to control their thoughts and their actions. Control over people is exactly what the Government wishes to accomplish through its development of neurological weaponry. Ellen M. Borges, Ph.D., a sociologist and faculty member at Goddard College in Plainfield, Vermont, talks about control in a chapter in Pseudoscience. She states that "Biological psychiatry redefines social deviance as a medical problem. By doing so, it transforms social norms, which are subjective and political, into medical norms, presumed to be objective and scientific. Medicalization of social deviance allows us a pretense of humanitarianism" for coercive measures against people whose behavior "deviates from expectations based on the dominant social class's ideology and viewpoint." She says further, "Psychiatry redefines a great deal of normal human behavior as medically deviant by pathologizing people who are socially marginal in any way. Psychiatrists have never explored why ESMC victims feel that they are targeted by remote electronic and mind control activities. They not only fail to delve into the basis of patients complaints but they also refuse to order x-rays, MRIs, and CT Scans to see whether there might be an implanted object in the patients. If they order a scan at all, it will be confined to only the brain. No target would likely have a device implanted directly within the brain itself. Without orders for photographic searches of their body, targets are left to guess and theorize what causes their ESMC. The KMHAC (find name) spelled out some shortcomings in the field of psychiatry, including the collusion between psychiatrists and the drug industry, in an article seen on the internet. Three of those criticisms bear mentioning. I either quote, partially quote, or paraphrase them below. Psychoactive drugs have become legal and commonplace, with physicians acting out a role little different from that of drug pushers, pandering to those who seek short-cuts to an escape from painful thoughts. . . . The widespread availability of such drugs which are often dangerous and poorly tested is a public scandal. Psychiatric confinement and court-ordered "medicating" of persons to prevent supposed future actions is a massive infringement of Constitutionally enshrined human rights. The law has the premise you do not do the time before you've done the crime. Psychiatry stands this principle on its head. Blaming the so-called mentally ill for everything wrong in society comes naturally from the corporate-owned media, who have ties to the profiteering pharmaceutical industry. Every unpleasant quirk of the human psyche is explained away as mental illness or a chemical imbalance . . . by research [conducted] on barely or non-consenting human guinea pigs.. Social control obviously defines the purpose for the treatment of targets. Psychiatrists fill targets full of pills and subject them to various largely unapproved treatments, including modern versions of the old shock treatment. I have yet to find a target forced to accept treatment who ceased believing that he was a target due to the psychiatrists therapy and medicines and thus cured of his supposed delusions. Psychiatrist Peter Breggin says about the drugs being used by psychiatrists: "Despite the current enthusiasm for Prozac, the FDA studies underscored the drug's lack of effectiveness, and recent analyses of literature indicate that antidepressants in general are no better than a placebo." Karl Loren, in his paper on psychiatry, says that Psychiatry and psychiatric drugs do more harm than any other [medical] practice on the face of this planet. Psychiatrist Susan S. Kemker, North Central Bronx Hospital, New York City, sums up the skepticism concerning psychiatry when she says "our understanding of our own field remains nave." I rest my case. Psychiatry as a branch of medicine is, at best, of doubtful usefulness to mankind. It most certainly singles out targets of ESMC for stigmatization. Its main purpose is social control. It is little wonder that the powerbrokers and their hireling handlers force targets to undergo psychiatric evaluations and treatment. Psychiatrists serve as main accomplices of the powerbrokers who employ electronic stalking and mind control by remote. Regardless of who a target might be, how he is selected, and why he is selected, he becomes a plaything for his handlers. To relentlessly torture targets, whom they may not even know, with

[218]

electronic and mind control devices by remote and watch them suffer, commit suicide, and die from those effects requires unbridled hatred on the part of the psychopathic people who ply that torture. Targets have been condemned in absentia by some person or group, provided no trial, and are summarily executed slowly by remote. -- Law enforcement has been almost completely uncooperative. The cowardly perpetrators of ESMC are textbook cases of domestic terrorists. In addition to committing terrorism, the stalkers are guilty of (1) stalking, (2) harassing with malicious intent, (3) coercion (in attempting to make the victim do things that he/she does not want to do with their mind control methods), (4) psychological and virtual rape, (5) breaking and entering (which they often do to intimidate the victims by unlocking locked doors, turning back clocks, moving items in rooms, hiding other items, etc.), (6) burglary and theft (which they commit when they enter a victims home and take items to confuse and disorient the victim), (7) recording a victims conversations without his/her consent, (8) peeping tom-ism (through their ability to view the victim), (9) assault and battery (by using electric shock, etc. against the victims), (10) slander (by circulating false rumors and stories that lack proof about the victim), (11) libel (when those rumors and stories are put into print in the from of emails, etc), (12) computer hacking and phone tapping, (13) conspiracy, (14) in some cases, blackmail and extortion, (15) first degree murder (when a victim suffers a fatal car crash because of sleep deprivation), and (16) attempted murder (when their plans do not succeed). Their list of crimes will put them away for the remainder of their evil lives. The refusal of the FBI to listen seriously to complainants and to investigate their claims indicts that agency. An electronic stalking victim whom I later met in person had also recurred to the FBI to complain. The victim told me that the agent to whom she made her complaint said with a grin: Makes you feel like youve got nowhere to turn, huh? She stated that He was quite aware of what I was experiencing. That victim, a grand and a very soft spoken, almost timid person, had worked for a single telecommunications company for thirty-five years before she retired The FBI continually monitors and even infiltrates known organizations that engage in domestic terrorism. It is ridiculous to consider that the FBI does not know about high-tech electronic harassment, the instruments used, and how the instruments work. Moreover, the FBI, Secret Service, NSA, and other agencies share the responsibility for the overall protection of the President, Vice President, cabinet members, Supreme Court justices, and Congresspersons. It is absurd to think that those intelligence agencies do not know about electronic stalking and mind control, how to prevent it, and, if discovered, how to neutralize it. The subject of electronic stalking and mind control remains taboo. The controlled media will not touch that topic, which hints at a conspiracy between the media and the government. Only on the internet, where data is still largely uncontrolled by the power brokers, can one find information on ESMC.

(C2) Case Summary: Rozi, September 25, 2004, www.multistalkervictims.org/rozi.htm In 1997 I met a man I will call "Chico" or "Mike" at an alcohol/drug treatment center in Tampa, Florida. This man, about 40, at the time, seemed to be a very intelligent, well dressed, clean cut, former drug addict. At the time, as unsuspecting and gullible and naive as I was, I believed him to be an honest, nice person seeking rehabilitation, as was I. I was currently married for a lengthy period of time to a wonderful man whom I adored and loved deeply , but with whom I was experiencing marital problems at the time because of my disease of alcoholism. We had a somewhat "happy" marriage, other than the alcohol problem I was experiencing. We had only one daughter, who we idolized and adored, who was 16 at the time, and a junior in high school. We were dedicated and good parents, we believed. Our daughter was a very pretty, intelligent, talented, sweet, popular, wonderful person. Our life surrounded around our marriage, family and daughter.

[219]

As I left the treatment center, "Chico" said to me "Your husband is a very lucky man." I was taken by this comment. A relationship with "Chico" ensued, attending AA meetings, lunches, dinners outings to the beach, etc. I had just retired from teaching for 25 years, and with my daughter now completely involved in high school, singing and dancing, and my husband totally engrossed in a high powered, successful, stressful job. I now had time for this companionship and relished it. Little to my knowledge did I know the atrocious, vicious crime that was awaiting me and my family in the future. One evening on a Saturday night in 1997, a man named "Tom" was at "Chico's" trailer for the weekend. This man informed me of a murder they intended to commit the coming Friday at noon. Thinking this man was a pathological liar and boasting I disregarded this comment. They even showed me what they were going to wear during this murder. A black ski mask and sunglasses (Tom) and blue denim overalls and the mask of a black man ("Chico"). Tom stated, "Open the newspaper Saturday, and you will read about it." I did, and to my awe, an article was there. I was in shock and disbelief. A 26 year old, small business owner, sandwich shop, was killed during a robbery attempt, during which he offered no resistance, and $42 dollars was gotten. After a few weeks, I creported my knowledge to the Tampa Police Department. I was disbelieved and disregarded. This is when the terrible crime of multistalking began. I have now been a victim of this terrible crime for 7 years. I have had all symptoms and tactics applied to me. For the first few years I had no idea what was happening, just that my life was "falling" apart. I sold my home in Tampa, and moved to country in Tarpon Springs, Fl., a remote, large house, very isolated, on a preserve. My daughter had by then left for college, thank goodness. I was alone in this house in the country, and was able to be subjected to much fear, many sabotages, robberies and all the trappings and tactics of organized stalking. My family did not believe that anything was happening to me. These were just "normal breaks of life." It was not until I experienced 2 teenagers in my isolated, treed backyard, wearing camoflauge clothes, helmets, white gloves and carrying rifles that I truly feared for my life. After this incident and the killing of my dog and lovebird, I sold my dream house, and moved to a heavily secured apartment, condominium in St. Petersburg, Florida. I had installed a huge security system, cut down the trees, installed fences and electronic gates at my home, and this did not deter the perpetrators. I experienced many break-ins and thefts and acts of sabotage and intimidation out there, and was truly in fear for my life. I am now again experiencing these tactics, now, in addition to technological harrassment. The harrassment has escalated rapidly. Now affectting my and my husband's health and security. I receive death threats, threats to my daughter and dog, sleep deprivation, mobbing, stranger accosting. It is never ending. I do believe that these 2 men are at the heart of this situation, accompanied by many assistants (gang members). I am truly frazzled, but try to remain strong daily. They have followed me to New York City, Negril, Jamaica, Toronto, Ontario, Canada, Virginia and many others places in the world. These sightings I can prove.

[220]

The threats upon my daughter's life, who has now graduated from college and moved away to another state--are the most troublesome. It has been through these activists on these sites that I have been made aware of what is being done to me, and about this phenomenom. I am very grateful for their courage, knowledge and assistance. I thank you and God (as my faith has not been daunted, yet) for your help. I know there is an ultimate purpose to this, but what it is, I currently do not know. I pray that I live to find out. [IMPORTANT NOTE: Reader, most organized stalking victims have NEVER had any type of contact with criminals, nor have they themselves committed any criminal offences.]

(C3)

Jesus

Mendoza

Maldonado

2202

E.

28th.

St.

Mission,

Texas

78574.

Ph.:

(956)519-7140

Email:

jessemm7@yahoo.com

To

whom

it

may

concern:

My three children and I are the subject of torture by satellite tracking and Organized Stalking as retaliation for denouncing fraud of federal funds, racial discrimination and judicial corruption. This Complaint points out to specific and concrete evidence on the federal record showing the legitimacy of my claims. Please See Exhibit '1' (attached) which describes some of the physical harm caused on myself and on my children by overexposure to the radiation used by satellite tracking. Exhibit '2' and '3' describe some of the physical harm caused on myself by overexposure to radiation. Exhibit '2'is a Decision of the Social Security Administration finding my electromagnetic sensitivity a severe impairment. Exhibit '3' is a Physician Statement of Disability by the Texas Department of Aging and Disability Services which describes some of harm caused by the overexposure to radiation. I was maliciously overexposed to radiation for the first time in 1997, as retaliation for denouncing a fraudulent scheme against the second largest law school in the country, the Thomas M. Cooley Law School located in Lansing, Michigan. At that time I was going on my second year of law school. I found myself on the emergency room with a swollen heart and breathing difficulties a few days after I submitted to the dean of the law school evidence that the law school engaged in racial discrimination, fraud of federal funds, and the giving away of law degrees to those affiliated to government agencies. At that time, I had been elected president of the Hispanic Law Society and I

[221]

had

been

on

the

Dean's

list.

The Electronic Aggression and the Organized Stalking forced me to leave my studies one month away from finishing the last semester in the State of Michigan, and I returned to my hometown, Mission, Texas. I left the law school in good moral and academic standing. In my efforts to stop the electronic aggression, I sought help from the federal courts. Although the litigation did not stop the electronic aggression, the following line of cases established on the record the legitimacy of my claims. A motion for summary judgment established as a matter of law the injuries caused on myself by the electronic aggression, my mental stability, and the fact that the law school incited against me a retaliatory federal electronic surveillance and Organized Stalking for denouncing the fraudulent scheme, including a fraud of student money committed by the president of the law school and former Chief Justice of the Michigan Supreme Court, Thomas E. Brennan, and by the then judge of the Michigan Court of appeals, Roman S. Briggs. Jesus Mendoza Maldonado v. The Thomas M. Cooley Law School, et al, W. Dist. MI., Case No. 5: 01cv93. On 2003, I filed a law suit against the US Attorney General John Ashcroft to stop the electronic aggression after I saw two of my children with convulsions and seizures while detection equipment was showing high intensities of radiation inside our home. US District Judge Ricardo H. Hinojosa assigned US Magistrate Dorina Ramos to hear the case. Judge Ramos recused herself in light of evidence that Judge Ramos ignored conclusive evidence of a fraud of student money committed by Judge Brennan and Judge Gribbs, and ignored evidence of the harm caused by the electronic aggression before sending the case against the Thomas M. Cooley Law School from McAllen, Texas to Grand Rapids, Michigan. US District Judge Ricardo Hinojosa reassigned the case to Judge Ramos. On a hearing before US Magistrate Dorina Ramos, my wife testified to the pain and suffering caused on myself and on my children when detection equipment shows high intensities of directed radiation inside our home, and how the readings on the meters go down as soon as I try to video tape the aggression. On a Report and Recommendation to dismiss the case, Judge Ramos altered the testimony of my wife to imply that I am delusional. The Report states that my wife testified that my problems subside as soon as I operate a video camera. Judge Hinojosa declined to consider the judicial misconduct of Judge Ramos and dismissed the case. During the litigation of this case, the US Attorney General did not oppose evidence of alteration of testimony by Judge Ramos; acknowledged my mental stability; and claimed that the use of ionizing radiation (x- and gamma rays) for surveillance of residences is legal. During the litigation of this case, the US Attorney General did not oppose an affidavit of a former government agent who was sent to the emergency room with internal bleeding every time he offered to testify in court to my mental stability and to the legitimacy of my claims of electronic aggression. During the litigation of this case, the US Attorney General did not oppose evidence showing that three federal agents (Mark Miller, Michael Rodriguez, and Jeffrey Schrimer, who identified themselves to the principal of the school as FBI agents) engaged in harassment at my work place, a day I attempted to file a criminal complaint against officers of the Thomas M. Cooley Law School. During the litigation of this case, the US Attorney General did not oppose video tape evidence of the pain and suffering caused on myself and on my children while detection equipment indicated an electronic aggression, and evidence that federal agencies are using harmful satellite radiation technologies which are otherwise reserved for national security and the military to direct radiation into residences. Although the Court of Appeals recognized my electrical sensitivity, the harm caused by the electronic aggression, the court did not address the magistrate's alteration of testimony to dismiss the case, finding that I had failed to establish a connection between the electronic aggression and the US Attorney General. The US Supreme Court declined to get involved in the case. (Maldonado v Ashcroft, Case No. M 03-038; US Court of Appeals for the Fifth Circuit Case No. 04-40095; Jesus Mendoza Maldonado v Alberto R. Gonzales, U.S. S. Ct., Case No. 04-9908). I submitted to the City of Mission Police Department videotapes showing high intensities of radiation on detection equipment and the pain and suffering inflicted on my children. The Chief of police, Lio Longoria claimed that he was to investigate the case himself. After examination of the videotapes, Joe Gonzales an investigator for the police department concluded that our home had been the subject of an electronic aggression. Another investigator, Ezequiel Navarro, claimed that

[222]

the local office of the Federal Bureau of Investigation had directed him no to intervene on the case, because of an ongoing investigation of my activities by the Central Intelligence Agency. Based on these facts, and on the facts established by the litigation against the US Attorney General, I filed a lawsuit in Washington, D.C. The lawsuit sought an Order to compel the Defendants to cease and desist from using radiation surveillance during any investigation of my activities, and to show cause for the investigation. Without a hearing, and without allowing the Defendants to respond, US District Judge Richard W. Roberts, dismissed the Complaint as delusional or fantastic. On November 21, 2006, Ginsburg, Chief Judge, and Randolph and Tatel, Circuit Judges denied the Petition for Rehearing. The same day, Ginsburg Chief Judge, and Sentelle, Henderson, Randolph, Rogers, Tatel, Garland, Brown, and Kavanaugh, denied the Petition for Rehearing in Banc. Judge Kavanaugh, a former White House aide (and possibly a former officer of the Thomas M. Cooley Law School), failed to recuse himself from the case. Judge Kavanaugh is disqualified to hear cases of domestic surveillance because while working as White House aid, Judge Kavanaugh was involved in crafting strategies to conceal from Congress the harmful use of radiation domestic surveillance programs. Judge Kavanaugh has been the subject of a Congressional inquiry to determine if he deceived a Congressional Committee during confirmation hearings. On June 21, of 2007, the US Supreme Court declined to get involved in the case. Jesus Mendoza Maldonado v Keith Alexander, in his official capacity as director of the National Security Agency, Michael Hayden, in his official capacity as Director of the Central intelligence Agency, and George W. Bush in his official capacity as President of the United states of America, US Court Supreme Court, Case No. 06-9569. Organized Stalking is a copy of the method used by dictatorships to retaliate against those who denounce injustice. Organized stalking includes pervasive street following and high speed road harassment, and disruption of daily routines aimed to overload the senses of the target and to cause harm in a way that appears natural, accidental, self inflicted, or the result of a mental problem. Hate groups and groups disguised as neighborhood watch members organize the stalking groups. They fuel support and participation from others by circulating false rumors that the target is mentally insane, child molester, drug dealer, a prostitute, homosexual, spy, terrorist, etc. People from all walks of life, from the homeless to professional people, compose these groups. See http://www.multistalkervictims.org/terstalk.htm There is evidence that funding for these activities may come from hate groups, and from federal funded faith funds for congregations. Members of these groups are found on the courts, on the universities, hospitals, the clergy and even on law enforcement agencies. The road harassment has resulted in deadly consequences. Children have been picked dead from the pavement in this area. Evidence that the shootings on campuses and congregations across the country are a reaction to Organized Stalking include the swift intervention of federal agencies to remove evidence showing that the culprits were reacting to pervasive harassment. There have been several attempts to run over my children and myself. Some of the identified organizers of Organized Stalking include Michael James Lindquist, a self proclaimed apostle of a non-Christian federal funded congregation; Diane K. Smedley, a high school teacher; Ruth Watkins, the wife of a high school teacher; and Christopher T. Lohden, a pilot of a local bank. Without a hearing and despite of defendants' admissions and incriminating evidence, US District Judge Lynn N. Hughes, dismissed the case. The Defendants did not oppose the appeal. A panel composed of Chief Judge Jones, and King and Dennis found the appeal frivolous and issued a warning of sanctions. Chief Judge Jones was disqualified to hear this case since she had ignored conclusive evidence of fraud on the court by Judge Ramos and Judge Hinojosa to benefit those engaged in fraud of federal funds and retaliation. US Court of Appeals for the Fifth Circuit, Complaints of Judicial Misconduct Nos. 04-05 372-0089 and 90. Maldonado v Lindquist, et al, US District Court Southern District of Texas, Houston Division, Case N0. H-05-97.(US Court of Appeals for the Fifth Circuit Case No. 05-20257). This case exposes the fact that there are no safeguards in place to impede that the same mentality

[223]

that tortured and murdered women and children in concentration camps, use silent and invisible technologies to harm people in homes, vehicles, schools, courts, hospitals, and even congregations. Victims from around the country can testify to the pain and suffering caused by electronic aggressions and Organized Stalking. See http://www.freedomfchs.com/repjimguestltr.pdf This type of terrorism could be considered the most serious threat to the American family. Everyday we live this torture. Please pray for us. We need your help. For all of the above reasons, I request an investigation of this Complaint and that after an investigation has taken place, to proceed accordingly against those responsible for the criminal acts detailed in this Complaint. If more information or documentation is needed, I will be happy to oblige. To the best of my knowledge and belief, ___________________________________Jesus 2202 Tel. E. 956 28th 519 Mendoza St. 7140. Maldonado Mission, Texas, 78574 http://jesusmendozza.blogspot.com/

(C4) Terrorist [Organized] Stalking in America by David Lawson reviewer Eleanor White This page updated December 17, 2007 ** See also my review of David Lawson's 2007 book on the same subject, containing quite a bit of the same material plus new, Cause Stalking

Concepts Table (Relevant Points) (Scroll down for book's table of contents)

Note: This "Concepts Table" is to speed up access to those points of special relevance to multiple stalking victims. This table doesn't appear in the book itself. Note: "Perp" is short for perpetrator of the stalking crimes. Police aware of these groups .................................. VI "Cause stalking" .............................................. VI Author mistaken - not ALL "Patriot" groups .................... -Tactics used by "cause stalkers" .............................. VII Cause stalkers always there ................................... VII Author's favorite quotes from perps he "rode" with ............ 15 Personality types of the perpetrators ......................... 16 Firemen can be perps .......................................... 16 Tearing up road is one recruitment goal ....................... 17

[224]

Perp LEADERS have shadowy backgrounds ......................... 17 Stalker groups' financial sources ............................. 20 Perps surround apartment of target ............................ 26 Adjacent apt - steady stream of people day and night .......... 27 "Who are we", perps' own statement about themselves ........... 27 The "cause" isn't the most important thing to group members ... -Victims don't always recognize harassment as such ............. 32 Isolating victim is the goal .................................. 32 Surrounding victim on the road ................................ 32 The on foot harassment methods ................................ 33 Ah, the trusty old "noise campaign" trick! .................... 34 Neighbors' synchronized leaving/arriving ...................... 34 Horns/sirens synced to toilet use ............................. 34 Synchronized movement, apts above or below .................... 35 Interference with personal and business relationships ......... 35 Leaders' claims of national security affiliation .............. 37 Stalker groups blame TARGET for their shortcomings ............ 49 Character assassination ....................................... 51 Stalking leaders say targets should be killed ................. 54 Gross disinformation in book "Harvest of Rage" ................ -Table of Contents

FOREWORD ...................................................... VI 1. Intro to Extremist Groups ................................ 10 2. Who Are These People? .................................... 16 3. Selection of Targets ..................................... 19 3. Group Structure .......................................... 22 5. The Surveillance Operation ............................... 25 6. Search and Seizure ....................................... 28 7. Overt or Covert Operation ................................ 32 8. Let's Pretend ............................................ 37 8. Influence Techniques ..................................... 40 9. Self Defense ............................................. 48 11. Conclusion ............................................... 53 Note: Chapter numbering errors are actually found in the book. This book is far to valuable to be concerned with that. Appendix A - DOJ article on stalking .......................... 57 Bibliography .................................................. 67 References .................................................... 73 Back to Top of Table of Contents Eleanor White talking: This book places the blame for much group stalking in the United States on what the author calls "extremist groups". We who are in the current day organized stalking target community see evidence that local "extremist groups" comprise a wide range of normal citizens, who appear to be normal, everday people who probably do not have criminal records. All trades are represented. Anyone from street people to small children to housewives to tradesmen to technical and professional people form these stalking groups, who believe, based on lies, that they are performing valuable community service by harassing their targets.

[225]

"Watcher" perpetrators on station Click here to see the 5-minute video from which the "watcher" image above was taken. What we see appear to be "citizens on patrol" groups gone wild, targeting people who have no criminal records, based on vicious lies we targets never get the chance to correct. This author describes local extremist groups who go to considerable lengths to actually masquerade as public officials. We organized stalking targets also report bizarre and sometimes unethical and illegal behaviour on the part of genuine public officials too, so this book should be viewed as excellent but not necessarily all available information on the topic of organized stalking. Let me say here that this author, basing his opinion on a misleading document by the Southern Poverty Law Center, alleges "Patriots" are one of the extremist groups which participate in stalking and harassment. The actual criminal groups frequently DO appeal to potential helpers' "patriotism" to obtain help in carrying out their harassment. But the SPLC report MISTAKENLY IMPLIES that EVERYONE who adopts the "Patriot" label is involved in these odious crimes. I listen daily to broadcasts by the group calling themselves the U.S. Patriot Movement, and which you, visitor can access via the WEB, shortwave, and some AM-FM stations from these sites: http://www.gcnlive.com (Mainly Mon-Fri, 8am-5pm) http://www.republicbroadcasting.org The Patriot broadcasters who broadcast on those stations aggressively work to expose and stop all well covered up crimes. It is clear the Southern Policy Law Center people who refer to Patriot Movement shortwave broadcasters as terrorist stalkers has NEVER actually listened to these broadcasts! Back to Top of Table of Contents Before we get started, author David Lawson did interview perpetrators, ("perps"), targetted people ("targets"), and the POLICE. Here is what the author heard from the police he interviewed: "I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that 'cause stalking' is primarily a civil problem where the plaintiff has to prove financial loss. They also said that there are free speech and grass roots issues involved. In fact, the police themselves are targets of these groups. In small towns, the number of members in these groups can easily exceed the number of police officers. In general, the police will NOT talk about stalking groups. One officer did say there is a storm brewing as groups become larger and more numerous." Author Lawson explains here how he got involved and began to interact with the 'cause stalking' perpetrators: "One day, several years ago, I was sitting in my house, and checking out the activity on my scanner. I heard a woman say that she was following a certain vehicle. She gave the

[226]

location, the make and model of the car and the license plate number. A few days later, I heard the same woman on the same frequency say that she needed a bit of help at a certain location and a few days after that I again heard her broadcasting the position and details about another vehicle she was following. I listened to other people talking on that frequency and they didn't give any indication that they were with any government agency but they were talking about ARRESTING PEOPLE. "On another occasion, on the same business band frequency, I heard someone complain that an African American man was crossing the street. "All we could get him for is jaywalking" responded the leader. Back to Top of Table of Contents "People in the group would discuss where they would go for supper, after their shift was over, so I [the author] went too. I listened to a group of people openly discussing various activities as if they were the police. "Real police officers were also sitting in the restaurant, listening to them. I later learned that their presence was not a coincidence. "One man who had supper with the group drove a van marked with the call letters of a local AM radio station. I started listening to it. Most of the guests were people who said they had new revelations about Waco or Ruby Ridge, or had some inside story about government corruption. I also heard advertisements for the meetings of a local political group and I attended some. "At the first meeting I attended, one young man flashed a phony police badge at me. No one paid any attention. Some of those in attendance were the people I had seen in the local restaurant. This was my introduction to the creepy world of extremists." David Lawson goes on to explain that he has observed extremist groups for several years while living in New York State, Florida, and Canada. Back to Top of Table of Contents He monitored their public communications, attended meetings, rode with them. The author defines the basic reason for being for these citizen stalking groups as CAUSE STALKING. Cause stalking means the group is assembled, under a leader with a "shadowy past", for some specific cause. But what actually happens is that these groups seem to be: "... groups of individuals who appear to be borderline retarded, mentally ill, or deluded into thinking that they are secret agents." And ... "Cause stalking has been used by extremist groups since the early 1990s. The basic system is alleged to have been developed by the Ku Klux Klan and refined through years of use. Easy to recruit, right? More than that, "Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure." Back to Top of Table of Contents More details about the typical cause stalking recruit:

[227]

"Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are janitors in apartments, hotels, etc., who have keys to get in any locked doors. They are security guards, who can let fellow members into places where they would not normally be allowed to go. They are city workers, who can, in many cities, follow a target around all day in their vehicles or have a noisy project underway near his [target's] residence. They are taxi drivers, who are always on the road. They are cable, telephone and electric company employees who can interfere with a target's service and spend time on patrol with the group, while they are on the job. Those are the author's words. Here are a few quotes from the perpetrators themselves: "We are like the police except we are ABOVE the police." "We are a citizen's group that helps the police. We are trying to alert people in the area about this person [the target] before he gets to do what he did in the last place he lived." [Eleanor White talking: All the cause stalking targets I know did not commit ANY offenses. The stalkers are filled with LIES by their leaders.] "When I get the call, I go to whatever the address is. It doesn't matter what they [targets] do, they can never get away from us." "Who are we? We drive the ambulances that take you to the emergency room. When your house is burning, we put out the fire. We are security guards. We protect you at night. YOU ONLY HAVE ELECTRICITY, PHONE AND CABLE SERVICE BECAUSE OF US. We are janitors. We have the keys. We fix your cars. YOU DON'T WANT TO MESS WITH US." Back to Top of Table of Contents The author concludes, as explained at a number of places in the book, that the "cause" the typical group is "working toward" is mainly an excuse to get the groups together. The main motivation of members who stay with these groups is the sense of power and belonging the group members derive. Having a "cause" enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feel about their "work" and accept them. These groups come into being and are run by leaders. Here is what the author says about them: "Most of these leaders HAVE BACKGROUNDS WHICH ARE NOT KNOWN TO THEIR SUPPORTERS. They are from 'somewhere else' and there isn't much information available about them from independent sources. This provides a basis for the 'larger than life' stature they assume in these groups. Many claim to have connections to the C.I.A. or other intelligence agencies which do not reveal the identities of their employees or exemployees." How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report. Here is an example of what I mean by "large expenses": "Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed by supporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands. They may even accompany him on a plane if they know his travel plan, and there is a good chance that they do." Back to Top of Table of Contents Here is what the author learned about their financing:

[228]

"The operations of many extremist groups are actually financed by CORPORATIONS which use them to stalk their enemies or potential enemies. The groups are used as the PRIVATE ARMIES of those corporations. Some countries kill dissidents and in others they are jailed. In the United States, someone who is threatening to corporations or industries, like a whistleblower or activist, is likely to become the target of an extremist group." The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders, but also are FOR HIRE - a kind of "revenge service" for those wealthy enough to hire them. Next, let's look at some of the typical OPERATIONS these groups carry out: "The primary characteristic of cause stalking is that it is done by LARGE GROUPS OF PEOPLE. A target will always be followed, but he is unlikely to see the same stalkers very often." ... "Many of these groups include hundreds of people." Back to Top of Table of Contents "Some authors refer to cause stalking as terrorist stalking. Groups do not just stalk individuals. They employ organized programs of harassment which include BREAKINS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH. The CHILDREN of a target are a favorite." "Firemen across the country, and even some police departments have a long history of supporting extremist groups. Fire trucks can sometimes be seen riding in extremist convoys, with their flashing lights turned on and their sirens screaming. They will also race to greet a convoy which is entering their town. The participation of firemen, city workers and utility company workers helps give group members an illusion of legitimacy and power." "City employees can be used to harass a target in many ways including tearing up the road in front of a target's home. Employees of pest control businesses who have access to the keys for apartments and those who work for alarm and locksmith companies are also of interest." Back to Top of Table of Contents "Groups also attack targets of convenience. These people are selected because they are convenient targets, and not for any other reason. These include loners who tend to be more vulnerable to their harassment tactics than those with family and friends around them. Targets of convenience are used for practice." "Groups have contacts in the media which they use to disseminate information about their targets. IT IS NOT UNUSUAL TO SEE THE VEHICLES OF LOCAL TELEVISION STATIONS RIDING IN EXTREMIST CONVOYS." "In order to establish bases of operation, they will ENLIST THE ASSISTANCE OF NEIGHBORS. In many areas, they can do this by intimidation. Those who do not cooperate can be targetted, which includes harassment of their families and damage to their homes and vehicles. "If they are dealing with individuals who do not know them, they can also appeal to their sense of patriotism and they can offer drugs, friendship, home repair, free taxi rides and what ever else they have to. In some cases they may even be able to get a key to the residence from a 'patriotic' landlord."

[229]

Back to Top of Table of Contents "Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio. Other members, who are patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit. In small towns, where business band radio is widely used, these activities are a local sport among a small group. Anyone with a scanner can join in. Some targets have reported hearing an announcement on their scanners AS SOON AS THEY TURN THEIR LIGHTS ON IN THE MORNING." "In a typical apartment setting, they will attempt to lease, sublet, or otherwise have access to apartments above, below, and on both sides of the target. They will also "guard" the vehicles of a target in the parking lot. If they have occupied apartments surrounding a target, typically normal noises like toilets flushing, doors closing, people talking, etc. will not be heard. The only noises that will be heard are in response to something the target does. If he flushes a toilet, he may hear a car horn honk, the sound of a power tool or hammering, for example. There will also be a large number of people coming and going, and accompanying rowdiness and noise." Back to Top of Table of Contents "A common ruse used by these groups is that they are a 'citizens group' which assists the police and they are 'just keeping track of' a certain individual, for whatever reason. The illusion is reinforced by the case files they carry which are complete with photos of the target and look like those used by police." "Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence. Many targets never experience the kind of harassment described here, because they are not alone very often. Others do not recognize that they are being harassed by an organized group. They just think that there are a lot of rude people in the world. Targets who do not experience physical harassment are still targets for other types of attacks. Back to Top of Table of Contents "Physical harassment is used when a target has no witnesses. An objective is to isolate the target from his family and friends. He can tell them about all the strange things happening around him, but they will not understand and perhaps will think he is crazy. Sometimes other members of the family will receive the same treatment." "When a target is driving, standard practice is to surround his vehicle and attempt to control his speed. He will not be followed in close proximity by the same vehicles for a long distance. They do frequent trade-offs. Vehicles line up behind the target for a short distance and then move out of place so the next vehicle can take over. Frequently, vehicles in the convoy will have their high beam headlights on during the day, so a target frequently have a vehicle behind him which has its headlights on. "In many parts of the country it is common to see groups of six to 30 or more vehicles driving around in convoys with their high beams on during the day. This is one of the ways a convoy can be identified." Back to Top of Table of Contents

[230]

"A target will be followed on foot wherever he goes. Anyone can go to the same public places he goes, and they will attempt to get into any other restricted places he goes, including hospitals, places of employment, etc. It has been said that it is possible to go nearly anywhere if you have a clipboard in your hand and it is almost true. They also like to wear name badges on a lanyard, and some carry phony police badges." "Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in their pockets while standing behind the target. Many tactics are tried and the result is observed. Those which evoke a response from the target are repeated. When a target sits anywhere in public, group members will attempt to sit behind him in order to create noise, by whatever means, including tapping their feet on the target's chair. The objective is to harass the target constantly." Back to Top of Table of Contents

"Groups attempt to interfere with any business and personal relationships which the target has. Typically, this interference involves character assassination from some anonymous individual and is not usually taken seriously by those who know the target. It can be effective with people who don't know the target." "At work, the target will also experience character assassination. If he works in any position where he has to deal with the public, there will be a steady stream of customers who complain about him. If he is a real estate agent, he will have a steady stream of prospects who OCCUPY HIS TIME but never make an offer." Let me, Eleanor White, give you an example of how brutal and serious this "character assassination" can be. One of our members, who prefers to remain anonymous, moved in with her husband and children to a house which, unkown to them, had been a methamphetamine lab. The chemicals used to brew meth apparently cause distinctive symptoms in the mouth. This family's dentist felt he was "helping law enforcement" by reporting them to local law enforcement as meth users. This was absolutely untrue, but the family didn't even know the report had been made and had no way to correct it. (In fact, in some places, dentists are REQUIRED to report suspected cases of meth use.) Law enforcement in that area was apparently tied in to the stalking groups, and the family was harassed for many years. The husband died, apparently from exposure to these chemicals. The lady, now a grand, steadfastly did detective work and eventually found out about her family's reputation, with some help from a policeman who was a personal friend, from a different jurisdiction. This policeman admitted off the record that "meth mouth" can result in people being submitted to citizen harassment groups for harassment. Character assassination is complete and has life-destroying consequences!

"A common tactic use by groups is noise campaigns. Group members will drive by the target's residence or work place, honking their horns, squealing tires, and making whatever other noise they can." "They will also make noise from whatever NEARBY PROPERTIES they have access to. Typically, they will make noise WHEN THE TARGET GOES OUTSIDE. [Eleanor

[231]

White talking: OR, when the target opens a window, and I mean timed to the millisecond! Open, close, perfect sync!] Group members will also frequently knock on his door for whatever peculiar reasons they can dream up." Back to Top of Table of Contents "In an apartment setting, targets can expect to hear tapping on the walls in the middle of the night, taps running, hammering etc. from the upper and/or lower apartments, and possibly the apartments on both sides. They will continue to 'work' on these activities for as long as they can get away with them." "Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles. "Standard practice is to watch the target's vehicles and this subjects them to damage including slashed tires, scratched paint, stolen license plates, etc. Typically they would not cut the brake lines on vehicles or commit other similar acts of sabotage, but they WOULD drain the oil or antifreeze over a period of TIME. [Eleanor White: AMEN!]" "... It is not uncommon, in an apartment setting, for a target to hear someone moving from room to room as he does, from the upper or lower apartment. [Eleanor White talking: This requires commercial through wall radar or more advanced technology in many cases.] Back to Top of Table of Contents Often they occupy a nearby apartment, part time, when the owner is not there and he receives some benefit. A target may notice someone leaving a nearby apartment when he leaves his, and arrive when he arrives. [Eleanor White talking: All the time, in my experience.] In addition, he will often be accompanied in elevators by a steady stream of different individuals who go to the apartments being used by the group.

Back to Top of Table of Contents Now that is a HUGE "laundry list" of operations carried out against the targets of these criminal cause stalking groups. But reader, this particular book is ALL MEAT, and there is MUCH, MUCH more within its covers. If the general public is made aware of this book, these brutal crimes, which have resulted in suicides, just might have a chance of being exposed and stopped. Currently, the typical justice system response is to label the victim as mentally ill and wash their hands of the problem. This is itself a criminal act, and a violation of all the job descriptions and oaths these public officials have accepted and made. They are NOT doing their jobs! What about the future, then? Let me close this review with a chilling quote from the book reporting what the author learned from some of the leaders: "The leaders ... are starting to balk at exposing their members to arrest for activities which amount to little gain for the movement. THEY SAY THAT ANYONE WHO IS A TARGET SHOULD BE KILLED, and not just harassed for years." YOU, Joe and Jane Citizen, have the power to stop this by doing nothing more than asking your public officials how they plan to deal with this growing crime. Will you help us?

[232]

Eleanor White Back to Top of Table of Contents

Bibliography [p 73] Robert L. Snow, "Stopping a Stalker", Plenum Press, 1998 Robert J. Lifton, "Thought Reform and the Psychology of Totalism", University of North Carolina Frank J. Donner, "Protectors of Privilege", University of California Press, 1990 Frank J. Donner, "The Age of Surveillance", Alfred A. Knopf Inc., 1980 Joel Dyer, "Harvest of Rage", Westview Press, 1998 [E.W. Thumbs down!] * See also Eleanor White's REVIEW of Harvest of Rage Eleanor White talking: The above book, "Harvest of Rage", is an attempt to paint ALL members of the U.S. Patriot Movement as extremists, criminals, religious fanatics, and mentally ill. At the time of writing this review, I have listened to their shortwave, web, and AM/FM *broadcasts* for two years. If Mr. Dyer has ever listened to those broadcasts, then I have to conclude he is deliberately trying to discredit this movement for motives unknown. My guess is Mr. Dyer has not listened to their broadcasts. I have heard an endless stream of documented information, often from wire services before getting edited by retail media outlets, and government publications, which shows conclusively that the U.S. Patriot Movement broadcasters are on the right track and speak out often against anti government violence. The goal of the U.S. Patriot broadcasters is nonviolent change, returning the United States to original Constitutional principles, brought about by PUBLIC EDUCATION. Anyone who takes the time to LISTEN to their broadcasts will find the same. It is easy to listen to them by way of the network links at the top of this document. I'm afraid the author of Terrorist Stalking in America, David Lawson, has not taken the time to listen to these broadcasts either, and so does not have a fully informed opinion about the Patriots. Back to Top of Table of Contents

References [p 73] 1. FBI web site, http://www.fbi.gov 2. "The Rise and Decline of the Patriots", Southern Poverty Law Center Report, summer 2001, issue #102,

[233]

http://www.splcenter.org/intelligenceproject/ip-index.html 3. Frank J. Donner, "Protectors of Privilege", University of California Press, 1990, 252 4. LCDR Steven Mack Presley, "The Rise of Domestic Terrorism and its Relation to United States Armed Forces", written in fulfillment of a requirement for the Marine Corps Command and Staff College, 26, http://www.fas.org/irp/eprint/presley.htm 5. Robert L. Snow, "Stopping a Stalker", Plenum Press, 1998, 85 6. Robert L. Snow, "Stopping a Stalker", Plenum Press, 1998, 94 7. Wollersheim v. Church of Scientology 89-1367 and 89-1361 8. Robert Jay Lifton, "Thought Reform and the Psychology of Totalism", University of North Carolina Press, 1989, 419 (C5) Federation Against Mind Control Europe Victims in Europe get together (different languages), talk about how to organize and help each other, and fight the worldwide abuse of technological means on humans. Site: www.mindcontrolvictims.eu Taking control over things: We are not able to control or avoid the people doing gang stalking to TIs. Sometimes perps control our brain to make us loss control of ourselves. If we loss control of ourselves we cannot control anything in our life and our life can be easily controlled by the perps. To have command on our own lives, the first and very basics thing to control is our brain (most private thing in our life). To control us perps normally introduce bad moods and make us lose control of our brain. When perps try us make to lose control of ourselves we should counter act such that we regain our control over brain. Perps use gang stalking to cause bad mood and as a result the person in bad mood will be very vulnerable. The next section explains how the bad moods caused by the gang stalking can be controlled or avoided. Perception and GS Gang stalking entirely works based on the perception of the victim. Without proper perception the gang stalking fails to cause the intended effects on the victim. Normally perps condition the TI victims brain to set the perception so that the gang stalking causes the intended bad moods. With enough conditioning of the brain a simple gesture can cause extreme bad moods and can persist in the TI for hours together. For example if the perps want to condition the TIs brain for bad mood when the TI sees anyone scratching their nose. To condition the TI brain for nose scratching gesture, perps display nose scratching followed by mind control by inducing thoughts like is the man scratching his nose is insulting me and after the thought O yes he is insulting me by mind control, perps attack the Tis brain with directed energy weapon to make the Tis brain learn that if a person scratches his nose I hate it, because I feel pain in my brain when I see someone scratches nose. The Tis can recondition their brain to neutralize the perceptions which cause bad moods in the TI for a given gesture which is part of Gang stalking. Prevention is better than cure: It is possible that the TI can identify events of the conditioning of brain by the perps and prevent the brain from conditioning for gang stalking by avoiding the conditioning thoughts from training TIs brain. Change in the brain perception by feeling the state of the brain:

[234]

Gang stalking perception which is responsible for the bad moods in the TI (multiple such instances over the period results in the social control of TI) can be avoided by just feeling the brain state. Feeling the brain state is nothing but just taking your consciousness to the different parts of the brain to find how the gang stalking affects each part of the brain. For example to feel the chill of a soft drink we touch and feel the temperature with our hand(by taking our mind conscious to the hand). Similarly feel different parts of the brain and find tensed parts of the brain and relax it (relax with breathing out). Feel different parts of your brain when you are angry, happy and for other moods and compare the brain state with the one generated by the gang stalking. By doing so the gang stalking perception occurrence can be avoided and hence the bad mood results from the gang stalking. The same technique can be even used to reduce the pain perception induced by the millimeter wave directed energy weapons, by feeling the different parts of the brain you are avoiding the pain sensation being felt by your conscious brain. You may wonder how just feeling different parts of the brain helps in avoiding the Gangstalking perception. The technique explained above prevents the processing of brain other the feeling of the brain itself and hence the brain doesnt find time to think about the Gangstalking. Following are the advantages of the technique: 1. We ignore the visual cue or gestures displayed by the perps when we feel the brain 2. Gang stalking perceptual training of the brain is avoided when you feel the parts instead of feeling the effect of the actions of perps on your brain. 3. We are avoiding the bad thoughts from the previous gang stalking being remembered while getting stalked 4. Electronic mind control can be avoided by having control over our brain 5. Bad moods are avoided and we are minding the things happening around us instead of experiencing bad moods and being in flight or fight moods. 6. DEW pain perception is also avoided (which is normally used by the perps to train the TI brain after the Gangstalking event) Neutralization of the TI brain trained by perp: Neutralization techniques that can be used to neutralize the TI brain trained to Gangstalking perception. Neutralization technique can be used once the TI brain is trained for the perception whereas the technique explained above even helps the brain from being trained to the perception of the brain. Consider a gang stalking case where a TI is sensitized by the perp so that whenever the TI sees people wearing red colour dress then the TI gets concerned. Normally anyone wont get concerned by just looking people wearing red dress, but when a person gets sensitized that is when a persons perception of looking people wearing red dress is trained then the person will get concerned. To achieve this perp will train the TI. There are several technique used by the perp for the training. Training of perception for Gangstalking with Directed energy weapon: To sensitize the TI on looking a person wearing red dress perp make a person wearing red dress and appear in front of TI and when the TI looks at the person perp will attack the Tis head with directed energy weapon. After this event the when TI recollects the event the TI will think that when TI looked at the person wearing red dress there was pain in the brain and hence unconsciously the TI will learn that when TI looks people in red dress the TI will get pain in the brain. Normally pain in the brain will not be perceived as brain ache but emotional event. Perp will repeat this event for couple of times until the TI gets sensitized by person in red dress. After sensitized or after turning the perception of the TI for Gangstalking perp has to just make person in red dress in front of TI to make the TI concerned. This type of Gangstalking can make the TI to be I bad mood for hours together after the Gangstalking. Above technique can be made more effective using the mind control instrument by perp. Consider a case where a TI is able think over the event and feels that people appearing in red dress is just

[235]

coincidence and it wont affect him/her in anyway, in this case above perception training may not work. But when using the mind control instrument the training the perception can be very effective. Consider the example explained above after the directed energy attack on TI on looking people in red dress, perp will transmit mind control signal with information I really hate seeing people in red dress, all the people in red dress are perps, people in red dress are everywhere!. After mind controlling this signal into the Tis brain the TI feels that the above thoughts appeared in the Tis brain is his/her own thought and will learn those thoughts and also feels emotional pressure of those words in the signal. The signal transmitted by the perp into the TI head cannot be detected by the TI normally and the TI will feel that the thoughts formed by the signal as his/her own thought. Above mind control signal can be used in many different forms to sensitize TI and control TI. Emotion and Gangstalking: Researches have proved that brain can store the deep emotional events better than mundane events. While Gangstalking the TI gets emotional and hence the memory of gang stalking is stored deep inside the brain. While gang stalking the brain readily retrieves the stored past gang stalked thoughts and the stress and pain of the gang stalking is multiplied for the TI for the presently occurring gang stalking. If the TI practices not to become emotional while gang stalking then the effect of the Gangstalking such as stress, pain will reduce substantially. Feel different parts of the brain and find tensed parts of the brain and relax it (relax with breathing out) to get rid of pain in the body caused by directed energy weapon. This only helps when the DEW causes pain in the body other effects such as pin needle effect and insect crawling effect on the skin are not reduced using the method explained above.

(C6) PREDATORY GANGSTALKING www.multistalkervictims.org "Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual's life on a continuing basis, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm." R.B.Ross c 2005 Tactics of Predatory Gangstalking include highly coordinated surveillance (hidden cameras, conversation bugging in private aswell as public), harassment, and psychological, psychosocial, financial, and sometimes physical assaults on an individual by a large group of people who are often strangers to the targeted individual. A Predatory Gangstalking group is a well-run organization comprised of members who are unidentified as gangstalkers to the outside world. Until a group of gangstalkers turn their face towards someone selected to be one of their targets, members of society do not realize there is such an invisible group. The practitioners of predatory gangstalking are people who, for the most part, go about their business of daily life appearing like everyone else, except for their activities involved with Predatory Gangstalking. Predatory gangstalking activities take priority over everything else in the lives of Predatory Gangstalkers. Predatory gangstalking is actually a lifestyle for those who participate in it. Predatory Gangstalking is also called "terror stalking", "gangstalking", "flash mobbing", "cause stalking," "hate stalking," "multi-stalking, "happy slapping," "workplace bullying, and "covert war." . "Flash mobbing" is an event occurring when a targeted individual is spotted in society. Their photo

[236]

and location is immediately and simultaneously sent out by cell phone text messages and Internet email to all gangstalkers within a certain radius. All gangstalkers then suddenly descend upon the target as a mob. . "Cause stalking" refers to gangstalking by single-issue radicals. They stalk a targeted person related to that specific agenda. "Cause stalking" has been reported to have been carried out by radical Christians who believe in "dominion theology." . "Happy slapping" refers to group harassment of one youth by other youths carried live over cell phones equipped to handle video to peers youths. The young gangstalkers slap around the targeted youth while laughing at him or her while several other youths broadcast the incident live to as many peers as possible. . "Ritual Gangstalking" is reportedly performed by cults and secret organizations such as Satanists, secret orders of free masons, some voodoo /obeah practitioners and Scientologists as a means of control or for punishment. "Ritual abuse" is incorporated into "ritual gangstalking" patterns in this case. N.B. Obeah is considered one of the darkest forms of black magic known. Blood sacrifice is always used and the intent is to harm, even to death, another person. . "Workplace bullying" involves gangstalking activities tailored to the workplace which are carried out by a group of employees against another individual employee. * "Cybergangstalking" is a situation where an individual is identified to be a target through Internet participation and their personal identity is determined. Cybergangstalkers pierce the electronic veil and are able to enter into the real life of a person, creating all forms of harassment, theft, psychological operations including slander and libel, and able to commit crimes against the targeted individual. * "Vigilante Stalking. Stalking, Terror Stalking" is the same as Predatory

For the purpose of this informational writing, all activities will be referred to as "predatory gangstalking" because the tactics and characteristics of the gangstalking are the same. And often a targeted person will become the victim of more than one type of gangstalking. "Predatory Gangstalking" is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade an individual's life on a continuous basis, to an extreme degree, as part of their lifestyle. While each individual gangstalker does his or her small part, what defines Predatory Gangstalking is the collective intent to do harm." R.B. Ross Predatory Gangstalking is reported by historians to have been originally developed by social scientists and psychologists in communist and fascist's countries as a means of control of individuals within those societies. The tactics and techniques of Predatory Gangstalking were developed through animal and then human experimentation. The methodology of Predatory Gangstalking is precise and well-orchestrated. It is reported that the technical mechanics for Predatory Gangstalking werefirst sold on the Black Market by the ruling party leaders of East Germany when the USSR political systems crumbled. These protocols were subsequently exported to other countries and implemented there against unsuspecting citizens. Predatory Gangstalking has been reportedly against citizens worldwide. Thus far, it has continued unchecked. One of the reasons for the unchallenged proliferation of this form of organized crime is that it characteristically takes place in such a way that it is invisible to the untrained eye. It is understandably, therefore, considered to be the perfect crime, as it remains unchallenged and

[237]

extremely

difficult

to

prove.

The countries with the greatest number of reports are the US, Canada, Germany, and England. In the US, the states with the greatest number of reported predatory gangstalkings are California, Texas, and New York. The predominant proportion of individuals targeted by gangstalkers are nonCaucasians. It is difficult to find other predominant similar characteristics in targets. The reasons that an individual is selected for targeting are unknown. It can only be speculated to include reasons such as easy accessibility to the target, random selection for training for new Predatory Gangstalkers, minority group member relative to hate-based groups, making an example of someone, revenge, retaliation, and social control. Who are the practitioners of Predatory Gangstalking? They include career criminals, participants in the drug trade, extreme ideologists such as radical Christians, members of hate groups such as White Supremacists, members of motorcycle and street gangs, and homeless people. They are also often people with a background in the military, including disabled Vets. Higher levels in the Predatory Gangstalking organizations include people in military and law enforcement or with same experience, secret service/defence employees, government officials, Banking firms, and so on. It has been reported that top level government security and intelligence agencies use gangstalking tactics in covert operations. What is most baffling about Predatory Gangstalking is that many of the practitioners of this social pathology appear to be regular mainstream people with no prior criminal record, predominantly in the socio-economic middle class. It is presumed they participate for the money or rewards they receive in the form of barter or for a social-conscience feelgood factor. The world of Predatory Gangstalking increases as new recruits are initiated into the Predatory Gangstalking process. Therefore, a target may see collusion and participation from neighbors and co- workers who were once on good terms with the target. The circle of predatory gangstalkers widens with time. However, most of the time, the gangstalkers are complete strangers to the target. In most of the encounters the target has with gangstalkers, the target does not recognize the perpetrators but the gangstalkers readily recognize the target. Further, these predatory strangers possess detailed knowledge about the targeted individual. Most often, Predatory Gangstalking is being engaged in by parties unknown, for reasons unknown, to the target. People have died after a lifetime of protracted Predatory Gangstalking without having any explanations as to who was doing this or why this happened to them. Sometimes, the leaders in these large affiliated groups of gangstalkers have specialized military expertise in the areas of military intelligence, military electronics and equipment, and in military strategic and tactical training. Those without formal military training have often engaged in paramilitary activities or have technical skills commonly found in successful career criminals. Others who join a Predatory Gangstalking group without such a background are given on-the-job training, in addition to other gangstalking skills. It can be said with certainty that there are specific protocols and tactics and most gangstalkers appear to be proficient in a similar set of skills. Predatory Gangstalkers each have their own individual skill that they contribute towards their common goal in the group. One person in a group knows how to pick locks; another knows how to hack into computers, while someone else provides the GPS and electronic equipment. Many Predatory Gangstalking members know how to tamper with a vehicle. Some predatory gangstalkers are practiced "look outs" while others are group leaders. Predatory gangstalking groups have their rank and file as in any other organization. Orders come from the top, just as in any other organization. However, it is unknown whether the top of the organizations are local, regional, national, or international. Predatory Gangstalkers use state-of-the-art technology coupled with law-enforcement- style surveillance tactics. Typically, the individual gangstalkers are strangers to the target. ("Happy slapping" and "workplace bullying" are the most common exceptions) Participants in predatory gangstalking are well-trained. The tactics and techniques they use are similar all around the world

[238]

in the numerous countries where this has been reported. Each group of predatory gangstalkers is a covert army unto themselves. They have incorporated specialized techniques originally used by spies during the cold war. They carry out their field work with military style precision. Then, they go about their daily lives, just like any other member of society, in most cases. Their gangstalking skills are highly sophisticated, and their commitment to Predatory Gangstalking exceeds zealousness. It appears to both an observer and a target that nothing required of them in terms of time or availability is too much trouble for them. As stated previously, but worth repeating, predatory gangstalking activities take priority in the lives of those who practice Predatory Gangstalking. Predatory Gangstalkers are a functioning subculture of society that move invisibly through society as such. This is by design, making it even more dangerous to society. The goals of Predatory Gangstalking of an individual are numerous. Predatory Gangstalking is intended to deprive someone of their freedoms and rights. It destroys a person's privacy and control of their own environments. It is intended to create distress, disrupt all relationships, deplete person's resources, destroy one's physical and mental health, and inflict great overall long term suffering. They interfere with a target's sleep thereby producing chronic sleep deprivation, as a strategic tactic. They employ a variety of interactions with the targeted individual which are likely to produce accidents and various forms of illness. One of the main weapons they use for their own protection and to enable their success in gangstalking is to manipulate the target's life in such a way as to cause them to lose their credibility with others. This is usually the first objective reached. After that, gangstalking the target involves only minor risk. Notably, people who become involved generally stop caring about the abuse by either turning a blind eye or actively joining in. While others, though concerned for the target, become too frightened to speak out or come to believe the propoganda that the target is mentally ill and needs this help. Predatory Gangstalking also involves provoking "accidents" and consequences of harm to the target. Predatory Gangstalkers will surrounding a target's moving vehicle and attempting to force them off of the road when they are stressed and exhausted. Worse, these tactics will be employed after tampering with a targeted individual's vehicle. Predatory Gangstalking is very serious business. Predatory Gangstalking is, at the least, psychological violence, and at most, it is a protracted sadistic sociopathic domination and calculated destruction of an innocent human being for reasons of pleasure, power, and social control by a group predatory stranger. It is rightfully assumed that money is involved in Predatory Gangstalking because of the amount of resources required to execute such extensive efforts. The gangstalkers develop capabilities directly proportionate to the amount money that funds them. In following the money trail speculatively, one looks to the possibility that drug money is involved. Some people reason that the government may be involved because of the amount of resources that are available to the practitioners of Predatory Gangstalking. Other individual situations seem to indicate that corporations, insurance companies, and even wealthy individuals with revenge motives fund a Predatory Gangstalking. In addition to cash payment for participation in Predatory Gangstalking, other forms of barter are used. These include drugs, *, alcohol, reciprocal favors, release from debts, jobs, contracts,"deals" for legal problems, and other forms of compensation. Some gangstalkers are given free housing in exchange for performing Predatory Gangstalking activities against a nearby target. However, it is clear from observing Predatory Gangstalkers in action that many engage in it for pleasure. One high ranking leader in Predatory Gangstalking stated that it was like an addiction. He described how the build up and culmination of a gangstalking assault was intoxicating, but that there was a let-down feeling afterwards that compelled him to do it again, and the cycle continued.

[239]

It is also true that some people participate in Predatory Gangstalking because they are deceived into participating. Friends, neighbors and associates of a selected target are given false information and finally come to believe the targeted individual has committed a heinous crime for which they deserve what is portrayed them to be rehabilitative social intervention. Sometimes people reluctantly participate in indirect ways, such as making their homes available at times for part of the operation, for fear of consequences if they did not. Others involved in Predatory Gangstalking, including the homeless, do so for money or drugs. Disabled Vets are known to participate in Predatory Gangstalking activities for alleged government or defense contractor's projects. Predatory Gangstalkers have successfully elicited the participation of neighbors by appealing to their sense of service to the community or government, often representing themselves as affiliates of the government or law enforcement. Lastly, those who are in the underworld or secret organizations practice Predatory Gangstalking as part of their membership duties. The craft and practice of Predatory Gangstalking appears to be standardized around the world. Many similarities parallel incidents reported by targets internationally. It appears that there is a standard protocol involving a series of tactics, progressive phases, and nature of assaults. It appears that an individual has been selected to become a target and the groundwork has been established for their assaults long before the individual can be aware that something criminal is occurring in their lives and to their person. Predatory Gangstalkers achieve this strategically. By the time the targeted individual becomes aware that something very threatening and disturbing is happening to them, they have already been thoroughly investigated by their enemies, stigmatized, discredited, and compromised. All wells have been already poisoned, so to speak, and all avenues of help and escape have been blocked. Predatory Gangstalkers first establish "information dominance" over a targeted individual. This achievement alone enables them to attain excessive power over the targeted individual. It is believed that this is accomplished by means of eavesdropping devices in the target's environment, global positioning technology (GPS) secreted on their vehicles, obtaining illegal access to all of a targeted individual's personal records such banks accounts, emails, medical records, and credit card purchases. They are often able to achieve 100% surveillance of a targeted individual and almost 100% access to a targeted individual's entire lifetime of available information from any computer, paper, photographic, or personal source. They use all of the information obtained to ambush and sabotage a targeted individual. Predatory Gangstalkers ultimately become capable of entering a target's house, place of employment, and vehicle at-will and often. All forms of communications in the targeted individual's life is interfered with by the gangstalkers. They will intercept email, tamper with voicemail, and obstruct the delivery of postal mail. The net result is that all communication in a targeted individual's life will become unreliable and incomplete, both incoming and outgoing. The Predatory Gangstalkers are then capable of greater insidious manipulation and control. Predatory Gangstalkers constantly update information about a target. Updates are promptly shared with all of the participants in that predatory gangstalking group. They take frequent photographs of the targeted individual, and maintain photos of the target's house, vehicle, place of employment, family, friends, and even the target's pets. They promptly disseminate this information through email and cell phones to other gangstalkers. This is the means by which a targeted individual is continually recognized by Predatory Gangstalkers everywhere they go. The Predatory Gangstalkers sadistically prefer to maintain a file of photos taken at points in time when the victimization reaches peaks, such as when a target is reaping consequences brought about by the gangstalkers, such as upon a targeted individual's firing, eviction, or when the person emotionally breaks down, or when they appear disheveled from insomnia or is fearful. Psychological profiling is yet another tactic performed on a targeted individual for the purpose of finding weaknesses. They exploit all information obtained, including fears, triggers, value-conflicts, skeletons in the closet, areas of shame, addictions, vices, and all things they hold dear. They often successfully "interview" a target under various guises. They use the information obtained to

[240]

maximize

the

Predatory

Gangstalkers'

ability

to

destroy

the

targeted

individual.

Practitioners of Predatory Gangstalking have their own coded language, both verbal and visual. Each targeted individual is referred to by an assigned code word. Hand signals are an important tool of their universal protocol. Some hand signals resemble the mannerisms used in baseball and other sports. Other signals are those found in law enforcement and the military. They use hand signals to identify the area of a target's body designated to be the target of a pending physical attack. This is often the eyes and the heart. They also use hand signals to coordinate the unauthorized entry into a target's home or vehicle. They also use hand signals during roving vehicle caravans and while on foot, for the purpose of coordinating attacks and pointing out the location of a target. Vehicle alarm panic buttons and horns are other commonly used tools of communication and coordination. In residential areas, outside lights have an established set of messages. They also use "dead drops" like spies have done historically to secretly pass along information to one another. Public bathrooms are commonly utilized as locations for the transfer of information and equipment. Mobile pick-up and delivery systems are in place for this purpose as well. They have a set of questions and responses to confirm the identity of a predatory gangstalker to another which are also coded. In the USA they refer to money by the last names of the president whose face is on the bill. Someone may say "I have references. (translation: money). I know 5 of the Franklin's." Their coded language is universal to them. Predatory Gangstalkers will begin an intense and extensive discrediting campaign against a selected target well before the target could even suspect he or she has an enemy. This critical tactic sets the stage for neighbors and associates to become alienated from the target. One of the Predatory Gangstalkers' goals is to eliminate all forms of support and assistance for the target. Towards this objective, the police are given anonymous "concerned citizen" tips designed to lead the police to believe the target is mentally unstable or a problem in the community in advance of any actual direct gangstalking of the targeted individual. This sets the stage for having the targeted individual prejudged so they will be disbelieved and dismissed when the gangstalking begins and they seek help. The discrediting campaign includes accusing the target of being an "undesirable" for any number of reasons, including fabricated reports of having committed crimes that are the most repulsive to members of society. Practitioners of Predatory Gangstalking even go so far as to represent themselves as undercover law enforcement or government agents. It has been reported that they will even show false documents for substantiation, but they will never leave them behind. Financial devastation is another goal of Predatory Gangstalking. Towards this goal, they make attempts to destroy one's gainful employment, pose as offering services to intervene in the problem to further take your money, and will steal funds and personal property on an on-going basis. Repeated unauthorized entries into a target's residence, vehicles, computer, and workplace are hallmark tactics of this crime and is nearly impossible to stop. Predatory Gangstalkers can pick locks, bypass security alarms, and enter any location posing as utility crews, law enforcement, or delivery men. Practitioners of Predatory Gangstalking will apply for and obtain legitimate jobs in a target's home or business in order to have access to the target and their life, relationships, and assets just to do harm. Predatory Gangstalking employs a tactic of synchronicity. This tactic involves the precise timing of interactions with the targeted individual. For example, the target can go out to get the morning newspaper and encounter gangstalking activities that suddenly appear and which are precisely synchronized. Throughout the targeted individual's day, these synchronized encounters repeatedly occur. Activities such as leaving one's driveway, taking out the trash, going to a store, or even walking the dog, are activities which result in an encounter with one or more Predatory Gangstalkers. Even when a target strategically does not follow any set routine, these synchronized occurrences continue. This makes the gangstalkers appear to be all- knowing and almost omnipresent in the mind of a new targeted individual. This is intimidating, demoralizing, and even terrorizing to targets. It is often

[241]

unavoidable. In the case of primary targeted individuals of gangstalking (the rare individuals who are the priority target of global gangstalking) the primary objective is to induce as much fear as possible and over time as the numbers of individuals that become involved or are made aware of a target, the abuse can increase substantially, so that there is no aspect of the targets life that is private or sacred. Rarely, if ever, does a targeted individual engage in an activity of daily living without the unwanted participation of Predatory Gangstalkers. The timing and coordination of these activities are remarkably precise. The targeted individual becomes aware that all of their activities include the presence of Predatory Gangstalkers. These gangstalkers demand to be noticed by their target, and if they are not, they will take an action to be noticed. This could include honking their horn strategically, making a comment, creating a scenario to get the attention of the targeted individual. Once noticed, they will return to non-contact, knowing that by that point, the targeted individual will henceforth anxiously watch for them. Most times, however, these practitioners of gangstalking maintain the appearance of "business as usual." They rarely make direct contact, with some exception. However, these strangers often boldly smirk and openly laugh at the targeted individual at some close point in the encounter. This is the universal exception to the "no direct contact" protocol. Other times, when verbal or physical contact is made, these encounters are conducted in such a way as to appear to have been "happenstance." Since most of the practitioners of Predatory Gangstalking rotate in and out of the life of a target, the same patterns of gangstalking will occur, but it will involve different people all the time. Therefore, many different stranger and many different vehicles will walk, drive, or bike past the target and interact in some manner, at various times and locations. All of the predatory gangstalkers will be strangers to the targeted individual and they will continue to make their presence, but not their purpose, known. This is one element of Predatory Gangstalking that is disbelieved by others. These "others" include law enforcement, the medical profession, and family. Those who are unaware of activities of subcultures such as criminals, secret organizations, clubs, extremist groups, radical political groups, hate groups, organized crime groups, and other antisocial groups, the scope of attack by Predatory Gangstalkers is unfathomable. Never the less, the extent of this massive assault on one individual is as extensive as described here and even more so. Let it be said that we really do live in amazing times. The world itself has seen much change and turmoil even in the last century, and with the increase of technology, the desire in those who choose to live out of balance with life and try to live in dominance and control of the masses have opted for this horrendous path of stolen power. This may sound quite vague, and it is, only because the other face of ganstalking or rather the precise reason for its use deals with a more incredible phenomena than hasn't been touched up yet. In the first instance, we mustn't be so nave as to assume that our governments and all those that have been granted the power and authority to run our world are acting from a selfless perspective. On a personal level, participating in any form of gangstalking is not only insane but utterly immoral, and spiritually and criminally corrupt. If you care, choose never to participate, inform the target (carefully/secretly), make a united stand with friends and neighbours not participate and log all the evidence you can - takedown all information you can. Be smart, technology and the capability of those that have orchestrated these world terrors are immense. (C7) ORGANIZED STALKING: A TARGET'S VIEW Eleanor White Revision of January 1, 2010

[242]

Lawson worked for more than a decade with a Florida detective agency. It appears that his investigative work involved travel throughout the U.S. and Canada. He stated that his investigation covered 12 years, and likely was a spare time activity for him. David Lawson reports in his books that he was casually listening to his public service radio scanner, and discovered a group using police-like terminology, but which did not sound as if they were actual police officers. Eventually, he learned of a restaurant where they met for meals, and visited one of this group's gatherings there. This provided the curious David Lawson with a chance to gain the confidence of the group, and Lawson found that they were, in fact, carrying out organized stalking on designated targets. This group assumed the role of some sort of "special community police." From my experience in the organized stalking target community, Lawson's observations are a perfect match for what targets experience from people in their community (or people encountered while travelling.) What I have heard consistently from perhaps 50 commentators over that time span is that they are people who research government documents, scientific reports, and under-reported mainstream media reports both from the U.S. and foreign. They reference published history. David Lawson discussed cause (organized) stalking with a few police officers during his investigation. He found an odd excuse made by police for allowing organized stalking to continue. The police claimed that somehow, harassment by groups amounts to free speech. Lawson learned that: ** Police themselves are sometimes targets ** Police are very reluctant to talk about stalking by groups ** One officer acknowledged that stalking groups are growing in size and number That statement by police, "In general, they said that 'cause stalking' is primarily a civil problem where the plaintiff has to prove financial loss" shows that police are definitely not interested in trying to go after organized stalkers. Since the early 1990s, there have been anti-stalking laws on the books. From that point forward, stalking is a criminal offence. True, stalking, even by a known single stalker, is difficult to investigate and prosecute because no single act by a stalker needs to be seriously criminal. It takes quite a bit of investigative effort to prosecute what people who are not stalking targets consider something relatively minor. And when the "labour" of stalking is divided among members of a group, it is even more difficult to prove culpability. But the fact remains that stalking is a criminal offence, and that 'civil problem' statement by police is what could be called a "cop out", pun intended. Lawson found that the recruits he managed to meet were blue collar workers. These recruits can bring very powerful abilities to the stalking group by way of having keys to locked spaces and apartments. Security guards, city workers, taxi drivers, cable, telephone and electric utility workers also contribute to the stalking groups' ability to keep the target in their sights, constantly, Lawson found. Keep in mind that organized stalking includes TWO phases - organized stalking by people,

[243]

and attacks using advanced through-wall electronic technologies. The recruits described above, according to Lawson, had no knowledge of the electronic attacks. There is apparently a separate "elite corps" of electronic stalkers, based on the experiences of targets. Lawson reports some statements from the harassers themselves, expressing their attitude and motivation. The stalkers believe: ** They are a kind of police who actually rank ABOVE the sworn constabulary. ** Their groups help police by trying to alert people living in the target's are that the target did something really bad at prior locations. ** They see themselves as kind of minutemen - always at the ready to be dispatched when called, forming a network the target can never escape. ** They feel the fact that essentially all service workers and trades are members of the stalking groups makes them a force a target doesn't want to mess with. Lawson reports some statistics he gathered regarding what motivates the perpetrators: ** 25% follow the nominal "cause" they were recruited under ** 25% actually participate in the harassment ** 75% harass occasionally or not at all ** 10% join out of fear of being harassed themselves Lawson describes recruits to these groups as "... those who feel powerless, inferior and angry." 19

[244]

Common sense is that naturally, such people would be easy to recruit for street and adjacent to the target's home harassment, but I would comment that lots of professionals put us (targets) down at every opportunity, declaring us mentally ill for even suggesting organized stalking is possible. These professionals don't "feel powerless, inferior, and angry." And I doubt the many utility and city employees who participate feel "powerless, inferior, and angry" either. So while David Lawson has done a great job, some aspects of organized stalking have apparently escaped him. One comment Lawson makes is that "Firemen across the country, and even some police officers, support these groups." I have heard a number of reports that vehicular harassment has involved an above average number of vehicles that bear stickers of firefighters, or, a few targets have traced perpetrator identities to firemen. One target discovered that a number of vehicular harassment cars, identified by licence number, were parked in a police station parking lot. My personal take on why some firemen and police might back these groups is that many have a heightened sense of community service. If they can be persuaded that the target has a criminal record, the worst case being that of a pedophile, it would be natural for firefighters and police to want to "help keep the target in line". The author concludes, as explained at a number of places in the book, that the "cause" the typical group is "working toward" is mainly an excuse to get the groups together heightened sense of community service. The main motivation of members who stay with these groups is the sense of power and belonging the group members derive. Having a "cause" enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feel about their "work" and accept them. "Most active group members have only a general idea of the ideology of the group, but they don't particularly care." These groups come into being and are run by leaders. Here is what the author says about them: "Group leaders do have political goals and the belief that the end justifies the means." Lawson describes leaders as considering their members "disposable." He states that some leaders work for corporations and politicians. Lawson states that leaders identify targets but don't directly supervise the harassment group members. Lawson describes leaders as having an "air of mystery", "having worked for the CIA, NSA, or some other intelligence agency that doesn't reveal information about their employees." Lawson states that this "background" is likely mythology. If organized stalking is the leading edge of a world dictatorship, however, it's not impossible that the world's intelligence agencies could play a part. How about financing these groups? Although the author states that the pay is low, there are still very large expenses to harass people as thoroughly as targets report. Lawson observed that the stalking groups he met and travelled with can afford to rent property adjacent to the target's home, pay for all modes of transportation so that stalkers can travel with a target, and the communications and coordination expenses to provide seamless coverage of targets regardless of where they travel. This adds up to significant expense.

[245]

Here is what the author learned about their financing: Lawson discovered that corporations fund at least some of these stalking grous, and use them as private armies against the enemies of the corporations. Enemies can be whistleblowers or activists, Lawson found. The author makes several statements that these criminal stalking groups not only harass targets specified by their leaders, but also are FOR HIRE - a kind of "revenge service" for those wealthy enough to hire them. There are two distinct reasons why targets are harassed: ** The initial reason targets are placed on the stalking groups' "list" ** The reason the stalkers keep it up Those two reasons should always be kept separate in your mind, reader. David Lawson's focus is mainly on the reason the stalkers continue to harass targets. David Lawson's chapter on Selection of Targets may well be true, but it certainly doesn't describe the thousands of people who don't fit his list of targeted categories. Here are some of the categories of targets Lawson records in second book, "Cause Stalking": ** Abortion clinic workers ** People guilty of mistreatment of animals ** County clerks and local politicians ** Police officers ** Judges ** IRS and Treasury agents ** Civil rights activists ** Government or corporate whistleblowers One thing David Lawson makes clear in describing the targets is that the ultimate goal of the groups is to destroy the targets. Those who have been stalked by organized citizen groups which are fed lies report that these groups do destroy targets with great efficiency. Next, let's look at some of the typical OPERATIONS these groups carry out. These are paraphrased from Lawson's books below: ** Once a target has been selected, that target will be studied to ascertain the target's personality type, IQ, and personal history. 21

[246]

** Targets will be photographed, sometimes openly. ** Targets are kept under surveillance by large groups, and will always be followed. However, the stalkers doing the following are rotated, and this makes it difficult for the target to prove they are being followed. ** Lawson's cause or terrorist organized stalking groups do more than just follow targets, they perform break-ins, damage property, and, says Lawson, have assaulted, sometimes fatally, some targets. These stalkers also like to stalk children of a target. ** Firemen and even some police departments are reported as having a history of supporting groups. Lawson describes fire department equipment being used as part of stalker convoys. Lawson reports the participation of firemen, city workers and utility workers makes the stalkers believe they are doing great community service instead of committing crimes against innocent people. ** Lawson learned that city worker participation sometimes extends as far as tearing up the road in front of a target's home. This shows the depth of penetration into legitimate organizations of these stalkers. ** Some targets are selected just because they are convenient, reports Lawson. Loners are good convenience targets, and those with a good network of family support are not. ** Neighbours of the target are often persuaded to participate. These neighbours can be intimidated by threats of harassment, and of damage to homes and vehicles. Neighbours are plied with appeals to a sense of patriotism (the targets are painted as criminals and other types of undesirables) or the neighbours can be offered things like drugs, repairs to their homes, free taxi rides, or even just friendship. A major benefit to the stalkers is when they can persuade neighbours to give the stalkers a key to their residence. ** Lawson reports that targets are kept under surveillance around the clock. Stalkers detailed to keep the target under surveillance report the movements of the target by cell phone or two-way radio. Some stalkers will patrol the area to watch out for police, and if a target drives away from home, will begin to tail the target. ** Lawson found that in some locations, keeping a target under surveillance has almost become a sport, and all who know what radio channel the activity is carried out on can participate. Some targets have become aware of the radio activity, and reported to Lawson that they hear a radio bulletin go out as soon as the target turns on their lights in the early morning. ** Targets who live in apartments can expect stalkers to move in to several apartments which adjoin theirs. Stalkers consider it important that their members have access to all apartments in all directions from that of the target. Stalkers also keep the target's vehicle under surveillance, says Lawson. ** Stalkers who keep targets under surveillance sometimes set up a system where, for example, if the target flushes a toilet, a car horn will honk every time in synchronisim, or 22

[247]

possibly a burst of noise from a power tool or hammering. ** Targets find that there are suddenly large numbers of people coming or going to or from apartments next to the target, accompanied by rowdiness enough to hold the attention of the target, but not quite enough for a successful complaint to building management or police. ** Lawson reports that the stalking groups tell their neighbours that the stalkers are some sort of citizens' group which assists the police and are there to keep track of the target for some legitimate-sounding reason. Stalkers use props like case files, including photos of the target, to appear legitimate. ** Stalker will enter the target's home or apartment when the target is away, and they have lookouts patrolling a perimeter around the target's residence to watch for police. In apartments specifically, building staff are often co-opted by telling lies about the target. Building staff may also be intimidated and cooperate through fear of the stalkers. Pest control and alarm technicians sometimes provide access to the targets' apartments. ** Some targets, found Lawson, don't recognize that they are being deliberately harassed. Such unaware targets make an excuse such as there are a lot of rude people in the world. ** Lawson reports that interception of targets' mail happens frequently. Targets will find their mail arriving late, or they will find some mail doesn't arrive at all. Stalkers sometimes rub it in by sitting at a nearby table in a restaurant discussing the target's missing mail, or sometimes stalkers may even drive by the target waving the missing mail at the target. ** Blocking of phone calls by telephone company staff happens routinely. The staffers may believe the target deserves it, or for some perk offered by the stalkers. ** Stalkers put effort into destroying the target's social ties to family and friends. [This is made easy by choosing harassment methods which look like life's normal breaks to outside observers.] When the target inevitably describes the harassment, the target is likely to be seen as crazy. Lawson found that in some cases, more than one member of a family will receive the harassment. ** On the road, stalkers will often surround the travelling target and try to control the target's speed. To make it hard for the target to prove this crime, the stalkers doing vehicular harassment will frequently move off and a new group of harassers will take over. ** Stalkers like to drive around in convoys or 6 to 30 or even more vehicles, reports Lawson. Lawson found that a convoy all displaying high beams may be a stalker convoy. ** Sabotage of the target's vehicle happens, including scratching of the paint by a sharp object like a key, slashing the tires, even stealing licence plates. Stalkers avoid extremely dangerous sabotage like cutting brake lines, but they do engage in very expensive sabotage like draining oil or coolant to cause major repair bills and inconvenience.

[248]

** When a target walks in the community, he or she is followed everywhere. The stalkers seem to make a game out of trying to get into places with some restrictions on entry, such as places of employment. Stalkers will carry clipboards, wear name badges on lanyards around their neck, or even carry phony police badges.

[249]

** Stalkers use harassment tactics that look minor to passers-by. These tactics include noisemaking near the target such as clicking ball point pens constantly, rattling keys or change, particularly when standing behind the target. If the target responds, the target can expect more of the same. When a target takes a seat in public, stalkers will sit nearby to deliver noise harassment, or to repeatedly tap their feet, sometimes on the target's chair. The goal is to keep the target uncomfortable constantly. ** Stalkers work at disrupting both business and personal relationships by character assassination. This can be effective for new relationships; it isn't always successful with people who know the target well. ** Starting rumours and passing lies at the target's workplace is another method reported by Lawson. Stalkers will pose as customers when the target works directly with the public, then make complaints about the target. One example would be where the target is a real estate agent, where bogus customers can take up huge amounts of ther target's time without ever making an actual offer. ** Let me, Eleanor White, give you an example of how brutal and serious this "character assassination" can be: One of our members, who prefers to remain anonymous, moved in with her husband and children to a house which, unknown to them, had been a methamphetamine lab. The chemicals used to brew meth apparently cause distinctive symptoms in the mouth. This family's dentist felt he was "helping law enforcement" by reporting them to local law enforcement as meth users. This was absolutely untrue, but the family didn't even know the report had been made and had no way to correct it. (In fact, in some places, dentists are REQUIRED to report suspected cases of meth use.) Law enforcement in that area was apparently tied in to the citizen groups, and the family was harassed for many years. The husband died, apparently from exposure to these chemicals. The lady, now a grand, steadfastly did detective work and eventually found out about her family's reputation, with some help from a policeman who was a personal friend, from a different jurisdiction. This policeman admitted off the record that "meth mouth" can result in people being submitted to citizen harassment groups for harassment. Character assassination is complete, and has life-destroying consequences! ** Noise is one of the major means used by the stalkers. The stalkers use their cars to honk their horns or squeal their tires frequently as they pass the target's home. ** Stalkers use their access to nearby properties to create noise timed to target activities, such as the target leaving their home. ** Stalkers will make up nonsensical reasons to knock on the target's door. ** In apartment buildings, targets will be subjected to noise from work, like hammering or rapping on walls. The stalkers will work on these activities as long as possible, but avoiding forming the basis for a legitimate complaint by the target.

[250]

24

[251]

** The stalkers will sometimes make noise indicating they are moving around in sync with movements of the target, from the apartment either above or below the target's apartment. [Eleanor White talking: This requires commercial through wall radar.] ** The stalkers will sometimes leave a nearby apartment [or home] in perfect sync with the target's leaving home, repeatedly. Sometimes the stalkers will arrive at their apartment repeatedly arrive at their apartment in perfect sync with the target's arriving home. Stalkers crowding elevators with the target also happens. From the viewpoint of many targets, it is more likely that ordinary citizens from all age groups and walks of life are harassing us in an organized way, probably based on lies. Some targets have evidence that police play a role. In one case, someone claiming to be a retired police officer stated on a mainstream talk show about organized stalking that retired officers "sometimes make life hell" for targets who have done things they don't approve of. Bottom line: In spite of David Lawson's excellent observations, we still can't explain with certainty what entity is overseeing this global harassment organization. David Lawson presented us few hints about that. To locate a purchase source for his book, you can try a web search for: "Cause Stalking" "David Lawson" ... keeping those quote marks as they are above. The book has been intermittently available by way of the amazon.com Internet bookseller. Important Footnote Many people, including police officers, don't believe the Lawson picture of organized stalking because nobody has that much time on their hands. The answer to that comment is that Lawson found much of the harassment is NOT spare time activity, but is in fact rolled in to the day's work for a wide variety of professions and trades. Tradespeople and professionals simply carry on their normal careers. When the stalking group finds that a target has sought their services, the stalking group already knows which tradespeople are sympathetic to the stalking organization, and will alert them that the target is in fact designated. The tradespeople and professionals will then make sure the target receives treatment appropriate to the alleged crimes the target is said to be guilty of. This carries through to stores, restaurants, and public transit as well. So there is no need for harassers to have time on their hands in order for very vicious harassment to be taking place. Only the target sees it all. Harassers may only carry out an occasional act against a target. 25

[252]

Beyond tradespeople, at any one time there are plenty of citizens of a community who are not currently working: housewives, children, the disabled, the retired, the homeless. These people are also recruited and have plenty of time and opportunity to help punish the target. This, then, is the answer to critics who deny that anyone could have that much time on their hands. Let me start by sharing some anecdotes about when targets first become aware they are being deliberately harassed. That is, the moment when they wake up to the fact that they are not simply experiencing incredible "bad luck." One day a rather nasty looking middle aged man on a bicycle brushed past me on the sidewalk in front of my apartment house, screeched to a stop, turned around, and stared intently at me until I entered the building. When I got home, I discovered my underwear had holes punched in the crotches. I found some supplies which had been nearly full were now nearly empty. There was no evidence of a break-in, so clearly, someone had used a key. No valuable items, like my TV set, were taken. I began to pop wide awake every single night, and no matter how still I laid there, no matter how quiet it was, no matter how physically comfortable I was, sleep was absolutely impossible until daybreak, then I had to get up to go to work. Formerly friendly residents would no longer talk to me, but give me icy stares. Up until perhaps 11 pm each night, endless loud radios and banging noises became my constant companions. Before that, the apartment house had been quiet, and friendly. Clearly "something was up," but I had no idea what. It wasn't until I read a paper on the Internet by former U.S. Army intelligence officer Julianne McKinney about organized stalking and electronic harassment activity, 16 years later, that I had any idea there were others going through this. No known cause for starting the harassment. ** A social worker reported that her harassment started when she was hired to care for a young girl who had been through Hellish ritual abuse torture, and had developed multiple personalities as a result. (This is normal for children who are severely tortured.) The social worker found that she was being followed. Her house was broken into and the intruders were going through her possessions. Verbal harassment by strangers followed. No obvious cause for starting the harassment. ** A of three grown children, who had done forensic accounting and had inexplicable difficulty on some of her assignments, suddenly experienced an "electrical sensation" around her head. She began hearing "tones" (a commonly reported experience) seeming to originate inside her head. She received voice to skull transmissions from a man claiming to be a physicist "experimenting" on her. No known cause for starting the harassment. ** A man reports that his harassment began when he turned down an attempt to recruit him to do illegal things like running drugs, fixing elections, and witness tampering by a prominent government agency. Apparent cause, his refusal to play along. ** A former prison inmate reported his harassment originated with a system called "the Inmate Computerized Tracking System." He reports that once this system was implemented unusual things happened in the institution, including suicides and suicide attempts, and numerous inmates being labelled mentally ill. When this man attempted to seek help from outside agencies, intense harassment by guards resulted. Apparently caused by this government surveillance program. ** A man who had held responsible jobs was driving along the interstate, when he received a voice to skull transmission saying "It's going to break." This was followed by a popping sound in the vehicle's steering mechanism. The left turn signal was then permanently broken. No known cause for starting the harassment. ** A middle-aged man with no criminal record and no habits which would engender suspicion became aware of his targeting when he accepted a job on a work visa to a neighbouring country. Initial clues included being singled out by customs for detailed questioning, and treatment for mild depression by doctors which didn't actually seem related to the problem. The odd, not relevant treatment by doctors continued. Strange signs of entry into the target's apartment began, including damage to blinds and cable ties showing up on lamp cords. Sounds of wires "scraping" in his apartment wall, always exactly at his bed time. No known

[253]

cause for starting the harassment. ** A man moved to a new city and immediately began experiencing hostile behaviour of neighbours, "strange things" happening around his house, and harassing telephone calls. He then began to receive manipulated dreams, a common complaint. (Note: Even sleeping near a radio or TV can influence dreams, so influencing dreams by way of voice to skull and silent sound is not difficult.) No known cause for starting the harassment. ** A target noticed harassment starting just after telephone linemen were seen working just outside the target's home. The target began experiencing unusual clicks while talking on the phone, and when the target said "It seems someone is listening" the calls were cut off. (Noise and disruption on target telephones is common.) The target discovered their door unlocked or even open on returning from work, several days in a row. The television remote disappeared for a month. A man claiming to live in a motel overlooking the target's house offered to mow the lawn; obviously someone mowing lawns isn't going to be able to afford to live in a high quality motel. No known cause for starting the harassment. ** A female member of the army of a major country dated senior non-commissioned officers who were "revenge prone." Single stalking began which became organized stalking with electronic harassment. This female soldier reports hearing an attitude expressed by senior NCOs that single female soldiers need to be "managed." Apparent cause revenge, possibly related to a terminated relationship. ** A female software engineer began getting harassed on the job in the information technology security field. She had been getting top marks for her work prior to that. She began getting blacklisted, and heard specifically from one prospective employer that she was in fact blacklisted. There is an epidemic of severe abuse of foster children that you, reader, may not be aware of because foster children are doled out by agencies ostensibly there to genuinely help children in distress. This software engineer's child was removed from her, something that happens to a number of organized stalking targets. Her child turned up in a hospital emergency room displaying sunken eyes and emaciation from starvation, with sores all over her mouth. No known cause for starting the harassment, however, from the targets' viewpoint, jealousy on the job is sometimes suspected. ** Two organized stalking targets report that their harassment began when they entered alcoholics anonymous or narcotics anonymous "12 step" residential programs. They report that these agencies apparently feel perfectly justified in "punishing" addicts. One such target reported that the operative phrase for targets who try to leave these programs is "We [the agency] will refund your misery." ** A single mom of a pre-teen boy began getting heavy fatigue attacks at work. Then began massive sabotage of multiple computers, her telephone service, and belongings in her home. An external roof drain pipe was repeatedly crushed or pried apart to flood the basement. Clothing was ripped, and even spots of engine oil were placed throughout her home and on her son's bed. Her bank account information kept being sabotaged. Telephone customer service people were strangely hostile and not helpful, actually lying about service calls. No known cause for her harassment, however she suspects a strange encounter with a man at a dance hall may have triggered the start of the harassment. ** A lady, with teenage daughter, had to enter alcoholics anonymous, a residential program, due to her alcoholism threatening her marriage. While there she met, and began a relationship with an ostensibly clean cut, intelligent, former drug addict. This man had criminal affiliations, and the target came into inside knowledge about a major crime. When she reported her inside knowledge to police, full fledged organized stalking began, including electronic attacks on her health, and murder of her pets. Moving to widely separated locations did not stop the harassment. ** A target's harassment was first noticed as sensitivity to bright lights at night. This was followed by transmissions of faked cell phone ringing (by voice to skull technology.) Actual voices followed, accompanied by tones. Balance difficulty (see the EPIC weapon in the chapter about through wall weapons) and vibration of the teeth began. Her significant other began to hear some of the voice to skull transmissions. Only minimal stalking by people reported. No known cause for starting the harassment. ** A man's start of harassment happened when one night, he was forced wide awake, with a

[254]

pounding heart, at 3:00 am. (This is common.) His wife was sound asleep. He was on the wrong side of the bed, and the ceiling fan had been switched off by a cord switch instead of the outlet switch they normally used. No known cause for starting the harassment. ** Like the testimony above from a man whose harassment started with a voice to skull transmission that his vehicle's turn indicator was about to break, this man received a voice to skull transmission while a teenager undergoing dental work. He spoke about the transmission to the dentist, who got the man forced into the mental health system. The organized stalking program followed. No known cause for starting the harassment. ** A postal letter carrier accidentally hit the fence of a house connected to postal inspectors who were apparently involved in drug trafficking. That was enough to have the letter carrier's name turned over to organized stalkers, apparently because the letter carrier had become aware of criminal activity there. Once organized stalking begins, it is virtually always for life. ** A lady's voice to skull harassment began by perpetrators representing themselves (via voice to skull transmissions) as part of a "self help program." The perpetrators also contacted some of her family members, telling them the lady target had "ordered the service." No known cause for starting the harassment. ** A man reports organized stalking with electronic harassment for his entire life. No known cause for starting the harassment. ** A boarding house roomer's harassment started when people around him began discussing private things he had never discussed with anyone. This was followed by the classic harassment by members of the community, such as store clerks, and bank tellers. No known cause for starting the harassment. ** A lady's harassment started out as unexplained insults by neighbours, escalating into heavy electronic weapons harassment. No known cause for starting the harassment. That's what it's like to have organized stalking and electronic harassment start up, for a sampling of targets. Many targets have people or groups they suspect of being responsible for their harassment, but few actually know for sure. Because organized stalking and electronic harassment is so overwhelming, so total, so inescapable, and because virtually all officials deny that such a crime is possible, and because of known government criminal programs like MKULTRA (mind control by a variety of methods) or COINTELPRO (organized stalking to discredit activists,) many targets assume organized stalking is a government program. The end result of the secrecy is that if you should come across target testimonials on the Internet, you can expect to see a lot of blame placed on government. This writer suspects government is indeed involved, but I have no evidence that today's organized stalking is in fact being done by government. To my mind, the most important task ahead of targets of organized stalking is not speculating about whom to blame, but educating the general public. An aware public could apply enough pressure to get these crimes investigated seriously, and in all likelihood stopped. One interesting occurrence relating to how targeting starts - several targets report actually being warned they were about to be targeted before the targeting started. In one case, a person photographed a harassment skit being performed on another target. A warning note was discovered on the photographers vehicle saying Do not interfere in what you do not know about. Let's continue by relating some of the ongoing experiences reported by targets of organized stalking: ** Targets find that attempts are made to spoil every family, friendship and business relationship they have. Investigator David Lawson did mention lies and fake criminal records being used. While estranged family, friends and business associates aren't inclined to discuss reasons why with targets, bribes and threats have been known to cause estrangement too. Whichever cause of the estrangement is used, it is almost always very effective. A number of targets who owned their businesses have lost their businesses to harassment of their customers. ** Groups of harassers sometimes swarm into a store, either just before a target arrives or just after the target arrives. These stalkers will crowd areas the target attempts to select

[255]

items at, and will queue up at the checkout ahead of the target. This becomes obvious when it happens mid-day at times when shopping traffic is light. If a target operates on a regular schedule and visits, say, a convenience store on the way home from work regularly, the target is very likely to encounter constant long lineups indefinitely, even when the store is not in an area where high traffic occurs. ** Signs informing the public about organized stalking, as on targets' cars or even clothing or backpacks, have resulted in striking reductions in harassment in areas where the signs are displayed. This has been an effective technique in eliminating the store crowding skit described above. It is a guess, but possibly, the perpetrators don't want their local "troops" to visit web sites describing these crimes. ** One of the worst target experiences, thankfully not frequent, is the entry to the target's home while the target is out, and terrorizing the pet, giving the pet severe mental illness. Some pets are poisoned (one dog given antifreeze, making it blind.) Some pets and some wildlife are butchered and left on the target's doorstep. ** A sometimes intensely repeated skit, over perhaps a few weeks, is endless walking intercepts. Strangers will synchronize their walking speed and direction to force the target to take evasive action to avoid a collision. Several times over a short time span. Synchronized even to the point of turning the lock at exactly the same instant. ** A sometimes intensely repeated skit, over weeks, months or even years, also described by David Lawson's books, is highway harassment. This is especially true of targets who must commute to work by highways. Not only do perpetrators "box in" targets on the highway and forcer targets to drive more slowly than they had planned, but outright attempts to run the target off the road also happen. Targets occasionally collide with perpetrator vehicles and once in a while a target does run off the road. It appears that perpetrators may be given immunity by government for such attacks, however, I'm not aware of any explicit evidence to prove that. ** A sometimes intensely repeated skit, over weeks or months, are periods when perpetrators in vehicles will attempt to hit a target in a crosswalk, especially when no other traffic or witnesses are present. I've had several such encounters in 2007-2008. The drivers have been looking directly at me, not distracted, daytime, no visibility problems. I was entirely legal, all light signals being obeyed. The perpetrators entered the intersection and actually accelerated so as to hit me. The engines revved up noticeably. The drivers were middleaged adults, not kids showing off. These are deliberate attempts, and not just imagining an attempt to hit is taking place. Other targets report the same. ** A sometimes intensely repeated skit, over perhaps a few weeks, is synchronized leaving and or arriving. Whenever the target leaves, a nearby neighbour will leave at exactly the same time. This can also happen whenever the target arrives home. Another variation is, when the target does a lot of walking, to have someone on the opposite side of the street perfectly keep pace with the target for several blocks. While this happens in normal life, it doesn't happen day in and day out on streets that are nearly deserted. ** A skit by targets' neighbours is to start up noisy activity, such as a leaf blower when there are no leaves to be blown, the instant the target goes to their deck or back yard to relax. ** Another skit by targets' neighbours is to dump trash in the targets' yard while the target is away or not in a position to see the act. ** An ongoing skit is the entry to a target's home (usually) or sometimes automobile or workplace, when the target is absent. Furniture and objects are simply moved, as if to tell the target that the target is powerless to stop the entries. Once in a while the old "practical joke" of removing the screws holding a chair together will be performed. ** A strange experience by some targets is doctors who look at a clearly abnormal lab report, which the target can plainly see has very abnormal readings, and tell the target everything is fine. Confirmed by targets with medical training. ** Tradesmen hired by targets, or who are hired by say the target's employer to do work at the target's work area, "just always make mistakes." Mistakes that cost time, money, and create inconvenience for the target. By the time a target reaches middle age, they have a good idea of what the normal mistake probability is, and these cases are well outside that

[256]

range. For example, while I was in charge of the computer system at an employer, the telephone technician wrapped a cable spirally around a large group of computer data cables, making it impossible to move them as was sometimes needed. There was no need to do that. The normal way to handle that job would have been to use cable ties. We had to push the telephone company to return and re-do the job. Another "mistake" occurred for a target when their car was towed away "by mistake." ** One somewhat common experience is that both by in-person approaches to the target, and voice to skull transmissions, the perpetrators attempt to convince the target that the target is in fact homosexual. This is a recurring "theme" in the harassment master menu. ** A lady videotaping harassment activity from her front porch was arrested for that legal act, on her front porch. When she read the report, the report stated she was actually around the corner on the sidewalk, taping one of the perpetrator's homes. ** Entry to targets' homes and moving objects into odd hiding places is done, probably to make the target think their mental faculties are deteriorating. ** Dumping of all sorts of consumable supplies is a regular experience for some targets. When a container is down to, say, 1/3 remaining, that's a time when the perpetrators will dump all but a small trace of the product. Labelling containers with the date purchased, the date opened, and in some cases, levels of product remaining and date, can reduce this activity. ** Ripping of clothing, and destruction of zippers, can be a common experience for some targets. Some targets experience emphasis on crotch and underarm places. One day I came home from work to find the crotches ripped out of every piece of underwear I owned. Sometimes, instead of a single rip, a small rip will be widened daily until the garment is destroyed. Sometimes, a crotch or underarm area will start out with many circular holes punched by a tapered awl, and these holes will be progressively widened over time. ** Destruction of furniture can happen to some targets. Items only a few weeks old will have welds, for example, snapped while the target is out. In one instance, I arrived home from work to find the back of my folding metal chair hacksawed off. In other instances, I have had folding chair legs bent, as if over a foot, while out at work. ** Thefts happen, but they are carefully done so that the value of the item is too low for the target to get police to take the incidents seriously. Theft of important personal papers is one type of theft experienced. While items of value are often not touched, there have been instances of moderate amounts of money (up to a couple of hundred dollars) stolen. It's not uncommon for stolen items to be returned AFTER the target replaces them. ** At work, targets experience sabotage of their work. At one job where I looked after the computer system, any programs I had written were frequently sabotaged overnight. Equipment "failed" at a rate far in excess of normal. "Failures" would sometimes be by way of someone working an equipment plug out just far enough to cause failure, and these tended to happen just as I was headed home, or about to bite into my sandwich at lunch time. ** Some targets report periods where everywhere they go, they are accompanied by very loud bird calls. This is true even where no birds are visible. While not a through-wall weapon, there is ultrasound technology which can project sound in a narrow beam, causing the impact point of the silent beam to appear to be the source of the projected sound. (Trade names such as "Acoustic Spotlight" or "HyperSonic Sound" are commercial versions of this technology.) ** Quite a few targets report at least one of the following through-wall electronic attacks: ** "Bee sting" sensations, particularly on the feet, particularly while trying to sleep ** Arms and/or legs jerking wildly when trying to sleep ** Extremely powerful, unquenchable, itching, no rash, no explanation from doctors ** Sudden extremely fast and heavy heartbeat, when fully relaxed ** Sudden extremely high body heat, fully relaxed, not after exercise ** Vibration of body parts and/or bed Some of these may be high power microwave beams, which can penetrate walls, however, we cannot explain how some of these common attacks are done. These attacks do suggest

[257]

that there is classified (secret) technology in use in some cases. The Phone Call Repeatedly heard in target reports is the sharp change in behaviour of professionals, clerks in commercial or government settings, and even just friendly people, when they get the phone call. A target will be receiving normal professional level attention from professionals or clerks, and friendly conversation with people they meet, and all of a sudden, the phone rings. When the person taking the call returns, they suddenly begin very negative behaviour towards the target. This can include family members of the target. The person who took the call suddenly doesn't have time right now to complete whatever interaction with the target was to happen. Targets rarely find out what the call was about, but it does indeed look like something negative about the target was conveyed. One guess would be someone saying they are law enforcement, and that the target is under surveillance, a suspect of a serious crime, and that the interaction should stop right now. Again, that is a guess, but that is how many of those whose behaviour changes, seem to behave. With professionals particularly, and with some clerks who handle very necessary services, this can be a significant problem. Some targets who have medical experience of some type report that they receive clearly faulty diagnoses from doctors. Often, these are of the type where a condition the target feels certain they have a medical condition needing attention and the doctor insists everything is OK. In my case, having been a target for 29 years, I have had massive chronic fatigue, muscle and joint pain, and a great deal of psychological stress (particularly before I knew this was a crime with a name) and every single medical lab test is perfect. Everything tested for is precisely in the center of the normal range. This, while I had such heavy fatigue I had to find a hiding place and lie down on the floor for 30 minutes at a time at work just to keep going. I simply don't believe all my lab tests were perfectly normal over that length of time. Just becoming a senior makes that highly unlikely. Just one case, I had collapsed on my living room floor, and when I regained some strength went to emergency. I could hardly sit up in the chair - I went by taxi. In that case, the ER doc did show me my potassium was way high. But he said there was nothing wrong. I have no idea what such a lab report should have meant, but I mention it as some reason to suspect that some doctors may well have had the phone call, followed by ignoring physical symptoms. (C8) Undisclosed My gang stalking began (I believe) in 1994, though it could have started earlier. The stalkers (not all of them of course) have rented apts near my apt complex. They park their vehicles around my apt building and the drivers just sit in the driver's seat all day long, every day, 24 hours a day. They work in shifts. They have given the people who live below me a device which produces a high-pitched beeping sound, which my neighbor sets off at all hours of the day and night. Virtually every time I sit or stand in public, they sit or stand next to me. I have many times attempted to file a report with my local police dept, but I was refused. I was told that I needed to see a doctor ("have you seen a doctor?"), that the state antistalking law cannot be enforced, that I need to conduct a complete investigation proving that I am being stalked before I can file a report, that gang stalking is not "real stalking" (which is defined as single stalker, easily identifiable, exboyfriend or exgirlfriend), and that I (obviously) can't file a report on a crime that is not "real." In 2001, the apartment complex where I was living (Swift Manor) was sold and renamed (Swift Ave Apartments). The new owner decided to renovate the apartments. I was told by the Property

[258]

Manager that I needed to move to a new apartment, the one right next to the new Resident Managers: Kenneth & Marion Birdline. In about June 2002, I was moving the last items from my old apartment into my new apartment. A black female knocked on my door. She said that she was a house guest of the new Resident Manager, that we were going to be neighbors, and that we could be "friends"or "enemies." She waited, apparently for me to a make a decision. I did not say anything. She walked away. It was at this point that the stalking became a 24-hour-a- day, everyday, affair. However, the stalking was very severe even before this encounter. In (September?) 2004, I visited my (then) local police Area Station. The officer told me "I can't take a report on something like that." He said that I had to call the main police number; I did and was refused again. On 30 Aug 2005, I called the "gang unit" of the police dept; I spoke to "patty" and left my phone number. She said that someone would call me. No one did. I contacted (by letter) the local District Attorney; I got a response (dated 31 Jan 2006) saying that my letter/claims did not warrant a criminal investigation. On 27 Feb 2006, I spoke to a person (Cindy) who works in the District Attorney's "Stalking Strike Force"; she told me to see a psychiatrist, that she believes that gang stalking is "real," and to "work with" the police dept. I contacted the ACLU asking for help; it (in a letter dated 23 June 2005) said that it could not help me. In May of 2005, I asked the FBI (FOIPA) if it had a file on me; in a letter dated 6 June 2005, it said that it did not. In mid-February 2006, using the "contact us" icon at the DA's website, I wrote an email to the San Diego County District Attorney's office asking about a letter that I had sent to the District Attorney's office. The next day I began receiving harassing emails to the email address I had used to send my email to the DA's office. In August 2004, I visited another police area station (the first one I visited); the officer wrote what I told him down ("Citizen Request Form") and said that someone from my local Area Station would call me. No one did. In October 2003, I was moving out of the apt complex (where the gangstalking became 24/7). On 1 (or 2) November 2003 (the last I time I entered the apt), I was gathering my last things together and exiting the apt, around 10:30 pm. I noticed that there were a large number (perhaps 8-10) of uniformed police officers standing around the apt complex. One stood next to the exit that I used to leave the apt. complex. I did not pay any attention to them because I assumed that their presence did not have anything to do with me. I slowly carried the last of my possessions to the bus stop, about 2.5 blocks away. As I waited for the bus, at around 10:45pm, someone in a passing vehicle yelled "faggot" as it (the vehicle) passed by me. There were not many cars on the road (El Cajon Blvd) at this time of night. Every day for at least the next three months, whenever I left my apt (generally once a day), there was a police dept black and white unit parked right next to the apt complex exit, the one that I used to get to El Cajon Blvd, or the black and white unit passed me by a few seconds after I walked onto the sidewalk. After three months, the harassment from black and white patrol cars lessened, but never stopped. Also immediately after I moved, an intense namecalling campaign ("fag," "faggot," "bitch," [the most common] "cocksucker," etc) began. The stalkers called me these names about 5 times a week; during this period, I was leaving my apt at least once every day. When I went to the Central Area police station in August 2004, I told the police officer there about (among other things) the constant name-calling; strangely, very soon after, the namecalling almost completely stopped. I believe that someone in law enforcement ordered the stalkers to stop calling me these names. They would not have stopped on their own. The name-calling campaign lasted for 10 months and began and ended abruptly. This is also the time period (November 2003) in which Fire Dept. vehicles (red square ambulances) began harassing me. Many nights, I would walk (it took 25 minutes) to the San Diego State University Student Computing Center from my new apartment. The SCC closed at 1:00 am. I would frequently walk to the 7-11 next to the college and get something to eat before walking back to my apt. I would sit near 7-11 and eat what I had bought. Many nights, a red square ambulance would be parked next to 7-11 while I was there. However the majority of the harassment by Fire Dept. vehicles did not start until I moved to my current residence, next to a Fire Dept. Station. Around mid-2004, I was attending an atheist meetup (meetup.com); Conway Redding, a black 69 years old [at the time] retired psychologist who use to work for the local (or some other) police dept,

[259]

informed the group (of perhaps 6 or 7 people) that people with mental illness "need to be watched" because "they might hurt someone." This was a "message" from my stalkers as to the "formal" (though no doubt illegal) justification for my being under 24-hour surveillance. At another meeting, he referred to me as a "pariah." At every meeting that he and I attended, he insisted on sitting next to me, and he got upset if I moved to another seat. At every meeting, he would (at some point) cough on me. He exuded hostility to me. I believe that the stalkers sent him to the meetings to harass me. I was apparently expected to "pay attention/come onto" to him. At all the "atheism" meetings, stalkers (beyond Conway Redding) would attend; the stalker would sit near me, and, just before leaving, would cough on me-to punish me for not "coming onto" him. I stopped attending meetup.com meetings around December 2004. There are interesting articles ("Stonewalled-still demanding respect: Police abuses against lesbian, gay, bisexual, and transgender people in the USA" 23 March 2006) about police harassment and assault at: http://web.amnesty.org/library/Index/ENGAMR510012006. ("United States of America-Stonewalled: Police abuse and misconduct against lesbian, gay, bisexual and transgender people in the U.S." 22 Sept 2005) at: http://web.amnesty.org/library/Index/ENGAMR511222005. ("Police target lesbian, gay, bisexual and transgender people in the USA" April 2006) at: http://web.amnesty.org/wire/April2006/LGBT. What I have learned: law enforcement is corrupt. most people can be easily induced to assault someone by using ideological means ("hey stranger, did you know that the person sitting next to you is a child molester or a homosexual?") or financial means ("I will give you $25 if you will kick, spit on, or shove that person over there") or "group" means ("you are going to have to assault person"X" if you want to join [or stay in] our group"). most people see the world & other people in stereotypes which they "use" when it is advantageous to them. for most people, hating someone who is even slightly different feels good, even if the person hated is not hurting anyone. many people take it upon themselves to enforce stereotypes, to force people to whom they have given a certain label ("nutcase" & "faggot" are by far the most common) to behave in a "certain way." most people will believe & do what they are told without asking any questions or doing any investigation, especially if the person telling them (to do/believe a certain thing) is a law enforcement officer or pretends to be. most law enforcement officers are very conservative politically; they believe that it is okay to assault & harass members of the community whom they do not like. many people who work in law enforcement have an intense & violent hatred of "faggots." law enforcement hires sociopaths, does not adequately monitor its employees, and does not care if they attack "weirdoes" or "oddballs." stereotypes & social expectations are VERY powerful; they can easily hide an EVIL which is staring you right in the face. It is extraordinarily difficult, verging on impossibly difficult, for most people to disregard a stereotype and to look deeper into a situation. "Hiding in a stereotype" is effective cover. I wonder how many people are aware that law enforcement can (for any reason) refuse to allow someone to file a report. I now know that law-enforcement statistics are an undercount (i. e. unreliable), partly because some people are not allowed to file a report.

(C9) http://gang-stalking.blogspot.com/

[260]

Monday, April 12, 2010 Frenzied Frenzied. That is the best word to use to describe these people. Recently I had to find out information in regards to trying to get this stopped, not just for myself but for other targets. The Informants went into hyper-stupidity mode. I was recently talking to someone in an official capacity, the informants interpreted this as a sign for sure of mental illness. It does not see to occur to them that in my official capacity of trying to assist myself and other targets, I now have to put in place procedures and suggestions that targets can use to get this curtailed in their lives? I am now trying to find the correct procedures and methods that current and future targets can use to gain access to their files, and what legal channels they need to take, this was what I recently set out to do. They were not having any of that, my need to make polite inquires was surely a sign of whatever garbage they are trying to put out there about me. Logic is not something that will stop these people from their crazy beliefs. They see logic, trip over logic, pick themselves up, and just keep going. Watching them in action I am sure that many of them would fail basic tests for critical thinking. They watch me looking for signs, and I watch them thinking, Are bloody well stupid? I often can not believe that I that I let such XXX destroy my life for so long. Frenzied is the only term that I can use to describe these people. http://www.thefreedictionary.com/frenzied frenzied (frnzd) adj. Affected with or marked by frenzy; frantic: The more they interact with each other, the more they feed the frenzy. It's interesting to watch, logic, and common sense just does not break through their wall of ignorance, they know what they know cause the state told them so. Not only are they frenzied, but a lot of what they do in their official delusion that they are keeping the city safe, involves breaking the law, and that is what I was setting out to do recently, finding out what course of action is best for targets to use to start to curtail this. I have very little doubts that my progress will be impeded, but it must be done. Again before I go further, let me state that there are sane rational citizens out there, one's who are as disgusted as I am by the crazy frenzied behaviour of the other citizens, but unfortunately too many bad apples will spoil the whole bunch. I just wanted to be clear that there are logical people out there, but more are needed. In a given day, I touch base with quite a few individuals, responding to inquires, contacting organizations that might be able to help, researching what was at the heart of the harassment that has begun to become known as Gang Stalking. Discovering a secret flagging system for members of society, and the army of citizens that monitor those being flagged has been no easy task. Now the question is, what can targets legally do to defend themselves and to challenge what is happening? For legal challenges I think and exposure will be key strategy for curtailing much of this. A lot of what they are doing is not going to be legal. Exposing it, and helping others to understand why it's wrong to dehumanize targets will be key. That is what I am working on, and have been working on, and will continue to work on. Any recent conversations, discussions, correspondences, therefore pertain to this. Period. What I had the chance to observe recently is what I gleamed after reading the articles about how they arrest and forced some innocent person because he bought guns, and his employer alerted them to the fact that he

[261]

might have been dangerous. http://reason.com/archives/2010/03/16/pre-crime-policing To hear them tell it they saved the day and stopped some crazy person, using the swat team to subdue him, and forcing him to get the help he needed. That's their interpretation. [quote]To hear them tell it, the five police agencies who apprehended 39-year-old Oregonian David Pyles early on the morning of March 8 thwarted another lone wolf mass murderer. The police were able to successfully take a potentially volatile male subject into protective custody for a mental evaluation, announced a press release put out by the Medford, Oregon, police department. The subject had recently been placed on administrative leave from his job, was very disgruntled, and had recently purchased several firearms. Local Law Enforcement agencies were extremely concerned that the subject was planning retaliation against his employers, the release said. Fortunately, Pyles voluntarily turned himself over to police custody, and the legally purchased firearms were seized for safekeeping.[/quote] The reality was very different. They took away this mans rights illegally. They forced their way into his home without cause, kidnapped him, forced him to have a mental evaluation without any real justification, then stole his guns. After he requested them back they then played around about giving it back till he contacted the media outlets. To this date I have not heard an apology issued for what was done. That's the reality of what they did. [quote]This voluntary exchange involved two SWAT teams, police officers from Medford and nearby Roseburg, sheriffs deputies from Jackson and Douglas counties, and the Oregon State Police. Oregon State Police Sgt. Jeff Proulx explained to South Oregons Mail Tribune why the operation was such a success: Instead of being reactive, we took a proactive approach. Theres just one problem: David Pyles hadnt committed any crime, nor was he suspected of having committed one. The police never obtained a warrant for either search or arrest. They never consulted with a judge or mental health professional before sending out the military-style tactical teams to take Pyle in. They woke me up with a phone call at about 5:50 in the morning, Pyles told me in a phone interview Friday. I looked out the window and saw the SWAT team pointing their guns at my house. The officer on the phone told me to turn myself in. I told them I would, on three conditions: I would not be handcuffed. I would not be taken off my property. And I would not be forced to get a mental health evaluation. He agreed. The second I stepped outside, they jumped me. Then they handcuffed me, took me off my property, and took me to get a mental health evaluation.[/quote] The problem is when people are in a frenzied state, they believe their own mythology, and nothing you say or do will convince them otherwise. The same is true for what we have to go through when dealong with frenzied people. The system has flagged us for various reasons. It no longer matters if it's true or not, if we are guilty or innocent, tell them crazy, they will see crazy, tell them terrorist and you will clear the space around you, they will believe anything and act accordingly. They also expect us to do the same, expecting us to internalize their expectations of us. Thus justifying their treatment of us. It's important that targets do not let this happen. http://en.wikipedia.org/wiki/Pygmalion_effect [quote] The Pygmalion effect, or Rosenthal effect, refers to the phenomenon in which the greater the expectation placed upon people, often children or students and employees, the better they perform. The effect is named after Pygmalion, a Cypriot sculptor in a narrative by Ovid in Greek mythology, who fell in love with a female statue he had carved out of ivory. The Pygmalion effect is a form of self-fulfilling prophecy, and, in this respect, people with poor

[262]

expectations internalize their negative label, and those with positive labels succeed accordingly. Within sociology, the effect is often cited with regards to education and social class.[/quote] Logic does not get past their wall of ignorance, fear, and stupidity. Other methods must be used. As you can see from the case above, the methods used involved expose, and I am sure future legal action. That was how he got his guns back, and that is how he got to tell his side of the story, very different than what they would have had the common public believe. http://reason.com/archives/2010/03/16/pre-crime-policing [quote]There's nothing wrong with looking for signs that someone is about to snap, and if he's putting up multiple red flags, we'd certainly want law enforcement to investigate, possibly to chat with the person and his friends and family. And obviously if someone has made specific threats, a criminal investigation should follow. But that's a far cry from what happened to Pyles. Pyles' problems began last June after a series of grievances with his employer, the Oregon Department of Transportation. "This was always a professional thing for me," he says. "It was never personal. We were handling the grievances through the process stipulated in the union contract." Pyles declined to discuss the nature of the complaints, citing stipulations in his contract. On March 4, Pyles was placed on administrative leave, which required him to work from home. On March 5, 6, and 7, after getting his income tax refund, he made three purchases of five firearms. Pyles describes himself as a gun enthusiast, who had already owned several weapons. All three new purchases required an Oregon background check, which would have prohibited the transactions had Pyles ever been convicted of a felony or a misdemeanor involving violence, or been committed by the state to a mental health institution. Pyles says he has no criminal record, and says he never threatened anyone in his office. (A specific threat of violence would have likely brought a criminal charge.) The Oregon State Police, the Medford Police Department, and the Oregon Department of Transportation did not respond to requests for comment. [/quote] Having the capacity for independent critical thinking is just so important, and I really believe a lot of these people have lost that. They need, they have to have hero vs villain to justify what they are doing. You are either with them or against them, and if you are against them then you must be bad. It helps them to justify their actions. I have seen their actions, not all of it is bad, but on the other hand I could not willing join a frenzied mob incapable of independent and critical thinking. They need to justify what they are doing, I have no desire to join the true insanity that I see before me which is how this flagging system works, and the actions of those doing the monitoring. It's like watching people in a lunatic frenzied state, and so they have to see those on this side as bad, and justify what they are doing. The scary part is how comforted they are when someone can share in their one handed sign language which tells them who is good vs bad. Anyways in my official capacity I was able to save some time by finding out a bit more about the direction that targets do no need to go in. What we need as a community are procedures. Simple procedures that most other targets can follow. Something easy affordable. If most of us knew at the beginning what was happening, we could seek out proper legal assistance before our resources were almost completely exhausted, and that is going to be the next leg of the journey. Other targets out there are free free to make their own inquires, if you are less watched, less guarded you might have slightly better luck. (C10) post on European Federation of Mind control (www.fedame.org ) Classification of Targeted Individuals based on the severity of the Control: Targeted Individuals are classified into different categories based on the severity of the Control. Social

[263]

Control is exerted by the government to control citizens. When the government views the Citizens as threat they classify them as Targeted Individuals. Social Control of the Targeted Individuals are required to prevent the influence of the Targeted Individuals on the society or government. Government does not view all the Targeted Individuals as high threat (high severity) to the government. Severity of the Targeted Individuals are classified based on gene(psycho-biology of the person) l, suspension (suspension of extremism) of the government on the Individual etc. Government achieve the control by harassing the Targeted Individuals. Harassment when used as a form of Control has the following advantages: (1) Harassment as Control of the TI prevents the TI conceive the idea of Control instead it is viewed purely as Harassment, (2) Harassment helps in disorientation of the TI,(3) Harassment helps in NLP-anchoring the TI for negative emotions, (4) Harassment prevents the TI to act on rational ideas instead to act based on emotional impulse, (5) Harassment helps in easy mind control of the TI. Types of targeted individuals: Highest Severity targeted individuals are the individuals who get killed at the convenience of the perps and diseases are blamed for covering up the killing. High Severity controlled targeted individuals: This type of targeted individuals have following characteristics: displays high compliance to the standard suspicion list or classified as targeted individuals gene or highly ambitious or not easy to manipulate or controlled or cannot easily deceived. The frequency of control of targeted individuals of this type is high. Control (assault or harassment) of the TI is done for every minute (24/7) and the control period is a minute. Every aspect of the TI life is manipulated or harassed and for every minute (since for every minute TI has to be manipulated the perps has to target every aspect of the TIs life). Control involves every aspect of the TIs life as following (1) if the TI is in public place then gang stalking is employed (2) if the TI is in workplace then workplace stalking (3) if the TI is in the family then TI is manipulated inside the family (with the conscious of the family members), or family members are mind controlled for TI stalking (without the knowledge of family members) (4) if the TI is in house then NLP anchor or trigger assault, or DEW harassment (electronic harassment), or mind control with mood control (5) if the TI is watching TV then NLP anchor psychological assault through TV programmes, (6) if the TI is in kitchen then creating trouble with the kitchen equipments, (7) if the TI is driving then trouble with the vehicle or stalkers vehicle traffic assault, (7) if the TI is in society then character assassination, ( if the TI has kids then turning the kids against the TI and targeting the kids of TI, etc Less Severity controlled targeted individuals: This type of targeted individuals have following characteristics: displays less compliance to the standard suspicion list or classified only partly as targeted individuals gene (not a complete targeted individuals gene) or can be manipulated or can be easily deceived. The frequency of control of targeted individuals of this type is less. Less Severity controlled targeted individuals has to be controlled for every week or month and the control period is week or month. Since the period of the control is less (ie every month) the perps don't explicitly expose the assault. Assault is done covertly without the understanding or knowledge of the Less Severity controlled targeted individuals. Assault can involve infecting the TI with fever or other disease or personal enmity(used to spoil the mood often) or electronic harassment(viewed as chronic pain) which the TI views as natural cause. For every occurrence of the period of control (every week or month), all of the above mentioned harassment tactics are used randomly so that the TI views the assault as a random occurrence of events without links to each other. Targeted individuals with medium control Severity level: This type of targeted individuals have following characteristics: displays partial compliance to the standard suspicion list or classified only partly as targeted individuals gene (not a complete targeted individuals gene). This type of targeted individuals has to be controlled every day, but the severity of the control is less

[264]

when compared with the High Severity controlled targeted individuals. At Least one severe assault (or harassment) per day is done for this type. This type of Targeted individuals are controlled by Mind control , Voice To skull, electronic harassment, etc on daily basis.

3.5 Conversation/discourse analysis in action: Unearthing the experiential building blocks and the ontologically coherent nature of open systems targeting lifeworld in the context of agenda 21 social networking The above case studies among a plethora of targeting cases that appear from all parts of the globe114 are as good as any in demonstrating the common experiential building blocks of targets ontologically uniform lifeworld. Based on conversation and discourse analysis standard practices hereby follows a taxonomical approach to accounting for this lifeworld, by reducing verbatims into common experiential categories, while pointing to the uniform way whereby common hypotheses as to the motives and the perpetrators behind targeting are formed based on targets experienced judgments, combined with either perfect or imperfect evidentiary material (numbers next to quotes correspond to above quoted case numbers): Direct perpetrators (a networked, preplanned, concerted, multiparticipant activity) the same patterns of gangstalking will occur, but it will involve different people all the time (C6)ALTERNATING PERPETRATORS, SAME SCRIPTS, DIFFERENT EPISODES, SAME SOCIAL SITUATIONS Targets who receive the electronic and mind control effects also often complain of organized stalking in their neighborhoods and other places. The accomplices are normally people of all walks of life (C1) Accomplices of the ESMC perpetrators perform the actual foot work. Many of the accomplices work in legitimate businesses such as delivery organizations (C1) Members of these groups are found on the courts, on the universities, hospitals, the clergy and even on law enforcement agencies (C3) "Recruits tend to be blue collar workers who are at the bottom end of the job scale. They are city workers, who can, in many cities, follow a target around all day in their vehicles or have a noisy project underway near his [target's] residence. They are taxi drivers, who are always on the road (C4) "Groups have contacts in the media which they use to disseminate information about their targets (C4) Formerly friendly residents would no longer talk to me, but give me icy stares (C7)- Conditioning paranoia The participation of firemen, city workers and utility company workers helps give group members an illusion of legitimacy and power." (C4) From the viewpoint of many targets, it is more likely that ordinary citizens from all age groups and walks of life are harassing us in an organized way, probably based on lies (C7). A major benefit to the stalkers is when they can persuade neighbours to give the stalkers a key to their residence (C7)- PERSUASION TO COMPLICITY IN ILLICIT BREAK INS OR FORCE THROUGH FEAR OF COMMUNITY EXCLUSION? The main motivation of members who stay with these groups is the sense of power and belonging the group members derive (C4) Here are a few quotes from the perpetrators themselves: "We are like the police except we are ABOVE the police." (C4) leaders as considering their members "disposable (C7)- Roxins alternating disposable perpetrators "Typically, harassment tactics are not used unless a target is alone. If he is with others, group members will still surround him, but they will not reveal their presence (C4)
114

The craft and practice of Predatory Gangstalking appears to be standardized around the world (C6)

[265]

The world of Predatory Gangstalking increases as new recruits are initiated into the Predatory Gangstalking process. Therefore, a target may see collusion and participation from neighbors and co- workers who were once on good terms with the target (C6) Predatory Gangstalkers each have their own individual skill that they contribute towards their common goal in the group (C6) the "cause" the typical group is "working toward" is mainly an excuse to get the groups together heightened sense of community service. (C7) THE CULTIVATION OF A COMMUNITARIAN ETHOS THROUGH TARGETS AS ZERO POINTS OF NARRATOLOGICAL CONTINUITY Many similarities parallel incidents reported by targets internationally115. It appears that there is a standard protocol involving a series of tactics, progressive phases, and nature of assaults. It appears that an individual has been selected to become a target and the groundwork has been established for their assaults long before the individual can be aware that something criminal is occurring in their lives and to their person (C6) Practitioners of Predatory Gangstalking have their own coded language, both verbal and visual (C6)- THE EXISTENCE OF A GROUP LINGO Security guards, city workers, taxi drivers, cable, telephone and electric utility workers also contribute to the stalking groups' ability to keep the target in their sights, (C7) The Informants went into hyper-stupidity mode. I was recently talking to someone in an official capacity, the informants interpreted this as a sign for sure of mental illness (C8) Indirect perpetrators The powerbrokers behind it identify and attempt to destroy the lives of targets through hirelings (C1) There are two logical and plausible reasons why most of those particular people are not targeted: (1) Those non-targets are a part of the conspiracy, either directly or indirectly, and thus protected. (2) The perpetrators know that those targeted groups would possess the intellectual credibility and the power to command investigations of their attacks. (C1) Without the goon squads who openly harass targets, burglarize their houses, sabotage their electricity, water, and appliances, surreptitiously enter their domiciles for gas lighting, strew rumors, collect extraneous information about the targets lives, and interfere with the targets communications, the handlers would probably not be able to operate effectively (C1) the FUNCTIONAL PLATFORM in Roxins terms It appears that an individual has been selected to become a target (C6)116
115

Not at all accidental that the time horizon wherein the silent massacre phenomenon appeared uniformly and globally coincides with the consolidation of the microsocial engineering project of agenda 21 116 VHH PHARMAKON (also reading in ancient Greek as sacrificial scapegoat as well as retaining the dual notion of pharmakos explored by Plato and Derrida, eg both poison and cure , or sacrificial killing as purification mechanism for the communitys wrong doings, according to Girards Christological paradigm). HOW MANY TIMES DOES ONE HAVE TO ENCOUNTER IN RANDOM (NOT EVEN PREDICTABLE) ROUTES THE SAME NAMES (and they are not even parts of multinational companies logistics fleets!) IN ORDER TO VALIDLY REGARD THEM AS PREPLANNED REPRESENTATIONS AND COMMUNITARIAN INDICES? IN FACT, IT WOULD AMOUNT TO A REDUCTION TO ABSURDITY NOT TO DO SO NOT THE OTHER WAY ROUND, AS PARTS OF A CLASSIC CONDITIONING MECHANISM. Additionally, upon my blog posts on the psychopharmaceutical complex, random street encounters while driving of pharmaceuticals owned cars has increased considerably! Well, if argumentation from signs and indices is a valid legal practice then this is a most striking exemplification! I also fail to see why these phenomena do not constitute valid allegations, based on the acceptance of semiotics as a practice for decoding particular lifeworlds (see previously quoted article from Poinikologos), it meets the epistemological/communicative condition as a discursive speech act and in the context of cultural pragmatics as a script (the denotative/connotative dimension of the sign) and as a social episode (the frequency of its encounter by the target)- creating a scenario to get the attention of the targeted individual (C6)- against the background of an ontologically coherent conditioning mechanism and a collective intentionality legitimated extrajudicially through social networks referenda it makes perfect sense (also see previous section on the relational validity of talking non-sense). Moreover, the cultural pragmatic aspect of using ordinary signs AS VISUAL METAPHORS in a bifurcated sense is not bereft of material antecedents insofar as my food supplies have been repeatedly tampered, wherefrom the validation of the more often than not quoted psychosomatic control in the context of experiential blanketing. Semantic twist of ordinary phenomena AND VISUAL

[266]

Multilayered open motives (material, psychological, ideological) as causae efficiens, but one causa finalis viz the extinction of the target the ultimate goal of the groups is to destroy the targets. Those who have been stalked by organized citizen groups (C7) which are fed lies report that these groups do destroy targets with great efficiency Predatory Gangstalking is, at the least, psychological violence, and at most, it is a protracted sadistic sociopathic domination and calculated destruction of an innocent human being for reasons of pleasure, power, and social control by a group predatory stranger (C6) In addition to cash payment for participation in Predatory Gangstalking, other forms of barter are used. These include drugs, *, alcohol, reciprocal favors, release from debts, jobs, contracts,"deals"
METAPHORS (equivalent to the example Garfinkel brings about a phones ringing) through their pragmatic inscription in fabricated social situations or social episodes as enactments of scripts results of unconscious conditioning with 24/7 experiential blanketing. Metaphors are really statements based on some kind of analogy where two things are compared to each other. This use of language allows knowledge to be seen in a new perspective. Visual metaphor is a term that designates how visual space is organized as a means of sharing cultural and social knowledge. The tradition investigated in this essay is nonAristotelian, and it is based on non-Western epistemology that is embraced by oral cultures. Specifically, this essay looks at the tradition of the Quaternity, a common recurring theme of the sacred number four in oral culturesVisual metaphors are just another way in which knowledge can be sharedRhetoric is essentially a way of thinking about the world and is predominately concerned with the perception and description of cognitive structures. It has a structural interest in the presentation of information. It focuses on structures which may be highlighted or foregrounded, and this is specifically accomplished in terms of such rhetorical devices as the:

narration of a event description of a scene illustration of a concept by means of examples intricacy of a process underlying an event definition of major nomenclature upon which deductive conclusions rest classification of information into bodies of evidence comparison and contrast of underlying epistemological structures analysis of a cause and its effects on the issues being investigated employment of deductive reasoning and the use of induction where facts need re-evaluation as to evidential status use of analogical reasoning in arriving at conclusions employment of logical argument emotive persuasion in formulation of a charge or an issue which is central to a cause (Benson & Prosser, 1972; Brent & Lutz, 1974).

More recently, it has been argued by Brown (1976) that root metaphors also provide some insight into the structure of a system by focusing on one unique perspective and by structuring lexical expressions from a certain point of view. These root metaphors, it can be argued, play a major role in the structuring of knowledge because they are epistemological in nature (St. Clair, 1980). They are the foundation upon which knowledge is given perspective. Just how this is accomplished is readily evident in some theoretical models, for example, which employ the Aristotelian metaphor of growth (Nisbet, 1969). Such models provide a major filter for their own community of specialists in which a framework is preordained through which all structures are created, organized, and coordinated (St. Clair, 1985). Visual Metaphor, Cultural Knowledge, and the New Rhetoric, Robert N. St. Clair (in Learn in Beauty: Indigenous Education for a New Century edited by Jon Reyhner, Joseph Martin, Louise Lockard, and W. Sakiestewa Gilbert. Copyright 2000 by Northern Arizona University, Flagstaff, Arizona). The difference with the employment of visual metaphors in the context of cultural pragmatics as a platform for creating group cohesion as against a disinterested work of art lies with the political goal of the former as pragmatic indices affording communal bonds through their prephenomenological commonality. Behind" statements and semioticizations there are only machines, assemblages, and movements of deterritorialization that cut across the stratification of the various systems and elude both the coordinates of language and of existence. That is why pragmatics is not a

[267]

for legal problems, and other forms of compensation. Some gangstalkers are given free housing in exchange for performing Predatory Gangstalking activities against a nearby target. However, it is clear from observing Predatory Gangstalkers in action that many engage in it for pleasure. One high ranking leader in Predatory Gangstalking stated that it was like an addiction. He described how the build up and culmination of a gangstalking assault was intoxicating, but that there was a let-down feeling afterwards that compelled him to do it again, and the cycle continued. It is also true that some people participate in Predatory Gangstalking because they are deceived into participating. Friends, neighbors and associates of a selected target are given false information and finally come to believe the targeted individual has committed a heinous crime for which they deserve what is portrayed them to be rehabilitative social intervention. Sometimes people
complement to logic, syntax, or semantics; on the contrary, it is the fundamental element upon which all the rest depend (Deleuze & Guattari, Anti-Oedipus)., echoing Habermas giveness of a cultural tradition. The giveness of visual metaphors is foundational to any signifying process and highly dependent on pragmatic goals behind encoding and decoding visual metaphors. From a targeting perspective it is the existence of a collective intentionality behind the employment of such and such visual metaphors that grants them signification and visual metaphors as collective signs assume univocity only against the background of a communitarian ethos, as given discourse or as the discursive ground allowing for the common understanding of the employment of a visual metaphor as language game in the horizon of a communitarian language as form of life. The target as social representation and the visual metaphors communally conditioning his existence in the social milieu of the community are mutually signified/signifying, as (i) the target pointing indexically to the zero point of the political community and (ii) the visual metaphors coined for the target acting as zero point indices for his existence and pointing to his conditioned hyperreal part in the communitarian social milieu The operative mode of this self-referential significatory system conditioning the target in a dystopian feedback loops social milieu has as follows: The signifying regime of the sign is defined by eight aspects or principles: (1) the sign refers to another sign, ad infinitum (the limitlessness of signifiance, which deterritorializes the sign); (2) the sign is brought back by other signs and never ceases to return (the circularity of the deterrito-rialized sign); (3) the sign jumps from circle to circle and constantly displaces the center at the same time as it ties into it (the metaphor or hysteria of signs); (4) the expansion of the circles is assured by interpretations that impart signified and reimpart signifier (5) the infinite set of signs refers to a supreme signifier presenting itself as both lack and excess (the despotic signifier, the limit of the system's deterritorialization); (6) the form of the signifier has a substance, or the signifier has a body, namely, the Face (the principle of faciality traits, which constitute a reterritorialization); (7) the system's line of flight is assigned a negative value, condemned as that which exceeds the signifying regime's power of deterritorialization (the principle of the scapegoat); (8) the regime is one of universal deception, in its jumps, in the regulated circles, in the seer's regulation of interpretations, in the publicness of the facialized center, and in the treatment of the line of flight. (Deleuze & Guattari, as above) The significatory principle of the scapegoat as an excessive zero point in the open systems signifying potential is crucial from a cultural pragmatics point of view and confirmatory of Girards Christological paradigm {the transgressor who violates the communitys language games] and in my case as quasi explanatory for being selected as target on the grounds of the sheer possibility of laying bare the signifying mechanisms of the communitarian ethos , while having being decided to be excluded from the elite scientific teams responsible for its production. The rite, the becoming-animal of the scapegoat clearly illustrates this: a first expiatory animal is sacrificed, but a second is driven away, sent out into the desert wilderness. In the signifying regime, the scapegoat represents a new form of increasing entropy in the system of signs: it is charged with everything that was "bad" in a given period, that is, everything that resisted signifying signs, everything that eluded the referral from sign to sign through the different circles; it also assumes everything that was unable to recharge the signifier at its center and carries off everything that spills beyond the outermost circle. Finally,and especially, it incarnates that line of flight the signifying regime cannot tolerate, in other words, an absolute deterritorialization; the regime must block a line of this kind or define it in an entirely negative fashion precisely because it exceeds the degree of deterritorialization of the signifying sign, however high it may be (Deleuze & Guattari, as above). What safeguards the identity and self sameness of social network members is their common adherence to mythological beliefs about a wide range of issues; in terms of the very political underpinnings of the community, myths of excluded others based on non partaking of the same form of life are of foundational significance. In traditional mythical structures, a community was normally instituted on the relics of a conquered community. In the context of psychological warfare, a community is structured on the grounds of virally diffusing beliefs about others and other communities (see articles by Bishop Brown, Lewin, Community in excess, social glue and social cybernetics papers). Such myths have certain basic features

[268]

reluctantly participate in indirect ways, such as making their homes available at times for part of the operation, for fear of consequences if they did not. Others involved in Predatory Gangstalking, including the homeless, do so for money or drugs. Lastly, those who are in the underworld or secret organizations practice Predatory Gangstalking as part of their membership duties (C6) attempts to destroy one's gainful employment, pose as offering services to intervene in the problem to further take your money, and will steal funds and personal property on an on-going basis (C6) motivation of members who stay with these groups is the sense of power and belonging the group members derive. Having a "cause" enhances the feelings of power and righteousness, but group members, according to the author, are most concerned with how their fellow group stalkers feel about their "work" and accept them (C6). ILLEGITIMATELY LEGITIMATING PERPETRATIONS BY VIRTUE OF GROUP MEMBERSHIP (EQUALITY INTER PARES)- IF EVERYONES IS DOING IT AND NOBODY REGARDS IT ILLEGITIMATE THEN WHY NOT JUMP ON THE BANDWAGON? THE CULTIVATION OF A COMMUNITY OF DOLUS INDIRECTUS most people see the world & other people in stereotypes which they "use" when it is advantageous to them (C8) Institutional involvement and (supra)state violence

that both enable them to be effective and also bring with them some ambiguous consequences. One is the division of the social field into our group and the others. Another is the division of the world into distinct spheres of quality: the sacred and the profane. These two sets of divisions are not identical, but they work together to bring about social cohesion. Our group is always associated with sacred values. The others tend to be thought of as living outside the sacred in the chaos of the profane. Myths are intrinsically political because they always have to do with the birth or maintenance of order against the threat of chaos, either from without or from within, and it is unlikely any political community could survive for long without drawing on the symbolism of the sacred to reinforce its claims and encourage its members to struggle against the forces that threaten it. Political Symbolism and the Ambiguity of Political Community:An Inherent Dilemma of Politics. In Girards interpretation, the victim is an object of abhorrence insofar as he is perceived by members of the angry mob as the source of all the violence among them. This is why he must be killed. But when he is dead, his death is also seen as the source of the new spirit of peace and brotherhood among them, and the newly born community deifies him and reenacts his death in sacrificial rites in order to try to perpetuate the beneficent effects of his slaying. To speak simultaneously of myths power both to disturb and to protect the balance of the soul might seem paradoxical, but the paradox is an inescapable result of the inherent ambiguity of the sacred, of the mythic foundation of community, and of the human spirit itself The notion of paradox is instrumental to understanding the state of mind of agenda 21 social networks members. Paradoxicality is essentialized in all comportments as coexistence of opposite states of mind; in essence, the state of mind demanded of agenda 21 social networks (just like secret societies in general) members is equivalent to that of a schizoid personality, insofar as they operate in every instance on two levels; on the one level, they have to abide by given societal rules and state laws, while at the same time undermining them in order to satisfy own and group sanctioned goals. This explains beyond reasonable doubt the very fact that the perpetration of targeting activities is not regarded illegitimate by group participants, insofar as it is informally legitimated. The very fact that most targeting methods constitute indirect acts of perpetration, not in the sense of a perpetrator behind the perpetrator , but as regards the modality of the perpetrations (constituting covert operations and lying in a grey area between legitimacy and illegitimacy and being discernible as illegitimate only in the context of targeting) confirms the covertly operating facet of agenda 21 as social engineering blueprint.

[269]

The human resources and the enormous cost required to carry out electronic stalking and mind control, re-enforced in many cases by gang stalking, almost certainly limit its use to governments (C1) . People in countries all over the world are reporting electronic and neurological assaults. Many Western targets live in Canada and the United Kingdom. In Asia thousands of Chinese, Indian, and Australian targets are beginning to surface (C1) city worker participation sometimes extends as far as tearing up the road in front of a target's home. This shows the depth of penetration into legitimate organizations of these stalkers (C7). Institutional complicity/Mode of treatment by institutional agents Strangely and perhaps suspiciously, the following appear exempt from electronic harassment and mind control: Congresspersons , Governors and other high ranking state-level officials, Clergy, Law enforcement officers, CEOs and very successful businesspersons, High ranking military officials, The medical community, The wealthy, Judges and lawyers (C1) Those responsible for the development and employment of electronic stalking and mind control have not only fostered the increasing reliance on psychiatry but have also made psychiatry a main facet of their total neurological torture scheme (C1) Law enforcement has been almost completely uncooperative. (C1) An electronic stalking victim whom I later met in person had also recurred to the FBI to complain. The victim told me that the agent to whom she made her complaint said with a grin: Makes you feel like youve got nowhere to turn, huh? (C1) After a few weeks, I creported my knowledge to the Tampa Police Department. I was disbelieved and disregarded (C2) Currently, the typical justice system response is to label the victim as mentally ill and wash their hands of the problem. This is itself a criminal act, and a violation of all the job descriptions and oaths these public officials have accepted and made. They are NOT doing their jobs! (C4) This is one element of Predatory Gangstalking that is disbelieved by others. These "others" include law enforcement, the medical profession, and family (C6). I have many times attempted to file a report with my local police dept, but I was refused. I was told that I needed to see a doctor (C8) The next day I began receiving harassing emails to the email address I had used to send my email to the DA's office (C8) Institutional cover-ups, sophistic reversals, transposition of responsibility to the target and discrediting campaigns They especially interfered with my writing the section on psychiatrists and their role in ESMC by continually deleting my text, keeping me from saving the text to the computer, and causing countless other mechanical problems (C1) The discrediting campaign includes accusing the target of being an "undesirable" for any number of reasons, including fabricated reports of having committed crimes that are the most repulsive to members of society (C6) Discredit the target by making him appear insane or demented. They will also spread rumors about the target designed to isolate him from neighbors. Those rumors will usually suggest that the target is a drug pusher or user, a child molester (one of their favorites), a wife-beater, a common street walker or male prostitute, a rip-off artist, a closet drunkard, a white collar thief, a racist, an antiSemite (another of their favorites), and others. In addition to socially isolating the target, the handlers also seek to cause the target anxiety and other psychological problems that drive him to a psychiatrist, who then diagnoses him as schizophrenic(C1) The police claimed that somehow, harassment by groups amounts to free speech. (C6)

[270]

Also immediately after I moved, an intense name-calling campaign ("fag," "faggot," "bitch," [the most common] "cocksucker," etc) began. The stalkers called me these names about 5 times a week; during this period, I was leaving my apt at least once every day (C8) Highest Severity targeted individuals are the individuals who get killed at the convenience of the perps and diseases are blamed for covering up the killing. (C10) This policeman admitted off the record that "meth mouth" can result in people being submitted to citizen harassment groups for harassment (C4) Isolate the victim by casting suspicions, spreading rumors, interfering with his postal and email communications, causing problems between the target and his friends and family members, and making him look crazy (C1). They fuel support and participation from others by circulating false rumors that the target is mentally insane, child molester, drug dealer, a prostitute, homosexual, spy, terrorist, etc. People from all walks of life, from the homeless to professional people, compose these groups. See http://www.multistalkervictims.org/terstalk.htm (C3) Predatory Gangstalkers will begin an intense and extensive discrediting campaign against a selected target well before the target could even suspect he or she has an enemy. This critical tactic sets the stage for neighbors and associates to become alienated from the target (C6) During the litigation of this case, the US Attorney General did not oppose an affidavit of a former government agent who was sent to the emergency room with internal bleeding every time he offered to testify in court to my mental stability and to the legitimacy of my claims of electronic aggression (C3) ACCORDING TO GIRARD, THE PERSON ATTEMPTING TO SUPPORT THE SACRIFICIAL VICTIM TAKES HIS PLACE; NOTICE THAT THE SAME HAPPENED TO CONGRESSMAN RON PAUL SOON AFTER HE AGREED TO LOOK INTO THE TARGETING ISSUE IN COOPERATION WITH KELB REPRESENTATIVES; NOT ONLY THERE ARE ALTERNATING PERPETRATORS, BUT ALSO ALTERNATING VICTIMS SEE BAUDRILLARDS SYMBOLIC EXCHANGE AND DEATH- AND A SYSTEM OF SYMBOLIC EXCHANGES FOR THE SAKE OF A PHANTASMATIC EQUILIBRIUM Active involvement of secret services the local office of the Federal Bureau of Investigation had directed him no to intervene on the case, because of an ongoing investigation of my activities by the Central Intelligence Agency (C3) If organized stalking is the leading edge of a world dictatorship, however, it's not impossible that the world's intelligence agencies could play a part. (C7) 24/7 surveillance ; Intrusion of privacy and strictly controlled environment; organized form of crime involving audiovisual surveillance Monitor movements. The handlers not only know ones vehicular movements but they can also view him and follow his movements on his property and even inside his house. Once they hook the target with their equipment, they have ready access to him at all times. Their torture follows the target wherever he goes, even to other states and abroad The handlers seemingly track the target within his dwelling (C1). View the victims body whether it is clothed or not and zoom in on any part or organ of the body, even in the darkness (C1) "Groups are WELL FINANCED. They can afford to RENT PROPERTY WHEREVER THE TARGET LIVES. If he drives across the country, he will be followed by supporters of similar groups in that area. If he travels by plane, group members will meet him wherever he lands (C4) Discovering a secret flagging system for members of society, and the army of citizens that monitor those being flagged has been no easy task (C9)- THE INCIDENCE OF TAGGING THROUGH SOCIAL NETWORKS AGREEMENT I receive death threats, threats to my daughter and dog, sleep deprivation, mobbing, stranger accosting. It is never ending (C2) "Surveillance is conducted 24 hours a day, 7 days a week. When a target leaves his residence they will alert the group, either by cell phone or by business band radio. Other members, who are

[271]

patrolling the perimeter to watch for police and other vehicles driving in the area, will race to the location to begin pursuit (C4) Predatory Gangstalking is intended to deprive someone of their freedoms and rights. It destroys a person's privacy and control of their own environment (C6) Repeated unauthorized entries into a target's residence, vehicles, computer, and workplace are hallmark tactics of this crime and is nearly impossible to stop. (C6) They park their vehicles around my apt building and the drivers just sit in the driver's seat all day long, every day, 24 hours a day. They work in shifts (C8) Methods of targeting Experiential blanketing / controlled hyperreal environment Curtailing the targets ability to communicate aids the handlers in neutralizing the targets. My handlers, who have had access to my computer for years, tried their best to prevent my communicating via this paper (C1) ** Blocking of phone calls by telephone company staff happens routinely. The staffers may believe the target deserves it, or for some perk offered by the stalkers (C7). Predatory Gangstalking employs a tactic of synchronicity. This tactic involves the precise timing of interactions with the targeted individual (C6) * Stalkers who keep targets under surveillance sometimes set up a system where, for example, if the target flushes a toilet, a car horn will honk every time in synchronism (C7) Synchronized even to the point of turning the lock at exactly the same instant (C7) Street theater In those skits, the handlers actually direct the actors (C1)

Conditioning through ordinary stimuli To condition the TI brain for nose scratching gesture, perps display nose scratching followed by mind control (C5) Boxing technique "When a target is driving, standard practice is to surround his vehicle and attempt to control his speed (C4) Blockade "Other vehicle related tactics include blockade, so the target vehicle cannot leave a parking lot, for example, or he is surrounded by slow moving vehicles (C4) Mobbing in places where the target frequents ** Groups of harassers sometimes swarm into a store, either just before a target arrives or just after the target arrives. These stalkers will crowd areas the target attempts to select items at, and will queue up at the checkout ahead of the target. (C7) "Common harassment tactics used by those on foot include PEN CLICKING, in which they repeatedly click a ball point pen, key rattling, and rattling change in their pockets while standing behind the target (C4) Groups do not just stalk individuals. They employ organized programs of harassment which include BREAK-INS, PROPERTY DAMAGE, ASSAULT AND OCCASIONALLY, EVEN DEATH (C4) Illicit break ins and psychological warfare methods

[272]

Unknown persons have entered my house in my absence on several occasions and taken items and rearranged other items. In October of 2008 while I was away on a several-day trip, someone entered my house and took from the center of my bed a round magnet with which I always sleep that measures two inches in diameter by a half inch in thickness (C1) When I got home, I discovered my underwear had holes punched in the crotches (C7) "Physical harassment is used when a target has no witnesses. (C4)- even knowledge when mobile battery is dead , thus unrecordable occasion for attack An ongoing skit is the entry to a target's home (usually) or sometimes automobile or workplace, when the target is absent. (C7) Electromagnetic harassment & food tampering The first electronic vibrations struck me with such force that I could hardly stand on my feet. I gradually learned that the physical electronic effects, although annoying and painful, were simply used to soften or sensitize or pre-condition me for the real objective mind control. (C1) one day while washing my hair I brushed the small hairs at the entrance of the ear canal, and each time I did I heard, Youre horny. (C1) detection equipment shows high intensities of directed radiation inside our home, and how the readings on the meters go down as soon as I try to video tape the aggression (C3) Assault can involve infecting the TI with fever or other disease or personal enmity(used to spoil the mood often) or electronic harassment(viewed as chronic pain) which the TI views as natural cause. For every occurrence of the period of control (every week or month), all of the above mentioned harassment tactics are used randomly so that the TI views the assault as a random occurrence of events without links to each other. (C10) Feelings/moods/sentiments generated by the experiential blanketing- the fabrication of a dystopian hyperreal environment Humiliation of targets cause a feeling of helplessness (C1) To control us perps normally introduce bad moods (C5) The social reality of the targeting phenomenon: indoctrination to agenda 21 communitarian ethos or silent massacre? Apparent cause, his refusal to play along. (C7)- BY DEFAULT COERCION AS A SUBJECTIVE CONDITION FOR ENGAGING IN ACTS OF PERPETRATION IS EXERCISED EITHER DIRECTLY OR INDIRECTLY Sociocybernetic feedback loops- recording responses to fabricated stimuli (scripts, social episodes) enables the indirect perpetrators to constantly realign the types, frequency and intensity of stimuli with the intended responses I later realized that my handlers could utilize my journal as a written record of the effects of their torture, could adjust their effects on my mind and body (C1) Register the targets emotions (C1) Perceptual inertia on behalf of significant and insignificant others My family did not believe that anything was happening to me (C2) The case of discursive complicity "I also spoke with police officers from across the country. They confirmed the existence of stalking groups across the country. In general, they said that 'cause stalking' is primarily a civil problem where the plaintiff has to prove financial loss (C4)- not only is the target harassed 24/7, but the burden of proof falls on him The case of psychic complicity in a community of dolus indirectus and projection of collective deficits to the target according to the Christological paradigm; social networks at play and Roxins extrajudicial trials Targets have been condemned in absentia by some person or group, provided no trial, and are summarily executed slowly by remote (C1).

[273]

"Group members are taught that THE TARGET IS THE REASON FOR THEIR PROBLEMS. He is the reason why their lives are a failure." (C4) The problem is when people are in a frenzied state, they believe their own mythology, and nothing you say or do will convince them otherwise (C9) What we see appear to be "citizens on patrol" groups gone wild, targeting people who have no criminal records, based on vicious lies we targets never get the chance to correct (C4) Not only are they frenzied, but a lot of what they do in their official delusion that they are keeping the city safe, involves breaking the law, and that is what I was setting out to do recently, finding out what course of action is best for targets to use to start to curtail this. I have very little doubts that my progress will be impeded, but it must be done (C9) Again before I go further, let me state that there are sane rational citizens out there, one's who are as disgusted as I am by the crazy frenzied behaviour of the other citizens, but unfortunately too many bad apples will spoil the whole bunch. I just wanted to be clear that there are logical people out there, but more are needed (C9). The common ontologically coherent reality and prephenomenological giveness of targeted individuals Targeted individuals will readily identify with what I talk about in this paper (C1) They understand the veracity of my descriptions of the effects of electronic and mind control attacks, which to others read like science fiction (C1) The somatic and material/financial effects sensation of pin pricks in the eyes, shoulders, face, feet, elbows, and other areas. The pin prick can be instantaneous or can be prolonged. In my case, the handlers have long caused an enduring pin prick on the rear of my neckrestless legselectrical jolts, tremors.. lethargy financial problemsDestroying expensive household and other itemsFomenting personal and other problems that require that targets hire lawyersRobbing targets of their time They prefer to make targets gain weight Cause burn marks (C1) She received voice to skull transmissions from a man claiming to be a physicist "experimenting" on her (C7)

3.6 The implication of agenda 21 as a platform for effecting sociocybernetic solidarity on a global scale Targets are used as experimental subjects for attaining communitarian solidarity or psychic complicity among multiple network participants. It is not so much about the individual targets qua persons, but qua platforms for attaining solidarity among social network members. Sustainable development is a proxy term masking the application of Stafford Beers Viable System Model on a global scale by streamlining bottom up social constellations with a grand scheme of societal patterning. Insofar as macro and micro are in dynamic interplay, complexity at the micro level must be reduced in order to avoid unwanted oscillations on a macro level. Targets constitute toys for cybernetic discursive games pointing to the legitimacy of a new natural language as form of life. Cybernetics is not a science in the strict sense. It is a method of achieving results by using scientific methods. It is not concerned with epistemological and ontological issues to the extent that the models constructed through cybernetics methods work. Cybernetics as potentially applicable to

[274]

open systems is primarily concerned with reducing complexity on a micro level in order to avoid unnecessary oscillations on a macro level. An open system constructed out of monads as controlled closed systems is more effective and efficient, rather than as the theoretical sum of infinite interactions among uncontrollable monads as open systems. As explained by Gregory Bateson The self-organizing and homeostatic (self-stabilizing) processes exhibited by open systems constitute evidence of persistent phenomena which are contrary to the mechanically and statistically demonstrable dissolution of the universe, postulated by the second law of thermodynamics. Also, open systems provide evidence that demonstrates the existence of anti-entropic (negentropic) tendencies within our perceived universenegentropic tendencies in which order, complexity, and improbability are sustained and increased. Hence, we may safely assume that the existence of open systems resolves the apparent contradiction between data from physics which supports dissipation, disorganization and randomness, on the one hand, and ample documentation of increased order and complexity in biological evolution, on the other. It is remarkable that metaphors such as heat and water are ubiquitous in the new lingo of the communitarian ethos of agenda 21 . Originally made sense of in a cybernetic paradigm as, respectively, When a system is at equilibrium, its nonlinear creative potential does not reveal itself; the observable linear processes are sufficient for system functionality. Under far-from-equilibrium conditions created by heat, the inherent, nonlinear potentiality emerges as the system reorganizes itself into a more complex structure (Goldstein, 1994).and as systemic leakages:creating oscillations in the collectives state of equilibrium (the so called , contractually and metaphorically alluded to as such, social peace). The process of lifting the semantic content of descriptors from their initial context of use and their intuitive reinscription in the context of a binding cultural pragmatics is an attestation both of the cyberneticized origins of the agenda 21 ethos (sustainability as Beers VSM) and the establishment of a new global community of participants as lingo carriers. The reason why the target ATTRACTS such a multifarious group of cyberneticized automata (or agenda 21 participants) is precisely due to his systemic function as strange attractor whose complexity must be reduced through tagging and exclusionary mechanisms in order to maintain a phantasmatic equilibrium Strange attractors are synonymous with the term mathematical chaos. Strange, or chaotic, attractors are nonlinear trajectories drawn into irregular, seemingly random cycles of behavior. Control parameters are opened up through increased information or energy flow, thus generating increasingly complex behavior. All nearby trajectories are drawn into its orbit, yet no two orbits overlap. The trajectories separate because of the property of sensitive dependence on initial conditions, which means that small changes may be escalated into major differences in behavior. The strange attractor literally attracts or pulls the broad range of behaviors into an order that emerges from within the randomness of behavior, patterns of behaviors that organize themselves within defined boundaries (Kauffman, 1995). As a system generates ever increasing complexity through the chaotic cycles of behavior, it continually bifurcates until it reaches the strange attractor state. Just before it does so, it may pass through a phase transition in which order coexists with chaos. This phase transition is described in the literature as the edge of chaos (Kauffman, 1995; Theitart & Forgues, 1995)117. The reason why systemically from a sociocybernetic perspective, certain targets are situated as strange attractors in a cyberneticized ethos, such as agenda 21, is because of their potential to function as systemic energy. Energy coming into the system as a result of positive feedback creates system instability, which can lead to one or a series of bifurcations. Bifurcation points mark sudden changes in a systems structure, in which the system will either disintegrate or reorganize into a new form capable of resolving the tension and utilizing the increased flow of energy that results from amplified feedback (Goldstein, 1994). The co-existence of negative and positive feedback

117

Complexity Theories: Perspectives for the Social Construction of Organizational Transformation Mary A. Ferdig, Journal of Sociocybernetics

[275]

cycles provides parameters required for self-regulation of the system The target as social representation and a set of interpretive schemata predicated of him by social actors in social networks in the social engineering paradigm of agenda 21 functions as a hub of inflows and outflows of information from and to social networks by virtue of his position as strange attractor or as experimental platform for maintaining stability during systemic bifurcations. In essence, pejorative judgments, tags and flags predicated of him are not so much about him qua person, but qua experimental platform in a sociocybernetic experiment. This unfortunately for the target bleak reality is echoed in Luhmanns words, viz. the autopoietic network in a human system as a process of communication: social systems use communication as their particular mode of autopoietic reproduction . He uses a family system to exemplify a network of conversations that exhibit inherent circularities. The results of conversations give rise to further conversations, thus forming self-amplifying feedback loops. The autonomous nature of the autopoietic network results in a shared system of beliefs, explanations, and valuesa context of meaningthat is continually sustained by further conversation (Capra, 1996).In the context of autopoetically coevolving social networks, the target as strange attractor constitutes a force filed of signification, animating on the inverse, the capacity of social networks to regenerate themselves as complex adaptive systems with implicit language games rules and exemplary speech acts. A complex adaptive system is a self-organizing, self-reflective community of intelligent agents capable of learning and adaptation (Morel & Ramanujam, 1999; Pascale, 1999). It is made up of interacting agents, or system components, whose behavior is driven by adaptive rules.Some of the rules are conscious and explicit; others are implicit and unconscious (Goldstein, 1994; Stacey, 1996).Because complex adaptive systems are self-organizing learning systems that function in environments containing other complex adaptive learning systems, it follows that together they form a co-evolving suprasystem that creates and learns its way into the future (Stacey, 1996).Agents within a complex adaptive system operate within a collective schema as well as unique individual schemata for interpreting their context and 1) adapting behavior according to its consequences (simple or singleloop learning), or 2) changing schemata that occur in the form of creative shifts during conditions far from equilibrium (complex or double-loop learning). Environments of systems within systems continually change, requiring rules within an organizations shared schema to be continually adapted to fit existing conditions. In complex human systems, individuals choose behaviors according to their own unique schemata. The indispensable role of interpretive schemata as mutually shared representations among social actors in social networks has already been analyzed. The target as interpretive schema circulating as arche signifier among autopoetically evolving social networks is ritualistically deindividuated or sacrificed through ritual communicative chains118 [see Collins as above] for the sake of maintaining
118

The sphere of signification is the biosemiotic term for Uexklls "Umwelt" (Uexkull 1934) and Maturana and Varelas (1980) "cognitive domain". I have imported Wittgensteins term "language games" describing what goes on in Luhmanns socio-communicative systems. Their surroundings are human bodies interacting with nature and each other in "life forms". In the targets simulated environment the importance of semioticized individuals as participants in the conditioning mechanism is paramount. Participants are semioticized as inscriptors of agenda 21 ethos as prephenomenological corporeal pragmatics below cultural pragmatics. This is the application of the concept of biosemiosis or the bodys becoming the locus of signification in the context of a communitarian ethos. This kind of protosemiotic communication poses serious interpretive issues for dogmatic law: Is the preplanned array of a string of actors awaiting the target to establish eye contact complicit in reproducing in a participatory fashion information that has been disseminated of an actor? No traditional evidentiary rationale would be able to account for this phenomenon. But it is within the provinces of the protosemiotic aspects of this new communitarian ethos that the experiential stream of such social situations assumes in the targets prephenomenological ontological empirical continuum a defamatory character.Therefore, coming back to Bitzilekis argument of the need for applying the law in the context of the ontological spectrum of relationships , it is only by deconstructing the modes of such novel protosemiotic communication that laws such as defamation and covert psychological harassment may be applied. Again, complementary to the application of S.Beers notion of VSM as sustainable development, we encounter the reification of Bourdieus notion of habitus as Project Habitus that is social interaction as the product of mostly un- or pre-conscious processes in perception stemming from bodily processes and from

[276]

a phantasmatic equilibrium or as a zero point of collective narratology, pointing indexically to the disequilibrium state the community would be in werent it for the existence of such a scapegoatist signifying system119.. The linguistic mode of perpetration is protosemiotic and it is within the context of cybersemiotics as the communicative paradigm of sustainably developing complex social networks that participants enactments of protosemiotic language games in the face of the target assume their criminal character. Interestingly, the phenomenological reality of targeting matches the processes usually employed in cult indoctrination tactics. As echoed in one of the above quoted statements, either you play along or else Clearly it is a case of an enforced double-bind: either you participate in the communitarian ethos of which targeting activities are standard, informally legitimated actions, or youre a target. The cultivation of this perceptual bipolar (either with me or against me) is crucial as a fundamental mind state and universal rhetoric in the communitarian ethos, whose political correlate exists only in totalitarian regimes, hence one more reason why Roxins theory is applicable in cases of silent massacre. 3.7 Conversion as a change in ones universe of discourse 120 and the legal issue of freedom of will and responsibility (at least for the direct perpetrators) in the context of indoctrination and coercive persuasion121 A short yet concise expose of mind control or conversion tactics usually employed by secret societies and cults, and given that it has already been demonstrated how agenda 21 has been spreading through covert operations and justifiably so as the very projects programmatic declarations are unconstitutional, are applicable as psychological mechanisms of indoctrination into the communitarian ethos. Typical conversion mechanisms
social interactions (Bourdieus definition of habitus) The relation between phenosemiotics (prelinguistic experiences), endosemiotics, thought semiotics, and intrasemiotics (semiotic interaction between the biological and the psychological levels, now reformulated in cybersemiotic terms). I have in this way constructed a semiotic analogue to Luhmanns three levels of autopoiesis. The semiotic processes occur within the autopoietic systems. Where they interpenetrate, communicative systems like intrasemiotics appear, which are created inside; outside sign games appear as the exosemiotic aspect . Targeting conditioning methods, such as playing with keys, drinking with strawbs from cans, throwing garbage in synchronicity to the targets exiting his apprtment, as amply reported from targeted individuals and in my case , constitute exosemiotic aspects of protosemiotic communication and STRIKING EXAMPLES OF THE IRRATIONAL communitarian ethos of agenda 21 as social networking paradigm. Most importantly, they indicate the maliciously , indirectly operating harassment that slips under penal law. If this does not point to the involvement of judiciary members who are fully aware of what counts as valid and admissible evidence, then what does? Is this mode of communication illegal? No, but its application in the context of a premeditated silent massacre (wherefrom the need for employing silent protosemiotic forms of communication) is. Insofar as the means justify the ends and the ends have been demonstrated to be illegal, then the means are too. 119 The functional and the semantic aspects, then, are coupled for the first time here in a theory that connects biology, psychology and sociology with a theory of signaling, signification, cognition and communication. The cybersemiotic approach works by making synergies between the socio-communication systems theory of Luhmann with its basis in Spencer-Browns logic of distinction, its inclusion of Maturana and Varelas theory of autopoiesis and Heinz von Foersters theory of second order cybernetics on one hand, and on the other hand, Peircean pragmatic semiotics, in the form of the new biosemiotics of Thomas Sebeok (including all living systems and the human body in the semiotic sphere), combined with Lakoff (1987) and Lakoff and Johnsons (1999) embodied cognitive semantics and Wittgensteins language-game theory.JOURNAL OF SOCIOCYBERNETICS VOL3N02 FALL/WINTER 2002-03 LUHMANN SEMIOTICIZED , Sren Brier
120
121

The sociology of conversion, D.Snow, R.Machalek, Annual Review of Sociology 1984

Cf Indoctrination, Coercion and Freedom of Will , G.Yaffe, International Phenomenological Society, Philosophy and Phenomenological Research, Vol LXVII, Sep 2003

[277]

It entails the displacement of one universe of discourse by another or ascendance of a formerly peripheral universe of discourse to the status of a primary authority Rhetorical indicators of conversion o Biographical reconstruction : ones biography is reconstructed in accordance with the new or ascendant universe of discourse and its attendant grammar and vocabulary of motives Adoption of a master attribution scheme: when a new or previously peripheral causal schema or vocabulary of motives authoritatively informs all causal attributions of self , others, and events in the world. Feelings, behaviors, and events formerly interpreted with reference to a number of causal schemes are now interpreted from the standpoint of one pervasive schema. A suspension of analogical reasoning Embracement of the covert role, suggesting not only that the convert sees himself and herself in terms of that role, but that it influences the converts orientation in all interactive situations

o o

The causes of conversion Psychophysiological responses to coercion and induced stress

The brainwashing or coercive persuasion model is most popular explanation for conversion outside of sociological facts. Induced physiological dysfunctioning of the brain is thus seen as the key to conversion. The basic thesis is that conversion is the product of devious but specifiable forces acting upon unsuspecting and therefore highly vulnerable movements. When the proposition is combined with psychoanalytic theory, we have a picture of the convert as an individual who has been made receptive to new ideas because his or her critical facilities and ego strength have been eroded by information control, overstimulation of the nervous system, forced confessions and ego destruction, among other factors.

Predisposing personality traits and cognitive orientations o Escapist mechanism for those who suffer from character disorders in the form of attenuated ego and superego development.

Tension producing psychological factors o Loss of a family member, change or loss of a job, education pressures or any of a number of tensions. Often conversions occur under duress and therefore may represent irrational responses to lifes problems

Social attributes and the structural availability of converts The role of social networks and affective and intensive interaction

[278]

Role learning [and to this one should add language games learning] EXTENDED TO THE USE OF A SPECIAL VOCABULARY AND RELIANCE ON METAPHORIC SPEECH (a striking instance of which, in my case, is the employment of signs or indices as cultural pragmatic signifiers or bifurcated social representations).

Further proof of how similar to targeting tactics as indoctrination/thought reform methods have been amply demonstrated by social psychologists, such as B.Stern and R.J.Lifton. B.Sterns coercive persuasion and cult indoctrination techniques A coercive persuasion program is a behavioral change technology applied to cause the "learning" and "adoption" of a set of behaviors or an ideology under certain conditions The advances in the extreme anxiety and emotional stress production technologies found in coercive persuasion supersede old style coercion that focuses on pain, torture, drugs, or threat in that these older systems do not change attitude so that subjects follow orders "willingly."(extracts from FACT.net- www.factnet.org ) TACTIC 1. The individual is prepared for thought reform through increased suggestibility and/or "softening up," specifically through hypnotic or other suggestibility-increasing techniques such as: A. Extended audio, visual, verbal, or tactile fixation drills; B. Excessive exact repetition of routine activities; C. Decreased sleep; D. Nutritional restriction. TACTIC 2. Using rewards and punishments, efforts are made to establish considerable control over a person's social environment, time, and sources of social support. Social isolation is promoted. Contact with family and friends is abridged, as is contact with persons who do not share group-approved attitudes. Economic and other dependence on the group is fostered. (In the forerunner to coercive persuasion, brainwashing, this was rather easy to achieve through simple imprisonment.) TACTIC 3. Disconfirming information and nonsupporting opinions are prohibited in group communication. Rules exist about permissible topics to discuss with outsiders. Communication is highly controlled. An "in-group" language is usually constructed. TACTIC 4. Frequent and intense attempts are made to cause a person to re-evaluate the most central aspects of his or her experience of self and prior conduct in negative ways. Efforts are designed to destabilize and undermine the subject's basic consciousness, reality awareness, world view, emotional control, and defense mechanisms as well as getting them to reinterpret their life's history, and adopt a new version of causality. TACTIC 5. Intense and frequent attempts are made to undermine a person's confidence in himself and his judgment, creating a sense of powerlessness. TACTIC 6. Nonphysical punishments are used such as intense humiliation, loss of privilege, social isolation, social status changes, intense guilt, anxiety, manipulation and other techniques for creating strong aversive emotional arousals, etc. TACTIC 7. Certain secular psychological threats [force] are used or are present: That failure to adopt the approved attitude, belief, or consequent behavior will lead to severe punishment or dire consequence, (e.g. physical or mental illness, the reappearance of a prior physical illness, drug dependence, economic collapse, social failure, divorce, disintegration, failure to find a mate, etc.).

Robert Jay Lifton's Eight Point Model of Thought Reform

[279]

1. ENVIRONMENT CONTROL. Limitation of many/all forms of communication with those outside the group. Books, magazines, letters and visits with friends and family are taboo. "Come out and be separate!" 2. MYSTICAL MANIPULATION. The potential convert to the group becomes convinced of the higher purpose and special calling of the group through a profound encounter / experience, for example, through an alleged miracle or prophetic word of those in the group. 3. DEMAND FOR PURITY. An explicit goal of the group is to bring about some kind of change, whether it be on a global, social, or personal level. "Perfection is possible if one stays with the group and is committed." 4. CULT OF CONFESSION. The unhealthy practice of self disclosure to members in the group. Often in the context of a public gathering in the group, admitting past sins and imperfections, even doubts about the group and critical thoughts about the integrity of the leaders. 5. SACRED SCIENCE. The group's perspective is absolutely true and completely adequate to explain EVERYTHING. The doctrine is not subject to amendments or question. ABSOLUTE conformity to the doctrine is required. 6. LOADED LANGUAGE. A new vocabulary emerges within the context of the group. Group members "think" within the very abstract and narrow parameters of the group's doctrine. The terminology sufficiently stops members from thinking critically by reinforcing a "black and white" mentality. Loaded terms and clichs prejudice thinking. 7. DOCTRINE OVER PERSON. Pre-group experience and group experience are narrowly and decisively interpreted through the absolute doctrine, even when experience contradicts the doctrine. 8. DISPENSING OF EXISTENCE. Salvation is possible only in the group. Those who leave the group are doomed. Needless to say that from a legal point of view such coercive mind control techniques are totally illegal. For example, in United States v. Lee 455 U.S. 252, 257-258 (1982), the California Supreme Court found that "when a person is subjected to coercive persuasion without his knowledge or consent... [he may] develop serious and sometimes irreversible physical and psychiatric disorders, up to and including schizophrenia, self-mutilation, and suicide." From a social phenomenological122 point of view, which perspective has been adhered to thus far, the following issues emerge while attempting to identify the extent to which the subjective dimensions of acting responsibly and acting willfully [both significant aspects of mens rea] while carrying out an act of direct perpetration may be fulfilled in a communitarian ethos and against the background of a covertly legitimating regime of indirect perpetration in the context of organized power mechanisms (which will be illustrated in chapter 4): distinction is drawn between two forms of manipulation: indoctrination is defined as causing another person to respond to reasons in a pattern that serves the manipulator's ends; coercion as supplying another person with reasons that, given the pattern in which he responds to reasons, lead him to act in ways that serve the manipulator's ends. It is argued that both forms of manipulation undermine freedom because manipulators track the compliance of their
122

Phenomenological sociology received its classic expression in Peter Berger and Thomas Luckmans The Social Construction of Reality (1967).

[280]

victims, while neutral causal mechanisms do not123. fundamental trait in indoctrination/coercion mechanisms is the ability on behalf of the indirect perpetrator to TRACK the potential direct perpetrators path to compliance, and thus employ indirect means of persuasion [see chapter 2 on 100 ways of mind control] in order to align the prospects goals with predefined goals. The only one who will know how the prospect reached compliance is the indirect perpetrator! In fact, this very mode of accomplishing the subjective condition of acting out of will is crucial in understanding the sociocybernetic mechanism whereby the communitarian ethos is virally disseminated. The controllers , placed pyramidically in progressively spiraling microsocial networks are capable by virtue of networks members to monitor the path to indoctrination on behalf of prospect members. The same mechanic is customarily employed in potential recruits in Masonic circles, as amply documented. The prospects movements are closely monitored prior to receiving recommendations for joining a lodge. This implies that routine activities and habits, weaknesses and strengths, needs and aspirations are recorded and knowledge on behalf of recruiters is progressively amassed as to how the prospect may be acted upon. Especially in the context of audiovisual surveillance, the predictability of the amassed knowledge may surface in the context of seemingly innocuous conversations as deterministically causative. Insofar as motives as reasons for engaging in an act of perpetration are rooted in a voluntaristic framework, waiving that framework would also point to a lack of self-motivated motive, and a diminished culpability for responsibility, even when the perpetrator is neither deaf/dumb nor seemingly incapable of carrying culpability (due to a mentally disorderly status or due to external force, such as acting out of necessity or upon command). None of these conditionals exist (at least not in all instances and not observably so) yet one willfully submits to carrying out an act of perpetration. In this instance, how can we claim a state of indirect coercion as indoctrination? Acts of psychic, discursive and silent complicity have already been alluded to in chapter 2. The very etymology of ethos points to the force of habit and not by accident the local aspect of agenda 21 has been named after Bourdieus Habitus. Ethos is also narrowly related to hexis or addiction or to be had by or to be dependent on an object, a subject, a state of affairs, a goal etc, and derivative words such as methexis point to interdependency and cobelonging. It is by the very ontologically semantic contiguity and by the fact that we ec-sist linguistically or we have always already been had by another as conditioner of our horizon of possibilities (in terms of existentialist phenomenology124) that by default to be had is to be alongside someone else qua horizon. This very foundational mode-of-Being as being-in-theworld (as Heidegger would have it) as being-preconditionally-alongside-significant-others that suggestibility as to potential action is unavoidable. Therefore, ontologically speaking, acting PURELY out of individual will is unfeasible as it presupposes a solipsistic existence. What distinguishes the qualification of suggestibility between legitimate and illegitimate action (assuming knowledge of the law, whose in principle ignorance is no excuse and this is debatable) is the ability of the prospect to recognize it as either legitimate or the opposite. Insofar as the new ethos is founded on the principle of dolus indirectus such recognition is unattainable (as evidenced through the plethora of targets accounts- either you become a perpetrator or harassment continues etc). Thus the voluntaristic element is waived not rationally upon speculation of the potential outcomes of acting or not upon suggestibility , but as an ontological precondition of being-with as being-in-theworld of agenda 21. In terms of a language as form of life in the context of the cultural pragmatics of the new ethos it is by virtue of the limited set of pragmatic tropes that may be achieved against the background of demonstrated group cohesion goals that suggestibility must be acted upon, even though the imperative is not fleshed out through a commandeering speech act, but through the seduction of signs in a culturally pragmatic regime of signs. This is why indoctrination may not be fully accounted for through formal legal discourse insofar as the mode of communication and the code of the new lingo is not rational, but pragmatic (already illustrated in chapter 2 by allusion to the
123

Yaffe, as above In the philosophical work of Heidegger, Schutz, and Merleau-Ponty the transcendental phenomenology of Husserl, concerned with grounding the actual world in an atemporal realm of necessity, was transformed into an existential phenomenology concerned with the structure of the lived world of actually existent,embodied agents. This transformation rendered phenomenology directly suitable for empirical social analysis.
124

[281]

difference between formal and informal logic and the way causality is shaped in the former vs the latter and why an ideal speech community of rational actors is unattainable in this chapter). Therefore, passages such as the following Since our choices and subsequent conduct can be deterministically caused, and we can still satisfy this condition, under this view, we can be free even under determinism. But as a general rule we seem unfree when our choices are the product of manipulation, even if the subsequent actions do depend on our choices.125 the manipulator causes her to lose a battle to the motives on which the manipulator wants her to act. To be someone's toady, on the other hand, is to be seduced; such a person doesn't lose a battle to the motives on which the manipulator wants her to act, rather, the manipulator induces her to side with them.. To be a toady is to be free to yourself, and yet not to be free. Such an agent possesses all of the subjectively accessible mental states and attitudes that are involved in free action and those attitudes all play just the roles in the production of her action that they play when she acts freely, but, nonetheless, she is not (or, at least, seems not to be) free make sense from a dogmatic legal discourse point of view, but not in the context of natural language, where, over and above the propositional content of the utterances and the mode of utterance in a communicative encounter one should also take into account situational aspects, in Van Dijks terms, as well as relationship precedents (given that the relational paradigm as explanatory of the operational mode of pragmatic social networks is more plausible than the semantic paradigm, as established in the beginning of this chapter and upon the exposition of the relatedness mandate of agenda 21 established in chapter 1).. Is this gap unbridgeable for dogmatic law and how can we account then for motives, responsibility, actus reus, mens rea etc? Does this mean that an entire community must be burnt at the stake for communicating protosemiotically, hence irrationally, indexically/pragmatically, but not dialectically? Some of these interpretive complexities will be further elucidated in chapter 4. Therefore, by implication, targeting activities as indoctrination techniques to the communitarian ethos of agenda 21 or silent massacre methods (depending on which part of the enforced double bind they are viewed) not only are globally operative and demonstrably so in my case, but they are forceful attestations of the covert psychological warfare operations employed in the virally spreading communitarian ethos, which operations themselves are part and parcel of secret services as animus auctoris and implementers of agenda 21s networking mandate as animus socii, as will be demonstrated in the following chapter. 3.8 Agenda 21 and Viral Marketing techniques: A NEW SOCIAL MOVEMENT of pyramidically interdependent formal and informal social networks spreading virally through indoctrination techniques? Yes and no. The fact that agenda 21 has spread virally yet covertly in the socius and effectively has reengineered the socius through the formation of multiple social networks and compulsory cobelonging therein with view through the application of technologies of self (as Foucault would put it) to streamline individual goals and aspirations with communitarian goals against fuzzy guidelines has been demonstrated by allusion to the respective documents. The reason why participation is effected through indoctrination as against coercive persuasion means and why this kind of psychological manipulation lies in the grey area between legal responsibility and freedom of will and the irrational domain where one lets be acted upon by virtue of mandated cobelonging and by virtue of powerful members in the social networks being capable of cunningly redirecting their goals (as the outcome of audiovisual surveillance and other memberspsychosomatic stalking) hence appearing as helpers and advisors rather than as direct commanders has
125

idem

[282]

already been demonstrated. The informal network leaders and other key network members are legitimated by the blueprint to act as mobilizers of individuals directionality through framing (to use a familiar term coined by Goffman) participants interpretive schemata and a contrario the schemata predicated of targeted individuals thus acting on their intentionality. The existing literature on the operational modes of social movements is illuminating regarding how mobilization as the motivating force behind the viral expansion of a microsocial organizational mode in the form of informal social networks does not differ semantically that much from indoctrination, while constituting exactly the same method of initial microsocial formations in former totalitarian communist regimes, such as the Soviets, as already hinted at in Chapter 1:
The Ingredients of Micro-mobilization in social movements126 Kindling in small groups

The basic building block of social movements is the small informal group connected to a loose network. Sometimes this "micro-mobilization context is a group of friends, sometimes a group of coworkers, sometimes a subgroup within a larger group like a church or a union. Margaret Mead was quite right: Never doubt that a small group of thoughtful , committed citizens [my note: or an irrational community of pragmatically driven networked social actors] can change the world; indeed, it's the only thing that ever has.
Familiar members

Micro-mobilization contexts act as the staging ground for movements. Three resources affect the emergence of a movement: members, leaders, and an existing communications network. Research shows that new members appear along established lines of interaction. New members tend to know people who are already members. The more a person is integrated into a community, the more readily he or she will be willing to take part in its activities.
A co-optable communications network

The pattern, speed and spread of a movement depends on an existing cooptable communications network. The womens liberation movement, for example, was able to make rapid progress in the 1960s (when it had previously failed to do so) because of the prior arrival of just such a network. Overall, the greater the number and diversity of people actively participating in a network the more likely it will support a mobilization effort [my note: which diversity is demanded in agenda 21].The network may be informal and invisible, like those described in detail in Emanuel Rosens book, The Anatomy of Buzz. Rosen sees networks as useful for flogging products; activists see them as useful for spreading ideas. Capable leaders (in Agenda 21 terms agents of change or group leaders or nos 37the adaptation of the 23 master mason degree in traditional freemasonry) Smart, honest, committed leaders are invaluable to a social movement. The literature on activism emphasizes the importance of leaders in generating a movement, and the importance of creating new leaders to keep it rolling. Particularly important is the articulate and charismatic leader who can elegantly articulate everyones concerns, and inspire an emotional response.
A Mobilizing frame

126

Social movements: a summary of what works, by Charles Dobson; Also see Formal models in studying collective action and social movements by DJ Myers; Dancing the dilemmas: the mythological enabling of collective action by EA Royrvik and E.Wulff, Indoctrination and group evolution strategies, by Kevin McDonald in In I. Eibl-Eibesfeldt & F. Salter (Eds.), Ideology, Warfare, and Indoctrinability. Oxford and Providence: Berghahn Books

[283]

Erving Goffman originated the term frame to refer to an interpretive scheme that people use to simplify and make sense of some aspect of the world. When a mobilizing frame becomes widely shared, the chances of collective action increase markedly.
Frame alignment

Frame alignment describes what happens in small informal groups that promote social change. Movement supporters attempt to recruit bystanders by providing examples and rationales that support a mobilizing frame and legitimize the movement.[the case for indirect volitional control and stepwise mobilization of individuals] If the examples and rationale are convincing [the case for persuasion and mind control techniques vs coercive command], bystanders will adjust their view of issues and events to fit the new mobilizing frame [the case of reevaluation of previous lifeworld events and choices in the context of indoctrination, as previously noted by M.Singer]. Most frame alignment comes from social movement organizations as they try to bring in new people and fend off countermovement attacks. [the case for targeting potential threats}. Frame alignment comes in varieties sociologists have named frame bridging, frame amplification, frame extension and frame transformation. According to David Snow and others, frame extension occurs when a social movement organization extends the boundaries of its primary framework so as to encompass interests or points of view that are incidental to its primary objectives but of considerable salience to potential adherents. In effect, the movement is attempting to enlarge its adherent pool by portraying its objectives or activities as attending to and being congruent with the values and interests of potential adherents.
Apparently, history is repeating itself, this time through open system dynamics or open frame dynamics and the a priori, yet dynamic, compartmentalization of the socius through predefined typolologies. Is concerted multiparticipant perpetration in this evolving regime and communitarian ethos comparable to traditional closed systems / totalitarian regimes and can Roxins theory of indirect perpetration in organized power mechanisms be applied in the context of this societal engineering blueprint? The answer is yes, as will be demonstrated in chapter 4. Chapter 4 The legal framework of targeting: A case of premeditated, multiparticipant, multiact murder attempt of indirect perpetration in the context of organized mechanisms of power and institutional/private alliances (agenda 21/third realm) and freemasonry 4.1 Reasons why the silent massacre phenomenon should be typified as an exceptional form of criminal activity in dogmatgic penal law: the analogy with the typified chapter on Duel in the Greek criminal law (Chapter IZ of the Particular Part of the Greek Criminal Law) As is well known, formal law may not regulate a priori the entire set of legal cases. In the face of multiple breaches of formal law encountered in exceptional cases, such as the silent massacre phenomenon, the phenomenon must be typified as such de lege ferenda, in order to be capable of discerning its crucial contextual differences from other cases. For example, why should the antiquated practice of duel be typified de lege lata? Moreover, how did it evolve historically into a typified criminal activity? The objective dimensions of this criminal activity could be subsumed under clauses pertaining to the intended cause of fatal bodily injury. What apeears to be the driving force behind the lawmakers typification of this phenomenon as an exceptional form of criminal activity was its extrajudicious embeddedness in public mores as a form of life, that legitimated duel as a manner of resolving conflicts, resting with mutual hatred. The empirical verification based on circumstantial evidence and forensics elements in the crime scenes attested to the precedence of such exceptional cases of premeditated homicide, based on popular knowledge about duel being a form of conflict resolution. By the same token, and based on the plethora of allegations and proofs about the existence of

[284]

the silent massacre phenomenon and the organized perpetration mechanism favoring it against the background of a new ethos and a new form of life called agenda 21, it should be typified in dogmatic law. What kind of interests might be thwarting its typification? From a methodological point of view and regarding the legal decision making process steps leading to the verification of the precedence of a duel, one normally relies on (i) uniformly distinct forensics evidence (ii) the fact that this type of criminal activity is embedded in a form of life and a set of ontological relationships whereupon this act of premeditated homicide is founded. Automatically inferring the existence of such an exceptional type of criminal activity has been enabled through the progressive crystallization of abductive hypotheses into deductively valid principles. In short, what emerges as a univocal causal explanation and driver behind the typification of an exceptional form of criminal activity is the modality of perpetration and its being embedded in the context of a form of life. O tempora o mores. [ - [de lege ferenda] - , ( ) [de lege lata] ; . " " . . ' " " . ; , () () " " " " , . , . O TEMPORA O MORES] 4.2 Main findings from chapter 3 and their relationship to the justification for using the proposed legal framework : targeting experiential categories as argumentative third terms and their usefulness in the interpretation and application of dogmatic law concepts

[285]

Allusion to crucial structural societal organization particularities in the context of secretly spreading societies within societies, such as agenda 21 and existing secret societies such as freemasonry has already been made and sufficient justification provided why these particularities favor the emergence and establishment of an extrajudiciary system that contravenes formal law, why such extrajudiciary systems constitute breaches of formal law and which structural elements of these secretly operating societies should be accounted for in order to carry out the necessary interpretive adjustments in formal laws clauses, the formation of Wigmore type syllogisms with the use of third terms: as nodes in the syllogistic chains against the background of the evidenced structural particularities and finally the correct subsumption of syllogisms as minor premises under the major premises of penal law clauses. This is a delicate endeavor insofar as fundamental workings of democratic regimes are questioned in the face of crypto-totalitarian regimes. Therefore, it is prudent to summarise the main learnings and findings from chapter 3 in order to demonstrate which structural particularities must be used as connecting third terms in empirical syllogisms, why they are not hypothetical , but demonstrable and what is their particular relevance to the silent massacre phenomenon. Based on the ethnomethodological reading of various indicative cases of targeted individuals, which are also applicable in my case, the following experiential categories emerged through a dynamic bottom-up reduction of those cases particularities: List of experiential categories in the silent massacre phenomenon

1 2 3 4

Characteristics of targeting (participants, organizational structue, motives, effects on targets, discursive and material complicity by institutional agents, methods) A system of indirect perpetration Direct perpetrators Indirect perpetrators Multilayered open motives (material, psychological, ideological) as causae efficiens, but one causa finalis viz the extinction of the target Institutional involvement and (supra)state violence Institutional complicity/Mode of treatment by institutional agents Institutional cover-ups, sophistic reversals, transposition of responsibility to the target and discrediting campaigns Active involvement of secret services 24/7 surveillance ; Intrusion of privacy and strictly controlled environment; organized form of crime involving audiovisual surveillance Methods of targeting Experiential blanketing / controlled hyperreal environment Street theater Conditioning through ordinary stimuli Boxing technique Blockade Mobbing in places where the target frequents Illicit break ins and psychological warfare methods

5 6 7

8 9 1 0 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1

[286]

8 1 9 2 0 2 1

Electromagnetic harassment & food tampering Feelings/moods/sentiments generated by the experiential fabrication of a dystopian hyperreal environment blanketing- the

The social reality of the targeting phenomenon: indoctrination to agenda 21 communitarian ethos or silent massacre? Sociocybernetic feedback loops- recording responses to fabricated stimuli (scripts, social episodes) enables the indirect perpetrators to constantly realign the types, frequency and intensity of stimuli with the intended responses Perceptual inertia on behalf of significant and insignificant others The case of discursive complicity The case of psychic complicity in a community of dolus indirectus and projection of collective deficits to the target according to the Christological paradigm; social networks at play and Roxins extrajudicial trials The common ontologically coherent reality and prephenomenological giveness of targeted individuals The somatic and material/financial effects

2 2 2 3 2 4 2 5 2 6 2 7

It is precisely the ubiquitous, that is universally applicable and exceptional nature of the above fundamental traits regarding the mode of perpetration, the multilayered motives, the alternating participants and their relationships, the indirect perpetrator(s), the individual social episodes , the scripts used and the institutional mode of treatment of allegations regarding the above that legitimates their use as argumentatively valid third terms or nodes in syllogistic chains, by analogy and in the same fashion as one would be able to draw inductive inferences based on duel-related forensic elements and circumstantial evidence as falling beyond all reasonable doubt under the duel-related clauses. Moreover, the existence of clear and explicitly stated as such directives for effecting the local agenda 21 at the expense and to the detriment of old regime opponents,, its secretively and virally expanding membership and its undoubtable structural and nominal similarities to the established and powerful secret society of freemasonry legitimate me to raise valid claims and make allegations about these secret societies acting as animus socii in my case of silent massacre. Based on extensive literature review in the disciplines of sociology, psychology and philosophy and in particular the fields of communication theory, cultural pragmatics, the pragmatics of social interaction, social psychology, ethics, sociocybernetics, sociology of conversion/indoctrination, ethnomethodology and conversation/discourse analysis, sociolinguistics among others, the following have been shown to be of apodeictic validity and of potential use as omnipresent third terms127 in the formation of syllogistic chains:

127

ARGUMENT FROM AN ESTABLISHED RULE AND ARGUMENT FROM VERBAL/EXPERIENTIAL (MEETING THE BURDEN OF PROOF, eg FEDAME DATABASE) CLASSIFICATION- VERY IMPORTANT INSOFAR AS IT IS NORMATIVE IMPLICIT RULES WHEREUPON DECISIONS ARE MADE IN ORDINARY LIFE ABOUT ACTIONS IN THE FACE OF FACTS AND VERY IMPORTANT IN ESTABLISHING THE FORESEEABILITY OF POSSIBLE OUTCOMES. THE EXPERIENTIAL CATEGORIES OF TARGETING CONSTITUTER SUCH RULES

[287]

1. In the context of ordinary transactions and social networks relationships the primary end of communication shifts from simply establishing a common understanding of objects or states of affaiors to effecting an intersubjective relationship KEY THIRD TERM: relational/pragmatic paradigm over epistemic validity IMPLICATION AND USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: For example, in discerning the motive on behalf of an indirect perpetrator [eg secret services] in the context of open system dynamics for diffusing defamatory information about a targeted social actor to a sociocybernetically structured networked community, thus indirectly forcing them to know the target, or, in terms of secret services lingo, to effect a closure on defamatory information as working hypotheses by virtue of the indirect perpetrators knowingness and maliciously acting on the fact that social actors do not confer value judgments disinterestingly about others qua social representations, but, based on a relational paradigm, they will seek to affirm their relationship with network members through the confirmation of defamatory information about a target as their transgressional other, ontologically speaking. THIS IS A UNIVERSALLY BINDING THIRD TERM INSOFAR AS IT HAS BEEN ABDUCTIVELY RENDERED THROUGH ETHNOMETHODOLOGICAL INTERPRETATION AND TO THE BEST POSSIBLE EXPLANATION THUS BEYOND REASONABLE DOUBT AS A METAEPISTEMIC PRINCIPLE, ALLOWING FOR THE RECOGNITION OF PHENOMENA AS PARTAKING OF THE PREVIOUSLY CITED INTERPRETIVE CATEGORIES ANALYTICALLY, RATHER THAN SYNTHETICALLY (eg an incident of an institutional agents refusing to take seriously and in the context of the silent massacre targeting toolkit allegations about illicit break-ins and torn clothes as being univocally subsumable under experiential category (7) in the above cited list of experiential categories in the silent massacre phenomenon

2. Another key third term across incidents is the ubiquitous subjective condition of dolus, premeditation and synchronicity in incidents deployment. IMPLICATION AND USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: for example, in using circumstantail evidence from a social episode as objective and subjective indices for gauging the incidence of the targeting phenomenon insofar as synchronicity essentially presupposes premeditation and premeditation presupposes dolus Where no hard evidence exists (and even if it exists typically it cannot be proven as for example in incidents of torn clothes a third party observer should have experienced the clothes state prior to tearing, but it is an experiential category of the silent massacre phenomenon, hence it must be accepted) Why are experiential categories of particular apodeictic value in this case? Because they are part of a NOVEL and EXCEPTIONAL type of criminal activity, It is not as if one is claiming compenstaion for illegal entry and property damage, in which case one would not be able to provide evidence, It is by virtue of a perfect syllogism based upon imperfect evidence that becomes perfect through its inclusion in the ontologically coherent phenomenon of silent massacre. Targeting is considered to be the operfect crime. As I will demonstrate it is rather an imperfect crime with quasi-perfect criminal acts. It is the clearly evidenced ontological horizon of dolus (both directus and indirectus/eventualis) that betrays its perfection and the nodes and links of omissions and cover ups that expose it a contrario.A contrario,the partial and imperfect objective, subjective and circumstatial evidence of the targeting phenomenon is corroborative of a peffect crime 3. KEY THIRD TERM community over individual (not as the outcome of monadic voluntary acts, but as a mandatory ontological precondition) AND extrajudicial system of agenda 21 in line with freemasonry USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: For example, very important in filtering witness and expert witness testimony

[288]

insofar as they are highly likely to constitute echos of extrajudiciary decisions, thus, irrespective of any ad hominem arguments, their origin rests with a community of dolus It is by virtue of this ethos that illegal acts are silently legitimated ("other scene of discourse" insofar as reasons for targeting vary according to multilayered motives and based on secret referenda). The motive is dispositionally legitimated , while a tacit agreement on the validity of the motive as conducive to the setting in motion of exclusionary mechanisms affords to maintain the communitarian bond among members of a discursive community. 4. KEY THIRD TERM: informal legitimation of motives even when they contravene clauses of the formal penal law USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: the existence of secret referenda informally legitimating hate crimes and the overdetermination of a secret communitarian ethos (agenda 21, freemasonry) as psychically complicit [mens rea] in urging social actors to participate in targeting activities knowingly, that is consciously as regards the formal law implications of their activities. The truth value of a defamatory statement or an exclusionary mandate consists in the similarity of doxic positings on behalf of a linguistic/pragmatic community or the adoption and diffusion of a univocal rhetoric about states of affairs and others. There is nothing strictly physical or metaphysical about positings, save for pragmatic agreement. ; There is nothing inherent in a person that causes the doxic positing, it is rather a matter of appropriating another person qua object of collective intentionality through doxic positings that it appears in such and such a manner 5. KEY THIRD TERM Illusory consensus or collective intentionality as agreement over multilayered motives against the background of asymmetry of information diffusion and decision making power among members in social networks, which by default waives the existence of a speech community of rational agents and/or a rational and disinterested process of decision making about states of affairs and others among social actors, coupled with the ubiquitous psychological mechanisms of perceptual inertia, the abilene paradox; prisonners dilemma USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: very important in terms of allocating reponsibility to actions of direct perpetrators as a significant part of mens rea rests with collective intentionality and ontological cobelonging

6. KEY THIRD TERM dual and complementary motives, ontic (resting with pragmatic self centered interests) and ontological (resting with communitarian, psychological interests) USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: crucial as it is hard to determine the relative weight of each of the above coexisting motives in the perpetration of targeting activities Coming back to Bitzilekis argument, the admissibility of motive(s) for participants and indirect perpetrators respectively does not rest stricto sensu, or at least exhaustively, with the appropriation and redistribution of material things {in terms of dogmatic law and applied legal practice, such as ones house, kitchen table and other items of value, as well as ones career prospects), but PRIMARILY, FOUNDATIONALLY and overarchingly with the ontological dimension underpinning as the horizon for the appropriation of ontic elements, that is with the maintenance of the relationships among social actors in social networks.

[289]

Thus, the target functions on the inverse as a ground of legitimacy for a nexus of social relationships,albeit informally and as a lacuna in the center of social networks that must be closed or ritually annihilated [in terms of Collins interaction ritual chains ] as a systemic sacrifice celebrating the cohesion among group members [in terms of Girards christological paradigm]. Thus, the motives on behalf of alternating participants in targeting activities do not rest necessarily (or at least exhaustively) with a direct benefit rationally expected from the social situation, but with an affirmation of their empirical continuity qua members of social networks, the cultural pragmatics of which mandate that they engage in ordinary ritual communicative activities whereby their situational self is negotiated in interaction with others. In essence, mutual recognition among participants as partaking of the same symbolic order is activated through putting shared schemata in practice in social situations OR CONSTANTLY REANIMATING SOCIAL CONTEXTS IN DESCRETE SOCIAL SITUATIONS THAT ARE REPEATED AS SOCIAL EPISODES. The inverse (in terms of recognition) is the case of the target, who is part of participants socially shared schemas, therefore a phantasmatic copula granting the hyperreal continuity of social milieus, but not negotiating his situational selfhood, as he is not a recognizable member of the speech community. In more concrete terms, in repetitive social situations as social episodes, such as gaslighting and street theater the target is essentially used as training device on behalf of social networks members for affirming their collective identity through engagement in common discursive rituals. The necessity of the target in discursive ordinary contexts consists in a prephenomenological spectacle of ritual killing wherein the methexis of participants is affirmative of their unconditional sameness within the differentiating distancing from a zero point of collective narratological continuity. The ontological dimension of social networking and the ontology of relationships as fundamental modes whereby social meaning is ascribed to both humans and objects may not be unaccounted for by a judge and criminal law - Insofar as a crime is ontologically embedded in a network of social relationships its sense and meaning are always already socially mediated - The degree of involvement (either as solicitor of an act, or motivator or plain participant) of a member of a social network and his contribution in a causal chain leading up to a criminal incident is not materially reflected in criminal law up until the point where that involvement has tactile impact on an individual 7. KEY THIRD TERM: social representations and interpretive schemata as the middle term between observed actions and hypothesized causes- it is not the individial social actor qua individual, but qua narratological and acontextual re[mis]construction that is targeted USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: crucial in allocating responsibility for actions, in drawing causal chains, in discerning relationships among seemingly uknowable social actors and against the background of operative secret societies Moscovicis use of social representations as embedded schemata between perception and memory affords to elucidate the background assumptions or information constellations that are embedded in social actors empirical understanding and help filter new perceptual stimuli about the targeted individual according to information that has been stocked about him in memory The cycle of information and the cycle of perpetration among PRIMUS/SECUNDUS/TARGET Thus, the series of predicating causality shifts from a primary state of affairs such as agreement among social network participants about the features or attributes of an interpretive schema , which agreement functioned as the causa prima [or the PRIMUS in terms of the locus of decision making responsibility for a criminal activity] of the schemas extrajudiciary formation and predication of the targeted individual, to the SECUNDUS, for whom the schema functions as causa efficiens for engaging in a targeting incident and through a post-incident agreement between PRIMUS and SECUNDUS back to the target in an attempt to cover up their initial PARTAKING OF THE COMMON INTERPRETIVE SCHEMA.

[290]

Multiple composite causality What is confirmed in an episode as a causal nexus involving the target and situational factors is the convention of a social representation The very scripting or fabrication of incidents by secret services is an attempt to perpetuate the social representation as communal bond among social networks participants through a conventionalist or coherenitist truth paradigm 8. KEY THIRD TERM: In the context of a fabricated social representation qua target a coherentist/conventionalist truth paradigm as against a correspondence (inner/outer) truth paradigm is more suitable for making sense of collective intentionality and predicates stemming therefrom- its all about maintaining a collective myth, rather than validating hypotheses about the target USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: First and foremost, allegations as being primarily of relational validity and secondarily of truth validity and self-referential qua predicates of a social representation that must be maintained at all costs Clear evidence of fabricated hyperreality through repetitive social situations or social episodes against globally and uniformly tried and tested scripts- the person, the propositional contexts change, the narratives are the same uniformly and globally 9. KEY THIRD TERM: Discursive complicity among lay and institutional discourse both in essence (as direct reflections of contiguous causal chains and univocal dominant paradigms) and in practice; cover ups through shift of institutional exploratory focus from group to individual- the reduction of complexity principle favors scapegoatism and coverups USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: Expert testimonies should be approached not uncritically but in the context of implicit power plays; otherwise significant risk of their contribution to the formation of judiciary attitude [dikaniki pepoithisis] as complicitly biasing value judgments Not only institutional mechanisms act complicitly to social representations fabricated of the target through participants in social networks with demonstrable motives, but in an attempt to cover up their ulterior motives they enhance the complexity of the social context by encouraging to disseminate the target to such an extent, as to waive the possibility of discerning the remote cause that triggered the dissemination of the target qua social representation, which is clearly facilitated by common peoples perceptual inertia, illusory correlations and by the sheer proclivity to engage in Rosss fundamental flaw, that is univocally ascribing causality to the target by disregarding circumstantial evidence or counterevidence. And yet this falsity or this fundamental flaw constitutes the very basis of inherentist / solipsistic epistemic paradigms, which have gained institutional currency not thanks to a discursive superiority (which is not provable) but to their acting complicitly in covering up the complexity of the process of the formation of social representations through social networks and the implicit powerplay inherent thereto. This point is crucial in accounting for how flagging and tagging is created through directed conversations, street theater, staged accidents and the rest well known targeting techniques. In fact, the social cybernetics notion of dynamically co-evolving multi-agent normative ecosystems (eg the bottom-up approach) is a quasi-myth, insofar as the goal is reduction of complexity (for targeted individuals) and the application of control sanctions in case a priori conceived flagging is not adhered to. . [Comm]Unity against a causa finalis / ulterior motive, difference in terms of efficient causes / individual motives: Not only an exceptional criminal activity, multi-act and multi-participant, but of multiple composite causality

[291]

Targeting cases should be viewed through the lenses of multiple, composite causality [ ] , where (i) alternating direct participants and (ii) indirect perpetrators as selves and motives as reasons for participating for (i) and (ii) respectively rest with different referential planes not only between (i) and (ii)- which in itself does not waive the indirect perpetration hypothesis insofar as both participate and are motivated by a causa finalis, yet differ in terms of causae efficiens- but also among indirect perpetrators themselves and among direct participants themselves and throughout time insofar as the very structure of social networks changes. What remains the same throughout goal oriented situations is the modality of their staging and their causa finalis, that is the extinction of the target. The legal technicalities and formal objective/subjective conditionals for affirming this ulterior motive on behalf of a multiparticipant system of indirect perpetration in the context of organized institutional mechanisms and public/private third realm alliances have already proven to be operative in open system dynamics, such as, and based on Roxin;s theory, subjectively (i) not-knowingness among multiple participants (ii) participant motive not necessarily the same with the solicitor of the act, objectively (i) alternating direct perpetrators (ii) extrajudicial system conferring decision based on informal referenda and the precedent of similarly covertly operating secret societies, such as freemasonry (iii) institutional mechanisms complicity, where institutional agents act as apologetic of prior decisions through the extra judicial system of informal social networks. 10. KEY THIRD TERM: MODALITY IS KEY AS THIRD TERM UNITING VARIOUS DIRECT ACTS AND POINTING TO THE INDIRECT PERPETRATOR USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: Crucial in inferring the existence of indirect perpetrators behind direct perpetrators In terms of modality, what evidences itself as a microstructural element across all fabricated social situations is an overarching motive of keeping the target within the contextual loop of social representations and the latent and shifting interaction rules , such as the use of indirect speech and the avoidance of causing bodily harm [with striking exceptions as already illustrated]. Language games, such as playback of the targets prior movements inside and outside his home constitute enactments of the above stated motive and attestations of prior and latent agreement on behalf of participating social actors in fabricated social situations about the exclusionary features that are predicated of the actor. Indirect and covert methods of perpetration pointing a contrario to covert methods of microsocial organizations (otherwise there would be open public executions, such as in totalitarian regimes)the case for crypto totalitarianism and as stated by Roxin it is precisely by virtue of "being uknown to each other" that a secret form of organization is verified Summary of the 10 necessary third terms as nodes in the syllogistic chain concerning the formation of legal syllogisms about the subsumption of empirical/minor premises pertaining to the silent massacre phenomenon under dogmatic law major premises 1. KEY THIRD TERM: relational/pragmatic paradigm over epistemic validity IMPLICATION AND USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: For example, in discerning the motive on behalf of an indirect perpetrator [eg secret services] in the context of open system dynamics for diffusing defamatory information about a targeted social actor to a sociocybernetically structured networked community, thus indirectly forcing them to know the target, or, in terms of secret services lingo, to effect a closure on defamatory information as working hypotheses by virtue of the indirect perpetrators knowingness and maliciously acting on the fact that social actors do not confer value judgments disinterestingly about others qua

[292]

social representations, but, based on a relational paradigm, they will seek to affirm their relationship with network members through the confirmation of defamatory information about a target as their transgressional other, ontologically speaking. 2. Another key third term across incidents is the ubiquitous subjective condition of dolus, premeditation and synchronicity in incidents deployment. IMPLICATION AND USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: for example, in using circumstantail evidence from a social episode as objective and subjective indices for gauging the incidence of the targeting phenomenon insofar as synchronicity essentially presupposes premeditation and premeditation presupposes dolus

3. KEY THIRD TERM community over individual (not as the outcome of monadic voluntary acts, but as a mandatory ontological precondition) AND extrajudicial system of agenda 21 in line with freemasonry USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: For example, very important in filtering witness and expert witness testimony insofar as they are highly likely to constitute echos of extrajudiciary decisions, thus, irrespective of any ad hominem arguments, their origin rests with a community of dolus 4. KEY THIRD TERM: informal legitimation of motives even when they contravene clauses of the formal penal law USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: the existence of secret referenda informally legitimating hate crimes and the overdetermination of a secret communitarian ethos (agenda 21, freemasonry) as psychically complicit [mens rea] in urging social actors to participate in targeting activities knowingly, that is consciously as regards the formal law implications of their activities. 5. KEY THIRD TERM Illusory consensus or collective intentionality as agreement over multilayered motives against the background of asymmetry of information diffusion and decision making power among members in social networks, which by default waives the existence of a speech community of rational agents and/or a rational and disinterested process of decision making about states of affairs and others among social actors, coupled with the ubiquitous psychological mechanisms of perceptual inertia, the abilene paradox, prisonners dilemma USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: very important in terms of allocating reponsibility to actions of direct perpetrators as a significant part of mens rea rests with collective intentionality and ontological cobelonging

6. KEY THIRD TERM dual and complementary motives, ontic (resting with pragmatic self centered interests) and ontological (resting with communitarian, psychological interests) USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: crucial as it is hard to determine the relative weight of each of the above coexisting motives in the perpetration of targeting activities

[293]

7. KEY THIRD TERM: social representations and interpretive schemata as the middle term between observed actions and hypothesized causes- it is not the individial social actor qua individual, but qua narratological and acontextual re[mis]construction that is targeted USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: crucial in allocating responsibility for actions, in drawing causal chains, in discerning relationships among seemingly uknowable social actors and against the background of operative secret societies 8. KEY THIRD TERM: In the context of a fabricated social representation qua target a coherentist/conventionalist truth paradigm as against a correspondence (inner/outer) truth paradigm is more suitable for making sense of collective intentionality and predicates stemming therefrom- its all about maintaining a collective myth, rather than validating hypotheses about the target USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: First and foremost, allegations as being primarily of relational validity and secondarily of truth validity and self-referential qua predicates of a social representation that must be maintained at all costs 9. KEY THIRD TERM: Discursive complicity among lay and institutional discourse both in essence (as direct reflections of contiguous causal chains and univocal dominant paradigms) and in practice; cover ups through shift of institutional exploratory focus from group to individual- the reduction of complexity principle favors scapegoatism and coverups USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: Expert testimonies128 should be approached not uncritically but in the context of implicit power plays; otherwise significant risk of their contribution to the formation of judiciary attitude [dikaniki pepoithisis] as complicitly biasing value judgments 10. KEY THIRD TERM: MODALITY IS KEY AS THIRD TERM UNITING VARIOUS DIRECT ACTS AND POINTING TO THE INDIRECT PERPETRATOR USEFULNESS FOR THE INTERPRETATION AND APPLICATION OF DOGMATIC LAW CONCEPTS: Crucial in inferring the existence of indirect perpetrators behind direct perpetrators

In a nutshell: Need for interpetive qualification of key terms in formal legal clauses AND/OR justification in the light of the above third terms why minor premises should be subsumed under particular major premises of dogmatic law The globally common ontologically coherent lifeworld of targets, coupled with a uniform mode of perpetration and the rest "targeting" conditionals (subjective and objective) in relation to the time horizon within which targeting incidents have been reported point beyond any reasonable doubt to agenda 21 as a globally binding blueprint of microsocial engineering through compulsory participation in social networks and their structural/nominal similarities to traditional freemasonry. The conversion and indoctrination tactics echoed in agenda 21 formal implementation action points and the targeting activities explicitly, yet informally legitimated for its implementation point to a utopia/dystopia paradigm, hence the validity of arguing judging from the effects to a contrario the common blueprint as animus socii.

128

Defacto authority is not a necessary precondition for making de jure judgments , especially in the face of the political aspects of de facto authority which in this case are brought into question

[294]

Thus, insofar as distinctive types of crime are discernible according to distinctive classes of subjective and objective conditions (eg theft of animals) targeting should be typified in law insofar as law is dynamic and changes based on shifting public mores and the types of criminal activity to which these mores give rise, by analogy to the example of duel referred to in the beginning of this chapter. Otherwise, the law is discursively complicit alongside other classes of institutional discourse in the perpetuation of targeting phenomena. THE EXPANSION (OR RATHER STRETCHABILITY) OF THE APPLICATION OF RULES OF DOGMATIC LAW IS TRULY TESTED THROUGH THE CONSIDERATION OF PRAGMATIC ALONGSIDE THE SEMANTIC ASPECTS OF ARGUMENTATION AND THE FACTS THEY PORTRAY, INSOFAR AS exemplary reasoning processes that abduce deductively applicable principles operate not just at the level of testing arguments for validity, but also at the deeper level of discerning the very rules of deductive inference that help to define the concept of validity itself The dialectical relationship between deductive and abductive logic in the formation of deductive principles has already been illustrated in chapter 2 by allusion to the Peircian approach. Given the above potential for factoring in the interpretive equation pragmatic qualifiers by putting the phenomenon at hand in perspective through an ethnomethodolgical approach (especially useful in the face of (i) radically changing mores demanding a reevalutation of fundamental premises (ii) the novelty , thus indeterminacy based on legal precedents,of the phenomenon under scrutiny both as regards the technicalities whereby it is operationally carried out, as well as the motives and objectives that condition it) what is evidenced is the mandatory task of emphasizing contextual facets. In the context of changing mores there is a need for equivalently new rules for inferential judgments, eg matching empirical phenomena as minor premises with major premises of dogmatic law; an issue of law methodology or metalinguistic issue concerning the correct translation of minor into major premises, which is enabled in the light of the validly inferred experiential categories as analytical principles and the fundamental 10 third terms as nodes in syllogistic chains. Thus, the issue of subsumption is not merely epistemological (eg how we know dispositional and subjective elements and correctly subsume objective elements under major premises) but primarily methodological, how we come about making sense of the referential horizon of minor premises as fragments of an ontologically coherent empirical reality and pursuant thereto subsume them under major premises. It is a matter of reopening abductively inferential rules that have crystallized as deductive and reinscribing them in an interpretive circle, starting with a new ethos as a new ontology of relationships (macro) that is evidently reflected on a micro level and ending with particular cases and incidents within the continuum of individual targeting cases. This is why it is a case of multiple composite causality , multiact, multiparticipant in the context of organized power mechanisms. In structural homonymy to the above we encounter multilayered motives (ontic, ontological), multiple referential planes and regimes of signs- in tandem with open system dynamics and the opneness of the new communitarian ethos itself129, as macro conditionals or causae remotae resonating in the mode of perpetration and the way complicity is formed through indoctrination in the context of a social movement

4.3 The informal and formal judiciary aspects of the silent massacre phenomenon as regards separate criminal activities and the ontologically coherent nature of their plenum Pursuant to exposing in chapter 3 why the communitarian/utopian ethos of agenda 21 does not constsitute an ideal speech community of social actors, but pragmatically driven microsocial organizations horizontally structured and through allusion to classical tried and tested sociological, philosophical, anthropological and psychological perspectives why the conflict and power and group decision making mechanisms involved in communitarian settings are favorable to and by
129

For example see NWO without ideologies paper presented at the club of Rome, Feb 2003

[295]

default conducive to criminal activities such as the silent massacre phenomenon I will now proceed with the justification of the legal framework within which this phenomenon in general and in my case in particular should be subsumed. Prior to proving why the silent massacre phenomenon is a novel and exceptional case of criminal activity and why it should be subsumed under the premeditated murder attempt and indirect perpetration legal clauses and why Claus Roxins interpretive schema of indirect perpetration in the context of organized mechanisms of power should be applied in this type of criminal activity, I hereby list local (Greek) and international criminal law clauses that have been breached by distinctive acts of perpetration:

27 28 29 30 31 34 35 39 42

malice / dolus (direct aforethought / indirect / eventualis) Extreme Reckless Disregard liability based on the outcome of an action real deception judiciary deception mental disorders provocateur of mental disorders duration of confinement in a psychiatric institution attempted crime Incomplete attempt ; special case of incomplete attempt: impossible attempt:the qualification to the rule relating to putative crimes, if you think that you are committing a criminal act but the act is in fact not criminal then you havent committed a crime and vice versa WHICH EXPLAINS THE DIFFERENCE IN REFERENTIAL PLANES AND THE MULTIPLE REGIMES OF SIGNS retreat from attempt Coperpetration

43 44 45

46

SOLICITATOR OF A CRIME / direct coperpetrator or indirect perpetrator Occasionally, individuals planning criminal activity do not intend to personally commit the unlawful act. Instead, they intend to solicit and encourage others to carry out the criminal conduct. A person who solicits, urges or encourages another to commit an unlawful act has gone beyond the stage of simply having bad thoughts and into the realm of acting upon those thoughts. The act of soliciting another to commit a crime, although still part of the preparatory or planning stage of criminal activity, rises to the level of criminal conduct

[296]

47

ACCESSORY OR AIDING AND ABETTING LIABILITY A person can be liable for the criminal conduct of another if he provides assistance before or during the commission of the crime. This type of criminal liability is referred to as accessory or aiding and abetting liability. Accessory after the Fact If the criminal conduct is complete, any assistance provided at that point is considered assistance after the fact, and the person providing assistance is guilty as an accessory after the fact. ON SPECIAL RELATIONSHIPS AMONG PARTICIPANTS [The Conspiratorial Agreement and the Parties to the Conspiracy A conspiratorial agreement can be written, verbal or implied by conduct. Because a conspiracy involves an agreement between parties, in some instances simply identifying the parties who have actually agreed to engage in the unlawful conduct will reveal the parties to the agreement / The Unlawful Act Requirement As discussed earlier, a conspiracy involves an agreement between two or more persons to commit an unlawful act. Overt Act The overt act element of a conspiracy is not very difficult to prove. In fact, at common law, proof of an overt act wasnt even required. Many jurisdictions later included the overt act requirement because it provides some circumstantial evidence of the conspirators intent to proceed with the objectives of the conspiracy. In other words, the overt act demonstrates that the conspirators have] moved beyond the stage of mere bad thoughts. involuntary commitment crime out of avarice human torture agent provocateur: a person WHO ACTIVELY ENTICES, ENCOURAGES OR PERSUADES SOMEONE TO COMMIT A CRIME; ALSO SEE THE NOTION OF institutional agenterpetration ADOPTED BY THE ICC Conspiratorial Liability As explained earlier, the crime of conspiracy is punished because of the special danger presented by group activity that has a criminal objective A Conspiracy to Kill acts of terrorism

49 . .69. 81

186

187-1 187-1 .187.-1. , 8, :

[297]

) ( 299), ) ( 310), ) ( 311), ) ( 322), ) ( 382 . 2), ) ( 273), ) ( 279), ) 1 8 .. 181/1974 " " ( 347 ), 188 190 221 224 225 226 . 228 229

The distinguishing factor between murder and manslaughter is the concept of malice aforethought. Murder is an unlawful killing with malice aforethought, while manslaughter is defined as an unlawful killing without malice aforethought serious injury deadly injury theft damage of foreign property commonly dangerous damage food tampering EMR related (ionizing; cross refer to papers demonstrating the dangers and symptoms to non ionizing radiation and the relevant European and International legislatures against psychotronic weapons using non ionizing radiation) participation in unlawful syndicate disruption of peace false medical documentation perjury false pretrial testimony perjury of expert testimony deception to commit perjury false allegation The Crime of Covering Up A person may be responsible for the criminal conduct of another if he or she assists, encourages or facilitates that conduct with the intent that the crime be committed. Abuse of Power breach of duty commonly dangerous damage

232 239 259 273 279 282 299 306 308

food poisoning
poisoning of pet food

Premeditated homicide/Intent to Kill/VOLUNTARY MANSLAUGHTER


Exposure Assault with Intent to Inflict Serious Bodily Injury

[298]

309 325 326 333 361 363

unprovoked bodily injury

Intent to Do Serious Bodily Harm


illicit detention unconstitutional detention threat insult intentional and concerted defamation with malice aforethought LARCENY Larceny is the trespassory taking and carrying away of the personal property of another with the intent to permanently deprive the owner of the property. EMBEZZLEMENT The main difference between the crimes of larceny and embezzlement is that the embezzler usually has lawful possession of the property at the time of the taking. petty larcency and embezzlement foreign property damage Blackmail/extortion FRAUD AND FALSE PRETENSES The crime of fraud or false pretenses requires that the defendant make a false statement of past or present fact that induces the victim to relinquish title to property. Unlawful and intentional making of a misrepresentation which causes an actual or potential prejudice to another. The Innocent Instrumentality Sometimes a person contemplating criminal activity procures the assistance of another through deception. If the person actually committing the crime is, for whatever reason, unaware that he or she is engaging in criminal conduct, then that person is considered an innocent instrumentality of the solicitation. vs Adequate Provocation provocation of unrest illegal copying of keys

372

375 377 381 385-1

386

389 416 446 .

Ar 148

espionage

Relevant international clauses International Criminal Law

[299]

Based on Article 3 of the Geneva convention, violations of its provisions need not be committed by an identifiable group of individuals130; Based on Amicus Curiae, International Criminal Law demands cross-states intervention when international crimes occur ECHR

Convention for the Protection of Human Rights and Fundamental Freedoms as amended by Protocol No. 11
Article 1 . Obligation to respect human rights The High Contracting Parties shall secure to everyone within their jurisdiction the rights and freedoms defined in Section I of this Convention. 3 SECTION I . RIGHTS AND FREEDOMS Article 2 . Right to life 1 Everyones right to life shall be protected by law. No one shall be deprived of his life intentionally save in the execution of a sentence of a court following his conviction of a crime for which this penalty is provided by law. 2 Deprivation of life shall not be regarded as inflicted in contravention of this article when it results from the use of force which is no more than absolutely necessary: a in defence of any person from unlawful violence; b in order to effect a lawful arrest or to prevent the escape of a person lawfully detained; c in action lawfully taken for the purpose of quelling a riot or insurrection. Article 3 . Prohibition of torture No one shall be subjected to torture or to inhuman or degrading treatment or punishment. Article 5 . Right to liberty and security 1 Everyone has the right to liberty and security of person. No one shall be deprived of his liberty save in the following cases and in accordance with a procedure prescribed by law: a the lawful detention of a person after conviction by a competent court; b the lawful arrest or detention of a person for non-compliance with the lawful order of a court or in order to secure the fulfilment of any obligation prescribed by law; c the lawful arrest or detention of a person effected for the purpose of bringing him before the competent legal authority on reasonable suspicion of having committed an offence or when it is reasonably considered necessary to prevent his committing an offence or fleeing after having done so; d the detention of a minor by lawful order for the purpose of educational supervision or his lawful detention for the purpose of bringing him before the competent legal authority; e the lawful detention of persons for the prevention of the spreading of infectious diseases, of persons of unsound mind, alcoholics or drug addicts or vagrants; f the lawful arrest or detention of a person to prevent his effecting an unauthorised entry into the country or of a person against whom
130

MACRO CRIMINALITY IS AN ACCEPTABLE PHENOMENON OF INDIRECT PERPETRATION IN ORGANIZED POWER MECHANISMS

[300]

action is being taken with a view to deportation or extradition. 2 Everyone who is arrested shall be informed promptly, in a language which he understands, of the reasons for his arrest and of any charge against him. 5 3 Everyone arrested or detained in accordance with the provisions of paragraph 1.c of this article shall be brought promptly before a judge or other officer authorised by law to exercise judicial power and shall be entitled to trial within a reasonable time or to release pending trial. Release may be conditioned by guarantees to appear for trial. 4 Everyone who is deprived of his liberty by arrest or detention shall be entitled to take proceedings by which the lawfulness of his detention shall be decided speedily by a court and his release ordered if the detention is not lawful. 5 Everyone who has been the victim of arrest or detention in contravention of the provisions of this article shall have an enforceable right to compensation. Article 8 . Right to respect for private and family life 1 Everyone has the right to respect for his private and family life, his home and his correspondence. 2 There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others. Article 9 . Freedom of thought, conscience and religion 1 Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief and freedom, either alone or in community with others and in public or private, to manifest his religion or belief, in worship, teaching, practice and observance. Article 10 . Freedom of expression 1 Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2 The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a democratic society, in the interests of national security, territorial integrity or public safety, for the prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation or rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary. Article 13 . Right to an effective remedy Everyone whose rights and freedoms as set forth in this Convention are violated shall have an effective remedy before a national authority notwithstanding that the violation has been committed by persons acting in an official capacity. Article 14 . Prohibition of discrimination The enjoyment of the rights and freedoms set forth in this Convention shall be secured without discrimination on any ground such as sex, race, colour, language, religion, political or other opinion, national or social origin, association with a national minority, property, birth or other status.

[301]

4.4 My allegations regarding individual instances of the ontologically coherent plenum of the attempted premeditated murder against me
In particular, and in continuation to chapter 3 analysis of two separate incidents pertaining to my case, herebelow follows a table listing separate incidents, which individual clauses of the Greek criminal law were breached in each instance and which criminal law clauses have been breached in total (that is across the plenum of individual incidents in the context of the ontologically coherent continuum of the silent massacre and the targeting experiential categories to which they pertain, based on their listing by FFCHS (cf Chapter 2): 4.5 What are the apodeictic conditionals for premeditated attempted murder? In cases of premeditated and deliberate attempted murder the claimant must prove that the defendant premeditated and deliberated. It is important to understand that premeditation and deliberation are not mental states for the crime of murder, but are instead aggravating factors surrounding the mental state of intent to kill. Premeditation and deliberation can take place over a short period of time (eg one minute) or a alonger period of time (eg four year). How can we gauge the existence of intent? - From actions suggesting a planning activity prior to the crime (in this case a mechanism of surveillance by virtue of which synchronicity is attained and the intentional dissemination of defamatory information about the target) - The manner in which individual acts of perpetration are committed (eg through omissions in recording crucial circumstantial aspects making up an incident, obvious attempts at covering up certain aspects , while overempahasizing others- such as classical prppaganda techniques of overstretching value judgments and claims and through agreement conditioning the validity of a univocal rhetoric) - Motive or reasons for committing individual acts of perpetration (multilayered, as already explained, covering a wide spectrum of economic, pragmatic, psychological, ontological reasons) Occasionally, individuals planning a murder attempt do not intend to personally commit the unlawful act, Instead, they intend to solicit and encourage others to carry out the criminal conduct. A person who solicits, urges or encourages another to commit an unlawful act has gone beyond the stage of simply having bad thoughts and into the realm of acting upon those thoughts. The act of soliciting another to commit a crime, although still part of the preparatory or planning stage of criminal activity, rises to the level of criminal conduct, as in the case of indirect perpetration. As a prerequisite for the crime of solicitation, the solicitee must understand that he is being asked to engage in criminal conduct and ultimately refuse to go along with the plan. Typically, the solicitee is the only witness to the transaction; if he does not interpret the request of the solicitor as an urging to engage in criminal conduct, then there is little chance that the solicitors conduct will be reported to the authorities. However, in the case of indirect perpetration in organized mechanisms of power, as quoted in chapter 2 by Claus Roxin, the inverse holds insofar as it by virtue of the participants being uknown to each other (at least in an overt sense as would be established by a confession to having made an agreement) that indirect perpetration is inferred. BUT WHAT HAPPENS IN CASES AS ANNA PSAROUDA MPENAKI NOTES, WHERE A DIRECT PERPETRATOR HAS TAKEN AN OATH OF SILENCE NOT TO REVEAL THE CHAIN OF COMMAND, or in the case of agenda 21 informal social networks that operate complicitly precisely by virtue of their informality, hence by default the impossuibility of extracting a statement as to the indirect perpetrator(s who issue commands? In my case, there is hard evidence concerning my who refused to name which doctor or associate urged her to proceed with an act of involuntary commitment. In fact, if there is an agreement by the solicitee to carry out the criminal conduct, then the crime is no longer solicitation and becomes instead the crime of conspiracy. This condition will be qualified in due course.

[302]

Sometimes a person contemplating criminal activity procures the assistance of another through deception, while we know from fact that in the case of secret societies such as freemasonry, deception and diffusion of information on a need to know basis among varying degrees members is a PREREQUISITE. If the person actually commiting the crime is, for whatever reason, unaware that he or she is engaging in criminal conduct, then that person is considered an innocent instrumentality of the solicitation. This point is particularly crucial regarding the information diffusion process in discrediting campaigns , where the indirect perpetrator hiding behind the scenes affords to motivate social actors to engage in targeting methods, which are carried out by virtue of a trusted relationship with the solicitor or out of fear or because of command or out of sheer pragmatic criteria. Also this corroborates the argument raised in chapter 2 about the seeming unconnectedness of perpetrators, yet the mode of conducting the activities illustrates clear planning, intention and control of the targets movements. Therefore, despite the lack of overt agreement as a missing link between the direct and the indirect perpetrator, the very missing link becomes self evident through the mode of carrying out the act, as the existence of a perpetrator behind the scenes, to use Roxins term, controlling through remote surveillance technologies the targets movements and issuing commands or suggestions to alternating direct perpetrators. Everyone knows that illicit break-ins constitute a criminal activity. Even if the chain of command reaches upper echelons of social network decision making, there is no innocence instrumentality on behalf of the direct perpetrator. A person can be liable for the criminal conduct of another if he provides assistance before or during the commission of the crime. A person who provides assistance to another is considered dangerous because, although he may not actually commit the offense, he has the necessary criminal intent and engages in some conduct thath furthers the criminal activity. An accessory may be criminally liable for providing physical or verbal assistance or encouragement to another and may be liable without regard to whether he is present during the commission of the offense. 4.6 The beginning of the act131 of attempted premeditated murder as silent massacre (with yet overt and demonstrable objective facets) against me and why it constitutes a multi-act crime with multiple perpetrators E. Symeonidou-Kastanidou, a prominent Greek legal scholar, points out in her article The beginning of an act of perpetration 132 ( ) that in the Greek legal science significantly divergent viewpoints are voiced regarding the composition of attempted perpetration cases Franks approach is conventionally used in standard legal practice, which accepts as the beginning of the act of perpetration133 every individual activity that constitutes part of the objective precondition of the crime, as well as those activities, which by virtue of their necessary interconnectedness to the standardized acts intuitively appear to be partia totalis and in case of failure to undercut them by any means, they lead directly to the crimes accomplishment [ Frank- - ] . Therefore, in my case, the beginning of the attempts at silent massacre against me are situated temporally in September 2007 and upon my return to Greece from the UK, which is when I started
131

The notion of the act , as noted by Kastanidou, is itself laden with inrepretative issues, and concepts such as while in the act [ ] , pointing not only to spatiotemporal points , but to a continuum or an act that spreads through time. In Heideggerian terms, the act constitutes discreet ontic points in an ontological horizon 132 [Attempted perpetration issues in Greek criminal law] Sakkoulas Editions 1988 133 Also see Bitzilekis, as above quoted, , (regressus ad infinitum)- causae remotae

[303]

experiencing intensive mobbing, gang stalking and gaslighting, the far and wide circulation of defatamory rumors about me, the aforementioned unsolicited and covert drugging attempts on behalf of my , distancing of my parents and indirect talking with an apparent intention to impose a univocal rhetoric of individual responsibility for everyhting I have been experiencing (confirming Girards christological paradigm and Judith Butlers analysis on the manufacture of guilt and the literature on the social manufacturing of psychopathy). , my parents acting out as acting on command, playback of coversations I held with my father from random passengers on the beach and other public places (evidence of audivisual surveillance), complicit silence on behalf of a legal advisor regarding my allegations to conspiracy, recruiting agencies not returning my calls upon sending over CVs, and this was back in September 2007 and until the end of February 2008 when I managed to find an opening matching my professional background and career objective. As already stressed, the subjective elements of my ontologically coherent experience (as a commonly used descriptor in dogmatic law reflecting the claimants lifeworld, which in Heideggerian terms should rather be rendered as ontically coherent experience) match the allegations raised by targeted individuals in the respective literature, while meeting certain of the objective conditions of a multiparticipant criminal activity, as already illustrated. Lunderssen seeks to establish the PARTICULARLY objective injustice of participation from the perspective that THE CAUSATION OF THE SAME RESULT from MULTIPLE PERPETRATORS meets one DEMONSTRABLE CRIME or corresponds to multiple levels of the same crime. [O Luderssen ]134. In terms of the mechanics of social interaction favoring the formation of social representations and the decision to act thereupon it has been illustrated that the adoption of a FUNCTIONALIST paradigm (also echoed in the common truthfinding procedure in legal proceedings) or a mechanistic outlook towards the transition from simple thought to motive to action (either as direct or indirect perpetration) is far from being an accurate description of the supple process in the contexts of suggestibility, persuasion, coercion, indoctrination and a plethora of conscious, preconscious and unconscious processes that are operative during these formative stages. 4.7 Why my case constitues an attempt at multi-act premeditated murder with multiple perpetrators? The attempts at resolving to what extent multi-act, multi-participant and moreover EXCEPTIONAL and NOVEL forms of criminal activity, such as the silent massacre phenomenon, and the subjective/objective conditions that must be met in order to demonstrate by the tenets of dogmatic/formal criminal law, while taking into account essentially differentiating , informal and intrepretatively distinguishable facets, the existence of such a type of criminal activity, have instigated considerable and lengthy discussions among legal scientists. The main typologies of relationship to criminal activity, as recognized by Greek, German and international scholars in a multiparticipant crime consist in:

134

[key responsibility for the act, either through direct perpetration or through soliciting the act] [coperpetration]135

, , , 1988, [. Charalambakis, Thoughts on basic problems of participation in the Greekm criminal law, Sakkoulas Publications 1988] 135

[304]

[acting in parallel with others, but not necessarily motivated by the same cause in carrying out the act]136 [indirect perpetration, or the solicitor behind the scenes, in Roxins terms, or the person(s) or the MECHANISM responsible for motivating through information or through the provision of material means to carry out the act] [a form of paraytoyrgia or multiparticipants acting dircetly in parallel with intent without being necessarily motivated by the same motive(s)]137 [simple participation, either voluntarily or involuntarily in the criminal activity]138 [participation in organized mechanisms of power, Roxins theory]

I will start by eliminating perspectives in order to move from the less to the more plausible in my case and with view to demonstrating that the silent massacre phenomenon constitutes a NOVEL
( ) ( , .., .. ( 1993)

136

, , , , ( )
137

, ( ) , .., .. ( 1993) 1, - ( )
138

( ) , , .., .. ( 1993, Issues with participation in a crime, I.E.Manoledakis, A.I.Charalampakis, Sakkoulas Publications 1993, 1, - ( ) 45 , . 187

[305]

and EXCEPTIONAL multiact, multiparticipant act of premeditated murder, as a form of indirect perpetration in the context of organized mechanisms of power against the background of a blueprint for social reengineering called agenda 21 (or planet 7): 4.8 Why the multiple acts of perpetration as above cited are not isolated, hence not falling under the umbrella of simple participation? Is it just because the claimant claims so and legitimately so under the auspices of the ontologically coherent and clearly patterned and spatiotemporally situated beyond all reasonable doubt experience, which also matches the numerous allegations and narrative accounts on behalf of the community of targeted individuals? Certainly this is a valid subjective condition,, which backed by evidence from relevant literature about these tactics constituting methods of psychological warfare (Cointelpro, MK Ultra) and silent massacre organized by secret services in the context of organized mechanisms of power and democratic regimes. What is objectively evident in terms of arguing against simple participation, thus waiving, the organizational and concerted aspect of these spatiotemporally separate activities that have taken place in the course of four years is the common element of synchronicity with the targets movements and the univocal rhetoric that is recruited by significant and insignificant others against the targets allegations, both in the public and private sectors and in the third realm (agenda 21) sector, and the apparent attempts at covering-up through inversion and agreed falsification of statements made against the background of concrete evidence, which matches the usual mode of treatment of targets allegations as illustrated in chapter 2. The primary motive for attempting so forcefully to cover up all these allegations clearly demonstrates on the inverse and through the same abductive turn employed by Roxin (while legitimating his claims about silent complicity among multiple perpetrators in the context of indirect perpetration where the indirect perpetrator is uknown to the direct perpetrator (or there is no overt evidence as to their agreement), that even though the multiple participants may not be known to each other (and the echelons of a command chain not necessarily known to them), , their patterned movement of action and the synchronicity of the events point to a controlled environment. Also, as Androulakis remarks regarding the issues that arise in terms of proving the subjective dimensions of a multiparticipant crime, there is no need for real communication among multiple participants, every condition suffices for causing the decision to participate [ ] One might say and there is plausible reason for claiming this (based on concrete and demonstrable discursive evidence) that the secret services orchestrate these activities, which is a common reality for targeted individuals. The attempt is a way of perpetrating the crime against the background of a complete subjective dimension, but with incomplete objective dimensions[ , ]139 Insofar as the audiovisual surveillance technology is owned and controlled by the secret services and insofar as both land based and judging from the generated electromagnetic harassment symptoms sattelite based surveillance are part and parcel of targets ontologically coherent reality (with demonstrable proof of some of its facets) we may plausibly and through the elimination of less likely hypotheses infer that secret services, and occasionally the police sanctioned under agenda 21 to enforce the implementation of the blueprint, are responsible for carrying out targeting
139

ibid

[306]

activities. This is beyond reasonable doubt. What is still not apparent though is the chain of command. Yes, secret services personnel may be acting out as both indirect perpetrators and direct participants in a framework of organized institutions of power, but in a democratic regime, such as Greece, operating in a highly interdependent global environment, the indirect perpetrator(s) might be anyone with access to the secret services as enforcers of silent massacre contracts , from the local President of democracy to the President of Botswana. Insofar as it is highly unlikely to uncover the chain of command , as in contradistinction to Roxins theory , as already illustrated, participants do not act in the context of closed, ideologically fuelled systems, but in open systems, what we may plausibly use is Roxins heuristic of the machine, which, in this case is the social networking mandate in the agenda 21 blueprint, which also corroborates the volitional element and the existence of dolus [as complete subjective dimensions] in participants participation in targeting activities, as they view this not as an act of inflicting torture upon a target, but as a way of claiming their identity as members of a mandatory social networking mechanism through seemingly innocent (in some instances) acts of affirming the targets difference as not member in the social networking mechanism. Their synchronicity with the targets movements clearly demonstrates and objectively (as against a potential counterargument from the possibility to extract a confession from a participant of having received a command- even though the gangstalker groups organizational structure and intragroup communications code has already been cited as evidence) corroborates the organizational aspect of the individual acts of perpetration, thus pointing to the social networking machine and waiving the simple participation hypothesis. As already noted in the Reasons for participating in targeting activities (in schemes such as for example community policing) motives vary to such an extent as to waive the appearance of an agreement among participants for carrying out the acts, while the ulterior motive rests with the indirect perpetrator(s). An apodeictic condition that has been met almost uniformly in almost all of the abovementioned multiple acts or incidents or social episodes is the subjective elements of dolus (in varying degrees and by incidence as directus or indirectus/eventualis and in varying degrees the existence of the subjective condition of intent or a voluntary decision to engage in the act and motive or an identifiable driving force behind the perpetration, as will be illustrated in the ensuing sections.. 4.9 Why this is not a case of acting in parallel with others while not being motivated necessarily by the same cause? This typology of perpetration is a quasi explanation of the individual acts of perpetration, which fails interpretatively to account for the premeditated murder hypothesis through a multiact, multiparticipant crime to its full blown extent. Indeed, in isolated acts of perpetration (such as the bikers attack and the stabbing, cf P23 in the list of criminal incidents) four perpetrators acted complicitly in a case of assault and battery, serious bodily injury, and property damage and werent it for my escape the incident might have evolved into a murder, hence allegations about an incomplete case of attempted murder might be raised with regard to that particular incident. What is lacking in the probative value of this discreet phenomenon vis a vis the probative value of the multiact hypothesis is that it constitutes a drop in an ocean of a plethora of incidents in the context of my case of silent massacre, while meeting the objective condition of synchronicity with my movements and the institutional coverup of the event in line with all the rest activities, which demonstrates the above quoted explanatory hypothesis by Lunderssen140. Who is the accessory in
140

ex ante

[307]

this case that provided information about my movements, just like who is accessory by providing information to a person I had never met before who demonstrably made defamatory allegations against me in a context of street theater, to quote just a few out of the plethora of demonstrable targeting incidents as above cited? The one dispensing information about the prospective victims movements is also an accessory [ ] , E. Symeonidou Kastanidou, as above- also cross-refer to the cycle of information method employed by secret services in the Handbook of Intelligence studies and how operative hypotheses that are manufactured of the target are diffused to civilian snitches for confirmation OR MANUFACTURING141 Thus, the indirect perpetrator who yielded accessory information about my movements and diffused defamatory information about me behind the scenes gets away, as Roxin remarks. Did the bikers know the person who made defamatory allegations about me? Hardly likely, although not totally unlikely, but in either case this is of minor importance in inferring validly the existence of indirect perpetrator(s). Are these instances situated in discreet spatiotemporal points with a time lag of two years in a four year targeting horizon? Yes. Are there common elements in the preplanning phase (article 47 of the Greek criminal law) conditioning the multiple acts? Yes, synchronicity and information. Who has the technological power to monitor indoors and outdoors the target;s movements and motivate others to participate in targeting activities? Unquestionably secret services. Who is the indirect perpetrator behind the scenes? Secret services. Are secret services entitled to violate a persons privacy and engage in all sorts of atrocities? Thousands of pages demonstrate that yes, as they are exempt from criminal statutes and act under special national security acts. Under agenda 21s provision that local authorities should enforce the paradigm of comulsory social networking are they legitimated to apply their tactics across social network participants? Yes and the target could not know. What is the causal nexus in this case? Simply a matter of attaining an ontologically valid ulterior cause of manufacturing, in terms of christology, a modern star upon whom relief on behalf of social network participants may be granted and upon whom the symbolic projection of members vices may be projectively laid? Certainly, but not exhaustively, as causes and motives are multilayered, meaning that a low-level participant in a
, (43, 1) 141 Also see Analytic Culture in the US Intelligence Community: An Ethnographic Study/ Dr. Rob Johnston The Traditional Intelligence Cycle process resembles many other production cycles. It is prescriptive, structured, Planning and direction made up of discrete steps, and expected to yield a specific product. The traditional depiction of the Collection Dissemination process in the Intelligence Cycle, however, is not an accurate representation of the way intelligence is produced. The notion of a Processing Analysis cycle assumes that the steps and production will proceed in the prescribed order and that the process will repeat itself continuously with reliable results. This type of representation gives the impression that all inputs are constant and flow automatically, but it does not address elements that may influence the movement of the cycle, positively or negatively The Intelligence Cycle is represented visually to provide an easy-to-grasp and easy-to-remember representation of a complex process. Although this type of representation may make the flow of information and the interrelationships of steps easy to identify, it does not indicate who or what may affect the completion of a step or the resources needed to begin the next step. In its concise form, then, the visual representation of the Intelligence Cycle is reduced to a map of information handling. Without explicit descriptions of the steps in the process or the benefit of prior knowledge, it can raise questions of accuracy and completeness and can occasion misconceptions, particularly concerning the roles and responsibilities of intelligence analysts.

[308]

chain of command may be carrying out a targeting activity because he as an ex-con on patrol (for which there is evidence from targeting cases), a random member having fun, a member of an agenda 21 network whose leader is vying your house and a member of a social network that is vying your intellectual property and your career prospects. Therefore, perpetrators in individual acts are motivated by different motives, there is clearly intent (otherwise they would not participate) , they act in parallel (even though spread out in time), but they do not match the ubiquitous fact of synchronicity and mode of treatment of a targets allegations, which points univocally to a higher chain of command, hence a case of indirect perpetration in the context of organized mechanisms of power. 4.10 Is it a case of complicity142 in the context of indirect perpetration143 carried out through organized mechanisms of power? Whose dolus and who is animus auctoris and who is animu socii?

Yes, A critical condition for affirming the existence of coperpetration [my note: and by implication indirect perpetration, which is characterized by a similar level of complicity] is to point out each time whether the sum of the multiple acts translates into a cause of death144 A facilitating or
142

128

143

.. , (Chorafas perspective to indirect perpetration) ; () o () "" delictum proprium , conditio sine qua non (Androulakis perspective on indirect perpetration); , (Benakis perspective on indirect perpetration); 144 , in I.E.Manoledakis, A.I.Charalampakis, 1993 as above . Also emphasizing the quasi paradoxical nature of attempted murder insofar as what appears as a working hypothesis (such as

[309]

multiplicative causality exists between a conditioning act and the final result, resulting in a degradation of the individuals position, by virtue of which the individual is rendered vulnerable to the perpetrating act. It is not the act per se that is the cause of death, but its effects as enablers and multipliers of the cause of death [ , . ]145

the silent massacre) would be confirmed as such only post mortem! To , . . BASED ON THIS CRUCIAL POINT RAISED BY E.SYMEONIDOU KASTANIDOU, THAT IS THE EQUIVALENCE IN PROBATIVE VALUE BETWEEN THE CRIMINAL PLAN AND THE OBJECTIVE FACTS OF MULTIPLE ACTS, WE MAY LEGITIMATELY INFER THAT THE MULTIPLE ACTS OF PERPETRATION OVER A PROLONGED PERIOD OF FOUR YEARS CLEARLY DEMONSTRATE A PREMEDITATED MURDER ATTEMPT.. How do individual acts contribute to the ulterior motive of killing me? Through the formation of a dystopian spiral, insofar as the sum of the acts assumes amplified value, and their resonating after effects constitute the conditioning platform for carrying out the silent massacre. , as stressed by Kastanidou AND IT IS PRECISELY THIS POINT THAT WORKS AS AN INSTITUTIONAL COVER UP OF THE ONTOLOGICALLY COHERENT DISCREET ACTS OF PERPETRATION, that is THE OMISSION TO EMPHASIZE THE MULTIPLICATIVE EFFECTS OF INDIVIDUAL ACTS ON THE TARGET. As Kastanidou notes [and her argument is very indicative of what happens to the target during illicit break ins and food tampering , , . , . . , , .THEREFORE, AS KASTANIDOU REMARKS, THE ISSUE OF COPERPETRATION [and by implication of indirect perpetration] IS AXIOLOGICAL [thus resting with the judiciary] AND NOT APODEICTIC OF THE EXISTENCE OF A CAUSAL CHAIN. An act of perpetration by definition alters the lived world of the victim, not to mention AN ONTOLOGICALLY COHERENT EXPERIENTIAL NEXUS SPANNING A FOUR-YEAR PERIOD. An act is every change effected on the external environment as an outcome of human will Ap;ostolos Charalampakis, (Criminal Law Sketchmap, Sakkoulas Publications), who also emphasizes through the example of parallel acts of perpetration the importance of aggregate causes. [ ], echoed in the above argument by Kastanidou on the multiplicative effects of multiple acts of perpetration. ( 285/1965). , , , , (A.Charalampakis) .

[310]

[ ].Therefore we may safely assume that we are confronted with acts that violate the protective social contours of the individual, rendering it vulnerable to the perpetrators intentions [ , ]. What must be qualified is the level of complicity of each perpetrator in each act (even when they remain uknown to each other) , who is a direct and who is an indirect perpetrator and what is the organizational mechanism. What should be clarified is why there is a clear pattern in the multiact instances, hence why they are complicit OVER AND ABOVE the complicity of perpetrators in individual acts. From a subjective conditions perspective the institutional mode of treatment of allegations through the employment of a univocal rhetoric even when hard evidence (assaults & battery, shooting, defamation) to the contrary is presented, which demonstrates the incidence of dolus. From an objective conditions perspective, the cover-up of the true and evidently so causal chains that led to individual acts of perpetration point to a crime by virtue of omitting crucial circumstancial and hard evidence pertaining to individual acts, biased recording of factual evidence on behalf of institutional authorities and/or not taking appropriate action146. WHAT IS IT THAT THEY ARE TRYING TO COVER UP SO EAGERLY? The existence of the silent massacre phenomenon and the dystopian closed feedback loops conditioning the target in a downward spiral. Why is it a matter of private/publc alliances, favored by agenda 21 or the eloquently called third realm? By virtue of the participants appearing to be common citizens, yet when it comes to the incidences recording by institutional agents a selective process of recording evidence with view to shaping a univocal rhetoric is blatantly followed (and this is also recorded in various targets accounts), which third sector alliance points indexically and by virtue of the very uniform properties in the mode whereby acts are peroetrated and their phenomenological rendition is chanelled according to background assumptions about the target by institutional agents, to an organized mechanism of power. Is there evidence of the participation of freemasonry? By virtue of the structural and nominal similarities between agenda 21 and freemasonry as already pointed out in Chapter 1 and based upon precedent conditionals as alleged in this chapter, definitely yes. This brings us back to the fundamental issues analyzed in the previous chapter and a summary of which has been cited in this chapter, viz the existence of pragmatic social networks and the unattainability of a community of rational agents in the face of the non existence of symmetrical information diffusion, hence by default a nexus of interested judgments from not at all disinterested

145

Bitzilekis , as above 146 . . , A.Charalampakis, Criminal Law Sketchmap, Sakkoulas Publications

[311]

social actors participating mandatorily in social networks. This phenomenon of distribution of power and by implication the exclusion of certain targets from the distribution of power through third/realm public/private partnerships points to the act of this mechanism outside of the boundaries of law or operating against an invisible system of sanctions, open only to members, which is the case with agenda 21 social formations, as well as the case with freemasonry 147 Thus, the existence of a system of rules and sanctions visibly constraining social actors from meeting their legitimately sanctioned goals meets another fundamental conditional of Roxins theory, viz. extrajudiciousness148 []., or the mechanisms having been cut off from formal law, not in its entirety, but only from clauses pertaining to blameworthy actions, which evidently is the case with covertly operated targeting activities. From a sociolinguistic point of view it is now clearer why descriptive sentences in the context of allegations on behalf of social actors participating in social networks are pragmatically and not semantically valid as their content is loaded with interest-bound background assumptions. The pragmatic paradigm (echoed in behaviorist approaches, such as James and Rortys) is legitimated cryptically as social sustainability agenda 21, albeit for particularly defined social groups, which are legitimated to act as agents of social change OR redistribution of wealth among them at the expense both of other social organization paradigms and other social actors, therefore under the provision of articles 187 and 188 of the greek criminal law the blueprint constitutes an elementary condition for the formation of complicit social networks and its members participate in a criminal organization. Needless to say that in the case of freemasonry not only instances of organized crime are evidently massive, but the very organization has been vindicated demonstrably on various occasions throughout the centuries, as demonstrated in chapter 1. In fact, not making allegations against this organization on my behalf would be a regrettable omission, based on precedent witness testimony. As previously noted it is by virtue of surveillance technologies AS FUNCTIONAL ENABLERS that synchronicity is attained in targeting activities or whoever controls the technology controls the shaping of the dystopian hyperreal artificial ecosystem of the target insofar as all activities and thought patterns are monitored (ANIMUS AUCTORIS). Therefore, based on the Greek and German criminal science and partcularly on theories of FUNCTIONAL DOMINATION over the acts of perpetration, secret services constitute the indirect perpetrators behind the perpetrators149.But it is by virtue of bringing about the social reengineering project of agenda 21 the mandates of which act as ANIMUS SOCII150, hence the motive for employing dystopianly targets according to the christological paradigm as inverse affirmations of the necessity of the utopian vision of agenda 21

147 148

See paper The judiciary and freemasonry Claus Roxin, Organizational dominance as a self-sufficient form of indirect perpetration, Poinikologos 2008 149 , , , , in I.E.Manoledakis, A.I.Charalampakis, 1993 as above
150

: (animus auctoris) (animus socii) (Charalampakis)

[312]

rests with interest groups way above the secret services that dominate functionally over the acts of perpetration. It is of no accident that new lingo metaphors coined uniformly across the globe and with local variations, such as you may park here (an indexical expression lifting the act of parking from the contours of a natural language and transposing it [performatively by opening up its metaphorical dimension to a collective intentionality that is animated by a binding social reengineering schemje and from which blueprint social actors derive their legitimacy for using indexical expressions in a performatively novel manner] to an act of joining a social network. Similar expressions that have attained to reshape the intersubjective communicative trajectory of the new social milieu consist in taking a turn, denoting joining a new social network, axiomatikos denoting both an armed forces officer and, metaphorically someone meriting being put in the eye or monitored through surveillance technologies, red tomatoes denoting metaphorically the speculative degrees of freemasonry, Sir [kyrios] denoting metaphorically a selected targeted [in Greek Kyrios is also used for referring to Christ, eggs denoting EEGs and the list goes on, my love in secret services lingo denoting the loveliest hypothesis [see Handbook of intelligence Studies] and so forth151 Given the already noted (Kastanidou and Charalampakis) apodeictic or rather axiological 152 impasses in proving the existence of a premeditated murder attempt in so far as the intended activity has not been materialized yet (otherwise I would not be writing this), the legal scientific stratagem of judging a criminal intention or activity through its effects has gained currency both in legal science and in legal practice153 (which amounts formally to a logical fallacy of judging a necessary cause from the consequent or from observable effects, even though this formally fallacious method constitutes the ground for judging incidences of dolus indirectus, whereby one speculates backwards from phenomena as to what extent the negative consequences of a breach of law could have been foreseen). In fact, unless this stratagem is recruited, then any causa per necessitatem, such as the existence of an animus socii and the functional dominance over individual acts of perpetration would be impossible to prove as such, thus reducing discreet events in a multi act setting to a series of causae efficiens, where the effects of one sufficient cause condition the causa efficiens of a next set of effects and so on ad infinitum, which do work as explanatory hypotheses of the multiact phenomenon of silent massacre, in terms of a composite causal chain [ ] but do not expose to its full-blown extent the preplanning and the intentionality on behalf of indirect perpetrators whose decision acts as a
151 152

See papers on the role of metaphor as a glue for social collectives , the generative power of metaphor etc Even though, as N.Mpitzilekis stresses, be definition there no difference between the real and the axiological (N.Mpitzilekis, The participative act, Sakkoulas Publications 1990) . , 1990. , , social constructivism - , ' , ( Kant) . , . 153 Partially echoed in clause 29 of the Greek penal law, viz Responsibility based on the outcomes of an act, which presupposes negligence on behalf of the perpetrator, which negligence also resides in a string of omissions in counteracting the advent of a fatal outcome (such as continuous imbuement of guilt to a target for actions not causally generated by him , by objectively demonstrated omissions in countering furthe targeting activities, by discursive omissions cunnungly reimbursing a target in a dystopian self referential feedback loop mechanism)

[313]

necessary cause for the deployment of further efficient causes. As .Charalampakis notes in Issues of criminal attempt in the Greek criminal law, the legal formalization of judging the incidence of a crime from its consequences has been effected as THE OUTCOME OF PROLONGED DAMAGE OF THE SAME INDIVIDUAL, which is usually endangered by the completion of the perpetration of the dominant criminal activity. HOWEVER, IF THE DAMAGING EFFECTS SINCE THE PERPETRATION OF THE INITIAL AND MAIN ACT PERSIST, THEN AN EMPIRICALLY VERIFIABLE ONTOLOGICAL154 COHERENCE IS DEMONSTRATED, WITH A QUALITATIVELY, AND NOT JUST QUANTITATIVELY DIFFERENT CHARACTER to a usual crime.[ , , ] Having thus far established that (i) individual participants (eg gangstalkers, gaslighters, illicit breakin perpetrators etc) and/or coperpetrators in discreet criminal acts (eg group assault and battery and physical injury by bikers) need not be known to each other or be directly related to the target (me) even through remote acquaintance in order to demonstrate my case of premeditated

154

- , , , , , . , steet theater workplace mobbing public playback , , ; , , , ( ) , / (), , glissement ( , dolus indirectus - ", ;"), , - . Husserl Logical Investigations: Beginning from the classical argument of doubt: knowing involves being in some sense aware of the contrast of a present belief with various epistemically inferior beliefs. Knowing is also a state of being in a position to reject doubt, ie to have grounds for certainty rather than doubt. In other words, if knowledge is to be possible, some beliefs must be defensible, ie justifiable, presumably because it is evident to the believer that things are what he believes them to be. what presents itself to the mind are objects that have already been conceptualized to a certain extent the truth seeker is one who has an implicit ontology and epistemology, which a phenomenological epistemology begins by describing.. No truth seeker without some sort of prephilosophical ontology and epistemology (what Heiidegger later describes the modes of giveness of Being or modes of being)- also see Wittgenstein on natural language ...Common sense assumes that perception is a generally reliable source of knowledge, and we mostly accept what presents itself in that way. All such convictions, we might say, are embodied in the implicit ontological and epistemological contours of common sense

[314]

attempted murder, but that they act with dolus155 directus and/or dolus indirectus/eventualis156 and not necessarily by the same motive (ii) but with the same ulterior intent which rests with the level 1 indirect perpetrator animus auctoris, that is with secret services, which provide the information and dominate functionally over individual acts and with level 2 indirect perpetrator or animus socii, that is the agenda 21 blueprint that mandates social networking of social actors (SERIES OF ANIMATION or ANIMATED SERIES in a chain of direct perpetration [ ] in the sense of A animating/motivating B, B animating/motivating C and so on ad infinitum),() there are sufficient indicators suggesting that the concerned societal engineering blueprint is, if not a criminal organization, beyond reasonable doubt a set of mandates for organizing criminal activities,(such as redistribution of wealth from less privileged to more privileged social actors) therefore an organizational blueprint (iv) the case of silent massacre is by default an incidence of attempted157 premeditated murder, with multiple acts that constitute fragmentary substantiations [ ] of a teleologically inscribed causa finalis that is evidenced by employing the legal stratagem of judging the criminal intention from its consequents [ ] I shall now proceed with further elaboration of the technicalities of applying Roxins theory in the context of open system versus closed system dynamics and which subjective and objective conditions must be met in order to verify the silent massacre phenomenon against the background of the public/private or third realm organizational blueprint..
155

IN THIE CONTEXT OF INDIRECT PERPETRATION dolus on behalf of the direct perpetrator may be simply a matter of infusion by the indirect perpetrator or solicitor or accomplice, as Benaki notes. Interestingly, as Mayer notes, it is a matter of multilateral parties uniting their will or rather being united in a common act of volition by virtue of partaking in a social network that is ANIMATED by dolus To use a familiar term encountered both in Aristotle and Plato, it is an issue of methexis or blending in a commonly animating social network that dolus is transfused among members and even further, on a second reading, it is by virtue of having been coercively driven to become members of social networks that an avengeful and latent malice becomes an animating force against non network participants. ( - ) , , ( on a need to know basis- ( 21) 156 See Christos Mylonopoulos article from Poinikologos, Sakkoulas Publications,Dolus Indirectus and fuzzy logic, a dispositional analysis approach [ fuzzy logic, ], dolus indirectus , 1 2 , 3 , 6 , [WHICH COINCIDES WITH THE JUSTIFICATORY AND DEMONSTRATIVE PROCEDURE FOLLOWED IN DETERMINING THE INTENT TO ENGAGE IN ACT(S) OF PREMEDITATED MURDER FROM THE EFFECTS IN THE INSTANCES OF CRIME BASED ON THE OBSERVED CONSEQUENCES]. , , - . 157 Also see , chapters by A., , .- , ,

[315]

4.10.2 What is the difference between closed and open system dynamics? Every organism (be it a cell, an individual, an organization) coevolves with its environment and by translating stimuli it receives from its environment into goal oriented actions upon which it either changes its current state of affairs or does not. In a closed system, the control of stimuli (eg information) that move towards and from an organism is high, meaning that both the sources that emit stimuli and the ways whereby responses are triggered by the receiving organism and fed back to the system are highly controlled. This is the case with closed ideological systems , such as the ones where Roxin;s theory has been applied so far, given that (i) there is a clear and distinct ideological apparatus shaping univocally the interpretive schemata among social actors through which information is directly made sense of (that is without undergoing an extensive process of meaning elaboration) (ii) there is a vertical chain of command through which information is dispensed and upon which social actors are expected to act uncritically. The difference in open systems lies in their displaying (i) multi source inflows and outflows (as no control is necessarily imposed on either source or receiver or destination of sending anew the filtered information) (ii) horizontal and vertical inflows and outflows of information (iii) no single ideological apparatus but polyphonic interpretive schemata (iv) not overtly vertically structured chain of command, but multidirectional. This is why the case for totalitarianism (in an ideological apparatus sense) may not be argued for , or at least in its overt form, which has allowed in the past for the identification of clear chains of command and concrete indirect perpetrators issuing commands behind the scenes. However, as already stressed and demonstrated , there is a clear case of audiovisual surveillance on targets and high controls placed on their environments, which allowed us to infer that the animus socii behind the direct perpetrators rests with secret services, while the blueprint of agenda 21 was found to be the animus socii in so far as it mandates of social actors to enter social networks, which is unconstitutional. At the same time, it has been proven that agenda 21 has been virally disseminated across the globe and in Greece and the social netwroking paradigm enforced covertly (wherefrom the necessity for employing secret services), which by default refers to decision making behind the scenes affecting especially targets, while the open vs closed system dynamics that work in favor of this covertly operating state of affairs has been demonstrated in the context of the ever multiplying reasons why someone should be targeted, which led us to confirm the pragmatic paradigm. What constitutes the common platform between the two forms of organizational structures is the applicability of Roxins fundamental concepts, such as the functional domination over acts of perpetration, the institutionally sanctioned act over perpetrators will or their animation in carrying out these acts, the existence of alternating perpetrators and the existence of an institutional machine that acts in favor of perpetrators.The application of Roxins theory in closed and open system dynamics manifests the following differences: in the context of closed, ideologically fuelled regimes the ideology is given and by implication the institutional mechanisms are a priori complicit, whereas in open systems the institutional mechanisms complicity is proven a posteriori, from which we extrapolate the function of a seemingly open agenda (yet with clear determination regarding particular aims, eg redistribution of wealth and particular social groups favored therein as agents for social change), which yet has been applied covertly, as the animus socii behind perpetrators acts. Thus, even though democratic regimes in which agenda 21 is applied constitute in principle open systems (and this is questionable, for example see Karl Poppers Open Society and its enemies) the ecosystems manufactured around targets constitute proof of closed systems dynamics operative in open systems. Insofar as the reasons for targeting vary to such a magnanimous extent, what grounds do we have for judging that open systems dynamics are operative in the first place? Certainly in theory open system dynamics makes sense, but what grounds do we have for discerning its existence when the phenomenon of targeting is open in itself, which amounts to stressing that if an essential property (that is openess) is predicated by necessity of two opposing structural phenomena then their opposition does not hold as such and they conflate. Is it just a matter of discerning identity and difference in logically formal terms? Not at all, as the fact that horizontal networks are favored over vertical ones still points to a stuctural network. Is it just a matter of reversing the chain of command, that is starting at the bottom as the ground for decision making and applying it at the top? Certainly not as that would not make sense. Across an horizontal network that extends theoretically ad

[316]

infinitum there are still links and nodes and relatively more powerful centers that exert oscillations along the network chain. The fact that no visible (to the multitude of social actors) head exists in a horizontally structured social network does not imply that the distribution of power is uniform across the networks members. Otherwise we would be observing a uniformly egalitarian system, which evidently does not exist. Therefore, changing a label from vertical to horizontal networks merely affords to hide decision making hubs and their influence across the chain even more than in the incidence of vertical networks, as evidenced by the multiplicity of reasons for targeting. Which participants and what kinds of affiliation manage to set such a vast mechanism of control over selected individuals? Do they get away, as Roxin stresses, simply by being situated in the outskirts of a chain of command? In this case the system of alternating scapegoats affords to maintain the horizontal systems phantasmatic balance. The key indirect perpetrators that hide in certain nodes of the horizontal network simply transpose responsibility for not maintaining the covert structuration of the chain to links, thus seemingly affording justice, while essentially getting away. The same could be largely argued for vertical networks, but this would take us to a completely different direction. What matters is to demonstrate the applicability of Roxin;s theory in open system dynamics by pointing out the differences and similarities with closed systems, which have been found not to be that different after all and which applicability has been found to be feasible against the objective and subjective conditions that must be met for confirming the criminal act of indirect perpetration in a context of organized mechanisms of power in the particular context of the third realm 4.11 Legal precedents in criminal activties perpetrated in the context of organized power mechanims (in closed systems) and further elaboration of terms based on precedents Roxin;s theory of indirect perpetration in the context of organized power mechanisms became popular as a justificatory platform for directing responsibility to the criminal operations of secret services in concentration camps during WWII158. A key motive for discerning responsibility on behalf of direct perpetrators concerned the fear of unfavorable transfers or blocking of promotion. The ulterior motive and the key perpetrating intent rested with the superiors who issued commands and who had personal interests from enforcing the commands. The particularity of this type of criminal activity rests with the fact that an operative or a managerial member of a secret services organization dominates over the criminal activities that are carried out by a state mechanism, which is different to the usual notion of a solicitor of a criminal act.,by virtue of the organizational strcutures that act independently of particular members, This implies that high ranking members do not need to exert deception or force in order to achieve their goals as they know that the mechanism is structured in such a fashion as even in the face of denial or reluctance of one or more members to carry out their commands there will be others more willing to do so. The deciding variable that distinguishes such organizational structures is the existence of alternating direct perpetrators. The particularity of the mechanisms operation leads univocally to the organizational dominance of superiors over the direct acts of perpetration and to their liability for the accomplished crimes. The superiors dominance over the acts of perpetration was beyond reasonable doubt insofar as they controlled the system, which they used according to will and illicitly for carrying out their plans. As typified in the verdict it was a case of perpetrators acting from the office using faceless direct perpetrators.

158

Aristotelis Charalampakis, Indirect Perpetration, Thoughts on fundamental issues of participation in the Greek criminal law (Sakkoulas publications 1988, chapter 21 A , , , 1988, 21, ( 338) ; also see Roxin, Claus, Tterschaft und Tatherrschaft (Perpetration and control over the act), 6th Edition, Berlin, New York, 1994

[317]

Since WWII Roxins theory has been applied in similar cases and mainly in the context of totalitarian regimes (such as the Argentina coup or crimes committed in the former Yugoslavia) What is the fundamentai issue with domestic and international criminal law and what is the discrepancy with provisions made by the European Court of Human Rights? In resolving these issues I shall quote judges Wolfgang Schomburgs arguments at length as they attain to illustrate the syllogisms and the issues that arise from failure to take into account the degree of responsibility that rests with participants [members] and with indirect perpetrators behind the scenes. The basis for domestic (Greek) criminal law is the individual as primary carrier of rights and resonsibilities, which by default is a bifurcated principle as , on the one hand, it acts positively in safeguarding fundamental rights such as owness of property, the right to move freely without being legitimately harassed, in attributing responsibility for breaches etc. However,the very foundations of dogmatic law may act negatively by imposing a strictly solipsistic paradigm on human action and by waiving (by default) any interdependence between the individual and its environment. In the case of the International Criminal Law the Statute does not penalize individual criminal responsibility through Joint Criminal Enterprise [JCE]. The Statute does not criminalize the membership in any association or organization. The purpose of this International Tribunal 159 is to punish individuals and not to decide on the responsibility of states, organizations or associations160. As stated in Nuremberg: Crimes against international law are committed by men, not by abstract entities, and only by punishing individuals who commit such crimes can the provisions of international law be enforced. While joint criminal enterprise is based primarily on the common state of mind of the perpetrators (subjective criterion), co-perpetratorship also depends on whether the perpetrator exercises control over the criminal act (objective criterion). Furthermore, the Appeals Chambers constant adjustment of what is encompassed by the notion of JCE raises serious concerns with regard to the principle of nullum crimen sine lege. The lack of an objective element in the so-called third (extended) category of JCE is particularly worrying. It cannot be sufficient to state that the accused person is liable for any actions by another individual, where the commission of the crimes were a natural and foreseeable consequence of a common criminal purpose.What is missing here is an additional objective component, such as control over the crime as would be provided under the concepts of co-perpetration or indirect perpetration. This necessary element of having control over the crime would on the one hand serve as a safeguard to adequately limit the institutional agents of individual criminal responsibility, and on the other hand properly distinguish between a principal and an accessory. By contrast, the current shifting definition of the third category of JCE has all the potential of leading to a system, which would impute guilt solely by association. The decisive element must be in principle the individual contribution of an accused. At times, the incorrect impression is given that the third category of JCE attracts a lower sentence simply because of its catch-all nature. However, in principle, a persons guilt must be described as increasing in tandem with his position in the hierarchy: The higher in rank or further detached the mastermind is from the person who commits a crime with his own hands, the greater is his responsibility. Especially the notion of indirect perpetration has been employed in cases concerning organized crime, terrorism, white collar crime or state induced criminality. For example, Argentinean Courts have entered convictions for crimes committed by members of the Junta regime based on indirect perpetratorship. This is especially relevant if crimes are committed through an organized structure of power in which the direct and physical perpetrator is nothing but a cog in the wheel that can be replaced immediately. Since the identity of the direct and physical perpetrator is irrelevant, the control and, consequently, the main responsibility for the crimes committed shifts to the persons occupying a leading position in such an organized structure of power.
159 160

Jurisprudence on JCE- revisting a never ending story, by Wolfgang Schomburg Now, this point is not defensible insofar as ample positive rulings exist from the European Court of Human Rights concerning (i) individuals filing ad humanitatem lawsuits against states and (ii) states filing lawsuits against organizations (eg Italy against Freemasonry)

[318]

These persons must therefore be regarded as perpetrators irrespective of whether the direct and physical perpetrators are criminally responsible themselves or (under exceptional circumstances) not. This approach was applied, for example, by German courts in cases concerning killings at the East German border: as far as border guards who had killed persons were identified and brought to trial, they were generally convicted as perpetrators. This, however, did not reduce the criminal responsibility of those who had acted behind the scenes. As the German Federal Supreme Court (Bundesgerichtshof) held in the aforementioned Politbro Case: [I]n certain groups of cases, however, even though the direct perpetrator has unlimited responsibility for his actions, the contribution by the man behind the scenes almost automatically brings about the constituent elements of the offence intended by that man behind the scenes. Such is the case, for example, when the man behind the scenes takes advantage of certain basic conditions through certain organisational structures, where his contribution to the event sets in motion regular procedures. Such basic conditions with regular procedures are found particularly often among organisational structures of the State [] as well as in hierarchies of command. If the man behind the scenes acts in full awareness of these circumstances, particularly if he exploits the direct perpetrators unconditional willingness to bring about the constituent elements of the crime, and if he wills the result as that of his own actions, then he is a perpetrator by indirect perpetration. He has control over the action []. In such cases, failing to treat the man behind the scenes as a perpetrator would not do justice to the significance of his contribution to the crime, especially since responsibility often increases rather than decreases the further one is from the scene of the crime For these reasons, the notion of indirect perpetration suits the needs also of international criminal law particularly well.It is a means to bridge any potential physical distance from the crime scene of persons who must be regarded as main perpetrators because of their overall involvement and control over the crimes committed. This was recognized upon the establishment of the International Criminal Court whose Statute, in Article 25(3)(a),99 states that as indirect perpetration focuses on the indirect perpetrators control over the will of the direct and physical perpetrator, it is sometimes understood to require a particular defect on the part of the direct and physical perpetrator which excludes his criminal responsibility161. The ICC went on with its in-depth analysis of this mode of liability in The Prosecutor v.Katanga et al. (Pre-Trial Chamber Decision on the Confirmation of Charges) ICC-01/04- 01/07 (30 September 2008): . The commission of a crime through another person is a model of criminal responsibility recognised by the world's major legal systems The principal (the 'perpetratorby-means'162) uses the executor (the direct perpetrator) as a tool or an instrument for the commission of the crime. Typically, the executor who is being used as a mere instrument will not be fully criminally responsible for his actions. As such, his innocence will depend upon the availability of acceptable justifications and/or excuses for his actions. Acceptable justifications and excuses include the person's: i) having acted under a mistaken belief; ii) acted under duress; and/or iii) not having the capacity for blameworthiness.. A concept has developed in legal doctrine that acknowledges the possibility that a person who acts through another may be individually criminally responsible, regardless of whether the executor (the direct perpetrator) is also responsible. This doctrine is based on the early works of Claus Roxin and is identified by the term: 'perpetrator behind the perpetrator' (Tter hinter dem Tter). The underlying rationale of this model of criminal responsibility is that the perpetrator behind the perpetrator is responsible because he controls the will of the direct perpetrator. As such, in some scenarios it is possible for both perpetrators to be criminally liable as principals: The direct perpetrator for his fulfilment of the subjective and objective elements of the crime, and the perpetrator behind the perpetrator for his control over the crime via his control over the will of the direct perpetrator.. Several groups of cases have been presented as examples for the perpetrator behind the perpetrator's being
161

Also echoed in the Greek criminal law- BUT, ISNT DEFECT ALSO A STATE OF NEED AND ISNT DEFECT RELATIVELY JUDGED AS SUCH BASED ON THE PRAGMATIC (SOCIOECONOMIC CONTOURS) A PERSON OR A GROUP ARE SITUATED IN? In ordinary discourse we say that person is in a defective position. By implication, then isnt a defective person, signifying someone in a defective position, MORE PRONE TO MAKE WILLING CONCESSIONS TO A SOLICITORS DEMANDS? 162 And means should be qualified as economic, technological etc , which constitute in Roxin;s terms, THE FUNCTIONAL PLATFORM for indirect perpetration

[319]

assigned principal responsibility despite the existence of a responsible, direct perpetrator (i.e., one whose actions are not exculpated).This notwithstanding, the cases most relevant to international criminal law are those in which the perpetrator behind the perpetrator commits the crime through another by means of "control over an organisation" (Organisationsherrschaft). For the purposes of this Decision, the control over the crime approach is predicated of a notion of a principal's "control over the organisation". The Chamber relies on this notion of"control over the organisation" for numerous reasons, including the following: (i) it has been incorporated into the framework of the Statute; (ii) it has been increasingly used in national jurisdictions; and (iii) it has been addressed in the jurisprudence of the international tribunals. This doctrine has also been applied in international criminal law in the jurisprudence of the international tribunals. In The Prosecutor v. Milomir Stakic Judgement, Trial Chamber II of the ICTY relied on the liability theory of institutional agenterpetration of a crime through another person as a way to avoid the inconsistencies of applying the so-called "Joint Criminal Enterprise" theory of criminal liability to senior leaders and commanders. As noted by the Defence for Germain Katanga, the Trial Chamber's Judgement was overturned on appeal. However, the reasoning of the ICTY Appeals Chamber's Judgement is of utmost importance to an understanding of why the impugned decision does not obviate its validity as a mode of liability under the Rome Statute. The Appeals Chamber rejected this mode of liability by stating that it did not form part of customary international law. However, under article 21(l)(a) of the Statute, the first source of applicable law is the Statute. Principles and rules of international law constitute a secondary source applicable only when the statutory material fails to prescribe a legal solution. Therefore, and since the Rome Statute expressly provides for this specific mode of liability, by providing the following objective conditions a. Existence of an agreement or common plan between two or more persons b. Coordinated essential contribution by each co-perpetrator resulting in the realisation of the objective elements of the crime the notion of agenterpetration is valid. BUT, AND THIS IS CRUCIAL, as explained in the Lubanga Decision, the agreement need not be explicit, and that its existence can be inferred from the subsequent concerted action of the institutional agenterpetrators163, which is in line with the employment of the legal construct ofcrime based on results for gauging indirectly the necessary existence of agreement and a common plan and point to particular blueprints for action and secret societies, When the objective elements of an offence are carried out by a plurality of persons acting within the framework of a common plan, only those to whom essential tasks have been assigned - and who, consequently, have the power to frustrate the commission of the crime by not performing their tasks - can be said to have joint control over the crime. Where such persons commit the crimes through others, their essential contribution may consist of activating164 the mechanisms which lead to the automatic compliance165 with their orders and, thus, the commission of the crimes.
163

JUST LIKE THE PREVIOUSLY CITED ACCEPTABILITY IN GREEK CRIMINAL LAW OF THE METHOD OF DEMONSTRATING THE EXISTENCE OF AN ATTEMPTED MURDER CASE BY JUDGING FROM CONSEQUENTS, EVEN WHEN NO EXPLICIT CONFESSIONS ABOUT THE AGREEMENT OF COPERPETRATORS OR PARTICIPANTS IN A MULTIACT PREPLANNED CRIMINAL ACTIVITY ARE DISPLAYED, IN INTERNATIONAL CRIMINAL LAW IT HAS BEEN INSTITUTED UPON PRECEDENT RULINGS THAT AGREEMENT MAY BE INFERRED BY JUDGING UPON CONSEQUENTS. WE HAVE ALREADY ESTABLISHED HOW INDIVIDUAL ACTIONS ARE CONTROLLED BY SECRET SERVICES AND HOW DECISIONS RESTING WITH SOCIAL NETWORKS MEMBERS ARE LEGITIMATED BY OTHER INSTITUTIONAL MECHANISMSAGENTS. 164 Or, rather, ANIMATING 165 The problematic nature of acting on anothers willful action . SEE PAPER INDOCTRINATION, COERCION, FREEDO OF WILL, HENCE ANOTHER BUILDING BLOCK OF THE DOGMATIC AND TRIED AND TESTED THEORY MUST BE AMENDED IN ORDER TO ACCOUNT FOR THE PARTICULARITIES OF THIS PHENOMENON Duress in this context may be masked as a result of an indoctrination process whereby unwilful acts are not recognized by the direct perpetratot as such due to his

[320]

In sum, the objective elements (actus reus) of this mode of participation in one of the crimes provided for in the Statute (with regard to each of the three categories of cases) are as follows: i. A plurality of persons. They need not be organised in a military, political or administrative structure, as is clearly shown by the Essen Lynching34 and the Kurt Goebell35 cases. ii. The existence of a common plan, design or purpose which amounts to or involves the commission of a crime provided for in the Statute. There is no necessity for this plan, design or purpose to have been previously arranged or formulated. The common plan or purpose may materialise extemporaneously and be inferred from the fact that a plurality of persons acts in unison to put into effect a joint criminal enterprise. iii. Participation of the accused in the common design involving the perpetration of one of the crimes provided for in the Statute. This participation need not involve commission of a specific crime under one of those provisions (for example, murder, extermination, torture, rape, etc.), but may take the form of assistance in, or contribution to, the execution of the common plan or purpose. By contrast, the mens rea element differs according to the category of common design under consideration. With regard to the first category, what is required is the intent to perpetrate a certain crime (this being the shared intent on the part of all co-perpetrators) With regard to the second category (which, as noted above, is really a variant of the first), personal knowledge of the system of ill-treatment is required (whether proved by express testimony or a matter of reasonable inference from the accuseds position of authority), as well as the intent to further this common concerted system of ill-treatment. With regard to the third category, what is required is the intention to participate in and further the criminal activity or the criminal purpose of a group and to contribute to the joint criminal act. In addition, responsibility for a crime other than the one agreed upon in the common plan arises only if, under the circumstances of the case, (i) it was foreseeable that such a crime might be perpetrated by one or other members of the group and (ii) the accused willingly took that risk. The Trial Chamber emphasizes that joint criminal enterprise is only one of several possible interpretations of the term commission under Article 7(1) of the Statute and that other definitions of co-perpetration must equally be taken into account. Furthermore, a more direct reference to
willful endorsement of certain moral principia that demnand of him to engage in dogmatically regarded acts of transgression. What is blameworthy in this instance is the context with which the perp has been imbued and wherein his actions are legitimated. Thus, duress does not apply STRICTO SENSU to a primary action (eg command or suggestion) that brought about the actual perpetration, but to the process of imbuing someone with the frame of mind that enables him to conceive of his action as legitimate, even at the expense of prior knowledge of its being illegal. Another point that merits critical attention is the way whereby the intersubjective domain is delineated in the theoretical contours of the co-perpetrartion literature. The foundation of the definitional approach (as coined by Roxin) rests with the dogmatic outlook of the individual as the frame of reference of the penal law. An organization is conceived of as an assembly of monads. However, as learnings from subject formation from group psychology suggest, the individual is de-individuated in instances of strong group cohesion. This is a facet of group formation which by default urges us to question the extent to which the assumption of the monadic outlook on individuality qua group member is the correct starting point. However, as examples from social phenomenology, existentialism, group psychology , social anthropology, systems theory and other paradigms have demonstrated, in instances where group membership becomes a priority, the structural untegrity of a monadically viewed individual is challenged.

[321]

commission in its traditional sense should be given priority before considering responsibility under the judicial term joint criminal enterprise. The Trial Chamber prefers to define committing as meaning that the accused participated, physically or otherwise directly or indirectly, in the material elements of the crime charged through positive acts or, based on a duty to act, omissions, whether individually or jointly with others. The accused himself need not have participated in all aspects of the alleged criminal conduct. In respect of the above definition of committing, the Trial Chamber considers that a more detailed analysis of co-perpetration is necessary. For co-perpetration it suffices that there was an explicit agreement or silent consent to reach a common goal by coordinated cooperation and joint control over the criminal conduct. For this kind of co-perpetration it is typical, but not mandatory, that one perpetrator possesses skills or authority which the other perpetrator does not. These can be described as shared acts which when brought together achieve the shared goal based on the same degree of control over the execution of the common acts. In the words of Roxin: The institutional agenterpetrator can achieve nothing on his ownThe plan only works if the accomplice works with the other person. Both perpetrators are thus in the same position. As Roxin explains, they can only realise their plan insofar as they act together, but each individually can ruin the whole plan if he does not carry out his part. To this extent he is in control of the act. Roxin goes on to say, [t]his type of key position of each co-perpetrator describes precisely the structure of joint control over the act. 4.12 In a nutshell: Subjective and objective conditionals / Actus reus and mens rea that must be met in order to determine the existence of indirect perpetration in the exceptional case of the silent massacre phenomenon in the context of organized power mechanisms and against the background of the secret societies of agenda 21 and freemasonry Actus reus (objective conditions)

1. A plurality of persons or, in Roxin;s terms, alternating perpetrators- who need not be known
among them or be organized in a military, political, administrative structure166 2. The existence of a common plan, design or purpose which amounts to or involves the commission of a crime provided for in the Statute. There is no need for this plan, design or purpose to have been previously arranged or formulated, or at least, as already proven , no need for proof of overt agreement insofar as it may be gauged by the results of the actions. The common plan or purpose may materialize extemporaneously and be inferred from the fact that a plurality of persons acts in unison to put into effect a joint criminal enterprise 3. Participation of the accused (either as direct or as indirect) perpetrators in the common design, either as an enabler through the provision of essential information and/or technological means or as a direct or physical perpetrator of the actions or through omitting to take necessary actions in order to counteract the advent of the criminally liable results (to omit is to commit) 4. The indirect perpetrator has a relationship of FUNCTIONAL DOMINANCE over the direct perpetrator(s) and the direct perpetrator a relationship of INSTRUMENTALITY to the indirect perpetrator- ANIMUS AUCTORIS

166

Shmoburg (as above) cites over and above the ICC cases during which these conditions were affirmed, individual case rulings from Germany, such as Essen Lynching and Kurt Goebell

[322]

5. Institutional complicity through cover-ups and intended omissions 6. IN THE CASE OF A MULTI ACT ATTEMPTED MURDER: (i) the necessary interconnectedness of the acts (Franks condition) (ii) the multiplicative and aggravating effects of individual acts [WHICH IN SUM MAKE UP A CAUSE OF DEATH] and the omission on behalf of institutions to take action in order to counteract the completion of the murder attempt 7. IN THE CASE OF A MULTIPARTICIPANT CRIME the uknowingness among direct perpetrators

8. Multiple composite causality [ ] or composite causal chain


[ ] or chain of perpetration [ ] one causa finalis conditioning as causa per necessitatem and through causae remotae the amplifying and aggravating effects of multiple causae efficiens or causae adaequatae 9. Extra judiciousness of acts or their informal legitimation based on secret referenda and sanctions imposed unknowingly to the target upon secret societies decisions and agreements 10. Especially in the context of open system dynamics: targeting phenomenon as closed system , sociocybernetically conditioned fabricated hyperreality of the targets lifeworld; horizontal vs vertical networks Mens rea (subjective conditions)

1. The shared intent to commit the crime, but not necessarily the same motive 2. The existence of dolus (either directus or indirectus/eventualis OR MASKED DOLUS
DIRECTUS [ ]/DOLUS MALUS as above noted) with the qualifications already mentioned (such as the ex position ability of the indirect perpetrator to act on the direct perpetrators will) through various psychological mechanisms (perceptual inertia, abileen paradox, Ross fundamental flaw, prisoners dilemma); key qualifier in the context of secret societies is the unconditional acceptance of indoctrinated individuals of always already having being deceived and by definition (echoing Psarouda Mpenakis argument) having taken oaths of secrecy 3. Acting knowingly (whether proven by express testimony or a matter of reasonable inference from the accuseds position of authority) in effecting the aggravating conditions at the expense of the target

4. the intention to participate in and further the criminal activity or the criminal purpose of a
group. IN ADDITION, RESPONSIBILITY FOR A CRIME other than the one agreed upon in the common plan arises only if under the circumstances of the case (i) it was foreseeable that such a crime might be perpetrated by one or other members of the group and (ii) the accused willingly took that risk 5. The indirect perpetrator has a relationship of PSYCHOLOGICAL DOMINANCE over the direct perpetrator(s (ANIMUS SOCII)

[323]

6. ESPECIALLY IN THE CONYEXT OF A MULTI ACT MURDER ATTEMPT: Complete subjective dimension, but incomplete objective dimensions 7. ESPECIALLY IN THE CASE OF TARGETING: the ontologically coherent lifeworld of the target conditioned by the multiple acts (NLP) 8. By virtue of horizontal vs vertical networks in open system dynamics no clear chain of command and overt coercion over free will , but enhanced suggestibility, persuasion and mind control tactics, enabled by the all seeing eye of audiovisual surveillance and the ability of the indirect perpetrator to monitor direct perpetrators; compliance with suggestions through remote viewing (decoding of evoked potentials EEGs) and through actual audiovisual monitoring of actions 4.13 Intermezzo: Notes on legal argumentation and evidentiary methodological rationale Given the EXCEPTIONAL nature of the silent massacre phenomenon it is crucial to notice its differences from and similarities to usual cases of premeditated murder alongside acceptable methods of legal argumentation and the evidentiary rationale behind the claims made in a silent massacre case, as well as why this form of perfect murder has been termed as such by virtue of essential limitations in the obtainment and the admissibility of evidentiary materials, thus pointing to a yet another form of silent discursive complicity. . 4.13.1 The necessity of using the silent massacre 10 third terms as nodes in legal syllogistic chains "Evidence counts as such by having a tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence"167 The reason why it is crucial in establishing legally valid arguments to employ the previously extrapolated third terms, based on a reduction of the multiple common experiential facets of targeted individuals, as nodes in the syllogistic chains, and validly so, has already been illustrated One also has to look at at the textual evidence in the given case, including the use of the so called indicator words and evidence from the context of the dialogue168 or a common discursive reality, we should add. By analogy to the employment in a juridical hearing process of common experiential denominators as third terms among the expressed and evidenced syllogisms (eg when grounding the incidence of dolus indirectus based on a commonly foreseeable outcome) the above coined third terms constitute indispensable loci communes of targets ontologically coherent lifeworld, thus indisputable to the same extent that a widely shared locus communis is deemed to be valid preontologically among members of a community. Thus, from a methodological perspective, not only it is crucial to determine the lifeworld particularities of the targeting phenomenon, but also qualify these particularities in terms of acceptable interpretive principles whereby minor premises assume enhanced probative value in the context of legal argumentation and a judicial hearing. while relevance is primarily a question of admissibility of evidence in law, weight refers to the persuasive force of the evidence, once it has been admitted. Thus it is important not only to demonstrate why the above coined third terms are interpretively relevant to this cases truth finding, but the relative wewight of minor/empirical premises shifts (vis a vis other cases of premeditated murder) insofar as the degree of probative value does not rest with usual phenomena (eg assault & battery), but with less usual phenomena (eg illicit break ins, clothes tearing, food tampering).
167 168

Legal argumentation and evidence, D.Walton, Library of US Congress 2002 idem

[324]

Therefore, forms of argumentation such as (1) and (2) in the below table are crucial as methods for producing valid legal syllogisms with the employment of third terms, which has already been argued for in Chapter 2. At the same time, an occasionally fallacious form of argumentation, such as (3) in the below table particularly in this instance would amount to an institutional cover up and the reinscription of arguments in a dystopian univocal rhetoric, as amply evidenced thus far, while converting the principle of the right to fair trial into another social episode of witchunting. F is a finding or given set of facts; E is a satisfactory explanation of F; No alternative explanation E given so far is as satisfactory as E; Therefore, E is plausible as a hypothesis entham gives the example of a case where a proposition A is eviudentiary for a second proposition B, and then B is evidentiary for C and C is evidentiary for D. the firsttypeof evidentiary chain is based on the principle that the greater the number of such intermediate links, the less is the probative force of the evidentiary fact proved with relation to the principal fact the argument from position to know is taken as a fallible argument that has weight in shifting a burden of proof in a dialogue toward one side

1. argument from signs / abduction

2. argument from verbal classification

3. argument from expertise

Fair trial or witchunt169? The best way to come to understand the logical features of how the fair trial should work as a normative framework in which arguments are evaluated is to contrast it with an opposing normative structure of dialogue called the witchunt. The witchunt has ten defining characteristics: (Walton 1996c) .

1. Pressure of social forces that drives the argumentation forward forcefully170


169

Dogmatic law and interpretative adjustments or malleus maleficarum? Jury or Holy insquisition? Employment of christological paradigm and background assumptions or reasonable inferences? The lines are blurred and by definition fuzzy. 170 Very likely in this case as there are plentiful hidden agendas (institutional mechanisms, third realm public/private alliances

[325]

2. Stigmatization of the accused (or the claimant) making a defense (or an offense) difficult or even impossible 3. Climate of fear 4. Resemblance to a fair trial 5. Use of simulated evidence (as opposed to real evidence) 6. Simulated expert testimony 7. Nonfalsifiability characteristic of the evidence 8. Reversal of polarity (or shifting burden of proof meaning in a criminal trial that the accused would have the burden of proving his innocence (and vice versa) 9. Non openess171 meaning that the argumentation is one sided and the prosecution argument is not really open to refutation 10. Use of the loaded question technique172 4.13.2 What are the limits between subjectivism and objective facts and between admissible and inadmissible evidentiary materials? As is well-known subjectivism is a rejected mode of truth finding in dogmatic law. However, as already pointed out, agreement on behalf of social actors in social networks (especially in the light of my case where what is primarily at stake in terms of accusation is a networking mandate that provides the sufficient condition for inferring collective judgments as animius socii) about the truth of the facts is not of necessity a ground for making valid truth claims. Then how is objectivity granted? T.Dalakouras173 stresses that , . However, as amply demosntrated in legal argumentation and proof literature, not only there is no single method for matching univocally empirical facts and minor premises through concepts of empirical understanding with deductive legal rules through deductive inferential mechanisms, but deductive syllogisms are not by necessity prioritized over inductive and abductive syllogisms174. In fact, as already demonstrated, (i) deductive principles in social sciences constitute the outcome of abductive processes and it is by the very virtue of their continued empirical verification that they assume deductive validity (which are amenable to criticism in the face of changing mores and social dynamics, thus calling for an employment anew of abductive processes for making sense of certain phenomena) (ii) especially in cases of multiact and exceptional types of crime, such as targeting, strict adherence to deductive processes would mask causal chains and evidentiary aspects, that may be sufficiently accounted for only through abductive processes. Are abductive processes a threat to deductive reasoning? Inasmuch as dogmatic law is a threat to itself, hence the answer is no175. As Dalakouras notes
171

Highly expected insofar as institutional mechanisms, including the judiciary, are interdendent AND MUST PLAY THE GAME TO THE END 172 AND THE REST IMPRESSION MANAGEMENT TECHNIQUES, sse Aristotles Sophistical Refutations 173 , , , 5, 2003 174 For example, see chapter 3.1.1.1 Logical and epistemological issues in the subsumption mechanism, H aitiologhsh ton apofaseon ton poinikon dikasthrion, Sakkoulas Publications 1989 175 T . , , ; ( ) ;

[326]

o 176 The existence of an objective third party observer, to use C.Mylonopoulos term is therefore by default waived insofar as what is at stake is a crime in the context of organized institutional mechanisms under the auspices of third realm public/private alliances. Thus, assuming as our starting point a deductive syllogistic process assumes that principles have been coined sub specie aeternitatis177, which is not the case as demonstrated, and claiming so would amount to a case of metaphysical violence178, reducing social dynamics to immobile Platonic idealistic principles (which hardly match the ubiquitous reality of pragmatism). On the other hand, assuming as univocally legitimate a subjective perspective would lead to unmanageable relativism. Isntt this the very reason why institutional mechanisms and processes for translating conflicts in the context of social dynamics are there for? Isnt this an objective criterion? In principle yes, but in practice, as Dalakouras notes, . But institutional complicity in targeting cases has already been verified (based both on my factuallly backed description of personal indicents and on the usual mode of treatment of targeting allegations) as constitutive of this form of cyberneticized univocal interpretivism , therefore, even if we employ a semiological or semiotic analysis (in which cases, and speaking both from academic and professional experience, proclivity to subjectivism and falsification is even higher) ,how can we confer disinterested judgments about the veracity of the arguments and furthermore about their correct subsumption under dogmatic law rules, while avoiding sophistical witchunt tactics (which is the way defamatory information about targets is diffused in the first place)? The social phenomenological and ethnomethodological reading of targets accounts dispels some of the above problematics, while opening a semiotic horizon wherein interpretive validity may be conferred on intersubjective uniform allegations beyond reasonable doubt of their facticity. Now factual does not imply by default valid, as validity is a methodological issue. But isnt methodology complicit in relevant to the silent massacre phenomenon instances where by default certain proof generating methods are dogmatically regarded as illicit, thus legitimating silently the perpetuation of the targeting phenomenon and displaying the complicity of law enforcement and judiciary mechanisms in a viciously circular fashion? How can one apply semiotics in cases where no discursive material is available (and as is well-known in the field of semiotics, discourse spans a wide range of cultural artefacts or evidentiary materials, such as texts, recordings, videos etc)? Is this subjectivist threat resolved by appeal to a dominant paradigm? No, as already illustrated as it violates the polyvocity of epistemological paradigms and it is falsifiable as expert testimony from a position to know, while the selfreferentiality of closed dominant discourses179, which suffer from
; , , , , , , . 176 ibid 177 Legal concepts are typically encountered in the context of legal norms, and the issue of deternining their content cannot be separated from the issue of identifying and interpreting (or construing) the norms in which they occur, and of using such norms in legal inference , Legal concepts as inferential nodes and ontological categories, G.Srator, Artificial Intelligence Law 2009 17 178 See Derridas Violence and Metaphysics 179 Alternatively, assuming this trial as an instance for condeming Socrates for introding kaina demonia in a deterministally shaped public arena simply confirms the hypothesis of a non-fair trial and complicitly legitimates the taregeting phenomenon or uses a PARTICULAR instance for legitimating A PRIORI

[327]

circularity and petitio principii insofar as the latent hypothses condition their veracity, has been extensively argued for. Therefore, the apodeictic issue is not strictly epistemological, but legally metaepistomological, that is granting agreement on behalf of the judiciary for the validity of the method employed for translating the evidentiary impasses and by implication on the acceptable evidentiary materials. In this instance , sufficient argumentation for the admissibility of the ethnomethodological method and the theory of the pragmatics of social interaction and cultural pragmatics has already provided. What will be argued for next is the admissibility of evidentiary materials. A.Konstantinidis provides a plausible argumentation on the evaluative freedom of evidentiary materials180. Based on Konstantinidis analysis, , , , , . 179 , . , .. , , , , Regarding the admissibility of recorded materials they do not breach the law insofar as there is more than valid suspicion of the perpetration of the testified crimes against me, for which a lawsuit was filed two years ago and upon which no action was taken, similar evidentiary methods are admissible in the context of breaches, such as adultery 9where materials gathered through private investigators are admissible) , while there are political precedents of their being taken legitimately into consideration, such as Cengressman Ron Paul;s in the US liaising with targeted individuals communities whose claims are supported by similar evidentiary materials. Moreover, failure to do so in the face of clear audiovisual surveillance on behalf of secret services would amount to a continuation of disseminating ones life to an ever wider audience , just like reality TV, thus continuing violations of the right to privacy, of torture activities and of the rest violations that have already been noticed. Thus, the major issue regarding the ecidentiary rationale does not concern the method whereby it was obtained, but the extent to which the amply evidenced methods whereby targeting cases are carried out and the epistemological principles of the model of making sense of targets manufactured realities are admissible by criminal courts, thus the issue is methodological and metaepistemological, primarily and secondarily ontological. 4.13.3 Justification of judiciary decisions: need for applying greater emphasis than usual on particular evidentiary materials as against general evidentiary typologies in order to avoid impressions management propagandist techniques and the complicity of the judiciary in the very methods that favor targeting as silent massacre (even though formally the judiciary is covered for not providing detailed argumentation as to which specific parts of the evidentiary materials and witness testimonies led to the formation of specific premises)UNIVERSALS, which amounts to the WITCHUNT TRIAL and confirms even further the CHRISTOLOGICAL PARADIGM . 180 A.Konstantinidis, Free evaluation of evidentiary materials: Uncontrolled judgment on things and the overruling control of the judiciary justification, Poinikologos, issue 2, 2009, , , , 2 2009

[328]

TRUTH OR AXIOLOGICAL JUDGMENTS CONDITIONED BY A COLLECTIVE INTENTIONALITY AS A SUM OF DOXIC POSITINGS? (see chapter 3) , 177., .w, as previously noted, impressions management as a rhetorical heuristic is by definition an opposing method of truth finding as it conceals syllogistic steps. Especially in the incidence of lay witnesses whose sentences not only rest with pragmatic criteria , but are formulated in a highly elliptical fashion and are usually emotionally loaded [SENSUS COMMUNIS AESTHETICUS] while suffering from all sorts of logical fallacies [slippery slope , ad hominem, argument from popularity, appeal to emotion, being the most usual ones] , AN IMMENSE SYLLOGISTIC GAP OPENS UP BETWEEN STRESSING THAT WITNESSES ACCOUNTS HAVE BEEN TAKEN INTO CONSIDERATION, not only by virtue of the manufacturing of witnesses in the first place, BUT MORE FUNDAMENTALLY FROM THE VERY FACT THAT witness testimonies (especially lay) are highly judgmental and in the context of the new social ethos highly conditioned through psychic complicity that is formed by mandatory participation in social networks. Thus, the provision of not tying up which part of a decision coheres [albeit in an essentially coherence truth paradigm] not only from which general evidentiary typology, but moreover from which part of the syllogistic chain of individual parts of specific categories of evidence raises significant epistemological issues, PARTICULARLY in this case of multiact, multiparticipant crime of premeditated attempted murder in the context of organized mechanisms of institutional powers and public/private alliances.Also, insofar as the epistemological method (that is framework) and methodology (that is apodeictic procedure) in a usual scientific paradigm are in a dynamic interplay with observations (especially during the formative steps of the paradigm, as Kuhn argues) and given that the CASE AT HAND is a novel phenomenon in the context of changing social dynamics, arent we confronted with an even widening gap between a cryptic legislative statute (that works favorably only in terms of time constraints and potentially masking latent interests) and its legitimating potential of an a priori common intent, evident in targeting activities? Certainly, the deployment of lengthy decision trees taking into account semantic and pragmatic aspects of a multiplicity of incidents would be demanding both in terms of time and human resources, but otherwise the legal procedure acts in complicity to background assumptions, and, unfortunately, as is the case with targeting activities, this is a standard procedure legitimating institutional cover-ups. By analogy, a similar epistemological discrepancy would emerge if I tried to account for open system dynamics not through paradigms such as sociocybernetics, but through paradigms, such as St.Augustines De Civitate Dei. ; , 181. , , , , . Alternatively, the null hypothesis of targeting .cases concerning the silent complicity through latent agreement amongst institutional agencies and between institutional agencies and public interest groups is confirmed. On a metadiscursive level, failure to cite alongside concrete/particular evidentiary elements the epistemological and methodological assumptions that are made for verifying the truth value of a
181

idem

[329]

formal logic syllogistic chain through weighting and scoring in terms of evidentiary weight and probative value, would point to the silent complicity of the judiciary in amplifying and formalizing the social representations or collective doxasies that have been complicitly predicated of the target and legitimated through their spiralling dissemination and the application of informal logic fallacies182 through social networks, thus to the silent participation in the silent massacre phenomenon as confirmatory of an irrational collective symbolic projection and scapegoatism, thus favoring interest groups..

Additionally, the selective usage of evidentiary elements at the expense of others and the same holds for a selective adherence to a dominant discourse at the expense of others) would point singlemindedly to a preferential treatment, which has been established as constituting a typical mode of treatment on behalf of institutional mechanisms of targeting allegations. 4.14 Bringing it all together: Formalizing and subsuming under dogmatic criminal law clauses my case of premeditated attempted murder with the aid of Wigmores diagrams Pursuant to coining the 10 necessary third terms as nodes in the syllogistic chain concerning the formation of legal syllogisms about the subsumption of empirical/minor premises pertaining to the silent massacre phenomenon under dogmatic law major premises and the qualification of actus reus and mens rea conditionals based on legal science,and actual legal precedents, coupled with contextual particularities of multiact, multiparticipant criminal activities in the contexts of organized power mechanisms and secret societies, as well as exposing certain limitations and areas of particular methodological concern in the formation of judiciary belief and the justification of judiciary decisions, I will now proceed to formally synthesizing and subsuming the individual acts of perpetration under the respective criminal law clauses by adhering to the commonly used practice of using Wigmores diagrams. Prior to the exposition of the diagrams (constructed on the grounds of clusters of empirical premises/individual criminal incidents and followed by the respective clauses of the Greek Criminal law which have been breached in each case, as well as by the actus reus and mens rea conditionals that are met in each case, herebelow follows the list of the incidents and the respective allegations or minor premises, accompanied by the targeting experiential catgeories pertaining to each incident: OMITTED

182

Which are part and parcel of what is cryptically called in Greek law [common experience] or [lessons of common experience]

[330]

[331]

You might also like