Whistle-Blowers Join Together to file joint law-suit proving U.S. politicians order hit-jobs on members of the public who speak out!!!!!!!
Multiple Former NSA Officials Team Up to Expose Whistle Blower Attacks
A number of different whistleblowers have recently joined together in a massive lawsuit against multiple government agencies, citing civil rights violations and malicious prosecution.
Thomas Drake, Diane Roark, Ed Loomis, J. Kirk Wiebe and William Binney have filed a lawsuit against the NSA, FBI, and DOJ, claiming that the highest ranking officials of those agencies attempted to silence them through prosecution, media smear tactics and occupational threats.
According to the lawsuit:
“Plaintiffs sue Defendants, as individuals and in their official and unofficial capacities, for violations when Robert S. Mueller was Director of the Federal Bureau of Investigation (“FBI”) of their constitutional and civil rights, invasion of privacy, and retaliation for their roles as whistleblowers, including illegal searches and seizures, physical invasion of their residences and places of business, illegal detention as temporary false imprisonment, confiscation of property, cancellation of security clearances leading to the loss of their jobs and employment, intentional infliction of emotional distress, harassment and intimidation.”
The lawsuit went on to say:
“This is a case of the abuse of false and fraudulent claims of national security to target critics and silence criticism of government officials for the benefit of public officials to avoid responsibility and accountability for their actions in government, by abusing false claims of national security to harass and intimidate and harm the Plaintiffs. In retaliation against the Plaintiffs for – confidentially within proper government channels – filing whistleblower complaints with Congress and the Inspector General (“IG”) of the U.S. Department of Defense (“DoD”), the Defendants knowingly and intentionally fabricated a claim of the Plaintiffs involvement in leaks of national security information to New York Times reporters Eric Lichtblau and James Risen, and used this fabricated claim for retaliation, illegal searches and seizures, physical invasion of their residences and places of business, temporary false imprisonment, the confiscation of their property, cancellation of security clearances leading to the loss of their jobs and employment, intentional infliction of emotional distress, harassment and intimidation.”
It has been long known that whistleblowers are not welcomed by the Unites States government, despite the fact that there are laws to protect them, and some politicians claim to support them. It is incredibly rare for a whistleblower to receive any protection or support from the government, and in fact, they many times are threatened with prison time, or the loss of their positions.
In court, the whistleblowers will be represented by attorney Larry Klayman, who specializes in cases against government agencies.
More Whistle-blowers and potential witnesses have been forced into suicide during the Obama Administration than IN ALL OTHER U.S. ADMINISTRATIONS COMBINED!
Obama likes those public citizens, who ‘do the right thing”: dead! He doesn’t negotiate. He doesn’t reward. He doesn’t help. He doesn’t seem to do anything but wipe them out.
The list of people who reported federal crimes to the Obama people, and then died, before the issue got resolved, is staggering.
It is easy to kill your enemies with psychological tricks, manipulation of their home water supply and medication rigging.
Here are some of the tactics that a pissed off politician might use:
America’s Internal Assassination Squad: How Corrupt Politicians & Their Sociopath Billionaires Take You Out
By Dave Emory and Paula White
Micheal T. works in a little known office, in a little known operation in Arlington, Virginia.
He gets up in the morning, brushes his teeth, makes bacon and eggs, reads the Washington Post and then drives 41 miles to work in a plain looking office high-rise.
He turns on his computers, upon arriving at his desk, and he begins killing American taxpayers in cities like Houston, San Francisco and Detroit.
He does not use bullets.
He uses metatags, databases and troll farms. He is a hired character assassin. He works for The President, Senators and their corrupt campaign billionaires.
What you are about to read is based on true incidents. The names have been changed. This actually takes place, on a daily basis, and thousands of domestic Americans are the targets.
Today Micheal has logged in a “Z-Notice” on a man in Houston, Texas. This man worked with Sandia National Laboratories and this man, who we will call Steve, witnessed technicians burying plutonium in a field because their boss had forgotten to add a concrete casing order to his annual budget. The boss didn’t want to get a budget over-run, so he thought he could have his guys fix the cost problem with a shovel and some dirt. When all of the ground squirrels, that usually ran freely around the Sandia campus, suddenly died. People became suspicious.
After Micheal launches the retribution and revenge program on Steve, he will begin the take-down of Susan, a senior nurse at the San Diego VA hospital. She reported that VA officials were putting very ill veterans on a permanent hold, hoping they would die before the VA executives had to go to all of the trouble of treating them.
His next “Z-Notice” is on Bob who reported that Steven Chu was embezzling tens of billions of federal dollars during is tenure at the Department of Energy.
On and on, the Z-Notices keep on coming.
Traditional logic would presume that most government executives would just say: “Thank you for pointing out those bad actors. Here is your whistle-blower reward”.
In the world of corruption and dirty politicians, it does not work like that. Criminally corrupt politicians exist because they have a little club of other criminally corrupt politicians who operate a quid-pro-quo round-robin kick-back scheme.
That is how the British famous politician pedophile ring operates. One famous political pedophile passes the abused, and the cover-up media, to the next. Each one cover’s the other ones butt, so to speak.
The only weapon against them is transparency. The corrupt politicians and their billionaires are the most egotistical, narcissistic idiots you could ever meet. They would rather die than become embarrassed. That is their weak link. Their hubris and ego-mania will always get them.
The only weapon, against their foes, is character assassination. It is a dark and grimy path that the corrupt have wandered down.
Steve, in Houston, rated a “high kill order” because be embarrassed both the President and two, highly placed, corrupt Senators. Steve went to the FBI and that created files that will never go away. Congress has so many watchdogs on the FBI, now, that, despite what creepy things they may, or may not do, It is no longer possible for the FBI to have “hard drives go missing.”
Steve had gotten himself a new job as a technical aide at the University in Houston. Micheal had been watching Steve’s payroll 1099 forms, by hacking into the University HR service, and wanted to make sure that Steve had received at least 2 months of pay. At the same time, Micheal had his boys at Gawker Media write a hatchet job article about how someone suspected that technical aides at the University in Houston were raping young girls.
It was then a simple matter for Micheal to use his DNS spoofing computer to send a FAX to the HR Director, at the University, with a copy of the article, with the words: “I THINK THIS MIGHT BE STEVE”,scrawled across one corner of the fax. The Fax ID made it look like the FAX came from the New York Times. Micheal used a voice modifier and a disposable cell phone with a New Jersey spoofed SIM card to call the staff of the University to say that he thought Steve had molested his daughter. Steve was fired, without any reason except “budget cuts”, that afternoon.
Micheal used his special account on Axciom and Oracle’s recruiter database engine to place a flag on Steve’s background checks and online profiles so that every person that might hire Steve, will see the special internal code that is the digital equivalent of a “red flag”. This made certain that Steve would never get employed again.
He followed that up with a double whammy. Micheal went into all 3 of the main credit services and, first, downgraded Steves credit scores and then he pulled all of the data about anybody that Steve owed money to. Micheal sent anonymous notices to all of the lenders and payment suppliers that Steve was obligated to, in order to try to get them to call his loans, refuse his loans or demand payment, In order to force Steve into bankruptcy and get him to live in his car.
Because Steve was exposed to plutonium, Steve got poisoned by it.
When Steve applies for disability insurance through social security, Micheal gets a notice on his Lotus Notes tracker and Micheal then makes sure that, first, Steve’s disability review is delayed for as long as humanly possible and then, when he finally gets a response, it is denied. All of Steve’s requests for hearings are denied too.
Micheal is delighted. The take-down of Steve is going great. This will teach those damn taxpayers to speak their minds! The Senator will probably give him a big Kill Bonus on this one. Steve can’t get a job, he can’t get disability. He can’t retire and use his other social security because he is not old enough, yet. Micheal, a few days later, gets another Lotus Notes computer notice that Steve has tried to open an online store on Zazzle and Café Press, in a desperate attempt to make money. Micheal sees to that by logging all of Steve’s email addresses as “flagged accounts” and rerouting any payments to Paypal into a black hole. Micheal has the contractors at In-Q-Tel, run a full hack on Steve’s phone.
Steve is persistent, though, and Steve tries to set up an online T-Shirt business. Damn, thinks Micheal, his shirts might sell. Can’t have Steve getting any cash. He might hire a lawyer.
Micheal logs into the agency account at Tai Systems in Taiwan. Tai Systems is a block, or two, of old warehouses. It looks like nothing is going on at the Tai Building. There are not many cars in the parking lot. Tai only needs a handful of people to do what Tai does. All of the buildings are filled with racks, and racks, of Dell Edge Servers. A few IT guys wander around the building looking for red lights and cooling issues. In one room 12 people sit at long tables with triple LCD screens on each table. They are firing digital machine guns.
Tai does two things well. It runs devastating troll farm blog screeds and it fires off some of the most potent denial of service attacks on websites. Micheal orders up a 3 month, 30,000 fake login attempt per day, attack on every website that Steve creates in order to try to get some money. Steve is wiped out and there is now no possible way for Steve to get any money.
Steve commits suicide 6 months later, with a little help from a modified sleeping pill prescription, that Micheal had wired into Steve’s Walgreen’s account, that changed Steve’s brain chemistry in order to increase his anxiety levels.
Micheal got a big bonus from The Senator for that one. The next target looked fun, some guy named Aaron with some wisenheimer tech start-up called Reddit.
Federal lawyers say that ”if a Politician uses these tactics on taxpaying citizens, they are then giving permission for those citizens to return the favor”
Did you piss off a corrupt White House politician and then have your life go to sh*t? Here is how they did it to you:
That corrupt Senator then had their chief of staff call either: In-Q-Tel, Tactical Resources or PsyoContract. These are consulting groups made up of former CIA operatives. Those kinds of services sell “hit-jobs”, using the latest government technology and psychological tactics. Here is what they did to you.
This activity is referred to as “Organized Corporate Stalking” – or “Political Gang Stalking” in the vernacular. Several million of Americans experience this type of activity in the US if they have been deemed a “dissident, activist, domestic threat or domestic terrorist.”
There are dozens of websites and YouTube channels dedicated to these black ops which are perpetrated in every major city of the US (and small towns as well)
Moving objects around in someone’s home is referred to as “gas-lighting” and is done so that the complainant/victim sounds delusional when they call the police for assistance.
After all, who is going to break into a home (usually without leaving a trace) and move a few objects around without stealing anything? It does not sound credible or believable.
Everything is done so there is plausible deniability, should the potential perpetrators ever be identified.
These tactics/techniques were used against American Embassy Staff in Cuba and Russia for years, however US authorities have been quite mum about it since the same techniques are used on a wide scale in the United States against “dissidents, activists” and anyone else who has been extra-judicially deemed a threat to the establishment, the status quo or large companies.
These activities are usually done in conjunction with vehicle vandalism/hacking, computer/e-mail/bank account hacking, mail tampering and untraceable, remotely-initiated damage to electronic devices and their power supplies.
Additionally victims of these covertly-styled assaults are also plagued by people passing by their residences at all hours and blowing their horns or revving their engines (referred to as a noise campaign).
Codes can be remotely stripped/read from computer keyboards, phones and alarm touch-pads since every key generates an electronic signature which can be read/culled from a distance – there are devices built specifically for this purpose.
Furthermore, these black ops are done while the victim’s name is simultaneously being slandered via false accusations of criminal activity, theft, violence, crimes of moral turpitude and prior mental health issues. The “teams” perpetrating these illegal acts will try and destroy every aspect of the target’s life.
You are likely bugged and your vehicle tagged with a GPS, thus moving will not necessarily terminate the issue(s) you are experiencing – although if your experience(s) have been published it may alleviate some of the illegal activities.
These politicos will hire private security groups and criminals to follow their targets around in order to let them know that he/she is now “persona non grata” and being monitored.
Being a single woman – especially with a child makes these activities even more traumatizing.
These tactics were used by Hitler, Mao Tze Tung, the East German Stasi and the KGB.
All of these activities are done so that the perpetrators are hard to identify – and the criminal acts are hard to prove to the police – and in court. (plausible deniability).
You will find you can’t get a job. You will get many phone calls and emails from people with east indian accents asking you to approve submitting a resume for a great job. Each time you will never hear back from them. Your disappointment will increase. That is how they like it. Those were not real recruiters, they were operatives trying to build you up and let you down, over and over, in order to create a sense of self-doubt and a sense of personal failure, so that you will be too emotionally weakened to fight against the politician.
It is also referred to as “No-Touch Torture” and is used to intimidate the target in addition to making them psychologically more vulnerable. The technique was developed by the Stasi and is calledZersetzung
Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation ordissolution) was a working technique of the East German secret police, the Stasi. The “measures ofZersetzung“, defined in the framework of a directive on police procedures in 1976, were effectively used in the context of so-called “operational procedures” (in German Operative Vorgänge or OV). They replaced the overt terror of the Ulbricht era.
As to the practice of repressive persecution, Zersetzung comprised extensive and secret methods of control and manipulation, even in the personal relations of the target. The Stasi relied for this on its network of unofficial collaborators (in German inoffizielle Mitarbeiter or IM), on the State’s influence on institutions, and on “operational psychology”. By targeted psychological attacks the Stasi tried in this way to deprive the dissident of any possibility of “hostile action”.
Thanks to numerous files of the Stasi made public following “the turning” (Die Wende) of East Germany, the use of measures of Zersetzung is well documented. Estimates of the number of victims of such measures are on the order of a thousand, or even about 10,000, of which 5,000 sustained irreversible damage. Pensions for restitution have been created for the victims.
[Zersetzung is] an operational method of the Ministry for Security of State for an efficacious struggle against subversive doings, in particular in the treatment of operations. With Zersetzung, across different operational political activities, one gains influence over hostile and negative persons, in particular over that which is hostile and negative in their dispositions and beliefs, in such a way that these would be shaken off and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be provoked, exploited, and reinforced.
The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to impede thereby, in a preventive manner, the hostile and negative doings, to limit them in large part, or to totally avert them, and if applicable to prepare grounds for a political and ideological reestablishment.
Zersetzung is equally an immediate constitutive element of “operational procedures” and other preventive activities to impede hostile gatherings. The principal forces to put Zersetzung in practice are the unofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures ofZersetzung.
Zersetzung must be produced on the basis of an analysis of the root of facts and the exact establishment of a concrete goal. Zersetzung must be executed in a uniform and supervised manner; its results must be documented.
The political explosivity of Zersetzung poses elevated imperatives in that which concerns the maintenance of secrecy.
During the first decade of existence of the German Democratic Republic, political opposition was combatted primarily through the penal code, via accusations of incitement to war or boycott. To counteract the isolation of the GDR on the international scene due to the construction of the Berlin wall in 1963, judicial terror was abandoned. Especially since the debut of the Honecker era in 1971, the Stasi intensified its efforts to punish dissident behaviors without using the penal code.Important motives were the desire on the part of the GDR for international recognition andrapprochement with West Germany at the end of the ’60s. In fact the GDR was committed, in adhering to the Charter of the U.N. and the Helsinki accords as well as the fundamental treaty signed with the Federal Republic of Germany, to respect human rights, or at least it announced its intention as such. The regime of the Socialist Unity Party of Germany decided thus to reduce the number of political prisoners, which was compensated for by practices of repression without imprisonment or judicial condemnation.
The Stasi used Zersetzung essentially as a means of psychological oppression and persecution.Findings of Operativen psychologie (psychological operations), formulated into method at the Stasi’s College of Legal Studies (Juristischen Hochschule der Staatssicherheit, or JHS), were applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them through subjection to repeated disappointments, and to socially alienate them through interference in and disruption of their relationships with others. The aim was to then induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism. The Stasi intended that their role as mastermind of the operations remain concealed. Jürgen Fuchs, a victim of Zersetzung who later wrote about his experience, described the Stasi’s actions as “psychosocial crime”, and “an assault on the human soul”.
Although its techniques had been established as effective by the late 1950s, Zersetzung was not defined in terms of scientific method until the mid-1970s, and only began to be carried out in a significantly systematic way in the 1970s and 1980s. It is difficult to determine the number of people targeted, since source material has been deliberately and considerably redacted; it is known, however, that tatics were varied in scope, and that a number of different departments participated in their implementation. Overall there was a ratio of four or five authorised Zersetzung operators for each targeted group, and three for each individual. Some sources indicate that around 5,000 people were “persistently victimised” by Zersetzung. At the College of Legal Studies, the number of dissertations submitted on the subject of Zersetzung was in double figures. It also had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.
Institutions implementing and cooperating with Zersetzung operations
Almost all Stasi departments were involved in Zersetzung operations, although foremost among these in implementing them were the head department of the Stasi’s directorate XX (Hauptabteilung XX) in Berlin, as well as its divisional offices in regional and municipal government. The function of the head and area Abteilung XXs was to maintain surveillance of religious communities; cultural and media establishments; alternative political parties; the GDR’s many political establishment-affiliated mass social organisations; sport; and education and health services – effectively, as such, covering all aspects of civic life and activity. The Stasi made use of the means available to them within, and as a circumstance of, the GDR’s closed social system. An established, politically-motivated collaborative network (politisch-operatives Zusammenwirken, or POZW) provided them with extensive opportunities for interference in such situations as the sanctioning of professionals and students, expulsion from associations and sports clubs, and occasional arrests by the Volkspolizei (the GDR’s quasi-military national police). Refusal of permits for travel to socialist states, or denial of entry at Czechoslovakianand Polish border crossings where no visa requirement existed, were also arranged. The various collaborators (Partnern des operativen Zusammenwirkens) included branches of regional government, university and professional management, housing administrative bodies, the Sparkasse public savings bank, and in some cases head physicians. The Stasi’s Linie III (Observation), Abteilung 26 (Telephone and room surveillance) and M (Postal communications) departments provided essential background information for the designing of Zersetzung techniques, with Abteilung 32 procuring the required technology.
The Stasi also collaborated with the secret services of other Eastern Bloc countries in implementingZersetzung. One such example was the co-operation of the Polish secret services in actions taken against branches of the Jehovah’s Witnesses organisation in the early 1960s, which would come to be known as “innere Zersetzung“ (internal subversion).
The Stasi applied Zersetzung before, during, after, or instead of incarcerating the targeted individual. The “operational procedures” did not have as an aim, in general, to gather evidence for charges against the target, or to be able to begin criminal prosecutions. The Stasi considered the “measures ofZersetzung” rather in part as an instrument that was used when judiciary procedures were not convenient, or for political reasons such as the international image of the GDR. In certain cases, the Stasi attempted meanwhile to knowingly inculpate an individual, as for example in the case of Wolf Biermann: The Stasi set him up with minors, hoping that he would allow himself to be seduced, and that they could then pursue criminal charges. The crimes that they researched for such accusations were non-political, as for example drug possession, trafficking in customs or currencies, theft, financial fraud, and rape.
…the Stasi often used a method which was really diabolic. It was called Zersetzung, and it’s described in another guideline. The word is difficult to translate because it means originally “biodegradation.” But actually, it’s a quite accurate description. The goal was to destroy secretly the self-confidence of people, for example by damaging their reputation, by organizing failures in their work, and by destroying their personal relationships. Considering this, East Germany was a very modern dictatorship. The Stasi didn’t try to arrest every dissident. It preferred to paralyze them, and it could do so because it had access to so much personal information and to so many institutions.
—Hubertus Knabe, German historian 
The proven forms of Zersetzung are described in the directive 1/76:
a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; […] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups […]; putting in place spatial and temporal obstacles rendering impossible or at least difficult the reciprocal relations of a group […], for example by […] assigning distant workplaces. —Directive No. 1/76 of January 1976 for the development of “operational procedures”.
Beginning with intelligence obtained by espionage, the Stasi established “sociograms” and “psychograms” which it applied for the psychological forms of Zersetzung. They exploited personal traits, such as homosexuality, as well as supposed character weaknesses of the targeted individual — for example a professional failure, negligence of parental duties, pornographic interests, divorce, alcoholism, dependence on medications, criminal tendencies, passion for a collection or a game, or contacts with circles of the extreme right — or even the veil of shame from the rumors poured out upon one’s circle of acquaintances. From the point of view of the Stasi, the measures were the most fruitful when they were applied in connection with a personality; all “schematism” had to be avoided.
For marketing and political manipulation, Google now maintains a sociogram of each user and manipulates each user via Stasi-like mood manipulation.
Moreover, methods of Zersetzung included espionage, overt, hidden, and feigned; opening letters and listening to telephone calls; encroachments on private property; manipulation of vehicles; and even poisoning food and using false medications. Certain collaborators of the Stasi tacitly took into account the suicide of victims of Zersetzung.
It has not been definitely established that the Stasi used x-rays to provoke long-term health problems in its opponents. That said, Rudolf Bahro, Gerulf Pannach, and Jürgen Fuchs, three important dissidents who had been imprisoned at the same time, died of cancer within an interval of two years. A study by the Federal Commissioner for the Records of the State Security Service of the former GDR (Bundesbeauftragte für die Unterlagen des Staatssicherheitsdienstes der ehemaligen Deutschen Demokratischen Republik or BStU) has meanwhile rejected on the basis of extant documents such a fraudulent use of x-rays, and only mentions isolated and unintentional cases of the harmful use of sources of radiation, for example to mark documents.
In the name of the target, the Stasi made little announcements, ordered products, and made emergency calls, to terrrorize him/her. To threaten or intimidate or cause psychoses the Stasi assured itself of access to the target’s living quarters and left visible traces of its presence, by adding, removing, and modifying objects.
Against groups and social relations
The Stasi manipulated relations of friendship, love, marriage, and family by anonymous letters, telegrams and telephone calls as well as compromising photos, often altered. In this manner, parents and children were supposed to systematically become strangers to one another. To provoke conflicts and extramarital relations the Stasi put in place targeted seductions by Romeo agents.
For the Zersetzung of groups, it infiltrated them with unofficial collaborators, sometimes minors.The work of opposition groups was hindered by permanent counter-propositions and discord on the part of unofficial collaborators when making decisions. To sow mistrust within the group, the Stasi made believe that certain members were unofficial collaborators; moreover by spreading rumors and manipulated photos, the Stasi feigned indiscretions with unofficial collaborators, or placed members of targeted groups in administrative posts to make believe that this was a reward for the activity of an unofficial collaborator. They even aroused suspicions regarding certain members of the group by assigning privileges, such as housing or a personal car. Moreover the imprisonment of only certain members of the group gave birth to suspicions.
Target groups for measures
The Stasi used Zersetzung tactics on individuals and groups. There was no particular homogeneous target group, as opposition in the GDR came from a number of different sources. Tactical plans were thus separately adapted to each perceived threat. The Stasi nevertheless defined several main target groups:
- associations of people making collective visa applications for travel abroad
- artists’ groups critical of the government
- religious opposition groups
- youth subculture groups
- groups supporting the above (human rights and peace organisations, those assisting illegal departure from the GDR, and expatriate and defector movements).
The Stasi also occasionally used Zersetzung on non-political organisations regarded as undesirable, such as the Watchtower Society.
Prominent individuals targeted by Zersetzung operations included Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, husband and wife Gerd und Ulrike Poppe, and Wolfgang Templin.
Social and juridicial process
Once aware of his own status as a target, GDR opponent Wolfgang Templin tried, with some success, to bring details of the Stasi’s Zersetzung activities to the attention of western journalists. In 1977Der Spiegel published a five-part article series (“Du sollst zerbrechen!” – “You’re going to crack!”) by the exiled Jürgen Fuchs, in which he describes the Stasi’s “operational psychology”. The Stasi tried todiscredit Fuchs and the contents of similar articles, publishing in turn claims that he had a paranoidview of its function, and intending that Der Spiegel and other media would assume he was suffering from a persecution complex. This, however, was refuted by the official Stasi documents examined after Die Wende (the political power shift in the GDR in 1989-90).
Because the scale and nature of Zersetzung were unknown both to the general population of the GDR and to people abroad, revelations of the Stasi’s malicious tactics were met with some degree of disbelief by those affected. Many still nowadays express incomprehension at how the Stasi’s collaborators could have participated in such inhuman actions.
Since Zersetzung as a whole, even after 1990, was not deemed to be illegal because of the principle ofnulla poena sine lege (no penalty without law), actions against involvement in either its planning or implementation were not enforceable by the courts. Because this specific legal definition ofZersetzung as a crime didn’t exist, only individual instances of its tactics could be reported. Acts which even according to GDR law were offences (such as the violation of Briefgeheimnis, the secrecy of correspondence) needed to have been reported to the GDR authorities soon after having been committed in order not to be subject to a statute of limitations clause. Many of the victims experienced the additional complication that the Stasi was not identifiable as the originator in cases of personal injury and misadventure. Official documents in which Zersetzung methods were recorded often had no validity in court, and the Stasi had many files detailing its actual implementation destroyed.
Unless they had been detained for at least 180 days, survivors of Zersetzung operations, in accordance with §17a of a 1990 rehabilitation act (the Strafrechtlichen Rehabilitierungsgesetzes, or StrRehaG), are not eligible for financial compensation. Cases of provable, systematically effected targeting by the Stasi, and resulting in employment-related losses and/or health damage, can be pursued under a law covering settlement of torts (Unrechtsbereinigungsgesetz, or 2. SED-UnBerG) as claims either for occupational rehabilitation or rehabilitation under administrative law. These overturn certain administrative provisions of GDR institutions and affirm their unconstitutionality. This is a condition for the social equalisation payments specified in the Bundesversorgungsgesetz (the war victims relief act of 1950). Equalisation payments of pension damages and for loss of earnings can also be applied for in cases where victimisation continued for at least three years, and where claimants can prove need.The above examples of seeking justice have, however, been hindered by various difficulties victims have experienced, both in providing proof of the Stasi’s encroachment into the areas of health, personal assets, education and employment, and in receiving official acknowledgement that the Stasi was responsible for personal damages (including psychic injury) as a direct result of Zersetzungoperations.
Modern use of techniques
Russia‘s secret police, the FSB, has been reported to use such techniques against foreign diplomats and journalists.
1. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic. Directive No. 1/76 on the Development and Revision of Operational Procedures Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge (OV)
2. Jump up ^ Federal Commissioner for the Records of the State Security Service of the former German Democratic Republic: The Unofficial Collaborators (IM) of the MfS
3. Jump up ^ Süß, Strukturen, p. 217.
4. Jump up ^ Consider in this regard the written position taken by Michael Beleites, responsible for the files of the Stasi in the Free State of Saxony: PDF, visited 24 August 2010, as well as 3sat : Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, visited 24 August 2010.
5. Jump up ^ Ministry for Security of State, Dictionary of political and operational work, entryZersetzung: Ministerium für Staatssicherheit (Hrsg.): Wörterbuch zur politisch-operativen Arbeit, 2. Auflage (1985), Stichwort: „Zersetzung“, GVS JHS 001-400/81, p. 464.
6. Jump up ^ Rainer Schröder: Geschichte des DDR-Rechts: Straf- und Verwaltungsrecht, forum historiae iuris, 6 avril 2004.
7. Jump up ^ Falco Werkentin: Recht und Justiz im SED-Staat. Bundeszentrale für politische Bildung, Bonn 1998, 2. durchgesehene Auflage 2000, S. 67.
8. Jump up ^ Sandra Pingel-Schliemann: Zerstörung von Biografien. Zersetzung als Phänomen der Honecker-Ära. In: Eckart Conze/Katharina Gajdukowa/Sigrid Koch-Baumgarten (Hrsg.): Die demokratische Revolution 1989 in der DDR. Köln 2009, S. 78–91.
9. Jump up ^ Art. 1 Abs. 3 UN-Charta. Dokumentiert in: 12. Deutscher Bundestag: Materialien der Enquete-Kommission zur Aufarbeitung von Geschichte und Folgen der SED-Diktatur in Deutschland. Band 4, Frankfurt a. M. 1995, S. 547.
10. Jump up ^ Konferenz über Sicherheit und Zusammenarbeit in Europa, Schlussakte, Helsinki 1975, S. 11.
11. Jump up ^ Art. 2 des Vertrages über die Grundlagen der Beziehungen zwischen der Bundesrepublik Deutschland und der Deutschen Demokratischen Republik vom 21. Dezember 1972. In: Matthias Judt (Hrsg.): DDR-Geschichte in Dokumenten – Beschlüsse, Berichte, interne Materialien und Alltagszeugnisse. Bundeszentrale für politische Bildung Bd. 350, Bonn 1998, S. 517.
12. Jump up ^ Johannes Raschka: „Staatsverbrechen werden nicht genannt“ – Zur Zahl politischer Häftlinge während der Amtszeit Honeckers. In: Deutschlandarchiv. Band 30, Nummer 1, 1997, S. 196
13. Jump up ^ Jens Raschka: Einschüchterung, Ausgrenzung, Verfolgung – Zur politischen Repression in der Amtszeit Honeckers. Berichte und Studien, Band 14, Dresden 1998, S. 15.
14. Jump up ^ Klaus-Dietmar Henke: Zur Nutzung und Auswertung der Stasi-Akten. In: Vierteljahrshefte für Zeitgeschichte. Nummer 4, 1993, S. 586.
15. Jump up ^ Süß: Strukturen. S. 229.
16. ^ Jump up to: a b Pingel-Schliemann: Zersetzen. S. 188.
17. ^ Jump up to: a b Jens Gieseke: Mielke-Konzern. S. 192f.
18. Jump up ^ Pingel-Schliemann: Formen. S. 235.
19. Jump up ^ Süß: Strukturen. S. 202-204.
20. Jump up ^ Süß: Strukturen. S. 217.
21. Jump up ^ Siehe hierzu die schriftliche Stellungnahme des Sächsischen Landesbeauftragten für die Stasi-Unterlagen Michael Beleites zur Anhörung des Rechtsausschusses des Deutschen Bundestages zu den Gesetzentwürfen und Anträgen zur Verbesserung rehabilitierungsrechtlicher Vorschriften für Opfer politischer Verfolgung in der DDR vom 7. Mai 2007 (PDF, 682 KB), eingesehen am 24. August 2010, sowie 3sat: Subtiler Terror – Die Opfer von Stasi-Zersetzungsmethoden, eingesehen am 24. August 2010.
22. Jump up ^ Günter Förster: Die Dissertationen an der „Juristischen Hochschule“ des MfS. Eine annotierte Bibliographie. BStU, Berlin 1997, Online-Quelle (Memento vom 13. Juli 2009 im Internet Archive).
23. Jump up ^ Anforderungen und Wege für eine konzentrierte, offensive, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Juristische Hochschule Potsdam 1977, BStU, ZA, JHS 24 503.
24. Jump up ^ Jens Gieseke: Das Ministerium für Staatssicherheit 1950–1989/90 – Ein kurzer historischer Abriss. In: BF informiert. Nr. 21, Berlin 1998, S. 35.
25. Jump up ^ Hubertus Knabe: Zersetzungsmaßnahmen. In: Karsten Dümmel, Christian Schmitz (Hrsg.): Was war die Stasi? KAS, Zukunftsforum Politik Nr. 43, Sankt Augustin 2002, S. 31, PDF, 646 KB.
26. Jump up ^ Pingel-Schliemann: Zersetzen, S. 141–151.
27. Jump up ^ Waldemar Hirch: Zusammenarbeit zwischen dem ostdeutschen und dem polnischen Geheimdienst zum Zweck der „Zersetzung“ der Zeugen Jehovas. In: Waldemar Hirch, Martin Jahn, Johannes Wrobel (Hrsg.): Zersetzung einer Religionsgemeinschaft: die geheimdienstliche Bearbeitung der Zeugen Jehovas in der DDR und in Polen. Niedersteinbach 2001, S. 84–95.
28. Jump up ^ Aus einem Protokoll vom 16. Mai 1963, zit. n. Sebastian Koch: Die Zeugen Jehovas in Ostmittel-, Südost- und Südeuropa: Zum Schicksal einer Religionsgemeinschaft. Berlin 2007, S. 72.
29. Jump up ^ Richtlinie 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge vom 1. Januar 1976. Dokumentiert in: David Gill, Ulrich Schröter: Das Ministerium für Staatssicherheit. Anatomie des Mielke-Imperiums. S. 390
30. Jump up ^ Lehrmaterial der Hochschule des MfS: Anforderungen und Wege für eine konzentrierte, rationelle und gesellschaftlich wirksame Vorgangsbearbeitung. Kapitel 11: Die Anwendung von Maßnahmen der Zersetzung in der Bearbeitung Operativer Vorgänge vom Dezember 1977, BStU, ZA, JHS 24 503, S. 11.
31. ^ Jump up to: a b c d Gieseke: Mielke-Konzern. S. 195f.
32. ^ Jump up to: a b Pingel-Schliemann: Phänomen. S. 82f.
33. Jump up ^ Hubertus Knabe: The dark secrets of a surveillance state, TED Salon, Berlin, 2014
34. Jump up ^ Roger Engelmann, Frank Joestel: Grundsatzdokumente des MfS. In: Klaus-Dietmar Henke, Siegfried Suckut, Thomas Großbölting (Hrsg.): Anatomie der Staatssicherheit: Geschichte, Struktur und Methoden. MfS-Handbuch. Teil V/5, Berlin 2004, S. 287.
35. ^ Jump up to: a b Knabe: Zersetzungsmaßnahmen. S. 27–29
36. Jump up ^ Arbeit der Juristischen Hochschule der Staatssicherheit in Potsdam aus dem Jahr 1978, MDA, MfS, JHS GVS 001-11/78. In: Pingel-Schliemann: Formen. S. 237.
37. Jump up ^ Pingel-Schliemann: Zersetzen. S. 266–278.
38. Jump up ^ Pingel-Schliemann: Zersetzen. S. 277.
39. Jump up ^ Pingel-Schliemann: Zersetzen, S. 280f.
40. Jump up ^ Der Spiegel 20/1999: In Kopfhöhe ausgerichtet (PDF, 697 KB), S. 42–44.
41. Jump up ^ Kurzdarstellung des Berichtes der Projektgruppe „Strahlen“ beim BStU zum Thema: „Einsatz von Röntgenstrahlen und radioaktiven Stoffen durch das MfS gegen Oppositionelle – Fiktion oder Realität?“, Berlin 2000.
42. Jump up ^ Udo Scheer: Jürgen Fuchs – Ein literarischer Weg in die Opposition. Berlin 2007, S. 344f.
43. Jump up ^ Gieseke: Mielke-Konzern. S. 196f.
44. Jump up ^ Gisela Schütte: Die unsichtbaren Wunden der Stasi-Opfer. In: Die Welt. 2. August 2010, eingesehen am 8. August 2010
45. Jump up ^ Pingel-Schliemann: Zersetzen, S. 254–257.
46. Jump up ^ Axel Kintzinger: „Ich kann keinen mehr umarmen“. In: Die Zeit. Nummer 41, 1998.
47. ^ Jump up to: a b Pingel-Schliemann: Zersetzen, S. 358f.
48. Jump up ^ Stefan Wolle: Die heile Welt der Diktatur. Alltag und Herrschaft in der DDR 1971–1989. Bonn 1999, S. 159.
49. Jump up ^ Kollektivdissertation der Juristischen Hochschule der Staatssicherheit in Potsdam. In: Pingel-Schliemann: Zersetzen. S. 119.
50. Jump up ^ Jens Gieseke: Mielke-Konzern. S. 192f.
51. Jump up ^ Mike Dennis: Surviving the Stasi: Jehovah’s Witnesses in Communist East Germany, 1965 to 1989. In: Religion, State and Society. Band 34, Nummer 2, 2006, S. 145-168
52. Jump up ^ Gieseke: Mielke-Konzern. S. 196f.
53. Jump up ^ Scheer: Fuchs. S. 347.
54. Jump up ^ Gieseke: Mielke-Konzern. S. 196f.
55. Jump up ^ Treffbericht des IMB „J. Herold“ mit Oberleutnant Walther vom 25. März 1986 über ein Gespräch mit dem „abgeschöpften“ SPIEGEL-Redakteur Ulrich Schwarz. Dok. in Jürgen Fuchs: Magdalena. MfS, Memphisblues, Stasi, Die Firma, VEB Horch & Gauck – Ein Roman. Berlin 1998, S. 145.
56. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB).
57. Jump up ^ Vgl. Interviews mit Sandra Pingel-Schliemann (PDF; 114 kB) und Gisela Freimarck (PDF; 80 kB).
58. Jump up ^ Interview mit der Bundesbeauftragten für die Stasi-Unterlagen Marianne Birthler im Deutschlandradio Kultur vom 25. April 2006: Birthler: Ex-Stasi-Offiziere wollen Tatsachen verdrehen, eingesehen am 7. August 2010.
59. Jump up ^ Renate Oschlies: Die Straftat „Zersetzung“ kennen die Richter nicht. In: Berliner Zeitung. 8. August 1996.
60. Jump up ^ Hubertus Knabe: Die Täter sind unter uns – Über das Schönreden der SED-Diktatur. Berlin 2007, S. 100.
61. Jump up ^ Ilko-Sascha Kowalczuk: Stasi konkret – Überwachung und Repression in der DDR, München 2013, S. 211, 302f.
62. Jump up ^ Stasiopfer.de: Was können zur Zeit sogenannte „Zersetzungsopfer“ beantragen?, PDF, 53 KB, eingesehen am 24. August 2010.
63. Jump up ^ Jörg Siegmund: Die Verbesserung rehabilitierungsrechtlicher Vorschriften – Handlungsbedarf, Lösungskonzepte, Realisierungschancen, Bundesstiftung Aufarbeitung, Symposium zur Verbesserung der Unterstützung der Opfer der SED-Diktatur vom 10. Mai 2006, PDF (Memento vom 28. November 2010 im Internet Archive), 105 KB, S. 3, eingesehen am 24. August 2010.
64. Jump up ^ Russian spy agency targeting western diplomats, The Guardian, 2011-7-23
How Do You Fight Back When Large Corrupt Entities Attack You: Your adversaries will hire private investigators known as “Opposition Researchers”. Regular people call them“hit-men”. From the famously vindictive SidneyBlumenthal, to the notorious Richard Berman, to unknown college kid junior “hit-men” in training; whenthey come for you it will be harsh, massively financed and driven by the madness of power-hungry campaign technology billionaires.
Your saving grace, though, will always be this: The “bad guys” are forced to operate in darkness and stealth, once exposed to the light, they will wither and crawl away. In this new Age of Transparency, the ability to shed light
on bad guys is more potent than ever! Look to major journalists, social networks and carbon-copy every law enforcement agency, so everyone knows what is going on, and so that no single entity can “stone-wall” or cover-up.
Tips for Tech Companies Under Attack – 1. Cooperate with every law enforcement agency request. Every law enforcement agency will have an interest in terminating felony-grade law-breaking.
2. When they seek to destroy your reputation. Prove them wrong in public. In our case, the volume of greatreferences and broadcast news acclaim, posted on this site, counters any credibility attacks. They will try to spin the phrase “scam” or “not credible” into their attacks. Prove them wrong with the facts. Offer to meet them in any federal court or live TV debate to prove the facts. If the “bad guys” are involved in crime, be sure to show those facts in your public debate, so that people consider the source of the attacks. It isn’t possible to take a considered read of our references and proven deliverable documentation and not realize that any “scam” attack media/blog clips are fabricated by the attackers. In our case, we have seen law enforcement records and investigator documents proving severe felony-level crimes were engaged in by the people suspected of attacking our Team. We are extremely confident about who will be looking bad when everything is all-said-and-done. In today’s total information world, you can hire thousands of services that can track the off-shore tax evasion accounts, escort services, political bribes and illegal PAC groups, kick-backs, insider trading and other criminal actions that any criminal billionaire, that is attacking you is involved in. If you find such information, help the law enforcement people by delivering it to all of them. The level of felony crimes, these kinds of people get involved in, are “felony-grade embezzlement and racketeering matters”, according to the FBI. They are going to get in pretty big trouble. In the cases where they used taxpayer money to stage their crimes, they are going to get in Super Big trouble.
3. Sue them. There are now contingency law firms who will cover the costs of going after big bad guys in exchange for a percentage of the judgement. For example: Many people, and countries, have now proven that Google rigs it’s search engines to harm it’s adversaries. If Google did that to you, the technical proof now exists and you can win in court and get compensated for the damages they caused you.
4. Watch out for “moles”. Crazy rich people have private eye’s and ex-employees that they pay to get a job at your company. They pretend that they are helping you, then they sabotage your effort. Consider past jobs that future employees had with your attackers.
5. Watch the news coverage for exposes about crimes that your attackers are suspected of being involved in and contact others that were harmed by the attackers. Form a support coalition with others that were damaged by the attackers.
6. Read about who does hired character assassinations, and how they do it, at THIS LINK and watch for the early signs of the attacks.
7. To understand the process, watch some of the movies about how the bad guys sabotage: Francis Coppola’s:Tucker, A Man and His Dream; Greg Kinear’s: Flash of Genius, and read some of the history of the “tech take-downs” at THIS LINK http://wp.me/P1EyVm-xH
8. Stay on the “side of the Angels”. Good eventually wins over evil. In this new “Age of Transparency”, evil is losing faster than ever.
9. As punishment against you, rich political campaign backers will try to have their federal lackey’s change the law to hurt you. If you are a tech group, for example, the “bad guys”, might organize to suddenly try to change the patent laws so that your business is destroyed. When billionaires put bribes in the right pockets, they accomplish sweeping policy change. Don’t let that happen. Expose the “who” and the “why” in such tactics.
10. Consider Quid-Pro-Quo. In many countries the rule is: “if they do it to you, you have every right to do it back to them”
11. Watch out for “honey traps” in your activities and in on-line sites. Read the Snowden/Greenwald reports on what “Honey Traps” are.
12. The Bad Guys are usually very involved in politics because they like to control things. In order to control politics they own many stealth tabloid publications where they can order attack stories written about you. Some of these kinds of people own famous online media tabloids (ie: Gawker Media Group) and stock tip publications which are really just shill operations for their agendas and attacks. Identify these publications and partner with every person, or company, who they have coordinated attacks on in the past. Read about their attacks on inventor Mike Cheiky, Gary D. Conley, Aaron Swartz, Stan Meyer, Preston Tucker and hundreds of other innovators ( http://wp.me/P1EyVm-xH ) that they wanted “out of the way”.
13. Certain “special interests” own, and control, the content on Google, Reddit, Hearst Publications, Motley Fool and other “publication outlets”. You will only see glowing reports about the “bad guys” on those. You will see no negative reports about the “bad guys”, allowed on those sites, and every bad report about you will be manually up-ranked and locked into the top slot on their page in order to damage you. The down-side for the bad guys, though, is that the internet remembers everything. You can now prove, in court, showing technical and historical metric data, that they intentionally locked and damaged you and you can get compensated for the damages.
14. Every single troll blog comment, every pseudo attack article about you, everything is already tracked back to the actual author. The NSA have done it, that is well known. NO amount of TOR, or VPN on top of VPN or stealthing software can hide a troll attacker any more. What is only now becoming known is that the official, and also the independent hacker, Chinese and Russian spies have got almost all of that information too. Hackers have broken into Sony, The White House, All of Target, All of the Federal Employee Records, everything. In a court case you can now, legally, subpoena NSA records to sue the attackers. Others, hearing of your filed case, may just show up and give you the information. Attackers cannot hide behind anonymity any more. Those who were blogging that you “sleep with goats” and “eat unborn children” can now be found out and delt with.
15. Do you have on-line stores and paypal or credit card accounts that take payments at those stores? Trying to make a little cash on the side? Confused about why you never get any orders? The attackers have DNS-re-routed your stores and payment certificates, spoofed your sites and turned off all of your income potential from those on-line options in order to damage your economic potential. Illegal? Yes. Happening to people every day? Yes. Get professional IT services to document the spoofs, and re-routes, and sue the operators of those tactics that are attacking your revenue stream.
16. It costs $50,000.00 to bribe a Senator. Some of these tech billionaires earn that much in 3 minutes. Beware of your Senator. Senators take stock options in tech companies as bribes, watch for linkages. See the 60 Minutes Episode called: Congress Trading On Insider Information.
17. Want a job? Forget about it! The bad guys went into Axciom, Oracle, SAP, and all of the Human Resources and Recruiter databases, and put “red flag notices” on your profile. You will get some great first interviews, but when they run your back-ground check, you will never hear back from that interviewer again. You got “HR Black-listed”, in retribution, for accidentally bothering a campaign billionaire. Hire an HR service to look and print out your false “red flag” HR data-base inserts and use those as evidence in your lawsuit.
18. (This one, submitted by a Washington Post reporter): They will anonymously put all of your email addresses on blacklists, and watch-lists, so that you can’t use services like craigslist, cafe press, zazzle or other on-line services to make money. If you try to open any accounts on those services, you either won’t be able to create an account or, you will get an account, but all of your orders will get “spoofed” into oblivion so you can’t make any money. The attackers believe that by causing you as much economic hard-ship as possible, they can get retribution for what-ever they have perceived that you have done to offend them. Again, use an IT forensic services group to get the data to show this is happening, trace it, and sue the perpetrators.
19. Their actions provide the proof. When you look out on the internet and add up the pronouncements of “scam”, “sleeping with goats”, etc. The volume of attack items proves that no mere mortal, or company, could have acquired that much media unless it was placed there by very wealthy parties. Everyone now knows that the web is controlled. The volume of attacks can often prove that those attacks are fabricated. Additionally, IP Trace Routing and digital tracking now can prove the attackers manipulation of your data, email and website traffic. One of your best sets of evidence will come from the attackers, themselves. The bad guys always leave a digital trail of bread-crumbs leading right back to themselves. You can hire an IT company to build a “tracking array” comprised of hundreds of websites which are bait to catch them in the act. Regarding: Paranoia vs. documented evidence. If you, and others have experienced the tactics, and the police have recorded the tactics being used against you, it isn’t paranoia to be cautious.
HERE ARE SOME OF THE ACTUAL PAGES FROM THE ATTACK INSTRUCTION MANUALS AS REVEALED BY THE GUCCIFER AND SNOWDEN LEAKS: