Human integrity and privacy Human integrity extends beyond the - TopicsExpress



          

Human integrity and privacy Human integrity extends beyond the physical body. In their thoughts and in their personal environments and communications, all humans have the right to remain unobserved and unmolested. This fundamental human right has been rendered null and void through abuse of technological developments by states and corporations for mass surveillance purposes. A person under surveillance is no longer free; a society under surveillance is no longer a democracy. To maintain any validity, our democratic rights must apply in virtual as in real space. * Surveillance violates the private sphere and compromises freedom of thought and opinion. * Mass surveillance treats every citizen as a potential suspect. It overturns one of our historical triumphs, the presumption of innocence. * Surveillance makes the individual transparent, while the state and the corporation operate in secret. As we have seen, this power is being systemically abused. * Surveillance is theft. This data is not public property: it belongs to us. When it is used to predict our behaviour, we are robbed of something else: the principle of free will crucial to democratic liberty. WE DEMAND THE RIGHT for all people to determine, as democratic citizens, to what extent their personal data may be legally collected, stored and processed, and by whom; to obtain information on where their data is stored and how it is being used; to obtain the deletion of their data if it has been illegally collected and stored. WE CALL ON ALL STATES AND CORPORATIONS to respect these rights. WE CALL ON ALL CITIZENS to stand up and defend these rights. WE CALL ON THE UNITED NATIONS to acknowledge the central importance of protecting civil rights in the digital age, and to create an International Bill of Digital Rights. WE CALL ON GOVERNMENTS to sign and adhere to such a convention. Human integrity extends beyond the physical body. Ordinary people when witnessing what is been done to us, seem relieved that us and not them are at the receiving end of this horrible crime, without realizing the obvious, that the techniques being tested on us today, are destined to be used on them, their children and grandchildren tomorrow! Human right to privacy When a medium which can tap or hack humans is used without permission from authorities or motivation from an independent person separately from the sources themself the medium is in violation of the human right to privacy. Surveillance, interception and data collection, which may violate or abuse human rights, in particular the right to privacy, as set out in article 12 of the Universal Declaration of Human Rights and article 17 of the International Covenant on Civil and Political Rights, The human right to privacy, according to which no one shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home or correspondence, and the right to the protection of the law against such interference, and recognizing that the exercise of the right to privacy is important. Hacking or surveillance by sorcery is therefore unlawful. We strongly urge the government to uphold these laws and principles. ELECTRONIC TORTURE AND MIND CONTROL IN THE UNITED STATES OF AMERICA AND LAW ENFORCEMENT COMPLICITY OUTSIDE THE STATES Those who have learned how to locate, focus on, and lock into a person’s brain by remote to manipulate that person’s thoughts and thus his actions. The targeted person often never discovers that he has become a mind control victim, and he ends up hurting others, taking his own life, or simply becoming another “Alzheimer” statistic.Its often called electronic stalking and mind control (ESMC). While writing this, the people who monitor me electronically continually interfere with my computer and e-mails and tap my phones often entered my computer to make changes or to slow down my computer to discourage me and try to make me look crazy. Keeping this writing intact and ensuring accuracy have been a constant battle. Even now, after finishing this, when powerful forces do not want papers such as this one written and disseminated. Fortunately the internet brings together targeted individuals (TIs) of electronic torture and mind control from all conceivable backgrounds. Targets continue to suffer from the same evil. This paper is written principally for those victims. Targeted individuals will readily identify with what I talk about in this paper. Those who are not Targeted Individuals but who are intellectually curious about electronic and mind control assault will learn much about the attack on tens of thousands of targets that also indirectly affects everybody in those targets’ lives. The human resources and the enormous cost required to carry out electronic stalking and mind control, re-enforced in many cases by gang stalking, almost certainly limit its use to governments. Only governments can mobilize the enormous outlay of funds and successfully camouflage the use of those funds. Only governments have the sophisticated equipment and computers required for electronic abuse and mind control.This has to be governmental organised free masonry. Although simple mind control is called sorcery.Only governments can train in secrecy the cadre of handlers who administer the electronic assault and mind control activities, using deception and psychology. Even mega corporations and businesses would not be able to carry out electronic assault and mind control in secrecy unless they did so under cover of government work and with government protection. Several countries, including the United States of America, have experimented with directed electronic stalking and mind control for many years. MK Ultra documents reveal these sick experiments. Everybody who realizes that he has become a targeted individual for electronic stalking and mind control has his story. However, sometimes he has no idea who might have targeted him. In my case, there is overwhelming evidence concerning who initiated my electronic stalking and mind control. Some readers may find this paper objectionable when I talk about who initiated my ESMC and who probably continues to manage it indirectly. I was first targeted for surveillance by the Israelis or pro-Israel elements of the U. S. Government. When a coincidence turns into a string of coincidences, it ceases to be a string of coincidences, and it becomes a pattern. ELECTRONIC TORTURE AND MIND CONTROL BY SORCERY The stalkers are guilty of (1) stalking, (2) harassing with malicious intent, (3) coercion (in attempting to make the victim do things that he/she does not want to do with their mind control methods), (4) psychological and virtual rape, (5) breaking and entering (which they often do to intimidate the victims by unlocking locked doors, turning back clocks, moving items in rooms, hiding other items, etc.), (6) burglary and theft (which they commit when they enter a victim’s home and take items to confuse and disorient the victim), (7) recording a victim’s conversations without his/her consent, (8) peeping tom-ism (through their ability to view the victim), (9) assault and battery (by using electric shock, etc. against the victims), (10) slander (by circulating false rumors and stories that lack proof about the victim), (11) libel (when those rumors and stories are put into print in the from of emails, etc), (12) computer hacking and phone tapping, (13) conspiracy, (14) in some cases, blackmail and extortion, (15) first degree murder (when a victim suffers a fatal car crash because of sleep deprivation), and (16) attempted murder (when their plans do not succeed). Their list of crimes will put them away for the remainder of their evil lives.
Posted on: Thu, 23 Oct 2014 20:43:14 +0000

Trending Topics



Recently Viewed Topics




© 2015