{"id":945,"date":"2011-12-15T15:44:09","date_gmt":"2011-12-15T19:44:09","guid":{"rendered":"http:\/\/govsponsoredstalking.info\/?p=945"},"modified":"2011-12-15T15:52:50","modified_gmt":"2011-12-15T19:52:50","slug":"nsa-transmissions-elf-mind-control-cancer-corruptions-july-1-2010","status":"publish","type":"post","link":"http:\/\/govsponsoredstalking.info\/?p=945","title":{"rendered":"NSA transmissions ELF mind control Cancer corruptions (July 1, 2010)"},"content":{"rendered":"<h1>Description<\/h1>\n<p>IN THE UNITED STATES DISTRICT COURTS<\/p>\n<p>FOR THE DISTRICT OF COLUMBIA<\/p>\n<p>MIREILLE TORJMAN\tCASE NO.:<\/p>\n<p>Plaintiff<\/p>\n<p>V.<\/p>\n<p>FEDERAL BUREAU OF INVESTIGATIONS, et al.<\/p>\n<p>935 Pennsylvania Avenue Northwest<\/p>\n<p>Washington, DC 20535-0001;<\/p>\n<p>CENTRAL INTELLIGENCE AGENCY<\/p>\n<p>Office of Public Affairs<\/p>\n<p>Washington, D.C. 20505;<\/p>\n<p>NATIONAL SECURITY AGENCY<\/p>\n<p>9800 Savage Road, Suite 6711<\/p>\n<p>Fort Meade, MD 20755-6711;<\/p>\n<p>DEPARTMENT OF JUSTICE<\/p>\n<p>600 E Street, N.W.<\/p>\n<p>Washington, D.C. 20530;<\/p>\n<p>DEPARTMENT OF DEFENSE<\/p>\n<p>1400 Defense Pentagon<\/p>\n<p>Washington, DC 20301-1400;<\/p>\n<p>DEPARTMENT OF ENERGY<\/p>\n<p>1000 Independence Ave<\/p>\n<p>Washington, DC 20585;<\/p>\n<p>UNITED STATES OF AMERICA<\/p>\n<p>Defendants<\/p>\n<p>COMPLAINT<\/p>\n<p>1.\tPlaintiff, Mireille Torjman hereby brings this action for injunction  relief and damages based on personal knowledge and belief, as a victim  and expert witness, to the information provided, as to all other  matters, as to which allegations Plaintiff, without doubt or delusion,  will provide proof, unrefuted evidence, overwhelming evidentiary  support, witnesses, substantial facts, research, and investigation that  exists as follows:<\/p>\n<p>PRELIMINARY STATEMENT<\/p>\n<p>2.\tThis case is about the wiretapping, civil rights violations, privacy, communications technology, and crimes of humanity, in use by the  Intelligence Community. With the advanced technology unknown to most, of shadow network of surveillance and spying under DARPA projects,  defendants are, transmitting, intercepting, tampering, and blocking the  content of a significant portion of the Plaintiff\u2019s phone calls,  emails, instant messaging, text messaging, www, Skype, electronic and wireless  communications, and other communications, both internationally and  domestic, including Plaintiff\u2019s family and practically every American,  for the past 4 years, beginning on or about January 2007.<\/p>\n<p>3.\tPlaintiff\u2019s records will show communications are intercepted,  manipulated, tampered with, stored, (data mining), harassed, and  impeded. Plaintiff will provide numerous emails hijacked, fabricated,  UNREAD, manipulated, deleted, including facsimile, and internet  manipulations, since 2007. Plaintiff\u2019s numerous impeded electronic  communications with all her service providers were debilitating to her  work and she had no resolve available from providers who were not able  to correct or detect the situations. This includes manufactured emails,  phone calls, and government employee\u2019s unwitting involvement. In 2008,  Plaintiff was also accused legally of false communications during her  service with Qwest, by using wiretapped calls and disconnects to create  false records with her utilities company, including defamation to her  character. (Kay Griggs, Military wife; whistle blow case on tampered  communication CHAOS and automobile impediments not to testify).<\/p>\n<p>4.\tPlaintiff is not delusional and has provided her records to DOJ in  early 2009, with documents from many other credible sources and whistle  blowers. Plaintiff requests that the Russell Tice case and Articles  below \u00a7 35 is read with disclosures being made as to her allegations,  Injunction relief, various separate counts, and tort damages throughout. Plaintiff has demonstrated courage, risked her reputation, risked her  life, and family\u2019s, and has been threatened, prior to receiving an  anonymous email of the NSA article (below) in February 2009. Plaintiff  tried to blow the whistle to the DA late 2007, and was not aware what  NSA was or government corruption, but knew she had to report what was  going on. As quoted by Mr. Tice and others; \u201cStatement by NSA, \u201cTHE  TIP OF THE ICEBERG and WIRETAPPING SURVEILLANCE LOOK LIKE SMALL  POTATOES\u201d. Most recently, Plaintiff was able to meet with the FBI in  early 2010, and provided some information for investigation by various  FBI analysts.<\/p>\n<p>5.\tThe President and other executive officials have described some  activities of surveillance and spying which are conducted outside the  procedures of the Foreign Intelligence Surveillance Act (\u201cFISA\u201d) and  without authorization by the Foreign Intelligence Court, Communities,  Committees, Senate, or Congress.<\/p>\n<p>6.\tAs with The Attorney General and the Director of National  Intelligence having since publicly admitting that the TSP was only one  particular aspect of the surveillance activities authorized by the<\/p>\n<p>Programs, and are being abused. (Jewel v United States, United States v Yahoo)<\/p>\n<p>7.\tIn addition to eavesdropping on or reading specific communications,  Defendants have intercepted the communications contents across the  United States and overseas, and targeted the Plaintiff with intense  sabotage and impediments, Electronic Stalking, Slander, including  Internet Communications, and Google\u2019s Access Portals. Plaintiff wrote  to Google to let them know what was going on behind the scenes with all the  tampering including remote viewing, password access, and covert  data-mining in SG3 dating back prior to 911. (EFF v Google and Street  View) DOD\u2019s ELF transmitters were already in full scale by 1981 in  Australia and Africa, followed by additional covert superior Projects as Combat Zones also under DARPA formerly ARPA)<\/p>\n<p>ALLEGATIONS AND FACTUAL ALLEGATIONS RELATED TO ALL COUNTS<\/p>\n<p>8.\tWith suspicious FBI allegations and $122 Million Virtual Case File  Project gone wrong in 2001, prior Board Members and Government  Officials\u2019, the new Parent Company SAIC\u2019s (C I A Spacestar) servers  and the (\u201cOccult Connections\u201d). Chief of Staff Jack E Thomas Air Force  Intelligence, 1997 ties with DOD, NSA, CIA, and former Executives,  Directors, Secretaries, Army Generals, all had knowledge of REMOTE  VIEWING experiments spy biz, SPAWAR at the Naval Electronics System  Command in San Diego and Los Alamos National Labs for Medical Oversight  to American Intelligence Agencies (1996). A surge of Federal Spending  raised Multi-Billion dollar Defense concerns with SAIC and Titan (moon)  in 2004 (San Diego) and the mid 90\u2019s on technology projects that  REQUIRE HUMAN EXPERIMENTING as well. These BLACK BUDGETS are corruption hiding  behind SSP.<\/p>\n<p>9.\tJoseph McMoneagle, eventually revealed as such, but for the purposes  of the Army\u2019s psychic intelligence unit, he was simply Remote Viewer  No. 1.&#8221; In his Memoirs of a Psychic Spy is a look at the most remarkable  exploits in a most astonishing career of military service. Remote Viewer 001 in Army\u2019s Stargate Project reports this as still classified. The  top secret intelligence gathering initiative launched at height of Cold  War- David Morehouse 1998. This project was first used to retrieve  intentions in a criminal or terrorist\u2019s mind. (The Lucid View,  Investigations in Occultism, 2004 and included in MK ULTRA is Project  \u201cVOICE of GOD\u201d) This is used for unexplained phenomenon and to  manipulate religion and\/or to compel a crime, command or order. It is  undeniable that government agencies have tested citizens without  permission as The Manchurian Candidates in the United States and the  IRS. Cognitive Sciences Laboratories CIA research 24 years ago when Tom  Beardon warned about these weapons and activities as serious dangers.<\/p>\n<p>10.\tThe core component of these Programs is Defendants\u2019 nationwide  network of sophisticated communications surveillance and spy devices  installed overtly. NSA transmissions and NASA Remote Viewing have been  in place and are being connected to the key facilities of  telecommunications with advanced technologies like that of HAARP  stations and Satellites for many years prior and covertly. As Quantum  Physics (sound and\/or radio WAVES) and subliminal are being used for  Spying and breaching contracts with other Countries and Embassies, HAARP is used for Earth and human manipulations. (Jerry Smith, Jim Keith;  Politician and Dr. Nick Begich, Alaska; \u201cHAARP; THE ULTIMATE  CONSPIRACY\u201d 1998) The \u201cMethod of Inducing Mental Emotional and Physical States in  Human Beings\u201d was patented for the CIA in Virginia in 1993.<\/p>\n<p>11.\tThese projects of CointelPro, Psyops experiments for drones, and  Surveillance\/spying have continued covertly to develop weapons that were first patented by Russia and China. Since the 1950\u2019s, first revealed  to the public were the Alien UFO Projects, and the subliminal cravings of  coca cola, movies and pop corn. Shortly thereafter as technology  advanced, mass control continued to this day nefariously against all  Americans, called NSA transmissions today. Since 1974 under the  Pentagon, DOD funded the ELF radio broadcasting in conjunction with  hypnotic control and prior to that Doctors Bill Nelson and Tom Beardon  had their own patents at NASA on Medicinal Energy and Biofeedback,  already in use in other Countries with the same remote scalar waves and  frequencies. (Apollo and Whistleblowers Second craft 11, shadowing  Apollo 13 and no witnesses returned after the Shuttle)<\/p>\n<p>12.\tIn early 2008, after 25 years of being an accountant, and raised in  the Mediterranean, Plaintiff purchased the Non FDA device from a NASA  physicist at $21,000.00 with Scalar waves, (Russian Woodpecker  frequencies), and Military Patents. Plaintiff became a certified  practitioner to protect herself and attempt to deprogram. Plaintiff was  intercepted by this HAARP and NSA\u2019s SIG-INT Satellites, thus became a  certified hypnotist trained in NLP (Neuro-Linguistic Programming; CIA  taught techniques, (Bandler and Grinder 1976) and (Project Paperclip;  Dr. Strughold Space Medicine 1963)<\/p>\n<p>13.\tIn her travels, Plaintiff witnessed these transmissions used in  Israel, Australia, England, European Countries, and was further impeded  when attempting to whistle blow the nefarious uses and crimes of  humanity, to the embassies. Plaintiff will show documents or connections to MAFIOSO, KGB, and AL Qaeda, within the CIA, as with Donald Rumsfeld  and his banking ties. World Banks (1910) JP Morgan, Black Budgets, and  Nikola Tesla 1940)<\/p>\n<p>14.\tSome aspects of the Programs of MKULTRA were publicly acknowledged  by President Clinton with partial apologies on October 3, 1995 as past  tense and not being done currently to down play their uses. The Pentagon has new buzz words SYNTHETIC TELEPATHY-Psychotronics. However, Plaintiff  spoke with many other victims today, and the latest FT Hood Mind  Control soldier. Psychotronics also has a non-profit organization of  former scientists and whistleblowers of same. (Lynn Surgella-Cancer;  Central Nervous System diseases and Immune System-FDA drug corruptions)  Furthermore, under DOD, Combat Zones That See, or CTS, project of the  United States Defense Advanced Research Projects Agency (DARPA-1957)  whose goal was to &#8220;track everything that moves&#8221; in a city by linking up a massive network of surveillance cameras to a centralized computer  system. (Russell Tice called Spy Apparatus.) Artificial intelligence  software will then identify and track all movement throughout the city.  In 1958, immediately after Sputnick, DARPA began to secure our space and airways with these Directed Energy Weapons. (Project AGILE-1966  Pentagon). Plaintiff has knowledge that after this project was  field-tested with experiments on Vietnam VETERANS disguised as Agent  Orange. Plaintiff spoke with many suffering from ELF induced nervous  central system attacks and complain of mind control. One of many victims is suing the Bar due to the VA computer systems uses. In an undisclosed report dated March 9, 2005, 8 more projects with strategic thrusts  included Bio-Revolution, DIRECTED ENERGY, and Urban Operation of sensors on the existing Airborne Video Surveillance, all under the Iraq theory, also data mining all information from the Human. CTS is described by  DARPA as intended for use in combat zones, to deter enemy attacks on  American troops and to identify and track enemy combatants who launch  attacks against American soldiers, under Martial Law for a Police State  and legalize Fascism.<\/p>\n<p>DARPA\u2019s current Projects, XG, Robotic assured Military communication,  CALO; Cognitive Impairment (ADDHD and Optical), and Silent Talk; A  planned program attempting to identify EEG patterns for words and  transmit these for covert communications. Telepathy were part of the  tests the Plaintiff was sent for, including warming her blood without  the Doctor\u2019s consent and her eyes physically taken over by an MRI,  data mining the Plaintiff\u2019s optic pattern, DNA, and more. This  computer-mediated telepathy allows user-to-user communication through  analysis of neural signals. The research aims to detect and analyze the  word-specific neural signals, using EEG, which occur before speech is  vocalized, and to see if the patterns are generalizable. As of 2009 the  research is focused on military uses. Plaintiff, an unwitting guinea pig of these programs went for tests, as her hair has not grown since 1996, with induced rapid loss, a skin condition from the blood unknown to the doctors. In addition, since 1962, ARPA initiated the Office of  Information Processing Technique and Behavior Sciences for Artificial  Intelligence, Command and Control, known today as Behavior Modification  or BRAINWASH.<\/p>\n<p>15.\tJulianne McKinney, 1994 former Military Intelligence Officer and  Director of these very PROJECTS is still battling with it today,  demanding oversight and cease and desist of Microwave Harassment.  (\u201cThe Classic Mind Control Operation Revealed\u201d June 2003, surveillance and  &#8216;neurocybernetics&#8217; systems, which DOD refers to as &#8216;psychotechnologies&#8217;. (Former Pentagon Reporter, Sharon Weinberger (misfits scientists, remote  viewing; internal emails, 1996)<\/p>\n<p>16.\tJohn Herschel Glenn Jr., 1974-1999, former astronaut and U.S.  politician who Introduced a Bill and Joint Resolutions (Page S645) Human Research Subject Protection Act, stated \u201cIn fact, our own Constitution  says, &#8216;The right of the people to be secure in their persons . . .  shall not be violated.&#8217;\u201c, and compared it to the Nuremberg Code. His own  experience and knowledge of unwitting civilians with Radiation  experiments has already been proven that Directed Energy Weapons  increased CANCER rates DRAMATICALLY in this COUNTRY thus far.  Furthermore, patients have discovered leaving the Country for natural  cures worked without further Chemotherapy. During Plaintiff\u2019s brief  work at the ACLU, Plaintiff learned that calls were made from patients  complaining of being electrocuted while in Hospitals. the reason  knowledgeable professionals warn against this Technology in the wrong  hands; OUR CIA\u2019s Cointelpro division of Terrorists within, and keeping  their enemies close, unfortunately. Plaintiff met with FBI and Congress  on two occasions and warned them of her discoveries, and the Gulf\u2019s  Red Tide in Florida before the spill as corruptions at the hands of our  Shadow Government, and did same with Documentary \u201cUn-Covered\u201d as  Marionettes. ELF Waves used in getting a war by Congress not reading  full documents to invade Iraq. (Judicial Watch various lawsuits, FBI  2008 spinning their wheels)<\/p>\n<p>17.\tPlaintiff also has knowledge of the manipulations to the media and  miscommunications for the use of quashing, suppressions and propaganda  to block exposing the government\u2019s advertising corruptions with  misuses in the 21st Century technology. (Operation Mockingbird Media,  beginning in the 1950\u2019s). The HAARP and HIPPA stations were set up  reaching Woodpecker waves with Russia about the time space activities  began 1970 when \u201cBig Brother was watching\u201d today known as \u201cBig  Brother gets a Brain\u201d. Whereas Russia was in fact only deployed with  these Weapons on the U.S. or on its own people. Paranoid, our  Intelligence, DIA launched against its own people in 1983. Astronomical  Defense budgets developed as black budgets, and SPYING nefariously went  covert from media and public\u2019s knowledge. (Jerry Smith, CARABAS  Coherent All Radio Band Sensing, HAARP printed in Canada 1998)<\/p>\n<p>18.\tPlaintiff and Plaintiff\u2019s family members are ordinary Americans  who were initially picked up in the \u201cBig Brother radar\u201d unwittingly in  1971, whereas Plaintiff was informed others who have ties with Military, Minorities, Government employees and buildings, all being picked up in  radar with data mining human information for world domination powers.  \u201cDumbed Down and red tape bureaucratic culture induced\u201d<\/p>\n<p>19.\tPlaintiff was informed that Pilots were mind controlled in advance  in the U.S. and San Diego, and that 911 was created to lose our FREEDOMS and the commission investigation was sabotaged. (Naomi Wolf (Yale  Journalist)-10 Steps-Freedom to Fascism, 2007- also harassed by and on  no fly zone list)<\/p>\n<p>\u201cDeath Ray\u201d for planes was Tesla\u2019s invention in 1940 and a  $2,000,000,00 device to zap and melt an airplane motor 250 miles away and an Invisible  Chinese Wall of defense was built around the Country, no matter how  large an attack, (Teleforce, manifests energy and creates rays; zapping  beams, the new invisible war). Today, this Wardencliff Tower is in full  action in Long Island NY, along with 36 other stations or sites as GWEN,  Globally and beam massive volume of Free Energy. (The New York Times,  Sunday September 22, 1940-Science and Patents, Education News) One energy zapping causes confusion, mistakes, body temp-freeze,  heat, miscommunication, fatigue, radio-sleep (Kucinich), and stalling  engines.<\/p>\n<p>On or about January 3, 2009, upon contacting the United Nation\u2019s  African Human Rights; provided her information of these weapons in use for mind control overseas and found Alison Des Forges, senior Africa adviser for Human Rights Watch was deceased in the Buffalo NY crash in February  2009. On or about May 2008, the same occurred after contacting Ted  Kennedy for assistance and suddenly became unavailable with Cancer.  Plaintiff was scheduled to testify in NY senate hearing with the help of Senator Eric Adams which was delayed with a busy nation in transition,  until his second home caught fire and the hearing never occurred.  Plaintiff had numerous impediments of busy delays from everyone she  contacted daily to block her and has more disclosures not included in  this complaint.<\/p>\n<p>On or about January 2007, Plaintiff witnessed people and companies  pointing the finger at each other, and creating a doubt to sabotaged  lives and the LEGAL SYSTEM further. \u201cWhat the courts should also  know.\u201d Today, Society\u2019s Chief complaints are demanding OVERSIGHT and  TRANSPANCY. Plaintiff has knowledge that it is the CORRUPTION and the  bigger Agenda to change the Constitution, that\u2019s HIDING behind SSP.  Furthermore, testimonies made in 1977 to U.S. Courts and Congress by  whistleblowers Cathy O\u2019brien and Mark Phillips were blocked for  reasons of National Security. This SSP has unwittingly allowed the  crimes to continue. Today we are finally seeing the same has continued  to bigger Government crimes and corruption with technology and war. Step  #9 closer to legalizing Fascism, eyes wide shut: (Access Denied, Trance-formation of America 2003). The Judicial System has not connected the dots yet, on  prior crimes from these technology weapons that blighted the Courts 40  years ago to bring us to this point and a corrupted culture. Plaintiff  will show that smokescreens are created through propaganda to cover up  what is going on in this Country from \u201cWe the People\u201d, collectively  since \u201cBig Brother Technology\u201d that outsiders already noticed or  realize. (See \u00a7 34)<\/p>\n<p>20. Plaintiff is also suing Defendants to enjoin their unlawful ABUSES  of communications, records, and intrusions. Plaintiff makes demand for  the inventory of records since 1971 when Defendant\u2019s family applied to  come to America. Plaintiff motions the court to compel the safety of  \u201cWE THE PEOPLE\u201d by dismantling these Weapon Stations, and the CIA, which  were born with the National Security\u2019s Act in 1947, with criminal and  punitive damages.<\/p>\n<p>21.\tPlaintiff is also suing Defendants for treason, crimes, violations,  and threats attempted on her and her family, when disseminating the  information and ARTICLE, and reporting it to the Authorities.<\/p>\n<p>22.\tPlaintiff was pre-empted with these Serious Accusations to whitewash history, brainwash the public, and keep Washington in their bubble, as  being too late. (CIA techniques; Jacketing- against each other or one  against the other, and changing minds, Past Presidents-Dr. Walter  Bowart, False Memory Syndrome Foundation 1992, and Alzheimer\u2019s  disease-like memory loss, 1996)<\/p>\n<p>23.\tThese are unconstitutional programs under Cointelpro divisions  (Operation Mind Control and DIA Remote Viewing experiments and NSA  transmissions) as described to include Monarch-The New Phoenix Program,  MKULTRA (Constantine-Virtual Government, CIA Mind Control Operations in  America, 1997), Project Philadelphia, Echelon, Clear eyes, Mockingbird  media), and Military Pandora\u2019s Box, Voice of GOD, Operation Northwoods  (creating wars), Project Stargate and Spacestar, (CIA Psychic Remote  Viewing and FBI Virtual Project, 1996 respectively), Project Paperclip  (Space Medicine), along with many others), and include corruption crimes of abusive powers.<\/p>\n<p>24.\tPlaintiff is suffering from the violations of her constitutional  rights, and privacy acts, (US code 5 and 18) at the hands of, the  direction of or with the knowledge of, the Defendants. Defendants in  concert with other Intelligence agencies and\/or service providers and  means are set forth in paragraphs below).<\/p>\n<p>25.\tPlaintiff, was comatosed for 72 hours in her home and recruited for  experimental remote mind control ESPIONAGE, SEXUAL SLAVERY, AND BEHAVIOR MODIFICATION, (brainwash) The Cult of Intelligence (1974) but censored  in the U.S. During her research and travels, Plaintiff made acquaintance with retired government employees and other spies, using remote viewing on their target and countless victims. Plaintiff also interviewed others  and found millions of victims complaining of the same tactics and tortures from electricity and Energy. Plaintiff called Lt. Col. Tom  Beardon in 2007, and spoke to his wife as he was on a respirator,  Kathleen Sullivan (Mind Controlled CIA child whistleblower) who was  frantic about nursing her husband with CANCER. Plaintiff has many other  murders to report with Automobile accidents, suicide, and offered to  testify to Congress. With the use of surveillance technology, spying,  and NSA Transmission conducted by top secret, Q clearance, Defendants  and DIA, Plaintiff hereby makes these serious accusations against the  United States Secret Government for the past 50 years on U.S. Soil.<\/p>\n<p>JURISDICTION AND VENUE<\/p>\n<p>26. This court has subject matter jurisdiction over the federal claims  pursuant to 28 U.S.C. \u00a7 1331, 18 U.S.C. \u00a7 2712, and 5 U.S.C. \u00a7 702.<\/p>\n<p>27. Plaintiffs are informed, believe and thereon allege that Defendants have sufficient contacts with this<\/p>\n<p>district generally and, in particular, with the events herein alleged, that Defendants are subject to the exercise<\/p>\n<p>of jurisdiction of this court over the person of such Defendants and  that venue is proper in this judicial district pursuant to 28 U.S.C. \u00a7  1391.<\/p>\n<p>28. Plaintiff is informed, believe and thereon allege that a substantial part of the events giving rise to the claims herein alleged occurred in this district jurisdiction, and Defendants and\/or agents of Defendants  may be found in this district, nationally, and internationally.<\/p>\n<p>PARTIES<\/p>\n<p>29. Plaintiff, Mireille Torjman is an intelligent native French speaking refugee from Marrakesh, Morocco. Plaintiff is a divorced woman of 48  years of age and was an accountant for 25 years. Plaintiff comes from a  religious background, disciplined and educated, has spent 25 years in  the Philadelphia area, currently in South Florida with her Mother.<\/p>\n<p>30. Defendant Federal Bureau of Investigations (FBI) is an agency under  the direction and control of the Department of Justice and the Pentagon  that investigates and protects the Nation with Programs of CointelPro  joined by CIA operating on U.S. Soil.<\/p>\n<p>31. Defendant Central Intelligence Agency (CIA) is an agency that  protects the Country in first line of Defense and collects information  that reveals the plans, intentions and capabilities of our adversaries  and provides the basis for decision and action.<\/p>\n<p>32. Defendant NSA Defendant National Security Agency (NSA) is an agency  under the direction and control of the Department of Defense that  collects, processes, and disseminates foreign signals intelligence. It  is responsible for carrying out the Programs challenged herein.<\/p>\n<p>33.\tDefendant United States is the United States of America, its  departments, agencies, and entities. Including DOJ, and Congresswoman  Ginny Browne-Waite as the current Florida Congress Representative of the United States, who Plaintiff attempted to warn on numerous occasions  since early 2008 and Senator Bill Nelson, currently on Florida\u2019s  Intelligence Committee.<\/p>\n<p>BACKGROUND<\/p>\n<p>34. Counter Intelligence Program was a series of covert, and often  illegal, projects conducted by the United States Federal Bureau of  Investigation (FBI) aimed at investigating and disrupting dissident  political organizations within the United States. The FBI used covert  operations from its inception; however formal COINTELPRO operations took place between 1956 and 1971. The FBI&#8217;s stated motivation at the time was  &#8220;protecting national security, preventing violence, and maintaining the  existing social and political order.&#8221; According to FBI records, 85% of  COINTELPRO resources were expended on infiltrating, disrupting,  marginalizing, and\/or subverting groups suspected of being subversive,  such as communist and socialist organizations; the women&#8217;s rights  movement; militant black nationalist groups, and the non-violent civil  rights movement, including individuals such as Martin Luther King, Jr.  and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, the  Congress of Racial Equality, the American Indian Movement, and other  civil rights groups; a broad range of organizations labeled &#8220;New Left&#8221;,  including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even  individual student demonstrators with no group affiliation; and  nationalist groups such as those &#8220;seeking independence for Puerto Rico.&#8221; The other 15% of COINTELPRO resources were expended to marginalize and  subvert &#8220;white hate groups,&#8221; including the Ku Klux Klan and National  States&#8217; Rights Party. The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to &#8220;expose,  disrupt, misdirect, discredit, or otherwise neutralize&#8221; the activities  of these movements and their leaders. Hoover disclosed how horrific  these weapons were thus, hard to believe. MKULTRA mind control  experiments began at the end of WWII and then became public in the  1970\u2019s, however imperfectly, and went \u2018black\u201d again because of  Senate hearings, but these experiments have continued to this day. The  only reason that MKULTRA was ever brought into the light of day was that  a dissident group stole government documents and released them to the  press, which initially refused to publish them. The MKULTRA archive was  destroyed because of the seriousness of the crimes perpetrated by the  intelligence communities. If it became public knowledge that the  intelligence agencies had allowed Nazi war criminals to experiment upon  American citizens, including children, and then replicated these  techniques themselves, the damage to their reputation could never be  undone. The only aspects of CIA criminal activity in general, or MKULTRA in particular, that the intelligence community ever admitted to were the  ones that were already public, or details that had very little to do with the current capabilities of mind control weapons and techniques.  Microwave weapons and remote influence of the Human Central Nervous  System are the crown jewels of the intelligence community. The DEFENDER  and AGILE Programs formed the foundation of DARPA sensor, surveillance,  spying, and directed energy R&amp;D, particularly in the study of radar, infrared sensing, and x-ray\/gamma ray detection. During the late 1960s, with the transfer of these mature programs to the Services, ARPA  redefined its role and concentrated on a diverse set of relatively  small, essentially exploratory research programs. The Agency was renamed the Defense Advanced Research Projects Agency (DARPA) in 1972, and  during the early 1970s, it emphasized direct energy programs,  information processing, and tactical technologies.<\/p>\n<p>Today we know we have had the Technology as warfare and\/or medicine,  coupled with the Conspiracy theories of HAARP, (Dr. Hubertus Strughold,  space medicine-project paperclip-The Jewish Telegraphic Agency 1995;  \u201cDark Moon; Apollo and Whistleblowers Second craft 11, shadowing  Apollo 13\u201d and technical difficulties with no witnesses returned.  Issues of Mind Control reported by Dr. Rauni-Leena Luukanen Kilde &#8211;  Nyhetsspeilet.no with 50 year old technology from our government being  disclosed as new, have consistently been deceiving the public, while  mapping out a grid across the Country. DUPLICITOUS and INDUCED  manipulations of grave mass control escalations have been documented and quashed over the decades. Experiments under MK ULTRA for Behavior  Modification also became corrupted for tax gains with massive funding to LEAA Law Enforcements while Crimes were induced in major cities in 1968 by 50% (Newsweek, FBI reports) Unwitting citizens blighted the courts  with lawsuits, prisons and Hospitals in this Country with complaints of  mind control that the Media refused to cover. This erupted suddenly and  massively over one year. Today this continues tenfold and is still  uncovered by media. Forty years later the COURTS are now being blighted  with cases of privacy rights, War, and Technology combined. Thus we have an agenda of larger government and agencies, created for more tax  dollars and controls. CONGRESS spinning their wheels instead of meeting  once a year, as intended in the Constitution. A Country is being usurped since the 1910 secret meeting on Jekyll Island and a blank check to  create \u201cThe Federal Reserve\u201d.<\/p>\n<p>35. Is the NSA Conducting Electronic Warfare On Americans?<\/p>\n<p>Jonas Holmes May 19, 2006 CHRONICLE ARTICLE<\/p>\n<p>Russ Tice, former NSA intelligence officer and current Whistleblower,  was to testify before the Senate Armed Services Committee this week.  Apparently the testimony, Mr. Tice wanted to give, makes General  Hayden\u2019s phone surveillance program look like very small potatoes. Mr.  Tice\u2019s testimony is expected to reveal further illegal activity  overseen by General Michael Hayden which even loyal and patriotic NSA employees  view as unlawful. I think the people I talk to next week are going to be shocked when I tell them what I have to tell them. IT\u2019S PRETTY HARD TO  BELIEVE, Tice said. I hope that they\u2019ll clean up the abuses and have  some oversight into these programs, which doesn\u2019t exist right now.  According to Mr. Tice, what has been disclosed so far is only the tip of the iceberg. What in the world could Russ Tice be talking about! To  figure it out let us take a look at Russ Tice\u2019s work at the NSA.<\/p>\n<p>According to the Washington Times and numerous other sources, Mr. Tice  worked on special access programs related to electronic intelligence  gathering while working for the NSA and DIA, where he took part in space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems.  Special Access Programs or SAPs refer to Black Budgets or Black  Operations. Black means that they are covert and hidden from everyone  except the participants. Feasibly there would be no arena with a greater potential for abuse and misuse than Special Access Programs. Even now  Congress and the Justice Department are being denied the ability to  investigate these programs because they don\u2019t have clearance. To put  it in CNN\u2019s Jack Cafferty\u2019s words a top secret government agency,  the NSA, the largest of its kind in the world, is denying oversight or  investigation by the American people because investigators lack  clearance. To add a layer of irony to the Black Ops cake this travesty  is occurring in America, the supposed bastion of Freedom and Democracy,  which we are currently trying to export to Iraq.<\/p>\n<p>It just gets scarier. The Black Ops that Mr. Tice was involved in  related to electronic intelligence gathering via space systems  communications, non-communications signals, electronic warfare,  satellite control, telemetry, sensors, and special capability systems.  For greater insight as to the impact of these programs readers should  review decades old FOIA authenticated programs such as MKULTRA,  BLUEBIRD, COINTELPRO and ARTICHOKE. Radar based Telemetry involves the  ability to see through walls without thermal imaging. Electronic Warfare is even scarier if we take a look at the science. NSA Signals  Intelligence Use of EMF Brain Stimulation. NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since  the MKUltra program of the early 1950&#8217;s, which included neurological  research into &#8220;radiation&#8221; (non-ionizing EMF) and bioelectric research  and development. The resulting secret technology is categorized at the  National Security Archives as &#8220;Radiation Intelligence,&#8221; defined as  &#8220;information from unintentionally emanated electromagnetic waves in the  environment, not including radioactivity or nuclear detonation.&#8221; Signals Intelligence implemented and kept this technology secret in the same  manner as other electronic warfare programs of the U.S. government. The  NSA monitors available information about this technology and withholds  scientific research from the public. There are also international  intelligence agency agreements to keep this technology secret.<\/p>\n<p>The NSA has proprietary electronic equipment that analyzes electrical  activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain  continuously. The NSA records and decodes individual brain maps (of  hundreds of thousands of persons) for national security purposes. EMF  Brain Stimulation is also secretly used by the military for  Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech  center of the brain can be translated into the subject&#8217;s verbal  thoughts. RNM can send encoded signals to the brain&#8217;s auditory cortex  thus allowing audio communication direct to the brain (bypassing the  ears). NSA operatives can use this to covertly debilitate subjects by  simulating auditory hallucinations characteristic of paranoid  schizophrenia. Without any contact with the subject, Remote Neural  Monitoring can map out electrical activity from the visual cortex of a  subject&#8217;s brain and show images from the subject&#8217;s brain on a video  monitor. NSA operatives see what the surveillance subject&#8217;s eyes are  seeing. Visual memory can also be seen. RNM can send images direct to  the visual cortex. bypassing the eyes and optic nerves. NSA operatives  can use this to surreptitiously put images in a surveillance subject&#8217;s  brain while they are in R.E.M. sleep for brain-programming purposes.  Individual citizens occasionally targeted for surveillance by  independently operating NSA personnel<\/p>\n<p>NSA personnel can control the lives of hundreds of thousands of  individuals in the U.S. by using the NSA&#8217;s domestic intelligence network and cover businesses. The operations independently run by them can  sometimes go beyond the bounds of law. Long-term control and SABOTAGE OF TENS OF THOUSANDS OF UNWITTING CITIZENS by NSA operatives is likely to  happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be  diagnosed with ill mental health. National Security Agency Signals  Intelligence Electronic Brain Link Technology NSA SigInt can remotely  detect, identify and monitor a person&#8217;s bioelectric fields. The NSA&#8217;s  Signals Intelligence has the proprietary ability to remotely and  non-invasively monitor information in the human brain by digitally  decoding the evoked potentials in the 30-50 hz,.5 milliwatt  electro-magnetic emissions from the brain. Neuronal activity in the  brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt  electromagnetic (EMF) wave. Contained in the electromagnetic emission  from the brain are spikes and patterns called &#8220;evoked potentials.&#8221;<\/p>\n<p>Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding &#8220;evoked potential&#8221; or set of &#8220;evoked  potentials.&#8221; The EMF emission from the brain can be decoded into the  current thoughts, images and sounds in the subject&#8217;s brain.<\/p>\n<p>NSA SigInt uses EMF-transmitted Brain Stimulation as a communications  system to transmit information (as well as nervous system messages) to  intelligence agents and also to transmit to the brains of covert  operations subjects (on a non-perceptible level).<\/p>\n<p>EMF Brain Stimulation works by sending a complexly coded and pulsed  electromagnetic signal to trigger evoked potentials (events) in the  brain, thereby forming sound and visual images in the brain&#8217;s neural  circuits. EMF Brain Stimulation can also change a person&#8217;s brain-states  and affect motor control. Two-way Electronic Brain-Link is done by  remotely monitoring neural audio-visual information while transmitting  sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the  images appear as floating 2-D screens in the brain). Two-Way Electronic  Brain Link has become the ultimate communications system for CIA\/NSA  personnel. Remote Neural Monitoring (RNM, remotely monitoring  bioelectric information in the human brain) has become the ultimate  surveillance system. It is used by a limited number of agents in the  U.S. Intelligence Community. RNM requires decoding the resonance  frequency of each specific brain area. That frequency is then modulated  in order to impose information in that specific brain area. The  frequency to which the various brain areas respond varies from 3 Hz to  50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.<\/p>\n<p>An example of EMF Brain Stimulation:\tBrain Area<\/p>\n<p>Bioelectric Resonance Frequency\tInformation Induced Through Modulation<\/p>\n<p>Motor Control Cortex\t10 HZ\tMotor Impulse Co-ordination<\/p>\n<p>Auditory Cortex\t15 HZ\tSound which bypasses the ears<\/p>\n<p>Visual Cortex\t25 HZ\tImages in the brain, bypassing the eyes<\/p>\n<p>Somatosensory Cortex\t09 HZ\tPhantom Touch Sense<\/p>\n<p>Thought Center\t20 HZ\tImposed Subconscious Thoughts<\/p>\n<p>This modulated information can be put into the brain at varying  intensities from subliminal to perceptible. Each person&#8217;s brain has a  unique set of bioelectric resonance\/entrainment frequencies. Sending  audio information to a person&#8217;s brain at the frequency of another  person&#8217;s auditory cortex would result in that audio information not  being perceived. Additionally, A 1994 congressional hearing reported  that nearly half a million Americans were subjected to some kind of cold war era tests, often without being informed and without their consent.  In addition, experimentation law is well grounded in constitutional and  international law. It is an under-reported fact that two major reports  on human rights and torture in the U.S. recently listed illegal  radiation experiments. Many more facts are documented below. Therefore,  human research subject protections should be a high priority and are  just as significant as current issues of torture and illegal  wiretapping. IT IS TIME FOR AMERICA TO WAKE UP. It is time for America  to protect its Whistleblowers who are our last line of defense against  dictatorship and despotism. It is time for America to take  responsibility for oversight of its tax dollars and elect leaders who  will assume such responsibility now. Yes, the war on terrorism is  important. It is even more important and fearful if the terrorism is  from within and unknowingly funded by hard working American citizens.  There is no Special Access Program beyond the oversight of political  leaders elected by the people and for the people. If these political  leaders jeopardize national security then that shall be handled in a  court of law. But to tell America, to tell the American people, to tell  the political leaders elected by the American people that America does  not deserve to know what happening in the NSA\u2019s dark, black rooms,  with billions of dollars, behind closed doors, when we know that  privilege has already been abused; that is the true definition of  TERRORISM. That is the true definition of Communism and a Police State,  no oversight. So fellow Americans, you may hem and haw in the face of truth but know that  one day you will realize that your country has been USURPED from the  very principles upon which it was founded.<\/p>\n<p>Godspeed, Russ Tice, the Patriots are with you.<\/p>\n<p>Why hasn&#8217;t the press&#8211;aside from MSNBC&#8211;covered Russell Tice&#8217;s  revelations on the government&#8217;s massive spy apparatus that according to  Tice illegally survey&#8217;s every US citizens&#8217; purchasing records, emails,  phone calls, bank transactions, etc. and maintains the information in  massive databases for nefarious uses?<\/p>\n<p>In the Interview of January 03, 2006 the following was revealed:<\/p>\n<p>AMY GOODMAN: That was Sibel Edmonds. Russell Tice, you are a member of  her group, the National Security Whistleblowers Coalition.<\/p>\n<p>AMY GOODMAN: What do you think of the Justice Department launching an  investigation into the leak, who leaked the fact that President Bush was spying on American citizens?<\/p>\n<p>RUSSELL TICE: Well, I think this is an attempt to make sure that no  intelligence officer ever considers doing this. What was done to me was  basically an attempt to tell other intelligence officers, \u2018HEY, IF YOU  DO SOMETHING LIKE THIS, IF YOU DO SOMETHING TO TICK US OFF, WE\u2019RE  GOING TO TAKE YOUR JOB FROM YOU, WE\u2019RE GONNA DO SOME UNPLEASANT THINGS  TO YOU.\u2019<\/p>\n<p>So, right now, the atmosphere at N.S.A. and D.I.A., for that matter, is  fear. The security services basically rule over the employees with fear, and people are afraid to come forward. People know if they come forward even in the legal means, like coming to Congress with a concern, your  career is over. And that\u2019s just the best scenario. There\u2019s all sorts  of other unfortunate things like, perhaps, if someone gets thrown in  jail for either a witch-hunt or something trumping up charges or, you  know, this guy who is basically reporting a crime.<\/p>\n<p>AMY GOODMAN: Were you ever asked to engage in this?<\/p>\n<p>RUSSELL TICE: No, no, and if I did so, I did so unwittingly, which I  have a feeling would be the case for many of the people involved in  this. More than likely this was very closely held at the upper echelons  at N.S.A., and mainly because these people knew\u2014General Hayden, Bill  Black, and probably the new one, Keith Alexander, they all knew this was illegal. So, you know, they kept it from the populace of N.S.A., because  every N.S.A. officer certainly knows this is illegal.<\/p>\n<p>AMY GOODMAN: What do you mean if you did so, you did so unwittingly?<\/p>\n<p>RUSSELL TICE: Well, there are certain elements of the aspects of what is done where there are functionaries or technicians or analysts that are  given information, and you just process that information. You don\u2019t  necessarily know the nitty gritty as to where the information came from  or the\u2014it\u2019s called compartmentalization. It\u2019s ironic, but you  could be working on programs, and the very person sitting next to you is  not cleared for the programs you\u2019re working on, and they\u2019re working  on their own programs, and each person knows to keep their nose out of the other person\u2019s business, because everything\u2019s compartmentalized, and  you\u2019re only allowed to work on what you have a need to know to work  on.<\/p>\n<p>AMY GOODMAN: What about the telecoms, the telecommunications  corporations working with the Bush administration to open up a back door to eavesdropping, to wiretapping?<\/p>\n<p>RUSSELL TICE: If that was done and, you know, I USE A BIG \u201cIF\u201d HERE,  AND, REMEMBER, I CAN\u2019T TELL YOU WHAT I KNOW of how N.S.A. does its  business, but I can use the wiggle words like \u201cif\u201d and scenarios  that don\u2019t incorporate specifics, but nonetheless, if U.S. gateways  and junction points in the United States were used to siphon off  information, I would think that the corporate executives of these  companies need to be held accountable, as well, because they would  certainly also know that what they\u2019re doing is wrong and illegal. And  if they have some sort of court order or some sort of paper or something  signed from some government official, Congress needs to look at those  papers and look at the bottom line and see whose signature is there. And these corporations know that this is illegal, as well. So everyone needs  to be held accountable in this mess.<\/p>\n<p>AMY GOODMAN: When you come on board at these intelligence agencies, as  at the National Security Agency, what are you told? I mean, were you  aware of the Church hearings in the 1970s that went into the illegal  spying on monitoring, of surveilling, of wiretapping of American  citizens?<\/p>\n<p>RUSSELL TICE: Well, that\u2019s something that\u2019s really not drummed in  your head. That\u2019s more of a history lesson, I think. And the  reasoning, ultimately, for the FISA laws and for what\u2019s called USSID  18, which is sort of the SIGINTer\u2019s bible of how they conduct their  business, but the law itself is drilled into your head, as well as the tenets of USSID 18,  of which the number one commandment is \u2018Thou shalt not spy on  Americans.\u2019<\/p>\n<p>But ultimately, when we\u2019re using that on\u2014if we\u2019re using that with  U.S. databases, then ultimately, once again, the American people  are\u2014their civil rights are being violated.<\/p>\n<p>AMY GOODMAN: Do you expect you are being monitored, surveilled, wiretapped right now?<\/p>\n<p>RUSSELL TICE: Yes, I do. As a matter of fact,<\/p>\n<p>AMY GOODMAN: You\u2019re saying in the leadership of your own agency, the National Security Agency?<\/p>\n<p>RUSSELL TICE: That\u2019s correct, yeah, because certainly General  Alexander and General Hayden and Bill Black knew that this was illegal.<\/p>\n<p>AMY GOODMAN: But they clearly had to have authorization from above, and Bush is not contending that he did not know.<\/p>\n<p>RUSSELL TICE: Well, that\u2019s true. But the question has to be asked:  What did the President know? What was the President told about this?  It\u2019s just\u2014there\u2019s just too many variables out there that we  don\u2019t know yet. And, ultimately, I think Congress needs to find out  those answers. If the President was fed a bill of goods in this matter,  then that\u2019s something that has to be addressed. Or if the President  himself knew every aspect of what\u2019s going on, if this was some sort of  vacuum cleaner deal, then it is ultimately, I would think, the President himself that  needs to be held responsible for what\u2019s going on here.<\/p>\n<p>AMY GOODMAN: This investigation that the Justice Department has  launched\u2014it\u2019s interesting that Alberto Gonzales is now Attorney  General of the United States\u2014the latest story of The New York Times:  Gonzales, when he was White House Counsel, when Andrew Card, chief of  staff, went to Ashcroft at his hospital bedside to get authorization for  this. Can he be a disinterested party in investigating this now, as  Attorney General himself?<\/p>\n<p>RUSSELL TICE: Yeah, I think that for anyone to say that the Attorney  General is going to be totally unbiased about something like this, I  think that\u2019s silly. Of course, the answer is \u201cNo.\u201d He can\u2019t be  unbiased in this. I think that a special prosecutor or something like  that may have to be involved in something like this, otherwise we\u2019re  just liable to have a whitewash.<\/p>\n<p>AMY GOODMAN: What do you think of the term \u201cpolice state\u201d?<\/p>\n<p>RUSSELL TICE: Well, anytime where you have a situation where U.S.  citizens are being arrested and thrown in jail with the key being thrown away, you know, potentially being sent overseas to be tortured, U.S.  citizens being spied on, you know, and it doesn\u2019t even go to the court  that deals with these secret things, you know, I mean, think about it,  you could have potentially somebody getting the wrong phone call from a  terrorist and having him spirited away to some back-alley country to get the rubber hose treatment and who knows what else. I think that would  kind of qualify as a police state, in my judgment. I certainly hope that Congress or somebody sort of does something about this, because, you  know, for Americans just to say, \u2018Oh, well, we have to do this  because, you know, because of terrorism,\u2019 you know, it\u2019s the same  argument that we used with communism years ago: take away your civil  liberties, but use some threat that\u2019s, you know, been out there for a  long time.<\/p>\n<p>Terrorism has been there for\u2014certainly before 9\/11 we had terrorism  problems, and I have a feeling it\u2019s going to be around for quite some  time after whatever we deem is a victory in what we\u2019re doing now in  the Middle East. But, you know, it\u2019s just something that has to be  addressed. We just can\u2019t continue to see our civil liberties degraded.  Ultimately, as Ben Franklin, I think, had said, you know, those who  would give up their essential liberties for a little freedom deserve  neither liberty or freedom, and I tend to agree with Ben Franklin.<\/p>\n<p>AMY GOODMAN: And your colleagues at the N.S.A. right now, their feelings, the National Security Agency?<\/p>\n<p>RUSSELL TICE: Boy, I think most folks at N.S.A. right now are just  running scared. They have the security office hanging over their head,  which has always been a bunch of vicious folks, and now they\u2019ve got,  you know, this potential witch hunt going on with the Attorney General.  People in the intelligence community are afraid. They know that you  can\u2019t come forward. You have no protections as a whistleblower. These  things need to be addressed.<\/p>\n<p>AMY GOODMAN: What do you mean you have no protection?<\/p>\n<p>RUSSELL TICE: No. No, I do not. As far as\u2014of course, I\u2019m not witting  of anyone that was told they will spy on an American. So, ultimately,  when this was going on, I have a feeling it was closely held at some of  the upper echelon levels. And you\u2019ve got to understand, I was a worker  bee. I was a guy that wrote the reports and did the analysis work and\u2014you  know, the detail guy. At some point, your reports have to get sent up up the line and then, you know, the management takes action at some point  or another, but at my level, no, I was not involved in this.<\/p>\n<p>RUSSELL TICE: I sent it to the chairs of the Senate Intelligence  Committee and the House Intelligence Committee, the SSCI and the HPSCI.<\/p>\n<p>The CIA and the cult of intelligence (1974) Reviewed by JamesRMacLean on 2007-04-09. Incompetence leads to Monstrosity Marchetti&#8217;s expose of the CIA was published on the eve of the Church Commission, at a moment when domestic outrage at the culture of duplicity and domestic interference  had reached its peak. Since that time, successful public relations have  greatly enhanced the image of intelligence services. Marchetti&#8217;s thesis  is that, contrary to widespread public belief, the USA was not locked in an existential struggle with Soviet or Chinese subversion, and never  really was. Soviet intelligence utterly surpassed the CIA in  effectiveness, initiative, and recruitment of allied agents abroad. In  fact, the CIA was effective only against 3rd world intelligence  organizations, and there, spectacularly so. This extreme Soviet edge in  espionage was more than offset by the superior resources of the  conventional Western militaries and the impossibility of waging a direct confrontation owing to the nuclear stalemate. Worse, this advantage was not seriously mitigated by the abundance of high-tech gadgets, such as  satellites; such tools merely facilitated the collection of large  amounts of raw data, with virtually no practical usefulness.<\/p>\n<p>Far from rendering the US intelligence community harmless, however, it  made the agency focus on a campaign against 3rd world allies, and  ultimately, against the US population. The CIA tried its hand at waging  secret wars in Latin America, Southeast Asia, and Africa; it developed a vast group of businesses to serve as cover for illicit shipping and arms  supplies; and it became utterly habituated to corrupting legislators in  the Free World. The CIA became an eager tool for an unaccountable  executive branch, provided that the executive had a flair for covert  action; and it tended to create an echo chamber of self-deception that  threatened the entire national security establishment. At the very top  of its list of priorities was the urgent need to defend its mission  publicly, and validate its immense budget. Marchetti spends a modest  amount of time discussing the inability of the CIA to confront the Soviet KGB. When he mentions it, he avers the KGB  and its allied bureaux are indeed odious, but also defensive&#8211;by  necessity. He dwells in somewhat greater detail on the CIA&#8217;s structure  and specialized fields of performance. He includes a broad-brush  description of the overall US intelligence community, before turning to  an analysis of the separate divisions and their respective behavior.  This included covert operations (such as the Bay of Pigs invasion),  proprietaries (such as Interarmco and Air America), propaganda and  disinformation, and espionage\/counterespionage. In all of these  enterprises, the same motivation prevails: the CIA seeks  self-perpetuation and influence WITHIN the Western world, but lacks will or ability to seriously combat the Soviets. Towards the end, he  discusses the increasing tendency of the CIA to interfere in regular US  politics, chiefly to ingratiate itself with the president.<\/p>\n<p>Marchetti&#8217;s criticisms of the intelligence community were surprisingly  mild. I should mention in passing that his book had about 170 or so  passages deleted by court order; the CIA had earlier demanded well in  excess of 300, and the court awarded it half of what it demanded. Some  of the deletions are downright silly (as where it refers to a base in  [DELETED] granted by Haile Selassie!), and elsewhere I was amused to  observe the most numerous deletions in the part dealing with funding  appropriations. The extreme secrecy of the intelligence community with  respect to funding has greatly intensified since this book was  published, and usually the motivation is quite obviously to conceal how  much money these agencies actually waste. However, Marchetti concludes  that the CIA is essentially past reform, useless, and so incompetent at  its mission as to have become narrowly focused on extorting billions  from the nation.<\/p>\n<p>PSYCHOTRONIC WEAPONS<\/p>\n<p>Former United States Government Physicist! 1981-Lt Col. US Army Retired, Pentagon analyst<\/p>\n<p>(McRae, Ronald, Mind Wars, St. Martin&#8217;s Press, 1984, p 127)<\/p>\n<p>In a slide Bearden illustrates how a Scalar War would involve a  psychoenergetics attack on the operators of the enemy scalar  installation, entraining their minds into hypnogogic trance and getting  them to shut down their systems. And ultimately psychoenergetic warfare  goes to the very heart of human identity itself. For if my thoughts  might no longer be &#8220;mine,&#8221; then who and what am I? Can my very sense of  being &#8220;me&#8221; be hijacked by some nefarious psychoenergetic scheme? One  paper to begin with is \u201cMind Control and EM Wave Polarization  Transductions\u201d This is such serious stuff that Bearden includes a  strong warning about misuse of this knowledge. Psychoenergetics weapons can  MENTALLY MAIM AND PHYSICALLY KILL. \u201cUNAWARE FORCED SPEECH by- passing  memory, Channelled DREAMS, Split personalities etc.<\/p>\n<p>SPACE PRESERVATION ACT-House Resolution (bill 2977)<\/p>\n<p>Brain manipulation from a distance-2001-2002<\/p>\n<p>Last year, in October, the Congressman Dennis J. Kucinich introduced in  the American Congress a bill, obliging the American president to get  engaged in the negotiations aimed at the ban of space based weapons. In  this bill the definition of a weapon system includes: any other  unacknowledged or as yet undeveloped means inflicting death or injury  on, or damaging or destroying, a person (or the biological life, bodily  health, mental health, or physical and economic well-being of a person)  through the use of land-based, sea-based, or space-based systems using  radiation, electromagnetic, psychotronic, sonic, laser, or other  energies directed at individual persons or targeted populations or the  purpose of information war, mood management, or mind control of such  persons or populations&#8221; (12). As in all legislative acts quoted in this  article the bill counts with sound, light or electromagnetic stimulation of human brain. Psychotronic weapons remain, at least for a layman  uninformed of secret military research, in the sphere of science  fiction, since so far none of the published scientific experiments was  presented in the way which would allow for its replication. That it is  feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of  the countries the use of such technologies, without consent of the  user, is banned. Devices using light for the stimulation of the brain  show another way how the light flashing in certain frequencies could be  used for the manipulation of human psychic life. As for the sound, a  report on the device transmitting a beam of sound waves, which can hear  only persons at whom the beam of sound waves is targeted, appeared last  year in the world newspapers. The beam is formed by a combination of  sound and ultrasound waves which causes that a person targeted by this  beam hears the sound inside of his head. Such a perception could easily  convince the human being that it is mentally ill. The acts presented in  this article suggest that with the development of technology and  knowledge of the functioning of human brain new ways of manipulation of  human mind keep emerging. One of them seems to be the electromagnetic  energy.<\/p>\n<p>Though in the open scientific literature only some 30 experiments were  published, supporting this assumption (1),(2), already in 1974, in the  USSR, after successful testing with military unit in Novosibirsk, the  installation Radioson (Radiosleep) was registered with the Government  Committee on the Matters of Inventions and Discoveries of the USSR,  described as a method of induction of sleep by means of radio waves (3), (4), (5)\u2026<\/p>\n<p>Dear Senator-Attorney Letter included:<\/p>\n<p>We seek your office\u2019s assistance in initiating hearings and a  fact-finding congressional inquiry into the government agencies and\/or  private companies that are targeting citizens. Many citizens are  desperate to be freed from the disturbing, intrusive and oppressive  targeting.<\/p>\n<p>Evidence supports the conclusion that weapons exist that could be used  against individuals, based on U.S. Patent and Trademark Office filings,  public releases by agencies, and other technologies that indicate the  level of technological sophistication. The weapons are believed to be  based on electromagnetism, microwaves, sonic waves, lasers and other  types of directed energy, and were characterized as \u201cpsychotronic\u201d  in Rep. Dennis Kucinich\u2019s draft of House Resolution 2977, the Space  Preservation Act of 2001. Furthermore, it is undeniable that government  agencies have tested citizens without permission in the past; for  example, the CIA\u2019s human experimentation discussed in Orlikow v. U.S.,  682 F.Supp. 77 (D.D.C. 1988), secretly administered lysergic acid  diethylamide discussed in United States v. Stanley, 483 U.S. 669 (1987), and military chemical experimentation as discussed in Congressional  Committee Report 103-97, 103d Congress, 2d Session, S. Prt. 103-97 (Dec. 8, 1994). Lastly, the sheer numbers of people complaining of being  targeted, including people with post-graduate degrees and a lifetime of  achievements, and the similarities in symptoms tend to outweigh a  dismissive response based on charges of anecdotal evidence or group  paranoia.<\/p>\n<p>there is a certain risk of sounding too conspiratorial, however, common  denominators such as physical symptoms and medical reports, surveillance scenarios, harassment techniques, and more can be readily established.<\/p>\n<p>Very truly yours,<\/p>\n<p>36.\tAround January 2003, the NSA designed and implemented a program  \u201cTHE DRAGNET\u201d in collaboration with AT&amp;T to build a surveillance  operation at AT&amp;T\u2019s Folsom Street Facility, inside a secret room  known as the \u201cSG3 Secure Room\u201d. In February 2003, the \u201cSplitter  Cabinet\u201d split diverting to and from Qwest, XO, PAIX, Allegiance, and many more  Service Providers at the SG3 Location.<\/p>\n<p>37.\tAs some \u201cX or zero\u201d files kept covertly in Silicon Valley and  NSA and \u201cData Mining\u201d with SIG-INT Satellites used as the scapegoat  of illegal covert spying of 50 years. Plaintiff received communication  through Qwest and T-Mobile, and many other carriers that were tampered  with, Plaintiff found her computer files wiped out for over one year  (2007-2008 of all her Government research and email communications to  the public, since she began attempts for help, and notified Qwest of the activities behind the scenes as they had found them undetectable.  Plaintiff\u2019s communications verbally and electronically, including  facsimiles, muting one party in conversation to sabotage meaning, emails were intercepted and manipulated, as destroyed documents, videos, and  photographs, preventing the reporting her story and the torture and  abuse to non-conspiring authorities and individuals.<\/p>\n<p>38. Defendant\u2019s daily tortures are being done without judicial,  statutory, or other lawful authorization, in violation of statutory and  constitutional limitations, and in excess of statutory and  constitutional authority.<\/p>\n<p>39. Defendants\u2019 daily tortures are being done without probable cause  or reasonable suspicion to believe that Plaintiff has committed or are  about to commit any crime or engage in any terrorist activity.<\/p>\n<p>40. Defendants\u2019 daily tortures are being done without probable cause  or reasonable suspicion to believe that Plaintiff is of foreign powers  or agents thereof and these activities are crimes of humanity.<\/p>\n<p>41. Defendants\u2019 daily tortures are being done without any reason to  believe that the information is relevant to an authorized criminal  investigation or to an authorized investigation to protect against  international terrorism or clandestine intelligence activities.<\/p>\n<p>42.\tPlaintiff was targeted in 1996 for 5 years of her life, unwittingly  after calling the FBI from her work place and was told \u201cThey were  already on it\u201d. On another experiment for war allies, Plaintiff,  UNREALIZED, was told she was free and arrived in San Diego 5 days later  on 9\/11\/01. Plaintiff flew to Atlanta wondering why she was invited to  sit in a co-pilot\u2019s chair on the runway, while waiting to take off  from snow on the ground, in the height of the new steel door  installation climate and high security. This information was sent to the  U.N. BEFORE the Buffalo crash. In her Florida home, early 2007, naive  and without knowledge of corruptions, wars, or weapons, Plaintiff was  comatosed for 72 hours and her memory began to be wiped out each night  and corrupted with transmissions in each day. Plaintiff ran away  TERRORIZED after being transmitted to start \u201cTHE PROCESS\u201d, which  today she knows was to brainwash her into the cult of intelligence and  experiments. Plaintiff left her home terrorized and traveled around the  world programmed to keep copious notes. Plaintiff was attacked for no  reason on the streets, by UNREALIZED doctors, by kids, dogs, on planes (International Airways),  and was held hostage in a food establishment in Nice when on her way to  whistle blow the information to other embassies. Plaintiff had her  house contents hijacked from AZ, leaving her homeless numerous times to  sabotage her life and work and was falsely detained upon each attempt to  whistle blow. Plaintiff was transmitted to send a letter to FBI  Director Mueller, demanding to cease and invert her family, when she returned from AZ in February of 2008. Plaintiff was informed that it was  too late as they had already \u201cgotten to him\u201d and she would never be  believed. Not until one year later in February 2009, someone sent  Plaintiff an email of the Russell Tice article and Plaintiff IMMEDIATELY came to DC in April 2009 to talk with DOJ Officials and their Attorneys.  Plaintiff\u2019s many computers and car batteries, etc were zapped the same day again while en route. Plaintiff\u2019s communication chaos  with NSA transmissions sabotaged her life, and others with unwitting false  memories. In January 2010 Plaintiff was told her surveillance\/spying  recordings could be sold overseas and that the FBI had joined forces  with the Shadow Government to suppress her further from whistle blowing. Plaintiff\u2019s behavior was modified and resembled what she found on  u-tube in the 911 brainwashing process to the public for Weapons of Mass Destruction (the opposite of most news reports). Plaintiff was jacketed (against each other) and isolated during the 4 years Defendants\u2019 daily  tortures against her will and religion is directly performed, and\/or  aided, abetted, counseled, commanded, induced or procured, by  Defendants. On information and belief, Defendants will continue to  directly target the Plaintiff and the Public and \/or will continue to  aid, abet, counsel, command, induce or procure that conduct. (Mind  Control and the American Government; \u201cPrevailing Winds\u201d 1994) On  information and belief, since Tesla\u2019s Directed Energy Weapons were  invented and launched or picked up by DOD covert ops, The United States  unlike the rest of the Globe, rapidly began down a culture of Cancer,  corruptions, crimes (another experiment in 1968 on crimes in major  cities hidden behind LSD like aliens) paranoia, immoral behaviors, AIDS, ANTHRAX, obesity, division, Trash TV, paranormal phenomenon, and a  greater necessity of guinea pigs for TECHNOLOGY experimentation and  corruptions.<\/p>\n<p>\u201cWhen even one American -who has done nothing wrong- is forced by fear  to shut his mind and close his mouth, then all Americans are in  peril.\u201d Harry S. Truman<\/p>\n<p>43.\tPlaintiff seeks costs, legal fees, and damages applicable by law  with protective measures for all COUNTS. Plaintiff was represented under a class suit, before transmissions sabotaged the attorney and his  contact information has been disconnected and tampered with. On  information and belief, the former attorney may have had brain surgery  from Migraines while preparing the Complaint funded by and San Francisco University, after my visit with him to Denver and may be overseas at  this time.<\/p>\n<p>ALLEGATIONS also included in Plaintiff\u2019s NSA and\/or Electronic Communications<\/p>\n<p>44. Pursuant to Federal Rules of Civil Procedure, Title 5, 22, 42, 142,  18, 18a, and 50, Plaintiff Mireille Torjman brings this action on behalf of herself, and to attest to her family and the public\u2019s  victimization, unwittingly and\/or unrealized:<\/p>\n<p>(a)\tTITLE 18 PART I CHAPTER 37 \u00a7 793. Gathering, transmitting or losing defense information,<\/p>\n<p>(b)\t18 U.S.C. \u00a7 241. Conspiracy against rights,<\/p>\n<p>(c)\t18 U.S.C. \u00a7 373. Solicitation to commit a crime of violence,<\/p>\n<p>(d)\t18 U.S.C. \u00a7 1091. Genocide,<\/p>\n<p>(e)\t18 U.S.C. \u00a7 1341. Mail fraud,<\/p>\n<p>(f)\t18 U.S.C. \u00a7 1512. Tampering with a witness, victim, or an informant,<\/p>\n<p>(g)\t18 U.S.C. \u00a7 1513. Retaliating against a witness, victim, or an informant,<\/p>\n<p>(h)\t18 U.S.C. \u00a7 1583 (2). Enticement into slavery,<\/p>\n<p>(i)\t18 U.S.C. \u00a7 1692. Foreign mail as United States mail,<\/p>\n<p>(j)\t18 U.S.C. \u00a7 1801. Video voyeurism,<\/p>\n<p>(k)\t18 U.S.C. \u00a7 1812. Statement of exclusive means by which electronic  surveillance and interception of certain communications may be  conducted,<\/p>\n<p>(l)\t18 U.S.C. \u00a7 2242. Sexual abuse,<\/p>\n<p>(m)\t18 U.S.C. \u00a7 2332 (a) Terrorism, and (h). Use of weapons of mass destruction,<\/p>\n<p>(n)\t18 U.S.C. \u00a7 2339. Harboring or concealing terrorists,<\/p>\n<p>(o)\t18 U.S.C. \u00a7 2422. Coercion and enticement, or are currently doing so;<\/p>\n<p>(p) Defendants have subjected the public to electronic surveillance, in  violation of 50 U.S.C. \u00a7 1809 and 1810, or are currently doing so;<\/p>\n<p>(q) Defendants are intercepting communications in violation of 18 U.S.C. \u00a7 2510 and 18 U.S.C. \u00a7 2511;<\/p>\n<p>(r) Defendants have transmitted Plaintiff and the public in violation of 18 U.S.C. \u00a7 2703, Required Disclosure of communications records, or are currently doing so;<\/p>\n<p>(s)\tDefendants have transmitted civilians, and non civilians, in  violation of 18 U.S.C. \u00a7 2381. Treason, or are currently doing so;<\/p>\n<p>(t) Defendants have harassed and transmitted the public to stalk and  harass the Plaintiff inclusive of electronically and tangibly, in  violation of 18 U.S.C. \u00a7 2261: US Code &#8211; 2261A: Stalking<\/p>\n<p>(u) Plaintiff was falsely detained and sabotaged with the use of mind  control transmissions violating 18a U.S.C. Rule 41. Search and Seizure<\/p>\n<p>(v) Defendants have violated the Administrative Procedures Act, 5 U.S.C. \u00a7\u00a7 701 et seq., or are currently doing so;<\/p>\n<p>(w) Defendants have violated the constitutional principle of separation of powers, or are currently doing so;<\/p>\n<p>(x) Defendants have Tortured Plaintiff, her family, and the public  electronically in violation of 18 U.S.C. \u00a7 2340A, or currently doing  so:<\/p>\n<p>(y) Plaintiff is entitled to injunctive, declaratory, and other  equitable relief against defendants and freedom from further threats,  family, accidents, psychological and physical harm, illnesses, sabotage, bribes, and blackmail;<\/p>\n<p>(z)\tDefendants have Tortured Plaintiff, her family and the public  electronically in violation of 18 U.S.C. \u00a7 2422, or currently doing so:<\/p>\n<p>(aa) Plaintiff is entitled to Civil Damages 18 U.S.C. \u00a7 Rule 2520 in  violations of her First, Third, Fifth, and Thirteenth Amendments; 18  U.S.C. \u00a7 2510, 18 U.S.C. \u00a7 2511, and 18 U.S.C. \u00a7 2512.<\/p>\n<p>(ab) Plaintiff is entitled to Grants and Health Care Assistance as a  victim in accordance to 22 U.S.C. \u00a7 2152: US Code &#8211; Section 2152:  Assistance for victims of torture.<\/p>\n<p>(ac) United Nations Convention Against Torture and Other Cruel, Inhuman  or Degrading Treatment or Punishment, G.A. res. 39\/46, annex, 39 U.N.  GAOR Supp. (No. 51) at 197, U.N. Doc. A\/39\/51 (1984), entered into force June 26, 1987; Universal Declaration of Human Rights, G.A. res. 217A  (III), U.N. Doc. A\/810 at 71 (1948); International Convention on Civil  and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A\/6316 (1966), 9.99 U.N.T.S. 171, entered into force  Mar. 23, 1976.<\/p>\n<p>(ad)\tDefendants have Tortured Plaintiff, her family and the public and  the prohibitions against torture and other cruel, inhuman, or degrading  treatment and the conspiracy to oppress, torture, rape, suppress, is a  violation under 142 U.S.C.\u00a7 1985. Conspiracy to interfere with United  States Civil Rights.<\/p>\n<p>(ae) Defendants have Tortured Plaintiff, her family and the public and  the prohibitions against malicious intent to torture, rape privacy  rights, brainwash, and enslave with severe psychological in-humane  damages to one\u2019s spirit, and libel is actionable under Tort Claims of  damages found under civil and criminal trials.<\/p>\n<p>(af)\tPlaintiff has made at least 2 requests to the FOIA and both  dossiers were denied under the violation of 5 U.S.C. \u00a7 552; claims  under and 18 U.S.C. \u00a7 2707 and 5 U.S.C. \u00a7 702<\/p>\n<p>42.\tAdequacy: Plaintiff and family members are suffering great harm  arising from Defendants\u2019 violations of law, as alleged herein.  Plaintiff intends to prosecute this action vigorously. Plaintiff hereby demands  injunctive relief and damages.<\/p>\n<p>COUNT I<\/p>\n<p>Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND  War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and  50 U.S.C. and International Conventional<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>43. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>44. Plaintiff is seeking protection for her and for all family members  under the law TITLE 18 U.S.C. \u00a7 3521. Witness relocation and  protection.<\/p>\n<p>COUNT II<\/p>\n<p>Violation of First and Fourth Amendments, 42 U.S.C and 18 U.S.C. and 50  U.S.C. Crimes and Criminal Procedures AND War and National Defense  Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International  Conventional<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>45. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>46.\tPlaintiff motions the COURTS and Defendants to cease and desist  and\/or injunction for relief, immediately from grave dangerous damaging  electronic harassments and that of a religious and personal nature, all  other allegations of surveillance, spying, manipulations, torture,  censorships, daily sabotage, and blocks electronically and otherwise,  retaliations, death threats, thereby violating the constitution and  privacy acts, (US code 22, 42, 142, 18, 18a, and 50) at the hands of,  the direction of, or with the knowledge of, any and all government and  affiliations. Plaintiff seeks declaratory relief against all allegations and all counts. Defendant\u2019s actions described herein violated  Plaintiff\u2019s rights under the Free Exercise and Free Speech Clauses of  the United States Constitution, the Religious Freedom Restoration Act of 1993, 42 U.S.C. \u00a7 2000bb et seq., the Privacy Act, 5 U.S.C. \u00a7 552a,  and Air Force Instruction 37-132; and all other freedoms and rights under  the Law.<\/p>\n<p>COUNT III<\/p>\n<p>Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND  War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and  50 U.S.C. and International Conventional<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>47. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>48.\tPlaintiff numerous attempts sabotaged, hereby requests to compel the court for Defendants to conduct proper and thorough investigations (not failing to include fundamental steps of interviews and psyops techniques  on U.S. Soil) even when seemingly undetectable and\/or prior to 2008,  with all accusations and agencies with full cooperation, including  Sports, Cloning, ENGINEERED Poverty-Bankruptcies with individuals with  Cancer, also to sabotage economies, under the Law.<\/p>\n<p>COUNT IV<\/p>\n<p>Violation of First Amendment\u2014Declaratory, Injunctive, and Other Equitable Relief<\/p>\n<p>Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND  War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50  U.S.C. and International Conventional<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>49. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>50.\tPlaintiff has been sabotaged with proper coverage to expose and warn the public. Plaintiff requests to compel the court for Defendants to  provide the Constituents \u201cWE THE PEOPLE\u201d with un-tampered accurate  news, APPROPRIATE WARNINGS with Main Stream Media: to heed caution, and be  AWARE with knowledge, and choice of action or recourse, under the law of Constituents rights and United States Constitution.<\/p>\n<p>COUNT V<\/p>\n<p>Violation of Fourth Amendment\u2014Declaratory, Injunctive, and Equitable Relief 108.<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>51. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law and aforementioned Amendments of the Constitution, as stated above.<\/p>\n<p>52. Plaintiff is seeking protection for her and for all family members under the law.<\/p>\n<p>53. Plaintiff and have a reasonable expectation of privacy in their  communications and\/or records, mail communications, as forementioned  above, DNA, brain waves, brain activities, brain manipulations, brain  recordings, data mining, collected, and\/or stored by these activities.<\/p>\n<p>54. Plaintiff have expectations of complete privacy to the intrusions of their minds and bodies, threats and fears, blackmail and choice, thus freedom of thought, emotion, will, and destiny.<\/p>\n<p>55. Defendants have directly performed, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated,  directed, controlled, assisted in, or conspired in the commission of  the above-described acts of spying, torture, interception, and\/or use of Plaintiff and her activities, by Intelligence, covertly  without judicial or other lawful authorization, probable cause, and\/or  individualized suspicion, in violation of statutory and constitutional  limitations, and in excess of statutory and constitutional authority.<\/p>\n<p>56. At all relevant times, Defendants committed, knew of and\/or  acquiesced in all of the above-described acts, and failed to respect the Constitutional rights of the Plaintiff by obtaining judicial or other  lawful authorization and by conforming their conduct to the requirements of the respective Amendments, under the Law of the United States  Constitution.<\/p>\n<p>57. By the acts alleged herein, Defendants have violated Plaintiffs\u2019  reasonable expectations of privacy and denied Plaintiff her right to be  free from unreasonable searches and seizures as guaranteed by the Fourth Amendment to the Constitution of the United States. By the acts alleged herein, as a victim of the Programs, Defendants violated Plaintiff\u2019s  rights of the Fourth Amendment to be free from unreasonable searches and seizures, as guaranteed by the Fourth Amendment of the United States  Constitution.<\/p>\n<p>58. By the acts alleged herein, Defendants\u2019 conduct has caused harm to Plaintiff and her family.<\/p>\n<p>59. Defendants\u2019 conduct was done intentionally, with malice and  deliberate indifference, against her will and religion, and\/or with  reckless disregard of, negligent, forceful, trickery, pleasure,  premediated conspiracy, in gross violations of Plaintiff constitutional  rights.<\/p>\n<p>60. On information and belief, the Count V and all other pertaining  Counts Defendants are now engaging in and will continue to engage in the above-described violations of Plaintiffs\u2019 constitutional rights, and  are thereby irreparably harming Plaintiff. Plaintiff have no adequate  remedy at law for the Count V and all other pertaining Counts to  Defendants\u2019 continuing unlawful conduct, and the Count V and all other  pertaining Counts Defendants will continue to violate Plaintiffs\u2019  legal rights unless enjoined and restrained by this Court.<\/p>\n<p>61. Plaintiff seeks that this Court declare that Defendants have  violated their rights and the rights of the public; enjoin the Count V  Defendants, their agents, successors, and assigns, and all those in  active concert and participation with them from violating the  Plaintiffs\u2019 rights under the Fourth Amendment and respective  Amendments, to the United States Constitution; and award such other and further  equitable relief as is proper.<\/p>\n<p>COUNT VI<\/p>\n<p>Violation of Fourth Amendment\u2014Damages<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>62. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>63. Plaintiff have a reasonable expectation of privacy in their  communications and\/or records, mail, communications, Transmissions,  intrusions, spying, by all means including electronics and waves as  forementioned by Defendants.<\/p>\n<p>64. Plaintiff have expectations of privacy to the atrocious intrusions and gross negligence.<\/p>\n<p>65. Defendants have directly performed, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated,  directed, controlled, assisted in, or conspired in the commission of  the above-described acts of acquisition, interception, disclosure,  divulgence and\/or use of communications, contents of communications, and  records pertaining to their communications transmitted, collected, DNA  and brain waves from Data Mining and remote transmissions, and\/or  stored, spying, torture, by Defendants without judicial or other lawful  judicial or other lawful authorization, probable cause, and\/or  individualized suspicion, in violation of statutory and constitutional  limitations, and in excess of statutory and constitutional authority.<\/p>\n<p>66. Defendants, and\/or the use of electronic communication services  acted as the agent in performing, participating in, enabling,  contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the  above-described acts of interceptions, disclosure and\/or use of  Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records  pertaining to their transmissions, collected, and\/or stored without  judicial or other lawful authorization, probable cause, and\/or  individualized suspicion of Plaintiff\u2019s records or other information.<\/p>\n<p>67. At all relevant times, Defendants committed, knew of and\/or  acquiesced, enjoyed all of the above-described acts, and failed to  respect the Fourth Amendment rights of Plaintiffs by obtaining judicial  or other lawful authorization, and by conforming their conduct to the  requirements of the requirements of the respective Amendments.<\/p>\n<p>68. By the acts alleged herein, Defendants have violated Plaintiffs\u2019  reasonable expectations of privacy and denied Plaintiffs their right to  be free from unreasonable searches and seizures as guaranteed by the  Fourth Amendment to the Constitution of the United States.<\/p>\n<p>69. By the acts alleged herein, Defendants\u2019 conduct has caused harm to Plaintiff.<\/p>\n<p>70. Defendants\u2019 conduct is being done intentionally and with malice,  with deliberate indifference, or with reckless disregard of,  Plaintiffs\u2019 constitutional rights.<\/p>\n<p>71. Plaintiff seeks an award of her actual damages and punitive damages  against the Counts III and V Defendants, and such other or further  relief as is proper.<\/p>\n<p>COUNT VII<\/p>\n<p>Violation of First Amendment\u2014Declaratory, Injunctive, and Other Equitable Relief<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>72. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>73. Plaintiff use of communications anonymously and to associate  privately and securely with freedoms as their Constitution Rights.<\/p>\n<p>74. Defendants have directly performed, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently  contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of the above-described acts of acquisition,  interception, disclosure, divulgence and\/or use of Plaintiff and  Plaintiff\u2019s communications, contents of communications, and records  pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and\/or stored,  spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and\/or individualized  suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.<\/p>\n<p>75. Defendants, and\/or the use of electronic communication services  acted as the agent in performing, participating in, enabling,  contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the  above-described acts of acquisition interception, disclosure,  divulgence, and\/or use of Plaintiff and communications, mind and body,  DNA and brain waves, Data Mining and remote transmissions, contents of  communications, and records pertaining to their communications  transmissions, collected, and\/or stored without judicial or other lawful authorization, probable cause, and\/or individualized suspicion of  Plaintiff\u2019s records or other information without judicial or other  lawful authorization, probable cause, and\/or individualized suspicion.<\/p>\n<p>76. By the acts alleged herein, Defendants\u2019 violated Plaintiff\u2019s  rights to speak and receive speech anonymously and associate privately  under the First Amendment.<\/p>\n<p>77. By the acts alleged herein, Defendants\u2019 conduct proximately caused harm to Plaintiff.<\/p>\n<p>78. Defendants\u2019 conduct was done intentionally, with malice and  intent, with deliberate indifference, with reckless disregard, and  negligence, Plaintiff constitutional rights were grossly violated.<\/p>\n<p>79. On information and belief, the Count VII Defendants are now engaging in and will continue to engage in the above-described violations of  Plaintiff\u2019s constitutional rights, and are thereby irreparably harming  Plaintiff. Plaintiff has no adequate remedy at law for the Count VII  Defendants\u2019 continuing unlawful conduct, and the Count VII Defendants  will continue to violate Plaintiff legal rights unless enjoined and  restrained by this Court.<\/p>\n<p>80. Plaintiffs seek that this Court declare that Defendants have  violated their rights; enjoin the Count VII Defendants, their agents,  successors, and assigns, and all those in active concert and  participation with them from violating the Plaintiff rights under the  First Amendment to the United States Constitution; and award such other  and further equitable relief as is proper.<\/p>\n<p>COUNT VIII<\/p>\n<p>Violation of First Amendment\u2014Damages<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>81. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>82. Plaintiff use of communication with privacy to speak or receive speech anonymously and to associate privately.<\/p>\n<p>83. Defendants have directly performed, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently  contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of the above-described acts of acquisition,  interception, spying, disclosure, divulgence and\/or use of Plaintiff and Plaintiff\u2019s communications, contents of communications, and records  pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and\/or stored,  spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and\/or individualized  suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.<\/p>\n<p>84. By the acts alleged herein, Defendants violated Plaintiffs\u2019 rights  to speak and receive speech anonymously and associate privately under  the First Amendment.<\/p>\n<p>85. By the acts alleged herein, Defendants\u2019 conduct proximately caused harm to Plaintiff.<\/p>\n<p>86. Defendants\u2019 conduct was done intentionally, with malice and sadistic pleasure, with deliberate indifference, or with reckless disregard of, Plaintiff constitutional rights.<\/p>\n<p>87. Plaintiff seeks an award of her actual damages and punitive damages  against the Counts IV and VIII Defendants, and for such other or further relief as is proper.<\/p>\n<p>COUNT IX<\/p>\n<p>Violation of Foreign Intelligence Surveillance Act\u2014Declaratory, Injunctive and Other Equitable Relief<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>88. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>89. In relevant part, 50 U.S.C. \u00a7 1809 provides that:<\/p>\n<p>(a) Prohibited activities\u2014A person is guilty of an offense if he  intentionally\u2014(1) engages in electronic surveillance under color of  law except as authorized by this chapter, chapter 119, 121, or 206 of  Title 18 or any express statutory authorization that is an additional  exclusive means for conducting electronic surveillance under section  1812 of this title; or (2) discloses or uses information obtained under  color of law by electronic surveillance, knowing or having reason to  know that the information was obtained through electronic surveillance  not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or  any express statutory authorization that is an additional exclusive  means for conducting electronic surveillance under section 1812 of this  title.<\/p>\n<p>90. In relevant part 50 U.S.C. \u00a7 1801 provides that:<\/p>\n<p>(f) \u201cElectronic surveillance\u201d means \u2013 (1) the acquisition by an  electronic, mechanical, or other surveillance device of the contents of  any wire or radio communication sent by or intended to be received by a  particular, known United States person who is in the United States, if  the contents are acquired by intentionally targeting that United States  person, under circumstances in which a person has a reasonable  expectation of privacy and a warrant would be required for law  enforcement purposes; (2) the acquisition by an electronic, mechanical,  or other surveillance device of the contents of any wire communication  to or from a person in the United States, without the consent of any  party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer  trespassers that would be permissible under section 2511(2)(i) of Title  18; (3) the intentional acquisition by an electronic, mechanical, or  other surveillance device of the contents of any radio communication,  under circumstances in which a person has a reasonable expectation of  privacy and a warrant would be required for law enforcement purposes,  and if both the sender and all intended recipients are located within  the United States; or (4) the installation or use of an electronic,  mechanical, or other surveillance device in the United States for  monitoring to acquire information, other than from a wire or radio  communication, under circumstances in which a person has a reasonable  expectation of privacy and a warrant would be required for law  enforcement purposes.<\/p>\n<p>91. 18 U.S.C. \u00a7 2511(2)(f) further provides in relevant part that  \u201cprocedures in this chapter or chapter 121 and the Foreign  Intelligence Surveillance Act of 1978 shall be the exclusive means by  which electronic surveillance, as defined in section 101 [50 U.S.C. \u00a7  1801] of such Act, and the interception of domestic wire, oral, and electronic  communications may be conducted.\u201d (Emphasis added.)<\/p>\n<p>92. 50 U.S.C. \u00a7 1812 further provides in relevant part that:<\/p>\n<p>(a) Except as provided in subsection (b), the procedures of chapters  119, 121, and 206 of Title 18 and this chapter shall be the exclusive  means by which electronic surveillance and the interception of domestic  wire, oral, or electronic communications may be conducted.<\/p>\n<p>(b) Only an express statutory authorization for electronic surveillance  or the interception of domestic wire, oral, or electronic  communications, other than as an amendment to this chapter or chapters  119, 121, or 206 of Title 18 shall constitute an additional exclusive  means for the purpose of subsection (a).<\/p>\n<p>(Emphasis added.)<\/p>\n<p>93.\tDefendants intentionally acquired, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of such acquisition, by means of a  surveillance and spying devices, the contents of one or more wire and  wireless communications to or from Plaintiff or other information in  which Plaintiff has a reasonable expectation of privacy, without the  consent of any party thereto, and such acquisition occurred in the  United States and overseas.<\/p>\n<p>94. Defendants, and\/or other electronic communication services acted as  the agent in performing, participating in, enabling, contributing to,  negligently contributing to, facilitating, at the hands of, direction  of, or knowledge of, or assisting in the commission of the  above-described acts of acquisition of Plaintiffs\u2019 communications,  interceptions, disclosure and\/or use of Plaintiff mind and body, DNA and brain waves from Data Mining, remote transmissions, communications  records, and contents of communications, pertaining to their  transmissions, collected, and\/or stored without judicial or other lawful authorization, probable cause, and individualized suspicion of  Plaintiff\u2019s records and information.<\/p>\n<p>95. By the acts alleged herein, Defendants acting in excess of their  statutory authority and in violation of statutory limitations have  intentionally engaged in, or aided, abetted, counseled, commanded,  induced, procured, encouraged, promoted, instigated, advised, willfully  caused, participated in, enabled, contributed to, negligently  contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of, electronic surveillance (as defined by  50 U.S.C. \u00a7 1801(f)) under color of law, not authorized by any statute,  to which Plaintiff were subjected in violation of 50 U.S.C. \u00a7 1809.<\/p>\n<p>96. Additionally or in the alternative, by the acts alleged herein,  Defendants acting in excess of their statutory authority and in  violation of statutory limitations have intentionally disclosed or used  information obtained under color of law by electronic surveillance,  knowing or having reason to know that the information was obtained  through electronic surveillance and spying not authorized by statute,  including information pertaining to Plaintiff, or aided, abetted,  counseled, commanded, induced, procured, encouraged, promoted,  instigated, advised, willfully caused, participated in, enabled,  contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of such acts.<\/p>\n<p>97. Defendants did not notify Plaintiff of the above-described  electronic surveillance, disclosure, and\/or use, nor did Plaintiffs or  class members consent to such.<\/p>\n<p>98. Plaintiff have been and are aggrieved by Defendants\u2019 electronic  surveillance, and spying , disclosure, and\/or use of their wire  communications.<\/p>\n<p>99. On information and belief, the Count IX Defendants are now engaging  in and will continue to engage in the above-described acts resulting in  the electronic surveillance, spying, disclosure, and\/or use of Plaintiff wire communications, acting in excess of the Count IX Defendants\u2019  statutory authority and in violation of statutory limitations, including 50 U.S.C. \u00a7 1809 and 18 U.S.C. \u00a7 2511(2)(f), and are thereby  irreparably harming Plaintiff and Plaintiff\u2019s family. Plaintiffs has  no adequate remedy at law for the Count IX Defendants\u2019 continuing  unlawful conduct, and the Count IX Defendants will continue to violate  Plaintiff legal rights unless enjoined and restrained by this Court.<\/p>\n<p>100. Pursuant to Larson v. United States, 337 U.S. 682 (1949) and to 5 U.S.C. \u00a7 702,<\/p>\n<p>Plaintiff seeks that this Court declare that Defendants have violated  their rights and the rights of the class; enjoin the Count IX  Defendants, their agents, successors, and assigns, and all those in  active concert and participation with them from violating the  Plaintiff\u2019s statutory rights, including their rights under 50 U.S.C.  \u00a7\u00a7 1801 et seq.; and award such other and further equitable relief as  is proper.<\/p>\n<p>COUNT X<\/p>\n<p>Violation of 50 U.S.C. \u00a7 1809, actionable under 50 U.S.C. \u00a7 1810\u2014Damages<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>101. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>102. In relevant part, 50 U.S.C. \u00a7 1809 provides that:<\/p>\n<p>(a) Prohibited activities\u2014A person is guilty of an offense if he  intentionally\u2014(1) engages in electronic surveillance under color of  law except as authorized by this chapter, chapter 119, 121, or 206 of  Title 18 or any express statutory authorization that is an additional  exclusive means for conducting electronic surveillance under section  1812 of this title; or (2) discloses or uses information obtained under  color of law by electronic surveillance, knowing or having reason to  know that the information was obtained through electronic surveillance  not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or  any express statutory authorization that is an additional exclusive  means for conducting electronic surveillance under section 1812 of this  title.<\/p>\n<p>103. In relevant part 50 U.S.C. \u00a7 1801 provides that:<\/p>\n<p>(f) \u201cElectronic surveillance\u201d means \u2013 (1) the acquisition by an  electronic, mechanical, or other surveillance device of the contents of  any wire or radio communication sent by or intended to be received by a  particular, known United States person who is in the United States, if  the contents are acquired by intentionally targeting that United States  person, under circumstances in which a person has a reasonable  expectation of privacy and a warrant would be required for law  enforcement purposes; (2) the acquisition by an electronic, mechanical,  or other surveillance device of the contents of any wire communication  to or from a person in the United States, without the consent of any  party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer  trespassers that would be permissible under section 2511(2)(i) of Title  18; (3) the intentional acquisition by an electronic, mechanical, or  other surveillance device of the contents of any radio communication,  under circumstances in which a person has a reasonable expectation of  privacy and a warrant would be required for law enforcement purposes,  and if both the sender and all intended recipients are located within  the United States; or (4) the installation or use of an electronic,  mechanical, or other surveillance device in the United States for  monitoring to acquire information, other than from a wire or radio  communication, under circumstances in which a person has a reasonable  expectation of privacy and a warrant would be required for law  enforcement purposes.<\/p>\n<p>104. 18 U.S.C. \u00a7 2511(2)(f) further provides in relevant part that  \u201cprocedures in this chapter or chapter 121 and the Foreign  Intelligence Surveillance Act of 1978 shall be the exclusive means by  which electronic surveillance, as defined in section 101 [50 U.S.C. \u00a7  1801] of such Act, and the interception of domestic wire, oral, and electronic  communications may be conducted.\u201d (Emphasis added.)<\/p>\n<p>105. 50 U.S.C. \u00a7 1812 further provides in relevant part that:<\/p>\n<p>(a) Except as provided in subsection (b), the procedures of chapters  119, 121, and 206 of Title 18 and this chapter shall be the exclusive  means by which electronic surveillance and the interception of domestic  wire, oral, or electronic communications may be conducted.<\/p>\n<p>(b) Only an express statutory authorization for electronic surveillance  or the interception of domestic wire, oral, or electronic  communications, other than as an amendment to this chapter or chapters  119, 121, or 206 of Title 18 shall constitute an additional exclusive  means for the purpose of subsection (a). (Emphasis added.)<\/p>\n<p>106. Defendants intentionally acquired, or aided, abetted, counseled,  commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, (negligent),  facilitated, directed, controlled, assisted in, or conspired in the  commission of such acquisition, by means of a surveillance and spying  devices, the contents of one or more wire and wireless communications to  or from Plaintiff or other information in which Plaintiff has a  reasonable expectation of privacy, without the consent of any party  thereto, and such acquisition occurred in the United States.<\/p>\n<p>107. Defendants, and\/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to,  negligently contributing to, facilitating, at the hands of, direction  of, or knowledge of, or assisting in the commission of the  above-described acts of acquisition of Plaintiffs\u2019 communications,  interceptions, disclosure and\/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications,  contents, and records pertaining to their transmissions, collected,  and\/or stored without judicial or other lawful authorization, probable  cause, and\/or individualized suspicion of Plaintiff\u2019s records or other  information.<\/p>\n<p>108. By the acts alleged herein, Defendants have intentionally engaged  in, or aided, abetted, counseled, commanded, induced, procured,  encouraged, promoted, instigated, advised, willfully caused,  participated in, enabled, contributed to, (negligent), facilitated,  directed, controlled, assisted in, or conspired in the commission of,  electronic surveillance (as defined by 50 U.S.C. \u00a7 1801(f)) under color  of law, not authorized by any statute, to which Plaintiffs were  subjected in violation of 50 U.S.C. \u00a7 1809.<\/p>\n<p>109. Additionally or in the alternative, by the acts alleged herein, Defendants have intentionally disclosed<\/p>\n<p>or used information obtained under color of law by electronic  surveillance, knowing or having reason to know that the information was  obtained through electronic surveillance and spying not authorized by  statute, including information pertaining to Plaintiffs, or aided,  abetted, counseled, commanded, induced, procured, encouraged, promoted,  instigated, advised, willfully caused, participated in, enabled,  contributed to, facilitated, directed, controlled, assisted in, or  conspired in the commission of such acts.<\/p>\n<p>110. Defendants did not notify Plaintiff of the above-described  electronic surveillance, spying, disclosure, and\/or use, nor did  Plaintiffs consent to such.<\/p>\n<p>111. Plaintiffs have been and are aggrieved by Defendants\u2019 electronic  surveillance, spying, disclosure, and\/or use of their wire  communications.<\/p>\n<p>112. Pursuant to 50 U.S.C. \u00a7 1810, which provides a civil action for  any person who has been subjected to an electronic surveillance and spying  or about whom information obtained by electronic surveillance of such  person has been disclosed or used in violation of 50 U.S.C. \u00a7 1809,  Plaintiff seeks from the Count X Defendants for each Plaintiff their  statutory damages or actual damages; punitive damages as appropriate;  and such other and further relief as is proper.<\/p>\n<p>COUNT XI<\/p>\n<p>Violation of 18 U.S.C. \u00a7 2510, 18 U.S.C. \u00a7 2511, and 18 U.S.C. \u00a7 2512\u2014Declaratory, Injunctive, and Other Equitable Relief<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>113. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>114. In relevant part, 18 U.S.C. \u00a7 2510, 18 U.S.C. \u00a7 2511, and 18 U.S.C. \u00a7 2510 provides that:<\/p>\n<p>(1) Except as otherwise specifically provided in this chapter any person  who \u2013 (a) intentionally intercepts, endeavors to intercept, or  procures any other person to intercept or endeavor to intercept, any  wire, oral, or electronic communication . . . (c) intentionally  discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to  know that the information was obtained through the interception of a  wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any  wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a  wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).<\/p>\n<p>115. 18 U.S.C. \u00a7 2511 further provides that:<\/p>\n<p>(3)(a) Except as provided in paragraph (b) of this subsection, a person  or entity providing an electronic communication service to the public  shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in  transmission on that service to any person or entity other than an  addressee or intended recipient of such communication or an agent of  such addressee or intended recipient.<\/p>\n<p>116. 18 U.S.C. \u00a7 2511(2)(f) further provides in relevant part that  \u201cprocedures in this chapter or chapter 121 and the Foreign  Intelligence Surveillance Act of 1978 shall be the exclusive means by  which electronic surveillance, as defined in section 101 [50 U.S.C. \u00a7  1801] of such Act, and the interception of domestic wire, oral, and electronic  communications may be conducted.\u201d (Emphasis added.)<\/p>\n<p>117. 50 U.S.C. \u00a7 1812 further provides in relevant part that:<\/p>\n<p>(a) Except as provided in subsection (b), the procedures of chapters  119, 121, and 206 of Title 18 and this chapter shall be the exclusive  means by which electronic surveillance and the interception of domestic  wire, oral, or electronic communications may be conducted.<\/p>\n<p>(b) Only an express statutory authorization for electronic surveillance  or the interception of domestic wire, oral, or electronic  communications, other than as an amendment to this chapter or chapters  119, 121, or 206 of Title 18 shall constitute an additional exclusive  means for the purpose of subsection (a). (Emphasis added.)<\/p>\n<p>118. By the acts alleged herein, Defendants have intentionally and  willfully intercepted, endeavored to intercept, or procured another  person to intercept or endeavor to intercept, Plaintiff\u2019s wire or  electronic communications in violation of 18 U.S.C. \u00a7 2511(1)(a);  and\/or<\/p>\n<p>119. By the acts alleged herein, Defendants have intentionally and  willfully disclosed, or endeavored to disclose, to another person the  contents of Plaintiff wire or electronic communications, knowing or  having reason to know that the information was obtained through the  interception of wire or electronic communications in violation of 18  U.S.C. \u00a7 2511(1)(c); and\/or<\/p>\n<p>120. By the acts alleged herein, Defendants have intentionally and  willfully used, or endeavored to use, the contents of Plaintiff wire or  electronic communications, while knowing or having reason to know that  the information was obtained through the interception of wire or  electronic communications and spying in violation of 18 U.S.C. \u00a7  2511(1)(d).<\/p>\n<p>121. By the acts alleged herein, Defendants have intentionally and  willfully caused, or aided, abetted, counseled, commanded, induced,  procured, encouraged, promoted, instigated, advised, participated in,  contributed to, negligently contributed to, facilitated, directed,  controlled, assisted in, or conspired to cause unwitting subjects,  Plaintiff, and the public, divulgence of Plaintiff wire or electronic  communications to Defendants while in transmission by various service  providers, and there of tampering with, in violation of 18 U.S.C. \u00a7  2511(2)(3)(4)(5).<\/p>\n<p>122. Defendants have committed these acts of interception, disclosure,  divulgence and\/or use of Plaintiff communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging,  promoting, instigating, advising, willfully causing, participating in,  enabling, contributing to, facilitating, directing, controlling,  assisting in, or conspiring in their commission. In doing so, Defendants have acted in excess of their statutory authority and in violation of  statutory limitations.<\/p>\n<p>123. Defendants, and\/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to,  negligently contributing to, facilitating, at the hands of, direction  of, or knowledge of, or assisting in the commission of the  above-described acts of interceptions, disclosure and\/or use of  Plaintiff\u2019s mind and body, DNA and brain waves from Data Mining and  remote transmissions, communications, contents of communications, and  records pertaining to their transmissions, collected, and\/or stored  without judicial or other lawful authorization, probable cause, and\/or  individualized suspicion of Plaintiff\u2019s records or other information.<\/p>\n<p>124. Defendants did not notify Plaintiff of the above-described  intentional interception, disclosure, divulgence and\/or use of their  wire or electronic communications, nor did Plaintiff consent to such.<\/p>\n<p>125. Plaintiff have been and are aggrieved by Defendants\u2019 intentional  and willful interception, disclosure, divulgence and\/or use of their  wire or electronic communications.<\/p>\n<p>126. On information and belief, the Count XI Defendants are now engaging in and will continue to engage in the above-described acts resulting in the intentional and willful interception, disclosure, divulgence and\/or use of Plaintiff\u2019s wire or electronic communications, acting in excess  of the Count XI Defendants\u2019 statutory authority and in violation of  statutory limitations, including 18 U.S.C. \u00a7 2511, and are thereby  irreparably harming Plaintiff. Plaintiffs have no adequate remedy at law for the Count XI Defendants\u2019 continuing unlawful conduct, and the  Count XI Defendants will continue to violate Plaintiff\u2019s legal rights unless  enjoined and restrained by this Court.<\/p>\n<p>127. Pursuant to 18 U.S.C. \u00a7 2520, which provides a civil action for  any person whose wire or electronic communications have been intercepted,  disclosed, divulged or intentionally used in violation of 18 U.S.C. \u00a7  2511, to Larson v. United States, 337 U.S. 682 (1949), and to 5 U.S.C.  \u00a7 702, Plaintiff seek equitable and declaratory relief against the Count  XI Defendants.<\/p>\n<p>128. Plaintiffs seek that this Court declare that Defendants have  violated their rights and the rights of the class; enjoin the Count XI  Defendants, their agents, successors, and assigns, and all those in  active concert and participation with them from violating the Plaintiff  statutory rights, including their rights under 18 U.S.C. \u00a7 2511; and  award such other and further equitable relief as is proper.<\/p>\n<p>COUNT XII<\/p>\n<p>Violation of 18 U.S.C. \u00a7 2510, 18 U.S.C. \u00a7 2511, and 18 U.S.C. \u00a7 2512 actionable under 18 U.S.C. \u00a7 2520\u2014Damages<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>129. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>130. In relevant part, 18 U.S.C. \u00a7 2510, 18 U.S.C. \u00a7 2511, and 18 U.S.C. \u00a7 2510 provides that:<\/p>\n<p>(1) Except as otherwise specifically provided in this chapter any person who \u2013 (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to<\/p>\n<p>any other person the contents of any wire, oral, or electronic  communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic  communication in violation of this subsection . . . [or](d)  intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the  information was obtained through the interception of a wire, oral, or  electronic communication in violation of this subsection . . . shall be  punished as provided in subsection (4) or shall be subject to suit as  provided in subsection (5).<\/p>\n<p>131. 18 U.S.C. \u00a7 2511 further provides that:<\/p>\n<p>(3)(a) Except as provided in paragraph (b) of this subsection, a person  or entity providing an electronic communication service to the public  shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in  transmission on that service to any person or entity other than an  addressee or intended recipient of such communication or an agent of  such addressee or intended recipient.<\/p>\n<p>132. 18 U.S.C. \u00a7 2511(2)(f) further provides in relevant part that  \u201cprocedures in this chapter or chapter 121 and the Foreign  Intelligence Surveillance Act of 1978 shall be the exclusive means by  which electronic surveillance, as defined in section 101 [50 U.S.C. \u00a7  1801] of such Act, and the interception of domestic wire, oral, and electronic  communications may be conducted.\u201d (Emphasis added.)<\/p>\n<p>133. 50 U.S.C. \u00a7 1812 further provides in relevant part that:<\/p>\n<p>(a) Except as provided in subsection (b), the procedures of chapters  119, 121, and 206 of Title 18 and this chapter shall be the exclusive  means by which electronic surveillance and the interception of domestic  wire, oral, or electronic communications may be conducted.<\/p>\n<p>(b) Only an express statutory authorization for electronic surveillance  or the interception of domestic wire, oral, or electronic  communications, other than as an amendment to this chapter or chapters  119, 121, or 206 of Title 18 shall constitute an additional exclusive  means for the purpose of subsection (a). (Emphasis added.)<\/p>\n<p>134. By the acts alleged herein, Defendants have intentionally and  willfully intercepted, endeavored to intercept, or procured another  person to intercept or endeavor to intercept, Plaintiff\u2019s and  Plaintiff\u2019s family members\u2019 wire or electronic communications in  violation of 18 U.S.C. \u00a7 2511(1)(a); and\/or<\/p>\n<p>135. By the acts alleged herein, Defendants have intentionally and  willfully disclosed, or endeavored to disclose, to another person the  contents of Plaintiff\u2019s wire or electronic communications, knowing or  having reason to know that the information was obtained through the  interception of wire or electronic communications in violation of 18  U.S.C. \u00a7 2511(1)(c); and\/or<\/p>\n<p>136. By the acts alleged herein, Defendants have intentionally and  willfully used, or endeavored to use, the contents of Plaintiff\u2019s wire  or electronic communications, while knowing or having reason to know  that the information was obtained through the interception of wire or  electronic communications in violation of 18 U.S.C. \u00a7 2511(1)(d).<\/p>\n<p>137. By the acts alleged herein, Defendants have intentionally and  willfully caused, or aided, abetted, counseled, commanded, induced,  procured, encouraged, promoted, instigated, advised, participated in,  contributed to, facilitated, directed, controlled, assisted in, or  conspired to cause divulgence of Plaintiff\u2019s and Plaintiff\u2019s family  members wire or electronic communications to Defendants while in  transmission by various service providers, and there of tampering with,  in violation of 18 U.S.C. \u00a7 2511(2)(3)(4)(5).<\/p>\n<p>138. Defendants have committed these acts of interception, disclosure,  divulgence and\/or use of Plaintiff\u2019s communications directly or by  aiding, abetting, counseling, commanding, inducing, procuring,  encouraging, promoting, instigating, advising, willfully causing,  participating in, enabling, contributing to, facilitating, directing,  controlling, assisting in, or conspiring in their commission.<\/p>\n<p>139. Defendants, and\/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to,  negligently contributing to, facilitating, at the hands of, direction  of, or knowledge of, or assisting in the commission of the  above-described acts of interceptions, disclosure and\/or use of  Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records  pertaining to their transmissions, collected, and\/or stored without  judicial or other lawful authorization, probable cause, and\/or  individualized suspicion of Plaintiff\u2019s records or other information.<\/p>\n<p>140. Defendants did not notify Plaintiff of the above-described  intentional interception, disclosure, divulgence and\/or use of their  wire or electronic communications, nor did Plaintiff consent to such.<\/p>\n<p>141. Plaintiff have been and are aggrieved by Defendants\u2019 intentional  and willful interception, disclosure, divulgence and\/or use of their  wire or electronic communications.<\/p>\n<p>142. Pursuant to 18 U.S.C. \u00a7 2520, which provides a civil action for  any person whose wire or electronic communications have been intercepted,  disclosed, divulged or intentionally used in violation of 18 U.S.C. \u00a7  2511, Plaintiff seeks from the Count XII Defendants for Plaintiff\u2019s  statutory damages or actual damages; punitive damages as appropriate;  and such other and further relief as is proper.<\/p>\n<p>COUNT XIII<\/p>\n<p>Violation of 18 U.S.C. \u00a7 2511, actionable under 18 U.S.C. \u00a7 2712\u2014Damages<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>143. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>144. In relevant part, 18 U.S.C. \u00a7 2511 provides that:<\/p>\n<p>(1) Except as otherwise specifically provided in this chapter any person who \u2013 (a) intentionally intercepts, endeavors to intercept, or  procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or  endeavors to disclose, to any other person the contents of any wire,  oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral,  or electronic communication in violation of this subsection . . .  [or](d) intentionally uses, or endeavors to use, the contents of any  wire, oral, or electronic communication, knowing or having reason to  know that the information was obtained through the interception of a  wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).<\/p>\n<p>145. 18 U.S.C. \u00a7 2511 further provides that:<\/p>\n<p>(3)(a) Except as provided in paragraph (b) of this subsection, a person  or entity providing an electronic communication service to the public  shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in  transmission on that service to any person or entity other than an  addressee or intended recipient of such communication or an agent of  such addressee or intended recipient.<\/p>\n<p>146. 18 U.S.C. \u00a7 2511(2)(f) further provides in relevant part that  \u201cprocedures in this chapter or chapter 121 and the Foreign  Intelligence Surveillance Act of 1978 shall be the exclusive means by  which electronic surveillance, as defined in section 101 [50 U.S.C. \u00a7  1801] of such Act, and the interception of domestic wire, oral, and electronic  communications may be conducted.\u201d(Emphasis added.)<\/p>\n<p>147. 50 U.S.C. \u00a7 1812 further provides in relevant part that:<\/p>\n<p>(a) Except as provided in subsection (b), the procedures of chapters  119, 121, and 206 of Title 18 and this chapter shall be the exclusive  means by which electronic surveillance and the interception of domestic  wire, oral, or electronic communications may be conducted.<\/p>\n<p>(b) Only an express statutory authorization for electronic surveillance  or the interception of domestic wire, oral, or electronic  communications, other than as an amendment to this chapter or chapters  119, 121, or 206 of Title 18 shall constitute an additional exclusive  means for the purpose of subsection (a).<\/p>\n<p>(Emphasis added.)<\/p>\n<p>148. By the acts alleged herein, Defendants have intentionally and  willfully intercepted, endeavored to intercept, or procured another  person to intercept or endeavor to intercept, spy, Plaintiff wire or  electronic communications in violation of 18 U.S.C. \u00a7 2511(1)(a);  and\/or<\/p>\n<p>149. By the acts alleged herein, Defendants have intentionally and  willfully disclosed, or endeavored to disclose, to another person the  contents of Plaintiff wire or electronic communications, knowing or  having reason to know that the information was obtained through the  interception of wire or electronic communications in violation of 18  U.S.C. \u00a7 2511(1)(c); and\/or<\/p>\n<p>150. By the acts alleged herein, Defendants have intentionally and  willfully used, or endeavored to use, the contents of Plaintiff wire or  electronic communications, while knowing or having reason to know that  the information was obtained through the interception of wire or  electronic communications in violation of 18 U.S.C. \u00a7 2511(1)(d).<\/p>\n<p>151. By the acts alleged herein, Defendants have intentionally and  willfully caused, or aided, abetted, counseled, commanded, induced,  procured, encouraged, promoted, instigated, advised, participated in,  contributed to, facilitated, spied, directed, controlled, assisted in,  or conspired to, negligently conspired to, cause unwitting subjects,  Plaintiff, and the public, divulgence of Plaintiff\u2019s wire or  electronic communications to Defendants while in transmission by various service  providers, and there of tampering with, in violation of 18 U.S.C. \u00a7  2511(2)(3)(4)(5).<\/p>\n<p>152. Defendants have committed these acts of interception, disclosure,  divulgence and\/or use of Plaintiff\u2019s communications directly or by  aiding, abetting, counseling, commanding, inducing, procuring,  encouraging, promoting, instigating, advising, willfully causing,  participating in, enabling, contributing to, facilitating, directing,  controlling, assisting in, or conspiring in their commission.<\/p>\n<p>153. Defendants, and\/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to,  negligently contributing to, facilitating, at the hands of, direction  of, or knowledge of, or assisting in the commission of the  above-described acts of interceptions, disclosure and\/or use of  Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records  pertaining to their transmissions, collected, and\/or stored without  judicial or other lawful authorization, probable cause, and\/or  individualized suspicion of Plaintiff\u2019s records or other information.<\/p>\n<p>154. Defendants did not notify Plaintiffs of the above-described  intentional interception, disclosure, divulgence and\/or use of their  wire or electronic communications, nor did Plaintiff consent to such.<\/p>\n<p>155. Plaintiff have been and are aggrieved by Defendants\u2019 intentional  and willful interception, disclosure, divulgence and\/or use of their  wire or electronic communications.<\/p>\n<p>156. Title 18 U.S.C. \u00a7 2712 provides a civil action against the United  States and its agencies and departments for any person whose wire or  electronic communications have been intercepted, disclosed, divulged or  intentionally used in willful violation of 18 U.S.C. \u00a7 2511. Plaintiff  has complied fully with the claim presentment procedure of 18 U.S.C. \u00a7  2712. Pursuant to 18 U.S.C. \u00a7 2712, Plaintiff seeks from the Count XIII  Defendants for Plaintiff\u2019s statutory damages or actual damages, and  such other and further relief as is proper.<\/p>\n<p>COUNT XIV<\/p>\n<p>Violation of 18 U.S.C. \u00a7 2703(a) &amp; (b)\u2014Declaratory, Injunctive, and Other Equitable Relief<\/p>\n<p>(Plaintiff vs. Defendants) and parties, inclusive of all affiliations<\/p>\n<p>157. Plaintiff repeats and incorporates herein by reference the  allegations in the preceding paragraphs of this complaint, as if set  forth fully herein; and all allegations under the law, as stated above.<\/p>\n<p>158. In relevant part, 18 U.S.C. \u00a7 2703 provides that:<\/p>\n<p>(a) Contents of Wire or Electronic Communications in Electronic  Storage.\u2014 A governmental entity may require the disclosure by a  provider of electronic communication service of the contents of a wire or  electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only  pursuant to a warrant issued using the procedures described in the  Federal Rules of Criminal Procedure by a court with jurisdiction over  the offense under investigation or equivalent State warrant. A  governmental entity may require the disclosure by a provider of  electronic communications services of the contents of a wire or  electronic communication that has been in electronic storage in an  electronic communications system for more than one hundred and eighty  days by the means available under subsection (b) of this section.<\/p>\n<p>(b) Contents of Wire or Electronic Communications in a Remote Computing Service.\u2014<\/p>\n<p>(1) A governmental entity may require a provider of remote computing  service to disclose the contents of any wire or electronic communication to which this paragraph is made applicable by paragraph (2) of this  subsection\u2014<\/p>\n<p><strong><a title=\"NSA Transmission of ELF Mind Control\" href=\"http:\/\/groups.yahoo.com\/group\/governmentsponsoredstalking\/message\/1345\" target=\"_blank\">more<\/a>:<\/strong><\/p>\n<h3>Related Images:<\/h3><div class=\"ngg-related-gallery\">\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi.png\"\r\n           title=\"Not a single vehicle in this parking lot when I sat down next to the building. And within a few minutes time, burgundy vehicle comes in.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"789\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi.png\" data-title=\"Vehicle enters parking lot\" data-description=\"Not a single vehicle in this parking lot when I sat down next to the building. And within a few minutes time, burgundy vehicle comes in.\">\r\n            <img decoding=\"async\" title=\"Vehicle enters parking lot\"\r\n                 alt=\"Vehicle enters parking lot\"\r\n                 data-image-id=\"789\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-1.png\"\r\n           title=\"This is a full view of vehicle that is now parked in the parking lot.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"790\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-1.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-1.png\" data-title=\"Vehicle Now In Parking Lot\" data-description=\"This is a full view of vehicle that is now parked in the parking lot.\">\r\n            <img decoding=\"async\" title=\"Vehicle Now In Parking Lot\"\r\n                 alt=\"Vehicle Now In Parking Lot\"\r\n                 data-image-id=\"790\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-1.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-2.png\"\r\n           title=\"This man is now leaving vehicle after it was parked. Vehicles that are parked always are transmitting electro-magnetic waves.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"791\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-2.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-2.png\" data-title=\"Man Leaves Vehicle\" data-description=\"This man is now leaving vehicle after it was parked. Vehicles that are parked always are transmitting electro-magnetic waves.\">\r\n            <img decoding=\"async\" title=\"Man Leaves Vehicle\"\r\n                 alt=\"Man Leaves Vehicle\"\r\n                 data-image-id=\"791\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-2.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-3.png\"\r\n           title=\"This is the same guy who drove into an empty parking lot after only a few minutes of sitting down.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"792\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-3.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-3.png\" data-title=\"Burgundy Vehicle Perpetrator\" data-description=\"This is the same guy who drove into an empty parking lot after only a few minutes of sitting down.\">\r\n            <img decoding=\"async\" title=\"Burgundy Vehicle Perpetrator\"\r\n                 alt=\"Burgundy Vehicle Perpetrator\"\r\n                 data-image-id=\"792\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-3.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0127.avi.png\"\r\n           title=\"This shows how they were rushing to get the recondition items on the shelves.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"793\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0127.avi.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0127.avi.png\" data-title=\"Empty Boxes In Shopping Cart\" data-description=\"This shows how they were rushing to get the recondition items on the shelves.\">\r\n            <img decoding=\"async\" title=\"Empty Boxes In Shopping Cart\"\r\n                 alt=\"Empty Boxes In Shopping Cart\"\r\n                 data-image-id=\"793\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0127.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0128.avi.png\"\r\n           title=\"Is seen shopping in this section of the store.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"794\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0128.avi.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0128.avi.png\" data-title=\"Burgundy Vehicle Perpetrator\" data-description=\"Is seen shopping in this section of the store.\">\r\n            <img decoding=\"async\" title=\"Burgundy Vehicle Perpetrator\"\r\n                 alt=\"Burgundy Vehicle Perpetrator\"\r\n                 data-image-id=\"794\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0128.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0130.avi-1.png\"\r\n           title=\"I have seen this match up of both white and black perpetrator before.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"795\" data-src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0130.avi-1.png\" data-thumbnail=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0130.avi-1.png\" data-title=\"Random Interacial Perpetators\" data-description=\"I have seen this match up of both white and black perpetrator before.\">\r\n            <img decoding=\"async\" title=\"Random Interacial Perpetators\"\r\n                 alt=\"Random Interacial Perpetators\"\r\n                 data-image-id=\"795\"\r\n                 src=\"http:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0130.avi-1.png\"\/>\r\n        <\/a>\r\n    <\/div>","protected":false},"excerpt":{"rendered":"<p>Description IN THE UNITED STATES DISTRICT COURTS FOR THE DISTRICT OF COLUMBIA MIREILLE TORJMAN CASE NO.: Plaintiff V. FEDERAL BUREAU OF INVESTIGATIONS, et al. 935 Pennsylvania Avenue Northwest Washington, DC 20535-0001; CENTRAL INTELLIGENCE AGENCY Office of Public Affairs Washington, D.C. &hellip; <a href=\"http:\/\/govsponsoredstalking.info\/?p=945\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[94],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-detailing-cimes-against-humanity","tag-north-carolina"],"_links":{"self":[{"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=945"}],"version-history":[{"count":4,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/945\/revisions"}],"predecessor-version":[{"id":947,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/945\/revisions\/947"}],"wp:attachment":[{"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}