CONTENTS:
ORIGINS
NSA WHISTLEBLOWERS AND SURVEILLANCE DISCLOSURES
TARGETED INDIVIDUAL COMPARISONS TO MKULTRA, COINTELPRO, STASI
HOW IS NEW ZEALAND RELATED TO ALL THIS
NSAs SURVEILLANCE STUCTURE POST 9/11
FUSION CENTRES
CHINA'S SURVEILLANCE AND SOCIAL CREDIT SYSTEM IS THE POSTER CHILD FOR THE SMART CITY
ORIGINS
NSA WHISTLEBLOWERS AND SURVEILLANCE DISCLOSURES
TARGETED INDIVIDUAL COMPARISONS TO MKULTRA, COINTELPRO, STASI
HOW IS NEW ZEALAND RELATED TO ALL THIS
NSAs SURVEILLANCE STUCTURE POST 9/11
FUSION CENTRES
CHINA'S SURVEILLANCE AND SOCIAL CREDIT SYSTEM IS THE POSTER CHILD FOR THE SMART CITY
Origins
Empires and Governments who use informants and spies to monitor citizens date back to ancient civilizations. The Targeted Individual Phenomenon is merely an a amalgamation and extensions of past and emerging developments of human and mind control experiments, psychological warfare operations, authoritarian rule, military warfare, espionage and reconnaissance operations, emerging technologies and domestic and global mass surveillance operations i.e.:
MKUltra 1953-1973- and predecessor programs that follow. > The National Security Agency NSA 1952-2025 the top tier for global surveillance monitoring, and data collection. > The FIVE EYES “FVEY” alliance 1946-2025. > COINTELPRO 1956-1971. > DARPA 1958-2025. > The STASI 1950-1990. > ECHELON surveillance networks developed by FVEY 1972-2000. > 9/11-2001 “War on Terror” The Patriot Act and the expansion of the Global Surveillance Networks FVEY alliances >>> as well as a plethora of other branches, international sharing intelligence collaborations and predecessor programs.
MKUltra 1953-1973- and predecessor programs that follow. > The National Security Agency NSA 1952-2025 the top tier for global surveillance monitoring, and data collection. > The FIVE EYES “FVEY” alliance 1946-2025. > COINTELPRO 1956-1971. > DARPA 1958-2025. > The STASI 1950-1990. > ECHELON surveillance networks developed by FVEY 1972-2000. > 9/11-2001 “War on Terror” The Patriot Act and the expansion of the Global Surveillance Networks FVEY alliances >>> as well as a plethora of other branches, international sharing intelligence collaborations and predecessor programs.
Significant Surveillance disclosure events that arise in the following decades
Wikileaks 2006 primary aim is to bring transparency to governments and corporations by exposing hidden or classified information, often related to political, corporate, or human rights issues.
Thomas Tamm and the NSA Warrantless Wiretapping 2004-2005. > Chelsea Manning and Wiki Leaks 2010 > Edward Snowden's Revelations 2013. > The Drone Papers 2015. > Vault 7 2017 "SMART" device hacking > BlueLeaks "Fusion Centres" > The Pegasus Project 2021.
Wikileaks 2006 primary aim is to bring transparency to governments and corporations by exposing hidden or classified information, often related to political, corporate, or human rights issues.
Thomas Tamm and the NSA Warrantless Wiretapping 2004-2005. > Chelsea Manning and Wiki Leaks 2010 > Edward Snowden's Revelations 2013. > The Drone Papers 2015. > Vault 7 2017 "SMART" device hacking > BlueLeaks "Fusion Centres" > The Pegasus Project 2021.
NSA Whistle blowers that exposed unethical surveillance practices : 1. Perry Fellwock (also known as Winslow Peck): 2. Thinthread Whistle blowers Thomas Drake, William Binney, and J. Kirk Wiebe 3. Edward Snowden 4. Karen Melton Stewart 5. Thomas Tamm 6. Mark Klein
The Snowden files in 2013 unveiled:
Mass Surveillance: Extensive, global surveillance programs by the NSA, including spying on allies and citizens.
PRISM: A program for collecting internet communications from major tech companies.
XKeyscore: A tool allowing analysts to search through vast amounts of internet data.
Temporal: The UK's program intercepting fiber-optic cables carrying internet traffic.
Boundless Informant: A tool tracking and mapping NSA data collection activities.
These revelations sparked widespread debate on privacy, security, and government surveillance.
PRISM: A program for collecting internet communications from major tech companies.
XKeyscore: A tool allowing analysts to search through vast amounts of internet data.
Temporal: The UK's program intercepting fiber-optic cables carrying internet traffic.
Boundless Informant: A tool tracking and mapping NSA data collection activities.
These revelations sparked widespread debate on privacy, security, and government surveillance.
Vault 7 2017
Vault 7 refers to one of the most significant document leaks in history, initiated by WikiLeaks in 2017. It exposed CIA's hacking tools and cyber-warfare capabilities. Included details on malware, hacking techniques for “SMART DEVICES”, and surveillance methods. It Raised concerns about privacy, security, and the extent of CIA's hacking powers. Vault 7 has left a lasting impact on the discourse around cyber security, surveillance, and the balance between national security and individual privacy rights.
BlueLeaks 2020
BlueLeaks was a massive data breach where hackers accessed and leaked nearly 270 gigabytes of data from over 200 U.S. law enforcement agencies. The BlueLeaks data breach included information from multiple "FUSION CENTERS" across the United States. BlueLeaks significantly impacted "FUSION CENTERS" by exposing the vulnerabilities in their information-sharing systems, prompting widespread concern over privacy, security, and the management of sensitive data.
.1. Bill Binney NSA whistleblower on how the agency tracks you.
https://www.youtube.com/watch?v=XGwL3QIz_lY 2. Wikileaks Vault 7: What's in the CIA Hacking Toolbox? hacking smartphones,smart t.vs, computer operating systems, automobiles, messenger applications.https://www.youtube.com/watch?v=X45Bb8O-gMI |
|
|
The Targeted Individual program has significant comparisons to the methods of MKUltra, COINTELPRO and the STASI programs which are examples of extreme state control and psychological manipulation, surveillance and the disruption of civil liberties globally. The only differences between those documented historical events and the Targeted Individual Program is:
- TIs are being covertly beta tested with advanced emerging technology that has exceeded traditional espionage, reconnaissance, psychological warfare and mind control tactics, so much so it is beyond interpretation to the average person. Thus why TIs are deemed mentally ill when they report voice to skull experiences, remote mind and behavior control, DEW and radiation attacks, synchronized gang stalking & street theatre, coincidental synchronizations, etc. yet these capabilities are in Smart city applications that can be hacked, merged with military tech and emerging tech.
- The TI program is covertly and deceptively merged into society, the judicial systems and Government Policies under the guises of terrorism and future sustainable living goals.
- TIs are being covertly beta tested with advanced emerging technology that has exceeded traditional espionage, reconnaissance, psychological warfare and mind control tactics, so much so it is beyond interpretation to the average person. Thus why TIs are deemed mentally ill when they report voice to skull experiences, remote mind and behavior control, DEW and radiation attacks, synchronized gang stalking & street theatre, coincidental synchronizations, etc. yet these capabilities are in Smart city applications that can be hacked, merged with military tech and emerging tech.
- The TI program is covertly and deceptively merged into society, the judicial systems and Government Policies under the guises of terrorism and future sustainable living goals.
MKUltra 1950s-1960s
MKUltra was a secretive CIA program from the 1950s to 1960s aimed at mind control and interrogation through methods like LSD, sensory deprivation, and hypnosis. Conducted often without consent, it was exposed in the 1970s, leading to public outcry and new oversight on CIA activities. It remains one of the most notorious examples of unethical psychological experimentation, highlighting the dark side of Cold War tactics and the ethical boundaries in scientific research.
MKUltra methods including:
Drugs: Extensive use of LSD and other psychoactive substances to test their effects on human behavior, memory, and consciousness.
Psychological Torture: Techniques like sensory deprivation, isolation, verbal abuse, and sexual abuse were used to break down subjects' psychological defenses.
Hypnosis: Experiments to see if hypnosis could be used to control behavior or extract information.
Electroshock: Sometimes combined with drug administration to induce altered states of consciousness.
MKUltra methods including:
Drugs: Extensive use of LSD and other psychoactive substances to test their effects on human behavior, memory, and consciousness.
Psychological Torture: Techniques like sensory deprivation, isolation, verbal abuse, and sexual abuse were used to break down subjects' psychological defenses.
Hypnosis: Experiments to see if hypnosis could be used to control behavior or extract information.
Electroshock: Sometimes combined with drug administration to induce altered states of consciousness.
COINTELPRO 1956-1971 (Counter Intelligence Program)
COINTELPRO was an FBI initiative designed to surveil, infiltrate, and disrupt various domestic political organizations in the United States. The program's aim was to neutralize perceived threats to national security or government stability by any means necessary, often involving tactics that were later considered illegal or unethical.
COINTELPRO Tactics:
Surveillance: Extensive use of wiretaps, bugs, and informants to gather intelligence on targeted groups.
Infiltration: Placing agents or informants within organizations to disrupt them from within, sow discord, or mislead the group's direction.
Psychological Warfare: Using disinformation, anonymous letters, or spreading rumors to discredit leaders or turn members against each other.
Legal Harassment: Encouraging or manufacturing legal cases against activists to drain organizational resources and intimidate members.
Black Propaganda: Creating and distributing materials that appeared to come from the targeted groups but were designed to provoke law enforcement responses or alienate the group from potential supporters.
Direct Action: Sometimes involving physical action like break-ins to steal documents or sabotage.
Media Manipulation: Feeding stories to or working with media outlets to shape public perception negatively against targeted groups.
These tactics were often conducted with little oversight, leading to abuses of power and infringements on civil liberties.
COINTELPRO Tactics:
Surveillance: Extensive use of wiretaps, bugs, and informants to gather intelligence on targeted groups.
Infiltration: Placing agents or informants within organizations to disrupt them from within, sow discord, or mislead the group's direction.
Psychological Warfare: Using disinformation, anonymous letters, or spreading rumors to discredit leaders or turn members against each other.
Legal Harassment: Encouraging or manufacturing legal cases against activists to drain organizational resources and intimidate members.
Black Propaganda: Creating and distributing materials that appeared to come from the targeted groups but were designed to provoke law enforcement responses or alienate the group from potential supporters.
Direct Action: Sometimes involving physical action like break-ins to steal documents or sabotage.
Media Manipulation: Feeding stories to or working with media outlets to shape public perception negatively against targeted groups.
These tactics were often conducted with little oversight, leading to abuses of power and infringements on civil liberties.
The STASI 1950-1990 (the Ministry for State Security of the German Democratic Republic)
The STASI was the secret police of East Germany from 1950 until the fall of the Berlin Wall in 1989. It was one of the most effective and repressive intelligence and secret police agencies in the world, dedicated to maintaining control by suppressing dissent and ensuring the loyalty of the populace to the socialist state. The Stasi was responsible for both domestic security and foreign espionage. It had a vast network of informants (estimated at around 1 in 6.5 citizens) and a formal staff of over 90,000 at its peak. The Stasi targeted anyone perceived as a threat to the state, including political dissidents, religious groups, intellectuals, and even people trying to leave the country. It also kept tabs on ordinary citizens to ensure conformity.
STASI Tactics:
Surveillance: The Stasi used extensive surveillance methods, including wiretapping, bugging devices, and mail interception and inspection. They also employed photography and video surveillance. They planted listening devices in homes, offices, cars, and even public places.
Database and Record Keeping: The Stasi maintained detailed files on a million citizens, documenting private lives, conversations, and even thoughts, which were used to blackmail or manipulate individuals.
Informant Network: Perhaps their most notorious tactic, the Stasi cultivated an extensive network of informants who reported on friends, neighbors, and colleagues. Informants were everywhere - in workplaces, schools, churches, and within families. An estimated 1 in 6.5 East Germans was an informant at some point.
Psychological Warfare: Tactics included "Zersetzung”, where individuals would be subjected to systematic psychological harassment to discredit them or push them into mental breakdown. This could involve spreading rumors, manipulating living conditions, or breaking into homes to rearrange items.
Interrogation and Detention: The Stasi was notorious for its interrogation techniques, which often led to false confessions due to psychological pressure, sleep deprivation, or physical coercion.
Control of Information: The Stasi controlled media, censored art, and manipulated information to control public perception and suppress any form of dissent or alternative thought.
Observation Points: They established observation posts in buildings or other strategic locations to watch individuals or groups. These could be long-term surveillance operations.
Deception and Disguise: Stasi agents would sometimes pose as ordinary citizens or even as members of targeted groups to infiltrate and gather intelligence. They used a variety of disguises to blend in.
Technical Surveillance: This included everything from night vision equipment to X-ray scanners for mail, and special photographic techniques for covert operations.
Scent Samples: In an unusual and invasive practice, the Stasi collected scent samples from individuals using odor jars, which could later be used to identify or track them with scent dogs.
STASI Tactics:
Surveillance: The Stasi used extensive surveillance methods, including wiretapping, bugging devices, and mail interception and inspection. They also employed photography and video surveillance. They planted listening devices in homes, offices, cars, and even public places.
Database and Record Keeping: The Stasi maintained detailed files on a million citizens, documenting private lives, conversations, and even thoughts, which were used to blackmail or manipulate individuals.
Informant Network: Perhaps their most notorious tactic, the Stasi cultivated an extensive network of informants who reported on friends, neighbors, and colleagues. Informants were everywhere - in workplaces, schools, churches, and within families. An estimated 1 in 6.5 East Germans was an informant at some point.
Psychological Warfare: Tactics included "Zersetzung”, where individuals would be subjected to systematic psychological harassment to discredit them or push them into mental breakdown. This could involve spreading rumors, manipulating living conditions, or breaking into homes to rearrange items.
Interrogation and Detention: The Stasi was notorious for its interrogation techniques, which often led to false confessions due to psychological pressure, sleep deprivation, or physical coercion.
Control of Information: The Stasi controlled media, censored art, and manipulated information to control public perception and suppress any form of dissent or alternative thought.
Observation Points: They established observation posts in buildings or other strategic locations to watch individuals or groups. These could be long-term surveillance operations.
Deception and Disguise: Stasi agents would sometimes pose as ordinary citizens or even as members of targeted groups to infiltrate and gather intelligence. They used a variety of disguises to blend in.
Technical Surveillance: This included everything from night vision equipment to X-ray scanners for mail, and special photographic techniques for covert operations.
Scent Samples: In an unusual and invasive practice, the Stasi collected scent samples from individuals using odor jars, which could later be used to identify or track them with scent dogs.
How is New Zealand related to all this?
New Zealand has had alliances with the United States (U.S) such as the ANZUS treaty and continues to engage in joint military exercises and intelligence cooperation’s through the FIVE eyes framework. The Five Eyes (FVEY) is an intelligence alliance consisting of: Australia, Canada, New Zealand, United Kingdom, and United States. It focuses on signals intelligence (SIGINT) sharing among these countries, aimed at gathering and analyzing electronic communications for national security purposes.
September 11 - 2001 “War on Terror”
Post 9/11, The Patriot Act and the expansion of the Mass Global Surveillance Networks FVEY alliances are underway. New Zealand and other members of FVEY act as counterparts to NSAs mass surveillance policies and processes i.e.:
NSA > 9/11 Patriot Act > Exploitation of Public and Private Partnerships that evade laws to surveil everyone globally > FISA Court section 702 > Courts and Governments have no real power and oversight > Mass data mining and data aggregation for consumers and profit > Terrorist and Civilian watch list programs formed > Fusion Centers > Secret ambiguous due processes to blacklist anyone without consent or knowledge > Warrantless surveillance laws > Deputizing civilians spies > Everyone is a target > Targeted Individual
Despite the expired, reformed and reinstated acts in the following years, this unscrupulous process is still in effect in 2025. It has embedded itself in enigmatic laws and at the same time remains ineffective to privacy and protection laws. The Targeted individual phenomenon is a continued exploitation of the FVEY expansion Global Surveillance Networks alliances post 911.
NSA > 9/11 Patriot Act > Exploitation of Public and Private Partnerships that evade laws to surveil everyone globally > FISA Court section 702 > Courts and Governments have no real power and oversight > Mass data mining and data aggregation for consumers and profit > Terrorist and Civilian watch list programs formed > Fusion Centers > Secret ambiguous due processes to blacklist anyone without consent or knowledge > Warrantless surveillance laws > Deputizing civilians spies > Everyone is a target > Targeted Individual
Despite the expired, reformed and reinstated acts in the following years, this unscrupulous process is still in effect in 2025. It has embedded itself in enigmatic laws and at the same time remains ineffective to privacy and protection laws. The Targeted individual phenomenon is a continued exploitation of the FVEY expansion Global Surveillance Networks alliances post 911.
1. Post 9/11 U.S Mass surveillance NSA structure" https://watson.brown.edu/costsofwar/papers/2023/surveillance
2."New Zealands Counterpart version" from Suzie Dawson, a New Zealand activist and Targeted Individual.https://www.youtube.com/watch?v=oW0KrReDiNI
3. Another version from the millennium report https://themillenniumreport.com/wp-content/uploads/2018/12/ti-diagram2_orig.jpg
2."New Zealands Counterpart version" from Suzie Dawson, a New Zealand activist and Targeted Individual.https://www.youtube.com/watch?v=oW0KrReDiNI
3. Another version from the millennium report https://themillenniumreport.com/wp-content/uploads/2018/12/ti-diagram2_orig.jpg
The Surveillance Industrial Complex ACLU 2004Covering the Mass Surveillance and data mining of civilians by the Government and Private entities after 911, recruiting citizen spies via an array of Terrorist Watch Programs , Government exploitations of Private Corporations who are not subject to law and public scrutiny etc
PDF LINK
|
1 Karen Stewart. Ex NSA intelligence analyst whistleblows on targeted individuals. Fusion centres.
https://www.youtube.com/watch?v=AqHtr1Fy1a0&t=120s 2.Suzie Dawson. Opening the Five Eyes: Exposing The Methods of the Spies - a #1vs5i Live Event. Global Surveillamce, Fusion centres etc. https://www.youtube.com/watch?v=oW0KrReDiNI |
|
|
|
|
1.Suzie Dawson. EP2 Opening the Five Eyes: Exposing The Methods of the Spies - a #1vs5i Live Event.
https://www.youtube.com/watch?v=3A2gnP-F9jU 2.Suzie Dawson.Episode 6: JTRIG Opening the Five Eyes: Deciphering https://www.youtube.com/watch?v=6KNVWWd2pNY |
CHINA'S SURVEILLANCE AND SOCIAL CREDIT SYSTEM IS THE POSTER CHILD FOR THE SMART CITY
The Social Credit Score System is a national credit rating and blacklist implemented by the government of the People's Republic of China. The social credit system is a record system so that businesses, individuals and government institutions can be tracked and evaluated for trustworthiness. The national regulatory method is based on varying degrees of whitelisting and blacklisting.
Social Credit System
https://en.wikipedia.org/wiki/Social_Credit_System
CHINA’S SOCIAL CREDIT SYSTEM
https://www.bertelsmann-stiftung.de/fileadmin/files/aam/Asia-Book_A_03_China_Social_Credit_System.pdf
Social Credit System
https://en.wikipedia.org/wiki/Social_Credit_System
CHINA’S SOCIAL CREDIT SYSTEM
https://www.bertelsmann-stiftung.de/fileadmin/files/aam/Asia-Book_A_03_China_Social_Credit_System.pdf
1. China’s Surveillance State: Why You Should Be Worried | System Error https://www.youtube.com/watch?v=xXPnXNQpTOs
|
2. China ranks 'good' and 'bad' citizens with 'social credit' system https://www.youtube.com/watch?v=NXyzpMDtpSE
|