Thank you to Nina for this one! Interesting read!-A.M.
John St. Clair Akwei vs. NSA, Ft. Meade, MD, USA
Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.
(Civil Action 92-0449)
My knowledge of the National Security Agency’s structure, national security activities,
proprietary technology,and covert operations to monitor individual citizens.
The NSA’s mission and the NSA’s domestic Intelligence operation.
Communications Intelligence (COMINT)
Blanket coverage of all electronic communication in the U.S. and the world to ensure national
security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since
the early 1960’s. NSA technology is developed and implemented in secret from private
corporations, academia, and the general public.
Signals Intelligence (SIGINT)
The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves
in the environment for wirelessly tapping into computers and tracking persons with the electrical
currents in their bodies. Signals Intelligence is based on the fact that everything in the environment
with an electric current in it has a magnetic flux around it which gives off EMF waves. The
NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all
objects whether man-made or organic that have electrical activity.
Domestic Intelligence (DOMINT)
The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might
be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by
executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist
surveillance network in place. This surveillance network is completely disguised and hidden from
Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s
electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of
thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective
implementation of operations is assured by NSA computer technology designed to minimize
NSA personnel serve in Quasi-public positions in their communities and run cover businesses and
legitimate businesses that can inform the intelligence community of persons they would want to
track. N.S.A. personnel in the community usually have cover identities such as social workers,
lawyers and business owners.
Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.
NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using
the NSA’s domestic intelligence network and cover businesses. The operations independently run
by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of
thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability
to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects
to be diagnosed with ill mental health.