Académique Documents
Professionnel Documents
Culture Documents
Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &
Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566
TERRORISM
USED AS A POLITICAL TACTIC
TO JUSTIFY WARRENTLESS SURVIELLANCE
AND THE EROSION OF OUR CIVIL LIBERTIES
by Stan J. Caterbone September 14, 2017
_________________________________________
It is too easy for present and future administrations to abuse their power
and utilize warrantless surveillance as a means of subverting and obstructing
justice for those that are engaged in Whistle-Blowing cases that concern
National Security. Without the proper oversight and judicial review, a Whistle
Blower can be place on terrorist lists for malicious reasons without the
knowledge or just cause. This is in direct conflict with keeping our democracy
free of corruption while adhering to the spirit of the constitution in the manner
our founding fathers envisioned.
Today the Trump Administration is again trying to advance what PATRIOT
Edward Snowden had disclosed, in the re-authorization of Title VII of the
Foreign Intelligence Surveillance Act (FISA), Section 702, which authorizes the
National Security Agency (NSA) to intercept the communications of foreigners
located outside the United States without obtaining a search warrant. The law
expires at the end of the year unless Congress passes legislation reauthorizing
it.
Stan (Also Stanley) J. Caterbone is a private citizen and the majority shareholder
of the United States incorporated business Advanced Media Group, Ltd., Stan J.
Caterbone was a whistle-blower and shareholder in 1987 involving the United States
Defense Contractor International Signal & Control, Plc., known as ISC. In 1992,
International Signal & Control was indicted and found guilty of among other things a
Billion Dollar Fraud and export violations concerning illegally shipping cluster bomb
technologies, missile defense systems, and other defense systems to foreign interests
including South Africa, Iraq and Saddam Hussein. Cluster bombs and related
technologies are known to have been exported to Iraq by the Chilean Arms Dealer Carlos
Cardoen, a joint venture partner of International Signal & Control. The Central
Intelligence Agency is confirmed to have been involved in a covert program to arm Iraq
during the 1980s with close ties to International Signal & Control, which allegedly
included the help of the National Security Agency, a former end user of International
Signal & Control technologies under the early 1980s program Project X. A Presidential
Finding in 1984 by the Bush Administration was executed to implement the program of
arming Saddam Hussein and Iraq with the cluster bomb technologies. Serious allegations
of these programs were the focus of investigations that included the knowledge and
supervision of then appointed nominee for the Director of Central Intelligence Agency,
Robert M. Gates.
Since 1987, Stan J. Caterbone has been the victim of vast civil conspiracy that
started in 1987 to cover-up allegations of fraud within International Signal & Control
during the negotiations and merger of International Signal & Control and Ferranti
International of England. Stanley J. Caterbone alleges that warrantless surveillance was
used to obstruct justice and moot his constitutional rights in an effort to divert attention
away from his allegations of fraud within International Signal & Control back in 1987, and
afterwards to the present as a means to deny his access to the courts for remedy and
relief, and Federal False Claims Act violations. The business of Advanced Media Group has
been greatly compromised and intellectual property stolen during the late 1980s and
early 1990s that included information technology contracts with the United States
Government.
Organized stalking and harassment began in 1987 following the public allegations
of fraud within ISC. This organized stalking and harassment was enough to drive an
ordinary person to suicide. As far back as the late 1980's Stan J. Caterbone knew that
his mind was being read, or "remotely viewed". This was verified and confirmed when
information only known to him, and never written, spoken, or typed, was repeated by
others. In 1998, while soliciting the counsel of Philadelphia attorney Christina Rainville,
(Rainville represented Lisa Michelle Lambert in the Laurie Show murder case), someone
introduced the term remote viewing through an email. That was the last time it was an
issue until 2005. The term was researched, but that was the extent of the topic. Remote
Viewers may have attempted to connect in a more direct and continuous way without
success.
In 2005 the U.S. sponsored mind control turned into an all-out assault of mental
telepathy; synthetic telepathy; and pain and torture through the use of directed energy
devices and weapons that usually fire a low frequency electromagnetic energy at the
targeted victim. This assault was no coincidence in that it began simultaneously with the
filing of the federal action in U.S. District Court, or CATERBONE v. Lancaster County
Prison, et. al., or 05-cv-2288. This assault began after the handlers remotely trained
Stan J. Caterbone with mental telepathy. The main difference opposed to most other
victims of this technology is that Stan J. Caterbone after being connected to some 20 or
so individuals ranging from CIA Operatives to current day national newscasters and
celebrities, Stan J. Caterbone remains connected 24/7 with a person who declares that
she is Interscope recording artist Sheryl Crow of Kennett Missouri. Stan J. Caterbone has
spent 3 years trying to validate and confirm this person without success. Most U.S.
intelligence agencies refuse to cooperate, and the Federal Bureau of Investigation and
the U.S. Attorney's Office refuse to comment. See attached documents for more
information.
In 2006 or the beginning of 2007 Stan J. Caterbone began his extensive research
into mental telepathy; mind control technologies; remote viewing; and the CIA mind
control program labeled MK ULTRA and it's subprograms.
Today, Stan J. Caterbone is a pro se litigant in several state and local courts, in an
effort to be restored to whole since the WHISTLEBLOWING of 1987. Most notable is
CATERBONE v. The National Security Agency, NSA, et.al. In the UNITED STATES COURT
OF APPEALS FOR THE THIRD CIRCUIT CASE NO. 17-1904. That case is a PRELIMINARY
INJUNCTION FOR EMERGENCY RELIEF FILED TO IMMEDIATELY HALT THE OBSTRUCTION
OF JUSTICE THAT IS BEING ADMINISTERED THROUGHT THE ILLEGAL COINTELPRO
PROGRAM COUPELD WITH THE TORTURE PROGRAM.
Mr. Lawrence Resch, of San Clamente, California, was a long time associate of Mr. James
Guerin who worked as a marketing consultant, and was an ISC executive prior to the
company going public in 1982. He served as Director of Marketing and head of Lancaster
operations for then defunct United Chem Con, an affiliate of ISC. He was sued by Ferranti
International in 1990 for $189 million dollars and indicted and found guilty by
prosecutors for his role with ISC and served a jail term.
Upon the arrival of Mr. Larry Resch, Stan Caterbone met him in the lobby of Financial
Management Group, Ltd, at which time Larry Resch said "Carl Jacobson could not attend,
we had to suddenly fly him out of the country early this morning (flew to Chile) The
meeting was started with the subject of the financial difficulties of United Chem Con and
possible alternatives. Larry Resch specifically addressed the possibility of moving the
operations of United Chem Con to another facility, with specific regards to the Renovo
Plant. Larry Resch specifically addressed the financing capabilities of Stan Caterbone,
along with possible management opportunities. Larry Resch also gave financial
statements and documents to Stan Caterbone for the latest fiscal year for United Chem
Con. Stan Caterbone went on to allege that United Chem Con had embezzled some
$15,000,000 from the United States Government for contracts that contained
improprieties. Stan Caterbone also alleged improprieties of International Signal & Control
and James Guerin, with specific regards to its role in the United Chem Con, and its
business activities as related to government contracts. Stan Caterbone noted that he, as
a legal shareholder of International Signal & Control was concerned about improper
business activities.
Larry Resch was taken by surprise by all of the above. Stan Caterbone became quite
upset by the evasiveness and the lack of specifics with regards to Larry Resch's
conversation. In efforts to thwart any further communication from James Guerin, United
Chem Con, or International Signal & Control, Stan Caterbone demanded a retainer fee of
$10,000 before anyone contacted him again.
1. As Contained In The Lancaster County Court Of Common Pleas Case No. 08-13373
Where President Donald Trump Was Added To The Defendant's List On January 23,
2017 And Other State And Federal Court Cases; The Trump Administration Is
Utilizing An Illegal COINTELPRO Program To Harass The Appellant, Stan J.
Caterbone And Obstruct Justice By Directing Causing It Almost Impossible For The
Continuation Of Those Same Civil Actions.
2. The Trump Administration Signed (3) Executive Orders That Broadened The Powers
Of The City Of Lancaster Police Department To Coincide With The Above.
3. The Fact That Complainant Stan J. Caterbone's History With The Lancaster City
Police Department Traces Back To The 1960'S With The Targeting Of Complainant
Stan J. Caterbone's Father, Samuel Caterbone, Jr. In The Very Same Manner As
The Current Targeting Of Complainant Stan J. Caterbone Today Is Reason Enough
To Have Summary Judgments In All Civil Actions In Federal And State Courts
Immediately Ordered.
4. THE TARGETING CONSISTS OF THE FOLLOWING:
A. An Unprecedented Harassment Program Carried Out By Residents, Neighbors,
Stalking Groups, Law Enforcement, And Others.
B. An Unprecedented Hacking Program Of All Electronic Equipment.
C. An Unprecedented Torture Program Utilizing Electromagnetic And Other Exotic
Weapons Developed By The Department Of Defense And Intelligence
Community.
D. An Unprecedented Campaign Designed To Drain The Appellant Stan J.
Caterbone Of All Cash Resources, Which Has Resulted In A Cash Position Of
Some $60,000.00 In June Of 2015 To Nothing Today.
E. The Unprecedented Campaign Of False Statements By The Residents Of 1252
Fremont Street And The Perjured Statements Of Lancaster City Police In Recent
Criminal Summary Offenses Filed In District Magistrate Adam Witkonis Court.
F. An Unprecedented Campaign Of Daily Harassment's And Threats By The
Residents Of 1252 Fremont Street, Which Has Been Ongoing Since 2006.
G. Un Unprecedented Campaign Of Threats Of Physical Harm In Public Spaces.
H. The Unprecedented Campaign Of The Breaking And Entering Into The
Residence Of The Complainant Stan J. Caterbone Causing Vandalism, Thefts,
Poisoning Of Food, And The Strategic Placement Of Cock Roaches On A Daily
Basis. This Also Involves The Theft And Manipulation Of Court Filings And
Evidence.
I. The Above Are All Facilitated And Supported With Violations Of Due Process In
The Complaints To Law Enforcement.
J. Complainant Stan J. Caterbone, Pro Seam Receiving Retaliatory Adverse And
It is too easy for present and future administrations to abuse their power and
utilize warrantless surveillance as a means of subverting and obstructing justice for those
that are engaged in Whistle-Blowing cases that concern National Security. Without the
proper oversight and judicial review, a Whistle Blower can be place on terrorist lists for
malicious reasons without the knowledge or just cause. This is in direct conflict with
keeping our democracy free of corruption while adhering to the spirit of the constitution
in the manner our founding fathers envisioned.
Activists, Citizens, and Voters must ensure that constitutional rights of private
citizens are not compromised and justice subverted through information obtained from
warrantless surveillance upon which there is no just cause for any allegations or
association with terrorism. Whistle-Blowers are inherently supportive of a system of
checks and balances within our government that go beyond our constitutional doctrines
regarding the same. Whistle-Blowers ensure that the rule of law is universally applied to
all government officials in all branches of government. The Federal False Claims Act and
its provisions protect individuals from abuse of power, while providing relief and remedies
for those that were wronged and those that had the courage to cite a wrong.
U.S. Sponsored Mind Control Systems are also used to compliment these
illegal programs to silence WHISTLEBLOWERS and others that our government
recognizes as a threat to their illegal strategies and those that are seeking the
TRUTH. Synthetic Telepathy Coupled with Electromagnetic Weapons used for
pain have been the ELECTRONIC WEAPONS OF CHOICE by the PERPETRATORS
committing these haneus crimes against, STAN J. CATERBONE since at least
2005. My father, U.S. Navy 1943 to 1946) was a victim of MK-ULTRA and
experienced the same effects since at least the early 1960's and my brother,
Sammy, (U.S. Air Force 1969-19710 received the same victimization through
the use of the LSD experiments of the same program.
STAN J. CATERBONE stated and declared that the initial time of connection
with the SYNTHETIC TELEPATHY consisted of months of NON-STOP
INTERROGATIONS BY MALE SUBJECTS WHO IDENTIFIED THEMSELVES AS CIA
OPERATIVES. The interrogations lasted hours upon hours at a time and covered
just about every aspect of AMICUS STAN J. CATERBONE'S life. The
The following article by psychologist JEFFREY KAYE along with the other
exhibits that detail the use of U.S. SPONSORED MIND CONTROL, or behavioral
modification programs, will substantiate that these illegal and criminal
techniques were being used, without any means to verify or evidence, on the
prisoner detainees.
A close reading of the CIAs Inspector General Report and the Senate Intelligence
Committees narrative on the Office of Legal Counsel (OLC) torture memos reveals a
more detailed picture of the CIAs involvement in the construction of those documents.
What emerges is consistent with recent charges of CIA experimentation on prisoners, and
of the overall experimental quality of the torture program itself. It also points to a crucial
piece of analysis by the CIAs Office of Technical Services, a memo which may or may
not include damning medical and psychological evidence of the damaging effects of SERE
techniques, and which the IG report maintains was utilized in substantial part in the
drafting of the August 1, 2002 Bybee memos. If one is looking for a smoking gun in the
torture scandal, in my opinion, one doesnt have to look much further than this.
The quote below is from the April 22, 2009 Senate Intelligence Committee narrative of
the Office of Legal Counsels opinions on the CIAs interrogation program. Please keep in
mind as you read the quote and the added bolded emphasis, that recent documentation
has shown that for years the CIA and Special Operations had researchers studying the
effects of SERE training.
Moreover, the research had published in peer-reviewed journals, in part because the
research was also meant to add to the psychiatric communitys understanding of the
mechanisms of Post-traumatic Stress Disorder. Some of the research had also been
published in the June 2000 edition of Special Warfare, The Professional Bulletin of the
John F. Kennedy Special Warfare Center and School.
So, keeping this all in mind, consider the following from the Intel Committees narrative
(emphasis added): According to CIA records, because the CIA believed that Abu
Zubaydah was withholding imminent threat information during the initial interrogation
sessions, attorneys from the CIAs Office of General Counsel met with the Attorney
General, the National Security Adviser, the Deputy National Security adviser, the Legal
Adviser to the National Security Council, and the Counsel to the President in mid-May
2002 to discuss the possible use of alternative interrogation methods that differed from
the traditional methods used by the U.S. military and intelligence community. At this
meeting, the CIA proposed particular alternative interrogation methods, including
waterboarding.
The CIAs Office of General Counsel subsequently asked OLC to prepare an opinion about
the legality of its proposed techniques. To enable OLC to review the legality of the
techniques, the CIA provided OLC with written and oral descriptions of the proposed
techniques. The CIA also provided OLC with information about any medical and
psychological effects of DoDs Survival, Evasion, Resistance and Escape (SERE)
School, which is a military training program during which military personnel receive
counter-interrogation training.
While the fact that the OLC accepted at face value the CIAs statements regarding the
safety or the effects of the interrogation procedures they were proposing is no surprise to
anyone who has read the torture memos and evidence of the unprofessionalism and
bias of the memos authors the degree to which the conspiracy (by CIA or OLC, or
both) to withhold evidence of the real effects of the Enhanced Interrogation Techniques
(EITs) by the CIA has never been made more concrete than now.
To my knowledge, we do not have the specific document wherein the CIA provides the
medical and psychological effects of SERE school. I have been told that this document
is still classified. But it seems possible that the CIA did pass on the details of the
research that was available to it, including the debilitating effects of SERE techniques,
which sent stress hormone levels, according to one research report, some of the
greatest ever documented in humans. Another report cited neuroendocrine changes
[that] may have significant implications for subsequent responses to stress.
One of the authors of these reports, Charles A. Morgan, III, M.D., who has identified
himself in certain settings as a Senior Research Scientist on the CIAs Behavioral
Science Staff, has criticized my coverage of CIA experiments on the psychological and
physiological effects of SERE training upon human subjects. While he could not specify
what aspects of this coverage he felt were inaccurate and misleading, he did insist:
The research conducted by our research team at the National Center for Post Traumatic
Stress Disorder is not, and never has been, conducted for any other purpose than to help
us understand the pathophysiology of stress disorders and we might better help in the
treatment of veterans.
In making his mea culpa, Dr. Morgan never mentions that some of this research was
funded (over $400,000) by the Army and the Office of Naval Research. He doesnt
mention his acquaintance with great people who do military interrogations. He also
Of course, he neither confirms nor denies his affiliation with the CIA, an affiliation which I
have traced to the CIAs Science and Technology directorate, through his association
(large PDF) with the Intelligence Technology Innovation Center, which is a research
organization under the CIAs authority that answers directly to the CIAs Science and
Technology directorate. But most of all, Dr. Morgans arrows fall way short of his target,
as I have never accused him of personal involvement in the reverse-engineering of SERE
techniques for use in the torture program.
What is disturbing is his seeming lack of concern over the possiblity that the research he
helped conduct was either used to further experiments upon torture victims in the CIAs
clandestine prisons, or contrariwise, was withheld from Office of Legal Counsel lawyers
who relied upon CIA advice concerning the effects of techniques derived from the SERE
schools.
What is indisputable is that by virtue of his position, Dr. Morgan had access to CIA
officials just at the time that another department of the CIA, one to which he is affiliated,
was, according to the CIAs own Office of Inspector General Report (large PDF) involved
in vetting the SERE techniques for use in interrogations. The other department was the
Office of Technical Services (OTS), part of the CIAs Science and Technology Directorate.
This, by the way, is the same division that was responsible for the MKULTRA experiments
of the 1950s and 1960s. From the OIG report:
CTC [CIA's Counter-Terrorism Center], with the assistance of the Office of Technical
Service (OTS), proposed certain more coercive physical techniques to use on
AbuZubaydah.
CIAs OTS obtained data on the use of the proposed EITs and their potential long-term
psychological effects on detainees. OTS input was based in part on information solicited
from a number of psychologists and knowledgeable academics in the area of
psychopathology.
OTS also solicited input from DoD/Joint Personnel Recovery Agency (JPRA) regarding
techniques used in its SERE training and any subsequent psychological effects on
students. DoD/JPRA concluded no long-term psychological effects resulted from use of
the EITs, including the most taxing technique, the waterboard, on SERE students. The
OTS analysis was used by OGC [DoD's Office of General Counsel] in evaluating the
legality of techniques.
OTSs solicitation of information on SERE from JPRA elicited some sort of feedback from
JPRA, which supposedly told OTS that SERE training caused no long-term effects. The IG
Report does not say if this was in the form of a memo and only speaks of OTSs analysis.
In any case, we should not confuse any OTS analysis with the information provided by
JPRA itself to the Office of General Counsel, which produced a number of memorandum
and attachments in late July 2003. Marcy Wheeler has been analyzing the timing of these
JPRA items, including the fact that one of these key documents is missing.
The CIA IG Report is relating a story whose emphasis differs from that produced in the
narrative of the Senate Armed Services Committee investigation (PDF) into SERE torture.
In the latter, JPRA is the main culprit in providing cover for the supposed safety of using
SERE techniques. Yet, in the OIG account it looks like the CIA used DOD/JRRA as a cover
for the safety of techniques that it knew were in fact harmful from their own analysis of
the data. Moreover, it was the OTS analysis that was used in substantial part as
the basis of the August 1, 2002 memo approving the Enhanced Interrogation
Techniques (EITs).
That legal opinion was based, in substantial part, on OTS analysis and the experience and
expertise of non-Agency personnel and academics concerning whether long-term
psychological effects would result from use of the proposed techniques.
Moreover, the CIAs Office of Medical Services was frozen out of the initial analysis of the
risk and benefits of EITs, and not even provided with a copy of the OTS report given to
the White House Office of Legal Counsel. Such compartmentalization of information is
indicative of a covert operation, such as a Special Access Program (SAP). This SAP would
have included personnel in CIAs CTC, OTS, OGC, and Directorate of Operations, also
portions of DOD (JPRA and Special Operations Command),
and probably the White Houses OLC, Office of the Vice President, and National Security
Council. It seems highly likely that the CIA report to the OLC on the medical and
psychological effects of the SERE school program, mentioned in the Senate Intelligence
Committee narrative quote above, is in fact the OTS report, which came from the same
CIA directorate to which Dr. Morgan belongs. This does not speak to Morgans
foreknowledge of what would be used, nor to the amount of his involvement. But it does
speak to the likelihood that the government research he conducted (with others) was
available and likely used by his associates in the CIA.
To what purpose was this information used? It seems Dr. Morgan has serendipitously
given us the answer himself: exploring old and new techniques in gathering human
intelligence. The CIA appears to have used torture to conduct what Physicians for
Human Rights, in a white paper (PDF) recently published, called possible unethical
human experimentation, [which] urgently needs to be thoroughly investigated. The
government should declassify the OTS report, and bring the process of investigating the
CIAs role in the torture conspiracy fully into public purview.
In Keith, 407 U.S. at 313-14. There, the Court explained that [n]ational
security cases . . . often reflect a convergence of First and Fourth Amendment
values . . . Fourth Amendment protections become the more necessary when
the targets of official surveillance may be those suspected of unorthodoxy in
their political beliefs. The danger to political dissent is acute where the
Government attempts to act under so vague a concept as the power to protect
domestic security. Id. The Court thus concluded that Fourth Amendment
freedoms cannot properly be guaranteed if domestic security surveillances may
be conducted solely within the discretion of the Executive Branch. The Fourth
Amendment does not contemplate the executive officers of Government as
James Guerin was a Christian man and PATRIOT that fell victim to Public
Corruption and over-zealous prosecutors who lacked the knowledge and
sophistication to ever be involved in such affairs in the first place. I personally
met James Guerin and had the fortunate privilege to befriend his daughter and
son. Today the United States Attorney General, Mr. Jeffrey Sessions, and other
Trump Administration Officials engage in the same tactics. James Comey,
former Director of the Federal Bureau of Investigation, FBI, is a prime example.
His firing was a miscalculated political mistake. And President Trump can than
Comey for the Press Release 8 days before the election regarding Hillary Clinton
and Weiner. That changed the course of the election no matter what the
pundits say.
On February 1, 1991 Lynn Sherr of ABC News 20/20 reported the following:
This is the story of how this deadly weapon, designed for the U.S. military made
its way form this country to Iraq. And how American Soldiers may face the devastation of
a cluster bomb if a ground war breaks out in the Persian Gulf. Federal Officials believe
Saddam Hussein got his arsenal thru a lethal combination bureaucratic foul ups in the
U.S. Government and simple greed.
Here is how the cluster bomb works. An artillery shell, an airplane, or a rocket launcher
sends the bombs toward their targets. Each bomb carries hundreds of smaller bomlets,
something like hand grenades. Cluster bombs can be used against ground troops or
tanks, and can even scatter mines to lie dormant for days. The bombs can spray
thousands of pounds of sharp objects pins or even razor blades. The shrapnel can rip
through anyone or anything in its way, causing massive casualty among civilians or
ground troops. You can see the destruction in these buildings in Lebanon after a cluster
bomb attack.
How did Iraq obtain the cluster bombs and the ability to make their own? It was
incredibly simple. Investigators believe it started with International Signal & Control, A
government contractor with 5,000 employees based in Pennsylvania, which build key
components of cluster bombs in a subsidiary in California. 20/20 has learned Federal
Investigators believe ISC provided the technology, that is the plans, to this man, Carlos
Cardoen, Chilean arms dealer. Authorities believe he used the plans to build the cluster
bombs in Chile, then he shipped them to Iraq.
Whats wrong with all this? If the cluster bomb technology actually left the county, that is
illegal without U.S. Government permission, investigators say ISC never got. It is also
illegal for a foreigner, like Cardoen, to take the plans out of the United States without a
license, which sources tell us, he never obtained. The man who opened the door to Iraq
for Cardoen, was this man Nasser Bedouin. He is a Lebanese born middleman for
Cardoen who is based in the United States. Bedouin traveled often to Bagdad, and
arranged for sale cluster bombs and other military hardware to Saddam Husseins army.
In his first television interview, he told us about the business of dealing in deadly
weapons.
The links to ISC and Lancaster, Pennsylvania and U.S. Sponsored Mind
Control comes through ISC Board of Directors, Former Director of the NSA, and
The Director of U.S. Naval Intelligence Admiral Bobby Ray Inman. One must
remember that the U.S. Sponsored Mind Control Programs were the direct result
of the Soviet Unions accomplishments of using Microwave Technologies to
bombard the U.S. Embassy in Moscow as early the 1950's and the use of
German Psychiatrists by Adolf Hitler in the 1940's. Both the German and Soviet
Mind Control Programs predate that of the United States. Thus, the beginning
of the Mind Control Arms Race. Just this year, the Trump Administration
introduced the NEW MILITARY SPACE AGENCY, in an effort to formalize the
weaponization of Space and Microwave Weapons under one agency. This will
convert the Department of Defense programs and that of the U. S. Intelligence
Agencies to this new Military Space Agency, in my opinion.
We cannot afford to wait until the fighting starts to think about EW. By consolidating
leadership within the Office of the Secretary of Defense (OSD) and the services, creating
more effective investment strategies and better training our troops to utilize EW, I believe
the future of EW will be strengthened to the benefit of our armed forces. In response to
glaring shortfalls in EW realized during Operation Allied Force over Kosovo in 1999, I
founded the congressional EW Working Group (EWWG), intended to be a resource to
Congress, the Department of Defense and the defense community at large about the
need to invest in EW technology and capabilities.
The current operations in Iraq and Afghanistan again have highlighted the need to
strengthen U.S. superiority in the electromagnetic spectrum. EW continues to save
hundreds of lives by defeating improvised explosive devices that use electronic triggering
devices, such as cell phones and car
key fobs. But our adversaries are becoming more adept at operating in the spectrum by
identifying where we are vulnerable, and we must continually learn to counter rapidly
advancing technology.
However, despite the success in Iraq and Afghanistan, history suggests that our EW
capabilities will again face a period of neglect once current operations slow down or the
United States enters a period of relative peace. The people from our armed forces'
research labs, EW chiefs from each branch of the military and industry representatives to
discuss the future of electronic warfare.
Likewise, within each service, there is no flag or general officer with appropriate authority
who can provide leadership for service EW programs. To remedy this, an office within
OSD tasked to guide joint EW plans, policies and procurement should be established,
along with the appointments of experienced EW flag or general officers within each
service. Leaders understanding the value of EW is not the same as leadership, which is
necessary for effective EW practices.
The streamlining of EW leadership will then lead to more efficient investment in present
and future capabilities. Operations in Iraq and Afghanistan have taken a further toll on
EW systems and platforms, and many need to not only be restored but modernized. To
this en and prioritize modernization efforts and inject necessary funding for next
generation EW capability.
The Defense Department should also authorize an EW Critical Technologies List, which
would help coordinate EW investment strategy, maximize limited resources and stabilize
funding streams for next-generation systems. This list should be submitted to Congress
on a regular basis.
We have seen that our enemies are able to quickly adapt and field deadly assets; the
United States must meet and exceed these challenges by implementing proper
investment strategies. Our troops also need adequate knowledge and training. While
each branch of the military must provide its own EW expertise and capabilities, current
operations have highlighted the need for joint interaction and readiness. The AOC has
recommended, and I agree, that a joint services coordination cell should be established
to serve the combatant commands. The coordination cell would work directly with
combatant commanders and be ready to deploy to help us control the spectrum from the
first day of conflict.
Furthermore, just as there is high-level specialized training, such as Navy TOPGUN and
Air Force Fighter Weapons School for our fighter pilots, there should be a similar joint EW
training program so our war fighters know what they need to know about EW before
being deployed. Effective training and projected career path will help sustain the
EW community for many years to come.
EW saves lives, and we must not allow our EW capabilities to continue eroding. Now is
the time for the United States to capitalize on numerous opportunities to improve and
strengthen our edge in the electromagnetic spectrum. These recommendations can
secure the future of EW, keeping the members of our armed forces safe and effective in
conflict. Rep. Joe Pitts,R-Pa.,is founder, Electronic Warfare Working Group.
It is during these years that I also did work for DARPA, The Defense
Advanced Research Project Agency, of the Department of Defense. DARPA IS
CREDITED WITH BEING THE AGENCY THAT DEFELOPES THE MOST
SOPHISTICATED MIND CONTROL TECHNOLOGIES FOR THE MILITARY. DARPA
was a joint venture partner of NIST, or the National Institute of Science and
Technology of Washington, D.C. I was instrumental in helping NIST create CD-
ROM's in the UNIX language for the development of Voice Recognition Systems.
Editors note: Trump policy advisers Robert Walker and Peter Navarro return with a
second op-ed detailing the approach a Trump administration would take on national-
security space matters. Hillary Clintons campaign has been invited to submit op-eds
elaborating on the answers Clinton provided for our Oct. 10 article, Hillary Clinton and
Donald Trump weigh in on U.S. space policy.
Obama-Clinton economy and a lack of strategic vision are major causes. Meanwhile,
China and Russia continue to move briskly forward with military-focused space initiatives.
Indeed, each continues to develop weapons explicitly designed, as the Pentagon has
noted, to deny, degrade, deceive, disrupt, or destroy Americas eyes and ears in space.
To address such emerging threats and maintain U.S. strategic superiority in space a
peace through strength Trump administration will simultaneously strengthen our
economy and manufacturing base while significantly expanding our civilian and military
space budgets.
Trump understands, as Reagan did before him, that without a strong economy, there can
be no strong space program. It is not too bold to assert the maintenance of our
technological and strategic superiority in space is vital not just to national security but to
our very survival. Today, every aspect of our military force projection worldwide depends
on our on-orbit communications, observation, and intelligence gathering capabilities. Our
ability to see and understand potential hostile activity and to respond promptly and
accurately is ineluctably intertwined with our space capabilities.
While Americas space-based capabilities have made our military the worlds most
powerful and effective, an over-reliance on our satellite network to provide situational
awareness on the battlefield is now making America highly vulnerable to attack. Chinese
and Russian strategists understand this better than our own government. Thats why
they are now aggressively targeting our satellite networks both military and civilian as
the very concept of warfare broadens.
Against this emerging strategic chessboard, Donald Trumps priorities for our military
space program are clear: We must reduce our current vulnerabilities and assure that our
military commands have the space tools they need for their missions. We must also
reduce the cost of space access and create new generations of satellites to deal with
emerging threats.
The future military necessity of using smaller force projection into hostile arenas will
demand the speed and agility that only space-based assets can supply. Addressing
current vulnerabilities will, for example, require new generations of smaller, more robust
constellations of satellites.
To move boldly forward, we must recognize that many of our military needs can be met
with commercially available launch, communications, and observation capabilities. This
businessoriented approach will reduce costs while accessing new advances on a timeline
significantly quicker than current, outdated military procurement procedures.
Such an increased reliance on the private sector will be a cornerstone of Trump space
policy.
America must continue to be a bright star in space that people all around the world will
continue to look up to with admiration, assurance, and hope. No space goals will be more
important to Donald Trump than defense of our nation and that a freedom-loving people
will lead the way to the heavens above.
_____________
Robert Walker is former chairman of the U.S. House Science, Space, and Technology
Committee and former chairman of the Commission on the Future of the U.S. Aerospace
Industry. Peter Navarro is a business professor at the University of California-Irvine
and author of Crouching Tiger: What Chinas Militarism Means for the World. Both are
senior policy advisers to the Trump campaign.
ADMIRAL BOBBY RAY INMAN, THE GO-TO GUY FOR BLACK OPS
PROGRAMS AND DEFENSE CONTRACTS
In the following article by Tom Porter in 1996 documents the Bobby Ray
Inman Mind Control Connection through SAIC Corporation:
In April 1992, prior to Guerin's sentencing, Inman, wrote the judge that
between 1975 and 1978 Guerin "voluntarily provided the U.S. government with
information obtained during his foreign travels which was of substantial value,
particular that related to the potential proliferation of nuclear weapons."
Several defendants in the ISC case claimed the U.S. government knew of their
sales to South Africa and that they provided information on South Africa's
defense, including its nuclear weapons program. Guerin was sentenced to 15
years in jail. Guerin could have received up to 61 years.
The withdrawal of Bobby Ray Inman's nomination for Secretary of Defense brought to
public attention the case of International Signal and Control, a defense and technology
company. James Guerin, the company's founder, was recently sentenced to jail for illegal
arms sales to South Africa, as you report in "Inman Faced Scrutiny on Jailed Arms
As one who has followed International Signal and Control for years, I believe there are
many unanswered questions in this case involving our own Government, its intelligence
agencies and United States implementation of the United Nations arms embargo against
South Africa.
Ties between International Signal and South Africa go back to the 1970's. In February
1976 the Department of State granted approval of a contract for the study of maritime
command and control systems with Barlow Communications of South Africa. In January
1978, because of United States support for the 1977 United Nations arms embargo
resolution, the State Department revoked the contract. Yet it appears International
Signal continued its involvement in this project. According to the indictment of Mr.
Guerin, International Signal sold South Africa inertial and land navigation systems and
gyroscopes for aircraft, missiles and helicopters. International Signal also made millions
of dollars in other illegal sales to South Africa including military-related technology and
land mines. Did United States intelligence agencies allow International Signal to continue
its illegal operations for intelligence on South Africa's nuclear and other military
programs, or to support South Africa's military for other reasons?
Mr. Inman has acknowledged that as director of Naval Intelligence in the mid-70's, he
knew of the first International Signal contract and was aware of later information
supplied by the company on South Africa's nuclear program. Most likely, these ties had
some bearing on Mr. Inman's appointment as a director on the International Signal
shadow board. Such boards protect United States interests and secrets. Did Mr. Inman
ask questions about large contracts going to small companies and countries like South
Africa and Panama? The central question, as with the IRAN-CONTRA SCANDAL, is how
to establish effective procedures to prevent United States intelligence agencies, or people
working with them, from subverting laws established by Congress. If directors on shadow
boards such as that of International Signal are just "window dressing," Congress should
tighten the system and make directors accountable.
Congress should also examine the role of intelligence agencies in this case. Company
officials say they continued providing Information to the Central Intelligence Agency into
the 80's, while illegal sales occurred.
Mr. Inman says the United States Government never gave Mr. Guerin permission to
violate the arms embargo against Smith Africa. Did the C.I.A. know of these violations of
the embargo? If the C.I.A. was aware and took no steps to stop the illegal said, it was
effectively a partner of International Signal in arming apartheid South Africa.
RICHARD KNIGHT
New York, Jan. 21, 1994
The writer is a research associate for the Africa Fund, a nonprofit human rights
organization.
Dr. Nick Begich is the eldest son of the late United States Congressman
from Alaska, Nick Begich Sr., and political activist Peggie Begich. He is well
known in Alaska for his own political activities. He was twice elected President
of both the Alaska Federation of Teachers and the Anchorage Council of
Education. He has been pursuing independent research in the sciences and
politics for most of his adult life. Begich received Doctor of Medicine (Medicina
Alternitiva), honoris causa, for independent work in health and political science,
from The Open International University for Complementary Medicines, Colombo,
Sri Lanka, in November 1994. He co-authored with Jeane Manning the book
Angels Don't Play This HAARP; Advances in Tesla Technology. Begich has also
authored Earth Rising - The Revolution: Toward a Thousand Years of Peace and
and his latest book Earth Rising II- The Betrayal of Science, Society and the
Soul both with the late James Roderick. His latest work is Controlling the
Human Mind The Technologies of Political Control or Tools for Peak
Performance. Begich has published articles in science, politics and education
and is a well known lecturer, having presented throughout the United States
and in nineteen countries. He has been featured as a guest on thousands of
radio broadcasts reporting on his research activities including new
technologies, health and earth science related issues. He has also appeared on
dozens of television documentaries and other programs throughout the world
including BBC-TV, CBC-TV, TeleMundo, and others. Begich has served as an
expert witness and speaker before the European Parliament. He has spoken on
various issues for groups representing citizen concerns, statesmen and elected
officials, scientists and others. He is the publisher and co-owner of Earthpulse
Press. He served as Tribal Administrator/Village Planner for the Chickaloon
Village Council, a federally recognized American Indian Tribe of the Athabascan
Indian Nation for five years and served four years as the Executive Director of
The Lay Institute of Technology, Inc. a Texas non-profit corporation. Currently
Begich consults for tribal organizations, private corporations and others in a
number of research areas. Dr. Begich is credited with persuading the EUROPEAN
UNION TO BAN SPACE BASED WEAPONS. Dr. Begich is a single person with five
adult children, and four grandchildren.
His initial concept was to create a global shield, to be able to utilize the natural magnetic
field lines that surround the earth, be able to punch energy into this and then create this
kind of global shielding effect. And the idea was that any electronic device piercing that
energy would be disrupted, like satellites, intercontinental ballistic missiles, virtually any
electronic device that ran into this field of energy that was being amplified would be
destroyed.
Now, one of the other interesting parts of this -- and this kind of shows that, again,
utilizing one of Eastlund's graphics. So you can see like a field line and then you see this
cork-screwing energy going around it. That energy naturally is occurring from the
southern polar regions into the northern polar regions. And, in this case, they actually
couple actually utilize the energy on the ground to couple with the natural energy, and
then coming from the north to the south, create this cork-screwing effect, which
accelerates the electrons and then creates this global shield.
Now, that was his initial concept. And as a concept, it caught the attention of a number
of people and eventually got funding from the Congress, initially at 30 million, and over
the last few decades now over almost 300 million, which in dollars is not a lot of money,
but when you consider, this is sort of the pinnacle of billions of dollars spent in
ionosphere research over many decades.
What caught my attention in terms of the technology of Eastlund -- I'm going to skip
some of these that are not so relevant -- was the idea that you could manipulate the
ionosphere -- and I'll use this as a better example. So one of the thoughts was that if
you could punch or pulse energy into the ionosphere so think about this energy going
up and, like, a hammer ringing a bell. Every time it hits that ionosphere, the ionosphere
itself vibrates and then it begins to send a signal in the ELF range. So you have a high
frequency signal going up, punching the ionosphere, the ionosphere which is energized
then acts as a broadcast antenna in the sky bringing back an ELF signal to the earth, and
in this case covering an entire hemisphere.
Now, ELF signals, extremely low frequency signals, are very long wavelengths. They
penetrate the earth and sea. They're utilized for communication with submarines, as an
example, the depth, because short wavelengths won't penetrate the earth and sea.
They're also used for what's called earth-penetrating tomography, which in simple
language or by analogy would be like x-raying the earth or looking into the earth for
underground structures. But one of the side effects of ELF is the entrainment effect on
the human mind. Because ELF signals will lock onto in what's called a frequency following
response. And you can use a lot of different techniques to create a frequency following
response. You can use flickering light, you can use binaural beat, which I'll explain in a
few minutes. You can use electromagnetic fields such as this, or even the power grid
itself can be modulated in such a way to create a signal that the human body will join
with, will couple with, and begin to follow. It doesn't take a great deal of energy to
accomplish this. This is the one that triggered my real interest in HAARP, because this is
the one that everybody kind of ignored and said, oh. In fact, the HAARP planners said,
well, if ELF has a biological effect, it's a side effect. It's an unintended consequence. We
heard that phrase earlier today. But I don't believe that. I believe that it's an intended
consequence. It's intended to grade populations in very specific ways.
Now, this book was mentioned by my friend earlier today, "Between Two Ages",
And why this is an important book, it was written National Security Adviser to President
Carter. This is around the time that Kissinger and think tank, so to speak. Now, find this
book. I really encourage you to find this book and read it, because it is not a prediction
of what will come with technology. It's the blueprint, in fact. You can read this. When I
first read it -- he writes in a pretty convoluted style. It's a little difficult even in English to
understand. But I really encourage you to read it because he predicted the economic
changes that took place, the political changes that took place in the world over the last
40 years with a great deal of accuracy. And some will say it really wasn't the prediction.
It was the plan.
If you look within this text between Pages and 56, you'll see a section that's dedicated to
the kind of technologies we're talking about today, a mind control technology. And what
Zbigniew referenced was a guy named J. F. Gordon MacDonald. And he was a
geophysicist at UCL. He wrote a book -- or, actually, a chapter in a book and the chapter
was called, "How to Wreck Your Environment", which this is before Earth Day, okay, so he
could get away with that. It was 1969 when that book was actually published. But what
he said that caught Zbigniew Brzezinski's attention was, he said, if we could ever figure
out how to electronically stroke the ionosphere in just the right way, we could return a
signal to the earth that would influence the behavior of people over huge geographic
areas.
Now, that's a pretty profound thing. But we didn't have a way to stroke the ionosphere in
1969. But we did by the 1990s. And that was, in fact, and is, in fact, the HAARP system
that can accomplish this. So the idea was -- and it was kind of, in a gross sort of way,
primitive, if you will, but what the intention was, was that if you could pulse the
ionosphere, return this ELF signal to the earth, you could agitate the population in very
specific ways. You could make them passive, less aggressive, or the opposite by just
amplifying that signal. And I'll explain a little bit of that as we go on.
The other person that comes out in the last presentations, Jose Delgado, and this book
he wrote, "Physical Control of the Mind: Toward a Psychocivilized Society". And this is,
again, a 1960s book. Those images that you saw in just this short video clip of Delgado's
work, there is a good section in this text as well showing that. But in those days they
used implants. They had to physically put something in the brain. And what Jose Delgado
originally did -- he was actually educated in electrophysiology at the University of Madrid.
He graduated in 1950. Electrophysiology, as a degree field, thinking about it in 1950,
now 65 years ago, most people don't even realize that's an area of higher education
today, much less that far back. One of my mentors, Raul Makayla (phonetic), he
actually graduated University of Madrid in 1958, and his area of interest was, essentially,
the same, biomagnetic and electric fields, effects on human physiology, and he spent his
career studying that.
Delgado, at Yale University, he initially was mapping the brain of primates and humans
by stimulating various portions of the brain to figure out what was responsible for what
kind of activity. And then he began to utilize the implants in those dramatic ways in those
film clips with the charging bull and he throws the switch and the bull stops, to
demonstrate that you could take a creature from passive to highly aggressive to passive
to highly aggressive, just like flipping on and off the lights in your living room. What
Delgado discovered by the mid-'80s is that you didn't need any implants. You just needed
to manipulate the energy itself. And you didn't need a great deal of energy. Now, we've
heard -- I forget the amount of energy surrounding us now. Was it a quintillion? I believe
it was 18 zeros after the one that we heard earlier. Back when I wrote the HAARP book in
'94, just radio frequency energy alone, it was 200 million times more around us every
day than nature created in 1994. Now, when you think about it, what did Delgado
discover? He discovered that one-fiftieth of the amount of energy in the natural
background noise of the earth was sufficient to manipulate the behavior of human beings
if you could hit the right frequencies, if you could hit those window frequencies that
stimulated that kind of activity.
Now, if you think about this -- again, by analogy, think about dialing through the radio
stations on a radio. In between the stations you get the white noise, the static, you get
no clear signal. But when you have resonance between the transmitter and the receiver,
then you get a nice, clear signal. The same is true in our physiology. Whether you're
looking at stimulating or affecting a specific element in the body, molecules in the body,
cell structures or organ structures or even the human mind, it's about manipulating the
underlying energy.
When you think about medical science in terms of how the fork in the road is and how
this kind of applies to why don't we know more about this today, well, there's lots of
literature now. 25,000 sources, I think we heard quoted earlier today. 25,000 sources
talking about the energy interactions with the human body. That is a lot of information.
But what happened in medical science? A lot of people that went into life sciences, they
were really good in the chemistry, a little weak in the math, so they went to life sciences.
People who were a little better in the math, they went to physics. And then once upon a
time, these two came together and we got biophysics, which is really the root of real
health science. If you really want to get to the meat of it, you've got to get to the
energetic interactions that create chemical reactions that then manifest in the body.
Now, Jose Delgado, when he figured out that you didn't need implants, you just need to
manipulate the energy itself, this became kind of the essence of sort of where everything
went from there. But I want to roll back a little bit, a little bit back in time, and talk
more about the evolution of mind control as technology starting with the work at Harvard
University of a gentleman, Estabrook, who was working in the Harvard hypnotherapy labs
in the 1920s. You can look Estabrook up. Look him up at the Library of Congress and
you'll see his list of publications, and I recommend that you do that. What he decided
was that you could create what we would call today a Manchurian candidate. You could
17 take certain individuals, put them in a very, very deep state of hypnosis and then over
a period of time train them so they would be like this super spy that you could send into
another country and they'd hang out for a year or two, but if they got captured, they
wouldn't really remember any of their former self, and then when they came back, in this
case, into the United States, that we would then give them the appropriate suggestions
and then extract the intelligence from them.
And this is what Estabrook was working on. By the 1930s, a lot of his work was being
classified and he continued to work in this field up through the 1960s. His last book --
and I always like to read the last thing someone writes, you know, because it tells you a
6 lot about, sort of, the conclusions and there are things that you might discard bits and
pieces as science enlightens you and your experience enlightens you. And what he talked
about in that last book were the experiments he was involved in using LSD and other 11
hallucinogenics in mind control, which he actually talked about in a favorable sense.
And for those of you that remember, the CIA was heavily involved in this in the 1960s
and, in fact, the whole area pre-1960s going back even to the Korean War, which is sort
of my next mark on the timeline. The Korean War, we had prisoners, patriotic young
Americans come back from war and they're handing out Communist leaflets on street
corners, and the term or the phrase brainwashing came into being. That's where it came
from. It came from that series of events after the Korean War.
The idea of being able to manipulate people's behavior and change them so profoundly
became of interest to the predecessor of the Central Intelligence Agency and then later
the Central Intelligence Agency. And what they looked at were lots of different ways to
3 manipulate human behavior. Now, when I was researching my first book with Jeane
Manning, "Angels Don't Play This HAARP", I was looking for a good source document that
would speak to this, because you always read about this in secondary, tertiary sources.
And so I'm in a book room, a big surplus book room, and I'm telling this guy that I know,
I really need this source. And as I'm having this conversation, I reach unconsciously
behind me into a box and I pull out this book. This is a really interesting one. This is
actually a presidential report. This is a report that was commissioned at the time, 1975,
to look at the abuses of the CIA. Now, this came out of the Church Committee reports,
which were Congressional hearings that took place in the early '70s to investigate the
abuses of the Central Intelligence Agency, the kind of abuses that we read about today,
because nothing really changed. Supposedly, this was to change things.
Now, what's in this report? The LSD experiments were in this report. The idea the Central
24 Intelligence Agency was domestically infiltrating civil rights groups, antiwar groups,
people that, essentially, opposed the government within the United States, which was not
part of their mandate, in fact, was illegal. The fact that they were reading people's mail,
utilizing unwitting victims and experiments for mind control. All of this came out in this
report in 1975. And yet, the CIA continues to do it even to this day.
Think about the kinds of activities that have been reported pretty widely over the last few
years, whether it's digging through garbage to blackmail other diplomats, which is
something our Intelligence community does, whether it's to send pallet loads of money
into countries like we did in Afghanistan to bribe officials as a way of doing business, or
whether it's to assassinate people with drones, kidnap people and torture them.
Now, most of us don't know people like this, but this is the government that I
unfortunately have guiding my country right now. It's a government of criminals. Now,
people want to talk about, oh, this couldn't happen here. It has happened here. It's
happened for decades in the United States. This report by the President's Commission
touches the very tip of that iceberg.
This is another document. This is -- this guy, Captain Tyler, he later became a colonel and
retired. He was involved in pretty much the sort of esoteric side of some of the
government research. This book this chapter out of this book is called, "Low-Intensity 5
Conflict and Modern Technology". It was prepared by Maxwell Air Force Base in 1984.
And it was talking about a large -- a variety of technologies. But in this particular one, if
you look at, certainly, the subject lines, you have stimulation of, bones* generation,
healing of fractures, treatment of disease, healing of wounds. You look at behavior
modification in animals. You know, some of these things that are listed here were kind of
under the mysterious category. They couldn't really explain what was happening in 1984.
But the idea was to stimulate research in these fields. So a number of things happened.
A lot of money started to flow into these areas. One of the reports that came out in the
1980s as a result of some of this was the Radiofrequency Dosimetry Handbook. It was a
21 big, thick handbook. It was produced by the University of Utah under contract to the
United States Air Force to determine the radiofrequency dosages that were required to
override every vital organ of the human body, whether it be the heart, the liver, the
lungs, the kidneys, just sort of preempt their natural function to be able to do it
remotely. And the idea was to take that leap of technology and begin to apply it into
weapon systems.
Mind control. "The Economist". Cover story. Some of you will remember this one. This is
2002, I believe. Yeah, 2002. And what this cover story was about was about the ethics
of mind control. Not saying, hey, does it exist or doesn't it exist? It's just saying it's here
right now. We really need to be debating whether we should advance this technology,
whether we should limit this technology. "The Economist" is certainly a credible
publication. Not too much happened from this story. This is -- unfortunately, it's not
showing up.
November -- you can get this one on my website. I'll give you my website, because this
is a very important document. The Navy set up a new set of regulations for human
experiments. It was approved in 2006. You know, in history, that's like tomorrow and
yesterday, right? It's, like, now. And in this they specifically call out mind control
experiments and who has the authority to approve them. And the persons with the
authority to approve them is under secretaries of the Navy in the case of Navy
Intelligence or Naval research.
Now, it's not just CIA. Naval Intelligence does this work. The Marines have a section on
non-lethal weapons that this falls under. The Air Force has the electromagnetic
directorate, which is working in an area called controlled effects, which deal, again, with
mind control and physiological effects on human beings. In fact, they publish a
publication called "Technology Horizons". I believe it's the June 2004 issue. You can look
it up. The cover story is on controlled effects.
Now, what are controlled effects? The first effect is attacking hardware; you know, like
equipment, like machines, to be able to interfere with the flow of electrons through
circuits to disrupt those machines to operate. Not using bombs and bullets and the things
of history, but using energy itself to manipulate hardware.
The second sort of level of controlled effects talked about in that article is the idea of
manipulating the software, the systems that run those systems, so that you can disrupt
the software, then you disrupt the hardware, and things collapse. And the third leg of
controlled effects is the human operator. And what they say in this particular article
produced by the electromagnetic director of the Air Force is that we can target or create
the illusion of all of the senses in the human body; sight, sound, touch, taste, to give
people complete memory sets, complete experiential sets that you wouldn't be able to
distinguish the synthetic from the real.
Now, think about that for a moment. What does that do to court testimony in 20 years if
this becomes the norm? They're now talking about using this for post-traumatic stress
syndrome folks, people coming back from warfare. This just sort of cleans up the
garbage of the mind and gets rid of that stress. Some people think that's a great idea.
Personally, I think that's the biggest mistake we could ever make. Because whatever
those servicemen and women were engaged in what used to happen in warfare -- what
happened in World War II when everybody came back, they said, I don't ever want to
see my children in these things, I don't want to see my grandchildren in these things.
Wars need to be put down, not amplified. When you take the human factor out of
warfare and it becomes like a video game, then our willingness to withdraw from direct
conflict no longer happens. And think about where our military science has gone. In fact,
I want to mention another very important publication. It was produced by the US Army
War College (C ARLISLE, PENNSYLVANIA) in the early 1980s. It's called the "Revolution
of Military Affairs and Conflict Short of War". And this particular paper was talking about
revolution of military affairs. What is that exactly?
There's simple ways that you can achieve this. You can introduce to the battlefield certain
elemental compounds that in small background amounts would not be considered
dangerous. Let me give you iodine as an example. We all need a certain amount of iodine
in the body to maintain thyroid function. But if you have too much iodine, you'll get
poisoned. You'll die. You'll get sick. So what can you do? You can send a signal in that
resonates the very same signal strength and frequency as iodine, you can send that
signal in and the body will begin to react as if its gotten this massive load of iodine and
show all the symptoms of iodine poisoning. You check the thyroid; check the blood, it's
not there. Mystery illness. Something as simple as that for manipulating large
populations, not necessarily with their consent and not necessarily with clear knowledge,
and nothing shows up in the background that would say why this poison actually exists
that would account for this. A simple way.
One of the other ways that this technology can be exploited is really quite
simple. There was an article produced by "Parameters", which is a military
publication. "Parameters". You can look it up. It's the -- I believe it was the Fall
1998, but you can look up the article name called, "The Mind has no Firewall".
It's a very important article. This article talked about all the various ways in which you
could introduce mind effects or mind control technologies using modern technology
today. And the original article was actually written in a military journal called "Orienteer"
published in what is now Russia. What's interesting about this is it said you could use
any electromagnetic carrier, whether it be radio, TV, the Internet, now cell phones; but,
essentially, any of these carriers, you can modulate a signal on them that will manipulate
behavior of segments of the population. And the Russians demonstrated this in a couple
of different ways. There was a program. It was called "Undercurrents". It aired in the
CBC, which is the Canadian Public Broadcasting System. "Undercurrents" did two really
interesting stories that I got to participate in. One was on HAARP and the other was on
mind control. And on the mind control story that they did -- this was a very popular
program in Canada at the time and this particular segment was their highest rated that
they had ever run. And they had folks that came in who were involved in the "Star Wars"
initiative during the Reagan Administration that couldn't talk about what they did in the
White House, but they could talk about what they observed in Russia.
And one of the things that they talked about was the idea that you could -- you could
create, sort of, this white noise and on this white noise carry a signal. And so they put
out this message, bring us cake. And Russians at tea time, you know, they eat these
little cakes? I guess you do that in other parts of Europe as well.
And so at the appointed time they began to broadcast this. And workers from within that
building and on the street were bringing cake into the meeting room without really
knowing why they were doing it. They just felt like doing it. Well, that was, in fact, what
they were programmed to do. Now, this goes back. We're talking about 15-year-old
technology. And when you think about sort of where did it go from there, in 2006, there
were a couple contracts left by DARPA, which does research for the defense industry in
the United States. And DARPA used to be run by a guy named Tony Tether. Tony Tether
was a good friend of Ben Eastlund's. Now, what they were doing then was, they had left
two contracts to the University of California for what's called electronic telepathy. Okay.
Electronic telepathy. The idea of reading another person's mind at a distance by
analyzing the emanations coming from this area, being able to analyze that and
determine and interpret what it is. And then the other half of the contract was to create
complex signals to see if you could transfer that array, so to speak, of signals into
another person's consciousness and whether they would perceive the same images.
Now, there was work done by Elizabeth Rauscher and her late husband, Bill Van Bise, in
this very same area. In fact, I have a copy of their unpublished paper where they
actually built an electronic circuit where they could take a person in one room and a
person in another room, attach this person to that circuit and his person to that circuit,
and then, you know, the psychic card where they show the triangles, the squares and the
circles and the little squiggly lines, a hundred percent accurate with nine test subjects
who had never experienced consciously in any way any sense of extrasensory
perceptions or psychic perceptions. They did it with hardware, transferring thoughts from
one to the other.
Now -- which tells me it's probably a little more simple than what DARPA's doing. But
when Ben Eastlund was doing work on HAARP and he was doing other work for DARPA at
the time and we had talked about him in our first publication, and then actually after
publication became friends, and Ben Eastlund's attitude was, you know, some things just
shouldn't be done. And one of the things that he had been working on was whether
modification technologies, which he was at that time and when we first met, making that
technology available to the military. And after some dialogue with us and others, he
decided there's certain technologies that are not safe in the hands of military.
At one point along the course I began doing quite a bit of work on this whole
mind effects issue. And I caught the attention of a woman, Dorothy Lay. Now,
Dorothy is one of the heirs to the Lay, as in Frito-Lay and PepsiCo Corporation.
So a very wealthy family. Dorothy was very interested in this technology
specifically as it applied to victims. And so she approached me at one point and
asked if I would become a member of her board of directors for a non-profit that she was
setting up to deal with these kinds of technologies. And I've got to think about whether I
should tell you the rest of this story, and I think I will, because why not?
So I have this thing, intuition. All of us have it. I used to not pay as much attention to it
as I do today. When my intuition tells me something, I listen, because when I really think
about it, it's never been wrong. Neither has yours, if you really think about it. Or maybe
you don't think about it and just start acting on it. So my intuition said -- and this was a
very difficult time for me in 2002. In 2002, I had been betrayed by a very good friend,
economically was bankrupt in the middle of this work, because I started this work in '94.
Economically was being crushed. And at that point I was deciding whether I was going to
stay in this work at all.
And I'm going through a bunch of my files and I see this file and it's marked Lay. And I
remember this person had contacted us needing some information and we provided it.
And we never charge for that. I mean, the way we operated is, I sold books. And people
like you bought my books. And they allowed me to do this work. I didn't write for grants
where somebody could manipulate me and control me and tell me what to say. I didn't
go out and find some publisher that would edit out my work. I risked my own money. I
published my book.
Case No. 15-3400 against these same said actors and perpetrators. The
PETITIONER will provide evidence to support this writ and offer a final remedy
and redress in accordance with federal law.
THE ABOVE IS AN EXCERPT FROM THE CURRENT CASE IN THE UNITED
STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA IN
CASE No. 17-cv-4000 CATERBONE v. The United States Government before U.S.
District Court Judge Edward G. Smith.
___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP
Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566
Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?
Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &
Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566
In 1987 STAN J. CATERBONE Had Unjustly Lost His Freedoms, His Rights, And
His Pursuit Of Life, Liberty And Justice.
The following report (most identities purposely omitted from this version)
is an amazingly true and factual account of an extraordinarily bizarre tragedy that has
turned one mans life into an eleven (11)2 year free fall into Dantes Hell.
On the surface, this is a story of a victim struggling to seek the truth, but in reality, the
evidence will conclude that this is a victim, literally, held hostage by virtue of his truth.
Later, the preponderance of evidence that the victim has amassed and his obsession for
meticulously documenting his ordeal might seem eccentric, yet his demonstrated ability
to react to events before they unfold appears mystical. And this was his manner in which
he tactfully defended and protected his life. It is these actions that have painted the
landscape with a dire vengeance for his ruin. His actions will ultimately serve to protect,
preserve, and foster the truth of his story, incriminating the culpability of his many
perpetrators, while at the same time being twisted and tainted in a relentless manner to
attack his credibility.
1
In April of 1997, Federal Court Judge Stuart Dalzall said Lancaster County had
lost its soul in the worst case of prosecutorial misconduct ever found in the
English speaking language regarding the Lisa Michelle Lambert hebeas corpus
hearing in the notorious Laurie Show murder case.
2
This is a story of a human being endearing for his rights, living in fear of his life,
and the remedial actions required for the truth to set him free. A victim forever believing
in his accomplishments and his visions, yet forced to adhere to a life of their diversions.
Fatefully, ten years after being taken as a political hostage, with the aid of numerous
arrests and false imprisonments conveniently falling short convictions , a Federal Judge,
Judge Stuart Dalzall, of the Eastern District Court of Pennsylvania, opened a Pandoras
Box into the true colors of the inner workings and politics of ultra conservative Lancaster
County, Pennsylvania. A supposedly Gods country. His findings reeled a dramatic and
emotional response from the Lancaster County community that was akin to the
assassination of JFK . A community where obstructions of justice strikes a startling and
stark contrast to the image it so desperately embraces. A community proud of its tough
on crime judges, a community of plain folks and
Amish, and a community settled in a beautiful landscape abundant in an agricultural
bounty. This is not a community of compromising integrity. Or so it has been perceived.
It is this public disclosure, that casts a new light and sudden hope for freedom into
this victims unbelievable and horrid story, that begun just four years prior to the
murder of Laurie Show. It is the decisive similarities of how both victims were subjected
to a very calculated and politically motivated attempts to frame and fabricate
circumstances to obtain the results that justified the means for illicit self-serving
interests. This very same conduct, committed by public servants, elected and enlisted to
enforce the law, to which Judge Dalzell found so appalling. Conduct, which violated the
very same rights their respective offices are commissioned to protect. Conduct which
strikes the meaning of We The People from our nations very own Constitution.
Fortunately, this victims story is laced with a thread of faith, a faith in God. And
because of his faith, this victim will forever regard Lisa Michelle Lambert 3 and Laurie
Show as his little Angels of Justice, a Godsend. An answer to his many prayers, that
3
The author admitted in an affidavit in 1998 that he did not know the criminal
culpability of Lisa Michelle Lambert, and further argues that it was because of the
prosecutorial misconduct and the erroneous handling of the crime scene that the
truth evaded both the prosecution and the defense as to who actually killed Laurie
Show.
for the first time in ten years provided a small glimmer of hope, and a few moments of
solitude that have materially justified his own tragic experience. The realization that the
truth is that much more believable because of the trials and tribulations of Lisa Michelle
Lambert. Unfortunately, this revelation came at the unfortunate and untimely death of
Laurie. However, it just may be Gods intentions of a Higher Purpose.
AT ISSUE
The central issue in this story, is a cover up, a cover up of mass proportions, and
of perplexing design, with national consequences. The fact of the matter is that this cover
up has had ramifications throughout this world, specifically the Middle East The cover up
would be emphatically unbelievable without the wealth of evidence, especially the
recorded conversations with Pennsylvania officials. A cover up that permeates from what
will later emerge as the 4th largest financial fraud (Billion Dollars) in the history of the
United States coupled with the covert sales of arms to Iraq. And five years after this
cover up began, these same munitions were used against our own troops in the Persian
Gulf War. And of course, there are admitted ties to the Central Intelligence Agency (CIA)
and the National Security Agency (NSA).. And this cover up and story, which began in
June of 1987, in Lancaster County, preceded criminal indictments by the United States
Attorney General, the Federal Bureau of Investigation (FBI), the Internal Revenue Service
(IRS), the Department of Justice and Commerce, and more. A vast array of criminal
activities conspired from the ultra conservative Lancaster County, where God is
supposedly supreme, and its hard line approach to crime is said to be preeminent. In
June of 1987, Lancaster County was immersed in a dynamic twist of fate, with a host of
players which may never be fully identified.
The irony of this story is how Lancaster County manages the disclosure of the very
same criminal activities that this story proves that it condoned, prior to the intervention
of federal authorities. It most dramatically will prove the nature of its integrity, or lack
thereof. International Signal & Control, (ISC) is the controversial player in this web
of conspiracy. In 1987, the third largest employer in Lancaster County, a non-discrete
defense contractor. In all due respect to our beloved country, this report is in no way
challenging the policies or the activities of the Department of Defense, or the vast
agencies of the Intelligence Community, especially the CIA or the NSA (National
Security Advisory). with regards to ISCs foreign dealings. Trying to protect the world of
malicious and evil empires is a process which never ends, and whos players are
constantly changing. And our respective intelligence agencies are continually challenged
with the task of trying to make a difference, in accordance with protecting our national
security. Unfortunately, given the nature of their discrete activities, and given the CIAs
history of avoiding congressional approval in certain situations, our current laws are void
of effectively dealing with the peripheral catastrophes of such activities that inherently
transpire. The CIA remains immune, while everyone outside suffers the consequences.
The fact that the CIA, or anyone of the other intelligence community, may have
been involved, does not grant a blanket of immunity over activities which were not
material to protecting our national security. If a company provides a service to anyone in
the intelligence community, our constitution, our laws, and its respective commercial
regulatory authorities, must still have the full sense of their jurisdiction. The intelligence
community may not have the right of intervention into the commercial enterprise, or
organization, circumventing the rights of its employees, shareholders, creditors, and
customers. No United States law or statute suggests that there is any involuntary
mandate that requires any of the preceding to compromise their interests in the
respective enterprise for the sake of national security, or the respective intelligence
agency. There must be considerations paid to all involved for those rights and interests
that compromise
such a relationship. Otherwise, the CIA could effectively gain control of any domestic
corporation it so desires, without ever owning one share of its outstanding stock, simply
by enlisting its product or services for the sake of national security. The CIA requires a
formal vehicle to enlist the aid of our domestic commercial enterprises. ISC is a proven
and unfortunate example of that.
This victim was a shareholder of record of International Signal & Control (ISC) for
the previous four years prior to when this tragic ordeal began. The victim was to
purchase the stock from now Republican Pennsylvania Senator Gib Armstrong, who was
in the brokerage business at the time and selling ISC stock. The stock was sold over the
London Securities Exchange, supposedly for reasons to suppress information. The victim
was interested in the stock because of his appetite for technology, and was more curious
about the business of ISC, than anything. In fact, the victim had never made any
inference to any of the illicit dealings with Iraq. However, the perpetrators of this story,
attempt to hide behind a vale of national security," in an effort to find legal immunity
from all wrongdoing. In accordance, the record will prove that this is merely a smoke
screen used to intimidate and obstruct the victims access for due process of the law.
The emotional response to the truth of this story is compelling, to say the
least. Subsequently, the startling keen sense of perception that the victim had
demonstrated, is even more intriguing. It is this extraordinary quality that is responsible
for saving his life, while yet at the same time providing his perpetrators with an alibi and
a vehicle for discrediting his startling allegations and his story. This story embellishes a
dichotomy of perception that had Hollywood producers from his film project call his work
genius, while his perpetrators from the Lancaster County Community conveniently and
maliciously labeling him as insane and emotionally disturbed."
THE LANDSCAPE
The perplexing question of the victims intelligence, or lack thereof, is best
analyzed as a question of perception. However it terms of the legal consequences of the
activities contained herein, they are of little if any relevancy. The fact of the matter is
that the mental deficiencies have very little relevancy to this story, other than serving
as a means to discredit the victim, a vehicle to facilitate the cover up, and a blanket of
immunity for all of the perpetrators.
The heart of this victims legal dogma is best described as follows: If a person, is
perceived to have a mental deficiency; yet whose actions and decisions are always
proven to be instinctually and amazingly prudent, always abiding within the law, and in
the best interest of his affairs, what rights and protection do the laws afford him from
persons abusing that perception, in order to yield political and financial rewards, as a
direct consequence of his demise? Furthermore, how does the law protect his rights, if
any and all malicious acts against this victim, are constantly and immediately
disregarded because he is perceived to not to be credible? As this story unfolds, these
questions will become even more troubling and appalling. Although the victim could
never describe the pain of his trauma, he would often say that the closest situation that
may compare is that of a woman being continuously raped, night after night, helplessly
praying for relief, struggling to free herself from her captor, all with no avail. He would
call it as being brain f------.
The victim, coming from the lower middle class of Lancaster City, was only 29
years old when this tragedy began. Coming from a broken home, he was the third of six
boys. While at a very young age, he would help his mother run a dry cleaning business,
in an amazing similarity like Lisa Michelle Lambert, he had also nursed his mother during
bouts of depression. While in high school, he was nursing his mothers depression, while
at same time tending to his older brothers bouts of schizophrenia. The victim had
learned to listen to the obscenities of mental illness since he was a child. He learned to
fill the shoes of his absent father in helping his mother raise his three younger brothers..
The victim was often called the little old man because of his extraordinary maturity as
a child. The victim was determined to break the barrier of the Good Ole Boys club or
the power elite, and had always felt a sense of compassion for those less fortunate, and
those neglected by those of material means, the oppressed and impoverished. He had an
undivided aspiration to someday make a difference to those that could not help
themselves, especially his older brother. Through his ingenious, resourceful, and honest
business approach, he was relentlessly growing his business and their respective
In 1986, after serving on the Board of Directors for the Central Pennsylvania
Chapter of International Association of Financial Planners (IAFP), the victim had made a
large contribution to increasing its membership and its awareness among local
professionals, as its vice president. In an effort to promote the organization, the victim
solicited a nationally recognized and prominent financial planner from Washington, D.C.,
to be a headline speaker at a dinner meeting. Ms. Alexandra Armstrong, one of the most
nationally recognized financial planners, often headlined in Money Magazine, attracted
100 industry professionals to the Treadway Resort Inn. The attendance was
unprecedented for the local IAFP chapter. The IAFP is the authoring organization for
certification as a financial planner. It was through the direct conversations with Ms.
Armstrong regarding his ideas and her experience, that inspired the victim to pursue his
ambitions of growing his own financial firm, which he began in the following months.
Disgruntled with the conflicts of interest and the lack of incentive for various
professionals to work together in managing ones wealth, a process which lacked
efficiency, this entrepreneur founded the firm Financial Management Group, Ltd., or
FMG as it was often called. The firm was to incorporate a one-stop-shopping strategy
and incorporate financial services, legal, accounting, tax preparation, real estate,
insurance, mortgage banking, and estate services all in one firm, all residing in one
location, all taking advantage of the synergistic approach toward managing wealth. And
to provide the professionals long term security and equity participation, all participants
were encouraged to purchase stock in the company. This was a new and innovative
approach that attracted a lot of attention from investors and clients, but also came a lot
of nervous twitches from competitors, especially in conservative Lancaster County.
The victim began recruiting professionals from all of the other firms, with great
success. He had enlisted two partners whom he had worked with at IDS/American
Express, to carry out his mission, which he began after extensive market studies and his
early version of the company, Pro Financial Group, Ltd., His two partners had followed
the victim to an independent broker dealer in Atlanta, named Financial Services
Corporation, where Ms. Alexandra Armstrong was associated, and encouraged the victim
to visit, during their discussion after dinner. Within one year, by June of 1987, the firm
had invested over $40 million for respective clients.
Ltd, and President of FMG, Advisory, Inc., which was one of the many subsidiaries parent
company owned. The victim acted as the architect and legal administrator of the
organization, in addition to building his own financial planning clients. He filed all of the
articles of incorporation in the Commonwealth of Pennsylvania and submitted all of the
tedious and rigorous filings necessary for the Pennsylvania Securities Commission, which
were very demanding considering the victim was selling stock of his company to his
associates and investors. The victim and his associates had also attracted some very
prominent Lancastrianss to invest in his venture, coming from various professional
circles, all infatuated with this extraordinary and intriguing concept of this young victim.
All had seen its potential for success and financial reward.
Many of his friends were involved, and in Lancaster, everyone knows everybody, so
it seams.. And everyone talks, gossip is as common as jogging. This exaggerated trait of
Lancaster County, will later to come back to haunt this victim, in a way that is most
sickening. In a way that will parallel the attitudes and sentiments in the Lisa Michelle
Lambert story.
In 1987, his business affairs were reaching a point of incredible success. In fact,
most of his family and friends, have always questioned the merits of their legitimacy. He
always conducted his affairs with the presumption that time could not afford the
opportunity to complete his agenda, while at the same time disclosing his business affairs
to persons that were not directly involved.. Accomplishing his mission was first and
foremost. But in Lancaster County, that was difficult. Lancastrianss have a notion to fear
what they dont know, and will always believe what they think they know, regardless of
its merits. In Lancaster County new ideas are shunned unless coming from their own,
and their own ideas are often kept close at bay, inhibiting progress and stymieing
learning. By June of 1987, a majority of his business affairs were conducted out of the
grasp of Lancaster County, his unknown activities made others curious, especially in
Lancaster County, where the blessing of the power elite was essential for success. But,
deep down inside, he knew he could never be accepted, because he did not descend from
a family of social grace. This fueled his aspirations for success even further, committed
to prove that intelligence was innate and learned, not a direct correlation to material
wealth or social grace.
One of his most cherished testimonials to his concept, his reputation, and his
mission, was provided by an elder attorney, Mr. Kenellm Shirk, a very respected and
prominent older Lancaster attorney, who was part of the status quo. Mr. Shirk had
petitioned the Pennsylvania Bar Association, after meeting with the victim, to obtain
their blessing and their knowledge of any laws which would forbid his firm to provide a
satellite office in the headquarters of Financial Management Group, Ltd., (FMG) Mr. Shirks
firm was to provide a partner, and estate services to the clients of FMG. The Pennsylvania
Bar provided a lengthy recommendation that did not prohibit a relationship, although
cautioned it to proceed with careful review. The fact that the very young and unknown
victim could attract an elder, conservative Lancaster County attorney to associate with
his firm was an encouraging sign of respect. Ironically, Mr. Shirk is the father of Roy Shirk
Jr., Lisa Michelle Lamberts first attorney who represented her during trial of 1992, the
proceeding which was the center of Judge Dalzalls controversial and appalling findings.
The victim prided himself on his entrepreneurship , and after building the foundation for
FMG, he set out to take advantage of its resources and its synergism.
By June of 1987, the victim had developed a fairly substantial mortgage banking
relationship with a Houston, Texas banker. That operation was capable of providing
lending to potential developers and businesses in the range of $ 3 million to $100 million.
And the lending packages were as competitive if not more competitive than the local
lending institutions of Lancaster County, capable with even higher lending limits. In a
matter of months of securing this relationship, the victim and his partner were
evaluating deals from Pennsylvania, New Jersey, New York, Florida, and as far away as
California.
There was a uniqueness to his capabilities that was very appealing to potential
borrowers. Because of the vast array of services of FMG, potential developers had the
opportunity to obtain both debt and equity financing through his companies. In plain
terms, most shopping centers raised capital by raising funds through investors coupled
with a mortgage. This gave potential developers one place to take down the deal rather
than dealing with many other professionals at the same time. It was a much more
efficient process for all. The victim was capable of providing a mortgage, while at the
same time selling shares in a shopping center through its vast client base of investors at
FMG. This also gave the victim a formidable presence into the venture capital markets,
by way of his strong ability to raise capital through his vast portfolio of clients of FMG.
And this was a rarity that developers and investors loved. Investors were attracted
because they could invest in equity type real estate projects with real sense of knowing
the developer, or kicking the bricks of the project. This was far different than investing
in a nationally syndicated project, with properties scattered all over the country, and with
developers that they did not know. The synergistic approach to his organization began
paying dividends by developing other peripheral markets and businesses.
Given the complex nature of the victims design of FMG, internal struggles within
the organization readily became the challenge. Orchestrating the relationships among all
of the different professionals, and trying to adhere to the interests of the clients, the
professionals and of the firm, FMG, managing the daily activities required immense
thought and prudence on the part of the principals. Of, course, the victim assumed
honesty and integrity to be a given. And for most it was. However there were times when
the senior partner engaged in tactical rights of power.
In the later part of 1986, after the victim had developed FMG to the point where
its future was on stable grounds, his two partners conveniently attempted to circumvent
his position and regain control of his stock and the firm. In fact, after the victim refused
to collaborate on a scheme to set up his other partner, the remaining two partners
began to attempt to regain the victims control. Through intimidating techniques, the
partners began to attack his presence. The victim became agitated, especially because
he played the lead role and was responsible for the formation of the company,
methodically designing and developing its foundation, with great success. And now after
the company was beyond its point of greatest risk, due to in large part the victims
efforts, the other two partners wanted to take advantage of his work, and take the
cream of the pie for their own financial gain. It was a difficult task to carry out because
the victim was the most respected of all three partners, consistently keeping their
respective policies in the best interest of the firm and of the other associates and
stockholders. In fact, most feared that the loss of control of the victim would ultimately
lead to adverse consequences. However the two partners trued unsuccessfully to weaken
his position, and when that didnt work, they focused on weakening the victim, via
intimidation and humiliation The coup and hostile environment caused a state of
depression for the victim, although he kept to his daily duties and responsibilities,
accordingly, he called a client and friend who was a psychiatrist, whom he trusted and
respected. It was easy access to a professional, yet on a very informal basis. Because the
victim had a family history of mental deficiencies, he wanted to seek the proper help.
The psychiatrist had diagnosed the victim as having Bi Polar Mood disorder. The
psychiatrist had quickly discounted any correlation between the current state of affairs,
and his partners abuse. The psychiatrist rationale was that because the startup of the
company was so successful in such a short period of time , and his demonstrated
intelligence and creativity, the victim must have been in a state of mania, and of course
now, was subsiding in a state of depression, the typical cycle for manic depressants. The
victim complied with the psychiatrist. And after refusing to sell out to his partners,
vowed to regain his business and rescind any efforts to give up his claim to his
accomplishments. The depression soon faded. The victim never disclosed the fact that
he had sought help to anyone other than family members. This coup lead to the victims
aggressive approach to grow the business, and to posture himself in projects that would
ultimately remain in his control, out of the influence of his partners. Particularly the
mortgage banking activities and the digital movie, which he did successfully, but
apparently too successfully.
Tony was looking to finance his new project, which was to be the first digital
movie. And, given the victims extreme appetite for technologies, coupled with his
amazing sense of perception, he dramatically recognized the future evolution for the
technical merits of delivering digital video and digital audio entertainment to the mass
markets. By June of 1987, the victim was positioned as the Executive Producer,
collaborating with Flatbush Films of Hollywood California, the movie producers, entrusted
with the mission of finding investors to provide funding for the first digital movie, and
to manage the ensuing business elements it required.
The movie was to be shot on-location at the Jersey shore points, mostly in
Wildwood. Tony strategically envisioned making a movie in the horror genre. There were
several specific reasons that supported this strategy. First, he determined that it was the
least expensive format to produce, we all estimated a budget of $4 million for the
production and post production. Secondly, the horror genre would compliment a very
intense sound track. The sound track was important to enhance the new digital format,
and also provide the means to introduce a new band that he had been grooming in his
studio for the past several years, French Lick, his predecessor to Bon Jovi. There had
been bad blood between Tony and his cousin Bon Jovi, which resulted in legal disputes
pertaining to Tonys financial interests in Jons success. It was an unfortunate situation
considering Tonys father and Jons father were brothers living in the same area. It was a
subject that Tony never wanted to discuss, except for his contributions toward Jons
career.
If by another act of fate, the victim had the privilege of meeting one of the many
superstars while working at Power Station studios. While growing up, at an early age, the
victim would sneak up into the bedroom of his oldest brother, and start up his old
General Electric stereo phonograph and listen to his favorite album - Diana Ross and the
Supremes. It was a passion and a ritual that provided an early infatuation to music, and
to Diana Ross. The victim was only 10 or 11 years old. And at this early age, he noticed
and listened to the annoying hiss, that conventional hiss that always seemed to
overshadow the music, whether played on an album, on the radio, 8-track tape, or
cassette.
And so, the digital movie project that the victim had embraced in 1987 had
personal significance, and he never ever doubted his instincts regarding the technical
merits of the project. The victims perception that the entertainment industry would
deliver full length motion pictures in a truly digital medium will later become a truly
remarkable vision.
The technical merits of this project and at this particular time with respect to the
victims extreme sense of perception require analysis. To truly understand this time
perception, some of the attributes of digital technologies need to be fully understood. In
1987, Compact DISC (CD) technology was only now being introduced to the commercial
markets. The victims own crafting of his joint venture proposals, dominated by the term
digital movie, is in itself some 4 or 5 years away. In 1987, there was very little use of
the term digital, with the exception of research and development engineers. The victim
will, throughout the documentation of this story, will have preceded a terminology that
has literally become the root of most technological advancements in the computer and
telecommunications industries of our present day, 10 years after the victims vision.
Today, digital is found to be part of or referred to in just about every product available
During May of 1987, the victim had created a joint venture proposal for SONY
Entertainment, Inc., for the digital movie. After weeks of researching the current state-
of-affairs within SONY, and after his proposal was completed, SONY publicly announced
their desire to open the markets for new and emerging technologies on the cover of
TIME magazine, another demonstrated sense of perception. It was this proposal, when
delivered to one of the Hollywood producers in Santa Monica, California, after reading a
draft of the proposal she said you are a genius. The proposal was introduced to Tony
Bongiovi at the Wildwood Boardwalk, where many of scenes were to be shot, and he
approved of the proposal and thought that it had great merits. Tony, who wanted very to
do with the business elements of his project, gave the victim complete authority to
secure the financing of the project, with a salary as Executive Producer, and a percentage
of the profits on the back end.
After review of the victims research and proposals, his vision and his passion,
unfortunately without his efforts, has come to be known as Direct Satellite System, or
DSS, which is Sonys satellite entertainment system (TV), delivering digital audio and
digital video entertainment. That technology is fast eroding at the cable industry. The
victim had his patent research center around the PSDMS system, the Power Station
Digital Movie System. And that was in 1987, some seven years before SONY delivered his
dreams. Later the victim would also accurately predict that the 90s would become the
Information Age because of the direct contributions and advancements of digital
technologies, which is directly responsible for the development of the INTERNET.
The victims obsession with his digital movie has proven to be one of his most
remarkable demonstrations of his keen sense of perception.
___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP
Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566
Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?
Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &
Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566
In Re:
STANLEY J. CATERBONE, APPELLANT
OPENING STATEMENT
re OBSTRUCTION OF JUSTICE IMPEDIMENTS
HEARING DATE THURSDAY, AUGUST 31, 2017 1:00pm
PROPOSED REMEDY:
1. SUMMARY JUDGEMENTS IN ALL CIVIL ACTIONS BY THE APPEALLANT SINCE
2005 IN FEDERAL AND STATE COURTS
2. A SECURE INTERNET LINE
3. ENHANCED SECURITY OF ALL REAL PROPERTY
4. SPECIAL TRAINING OF ALL LAW ENFORCEMENT IN DEALING WITH ALL
RELATED ISSUES
5. MANDATED MEDIA BLITZES TO DISCOURAGE ORGANIZED STALKING GROUPS
The Plaintiff alleges that he has been a prisoner of the state since 1987, and that the
activities surrounding the APPEALANT'S life has escalated into a daily occurrence of assaults.
Unfortunately while the APPEALANT has made many in person complaints to just about every law
enforcement agency, the most recent to the Manheim Township Substation in Lancaster Township
regarding an assault at the Manor Shopping Center minutes previously (December 9, 2015
9:00pm), the pleas for help and assistance have yielded nothing but more attacks to the
APPEALANT'S person, property, electronics, home, auto, reputation, intellectual
property, and lastly his mental state-of-mind A BRUTAL ARRAY OF PSYCHOLOGICAL
TORTURE. The APPEALANT has already made claims of COINTELPRO-like tactics in his
filings in the U.S.C.A. Case No. 15-3400 against these same said actors and
perpetrators. The APPEALANT will provide evidence to support this writ and offer a
final remedy and redress in accordance with federal law.
Due to the actions and criminal activity of the above named DEFENDANTS, it is reasonable
to prove that every aspect of the Complainants life, Stan J. Caterbone, is subject to undo
influence; harassment; torture; obstruction; etc. thus resulting in irreparable harm and injury.
This situation and set of circumstances as outlined here, and in Part II, Finding of Facts, and all
previous filings; reports; and statements, is a prescription for only one endgame - death or
suicide. There is no life action or activity that is immune from this horrendous HATE CRIME. The
precedent and landmark elements that make this so appalling is that the Complainant has never
done anything to set these circumstances in motion but to be right regarding International Signal
& Control back in 1987; as well as many other proclamations and forecasts. That being said, it is
also widely reported that many Targeted Individuals and Victims of U.S. Sponsored Mind Control
are lead to death and/or suicide. The Lancaster Community-At-Large is guilty of creating;
abetting; fostering; and executing this tragedy. The fact that local; state; and federal law
enforcement induce and encourage this environment of hate is landmark.
I have been the victim of a widespread civil and criminal conspiracy that dates back to
1987, made up of the very same actors that Kathleen Kane is up against, the "good old boys". In
1987 I blew the whistle on a local company, International Signal & Control, or ISC, that was
indicted for selling arms and weapons to Iraq via South Africa with the aid and support of the CIA
and the NSA. It was the 3rd largest white collar crime at that time, valued at $1 Billion Dollars. I
was the victim of a widespread wholesale cover-up through an elaborate slander campaign that
included 29 false arrests, multiple false imprisonments, and a fabricated mental illness record that
to this day is still resonating.
Kathleen Kane must be commended for her courage and her determination for taking on
this culture of arrogance and total disregard for the U.S. Constitution and the rule of law that they
so emphatically espouse to uphold. They believe and conduct their affairs in a manner that
suggests they are above the law and we, the Pennsylvania taxpayers, are beneath the law. The
sad fact that it reaches into the judiciary and law enforcement agencies is undeniably the most
outrageous and deplorable truth to this scandal. Case in point, until yesterday I was the
APPELLANT in a case before the U.S. Third Circuit Court of Appeals that involves the Habeus
CORPUS for convicted and imprisoned Lisa Michelle Lambert. A murder case in the early 1990's
that was made famous when in 1997 U.S. District Judge Stewart Dalzell found her actually
innocent due to "one of the worst cases of prosecutorial misconduct in the English speaking
language" and released her from prison. The case drew nationwide attention when then
Pennsylvania Attorney General, then Mike Fischer, enlisted the help of 9 other state attorney
generals to curtail the reach of the federal bench in state matters concerning Habeus CORPUS
cases. To make matters worst, 38,000 Lancastrians signed petitions to remove the Honorable
Stewart Dalzell from the federal bench.
Mike Fisher and company won and Lisa Michelle Lambert was back in prison within 9
months while the case went back to the Lancaster County Court of Common Pleas. The Honorable
Judge Lawrence Stengel held a bench hearing where she was again found guilty and sentenced to
life in prison. The case was covered by the LA Times in a multi-part Sunday series, A&E producer
Bill Curtis did a 48 Hours special, and Lifetime Movies made it into a prime time movie.
This year, these "Good Old Boys" made it so difficult for me to litigate my efforts to free
Lisa Michelle Lambert, that I had to dismiss my appeal and effectively withdraw as her MOVANT
and Advocate. I was trying to persuade the courts that my own demise was the result of the same
type of wholesale prosecutorial misconduct by some of the very same principals that Lisa Michelle
Lambert fell victim to. My efforts were so distasteful to the powers to be that her court appointed
attorney threatened me with criminal prosecution for no other reason than I might actually be
successful in helping her win the Habeus CORPUS she filed in May of 2014. I allege the U.S.
District Judge was trying in vain to invalidate and derail my own federal court cases that seek to
restore me to whole from a life of ruin, misery, torture, and financial collapse.
For the record, I founded a financial firm in the 1980's that reached 5 states and raised
some 90 million dollars in a matter of 9 months. In the late 1980's and early 1990's I was one of
5 domestic companies that had the capabilities of manufacturing CDROM's that included a client
list that reached across the globe and included government agencies and fortune 500 companies.
And in 1987, myself and a genius recording engineer named Tony Bongiovi and his famous
recording studio, Power Station Studios of New York, were developing and producing the first
"digital movie". The intellectual property rights and the RICO statutes that apply to my legal
claims in federal courts were too much for the "Good Old Boys" to handle....
In a December 30 editorial to the Washington Post titled Pornographic email scandal roils
Pennsylvania politics regarding the jurisprudence in the Commonwealth of Pennsylvania the
"Anyone who neutrally looked at Pennsylvania and tried to gauge the quality of
jurisprudence in the state would have to laugh and say, What in the world is going on
there? . . . Our justice system is about as out of control as it can get. "EDITOR:
These matters cannot properly be settled within Pennsylvania. Everybody from the
prosecutors, to the attorney general, to the justices have skin in the game. It is time for
these matters to be given over to U. S. Attorney General so assure as close to a
disinterested investigation as circumstances permit."
On March 8, 2016 I was illegally detained, handcuffed and interrogated by no less than
eight (8) National Security Agency Police in the barracks of Ft. Meade Maryland with no probable
cause for approximately 2 hours. My auto was searched and sniffed by the NSA CANINE UNIT. I
was interrogated about events from 1987 to the present involving my Whistleblowing activities,
my litigation, my mental health record and my intent on why I was traveling to Washington, D.C.
I was commanded not to continue on to Washington, D.C. And was commanded not to enter any
federally owned property again. I left the barracks and proceeded home to Lancaster, PA.
In July of 2005 at a military museum (Open to the Public) on a military base I was
detained and interrogated by two (2) Defense Intelligence Agents, or DIA of the Department of
Defense in Austin, Texas for about 1 hours for no probable cause. I was asked the same
questions as above and was not allowed to leave until the agents verified that I was staying with
my brother, Dr. Phillip Caterbone, who at the time resided in Austin, Texas. I was commanded not
to ever enter a military base again.
The Courts must consider UNJUST ENRICHMENT in this case. (Wikipedia, The Free
Dictionary by FARLEX) - A general equitable principle that no person should be allowed
to profit at another's expense without making restitution for the reasonable value of
any property, services, or other benefits that have been unfairly received and retained.
Although the unjust enrichment doctrine is sometimes referred to as a quasi-
contractual remedy, unjust enrichment is not based on an express contract. Instead,
litigants normally resort to the remedy of unjust enrichment when they have no written
or verbal contract to support their claim for relief. In such instances litigants ask a
court to find a contractual relationship that is implied in law, a fictitious relationship
created by courts to do justice in a particular case.
"I'm being followed everywhere I go", "it seems like they are everywhere", "it's like they
can read my mind and know where I'll be"...these are the types of statements, that while actually
quite accurate (keep reading), can easily make a targeted individual appear to have lost their
mind. In order for it to make more sense, let's once again review who is now orchestrating this
abuse against a targeted individual. Our military (essentially our international police force) and
our intelligence community are in control. This harassment campaign has reached the highest
levels of our government and as such, the resources at their disposable are truly unimaginable. Is
it just the military perpetrating this harassment campaign? Of course NOT! They have simply been
handed control. What this means for a targeted individual is that EVERY law enforcement tool
available from your local community watch, community organizations (ie Freemasons) and
"concerned citizen" types all the way up through Homeland Security including the U.S. military
have placed YOU in their cross hairs. If you are a targeted individual your conversations are being
monitored (whether inside your home, your car, your office, and obviously your telephone), your
movements and actions are constantly being monitored (whether inside your home or out in
public), your electronic correspondence is being monitored (email, websites you visit, letters you
write on your computer, etc) - you are being WATCHED! 24/7/365. Again, this isn't your local
Sheriff sitting in an "unmarked" patrol car eating his donut on a stakeout. A targeted individual
has every known (AND classified) technology being deployed, and most likely TESTED, against
them. Understand it and deal with it in a logical and sensible manner. I don't mean to alarm you,
but this is the unfortunate reality that any targeted individual now finds them self in. Maybe it's a
little clearer now HOW "they" can be everywhere you go and seem to be able to "read your mind".
Targeted individuals are not crazy - but be very careful...the perception of mental illness is one of
the many traps a program like this was designed to create. If not the actual illness itself.
So, besides an absolute abomination of a targeted individuals right to privacy, what other tactics
are being deployed against a targeted individual. The hardest to prove and the most criminal
tactic used (especially when a target has 3 young & developing children in the home such as
myself) is a continuous poisoning and torture of the target by invisible directed electromagnetic
radiation. If this is a new topic to you, it may be unclear exactly what electromagnetic radiation
(EMR) is. After all, it's not exactly the kind of topic an average American is thinking about. Well, to
name a few examples, electromagnetic radiation ranges from radio frequency waves (RF) to the
more destructive & potentially deadly ionizing forms of x-rays and gamma rays. In the lower to
mid spectrum there are also radar waves, microwaves, ultraviolet and infrared light waves.
What I noticed when this harassment campaign began for myself toward the end of 2005 was the
continuous jet plane(s) that suddenly began flying "holding patterns" for extended periods of time
above & around my home. My theory is that these planes are equipped with sophisticated radar
imaging technology. Possibly very high powered infrared imaging cameras as well. Rather than
using these electromagnetic radiation devices to "search" for something, in the case of a targeted
individual these devices are used to slowly poison and "overload" the targeted individual with
continuous high doses of directed electromagnetic radiation. Once a targeted individuals body has
been properly overexposed over a period of time (months), other portable devices may then be
used to keep a target in a constant state of agitation and dis-ease. And for the more fragile
among us, maybe even death! This tactic can be the premier form of making a target seem crazy
by forcing them to report what appear to be insane accusations against neighbors, the people
"following them everywhere", planes over their home and the government. Another obvious
reason for deploying this invisible & silent torture tactic is to provoke a targeted individual to lash
out in sheer frustration and anger against the closest person (who most likely has absolutely
nothing to do with the ongoing abuse). Essentially, this is the ultimate version of entrapment. And
may even be the ultimate, basically unprovable form of a state-sanctioned murder!
COINTELPRO
FBI records show that COINTELPRO resources targeted groups and individuals that the FBI
deemed subversive,[4] including anti-Vietnam War organizers, activists of the Civil Rights
Movement or Black Power movement (e.g., Martin Luther King, Jr. and the Black Panther Party),
feminist organizations, anti-colonial movements (such as Puerto Rican independence groups like
the Young Lords), and a variety of organizations that were part of the broader New Left.
FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to
"expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate" the activities of these
movements and especially their leaders.[5][6] Under Hoover, the agent in charge of COINTELPRO
was William C. Sullivan.[7] Attorney General Robert F. Kennedy personally authorized some of
these programs.[8] Although Kennedy only gave written approval for limited wiretapping of King's
phones "on a trial basis, for a month or so",[9] Hoover extended the clearance so his men were
"unshackled" to look for evidence in any areas of King's life they deemed worthy.[10]
History
Centralized operations under COINTELPRO officially began in August 1956 with a program
designed to "increase factionalism, cause disruption and win defections" inside the Communist
Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of
documents that would divide the American communist organization internally.[11] An October
1956 memo from Hoover reclassified the FBI's ongoing surveillance of black leaders, including it
within COINTELPRO, with the justification that the movement was infiltrated by communists.[12]
In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon,
and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders
of George W. Lee, Emmett Till, and other blacks in the South.[13] When the Southern Christian
Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the
group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and,
eventually, Rev. Martin Luther King, Jr.[14]
After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major
target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:
In the light of King's powerful demagogic speech. ... We must mark him now, if we have not done
so before, as the most dangerous Negro of the future in this nation from the standpoint of
communism, the Negro, and national security.[16]
Soon after, the FBI was systematically bugging King's home and his hotel rooms, as they now
were aware that King was growing in stature daily as the leader among leaders of the Negro
movement.[17]
In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the
use of terrorism by white supremacists. Hoover responded by publicly calling King the most
"notorious liar" in the United States.[18] In his 1991 memoir, Washington Post journalist Carl
Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to
commit suicide.[19] Historian Taylor Branch documents an anonymous November 21, 1964
"suicide package" sent by the FBI that contained audio recordings of King's sexual indiscretions
combined with a letter telling him "There is only one way out for you. You better take it before
your filthy, abnormal, fraudulent self is bared to the nation." And even by 1969, as has been
noted elsewhere, "[FBI] efforts to 'expose' Martin Luther King, Jr. had not slackened even though
King had been dead for a year. [The Bureau] furnished ammunition to conservatives to attack
King's memory, and...tried to block efforts to honor the slain leader." [20]
During the same period the program also targeted Malcolm X. While an FBI spokesman has denied
that the FBI was "directly" involved in Malcolm's murder, it is documented that the Bureau worked
to "widen the rift" between Malcolm and Elijah Muhammad through infiltration and the "sparking
of acrimonious debates within the organization," rumor-mongering, and other tactics designed to
foster internal disputes; which ultimately led to Malcolm's assassination.[21][22] The FBI heavily
infiltrated Malcolm's Organization of Afro-American Unity in the final months of his life. The
Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men
who plotted Malcolm's assassination were never apprehended and that the full extent of the FBI's
involvement in his death cannot be known.[23][24]
Amidst the urban unrest of JulyAugust 1967, the FBI began "COINTELPROBLACK HATE", which
focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC),
the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of
Racial Equality (CORE), and the Nation of Islam.[25] BLACK HATE established the Ghetto
Informant Program and instructed 23 FBI offices to "disrupt, misdirect, discredit, or otherwise
neutralize the activities of black nationalist hate type organizations".[26]
A March 1968 memo stated the program's goal was to "prevent the coalition of militant black
nationalist groups" ; to "Prevent the RISE OF A 'MESSIAH' who could unify...the militant black
nationalist movement" ; "to pinpoint potential troublemakers and neutralize them before they
exercise their potential for violence [against authorities]." ; to "Prevent militant black nationalist
groups and leaders from gaining RESPECTABILITY, by discrediting them to...both the responsible
community and to liberals who have vestiges of sympathy..."; and to "prevent the long-range
GROWTH of militant black organizations, especially among youth." Dr. King was said to have
potential to be the "messiah" figure, should he abandon nonviolence and integrationism;[27]
Stokely Carmichael was noted to have "the necessary charisma to be a real threat in this way;" as
he was seen as someone who espoused a much more militant vision of "black power."[28]
This program coincided with a broader federal effort to prepare military responses for urban riots,
and began increased collaboration between the FBI, Central Intelligence Agency, National Security
Agency, and the Department of Defense. The CIA launched its own domestic espionage project in
1967 called Operation CHAOS.[29] A particular target was the Poor People's Campaign, a national
effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and
disrupted the campaign on a national level, while using targeted smear tactics locally to
undermine support for the march.[30]
Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961),
the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New
Left social/political movement, which included antiwar, community, and religious groups (1968). A
later investigation by the Senate's Church Committee (see below) stated that "COINTELPRO began
in 1956, in part because of frustration with Supreme Court rulings limiting the Government's
power to proceed overtly against dissident groups ..."[31] Official congressional committees and
several court cases[32] have concluded that COINTELPRO operations against communist and
socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of
freedom of speech and association.[1]
Program exposed
The program was successfully kept secret until 1971, when the Citizens' Commission to
Investigate the FBI burgled an FBI field office in Media, Pennsylvania, took several dossiers, and
exposed the program by passing this material to news agencies.[33] Many news organizations
initially refused to publish the information. Within the year, Director J. Edgar Hoover declared that
the centralized COINTELPRO was over, and that all future counterintelligence operations would be
handled on a case-by-case basis.[34][35]
Additional documents were revealed in the course of separate lawsuits filed against the FBI by
NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976
the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of
the United States Senate, commonly referred to as the "Church Committee" for its chairman,
Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO.
Journalists and historians speculate that the government has not released many dossier and
documents related to the program. Many released documents have been partly, or entirely,
redacted.
The Final Report of the Select Committee castigated conduct of the intelligence community in its
domestic operations (including COINTELPRO) in no uncertain terms:
The Committee finds that the domestic activities of the intelligence community at times violated
specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal
questions involved in intelligence programs were often not considered. On other occasions, they
were intentionally disregarded in the belief that because the programs served the "national
security" the law did not apply. While intelligence officers on occasion failed to disclose to their
superiors programs which were illegal or of questionable legality, the Committee finds that the
most serious breaches of duty were those of senior officials, who were responsible for controlling
intelligence activities and generally failed to assure compliance with the law.[1] Many of the
techniques used would be intolerable in a democratic society even if all of the targets had been
involved in violent activity, but COINTELPRO went far beyond that ... the Bureau conducted a
sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment
rights of speech and association, on the theory that preventing the growth of dangerous groups
and the propagation of dangerous ideas would protect the national security and deter violence.
[31]
Range of targets
At its inception, the programs's main target was the Communist Party.[36]
According to the Church Committee:
While the declared purposes of these programs were to protect the "national security"
or prevent violence, Bureau witnesses admit that many of the targets were nonviolent
and most had no connections with a foreign power. Indeed, nonviolent organizations
and individuals were targeted because the Bureau believed they represented a
"potential" for violenceand nonviolent citizens who were against the war in Vietnam
were targeted because they gave "aid and comfort" to violent demonstrators by
lending respectability to their cause.
characterize as black nationalist but which were in fact primarily black." Thus, the
nonviolent Southern Christian Leadership Conference was labeled as a Black
Nationalist-"Hate Group."
Furthermore, the actual targets were chosen from a far broader group than the titles of
the programs would imply. The CPUSA program targeted not only Communist Party
members but also sponsors of the National Committee to Abolish the House Un-
American Activities Committee and civil rights leaders allegedly under Communist
influence or deemed to be not sufficiently "anti-Communist". The Socialist Workers
Party program included non-SWP sponsors of anti-war demonstrations which were
cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black
Nationalist program targeted a range of organizations from the Panthers to SNCC to
the peaceful Southern Christian Leadership Conference, and included every Black
Student Union and many other black student groups. New Left targets ranged from the
SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch
College ("vanguard of the New Left") to the New Mexico Free University and other
"alternate" schools, and from underground newspapers to students' protesting
university censorship of a student publication by carrying signs with four-letter words
on them.
Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal,
contained in the Church Committee report:[37]
1. President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams
to the White House opposing his "national defense" policy and supporting Col. Charles
Lindbergh.
3. President Eisenhower received reports on purely political and social contacts with foreign
officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O.
Douglas.
4. The Kennedy administration had the FBI wiretap a congressional staff member, three
executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F.
Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic
listening device targeting a congressman, both of which yielded information of a political
nature.
5. President Johnson asked the FBI to conduct "name checks" of his critics and members of
the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political
intelligence on his critics in the Senate, and received extensive intelligence reports on
political activity at the 1964 Democratic Convention from FBI electronic surveillance.
6. President Nixon authorized a program of wiretaps which produced for the White House
purely political or personal information unrelated to national security, including information
about a Supreme Court Justice.
organizations and individuals associated with the Civil Rights Movement, including Rev. Dr.
Martin Luther King, Jr. and others associated with the Southern Christian Leadership
Conference, the National Association for the Advancement of Colored People, the Congress
of Racial Equality, and other civil rights organizations
a broad range of organizations labeled "New Left", including Students for a Democratic
Society and the Weathermen
almost all groups protesting the Vietnam War, as well as individual student demonstrators
with no group affiliation
nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and
Cuban exile movements including Orlando Bosch's Cuban Power and the Cuban Nationalist
Movement;
The COINTELPRO documents show numerous cases of the FBI's intentions to prevent and disrupt
protests against the Vietnam War. Many techniques were used to accomplish this task. "These
included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing
violent confrontations as an alternative to massive, peaceful demonstrations." One 1966
COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support
for the antiwar movement.[39]
Methods
Body of Fred Hampton, national spokesman for the Black Panther Party, who was murdered[40]
[41] by members of the Chicago Police Department, as part of a COINTELPRO operation.[42][43]
According to attorney Brian Glick in his book War at Home, the FBI used four main methods
during COINTELPRO:
1. Infiltration: Agents and informers did not merely spy on political activists. Their main
purpose was to discredit and disrupt. Their very presence served to undermine trust and
scare off potential supporters. The FBI and police exploited this fear to smear genuine
activists as agents.
2. Psychological warfare: The FBI and police used myriad "dirty tricks" to undermine
progressive movements. They planted false media stories and published bogus leaflets and
other publications in the name of targeted groups. They forged correspondence, sent
anonymous letters, and made anonymous telephone calls. They spread misinformation
about meetings and events, set up pseudo movement groups run by government agents,
and manipulated or strong-armed parents, employers, landlords, school officials and others
to cause trouble for activists. They used bad-jacketing to create suspicion about targeted
activists, sometimes with lethal consequences.[44]
3. Harassment via the legal system: The FBI and police abused the legal system to harass
dissidents and make them appear to be criminals. Officers of the law gave perjured
testimony and presented fabricated evidence as a pretext for false arrests and wrongful
imprisonment. They discriminatorily enforced tax laws and other government regulations
and used conspicuous surveillance, "investigative" interviews, and grand jury subpoenas in
an effort to intimidate activists and silence their supporters.[42][45]
4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to
conduct illegal break-ins in order to search dissident homes; and to commit vandalism,
assaults, beatings and assassinations.[42] The object was to frighten or eliminate
dissidents and disrupt their movements.
The FBI specifically developed tactics intended to heighten tension and hostility between various
factions in the black militancy movement, for example between the Black Panthers, the US
Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were
San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[42]
Dhoruba Bin Wahad a former Black Panther, reflects on how these tactics made him feel, saying
he had a combat mentality and felt like he was at war with the government. When asked about
why he thinks the Black Panthers were targeted he said, "In the United States, the equivalent of
the military was the local police. During the early sixties, at the height of the Civil Rights
Movement, and the human rights movement, the police in the United States became increasingly
militaristic. They began to train out of military bases in the United States. The Law Enforcement
Assistance Act (LEAA) supplied local police with military technology, everything from assault rifles
to army personnel carriers. In his opinion, the Counterintelligence Program went hand-in-hand
with the militarization of the police in the Black community, with the militarization of police in
America."[46]
The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles,
San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther
homesoften with little or no evidence of violations of federal, state, or local lawswhich resulted
directly in the police killing many members of the Black Panther Party, most notably Chicago Black
Panther Party Chairman Fred Hampton on December 4, 1969.[42][43][47]
In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed
to have worked with local police departments to target specific individuals,[48] accuse them of
crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them. Elmer
"Geronimo" Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California
Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court,
an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los
Angeles Police Department knew he had not been in the area at the time the murder occurred.
[49][50]
Some sources claim that the FBI conducted more than 200 "black bag jobs",[51][52] which were
warrantless surreptitious entries, against the targeted groups and their members.[53]
J. Edgar Hoover In 1969 the FBI special agent in San Francisco wrote Hoover that his
investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers
were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the
agent's career goals would be directly affected by his supplying evidence to support Hoover's view
that the BPP was "a violence-prone organization seeking to overthrow the Government by
revolutionary means".[54]
Hoover supported using false claims to attack his political enemies. In one memo he wrote:
"Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist
to substantiate the charge."[55]
In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered
by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her
passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an
acknowledged FBI informant.[56][57] The FBI spread rumors that Liuzzo was a member of the
Communist Party and had abandoned her children to have sexual relationships with African
Americans involved in the Civil Rights Movement.[58][59] FBI records show that J. Edgar Hoover
personally communicated these insinuations to President Johnson.[60][61] FBI informant Rowe
has also been implicated in some of the most violent crimes of the 1960s civil rights era, including
attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church
bombing.[56] According to Noam Chomsky, in another instance in San Diego, the FBI financed,
armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a
group called the Secret Army Organization that targeted groups, activists, and leaders involved in
the Anti-War Movement, using both intimidation and violent acts.[62][63][64]
Hoover ordered preemptive action "to pinpoint potential troublemakers and neutralize them before
they exercise their potential for violence."[5]
Illegal surveillance
Too many people have been spied upon by too many Government agencies
and too much information has been illegally collected. The Government has
often undertaken the secret surveillance of citizens on the basis of their
political beliefs, even when those beliefs posed no threat of violence or illegal
acts on behalf of a hostile foreign power. The Government, operating
primarily through secret and biased informants, but also using other intrusive
techniques such as wiretaps, microphone "bugs", surreptitious mail opening,
and break-ins, has swept in vast amounts of information about the personal
lives, views, and associations of American citizens. Investigations of groups
deemed potentially dangerousand even of groups suspected of associating
with potentially dangerous organizationshave continued for decades,
despite the fact that those groups did not engage in unlawful activity.
disrupted because of their political views, social beliefs and their lifestyles.
Investigations have been based upon vague standards whose breadth made
excessive collection inevitable. Unsavory, harmful and vicious tactics have
been employedincluding anonymous attempts to break up marriages,
disrupt meetings, ostracize persons from their professions, and provoke
target groups into rivalries that might result in deaths. Intelligence agencies
have served the political and personal objectives of presidents and other high
officials. While the agencies often committed excesses in response to
pressure from high officials in the Executive branch and Congress, they also
occasionally initiated improper activities and then concealed them from
officials whom they had a duty to inform.
Post-COINTELPRO Operations
While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI
actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.
[67][68][69] Documents released under the FOIA show that the FBI tracked the late David
Halberstama Pulitzer Prize-winning journalist and authorfor more than two decades.[70]
"Counterterrorism" guidelines implemented during the Reagan administration have been described
as allowing a return to COINTELPRO tactics.[71][pages needed] Some radical groups accuse
factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[72]
The IG report found these "troubling" FBI practices between 2001 and 2006. In some cases, the
FBI conducted investigations of people affiliated with activist groups for "factually weak" reasons.
Also, the FBI extended investigations of some of the groups "without adequate basis" and
improperly kept information about activist groups in its files. The IG report also found that FBI
Director Robert Mueller III provided inaccurate congressional testimony about one of the
investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.
[73]
Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against
radical groups after the official COINTELPRO operations were ended. Several authors have
suggested the American Indian Movement (AIM) has been a target of these operations.
Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal
government intended to acquire uranium deposits on the Lakota tribe's reservation land, and that
this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.
[74][75][76][77][78] Others believe COINTELPRO continues and similar actions are being taken
against activist groups.[78][79][80] Caroline Woidat says that, with respect to Native Americans,
COINTELPRO should be understood within a historical context in which "Native Americans have
been viewed and have viewed the world themselves through the lens of conspiracy theory."[81]
Other authors argue that while some conspiracy theories related to COINTELPRO are unfounded,
the issue of ongoing government surveillance and repression is real.[82][83]
References
"I. Introduction and Summary" (PDF). Intelligence Activities and the Rights of Americans -
Church Committee final report. United States Senate website. II. United States
Government. 1976-04-26. p. 10. Archived (PDF) from the original on 2014-04-18.
Retrieved 2014-07-15.
Wolf, Paul. "COINTELPRO: The Untold American Story". Archive.org. World Conference
Against Racism, Durbin SA.
Jalon, Allan M. (2006-03-08). "A break-in to end all break-ins; In 1971, stolen FBI files
exposed the government's domestic spying program.". Los Angeles Times. Tribune
Company. Archived from the original on 2013-12-03. Retrieved 2014-07-15.
Jeffreys-Jones, Rhodri (208). The FBI. Yale University Press. p. 189.
ISBN 9780300142846.
COINTELPRO Revisited - Spying & Disruption - IN BLACK AND WHITE: THE F.B.I. PAPERS
"A Huey P. Newton Story - Actions - COINTELPRO". PBS. Archived from the original on
2010-11-18. Retrieved 2008-06-23.
Weiner, Tim (2012). Enemies : A History of the FBI (1st ed.). New York: Random House.
ISBN 9781400067480., p. 196. "Sullivan would become Hoover's field marshal in matters
of national security, chief of FBI intelligence, and commandant of COINTELPRO. In that top
secret and tightly compartmentalized world, an FBI inside of the FBI, Sullivan served as the
executor of Hoover's most clandestine and recondite demands."
Weiner, Enemies (2012), p. 233. "RFK knew much more about this surveillance than he
ever admitted. He personally renewed his authorization for the taps on Levison's office,
and he approved Hoover's request to tap Levison's home telephone, where King called late
at night several times a week."
Herst, Burton (2007) Bobby and J. Edgar, p. 372.
Weiner, Enemies (2012), p. 198. "On October 2, 1956, Hoover stepped up the FBI's long-
standing surveillance of black civil rights activists. He sent a COINTELPRO memo to the
field, warning that the Communist Party was seeking to infiltrate the movement."
David T. Beito and Linda Royster Beito, Black Maverick: T.R.M. Howard's Fight for Civil
Rights and Economic Power (Urbana: University of Illinois Press, 2009), 148, 15459.
Weiner, Enemies (2012), p. 200.
Gage, Beverly (2014-11-11). "What an Uncensored Letter to M.L.K. Reveals". The New
York Times. Retrieved 2015-01-09.
Weiner, Enemies (2012), p. 235.
Weiner, Enemies (2012), p. 236. "The bugs got quick results. When King traveled, as he
did constantly in the ensuing weeks, to Washington, Milwaukee, Los Angeles, and Honolulu,
the Bureau planted hidden microphones in his hotel rooms. The FBI placed a total of eight
wiretaps and sixteen bugs on King."
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999), p. 524-529
Adams, Cecil M. (2003-05-02). "Was Martin Luther King, Jr. a plagiarist?". Washington
Post. Retrieved 2006-06-06.
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999) p. 527-529
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999), p. 243
Gregory Kane, "FBI should acknowledge complicity in the assassination of Malcolm X" The
Baltimore Sun, May 14, 2000
Toure "Malcolm X: Criminal, Minister, Humanist, Martyr" The New York Times, June 17,
2011
James W. Douglass "The Converging Martyrdom of Malcolm and Martin" Dr. Martin Luther
King Jr. Lecture, Princeton Theological Seminary, March 29, 2006
"Guide to the Microfilm Edition of FBI Surveillance Files: Black Extremist Organizations,
Part 1" Lexis-Nexis
Weiner, Enemies (2012), p. 271.
"The FBI Sets Goals for COINTELPRO" American Social History Project, City University of
New York
Rob Warden "Hoover Rated Carmichael As 'Black Messiah'" Chicago Daily News, Feb 10,
1976
Weiner, Enemies (2012), p. 272. "Some 1,500 army intelligence officers in civilian clothing
undertook the surveillance of some 100,000 American citizens. Army intelligence shared all
their reports over the next three years. The CIA tracked antiwar leaders and black militants
who traveled overseas, and it reported back to the FBI. The FBI, in turn, shared thousands
of selected files on Americans with army intelligence and the CIA. All three intelligence
services sent the names of Americans to the National Security Agency for inclusion on a
global watch list; the NSA relayed back to the FBI hundreds of transcripts of intercepted
telephone calls to and from suspect Americans."
McKnight, Last Crusade, pp. 2628. "By March the Hoover Bureau's campaign against King
was virtually on a total war footing. In a March 21 'urgent' teletype, Hoover urged all field
offices involved in the POCAM project to exploit every tactic in the bureau's arsenal of
covert political warfare to bring down King and the SCLC."
"Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of
Americans". United States Senate. Retrieved 2010-12-01.
See, for example, Hobson v. Wilson, 737 F.2d 1 (1984); Rugiero v. U.S. Dept. of Justice,
257 F.3d 534, 546 (2001).[dead link]
http://www.pbs.org/independentlens/1971/
"A Short History of FBI COINTELPRO", Albion Monitor, Retrieved July 13, 2007. Archived
September 28, 2007, at the Wayback Machine.
Weiner, Enemies (2012), p. 293
The COINTELPRO Papers - Documents from the FBI's Secret Wars Against Dissent in the
United States by Ward Churchill & Jim Vander Wall. South End Press.
Intelligence Activities and the Rights of Americans, Final Report of the Senate Committee
to Study Governmental Operations with respect to Intelligence Activities
Various Church Committee reports reproduced online at ICDC: Final Report, 2A; Final
Report,2Cb; Final Report, 3A; Final Report, 3G. Various COINTELPRO documents
reproduced online at ICDC: CPUSA; SWP; Black Nationalist; White Hate; New Left; Puerto
Rico. Archived January 13, 2013, at the Wayback Machine.
Blackstock, Nelson. COINTELPRO: The FBI's Secret War on Political Freedom, Pathfinder,
New York. 1975. p. 111.
Michael Newton. Famous Assassinations in World History: An Encyclopedia. ABC-CLIO, p.
205. ISBN 1610692853
THE CHICAGO CRIME SCENES PROJECT: FRED HAMPTON
The FBI'S Covert Action Program to Destroy the Black Panther Party
FBI Secrets: An Agent's Expose. M. Wesley Swearingen. Boston. South End Press. 1995.
Special Agent Gregg York: "We expected about twenty Panthers to be in the apartment
when the police raided the place. Only two of those black nigger fuckers were killed, Fred
Hampton and Mark Clark."
Ward Churchill (2002), Agents of Repression (Agents of Repression: The FBI's Secret Wars
Against the Black Panther Party and the American Indian Movement ed.), South End Press,
ISBN 978-0896086463, OCLC 50985124, 0896086461
"Final Report of the Select Committee to Study Governmental Operations with Respect to
Intelligence Activities-Book III" [The Church Report], US Senate, 1976
Bin Wahad, Dhoruba. Still Black, Still Strong. Semiotext, 1993, pp. 18-19
Brown, Elaine. A Taste of Power: A Black Woman's Story. New York: Doubleday, 1992, pp.
204-06
Paul Wolf, "COINTELPRO", ICDC
"Former Black Panther freed after 27 years in jail". CNN. Archived from the original on
2010-11-18. Retrieved April 30, 2010.
In re Pratt, 82 Cal
Alexander Cockburn; Jeffrey St. Clair (1998). Whiteout: The CIA, Drugs and the Press.
Verso. p. 69. ISBN 978-1-85984-139-6.
FBI document, 19 July 1966, DeLoach to Sullivan re: "Black Bag" Jobs.
[1]
FBI document, 27 May 1969, "Director FBI to SAC San Francisco", available at the FBI
reading room.
FBI document, 16 September 1970, Director FBI to SAC's in Baltimore, Detroit, Los
Angeles, New Haven, San Francisco, and Washington Field Office. Available at the FBI
reading room.
Gary May, The Informant: The FBI, the Ku Klux Klan, and the Murder of Viola Luzzo, Yale
University Press, 2005.
"Jonathan Yardley". The Washington Post. Archived from the original on 2010-11-18.
Retrieved April 30, 2010.
Joanne Giannino. "Viola Liuzzo". Dictionary of Unitarian & Universalist Biography. Archived
from the original on 2010-11-18. Retrieved 2008-09-29.
Kay Houston. "The Detroit housewife who moved a nation toward racial justice". The
Detroit News, Rearview Mirror. Archived from the original on 1999-04-27.
"Uncommon Courage: The Viola Liuzzo Story". Archived from the original on 2007-08-13.
Mary Stanton (2000). From Selma to Sorrow: The Life and Death of Viola Liuzzo.
University of Georgia Press. p. 190.
Noam Chomsky, "Triumphs of Democracy", Excerpted from Language and Responsibility
Watergate and the Secret Army Organization - msg#00404 - culture.discuss.cia-drugs
1972
"Intelligence Activities and the Rights of Americans Book II, Final Report of the Select
Committee to Study Governmental Operations with respect to Intelligence Activities United
States Senate (Church Committee)". United States Senate. Retrieved May 11, 2006.
"Tapped Out Why Congress won't get through to the NSA.". Slate. Retrieved May 11,
2006.
David Cunningham. There's Something Happening Here: The New Left, the Klan, and FBI.
University of California Press, 2005: "However, strong suspicions lingered that the
program's tactics were sustained on a less formal basissuspicions sometimes furthered
by agents themselves, who periodically claimed that counterintelligence activities were
continuing, though in a manner undocumented within Bureau files."; Hobson v. Brennan,
646 F.Supp. 884 (D.D.C.,1986)
Bud Schultz, Ruth Schultz. The Price of Dissent: Testimonies to Political Repression in
America. University of California Press, 2001: "Although the FBI officially discontinued
COINTELPRO immediately after the Pennsylvania disclosures "for security reasons," when
pressed by the Senate committee, the bureau acknowledged two new instances of
"Cointelpro-type" operations. The committee was left to discover a third, apparently illegal
operation on its own."
Athan G. Theoharis, et al. The FBI: A Comprehensive Reference Guide. Greenwood
Publishing Group, 1999: "More recent controversies have focused on the adequacy of
recent restrictions on the Bureau's domestic intelligence operations. Disclosures of the
1970s that FBI agents continued to conduct break-ins, and of the 1980s that the FBI
targeted CISPES, again brought forth accusations of FBI abuses of powerand raised
questions of whether reforms of the 1970s had successfully exorcised the ghost of FBI
Director Hoover."
The Associated Press, "FBI tracked journalist for over 20 years". Toronto Star. November
7, 2008. Retrieved November 23, 2008.
Bud Schultz, Ruth Schultz. The Price of Dissent: Testimonies to Political Repression in
America. University of California Press, 2001: "The problem persists after Hoover."The
record before this court," Federal Magistrate Joan Lefkow stated in 1991, "shows that
despite regulations, orders and consent decrees prohibiting such activities, the FBI had
continued to collect information concerning only the exercise of free speech."
Mike Mosedale, "Bury My Heart," City Pages, Volume 21 - Issue 1002, 16 February 2000
"FBI Probes of Groups Were Improper, Justice Department Says". The San Jose Mercury
News. September 20, 2010. also reported at democracynow.org, 21 September 2010
Churchill, Ward, and Jim Vander Wall, (1990), The COINTELPRO Papers: Documents from
the FBI's Secret Wars Against Domestic Dissent, Boston: South End Press, pp. xii, 303.
Churchill, Ward; and James Vander Wall. Agents of Repression: The FBI's Secret Wars
against the Black Panther Party and the American Indian Movement, 1988, Boston, South
End Press.
Weyler, Rex. Blood of the Land: The Government and Corporate War Against First Nations.
Matthiessen, Peter, In the Spirit of Crazy Horse, 1980, Viking.
Woidat, Caroline M. "The Truth Is on the Reservation: American Indians and Conspiracy
Culture", The Journal of American Culture 29 (4), 2006, pp. 454467
McQuinn, Jason. "Conspiracy Theory vs Alternative Journalism", Alternative Press Review,
Vol. 2, No. 3, Winter 1996
Horowitz, David. "Johnnie's Other O.J.", Front Page Magazine.com, September 1, 1997.
Woidat, Caroline M. "The Truth Is on the Reservation: American Indians and Conspiracy
Culture", The Journal of American Culture 29 (4), 2006. pp. 454467
Berlet, Chip. "The X-Files Movie: Facilitating Fanciful Fun, or Fueling Fear and Fascism?
Conspiracy Theories for Fun, Not for False Prophets", 1998, Political Research Associates
Berlet, Chip; and Matthew N. Lyons. 1998, "One key to litigating against government
prosecution of dissidents: Understanding the underlying assumptions", Parts 1 and 2,
Police Misconduct and Civil Rights Law Report (West Group), 5 (13), (JanuaryFebruary):
145153; and 5 (14), (MarchApril): 157162.
Tragic, heartbreaking mass murders in recent years have spread fear and panic among the
general public. Yet some are questioning if there isn't more than meets the eye with these cruel
and bizarre events. Is it conceivable that there might be a deeper agenda here?
This essay presents undeniable evidence that secret government mind control programs
have created assassins out of unsuspecting citizens.
The astonishing excerpts below, taken verbatim from declassified CIA documents, reveal detailed
mind control experiments in highly secret, government-sponsored experiments. Through hypnosis,
drugs, and electric shock, CIA clinicians fractured personalities and induced multiple personality
disorder (MPD) also called dissociative identity disorder (DID).
To verify this startling information, links are provided to scanned images of the original CIA
documents. Instructions are also available here to order any of these documents directly from the
CIA using the Freedom of Information Act (FOIA).
Though dating from the 1950s and 60s, these revealing documents were not released for decades
for reasons of "national security." The U.S. government claims mind control experiments are no
longer being carried out, yet how can we know? The existence of these programs was denied for
decades, and certainly any recent documents would be classified secret under the rubric of
"national security."
A trusted CIA informant I know assures me that these programs are ongoing. These disturbing
methods are used by various countries in clandestine operations around the world. Many might
prefer not to look at these ugly wounds to the soul of our nation and world. Yet if we avoid or
ignore them, they are likely to grow and fester.
It has been shown clearly that physically individuals can be induced into H by telephone, by
receiving written matter, or by the use of code, signal, or words. Control of those hypnotized
can be passed from one individual to another without great difficulty. It has also been
shown by experimentation with these girls that they can act as unwilling couriers for
information purposes, and that they can be conditioned to a point where they believe a change
in identity on their part even on the polygraph.
Note: This document shows that CIA experimenters were successful in hypnotizing young
women (19 years old in this case) to do things they would not do normally without any
memory afterward, sometimes even unwillingly. Though they volunteered, these women
were thus programmed to be Manchurian Candidates or super spies with no knowledge of
what these men were doing to them.
Learning models will be instituted in which the subject will be rewarded or punished for his
overall performance and reinforced in various ways by being told whether he was right, by
being told what the target was, with electric shock etc. ... In other cases drugs and
psychological tricks will be used to modify his attitudes. The experimenters will be
particularly interested in disassociative states, from the abaissement de niveau mental to
multiple personality in so-called mediums, and an attempt will be made to induce a number
of states of this kind, using hypnosis.
Note: This document provides proof that the CIA was was using drugs and electric shock in
attempting to induce MPD (multiple personality disorder). Though this document uses the
masculine "he" to describe the subject, other documents show that most of the subjects
used were young women who volunteered. The subjects were not informed about the
deeper aspects and implications for which they were being trained. If you view the original,
you will also find interesting information on ESP experiments.
A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses
[deleted] and [deleted] immediately progressed to a deep hypnotic state with no further
suggestion. Miss [deleted] was then instructed (having previously expressed a fear
of firearms in any fashion) that she would use every method at her disposal to
awaken miss [deleted] (now in a deep hypnotic sleep), and failing this, she would
pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her
rage would be so great that she would not hesitate to "kill" [deleted] for failing to
awaken.
Miss [deleted] carried out these suggestions to the letter including firing the (unloaded pneumatic
pistol) gun at [deleted] and then proceeding to fall into a deep sleep. After proper suggestions
were made, both were awakened and expressed complete amnesia for the entire sequence. Miss
[deleted] was again handed the gun, which she refused (in an awakened state) to pick up or
accept form the operator. She expressed absolute denial that the foregoing sequence had
happened.
Miss [deleted] felt reluctant about participating further since she expressed her doubt as to
any useful purpose in further attendance. The Operator thereupon proceeded in full view of all
other subjects to explain to Miss [deleted] that he planned to induce a deep state of hypnosis
now. The reaction was as had been expected. Miss [deleted] excused herself to make a telephone
call (defense mechanism?). Upon her return a very positive approach was adopted by the operator
whereupon a deeper, much deeper state of hypnosis was obtained.
Immediately a posthypnotic was induced that when the operator accidently dropped a steel ball in
his hand to the floor ... Miss [deleted] would again go into hypnosis. Miss [deleted] then advised
that she must conclude her work for the evening. She arose to adjust her hair before the mirror.
The ball was dropped and she promptly slumped back into the chair and back into hypnosis. It is
the opinion of the operator the Miss [deleted] if properly trained (positive approach) will continue
to improve.
Note: Here we have proof that these women could be converted into unsuspecting and
even unwilling assassins. They could be programmed to assassinate anyone and would do
so without any conscious knowledge afterward. Note also the questionable status of
"volunteer" implied. Though these women originally volunteered, unwillingness to continue
could be manipulated by the men running the program.
Prior to actually beginning the more complex experiments, several simple post H were
worked with both of the girls participating. The first major experiment of the evening was
set up as follows without previous explanation to either [deleted] or [deleted]. Both
subjects were placed in a very deep trance state and while in this state, the following
instructions were given:
(A) [Deleted] was instructed that when she awakened, she was to procede to [deleted] room. She
was told that while there, she would receive a telephone call from an individual whom she would
know only as "Joe". This individual would engage her in a normal telephone conversation. During
this conversation, this individual would give her a code word and upon mentioning the
code word, [deleted] would go into a deep SI [sleep induction] trance state, but would
be "normal" in appearance with her eyes open.
[Deleted] was then told that upon the conclusion of the telephone conversation, she would
procede to the ladies room where she would meet a girl who was unknown to her. She was told
that she would strike up a conversation with this girl and during the conversation she would
mention the code word "New York" to this other girl, who, in turn, would give her a device and
further instructions which were to be carried out by [deleted]. She was told that after she carried
out the instructions, she was to return to the Operations Room, sit in the sofa and go immediately
into a deep sleep.
(B) [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where
she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim"
would engage her in normal conversation. During the course of the conversation, this individual
would mention a code word to [deleted]. When she heard this code word, she would pass into a SI
trance state, but would not close her eyes and remain perfectly normal and continue the
telephone conversation. She was told that upon conclusion of the telephone conversation, she
would then carry out the following instructions:
[Deleted] being in a complete SI state at this time, was then told to open her eyes and was shown
an electric timing device. She was informed that this timing device was an incendiary
bomb and was then instructed how to attach and set the device. After [deleted] had
indicated that she had learned how to set and attach the device, she was told to return to a sleep
state and further instructed that upon concluding the aforementioned conversation, she would
take the timing device which was in a briefcase and proceed to the ladies room.
In the ladies room, she would be met by a girl whom she had never seen who would identify
herself by the code word "New York." [Deleted] was then to show this individual how to
attach and set the timing device and further instructions would be given the individual
by [deleted] that the timing device was to be carried in the briefcase to [deleted] room,
placed in the nearest empty electric-light plug and concealed in the bottom, left-hand
drawer of [deleted] desk, with the device set for 82 seconds and turned on.
[Deleted] was further instructed to tell this other girl that as soon as the device had been set and
turned on, she was to take the briefcase, leave [deleted] room, go to the operations room and go
to the sofa and enter a deep sleep state. [Deleted] was further instructed that after completion of
instructing the other girl and the transferring to the other girl of the incendiary bomb, she was to
return at once to the operations room, sit on the sofa, and go into a deep sleep state.
For a matter of record, immediately after the operation was begun it was noted that a member of
the charforce was cleaning the floor in the ladies room and subsequently, both [deleted] and
[deleted] had to be placed ... once again in a trance state and instructions changed from the
ladies room to Room 3. It should be noted that even with the change of locale in the transfer
point, the experiment was carried off perfectly without any difficulty or hesitation on the part of
either of the girls. Each girl acted out their part perfectly, the device was planted and set as
directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep
state. Throughout, their movements were easy and natural.
Note: You will note the frequent use of "girls" (young women) in these programs. Do you
think the men in charge, having complete hypnotic control of these women, might have at
times taken advantage of them sexually? Yet this would never enter the official
documentation, with the one major exception below.
On 2 July 1951 approximately 1:00 p.m. the instruction began with [deleted] relating to the
student some of his sexual experiences. [Deleted] stated that he had constantly used
hypnotism as a means of inducing young girls to engage in sexual intercourse
with him. [Deleted], a performer in [deleted] orchestra, was forced to engage in sexual
intercourse with [deleted] while under the influence of hypnotism. [Deleted] stated that he
first put her into a hypnotic trance and then suggested to her that he was her husband and
that she desired sexual intercourse with him.
Note: This document shows that an instructor being used by the CIA took advantage of his
skill in hypnosis to sexually abuse young women without their having any knowledge of
being abused. How many CIA hypnotists did likewise? Do you think a man involved in
these programs might take advantage of a beautiful, young woman knowing she
would not remember afterward? Note that for some reason this document is not
available in the CIA's three CD set and must be ordered individually at this link. See the
What You Can Do section at the end of this page for suggestions on how we can stop this
abuse.
Preliminary clinical research during 1955-56 has yielded promising leads in terms
of knowledge of how hypnotizability can be influenced by pharmacological means.
It was deemed advisable to prepare the report of the MKULTRA program in one copy only, in
view of its unusual sensitivity. The MKULTRA activity is concerned with the research and
development of chemical, biological, and radiological materials capable of employment in
clandestine operation to control human behavior. MKULTRA was authorized by then Director
of Central Intelligence [DCI], Allen W. Dulles, in 1953.
The concepts involved in manipulating human behavior are found by many people both within and
outside the Agency to be distasteful and unethical. Nevertheless, there have been major
accomplishments both in research and operational employment. Some MKULTRA activities raise
questions of legality implicit in the original charter. A final phase of testing of MKULTRA
products places the rights and interests of U.S. citizens in jeopardy. Public disclosure of
some aspects of MKULTRA activity could induce serious adverse reaction in U.S. public
opinion. The DCI's memorandum ... exempted MKULTRA from audit.
Over the ten-year life of the program many additional avenues to the control of human behavior
have been designated by the TSD management [Technical Services Division - under which
MKULTRA operated] as appropriate to investigation under the MKULTRA charter, including
radiation, electro-shock, various fields of psychology, psychiatry, sociology, and anthropology,
graphology, harassment substances, and paramilitary devices and materials.
TSD initiated a program for covert testing of materials on unwitting U.S. citizens in 1955. TSD has
pursued a philosophy of minimum documentation in keeping with the high sensitivity of some of
the projects. The lack of consistent records precluded use of routine inspection procedures and
raised a variety of questions concerning management and fiscal controls.
There are just two individuals in TSD who have full substantive knowledge of the
program and most of that knowledge is unrecorded. In protecting both the sensitive
nature of the American intelligence capability to manipulate human behavior, they apply
"need to know" doctrine to their professional associates and to their clerical assistants
to a maximum degree.
Note: Why did only two people have full substantive knowledge of the program? Could it be
that sex abuse and political manipulations behind the scenes were so severe that no one
was to be trusted? Do you think we could trust those two individuals? CIA Director Richard
Helms, upon hearing there would be a Congressional investigation, ordered the destruction
of all documents from these unethical and at times illegal mind control programs in 1973.
He did not realize, however, that incriminating evidence remained in the financial files of the
agency, which are what you read here. We can only imagine what secrets the destroyed
documents held.
CIA document and page number: 87624, p. 3, 4 (also appended to 17748, p. 32,
33)
Title: Two Extremely Sensitive Research Programs
Date: 3 April 1953
Link to view images of original: Page 3, Page 4
Approximately 6% of the projects are of such an ultra-sensitive nature that they cannot and
should not be handled by means of contracts which would associate CIA or the Government
with the work in question.
We intend to investigate the development of a chemical material which causes a reversible non-
toxic aberrant mental state, the specific nature of which can be reasonably well predicted for each
individual. This material could potentially aid in discrediting individuals, eliciting
information, implanting suggestion and other forms of mental control.
In a great many instances the work in field (a) must be conducted by individuals who are not and
should not be aware of our interest. In all cases dealing with field (b), it is mandatory that any
connections with the Agency should be known only to an absolute minimum number of people
Experience has shown that qualified, competent individuals in the field of pharmacological,
physiological, psychiatric and other biological sciences are most reluctant to enter into signed
agreements of any sort which connect them with this activity since such a connection would
jeopardize their professional reputations. Even internally in CIA, as few individuals as
possible should be aware of our interest in these fields and of the identity of those who
are working for us. At present, this results in ridiculous contracts, with cut-outs, which
do not spell out the scope or intent of the work.
Note: In the three CD set, this document is found appended to document 17748 on pp. 30
to 37.
Drug Project - A project in the isolation and synthesis of pure drugs for use in effecting
psychological entry and control of the individual.
Drugs and electricity - Research work on the effects of lysergic acid [LSD] on animals. Use
of electric shock and the encephalograph in interrogation. Particular emphasis on the
detection and prior use of electric shock and the 'guaranteed amnesia' resulting
from electric shock.
CIA document and page number: 140394, pp. 2, 3 (not available in CD set, order
individually here)
Title: Interview with [Deleted]
Date: 25 February 1952
Link to view full text of both pages: Click here
Note: Individuals can be hypnotized without their knowledge. They can be programmed to
commit murder, suicide, and much more. Think about the implications. How many "suicides"
of important people we've heard in the news were not really suicides? How many murders
were committed by people who didn't even realize they were assassins? How much has this
technology been used to manipulate world politics? Think about the Kennedys, Martin
Luther King, Jr., and possibly those involved with 9/11 and other major terrorist attacks.
Note this document is not available in the three CD set and must be ordered individually at
this link.
CIA document and page number: 140401, pp. 6, 7 (not available in CD set, order
individually here)
Title: Special Research, Bluebird
Date: 1 January 1952 (approximate)
Link to view full text of both pages: Click here
Set out below are specific problems which can only be resolved by experiment, testing and
research.
Can we obtain control of the future activities (physical and mental) of any given individual,
willing or unwilling by application of SI [sleep induction] and H [hypnosis] techniques?
Can we in a matter of an hour, two hours, one day, etc., induce an H condition in an
unwilling subject to such an extent that he will perform an act for our benefit?
Could we seize a subject and in the space of an hour or two by post-H control
have him crash an airplane, wreck a train, etc.?
Can we devise a system for making unwilling subjects into willing agents and then transfer
that control to untrained agency agents in the field by use of codes or identifying signs?
Is it possible to find a gas that can be used to gain SI control from a gas pencil, odorless,
colorless: one shot, etc.?
How can sodium A or P or any other sleep inducing agent be best concealed in a
normal or commonplace item, such as candy, cigarettes, liquer, wines, coffee, tea,
beer, gum water, aspirin tablets, common medicines, coke, tooth paste?
Can we, using SI and H extract complicated formula from scientists, engineers, etc., if
unwilling?
Note: Reading all of the declassified CIA documents listed in this essay suggests that the
answer to most, if not all of the questions above appears to be yes. Note that sleep
inducing agents were being placed in candy, aspirin, Coke, and more. Think about the
implications if even just a few of the men in these programs decided to use such things
outside of the office to manipulate others for their personal benefit. It's time that this
information be made public so we can all be aware of what's going on and work to stop the
abuses. Note for some reason this document is not available in the three CD set and must
be ordered individually at this link.
Science Digest Article, pp. 44 - 53 (Not a CIA document, but related to the mind
control programs)
Title: Hypnosis Comes of Age
Date: April 1971
Link to view full text of article: Click here
One of the most fascinating but dangerous applications of hypnosis is its use in military
intelligence. This is a field with which I am familiar through formulating guidelines for the
techniques used by the United States in two world wars. I was involved in preparing many
subjects for this work during World War II.
One successful case involved an Army Service Corps Captain whom we'll call George Smith.
Captain Smith had undergone months of training. He was an excellent subject but did not realize
it. I had removed from him, by post-hypnotic suggestion, all recollection of ever having
been hypnotized. Outside of myself, Colonel Brown was the only person who could hypnotize
Captain Smith. This is "locking." I performed it by saying to the hypnotized Captain: "Until further
orders from me, only Colonel Brown and I can hypnotize you. We will use a signal phrase 'the
moon is clear.' " The system is virtually foolproof.
By the 1920's, not only had they learned to apply post-hypnotic suggestion, [they] also
had learned how to split certain complex individuals into multiple personalities like
Jeckyl-Hydes.
During World War II, I worked this technique with a vulnerable Marine lieutenant I'll call Jones.
Under the watchful eye of Marine Intelligence, I spilt his personality into Jones A and Jones B.
Jones A, once a "normal" working Marine, became entirely different. He talked communist doctrine
and meant it. He was welcomed enthusiastically by communist cells, was deliberately given a
dishonorable discharge by the Corps (which was in on the plot) and became a card-carrying party
member.
The joker was Jones B, the second personality, formerly apparent in the conscious Marine. Under
hypnosis, this Jones had been carefully coached by suggestion. Jones B was the deeper
personality, knew all the thoughts of Jones A, was a loyal American, and was "imprinted" to say
nothing during conscious phases. All I had to do was hypnotize the whole man, get in touch with
Jones B, the loyal American, and I had a pipeline straight into the Communist camp.
Note: This article shows that in the 1920s, U.S. military intelligence had already developed
the capability to cause split personalities. The created super spy or Manchurian Candidate
has been a reality for nearly a century, yet very few people know anything about it. These
unknowing spies could plant bombs, provide sexual favors, and even assassinate top
political leaders. Consider that many countries and key powerful, elite groups have had and
used this technology for many decades. Watch the movie Manchurian Candidate to see how
real it is.
In 2009 Advanced Media Group Proposed ORGANIZED STALKING AND DIRECTED ENERGY
WEAPONS HARASSMENT BILL to Pennsylvania House of Representative Mike Sturla (Lancaster,
Pennsylvania) and City of Lancaster Mayor Richard Gray in 2009. The draft legislation is the work
of Missouri House of Representative Jim Guest, who has been working on helping victims of these
horrendous crimes for years. The bill will provide protections to individuals who are being
harassed, stalked, harmed by surveillance, and assaulted; as well as protections to keep
individuals from becoming human research subjects, tortured, and killed by electronic frequency
devices, directed energy devices, implants, and directed energy weapons.
In 2005 I, as a Pro Se Litigant filed several civil actions as Plaintiffs in the United States District
Court for the Eastern District of Pennsylvania, the United States Third District Court of Appeals,
the Pennsylvania Supreme Court, The Pennsylvania Superior Court, the Commonwealth Court of
Pennsylvania, The Court of Common Pleas of Lancaster County, Pennsylvania. These litigations
included violations of intellectual property rights, anti-trust violations, and interference of
contracts relating to several business interests, harassment, extortion, fraud, etc.,. . Central to
this litigation is the Digital Movie, Digital Technologies, Financial Management Group, Ltd,/FMG
Advisory, Ltd., and its affiliated businesses along with a Federal False Claims Act or Federal
Whistleblowers Act regarding the firm of International Signal and Control, Plc., (ISC) the $1Billion
Dollar Fraud and the Export violations of selling arms to South Africa and Iraq. This litigation dates
back to 1987. APPEALANT STAN J. CATERBONE, PRO SE was a shareholder of ISC, and
was solicited by ISC executives for professional services.
In 1999 Advanced Media Group was solicited and paid to develop a comprehensive
business plan to develop the former Sprecher Brewery, known as the Excelsior Building on E. King
Street, in Lancaster, Pennsylvania by 2 Lancaster County restaurateurs. This plan was developed
in conjunction with the Comprehensive Economic Development Plan for the Revitalization of
Downtown Lancaster and the Downtown Lancaster Convention Center for the former Watt &
Shand building.
In 1996 Advanced Media Group had done consulting for companies under KAL, Inc., during the
time that APPEALANT STAN J. CATERBONE, PRO SE was controller of Pflumm
Contractors, Inc., Advanced Media Group was retained by Gallo Rosso Restaurant and Bar to
computerized their accounting and records management from top to bottom. APPEALANT
STAN J. CATERBONE, PRO SE had also provided consulting for the computerization of
accounting and payroll for Lancaster Container, Inc., of Washington Boro. APPEALANT STAN
J. CATERBONE, PRO SE was retained to evaluate and develop an action plan to migrate the
Information Technologies of the Jay Group, formally of Ronks, PA, now relocated to a new $26
Million Dollar headquarters located in West Hempfield Township of Lancaster County. The Jay
Group had been using IBM mainframe technologies hosted by the AS 400 computer and server.
APPEALANT STAN J. CATERBONE, PRO SE was consulting on the merits of migrating to a
PC based real time networking system throughout the entire organization. Currently the Jay
Group employees some 500 employees with revenues in excess of $50 Million Dollars per year.
In 1991 Advanced Media Group was elected to People to People International and the Citizen
Ambassador Program, which was founded by President Dwight D. Eisenhower in 1956. The
program was founded to To give specialists from throughout the world greater opportunities to
work together and effectively communicate with peers, The Citizen Ambassador program
administers face-to-face scientific, technical, and professional exchanges throughout the world. In
1961, under President John F. Kennedy, the State Department established a non-profit private
foundation to administer the program. We were scheduled to tour the Soviet Union and Eastern
Europe to discuss printing and publishing technologies with scientists and technicians around the
world.
In 1990 Advanced Media Group had worked on a project to develop voice recognition systems
for the governments technology think tank - NIST (National Institute for Standards & Technology)
and the Defense Advanced Research Project Agency, or DARPA of the Department of Defense .
APPEALANT STAN J. CATERBONE, PRO SE co-authored the article Escaping the Unix Tar
Pit with a scientist from NIST that was published in the magazine DISC, then one of the leading
publications for the CD-ROM industry. Today, most all call centers deploy that technology
whenever you call an 800 number, and voice recognition is prevalent in all types of applications
involving telecommunications.
In 1987 Power Station Studios of New York retained my services as executive producer
of a motion picture project. The theatrical and video release was to be delivered in a digital
format; the first of its kind. We had originated the marketing for the technology, and created the
concept for the Power Station Digital Movie System (PSDMS), which would follow the copyright
and marketing formula of the DOLBY technology trademark. We had also created and developed
marketing and patent research for the development and commercialization of equipment that we
intended to manufacture and market to the recording industry featuring the digital technology.
Sidel, Gonda, Goldhammer, and Abbot, P.C. of Philadelphia was the lead patent law firm that We
had retained for the project. Power Station Studios was the brainchild of Tony Bongiovi, a leading
engineering genius discovered by Motown when he was 15. Tony and Power Station Studios was
one of the leading recording studios in the country, and were responsible for developing Bon Jovi,
a cousin. Power Station Studios clients included; Bruce Springsteen, Diana Ross, Cyndi Lauper,
Talking Heads, Madonna, The Ramones, Steve Winwood, and many others. Tony and Power
Station Studios had produced the original Sound Track for the original Star Wars motion picture.
It was released for distribution and was the number one Sound Track recording of its time. Tony
Bongiovi was also active in working and researching different aerospace technologies. * We had
developed and authored a Joint Venture Proposal for SONY to partner with us in delivering the
Digital Movie and its related technologies to the marketplace. The venture was to include the
commercialization of technologies, which Tony Bongiovi had developed for the recording industry
simultaneously with the release of the Digital Movie. APPEALANT STAN J. CATERBONE,
PRO SE also created the concept for the PSDMS trademark, which was to be the Trademark logo
for the technology, similar to the DOLBY sound systems trademark. The acronyms stand for the
Power Station Digital Movie System. Today, DVD is the mainstay for delivering digital movies on a
portable medium, a compact disc.
In 1987 APPEALANT STAN J. CATERBONE, PRO SE had a created and developed FMG
Mortgage Banking, a company that was funded by a major banking firm in Houston Texas. We had
the capability to finance projects from $3 to $100 million dollars. Our terms and rates were so
attractive that we had quickly received solicitations from developers across the country. We were
also very attractive to companies that wanted to raise capital that include both debt and equity.
Through my company, FMG, we could raise equity funding through private placements, and debt
funding through FMG Mortgage Banking. We were retained by Gamillion Studios of Hollywood,
California to secure financing of their post production Film Studio that was looking to relocate to
North Carolina. We had secured refinancing packages for Norris Boyd of and the Olde Hickory and
were in the midst of replacing the current loan that was with Commonwealth National Bank. We
were quickly seeking commitments for real estate
deals from New York to California. We also had a number of other prominent local developers
seeking our competitive funding, including Owen Kugal, High Industries, and the Marty Sponougle
a partner of The Fisher Group (owner of the Rt. 30 Outlets), and Drew Anthon of Eden Resort Inn.
We were constantly told that our financing packages were more competitive than local institutions.
In 1985 APPEALANT STAN J. CATERBONE, PRO SE developed the Easter Regional Free
Agent Camp, the first Free Agent Camp for the Professional Football industry; which was
videotaped for distribution to the teams scouting departments. (See Washington Post page
article of March 24, 1985) Current camps were dependent on the team scouts to travel from state
to state looking for recruits. We had developed a strategy of video taping the camp and the
distributing a copy, free of charge to the teams, to all of the scouting departments for teams in all
three leagues FL, CFL and WFL. My brother was signed at that camp by the Ottawa Roughriders of
the CFL., and went on to be a leading receiver while J.C. Watts was one of the leagues most
prominent quarterbacks. My brother also played 2 years with the MiamAPPEALANT STAN J.
CATERBONE, PRO SE Dolphins while Dan Marino was starting quarterback. We were a Certified
Agent for the National Football League Players Association. Gene Upshaw, the President of the
NFLPA had given me some helpful hints for my camp, while we were at a Conference for agents of
the NFL. The Washington Post wrote a full-page article about our camp and associated it with
other camps that were questionable about their practices. Actually, that was the very reason for
our camp. We had attended many other camps around the country that were not very well
organized and attracted few if any scouts. We had about 60 participants, with one player coming
from as far away as Hawaii. We held the camp at Lancaster Catholic, with a professional
production company filming the entire camp, while APPEALANT STAN J. CATERBONE, PRO
SE did the editing and produced the video. The well respected and widely acclaimed professional
football scout, Gil Brandt, of the Dallas Cowboys, had given me support for my camp during some
conversations We had with him and said he looked forward to reviewing the tapes for any hopeful
recruits.
In 1985 APPEALANT STAN J. CATERBONE, PRO SE was elected Vice President of the
Central Pennsylvania Chapter of the International Association of Financial Planners, and helped
build that chapter by increasing membership 3to 4 times. We had personally retained the
nationally acclaimed and nationally syndicated Financial Planner, Ms. Alexandria Armstrong of
Washington D.C.; to host a major fundraiser. More than 150 professionals attended the dinner
event that was held at the Eden Resort & Conference Center. Ms. Armstrong discussed financial
planning and how all of the professions needed to work together in order to be most effective for
their clients. We attracted a wide variety of professionals including; brokers, lawyers, accountants,
realtors, tax specialists, estate planners, bankers, and investment advisors. Today, it has become
evident that financial planning was the way of the future. In 1986 executives approached us from
Blue Ball National Bank to help them develop a Financial Planning department within their bank.
From 1982 to 1985 APPEALANT STAN J. CATERBONE, PRO SE was a financial planner
for IDS/American Express and licensed in both securities and insurances.
Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?