What Oath?

From indy news. No, this is not my fiction site.

TruthDig – Redacted FBI Documents Show Plot to Kill Occupy Leaders If ‘Deemed Necessary’

A Freedom of Information Act request filed by the Washington, D.C.-based Partnership for Civil Justice Fund yielded an FBI document containing knowledge of a plot by an unnamed group or individual to kill “leaders” of the Houston chapter of the nonviolent Occupy Wall Street movement.

There’s some debate as to whether or not the assassination plot was somehow government by proxy as opposed to just sitting back and letting it happen. A rather severe violation of the First and Fourth, wouldn’t you say? Possibly behavioral modification related, but hard to say unless/until the organization and individuals involved are revealed.

Firedoglake – CIA Agents Were Embedded With NYPD And Had “No Limits”

That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A.

When I discovered that kind of thing, working for the US government without pay, I called it a violation of the 14th Amendment. At least some of what they were up to was terrorism-related (but only some) and it was apparently put to an end after “only” eleven years of it.

Firedoglake – CIA Anti-Leaking Campaign Memo Leaked

CIA Director John Brennan…has launched an anti-leaking program inside the CIA called the “Honor the Oath” campaign.

The oath he is referring to in his memo has to do with secrecy in CIA’s “corporate culture.” It is not, as the first commenter points out, like this one that most federal public servants take, including Congress, Mr. Brennan, and the President that includes all of the Bill of Rights:

“I, [name], do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter. So help me God.”

Unless, of course, you agree with Alberto Gonzalez that the portion where the President is charged with protecting the nation makes null and void everything else, and you define “nation” as something other than citizens of the nation. Basically if you accept the premise that words have no meaning, mean whatever you decide they do in the moment.

And one more, a man who wrote chalk on the sidewalk outside a San Diego Bank of America office faces up to thirteen years in prison:

DailyKos – Jeff Olson Petition

Note that BOA is one of those banks that was involved in various scandals in recent years resulting in no jail sentences. War, weapons, terrorism, bankrupting countries, drug money laundering not even misdemeanors; chalk messages a felony (though it should be noted that it’s the City of San Diego pressing the charges).

Acoustic Psycho-Correction

Added a tab / page for the Defense News 1993 article on the Russian technology acoustic psycho-correction. The implications are obvious and many even appear in the article itself (see for example concerns that it could “piggyback” over normal communication channels. Then see INFORMATION OPERATION ROADMAP‘s references to cellphones and satellites, then ask yourself why we haven’t “corrected” the Earth into world peace). There can be little doubt that this, along with variations of other technologies and methods, are being used on US soil by the US intelligence community and likely one or more multinational corporations. Likely also our two major political parties. It’s quite the mess.

Examiner Article

Surveillance is for remotely torturing innocent Americans

On this day recognized by the UN as the Day in Support of Victims of Torture, another group of innocent people, who are also well-hidden by media and others, are also being tortured, according to former CIA scientist Dr. Robert Duncan.

High-tech surveillance for high-tech torture

These well-hidden, innocent, mostly credible self-identified victims of torture remain publicly unrecognized, despite their continual attempts to gain advocacy.

With recent whistleblower surveillance leaks opening a crack in the the door for Targeted Individual discussions, Alisha Green commented under a related article on June 13:

“I am SO glad there is finally some national attention on this issue. I have been made a slave in the US by these spies and their terrorist covert harassment techniques. I have a mountain of evidence, but nowhere (as of yet) to show it. I have contacted over 40 times multiple govt agencies, priests, preachers, lawyers, doctors, and public officials to no avail. Most will not even return my calls. The ACLU hung up on me when I gave my name.”

Calling themselves Targeted Individuals (TIs), globally, they see what Dr. Duncan reveals in his book and interviews as rays of hope. The sooner more of the public and victim advocate professionals understand what people like Edward Snowden and Dr. Duncan have exposed, the sooner there might be an end to TIs’ anonymity, targeting, and torturous suffering.

“Edward Snowden really has done a great thing in coming forward, which is what will free us,” commented a TI, Cheryl Locke, adding, “maybe as this unfolds, one day we TI’s will be his saving grace. And now we will be able to start making police reports without being seen as crazy.”

Synthetic telepathy, not ‘mental illness’

Dr. Duncan’s latest work is also helping. He authored The Matrix Deciphered, a book about his invention, synthetic telepathy, that is used to torture innocent people under surveillance.

According to Dr. Duncan, synthetic telepathy is pulsed electromagnetic frequencies that is used to:

1. speak inaudible words directly to a persons mind – (“bio-communications”), and

2. torture a person with microwave energy, directed microwave energy that is also pulsed microwave frequencies based on Tesla Technology.

Jesse Ventura and US War Veterans, in separate investigations, confirmed the technology of which Duncan writes in his non-fiction book based on original research.

(See: http://www.veteranstoday.com/2012/12/24/venturas-brain-invaders/)

Dr. Duncan was interviewed on Jesse Ventura’s show where he confirmed that the technology he invented is being used to torture targeted Americans for mind control purposes.

Appearing on same Ventura episode was Mark Phillips, another former CIA agent who worked on the original Mk Ultra program.

(Watch on YouTube https://www.youtube.com/watch?v=IOHfDQPT9eU)

The plan is to expand this to the entire population, according to these former government intelligence agents.

“Worse than abuse, they are being tortured,” says Dr. Duncan.

“This is the holy grail of weaponry that the national security cabals have been hiding,” said Ted Gunderson, former head of the Los Angeles FBI.

BM Update Updated

Added some links to the Behavioral Modification page (Jeff Stein’s WaPo blog, US Senate MKULTRA report at the NY Times) as well as the 2006 FOIA request response from the US Army to Donald Friedman. There’s a link to the INSCOM report (declassified one week prior to the date of their cover letter to Friedman) included and it has been added to the History links at right.

2nd Update: Added an MK/Ultra tab at top listing many of the 149 subprojects and related projects. Number 68 is notably missing and some folks seem to think it’s the human behavior control project. I think 102, 103, 112, and 117 are hilarious (“think of the children”) since it would seem to tie in so closely with the Republican political backer funded schools I once noted as likely more interested in brainwashing than anything else. There are also “African Attitude” studies (which I take to mean African-American) and 119 “Telecontrol” at Texas Christian. Many schools mentioned, including the infamous McGill (“witch doctors”?) in Quebec.

Case Study in Behavioral Modification – Philip Kresnik

The name is, so far as I know, fictional. I’m using poor, non-existent Philip Kresnik as my virtual guinea pig to demonstrate the principle or principles behind how he came to kill his likewise non-existent wife and himself. The name may be a simple anagram of Kreskin, who I view as a fake, a charlatan, and therefore the name seems appropriate for someone who does not exist. Likewise, the case study is fictional but from what I can see, possible and similar happens regularly.

Philip Kresnik is a third generation American. His grandparents immigrated to the United States in the 1940s. He married his wife while they were both undergrads. He went to law school and is now an assistant state attorney on the path to becoming a district attorney ten or fifteen years down the road depending on when his boss who has held the job for two decades decides to retire and other factors related to garnering support, campaign funds, and gearing himself towards running for office.

He has no terrible skeletons in his closet. He once had a close call that turned out to be nothing. A misunderstanding at a picnic while he was in law school involving his then three year old son could have ended his career before it began. However, he managed to straighten things out and the incident is long forgotten. The truth was that there was no inappropriate behavior, merely a misunderstanding.

It is thirteen years later. He and his wife just had a conversation, one that seemed perfectly normal. At the conclusion of this short conversation, he shot her and then himself.

Here are three versions of what happened. As you’ll see, some may describe them as existing on a different level of consciousness. I don’t know if that is an accurate description. There is nothing supernatural nor transcendental about any of them. Rather, I see it as layers of an onion. Peeling the outer ones away is necessary if there is ever to be a leveling of the playing field and/or a staving off of whatever kind of oppressive system is waiting around the corner.

One – The police investigation.

Subject, Philip Kresnik, was working on a criminal case involving bank fraud as related to a gun and drug running gang known to operate in this state and others. At approximately 9:35PM last night, he shot his wife and shot himself a short time later. Both were pronounced DOA at 1:30AM at Municipal Hospital.

Their son, 16 y.o., happened to be leaving a voicemail via his cellphone with a schoolmate while in the next room. Forensics managed to enhance the audio to discern the conversation between Mr. and Mrs. Kresnik. It is as follows:




A shot. A second shot.

Mr. K: (Sobbing).

A third shot.

–End of audio.

Further investigation suggests that the stress of the high profile case combined with harassing phone calls lead to a nervous breakdown for Philip Kresnik resulting in murder-suicide. Police have thus far been unable to determine who made the threatening calls to Mr. Kresnik’s office. His secretary has been cooperative.

Result: The case against the bank and gang for conspiracy is delayed considerably. Mr. Kresnik’s situation is called “a tragedy” by the news media. Psychologist “talking heads” discuss a lot about job stress.

Two – The investigative reporter’s book.

Unsatisfied with the official accounting of what happened and titillated by the story he has heard thus far, an investigative reporter decides to dig deeper.

He discovers that, in addition to the threatening phone calls, someone sent child pornography to Mr. Kresnik’s email account, a fact that Mr. Kresnik’s secretary kept from the police out of loyalty and anger at those responsible (which she will tell anyone must be members of the gang he was prosecuting). He also finds that sometimes the calls got passed through to Kresnik when the secretary thought it was someone calling other than the harassers.

The discovery that excites him most, however, is the significance of the conversation recorded on the son’s cellphone call. He discovers by looking through old family photos that the son himself wore a shirt with a cartoon character on it along with those words. It is his “Rosebud” moment and presents a perfect “bow” on the narrative he constructed.

Putting those two things together, he suggests that the Assistant DA may have had some kind of sexual deviant past though he is unable to uncover any actual evidence of that despite that is seems that the gang may have succeeded in doing so to drive him to that extreme.

Change: There is debate in the media between a few of Kresnik’s (many) friends willing to stick their necks out and say that he was not a pedophile and those who take the reporter’s book to its seemingly logical conclusion and say that it’s possible (while of course discussing it as though it is fact). Overall desire to always depict two opposing sides as equal allows the debate to continue because it propagates the discussion, keeps people watching.

Result: Same as the police investigation except now the bank’s attorneys manage to move public opinion by smearing the DA’s office.

Three – The Covert Op.

Thirteen years ago it may or may not have been arranged. The group responsible for what happened more recently either discovered the picnic non-incident or arranged it, understanding that Kresnik was an up and comer, likely to achieve some status due to his drive and intellect. In fact, they may have helped his career along hoping to use the old picnic incident to blackmail him should the need arise. They do this a lot, this is standard operating procedure for them.

When the discovery and subsequent investigation regarding the illegal activities of the gang and bank occur, they decide that it is too late to simply use public relations to shut it down before the trail leads to other operations that they are involved in. Some of the players involved know too much about these other activities.

Therefore they begin with the harassment and drug Mr. Kresnik without his knowledge. He and those close to him assume it is the stress and lack of sleep responsible for his change in behavior.

They also use voice-to-skull in the subliminal audio mode to make Kresnik recall the picnic incident over and over. Similarly, they use it to give his wife a hypnotic suggestion to continue to forget it. What she does recall, is that their son once used the phrase on his shirt when Mr. Kresnik was upset and that it made him laugh to hear his three year old say so and it reminded him not to take things so seriously. Conversely for him and unknown to his wife, V2K is used so that the recollection of the shirt becomes the focus and the day he nearly lost everything due to a misunderstanding. Those words become a psychological trigger. Between the drugs (which alternately cause feelings of anger, depression, and low self esteem causing him to underestimate the strength of his case against the bank and gang), the harassing phone calls (one of which implies that they know about the picnic incident) and his wife’s innocent comment (that he takes in that moment as a sign that she has turned on him, that “they” have “gotten” to her as well and that she will turn on him in the press before he can make closing arguments; not only will “they” win but he and his life will be destroyed in the process; this seems the better way out) he crumbles under the pressure while being bombarded with violent thoughts and thoughts of failure via V2K.

The situation is created and the reactions fixed and the people dance as if choreographed in a ballet. The inability for one person to hear what the other actually means when they say what they say becomes the weakness. Love of ones family, job, community, become weaknesses to be exploited. Seeing how motive, when it is strong enough, requires further investigation just doesn’t happen.

Change: None whatsoever despite ample evidence that these technologies exist and that these methods have been studied for over half a century. An apparent inability to see the dangers or grasp the ruthlessness with which they are used leaves it largely untouched as a topic in serious discussion now even though it was discussed seriously from the 1950s to the 1970s. Advances in this tech and these methods mean the danger for abuse and likelihood for no subsequent detection are both increasing.

Result: The criminals win, everybody else loses.

These same principles can be applied to less dramatic actions. This includes those that would seem on the surface to be unlikely on the part of people like Mr. Kresnik.

For example, a high speed car accident. Was the person involved running to or from something? What overcame the desire for personal safety and increased the chances that a momentary loss of motor control would prove deadly? Similarly, subjects for whom some parties find it desirable to be cut off from friends and family, these same principles apply. Fear of family being harmed can drive people away if they believe they are the cause or the center of the danger.

In short, it involves turning whatever it is the subject holds dear or believes against him or her. One could try to change what those things are, but it is in many cases much harder unless the target, the subject, is already a member of a cult or cultlike group.

Furthermore, the applications for these principles coupled with this technology are many. Mostly, we see this within political movements where group cohesion cannot be maintained. Wedges are driven between people who would otherwise make effective allies. Suspicion about motives, true loyalties, and the best ways to move forward overcome the desire to work cooperatively. Each group or individual finds themselves having to take on an opposition that does not have the same problem because it understands these principles and its loyalties are simple: love of money and power. The desire to “win” overcomes objectivity and the result is either risk-taking (resulting in injury, death, imprisonment, or other forms of being neutralized) or backstabbing among would-be allies that weakens the overall message. Additionally, the opposition uses these same principles to maintain discipline in their ranks.

As you can see, the case of Philip Kresnik was a bit of both. They hoped to control him at first but when he pushed onward with the case anyway they instead used it to destroy him.

Michael Hastings

First a general note.

Added a Behavioral Modification page. On the desktop version of this site, you should see it at top above the picture. I also discovered that I mislinked one of those DoD info memos from May 17, 2012, the one dealing with Civil Liberties, when I blogged about it a year ago. The link is fixed and is also at the bottom of that long page along with some select public record bits regarding the ability to alter behavior of animals and humans, the research that has gone into same, and just how long ago progress was made all the way up to last year.

As noted in the previous post, I’ve seen a lot of weird where use of this stuff presents a rational explanation. Here’s another likely case of the same. I’ve mentioned a few of car accidents on this blog previously, including one involving the Squidgate juror and her granddaughter last December.

HuffPo, “Michael Hastings Sent Email About FBI Probe Hours Before Death” (mobile version)

Hours before dying in a fiery car crash, award-winning journalist Michael Hastings sent an email to his colleagues, warning that federal authorities were interviewing his friends and that he needed to go “off the rada[r]” for a bit. The email was sent around 1 p.m. on Monday, June 17. At 4:20 a.m. the following morning, Hastings died when his Mercedes, traveling at high speeds, smashed into a tree and caught on fire. He was 33.

In a rare move, the FBI issued a statement denying that Hastings was under investigation. The Los Angeles Police Department also said it had found no evidence of any foul play in his death.

Hastings, an accomplished war correspondent and sharp political reporter, was best known for writing a critical Rolling Stone profile of General Stanley McChrystal that led to his resignation.

Unless and until we get a grip on just how bad things are and the methods being used to accomplish said bad, we’re going to see this kind of thing over and over.

BBD – Now with 25% More BS

Right. Michigander * Ron in the hospital.

There are lots of additional, relatively minor things going on. Some are I suppose less minor but so similar to what has come before and already been documented here that most of it seems redundant to mention. Disputes among people that I can’t otherwise make sense of. Weird rumors, some about me, that I know aren’t true.

But then there’s the fact that for the past month or two someone has been harassing Ron on his phone. It always seems to happen when I’m not around and I was at least a little inclined to wonder if he wasn’t making it up (with or without the influence of V2K, etc.).

But I have seen the phone numbers on his cellphone. He has a friend in law enforcement, so I figured I’d talk to him about it.

Ron has also had this very annoying habit of deleting his call log because, he says, he doesn’t want to think about the harasser every time he goes to make a call.

In other words, he’s deleting evidence of being harassed. Against my advice. Against any kind of logic I can think of apart from what I said above: he prefers to ignore it rather than deal with it. Whoever this caller or these callers are, he says they have mentioned my name.

A third number appeared last night. Yet another piece of evidence. Ron was drugged up last night and again deleted the number.

But that’s not all…

His law enforcement friend stopped in, so I mentioned the harassing phone calls. I’d been meaning to for some time but that was my first opportunity.

His roommate at the hospital was discharged yesterday. So, when visiting hours ended last night, he was the only occupant.

Around 9PM, they admitted a man looking for pain killers. He’d been in at least two times previous.

You see where this is going, don’t you?

Today, while the nurse took Ron in for a shower, the roommate stole the phone. This was not a clever crook. Ron learned his name, where he lives, etc. This was drug addiction doing the thinking. Sort of.

Because like so many other “coincidences” this one stinks, too. The mistake most people would make would be to assume the junkie was paid to steal the phone. Not impossible, of course, except those responsible know I am fully capable and willing to call each and every law enforcement entity with anything approaching jurisdiction. Therefore, the more likely explanation is to goad me to do just that followed by an “open and closed”, run-of-the-mill, drug-related theft. Undermines credibility that anyone would suggest that the two things, the harassing phone calls and the theft, are related.

But that is exactly why this stuff is so dangerous. It’s not just the US domestic assassination program (so much worse than surveillance) but also the one-stop “fix it” program. You can arrange pretty much anything. Shall I go through some oldies but goodies?

After the Squidgate situation arose, I suddenly found myself subject to direct or indirect contact with four former New Jersey Shakespeare Festival company members. One of them lived just five blocks away for years but I never ran into him until the s hit the f. Another was suddenly feeling nostalgic and called old numbers, had his computer-literate girlfriend do a lot of web research to locate me. Another was at a party that I thought I wound up at randomly. And of course I discovered that yet another did the voice work for the audio book version of one of Peter Watts’ novels. All of that in a three-month period.

This is what I meant about putting Ron in the position of having to help a woman in wheelchair or to walk away. A psych profile alone could predict the outcome with high certainty. It’s just a matter of making sure that their paths crossed. These people know where and when someone is going to go postal, they can make sure you are there under what you think are normal, completely unrelated business.

And then there’s the whole stolen phone thing. Happened to me in Manhattan mere days before the Squidgate trial occurred. Again, did the guy steal it (and, by the way, subsequently sell it to someone who speaks Farsi), or was it strictly a V2K “puppet show”? Don’t know, but, like the 12/23/09 arson, I expect the latter. Subliminals, radio waves, microwaves, and ultrasound don’t leave a trace so far as I know.

Disappearing evidence, regardless as to how it happens, sure looks suspicious though, dudn’t it?

* A recent mass email from Senator Levin used Michiganian. Pretty sure I looked that up.