You are on page 1of 79

by Stan J.

Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &

Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566

TERRORISM
USED AS A POLITICAL TACTIC
TO JUSTIFY WARRENTLESS SURVIELLANCE
AND THE EROSION OF OUR CIVIL LIBERTIES
by Stan J. Caterbone September 14, 2017
_________________________________________

It is too easy for present and future administrations to abuse their power
and utilize warrantless surveillance as a means of subverting and obstructing
justice for those that are engaged in Whistle-Blowing cases that concern
National Security. Without the proper oversight and judicial review, a Whistle
Blower can be place on terrorist lists for malicious reasons without the
knowledge or just cause. This is in direct conflict with keeping our democracy
free of corruption while adhering to the spirit of the constitution in the manner
our founding fathers envisioned.
Today the Trump Administration is again trying to advance what PATRIOT
Edward Snowden had disclosed, in the re-authorization of Title VII of the
Foreign Intelligence Surveillance Act (FISA), Section 702, which authorizes the
National Security Agency (NSA) to intercept the communications of foreigners
located outside the United States without obtaining a search warrant. The law
expires at the end of the year unless Congress passes legislation reauthorizing
it.

Stan (Also Stanley) J. Caterbone is a private citizen and the majority shareholder
of the United States incorporated business Advanced Media Group, Ltd., Stan J.
Caterbone was a whistle-blower and shareholder in 1987 involving the United States
Defense Contractor International Signal & Control, Plc., known as ISC. In 1992,
International Signal & Control was indicted and found guilty of among other things a
Billion Dollar Fraud and export violations concerning illegally shipping cluster bomb
technologies, missile defense systems, and other defense systems to foreign interests
including South Africa, Iraq and Saddam Hussein. Cluster bombs and related

OEN OP-ED ARTICLE Page No. 1 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

technologies are known to have been exported to Iraq by the Chilean Arms Dealer Carlos
Cardoen, a joint venture partner of International Signal & Control. The Central
Intelligence Agency is confirmed to have been involved in a covert program to arm Iraq
during the 1980s with close ties to International Signal & Control, which allegedly
included the help of the National Security Agency, a former end user of International
Signal & Control technologies under the early 1980s program Project X. A Presidential
Finding in 1984 by the Bush Administration was executed to implement the program of
arming Saddam Hussein and Iraq with the cluster bomb technologies. Serious allegations
of these programs were the focus of investigations that included the knowledge and
supervision of then appointed nominee for the Director of Central Intelligence Agency,
Robert M. Gates.

Since 1987, Stan J. Caterbone has been the victim of vast civil conspiracy that
started in 1987 to cover-up allegations of fraud within International Signal & Control
during the negotiations and merger of International Signal & Control and Ferranti
International of England. Stanley J. Caterbone alleges that warrantless surveillance was
used to obstruct justice and moot his constitutional rights in an effort to divert attention
away from his allegations of fraud within International Signal & Control back in 1987, and
afterwards to the present as a means to deny his access to the courts for remedy and
relief, and Federal False Claims Act violations. The business of Advanced Media Group has
been greatly compromised and intellectual property stolen during the late 1980s and
early 1990s that included information technology contracts with the United States
Government.

Organized stalking and harassment began in 1987 following the public allegations
of fraud within ISC. This organized stalking and harassment was enough to drive an
ordinary person to suicide. As far back as the late 1980's Stan J. Caterbone knew that
his mind was being read, or "remotely viewed". This was verified and confirmed when
information only known to him, and never written, spoken, or typed, was repeated by
others. In 1998, while soliciting the counsel of Philadelphia attorney Christina Rainville,
(Rainville represented Lisa Michelle Lambert in the Laurie Show murder case), someone
introduced the term remote viewing through an email. That was the last time it was an
issue until 2005. The term was researched, but that was the extent of the topic. Remote
Viewers may have attempted to connect in a more direct and continuous way without
success.

In 2005 the U.S. sponsored mind control turned into an all-out assault of mental
telepathy; synthetic telepathy; and pain and torture through the use of directed energy
devices and weapons that usually fire a low frequency electromagnetic energy at the
targeted victim. This assault was no coincidence in that it began simultaneously with the
filing of the federal action in U.S. District Court, or CATERBONE v. Lancaster County
Prison, et. al., or 05-cv-2288. This assault began after the handlers remotely trained
Stan J. Caterbone with mental telepathy. The main difference opposed to most other
victims of this technology is that Stan J. Caterbone after being connected to some 20 or
so individuals ranging from CIA Operatives to current day national newscasters and
celebrities, Stan J. Caterbone remains connected 24/7 with a person who declares that
she is Interscope recording artist Sheryl Crow of Kennett Missouri. Stan J. Caterbone has
spent 3 years trying to validate and confirm this person without success. Most U.S.
intelligence agencies refuse to cooperate, and the Federal Bureau of Investigation and
the U.S. Attorney's Office refuse to comment. See attached documents for more
information.

OEN OP-ED ARTICLE Page No. 2 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

In 2006 or the beginning of 2007 Stan J. Caterbone began his extensive research
into mental telepathy; mind control technologies; remote viewing; and the CIA mind
control program labeled MK ULTRA and it's subprograms.

In January of 2006, Stanley J. Caterbone was detained at every airport security


check point, which was during a policy of random checks, and taken out of line during
travel from Philadelphia, Pennsylvania, to Houston, Texas, and on to Puerto Vallarta,
Mexico. At the Houston Airport, Stanley J. Caterbone was falsely accused of carrying
plastics explosives and taken to an interview room by Homeland Security officials.
Stanley J. Caterbone was also detained for three days in Mexico, and was not provided
with an opportunity to gain access to a flight out of the country by Mexican Officials.

Today, Stan J. Caterbone is a pro se litigant in several state and local courts, in an
effort to be restored to whole since the WHISTLEBLOWING of 1987. Most notable is
CATERBONE v. The National Security Agency, NSA, et.al. In the UNITED STATES COURT
OF APPEALS FOR THE THIRD CIRCUIT CASE NO. 17-1904. That case is a PRELIMINARY
INJUNCTION FOR EMERGENCY RELIEF FILED TO IMMEDIATELY HALT THE OBSTRUCTION
OF JUSTICE THAT IS BEING ADMINISTERED THROUGHT THE ILLEGAL COINTELPRO
PROGRAM COUPELD WITH THE TORTURE PROGRAM.

The following is a memo of a meeting with ISC executive Mr.


Lawrence Resch and Mr. Stanley J. Caterbone at his office at Financial
Management Group, Ltd., which took place on June 23, 1987.

Mr. Lawrence Resch, of San Clamente, California, was a long time associate of Mr. James
Guerin who worked as a marketing consultant, and was an ISC executive prior to the
company going public in 1982. He served as Director of Marketing and head of Lancaster
operations for then defunct United Chem Con, an affiliate of ISC. He was sued by Ferranti
International in 1990 for $189 million dollars and indicted and found guilty by
prosecutors for his role with ISC and served a jail term.

Upon the arrival of Mr. Larry Resch, Stan Caterbone met him in the lobby of Financial
Management Group, Ltd, at which time Larry Resch said "Carl Jacobson could not attend,
we had to suddenly fly him out of the country early this morning (flew to Chile) The
meeting was started with the subject of the financial difficulties of United Chem Con and
possible alternatives. Larry Resch specifically addressed the possibility of moving the
operations of United Chem Con to another facility, with specific regards to the Renovo
Plant. Larry Resch specifically addressed the financing capabilities of Stan Caterbone,
along with possible management opportunities. Larry Resch also gave financial
statements and documents to Stan Caterbone for the latest fiscal year for United Chem
Con. Stan Caterbone went on to allege that United Chem Con had embezzled some
$15,000,000 from the United States Government for contracts that contained
improprieties. Stan Caterbone also alleged improprieties of International Signal & Control
and James Guerin, with specific regards to its role in the United Chem Con, and its
business activities as related to government contracts. Stan Caterbone noted that he, as
a legal shareholder of International Signal & Control was concerned about improper
business activities.

Larry Resch was taken by surprise by all of the above. Stan Caterbone became quite
upset by the evasiveness and the lack of specifics with regards to Larry Resch's
conversation. In efforts to thwart any further communication from James Guerin, United

OEN OP-ED ARTICLE Page No. 3 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Chem Con, or International Signal & Control, Stan Caterbone demanded a retainer fee of
$10,000 before anyone contacted him again.

Today, the TRUMP ADMINISTRATION is using the old J. Edgar Hoover


COINTELPRO Program while at the same time expanding the powers of local law
enforcement through 3 Executive Orders in order to Militarize Local Police
Departments. The following are the effects of the ILLEGAL AND LANDMARK
COINTELPRO PROGRAM that is used against me:

1. As Contained In The Lancaster County Court Of Common Pleas Case No. 08-13373
Where President Donald Trump Was Added To The Defendant's List On January 23,
2017 And Other State And Federal Court Cases; The Trump Administration Is
Utilizing An Illegal COINTELPRO Program To Harass The Appellant, Stan J.
Caterbone And Obstruct Justice By Directing Causing It Almost Impossible For The
Continuation Of Those Same Civil Actions.
2. The Trump Administration Signed (3) Executive Orders That Broadened The Powers
Of The City Of Lancaster Police Department To Coincide With The Above.
3. The Fact That Complainant Stan J. Caterbone's History With The Lancaster City
Police Department Traces Back To The 1960'S With The Targeting Of Complainant
Stan J. Caterbone's Father, Samuel Caterbone, Jr. In The Very Same Manner As
The Current Targeting Of Complainant Stan J. Caterbone Today Is Reason Enough
To Have Summary Judgments In All Civil Actions In Federal And State Courts
Immediately Ordered.
4. THE TARGETING CONSISTS OF THE FOLLOWING:
A. An Unprecedented Harassment Program Carried Out By Residents, Neighbors,
Stalking Groups, Law Enforcement, And Others.
B. An Unprecedented Hacking Program Of All Electronic Equipment.
C. An Unprecedented Torture Program Utilizing Electromagnetic And Other Exotic
Weapons Developed By The Department Of Defense And Intelligence
Community.
D. An Unprecedented Campaign Designed To Drain The Appellant Stan J.
Caterbone Of All Cash Resources, Which Has Resulted In A Cash Position Of
Some $60,000.00 In June Of 2015 To Nothing Today.
E. The Unprecedented Campaign Of False Statements By The Residents Of 1252
Fremont Street And The Perjured Statements Of Lancaster City Police In Recent
Criminal Summary Offenses Filed In District Magistrate Adam Witkonis Court.
F. An Unprecedented Campaign Of Daily Harassment's And Threats By The
Residents Of 1252 Fremont Street, Which Has Been Ongoing Since 2006.
G. Un Unprecedented Campaign Of Threats Of Physical Harm In Public Spaces.
H. The Unprecedented Campaign Of The Breaking And Entering Into The
Residence Of The Complainant Stan J. Caterbone Causing Vandalism, Thefts,
Poisoning Of Food, And The Strategic Placement Of Cock Roaches On A Daily
Basis. This Also Involves The Theft And Manipulation Of Court Filings And
Evidence.
I. The Above Are All Facilitated And Supported With Violations Of Due Process In
The Complaints To Law Enforcement.
J. Complainant Stan J. Caterbone, Pro Seam Receiving Retaliatory Adverse And

OEN OP-ED ARTICLE Page No. 4 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Harassing Treatment Due To The Fact That 1. , I, Complainant Stan J.


Caterbone, Pro Se, Am The Amicus For Former Pennsylvania Attorney General
Kathleen Kane In Case No. 3575 EDA 2016 In The Eastern District Of Superior
Court, Currently In Litigation.

THE CUMULATIVE RESULTS OF THE ABOVE LAYS THE FOUNDATION FOR


AN UNPRECDENTED LANDMARK CASE OF HUMAN RIGHTS VIOLATIONS AND
ANTI-TRUST VIOLATIONS.

It is too easy for present and future administrations to abuse their power and
utilize warrantless surveillance as a means of subverting and obstructing justice for those
that are engaged in Whistle-Blowing cases that concern National Security. Without the
proper oversight and judicial review, a Whistle Blower can be place on terrorist lists for
malicious reasons without the knowledge or just cause. This is in direct conflict with
keeping our democracy free of corruption while adhering to the spirit of the constitution
in the manner our founding fathers envisioned.

Activists, Citizens, and Voters must ensure that constitutional rights of private
citizens are not compromised and justice subverted through information obtained from
warrantless surveillance upon which there is no just cause for any allegations or
association with terrorism. Whistle-Blowers are inherently supportive of a system of
checks and balances within our government that go beyond our constitutional doctrines
regarding the same. Whistle-Blowers ensure that the rule of law is universally applied to
all government officials in all branches of government. The Federal False Claims Act and
its provisions protect individuals from abuse of power, while providing relief and remedies
for those that were wronged and those that had the courage to cite a wrong.

U.S. Sponsored Mind Control Systems are also used to compliment these
illegal programs to silence WHISTLEBLOWERS and others that our government
recognizes as a threat to their illegal strategies and those that are seeking the
TRUTH. Synthetic Telepathy Coupled with Electromagnetic Weapons used for
pain have been the ELECTRONIC WEAPONS OF CHOICE by the PERPETRATORS
committing these haneus crimes against, STAN J. CATERBONE since at least
2005. My father, U.S. Navy 1943 to 1946) was a victim of MK-ULTRA and
experienced the same effects since at least the early 1960's and my brother,
Sammy, (U.S. Air Force 1969-19710 received the same victimization through
the use of the LSD experiments of the same program.

STAN J. CATERBONE stated and declared that the initial time of connection
with the SYNTHETIC TELEPATHY consisted of months of NON-STOP
INTERROGATIONS BY MALE SUBJECTS WHO IDENTIFIED THEMSELVES AS CIA
OPERATIVES. The interrogations lasted hours upon hours at a time and covered
just about every aspect of AMICUS STAN J. CATERBONE'S life. The

OEN OP-ED ARTICLE Page No. 5 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

HANDLERS, for lack of a better term, not only focused on the


WHISTLEBLOWING ACTIVITIES OF ISC IN 1987, but also covered mundane
everday experiences, as a form to harass and torture.

In late spring of 2005, the HANDLERS introduce females to the sessions.


To this day, the torture consists of the same, interrogations mixed in with
harassment, sex, and humor. It is the opinion of AMICUS STAN J. CATERBONE,
that the only way to keep from desensitizing and numbing to the harassment
and pain is to experience pleasure and laughter so as to keep the magnitude of
the pain at it's highest level. THIS CAN BE SUBSANTIATED AND VALIDATED BY
THE FACT THAT THE SOCIAL SECURITY ADMINISTRATION UNDER HEALTH AND
HUMAN SERVICES GRANTED AMICUS STAN J. CATERBONE DISABILITY
BENEFITS IN AUGUST OF 2009 FOR SYMPTOMS AND ILLNESSES RELATED TO
U.S. SPONSORED MIND CONTROL, AND IN FACT STATED IN THE AWARD LETTER
THAT DISABILITY WAS DETERMINED TO BEGIN IN DECEMBER OF 2005; THE
DATE AMICUS STAN J. CATERBONE DECLARED THAT THE SYNTHETIC TELEPATHY
HAD GONE FULL-TIME 24/7, WITHOUT INTERUPTION, TO THIS DAY.

The following article by psychologist JEFFREY KAYE along with the other
exhibits that detail the use of U.S. SPONSORED MIND CONTROL, or behavioral
modification programs, will substantiate that these illegal and criminal
techniques were being used, without any means to verify or evidence, on the
prisoner detainees.

Smoking Gun on CIA Torture Conspiracy? Human Experimentation


Central to EIT Program

Posted By Jeffrey Kaye On September 27, 2009

A close reading of the CIAs Inspector General Report and the Senate Intelligence
Committees narrative on the Office of Legal Counsel (OLC) torture memos reveals a
more detailed picture of the CIAs involvement in the construction of those documents.

What emerges is consistent with recent charges of CIA experimentation on prisoners, and
of the overall experimental quality of the torture program itself. It also points to a crucial
piece of analysis by the CIAs Office of Technical Services, a memo which may or may
not include damning medical and psychological evidence of the damaging effects of SERE
techniques, and which the IG report maintains was utilized in substantial part in the
drafting of the August 1, 2002 Bybee memos. If one is looking for a smoking gun in the
torture scandal, in my opinion, one doesnt have to look much further than this.

The quote below is from the April 22, 2009 Senate Intelligence Committee narrative of
the Office of Legal Counsels opinions on the CIAs interrogation program. Please keep in
mind as you read the quote and the added bolded emphasis, that recent documentation
has shown that for years the CIA and Special Operations had researchers studying the
effects of SERE training.

Moreover, the research had published in peer-reviewed journals, in part because the
research was also meant to add to the psychiatric communitys understanding of the

OEN OP-ED ARTICLE Page No. 6 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

mechanisms of Post-traumatic Stress Disorder. Some of the research had also been
published in the June 2000 edition of Special Warfare, The Professional Bulletin of the
John F. Kennedy Special Warfare Center and School.

So, keeping this all in mind, consider the following from the Intel Committees narrative
(emphasis added): According to CIA records, because the CIA believed that Abu
Zubaydah was withholding imminent threat information during the initial interrogation
sessions, attorneys from the CIAs Office of General Counsel met with the Attorney
General, the National Security Adviser, the Deputy National Security adviser, the Legal
Adviser to the National Security Council, and the Counsel to the President in mid-May
2002 to discuss the possible use of alternative interrogation methods that differed from
the traditional methods used by the U.S. military and intelligence community. At this
meeting, the CIA proposed particular alternative interrogation methods, including
waterboarding.

The CIAs Office of General Counsel subsequently asked OLC to prepare an opinion about
the legality of its proposed techniques. To enable OLC to review the legality of the
techniques, the CIA provided OLC with written and oral descriptions of the proposed
techniques. The CIA also provided OLC with information about any medical and
psychological effects of DoDs Survival, Evasion, Resistance and Escape (SERE)
School, which is a military training program during which military personnel receive
counter-interrogation training.

While the fact that the OLC accepted at face value the CIAs statements regarding the
safety or the effects of the interrogation procedures they were proposing is no surprise to
anyone who has read the torture memos and evidence of the unprofessionalism and
bias of the memos authors the degree to which the conspiracy (by CIA or OLC, or
both) to withhold evidence of the real effects of the Enhanced Interrogation Techniques
(EITs) by the CIA has never been made more concrete than now.

To my knowledge, we do not have the specific document wherein the CIA provides the
medical and psychological effects of SERE school. I have been told that this document
is still classified. But it seems possible that the CIA did pass on the details of the
research that was available to it, including the debilitating effects of SERE techniques,
which sent stress hormone levels, according to one research report, some of the
greatest ever documented in humans. Another report cited neuroendocrine changes
[that] may have significant implications for subsequent responses to stress.

One of the authors of these reports, Charles A. Morgan, III, M.D., who has identified
himself in certain settings as a Senior Research Scientist on the CIAs Behavioral
Science Staff, has criticized my coverage of CIA experiments on the psychological and
physiological effects of SERE training upon human subjects. While he could not specify
what aspects of this coverage he felt were inaccurate and misleading, he did insist:

The research conducted by our research team at the National Center for Post Traumatic
Stress Disorder is not, and never has been, conducted for any other purpose than to help
us understand the pathophysiology of stress disorders and we might better help in the
treatment of veterans.

In making his mea culpa, Dr. Morgan never mentions that some of this research was
funded (over $400,000) by the Army and the Office of Naval Research. He doesnt
mention his acquaintance with great people who do military interrogations. He also

OEN OP-ED ARTICLE Page No. 7 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

forgets to cite his book contribution, where he states (emphasis added):


The SERE training environment affords the military services the opportunity to
collaborate with various other government agencies in exploring old and new
techniques in gathering human intelligence.

Of course, he neither confirms nor denies his affiliation with the CIA, an affiliation which I
have traced to the CIAs Science and Technology directorate, through his association
(large PDF) with the Intelligence Technology Innovation Center, which is a research
organization under the CIAs authority that answers directly to the CIAs Science and
Technology directorate. But most of all, Dr. Morgans arrows fall way short of his target,
as I have never accused him of personal involvement in the reverse-engineering of SERE
techniques for use in the torture program.

What is disturbing is his seeming lack of concern over the possiblity that the research he
helped conduct was either used to further experiments upon torture victims in the CIAs
clandestine prisons, or contrariwise, was withheld from Office of Legal Counsel lawyers
who relied upon CIA advice concerning the effects of techniques derived from the SERE
schools.

What is indisputable is that by virtue of his position, Dr. Morgan had access to CIA
officials just at the time that another department of the CIA, one to which he is affiliated,
was, according to the CIAs own Office of Inspector General Report (large PDF) involved
in vetting the SERE techniques for use in interrogations. The other department was the
Office of Technical Services (OTS), part of the CIAs Science and Technology Directorate.
This, by the way, is the same division that was responsible for the MKULTRA experiments
of the 1950s and 1960s. From the OIG report:

CTC [CIA's Counter-Terrorism Center], with the assistance of the Office of Technical
Service (OTS), proposed certain more coercive physical techniques to use on
AbuZubaydah.

CIAs OTS obtained data on the use of the proposed EITs and their potential long-term
psychological effects on detainees. OTS input was based in part on information solicited
from a number of psychologists and knowledgeable academics in the area of
psychopathology.

OTS also solicited input from DoD/Joint Personnel Recovery Agency (JPRA) regarding
techniques used in its SERE training and any subsequent psychological effects on
students. DoD/JPRA concluded no long-term psychological effects resulted from use of
the EITs, including the most taxing technique, the waterboard, on SERE students. The
OTS analysis was used by OGC [DoD's Office of General Counsel] in evaluating the
legality of techniques.

OTSs solicitation of information on SERE from JPRA elicited some sort of feedback from
JPRA, which supposedly told OTS that SERE training caused no long-term effects. The IG
Report does not say if this was in the form of a memo and only speaks of OTSs analysis.
In any case, we should not confuse any OTS analysis with the information provided by
JPRA itself to the Office of General Counsel, which produced a number of memorandum
and attachments in late July 2003. Marcy Wheeler has been analyzing the timing of these
JPRA items, including the fact that one of these key documents is missing.

The CIA IG Report is relating a story whose emphasis differs from that produced in the

OEN OP-ED ARTICLE Page No. 8 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

narrative of the Senate Armed Services Committee investigation (PDF) into SERE torture.
In the latter, JPRA is the main culprit in providing cover for the supposed safety of using
SERE techniques. Yet, in the OIG account it looks like the CIA used DOD/JRRA as a cover
for the safety of techniques that it knew were in fact harmful from their own analysis of
the data. Moreover, it was the OTS analysis that was used in substantial part as
the basis of the August 1, 2002 memo approving the Enhanced Interrogation
Techniques (EITs).

That legal opinion was based, in substantial part, on OTS analysis and the experience and
expertise of non-Agency personnel and academics concerning whether long-term
psychological effects would result from use of the proposed techniques.

Moreover, the CIAs Office of Medical Services was frozen out of the initial analysis of the
risk and benefits of EITs, and not even provided with a copy of the OTS report given to
the White House Office of Legal Counsel. Such compartmentalization of information is
indicative of a covert operation, such as a Special Access Program (SAP). This SAP would
have included personnel in CIAs CTC, OTS, OGC, and Directorate of Operations, also
portions of DOD (JPRA and Special Operations Command),

and probably the White Houses OLC, Office of the Vice President, and National Security
Council. It seems highly likely that the CIA report to the OLC on the medical and
psychological effects of the SERE school program, mentioned in the Senate Intelligence
Committee narrative quote above, is in fact the OTS report, which came from the same
CIA directorate to which Dr. Morgan belongs. This does not speak to Morgans
foreknowledge of what would be used, nor to the amount of his involvement. But it does
speak to the likelihood that the government research he conducted (with others) was
available and likely used by his associates in the CIA.

To what purpose was this information used? It seems Dr. Morgan has serendipitously
given us the answer himself: exploring old and new techniques in gathering human
intelligence. The CIA appears to have used torture to conduct what Physicians for
Human Rights, in a white paper (PDF) recently published, called possible unethical
human experimentation, [which] urgently needs to be thoroughly investigated. The
government should declassify the OTS report, and bring the process of investigating the
CIAs role in the torture conspiracy fully into public purview.

The above report was originally published on FireDogLake.com. Jeffrey Kaye, a


psychologist living in Northern California and a regular contributor The Public Record, has
been blogging at Daily Kos since May 2005, and maintains a personal blog, Invictus. E-
mail Mr.Kaye at sfpsych at gmail dot com.

In Keith, 407 U.S. at 313-14. There, the Court explained that [n]ational
security cases . . . often reflect a convergence of First and Fourth Amendment
values . . . Fourth Amendment protections become the more necessary when
the targets of official surveillance may be those suspected of unorthodoxy in
their political beliefs. The danger to political dissent is acute where the
Government attempts to act under so vague a concept as the power to protect
domestic security. Id. The Court thus concluded that Fourth Amendment
freedoms cannot properly be guaranteed if domestic security surveillances may
be conducted solely within the discretion of the Executive Branch. The Fourth
Amendment does not contemplate the executive officers of Government as

OEN OP-ED ARTICLE Page No. 9 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

neutral and disinterested magistrates. . . . The historical judgment, which the


Fourth Amendment accepts, is that unreviewed executive discretion may yield
too readily to pressures to obtain incriminating evidence and overlook potential
invasions of privacy and protected speech. . . . [T]his Court has never sustained
a search upon the sole ground that officers reasonably expected to find
evidence . . . and voluntarily confined their activities to the least intrusive
means . . . . The Fourth Amendment contemplates a prior judicial judgment, not
the risk that executive discretion may be reasonably exercised.

ISC, THE CIA/NSA, AND LANCASTER COUNTY, PENNSYLVANIA

In 1991 the United States Attorney indicted James Guerin, founder of


International Signal and Control, Plc., or as they were known ISC, and many of
his colleagues in an attempt to politicize LEGITIMATE INTELLEGENCE
OPERATIONS THAT WERE USED TO, IN ACTUALITY AND HINDSIGHT, SUPPORT
OUR NATIONAL SECURITY EFFORTS IN THE MIDDLE EAST. These efforts helped
in earnest support Iraq defeat Iran, and helped drive the Soviets from
Afganastan, among other Middle East conflicts. ISC was instrumental in the
design and manufacture of everything from the cluster bomb to sophisticated
telemetry systems.

James Guerin was a Christian man and PATRIOT that fell victim to Public
Corruption and over-zealous prosecutors who lacked the knowledge and
sophistication to ever be involved in such affairs in the first place. I personally
met James Guerin and had the fortunate privilege to befriend his daughter and
son. Today the United States Attorney General, Mr. Jeffrey Sessions, and other
Trump Administration Officials engage in the same tactics. James Comey,
former Director of the Federal Bureau of Investigation, FBI, is a prime example.
His firing was a miscalculated political mistake. And President Trump can than
Comey for the Press Release 8 days before the election regarding Hillary Clinton
and Weiner. That changed the course of the election no matter what the
pundits say.

On February 1, 1991 Lynn Sherr of ABC News 20/20 reported the following:

This is the story of how this deadly weapon, designed for the U.S. military made
its way form this country to Iraq. And how American Soldiers may face the devastation of
a cluster bomb if a ground war breaks out in the Persian Gulf. Federal Officials believe
Saddam Hussein got his arsenal thru a lethal combination bureaucratic foul ups in the
U.S. Government and simple greed.

OEN OP-ED ARTICLE Page No. 10 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Here is how the cluster bomb works. An artillery shell, an airplane, or a rocket launcher
sends the bombs toward their targets. Each bomb carries hundreds of smaller bomlets,
something like hand grenades. Cluster bombs can be used against ground troops or
tanks, and can even scatter mines to lie dormant for days. The bombs can spray
thousands of pounds of sharp objects pins or even razor blades. The shrapnel can rip
through anyone or anything in its way, causing massive casualty among civilians or
ground troops. You can see the destruction in these buildings in Lebanon after a cluster
bomb attack.

How did Iraq obtain the cluster bombs and the ability to make their own? It was
incredibly simple. Investigators believe it started with International Signal & Control, A
government contractor with 5,000 employees based in Pennsylvania, which build key
components of cluster bombs in a subsidiary in California. 20/20 has learned Federal
Investigators believe ISC provided the technology, that is the plans, to this man, Carlos
Cardoen, Chilean arms dealer. Authorities believe he used the plans to build the cluster
bombs in Chile, then he shipped them to Iraq.

Whats wrong with all this? If the cluster bomb technology actually left the county, that is
illegal without U.S. Government permission, investigators say ISC never got. It is also
illegal for a foreigner, like Cardoen, to take the plans out of the United States without a
license, which sources tell us, he never obtained. The man who opened the door to Iraq
for Cardoen, was this man Nasser Bedouin. He is a Lebanese born middleman for
Cardoen who is based in the United States. Bedouin traveled often to Bagdad, and
arranged for sale cluster bombs and other military hardware to Saddam Husseins army.
In his first television interview, he told us about the business of dealing in deadly
weapons.

IS LANCASTER COUNTY GROUND ZERO FOR ELECTROMAGNETIC


WEAPON ATTTACKS, COVERT SURVEILLANCE, AND ORGANIZED
STALKING GROUPS?

The links to ISC and Lancaster, Pennsylvania and U.S. Sponsored Mind
Control comes through ISC Board of Directors, Former Director of the NSA, and
The Director of U.S. Naval Intelligence Admiral Bobby Ray Inman. One must
remember that the U.S. Sponsored Mind Control Programs were the direct result
of the Soviet Unions accomplishments of using Microwave Technologies to
bombard the U.S. Embassy in Moscow as early the 1950's and the use of
German Psychiatrists by Adolf Hitler in the 1940's. Both the German and Soviet
Mind Control Programs predate that of the United States. Thus, the beginning
of the Mind Control Arms Race. Just this year, the Trump Administration
introduced the NEW MILITARY SPACE AGENCY, in an effort to formalize the
weaponization of Space and Microwave Weapons under one agency. This will
convert the Department of Defense programs and that of the U. S. Intelligence
Agencies to this new Military Space Agency, in my opinion.

OEN OP-ED ARTICLE Page No. 11 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Lancaster County's U.S. Representative Joe Pitts was instrumental in


these efforts in his work on the Electronic Warfare Working Group. This is
documented in Congressman Pitt's article of the same:

Securing EW's Future


Create Single Leader To Direct Planning, Training As a veteran of the U.S. Air Force who
served three tours of duty in Vietnam as a navigator and electronic warfare (EW) officer
on board B-52s, I learned the absolute necessity of brandishing a dominant EW
capability. However, I continue to watch as EW faces neglect in the doctrine, investment
and leadership of our armed forces.

We cannot afford to wait until the fighting starts to think about EW. By consolidating
leadership within the Office of the Secretary of Defense (OSD) and the services, creating
more effective investment strategies and better training our troops to utilize EW, I believe
the future of EW will be strengthened to the benefit of our armed forces. In response to
glaring shortfalls in EW realized during Operation Allied Force over Kosovo in 1999, I
founded the congressional EW Working Group (EWWG), intended to be a resource to
Congress, the Department of Defense and the defense community at large about the
need to invest in EW technology and capabilities.

The current operations in Iraq and Afghanistan again have highlighted the need to
strengthen U.S. superiority in the electromagnetic spectrum. EW continues to save
hundreds of lives by defeating improvised explosive devices that use electronic triggering
devices, such as cell phones and car
key fobs. But our adversaries are becoming more adept at operating in the spectrum by
identifying where we are vulnerable, and we must continually learn to counter rapidly
advancing technology.

However, despite the success in Iraq and Afghanistan, history suggests that our EW
capabilities will again face a period of neglect once current operations slow down or the
United States enters a period of relative peace. The people from our armed forces'
research labs, EW chiefs from each branch of the military and industry representatives to
discuss the future of electronic warfare.

In addition, the Association of Old Crows (AOC), an organization of EW professionals, in a


recent report, "Electronic Warfare: The Changing Face of Combat," offered several
recommendations to improve EW capabilities.
n the whole, EW leadership within OSD and the services is fragmented, hurting EW
budgets and creating inefficient planning and sometimes duplicative EW programs. Unlike
many other mission areas, EW must be a truly joint capability. Yet, there is no single
individual within the Pentagon who oversees or coordinates funding, acquisition, training
and planning for EW.

Likewise, within each service, there is no flag or general officer with appropriate authority
who can provide leadership for service EW programs. To remedy this, an office within
OSD tasked to guide joint EW plans, policies and procurement should be established,
along with the appointments of experienced EW flag or general officers within each
service. Leaders understanding the value of EW is not the same as leadership, which is
necessary for effective EW practices.

OEN OP-ED ARTICLE Page No. 12 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

The streamlining of EW leadership will then lead to more efficient investment in present
and future capabilities. Operations in Iraq and Afghanistan have taken a further toll on
EW systems and platforms, and many need to not only be restored but modernized. To
this en and prioritize modernization efforts and inject necessary funding for next
generation EW capability.

The Defense Department should also authorize an EW Critical Technologies List, which
would help coordinate EW investment strategy, maximize limited resources and stabilize
funding streams for next-generation systems. This list should be submitted to Congress
on a regular basis.

We have seen that our enemies are able to quickly adapt and field deadly assets; the
United States must meet and exceed these challenges by implementing proper
investment strategies. Our troops also need adequate knowledge and training. While
each branch of the military must provide its own EW expertise and capabilities, current
operations have highlighted the need for joint interaction and readiness. The AOC has
recommended, and I agree, that a joint services coordination cell should be established
to serve the combatant commands. The coordination cell would work directly with
combatant commanders and be ready to deploy to help us control the spectrum from the
first day of conflict.

Furthermore, just as there is high-level specialized training, such as Navy TOPGUN and
Air Force Fighter Weapons School for our fighter pilots, there should be a similar joint EW
training program so our war fighters know what they need to know about EW before
being deployed. Effective training and projected career path will help sustain the
EW community for many years to come.

EW saves lives, and we must not allow our EW capabilities to continue eroding. Now is
the time for the United States to capitalize on numerous opportunities to improve and
strengthen our edge in the electromagnetic spectrum. These recommendations can
secure the future of EW, keeping the members of our armed forces safe and effective in
conflict. Rep. Joe Pitts,R-Pa.,is founder, Electronic Warfare Working Group.

In 1990 I was protesting a Department of Defense Contract the I was


bidding on for the Defense Mapping Agency of the Department of Defense for
my Company ADVANCED MEDIA GROUP and Joint Venture Partner American
Helix. There were four bidders, 2 being the designers and innovators of CD
Technology, SONY and PHILLIPS DUPONT. The contract was a multi-million
project to digitize the maps of the theater of war in the Middle East to CD-ROM
technology. Early on in the formal protest I solicited the help of Lancaster
County's U.S. Congressional Representative Robert Walker of East Petersburg,
Lancaster County as my Liason. We won the U.S. Department of Defense
Protest and the Bidding Process had to be started over. The Contracting Officer
was Brigadier General Stanley O. Nelson. SONY went on to secure the contract.
In October of 2016, while chairing the presidential campaign for John Kasic,

OEN OP-ED ARTICLE Page No. 13 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Robert Walker also wrote an regarding the weaponizing of space.

It is during these years that I also did work for DARPA, The Defense
Advanced Research Project Agency, of the Department of Defense. DARPA IS
CREDITED WITH BEING THE AGENCY THAT DEFELOPES THE MOST
SOPHISTICATED MIND CONTROL TECHNOLOGIES FOR THE MILITARY. DARPA
was a joint venture partner of NIST, or the National Institute of Science and
Technology of Washington, D.C. I was instrumental in helping NIST create CD-
ROM's in the UNIX language for the development of Voice Recognition Systems.

Editors note: Trump policy advisers Robert Walker and Peter Navarro return with a
second op-ed detailing the approach a Trump administration would take on national-
security space matters. Hillary Clintons campaign has been invited to submit op-eds
elaborating on the answers Clinton provided for our Oct. 10 article, Hillary Clinton and
Donald Trump weigh in on U.S. space policy.

by Robert S. Walker and Peter Navarro October 24, 2016

Obama-Clinton economy and a lack of strategic vision are major causes. Meanwhile,
China and Russia continue to move briskly forward with military-focused space initiatives.
Indeed, each continues to develop weapons explicitly designed, as the Pentagon has
noted, to deny, degrade, deceive, disrupt, or destroy Americas eyes and ears in space.

To address such emerging threats and maintain U.S. strategic superiority in space a
peace through strength Trump administration will simultaneously strengthen our
economy and manufacturing base while significantly expanding our civilian and military
space budgets.

Trump understands, as Reagan did before him, that without a strong economy, there can
be no strong space program. It is not too bold to assert the maintenance of our
technological and strategic superiority in space is vital not just to national security but to
our very survival. Today, every aspect of our military force projection worldwide depends
on our on-orbit communications, observation, and intelligence gathering capabilities. Our
ability to see and understand potential hostile activity and to respond promptly and
accurately is ineluctably intertwined with our space capabilities.
While Americas space-based capabilities have made our military the worlds most
powerful and effective, an over-reliance on our satellite network to provide situational
awareness on the battlefield is now making America highly vulnerable to attack. Chinese
and Russian strategists understand this better than our own government. Thats why
they are now aggressively targeting our satellite networks both military and civilian as
the very concept of warfare broadens.

Against this emerging strategic chessboard, Donald Trumps priorities for our military
space program are clear: We must reduce our current vulnerabilities and assure that our
military commands have the space tools they need for their missions. We must also
reduce the cost of space access and create new generations of satellites to deal with
emerging threats.

OEN OP-ED ARTICLE Page No. 14 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

The future military necessity of using smaller force projection into hostile arenas will
demand the speed and agility that only space-based assets can supply. Addressing
current vulnerabilities will, for example, require new generations of smaller, more robust
constellations of satellites.

Because of their sheer numbers, constellations of micro-satellites will be much harder to


attack. To maintain and constantly upgrade these constellations, in turn, will require new
technologies such as persistent platforms, capable of robotically servicing and refueling
satellites in orbit. A Trump administration will also lead the way on emerging technologies
that have the potentialwith a range of hypersonic weapons that are very difficult to
defend against with traditional air-defense interceptors. A Trump administration will
increase the coordination between DARPA, NASA, and the private sector to ensure the
U.S. remains well ahead of the technology curve.

To move boldly forward, we must recognize that many of our military needs can be met
with commercially available launch, communications, and observation capabilities. This
businessoriented approach will reduce costs while accessing new advances on a timeline
significantly quicker than current, outdated military procurement procedures.

Such an increased reliance on the private sector will be a cornerstone of Trump space
policy.

Launching and operating military space assets is a multi billion-dollar enterprise


employing thousands, spurring innovation, spinning off civilian applications like GPS, and
fueling economic growth. Todays backward-looking acquisition policies must be
immediately and substantially reformed as a priority action. A key Trump goal will be to
create lower costs through greater efficiencies. We must ensure that space products
developed for one sector, but applicable to another, will be fully shared, not duplicated. It
makes little sense to develop numerous launch vehicles at taxpayer cost, all with
essentially the same technology and payload capacity. Coordinated policy could end such
duplication of effort and could likely determine where there are private sector solutions
that do not necessarily require government investment.

America must continue to be a bright star in space that people all around the world will
continue to look up to with admiration, assurance, and hope. No space goals will be more
important to Donald Trump than defense of our nation and that a freedom-loving people
will lead the way to the heavens above.
_____________
Robert Walker is former chairman of the U.S. House Science, Space, and Technology
Committee and former chairman of the Commission on the Future of the U.S. Aerospace
Industry. Peter Navarro is a business professor at the University of California-Irvine
and author of Crouching Tiger: What Chinas Militarism Means for the World. Both are
senior policy advisers to the Trump campaign.

ADMIRAL BOBBY RAY INMAN, THE GO-TO GUY FOR BLACK OPS
PROGRAMS AND DEFENSE CONTRACTS

In the following article by Tom Porter in 1996 documents the Bobby Ray
Inman Mind Control Connection through SAIC Corporation:

OEN OP-ED ARTICLE Page No. 15 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Brief History Of MK-Ultra, CIA Program On Mind Control by Tom Porter


1996 All Rights Reserved

S.A.I.C. involvement in 1993 American Parapsychological Association


meeting arrangements, via their 'Cognitive Sciences Laboratory'. Science
Applications International Corporation is a big time defense contractor,
has held the largest number of research contracts of any defense
contractor. Bobby Ray Inman is on its board of directors, among others.

In December 1993 President Clinton nominated Admiral Bobby Ray


Inman to be Secretary of Defense. Inman served in a series of senior
intelligence positions including Director of Navel Intelligence (1974-76), Vice
Director of the Defense Intelligence Agency (1976-77), Director of the National
Security Agency (1977-81) and Deputy Director of the Central Intelligence
Agency (1981-1982). In the early 1980s Inman, then a private businessman,
was named to the shadow board International Signal and Control. These boards
are required for U.S. defense companies wholly or partly owned by foreigners
and are supposed to guarantee that no U.S. secrets get into foreign hands.

In 1991 James Guerin, founder and chairman of International Signal and


Control (ISC), pleaded guilty to selling arms to apartheid South Africa and
agreed to testify against others. Ten American, seven South Africans and three
South African companies were charged in the case. This case was one of the
most significant U.S. violations of the of U.S. export laws and the mandatory
U.N. arms embargo.

In April 1992, prior to Guerin's sentencing, Inman, wrote the judge that
between 1975 and 1978 Guerin "voluntarily provided the U.S. government with
information obtained during his foreign travels which was of substantial value,
particular that related to the potential proliferation of nuclear weapons."
Several defendants in the ISC case claimed the U.S. government knew of their
sales to South Africa and that they provided information on South Africa's
defense, including its nuclear weapons program. Guerin was sentenced to 15
years in jail. Guerin could have received up to 61 years.

In January 1994 Inman withdrew his nomination for Secretary of Defense. In


response to his withdrawal I wrote this letter that appeared in the New York
Times. - Richard Knight

THE NEW YORK TIMES EDITORIALS/LETTERS FRIDAY JANUARY 28, 1994


South Africa Link
To the Editor:

The withdrawal of Bobby Ray Inman's nomination for Secretary of Defense brought to
public attention the case of International Signal and Control, a defense and technology
company. James Guerin, the company's founder, was recently sentenced to jail for illegal
arms sales to South Africa, as you report in "Inman Faced Scrutiny on Jailed Arms

OEN OP-ED ARTICLE Page No. 16 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Dealer" (news article, Jan. 20).

As one who has followed International Signal and Control for years, I believe there are
many unanswered questions in this case involving our own Government, its intelligence
agencies and United States implementation of the United Nations arms embargo against
South Africa.

Ties between International Signal and South Africa go back to the 1970's. In February
1976 the Department of State granted approval of a contract for the study of maritime
command and control systems with Barlow Communications of South Africa. In January
1978, because of United States support for the 1977 United Nations arms embargo
resolution, the State Department revoked the contract. Yet it appears International
Signal continued its involvement in this project. According to the indictment of Mr.
Guerin, International Signal sold South Africa inertial and land navigation systems and
gyroscopes for aircraft, missiles and helicopters. International Signal also made millions
of dollars in other illegal sales to South Africa including military-related technology and
land mines. Did United States intelligence agencies allow International Signal to continue
its illegal operations for intelligence on South Africa's nuclear and other military
programs, or to support South Africa's military for other reasons?

Mr. Inman has acknowledged that as director of Naval Intelligence in the mid-70's, he
knew of the first International Signal contract and was aware of later information
supplied by the company on South Africa's nuclear program. Most likely, these ties had
some bearing on Mr. Inman's appointment as a director on the International Signal
shadow board. Such boards protect United States interests and secrets. Did Mr. Inman
ask questions about large contracts going to small companies and countries like South
Africa and Panama? The central question, as with the IRAN-CONTRA SCANDAL, is how
to establish effective procedures to prevent United States intelligence agencies, or people
working with them, from subverting laws established by Congress. If directors on shadow
boards such as that of International Signal are just "window dressing," Congress should
tighten the system and make directors accountable.

Congress should also examine the role of intelligence agencies in this case. Company
officials say they continued providing Information to the Central Intelligence Agency into
the 80's, while illegal sales occurred.

Mr. Inman says the United States Government never gave Mr. Guerin permission to
violate the arms embargo against Smith Africa. Did the C.I.A. know of these violations of
the embargo? If the C.I.A. was aware and took no steps to stop the illegal said, it was
effectively a partner of International Signal in arming apartheid South Africa.
RICHARD KNIGHT
New York, Jan. 21, 1994
The writer is a research associate for the Africa Fund, a nonprofit human rights
organization.

The following is a segment of a transcript from THE CONFERENCE ON


HARASSMENT AND COVERT SURVEILLANCE of October 1 and October 2, 2016 in
Germany. Dr. Nich Begich describes the Electronic Weapons, their history, and
their exploitation by the U.S. Government. IN ORDER TO DISCREDIT THE USE

OEN OP-ED ARTICLE Page No. 17 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

OF ELECTRONIC WEAPONS ON UNSUSPECTING U.S. CITIZENS ONE MUST BE


ABLE TO LEGITIMATELY DISCREDIT DR. NICK BEGICH AND THE FOLLOWING
TRANSCIRPT.

Dr. Nick Begich is the eldest son of the late United States Congressman
from Alaska, Nick Begich Sr., and political activist Peggie Begich. He is well
known in Alaska for his own political activities. He was twice elected President
of both the Alaska Federation of Teachers and the Anchorage Council of
Education. He has been pursuing independent research in the sciences and
politics for most of his adult life. Begich received Doctor of Medicine (Medicina
Alternitiva), honoris causa, for independent work in health and political science,
from The Open International University for Complementary Medicines, Colombo,
Sri Lanka, in November 1994. He co-authored with Jeane Manning the book
Angels Don't Play This HAARP; Advances in Tesla Technology. Begich has also
authored Earth Rising - The Revolution: Toward a Thousand Years of Peace and
and his latest book Earth Rising II- The Betrayal of Science, Society and the
Soul both with the late James Roderick. His latest work is Controlling the
Human Mind The Technologies of Political Control or Tools for Peak
Performance. Begich has published articles in science, politics and education
and is a well known lecturer, having presented throughout the United States
and in nineteen countries. He has been featured as a guest on thousands of
radio broadcasts reporting on his research activities including new
technologies, health and earth science related issues. He has also appeared on
dozens of television documentaries and other programs throughout the world
including BBC-TV, CBC-TV, TeleMundo, and others. Begich has served as an
expert witness and speaker before the European Parliament. He has spoken on
various issues for groups representing citizen concerns, statesmen and elected
officials, scientists and others. He is the publisher and co-owner of Earthpulse
Press. He served as Tribal Administrator/Village Planner for the Chickaloon
Village Council, a federally recognized American Indian Tribe of the Athabascan
Indian Nation for five years and served four years as the Executive Director of
The Lay Institute of Technology, Inc. a Texas non-profit corporation. Currently
Begich consults for tribal organizations, private corporations and others in a
number of research areas. Dr. Begich is credited with persuading the EUROPEAN
UNION TO BAN SPACE BASED WEAPONS. Dr. Begich is a single person with five
adult children, and four grandchildren.

DR. NICK BEGIC 2015 LECTURE TRANSCRIPT


And so I decided I would go in and look into this issue independently. And I did. I picked
up maybe 30 articles and papers, design specifications, some things, and with friends
encouraging me to publish, I published the first article that I had written on HAARP back
in 1994. So it's been a very long time ago, extremely low frequency signals or ELFs.
These are signals that can be biologically active, can affect us as human beings and in
very specific ways. And in particular, certain applications of the technology -- and this
gives you sort of a graphic illustration of the focus. These view graphs, actually, were
given to me by the inventor, Bernard Eastlund, prior to his passing. And we utilized them
in our publications and in some of our work. So this gives you kind of a graphic showing
the radio frequency from the array, moving up into the ionosphere and focusing that
energy.

OEN OP-ED ARTICLE Page No. 18 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

His initial concept was to create a global shield, to be able to utilize the natural magnetic
field lines that surround the earth, be able to punch energy into this and then create this
kind of global shielding effect. And the idea was that any electronic device piercing that
energy would be disrupted, like satellites, intercontinental ballistic missiles, virtually any
electronic device that ran into this field of energy that was being amplified would be
destroyed.

Now, one of the other interesting parts of this -- and this kind of shows that, again,
utilizing one of Eastlund's graphics. So you can see like a field line and then you see this
cork-screwing energy going around it. That energy naturally is occurring from the
southern polar regions into the northern polar regions. And, in this case, they actually
couple actually utilize the energy on the ground to couple with the natural energy, and
then coming from the north to the south, create this cork-screwing effect, which
accelerates the electrons and then creates this global shield.

Now, that was his initial concept. And as a concept, it caught the attention of a number
of people and eventually got funding from the Congress, initially at 30 million, and over
the last few decades now over almost 300 million, which in dollars is not a lot of money,
but when you consider, this is sort of the pinnacle of billions of dollars spent in
ionosphere research over many decades.

What caught my attention in terms of the technology of Eastlund -- I'm going to skip
some of these that are not so relevant -- was the idea that you could manipulate the
ionosphere -- and I'll use this as a better example. So one of the thoughts was that if
you could punch or pulse energy into the ionosphere so think about this energy going
up and, like, a hammer ringing a bell. Every time it hits that ionosphere, the ionosphere
itself vibrates and then it begins to send a signal in the ELF range. So you have a high
frequency signal going up, punching the ionosphere, the ionosphere which is energized
then acts as a broadcast antenna in the sky bringing back an ELF signal to the earth, and
in this case covering an entire hemisphere.

Now, ELF signals, extremely low frequency signals, are very long wavelengths. They
penetrate the earth and sea. They're utilized for communication with submarines, as an
example, the depth, because short wavelengths won't penetrate the earth and sea.
They're also used for what's called earth-penetrating tomography, which in simple
language or by analogy would be like x-raying the earth or looking into the earth for
underground structures. But one of the side effects of ELF is the entrainment effect on
the human mind. Because ELF signals will lock onto in what's called a frequency following
response. And you can use a lot of different techniques to create a frequency following
response. You can use flickering light, you can use binaural beat, which I'll explain in a
few minutes. You can use electromagnetic fields such as this, or even the power grid
itself can be modulated in such a way to create a signal that the human body will join
with, will couple with, and begin to follow. It doesn't take a great deal of energy to
accomplish this. This is the one that triggered my real interest in HAARP, because this is
the one that everybody kind of ignored and said, oh. In fact, the HAARP planners said,
well, if ELF has a biological effect, it's a side effect. It's an unintended consequence. We
heard that phrase earlier today. But I don't believe that. I believe that it's an intended
consequence. It's intended to grade populations in very specific ways.

Now, this book was mentioned by my friend earlier today, "Between Two Ages",

OEN OP-ED ARTICLE Page No. 19 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

by Zbigniew Brzezinski. (FATHER OF MSNBC HOST MIKA BRZEZINSKI OF


MORNING JOE (Joe Scarborugh whom both got married this Spring).

And why this is an important book, it was written National Security Adviser to President
Carter. This is around the time that Kissinger and think tank, so to speak. Now, find this
book. I really encourage you to find this book and read it, because it is not a prediction
of what will come with technology. It's the blueprint, in fact. You can read this. When I
first read it -- he writes in a pretty convoluted style. It's a little difficult even in English to
understand. But I really encourage you to read it because he predicted the economic
changes that took place, the political changes that took place in the world over the last
40 years with a great deal of accuracy. And some will say it really wasn't the prediction.
It was the plan.

If you look within this text between Pages and 56, you'll see a section that's dedicated to
the kind of technologies we're talking about today, a mind control technology. And what
Zbigniew referenced was a guy named J. F. Gordon MacDonald. And he was a
geophysicist at UCL. He wrote a book -- or, actually, a chapter in a book and the chapter
was called, "How to Wreck Your Environment", which this is before Earth Day, okay, so he
could get away with that. It was 1969 when that book was actually published. But what
he said that caught Zbigniew Brzezinski's attention was, he said, if we could ever figure
out how to electronically stroke the ionosphere in just the right way, we could return a
signal to the earth that would influence the behavior of people over huge geographic
areas.

Now, that's a pretty profound thing. But we didn't have a way to stroke the ionosphere in
1969. But we did by the 1990s. And that was, in fact, and is, in fact, the HAARP system
that can accomplish this. So the idea was -- and it was kind of, in a gross sort of way,
primitive, if you will, but what the intention was, was that if you could pulse the
ionosphere, return this ELF signal to the earth, you could agitate the population in very
specific ways. You could make them passive, less aggressive, or the opposite by just
amplifying that signal. And I'll explain a little bit of that as we go on.

The other person that comes out in the last presentations, Jose Delgado, and this book
he wrote, "Physical Control of the Mind: Toward a Psychocivilized Society". And this is,
again, a 1960s book. Those images that you saw in just this short video clip of Delgado's
work, there is a good section in this text as well showing that. But in those days they
used implants. They had to physically put something in the brain. And what Jose Delgado
originally did -- he was actually educated in electrophysiology at the University of Madrid.
He graduated in 1950. Electrophysiology, as a degree field, thinking about it in 1950,
now 65 years ago, most people don't even realize that's an area of higher education
today, much less that far back. One of my mentors, Raul Makayla (phonetic), he
actually graduated University of Madrid in 1958, and his area of interest was, essentially,
the same, biomagnetic and electric fields, effects on human physiology, and he spent his
career studying that.

Delgado, at Yale University, he initially was mapping the brain of primates and humans
by stimulating various portions of the brain to figure out what was responsible for what
kind of activity. And then he began to utilize the implants in those dramatic ways in those
film clips with the charging bull and he throws the switch and the bull stops, to
demonstrate that you could take a creature from passive to highly aggressive to passive

OEN OP-ED ARTICLE Page No. 20 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

to highly aggressive, just like flipping on and off the lights in your living room. What
Delgado discovered by the mid-'80s is that you didn't need any implants. You just needed
to manipulate the energy itself. And you didn't need a great deal of energy. Now, we've
heard -- I forget the amount of energy surrounding us now. Was it a quintillion? I believe
it was 18 zeros after the one that we heard earlier. Back when I wrote the HAARP book in
'94, just radio frequency energy alone, it was 200 million times more around us every
day than nature created in 1994. Now, when you think about it, what did Delgado
discover? He discovered that one-fiftieth of the amount of energy in the natural
background noise of the earth was sufficient to manipulate the behavior of human beings
if you could hit the right frequencies, if you could hit those window frequencies that
stimulated that kind of activity.

Now, if you think about this -- again, by analogy, think about dialing through the radio
stations on a radio. In between the stations you get the white noise, the static, you get
no clear signal. But when you have resonance between the transmitter and the receiver,
then you get a nice, clear signal. The same is true in our physiology. Whether you're
looking at stimulating or affecting a specific element in the body, molecules in the body,
cell structures or organ structures or even the human mind, it's about manipulating the
underlying energy.

When you think about medical science in terms of how the fork in the road is and how
this kind of applies to why don't we know more about this today, well, there's lots of
literature now. 25,000 sources, I think we heard quoted earlier today. 25,000 sources
talking about the energy interactions with the human body. That is a lot of information.
But what happened in medical science? A lot of people that went into life sciences, they
were really good in the chemistry, a little weak in the math, so they went to life sciences.
People who were a little better in the math, they went to physics. And then once upon a
time, these two came together and we got biophysics, which is really the root of real
health science. If you really want to get to the meat of it, you've got to get to the
energetic interactions that create chemical reactions that then manifest in the body.

And that's what we kind of miss in so much of our medicine. We followed a


pharmaceutical model as opposed to an electromagnetic model. In the '30s, prior to
World War II, that fork in the road was being explored pretty aggressively, the energetic
models. But they were somehow lost in that shuffle and we ended up with the
pharmaceutical industry, and the results of that, I think we can all not be quite so proud
of. In terms of where the technology is going and where a lot of the science is going, it
will be electromedicine that cures most of what we call incurable. It will also be that
which enhances or debilitates human consciousness itself.

Now, Jose Delgado, when he figured out that you didn't need implants, you just need to
manipulate the energy itself, this became kind of the essence of sort of where everything
went from there. But I want to roll back a little bit, a little bit back in time, and talk
more about the evolution of mind control as technology starting with the work at Harvard
University of a gentleman, Estabrook, who was working in the Harvard hypnotherapy labs
in the 1920s. You can look Estabrook up. Look him up at the Library of Congress and
you'll see his list of publications, and I recommend that you do that. What he decided
was that you could create what we would call today a Manchurian candidate. You could
17 take certain individuals, put them in a very, very deep state of hypnosis and then over
a period of time train them so they would be like this super spy that you could send into
another country and they'd hang out for a year or two, but if they got captured, they

OEN OP-ED ARTICLE Page No. 21 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

wouldn't really remember any of their former self, and then when they came back, in this
case, into the United States, that we would then give them the appropriate suggestions
and then extract the intelligence from them.

And this is what Estabrook was working on. By the 1930s, a lot of his work was being
classified and he continued to work in this field up through the 1960s. His last book --
and I always like to read the last thing someone writes, you know, because it tells you a
6 lot about, sort of, the conclusions and there are things that you might discard bits and
pieces as science enlightens you and your experience enlightens you. And what he talked
about in that last book were the experiments he was involved in using LSD and other 11
hallucinogenics in mind control, which he actually talked about in a favorable sense.

And for those of you that remember, the CIA was heavily involved in this in the 1960s
and, in fact, the whole area pre-1960s going back even to the Korean War, which is sort
of my next mark on the timeline. The Korean War, we had prisoners, patriotic young
Americans come back from war and they're handing out Communist leaflets on street
corners, and the term or the phrase brainwashing came into being. That's where it came
from. It came from that series of events after the Korean War.

The idea of being able to manipulate people's behavior and change them so profoundly
became of interest to the predecessor of the Central Intelligence Agency and then later
the Central Intelligence Agency. And what they looked at were lots of different ways to
3 manipulate human behavior. Now, when I was researching my first book with Jeane
Manning, "Angels Don't Play This HAARP", I was looking for a good source document that
would speak to this, because you always read about this in secondary, tertiary sources.
And so I'm in a book room, a big surplus book room, and I'm telling this guy that I know,
I really need this source. And as I'm having this conversation, I reach unconsciously
behind me into a box and I pull out this book. This is a really interesting one. This is
actually a presidential report. This is a report that was commissioned at the time, 1975,
to look at the abuses of the CIA. Now, this came out of the Church Committee reports,
which were Congressional hearings that took place in the early '70s to investigate the
abuses of the Central Intelligence Agency, the kind of abuses that we read about today,
because nothing really changed. Supposedly, this was to change things.

Now, what's in this report? The LSD experiments were in this report. The idea the Central
24 Intelligence Agency was domestically infiltrating civil rights groups, antiwar groups,
people that, essentially, opposed the government within the United States, which was not
part of their mandate, in fact, was illegal. The fact that they were reading people's mail,
utilizing unwitting victims and experiments for mind control. All of this came out in this
report in 1975. And yet, the CIA continues to do it even to this day.

Think about the kinds of activities that have been reported pretty widely over the last few
years, whether it's digging through garbage to blackmail other diplomats, which is
something our Intelligence community does, whether it's to send pallet loads of money
into countries like we did in Afghanistan to bribe officials as a way of doing business, or
whether it's to assassinate people with drones, kidnap people and torture them.

Now, most of us don't know people like this, but this is the government that I
unfortunately have guiding my country right now. It's a government of criminals. Now,
people want to talk about, oh, this couldn't happen here. It has happened here. It's
happened for decades in the United States. This report by the President's Commission
touches the very tip of that iceberg.

OEN OP-ED ARTICLE Page No. 22 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

This is another document. This is -- this guy, Captain Tyler, he later became a colonel and
retired. He was involved in pretty much the sort of esoteric side of some of the
government research. This book this chapter out of this book is called, "Low-Intensity 5
Conflict and Modern Technology". It was prepared by Maxwell Air Force Base in 1984.
And it was talking about a large -- a variety of technologies. But in this particular one, if
you look at, certainly, the subject lines, you have stimulation of, bones* generation,
healing of fractures, treatment of disease, healing of wounds. You look at behavior
modification in animals. You know, some of these things that are listed here were kind of
under the mysterious category. They couldn't really explain what was happening in 1984.
But the idea was to stimulate research in these fields. So a number of things happened.
A lot of money started to flow into these areas. One of the reports that came out in the
1980s as a result of some of this was the Radiofrequency Dosimetry Handbook. It was a
21 big, thick handbook. It was produced by the University of Utah under contract to the
United States Air Force to determine the radiofrequency dosages that were required to
override every vital organ of the human body, whether it be the heart, the liver, the
lungs, the kidneys, just sort of preempt their natural function to be able to do it
remotely. And the idea was to take that leap of technology and begin to apply it into
weapon systems.

Mind control. "The Economist". Cover story. Some of you will remember this one. This is
2002, I believe. Yeah, 2002. And what this cover story was about was about the ethics
of mind control. Not saying, hey, does it exist or doesn't it exist? It's just saying it's here
right now. We really need to be debating whether we should advance this technology,
whether we should limit this technology. "The Economist" is certainly a credible
publication. Not too much happened from this story. This is -- unfortunately, it's not
showing up.

November -- you can get this one on my website. I'll give you my website, because this
is a very important document. The Navy set up a new set of regulations for human
experiments. It was approved in 2006. You know, in history, that's like tomorrow and
yesterday, right? It's, like, now. And in this they specifically call out mind control
experiments and who has the authority to approve them. And the persons with the
authority to approve them is under secretaries of the Navy in the case of Navy
Intelligence or Naval research.

Now, it's not just CIA. Naval Intelligence does this work. The Marines have a section on
non-lethal weapons that this falls under. The Air Force has the electromagnetic
directorate, which is working in an area called controlled effects, which deal, again, with
mind control and physiological effects on human beings. In fact, they publish a
publication called "Technology Horizons". I believe it's the June 2004 issue. You can look
it up. The cover story is on controlled effects.

Now, what are controlled effects? The first effect is attacking hardware; you know, like
equipment, like machines, to be able to interfere with the flow of electrons through
circuits to disrupt those machines to operate. Not using bombs and bullets and the things
of history, but using energy itself to manipulate hardware.

The second sort of level of controlled effects talked about in that article is the idea of
manipulating the software, the systems that run those systems, so that you can disrupt
the software, then you disrupt the hardware, and things collapse. And the third leg of
controlled effects is the human operator. And what they say in this particular article

OEN OP-ED ARTICLE Page No. 23 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

produced by the electromagnetic director of the Air Force is that we can target or create
the illusion of all of the senses in the human body; sight, sound, touch, taste, to give
people complete memory sets, complete experiential sets that you wouldn't be able to
distinguish the synthetic from the real.

Now, think about that for a moment. What does that do to court testimony in 20 years if
this becomes the norm? They're now talking about using this for post-traumatic stress
syndrome folks, people coming back from warfare. This just sort of cleans up the
garbage of the mind and gets rid of that stress. Some people think that's a great idea.

Personally, I think that's the biggest mistake we could ever make. Because whatever
those servicemen and women were engaged in what used to happen in warfare -- what
happened in World War II when everybody came back, they said, I don't ever want to
see my children in these things, I don't want to see my grandchildren in these things.
Wars need to be put down, not amplified. When you take the human factor out of
warfare and it becomes like a video game, then our willingness to withdraw from direct
conflict no longer happens. And think about where our military science has gone. In fact,
I want to mention another very important publication. It was produced by the US Army
War College (C ARLISLE, PENNSYLVANIA) in the early 1980s. It's called the "Revolution
of Military Affairs and Conflict Short of War". And this particular paper was talking about
revolution of military affairs. What is that exactly?

This is a leap as important as the introduction of gunpowder in the middle ages in


Europe, as important as atomic weapons in the last century. And that's how they
characterize it. And what this is is the leap where we move from ordinance, from bullets,
bombs, things that rip tissue and tear things up, to electromagnetic weapon systems that
keep sort of the hardware intact, but debilitate the human operator to the point of being
combat ineffective. Or conversely, enhance the possibilities within our own combatants
while degrading the abilities of others.

There's simple ways that you can achieve this. You can introduce to the battlefield certain
elemental compounds that in small background amounts would not be considered
dangerous. Let me give you iodine as an example. We all need a certain amount of iodine
in the body to maintain thyroid function. But if you have too much iodine, you'll get
poisoned. You'll die. You'll get sick. So what can you do? You can send a signal in that
resonates the very same signal strength and frequency as iodine, you can send that
signal in and the body will begin to react as if its gotten this massive load of iodine and
show all the symptoms of iodine poisoning. You check the thyroid; check the blood, it's
not there. Mystery illness. Something as simple as that for manipulating large
populations, not necessarily with their consent and not necessarily with clear knowledge,
and nothing shows up in the background that would say why this poison actually exists
that would account for this. A simple way.

One of the other ways that this technology can be exploited is really quite
simple. There was an article produced by "Parameters", which is a military
publication. "Parameters". You can look it up. It's the -- I believe it was the Fall
1998, but you can look up the article name called, "The Mind has no Firewall".

It's a very important article. This article talked about all the various ways in which you
could introduce mind effects or mind control technologies using modern technology
today. And the original article was actually written in a military journal called "Orienteer"
published in what is now Russia. What's interesting about this is it said you could use

OEN OP-ED ARTICLE Page No. 24 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

any electromagnetic carrier, whether it be radio, TV, the Internet, now cell phones; but,
essentially, any of these carriers, you can modulate a signal on them that will manipulate
behavior of segments of the population. And the Russians demonstrated this in a couple
of different ways. There was a program. It was called "Undercurrents". It aired in the
CBC, which is the Canadian Public Broadcasting System. "Undercurrents" did two really
interesting stories that I got to participate in. One was on HAARP and the other was on
mind control. And on the mind control story that they did -- this was a very popular
program in Canada at the time and this particular segment was their highest rated that
they had ever run. And they had folks that came in who were involved in the "Star Wars"
initiative during the Reagan Administration that couldn't talk about what they did in the
White House, but they could talk about what they observed in Russia.

And one of the things that they talked about was the idea that you could -- you could
create, sort of, this white noise and on this white noise carry a signal. And so they put
out this message, bring us cake. And Russians at tea time, you know, they eat these
little cakes? I guess you do that in other parts of Europe as well.

And so at the appointed time they began to broadcast this. And workers from within that
building and on the street were bringing cake into the meeting room without really
knowing why they were doing it. They just felt like doing it. Well, that was, in fact, what
they were programmed to do. Now, this goes back. We're talking about 15-year-old
technology. And when you think about sort of where did it go from there, in 2006, there
were a couple contracts left by DARPA, which does research for the defense industry in
the United States. And DARPA used to be run by a guy named Tony Tether. Tony Tether
was a good friend of Ben Eastlund's. Now, what they were doing then was, they had left
two contracts to the University of California for what's called electronic telepathy. Okay.
Electronic telepathy. The idea of reading another person's mind at a distance by
analyzing the emanations coming from this area, being able to analyze that and
determine and interpret what it is. And then the other half of the contract was to create
complex signals to see if you could transfer that array, so to speak, of signals into
another person's consciousness and whether they would perceive the same images.

Now, there was work done by Elizabeth Rauscher and her late husband, Bill Van Bise, in
this very same area. In fact, I have a copy of their unpublished paper where they
actually built an electronic circuit where they could take a person in one room and a
person in another room, attach this person to that circuit and his person to that circuit,
and then, you know, the psychic card where they show the triangles, the squares and the
circles and the little squiggly lines, a hundred percent accurate with nine test subjects
who had never experienced consciously in any way any sense of extrasensory
perceptions or psychic perceptions. They did it with hardware, transferring thoughts from
one to the other.

Now -- which tells me it's probably a little more simple than what DARPA's doing. But
when Ben Eastlund was doing work on HAARP and he was doing other work for DARPA at
the time and we had talked about him in our first publication, and then actually after
publication became friends, and Ben Eastlund's attitude was, you know, some things just
shouldn't be done. And one of the things that he had been working on was whether
modification technologies, which he was at that time and when we first met, making that
technology available to the military. And after some dialogue with us and others, he
decided there's certain technologies that are not safe in the hands of military.

At one point along the course I began doing quite a bit of work on this whole

OEN OP-ED ARTICLE Page No. 25 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

mind effects issue. And I caught the attention of a woman, Dorothy Lay. Now,
Dorothy is one of the heirs to the Lay, as in Frito-Lay and PepsiCo Corporation.
So a very wealthy family. Dorothy was very interested in this technology
specifically as it applied to victims. And so she approached me at one point and
asked if I would become a member of her board of directors for a non-profit that she was
setting up to deal with these kinds of technologies. And I've got to think about whether I
should tell you the rest of this story, and I think I will, because why not?

So I have this thing, intuition. All of us have it. I used to not pay as much attention to it
as I do today. When my intuition tells me something, I listen, because when I really think
about it, it's never been wrong. Neither has yours, if you really think about it. Or maybe
you don't think about it and just start acting on it. So my intuition said -- and this was a
very difficult time for me in 2002. In 2002, I had been betrayed by a very good friend,
economically was bankrupt in the middle of this work, because I started this work in '94.
Economically was being crushed. And at that point I was deciding whether I was going to
stay in this work at all.

And I'm going through a bunch of my files and I see this file and it's marked Lay. And I
remember this person had contacted us needing some information and we provided it.
And we never charge for that. I mean, the way we operated is, I sold books. And people
like you bought my books. And they allowed me to do this work. I didn't write for grants
where somebody could manipulate me and control me and tell me what to say. I didn't
go out and find some publisher that would edit out my work. I risked my own money. I
published my book.

AND NOW, on this 14th Day of September, 2017, Stan J.


Caterbone/Advanced Media Group, do hereby file the following pursuant to the
Federal Habeus CORPUS statutes prescribed in 28 2242 as prescribed by law.
The Plaintiff alleges violations according to the 1867 interpretation of the
federal Habeus CORPUS statutes which states: where any person may be
restrained of his or her liberty in violation of the constitution, or of any treaty or
law of the United States.
Stan J. Caterbone alleges that he has been a prisoner of the state since
1987, and that the activities surrounding the PETITIONER'S life has escalated
into a daily occurrence of assaults. Unfortunately while the PETITIONER has
made many in person complaints to just about every law enforcement agency,
the most recent to the Manheim Township Substation in Lancaster Township
regarding an assault at the Manor Shopping Center minutes previously
(December 9, 2015 9:00pm), the pleas for help and assistance have yielded
nothing but more attacks to the PETITIONER'S person, property, electronics,
home, auto, reputation, intellectual property, and lastly his mental state-of-
mind A BRUTAL ARRAY OF PSYCHOLOGICAL TORTURE. The PETITIONER has
already made claims of COINTELPRO-like tactics in his filings in the U.S.C.A.

OEN OP-ED ARTICLE Page No. 26 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Case No. 15-3400 against these same said actors and perpetrators. The
PETITIONER will provide evidence to support this writ and offer a final remedy
and redress in accordance with federal law.
THE ABOVE IS AN EXCERPT FROM THE CURRENT CASE IN THE UNITED
STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA IN
CASE No. 17-cv-4000 CATERBONE v. The United States Government before U.S.
District Court Judge Edward G. Smith.

SEPTEMBER 14, 2017

___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP

Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566

Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?

OEN OP-ED ARTICLE Page No. 27 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &

Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566

HAD LANCASTER COUNTY (Pennsylvania) LOST ITS


SOVEREIGNTY BEFORE IT LOST ITS SOUL ?1
_____________________________________

Authored in May of 1998

Each time a man stands up for an ideal, or acts to


improve the lot of others, or strikes out against
injustice, he sends forth a tiny ripple of hope. And
crossing each other from a million different centers
of energy and daring, those ripples build a current
which can sweep down the mightiest walls of
oppression.. by Robert F. Kennedy

In 1987 STAN J. CATERBONE Had Unjustly Lost His Freedoms, His Rights, And
His Pursuit Of Life, Liberty And Justice.

The following report (most identities purposely omitted from this version)
is an amazingly true and factual account of an extraordinarily bizarre tragedy that has
turned one mans life into an eleven (11)2 year free fall into Dantes Hell.

On the surface, this is a story of a victim struggling to seek the truth, but in reality, the
evidence will conclude that this is a victim, literally, held hostage by virtue of his truth.
Later, the preponderance of evidence that the victim has amassed and his obsession for
meticulously documenting his ordeal might seem eccentric, yet his demonstrated ability
to react to events before they unfold appears mystical. And this was his manner in which
he tactfully defended and protected his life. It is these actions that have painted the
landscape with a dire vengeance for his ruin. His actions will ultimately serve to protect,
preserve, and foster the truth of his story, incriminating the culpability of his many
perpetrators, while at the same time being twisted and tainted in a relentless manner to
attack his credibility.

1
In April of 1997, Federal Court Judge Stuart Dalzall said Lancaster County had
lost its soul in the worst case of prosecutorial misconduct ever found in the
English speaking language regarding the Lisa Michelle Lambert hebeas corpus
hearing in the notorious Laurie Show murder case.
2

OEN OP-ED ARTICLE Page No. 28 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

This is a story of a human being endearing for his rights, living in fear of his life,
and the remedial actions required for the truth to set him free. A victim forever believing
in his accomplishments and his visions, yet forced to adhere to a life of their diversions.
Fatefully, ten years after being taken as a political hostage, with the aid of numerous
arrests and false imprisonments conveniently falling short convictions , a Federal Judge,
Judge Stuart Dalzall, of the Eastern District Court of Pennsylvania, opened a Pandoras
Box into the true colors of the inner workings and politics of ultra conservative Lancaster
County, Pennsylvania. A supposedly Gods country. His findings reeled a dramatic and
emotional response from the Lancaster County community that was akin to the
assassination of JFK . A community where obstructions of justice strikes a startling and
stark contrast to the image it so desperately embraces. A community proud of its tough
on crime judges, a community of plain folks and
Amish, and a community settled in a beautiful landscape abundant in an agricultural
bounty. This is not a community of compromising integrity. Or so it has been perceived.

Judge Dalzalls extremely controversial findings were responsible for Pennsylvanias


own crafting of the Laurie Bill, the retaliation by the Commonwealth of Pennsylvania
intended to curb the Federal Courts interference within the respective states own
jurisdictions and proceedings. Or was it a political maneuver to close the lid on
Pandoras Box? The Pennsylvania Attorney General and the Lancaster County District
Attorney have both thrown all their might and all their muscle at turning the tides of
Judge Dalzalls findings. This story and this victims rights have been violated and
abused by some of the very same principals that were responsible for Judge Dalzalls
unsettling revelations. Lancaster County prosecutors were found to have engaged in one
of the grossest acts of prosecutorial misconduct found in the English speaking
language, which allegedly occurred in this now famous Lisa Michelle Lambert case, a
murder trial which began in the summer of 1992. Subsequently, it is now in the midst of
a treacherous appeal process convened by Judge Dalzall. And if so by fate, in
Philadelphia, Pennsylvania, the home of the Freedom Fighters.

It is this public disclosure, that casts a new light and sudden hope for freedom into
this victims unbelievable and horrid story, that begun just four years prior to the
murder of Laurie Show. It is the decisive similarities of how both victims were subjected
to a very calculated and politically motivated attempts to frame and fabricate
circumstances to obtain the results that justified the means for illicit self-serving
interests. This very same conduct, committed by public servants, elected and enlisted to
enforce the law, to which Judge Dalzell found so appalling. Conduct, which violated the
very same rights their respective offices are commissioned to protect. Conduct which
strikes the meaning of We The People from our nations very own Constitution.

Fortunately, this victims story is laced with a thread of faith, a faith in God. And
because of his faith, this victim will forever regard Lisa Michelle Lambert 3 and Laurie
Show as his little Angels of Justice, a Godsend. An answer to his many prayers, that

3
The author admitted in an affidavit in 1998 that he did not know the criminal
culpability of Lisa Michelle Lambert, and further argues that it was because of the
prosecutorial misconduct and the erroneous handling of the crime scene that the
truth evaded both the prosecution and the defense as to who actually killed Laurie
Show.

OEN OP-ED ARTICLE Page No. 29 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

for the first time in ten years provided a small glimmer of hope, and a few moments of
solitude that have materially justified his own tragic experience. The realization that the
truth is that much more believable because of the trials and tribulations of Lisa Michelle
Lambert. Unfortunately, this revelation came at the unfortunate and untimely death of
Laurie. However, it just may be Gods intentions of a Higher Purpose.

This story was perpetuated through a gross miscarriage of justice: a tenure of


malicious wrongdoing by both the law enforcement community of Lancaster County and
the Commonwealth of Pennsylvania, as well as community leaders. A process that
continues obstruct this victims rights for justice. Its mannerisms reach into the inner
soul of political and judicial corruption. All in the name of greed, and all in the honor of
continuing the status quo of the Good Ole Boys club of Lancaster County. A process
obsessed with keeping its disclosure from escaping beyond the confines of Pandoras
Box. Its a tenure of power that evolved from the days of this countrys earliest settlers,
but an evolution that has somewhere strayed away from the intent of our constitution;
with total disregard for the law, in total disrespect for the Constitution, and void of many
of our civil liberties. This atrocity, like the Lambert case, would have made our founding
forefathers revel in disgust and bellow in despair. In fact, their spirits and energies
probably are!

AT ISSUE
The central issue in this story, is a cover up, a cover up of mass proportions, and
of perplexing design, with national consequences. The fact of the matter is that this cover
up has had ramifications throughout this world, specifically the Middle East The cover up
would be emphatically unbelievable without the wealth of evidence, especially the
recorded conversations with Pennsylvania officials. A cover up that permeates from what
will later emerge as the 4th largest financial fraud (Billion Dollars) in the history of the
United States coupled with the covert sales of arms to Iraq. And five years after this
cover up began, these same munitions were used against our own troops in the Persian
Gulf War. And of course, there are admitted ties to the Central Intelligence Agency (CIA)
and the National Security Agency (NSA).. And this cover up and story, which began in
June of 1987, in Lancaster County, preceded criminal indictments by the United States
Attorney General, the Federal Bureau of Investigation (FBI), the Internal Revenue Service
(IRS), the Department of Justice and Commerce, and more. A vast array of criminal
activities conspired from the ultra conservative Lancaster County, where God is
supposedly supreme, and its hard line approach to crime is said to be preeminent. In
June of 1987, Lancaster County was immersed in a dynamic twist of fate, with a host of
players which may never be fully identified.

The irony of this story is how Lancaster County manages the disclosure of the very
same criminal activities that this story proves that it condoned, prior to the intervention
of federal authorities. It most dramatically will prove the nature of its integrity, or lack
thereof. International Signal & Control, (ISC) is the controversial player in this web
of conspiracy. In 1987, the third largest employer in Lancaster County, a non-discrete
defense contractor. In all due respect to our beloved country, this report is in no way
challenging the policies or the activities of the Department of Defense, or the vast
agencies of the Intelligence Community, especially the CIA or the NSA (National
Security Advisory). with regards to ISCs foreign dealings. Trying to protect the world of
malicious and evil empires is a process which never ends, and whos players are
constantly changing. And our respective intelligence agencies are continually challenged

OEN OP-ED ARTICLE Page No. 30 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

with the task of trying to make a difference, in accordance with protecting our national
security. Unfortunately, given the nature of their discrete activities, and given the CIAs
history of avoiding congressional approval in certain situations, our current laws are void
of effectively dealing with the peripheral catastrophes of such activities that inherently
transpire. The CIA remains immune, while everyone outside suffers the consequences.

The fact that the CIA, or anyone of the other intelligence community, may have
been involved, does not grant a blanket of immunity over activities which were not
material to protecting our national security. If a company provides a service to anyone in
the intelligence community, our constitution, our laws, and its respective commercial
regulatory authorities, must still have the full sense of their jurisdiction. The intelligence
community may not have the right of intervention into the commercial enterprise, or
organization, circumventing the rights of its employees, shareholders, creditors, and
customers. No United States law or statute suggests that there is any involuntary
mandate that requires any of the preceding to compromise their interests in the
respective enterprise for the sake of national security, or the respective intelligence
agency. There must be considerations paid to all involved for those rights and interests
that compromise
such a relationship. Otherwise, the CIA could effectively gain control of any domestic
corporation it so desires, without ever owning one share of its outstanding stock, simply
by enlisting its product or services for the sake of national security. The CIA requires a
formal vehicle to enlist the aid of our domestic commercial enterprises. ISC is a proven
and unfortunate example of that.

This victim was a shareholder of record of International Signal & Control (ISC) for
the previous four years prior to when this tragic ordeal began. The victim was to
purchase the stock from now Republican Pennsylvania Senator Gib Armstrong, who was
in the brokerage business at the time and selling ISC stock. The stock was sold over the
London Securities Exchange, supposedly for reasons to suppress information. The victim
was interested in the stock because of his appetite for technology, and was more curious
about the business of ISC, than anything. In fact, the victim had never made any
inference to any of the illicit dealings with Iraq. However, the perpetrators of this story,
attempt to hide behind a vale of national security," in an effort to find legal immunity
from all wrongdoing. In accordance, the record will prove that this is merely a smoke
screen used to intimidate and obstruct the victims access for due process of the law.

The trials and tribulations of this victim are unprecedented in terms of


emotional and psychological duress, fortunately his indestructible faith in God, and his
enduring belief in himself and the truth, endures his life. There was one attempt on the
his life, days within the public disclosure of the CIAs involvement with the local Lancaster
County defense contractor (ISC), which Ted Kopel reported on ABC News Nightline, on
May 23, 1991, 4 years after the initial cover up began. This story will depict a series of
systematic and strategic offensive attacks upon this victim and his businesses that will
result failed business enterprises, and a Hollywood motion picture, deserted. An
impeccable professional reputation and a flawless credit rating purposely sabotaged.
Financial opportunities, that in 1987, were almost impossible to extrapolate, Vast
financial opportunities and aspirations forever a part of history. This horrendous
crime was perpetrated for the interest of a cover up, further protecting the corrupt
enterprises of Lancaster County's International Signal & Control (ISC). A quest for justice
that polarized every relationship the victim maintained, in Lancaster County and beyond,
including friends and family. This story demonstrates a methodology of his perpetrators
for keeping this victim quarantined from justice and public disclosure, through a

OEN OP-ED ARTICLE Page No. 31 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

malicious means of credibility proponents, and horrendously deceptive tactics. Financial


motives prominently displayed in the hands of all of the perpetrators, which absolves the
burden for a traditional conspiracy..

The emotional response to the truth of this story is compelling, to say the
least. Subsequently, the startling keen sense of perception that the victim had
demonstrated, is even more intriguing. It is this extraordinary quality that is responsible
for saving his life, while yet at the same time providing his perpetrators with an alibi and
a vehicle for discrediting his startling allegations and his story. This story embellishes a
dichotomy of perception that had Hollywood producers from his film project call his work
genius, while his perpetrators from the Lancaster County Community conveniently and
maliciously labeling him as insane and emotionally disturbed."

THE LANDSCAPE
The perplexing question of the victims intelligence, or lack thereof, is best
analyzed as a question of perception. However it terms of the legal consequences of the
activities contained herein, they are of little if any relevancy. The fact of the matter is
that the mental deficiencies have very little relevancy to this story, other than serving
as a means to discredit the victim, a vehicle to facilitate the cover up, and a blanket of
immunity for all of the perpetrators.

The heart of this victims legal dogma is best described as follows: If a person, is
perceived to have a mental deficiency; yet whose actions and decisions are always
proven to be instinctually and amazingly prudent, always abiding within the law, and in
the best interest of his affairs, what rights and protection do the laws afford him from
persons abusing that perception, in order to yield political and financial rewards, as a
direct consequence of his demise? Furthermore, how does the law protect his rights, if
any and all malicious acts against this victim, are constantly and immediately
disregarded because he is perceived to not to be credible? As this story unfolds, these
questions will become even more troubling and appalling. Although the victim could
never describe the pain of his trauma, he would often say that the closest situation that
may compare is that of a woman being continuously raped, night after night, helplessly
praying for relief, struggling to free herself from her captor, all with no avail. He would
call it as being brain f------.

The victim, coming from the lower middle class of Lancaster City, was only 29
years old when this tragedy began. Coming from a broken home, he was the third of six
boys. While at a very young age, he would help his mother run a dry cleaning business,
in an amazing similarity like Lisa Michelle Lambert, he had also nursed his mother during
bouts of depression. While in high school, he was nursing his mothers depression, while
at same time tending to his older brothers bouts of schizophrenia. The victim had
learned to listen to the obscenities of mental illness since he was a child. He learned to
fill the shoes of his absent father in helping his mother raise his three younger brothers..
The victim was often called the little old man because of his extraordinary maturity as
a child. The victim was determined to break the barrier of the Good Ole Boys club or
the power elite, and had always felt a sense of compassion for those less fortunate, and
those neglected by those of material means, the oppressed and impoverished. He had an
undivided aspiration to someday make a difference to those that could not help
themselves, especially his older brother. Through his ingenious, resourceful, and honest
business approach, he was relentlessly growing his business and their respective

OEN OP-ED ARTICLE Page No. 32 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

missions, in constant reminder of his oppression. His in depth understanding of computer


technology and his vision were his most powerful allies. Always pushing the envelope for
advanced technologies and seeking solutions for the most efficient means of his
operations.. He knew that every break was going to be few and far between, he
dedication himself to his work, and married his business affairs, always embracing his
projects with a passion.

In 1986, after serving on the Board of Directors for the Central Pennsylvania
Chapter of International Association of Financial Planners (IAFP), the victim had made a
large contribution to increasing its membership and its awareness among local
professionals, as its vice president. In an effort to promote the organization, the victim
solicited a nationally recognized and prominent financial planner from Washington, D.C.,
to be a headline speaker at a dinner meeting. Ms. Alexandra Armstrong, one of the most
nationally recognized financial planners, often headlined in Money Magazine, attracted
100 industry professionals to the Treadway Resort Inn. The attendance was
unprecedented for the local IAFP chapter. The IAFP is the authoring organization for
certification as a financial planner. It was through the direct conversations with Ms.
Armstrong regarding his ideas and her experience, that inspired the victim to pursue his
ambitions of growing his own financial firm, which he began in the following months.

Disgruntled with the conflicts of interest and the lack of incentive for various
professionals to work together in managing ones wealth, a process which lacked
efficiency, this entrepreneur founded the firm Financial Management Group, Ltd., or
FMG as it was often called. The firm was to incorporate a one-stop-shopping strategy
and incorporate financial services, legal, accounting, tax preparation, real estate,
insurance, mortgage banking, and estate services all in one firm, all residing in one
location, all taking advantage of the synergistic approach toward managing wealth. And
to provide the professionals long term security and equity participation, all participants
were encouraged to purchase stock in the company. This was a new and innovative
approach that attracted a lot of attention from investors and clients, but also came a lot
of nervous twitches from competitors, especially in conservative Lancaster County.

The victim began recruiting professionals from all of the other firms, with great
success. He had enlisted two partners whom he had worked with at IDS/American
Express, to carry out his mission, which he began after extensive market studies and his
early version of the company, Pro Financial Group, Ltd., His two partners had followed
the victim to an independent broker dealer in Atlanta, named Financial Services
Corporation, where Ms. Alexandra Armstrong was associated, and encouraged the victim
to visit, during their discussion after dinner. Within one year, by June of 1987, the firm
had invested over $40 million for respective clients.

The company had developed satellite offices throughout Pennsylvania and in


several other states, through his unique design. This firm was causing the other financial
services companies and the local banks in Lancaster County a run for their money. The
firm had built a new 20,000 square foot office building just a few miles north of the city.
The firm was attracting clients, associates, and nervous attention from, well just about
everybody. Considering the capabilities, legal, real estate, insurance, financial services,
accounting, FMG was making as many enemies as it was making friends. And the victim
always believed in the premise that its always better to have people talking about you,
regardless of the matter, than to have no one notice you. And they were talking. The
victim was only in his late twenties when he started this organization,. He held several
positions, he was Executive Vice President and Secretary of Financial Management Group

OEN OP-ED ARTICLE Page No. 33 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Ltd, and President of FMG, Advisory, Inc., which was one of the many subsidiaries parent
company owned. The victim acted as the architect and legal administrator of the
organization, in addition to building his own financial planning clients. He filed all of the
articles of incorporation in the Commonwealth of Pennsylvania and submitted all of the
tedious and rigorous filings necessary for the Pennsylvania Securities Commission, which
were very demanding considering the victim was selling stock of his company to his
associates and investors. The victim and his associates had also attracted some very
prominent Lancastrianss to invest in his venture, coming from various professional
circles, all infatuated with this extraordinary and intriguing concept of this young victim.
All had seen its potential for success and financial reward.

Many of his friends were involved, and in Lancaster, everyone knows everybody, so
it seams.. And everyone talks, gossip is as common as jogging. This exaggerated trait of
Lancaster County, will later to come back to haunt this victim, in a way that is most
sickening. In a way that will parallel the attitudes and sentiments in the Lisa Michelle
Lambert story.

In 1987, his business affairs were reaching a point of incredible success. In fact,
most of his family and friends, have always questioned the merits of their legitimacy. He
always conducted his affairs with the presumption that time could not afford the
opportunity to complete his agenda, while at the same time disclosing his business affairs
to persons that were not directly involved.. Accomplishing his mission was first and
foremost. But in Lancaster County, that was difficult. Lancastrianss have a notion to fear
what they dont know, and will always believe what they think they know, regardless of
its merits. In Lancaster County new ideas are shunned unless coming from their own,
and their own ideas are often kept close at bay, inhibiting progress and stymieing
learning. By June of 1987, a majority of his business affairs were conducted out of the
grasp of Lancaster County, his unknown activities made others curious, especially in
Lancaster County, where the blessing of the power elite was essential for success. But,
deep down inside, he knew he could never be accepted, because he did not descend from
a family of social grace. This fueled his aspirations for success even further, committed
to prove that intelligence was innate and learned, not a direct correlation to material
wealth or social grace.

One of his most cherished testimonials to his concept, his reputation, and his
mission, was provided by an elder attorney, Mr. Kenellm Shirk, a very respected and
prominent older Lancaster attorney, who was part of the status quo. Mr. Shirk had
petitioned the Pennsylvania Bar Association, after meeting with the victim, to obtain
their blessing and their knowledge of any laws which would forbid his firm to provide a
satellite office in the headquarters of Financial Management Group, Ltd., (FMG) Mr. Shirks
firm was to provide a partner, and estate services to the clients of FMG. The Pennsylvania
Bar provided a lengthy recommendation that did not prohibit a relationship, although
cautioned it to proceed with careful review. The fact that the very young and unknown
victim could attract an elder, conservative Lancaster County attorney to associate with
his firm was an encouraging sign of respect. Ironically, Mr. Shirk is the father of Roy Shirk
Jr., Lisa Michelle Lamberts first attorney who represented her during trial of 1992, the
proceeding which was the center of Judge Dalzalls controversial and appalling findings.
The victim prided himself on his entrepreneurship , and after building the foundation for
FMG, he set out to take advantage of its resources and its synergism.

By June of 1987, the victim had developed a fairly substantial mortgage banking
relationship with a Houston, Texas banker. That operation was capable of providing

OEN OP-ED ARTICLE Page No. 34 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

lending to potential developers and businesses in the range of $ 3 million to $100 million.
And the lending packages were as competitive if not more competitive than the local
lending institutions of Lancaster County, capable with even higher lending limits. In a
matter of months of securing this relationship, the victim and his partner were
evaluating deals from Pennsylvania, New Jersey, New York, Florida, and as far away as
California.

There was a uniqueness to his capabilities that was very appealing to potential
borrowers. Because of the vast array of services of FMG, potential developers had the
opportunity to obtain both debt and equity financing through his companies. In plain
terms, most shopping centers raised capital by raising funds through investors coupled
with a mortgage. This gave potential developers one place to take down the deal rather
than dealing with many other professionals at the same time. It was a much more
efficient process for all. The victim was capable of providing a mortgage, while at the
same time selling shares in a shopping center through its vast client base of investors at
FMG. This also gave the victim a formidable presence into the venture capital markets,
by way of his strong ability to raise capital through his vast portfolio of clients of FMG.
And this was a rarity that developers and investors loved. Investors were attracted
because they could invest in equity type real estate projects with real sense of knowing
the developer, or kicking the bricks of the project. This was far different than investing
in a nationally syndicated project, with properties scattered all over the country, and with
developers that they did not know. The synergistic approach to his organization began
paying dividends by developing other peripheral markets and businesses.

Given the complex nature of the victims design of FMG, internal struggles within
the organization readily became the challenge. Orchestrating the relationships among all
of the different professionals, and trying to adhere to the interests of the clients, the
professionals and of the firm, FMG, managing the daily activities required immense
thought and prudence on the part of the principals. Of, course, the victim assumed
honesty and integrity to be a given. And for most it was. However there were times when
the senior partner engaged in tactical rights of power.

In the later part of 1986, after the victim had developed FMG to the point where
its future was on stable grounds, his two partners conveniently attempted to circumvent
his position and regain control of his stock and the firm. In fact, after the victim refused
to collaborate on a scheme to set up his other partner, the remaining two partners
began to attempt to regain the victims control. Through intimidating techniques, the
partners began to attack his presence. The victim became agitated, especially because
he played the lead role and was responsible for the formation of the company,
methodically designing and developing its foundation, with great success. And now after
the company was beyond its point of greatest risk, due to in large part the victims
efforts, the other two partners wanted to take advantage of his work, and take the
cream of the pie for their own financial gain. It was a difficult task to carry out because
the victim was the most respected of all three partners, consistently keeping their
respective policies in the best interest of the firm and of the other associates and
stockholders. In fact, most feared that the loss of control of the victim would ultimately
lead to adverse consequences. However the two partners trued unsuccessfully to weaken
his position, and when that didnt work, they focused on weakening the victim, via
intimidation and humiliation The coup and hostile environment caused a state of
depression for the victim, although he kept to his daily duties and responsibilities,
accordingly, he called a client and friend who was a psychiatrist, whom he trusted and
respected. It was easy access to a professional, yet on a very informal basis. Because the

OEN OP-ED ARTICLE Page No. 35 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

victim had a family history of mental deficiencies, he wanted to seek the proper help.

The psychiatrist had diagnosed the victim as having Bi Polar Mood disorder. The
psychiatrist had quickly discounted any correlation between the current state of affairs,
and his partners abuse. The psychiatrist rationale was that because the startup of the
company was so successful in such a short period of time , and his demonstrated
intelligence and creativity, the victim must have been in a state of mania, and of course
now, was subsiding in a state of depression, the typical cycle for manic depressants. The
victim complied with the psychiatrist. And after refusing to sell out to his partners,
vowed to regain his business and rescind any efforts to give up his claim to his
accomplishments. The depression soon faded. The victim never disclosed the fact that
he had sought help to anyone other than family members. This coup lead to the victims
aggressive approach to grow the business, and to posture himself in projects that would
ultimately remain in his control, out of the influence of his partners. Particularly the
mortgage banking activities and the digital movie, which he did successfully, but
apparently too successfully.

THE DIGITAL MOVIE


Through an act of fate, in February of 1987, the victim found himself in a
meeting with Tony Bongiovi at Power Station studios. Through one of his partners, he
reluctantly traveled to New York to consider financing a motion picture. The victims own
lack tolerance for the risk associated with film investments was overshadowed by the
opportunity to visit a recording studio. Although his associate was a friend of Tonys, he
was not familiar with his accomplishments, or his work, so he thought. If nothing else, it
was a weekend away from Lancaster, and a chance to visit the Big Apple. Intriguingly, he
found more than he had ever imagined on that weekend excursion. Tony Bongiovi, a
musical genius, whos credits include one of the most recognized recording studios in the
country, Power Station Studios. Tony Bongiov produced the sound track for Star Wars,
and is responsible for the format of one of the most successful recording artist of the
80s, Jon Bon Jovi, his cousin. Power Station
has recorded the albums for some of the most influential artists of all time, including
Diana Ross, Madonna, The Rolling Stones, Steve Winwood, Bruce Springsteen, etc., Tony,
an eccentric genius, of Italian decent, had many talents, from music to aerospace
engineering. The victims associates sister met Tony while he flew his plane into
Lancasters airport for repairs. They dated for some time and the victims associate and
Tony became friends, which led the victim to Tonys Power Station Studios.

Tony was looking to finance his new project, which was to be the first digital
movie. And, given the victims extreme appetite for technologies, coupled with his
amazing sense of perception, he dramatically recognized the future evolution for the
technical merits of delivering digital video and digital audio entertainment to the mass
markets. By June of 1987, the victim was positioned as the Executive Producer,
collaborating with Flatbush Films of Hollywood California, the movie producers, entrusted
with the mission of finding investors to provide funding for the first digital movie, and
to manage the ensuing business elements it required.

The movie was to be shot on-location at the Jersey shore points, mostly in
Wildwood. Tony strategically envisioned making a movie in the horror genre. There were
several specific reasons that supported this strategy. First, he determined that it was the
least expensive format to produce, we all estimated a budget of $4 million for the
production and post production. Secondly, the horror genre would compliment a very
intense sound track. The sound track was important to enhance the new digital format,

OEN OP-ED ARTICLE Page No. 36 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

and also provide the means to introduce a new band that he had been grooming in his
studio for the past several years, French Lick, his predecessor to Bon Jovi. There had
been bad blood between Tony and his cousin Bon Jovi, which resulted in legal disputes
pertaining to Tonys financial interests in Jons success. It was an unfortunate situation
considering Tonys father and Jons father were brothers living in the same area. It was a
subject that Tony never wanted to discuss, except for his contributions toward Jons
career.

If by another act of fate, the victim had the privilege of meeting one of the many
superstars while working at Power Station studios. While growing up, at an early age, the
victim would sneak up into the bedroom of his oldest brother, and start up his old
General Electric stereo phonograph and listen to his favorite album - Diana Ross and the
Supremes. It was a passion and a ritual that provided an early infatuation to music, and
to Diana Ross. The victim was only 10 or 11 years old. And at this early age, he noticed
and listened to the annoying hiss, that conventional hiss that always seemed to
overshadow the music, whether played on an album, on the radio, 8-track tape, or
cassette.

And in a mystical twist of fate, while engrossed in a project dedicated to delivering


music without that hiss (digital) - the victim opened the door to the recording suite to
pack his bags for the journey back to Lancaster; - and there she sat, with a glowing
array of beauty, more beautiful than any picture could ever tell, Ms. Diana Ross. She
was pregnant and in the middle of a recording session, for a new album. Her assistant
quickly demanded, in a stern and protective voice, that we leave, and the victim and his
associate replied this is our makeshift bedroom, we are just gathering our belongings.
The victim walked toward Diana Ross, who was seated near his bag, and she asked and
who are you?, the victim calmly replied his name and absorbed as much of her beauty
as his eyes could behold before walking out the door. The room that was
his bedroom the nigh before, and suddenly transfixed into the recording suite of Diana
Ross, thinking back some twenty years earlier, one of the many gifts that God would
bestow upon him. A living memorial and reminder to his older brother, who died on
Christmas day of 1985, his best friend who taught him two of his greater pleasures in
life, Diana Ross, and listening to music. He prayed that his brother was watching from
above.

And so, the digital movie project that the victim had embraced in 1987 had
personal significance, and he never ever doubted his instincts regarding the technical
merits of the project. The victims perception that the entertainment industry would
deliver full length motion pictures in a truly digital medium will later become a truly
remarkable vision.

The technical merits of this project and at this particular time with respect to the
victims extreme sense of perception require analysis. To truly understand this time
perception, some of the attributes of digital technologies need to be fully understood. In
1987, Compact DISC (CD) technology was only now being introduced to the commercial
markets. The victims own crafting of his joint venture proposals, dominated by the term
digital movie, is in itself some 4 or 5 years away. In 1987, there was very little use of
the term digital, with the exception of research and development engineers. The victim
will, throughout the documentation of this story, will have preceded a terminology that
has literally become the root of most technological advancements in the computer and
telecommunications industries of our present day, 10 years after the victims vision.
Today, digital is found to be part of or referred to in just about every product available

OEN OP-ED ARTICLE Page No. 37 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

in the commercial markets.

During May of 1987, the victim had created a joint venture proposal for SONY
Entertainment, Inc., for the digital movie. After weeks of researching the current state-
of-affairs within SONY, and after his proposal was completed, SONY publicly announced
their desire to open the markets for new and emerging technologies on the cover of
TIME magazine, another demonstrated sense of perception. It was this proposal, when
delivered to one of the Hollywood producers in Santa Monica, California, after reading a
draft of the proposal she said you are a genius. The proposal was introduced to Tony
Bongiovi at the Wildwood Boardwalk, where many of scenes were to be shot, and he
approved of the proposal and thought that it had great merits. Tony, who wanted very to
do with the business elements of his project, gave the victim complete authority to
secure the financing of the project, with a salary as Executive Producer, and a percentage
of the profits on the back end.

After review of the victims research and proposals, his vision and his passion,
unfortunately without his efforts, has come to be known as Direct Satellite System, or
DSS, which is Sonys satellite entertainment system (TV), delivering digital audio and
digital video entertainment. That technology is fast eroding at the cable industry. The
victim had his patent research center around the PSDMS system, the Power Station
Digital Movie System. And that was in 1987, some seven years before SONY delivered his
dreams. Later the victim would also accurately predict that the 90s would become the
Information Age because of the direct contributions and advancements of digital
technologies, which is directly responsible for the development of the INTERNET.

The victims obsession with his digital movie has proven to be one of his most
remarkable demonstrations of his keen sense of perception.

DATE SEPTEMBER 14, 2017

___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP

Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566

Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?

OEN OP-ED ARTICLE Page No. 38 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

ACTIVE COURT CASES


J.C. No. 03-16-90005 Office of the Circuit Executive, United States Third Circuit Court of
Appeals - COMPLAINT OF JUDICIALMISCONDUCT OR DISABILITY re 15-3400 and 16-1149;
03-16-900046 re ALL FEDERAL LITIGATION TO DATE
U.S. Supreme Court Case No. 16-6822 PETITION FOR WRIT OF CERTIORARI re Case No.
16-1149 MOVANT for Lisa Michelle Lambert
U.S.C.A. Third Circuit Court of Appeals Case No. 16-1149 MOVANT for Lisa Michelle
Lambert;15-3400 MOVANT for Lisa Michelle Lambert;; 16-1001; 07-4474
U.S. District Court Eastern District of PA Case No. 17-CV-4000 New Habeus Corpus
U.S. District Court Eastern District of PA Case No. 16-4014 CATERBONE v. United States,
et.al.; Case No. 16-cv-49; 15-03984; 14-02559 MOVANT for Lisa Michelle Lambert; 05-2288;
06-4650, 08-02982;
U.S. District Court Middle District of PA Case No. 16-cv-1751 PETITION FOR HABEUS
CORPUS
Commonwealth of Pennsylvania Judicial Conduct Board Case No. 2016-462 Complaint
against Lancaster County Court of Common Pleas Judge Leonard Brown III
Pennsylvania Supreme Court Case No. 353 MT 2016; 354 MT 2016; 108 MM 2016 Amicus for
Kathleen Kane
Superior Court of Pennsylvania Summary Appeal Case No. CP-36-SA-0000219-2016, AMICUS
for Kathleen Kane Case No. 1164 EDA 2016; Case No. 1561 MDA 2015; 1519 MDA 2015; 16-
1219 Preliminary Injunction Case of 2016
Lancaster County Court of Common Pleas Case No. 08-13373; 15-10167; 06-03349, CI-06-
03401
U.S. Bankruptcy Court for The Eastern District of Pennsylvania Case No. 17-16204 NEW
CHAPTER 11 REORGANIZATION BANKRUPTCY CASE
U.S. Bankruptcy Court for The Eastern District of Pennsylvania Case No. 17-10615; Case No.
16-10157

OEN OP-ED ARTICLE Page No. 39 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &

Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-327-1566

UNITED STATES BANKRUPTCY COURT


FOR THE EASTERN DISTRICT OF PENNSYLVANIA
_______________________________________________

In Re:
STANLEY J. CATERBONE, APPELLANT

CASE NO. 17-01233


Case No. 17-10615REF

OPENING STATEMENT
re OBSTRUCTION OF JUSTICE IMPEDIMENTS
HEARING DATE THURSDAY, AUGUST 31, 2017 1:00pm

PROPOSED REMEDY:
1. SUMMARY JUDGEMENTS IN ALL CIVIL ACTIONS BY THE APPEALLANT SINCE
2005 IN FEDERAL AND STATE COURTS
2. A SECURE INTERNET LINE
3. ENHANCED SECURITY OF ALL REAL PROPERTY
4. SPECIAL TRAINING OF ALL LAW ENFORCEMENT IN DEALING WITH ALL
RELATED ISSUES
5. MANDATED MEDIA BLITZES TO DISCOURAGE ORGANIZED STALKING GROUPS

OBSTRUCTION OF JUSTICE IMPEDIMENTS INCLUDE:


1. WIDESPREAD HACKING OF ALL ELECTRONIC DEVICES, COMPUTER,
SMARTPHONE, PRINTER, SMARTWATCHES, ETC., RESULTING IN HUNDREDS
OF DOLLARS PER MONTH IN ADDITIONAL EXPENSES
2. WIDESPREAD HACKING INTO THE FINANCIAL, AND JUST ABOUT EVERY
ACCOUNT OF STAN. J. CATERBONE RENDERING THE ACCOUNT USELESS WITH
THEFTS BY DECEPTION AND/OR FRAUD OF REAL MONIES -
1. PACER ACCOUNT FOR FEDERAL ELECTRONIC FILING
2. EBAY ACCOUNT USED TO OBTAIN DISCOUNTED ITEMS
3. PAYPAL ACCOUNT USED TO TRANSFER FUNDS
4. AMAZON.COM ACCOUNT USED TO OBTAIN DISCOUNTED ITEMS
5. LANCASTER CITY WATER/SEWER ACCOUNT
6. UGI NATURAL GAS ACCOUNT
7. PPL ELECTRIC UTILITIES ACCOUNT
8. HUNTINGTON BANK AUTO LOAN ACCOUNT
9. ALL CELL PHONE ACCOUNTS, ATT; SPRINT; ETC.,
10. COMCAST CABLE ACCOUNT
11. LANCASTER COUNTY ASSESMENT ACCOUNT

OEN OP-ED ARTICLE Page No. 40 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

12. LANCASTER COUNTY REAL ESTATE CLAIM BUREAU ACCOUNT


13. MILLERSVILLE UNIVERSTY GRADUATE STUDIES ACCOUNTS
14. PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE SNAP (FOOD STAMPS)
ACCOUNT
15. ALL EMAIL ACCOUNTS USED TO SEND FABRICATED EMAILS
16. FAX BY INTERNET ACCOUNTS
17. BANK ACCOUNTS TOO MANY TO MENTION
18. TD AMERITRADE ACCOUNTS
19. HOMEOWNERS AND PROPERTY INSURANCE ACCOUNTS
20. MEDICARE ADVANTAGE PLAN HOSPITALIZATION ACCOUNTS
21. MEDICAL FILES AND REPORTS

THE ABOVE LIST RESULTS IN THE FINANCIAL LOSSES OF TENS OF


THOUSANDS OF DOLLARS SINCE 2005 AND CONTINUES TO THIS DAY.

The Plaintiff alleges that he has been a prisoner of the state since 1987, and that the
activities surrounding the APPEALANT'S life has escalated into a daily occurrence of assaults.
Unfortunately while the APPEALANT has made many in person complaints to just about every law
enforcement agency, the most recent to the Manheim Township Substation in Lancaster Township
regarding an assault at the Manor Shopping Center minutes previously (December 9, 2015
9:00pm), the pleas for help and assistance have yielded nothing but more attacks to the
APPEALANT'S person, property, electronics, home, auto, reputation, intellectual
property, and lastly his mental state-of-mind A BRUTAL ARRAY OF PSYCHOLOGICAL
TORTURE. The APPEALANT has already made claims of COINTELPRO-like tactics in his
filings in the U.S.C.A. Case No. 15-3400 against these same said actors and
perpetrators. The APPEALANT will provide evidence to support this writ and offer a
final remedy and redress in accordance with federal law.

Due to the actions and criminal activity of the above named DEFENDANTS, it is reasonable
to prove that every aspect of the Complainants life, Stan J. Caterbone, is subject to undo
influence; harassment; torture; obstruction; etc. thus resulting in irreparable harm and injury.
This situation and set of circumstances as outlined here, and in Part II, Finding of Facts, and all
previous filings; reports; and statements, is a prescription for only one endgame - death or
suicide. There is no life action or activity that is immune from this horrendous HATE CRIME. The
precedent and landmark elements that make this so appalling is that the Complainant has never
done anything to set these circumstances in motion but to be right regarding International Signal
& Control back in 1987; as well as many other proclamations and forecasts. That being said, it is
also widely reported that many Targeted Individuals and Victims of U.S. Sponsored Mind Control
are lead to death and/or suicide. The Lancaster Community-At-Large is guilty of creating;
abetting; fostering; and executing this tragedy. The fact that local; state; and federal law
enforcement induce and encourage this environment of hate is landmark.

OEN OP-ED ARTICLE Page No. 41 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

The APPEALANT has made many failed attempts to the Commonwealth of


Pennsylvania in 1987 to address these very same issues, specifically the Pennsylvania
Securities Commission (Agent Howard Eisler), the Pennsylvania Attorney General's
Office (Detective Bodan), the Civile Rights Enforcement Division of the Pennsylvania
Attorney General (Investigator ....). The APPEALANT will argue that the
Commonwealth of Pennsylvania is unable to address these issues without prejudice,
without discrimination, and without corruption. This can be best described in the
following Letter to the Editor of the NEWSLANC organization of 2016:

I have been the victim of a widespread civil and criminal conspiracy that dates back to
1987, made up of the very same actors that Kathleen Kane is up against, the "good old boys". In
1987 I blew the whistle on a local company, International Signal & Control, or ISC, that was
indicted for selling arms and weapons to Iraq via South Africa with the aid and support of the CIA
and the NSA. It was the 3rd largest white collar crime at that time, valued at $1 Billion Dollars. I
was the victim of a widespread wholesale cover-up through an elaborate slander campaign that
included 29 false arrests, multiple false imprisonments, and a fabricated mental illness record that
to this day is still resonating.
Kathleen Kane must be commended for her courage and her determination for taking on
this culture of arrogance and total disregard for the U.S. Constitution and the rule of law that they
so emphatically espouse to uphold. They believe and conduct their affairs in a manner that
suggests they are above the law and we, the Pennsylvania taxpayers, are beneath the law. The
sad fact that it reaches into the judiciary and law enforcement agencies is undeniably the most
outrageous and deplorable truth to this scandal. Case in point, until yesterday I was the
APPELLANT in a case before the U.S. Third Circuit Court of Appeals that involves the Habeus
CORPUS for convicted and imprisoned Lisa Michelle Lambert. A murder case in the early 1990's
that was made famous when in 1997 U.S. District Judge Stewart Dalzell found her actually
innocent due to "one of the worst cases of prosecutorial misconduct in the English speaking
language" and released her from prison. The case drew nationwide attention when then
Pennsylvania Attorney General, then Mike Fischer, enlisted the help of 9 other state attorney
generals to curtail the reach of the federal bench in state matters concerning Habeus CORPUS
cases. To make matters worst, 38,000 Lancastrians signed petitions to remove the Honorable
Stewart Dalzell from the federal bench.

Mike Fisher and company won and Lisa Michelle Lambert was back in prison within 9
months while the case went back to the Lancaster County Court of Common Pleas. The Honorable
Judge Lawrence Stengel held a bench hearing where she was again found guilty and sentenced to
life in prison. The case was covered by the LA Times in a multi-part Sunday series, A&E producer

OEN OP-ED ARTICLE Page No. 42 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Bill Curtis did a 48 Hours special, and Lifetime Movies made it into a prime time movie.

This year, these "Good Old Boys" made it so difficult for me to litigate my efforts to free
Lisa Michelle Lambert, that I had to dismiss my appeal and effectively withdraw as her MOVANT
and Advocate. I was trying to persuade the courts that my own demise was the result of the same
type of wholesale prosecutorial misconduct by some of the very same principals that Lisa Michelle
Lambert fell victim to. My efforts were so distasteful to the powers to be that her court appointed
attorney threatened me with criminal prosecution for no other reason than I might actually be
successful in helping her win the Habeus CORPUS she filed in May of 2014. I allege the U.S.
District Judge was trying in vain to invalidate and derail my own federal court cases that seek to
restore me to whole from a life of ruin, misery, torture, and financial collapse.

For the record, I founded a financial firm in the 1980's that reached 5 states and raised
some 90 million dollars in a matter of 9 months. In the late 1980's and early 1990's I was one of
5 domestic companies that had the capabilities of manufacturing CDROM's that included a client
list that reached across the globe and included government agencies and fortune 500 companies.
And in 1987, myself and a genius recording engineer named Tony Bongiovi and his famous
recording studio, Power Station Studios of New York, were developing and producing the first
"digital movie". The intellectual property rights and the RICO statutes that apply to my legal
claims in federal courts were too much for the "Good Old Boys" to handle....

In a December 30 editorial to the Washington Post titled Pornographic email scandal roils
Pennsylvania politics regarding the jurisprudence in the Commonwealth of Pennsylvania the

following was quoted by the editor of Newslanc.com;

"Anyone who neutrally looked at Pennsylvania and tried to gauge the quality of
jurisprudence in the state would have to laugh and say, What in the world is going on
there? . . . Our justice system is about as out of control as it can get. "EDITOR:
These matters cannot properly be settled within Pennsylvania. Everybody from the
prosecutors, to the attorney general, to the justices have skin in the game. It is time for
these matters to be given over to U. S. Attorney General so assure as close to a
disinterested investigation as circumstances permit."

PLACED ON TERRORIST LIST BY HOMELAND SECURITY SECRETARY TOM


RIDGE IN 2004?

On March 8, 2016 I was illegally detained, handcuffed and interrogated by no less than
eight (8) National Security Agency Police in the barracks of Ft. Meade Maryland with no probable
cause for approximately 2 hours. My auto was searched and sniffed by the NSA CANINE UNIT. I

OEN OP-ED ARTICLE Page No. 43 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

was interrogated about events from 1987 to the present involving my Whistleblowing activities,
my litigation, my mental health record and my intent on why I was traveling to Washington, D.C.
I was commanded not to continue on to Washington, D.C. And was commanded not to enter any
federally owned property again. I left the barracks and proceeded home to Lancaster, PA.

In July of 2005 at a military museum (Open to the Public) on a military base I was
detained and interrogated by two (2) Defense Intelligence Agents, or DIA of the Department of
Defense in Austin, Texas for about 1 hours for no probable cause. I was asked the same
questions as above and was not allowed to leave until the agents verified that I was staying with
my brother, Dr. Phillip Caterbone, who at the time resided in Austin, Texas. I was commanded not
to ever enter a military base again.

In January of 2006 I was detained and interrogated by Homeland Security in Houston


Airport upon the return from Puerto Vallarte, Mexico after being pulled from the line for allegedly
having plastic explosives in my back pack. Of course it was fabricated and I was allowed to
leave.

The Courts must consider UNJUST ENRICHMENT in this case. (Wikipedia, The Free
Dictionary by FARLEX) - A general equitable principle that no person should be allowed
to profit at another's expense without making restitution for the reasonable value of
any property, services, or other benefits that have been unfairly received and retained.
Although the unjust enrichment doctrine is sometimes referred to as a quasi-
contractual remedy, unjust enrichment is not based on an express contract. Instead,
litigants normally resort to the remedy of unjust enrichment when they have no written
or verbal contract to support their claim for relief. In such instances litigants ask a
court to find a contractual relationship that is implied in law, a fictitious relationship
created by courts to do justice in a particular case.

OEN OP-ED ARTICLE Page No. 44 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Targeted Individuals - An Overview (Taken from the website:


http://targetedindividual.blogspot.com/)
Essentially, a targeted individual has officially been declared an "enemy of the State". Your
unrelenting harassment has now entered an entirely new phase. From what was once State and
most likely federal law enforcement surveillance (for whatever reason) has now graduated to a
little-known CIA / U.S. military psychological harassment & physical torture campaign that is so
extensive and seemingly so absurd to the average American citizen, you will almost certainly be
labeled as having a mental illness and/or paranoia just for simply describing what has now
become your daily reality. The only other people that truly understand the extent of the
harassment & torture are fellow targeted individuals who have also been experiencing similar
violations of their civil, constitutional and basic human rights.

"I'm being followed everywhere I go", "it seems like they are everywhere", "it's like they
can read my mind and know where I'll be"...these are the types of statements, that while actually
quite accurate (keep reading), can easily make a targeted individual appear to have lost their
mind. In order for it to make more sense, let's once again review who is now orchestrating this
abuse against a targeted individual. Our military (essentially our international police force) and
our intelligence community are in control. This harassment campaign has reached the highest
levels of our government and as such, the resources at their disposable are truly unimaginable. Is
it just the military perpetrating this harassment campaign? Of course NOT! They have simply been
handed control. What this means for a targeted individual is that EVERY law enforcement tool
available from your local community watch, community organizations (ie Freemasons) and
"concerned citizen" types all the way up through Homeland Security including the U.S. military
have placed YOU in their cross hairs. If you are a targeted individual your conversations are being
monitored (whether inside your home, your car, your office, and obviously your telephone), your
movements and actions are constantly being monitored (whether inside your home or out in
public), your electronic correspondence is being monitored (email, websites you visit, letters you
write on your computer, etc) - you are being WATCHED! 24/7/365. Again, this isn't your local
Sheriff sitting in an "unmarked" patrol car eating his donut on a stakeout. A targeted individual
has every known (AND classified) technology being deployed, and most likely TESTED, against
them. Understand it and deal with it in a logical and sensible manner. I don't mean to alarm you,
but this is the unfortunate reality that any targeted individual now finds them self in. Maybe it's a
little clearer now HOW "they" can be everywhere you go and seem to be able to "read your mind".
Targeted individuals are not crazy - but be very careful...the perception of mental illness is one of
the many traps a program like this was designed to create. If not the actual illness itself.

So, besides an absolute abomination of a targeted individuals right to privacy, what other tactics
are being deployed against a targeted individual. The hardest to prove and the most criminal

OEN OP-ED ARTICLE Page No. 45 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

tactic used (especially when a target has 3 young & developing children in the home such as
myself) is a continuous poisoning and torture of the target by invisible directed electromagnetic
radiation. If this is a new topic to you, it may be unclear exactly what electromagnetic radiation
(EMR) is. After all, it's not exactly the kind of topic an average American is thinking about. Well, to
name a few examples, electromagnetic radiation ranges from radio frequency waves (RF) to the
more destructive & potentially deadly ionizing forms of x-rays and gamma rays. In the lower to
mid spectrum there are also radar waves, microwaves, ultraviolet and infrared light waves.

What I noticed when this harassment campaign began for myself toward the end of 2005 was the
continuous jet plane(s) that suddenly began flying "holding patterns" for extended periods of time
above & around my home. My theory is that these planes are equipped with sophisticated radar
imaging technology. Possibly very high powered infrared imaging cameras as well. Rather than
using these electromagnetic radiation devices to "search" for something, in the case of a targeted
individual these devices are used to slowly poison and "overload" the targeted individual with
continuous high doses of directed electromagnetic radiation. Once a targeted individuals body has
been properly overexposed over a period of time (months), other portable devices may then be
used to keep a target in a constant state of agitation and dis-ease. And for the more fragile
among us, maybe even death! This tactic can be the premier form of making a target seem crazy
by forcing them to report what appear to be insane accusations against neighbors, the people
"following them everywhere", planes over their home and the government. Another obvious
reason for deploying this invisible & silent torture tactic is to provoke a targeted individual to lash
out in sheer frustration and anger against the closest person (who most likely has absolutely
nothing to do with the ongoing abuse). Essentially, this is the ultimate version of entrapment. And
may even be the ultimate, basically unprovable form of a state-sanctioned murder!

OEN OP-ED ARTICLE Page No. 46 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

COINTELPRO

COINTELPRO (a portmanteau derived from COunter INTELligence PROgram) was a series of


covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of
Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting domestic political
organizations.[3]

FBI records show that COINTELPRO resources targeted groups and individuals that the FBI
deemed subversive,[4] including anti-Vietnam War organizers, activists of the Civil Rights
Movement or Black Power movement (e.g., Martin Luther King, Jr. and the Black Panther Party),
feminist organizations, anti-colonial movements (such as Puerto Rican independence groups like
the Young Lords), and a variety of organizations that were part of the broader New Left.

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to
"expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate" the activities of these
movements and especially their leaders.[5][6] Under Hoover, the agent in charge of COINTELPRO
was William C. Sullivan.[7] Attorney General Robert F. Kennedy personally authorized some of
these programs.[8] Although Kennedy only gave written approval for limited wiretapping of King's
phones "on a trial basis, for a month or so",[9] Hoover extended the clearance so his men were
"unshackled" to look for evidence in any areas of King's life they deemed worthy.[10]

History
Centralized operations under COINTELPRO officially began in August 1956 with a program
designed to "increase factionalism, cause disruption and win defections" inside the Communist
Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of
documents that would divide the American communist organization internally.[11] An October
1956 memo from Hoover reclassified the FBI's ongoing surveillance of black leaders, including it
within COINTELPRO, with the justification that the movement was infiltrated by communists.[12]
In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon,
and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders
of George W. Lee, Emmett Till, and other blacks in the South.[13] When the Southern Christian
Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the
group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and,
eventually, Rev. Martin Luther King, Jr.[14]

After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major
target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:

OEN OP-ED ARTICLE Page No. 47 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

In the light of King's powerful demagogic speech. ... We must mark him now, if we have not done
so before, as the most dangerous Negro of the future in this nation from the standpoint of
communism, the Negro, and national security.[16]

Soon after, the FBI was systematically bugging King's home and his hotel rooms, as they now
were aware that King was growing in stature daily as the leader among leaders of the Negro
movement.[17]

In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the
use of terrorism by white supremacists. Hoover responded by publicly calling King the most
"notorious liar" in the United States.[18] In his 1991 memoir, Washington Post journalist Carl
Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to
commit suicide.[19] Historian Taylor Branch documents an anonymous November 21, 1964
"suicide package" sent by the FBI that contained audio recordings of King's sexual indiscretions
combined with a letter telling him "There is only one way out for you. You better take it before
your filthy, abnormal, fraudulent self is bared to the nation." And even by 1969, as has been
noted elsewhere, "[FBI] efforts to 'expose' Martin Luther King, Jr. had not slackened even though
King had been dead for a year. [The Bureau] furnished ammunition to conservatives to attack
King's memory, and...tried to block efforts to honor the slain leader." [20]

During the same period the program also targeted Malcolm X. While an FBI spokesman has denied
that the FBI was "directly" involved in Malcolm's murder, it is documented that the Bureau worked
to "widen the rift" between Malcolm and Elijah Muhammad through infiltration and the "sparking
of acrimonious debates within the organization," rumor-mongering, and other tactics designed to
foster internal disputes; which ultimately led to Malcolm's assassination.[21][22] The FBI heavily
infiltrated Malcolm's Organization of Afro-American Unity in the final months of his life. The
Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men
who plotted Malcolm's assassination were never apprehended and that the full extent of the FBI's
involvement in his death cannot be known.[23][24]

Amidst the urban unrest of JulyAugust 1967, the FBI began "COINTELPROBLACK HATE", which
focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC),
the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of
Racial Equality (CORE), and the Nation of Islam.[25] BLACK HATE established the Ghetto
Informant Program and instructed 23 FBI offices to "disrupt, misdirect, discredit, or otherwise
neutralize the activities of black nationalist hate type organizations".[26]

A March 1968 memo stated the program's goal was to "prevent the coalition of militant black
nationalist groups" ; to "Prevent the RISE OF A 'MESSIAH' who could unify...the militant black

OEN OP-ED ARTICLE Page No. 48 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

nationalist movement" ; "to pinpoint potential troublemakers and neutralize them before they
exercise their potential for violence [against authorities]." ; to "Prevent militant black nationalist
groups and leaders from gaining RESPECTABILITY, by discrediting them to...both the responsible
community and to liberals who have vestiges of sympathy..."; and to "prevent the long-range
GROWTH of militant black organizations, especially among youth." Dr. King was said to have
potential to be the "messiah" figure, should he abandon nonviolence and integrationism;[27]
Stokely Carmichael was noted to have "the necessary charisma to be a real threat in this way;" as
he was seen as someone who espoused a much more militant vision of "black power."[28]

This program coincided with a broader federal effort to prepare military responses for urban riots,
and began increased collaboration between the FBI, Central Intelligence Agency, National Security
Agency, and the Department of Defense. The CIA launched its own domestic espionage project in
1967 called Operation CHAOS.[29] A particular target was the Poor People's Campaign, a national
effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and
disrupted the campaign on a national level, while using targeted smear tactics locally to
undermine support for the march.[30]

Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961),
the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New
Left social/political movement, which included antiwar, community, and religious groups (1968). A
later investigation by the Senate's Church Committee (see below) stated that "COINTELPRO began
in 1956, in part because of frustration with Supreme Court rulings limiting the Government's
power to proceed overtly against dissident groups ..."[31] Official congressional committees and
several court cases[32] have concluded that COINTELPRO operations against communist and
socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of
freedom of speech and association.[1]

Program exposed

The program was successfully kept secret until 1971, when the Citizens' Commission to
Investigate the FBI burgled an FBI field office in Media, Pennsylvania, took several dossiers, and
exposed the program by passing this material to news agencies.[33] Many news organizations
initially refused to publish the information. Within the year, Director J. Edgar Hoover declared that
the centralized COINTELPRO was over, and that all future counterintelligence operations would be
handled on a case-by-case basis.[34][35]

Additional documents were revealed in the course of separate lawsuits filed against the FBI by
NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976
the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of

OEN OP-ED ARTICLE Page No. 49 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

the United States Senate, commonly referred to as the "Church Committee" for its chairman,
Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO.
Journalists and historians speculate that the government has not released many dossier and
documents related to the program. Many released documents have been partly, or entirely,
redacted.

The Final Report of the Select Committee castigated conduct of the intelligence community in its
domestic operations (including COINTELPRO) in no uncertain terms:

The Committee finds that the domestic activities of the intelligence community at times violated
specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal
questions involved in intelligence programs were often not considered. On other occasions, they
were intentionally disregarded in the belief that because the programs served the "national
security" the law did not apply. While intelligence officers on occasion failed to disclose to their
superiors programs which were illegal or of questionable legality, the Committee finds that the
most serious breaches of duty were those of senior officials, who were responsible for controlling
intelligence activities and generally failed to assure compliance with the law.[1] Many of the
techniques used would be intolerable in a democratic society even if all of the targets had been
involved in violent activity, but COINTELPRO went far beyond that ... the Bureau conducted a
sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment
rights of speech and association, on the theory that preventing the growth of dangerous groups
and the propagation of dangerous ideas would protect the national security and deter violence.
[31]

Range of targets
At its inception, the programs's main target was the Communist Party.[36]
According to the Church Committee:

While the declared purposes of these programs were to protect the "national security"
or prevent violence, Bureau witnesses admit that many of the targets were nonviolent
and most had no connections with a foreign power. Indeed, nonviolent organizations
and individuals were targeted because the Bureau believed they represented a
"potential" for violenceand nonviolent citizens who were against the war in Vietnam
were targeted because they gave "aid and comfort" to violent demonstrators by
lending respectability to their cause.

The imprecision of the targeting is demonstrated by the inability of the Bureau to


define the subjects of the programs. The Black Nationalist program, according to its
supervisor, included "a great number of organizations that you might not today

OEN OP-ED ARTICLE Page No. 50 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

characterize as black nationalist but which were in fact primarily black." Thus, the
nonviolent Southern Christian Leadership Conference was labeled as a Black
Nationalist-"Hate Group."

Furthermore, the actual targets were chosen from a far broader group than the titles of
the programs would imply. The CPUSA program targeted not only Communist Party
members but also sponsors of the National Committee to Abolish the House Un-
American Activities Committee and civil rights leaders allegedly under Communist
influence or deemed to be not sufficiently "anti-Communist". The Socialist Workers
Party program included non-SWP sponsors of anti-war demonstrations which were
cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black
Nationalist program targeted a range of organizations from the Panthers to SNCC to
the peaceful Southern Christian Leadership Conference, and included every Black
Student Union and many other black student groups. New Left targets ranged from the
SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch
College ("vanguard of the New Left") to the New Mexico Free University and other
"alternate" schools, and from underground newspapers to students' protesting
university censorship of a student publication by carrying signs with four-letter words
on them.

Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal,
contained in the Church Committee report:[37]

1. President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams
to the White House opposing his "national defense" policy and supporting Col. Charles
Lindbergh.

2. President Truman received inside information on a former Roosevelt aide's efforts to


influence his appointments, labor union negotiating plans, and the publishing plans of
journalists.

3. President Eisenhower received reports on purely political and social contacts with foreign
officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O.
Douglas.

4. The Kennedy administration had the FBI wiretap a congressional staff member, three
executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F.
Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic
listening device targeting a congressman, both of which yielded information of a political
nature.

OEN OP-ED ARTICLE Page No. 51 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

5. President Johnson asked the FBI to conduct "name checks" of his critics and members of
the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political
intelligence on his critics in the Senate, and received extensive intelligence reports on
political activity at the 1964 Democratic Convention from FBI electronic surveillance.

6. President Nixon authorized a program of wiretaps which produced for the White House
purely political or personal information unrelated to national security, including information
about a Supreme Court Justice.

Groups that were known to be targets of COINTELPRO operations include

communist and socialist organizations

organizations and individuals associated with the Civil Rights Movement, including Rev. Dr.
Martin Luther King, Jr. and others associated with the Southern Christian Leadership
Conference, the National Association for the Advancement of Colored People, the Congress
of Racial Equality, and other civil rights organizations

black nationalist groups

the Young Lords

the American Indian Movement

the white supremacist groups

the Ku Klux Klan

the National States' Rights Party

a broad range of organizations labeled "New Left", including Students for a Democratic
Society and the Weathermen

almost all groups protesting the Vietnam War, as well as individual student demonstrators
with no group affiliation

the National Lawyers Guild

organizations and individuals associated with the women's rights movement

nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and
Cuban exile movements including Orlando Bosch's Cuban Power and the Cuban Nationalist
Movement;

and additional notable Americans.[38]

The COINTELPRO documents show numerous cases of the FBI's intentions to prevent and disrupt
protests against the Vietnam War. Many techniques were used to accomplish this task. "These

OEN OP-ED ARTICLE Page No. 52 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing
violent confrontations as an alternative to massive, peaceful demonstrations." One 1966
COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support
for the antiwar movement.[39]

Methods

Body of Fred Hampton, national spokesman for the Black Panther Party, who was murdered[40]
[41] by members of the Chicago Police Department, as part of a COINTELPRO operation.[42][43]

According to attorney Brian Glick in his book War at Home, the FBI used four main methods
during COINTELPRO:

1. Infiltration: Agents and informers did not merely spy on political activists. Their main
purpose was to discredit and disrupt. Their very presence served to undermine trust and
scare off potential supporters. The FBI and police exploited this fear to smear genuine
activists as agents.

2. Psychological warfare: The FBI and police used myriad "dirty tricks" to undermine
progressive movements. They planted false media stories and published bogus leaflets and
other publications in the name of targeted groups. They forged correspondence, sent
anonymous letters, and made anonymous telephone calls. They spread misinformation
about meetings and events, set up pseudo movement groups run by government agents,
and manipulated or strong-armed parents, employers, landlords, school officials and others
to cause trouble for activists. They used bad-jacketing to create suspicion about targeted
activists, sometimes with lethal consequences.[44]

3. Harassment via the legal system: The FBI and police abused the legal system to harass
dissidents and make them appear to be criminals. Officers of the law gave perjured
testimony and presented fabricated evidence as a pretext for false arrests and wrongful
imprisonment. They discriminatorily enforced tax laws and other government regulations
and used conspicuous surveillance, "investigative" interviews, and grand jury subpoenas in
an effort to intimidate activists and silence their supporters.[42][45]

4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to
conduct illegal break-ins in order to search dissident homes; and to commit vandalism,
assaults, beatings and assassinations.[42] The object was to frighten or eliminate
dissidents and disrupt their movements.

The FBI specifically developed tactics intended to heighten tension and hostility between various
factions in the black militancy movement, for example between the Black Panthers, the US

OEN OP-ED ARTICLE Page No. 53 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were
San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[42]

Dhoruba Bin Wahad a former Black Panther, reflects on how these tactics made him feel, saying
he had a combat mentality and felt like he was at war with the government. When asked about
why he thinks the Black Panthers were targeted he said, "In the United States, the equivalent of
the military was the local police. During the early sixties, at the height of the Civil Rights
Movement, and the human rights movement, the police in the United States became increasingly
militaristic. They began to train out of military bases in the United States. The Law Enforcement
Assistance Act (LEAA) supplied local police with military technology, everything from assault rifles
to army personnel carriers. In his opinion, the Counterintelligence Program went hand-in-hand
with the militarization of the police in the Black community, with the militarization of police in
America."[46]

The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles,
San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther
homesoften with little or no evidence of violations of federal, state, or local lawswhich resulted
directly in the police killing many members of the Black Panther Party, most notably Chicago Black
Panther Party Chairman Fred Hampton on December 4, 1969.[42][43][47]

In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed
to have worked with local police departments to target specific individuals,[48] accuse them of
crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them. Elmer
"Geronimo" Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California
Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court,
an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los
Angeles Police Department knew he had not been in the area at the time the murder occurred.
[49][50]

Some sources claim that the FBI conducted more than 200 "black bag jobs",[51][52] which were
warrantless surreptitious entries, against the targeted groups and their members.[53]

J. Edgar Hoover In 1969 the FBI special agent in San Francisco wrote Hoover that his
investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers
were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the
agent's career goals would be directly affected by his supplying evidence to support Hoover's view
that the BPP was "a violence-prone organization seeking to overthrow the Government by
revolutionary means".[54]

OEN OP-ED ARTICLE Page No. 54 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Hoover supported using false claims to attack his political enemies. In one memo he wrote:
"Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist
to substantiate the charge."[55]

In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered
by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her
passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an
acknowledged FBI informant.[56][57] The FBI spread rumors that Liuzzo was a member of the
Communist Party and had abandoned her children to have sexual relationships with African
Americans involved in the Civil Rights Movement.[58][59] FBI records show that J. Edgar Hoover
personally communicated these insinuations to President Johnson.[60][61] FBI informant Rowe
has also been implicated in some of the most violent crimes of the 1960s civil rights era, including
attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church
bombing.[56] According to Noam Chomsky, in another instance in San Diego, the FBI financed,
armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a
group called the Secret Army Organization that targeted groups, activists, and leaders involved in
the Anti-War Movement, using both intimidation and violent acts.[62][63][64]

Hoover ordered preemptive action "to pinpoint potential troublemakers and neutralize them before
they exercise their potential for violence."[5]

Illegal surveillance

The final report of the Church Committee concluded:

Too many people have been spied upon by too many Government agencies
and too much information has been illegally collected. The Government has
often undertaken the secret surveillance of citizens on the basis of their
political beliefs, even when those beliefs posed no threat of violence or illegal
acts on behalf of a hostile foreign power. The Government, operating
primarily through secret and biased informants, but also using other intrusive
techniques such as wiretaps, microphone "bugs", surreptitious mail opening,
and break-ins, has swept in vast amounts of information about the personal
lives, views, and associations of American citizens. Investigations of groups
deemed potentially dangerousand even of groups suspected of associating
with potentially dangerous organizationshave continued for decades,
despite the fact that those groups did not engage in unlawful activity.

Groups and individuals have been assaulted, repressed, harassed and

OEN OP-ED ARTICLE Page No. 55 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

disrupted because of their political views, social beliefs and their lifestyles.
Investigations have been based upon vague standards whose breadth made
excessive collection inevitable. Unsavory, harmful and vicious tactics have
been employedincluding anonymous attempts to break up marriages,
disrupt meetings, ostracize persons from their professions, and provoke
target groups into rivalries that might result in deaths. Intelligence agencies
have served the political and personal objectives of presidents and other high
officials. While the agencies often committed excesses in response to
pressure from high officials in the Executive branch and Congress, they also
occasionally initiated improper activities and then concealed them from
officials whom they had a duty to inform.

Governmental officialsincluding those whose principal duty is to enforce the


lawhave violated or ignored the law over long periods of time and have
advocated and defended their right to break the law.

The Constitutional system of checks and balances has not adequately


controlled intelligence activities. Until recently the Executive branch has
neither delineated the scope of permissible activities nor established
procedures for supervising intelligence agencies. Congress has failed to
exercise sufficient oversight, seldom questioning the use to which its
appropriations were being put. Most domestic intelligence issues have not
reached the courts, and in those cases when they have reached the courts,
the judiciary has been reluctant to grapple with them.[65][66]

Post-COINTELPRO Operations

While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI
actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.
[67][68][69] Documents released under the FOIA show that the FBI tracked the late David
Halberstama Pulitzer Prize-winning journalist and authorfor more than two decades.[70]
"Counterterrorism" guidelines implemented during the Reagan administration have been described
as allowing a return to COINTELPRO tactics.[71][pages needed] Some radical groups accuse
factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[72]

The IG report found these "troubling" FBI practices between 2001 and 2006. In some cases, the
FBI conducted investigations of people affiliated with activist groups for "factually weak" reasons.
Also, the FBI extended investigations of some of the groups "without adequate basis" and
improperly kept information about activist groups in its files. The IG report also found that FBI

OEN OP-ED ARTICLE Page No. 56 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Director Robert Mueller III provided inaccurate congressional testimony about one of the
investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.
[73]

Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against
radical groups after the official COINTELPRO operations were ended. Several authors have
suggested the American Indian Movement (AIM) has been a target of these operations.

Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal
government intended to acquire uranium deposits on the Lakota tribe's reservation land, and that
this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.
[74][75][76][77][78] Others believe COINTELPRO continues and similar actions are being taken
against activist groups.[78][79][80] Caroline Woidat says that, with respect to Native Americans,
COINTELPRO should be understood within a historical context in which "Native Americans have
been viewed and have viewed the world themselves through the lens of conspiracy theory."[81]
Other authors argue that while some conspiracy theories related to COINTELPRO are unfounded,
the issue of ongoing government surveillance and repression is real.[82][83]

References

"I. Introduction and Summary" (PDF). Intelligence Activities and the Rights of Americans -
Church Committee final report. United States Senate website. II. United States
Government. 1976-04-26. p. 10. Archived (PDF) from the original on 2014-04-18.
Retrieved 2014-07-15.

Wolf, Paul. "COINTELPRO: The Untold American Story". Archive.org. World Conference
Against Racism, Durbin SA.
Jalon, Allan M. (2006-03-08). "A break-in to end all break-ins; In 1971, stolen FBI files
exposed the government's domestic spying program.". Los Angeles Times. Tribune
Company. Archived from the original on 2013-12-03. Retrieved 2014-07-15.
Jeffreys-Jones, Rhodri (208). The FBI. Yale University Press. p. 189.
ISBN 9780300142846.
COINTELPRO Revisited - Spying & Disruption - IN BLACK AND WHITE: THE F.B.I. PAPERS
"A Huey P. Newton Story - Actions - COINTELPRO". PBS. Archived from the original on
2010-11-18. Retrieved 2008-06-23.
Weiner, Tim (2012). Enemies : A History of the FBI (1st ed.). New York: Random House.
ISBN 9781400067480., p. 196. "Sullivan would become Hoover's field marshal in matters
of national security, chief of FBI intelligence, and commandant of COINTELPRO. In that top
secret and tightly compartmentalized world, an FBI inside of the FBI, Sullivan served as the
executor of Hoover's most clandestine and recondite demands."
Weiner, Enemies (2012), p. 233. "RFK knew much more about this surveillance than he
ever admitted. He personally renewed his authorization for the taps on Levison's office,
and he approved Hoover's request to tap Levison's home telephone, where King called late
at night several times a week."
Herst, Burton (2007) Bobby and J. Edgar, p. 372.

OEN OP-ED ARTICLE Page No. 57 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Herst (2007), pp. 372374


Weiner, Enemies (2012), p. 195

Weiner, Enemies (2012), p. 198. "On October 2, 1956, Hoover stepped up the FBI's long-
standing surveillance of black civil rights activists. He sent a COINTELPRO memo to the
field, warning that the Communist Party was seeking to infiltrate the movement."
David T. Beito and Linda Royster Beito, Black Maverick: T.R.M. Howard's Fight for Civil
Rights and Economic Power (Urbana: University of Illinois Press, 2009), 148, 15459.
Weiner, Enemies (2012), p. 200.
Gage, Beverly (2014-11-11). "What an Uncensored Letter to M.L.K. Reveals". The New
York Times. Retrieved 2015-01-09.
Weiner, Enemies (2012), p. 235.
Weiner, Enemies (2012), p. 236. "The bugs got quick results. When King traveled, as he
did constantly in the ensuing weeks, to Washington, Milwaukee, Los Angeles, and Honolulu,
the Bureau planted hidden microphones in his hotel rooms. The FBI placed a total of eight
wiretaps and sixteen bugs on King."
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999), p. 524-529
Adams, Cecil M. (2003-05-02). "Was Martin Luther King, Jr. a plagiarist?". Washington
Post. Retrieved 2006-06-06.
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999) p. 527-529
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999), p. 243
Gregory Kane, "FBI should acknowledge complicity in the assassination of Malcolm X" The
Baltimore Sun, May 14, 2000
Toure "Malcolm X: Criminal, Minister, Humanist, Martyr" The New York Times, June 17,
2011
James W. Douglass "The Converging Martyrdom of Malcolm and Martin" Dr. Martin Luther
King Jr. Lecture, Princeton Theological Seminary, March 29, 2006
"Guide to the Microfilm Edition of FBI Surveillance Files: Black Extremist Organizations,
Part 1" Lexis-Nexis
Weiner, Enemies (2012), p. 271.
"The FBI Sets Goals for COINTELPRO" American Social History Project, City University of
New York
Rob Warden "Hoover Rated Carmichael As 'Black Messiah'" Chicago Daily News, Feb 10,
1976
Weiner, Enemies (2012), p. 272. "Some 1,500 army intelligence officers in civilian clothing
undertook the surveillance of some 100,000 American citizens. Army intelligence shared all
their reports over the next three years. The CIA tracked antiwar leaders and black militants
who traveled overseas, and it reported back to the FBI. The FBI, in turn, shared thousands
of selected files on Americans with army intelligence and the CIA. All three intelligence
services sent the names of Americans to the National Security Agency for inclusion on a
global watch list; the NSA relayed back to the FBI hundreds of transcripts of intercepted
telephone calls to and from suspect Americans."
McKnight, Last Crusade, pp. 2628. "By March the Hoover Bureau's campaign against King
was virtually on a total war footing. In a March 21 'urgent' teletype, Hoover urged all field

OEN OP-ED ARTICLE Page No. 58 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

offices involved in the POCAM project to exploit every tactic in the bureau's arsenal of
covert political warfare to bring down King and the SCLC."
"Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of
Americans". United States Senate. Retrieved 2010-12-01.
See, for example, Hobson v. Wilson, 737 F.2d 1 (1984); Rugiero v. U.S. Dept. of Justice,
257 F.3d 534, 546 (2001).[dead link]
http://www.pbs.org/independentlens/1971/
"A Short History of FBI COINTELPRO", Albion Monitor, Retrieved July 13, 2007. Archived
September 28, 2007, at the Wayback Machine.
Weiner, Enemies (2012), p. 293
The COINTELPRO Papers - Documents from the FBI's Secret Wars Against Dissent in the
United States by Ward Churchill & Jim Vander Wall. South End Press.
Intelligence Activities and the Rights of Americans, Final Report of the Senate Committee
to Study Governmental Operations with respect to Intelligence Activities

Various Church Committee reports reproduced online at ICDC: Final Report, 2A; Final
Report,2Cb; Final Report, 3A; Final Report, 3G. Various COINTELPRO documents
reproduced online at ICDC: CPUSA; SWP; Black Nationalist; White Hate; New Left; Puerto
Rico. Archived January 13, 2013, at the Wayback Machine.
Blackstock, Nelson. COINTELPRO: The FBI's Secret War on Political Freedom, Pathfinder,
New York. 1975. p. 111.
Michael Newton. Famous Assassinations in World History: An Encyclopedia. ABC-CLIO, p.
205. ISBN 1610692853
THE CHICAGO CRIME SCENES PROJECT: FRED HAMPTON
The FBI'S Covert Action Program to Destroy the Black Panther Party
FBI Secrets: An Agent's Expose. M. Wesley Swearingen. Boston. South End Press. 1995.
Special Agent Gregg York: "We expected about twenty Panthers to be in the apartment
when the police raided the place. Only two of those black nigger fuckers were killed, Fred
Hampton and Mark Clark."
Ward Churchill (2002), Agents of Repression (Agents of Repression: The FBI's Secret Wars
Against the Black Panther Party and the American Indian Movement ed.), South End Press,
ISBN 978-0896086463, OCLC 50985124, 0896086461
"Final Report of the Select Committee to Study Governmental Operations with Respect to
Intelligence Activities-Book III" [The Church Report], US Senate, 1976
Bin Wahad, Dhoruba. Still Black, Still Strong. Semiotext, 1993, pp. 18-19
Brown, Elaine. A Taste of Power: A Black Woman's Story. New York: Doubleday, 1992, pp.
204-06
Paul Wolf, "COINTELPRO", ICDC
"Former Black Panther freed after 27 years in jail". CNN. Archived from the original on
2010-11-18. Retrieved April 30, 2010.
In re Pratt, 82 Cal
Alexander Cockburn; Jeffrey St. Clair (1998). Whiteout: The CIA, Drugs and the Press.
Verso. p. 69. ISBN 978-1-85984-139-6.
FBI document, 19 July 1966, DeLoach to Sullivan re: "Black Bag" Jobs.
[1]

OEN OP-ED ARTICLE Page No. 59 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

FBI document, 27 May 1969, "Director FBI to SAC San Francisco", available at the FBI
reading room.
FBI document, 16 September 1970, Director FBI to SAC's in Baltimore, Detroit, Los
Angeles, New Haven, San Francisco, and Washington Field Office. Available at the FBI
reading room.
Gary May, The Informant: The FBI, the Ku Klux Klan, and the Murder of Viola Luzzo, Yale
University Press, 2005.
"Jonathan Yardley". The Washington Post. Archived from the original on 2010-11-18.
Retrieved April 30, 2010.

Joanne Giannino. "Viola Liuzzo". Dictionary of Unitarian & Universalist Biography. Archived
from the original on 2010-11-18. Retrieved 2008-09-29.
Kay Houston. "The Detroit housewife who moved a nation toward racial justice". The
Detroit News, Rearview Mirror. Archived from the original on 1999-04-27.
"Uncommon Courage: The Viola Liuzzo Story". Archived from the original on 2007-08-13.
Mary Stanton (2000). From Selma to Sorrow: The Life and Death of Viola Liuzzo.
University of Georgia Press. p. 190.
Noam Chomsky, "Triumphs of Democracy", Excerpted from Language and Responsibility
Watergate and the Secret Army Organization - msg#00404 - culture.discuss.cia-drugs
1972
"Intelligence Activities and the Rights of Americans Book II, Final Report of the Select
Committee to Study Governmental Operations with respect to Intelligence Activities United
States Senate (Church Committee)". United States Senate. Retrieved May 11, 2006.
"Tapped Out Why Congress won't get through to the NSA.". Slate. Retrieved May 11,
2006.
David Cunningham. There's Something Happening Here: The New Left, the Klan, and FBI.
University of California Press, 2005: "However, strong suspicions lingered that the
program's tactics were sustained on a less formal basissuspicions sometimes furthered
by agents themselves, who periodically claimed that counterintelligence activities were
continuing, though in a manner undocumented within Bureau files."; Hobson v. Brennan,
646 F.Supp. 884 (D.D.C.,1986)
Bud Schultz, Ruth Schultz. The Price of Dissent: Testimonies to Political Repression in
America. University of California Press, 2001: "Although the FBI officially discontinued
COINTELPRO immediately after the Pennsylvania disclosures "for security reasons," when
pressed by the Senate committee, the bureau acknowledged two new instances of
"Cointelpro-type" operations. The committee was left to discover a third, apparently illegal
operation on its own."
Athan G. Theoharis, et al. The FBI: A Comprehensive Reference Guide. Greenwood
Publishing Group, 1999: "More recent controversies have focused on the adequacy of
recent restrictions on the Bureau's domestic intelligence operations. Disclosures of the
1970s that FBI agents continued to conduct break-ins, and of the 1980s that the FBI
targeted CISPES, again brought forth accusations of FBI abuses of powerand raised
questions of whether reforms of the 1970s had successfully exorcised the ghost of FBI
Director Hoover."
The Associated Press, "FBI tracked journalist for over 20 years". Toronto Star. November
7, 2008. Retrieved November 23, 2008.
Bud Schultz, Ruth Schultz. The Price of Dissent: Testimonies to Political Repression in
America. University of California Press, 2001: "The problem persists after Hoover."The
record before this court," Federal Magistrate Joan Lefkow stated in 1991, "shows that

OEN OP-ED ARTICLE Page No. 60 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

despite regulations, orders and consent decrees prohibiting such activities, the FBI had
continued to collect information concerning only the exercise of free speech."
Mike Mosedale, "Bury My Heart," City Pages, Volume 21 - Issue 1002, 16 February 2000
"FBI Probes of Groups Were Improper, Justice Department Says". The San Jose Mercury
News. September 20, 2010. also reported at democracynow.org, 21 September 2010
Churchill, Ward, and Jim Vander Wall, (1990), The COINTELPRO Papers: Documents from
the FBI's Secret Wars Against Domestic Dissent, Boston: South End Press, pp. xii, 303.
Churchill, Ward; and James Vander Wall. Agents of Repression: The FBI's Secret Wars
against the Black Panther Party and the American Indian Movement, 1988, Boston, South
End Press.
Weyler, Rex. Blood of the Land: The Government and Corporate War Against First Nations.
Matthiessen, Peter, In the Spirit of Crazy Horse, 1980, Viking.
Woidat, Caroline M. "The Truth Is on the Reservation: American Indians and Conspiracy
Culture", The Journal of American Culture 29 (4), 2006, pp. 454467
McQuinn, Jason. "Conspiracy Theory vs Alternative Journalism", Alternative Press Review,
Vol. 2, No. 3, Winter 1996
Horowitz, David. "Johnnie's Other O.J.", Front Page Magazine.com, September 1, 1997.
Woidat, Caroline M. "The Truth Is on the Reservation: American Indians and Conspiracy
Culture", The Journal of American Culture 29 (4), 2006. pp. 454467
Berlet, Chip. "The X-Files Movie: Facilitating Fanciful Fun, or Fueling Fear and Fascism?
Conspiracy Theories for Fun, Not for False Prophets", 1998, Political Research Associates
Berlet, Chip; and Matthew N. Lyons. 1998, "One key to litigating against government
prosecution of dissidents: Understanding the underlying assumptions", Parts 1 and 2,
Police Misconduct and Civil Rights Law Report (West Group), 5 (13), (JanuaryFebruary):
145153; and 5 (14), (MarchApril): 157162.

OEN OP-ED ARTICLE Page No. 61 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

CIA Mind Control Experiments


Declassified Documents Reveal Sex Abuse, and More
Taken from the website:
(http://www.wanttoknow.info/mind_control/cia_mind_control_experiments_sex_abuse)

Tragic, heartbreaking mass murders in recent years have spread fear and panic among the
general public. Yet some are questioning if there isn't more than meets the eye with these cruel
and bizarre events. Is it conceivable that there might be a deeper agenda here?

This essay presents undeniable evidence that secret government mind control programs
have created assassins out of unsuspecting citizens.

The astonishing excerpts below, taken verbatim from declassified CIA documents, reveal detailed
mind control experiments in highly secret, government-sponsored experiments. Through hypnosis,
drugs, and electric shock, CIA clinicians fractured personalities and induced multiple personality
disorder (MPD) also called dissociative identity disorder (DID).

These top secret experiments were successful in creating Manchurian Candidates or


super spies programmed to carry out assassination, terrorist acts, sexual favors, and
more without conscious knowledge of what they were doing. The army of Manchurian
Candidates created may have played a key, hidden role in world politics.

To verify this startling information, links are provided to scanned images of the original CIA
documents. Instructions are also available here to order any of these documents directly from the
CIA using the Freedom of Information Act (FOIA).

Though dating from the 1950s and 60s, these revealing documents were not released for decades
for reasons of "national security." The U.S. government claims mind control experiments are no
longer being carried out, yet how can we know? The existence of these programs was denied for
decades, and certainly any recent documents would be classified secret under the rubric of
"national security."

A trusted CIA informant I know assures me that these programs are ongoing. These disturbing
methods are used by various countries in clandestine operations around the world. Many might
prefer not to look at these ugly wounds to the soul of our nation and world. Yet if we avoid or
ignore them, they are likely to grow and fester.

OEN OP-ED ARTICLE Page No. 62 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

CIA document and page number: 190684, pp. 1, 4


Title: Outline of Special H Cases
Date: 7 January 1953
Page 1, Page 4

In a general request for volunteers [deleted names] volunteered for H [hypnosis]


experimentation and were originally tested on 21 May 1951. Both girls, at this time,
were nineteen years of age. These subjects have clearly demonstrated that they can
pass from a fully awake state to a deep H controlled state via the telephone, via some very
subtle signal that cannot be detected by other persons in the room, and without the other
individuals being able to note the change.

It has been shown clearly that physically individuals can be induced into H by telephone, by
receiving written matter, or by the use of code, signal, or words. Control of those hypnotized
can be passed from one individual to another without great difficulty. It has also been
shown by experimentation with these girls that they can act as unwilling couriers for
information purposes, and that they can be conditioned to a point where they believe a change
in identity on their part even on the polygraph.

Note: This document shows that CIA experimenters were successful in hypnotizing young
women (19 years old in this case) to do things they would not do normally without any
memory afterward, sometimes even unwillingly. Though they volunteered, these women
were thus programmed to be Manchurian Candidates or super spies with no knowledge of
what these men were doing to them.

CIA document and page number: 17395, p. 18


Title: ESP Research
Date: Unknown
Link to view image of original: Click here

Learning models will be instituted in which the subject will be rewarded or punished for his
overall performance and reinforced in various ways by being told whether he was right, by
being told what the target was, with electric shock etc. ... In other cases drugs and
psychological tricks will be used to modify his attitudes. The experimenters will be
particularly interested in disassociative states, from the abaissement de niveau mental to
multiple personality in so-called mediums, and an attempt will be made to induce a number
of states of this kind, using hypnosis.

OEN OP-ED ARTICLE Page No. 63 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Note: This document provides proof that the CIA was was using drugs and electric shock in
attempting to induce MPD (multiple personality disorder). Though this document uses the
masculine "he" to describe the subject, other documents show that most of the subjects
used were young women who volunteered. The subjects were not informed about the
deeper aspects and implications for which they were being trained. If you view the original,
you will also find interesting information on ESP experiments.

CIA document and page number: 190691, p. 1, 2


Title: Hypnotic Experimentation and Research
Date: 10 February 1954
Link to view image of original: Page 1, Page 2

A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses
[deleted] and [deleted] immediately progressed to a deep hypnotic state with no further
suggestion. Miss [deleted] was then instructed (having previously expressed a fear
of firearms in any fashion) that she would use every method at her disposal to
awaken miss [deleted] (now in a deep hypnotic sleep), and failing this, she would
pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her
rage would be so great that she would not hesitate to "kill" [deleted] for failing to
awaken.

Miss [deleted] carried out these suggestions to the letter including firing the (unloaded pneumatic
pistol) gun at [deleted] and then proceeding to fall into a deep sleep. After proper suggestions
were made, both were awakened and expressed complete amnesia for the entire sequence. Miss
[deleted] was again handed the gun, which she refused (in an awakened state) to pick up or
accept form the operator. She expressed absolute denial that the foregoing sequence had
happened.

Miss [deleted] felt reluctant about participating further since she expressed her doubt as to
any useful purpose in further attendance. The Operator thereupon proceeded in full view of all
other subjects to explain to Miss [deleted] that he planned to induce a deep state of hypnosis
now. The reaction was as had been expected. Miss [deleted] excused herself to make a telephone
call (defense mechanism?). Upon her return a very positive approach was adopted by the operator
whereupon a deeper, much deeper state of hypnosis was obtained.

Immediately a posthypnotic was induced that when the operator accidently dropped a steel ball in
his hand to the floor ... Miss [deleted] would again go into hypnosis. Miss [deleted] then advised
that she must conclude her work for the evening. She arose to adjust her hair before the mirror.

OEN OP-ED ARTICLE Page No. 64 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

The ball was dropped and she promptly slumped back into the chair and back into hypnosis. It is
the opinion of the operator the Miss [deleted] if properly trained (positive approach) will continue
to improve.

Note: Here we have proof that these women could be converted into unsuspecting and
even unwilling assassins. They could be programmed to assassinate anyone and would do
so without any conscious knowledge afterward. Note also the questionable status of
"volunteer" implied. Though these women originally volunteered, unwillingness to continue
could be manipulated by the men running the program.

CIA document and page number: 190527, pp. 1, 2


Title: SI and H Experimentation
Date: 25 September 1951
Link to view images of original: Page 1, Page 2
Note: SI stands for sleep induction and H for hypnosis

Prior to actually beginning the more complex experiments, several simple post H were
worked with both of the girls participating. The first major experiment of the evening was
set up as follows without previous explanation to either [deleted] or [deleted]. Both
subjects were placed in a very deep trance state and while in this state, the following
instructions were given:

(A) [Deleted] was instructed that when she awakened, she was to procede to [deleted] room. She
was told that while there, she would receive a telephone call from an individual whom she would
know only as "Joe". This individual would engage her in a normal telephone conversation. During
this conversation, this individual would give her a code word and upon mentioning the
code word, [deleted] would go into a deep SI [sleep induction] trance state, but would
be "normal" in appearance with her eyes open.

[Deleted] was then told that upon the conclusion of the telephone conversation, she would
procede to the ladies room where she would meet a girl who was unknown to her. She was told
that she would strike up a conversation with this girl and during the conversation she would
mention the code word "New York" to this other girl, who, in turn, would give her a device and
further instructions which were to be carried out by [deleted]. She was told that after she carried
out the instructions, she was to return to the Operations Room, sit in the sofa and go immediately
into a deep sleep.

OEN OP-ED ARTICLE Page No. 65 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

(B) [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where
she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim"
would engage her in normal conversation. During the course of the conversation, this individual
would mention a code word to [deleted]. When she heard this code word, she would pass into a SI
trance state, but would not close her eyes and remain perfectly normal and continue the
telephone conversation. She was told that upon conclusion of the telephone conversation, she
would then carry out the following instructions:

[Deleted] being in a complete SI state at this time, was then told to open her eyes and was shown
an electric timing device. She was informed that this timing device was an incendiary
bomb and was then instructed how to attach and set the device. After [deleted] had
indicated that she had learned how to set and attach the device, she was told to return to a sleep
state and further instructed that upon concluding the aforementioned conversation, she would
take the timing device which was in a briefcase and proceed to the ladies room.

In the ladies room, she would be met by a girl whom she had never seen who would identify
herself by the code word "New York." [Deleted] was then to show this individual how to
attach and set the timing device and further instructions would be given the individual
by [deleted] that the timing device was to be carried in the briefcase to [deleted] room,
placed in the nearest empty electric-light plug and concealed in the bottom, left-hand
drawer of [deleted] desk, with the device set for 82 seconds and turned on.

[Deleted] was further instructed to tell this other girl that as soon as the device had been set and
turned on, she was to take the briefcase, leave [deleted] room, go to the operations room and go
to the sofa and enter a deep sleep state. [Deleted] was further instructed that after completion of
instructing the other girl and the transferring to the other girl of the incendiary bomb, she was to
return at once to the operations room, sit on the sofa, and go into a deep sleep state.

For a matter of record, immediately after the operation was begun it was noted that a member of
the charforce was cleaning the floor in the ladies room and subsequently, both [deleted] and
[deleted] had to be placed ... once again in a trance state and instructions changed from the
ladies room to Room 3. It should be noted that even with the change of locale in the transfer
point, the experiment was carried off perfectly without any difficulty or hesitation on the part of
either of the girls. Each girl acted out their part perfectly, the device was planted and set as
directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep
state. Throughout, their movements were easy and natural.

OEN OP-ED ARTICLE Page No. 66 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Note: You will note the frequent use of "girls" (young women) in these programs. Do you
think the men in charge, having complete hypnotic control of these women, might have at
times taken advantage of them sexually? Yet this would never enter the official
documentation, with the one major exception below.

CIA document and page number: 140393, p. 1


Title: [Deleted]
Date: 9 July 1951
Link to view image of original: Click here

On 2 July 1951 approximately 1:00 p.m. the instruction began with [deleted] relating to the
student some of his sexual experiences. [Deleted] stated that he had constantly used
hypnotism as a means of inducing young girls to engage in sexual intercourse
with him. [Deleted], a performer in [deleted] orchestra, was forced to engage in sexual
intercourse with [deleted] while under the influence of hypnotism. [Deleted] stated that he
first put her into a hypnotic trance and then suggested to her that he was her husband and
that she desired sexual intercourse with him.

Note: This document shows that an instructor being used by the CIA took advantage of his
skill in hypnosis to sexually abuse young women without their having any knowledge of
being abused. How many CIA hypnotists did likewise? Do you think a man involved in
these programs might take advantage of a beautiful, young woman knowing she
would not remember afterward? Note that for some reason this document is not
available in the CIA's three CD set and must be ordered individually at this link. See the
What You Can Do section at the end of this page for suggestions on how we can stop this
abuse.

CIA document and page number: 17441, p.8


Title: Continuation of Studies of Hypnosis and Suggestibility
Date: Unknown
Link to view image of original: Click here

Preliminary clinical research during 1955-56 has yielded promising leads in terms
of knowledge of how hypnotizability can be influenced by pharmacological means.

OEN OP-ED ARTICLE Page No. 67 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Experiments involving altered personality function as a result of environmental manipulation


(chiefly sensory isolation) have yielded promising leads in terms of suggestibility and the
production of trance-like states. There is reason to believe that environmental
manipulations can affect tendencies for dissociative phenomenon to occur.

Note: "Dissociative phenomenon" refers to the ability of a person's consciousness to leave


and a new consciousness enter, thereby facilitation the creation of "alter" or multiple
personalities. Besides hypnosis, drugs and electric shocks were developed as means to
facilitate the creation of Manchurian Candidates.

CIA document and page number:17748, pp. 1, 2, 4, 6-9


Title: Report of Inspection of MKULTRA
Date: 26 July 1963
Link to view images of original: Page 1, Page 2, Page 4, Page 6, Page 7, Page 8,
Page 9.

It was deemed advisable to prepare the report of the MKULTRA program in one copy only, in
view of its unusual sensitivity. The MKULTRA activity is concerned with the research and
development of chemical, biological, and radiological materials capable of employment in
clandestine operation to control human behavior. MKULTRA was authorized by then Director
of Central Intelligence [DCI], Allen W. Dulles, in 1953.

The concepts involved in manipulating human behavior are found by many people both within and
outside the Agency to be distasteful and unethical. Nevertheless, there have been major
accomplishments both in research and operational employment. Some MKULTRA activities raise
questions of legality implicit in the original charter. A final phase of testing of MKULTRA
products places the rights and interests of U.S. citizens in jeopardy. Public disclosure of
some aspects of MKULTRA activity could induce serious adverse reaction in U.S. public
opinion. The DCI's memorandum ... exempted MKULTRA from audit.

Over the ten-year life of the program many additional avenues to the control of human behavior
have been designated by the TSD management [Technical Services Division - under which
MKULTRA operated] as appropriate to investigation under the MKULTRA charter, including
radiation, electro-shock, various fields of psychology, psychiatry, sociology, and anthropology,
graphology, harassment substances, and paramilitary devices and materials.

TSD initiated a program for covert testing of materials on unwitting U.S. citizens in 1955. TSD has

OEN OP-ED ARTICLE Page No. 68 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

pursued a philosophy of minimum documentation in keeping with the high sensitivity of some of
the projects. The lack of consistent records precluded use of routine inspection procedures and
raised a variety of questions concerning management and fiscal controls.

There are just two individuals in TSD who have full substantive knowledge of the
program and most of that knowledge is unrecorded. In protecting both the sensitive
nature of the American intelligence capability to manipulate human behavior, they apply
"need to know" doctrine to their professional associates and to their clerical assistants
to a maximum degree.

Note: Why did only two people have full substantive knowledge of the program? Could it be
that sex abuse and political manipulations behind the scenes were so severe that no one
was to be trusted? Do you think we could trust those two individuals? CIA Director Richard
Helms, upon hearing there would be a Congressional investigation, ordered the destruction
of all documents from these unethical and at times illegal mind control programs in 1973.
He did not realize, however, that incriminating evidence remained in the financial files of the
agency, which are what you read here. We can only imagine what secrets the destroyed
documents held.

CIA document and page number: 87624, p. 3, 4 (also appended to 17748, p. 32,
33)
Title: Two Extremely Sensitive Research Programs
Date: 3 April 1953
Link to view images of original: Page 3, Page 4

Approximately 6% of the projects are of such an ultra-sensitive nature that they cannot and
should not be handled by means of contracts which would associate CIA or the Government
with the work in question.

We intend to investigate the development of a chemical material which causes a reversible non-
toxic aberrant mental state, the specific nature of which can be reasonably well predicted for each
individual. This material could potentially aid in discrediting individuals, eliciting
information, implanting suggestion and other forms of mental control.

In a great many instances the work in field (a) must be conducted by individuals who are not and
should not be aware of our interest. In all cases dealing with field (b), it is mandatory that any
connections with the Agency should be known only to an absolute minimum number of people

OEN OP-ED ARTICLE Page No. 69 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

who have been specifically cleared for this purpose.

Experience has shown that qualified, competent individuals in the field of pharmacological,
physiological, psychiatric and other biological sciences are most reluctant to enter into signed
agreements of any sort which connect them with this activity since such a connection would
jeopardize their professional reputations. Even internally in CIA, as few individuals as
possible should be aware of our interest in these fields and of the identity of those who
are working for us. At present, this results in ridiculous contracts, with cut-outs, which
do not spell out the scope or intent of the work.

Note: In the three CD set, this document is found appended to document 17748 on pp. 30
to 37.

CIA document and page number: 190885, p. 1


Title: None Given
Date:1 January 1950
Link to view image of original: Click here

Drug Project - A project in the isolation and synthesis of pure drugs for use in effecting
psychological entry and control of the individual.

Drugs and electricity - Research work on the effects of lysergic acid [LSD] on animals. Use
of electric shock and the encephalograph in interrogation. Particular emphasis on the
detection and prior use of electric shock and the 'guaranteed amnesia' resulting
from electric shock.

Hypnosis - Investigation of the possibilities of hypnotic and post-hypnotic control.

CIA document and page number: 140394, pp. 2, 3 (not available in CD set, order
individually here)
Title: Interview with [Deleted]
Date: 25 February 1952
Link to view full text of both pages: Click here

OEN OP-ED ARTICLE Page No. 70 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Q: What are your experiences in general with hypnotism?


A: I have been a professional hypnotist for at least 15 years. At present, I am employed on
a very confidential basis two days a week.
Q: Can you obtain information from an individual, willing or unwilling, by
hypnotism?
A: Definitely, yes. Many of the medical cases I work on are involved in obtaining
personal, intimate information, and through hypnotism, I have been quite
successful in obtaining this. If an individual refuses to co-operate with hypnosis,
the doctors with whom I work use drugs, always sodium amytal.
Q: How far do you think individuals could be controlled by hypnosis?
A: This is a very difficult subject. Post-hypnotics will last twenty years and will be very
strong if re-enforced from time to time.
Q: Have you ever had any experience with drugs?
A: Yes, many times. I have worked with doctors using sodium amytal and pentothal and
have obtained hypnotic control after the drugs were used. In fact, many times drugs were
used for the purpose of obtaining hypnotic control.
Q: Do you have any ideas that hypnotism could be used as a weapon?
A: Yes, I have thought about this often. It could certainly be used in obtaining information
from recalcitrant people particularly with drugs. It could be used as a recruiting source for
special types of work. A good hypnotist running hypnotic shows for entertainment
would pick up a great many subjects, some of whom might be exceptionally good
subjects for us. These subjects could easily be tabbed and put to use.
Q: Have you ever been able to produce hypnosis without an individual's knowledge?
A: Yes, through the relaxing technique and on rare occasions [I've] been able to produce
hypnotism against a person's will. However, you cannot count on this and to attempt to
attach an individual who did not want to be hypnotized alone would be almost an impossible
task. In that type of case, I would use sodium amytal and/or sodium pentothal.
Q: How effective are post-hypnotics; over what distances and time can they be effective?
A: Properly used post-hypnotics will last twenty years. They can be made more effective by
re-enforcement from time to time. Post-hypnotics are not affected at all by time or travel or
distance away from the person who placed the post-hypnotic. As a rule, post-hypnotics
should be 100% effective in good subjects.
Q: Can individuals be made to do things under hypnosis that they would not otherwise?
A: Individuals could be taught to do anything including murder, suicide, etc. I do
believe that you could carry out acts that would be against an individual's moral
feelings if they were rightly, psychologically conditioned.

Note: Individuals can be hypnotized without their knowledge. They can be programmed to

OEN OP-ED ARTICLE Page No. 71 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

commit murder, suicide, and much more. Think about the implications. How many "suicides"
of important people we've heard in the news were not really suicides? How many murders
were committed by people who didn't even realize they were assassins? How much has this
technology been used to manipulate world politics? Think about the Kennedys, Martin
Luther King, Jr., and possibly those involved with 9/11 and other major terrorist attacks.
Note this document is not available in the three CD set and must be ordered individually at
this link.

CIA document and page number: 140401, pp. 6, 7 (not available in CD set, order
individually here)
Title: Special Research, Bluebird
Date: 1 January 1952 (approximate)
Link to view full text of both pages: Click here

Set out below are specific problems which can only be resolved by experiment, testing and
research.

Can we obtain control of the future activities (physical and mental) of any given individual,
willing or unwilling by application of SI [sleep induction] and H [hypnosis] techniques?

Can we create by post-H control an action contrary to an individual's basic moral


principles?

Can we in a matter of an hour, two hours, one day, etc., induce an H condition in an
unwilling subject to such an extent that he will perform an act for our benefit?

Could we seize a subject and in the space of an hour or two by post-H control
have him crash an airplane, wreck a train, etc.?

Can we by H and SI techniques force a subject (unwilling or otherwise) to travel long


distances, commit specified acts and return to us or bring documents or materials?

Can we guarantee total amnesia under any and all conditions?

Can we "alter" a person's personality?

Can we devise a system for making unwilling subjects into willing agents and then transfer
that control to untrained agency agents in the field by use of codes or identifying signs?

Is it possible to find a gas that can be used to gain SI control from a gas pencil, odorless,
colorless: one shot, etc.?

What are full details on "sleep-inducing machine"?

How can sodium A or P or any other sleep inducing agent be best concealed in a
normal or commonplace item, such as candy, cigarettes, liquer, wines, coffee, tea,
beer, gum water, aspirin tablets, common medicines, coke, tooth paste?

OEN OP-ED ARTICLE Page No. 72 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

Can we, using SI and H extract complicated formula from scientists, engineers, etc., if
unwilling?

Note: Reading all of the declassified CIA documents listed in this essay suggests that the
answer to most, if not all of the questions above appears to be yes. Note that sleep
inducing agents were being placed in candy, aspirin, Coke, and more. Think about the
implications if even just a few of the men in these programs decided to use such things
outside of the office to manipulate others for their personal benefit. It's time that this
information be made public so we can all be aware of what's going on and work to stop the
abuses. Note for some reason this document is not available in the three CD set and must
be ordered individually at this link.

Science Digest Article, pp. 44 - 53 (Not a CIA document, but related to the mind
control programs)
Title: Hypnosis Comes of Age
Date: April 1971
Link to view full text of article: Click here

Psychologist G. H. Estabrooks reminisces about his long career as a hypnotist. Dr.


Estabrooks discusses how he "programmed" American spies with hypnosis and how he
helped businessmen and students with his skills. Dr. Estabrooks is a Rhodes Scholar. He
took his Doctorate at Harvard ('26), and has authored many articles and books on clinical
hypnosis and human behavior.

One of the most fascinating but dangerous applications of hypnosis is its use in military
intelligence. This is a field with which I am familiar through formulating guidelines for the
techniques used by the United States in two world wars. I was involved in preparing many
subjects for this work during World War II.

One successful case involved an Army Service Corps Captain whom we'll call George Smith.
Captain Smith had undergone months of training. He was an excellent subject but did not realize
it. I had removed from him, by post-hypnotic suggestion, all recollection of ever having
been hypnotized. Outside of myself, Colonel Brown was the only person who could hypnotize
Captain Smith. This is "locking." I performed it by saying to the hypnotized Captain: "Until further
orders from me, only Colonel Brown and I can hypnotize you. We will use a signal phrase 'the
moon is clear.' " The system is virtually foolproof.

OEN OP-ED ARTICLE Page No. 73 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

By the 1920's, not only had they learned to apply post-hypnotic suggestion, [they] also
had learned how to split certain complex individuals into multiple personalities like
Jeckyl-Hydes.

During World War II, I worked this technique with a vulnerable Marine lieutenant I'll call Jones.
Under the watchful eye of Marine Intelligence, I spilt his personality into Jones A and Jones B.
Jones A, once a "normal" working Marine, became entirely different. He talked communist doctrine
and meant it. He was welcomed enthusiastically by communist cells, was deliberately given a
dishonorable discharge by the Corps (which was in on the plot) and became a card-carrying party
member.

The joker was Jones B, the second personality, formerly apparent in the conscious Marine. Under
hypnosis, this Jones had been carefully coached by suggestion. Jones B was the deeper
personality, knew all the thoughts of Jones A, was a loyal American, and was "imprinted" to say
nothing during conscious phases. All I had to do was hypnotize the whole man, get in touch with
Jones B, the loyal American, and I had a pipeline straight into the Communist camp.

Note: This article shows that in the 1920s, U.S. military intelligence had already developed
the capability to cause split personalities. The created super spy or Manchurian Candidate
has been a reality for nearly a century, yet very few people know anything about it. These
unknowing spies could plant bombs, provide sexual favors, and even assassinate top
political leaders. Consider that many countries and key powerful, elite groups have had and
used this technology for many decades. Watch the movie Manchurian Candidate to see how
real it is.

OEN OP-ED ARTICLE Page No. 74 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

RESUME AND BIOGRAPHY OF APPEALANT STAN J. CATERBONE, PRO SE


AND ADVANCED MEDIA GROUP

Present APPEALANT STAN J. CATERBONE, PRO SE have been a victim of organized


stalking since 1987 and a victim of electronic and direct energy weapons since 2005.
APPEALANT STAN J. CATERBONE, PRO SE had also been telepathic since 2005. In 2005
the U.S. sponsored mind control turned into an all-out assault of mental telepathy; synthetic
telepathy; and pain and torture through the use of directed energy devices and weapons that
usually fire a low frequency electromagnetic energy at the targeted victim. This assault was no
coincidence in that it began simultaneously with the filing of the federal action in U.S. District
Court, or CATERBONE v. Lancaster County Prison, et. al., or 05-cv-2288. This assault began after
the handlers remotely trained Stan J. Caterbone with mental telepathy. The main difference
opposed to most other victims of this technology is that APPEALANT STAN J. CATERBONE,
PRO SE am connected 24/7 with a person who declares that she is Interscope recording artist
Sheryl Crow of Kennett Missouri. Over the course of 10 years APPEALANT STAN J.
CATERBONE, PRO SE have been telepathic with at least 20 known actors and have spent 10
years trying to validate and confirm this person without success. Most U.S. intelligence agencies
refuse to cooperate, and the Federal Bureau of Investigation and the U.S. Attorney's Office refuse
to comment

In 2009 Advanced Media Group Proposed ORGANIZED STALKING AND DIRECTED ENERGY
WEAPONS HARASSMENT BILL to Pennsylvania House of Representative Mike Sturla (Lancaster,
Pennsylvania) and City of Lancaster Mayor Richard Gray in 2009. The draft legislation is the work
of Missouri House of Representative Jim Guest, who has been working on helping victims of these
horrendous crimes for years. The bill will provide protections to individuals who are being
harassed, stalked, harmed by surveillance, and assaulted; as well as protections to keep
individuals from becoming human research subjects, tortured, and killed by electronic frequency
devices, directed energy devices, implants, and directed energy weapons.

In 2005 I, as a Pro Se Litigant filed several civil actions as Plaintiffs in the United States District
Court for the Eastern District of Pennsylvania, the United States Third District Court of Appeals,
the Pennsylvania Supreme Court, The Pennsylvania Superior Court, the Commonwealth Court of
Pennsylvania, The Court of Common Pleas of Lancaster County, Pennsylvania. These litigations
included violations of intellectual property rights, anti-trust violations, and interference of
contracts relating to several business interests, harassment, extortion, fraud, etc.,. . Central to
this litigation is the Digital Movie, Digital Technologies, Financial Management Group, Ltd,/FMG
Advisory, Ltd., and its affiliated businesses along with a Federal False Claims Act or Federal
Whistleblowers Act regarding the firm of International Signal and Control, Plc., (ISC) the $1Billion
Dollar Fraud and the Export violations of selling arms to South Africa and Iraq. This litigation dates
back to 1987. APPEALANT STAN J. CATERBONE, PRO SE was a shareholder of ISC, and
was solicited by ISC executives for professional services.

From 2002 to 2004 APPEALANT STAN J. CATERBONE, PRO SE engaged in full-time


online day-trading of securities and the selling of merchandise on eBay.

In 2000 to 2002 Advanced Media Group developed an array of marketing and


communication tools for wholesalers of the AIM Investment Group and managed several
communication programs for several of the company wholesalers throughout the United States
and Costa Rica.

In 1999 Advanced Media Group was solicited and paid to develop a comprehensive
business plan to develop the former Sprecher Brewery, known as the Excelsior Building on E. King
Street, in Lancaster, Pennsylvania by 2 Lancaster County restaurateurs. This plan was developed

OEN OP-ED ARTICLE Page No. 75 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

in conjunction with the Comprehensive Economic Development Plan for the Revitalization of
Downtown Lancaster and the Downtown Lancaster Convention Center for the former Watt &
Shand building.

In 1998 APPEALANT STAN J. CATERBONE, PRO SE administered the charity giving of


Toms Project Hope, a non-profit organization promoting education and awareness for mental
illness and suicide prevention. We had provided funding for the Mental Health Alliance of Lancaster
County, Contact Lancaster (The 24/7 Suicide Prevention Hotline), The Schreiber Pediatric Center,
and other charitable organizations and faith based charities. The video "Numbers Don't Lie" have
been distributed to schools, non profit organizations, faith based initiatives, and municipalities to
provide educational support for the prevention of suicide and to bring awareness to mental illness
problems.

In 1996 Advanced Media Group had done consulting for companies under KAL, Inc., during the
time that APPEALANT STAN J. CATERBONE, PRO SE was controller of Pflumm
Contractors, Inc., Advanced Media Group was retained by Gallo Rosso Restaurant and Bar to
computerized their accounting and records management from top to bottom. APPEALANT
STAN J. CATERBONE, PRO SE had also provided consulting for the computerization of
accounting and payroll for Lancaster Container, Inc., of Washington Boro. APPEALANT STAN
J. CATERBONE, PRO SE was retained to evaluate and develop an action plan to migrate the
Information Technologies of the Jay Group, formally of Ronks, PA, now relocated to a new $26
Million Dollar headquarters located in West Hempfield Township of Lancaster County. The Jay
Group had been using IBM mainframe technologies hosted by the AS 400 computer and server.
APPEALANT STAN J. CATERBONE, PRO SE was consulting on the merits of migrating to a
PC based real time networking system throughout the entire organization. Currently the Jay
Group employees some 500 employees with revenues in excess of $50 Million Dollars per year.

In 1993 to 1998 APPEALANT STAN J. CATERBONE, PRO SE was retained by Pflumm


Contractors, Inc., as controller, in efforts to stave off a potential bankruptcy. APPEALANT STAN
J. CATERBONE, PRO SE was responsible for implementing computerized accounting,
implementing Management Information Systems, accounting and contract policies and
procedures, human resource policies and procedures, marketing strategies and programs,
performance measurement reporting, and administrative and office procedures and logistics.
Within 3 years, the company realized an increase in profits of 3 to 4 times its previous years, and
recorded record revenues.

In 1991 Advanced Media Group was elected to People to People International and the Citizen
Ambassador Program, which was founded by President Dwight D. Eisenhower in 1956. The
program was founded to To give specialists from throughout the world greater opportunities to
work together and effectively communicate with peers, The Citizen Ambassador program
administers face-to-face scientific, technical, and professional exchanges throughout the world. In
1961, under President John F. Kennedy, the State Department established a non-profit private
foundation to administer the program. We were scheduled to tour the Soviet Union and Eastern
Europe to discuss printing and publishing technologies with scientists and technicians around the
world.

In 1990 Advanced Media Group had worked on a project to develop voice recognition systems
for the governments technology think tank - NIST (National Institute for Standards & Technology)
and the Defense Advanced Research Project Agency, or DARPA of the Department of Defense .
APPEALANT STAN J. CATERBONE, PRO SE co-authored the article Escaping the Unix Tar
Pit with a scientist from NIST that was published in the magazine DISC, then one of the leading
publications for the CD-ROM industry. Today, most all call centers deploy that technology
whenever you call an 800 number, and voice recognition is prevalent in all types of applications
involving telecommunications.

OEN OP-ED ARTICLE Page No. 76 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

In 1989 APPEALANT STAN J. CATERBONE, PRO SE founded Advanced Media Group,


Ltd., and was one of only 5 or 6 U.S. domestic companies that had the capability to manufacture
CD-ROM's, which at the time was a new and advanced technology in its early stages of being
commercialized from research and development. We did business with commercial companies,
government agencies, educational institutions, and foreign companies. APPEALANT STAN J.
CATERBONE, PRO SE performed services and contracts or prepared proposals for a host of
domestic and foreign companies including but not limited to: for the Department of Defense,
NASA, National Institution of Standards & Technology (NIST), Department of Defense, The
Defense Advanced Research Projects Agency (DARPA), and the Defense Mapping Agency, Central
Intelligence Agency, (CIA), IBM, Microsoft, AMP, Commodore Computers, American Bankers Bond
Buyers, the Library of Congress, Exxon, Tandy Computers/Radio Shack, and a host of others.
APPEALANT STAN J. CATERBONE, PRO SE also was working with R.R, Donnelly's Geo
Systems, which was developing various interactive mapping technologies, which is now Map
Quest. Map Quest is the premier provider of mapping software and applications for the internet
and is often used in delivering maps and directions for Fortune 500 companies. We had arranged
for High Industries to sell American Helix, the manufacturer of compact discs, to R.R. Donnelly &
Sons of Chicago, Illinois. American Helix was later sold to KAO Industries. We were also the
exclusive marketing agent and partner with a Boston, Massachusetts software engineer in the
selling of a software developed to diagnose and test CD-ROM drives called CD-Diagnostics. The
program was sold to both domestic and foreign companies and was then under review for
company-wide distribution by Microsoft Corporation.

In 1987 Power Station Studios of New York retained my services as executive producer
of a motion picture project. The theatrical and video release was to be delivered in a digital
format; the first of its kind. We had originated the marketing for the technology, and created the
concept for the Power Station Digital Movie System (PSDMS), which would follow the copyright
and marketing formula of the DOLBY technology trademark. We had also created and developed
marketing and patent research for the development and commercialization of equipment that we
intended to manufacture and market to the recording industry featuring the digital technology.
Sidel, Gonda, Goldhammer, and Abbot, P.C. of Philadelphia was the lead patent law firm that We
had retained for the project. Power Station Studios was the brainchild of Tony Bongiovi, a leading
engineering genius discovered by Motown when he was 15. Tony and Power Station Studios was
one of the leading recording studios in the country, and were responsible for developing Bon Jovi,
a cousin. Power Station Studios clients included; Bruce Springsteen, Diana Ross, Cyndi Lauper,
Talking Heads, Madonna, The Ramones, Steve Winwood, and many others. Tony and Power
Station Studios had produced the original Sound Track for the original Star Wars motion picture.
It was released for distribution and was the number one Sound Track recording of its time. Tony
Bongiovi was also active in working and researching different aerospace technologies. * We had
developed and authored a Joint Venture Proposal for SONY to partner with us in delivering the
Digital Movie and its related technologies to the marketplace. The venture was to include the
commercialization of technologies, which Tony Bongiovi had developed for the recording industry
simultaneously with the release of the Digital Movie. APPEALANT STAN J. CATERBONE,
PRO SE also created the concept for the PSDMS trademark, which was to be the Trademark logo
for the technology, similar to the DOLBY sound systems trademark. The acronyms stand for the
Power Station Digital Movie System. Today, DVD is the mainstay for delivering digital movies on a
portable medium, a compact disc.

In 1987 APPEALANT STAN J. CATERBONE, PRO SE had a created and developed FMG
Mortgage Banking, a company that was funded by a major banking firm in Houston Texas. We had
the capability to finance projects from $3 to $100 million dollars. Our terms and rates were so
attractive that we had quickly received solicitations from developers across the country. We were
also very attractive to companies that wanted to raise capital that include both debt and equity.
Through my company, FMG, we could raise equity funding through private placements, and debt
funding through FMG Mortgage Banking. We were retained by Gamillion Studios of Hollywood,
California to secure financing of their post production Film Studio that was looking to relocate to
North Carolina. We had secured refinancing packages for Norris Boyd of and the Olde Hickory and

OEN OP-ED ARTICLE Page No. 77 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

were in the midst of replacing the current loan that was with Commonwealth National Bank. We
were quickly seeking commitments for real estate

deals from New York to California. We also had a number of other prominent local developers
seeking our competitive funding, including Owen Kugal, High Industries, and the Marty Sponougle
a partner of The Fisher Group (owner of the Rt. 30 Outlets), and Drew Anthon of Eden Resort Inn.
We were constantly told that our financing packages were more competitive than local institutions.

In 1986 APPEALANT STAN J. CATERBONE, PRO SE had founded Financial Management


Group, Ltd (FMG) and served as Executive Vice President and President of FMG Advisory, Ltd., the
investment advisory subsidiary. FMG was a large financial services organization comprised of a
variety of professionals operating in one location. We had developed a stock purchase program for
where everyone had the opportunity for equity ownership in the new firm. FMG had financial
planners, investment managers, accountants, attorneys, realtors, liability insurance services, tax
preparers, and estate planners operating out of our corporate headquarters in Lancaster. In one
year, we had 24 people on staff, had approximately 12 offices in Pennsylvania, and several
satellite offices in other states. We had in excess of $50 million under management, and our
advisors were generating almost $4 million of commissions per year, which did not include the
fees from the other professionals. We had acquired an interest in our own Broker Dealer firm and
were valued at about $3 to $4 million in 1987.

In 1985 APPEALANT STAN J. CATERBONE, PRO SE developed the Easter Regional Free
Agent Camp, the first Free Agent Camp for the Professional Football industry; which was
videotaped for distribution to the teams scouting departments. (See Washington Post page
article of March 24, 1985) Current camps were dependent on the team scouts to travel from state
to state looking for recruits. We had developed a strategy of video taping the camp and the
distributing a copy, free of charge to the teams, to all of the scouting departments for teams in all
three leagues FL, CFL and WFL. My brother was signed at that camp by the Ottawa Roughriders of
the CFL., and went on to be a leading receiver while J.C. Watts was one of the leagues most
prominent quarterbacks. My brother also played 2 years with the MiamAPPEALANT STAN J.
CATERBONE, PRO SE Dolphins while Dan Marino was starting quarterback. We were a Certified
Agent for the National Football League Players Association. Gene Upshaw, the President of the
NFLPA had given me some helpful hints for my camp, while we were at a Conference for agents of
the NFL. The Washington Post wrote a full-page article about our camp and associated it with
other camps that were questionable about their practices. Actually, that was the very reason for
our camp. We had attended many other camps around the country that were not very well
organized and attracted few if any scouts. We had about 60 participants, with one player coming
from as far away as Hawaii. We held the camp at Lancaster Catholic, with a professional
production company filming the entire camp, while APPEALANT STAN J. CATERBONE, PRO
SE did the editing and produced the video. The well respected and widely acclaimed professional
football scout, Gil Brandt, of the Dallas Cowboys, had given me support for my camp during some
conversations We had with him and said he looked forward to reviewing the tapes for any hopeful
recruits.

In 1985 APPEALANT STAN J. CATERBONE, PRO SE was elected Vice President of the
Central Pennsylvania Chapter of the International Association of Financial Planners, and helped
build that chapter by increasing membership 3to 4 times. We had personally retained the
nationally acclaimed and nationally syndicated Financial Planner, Ms. Alexandria Armstrong of
Washington D.C.; to host a major fundraiser. More than 150 professionals attended the dinner
event that was held at the Eden Resort & Conference Center. Ms. Armstrong discussed financial
planning and how all of the professions needed to work together in order to be most effective for
their clients. We attracted a wide variety of professionals including; brokers, lawyers, accountants,
realtors, tax specialists, estate planners, bankers, and investment advisors. Today, it has become
evident that financial planning was the way of the future. In 1986 executives approached us from
Blue Ball National Bank to help them develop a Financial Planning department within their bank.

OEN OP-ED ARTICLE Page No. 78 of 79 Thursday September 14, 2017


by Stan J. Caterbone, Pro Se and The ADVANCED MEDIA GROUP Copyright 2017

From 1982 to 1985 APPEALANT STAN J. CATERBONE, PRO SE was a financial planner
for IDS/American Express and licensed in both securities and insurances.

From 1977 to 1981 APPEALANT STAN J. CATERBONE, PRO SE operated SJ Caterbone


Painting and Renovating and was was a contractor responsible for painting and renovating
residential, commercial and residential properties and facilities in Lancaster County.

From 1976 to 1980 APPEALANT STAN J. CATERBONE, PRO SE attended and


graduated from Millersville University of Millersville, Pennsylvania.

In 2009 Stan J. Caterbone applied for Social Security Disability Benefits


for Symptoms and Illnesses Related to U.S. Sponsored Mind Control
SEPTEMBER 14, 2017
and was AWARDED Monthly Benefits of $1,358.00 in August of 2009
and was DECLARED DISABLED in December 2005 - THE MONTH SYNTHETIC
TELEPETHY went 24/7 Non Stop, To This Day.

Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our right to continue our pursuit of justice. Advanced Media Group is also a member
of the media. Unfortunately due to the hacking of our electronic and digital footprints, we no longer have
access to our email contact list to make deletions. How long can Lancaster County and Lancaster City
Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture from U.S. Sponsored Mind
Control and the OBSTRUCTION OF JUSTICE from the COINTELPRO PROGRAM)?

ACTIVE COURT CASES


J.C. No. 03-16-90005 Office of the Circuit Executive, United States Third Circuit Court of
Appeals - COMPLAINT OF JUDICIALMISCONDUCT OR DISABILITY re 15-3400 and 16-1149;
03-16-900046 re ALL FEDERAL LITIGATION TO DATE
U.S. Supreme Court Case No. 16-6822 PETITION FOR WRIT OF CERTIORARI re Case No.
16-1149 MOVANT for Lisa Michelle Lambert
U.S.C.A. Third Circuit Court of Appeals Case No. 16-1149 MOVANT for Lisa Michelle
Lambert;15-3400 MOVANT for Lisa Michelle Lambert;; 16-1001; 07-4474
U.S. District Court Eastern District of PA Case No. 17-CV-4000 New Habeus Corpus
U.S. District Court Eastern District of PA Case No. 16-4014 CATERBONE v. United States,
et.al.; Case No. 16-cv-49; 15-03984; 14-02559 MOVANT for Lisa Michelle Lambert; 05-2288;
06-4650, 08-02982;
U.S. District Court Middle District of PA Case No. 16-cv-1751 PETITION FOR HABEUS
CORPUS
Commonwealth of Pennsylvania Judicial Conduct Board Case No. 2016-462 Complaint
against Lancaster County Court of Common Pleas Judge Leonard Brown III
Pennsylvania Supreme Court Case No. 353 MT 2016; 354 MT 2016; 108 MM 2016 Amicus for
Kathleen Kane
Superior Court of Pennsylvania Summary Appeal Case No. CP-36-SA-0000219-2016, AMICUS
for Kathleen Kane Case No. 1164 EDA 2016; Case No. 1561 MDA 2015; 1519 MDA 2015; 16-
1219 Preliminary Injunction Case of 2016
Lancaster County Court of Common Pleas Case No. 08-13373; 15-10167; 06-03349, CI-06-
03401
U.S. Bankruptcy Court for The Eastern District of Pennsylvania Case No. 17-16204 NEW
CHAPTER 11 REORGANIZATION BANKRUPTCY CASE
U.S. Bankruptcy Court for The Eastern District of Pennsylvania Case No. 17-10615; Case No.
16-10157

OEN OP-ED ARTICLE Page No. 79 of 79 Thursday September 14, 2017

You might also like