Professional Documents
Culture Documents
Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &
Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-528-2200
Joshua D. Lock
GoldbergKatzman, ATTORNEYS AT LAW
4250 Crump Mill Road
Suite 301
Harrisburg, PA 17112
(717) 234-4161
(717) 234-6808 fax
www.goldbergkatzman.com
Re: THE DEFENSE OF THE HONORABLE MS. KATHLEEN KANE, Case No. 3575 EDA 2016
DRAFT - Case No. 17-cv-867-EGS Preliminary Injunction for Emergency Relief
MOTION FOR RECONSIDERATION OF ORDER AND MEMORANDUM DATED MARCH
28, 2017 - April 5, 2017
Dear Joshua,
I hope all is well with Ms. Kane and her family. Please find the attached filing that may be
of some interest to her defense.
In addition there is a book titled Bush's Brain, which is a book about the man thought by
some to be the most influential to former President George W. Bush Mr. Karl Rove. In the book,
the author outlines tactics that were and still are used against me; the changing of documents,
the planting of documents, the deletion of electronic files, etc., I thought you should know this
because there was one instance when the searched Ms. Kane's office and I thought something like
the mentioned may have happened.
Respectfully,
___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP
Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-528-2200
Notice and Disclaimer: Stan J. Caterbone and the Advanced Media Group have been slandered, defamed, and
publicly discredited since 1987 due to going public (Whistle Blower) with allegations of misconduct and fraud
within International Signal & Control, Plc. of Lancaster, Pa. (ISC pleaded guilty to selling arms to Iraq via
South Africa and a $1 Billion Fraud in 1992). Unfortunately we are forced to defend our reputation and the
truth without the aid of law enforcement and the media, which would normally prosecute and expose public
corruption. We utilize our communications to thwart further libelous and malicious attacks on our person, our
property, and our business. We continue our fight for justice through the Courts, and some communications
are a means of protecting our rights to continue our pursuit of justice. Advanced Media Group is also a
member of the media. Reply if you wish to be removed from our Contact List. How long can Lancaster County
and Lancaster City hide me and Continue to Cover-Up my Whistle Blowing of the ISC Scandel (And the Torture
from U.S. Sponsored Mind Control)?
ACTIVE COURT CASES
J.C. No. 03-16-90005 Office of the Circuit Executive, United States Third Circuit Court of Appeals -
COMPLAINT OF JUDICIALMISCONDUCT OR DISABILITY re 15-3400 and 16-1149; 03-16-900046 re ALL
FEDERAL LITIGATION TO DATE
U.S. Supreme Court Case No. 16-6822 PETITION FOR WRIT OF CERTIORARI re Case No. 16-1149
MOVANT for Lisa Michelle Lambert
U.S.C.A. Third Circuit Court of Appeals Case No. 16-3284; Case No. 16-1149 MOVANT for Lisa Michelle
Lambert;15-3400 MOVANT for Lisa Michelle Lambert;; 16-1001; 07-4474
U.S. District Court Eastern District of PA Case No. 17-01233 Chapter 11 Appeal for 17-10615; Case No.
17-0867 Preliminary Injunction from Middle District; Case No. 16-4014 CATERBONE v. United States,
et.al.; Case No. 16-cv-49; 15-03984; 14-02559 MOVANT for Lisa Michelle Lambert; 05-2288; 06-4650, 08-
02982;
U.S. District Court Middle District of PA Case No. 16- 2513 INJUNCTION; Case No. 16-cv-1751
PETITION FOR HABEUS CORPUS
Commonwealth of Pennsylvania Judicial Conduct Board Case No. 2016-462 Complaint against
Lancaster County Court of Common Pleas Judge Leonard Brown III
Pennsylvania Supreme Court Case No. 353 MT 2016; 354 MT 2016; 108 MM 2016 Amicus for Kathleen Kane
Superior Court of Pennsylvania 3575 EDA 2016 Amicus for Kathleen Kane; Summary Appeal Case No.
CP-36-SA-0000219-2016, AMICUS for Kathleen Kane Case No. 1164 EDA 2016; Case No. 1561 MDA 2015;
1519 MDA 2015; 16-1219 Preliminary Injunction Case of 2016
Lancaster County Court of Common Pleas Case No. 16-05815 Injunction; Case No. 16-08472 INJUNCTION re
Pain Meds; Case No. 15-10167 Film Commission; Case No. 08-13373; 15-10167; 06-03349, CI-06-03401
U.S. Bankruptcy Court for The Eastern District of Pennsylvania Case No. 17-10615; Case No. 16-10157
THIS PAGE INTENTIONALLY LEFT BLANK
Stan J. Caterbone
ADVANCED MEDIA GROUP
Freedom From Covert Harassment &
Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-528-2200
DEFENDANTS :
___________________________________________________________________________________________________________
I Stanley J. Caterbone, PLAINTIFF, and appearing Pro Se, do hereby on this 7 th day of April,
2017 file a MOTION FOR RECONSIDERATION OF ORDER AND MEMORANDUM DATED
MARCH 28, 2017.
THE ORDER OF MARCH 28, 2017 BY THE HONORABLE EDWARD G. SMITH MUST BE
REVERSED AND INJUNCTIVE RELIEF GRANTED.
___________/S/____________
Stan J. Caterbone, Pro Se Litigant
ADVANCED MEDIA GROUP
Freedom From Covert Harassment & Surveillance,
Registered in Pennsylvania
1250 Fremont Street
Lancaster, PA 17603
www.amgglobalentetainmentgroup.com
stancaterbone@gmail.com
717-528-2200
The pro se plaintiff, a purprorted telepath, has commenced a civil rights action
various federal, state, and local authorities based primarily on allegation that the
government has been reading and controlling his mind for three decades. Due to the
plaintiff's prior, unsuccessful (a term he disputes) attempts to assert these precise
claims in this district, he originally filed this case in the MIDDLE District of Pennsylvania
hoping that the court would accept venue over this case. Although the Middle District of
Pennsylvania granted the plaintiff's request to proceed in forma pauperis, the court
unsurprisingly transferred the case here because of improper venue. Page 41
The court is internationally and maliciously confusing 2 cases that were filed in
the Eastern District of Pennsylvania, and under the authority of Judge Edward Smith; in
order to remove FINANCIAL AND CRIMINAL LIABILITY from a host of DEFENDANTS and
claims dating back to 1987.
First and foremost the question how how Judge Edward Smith was selected to hear any
case of Stanley J. Caterbone, Pro Se, must be reviewed for the sole purpose of determining why
the CLERK OF COURTS named a Judge in Easton, THE HONORABLE EDWARD SMITH,
Pennsylvania, rather than the original Judge Assigned,Judge Anita Brody as was done on April 14,
2016 in U.S. District Court for the Eastern District of Pennsylvania Case No. 16-mc-00049. The
docket entry reads
ORDER THAT THIS CASE BE REASSIGNED FROM HONORABLE ANITA B. BRODY TO
HONORABLE EDWARD G. SMITH FOR ALL FUTHER PROCEEDINGS. SIGNED BY MICHAEL
E. KUNZ, CLERK OF COURT ON 04/14/2016. 04/14/2016 ENTERED AND COPIES
MAILED TO PRO SE. (sg, ) (Entered: 04/14/2016) Page 66
The travel distance from Lancaster is reason enough to cause concern that the Court was
attempting to pose at least an inconvenience to Stanley J. Caterbone. No explanation is on the
official court record as to why the fist case was transferred to Easton, Case No. 16-mc-00049EGS.
Secondly, and most importantly, Case No. 16-2513, filed in the MIDDLE District of
Pennsylvania, in Harrisburg is a PRELIMINARY INJUNCTION FOR EMERGENCY RELIEF and has
nothing to do with a civil rights action various federal, state, and local authorities based
primarily on allegation that the government has been reading and controlling his mind
for three decades. Page 41
Case No. 16-2513 is, again, a PRELIMINARY INJUNCTION FOR EMERGENCY RELIEF, filed
to thwart the criminal and civil attempts at obstructing justice in order to keep Stanley J.
17-0867 MOTION FOR RECONSIDERATION Page 3 of 106 Friday April 7, 2017
Caterbone from continuing the cases outlined in the U.S. Third Circuit Court of Appeals ORDER
AND MEMORANDUM, Cases No. 07-4474 and 07-4474, which Stanley J. Caterbone was successful
in his appeal of dismissals by Judge Mary McLaughlin, which the U.S. Third Circuit Court of
Appeals ORDERED the cases to continue litigation. The lower court cases, as well as other civil
rights cases were successfully granted MOTIONS TO WITHDRAW WITHOUT PREJUCICE, thus
protecting Stanley J. Caterbone's claims.
On January 31, 2017 in Case No. 1:16-cv-2513 on page one of The ORDER by MIDDLE
DISTRICT JUDGE YVETTE KANE Transferring this Case to EASTERN DISTRICT in Philadelphia from
the MIDDLE DISTRICT in HARRISBURG, The HONORALBE YVETTE KANE WRITES:
The EXHIBT in the above complaint seeking injuctive relief is the FEDERAL
COMPLAINT AS OF THAT DATE to which the OBSTRUCTION OF JUSTICE claims are
preventing from due process of the law.
Case No. 16-4014 was the latest attempt at those same said claims, and after Stanley J.
Caterbone filed another 'MOTION TO WITHDRAW WITHOUT PREJUDICE, your Honor dismissed the
case on August 8, 2016 as follows:
AND NOW, on this 21st day of December 2016, the PLAINTIFF, Stanley J.
Caterbone/Advanced Media Group, do hereby file this PRELIMINARY INJUNCTION FOR
EMERGENCY RELIEF pursuant to the following Federal Statute:
(C) hinder, delay, or prevent the communication to a law enforcement officer or judge of
the United States of information relating to the commission or possible commission of a Federal
offense or a violation of conditions of probation, supervised release, parole, or release pending
judicial proceedings; shall be punished as provided in paragraph (3).
(3) The punishment for an offense under this subsection is
(A) in the case of a killing, the punishment provided in sections 1111 and 1112;
(B) in the case of
(i) an attempt to murder; or
(ii) the use or attempted use of physical force against any person;
imprisonment for not more than 30 years; and
(C) in the case of the threat of use of physical force against any person, imprisonment for
not more than 20 years.
(b) Whoever knowingly uses intimidation, threatens, or corruptly persuades another person, or
attempts to do so, or engages in misleading conduct toward another person, with intent to
(1) influence, delay, or prevent the testimony of any person in an official proceeding;
(2) cause or induce any person to
(A) withhold testimony, or withhold a record, document, or other object, from an official
proceeding;
(B) alter, destroy, mutilate, or conceal an object with intent to impair the objects integrity
or availability for use in an official proceeding;
Hostile Environment of the U.S. District Court for the Eastern District of Pennsylvania which
is being used as a means of causing severe mental anguish, pain, and suffering which is
in essence obstruction of justice in the most extreme sense
On August 5, 2016 in U.S. District Court for the Eastern District of Pennsylvania Case No.
16-cv-4014 the PETITIONER filed a Motion To Withdraw Without Prejudice that was
GRANTED by U.S. District Court Judge Edward G. Smith for the above mentioned reasons
as an INSTANT MOTION TO DISMISS. See Attached Motion and Court Docket. THE
PLAINTIFF IS ATTEMPTING TO COMPLETE THE Case No. 16-cv-4014 CATERBONE v. the
United States of America, et.al., COMPLAINT December 20, 2016. That COMPLAINT is
evidence in itself to support the PRELIMINARY INJUNCTION FOR EMERGENCY RELIEF
Costs associated with this filing are substantially lower due to the fact this court is in close
proximity; the printing costs from State Street Copy across from the Capitol Building are
substantially less; and transportation costs are substantially lower
The perpetrators of the crimes associated with this filing are attempting and in most cases
are successful in draining the PLAINTIFF'S liquid assets through an elaborate scheme of
criminal activities that have so far gone uninterrupted
The computer hackers have left the PLAINTIFF without most of his online accounts,
including PACER, which is used to file and track federal cases leaving the PLAINTIFF to
travel to the U.S. Courthouse in Philadelphia on a semi weekly basis to obtain docket
sheets for his federal cases
Attendance of any and all court related hearings, if required, would be possible in the
Middle District Court, and unimaginable in the Eastern District anticipating the perpetrators
would make it difficult, if not impossible, when resolutions are in the works; already proven
to happen on numerous occasions.
III) The PLAINTIFF'S life and property is under constant threat on a daily basis and
local, state, and federal law enforcement are complicit in every way. Complaints and
pleadings for help have fallen on deaf ears.
17-0867 MOTION FOR RECONSIDERATION Page 5 of 106 Friday April 7, 2017
IV) The PLAINTIFF is now a PETITIONER in the U.S. Supreme Court, case no. 16-6822
(The Habeus Corpus Case of Prisoner Lisa Michelle Lambert) and this filing is in support
of litigating that case without undoinfluence, threats, and the destruction of the
PLAINTIFF'S office electronics required to continue all pending and awaiting litigation.
It is wholly unfair and most likely a calculated effort to hinder and obstruct the release
of PETITIONER LISA MICHELLE LAMBERT from prison.
There are six essential prerequisites that a party must establish prior to obtaining a
Preliminary Emergency Injunction For Relief:
1. that the injunction is necessary to prevent immediate and irreparable harm that cannot be
adequately compensated by damages;
2. that greater injury would result from refusing an injunction than from granting it, and,
concomitantly, that issuance of an injunction will not substantially harm other interested
parties in the proceedings;
3. that a preliminary injunction will properly restore the parties to their status as it existed
immediately prior to the alleged wrongful conduct;
4. that the activity it seeks to restrain is actionable, that its right to relief is clear, and that the
wrong is manifest, or, in other words, that it is likely to prevail on the merits;
5. that the injunction it seeks is reasonably suited to abate the offending activity; and,
6. that a preliminary injunction will not adversely affect the public interest
The Courts must consider UNJUST ENRICHMENT in this case. (Wikipedia, The Free
Dictionary by FARLEX) - A general equitable principle that no person should be allowed to profit at
another's expense without making restitution for the reasonable value of any property, services,
or other benefits that have been unfairly received and retained. Although the unjust enrichment
doctrine is sometimes referred to as a quasi-contractual remedy, unjust enrichment is not based
on an express contract. Instead, litigants normally resort to the remedy of unjust enrichment
when they have no written or verbal contract to support their claim for relief. In such instances
litigants ask a court to find a contractual relationship that is implied in law, a fictitious relationship
created by courts to do justice in a particular case.
The PLAINTIFF seeks a temporary injunction until a permanent resolution to ALL ISSUES
CONTAINED HEREIN are constructed and resolved in the myriad of civil actions pending before the
courts and those actions withdrawn without prejudice awaiting resolutions.
IRREPRABLE HARM
The irreparable harm and injure that has resulted from the above circumstances includes
but is not limited to the following:
In July of 2005 at a military museum (Open to the Public) on a military base I was
detained and interrogated by two (2) Defense Intelligence Agents, or DIA of the Department of
Defense in Austin, Texas for about 1 hours for no probable cause. I was asked the same
questions as above and was not allowed to leave until the agents verified that I was staying with
my brother, Dr. Phillip Caterbone, who at the time resided in Austin, Texas. I was commanded not
to ever enter a military base again.
Essentially, a targeted individual has officially been declared an "enemy of the State". Your
unrelenting harassment has now entered an entirely new phase. From what was once State and
most likely federal law enforcement surveillance (for whatever reason) has now graduated to a
little-known CIA / U.S. military psychological harassment & physical torture campaign that is so
extensive and seemingly so absurd to the average American citizen, you will almost certainly be
labeled as having a mental illness and/or paranoia just for simply describing what has now
become your daily reality. The only other people that truly understand the extent of the
harassment & torture are fellow targeted individuals who have also been experiencing similar
violations of their civil, constitutional and basic human rights.
So, besides an absolute abomination of a targeted individuals right to privacy, what other
tactics are being deployed against a targeted individual. The hardest to prove and the most
criminal tactic used (especially when a target has 3 young & developing children in the home such
as myself) is a continuous poisoning and torture of the target by invisible directed electromagnetic
radiation. If this is a new topic to you, it may be unclear exactly what electromagnetic radiation
(EMR) is. After all, it's not exactly the kind of topic an average American is thinking about. Well, to
name a few examples, electromagnetic radiation ranges from radio frequency waves (RF) to the
more destructive & potentially deadly ionizing forms of x-rays and gamma rays. In the lower to
mid spectrum there are also radar waves, microwaves, ultraviolet and infrared light waves.
What I noticed when this harassment campaign began for myself toward the end of 2005
was the continuous jet plane(s) that suddenly began flying "holding patterns" for extended
periods of time above & around my home. My theory is that these planes are equipped with
sophisticated radar imaging technology. Possibly very high powered infrared imaging cameras as
well. Rather than using these electromagnetic radiation devices to "search" for something, in the
case of a targeted individual these devices are used to slowly poison and "overload" the targeted
individual with continuous high doses of directed electromagnetic radiation. Once a targeted
individuals body has been properly overexposed over a period of time (months), other portable
devices may then be used to keep a target in a constant state of agitation and dis-ease. And for
the more fragile among us, maybe even death! This tactic can be the premier form of making a
target seem crazy by forcing them to report what appear to be insane accusations against
neighbors, the people "following them everywhere", planes over their home and the government.
Another obvious reason for deploying this invisible & silent torture tactic is to provoke a targeted
individual to lash out in sheer frustration and anger against the closest person (who most likely
has absolutely nothing to do with the ongoing abuse). Essentially, this is the ultimate version of
entrapment. And may even be the ultimate, basically unprovable form of a state-sanctioned
murder!
COINTELPRO
COINTELPRO (a portmanteau derived from COunter INTELligence PROgram) was a series of
covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of
Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting domestic political
organizations.[3]
FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents
to "expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate" the activities of these
movements and especially their leaders.[5][6] Under Hoover, the agent in charge of COINTELPRO
was William C. Sullivan.[7] Attorney General Robert F. Kennedy personally authorized some of
these programs.[8] Although Kennedy only gave written approval for limited wiretapping of King's
phones "on a trial basis, for a month or so",[9] Hoover extended the clearance so his men were
"unshackled" to look for evidence in any areas of King's life they deemed worthy.[10]
After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a
major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:
In the light of King's powerful demagogic speech. ... We must mark him now, if we have
not done so before, as the most dangerous Negro of the future in this nation from the standpoint
of communism, the Negro, and national security.[16]
Soon after, the FBI was systematically bugging King's home and his hotel rooms, as they
now were aware that King was growing in stature daily as the leader among leaders of the Negro
movement.[17]
In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention
to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most
"notorious liar" in the United States.[18] In his 1991 memoir, Washington Post journalist Carl
Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to
commit suicide.[19] Historian Taylor Branch documents an anonymous November 21, 1964
"suicide package" sent by the FBI that contained audio recordings of King's sexual indiscretions
combined with a letter telling him "There is only one way out for you. You better take it before
your filthy, abnormal, fraudulent self is bared to the nation." And even by 1969, as has been
noted elsewhere, "[FBI] efforts to 'expose' Martin Luther King, Jr. had not slackened even though
King had been dead for a year. [The Bureau] furnished ammunition to conservatives to attack
King's memory, and...tried to block efforts to honor the slain leader." [20]
During the same period the program also targeted Malcolm X. While an FBI spokesman has
denied that the FBI was "directly" involved in Malcolm's murder, it is documented that the Bureau
worked to "widen the rift" between Malcolm and Elijah Muhammad through infiltration and the
"sparking of acrimonious debates within the organization," rumor-mongering, and other tactics
designed to foster internal disputes; which ultimately led to Malcolm's assassination.[21][22] The
FBI heavily infiltrated Malcolm's Organization of Afro-American Unity in the final months of
his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most
Amidst the urban unrest of JulyAugust 1967, the FBI began "COINTELPROBLACK HATE",
which focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee
(SNCC), the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice,
Congress of Racial Equality (CORE), and the Nation of Islam.[25] BLACK HATE established the
Ghetto Informant Program and instructed 23 FBI offices to "disrupt, misdirect, discredit, or
otherwise neutralize the activities of black nationalist hate type organizations".[26]
A March 1968 memo stated the program's goal was to "prevent the coalition of militant
black nationalist groups" ; to "Prevent the RISE OF A 'MESSIAH' who could unify...the militant
black nationalist movement" ; "to pinpoint potential troublemakers and neutralize them before
they exercise their potential for violence [against authorities]." ; to "Prevent militant black
nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to...both the
responsible community and to liberals who have vestiges of sympathy..."; and to "prevent the
long-range GROWTH of militant black organizations, especially among youth." Dr. King was said to
have potential to be the "messiah" figure, should he abandon nonviolence and integrationism;[27]
Stokely Carmichael was noted to have "the necessary charisma to be a real threat in this way;" as
he was seen as someone who espoused a much more militant vision of "black power."[28]
This program coincided with a broader federal effort to prepare military responses for
urban riots, and began increased collaboration between the FBI, Central Intelligence Agency,
National Security Agency, and the Department of Defense. The CIA launched its own domestic
espionage project in 1967 called Operation CHAOS.[29] A particular target was the Poor People's
Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI
monitored and disrupted the campaign on a national level, while using targeted smear tactics
locally to undermine support for the march.[30]
Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party
(1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the
entire New Left social/political movement, which included antiwar, community, and religious
groups (1968). A later investigation by the Senate's Church Committee (see below) stated that
"COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting
the Government's power to proceed overtly against dissident groups ..."[31] Official congressional
committees and several court cases[32] have concluded that COINTELPRO operations against
communist and socialist groups exceeded statutory limits on FBI activity and violated
constitutional guarantees of freedom of speech and association.[1]
The building broken into by the Citizen's Commission to Investigate the FBI, at One
Veterans Square, Media, Pennsylvania
The program was successfully kept secret until 1971, when the Citizens' Commission to
Investigate the FBI burgled an FBI field office in Media, Pennsylvania, took several dossiers, and
exposed the program by passing this material to news agencies.[33] Many news organizations
initially refused to publish the information. Within the year, Director J. Edgar Hoover declared that
the centralized COINTELPRO was over, and that all future counterintelligence operations would be
handled on a case-by-case basis.[34][35]
The Final Report of the Select Committee castigated conduct of the intelligence community
in its domestic operations (including COINTELPRO) in no uncertain terms:
The Committee finds that the domestic activities of the intelligence community at times
violated specific statutory prohibitions and infringed the constitutional rights of American citizens.
The legal questions involved in intelligence programs were often not considered. On other
occasions, they were intentionally disregarded in the belief that because the programs served the
"national security" the law did not apply. While intelligence officers on occasion failed to disclose to
their superiors programs which were illegal or of questionable legality, the Committee finds that
the most serious breaches of duty were those of senior officials, who were responsible for
controlling intelligence activities and generally failed to assure compliance with the law.[1] Many
of the techniques used would be intolerable in a democratic society even if all of the targets had
been involved in violent activity, but COINTELPRO went far beyond that ... the Bureau conducted a
sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment
rights of speech and association, on the theory that preventing the growth of dangerous groups
and the propagation of dangerous ideas would protect the national security and deter violence.
[31]
Range of targets
At its inception, the program's main target was the Communist Party.[36] According to the Church
Committee:
While the declared purposes of these programs were to protect the "national security" or
prevent violence, Bureau witnesses admit that many of the targets were nonviolent and
most had no connections with a foreign power. Indeed, nonviolent organizations and
individuals were targeted because the Bureau believed they represented a "potential" for
violenceand nonviolent citizens who were against the war in Vietnam were targeted
because they gave "aid and comfort" to violent demonstrators by lending respectability to
their cause.
The imprecision of the targeting is demonstrated by the inability of the Bureau to define
the subjects of the programs. The Black Nationalist program, according to its supervisor,
included "a great number of organizations that you might not today characterize as black
nationalist but which were in fact primarily black." Thus, the nonviolent Southern Christian
Leadership Conference was labeled as a Black Nationalist-"Hate Group."
Furthermore, the actual targets were chosen from a far broader group than the titles of the
programs would imply. The CPUSA program targeted not only Communist Party members
but also sponsors of the National Committee to Abolish the House Un-American Activities
Committee and civil rights leaders allegedly under Communist influence or deemed to be
not sufficiently "anti-Communist". The Socialist Workers Party program included non-SWP
sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young
Socialist Alliance, its youth group. The Black Nationalist program targeted a range of
organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership
Conference, and included every Black Student Union and many other black student groups.
New Left targets ranged from the SDS to the InterUniversity Committee for Debate on
Foreign Policy, from Antioch College ("vanguard of the New Left") to the New Mexico Free
University and other "alternate" schools, and from underground newspapers to students'
protesting university censorship of a student publication by carrying signs with four-letter
words on them.
President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams
to the White House opposing his "national defense" policy and supporting Col. Charles
Lindbergh.
President Truman received inside information on a former Roosevelt aide's efforts to
influence his appointments, labor union negotiating plans, and the publishing plans of
journalists.
President Eisenhower received reports on purely political and social contacts with foreign
officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O.
Douglas.
The Kennedy administration had the FBI wiretap a congressional staff member, three
executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F.
Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic
listening device targeting a congressman, both of which yielded information of a political
nature.
President Johnson asked the FBI to conduct "name checks" of his critics and members of
the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political
intelligence on his critics in the Senate, and received extensive intelligence reports on
political activity at the 1964 Democratic Convention from FBI electronic surveillance.
President Nixon authorized a program of wiretaps which produced for the White House
purely political or personal information unrelated to national security, including information
about a Supreme Court Justice.
almost all groups protesting the Vietnam War, as well as individual student demonstrators
with no group affiliation
The COINTELPRO documents show numerous cases of the FBI's intentions to prevent and
disrupt protests against the Vietnam War. Many techniques were used to accomplish this task.
"These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and
pushing violent confrontations as an alternative to massive, peaceful demonstrations." One 1966
COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support
for the antiwar movement.[39]
Methods
Body of Fred Hampton, national spokesman for the Black Panther Party, who was
murdered[40][41] by members of the Chicago Police Department, as part of a
COINTELPRO operation.[42][43]
According to attorney Brian Glick in his book War at Home, the FBI used four main methods
during COINTELPRO:
1. Infiltration: Agents and informers did not merely spy on political activists. Their main
purpose was to discredit and disrupt. Their very presence served to undermine trust and
scare off potential supporters. The FBI and police exploited this fear to smear genuine
activists as agents.
2. Psychological warfare: The FBI and police used myriad "dirty tricks" to undermine
progressive movements. They planted false media stories and published bogus leaflets and
other publications in the name of targeted groups. They forged correspondence, sent
anonymous letters, and made anonymous telephone calls. They spread misinformation
about meetings and events, set up pseudo movement groups run by government agents,
and manipulated or strong-armed parents, employers, landlords, school officials and others
to cause trouble for activists. They used bad-jacketing to create suspicion about targeted
activists, sometimes with lethal consequences.[44]
3. Harassment via the legal system: The FBI and police abused the legal system to harass
dissidents and make them appear to be criminals. Officers of the law gave perjured
testimony and presented fabricated evidence as a pretext for false arrests and wrongful
imprisonment. They discriminatorily enforced tax laws and other government regulations
and used conspicuous surveillance, "investigative" interviews, and grand jury subpoenas in
an effort to intimidate activists and silence their supporters.[42][45]
4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to
conduct illegal break-ins in order to search dissident homes; and to commit vandalism,
assaults, beatings and assassinations.[42] The object was to frighten or eliminate
dissidents and disrupt their movements.
The FBI specifically developed tactics intended to heighten tension and hostility between
various factions in the black militancy movement, for example between the Black Panthers, the US
Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were
San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[42]
Dhoruba Bin Wahad a former Black Panther, reflects on how these tactics made him feel,
saying he had a combat mentality and felt like he was at war with the government. When asked
about why he thinks the Black Panthers were targeted he said, "In the United States, the
equivalent of the military was the local police. During the early sixties, at the height of the Civil
Rights Movement, and the human rights movement, the police in the United States became
increasingly militaristic. They began to train out of military bases in the United States. The Law
Enforcement Assistance Act (LEAA) supplied local police with military technology, everything from
assault rifles to army personnel carriers. In his opinion, the Counterintelligence Program went
hand-in-hand with the militarization of the police in the Black community, with the militarization of
police in America."[46]
In order to eliminate black militant leaders whom they considered dangerous, the FBI is
believed to have worked with local police departments to target specific individuals,[48] accuse
them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.
Elmer "Geronimo" Pratt, a Black Panther Party leader, was incarcerated for 27 years before a
California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before
the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI
and the Los Angeles Police Department knew he had not been in the area at the time the murder
occurred.[49][50]
Some sources claim that the FBI conducted more than 200 "black bag jobs",[51][52] which
were warrantless surreptitious entries, against the targeted groups and their members.[53]
J. Edgar Hoover
In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the
Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily
engaged in feeding breakfast to children. Hoover fired back a memo implying the agent's career
goals would be directly affected by his supplying evidence to support Hoover's view that the BPP
was "a violence-prone organization seeking to overthrow the Government by revolutionary
means".[54]
Hoover supported using false claims to attack his political enemies. In one memo he wrote:
"Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist
to substantiate the charge."[55]
In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was
murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that
her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an
acknowledged FBI informant.[56][57] The FBI spread rumors that Liuzzo was a member of the
Communist Party and had abandoned her children to have sexual relationships with African
Americans involved in the Civil Rights Movement.[58][59] FBI records show that J. Edgar Hoover
personally communicated these insinuations to President Johnson.[60][61] FBI informant Rowe
has also been implicated in some of the most violent crimes of the 1960s civil rights era, including
attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church
bombing.[56] According to Noam Chomsky, in another instance in San Diego, the FBI financed,
armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a
group called the Secret Army Organization that targeted groups, activists, and leaders involved in
the Anti-War Movement, using both intimidation and violent acts.[62][63][64]
Hoover ordered preemptive action "to pinpoint potential troublemakers and neutralize them
before they exercise their potential for violence."[5]
Illegal surveillance
Too many people have been spied upon by too many Government agencies and too much
information has been illegally collected. The Government has often undertaken the secret
surveillance of citizens on the basis of their political beliefs, even when those beliefs posed
no threat of violence or illegal acts on behalf of a hostile foreign power. The Government,
operating primarily through secret and biased informants, but also using other intrusive
techniques such as wiretaps, microphone "bugs", surreptitious mail opening, and break-ins,
17-0867 MOTION FOR RECONSIDERATION Page 15 of 106 Friday April 7, 2017
has swept in vast amounts of information about the personal lives, views, and associations
of American citizens. Investigations of groups deemed potentially dangerousand even of
groups suspected of associating with potentially dangerous organizationshave continued
for decades, despite the fact that those groups did not engage in unlawful activity.
Groups and individuals have been assaulted, repressed, harassed and disrupted because of
their political views, social beliefs and their lifestyles. Investigations have been based upon
vague standards whose breadth made excessive collection inevitable. Unsavory, harmful
and vicious tactics have been employedincluding anonymous attempts to break up
marriages, disrupt meetings, ostracize persons from their professions, and provoke target
groups into rivalries that might result in deaths. Intelligence agencies have served the
political and personal objectives of presidents and other high officials. While the agencies
often committed excesses in response to pressure from high officials in the Executive
branch and Congress, they also occasionally initiated improper activities and then
concealed them from officials whom they had a duty to inform.
The Constitutional system of checks and balances has not adequately controlled
intelligence activities. Until recently the Executive branch has neither delineated the scope
of permissible activities nor established procedures for supervising intelligence agencies.
Congress has failed to exercise sufficient oversight, seldom questioning the use to which its
appropriations were being put. Most domestic intelligence issues have not reached the
courts, and in those cases when they have reached the courts, the judiciary has been
reluctant to grapple with them.[65][66]
Post-COINTELPRO operations
While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI
actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.
[67][68][69] Documents released under the FOIA show that the FBI tracked the late David
Halberstama Pulitzer Prize-winning journalist and authorfor more than two decades.[70]
"Counterterrorism" guidelines implemented during the Reagan administration have been described
as allowing a return to COINTELPRO tactics.[71][pages needed] Some radical groups accuse
factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[72]
The IG report found these "troubling" FBI practices between 2001 and 2006. In some
cases, the FBI conducted investigations of people affiliated with activist groups for "factually
weak" reasons. Also, the FBI extended investigations of some of the groups "without adequate
basis" and improperly kept information about activist groups in its files. The IG report also found
that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the
investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.
[73]
Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics
against radical groups after the official COINTELPRO operations were ended. Several authors have
suggested the American Indian Movement (AIM) has been a target of these operations.
Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal
government intended to acquire uranium deposits on the Lakota tribe's reservation land, and that
this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.
[74][75][76][77][78] Others believe COINTELPRO continues and similar actions are being taken
against activist groups.[78][79][80] Caroline Woidat says that, with respect to Native Americans,
COINTELPRO should be understood within a historical context in which "Native Americans have
been viewed and have viewed the world themselves through the lens of conspiracy theory."[81]
Other authors argue that while some conspiracy theories related to COINTELPRO are unfounded,
17-0867 MOTION FOR RECONSIDERATION Page 16 of 106 Friday April 7, 2017
the issue of ongoing government surveillance and repression is real.[82][83]
References
"I. Introduction and Summary" (PDF). Intelligence Activities and the Rights of Americans -
Church Committee final report. United States Senate website. II. United States
Government. 1976-04-26. p. 10. Archived (PDF) from the original on 2014-04-18.
Retrieved 2014-07-15.
Wolf, Paul. "COINTELPRO: The Untold American Story". Archive.org. World Conference
Against Racism, Durbin SA.
Jalon, Allan M. (2006-03-08). "A break-in to end all break-ins; In 1971, stolen FBI files
exposed the government's domestic spying program.". Los Angeles Times. Tribune
Company. Archived from the original on 2013-12-03. Retrieved 2014-07-15.
Jeffreys-Jones, Rhodri (208). The FBI. Yale University Press. p. 189.
ISBN 9780300142846.
COINTELPRO Revisited - Spying & Disruption - IN BLACK AND WHITE: THE F.B.I. PAPERS
"A Huey P. Newton Story - Actions - COINTELPRO". PBS. Archived from the original on
2010-11-18. Retrieved 2008-06-23.
Weiner, Tim (2012). Enemies : A History of the FBI (1st ed.). New York: Random House.
ISBN 9781400067480., p. 196. "Sullivan would become Hoover's field marshal in matters
of national security, chief of FBI intelligence, and commandant of COINTELPRO. In that top
secret and tightly compartmentalized world, an FBI inside of the FBI, Sullivan served as the
executor of Hoover's most clandestine and recondite demands."
Weiner, Enemies (2012), p. 233. "RFK knew much more about this surveillance than he
ever admitted. He personally renewed his authorization for the taps on Levison's office,
and he approved Hoover's request to tap Levison's home telephone, where King called late
at night several times a week."
Herst, Burton (2007) Bobby and J. Edgar, p. 372.
Herst (2007), pp. 372374
Weiner, Enemies (2012), p. 195
Weiner, Enemies (2012), p. 198. "On October 2, 1956, Hoover stepped up the FBI's long-
standing surveillance of black civil rights activists. He sent a COINTELPRO memo to the
field, warning that the Communist Party was seeking to infiltrate the movement."
David T. Beito and Linda Royster Beito, Black Maverick: T.R.M. Howard's Fight for Civil
Rights and Economic Power (Urbana: University of Illinois Press, 2009), 148, 15459.
Weiner, Enemies (2012), p. 200.
Gage, Beverly (2014-11-11). "What an Uncensored Letter to M.L.K. Reveals". The New
York Times. Retrieved 2015-01-09.
Weiner, Enemies (2012), p. 235.
Weiner, Enemies (2012), p. 236. "The bugs got quick results. When King traveled, as he
did constantly in the ensuing weeks, to Washington, Milwaukee, Los Angeles, and Honolulu,
the Bureau planted hidden microphones in his hotel rooms. The FBI placed a total of eight
wiretaps and sixteen bugs on King."
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999), p. 524-529
Adams, Cecil M. (2003-05-02). "Was Martin Luther King, Jr. a plagiarist?". Washington
Post. Retrieved 2006-06-06.
Taylor Branch, Pillar of Fire: America in the King Years 1963-1965 (Simon & Schuster,
1999) p. 527-529
"A Short History of FBI COINTELPRO", Albion Monitor, Retrieved July 13, 2007. Archived
September 28, 2007, at the Wayback Machine.
Weiner, Enemies (2012), p. 293
The COINTELPRO Papers - Documents from the FBI's Secret Wars Against Dissent in the
United States by Ward Churchill & Jim Vander Wall. South End Press.
Intelligence Activities and the Rights of Americans, Final Report of the Senate Committee
to Study Governmental Operations with respect to Intelligence Activities
Various Church Committee reports reproduced online at ICDC: Final Report, 2A; Final
Report,2Cb; Final Report, 3A; Final Report, 3G. Various COINTELPRO documents
reproduced online at ICDC: CPUSA; SWP; Black Nationalist; White Hate; New Left; Puerto
Rico. Archived January 13, 2013, at the Wayback Machine.
Blackstock, Nelson. COINTELPRO: The FBI's Secret War on Political Freedom, Pathfinder,
New York. 1975. p. 111.
Michael Newton. Famous Assassinations in World History: An Encyclopedia. ABC-CLIO, p.
205. ISBN 1610692853
THE CHICAGO CRIME SCENES PROJECT: FRED HAMPTON
Berlet, Chip; and Matthew N. Lyons. 1998, "One key to litigating against government
prosecution of dissidents: Understanding the underlying assumptions", Parts 1 and 2,
Police Misconduct and Civil Rights Law Report (West Group), 5 (13), (JanuaryFebruary):
145153; and 5 (14), (MarchApril): 157162.
Tragic, heartbreaking mass murders in recent years have spread fear and panic among the
general public. Yet some are questioning if there isn't more than meets the eye with these cruel
and bizarre events. Is it conceivable that there might be a deeper agenda here?
This essay presents undeniable evidence that secret government mind control
programs have created assassins out of unsuspecting citizens.
The astonishing excerpts below, taken verbatim from declassified CIA documents, reveal
detailed mind control experiments in highly secret, government-sponsored experiments. Through
hypnosis, drugs, and electric shock, CIA clinicians fractured personalities and induced multiple
personality disorder (MPD) also called dissociative identity disorder (DID).
To verify this startling information, links are provided to scanned images of the original CIA
documents. Instructions are also available here to order any of these documents directly from the
CIA using the Freedom of Information Act (FOIA).
Though dating from the 1950s and 60s, these revealing documents were not released for
decades for reasons of "national security." The U.S. government claims mind control experiments
are no longer being carried out, yet how can we know? The existence of these programs was
denied for decades, and certainly any recent documents would be classified secret under the
rubric of "national security."
A trusted CIA informant I know assures me that these programs are ongoing. These
disturbing methods are used by various countries in clandestine operations around the world.
Many might prefer not to look at these ugly wounds to the soul of our nation and world. Yet if we
avoid or ignore them, they are likely to grow and fester.
In a general request for volunteers [deleted names] volunteered for H [hypnosis] experimentation
and were originally tested on 21 May 1951. Both girls, at this time, were nineteen years of
age. These subjects have clearly demonstrated that they can pass from a fully awake state to a
deep H controlled state via the telephone, via some very subtle signal that cannot be detected by
other persons in the room, and without the other individuals being able to note the change.
It has been shown clearly that physically individuals can be induced into H by telephone, by
receiving written matter, or by the use of code, signal, or words. Control of those hypnotized
can be passed from one individual to another without great difficulty. It has also been
shown by experimentation with these girls that they can act as unwilling couriers for
information purposes, and that they can be conditioned to a point where they believe a change
in identity on their part even on the polygraph.
Note: This document shows that CIA experimenters were successful in hypnotizing young women
(19 years old in this case) to do things they would not do normally without any memory
afterward, sometimes even unwillingly. Though they volunteered, these women were thus
programmed to be Manchurian Candidates or super spies with no knowledge of what these men
Learning models will be instituted in which the subject will be rewarded or punished for his
overall performance and reinforced in various ways by being told whether he was right, by
being told what the target was, with electric shock etc. ... In other cases drugs and
psychological tricks will be used to modify his attitudes. The experimenters will be
particularly interested in disassociative states, from the abaissement de niveau mental to
multiple personality in so-called mediums, and an attempt will be made to induce a number
of states of this kind, using hypnosis.
Note: This document provides proof that the CIA was was using drugs and electric shock in
attempting to induce MPD (multiple personality disorder). Though this document uses the
masculine "he" to describe the subject, other documents show that most of the subjects
used were young women who volunteered. The subjects were not informed about the
deeper aspects and implications for which they were being trained. If you view the original,
you will also find interesting information on ESP experiments.
A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses
[deleted] and [deleted] immediately progressed to a deep hypnotic state with no further
suggestion. Miss [deleted] was then instructed (having previously expressed a fear
of firearms in any fashion) that she would use every method at her disposal to
awaken miss [deleted] (now in a deep hypnotic sleep), and failing this, she would
pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her
rage would be so great that she would not hesitate to "kill" [deleted] for failing to
awaken.
Miss [deleted] carried out these suggestions to the letter including firing the (unloaded pneumatic
pistol) gun at [deleted] and then proceeding to fall into a deep sleep. After proper suggestions
were made, both were awakened and expressed complete amnesia for the entire sequence. Miss
[deleted] was again handed the gun, which she refused (in an awakened state) to pick up or
accept form the operator. She expressed absolute denial that the foregoing sequence had
happened.
Miss [deleted] felt reluctant about participating further since she expressed her doubt as to
any useful purpose in further attendance. The Operator thereupon proceeded in full view of all
other subjects to explain to Miss [deleted] that he planned to induce a deep state of hypnosis
now. The reaction was as had been expected. Miss [deleted] excused herself to make a telephone
call (defense mechanism?). Upon her return a very positive approach was adopted by the operator
whereupon a deeper, much deeper state of hypnosis was obtained.
Immediately a posthypnotic was induced that when the operator accidently dropped a steel ball in
his hand to the floor ... Miss [deleted] would again go into hypnosis. Miss [deleted] then advised
that she must conclude her work for the evening. She arose to adjust her hair before the mirror.
The ball was dropped and she promptly slumped back into the chair and back into hypnosis. It is
the opinion of the operator the Miss [deleted] if properly trained (positive approach) will continue
to improve.
17-0867 MOTION FOR RECONSIDERATION Page 22 of 106 Friday April 7, 2017
Note: Here we have proof that these women could be converted into unsuspecting and even
unwilling assassins. They could be programmed to assassinate anyone and would do so without
any conscious knowledge afterward. Note also the questionable status of "volunteer" implied.
Though these women originally volunteered, unwillingness to continue could be manipulated by
the men running the program.
Prior to actually beginning the more complex experiments, several simple post H were
worked with both of the girls participating. The first major experiment of the evening was
set up as follows without previous explanation to either [deleted] or [deleted]. Both
subjects were placed in a very deep trance state and while in this state, the following
instructions were given:
(A) [Deleted] was instructed that when she awakened, she was to procede to [deleted] room. She
was told that while there, she would receive a telephone call from an individual whom she would
know only as "Joe". This individual would engage her in a normal telephone conversation. During
this conversation, this individual would give her a code word and upon mentioning the
code word, [deleted] would go into a deep SI [sleep induction] trance state, but would
be "normal" in appearance with her eyes open.
[Deleted] was then told that upon the conclusion of the telephone conversation, she would
procede to the ladies room where she would meet a girl who was unknown to her. She was told
that she would strike up a conversation with this girl and during the conversation she would
mention the code word "New York" to this other girl, who, in turn, would give her a device and
further instructions which were to be carried out by [deleted]. She was told that after she carried
out the instructions, she was to return to the Operations Room, sit in the sofa and go immediately
into a deep sleep.
(B) [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where
she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim"
would engage her in normal conversation. During the course of the conversation, this individual
would mention a code word to [deleted]. When she heard this code word, she would pass into a SI
trance state, but would not close her eyes and remain perfectly normal and continue the
telephone conversation. She was told that upon conclusion of the telephone conversation, she
would then carry out the following instructions:
[Deleted] being in a complete SI state at this time, was then told to open her eyes and was shown
an electric timing device. She was informed that this timing device was an incendiary
bomb and was then instructed how to attach and set the device. After [deleted] had
indicated that she had learned how to set and attach the device, she was told to return to a sleep
state and further instructed that upon concluding the aforementioned conversation, she would
take the timing device which was in a briefcase and proceed to the ladies room.
In the ladies room, she would be met by a girl whom she had never seen who would identify
herself by the code word "New York." [Deleted] was then to show this individual how to
attach and set the timing device and further instructions would be given the individual
by [deleted] that the timing device was to be carried in the briefcase to [deleted] room,
placed in the nearest empty electric-light plug and concealed in the bottom, left-hand
drawer of [deleted] desk, with the device set for 82 seconds and turned on.
For a matter of record, immediately after the operation was begun it was noted that a member of
the charforce was cleaning the floor in the ladies room and subsequently, both [deleted] and
[deleted] had to be placed ... once again in a trance state and instructions changed from the
ladies room to Room 3. It should be noted that even with the change of locale in the transfer
point, the experiment was carried off perfectly without any difficulty or hesitation on the part of
either of the girls. Each girl acted out their part perfectly, the device was planted and set as
directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep
state. Throughout, their movements were easy and natural.
Note: You will note the frequent use of "girls" (young women) in these programs. Do you think
the men in charge, having complete hypnotic control of these women, might have at times taken
advantage of them sexually? Yet this would never enter the official documentation, with the one
major exception below.
On 2 July 1951 approximately 1:00 p.m. the instruction began with [deleted] relating to the
student some of his sexual experiences. [Deleted] stated that he had constantly used
hypnotism as a means of inducing young girls to engage in sexual intercourse
with him. [Deleted], a performer in [deleted] orchestra, was forced to engage in sexual
intercourse with [deleted] while under the influence of hypnotism. [Deleted] stated that he
first put her into a hypnotic trance and then suggested to her that he was her husband and
that she desired sexual intercourse with him.
Note: This document shows that an instructor being used by the CIA took advantage of his
skill in hypnosis to sexually abuse young women without their having any knowledge of
being abused. How many CIA hypnotists did likewise? Do you think a man involved in
these programs might take advantage of a beautiful, young woman knowing she
would not remember afterward? Note that for some reason this document is not
available in the CIA's three CD set and must be ordered individually at this link. See the
What You Can Do section at the end of this page for suggestions on how we can stop this
abuse.
Preliminary clinical research during 1955-56 has yielded promising leads in terms
of knowledge of how hypnotizability can be influenced by pharmacological means.
Experiments involving altered personality function as a result of environmental manipulation
(chiefly sensory isolation) have yielded promising leads in terms of suggestibility and the
production of trance-like states. There is reason to believe that environmental
17-0867 MOTION FOR RECONSIDERATION Page 24 of 106 Friday April 7, 2017
manipulations can affect tendencies for dissociative phenomenon to occur.
It was deemed advisable to prepare the report of the MKULTRA program in one copy only, in
view of its unusual sensitivity. The MKULTRA activity is concerned with the research and
development of chemical, biological, and radiological materials capable of employment in
clandestine operation to control human behavior. MKULTRA was authorized by then Director
of Central Intelligence [DCI], Allen W. Dulles, in 1953.
The concepts involved in manipulating human behavior are found by many people both within and
outside the Agency to be distasteful and unethical. Nevertheless, there have been major
accomplishments both in research and operational employment. Some MKULTRA activities raise
questions of legality implicit in the original charter. A final phase of testing of MKULTRA
products places the rights and interests of U.S. citizens in jeopardy. Public disclosure of
some aspects of MKULTRA activity could induce serious adverse reaction in U.S. public
opinion. The DCI's memorandum ... exempted MKULTRA from audit.
Over the ten-year life of the program many additional avenues to the control of human behavior
have been designated by the TSD management [Technical Services Division - under which
MKULTRA operated] as appropriate to investigation under the MKULTRA charter, including
radiation, electro-shock, various fields of psychology, psychiatry, sociology, and anthropology,
graphology, harassment substances, and paramilitary devices and materials.
TSD initiated a program for covert testing of materials on unwitting U.S. citizens in 1955. TSD has
pursued a philosophy of minimum documentation in keeping with the high sensitivity of some of
the projects. The lack of consistent records precluded use of routine inspection procedures and
raised a variety of questions concerning management and fiscal controls.
There are just two individuals in TSD who have full substantive knowledge of the
program and most of that knowledge is unrecorded. In protecting both the sensitive
nature of the American intelligence capability to manipulate human behavior, they apply
"need to know" doctrine to their professional associates and to their clerical assistants
to a maximum degree.
Note: Why did only two people have full substantive knowledge of the program? Could it be that
sex abuse and political manipulations behind the scenes were so severe that no one was to be
trusted? Do you think we could trust those two individuals? CIA Director Richard Helms, upon
hearing there would be a Congressional investigation, ordered the destruction of all documents
from these unethical and at times illegal mind control programs in 1973. He did not realize,
however, that incriminating evidence remained in the financial files of the agency, which are what
you read here. We can only imagine what secrets the destroyed documents held.
CIA document and page number: 87624, p. 3, 4 (also appended to 17748, p. 32, 33)
Title: Two Extremely Sensitive Research Programs
Date: 3 April 1953
Link to view images of original: Page 3, Page 4
We intend to investigate the development of a chemical material which causes a reversible non-
toxic aberrant mental state, the specific nature of which can be reasonably well predicted for each
individual. This material could potentially aid in discrediting individuals, eliciting
information, implanting suggestion and other forms of mental control.
In a great many instances the work in field (a) must be conducted by individuals who are not and
should not be aware of our interest. In all cases dealing with field (b), it is mandatory that any
connections with the Agency should be known only to an absolute minimum number of people
who have been specifically cleared for this purpose.
Experience has shown that qualified, competent individuals in the field of pharmacological,
physiological, psychiatric and other biological sciences are most reluctant to enter into signed
agreements of any sort which connect them with this activity since such a connection would
jeopardize their professional reputations. Even internally in CIA, as few individuals as
possible should be aware of our interest in these fields and of the identity of those who
are working for us. At present, this results in ridiculous contracts, with cut-outs, which
do not spell out the scope or intent of the work.
Note: In the three CD set, this document is found appended to document 17748 on pp. 30 to 37.
Drug Project - A project in the isolation and synthesis of pure drugs for use in effecting
psychological entry and control of the individual.
Drugs and electricity - Research work on the effects of lysergic acid [LSD] on animals. Use
of electric shock and the encephalograph in interrogation. Particular emphasis on the
detection and prior use of electric shock and the 'guaranteed amnesia' resulting
from electric shock.
CIA document and page number: 140394, pp. 2, 3 (not available in CD set, order
individually here)
Title: Interview with [Deleted]
Date: 25 February 1952
Link to view full text of both pages: Click here
A: Definitely, yes. Many of the medical cases I work on are involved in obtaining
personal, intimate information, and through hypnotism, I have been quite
successful in obtaining this. If an individual refuses to co-operate with hypnosis,
A: This is a very difficult subject. Post-hypnotics will last twenty years and will be very
strong if re-enforced from time to time.
A: Yes, many times. I have worked with doctors using sodium amytal and pentothal and
have obtained hypnotic control after the drugs were used. In fact, many times drugs were
used for the purpose of obtaining hypnotic control.
A: Yes, I have thought about this often. It could certainly be used in obtaining information
from recalcitrant people particularly with drugs. It could be used as a recruiting source for
special types of work. A good hypnotist running hypnotic shows for entertainment
would pick up a great many subjects, some of whom might be exceptionally good
subjects for us. These subjects could easily be tabbed and put to use.
Q: Have you ever been able to produce hypnosis without an individual's knowledge?
A: Yes, through the relaxing technique and on rare occasions [I've] been able to produce
hypnotism against a person's will. However, you cannot count on this and to attempt to
attach an individual who did not want to be hypnotized alone would be almost an impossible
task. In that type of case, I would use sodium amytal and/or sodium pentothal.
Q: How effective are post-hypnotics; over what distances and time can they be effective?
A: Properly used post-hypnotics will last twenty years. They can be made more effective by
re-enforcement from time to time. Post-hypnotics are not affected at all by time or travel or
distance away from the person who placed the post-hypnotic. As a rule, post-hypnotics
should be 100% effective in good subjects.
Q: Can individuals be made to do things under hypnosis that they would not otherwise?
Note: Individuals can be hypnotized without their knowledge. They can be programmed to
commit murder, suicide, and much more. Think about the implications. How many "suicides"
of important people we've heard in the news were not really suicides? How many murders
were committed by people who didn't even realize they were assassins? How much has this
technology been used to manipulate world politics? Think about the Kennedys, Martin
Luther King, Jr., and possibly those involved with 9/11 and other major terrorist attacks.
Note this document is not available in the three CD set and must be ordered individually at
this link.
CIA document and page number: 140401, pp. 6, 7 (not available in CD set, order
individually here)
Title: Special Research, Bluebird
Date: 1 January 1952 (approximate)
Link to view full text of both pages: Click here
Can we obtain control of the future activities (physical and mental) of any given individual,
willing or unwilling by application of SI [sleep induction] and H [hypnosis] techniques?
Can we create by post-H control an action contrary to an individual's basic moral
principles?
Can we in a matter of an hour, two hours, one day, etc., induce an H condition in an
unwilling subject to such an extent that he will perform an act for our benefit?
Could we seize a subject and in the space of an hour or two by post-H control
have him crash an airplane, wreck a train, etc.?
Can we by H and SI techniques force a subject (unwilling or otherwise) to travel long
distances, commit specified acts and return to us or bring documents or materials?
Can we guarantee total amnesia under any and all conditions?
Can we "alter" a person's personality?
Can we devise a system for making unwilling subjects into willing agents and then transfer
that control to untrained agency agents in the field by use of codes or identifying signs?
Is it possible to find a gas that can be used to gain SI control from a gas pencil, odorless,
colorless: one shot, etc.?
What are full details on "sleep-inducing machine"?
How can sodium A or P or any other sleep inducing agent be best concealed in a
normal or commonplace item, such as candy, cigarettes, liquer, wines, coffee, tea,
beer, gum water, aspirin tablets, common medicines, coke, tooth paste?
Can we, using SI and H extract complicated formula from scientists, engineers, etc., if
unwilling?
Note: Reading all of the declassified CIA documents listed in this essay suggests that the
answer to most, if not all of the questions above appears to be yes. Note that sleep
inducing agents were being placed in candy, aspirin, Coke, and more. Think about the
implications if even just a few of the men in these programs decided to use such things
outside of the office to manipulate others for their personal benefit. It's time that this
information be made public so we can all be aware of what's going on and work to stop the
abuses. Note for some reason this document is not available in the three CD set and must
be ordered individually at this link.
Science Digest Article, pp. 44 - 53 (Not a CIA document, but related to the mind control
programs)
Title: Hypnosis Comes of Age
Date: April 1971
Link to view full text of article: Click here
One successful case involved an Army Service Corps Captain whom we'll call George Smith.
Captain Smith had undergone months of training. He was an excellent subject but did not realize
it. I had removed from him, by post-hypnotic suggestion, all recollection of ever having
been hypnotized. Outside of myself, Colonel Brown was the only person who could hypnotize
Captain Smith. This is "locking." I performed it by saying to the hypnotized Captain: "Until further
orders from me, only Colonel Brown and I can hypnotize you. We will use a signal phrase 'the
moon is clear.' " The system is virtually foolproof.
By the 1920's, not only had they learned to apply post-hypnotic suggestion, [they] also
had learned how to split certain complex individuals into multiple personalities like
Jeckyl-Hydes.
During World War II, I worked this technique with a vulnerable Marine lieutenant I'll call Jones.
Under the watchful eye of Marine Intelligence, I spilt his personality into Jones A and Jones B.
Jones A, once a "normal" working Marine, became entirely different. He talked communist doctrine
and meant it. He was welcomed enthusiastically by communist cells, was deliberately given a
dishonorable discharge by the Corps (which was in on the plot) and became a card-carrying party
member.
The joker was Jones B, the second personality, formerly apparent in the conscious Marine. Under
hypnosis, this Jones had been carefully coached by suggestion. Jones B was the deeper
personality, knew all the thoughts of Jones A, was a loyal American, and was "imprinted" to say
nothing during conscious phases. All I had to do was hypnotize the whole man, get in touch with
Jones B, the loyal American, and I had a pipeline straight into the Communist camp.
Note: This article shows that in the 1920s, U.S. military intelligence had already developed
the capability to cause split personalities. The created super spy or Manchurian Candidate
has been a reality for nearly a century, yet very few people know anything about it. These
unknowing spies could plant bombs, provide sexual favors, and even assassinate top
political leaders. Consider that many countries and key powerful, elite groups have had and
used this technology for many decades. Watch the movie Manchurian Candidate to see how
real it is.
In 1987 CATERBONE became a federal whistleblower for the case of local defense contractor
International Signal and Control, or ISC. ISC was a black ops program for the NSA and CIA that
was convicted in 1992 for an elaborate scheme to arm Iraq and other Middle Eastern countries
with a broad array of weapons, most notably cluster bombs. It was the third larges fraud in U.S.
History at that time. CATERBONE had been a victim of organized stalking since 1987 and a victim
of electronic and direct energy weapons since 2005. CATERBONE had also been telepathic since
2005. In 2005 the U.S. Sponsored Mind Control turned into an all-out assault of mental
telepathy; synthetic telepathy; hacking of all electronic devices; vandilism and thefts of personal
property, extortions, intellectual property violations, obstruction of justice; violations of due
process; thefts and modifications of court documents; and pain and torture through the use of
directed energy devices and weapons that usually fire a low frequency electromagnetic energy at
the targeted victim. This assault was no coincidence in that it began simultaneously with the filing
of the federal action in U.S. District Court, or CATERBONE v. Lancaster County Prison, et. al., or
05-cv-2288. This assault began after the handlers remotely trained/sychronized Stan J.
Caterbone with mental telepathy. The main difference opposed to most other victims of this
technology is that CATERBONE is connected 24/7 with the same person who declares
telepathically she is a known celebrity. Over the course of 10 years CATERBONE had been
telepathic with at least 20 known persons and have spent 10 years trying to validate and confirm
their identities without success. Most U.S. intelligence agencies refuse to cooperate, and the
Federal Bureau of Investigation and the U.S. Attorney's Office refuse to comment and act on the
numerous formal complaints that are filed in their respective offices. Most complaints are focused
on the routine victimization's of a targeted individual including but not limited to stalking,
harassment, threats, vandalism, thefts, extortion, burglaries, false imprisonments, fabricated
mental health warrants or involuntary commitments, pain and torture to the body, and most often
the cause of obstruction of justice is the computer hacking.
CATERBONE had a very sophisticated and authentic library of evidence of the use of U.S.
Sponsored Mind Control technologies on my father and brother that dates back to the 1940's
while my father was in the U.S. Navy after he graduated with honors from Air Gunners School in
Florida, including an affidavit motorized and authenticated by my father in 1996. My brother
served in the U.S. Air force and was victim to LSD experiments of the infamous MKULTRA program
in the late 1960's.
In 2016 CATERBONE was the AMICUS for Pennsylvania Attorney General Kathleen Kane in the
Pennsylvania Superior Court Case No. 1164 EDA 2016 in the COMMONWEALTH OF PENNSYLVANIA
v. Kane which included perjury charges during the alleged leaking of grand jury information.
Kathleen Kane took on the Good Old Boy network regarding judicial reform in the
Commonwealth of Pennsylvania in an effort to rid the state of the long standing public corruption
ring that was evident from local law enforcement to Supreme Court Justices, and everyone in
between.
In 2015 CATERBONE filed an amicus curie on behalf of Lisa Michelle Lambert who was convicted
in 1992 of the murder of Laurie Show, both of Lancaster, Pennsylvania. CATERBONE currently
am in litigation in the U.S. Third Circuit Court of Appeals and in February of 2016 Lisa Michelle
Lambert published her book titled Corruption in Lancaster County My Story, which is available
in bookstores and on Amazon.com. CATERBONE is in frequent contact with her co-author, Dave
Brown of Philadelphia, Pennsylvania.
In 2006 CATERBONE began his role as an Activist Shareholder for Fulton Financial, which is
listed as "FULT" on the NASDAQ stock exchange. As a founder of Financial Management Group,
Ltd., a full service financial firm, Stan J. Caterbone has drawn upon the success in developing the
strategic vision for his company and the experience gained in directing the legal affairs and public
offering efforts in dealing with Fulton Financial. CATERBONE had been in recent discussions with
the Fulton Financial Board of Directors with regards to various complaints dealing with such issues
as the Resource Bank acquisition and the subprime failures. CATERBONE believes that Fulton
Financial needs management to become more aggressive in it's strategic planning and the
performance it expects from it's management team in order to increase shareholder value.
Expanding the footprint of the regional bank has not yielded an increase to the bottom line that is
consistent with the expectations of shareholders. Lancaster County has seen several local banking
institutions acquired by larger regional banks, thus increasing the competition Fulton Financial will
see in it's local marketplace as well as in it's regional footprint.
In 2005 CATERBONE, as a Pro Se Litigant filed several civil actions as CATERBONE's that are in
current litigation in the United States District Court for the Eastern District of Pennsylvania, the
United States Third District Court of Appeals, the Pennsylvania Supreme Court, The Pennsylvania
Superior Court, the Commonwealth Court of Pennsylvania, The Court of Common Pleas of
Lancaster County, Pennsylvania. These litigations include violations of intellectual property rights,
anti-trust violations, and interference of contracts relating to several business interests. Central to
this litigation is the Digital Movie, Digital Technologies, Financial Management Group, Ltd,/FMG
Advisory, Ltd., and its affiliated businesses along with a Federal False Claims Act or Federal
Whistleblowers Act regarding the firm of International Signal and Control, Plc., (ISC) the $1Billion
Dollar Fraud and the Export violations of selling arms to South Africa and Iraq. This litigation dates
back to 1987. Stan J. Caterbone was a shareholder of ISC, and was solicited by ISC executives for
professional services. The Federal False Claims Act is currently part of RICO Civil Complaint in the
United States District Court for the Eastern District of Pennsylvania and the Third Circuit Court of
Appeals, as docket no. 05-2288.
In 2005 CATERBONE Advanced Media Group/Project Hope filed a Civil Action in the Court of
Common Pleas of Lancaster County against Drew Anthon and the Eden Resort Inn for their
attempts to withhold the Tourism Tax and Hotel Tax that supports the Downtown Lancaster
Convention Center & Marriot. We also proposed an alternative plan to move the Convention Center
to the Hotel Brunswick and Lancaster Square to all of the major stakeholders. The Lancaster
County Convention Center is finally under construction with a March 2009 Opening date.
In 2005 CATERBONEwas selected to attend the Clinton Global Initiative in New York City
after submission of an essay with and application. CATERBONE received the invitation from
Bruce R. Lindsey, Chief Executive Officer of the William J. Clinton Foundation.
In 2005 CATERBONE began our philanthropic endeavors by spending our energies and working
with such organizations as; ONE.org, Livestrong.org, WoundedWarriors.org, The Clinton Global
Initiative, Lancaster Convention Center Authority, Lancaster Chamber of Commerce, Toms Project
Hope, People to People International, GlobalWarming.org, Contact Lancaster/24 Hour Suicide
Hotline, Schreiber Pediatric Center, and numerous others.
In 2004 CATERBONE embarked on our past endeavors in the music and entertainment
industries with an emphasis on assisting for the fair and equitable distribution of artists rights and
royalties in the fight against electronic piracy. We have attempted to assist in developing new
business models to address the convergence of physical and electronic mediums; as it displaces
royalties and revenues for those creating, promoting, and delivering a range of entertainment
content via wireless networks.
In 2000 to 2002 CATERBONE developed an array of marketing and communication tools for
wholesalers of the AIM Investment Group and managed several communication programs for
several of the company wholesalers throughout the United States and Costa Rica. We also began a
Day Trading project that lasted until 2004 with success.
17-0867 MOTION FOR RECONSIDERATION Page 31 of 106 Friday April 7, 2017
In 1999 CATERBONE developed a comprehensive business plan to develop the former Sprecher
Brewery, known as the Excelsior Building on E. King Street, in Lancaster, Pennsylvania. This plan
was developed in conjunction with the Comprehensive Economic Development Plan for the
Revitalization of Downtown Lancaster and the Downtown Lancaster Convention Center for the
former Watt & Shand building.
In 1998 CATERBONE had began to administer the charity giving of Toms Project Hope, a non-
profit organization promoting education and awareness for mental illness and suicide prevention.
We had provided funding for the Mental Health Alliance of Lancaster County, Contact Lancaster
(The 24/7 Suicide Prevention Hotline), The Schreiber Pediatric Center, and other charitable
organizations and faith based charities. The video "Numbers Don't Lie" have been distributed to
schools, non profit organizations, faith based initiatives, and municipalities to provide educational
support for the prevention of suicide and to bring awareness to mental illness problems.
In 1996 CATERBONE had done consulting for companies under KAL, Inc., during the time that
CATERBONE was controller of Pflumm Contractors, Inc., CATERBONE was retained by Gallo
Rosso Restaurant and Bar to computerized their accounting and records management from top to
bottom. CATERBONE had also provided consulting for the computerization of accounting and
payroll for Lancaster Container, Inc., of Washington Boro. CATERBONE was retained to evaluate
and develop an action plan to migrate the Informations Technologies of the Jay Group, formally of
Ronks, PA, now relocated to a new $26 Million Dollar headquarters located in West Hempfield
Township of Lancaster County. The Jay Group had been using IBM mainframe technologies hosted
by the AS 400 computer and server. CATERBONE was consulting on the merits of migrating to a
PC based real time networking system throughout the entire organization. Currently the Jay Group
employees some 500 employees with revenues in excess of $50 Million Dollars per year.
In 1993 CATERBONE was retained by Pflumm Contractors, Inc., as controller, and was
responsible for saving the company from a potential bankruptcy. At that time, due to several
unpaid contracts, the company was facing extreme pressure from lenders and the bonding
insurance company. We were responsible for implementing computerized accounting, accounting
and contract policies and procedures, human resource policies and procedures, marketing
strategies, performance measurement reporting, and negotiate for the payment of unpaid
contracts. The bonding company was especially problematic, since it was the lifeline to continue
work and bidding for public contracts. The Bank of Lancaster County demanded a complete
accounting of the operations in order to stave off a default on the notes and loans it was holding.
We essentially revamped the entire operation. Within 3 years, the company realized an increase in
profits of 3 to 4 times its previous years, and record revenues.
In 1991 CATERBONE was elected to People to People International and the Citizen Ambassador
Program, which was founded by President Dwight D. Eisenhower in 1956. The program was
founded to To give specialists from throughout the world greater opportunities to work together
and effectively communicate with peers, The Citizen Ambassador program administers face-to-
face scientific, technical, and professional exchanges throughout the world. In 1961, under
President John F. Kennedy, the State Department established a non-profit private foundation to
administer the program. We were scheduled to tour the Soviet Union and Eastern Europe to
discuss printing and publishing technologies with scientists and technicians around the world.
In 1990 CATERBONE had worked on developing voice recognition systems for the governments
technology think tank - NIST (National Institute for Standards & Technology). CATERBONE co-
authored the article Escaping the Unix Tar Pit with a scientist from NIST that was published in
the magazine DISC, then one of the leading publications for the CD-ROM industry. Today, most
all call centers deploy that technology whenever you call an 800 number, and voice recognition is
prevalent in all types of applications involving telecommunications.
In 1989 CATERBONE had founded Advanced Media Group, Ltd., and was one of only 5 or 6 U.S.
In 1987 Power Station Studios of New York Tony Bongiovi retained CATERBONE as
executive producer of a motion picture project. The theatrical and video release was to be
delivered in a digital format; the first of its kind. We had originated the marketing for the
technology, and created the concept for the Power Station Digital Movie System (PSDMS), which
would follow the copyright and marketing formula of the DOLBY technology trademark.
CATERBONE had also created and developed marketing and patent research for the development
and commercialization of equipment that we intended to manufacture and market to the recording
industry featuring the digital technology. Sidel, Gonda, Goldhammer, and Abbot, P.C. of
Philadelphia was the lead patent law firm that We had retained for the project. Power Station
Studios was the brainchild of Tony Bongiovi, a leading engineering genius discovered by Motown
when he was 15. Tony and Power Station Studios was one of the leading recording studios in the
country, and were responsible for developing Bon Jovi, a cousin. Power Station Studios clients
included; Bruce Springsteen, Diana Ross, Cyndi Lauper, Talking Heads, Madonna, The Ramones,
Steve Winwood, and many others. Tony and Power Station Studios had produced the original
Sound Track for the original Star Wars motion picture. It was released for distribution and was
the number one Sound Track recording of its time.
Tony Bongiovi was also active in working and researching different aerospace technologies. *
CATERBONE had developed and authored a Joint Venture Proposal for SONY to partner with us in
delivering the Digital Movie and its related technologies to the marketplace. The venture was to
include the commercialization of technologies, which Tony Bongiovi had developed for the
recording industry simultaneously with the release of the Digital Movie.
CATERBONE also created the concept for the PSDMS trademark, which was to be the Trademark
logo for the technology, similar to the DOLBY sound systems trademark. The acronyms stand for
the Power Station Digital Movie System. Today, DVD is the mainstay for delivering digital movies
on a portable medium, a compact disc.
In 1987 CATERBONE had a created and developed FMG Mortgage Banking, a company that was
funded by a major banking firm in Houston Texas. We had the capability to finance projects from
$3 to $100 million dollars. Our terms and rates were so attractive that we had quickly received
solicitations from developers across the country. We were also very attractive to companies that
wanted to raise capital that include both debt and equity. Through my company, FMG, we could
raise equity funding through private placements, and debt funding through FMG Mortgage
Banking. We were retained by Gamillion Studios of Hollywood, California to secure financing of
their postproduction Film Studio that was looking to relocate to North Carolina. We had secured
refinancing packages for Norris Boyd of and the Olde Hickory and were in the midst of replacing
the current loan that was with Commonwealth National Bank. We had meetings and discussions
with Drew Anton of the Eden Resort, for refinancing a portion of his debt portfolio. We were
quickly seeking commitments for real estate deals from New York to California. We also had a
number of other prominent local developers seeking our competitive funding, including Owen
Kugal, High Industries, and the Marty Sponougle a partner of The Fisher Group (owner of the Rt.
30 Outlets). We were constantly told that our financing packages were more competitive than
local institutions.
In 1985 CATERBONE developed the Easter Regional Free Agent Camp, the first Free Agent
Camp for the Professional Football industry; which was videotaped for distribution to the teams
scouting departments. (See Washington Post page article of March 24, 1985) Current camps
were dependant on the team scouts to travel from state to state looking for recruits. We had
developed a strategy of video taping the camp and the distributing a copy, free of charge to the
teams, to all of the scouting departments for teams in all three leagues FL, CFL and WFL. My
brother was signed at that camp by the Ottawa Roughriders of the CFL, and went on to be a
leading receiver while J.C. Watts was one of the leagues most prominent quarterbacks. My brother
also played 2 years with the Miami Dolphins while Dan Marino was starting quarterback. We were
a Certified Agent for the National Football League Players Association. Gene Upshaw, the President
of the NFLPA had given me some helpful hints for my camp, while we were at a Conference for
agents of the NFL. The Washington Post wrote a full-page article about our camp and associated it
with other camps that were questionable about their practices. Actually, that was the very reason
for our camp. We had attended many other camps around the country that were not very well
organized and attracted few if any scouts. We had about 60 participants, with one player coming
from as far away as Hawaii. We held the camp at Lancaster Catholic, with a professional
production company filming the entire camp, while CATERBONE did the editing and produced the
video. The well respected and widely acclaimed professional football scout, Gil Brandt, of the
Dallas Cowboys, had given me support for my camp during some conversations We had with him
and said he looked forward to reviewing the tapes for any hopeful recruits.
In 1985 CATERBONE was elected Vice President of the Central Pennsylvania Chapter of the
International Association of Financial Planners, and helped build that chapter by increasing
membership 3to 4 times. We had personally retained the nationally acclaimed and nationally
syndicated Financial Planner, Ms. Alexandria Armstrong of Washington D.C.; to host a major
fundraiser. More than 150 professionals attended the dinner event that was held at the Eden
Resort & Conference Center. Ms. Armstrong discussed financial planning and how all of the
professions needed to work together in order to be most effective for their clients. We attracted a
wide variety of professionals including; brokers, lawyers, accountants, realtors, tax specialists,
estate planners, bankers, and investment advisors. Today, it has become evident that financial
planning was the way of the future. In 1986 executives approached us from Blue Ball National
Bank to help them develop a Financial Planning department within their bank.
In 1984 CATERBONE had helped to develop strategic planning for Sandy Weill, former President
of Citi Group (the largest banking entity in the U.S). We were one of several associates asked to
help advise on the future of Financial Planning and how it would impact the brokerage and the
investment industry at large. Mr. Weil was performing due diligence for the merger of American
Express and IDS (Investors Diversified Services). We were at that time a national leader in the
company in delivering Fee Based Financial Planning Services, which was a new concept in the
investment community and mainstream investors. That concept is now widely held by most
investment advisers.
Stan
LOCAL,
Caterbone
17-0867 STATE, FEDERAL
MOTION &FOR
FEDERAL
COURT
COURT
DOCKETS
DOCKDETS Page 63
DOCKETS
RECONSIDERATION 31 of 106
64 171
499
811
107 Thursday
Sunday November
Monday
Friday April10,
April 13,
7, 2016
2017
THIS PAGE INTENTIONALLY LEFT BLANK
Stan
LOCAL,
Caterbone
17-0867 STATE, FEDERAL
MOTION &FOR
FEDERAL
COURT
COURT
DOCKETS
DOCKDETS Page 69
DOCKETS
RECONSIDERATION 19 of 106
70 171
499
811
107 Thursday
Sunday November
Monday
Friday April10,
April 13,
7, 2016
2017
Stan J. Caterbone and Advanced
Stan Media
J. Caterbone,
Group, Pro Se Billing File
Stan
LOCAL,
Caterbone
17-0867 STATE, FEDERAL
MOTION &FOR
FEDERAL
COURT
COURT
DOCKETS
DOCKDETS Page 70
DOCKETS
RECONSIDERATION 20 of 106
71 171
499
811
107 Thursday
Sunday November
Monday
Friday April10,
April 13,
7, 2016
2017
1512. Tampering with a witness, victim, or an informant
!"" # $%
&! ! '" !
()*+
, # $
(-.+/
000 &&" " ! & 1#
# 2& !" #
-(-3*)43))++
5 5 5 5 5 5
5 , 5 5 6,
5 , 6 5 7 8
, 5
, 6 5 6 ,
= (*() 5 1 ! & 0! : 0! $ !# ! $ ! 9
> 5 5, (4 3 ,
3 5
5 -/ 3 7 5 5 5
= (*() 5 1 ! & 0! : 0! $ !# ! $ ! 9
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page71
Page 1 of
67
72 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page72
Page 2 of
68
73 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
> 5: , 5 ! 0 5 5 ! : 1 $# (.3.4))
?5: 1 9 ! ,! !#: "" , > :! 9!"! & ! ! 11
9 "! !& ! & : # 0! : ! 9" # $ : $ : # ! 9 :
, 5 B 99!# " # !# A ! # ! "" 1 ! & 0 ! ! & "! !& !
! 0: ""' 9 ! "!< "' # "# " 99 :! # : "
9 5 5 , ,, , 7 59 1 !
> #: :! , 6 5 6 , !
# ! ! & ! # 11 ! & # ! ! #" ! &1 9 ! 9!"
5 8 # )($ )+(.
CCCCCCCCCCC@ @CCCCCCCCCCCC
$ ,! !&
%
!"" # $
&! ! '" !
()*+
, # $ (-.+/
000 &&" " ! & 1#
# 2& !" #
-(-3*)43))++
!# ! #" ! 8 : # ! 1 : " $ 9 $
1 "!#"' ! # ! ! # (D4- & ! & 1 "!# ?E:! " 7" 0 > 0! : "" & ! 9 ! # # 9
0! :! ! " !& " "$ "# 9 , # $ ? 1" & !" ' ""! & A !
: 9 !# F( 7!""! ! (DD)> 9 "' 0 9 # 9 1 ! :
: 0! : : ! 9 " 0 9 # : ! $ 0:!#: 0 " ""' 1 # G1 1 "!#
# 1 ! E !"!H # !# ! :0 9 : "! " "!#! #< 1 $
1 1 '$ ! E # ! 9!&: 9 ; !# : &: : $ # !# !
9 1 # ! & !&: # ! 1 ! 9 ; !# # ! 1 ! "
9 : ! 1"' !9 ' 0! : 9 # ,! 0" &# , # '
, # ! ' :! ! 3 1 ' E:! " 7" 0! & 9 : # "? : 5
9 1 ! ">I
5 5
+/3(.3D+++* 99!# 9 : ! # ! G # ! $ ! 5:! ! # ! 9 11 " 3
, 5 , 5 7 , 56 " >?5@## $? @GJ +/3(.3D+++K. ,,
,, 5 5 5 5
1 (.3.4)) 5 5 E 5 5 $? @G
+ & " + (( ! "
5:! ! # ! 9 11 " $? @G 5 9 ,! !#: "" , 3 >?5@##
59 ,! !#: "" , J3 $? ## 3 #H?@@H@
! !# ! !# 9 (.3K+(K 5 7 ! $ (3
$? ?@G3 >?#5GI@3 @?# >>G 59 ,! !#: "" , J #>? II3 #$?@$># #I?# GI J
! !# ! " ! !# 9 (.3# 3(-*( 5 5 7
0 " : 9 '" ! !#! " # 7 L )+(.3K.) .( 0 "
- -" %( & , 7 0
'" ! 1 -" 5>5 +& # $3 5>@ +& # $J #I ++ # $ !# 9 M :" M
1 ! 9 '" ! ' 11 " %?5$? ?#### G? # $ 9 M :"
M ((.K )+(.3 >$ + # >3 > G + # >J (.3()(D "! ! '
; # ! 9 )+(.
, # ' 9 " #I? 55H53 >? # $H3 #$?#55@G ?#$?#5@#
7 < 1 #' 9 5: ! !# 9 '" ! $? # >H
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page73
Page 3 of
69
74 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
, 6 5 6 ,
& %( (( 0 ! ." " B D GIH
-"" - 0 , 5 B ( -( ( ( -""
2 "- ( / ( , 5 B . " ! - " .( 1-
( / " 0 " + & / -! " .
& / . " 0 " 0 -( + " .. 0 " - ." - ( 4 ! " G
# > G ##. 6 .( " (. ( 0 !- " 8
, 5 B . " ." . " ( " - " .- (( - ( ." . "
( ( ( ? ? < CA2& AA J ' % J ; , & A&2A &
% & & A (" ( & %A ?( 8 ( 0 2
>?5@## 0 " . ". " " & % & & A / (( ."
-.. " /" " (" " " " / " (( /
, 5 76 , 5
& , 5 8 " ( " ! "
" 0- ( = " ! KK( / ( 0 - " !(
, 5 8 " ( " ( / " 0 - !-
." , 8 5 " ( ( " ! "- " .-!(
0 1- -
." , 5
8 " ( - -" " !( / " 0 "
" " -" " 8 / - " & .( 8 " ( "
(8 0 " 0 0 ! " " F- " ( / " 8 -" - (
(( -. ." " ( ( " -
" ( ! ' & " !( ." "
. , 5 B ( -!1 - (- 3 " 3 " -" 3 ! "- 3
- " -( 0 "" . " !( " 1-" & - " -
-( " (( ." - ( 0 3 " . " 3 ." ". " (
0 ? " - & " ( " - " "" -
; & A + & ." ( "8 ( 8 .. (( 0
.( " 0 " - !- ! "0
" 0 " 0 " ( 0 ( L " ( ! 8 GIH3 / (( " ." (
" & ! 0 ( / ( " . " & "0 - (
2 . " + " ( " ( * " - & " - ? ? "0
0- ( " 03 ! 03 " 03 = - 0 " 0 & ( (3 3
" (( / " - -" 0 " ( "8
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page74
Page 4 of
70
75 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
7,
& "" . " !( " 1-" " -( " ! " - (-
!- ( (( / 0
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page75
Page 5 of
71
76 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
7 M 5 5 6 5 , 5 5
E 5 5 , , 5 5, 5 76 , 56 5 6
5 )++KI
+ " I # $ / (( 0 (( - "" 0 ! (
0 4I6 ( -" 0 % ( ! "" 8 ' + + " ( / ." ! !(
- " .." = ( -" + - / " ! 2 &
/ "" 0 ! - " GIH ." ( 0 ( !( / 0
( 0 ( ( " " / / " ( 0 0
/ - 0 / "
" (( / ." . " 0 ( ! "" 8 ." " %
)-( ##>
( " - - 4 . %-!( 6 ( " ! /
"" 0
/ 4 6 ! (( 0 0 " . "
- & =
" ! - O -" " ." ! !( - / 8
F- ! / (( / ( - ( 0 " / 0 /
!" " " % (( . "! / " - & = /
" " ( " ! 0
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page76
Page 6 of
72
77 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
5 ,
5 , 4 . " - " " - " 5 ,( 0 0" 6 / "
" (( 0 ( S TS T ." 1 - ! 2 ' " ( C-" -
0 4'C 6 -" (( 0 (" 0 " 0 "-. 0 . ( (
"0 K S5T
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page77
Page 7 of
73
78 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
'C " ") 0 "; " - " 0 " 0 & %A " " 0 'C 0
P =. "-. " " - " (K " "/ ( P
. (( " ( " S>TS$T 2 " ; " 0 "0 & %A
/ (( -(( SHT " , " ( A ! " ' U . " (( - "K
." 0" SIT ( -0 U ( 0 /" .." ( "( /" .. 0 U 0E
. P " ( ! " " P SGT ; " = ( " / "
P- 8( P ( 8 " " U 0E ( / " S #T
5: !
' 9 5 ,
" (K . " - " & %A ((
! 0 -0- G>$ / ." 0"
0 P " ( - "-. / P -
% " 2 4 %2 6 & (- - . (( A - "
- / -( " - "0 K " (( S T ! "
G>$ " ; " " ( 'C E 0 0 -" (( !( 8 ( " (- 0
/ & %A / 1- / (" ! - S T
G>$ ; " . ( " - 0 " &A + ; / " ( "0 ( " -"0
/ ( " ." -" + .. / " K 'C ( 0 " -" "
, "0 & (( " !( 8 - S 5T - " "
" . " 4 6 / - G>H 'C ! 0 " "0
0" -. ( ( - 0 . " -( "( C " A- (
- (( A + " - " U 0 )" S @T
(0 U 0E . / " -( 0 0 . - "8 / /
! " 0 " - 0" - -" " .
- 0" ( -" S $T
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page78
Page 8 of
74
79 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
-"! - " )-( < -0- G$H 'C ! 0 P & %A <C U; & P
/ - U 0 / (( - ( " 0
4 6 A (- " + 4A +6 " )-
0" A ( F- ( 4 A 6 ( S >T C U ; & !(
, " %" 0" "- 5 'C P "-. " " "
"/ - " (K !( 8 ( . "0 K P S $T
& ." 0" / !" " " ( " ." . " ( " " . "
-"! " ! 0 " (( ! " ! / 'C " ( (( 0 0
( -" 0 . " & ( - /
. 0 ." 1 G$H (( . " ; S GT . "-( " "0 / % " % .( E
. 0 ( " "0 K ! U 0 -. 0 & 'C
" "-. . 0 ( ( ( / ( - 0 "0 "
( (( - " -.. " " " S5#T
5: 5 , & G1
&
." 0" / - -(( 8 . " - ( GH / K E
0 'C !-"0( 'C ( + % ( 8 " ( "
=. ." 0" ! . 0 " ( / 0 S55T + / "0 K
(( " - .-!( " " " " ) 0 "; " ( "
" (K & %A / " (( - -" - " (( 0 . " / -( !
( ?! ? ! S5@TS5>T
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page79
Page 9 of
75
80 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
& (( 0 -
( . - " ." ! " 0 - ( "0 " K
& ( 0 ( F- (( 0 ( / " ." 0" " "
/ " (( " 0 " ! ( ! - ." 0" "
P ( -" P ( / ..( ( (( 0 " ( (
" -. " " ." 0" / / " (( 0 ( " F- !( ( 0 (
" - !" - / " " ( / / " " . !( "
" (( 0 (( 0 0 " (( ( -" .( / ( / S T +
F- - / -( ! ( " !( " (( "0
! ( ( !- & %A / "! C-" - -
. 0( . " F- " ( ." 0 = " '"
"0 . " ." 0 0" / 0 " - 0" -.
." . 0 0 " - / -( ." ( -" " (
S5 T
& 9 &
. ." 0" E "0 / - % " S5$T " 0 -"
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 80
10 of 106
76
81 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
- ( "0 K
"0 K - ( / ( A0 + (- 0 A "
+ " - " U 0 )" " / - " " " .
" ( " ( " % .( 0"
A ( F- ( " ("0 "0 K
!( 8 ( 0" -.
J - 0 "
" +
/ -." 0" -.
U- U(-= U(
( EA0 % "
!" " 0 "0 K ( ! ( P / P (- 0 - " "
"
( (( 0" -. ." 0 " / (( - ( - " "
/ 0" -. (
( / " ,- (
"0 K - ( / / E "0
( 0" -. - 8 0 . " %- " A 2 " (
-! =( (- 0 "( C E -! % / " -! (
+ 3
( !( " S5IT
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 81
11 of 106
77
82 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
& 'C . (( ( . 0 ( ! /
" - !( 8 ( " = .( ! / C( 8% " 2
"0 K C( 8 A 0 " & " -( - " - 0 / / "
0 C( 8 % "% " ! " ) ;-00 C- " " ( " C (( S@ T
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 82
12 of 106
78
83 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
&
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 83
13 of 106
79
84 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
: & . .( ! . -. ! , " 0 -
" ! (( 0 (( (( & , " - " 8 "
-" (( K ! ". ( (! ( / ! ( .
" ( " (( 0 ( ! ( ( " 0 . / " & , "
. " 0 ." "( " -0 " ! " !- ( - 0 " "-
F- - /" . " . P!-0 P -"" . - ( . 0 !" 8?
/ . - " ! - . " (( /
" K 0 0" -. . (( 0 " - 7
0" -. - . 0 / . (( 0 " - "0 K 7 -
" . 0" -. 0 0 - ( / -(
: & - ( 8 ! ( F- ( " ((
(( 0 ( " ( 2= - !" " ( .
. " !( " !( ." -" " -. " 0 (( 0 0
0" ( = " - " 0 ( F- 0 - /
.." ." / " ! 0 .- + (( 0 - "
-" / " -" 1- " !
" (- 0" ..( / S$>TS$$T
3 5 , 1 !
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 84
14 of 106
80
85 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
9 #
! "
# # ! $ % & $
' ()*+",-".+ (, ! .,(-",-"(/
.,(-",*"(0
!1 #2 3456 27 4 $ # !
1 &
8 1 9 .,,+",:",/ & ;" & ;" < ()*(1 = !
> ? 6 4 4 &
# ! .,(:"(.",: .,(-",*"(0
8 !! "8 1 .,/ 4 = @ $ (/)
=3 )*/,:,,(-./-+
& %A A ? . 0L "-. ? C U ; & &; ' C % % A
3 % " " #2 3456 2 = !
.,(,"(("(/ .,,/",+".:
1 4 .,(. 5 7 ! = ( 3 % @ ;7
=3 )*/(-,,,+*-/, . G$ P -(( / -( ! ; "E ( " ( "
( -" 'C (( 0 & %A .
" 0 ( . " (K / "( 'C 'C -(( "
= - " ; "E ( " P
" 5 4 # 6 . 55 PA'U 8 / - " ! - -" ((
" ; . " (( " / - "K " . E
.." ; "E " F- . E ( . / " U 0 (( (
0 " ( / 8P
; " C-" 4 ##H6 = && 8 5 . 5H
; " 4 ##H6 .. 5H <5H@
" 5 4 # 6 . G>
" 5 4 # 6 . GI P ! " G>$ ; " .. -. 'C E ( 0?
0 -" (( !( 8 ( "0 ; & %A
( / " 0 - % " / 8 0 (" P
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 85
15 of 106
81
86 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
& C A " C = ; 9 ;7 4 9 % ? ! #
5 % 42"! 2 " (( %" ##G6 @I >@<>G
" 5 4 # 6 . ##
' 1 = .,(-"(("(( $ 6 96A 4 3 %
@ ;4 .,(0",(",)
" 5 4 # 6 . 5>
" 5 4 # 6 . 5$ P& !-0 0 F- 8 " -( U 0 " (
( - 0/ 8 0 + (/ -8 0 ( ; (-(-
C-" - .( " . (" & 'C .( ( 0
/" . = !-0 U 0P
& ( " C" % (( " '" " U 0 J " G$5? G$> 4 L - "
GGG6 . > @?> G
1 # 9 .,,:",0",. 9 6 A 1 8 B
.,,+",+",+
& ( " C" % (( " '" " U 0 J " G$5? G$> 4 L - "
GGG6 . > H?> G
& ( " C" ! 7 A @ ()+:"()+0 4 L - "
GGG6 . @5
," 0 " U P'C -( 8 /( 0 .( + ( ( MP &
C ( " - + @ ###
& -" P+ ( ( M " ( + " ;- + " "P & / J "8 & )- H
#
) -0( P& "0 0 + " " + ( ( + " P " + " - "
U 0 )" -" %" & ( 0 ( " + " G ##$
P,- + " ( 'C -" (( '( C( 8 = " "0 K
% " P = ? =
" 5 4 # 6 . H
P& 'C , ( " & %A P " ( ; " %" 1 2 "
/ J "8
A ! " P; " A " ( EC( 8 + EP 0 ( / ' ! #
GH$
" 5 4 # 6 . H P >## " (( 0 " ( ( 0
- " 8 -" (( ## ### " K " (( 0 " ((
"" . " " = " " & " 8 / "( " !( 8 (
/ " ( " " . " ! 8 'C & 'C -" " -
( ( " / " (( 0 (( " (( 0
" " ( -" 0 " (-
0( ! ( / ( 3 " ( ! 8 'C - " " ". " .
( . (( " - . " P
+ U 0 6 # .. $< I PC + " ; " C-" -E . 0 0 U 0
/ " - (( ( / " 0 + " E-"0 E ( . ; " -"0 (( (
( % + ." 1 =.( " !-" -E " (
" . ( (/ " " !" 0 / U 0 P
!! !
$ .,(,"(.",(
" = .( & H5H ' 4 GI@63 $ ! 8
>H ' 5 >5@ >@$ 4 ## 6 S ;T
. **/// .! "0* . ( * GH *
P " ; " 'C & %A P & 9 A " )-( 5 ##H "
. ! " I ##H ! 8+
" 5 4 # 6 . G5
& & %A % . " ? - " 'C E " " 0
2 ! " -" (( L ) " (( - %"
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 86
16 of 106
82
87 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 87
17 of 106
83
88 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
4 2 # % ? 3 9 ((1
.,,+
- 0 4 ? 7 4 3 % 6 !1 A 1 =
2 " ( " %" ##> P; / " " 0 - . ( 0 "
." 0" E / " - ( " ( ! 7 - . -" "
! 0 ( / . " (( ( - " (( 0 / "
- 0 -0 " - - / C-" - ( P3 & = 1
$@$ ' -.. II@ 4 GI$6
C- -( K A- -( K 4 ! 7 4
2 " ( " %" ## P ( -0 'C (( -
& %A ( " % ( ( -" P " -" " P /
." ! !-" - 8 /( 0 / /
P (." ? . P . " & / ( " " .. " ( (( 0 (
. " / P
, & " ( 4 = 7 # ! ' ," /
%-!( 0 ," -. GGG P+ " " " " - F-
" " " C-" -E (( 0 . " ( -"
GH# 'C 0 - - !" 8? GI# 'C
"0 % 0 !" -0 " - 'C !- . / "7 "
F- / " " " GH# - -(( = " 0 'C
" "; "P
& %" = ; C ! ., 4 3 &
*1 .,,/ 3 & .:1 .,,/
C- -( K A- -( K 4 ! 7 4
2 " ( " %" ## P& ." !( . " " ; "W P&
" " ! " -" P ' " ( + 0 " ) 8 / GG P /
. " 0-( " " " ." ! 0 - 'C
- (( " " 0 ( = " " . P
+8 + ( PC-" + ; " P # (- ? - ## $ ' !"- " ###
= & ! ' 1 8 4 8 9
3 % & .,1 .,(, ( " . " " / "0 . ! " # #
-" (( " ) " (( 4 GG#6 4 #2 3456 2 7 !
= ? 1C - %" .. = 5#5
-" (( " 3 ) " (( ! 7 4 = ?
= ; 9 GII C -
%"
( " A = = ! 6 74 ' # 3
+ % " !# E GI# 8 0
" ( + P& &"- A " " ."
-( -" P 4 8 ! # G 4@6 ##$ .. @>@<@$H
+ X- ) P ." & " ( " ) -" ( P %
( 5 " GG$
; " / K P) E " )P 9 E . ! " GGH
" ( + P& &"- A " " ."
-( -" P 4 8 ! # G 4@6 ##$ .. @>@<@$H
C "( . P& M?' ( + ' ( 0 ' -( '- " '- ( 0 ' " ' Q
." & " " '- " ' ( %" . P GGI % ( (A "
C "( .3 + / GGI P 8 ( 0 0 0 0 "
." - 2 " 0 - "( 0 - . P % "
9 # 6 % 4 ," -.6 > 4 56 4) - " <' !"- " 6
@>< >53 > 4 @6 4+ " < ." (6 >H< $
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 88
18 of 106
84
89 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
! " G1 !
#" !9! # " G $
& 8 " / !
4 . **/// / 8 / * " (* " ( =. " = !- 6
5: 1 # G1 ! 0 ## 9 "! # ! & #: ! !
1 1! 1 & # ' ! ! $ ! # $ G "9 $
0! : # #! < 0" & 9 0: : ' 0 ! & & " + -"
" .( 8 " ( / "( . (
# 1 & 8 (D+.4K$ 11 ($ K
5! " 8 "! 9 1 #! "
8- ' (D*/
& ($ & K
! / ( "( . (( - ( ! - ; ! ( . !
" 0 /" " " ! - 0 ( " / " 9 :" :'1 !H
# 1 9 ! ! ! " : 0! : & !99!# " ' : "
: 0 ' G1 ! ! 0! : : &! " : : ' # # 0!""! & # ! 9
! 9 ! 1 1 ! . / " ! ( 0
". " . ( 0" .
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 89
19 of 106
85
90 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
# 1 & 8 (-/D*$ 1 (4
5! " 8 #:
8 < 0
,! < ! 0! & 9 !&! "8 "!#< :
# 1 & 8 (D+.D($ 1 ($ )
5! " 8 '1 !# G1 ! ! #:
8 (+ ' (D*K
,! < ! 0! & 9 !&! "8 & ($ & )
. . 0 4. ! "0 "
- / (( ( .6 / +
S ( T S ( T ( ." 0" . . / -" "
-00 ! O " P0 : ! # ?: ! & 1 ! "' G1 9
9 9! ! ' 9 :! > : : 0 " ' : : ! 1 "
0 < ! O " P? 0! 1 :'1 !# " 1>$ 9 !"! & :! $ : 0 "
1!#< 1 1! " ' 9! ! ! O " P : 0 ! # : :
& 0 " & : : 0 " : ! Q<!""Q O " P9 9 !"! &
0 <
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 90
20 of 106
86
91 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
# 1 & 8 (D+*)-$ 11 ($ )
5! " 8 G1 ! !
8 )* 1 (D*(
,! < ! 0! & 9 !&! "8 & ($ & )
8 9 " 1! # ! 9 :'1 !
S ( T / ( -. (- ( . " / -(
." ( " / " / -( 0 "( / / - 8 / " / (
/ -( " 8 -. " / 0 "( -" 0 " / -(
/ " P / J "8P " 0 "( / -" / -( 0 "
-" " "- / / " ! "" - ! S ( T / ( " ""
- "- / " -" . " A 0 (
. ( .
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 91
21 of 106
87
92 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
S ( T! 0 .( / ( . " / /
( " 0 : 0 ! 9 : :! ! ! & !# 0 ! # ! '
0 : ! # : 0 #: : !# " S ( T
( " / / ( " -" ( .
-" " "- -. (- 0 " " / -(
8 0 / / !" ." ( "
# 1 & 8 (K+/D/$ 1 (
5! " 8 O " P
8D "' (D*(
,! < ! 0! & 9 !&! "8 "!#< :
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 92
22 of 106
88
93 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
# 1 & 8 (-KK($ 1 4
5! " 8 ! ! 9 ! 9 '1 ! && ! !"! '
8 < 0
,! < ! 0! & 9 !&! "8 "!#< :
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 93
23 of 106
89
94 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
=. " / F- ( . - ( ( .( 0 ( "
. ( 0 ( . " " ! ( 0 ( " " (- 0 "
0" " / / - / -(
1 . " K " ." ( " .- ! ""' ! $ 9 0 ! ! ! "
1 ! " : " 0 9 ! ! : 9! " 9 : ! ! ' 9 : 0:
0 <! & 9 1 $ :! " ! ! !# " # # $ 0! : # 3 $ 0:!#:
1 "" : # 1 ! 9 : 0 <
8 " - - .. - HH@I .. 5# 5H
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 94
24 of 106
90
95 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
# 1 & 8 (D+44*$ 1 (
5! " 8 !
8( ' (D*+
,! < ! 0! & 9 !&! "8 "!#< :
; . ? 0 . !( . . ? . " (
X ; / " - 8 - ( -( ! " (( ! . Q
J / "8 / " - 0 - ( . (
! . " ( " "-0 / " - "-0 / "
- " .-". ! 0 . " (
X - . -( ! - / . Q
J -0 ! - -( " ( ! - ! 0 "
" " ( " . .( . " -( "( / "-0 -( ! - " "- 0 -" "
. ( . / "8 & :'1 ! ! & :'1 !# : 0 9 !
0 " 1!#< 1 & ' ; # $ 9 0: !&: G# 1 ! ""' &
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 95
25 of 106
91
96 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
; # 9 5: ; # # " !"' 1
X ; - "! !( ." - . / - - (E 8 /( 0 Q
X ; / " . ? . 3 "/ ! Q
X - ( ! 0 - " . / -( "/ Q
/ ! " ( - -" 4. ( (6 0 - (
/ (( 0 " - / (( 0 ! ..( S ( . - T ;S . T F- Q
/ " ! . ?; " ( " " - (E ! " (
." .( Q
/ " -" / -" - ;
- / (( 0 -!1 - = / (( . " " " -" ! Q
" 0 !H ; # ! : 1 # 9 : 0 '1 3 # "
: :! # : ! 1" $ 0 #< ! $ #I
/ ! ; F- " -!1 4- / (( 0 " "/ 6 " (( 0
. " -" - " !" 0 - " " ( Q
/ 0- " ( - " (( Q
/ P ( "P . " E . " ( Q
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 96
26 of 106
92
97 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
8 A 0 (( ( - ( -00
/ " (( F- ! .. " ! ( .
- 0 0 / " ! 0 .( ." 8 " & 8 ! -
.( 1- / ." 0" - - 0
- .-( " " " . " ( ! E
" ! .-!( / (( ! / " / E 0 0 / "8 .
!- " " - ( !( " -
! " " - (( ( 8
- -( ( " "
". . / / E(( (( , "0
. - "0 " 0 ; / = (( -!1 !- " (K
: 9 :!
$ ' 1 3:'1 !# && ! $ "" # "" # ! 9 : ! &
:'1 !H - ( ( ( C" / / ( . " / -( . K
. & P( 8 0 P . " " ! 0 . K . P2 ( -" "
" " " ( ( ( C" / . K - / (( - 0 ( . " E
( "E P & " - (( (."
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 97
27 of 106
93
98 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page 98
28 of 106
94
99 176
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
@ # ! 1 7! & 1:'
3 # ! 1$ ! $ 0 $
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page100
Page 29 of
95
99 176
of106
102
107 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page100
Page 30 of
101
96 176
of102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page101
Page 31 of
102
97 176
of102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page102
Page 32 of
103
98 176
of102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page103
Page 33 of
104
99 176
of102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page104
Page 34 of
100
105 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
1512. Tampering with a witness, victim, or an informant
5 5
5 8 # )($ )+(.
CCCCCCCCCCC@ @CCCCCCCCCCCC
$ ,! !&
%
!"" # $
&! ! '" !
()*+
, # $ (-.+/
000 &&" " ! & 1#
# 2& !" #
-(-3*)43))++
5 5
+/3(.3D+++* 99!# 9 : ! # ! G # ! $ ! 5:! ! # ! 9 11 " 3
, 5 , 5 7 , 56 " >?5@## $? @GJ +/3(.3D+++K. ,,
,, 5 5 5 5
5:! ! # ! 9 11 " $? @G 5 9 ,! !#: "" , 3 >?5@##
59 ,! !#: "" , J3 $? ## 3 #H?@@H@
! !# ! !# 9 $? ?@G3 >?#5GI@3 @?# >>G 5 9 ,!
!#: "" , J #>? II3 #$?@$># #I?# GI
0 " : 9 '" ! !#! " # 7 L )+(.3K.) .( 0
" - -" %( & , 7 0
'" ! 1 -" 5>5 +& # $3 5>@ +& # $J #I ++ # $ !# 9 M :" M
1 ! 9 '" ! 9 M :" M ((.K )+(.3 >$
+ # >3 > G + # >
, # ' 9 " #I? 55H53 >? # $H3 #$?#55@G ?#$?#5@#
7 < 1 #' 9 5: ! !# 9 '" ! $? # >H
INJUNCTION FORFOR
17-0867 MOTION EMERGENCY RELIEF
RECONSIDERATION Page105
Page 35 of
101
106 of176
102
107
106 Wednesday December
Monday
Friday April21,
April 7, 2016
10, 2017
THIS PAGE INTENTIONALLY LEFT BLANK