Site hosted by Build your free website today!

Counterintelligence, Intel, Domestic Spying, Harassment , Cover Up

Index Page


Agents: An agent is anyone able to provide intelligence that assists investigations. Agents are not members of an intelligence organization or an "intelligence officer."

Black Bag Operation (also "off-net operations"): otherwise known as a "sneak and peek". Some of the tactics, techniques and procedures associated with black bag operations are: lock picking, safe cracking, key impressions, fingerprinting, photography, electronic surveillance (including audio and video surveillance), mail manipulation (flaps and seals), forgery, and a host of other related skills. The term "black bag" refers to the little black bag in which burglars carry their tools."The CIA remains responsible for conducting these highly classified operations overseas, while the Federal Bureau of Investigation (FBI) performs the exact same function inside the U.S. and its territories."(13)

COINTELPRO The FBI (1956-1971): short for Counterintelligence Program to disrupt the activities of targeted groups.

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed "subversive", including communist and socialist organizations; organizations and individuals associated with the civil rights movement.

The program was successfully kept secret until 1971, when the Citizens' Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this information to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hoover declared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.

Covert Tagging Tracking and Locating (CTTL): People with security clearances using signal intelligence technology designated as secret.

CIA's KUBARK Counterintelligence interrogation (1963): chapter: “The Coercive Counterintelligence Interrogation of Resistant Sources” To create fatigue, pain, sleep loss. See: no-touch torture.

CubeSats: small special opertions configuarable satellites for "tagging, tracking, and locating (TTL)."

FBI’s Behavioral Analysis Unit: reviewes a target's case before offering instructions on how to manipulate a target and guide him or her toward a terrorist conspiracy. Example: "FBI’s Behavioral Analysis Unit had reviewed before offering instructions on how to manipulate McDavid and guide him toward a terrorist conspiracy." (17)

FBI's Tactical Operations Suport Center (TOSC): FBI agnets that are involved in black bag operations.

Fusion Center: is an information sharing center, many of wich were jointly created between 2003 and 2007 under the U.S. Department of Homeland Security and the Office of Justice Programs in the U.S. Department of Justice. The ACLU revealed a new "homeland security" industry is flourishing, with lucrative gains going to Lockheed Martin, Raytheon, Boeing, Northrop Grunman and other major defense contractors, despite their reportedly inadequate performance.

Informant: is a person who provides privileged information about a person or organization to an agency. The term is usually used within the law enforcement world, where they are officially known as confidential or criminal informants (CI), [FBI Informant] and can often refer pejoratively to the supply of information without the consent of the other parties with the intent of malicious, personal or financial gain . Example:“...the FBI had built a network of more than 15,000 informants like Anna and the government had classified eco-terrorism as the No. 1 domestic terrorism threat — even though so-called eco-terrorism crimes in the United States were rare and never fatal.” (17)

Manufactured (Domestic) Terrorists: FBI sting operations make jihadists out of hapless malcontents. (18)

National Strategy for Information Sharing or ISE: info that files into Fusion Centers.

“Non-custodial questioning”: can involve law enforcement agents visiting suspects at their home or workplace and disguising, through friendly questions, the fact that they are under investigation. The suspects are not read their Miranda rights, warning that anything they say can be used against them in a court of law.

NSLs (National Security Letters): The FBI issues letters without any judicial review that come with a gag order.

Psy-Ops (Black PSYOP): The purpose of psychological operations is to induce or reinforce favorable behavior to U.S. objectives.

Sensitive Compartmented Information Facility (SCIF): where classified information can be discussed without fear of eavesdropping.

The New COINTELPRO (2001 - Present): Since 9/11, overzealous FBI agents and informants have overreacted to minor threats and ensnared hapless losers in their stings by encouraging, escalating or even creating the very plots they bust under the auspices of counter-terrorism.. Example: trying to link the Occupy (Cleveland) movement to terrorism. Some say it reminds them of the FBI's abuses of power under J. Edgar Hoover, when agents infiltrated political organizations and tried to undermine and discredit activists from Martin Luther King Jr. to John Lennon.

Red Squads (20th century): In the United States, Red Squads were police intelligence units that specialized in infiltrating, conducting counter-measures and gathering intelligence on political and social groups during the 20th century. Dating as far back as the Haymarket Riot in 1886, Red Squads became common in larger cities such as Chicago, New York, and Los Angeles during the First Red Scare of the 1920s. They were set up as specialized units of city police departments, as a weapon against labor unions, communists, anarchists, and other dissidents.

Stingray devices (cell site simulators, IMSI catchers): used by polcie and military, Mimmick cell phone towers and send out signals to trick cell phones in the area into transmitting its location and identifying info.

Cyber-Related Hacking, Tracking, Spying:

Black Hats: hackers that violate computer securiy for personal gain.

Black Hole: in wi-fi, able to crack the encryption keys protecting networks. gives operators "the ability to filter, display, and reconstruct e-mail messages. Used by DoD, national level agencies like the U.S. Special Operations Command.

malware: Your biggest threat to being tracked or spied upon is malware. Executable code, scripts, active content, apps, downloaded software designed to spy on your computer.

Man-in-the-middle: more common then "evil twins" can intercept messages between two parties while in range of an unencrypted wi-fi access point.

Evil Twins: Fake wi-fi access points. If you connect the perp can eavesdrop or direct you to fake web site.

Anti-Terror Bureaucracy, Extraordinary Rendition, Torture

Terrorism Information and Prevention System (Operation TIPS) : was a domestic intelligence-gathering program designed by President George W. Bush to have United States citizens report suspicious activity. The program's website implied that US workers who had access to private citizens' homes, such as cable installers and telephone repair workers, would be reporting on what was in people's homes if it were deemed "suspicious." Information provided would be kept on a Justice Department database, which will then be broadly available within the department, and to state and local agencies and local police forces.

Terrorism Liaison Officer: A Terrorism Liaison Officer is a public citizen in the United States of America who has been trained to report suspicious activity that may be encountered during the course of his or her normal occupation as part of the United States' War on Terror. While some of these individuals are members of local law enforcement agencies, others such as paramedics, utility workers, and railroad employees have also been recruited into the program.

Covert Human Intelligence Sources (CHIS): are Agents, also known as Citizen Informants.

Black Site: In military terminology, a black site is a location at which an unacknowledged black project is conducted. Recently, the term has gained notoriety in describing secret prisons operated by the United States Central Intelligence Agency (CIA), generally outside of U.S. territory and legal jurisdiction.

Targeted Killing: is the premeditated killing of an individual, by a state, organization or institution, outside a battlefield. The legality of targeted killing is disputed.

Electric Torture: torture administered using electric shock. Example 1: "I could tolerate the pain of being beaten and even having my toenail pulled out, but it was the electric shocks I was terrified of” These were administered by electrodes placed inside the ears. Chum Mey is def in one ear as a result and says he hears sound of rushing water when he moves his head. Example 2: Torture techniques used in Algeria then other means, such as electric shock was made possible by generators used to power field radio transmitters, which were extremely common in Algeria. Electrodes were attached to the prisoners ears and testicles, the electric charges of varying intensity were turned on. (11)(12)

'Kill List': A rationale for murdering suspect citizens of countries with which the United States was not at war. The list began under the Bush regime. President Obama expanded the scope of the list to include the execution, without due process of law, of U.S. citizens accused, without evidence presented in court, of association with terrorism.

Patriot Act: Post 9-11-01 legislation criticized as being unconstitutional.

FISA Amendment Act: provided congressional sanction for the secret and illegal warrantless wiretapping program initiated by the Bush administration in 2001. The legislation explicitly allowed the NSA to conduct dragnet surveillance of international communications by Americans. Conceivably it has opened the door to abuses of power and unwarranted surveillance. It is being compared to the East German Stasi (Ministerium für Staatssicherheit, MfS).

PRISM (surveillance program): is a clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) since 2007. PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN


On September 11, 2007, U.S. President George W. Bush signed the Protect America Act of 2007, allowing the NSA to start a massive domestic surveillance program. The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[citation needed] Its existence was leaked five years later by NSA contractor Edward Snowden, who claimed the extent of mass data collection was far greater than the public knew, and included "dangerous" and "criminal" activities in law. The disclosures were published by The Guardian and The Washington Post on June 6, 2013.

US Special Operation Command (SOCOM): overseeing special operations for military branches. Part of the DoD.

Electronic (Covert) Harassment, Gang Stalking, Targeted Individuals (TIs), Human Experimentation

Active Shooter: A term created by the DHS to describe mass shooters, mostly lone wolfs. Some active shooter's such as the Navy Yard shooter (2013) claimed electronic harassment, DEW torture. See: Non-lethal weapons, Targeted Individual (TI).

Behavioral Conditioning Experiments: The U.S. Government's non-lethal weapons are being used in a type of psychiatric/medical experiment that tries to change human behavior by remote. The team doing this experiment consists of a few psychiatrists, psychologists, neuroscientists, computer experts, military leaders... This experiment started out as way to perfect the super soldier technology [Future Force Warrior, Future Combat Systems]. Specific frequencies (called "classified" are set aside by the Department of Energy for military/experimental use). Alleged U.S.Air Force invlovement.

Gang Stalking: A target (TI) is followed around and placed under intrusive and directed surveillance by groups of organized “Covert Human Intelligence Sources” also known as Citizen Informants.

Gaslighting: a type of psychological warfare through manipulation making a victim doubt his or her sanity. (19)

MK Ultra: Human experimentation, mind control program by the CIA during the 1950s to 1970s that included drug induced hypnosis, electronic torture, and radio frequency neural contact with unwitting human targets.

Project Pandora: A CIA program to determine the purpose of microwaves bombarding the Soviet embassy by the Russians starting in 1962.

Non-lethal Behavioral Influencing Technologies: Highly classified non-lethal weapons experiments, using civilians, or others, that couple neuroscience, computer to brain interface, satellite based transmission, and radio frequency and ELF. From USAF documents, the writings of Professor Peter Phillips, Dr. Nick Begich, and Carole Smith.

Organized Stalking: clandestine vigilantism.

Psychotronic Torture: a combination of psychological torment and technological terror.

No-Touch Torture: Is a form of PT (psychological torture) described in the CIA’s KUBARK Manual and used in rendition camps, Guantanamo bay.

Raytheon Blackbird Technologies: Surveillance and cybersecurity company. Well known to special operation forces (SOC), spies, organizations that support the DoD. Makers of tagging, tracking and locating (TTL) systems (hacking without a trace amongst other secret tracking activity). According to James Lico Blackbird Technologies Corporaion makes secret Signal intelligence technology used in covert harassment. Companies like Blackbird "aren't subject to the controls and regulations the government or even quasi-government organizations get." (15)

Cobham Plc: a British firm supplying American special operators with TTL gear.

Synthetic telepathy: an NSA "whistleblower" in a 1992 federal lawsuit contended that land-based technologies can now isolate a person's individual neural frequencies and can remotely connect to the brain. This link, according to the suit, enables synthetic telepathy, manipulates the centural nervous system.

Tag: something attached to the person or object to be loacted and/or tracked. The tag increases it's ability to be detected or its probability of indentification by a surveillence system attuned to the tag. The U.S. military uses both active tags, including radio emitting tags, and passive tags such as radio frequency indentification (RFID) tags.

Targeted Individual (TI): A person being targeted, harassed using no-touch torture methods including directed energy (DE).





4. ,





9. 21st Century Behavioral Conditioning Experiments/hiding under words like "classified" To: Sen. Claire McCaskill ,

10. 1996 USAF report no. 2025.

11. How two men survived a prison where 12,000 were killed

12. Torture techniques used in Algeria. - Other testimony and descriptions


14. FBI Manufactured Terrorist

15. Wired: Manhunt Inc.: Firm 'Tags' Terrorist For Special Ops, 05.08.11

16. Re: FBI Watch

17. An FBI Informant Seduced Eric McDavid Into A Bomb Plot. Then The Government Lied About Itby Trevor Aaronson, Katie Galloway