To whom it may concern:

My name is and I wanted to make your organization aware of some ongoing and egregious criminal violations.

Illegal audio and video surveillance

• Personally detected several audio listening devices in my house by using a RTL-SDR. They were unencrypted and found in the 20-40mhz channel.

• These devices are referred to as providing “light”. The homes of participants can be located easily via signal emanation. This is true regardless of whether or not the device is encrypted.

• I assume that they are use for both offensive and defensive purposes.

• Monitoring appears to be continuous.

Augmented Reality Game (DIA lead, entire IC involvement) “Deep State Training”

• Design goals

o Styled after 1984, likely to “teach a lesson”

o “Teaching lessons” to unwilling participants appears to one of the primary functions of this program. They go so far as to associate the illegal programs with the church.

o This allows for the use of psychoactive chemicals and programming techniques to be seen as “The presence of God”.

o It is also called “love” with great frequency. For instance, a undercover pair of individuals are referred to as “lovers” regardless of whether or not they are romantically associated.

o Already indoctrinated families utilized to create a “Pool” of people that can be utilized for intelligence gathering or, much more often, communicate information that they themselves are unaware of. This represents the successful completion of the design goal of the MK series of projects.

o Common steganographic communication methodologies that the pool is used for:

 Car / License Plate codes

 Used to find individuals with strong facial similarity to an individual information is being communicated about.

• This even goes so far as to be the origin of the “Meme Man” head. This is a blank biometric template for facial recognition.

• DIA consistently orders wildly unethical actions to be preformed on unwilling and unaware human subjects under the guise of “training”.

• These actions are monitored by a remote operator with the unaware subject being, in certain instances, issued commands remotely.

• These remote operators can, and have, issued commands to unknowing subjects in order to entrap them. The hiding of this information behind DoD associated parties appears to be designed to circumvent Brady disclosures.

• FBI appears to be fully aware of this program, as it produces undercover operatives for them.

• HEAVY law enforcement corruption

o Deliberate criminal violations against subjects seen as part of the game

o Criminal Informants (CIs) put under military observation

o Blackmail used to “control” and abuse informants

o CIs are also subjected to the programming outline below once they are “under control”

• Use of the National Guard Program to obfuscate the above operations appears to be extensive.

Sharing of classified materials

• Steganographic methods utilized to communicate “metadata” about what would otherwise be restricted information over the open internet.

The programming of children

• Programming begins at a very young age

• There are programs that existed and still exist in Florida that target high IQ children in order to create assets. These children are colloquially referred to as “Frank’s kids”.

• The result is the ability to create human “telephones”. This is appears to be a continuation of the research started in Artichoke.

• Similar conditioning methodologies are utilized to enhance combat effectiveness in the Armed Services.

• Family based controls modeled after the systems that were initially created in Grillflame.

• The National Guard infrastructure helps obfuscate this participation.

Naval participation

• Direct law enforcement connection, military observation

• Responsible for the sale and distribution of narcotics

• Presumably designed to regulate the underworld

• This appears to be directly related to dealings with foreign governments and appears to be associated with the CIA

• “Deep blue”

Marine participation