You are on page 1of 10

THE BLACKFILE

"TM"

Wednesday, April 03, 2013

[Last updated: 04.03.2013, 12:30 PM PST]

Bob Levin BobLevin.writer@gmail.com www.BobLevin.org


Former U.S. Intelligence Professional and FBI/Blackops Whistleblower Standing for the Human Beings

Inv estigativ e & Undercov er Journalism Consumer Protection A ctiv ist for Whistleblower Patriots, Human Rights Victims and Blacklisted Indiv iduals
DBA: BobLevin.writer TM The Blackfile TM Gladiator of the Wok

Robert Dov Levin "Bob", 11918 SE Division Street, Ste 293, Portland, Oregon 97266-1037

Manife stos Food Rev iews Whistleb lowe r Rep orts Unlawfu l Tra de P racti ces Compl aint s Stories TM TM & 2013 Bob Levin, Investigative Journalist. All Rights Reserved.

Cointelpro Cyber Targeting and Electronic Surveillance using Roving Bug Applications.

The Jewish Holocaust never ended. It returned to its eugenics roots in America under "Operation Paperclip" along with 1500 Na zi SS war criminals to become the CIA MK-ULTRA Program, the "Manhattan Project" of mind control and "brainwashing" employing involuntary human test animals within the tentacles of 250 black subprojects. The resulting harm sired the four principle components comprising the CIA Torture Paradigm and the erosive formulas for covert and overt acts of PsyOps terrorism and "no touch" invisible physical torture that remains sanctioned against specific and randomly targeted individuals. This matrix for systematic systemic genocide and negat ive eugenics is self-perpetuates by these ongoing black projects that migrate beneath the clandestine mud of evolutionary change to shed their outer shells like Chesapeake Bay bluecrabs to emerge later as newer versions of the same godless atrocities while leaving behind the empty places of their past existences like riddles trapped in mysteries and wrapped in enigmas. - Bob Levin

Saturday, March 30, 2013 [Last updated: 04.03.2013, 12:30 PM PST] Blackfile Intelligence Report, No.: 0172 Cointelpro Cyber Targeting and Electronic Surveillance using Roving Bug Applications. Screenshot: My smartphone was hit again with what used to be called a "roving bug" application to either lock-up and/or scramble my screen and neutralize my call and/or ability to communicate with others I was previously able to reach. Often this occurs during critical times. Given the repeated frequency of occurrences over the past thirteen years, these acts constitute "no touch" invisible physical torture with a mask of plausible deniability. Notice the illuminated green band of light at the top. These electronic sanctions by the terrorist jackals within our government, will sometimes shred the screen's appearance and make it completely unreadable. This also makes the device very difficult to reboot. Notably this will occur, after communicating with clandestine federal agent contacts concerning the degree of classified government business that still concerns me. The jackals want to subvert that process or let me know they are conducting warrantless surveillance or illegal reverse targeting under FISA. That said, typically other companion sanctions will occur simultaneous while those who politically sanction whistleblower patriots commit their treasonous covert and overt acts of torture and terrorism; ref., *see addendum below.

This stuff is second nature to me and I probably speak of it too readily while forgetting many people do not know about these technologies. When I was employed by the FBI, new technologies

were always being used and came with various trade craft names like "F-bird" for a concealed digital body recorder that was downloaded into a computer and a classified secretary would produce a transcript that I hated having to proof in real-time using tapes on a high-end tape recorder with multiple filters and that was also used for court ordered wiretapping and training agents and taskforce officers who were cross sworn to work federal matters. In the latter case they would listen to me operate a wiretap and not know that I was a good guy. They would listen while I contacted criminal targets to setup controlled drug buys and illegal weapons purchases or to conduct reverse investigative techniques to solicit a criminal act within the scope of the investigation. These "F-birds" came in all manner of shapes and configurations, a metal can that used wires with flat metal ends as speakers and could record a whisper across a room provided you were standing still. Others were flat and shown inside belts and clothing with special flexible batteries that last 12 hours or longer...I laugh when automakers say they don't have battery technologies to make a really long range electric car. Other applications where found inside cellphones that I sometimes altered with black electrical tape cause the red lights inside could be seen blinking. There were other tradecraft investigative techniques that I won't include here. These program names change as did the two before "roving bug" applications, which can see through a phone camera, hear everything said into or around the phone...even when turned off and can only be defeated by removing the battery from the phone. The telltale signs that a "roving bug" application is being used for erosive "no touch" invisible physical torture sanctions, is "rapid battery depletion". This might occur when you call-in for a radio interview and say hello with a full battery charge and the cellphone/smartphone goes dead, locks-up or scrambles the screen, it will cause apps to open, and in this case produces the green illuminated band of light at the top while and/or after having been speaking with someone THEY either don't want you speaking with, want you to know they know you are talking with or both. A fractionalizing tactic. There was a program produced by "J-Star" or a black project subsidiary that would triangulate cellphone signals with satellites and cellphone towers to locate anyone using a particular cellphone or simply having that handset with them. GPS and IP addresses work the same way. Everything that can be wired to the electronic spider's web called the internet, has been. Even electrical power meters, which are now digital "smart meters", are probably able to do more than we already know while currently detecting our use of every electronic device in the home and business. Smart meters are also being used by power companies to spirit away fees from the consumer public for energy not used and based on estimated use. Allegedly the power companies, like PGE, are unable to budget their own business activities to compensate for their slow season. Under the color of larceny, PGE extorts warrantless funds from the consumer, which the Ernonistic power company, then compounds same with the interest gained. PGE knowingly pick pockets these funds from a victimized public. Again these programs are constantly being modified and given new names. The PROMIS [used by most courts and law enforcement agencies - perfect for clandestine harvesting to use in ongoing illegal Cointelpro operations] software was stolen by Reagan and Ed Meese and sold illegally under different names with CIA back doors installed, to other nations and intelligence agencies via acts of espionage, is also a story that some have been assassinated for researching as "the octopus" and "operation octopus. When the designer of the PROMIS software complained to Meese and the Reagan administration about not being compensated for his software program and objecting to its theft, the administration and USAG, Meese charged the owner with income tax

evasion and he received a 39 year federal prison sentence. And people wonder why USAG Eric Holder doesn't prosecute the Banksters and Wall Street foreign and domestic terrorists. Government documents have been declassified and I'm looking into these as time permits, but all should know that Reagan and Meese were both heavily mobbed-up too. Even current FBI Director Bob Mueller, while a U.S. Attorney in Boston, Massachusetts, is alleged by sources close to the FBI to have been actively engaged with the Irish Mafia and James Joseph "Whitey" Bulger, Jr. There is another "sock puppet" software program developed for the U.S. Pentagon that has since been reversed on the people and deployed on FEDbook and elsewhere that allows a cyber agent to perform an online Cointelpro operation to fractionalize synthetic social media groups and individuals by posing as ten different fake personas simultaneously - a cyber gang of ghosts to prey on their unsuspecting victims. Then there is illegal reverse targeting under FISA where they can paint an innocent citizen as a terrorist suspect by having that target's communications monitored by a federal intelligence agency's surveillance network, then have an overseas asset call that target with hostile Islamic rhetoric against the U.S. and in a manner that appears he knows the innocent party to paint same as again, a terrorist suspect...another form of ongoing illegal Cointelpro. I'm dated and much of this is old school already, just like a CIA machine a guy I know took home when he retired. This machine can produce a letter from the bottom page of a legal pad form what was written on the top pages. Should you handwrite something sensitive, it is best to write with one sheet of paper on top of glass. Stingray probably came from the J-Star programs we used. Cloning a person's electronic equipment is equally a simple matter, so an agent in NY could watch, listen to and tamper with the communications of someone in California. Cointelpro has metastasized, the program might have officially ended, but like these software programs with evolving applications and changing names, the illegal fractionalizing operations and tradecraft have never stopped. end References of possible interest: http://online.wsj.com/article/SB10001424053111904194604576583112723197574.html http://www.defenseindustrydaily.com/cyberwar-department-defense-doctrine-response-06931/ http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks

ADDENDUM: Tuesday, April 02, 2013 Screenshot of a cyber Cointelpro agent and/or "sock puppet" false persona. Simultaneous and multiple political sanctions in keeping with the four principles of the CIA Torture Paradigm outlined below from my notes. Another boring cyber jackal soon to be blocked! However he obviously has a fondness for Dick; ref., my April Fool's Day spoof about Dick Cheney. Discovered important emails that were sent had never reached me. Tonight with my numbers having been included on the "Nation Do Not Call Registry" and after previously discussed my communications being sanctioned earlier, my smartphone rang and an automated message in a command voice said, "This is the Nextel System and we'd like to discuss telemarketing...", I laughed and disconnected.

Commentary notes from an exchange of questions and answers regarding electronic surveillance and counterintelligence reverse tactics, techniques and technologies that have employed CIA/Pentagon software programs that allow one cyber agent to simultaneously pose as ten different "sock puppet" false personas. This for the purpose of fractionalizing specific and randomly targeted individuals through synthetic social media websites. Anyone who stands for genuine democracy and opposes the corporatist agenda, which is to process the total aggregate of the world into a commodity and an end to perpetual wars for profit, will find themselves in the crosshairs.

Answer: These electronic sanctions routinely include a peppering of covert and overt attacks that target my communications; e.g., Deleting important emails before I receive them or instantly before my eyes when I just open them. Disrupting my Facebook account while requiring computer access to remedy when travelling with only a smartphone. Terminating my Yelp accounts for erroneous or no reasons given and/or their bot technologies populating images posted by me 4-8 times in the same location to activate the spam tripwire as a reverse sanction. This because I use to interface Yelp with Facebook's log-in information that expands the reach and sanctions of Facebook's admitted "use of BOT Technologies" they employ as an NSA intelligence contractor. Facebook/FEDbook's corporate personhood and their shield of selective prosecution and legalized criminality, gifted by USAG Eric Holder, also included this billion dollar corporation receiving corporate welfare in the form of millions of dollars in tax breaks. Meanwhile the rank and file of our nation are increasingly recognizing a holocaust within death camp America. Spamming me from outside the United States with emails or internet phone calls, allegedly from Muslims wanting to send my millions of dollars as a donation to my cause or speaking to me in Arabic with hostile rhetoric towards the United States, all of which triggers the NSA tracking stations to paint me as a possible terrorist, trap and monitor my communications under the color of warrantless wiretapping and illegally reverse target me under FISA. My evidence is irrefutable as to having been outed multiple times with a clandestine NOC clearance by known culpable government actors who disseminated leaked classified government documents to an entity of the German government. This through multiple acts of espionage against the United States, via an active mole and U.S. federal agent directly under control of the White House. This traitor remains protected by the complicit USAG Eric Holder. The evidence will addi tionally show that I have been subjected to warrantless wiretapping, sneak and peek searches, ongoing illegal Cointelpro operations, and significant attacks using Electromagnetic Pulse Radiation [EMP] against my electronics, home, vehicles, person and family. Lastly Google, Inc. that has remained actively engaged in monitoring and trapping emails for the NSA, has also been not populating my websites under most related search tags - a separate complaint was filed with the CFBP, SEC, ORDOJ, and my Webhost. Question from Coleen Rowley: Let me know if you devise a test to determine who the "false personas" are? Answer: Reference the Facebook screenshot above as one example. Answer: I've picked them out before by certain earmarks, which are one or two word responses with the color of causing you to argue a false negative or to actually do so, as a means of fractionalizing your mission and to consume precious time. They attempt basic reverse investigative techniques to try and cause you to bite on a poison chew-bait for use against you later. That entails seemingly rational opinions being espoused throughout a block of copy with often the trap inserted near the last sentence, which can solicit a conspiracy. I've found that a number of these cyber jackals or false personas, will come on as new friends for a period of time and then throw you a curve-ball that makes me block them. More blatant acts have included having me electronically sign a petition and then the actor change the entire content to something delusional. In other cases an actor friended me as a male, then changed all the photos and persona to female. Sometime later they attacked. Another dummy caused me to block him under one name, then approached under a new account and name, but forgot he used the exact same images placed in the same order. Answer: Always be alert of those who attempt to shame our logical cognitive process when they espouse something cousin to having the singular answer for all people. Most often this recognizes the terms I've spoke of previously; i.e., counterintelligence reverse tactics or reverse investigative techniques. Those who perform in this manner are most likely cyber agents attempting to fractionalize individuals and groups who stand in the way of the corporatist agenda to process the total aggregate of the world into a commodity. In short they are vermin and cancers among the healthy body of humanity. Answer: Genuine Whistleblowers and Truth Tellers like Coleen Rowley, Julia Davis, BJ Davis, Cathy Harris, Ann Wright, Daniel Ellsberg, Cindy Sheehan, Debra Sweet, Dr. Vanda Shiva, Sherry

Jackson, Jesselyn Radack, Howard Zinn, Noam Chomsky, Susan Lindauer, Russ Baker, Ed Asner, and the others both named in tribute on my websites or yet named, are all equally recognizable as selfless heroes, patriots and genuine human beings. However as a compare and contrast we should keep on mind that if there are war profiteers, there are also peace profiteers and likewise whistleblower profiteers who shall go unnamed here. Complacency with the legalized criminality and war crimes of our outlaw government, only prostitutes genuine American democracy as the fruit of the poisonous tree, which grows from the three branches of this corporatist government. The theory by some that secrets are something sacred, is defeated when clandestine federal agents of the federal government, are outed by jackals in political retribution and thereby sanctioned for assassination. Meanwhile USAG Eric Holder remains a complicit actor within the continuing criminal enterprise that has destroyed our nation; lest we forget that Obama has turned out to be even worse than Bush! That is not the America that I twice bled and once died for with an out-of-body experience, before my recovery and relearning to walk a second time. Answer: Sorry this stuff is second nature to me and I probably speak of it to readily while forgetting many people do not know about this stuff. When I was in the FBI, new technologies were always being used and came with various trade craft names like "F-bird" for a concealed digital body recorder that was downloaded into a computer and a classified secretary would produce a transcript that I hated having to proof in real-time using tapes on a high-end tape recorder with multiple filters and that was also used for court ordered wiretapping and training agents and taskforce officers who were cross sworn to work federal matters. In the latter case they would listen to me operate a wiretap and not know that I was a good guy. They would listen while I contacted criminal targets to setup controlled drug buys and illegal weapons purchases or to conduct reverse investigative techniques to solicit a criminal act within the scope of the investigation. These "F-birds came in all manner of shapes and configurations, a metal can with wires with flat metal ends that were speakers and could record a whisper across a room provided you were standing still. Others were flat and shown inside belts and clothing with special flexible batteries that last 12 hours or longer...I laugh when automakers say they don't have battery technologies to make a really long range electric car. Other applications where found inside cellphones that I sometimes altered with black electrical tape cause the red lights inside could be seen blinking. There were other trade craft investigative techniques that I won't include here. These program names change as did the two before "roving bug" applications, which can see through a phone camera, hear everything said into or around the phone...even when turned off and can only be prevented by removing the battery from the phone. The tell tail signs of the "roving bug" application being used as a sanction is "rapid battery depletion" like when you do a radio interview and say hello with a full battery charge and it goes dead or with the smartphones they can lock-up the screen and it causes apps to open and produces light changes like the green illuminated band at the top or scrambles the screen while or after talking to someone THEY either want you to know they know you are talking with or that they don't want you to talk with or both. There was a program produced by "J-Star" that triangulated cellphone signals to locate anyone using a phone...GPS..IP addresses all the same. Again these programs are constantly being modified and given new names. PROMIS software stolen by Reagan and Meese and sold illegally to other nations and intelligence agencies under different names with CIA back doors is also something some have been assassinated while researching "the octopus" and "operation octopus. Documents have been declassified and I'm looking at those as time permits, but Reagan and Meese were heavily mobbed up too. There is another software program developed for the Pentagon that has since been deployed on FEDbook and elsewhere that allows a cyber agent to perform an online Cointelpro operation to fractionalize synthetic social media by posing as ten different personas simultaneously...a cyber gang of ghosts to prey on their unsuspecting victims. Then there is illegal reverse targeting under FISA where they can paint an innocent citizen as a terrorist suspect by having that targets communications monitored by a federal intelligence agency's surveillance network, then have an overseas asset call that target with hostile Islamic rhetoric against the U.S. and in a manner that appears he knows the innocent party to paint same as again, a terrorist suspect...another form of ongoing illegal Cointelpro. I'm dated and much of this is old school already, just like this CIA machine a guy I know of took home when he retired.

This machine can produce a letter from the bottom page of a legal pad form what was written on the top pages...should you hand write something, it is best to write with one sheet of paper on top of glass. Answer: StingRay I and II, probably came from the J-Star program we used. Also forgot about cloning a person's electronic equipment so an agent in NY could watch, listen to and tamper with the communications of someone in California. About Cointelpro, the program might have officially ended, but like these software programs with evolving applications and changi ng names, the illegal fractionalizing operations have never stopped.

Reference: http://online.wsj.com/article/SB10001424053111904194604576583112723197574.html Answer: Historically, I scored at highest possible positive end of my government psych-eval, a perfect score in an extensive word comprehension test, tied for the highest score and top spot in my academy class, and dated two girls in my youth who were Mensa members, but for me and it hindsight on some level, it felt too much like the CIA shills who kept trying to have my parents enroll me in a special government program for "exceptionally gifted and talented children with clairvoyant potentials" aka CIA MK-ULTRA. Answer: Sorry you are having that problem, but I'm sure there is a fix. Sometimes plausible deniability is banked on by these idiots, to cause the willing suspension of disbelief against recognizing ourselves as being sanctioned, but it is the repeated frequency of occurrences that makes it a form of "no touch" invisible physical torture under the four principles of the CIA Torture Paradigm. Specific and randomly targeted individuals are sanctioned with micro and macro concentrations of the fractionalizing formulas that mirror something cousin to evolved McCarthyism and Cointelpro operations, which have continued even after the program officially ended. You might also contact your smartphone provider. When a system or firmware update occurs, it can also sometimes change internal settings for better or worse. There is one setting that if activated will repeatedly turn on 4G, WiFi and other things. Sprint is the only provider with truly unlimited data without a cap. I'm happy with them after fighting the drecks at T-Mobile USA,

Inc., a bankrupt German corporation that engaged in multiple acts of espionage against the United States via the dissemination of leaked classified government documents while outing a clandestine NOC agent of the federal government; i.e., Bob Levin. Personally I use Skype, no their VP in NY and have a Skype international number with unlimited coverage that forwards to my smartphone. With a number of sources around the world, I'm sure the NSA has stocked up on "Preparation H" from the times I've been able to throw four knuckles in their buckets with the truth. Answer: No one other than our government will insure a nuke plant and they do that through corporate welfare and subsidies. They increased the REMs before burn out for nuke plant workers, because life is less value than $$$$ to these three headed monsters with six hearts. My orthodox rabbi, a vegetarian friend who shares my passion for growing Egyptian figs, grapes and tomatoes, during WWII was part of the "Manhattan Project". Also one of my professors too. Both taught me that in scientific terms, radiation does diminish, but it is incalculable during a human lifetime. One nuke plant on a river, is a favorite spot for some fisherman, because the water temperature is higher, and the fish seem to congregate near the water-pipes...nuts! Answer: We are all being used as involuntary human test animals within a rapidly materializing physical reality from a virtual death camp environment that recognizes an American holocaust. Our corporatist government, its congressional capos and their pimps within the global criminal octopus consuming the world of human beings, are the creators and perpetuators of torture, terrorism and systematic systemic genocide for negative eugenics! Everything happening is a statistical calculation on the PsyOps chessboard and meant to psychologically herd [counterintelligence reverse techniques] the individual and humanity to a desired square where the jackals are already waiting. One day our world is going to explode in their faces when the rank and file of humanity have nothing left to lose, but their lives and after recognizing that the most affective soldier is the one willing to die in the process of neutralizing their enemies. This is more the actual reason why government actors are trying to manipulate gun control laws. They are destroying the planet, the rank and file of America and anticipating a revolution. We the People must be prepared to implement a restorative revolution under the lawful terms of the U.S. Declaration of Independence. Answer from my writing notes: The "CIA Torture Paradigm/Matrix" consists of four principle parts that often overlap with applications: 1. Causing Self-Inflicted Harm; 2. Sensory Disorientation; 3. Attacking Individual Fears; 4. Attacking Cultural Identity. This includes what has been coined as "no touch" invisible physical torture. The primary earmark of CIA Torture Programs is causing self-inflicted harm with a variety of intended meanings. The resulting harm is systematic systemic genocide for negative eugenics. [1.] Causing Self-Inflicted Harm: The Primary Earmark of CIA Torture Programs, Mental Illness, Post Traumatic Stress Disorder [PTSD], and Suicide; etc. [2.] Sensory Disorientation: Light, Temperature, Sound, Voice to Skull [V2K] Devices Defined By US Army as NLW that use a specific sound frequency range to transmit message through the bones of the human skull, Direct Energy Weapons, Electronic Harassment, Telephonic Harassment, Weaponized Neurological Technologies, Gunfire, Loud Noises, Horns and Sirens, Repeated Ad Nauseam Stimulus or Subliminal Messaging scientifically proven able to permanently alter the human nervous system and change the chemistry of the brain aka Mind-Control or Brainwashing; etc. [3.] Attacking Individual Fears: Personal and Family Safety, Psyops Terrorism and No touch Invisible Physical Torture under the constant Threat of Death, Psyops, Brain Fingerprinting, COINTELPRO is an acronym for Counter Intelligence Program with ongoing operations conducting illegal fractionalizing practices since 1956 and which potentially enlisted the additional federal asset of the FBIs InfraGard Program created in 1996. Counterintelligence Reverse Inve stigative

Techniques, Psychological Herding, Fox and Hound Exercises [not to be confused with the subversive Anti-TI Activist myth of gangstalking or the legal definition of the stalking statute]; Harassment; Physical Assaults; Inappropriate Touching or same with recognizable False Apologies that might include a repeated frequency of occurrences while shopping or waiting in a line somewhere when an actor touches your bottom. Using Convicted Criminals released from prison to conduct deliberately visible and non-visible surveillances on former members of Law Enforcement who previously assisted in that criminals prosecution, to affect Political Retribution against the Targeted Individual [TI] and Government Whistleblower through COINTELPRO operations in conjuncture with the CIA Torture Matrix/Paradigm as an applied Clandestine Neutralization Campaign, which includes the prevention of gainful employment, separation from professional degrees or the completion of same while illegally disenfranchising the TI from all entitled state and federal constitutional civil liberties and inalienable human rights. The full version of the Blackfile Summary Report will include a 1994 COINTELPRO pseudo successful assassination attempt and conspiracy to commit illegal Cointelpro operations within the DEA, FBI and CIA on U.S. soil, before, during and after my employment with the FBI. Note: Gangstalking is a myth supported by Anti-TI Activist that know or should have known subverts current and previously documented historical evidence of U.S. Government culpability for ongoing COINTELPRO operations. The winning legal strategy for a restoration in the lives of targeted individuals is the reopening a 3rd Congressional COINTELPRO investigation with the appointment of a Special Independent Counsel possessing subpoena powers for obtaining classified government documents that shows a specific harm to a specific person by a specific federal agent. With this real evidence, the affected TI has laminated a winnable lawsuit that should harvest a meritorious restorative settlement. [4.] Attacking Cultural Identity: Anti-Semitism, Racial Discrimination, Gender Preference; etc. Individually these acts might seem commonplace, but when laminated together with a constant or nearly constant frequency of cyclical reoccurrence, these applications on multiple levels recognize the ingredients that become no touch invisible physical torture and terrorism often produced with the constant fear of death various tactics, techniques and technologies. Medical science recognizes that repeated stimulus alters the human nervous system and can permanently change the chemical neurology of the human brain. There is no more science fiction, everything has been manufactured or is already on the drawing board.