12

October 22nd, 20014

Duggan, Jake

National Cyber Security Division

Department of Homeland Security

FIELD REPORT #917-406

SUBJECT: Airman Donald Westlake, U.S. Air Force, Kandahar, Afghanistan

TO: SIMON GUPTA, DIRECTOR OF H.S. CYBER-OPS

FROM: J. DUGGAN

Three weeks ago, I was entrusted with a mission coordinated with the CIA and DOD to investigate the possibility of a security breach at Kandahar Air Force Base in relation to the shooting of allied Afghan soldiers and the subsequent death of Airman Donald Westlake, a member of a secret drone aircraft pilot training program directed by the AF in conjunction with the Afghan authorities. An inspection of the physical evidence at Kandahar base barracks showed no signs of network manipulation or intrusion by unauthorized personnel, but there is reason to believe that such evidence, if it exists, was removed prior to my arrival at the base. The suppression of evidence by agents of the CIA and the DOD has led me to believe that the real goal of the DOD was to downplay or otherwise obscure facts or circumstances or activities, involving CIA and/or DOD agencies and/or external forces, that either caused or increased the likelihood of the death of Airman Westlake.

I have also come across anecdotal testimony related by Westlake’s drone teammate, Martin Fisk, since discharged and being treated for PTSD outside Fairchild AF Base in Spokane, WA, to the effect that Westlake did not suffer a combat-related psychotic episode, as described in internal govt documents, but was in fact acting under the influence of Internet-delivered messages, signals, or instructions that may have origins overseas, in the U.S., or both. Interviews and background checks suggest that the source of the signals could be undisclosed experiments by the DOD related to mind control, either defensive or offensive in design and nature, and other viral or Internet-bourne inducements. While I have found no direct evidence linking the CIA or DOD to specific experiments or covert programs that could have produced Pvt. Westlake’s actions in Kandahar, research and backchannel interviews suggest that the possibility is real and cannot be responsibly ignored.

Given the unknown origin, capabilities and distribution methods of these signals, and the magnitude of the potential threat that they represent to American citizens, I strongly recommend the following course of action:

  1. 1. A formal request to the CIA and DOD for all documents and evidence related to the Westlake incident, including interviews with military personnel in Kandahar and in the U.S. who had direct or indirect contact with Westlake and members of his platoon.
  2. 2. A full accounting of all special ops, covert training and mind contro

experiments, involving microwave transmission or any other cyber-techniques applied via computer software components, or that could be transmitted via the Internet, private online networks, or other mobile devices.

  1. 3. A request to the NSA for any and all related data and materials that pertain to this case, including the known defection and/or disappearnce of DOD researchers working on program like the ones described above.
  2. 4. An immediate elevation of this case to the Director of the Department of Homeland Security to flag what seems to be a case of intentional and coordinated inter-jurisdictional abuse and mis-intelligence between the DHS and the CIA and DOD.
  3. 5. If any of the assumptions and conclusions of this memo are true and accurate, it’s possible that the internal and external networks of the CIA, DOD and NSA have been comprised by enemy agents working inside and/or outside the US, which would require the immediate notification of the Director of the FBI and the Director of the National Cyber Security Division.
  4. 6. Permission for this agent to continue the investigation of the Westlake case and all related concerns and potential security and agency protocol breaches with the sole intention of containing and neutralizing any possible threat to citizens of the United States, either now or in the foreseeable future, and to ensure that such a situation is steadfastly avoided henceforth by identifying those responsible and taking immediate and appropriate organizational action.