October 22nd, 20014
Duggan, Jake
National Cyber Security Division
Department of Homeland Security
FIELD REPORT #917-406
SUBJECT: Airman Donald Westlake, U.S. Air Force, Kandahar, Afghanistan
TO: SIMON GUPTA, DIRECTOR OF H.S. CYBER-OPS
FROM: J. DUGGAN
Three weeks ago, I was entrusted with a mission coordinated with the CIA and DOD to investigate the possibility of a security breach at Kandahar Air Force Base in relation to the shooting of allied Afghan soldiers and the subsequent death of Airman Donald Westlake, a member of a secret drone aircraft pilot training program directed by the AF in conjunction with the Afghan authorities. An inspection of the physical evidence at Kandahar base barracks showed no signs of network manipulation or intrusion by unauthorized personnel, but there is reason to believe that such evidence, if it exists, was removed prior to my arrival at the base. The suppression of evidence by agents of the CIA and the DOD has led me to believe that the real goal of the DOD was to downplay or otherwise obscure facts or circumstances or activities, involving CIA and/or DOD agencies and/or external forces, that either caused or increased the likelihood of the death of Airman Westlake.
I have also come across anecdotal testimony related by Westlake’s drone teammate, Martin Fisk, since discharged and being treated for PTSD outside Fairchild AF Base in Spokane, WA, to the effect that Westlake did not suffer a combat-related psychotic episode, as described in internal govt documents, but was in fact acting under the influence of Internet-delivered messages, signals, or instructions that may have origins overseas, in the U.S., or both. Interviews and background checks suggest that the source of the signals could be undisclosed experiments by the DOD related to mind control, either defensive or offensive in design and nature, and other viral or Internet-bourne inducements. While I have found no direct evidence linking the CIA or DOD to specific experiments or covert programs that could have produced Pvt. Westlake’s actions in Kandahar, research and backchannel interviews suggest that the possibility is real and cannot be responsibly ignored.
Given the unknown origin, capabilities and distribution methods of these signals, and the magnitude of the potential threat that they represent to American citizens, I strongly recommend the following course of action:
experiments, involving microwave transmission or any other cyber-techniques applied via computer software components, or that could be transmitted via the Internet, private online networks, or other mobile devices.