Friday, June 5, 2015

Pentagon’s PSYOPs: Information Warfare Using Aggressive Psychological Operations

Information Operation Roadmap Part 4
The Pentagon’s plans for psychological operations or PSYOP in the global information environment of the 21st century are wide ranging and aggressive. These desires are outlined in the 2003 Pentagon document signed by Donald Rumsfeld in his capacity as the Secretary of Defense called the Information Operation Roadmap.
More detail about the origins and purpose of this document can be read in the first part of this series here. Also, a description of the Pentagon’s desire to dominate the entire electro-magnetic spectrum and their need to “fight the net” as outline in the Information Operation Roadmap were previously described.
What is a PSYOP?
A PSYOP is not specifically defined in this document but it does provide some insight into the wide ranging activities that are considered PSYOP.
“The customary position was that “public affairs informs, while public diplomacy and PSYOP influence.” PSYOP also has been perceived as the most aggressive of the three information activities, using diverse means, including psychological manipulation and personal threats.” [emphasis mine] – 26
“One result of public affairs and civil military operations is greater support for military endeavors and thus, conversely these activities can help discourage and dissuade enemies, which PSYOP does more directly with its own tactics, techniques and procedures.” [emphasis mine] – 10
“PSYOP messages disseminated to any audience except individual decision-makers (and perhaps even then) will often be replayed by the news media for much larger audiences, including the American public.” [emphasis mine] – 26
“A PSYOP force ready to conduct sophisticated target-audience analysis and modify behaviour with multi-media PSYOP campaigns featuring commercial-quality products that can be rapidly disseminated throughout the Combatant Commanders area of operations.” [emphasis mine] – 63
“PSYOP products must be based on in-depth knowledge of the audience’s decision-making processes and the factors influencing his decisions, produced rapidly at the highest quality standards, and powerfully disseminated directly to targeted audiences throughout the area of operations.” [emphasis mine] – 6
“Better depiction of the attitudes, perceptions and decision-making processes of an adversary. Understanding how and why adversaries make decisions will require improvements in Human Intelligence (HUMINT) and open source exploitation, as well as improved analytic tools and methods.” [emphasis mine] – 39
“SOCOM [Special Operations Command] should create a Joint PSYOP Support Element to coordinate Combatant Command programs and products with the Joint Staff and OSD [Office of the Secretary of Defense] to provide rapidly produced, commercial-quality PSYOP product prototypes consistent with overall U.S. Government themes and messages.” [emphasis mine] – 15
“SOCOM’s ongoing PSYOP Advanced Concept Technology Demonstration and modernization efforts should permit the timely, long-range dissemination of products with various PSYOP delivery systems. This includes satellite, radio and television, cellular phones and other wireless devices, the Internet and upgrades to traditional delivery systems such as leaflets and loudspeakers that are highly responsive to maneuver commanders.” [emphasis mine] – 15
“PSYOP equipment capabilities require 21st Century technology. This modernization would permit the long-range dissemination of PSYOP messages via new information venues such as satellites, the Internet, personal digital assistants and cell phones:
- (U) PSYOP ACTD. Commencing in FY04, SOCOM [Special Operations Command] initiates an Advanced Concept Technology Demonstration (ACTD) to address dissemination of PSYOP products into denied areas. The ACTD should examine a range of technologies including a network of unmanned aerial vehicles and miniaturized, scatterable public address systems for satellite rebroadcast in denied areas. It should also consider various message delivery systems, to include satellite radio and television, cellular phones and other wireless devices and the Internet.” [emphasis mine] – 65
“Rapid, fully integrated nodal and network analysis providing Combatant Commanders with holistic kinetic and non-kinetic solutions for a full range of electromagnetic, physical and human IO [information operations] targets.” [emphasis mine] – 39
“Capabilities such as physical security, information assurance, counter intelligence and physical attack make important contributions to effective IO.” [emphasis mine] – 23
Third Party PSYOP
The Pentagon is also willing to use third parties for their PSYOP.
Identify and disseminate the views of third party advocates that support U.S. positions. These sources may not articulate the U.S. position the way that the USG [US Government] would, but that may nonetheless have a positive influence.” [emphasis mine] – 27
Under recommendation number 48 – “Create a Joint PSYOP Support Element” – is the following:
Contract for commercial sources for enhanced product development.” [emphasis mine] – 64
The use of third party advocates or front groups for the dissemination of US government propaganda is well documented. A couple of recent examples include the illegal payment of $1.6 billion for domestic fake news and similar activities in Iraq using the Lincoln Group among others.
Virtual PSYOP
Not only is the Pentagon exploiting new and old technology for aggressive behavior modification, they can also practice and refine their techniques in a virtual simulation of the entire world.
From an article by Mark Baard:
“U.S defense, intel and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies.”
“Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman, among others. (Seligman introduced the theory of “learned helplessness” in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.)”
“Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.”
“The sim will feature an AR avatar for each person in the real world, based upon data collected about us from government records and the internet.”
How useful do you think your new MySpace or Facebook account is in helping the Pentagon develop a detailed psychological profile of you? Do you think they would be shy in exploiting such a valuable source of personal data?
AIDS Awareness
PSYOP in the past, however, often was used to support U.S. Government public diplomacy and information objectives with non-adversarial audiences. These actions include counter-drug, demining and AIDS awareness programs in friendly countries.” [emphasis mine] – 25
It is a minor point in the context of this document, but it is worth reflecting on why US military PSYOP were used for AIDS awareness.
Are There Any Limits to Information Warfare?
An obvious question arises from the description of PSYOP described by the Information Operation Roadmap, are there any limits? Can PSYOP be conducted on the American public or just foreign audiences? On adversaries or non-adversaries? Can they be performed during peacetime? My next article will attempt to show just how few limits there actually are.

Quantum Light Harvesting Hints at Entirely New Form of Computing

Light harvesting in plants and bacteria cannot be properly explained by classical processes or by quantum ones. Now complexity theorists say the answer is a delicate interplay of both, an idea that could transform computation.

Physicists have long known that plants and bacteria convert light into chemical energy in a way that is hugely efficient. But only in recent years have they discovered that the molecular machines behind this process rely on quantum mechanics to do the job.
That’s a big surprise because of the temperatures involved. Quantum states are highly fragile—sneeze and they disappear in a puff of smoke. Physicists can maintain these states for some time in carefully controlled environments at low temperature, but nobody can explain how it can be possible in the warm wet environments inside living things.
Today, Gabor Vattay at Eotvos University in Budapest and Stuart Kauffman at the University of Vermont in Burlington have the answer. They say the processes behind light harvesting are a special blend of the quantum and the classical. And that this delicate mix represents an entirely new form of computing that nature might exploit in other systems too.
The quantum processes must studied in light harvesting systems occur in a structure known as the Fenna-Matthews-Olson or FMO complex, a huge pigment protein that is part of the light-gathering machinery in green sulfur bacteria. Embedded in these protein structures are reaction centres that convert the energy from light into chemical energy.
When light hits the FMO complex, the energy must travel across the protein matrix until it reaches a reaction centre. And amazingly, this transfer occurs with an efficiency of almost 100 percent.
That’s puzzling because the only way for the light energy to find a reaction centre is to bounce through the protein network at random, like a ricocheting billiard ball. This process would take too long, much longer than the nanosecond or so it takes for the light energy to dissipate into the environment and be lost.
So the energy transfer process cannot occur classically in this way. Instead, physicists have gathered a variety of evidence showing that the energy transfer is a quantum process.
The thinking goes like this. Because energy can exist in a superposition of states, it can travel a variety of routes around the network at the same time. And when it finds the correct destination, the superposition collapses, leaving the energy at the reaction centre. The result is an almost perfect transfer of energy.
But Vattay and Kauffman say that this kind of pure quantum process this cannot be responsible either. That’s because a number of quantum processes slow down the movement of quantum objects through random networks like this. “Quantum mechanics has adverse effects too,” they say.
One of these party-poopers is known as Anderson localisation, a phenomenon that prevents the spread of quantum states in random media. Because the quantum state acts like a wave, it is vulnerable to interference effects, which prevent it propagating in a random network.
Another is the quantum zeno effect, the paradoxical phenomenon in which an unstable state never changes if it is watched continuously. That’s because watching involves a serious of measurements that constantly nudge the state, preventing it from collapsing. This is the quantum version of the watched-pot-never-boils effect.
A similar thing happens to the quantum state of the energy during light harvesting. This quantum state will inevitably interact with the environment but these interactions act like measurements. This triggers a quantum zeno-like effect that prevents the state from collapsing at the reaction centre. So the energy transfer cannot occur in this way, say Vattay and Kauffman.
Instead, they propose a new process in which the quantum search mechanism and the interaction with the environment combine to overcome Anderson localisation. It is the interplay between these processes that delivers the energy to the reaction centre in an optimal way, they say.
The idea is that the interaction with the environment changes the wave-like nature of the quantum state just enough to prevent Anderson localisation. At the same time, the quantum zeno effect extends the life time of the quantum state allowing it to find its way to the reaction centre. It is this interplay between the quantum and classical worlds that allows the energy transfer.
That explains the quantum-like behaviour of light harvesting processes at room temperature. But Vattay and Kauffman say the idea has other important implications. The problem of finding a reaction centre in a protein matrix is formally equivalent to many other problems in computing. So it ought to be possible to turn light harvesting to the task of computing by mapping one problem onto the other.
That could dramatically improve computational speeds at room temperature. “Computers based on artificial light harvesting complexes could have units with 100-1000 times larger efficiency at room temperature,” say Vattay and Kauffman.
What’s more, this kind of computation may already be at work in nature. “Since the realization of this mechanism seems now relatively easy, it is an important question if it has been realized in light harvesting systems or is also present in other biological transport or optimization processes. Especially in the human brain,” they say.
If they are right, this new kind of computation could generate a flurry of interest in a short space of time.
Ref: arxiv.org/abs/1311.4688: Evolutionary Design in Biological Quantum Computing  http://www.technologyreview.com/view/522016/quantum-light-harvesting-hints-at-entirely-new-form-of-computing/

Great Game Theory: A Numbers Station in Your Pocket


Is that a numbers station in your pocket, or are you just glad to see me?
Is that a numbers station in your pocket, or are you just glad to see me?
By: Jay Dyer
Continuing our analysis of advanced Psy Ops and information war, it is incumbent upon researchers to understand the Net itself as a product of the world of espionage and cryptology.  In a former piece I detailed the rise of the computer from the history of cryptography and wartime communication.  The need for secret means of conveying messages led to the development of mysterious “Numbers Stations,” and throughout the Cold War (and even today), Number Stations continue to operate as a means of relaying messages interlaced in with steady clips of nonsense.  These mysterious artifacts of the spy world have appeared in recent films such as John Cusack’s The Numbers Station, as well as the more conspiratorial examples of The Signal and Banshee Chapter, yet despite the exaggeration of these films, it is the world of SIGINT that gave rise to the Internet.
Arising from the decades-old Pentagon black projects known as ARPANET and DARPANET, the Internet as a public release was from less than benevolent motives on the part of the establishment.  While convenience and tech wizardy are certainly noble endeavors, it does not follow that artifacts of the spy world are expedient for mass populations.  Regardless, it is too late for all that now, as the surveillance net is cast across the globe.  In previous installments, we covered examples of Information Warfare in our day and their combinatory and exponential potency with strategies such as chemical, electromagnetic/frequency and DNA/RNA/biological forms of covert warfare.  Behind this attack pattern, we have posited an open plan of reengineering both the inner world of man’s psyche, as well as the exterior realm of the biosphere.
Hearkening back to 2003 (in the wake of 9/11 I presume), it was declassified that the Pentagon’s strategies of Psy Ops were transitioning to an “Infowar Oprations Roadmap” to “dominate” the electronic media spheres, and soon thereafter we learned the Bush Administration invested 1.6 billion into fake news and targeted psychological warfare broadcasts to synthesize Washington’s propaganda line for both domestic and foreign audiences.  Fast forward to 2010 where the doctrine is “clarified,” and then to 2013’s open dismissal of the 1948 Smith-Mundt Act, the establishment once again lifted its star-spangled middle finger towards its public, displaying what had long been the case – the public has always been the target of advanced psychological warfare and ridiculous, faux new.  For most of the “activist” and concerned, informed citizen niche this translated into a histrionic fury of bitching, yet as we have seen in this recent series on Psy Ops, the deeper objectives were totally missed.
In 2008, Global Research correctly drew attention to the real backdrop for these bizarre operations.  As alternative media has grown since 2008, the depth of the questioning involved on the part of researchers is unfortunately still too gradual.  My premise is this: The people who build things like the Internet and artificial intelligence software for predictive algorithmic tracking are well aware of psychological warfare and human social dynamics.  The alternative media is not something that arose as a surprise to the system, in fact, Bertrand Russell and H.G. Wells even discussed the rise of the opposition a century ago.  That being said, the world of espionage and cryptology from which the Internet arose is the same “dark” world that scientifically plans such “leaks” and media theatrics like Assange and Snowden, to the detriment of any real whistleblowers, given little to no media attention.  (Note too, the document mentions on page 25 “AIDS awareness” and the so-called drug war as aspects of U.S. military Psy Ops, as I have claimed many times.)
As Global Research reported:
“U.S defense, intel and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies.  Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman, among others. (Seligman introduced the theory of “learned helplessness” in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.)  Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.  The sim will feature an AR avatar for each person in the real world, based upon data collected about us from government records and the internet.” How useful do you think your new MySpace or Facebook account is in helping the Pentagon develop a detailed psychological profile of you? Do you think they would be shy in exploiting such a valuable source of personal data?”
Don't get gamed!
Don’t get gamed!
My second thesis: What is leaked is generally leaked intentionally.  Detailed previously, we begin to see how the purposeful leaking of information has numerous purposes.  False leaks, like false defections, might be done to spark a revolution, out a undesirable, provide misdirection, etc., but in our era a meta-level version of the leak has come into play with supercomputers and advanced A.I. war-gaming.  Like the A.I. characters in your typical Xbox or PlayStation video game, the choices made by human actors in concert with artificial programs is very valuable data.  Valuable, not in the pseudo-market of “BigData,” but for future predictive war gaming.  Indeed, video games themselves were a product of this same Pentagon, game theory/war gaming complex.  And just as the Internet was developed for cryptology and then released on the public as a massive surveillance Psy Op, so was the video game developed for militaristic training and released to entrap youthful generations in the rising virtual gulag.
In World War II and during the Cold War, Numbers Stations broadcast secret information between spies and headquarters, as we said, yet now the playing field has changed.  Researchers still spend time trying to crack Numbers Stations SIGINT, yet there is a deeper message here – we are all carrying portable Numbers Stations in our pockets with our iPhones and Sony cellular devices.  As millennials drift away into virtual worlds of Candy Crush and online Xbox planes of the synthetic, the great game is become the great video game, where quantified numeric reductionism becomes the unreal real:
“Game theory is a metaphysical doctrine, i.e. its ambition is to encompass everything, both the nature of man and the nature of universe. And there is a one special rule to every game of metaphysics, namely this: when the abstract and esoteric professional language of science is put aside, the game is potentially understandable to all parties – both those who are playing and those who are being played. It is an unspoken rule, an ancient assumption of all world-view con-games: in order for half-truth to hold sway over everybody, it must be spoken in common language. So let us examine, aided by some elementary concepts, what game theory is exactly and what it means for someone who is not a player, only played.”

The US Military’s Close History With Video Games

A close up of a T.V. screen shows two video game charecters looking through weapon sights in "Call of Duty: Modern Warfare 2." This particular game was being played by Soldiers from 3rd Stryker Brigade Combat Team, 2nd Infantry Division at Forward Operating Base Warhorse, Iraq, on April 26. (US Army photo by Pfc. Adrian Muehe)

The relationship between the commercial games industry and the American military establishment goes deeper than simple inspiration.

Today, some of the most popular video games involve military-inspired imagery and gameplay. The juggernaut first person-shooter series Call of Duty has sold almost 200 million copies as of July 2014. A look at the game database of Giant Bomb reveals nearly 1,000 titles with a “modern military” setting. But the relationship between the commercial games industry and the American military establishment goes deeper than simple inspiration.
The U.S. military’s first involvement with any type of electronic gaming was more of a happy accident than anything else. During the 1950s, Brookhaven National Laboratory had several early computers, designed to crunch the numbers on ballistic missile trajectories. In an attempt to garner interest from bored visitors to the lab, an enterprising physicist named William Higinbotham took one of these computers, hooked it up to oscilloscope, and created a small physics-based game dubbed Tennis For Two. Though the game had no real involvement from any military organization, the computer technology pioneered by the Department of Defense in the wake of World War II played a crucial role in bringing the game to life.
Thirty years later, the military was getting directly involved. One the first links between a commercial game company and a military agency occurred during the arcade game frenzy of the early 1980s. One of the more popular games at the time was Atari’s Battlezone, a tank game with eerie green wireframe graphics. The Army Training Doctrine and Command, aka TRADOC, wanted Atari to turn its sci-fi shooter into a training simulator for the Army’s latest infantry fighting vehicle, the M2 Bradley. Two Army Battlezone prototypes were eventually produced, but no Bradley crewman ever trained on the system. Still, it was an early signifier of how the mainstream games industry and the military would collaborate in the future. Another step came over a decade later. In 1993, a small developer from Texas, Id Software, released Doom. The game pioneered the first-person-shooter genre that continues to dominate the industry. The Marine Corps took note of the growing influence of games, and how it could be a cost-effective supplement to training. Ever frugal, the Corps charged it’s Modeling and Simulation Management Office with finding a commercial product that could be modified for Marine training needs. Lt. Scott Barnett was assigned to play PC games on the market that might fit the bill, and eventually selected Doom II. Barnett enlisted the help of Sgt. Dan Snyder to modify the game from its sci-fi Mars terrain to small desert village, and replace the game’s demon enemies with more real-world adversaries.
The resulting product — while nowhere near realistic — was intense and engaging, and promoted the kind of consistent, repetitive teamwork a Marine fireteam would employ in combat. While “Marine Doom” never became an official training tool, Marines were encouraged to play it, and it was sanctioned to be installed on government PCs. In 1997, Gen. Charles C. Krulak, who was the commandant of the Marine Corps at the time, issued a directive supporting the use of PC games for “Military Thinking And Decision Exercises.” The stage was set for the Marine Corps and other branches of the military to work hand in hand with game developers.
The Corps developed a fire team training tool with Destineer Studios, who would later commercially release it in 2005 under the name Close Combat: First to Fight. The Army partnered with console game developer Pandemic Studios, to develop Full Spectrum Warrior, its own squad-based training game, released in 2004. That game spawned a commercial-only sequel.
Arguably the highest profile and most controversial, military game project is America’s Army. Initially released in 2002, the title was not a training implement, but a recruiting tool. The game, available for free download or on disc at Army recruitment offices, was an online multiplayer, first-person shooter game that had players assuming the role of different infantry-related jobs in the Army. Financed and developed by the Army, the game rivaled many of its commercial contemporizes in terms of quality. The game was also designed to reinforce Army values and training; players had to complete a virtual boot camp and marksmanship test before jumping online, and specialized roles like medic or sniper were locked behind further tiers of training. The game was also notable in that players only could play as the U.S. Army; the enemy team always appeared as a generic “opposing force” faction. America’s Army quickly became the subject of criticism for targeting teenagers in its recruiting strategy; the game aimed to get high schoolers thinking about a career in the Army long before they turned 18. This controversy did not impact the game’s massive popularity, and the project has continued, receiving 41 updates as of January 2014.
The military’s use of games continues unabated; whether for training, recruitment, or more recently, the treatment of post-traumatic stress disorder. As budgets tighten, games have become an attractive supplement to expensive field training. And as gaming moves into mainstream culture, the military faces the challenge of enticing a new generation of players to serve and fight.
Christian Beekman is a writer and military enthusiast from northern New York. Follow Christian Beekman on Twitter @tacbeekman.

Report Reveals $8.5 Trillion Missing From Pentagon Budget   ~ can u say "hidden" off the books /off world / deep ,Deep.DEEP, "black budg " State ? $$$$$$$$  ....harvesting go~in ON ..naw ,nope ..just "acct'ing "errors"  nut~in 2 c here ,folks :)r  move  along  Oops

Region:

pentagon (2)
Yahoo Money’ The Daily Ticker  quoting a Reuters investigation that reveals that $8.5 trillion – that’s trillion with a “T” – in taxpayer money doled out by Congress to the Pentagon since 1996 that has never been accounted for.
You read that right. While Republican politicians  rush to slash food stamps for the 47 million Americans living in poverty – the highest amount in nearly two decades –  Republican U.S. Secretary of Defense Chuck Hagel has the audacity to complain that $20 billion dollars in automatic sequester cuts to the massive and secretive $565.8 billion Defense Department budget are “ too steep, too deep, and too abrupt,” all while the Pentagon and the Defense Department are overseeing massive fraud, waste, and abuse.
For anyone wondering, Reuters reports that the D.O.D.’s 2012 budget totaled $565.8 billion, more than the annual defense budgets of the 10 next largest military spenders combined, including Russia and China.
In an interview, Linda Woodford, an employee at the Defense Finance and Accounting Service – the Pentagon’s main accounting agency – reveals to Reuters that she spent the last 15 years of her career simply “plugging in” false numbers every month to balance the books;
“A lot of times there were issues of numbers being inaccurate. We didn’t have the detail … for a lot of it.”
In the REAL WORLD, that would be called MASSIVE FRAUD.
Woodford’s involvement in the fraud doesn’t even begin to scratch the surface. The report also reveals that “a single DFAS office in Columbus, Ohio, made at least $1.59 trillion – yes, trillion – in errors,  including $538 billion in plugs, in financial reports for the Air Force in 2009.”
Yahoo Finance lists some additional findings, including;
    • The DOD has amassed a backlog of more than $500 billion in unaudited contracts with outside vendors. How much of that money paid for actual goods and services delivered isn’t known.
    • Over the past 10 years the DOD has signed contracts for provisions of more than $3 trillion in goods and services. How much of that money is wasted in overpayments to contractors, or was never spent and never remitted to the Treasury is a mystery.
    • The Pentagon uses a standard operating procedure to enter false numbers, or “plugs,” to cover lost or missing information in their accounting in order to submit a balanced budget to the Treasury. In 2012, the Pentagon reported $9.22 billion in these reconciling amounts. That was up from $7.41 billion the year before.

'Why? Why? Why?' Crazed, rant-filled notebook of Dark Knight gunman - including a diagram of attack - revealed after he spent TEN YEARS planning movie massacre that killed twelve


Posted by George Freund on May 31, 2015 at 5:50 PM


The journal of mass murderer James Holmes was released by the court on Wednesday


  • The journal of mass murderer James Holmes was released by the court on Wednesday
  • On Tuesday jurors each received a copy in which he details his plan to commit a a massive shooting at a movie theater
  • The journal also reveals that he had been thinking about committing murder for 10 years
  • Holmes has entered a plea of not guilty by insanity for the July 2012 killing of 12 in an Aurora, Colorado theater
  • He sent the journal, which also has eight pages where he just wrote 'Why' to a psychiatrist who was treating him before the rampage 

Colorado theater shooting gunman James Holmes' notebook full of scrawled writings and stick-figure drawings was made public Wednesday, a day after it was introduced as evidence in his trial.
The 56-page notebook contains entries such as 'What kind of GOD commands his people not to murder yet cowers behind free will?' and eight consecutive pages with 'Why?' scribbled on them in ever-larger writing. Court officials released copies of the writings on a computer file.
Holmes' scrawled plans to attack a movie theater provide the most comprehensive look yet into what he described as his 'broken' mind.

On Tuesday jurors each received a copy in which he details his plan to commit a a massive shooting at a movie theater
On Tuesday jurors each received a copy in which he details his plan to commit a a massive shooting at a movie theater
The journal also reveals that he had been thinking about committing murder for 10 years
The journal also reveals that he had been thinking about committing murder for 10 years
In these journals Holmes examines what he believes to be the meaning of death
In these journals Holmes examines what he believes to be the meaning of death
Holmes also describes his struggles staying sane and focused
Holmes also describes his struggles staying sane and focused
Atorneys for Holmes believe the notebook proves that their client is not sane
Attorneys for Holmes believe the notebook proves that their client is not sane
In the notebook, Holmes writes about the many different ways he could kill large groups of people, and then, 'finally, the last escape, mass murder at the movies.'
Other ways he considered were at an airport or becoming a serial killer.
The former he ruled was too difficult because of security, and the latter he said would not claim enough lives.
He decides on the movie theater because it is 'isolated, proximal, large.'
Under that he draws out a map as he details his plan of attack.
He also says that he is aware of the '99% certainty' that he will get caught and estimates that it will take emergency responders approximately three minutes to arrive at the scene.
This obsession to kill meanwhile he says has been happening for the past 10 years. 


Holmes says that for the last seven to 10 years he wanted to commit a mass murder in the journals 
Holmes says that for the last seven to 10 years he wanted to commit a mass murder in the journals 
The map on right details the mall location near the movie theater and the parking lots
The map on right details the mall location near the movie theater and the parking lots
He even decides which movie theater offers him the best chance to kill
He even decides which movie theater offers him the best chance to kill
From there he looks into how long it would take emergency responders to arrive on the scene
From there he looks into how long it would take emergency responders to arrive on the scene
'What kind of GOD commands his people not to murder yet cowers behind free will,' writes Holmes
'What kind of GOD commands his people not to murder yet cowers behind free will,' writes Holmes


The journal also seems to outline his mental struggles, as he writes at one point; 'I could not sacrifice my soul to have a normal mind. Despite my biological shortcomings I have fought and fought.'
Then there are the eight pages he writes 'Why' repeatedly. 
Prosecutors are attempting to use the notebook to undermine Holmes' claim that he was legally insane at the time of the 2012 attack, which killed 12 and injured 70. He is charged with multiple counts of murder and attempted murder.
Holmes mailed the brown spiral notebook to a psychiatrist who was treating him before the rampage, and it was found a few days later undelivered in the mailroom at the University of Colorado Anschutz Medical Campus.
The school computation book has been one of the most important and closely guarded pieces of evidence in Holmes' death penalty trial, yet its contents only widened the diverging views of the man responsible for one of the worst mass shootings in U.S. history.
To prosecutors, it's the diary of a methodical killer, complete with detailed maps and drawings of auditoriums in the suburban Denver movie theater and the merits of each as the scene of mass murder.
To defense attorneys, the notebook chronicles the decline of a once-promising neuroscience student consumed by mental illness.
While prosecutors honed in on portions of the journal where Holmes describes his plans for mass violence, defense attorneys focused on nonsensical scribbles and odd symbols and the word "Why?" repeated over several pages.
Then there are eight pages where he simply writes 'Why'
Then there are eight pages where he simply writes 'Why'
Holmes has entered a plea of not guilty by insanity for the July 2012 killing of 12 in an Aurora, Colorado theater
Holmes has entered a plea of not guilty by insanity for the July 2012 killing of 12 in an Aurora, Colorado theater
He sent the journal, which also has eight pages where he just wrote 'Why' to a psychiatrist who was treating him before the rampage
He sent the journal, which also has eight pages where he just wrote 'Why' to a psychiatrist who was treating him before the rampage
Prosecutors argue that the journal proves Holmes was sane before the murders
Prosecutors argue that the journal proves Holmes was sane before the murders


Holmes mailed the notebook to Lynne Fenton, a University of Colorado psychiatrist who treated him, just hours before the July 20, 2012, shooting at a Batman movie premiere.
Officers found it unopened in a campus mail room July 23, after one of Holmes' attorneys called police looking for it. The notebook had $400 worth of burnt $20 bills wedged in its pages.
The court fight over the journal ended when Holmes pleaded not guilty by reason of insanity.
Now, it will be a key tool for jurors as they decide whether Holmes was so distorted by mental illness that he couldn't tell right from wrong at the time of the attack.
A judge gave all 24 jurors copies of the notebook this week, and they began immediately poring it over.

http://www.dailymail.co.uk/news/article-3099671/Court-releases-theater-shooting-suspects-notebook.html#ixzz3bSWfTNvj

The Enduring Mystery of Marilyn Monroe

marilyn-monroe

The Enduring Mystery of Marilyn Monroe

One of the most fascinating – and deeply controversial – pieces of documentation that has surfaced concerning the still-controversial death of Marilyn Monroe came from an individual that the FBI identified, in its now-declassified dossier on the Hollywood legend, as a “former Special Agent, who is currently Field Representative, Appointment Section, Governor’s Office, State of California.”
Written and sent to the FBI in 1963, its contents are eye-opening in the extreme, since they suggest that the attorney general, himself, Bobby Kennedy, was involved in a plot to “induce” Monroe’s suicide. The lengthy document sent to the FBI begins as follows:
“Robert Kennedy had been having a romance and sex affair over a period of time with Marilyn Monroe. He had met her, the first date being arranged by his sister and brother-in-law, Mr. And Mrs. Peter Lawford. Robert Kennedy had been spending much time in Hollywood during the last part of 1961 and early 1962, in connection with his trying to have a film made of his book dealing with the crime investigations. He used to meet with producer Jerry Wald. He was reported to be intensely jealous of the fact that they had been making a film of John F. Kennedy’s book of the PT boat story.”
Robert Francis Kennedy
Robert Francis Kennedy
The unidentified writer continued that RFK was deeply involved with Marilyn Monroe, and had repeatedly promised to divorce his wife to marry Marilyn. Eventually, however, she realized that Bobby had no intention of marrying her, at all – and almost certainly never had any such plans.
Adding to that woe, was the fact that, as the Bureau was also informed, “…about this time, 20th Century Fox studio had decided to cancel [Monroe’s] contract. She had become very unreliable, being late for set, etc. In addition, the studio was in financial difficulty due to the large expenditures caused in the filming of ‘Cleopatra.’ The studio notified Marilyn that they were canceling her contract. This was right in the middle of a picture she was making. They decided to replace her with actress Lee Remick.”
The spiraling bad luck, in both her private life and her acting career, prompted Monroe to turn to Bobby Kennedy yet again, even though it was clear to her that the relationship was doomed to go nowhere. It was a decision that may well have cost Marilyn her life, as the words of the FBI’s confidante demonstrate:
“Marilyn telephoned Robert Kennedy from her home at Brentwood, California, person-to-person, at the Department of Justice, Washington, D.C. to tell him the bad news. Robert Kennedy told her not to worry about the contract – he would take care of everything. When nothing was done, she again called him from her home to the Department of Justice, person-to-person, and on this occasion they had unpleasant words.
“She was reported to have threatened to make public their affair. On the day that Marilyn died, Robert Kennedy was in town, and registered at the Beverly Hills Hotel. By coincidence, this is across the street from the house in which a number of years earlier his father, Joseph Kennedy, had lived for a time, common-law, with Gloria Swanson.”
It was at this point in the informant’s story that things turned decidedly dark. Hardly surprising, since he outlined something controversial in the extreme: a plot to manipulate Marilyn Monroe into taking her own life. It began like this, FBI documents state:
Peter Lawford
Peter Lawford
“Peter Lawford knew from Marilyn’s friends that she often made suicide threats and that she was inclined to fake a suicide attempt in order to arouse sympathy. Lawford is reported as having made a ‘special arrangement’ with Marilyn’s psychiatrist, Dr. Ralph Greenson, of Beverly Hills. The psychiatrist was treating Marilyn for emotional problems and getting her off the use of barbiturates. On her last visit to him, he prescribed [illegible] tablets, and gave her a prescription for 60 of them, which was unusual in quantity, especially since she saw him frequently.”
That “special arrangement” had one goal: the death of the Hollywood goddess. The statement to the FBI continues:
“[Monroe’s] housekeeper put the bottle of pills on the night table. It is reported the housekeeper and Marilyn’s personal secretary and press agent, Pat Newcombe, were cooperating in the plan to induce suicide. Pat Newcombe was rewarded for her cooperation by being put on the head of the Federal payroll as top assistant to George Stevens, Jr., head of the Motion Pictures Activities Division of the U.S. Information Service. His father, George Stevens, Sr., is a left-wing Hollywood director, who is well known for specializing in the making of slanted and left-wing pictures. One of these was the ‘Diary of Anne Frank.’”
On the day of Marilyn’s death, said the FBI’s source, Robert Kennedy checked out of the Beverly Hills Hotel and flew from Los Angeles International Airport via Western Airlines to San Francisco, where he checked into the St. Francis Hotel; the owner of the hotel being a Mr. London, a friend of Robert Kennedy. From there, Kennedy phoned Peter Lawford “to find out if Marilyn was dead yet.”
FBI records reveal what reportedly happened next: “Peter Lawford had called Marilyn’s number and spoke with her, and then checked again later to make sure she did not answer. Marilyn expected to have her stomach pumped out and to get sympathy through her suicide attempt. The psychiatrist left word for Marilyn to take a drive in the fresh air, but did not come to see her until after she was known to be dead.
Joe DiMaggio, Sr. with Marilyn Monroe.
Joe DiMaggio, Sr. with Marilyn Monroe.
“Marilyn received a call from Joe DiMaggio, Jr., who was in the U.S. Marines, stationed at Camp Pendleton, California. They were very friendly. Marilyn told him she was getting very sleepy. The last call she attempted to make was to Peter Lawford to return a call her had made to her. Joe DiMaggio, Sr., knows the whole story and is reported to have stated when Robert Kennedy gets out of office, he intends to kill him. [Deleted] knew of the affair between Robert Kennedy and Marilyn.”
The story was not over, however; in fact, far from it. The FBI’s source had far more to add: “While Robert Kennedy was carrying on his sex affair with Marilyn Monroe, on a few occasions, John F. Kennedy came out and had sex parties with [Deleted], an actress. Chief of Police Parker, of the Los Angeles Police Department, has the toll call tickets obtained from the telephone company on the calls made from Marilyn’s residence telephone. They are in his safe at Los Angeles Headquarters.”
From there, things got even more intriguing:
“Florabel Muir, the columnist, has considerable information and knowledge of the Robert F. Kennedy and Marilyn Monroe affair. She personally saw the telephone call records. Marilyn Monroe’s psychiatrist, although he knew she had taken the pills, did not come to her home until after she was dead. He made contact with the coroner and an arrangement was made for a psychiatric board of inquiry to be appointed by the coroner, an unheard of procedure in the area. This was so the findings could be recorded that she was emotionally unbalanced. It was reported this arrangement was to discredit any statements she may have made before she died.
“During the period of time that Robert F. Kennedy was having his sex affair with Marilyn Monroe, on one occasion a sex party was conducted at which several other persons were present. Tap recording was secretly made and is in the possession of a Los Angeles private detective agency. The detective wants $5,000 for a certified copy of the recording, in which all the voices are identifiable.”
We may never know for sure to what extent the data provided to the FBI was acted upon – even if at all. We can say one thing for certain, however: just as with the deaths of JFK, Robert Kennedy, and Martin Luther King, nagging suspicions remain that the official explanation may not be the correct explanation.