You are on page 1of 233

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 1 of 7

IN UNITED STATES DISTRICT COURT


FOR THE SOUTHERN DISTRICT OF FLORIDA
CASE NO.: 15-cv-20782-Martinez-Goodman
DENNIS MONTGOMERY,
Plaintiff,
v.
RISEN, ET AL.
Defendants.
_____________________________/
PLAINTIFFS OPPOSITION TO NOTICE OF SUPPLEMENTAL AUTHORITY
CONCERNING DEFENDANTS MOTION TO DISMISS OR TRANSFER
Plaintiff Dennis Montgomery hereby opposes Defendants Notice Of Supplemental
Authority Concerning Defendants Motion To Dismiss Or Transfer on the following grounds:
First, Defendants filed their so-called supplemental authority, which is in reality a new
brief in support of their motion to dismiss after the pleading deadline had closed, without seeking
the consent of Plaintiff and leave of court. This is in violation of 7.1(a)(3) of the Local Rules of
this Court. All that Plaintiffs counsel was told is that Defendants intended to file an unspecified
pleading that contained information from the transcript that had been designated as confidential.
They then asked if Plaintiff would remove the confidential designation and Plaintiffs counsel
replied that he would check with his client in this regard. The confidential designation was
subsequently removed.
Second, while defense lead counsel seeks to disparage the credibility of Plaintiff and his
counsel, as this Court will recollect from the initial status conference, pro hac vice attorney
Laura Handman whose office is in Washington, D.C. misrepresented to this Court under oath
that Plaintiff had not registered to vote in Florida. Plaintiffs counsel raises this because before

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 2 of 7

the status conference of April 14, 2015, he had asked Ms. Handman to correct this
misrepresentation. However, she failed to do so later when she attempted to argue that Plaintiff
had, incredulously, no ties to Florida. Later misrepresentations occurred during a hearing with
Magistrate Judge Jonathan Goodman when she attempted to make up facts concerning the
deposition of James Risen. Attached as Exhibit 1 is the Miami-Dade County voter registration.
Thus, for defense counsel to viciously attack Plaintiff and his counsel in their supplemental
authority motion is the pot calling the kettle black and unprofessional.
Third, these attacks are consistent with lead pro hac vice defense counsels flippant,
condescending and insensitive remarks about the health of Mr. Montgomery at the status
conference before this Court. Below are quotes by the Court in response to what Ms. Handman
said about Plaintiffs health in trying to get this case delayed or moved to a venue which she
considers more to her liking, such as Washington, D.C., where cases drag on for years and where
there was at the time an anti-Slapp statute which has since been ruled inapplicable in federal
court. See Abbas v. Foreign Policy Group, LLC (No. 13-7171, Apr. 24, 2015). Defense counsels
strategy throughout this case has been to throw a monkey wrench into the case by whatever
means.
THE COURT: I don't think they can with aneurysms. And I am a world class
hypochondriac and I am very familiar with almost all medical problems, but I'm
particularly up to date on aneurysms because my sister is in the hospital right no
undergoing test for an operation that is imminent for aneurysm. So I'm familiar
with them, and I know that they can go any time. I mean, it's not a question of
predictability, it's a question of keeping an eye on them and if they start growing,
that's really bad. But they could go without growing. I mean, I don't know that the
fact that he's done so well this long really portends that he's going to continue to
do well. But I'm not sure that it makes any difference for our purposes.
Transcript of Status Conference of April 14, 2015 at pp. 12.

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 3 of 7

Fourth, and most importantly, notwithstanding the unprofessional conduct of pro hac vice
lead defense counsel, is that Mr. Montgomery is a citizen of Florida and has set up residency
there. Notwithstanding his voter registration at his deposition, Plaintiff described his efforts to
get a permanent residence. However, due to his failing health caused by his severe brain
aneurism with attendant strokes, he has not been able to do this. Exhibit 2 which will be filed
separately with the Court once it is declassified as to confidentiality is his complete, not
distorted or cropped testimony, as submitted by Defendants and their counsel to try again to
prejudice this Court. As can be gleaned from the transcript, Mr. Montgomery does indeed have a
residence in Florida. Indeed, in attending his deposition in Miami, he did so because of a
prearranged meeting with agents of the Federal Bureau of Investigation at its local headquarters
in Miramar, Florida, and also to pursue a permanent abode in Miami-Dade County. That he
could not travel to Nevada or California in the weeks prior was due to his health at the time. That
lead defense counsel Ms. Handman would use Mr. Montgomerys health to disparage him and
try to prejudice this Court against him, was also manifest during Mr. Montgomerys deposition,
which from his health standpoint was difficult and physically painful. For example, during one
instance, Ms. Handman mocked Mr. Montgomery when he made reference to his physical
condition, suggesting that this was his problem since he brought the lawsuit.
MR. MONTGOMERY: Its hard to sit here when youre sitting in your own
excrement when youre giving depositions. I dont have my family around t take
care of me and realize whats going on when I cant control my bladder or my
bowels. Im doing the best I can under what I consider some pretty tough
conditions.
MS. HANDMAN: Well, you chose to bring this lawsuit, Mr. Montgomery.
Transcript of Deposition of Dennis Montgomery at pp. 180-81, lines 23-25, 1-7.
Plaintiff will also file in hard copy the video of Mr. Montgomerys deposition which
visually shows his pain being deposed for seven hours. This lack of respect is consistent with pro

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 4 of 7

hac vices lead counsels comments about Mr. Montgomerys health at the initial status
conference.
Fifth, as for the law, which is something which Defendants and their pro hac vice lead
defense counsel choose to ignore, it is clear that Mr. Montgomery has established his Florida
citizenship, as the Sunshine State, of which his counsel is also a Florida citizen, is an intent
state.
For an individual, citizenship for diversity purposes is equivalent to domicile.
McCormick v. Aderholt, 293 F.3d 1254, 1257 (11th Cir. 2002). "A person's domicile is the place
of 'his true, fixed, and permanent home and principal establishment, and to which he has the
intention of returning whenever he is absent therefrom.'" Id. (citing Mas v. Perry, 489 F.2d 1396,
1399 (5th Cir. 1974), cert. denied, 419 U.S. 842, 95 S.Ct. 74, 42 L.E.2d 70 (1974)).
To determine a person's domicile, the courts consider a number of factors including:
current residence, voting registration and voting practices, location of personal and real property,
location of brokerage and bank accounts, location of spouse and family, membership in unions
and other organizations, place of employment or business, driver's license and automobile
registration, and payment of taxes. Lew v. Moss, 797 F.2d 747, 749-750 (9th Cir. 1986).
[D]iversity and jurisdiction are determined on the basis of the facts at the time the suit
was filed, and subsequent facts or changes in the domicile of either party do not affect
jurisdiction. Smith v. Sperling, 354 U.S. 91, 93 (1957). A plaintiff need only show a
preponderance of the evidence that he is a citizen of a state. Scoggins v. Pollock, 727 F.2d 1025,
1026 (11th Cir. 1984). The district court's finding of domicile will not be disturbed unless
clearly erroneous. Combee v. Shell Oil Co., 615 F.2d 698 (5th Cir. 1980).

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 5 of 7

As importantly, Plaintiff has always had, even prior to establishing citizenship and
domicile, significant contacts with Florida as set forth in his affidavits, which are consistent with
his testimony at his deposition. Attached as Exhibit 3 are the affidavits which he submitted in
opposition to Defendants motion to dismiss.
Finally, venue is proper in Florida even if Mr. Montgomery were not a citizen of Florida,
as the defamation was projected into this state, as set forth in his affidavits, and as Defendants
not only have a presence in Florida through their holding company in Orlando, but promote and
sell the libelous book at issue, Pay Any Price, here. Indeed, Florida, with its huge military and
national security presence of readers, is one of the largest if not the largest market for
Defendants. The depositions of the Defendant publishers, Linda K. Zecher, William Bayers,
Houghton Mifflin Harcourt Company, Houghton Mifflin Harcourt Publishing Company, and
Houghton Mifflin Harcourt Publishing Company in Orlando, Florida, which have been
scheduled, will bear this out. There is thus no dispute that Plaintiff was defamed in Florida, a
massive market for Defendants, especially when Plaintiff has had significant contacts, work
relationships, and business over the years in Florida, as set forth under oath in his affidavits.
Moreover, a defendants physical presence is not required in order to commit a tortious
act, such as defamation, in Florida. Exhibit Icons, LLC v. XP Cos., LLC, 609 F. Supp. 2d 1282,
1297 (2009). In Hartoy Inc. v. Thompson, a trademark and unfair competition case, the Court
ruled that a Wisconsin residents operation of a business website through which Florida residents
had placed orders established personal jurisdiction over the Wisconsin resident in Florida.
Hartoy Inc. v. Thompson, 2003 U.S. Dist. LEXIS 3185 (S.D. Fla. Jan. 29, 2003).
Similarly, in Bloom v. A. H. Pond Co., a non-resident corporations conducting of
business through an employee in the forum state satisfied the requisite nexus for personal

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 6 of 7

jurisdiction over it. Bloom v. A. H. Pond Co., 519 F. Supp. 1162 (S.D. Fla. 1981). In Tobinick v.
Novella, the exercise of personal jurisdiction over defendant was proper where plaintiffs claims
stemmed from content posted by defendant on a website accessible in a forum state. Tobinick v.
Novella, 2015 U.S. Dist. LEXIS 72467 (S.D. Fla. June 4, 2015); see also Zippo Mfg. Co. v.
Zippo Dot Com, Inc., 952 F. Supp. 1119 (W.D. Pa. 1997) (holding that:[i]f Dot Com had not
wanted to be amenable to jurisdiction in Pennsylvania, the solution would have been simple it
could have chosen not to sell its services to Pennsylvania residents).
Here, there is no doubt that the Defendants intended to sell books in Florida. After all, the
Defendants have an office in Orlando, Florida for the purpose of soliciting business in Florida
and to Florida residents.
For all of these compelling reasons, Defendants and their lead pro hac vice Washington
D.C. counsels personally offensive supplement, filed for tactical reasons, is improper, untimely
as the pleadings on their motion to dismiss had closed, and non-meritorious and must
respectfully be rejected by this Court.

Dated: September 10, 2015

Respectfully Submitted,

/s/ Larry Klayman


Larry Klayman, Esq.
FL Bar No. 246220
7050 W Palmetto Park Rd.
Suite 15-287
Boca Raton, FL 33433

Case 1:15-cv-20782-JEM Document 133 Entered on FLSD Docket 09/10/2015 Page 7 of 7

CERTIFICATE OF SERVICE
I HEREBY CERTIFY that on this 10th day of September 2015, a true and correct copy
of the foregoing was served via CM/ECF upon the following:
Sanford Lewis Bohrer
Brian Toth
Holland & Knight, LLP
Suite 3000
701 Brickell Ave
Miami, FL 33131
Email: sbohrer@hklaw.com
Email: brian.toth@hklaw.com
Laura R. Handman
Micah Ratner
Davis Wright Tremaine LLP
1919 Pennsylvania Ave., N.W., Suite 800
Washington D.C. 20006-3401
Email: laurahandman@dwt.com
Email: MicahRatner@dwt.com
Attorneys for Defendants

/s/ Larry Klayman


Larry Klayman, Esq.

Case 1:15-cv-20782-JEM Document 133-1 Entered on FLSD Docket 09/10/2015 Page 1 of 2

Exhibit 1

Case 1:15-cv-20782-JEM Document 133-1 Entered on FLSD Docket 09/10/2015 Page 2 of 2

Case 1:15-cv-20782-JEM Document 133-2 Entered on FLSD Docket 09/10/2015 Page 1 of


224

Exhibit 3

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
2 of2 150
of
224

IN THE UNITED STATES DISTRICT COURT


FOR THE SOUTHERN DISTRICT OF FLORIDA
DENNIS L. MONTGOMERY
Plaintiff,
v.

Civil Action No. 1:15-cv-20782-JEM

JAMES RISEN, ET AL.,


Defendants.
DECLARATION OF PLAINTIFF DENNIS MONTGOMERY, IN SUPPORT OF
PLAINTIFFS OPPOSITION TO DEFENDANTS MOTION
CHALLENGING FLORIDA JURISDICTION AND VENUE
Pursuant to 28 U.S.C. 1746, I, Dennis Montgomery, hereby declare under penalty of perjury
that the following is true and correct:
1) I am over the age of 18 years old and I make this affidavit on personal knowledge and
belief. I am mentally and legally competent to make this affidavit sworn under oath,
despite having suffered a brain aneurism and serious related health issues. See
Exhibits 9, 10, 11, attached to this affidavit.
2) Reporter James Risen of The New York Times and publisher Houghton Mifflin
Harcourt Publishing Company published a book Pay Any Price: Greed, Power and
Endless War in October 2014 (hereafter the Book).
3) In Chapter 2 of the Defendants Book, James Risen and Houghton Mifflin Harcourt
Publishing Company lie about me and my work and libel me extensively.
4) Chapter 2 involves me and James Risen focuses almost exclusively on defaming me
alone to sell copies of the Book in marketing interviews. Having read the book, I am

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
3 of3 150
of
224

its centerpiece, that is, Defendants punching boy to sell books. Risen conspicuously
ignores the many other events and incidents in the Book and focuses almost
exclusively on me when promoting his book for sales in Florida and elsewhere.
5) Whereas, the Defendants, especially Houghton Mifflin Harcourt Publishing
Company, have great resources and no doubt have errors and omissions insurance
to finance their legal defense, I have no money or resources at all. I lost my house in
foreclosure. The Defendants will be able to afford to litigate the claims in Florida.
6) My finances, employment, career and business opportunities have been severely
devastated and destroyed by the false and misleading statements made by the
Defendants, contributing to the loss of my previous house in foreclosure and driving
me into poverty just at the time I have also been diagnosed with serious medical
problems.
7) The Defendants published defamatory and false and misleading statements which are
not opinion or hyperbole and are not fair reporting of their sources or public records.
The defamation is specifically false and misleading in factually verifiable terms,
including in that:
a. Defendants published defamatory material and statements from confidential
government sources in the intelligence and military communities. The false
and misleading statements did not result from fair reporting of previously
published material. They admit this on page ix of the Book stating, Many
people have criticized the use of anonymous sources. Yet all reporters know
that the very best stories the most important, the most sensitive rely on
them. This book would not be possible without the cooperation of may current

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
4 of4 150
of
224

and former government officials and other individuals who were willing to
discuss sensitive matters only on the condition of anonymity. Indeed, this is a
big selling point of Defendants book. It publishes new information, however
defamatory, that had not been accessible or published before. This is why the
Book is a bestseller in Florida and elsewhere, particularly given that Florida is
at the center of U.S. Government counterterrorism military and intelligence
operations, as I testify to below.
b. The Defendants actually know that their U.S. Government sources are the
ones who will bear the public blame for their own poor decisions if they do
not shift the blame implausibly to me with the Defendants concerted help.
c. Defendant James Risen intentionally omitted several important facts while
fabricating defamatory statements and stories about me.
d. The Defendants actually knew that Warren Trepp received most of the money,
yet accuse me of fraud to obtain money while excusing politically-connected
Warren Trepp who took and kept the money and controlled the company.
e. The Defendants falsely and misleadingly state that I fabricated intelligence to
make money. In fact, eTreppid was paid for software work and analysis, not
contingent upon results or conditional upon finding any terrorist threats. Our
work was complete and payment due merely for doing the analysis the CIA
and other Government officials asked us to do.
f. My software and technology did work, does work, and is still being used
successfully by the U.S. Government today.
g. The Defendants actually know that Warren Trepp has never paid back any of

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
5 of5 150
of
224

the $30 million that eTreppid received from the U.S. Government nor offered
to pay any of it back nor has the U.S. Government asked for any of the money
back. Therefore, James Risen actually knows that his defamation of me is
false and misleading. If eTreppid received $30 million from the U.S.
Government for the use of my software and technology that was a purported
fraud or a hoax, eTreppid would have to pay the money back to the U.S.
Government. But the U.S. Government knows that my software and
technology actually worked and works and is valuable, which is why eTreppid
does not have to pay any of the $30 million back.
h. In fact, the Defendants ignore and intentionally omit my ten (10) patent
applications, which attest to and show my expertise.
i. The U.S. Government independently tested and verified the results of my
software and technology and did not rely upon my word alone. The U.S.
Government officials sought me and my technology out.
j. The data detected by my software and technology did predict actual terrorist
incidents and/or meetings in advance.
k. I could not have fabricated intelligence from my work, as Defendants defame
me, without being certain that no one else would independently verify my
work in any number of other ways available to the CIA, NSA, and military.
l. I and the companies I worked with had equal or better opportunities to provide
my services to private sector companies, and had no need to work for the U.S.
Government to make the same amount of money or less.
m. I was motivated by patriotism, not greed, in turning down equivalent

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
6 of6 150
of
224

opportunities to provide services to the private sector to answer requests for


help in the war on terror by the U.S. Government.
n. The Central Intelligence Agency (CIA) wanted experts to analyze Al Qaeda
videos.
o. It was the CIA who proposed to eTreppid that we would analyze Al Qaeda
videos. The defamation of me states that I fraudulently sold the CIA and U.S.
Government on a fantasy using fabricated intelligence. In fact, the CIA and
the U.S. Government approached us with what they wanted analyzed.
p. The Defendants actually knew that Warren Trepp closed the sales of
contracts by persuading the U.S. Government, yet falsely accuse me of selling
a fantasy of fabricated intelligence to the U.S. Government, while excusing
Trepp, as a fraudulent scheme to obtain money.
q. Defendants falsely state that I persuaded the President George W. Bush to
ban international passenger aircraft from entering U.S. airspace and nearly
shoot down passenger aircraft. However, I never provided any interpretation
of what the hidden data we uncovered meant. We merely provided the
uncovered data to the U.S. Government experts for their interpretation. Even
when pressed, I refused to offer any national security interpretation of the
data.
r. As obvious from the records and documents that the Defendants rely upon, the
Defendants so-called sources Michael Flynn, Tim Blixseth, and Warren
Trepp went to extraordinary and expensive legal and extra-legal (self help)
efforts to furiously get ownership of my work as being extremely valuable,

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
7 of7 150
of
224

while simultaneously stating that my work had no value.


s. Michael Flynn, Tim Blixseth, and Warren Trepp were attempting to invoke
the fraud exception to bankruptcy laws to invalidate my bankruptcy, and
therefore the Defendants knew that they had motives to fabricate or embellish
their false statements against me.
t. The public records that the Defendants claim to be relying upon though
voluminous overwhelmingly contradict the Defendants defamation of me.
u. On September 28, 1998, I and Warren Trepp co-founded eTreppid
Technologies (eTreppid) based on a Contribution Agreement of that date
in which we agreed to own the LLC in equal 50% shares. Trepp put up money
and I conveyed his software compression technology contained on CD No.
1 to eTreppid. The business plan of eTreppid and the application of the
compression technology were to compress VHS videotapes used for
surveillance in casinos for archiving and more efficient storage. Over the
preceding 20 years I developed and copyrighted other types of software
technology, including but not limited to Object Detection Software which is
a crucial component of, among other things, colorizing black and white
movies. In order for the computer to add color, it must be able to recognize
individual objects in the movie which are moving in three dimensions, (that is
moving toward or away from the camera and changing in apparent size),
aspect angle, orientation, etc. This was not conveyed to eTreppid and which,
per the terms of the Contribution Agreement, was expressly excluded.
Shortly after the formation of eTreppid, I offered to sell one part of his

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
8 of8 150
of
224

Object Detection System (ODS) software to Warren Trepp for the sum of
$10 million dollars, which Trepp rejected.
v. As reflected in a form SF-95 Attachment A prepared by me with my then
attorney Michael Flynn for presentation to the Government, Beginning on or
about November 2002, on behalf of the US Air Force, Montgomery began
work on military applications of his technology at Eglin Air Force base [in
Florida] to demonstrate the application of his technologies in the war on
terror.
w. Defendants make the technically absurd and false statement that The French
company said that there were simply not enough pixels in the broadcasts to
contain hidden bar codes or unseen numbers, only by falsely misrepresenting
that the data was contained only in the crawl at the bottom of the screen.
This falsified and misleading misdirection and deception to focus only on the
crawl is deceptive. It is patently unbelievable, which Defendant Risen should
have known as an expert in national security, that a television signal could not
contain such simple data as latitude and longitude coordinates, consisting of
only six numbers and two letters (East or West longitude, North or South
latitude).
8) I am a citizen of the State of Florida, with a residence in an apartment community in
Miami, Florida. I have a Florida telephone number in this district. I am reporting my
address and Miami-Dade, Florida phone number under seal.
9) I am registered to vote in Florida, as shown in Exhibit 1, attached to this affidavit. I
previously had a temporary address while settling on the permanent address that I

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document40-1
133-2Entered
Entered
on on
FLSD
FLSD
Docket
Docket
04/27/2015
09/10/2015Page
Page
9 of9 150
of
224

have now. I have updated my voter registration to reflect my current Miami address.
10) I have reviewed the affidavit of defense counsel Laura Handman attached to the
Defendants motion stating that I had not registered to vote in Florida. The
Defendants affidavit is false. I am registered to vote in the State of Florida, and am
now updating my voter registration with my new address. I was registered to vote in
Florida when Ms. Handman signed her affidavit. She misled this Court.
11) I found on the website of the publisher Houghton Mifflin Harcourt, that Houghton
Mifflin Harcourt Publishing Company maintains permanent and general offices in
Orlando, Florida at 9400 Southpark Center Loop, Orlando, Florida 32819. Exhibit 2,
attached to this affidavit, which I downloaded from the Defendant publishers website
at http://www.hmhco.com/about-hmh/our-offices. These are statements made by the
Defendants about themselves.
12) On the website of the Florida Department of State Division of Corporations, I found
that Defendant Houghton Mifflin Publishing Company is registered to do business in
Florida through the Florida Department of State Division of Corporations. Exhibit 3,
attached to this affidavit, which I downloaded from the Florida Department of States
website.
13) As shown in those Florida Government documents, in 2008 Defendant changed its
name from Houghton Mifflin Harcourt to Houghton Mifflin Publishing
Company. Id. These are statements made by Defendants about themselves.
14) My research of the publisher also uncovered that Defendants rely significantly upon
sales in the Southeast of the United States through a company Amazon for very
substantial sales over the internet. Amazons regional distribution centers or

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page10
10of
of
150
224

fulfillment centers are located in Ruskin, Florida in Hillsborough County and


Lakeland, Florida, in Polk County. See Exhibit 4, attached to this affidavit.
15) Much of the defamation which my lawsuit contests is contained within the physical
product physically shipped into Florida for sale, the Book written by James Risen and
published by Houghton Mifflin Harcourt Publishing Company.
16) In 2012, Edra Blixseth brought Chris Pipes, from the U.S. Special Operations
Command (SOCOM) from MacDill Air Force Base in Florida to our Palm Desert
offices. SOCOM was interested in pursuing object tracking, mass surveillance, and
research on cloaking technologies. Chris Pipes met at our facility, with a
representative of the CIA. While he was in our building, Chris Pipes then received a
telephone call from SOCOM in Florida, and then told us that SOCOM could not
pursue the technology because of what was written about me in the news media.
Exhibit 18, attached to this affidavit.
17) SOCOM is the Unified Combatant Command charged with overseeing the various
Special Operations Component Commands of the Army, Air Force, Navy and Marine
Corps of the United States Armed Forces. The command is part of the Department of
Defense and is the only Unified Combatant Command legislated into being by the
U.S. Congress. SOCOM is headquartered at MacDill Air Force Base in Tampa,
Florida. See, Exhibit 12, attached to this affidavit.
18) U.S. Central Command (CENTCOM) is a theatre-level Unified Combatant
Command of the U.S. Department of Defense, established in 1983. CENTCOM Area
of Responsibility includes countries in the Middle East, North Africa, and Central
Asia, most notably Afghanistan and Iraq. CENTCOM has been the main American

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page11
11of
of
150
224

presence in many military and intelligence operations. It is headquartered in Tampa,


Florida. See, Exhibit 12, attached to this affidavit.
19) The Defendant author James Risen actually knew or should have known that most of
my work was with U.S. Government organizations in Florida and the contracting
offices for my work are in Florida. A competent Pulitzer Price winning New York
Times reporter who wrote the Book over a four-year period from 2011 through 2014
would have reviewed the Wall Street Journal article from November 1, 2006,
attached, which includes the explanation:
Source of Secret Funds
One source of secret funds for eTreppid and other companies
is the Special Operations Command. Based in Tampa, Fla., the
command fields special-operations military and intelligence
forces around the globe and is at the forefront of the fight in
Iraq and Afghanistan. It has also been rocked by a criminal
investigation of a former contracting officer. The investigation
is continuing, according to a spokesman for the U.S. attorney
in Tampa.
In a separate inquiry, Pentagon investigators last year found
evidence that the command kept special accounts for "unrequested
congressional plus-ups," or earmarks. The plus-ups were used to
reward lawmakers with projects in their districts, according to
declassified investigators' notes reviewed by The Wall Street
Journal. The Pentagon's inspector general closed the inquiry after
finding that the accounts weren't illegal.
Mr. Trepp said eTreppid won classified work on its merits and
already had a number of government contracts before Mr. Gibbons
starting making introductions on the company's behalf. Mr.
Gibbons's campaign manager, Robert Uithoven, said the
congressman has been a strong supporter of new defense
technology, particularly after 9/11. But he said there was "no quid
pro quo whatsoever" for contributions from contractors. And while
some funding was secret, "it was because of the sensitive nature of
the work," Mr. Uithoven said, not to avoid public scrutiny.

10

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page12
12of
of
150
224

For Mr. Trepp, eTreppid's success at winning multimillion-dollar


federal contracts marks a comeback from his Drexel days. He sat at
Mr. Milken's right arm on the firm's famous X-shaped trading desk
in Beverly Hills, sometimes trading as much as $2 billion in
securities a day. Federal regulators filed a civil securities-fraud
claim against him in 1995, and a Securities and Exchange
Commission administrative judge found that his violations had
been "egregious, recurring and intentional." But she dismissed the
proceeding against him, noting that the allegations were old and he
had left the securities business years earlier. (Emphasis added).
20) This article and dozens of others, as well as court documents, caused Risen to know
or he should have known upon reasonable inquiry over four years that Warren Trepp
was furiously trying to take ownership of my software and technology, which directly
calls into question his self-serving false statements that the software and technology
he was trying to acquire rights to was worthless. The same article also reports:
Mr. Gibbons also got other, unreported gifts of cash and casino
chips from Mr. Trepp, according to sworn testimony in a civil
lawsuit brought by a former executive at eTreppid, Dennis
Montgomery. The suit, filed in February in federal court in Reno,
involves a dispute between Messrs. Trepp and Montgomery over
the rights to certain software code . . .
The suit has raised alarms in Washington because of concern that
national secrets will be revealed if it goes to trial. For example, one
of the entities that funded eTreppid is code-named Big Safari and
is a classified program, documents in the case show. The nation's
top intelligence official, John D. Negroponte, recently filed a
statement with the court seeking to seal the case. He wrote that
after personally reviewing the matter, he has concluded that
disclosure of some information connected with the case could do
"exceptionally grave damage" to national security.
21) My greatest opportunities for employment, business, and/or an income are at either
Macdill Air Base near Tampa, Florida and Eglin Air Force Base near Fort Walton
Beach, Florida, which is at the center of U.S. Government intelligence and
counterterrorism operations. See Exhibit 12, attached to this affidavit.

11

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page13
13of
of
150
224

22) As a result, I have settled in Florida not just for professional reasons but also because
of my failing health and desire to enjoy Florida at this stage in my life. Florida has no
personal income tax as well as a Homestead exception should I buy a home. Florida is
a great place to live.
23) In 2011, I incorporated a business with a partner in Florida to contract with the
military and U.S. Government at bases in Florida to continue the same type of
services and software and technological work that I had performed under eTreppid
and BLXWARE. This business was named Alex James LLC, which I incorporated
through the Legal Zoom service company. I set up the articles of incorporation,
paid for and set up this company. Judy Crowhurst is the woman I chose to run it.
Exhibit 17, attached to this affidavit.
24) Exhibit 5, attached to this affidavit, presents the papers I processed through the
Legal Zoom company and my payment information paying for the company in
Florida in 2011.
25) As an expert in national security issues, Defendant James Risen knows that the war in
Afghanistan was and is run largely from Florida electronically and by drone
controllers located in Florida. For instance, following September 11, 2001, General
Tommy Franks rarely set foot in Afghanistan and fought the war from U.S. Air Force
Bases in Florida, including from SOCOM and CENTCOM. This explains my work
with SOCOM and CENTOM in large part and why it continued there.
26) Defendant James Risen also knows that the U.S. military leadership and personnel are
concentrated mainly in Florida. Because U.S. military servicemen can choose their
state of residence despite being deployed elsewhere, Floridas lack of an income tax

12

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page14
14of
of
150
224

makes Florida a very attractive State for U.S. servicemen, often poorly paid. As a
result, most of the nations top military leaders, current and former servicemen, chose
Florida as their residency.
27) Defendant Risen knew in publishing the Book that Florida is an enormous market as
the nations now third largest State, including Floridas significant military and
intelligence and counterterrorism personnel, with many retirees (including retired
U.S. Government employees in the military and intelligence fields) with more time to
read books than the average American. For instance, former Secretary of Defense
Donald Rumsfield now lives in Florida, as well as former Chairman of the U.S.
Senate Intelligence Committee and CIA Director Porter Goss, who lives in Miami.
28) The team on which I worked had contracts directly with the intelligence agencies at
the military bases in Florida. I have video showing the work. The contracting
officers are out of those military bases, many of which are classified. I met and
worked with CIA officials in Florida at various military bases. However, I cannot
identify here the exact units stationed at those bases, which is classified information.
Exhibit 19, attached to this affidavit.
29) We at eTreppid and later BLXWARE did most of our work with units stationed at
MacDill Air Force Base and Eglin Air Force Base, whose identity is secret. See
February 14, 2004, Order for Supplies or Services attached, with the Ship To
address of UQ USSOCOM/SOAL-SP (Mohr), 7701 Tampa Point Boulevard, MacDill
Air Force Base, Florida 33621.
30) Most of the payments for our work, the work I did for eTreppid and later
BLXWARE, came out of the CIA offices in Florida and SOCOM, the U.S. Special

13

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page15
15of
of
150
224

Operations Command of the U.S. military at Macdill Air Force Base, Florida.
31) SOCOM of the U.S. military is located at 7701 Tampa Point Boulevard, MacDill Air
Force Base, Florida. See Exhibit 6, attached to this affidavit.
32) CENTCOM of the U.S. military is located at MacDill Air Force Base near Tampa,
Florida. See Exhibit 7, attached to this affidavit.
33) Relating to my work conducting surveillance of international communications, major
fiber optics cables run from Florida across the ocean, which is partly why my work
opportunities for my experience and capabilities are in Florida.
34) I intend to call witnesses who can testify that my defamed software and technology
does indeed work and is not a hoax. These witnesses are personnel based at Macdill
Air Base near Tampa, Florida and at Eglin Air Force Base near Fort Walton Beach,
Florida, where I did a lot of his work. The organizational units housed at Macdill and
Eglin used my software, technology, and work extensively during the time period
addressed by Defendants defamation of me. Those witnesses will testify and thus
help me prove that the defamatory statements about me are indeed false and
misleading.
35) Relevant officials at Macdill and Eglin (and all facilities that my work has provided
services to anywhere) make their own contracting decisions and do not rely upon
contracting offices in Washington, D.C., nor even at the CIA in Langley, Virginia, the
Pentagon in Arlington, Virginia, or the NSA in Fort Meade, Maryland.
36) Many of the witnesses in this case, with whom I have worked, are largely in Florida,
including, but not limited to:
Goss, Porter, former Director of CIA, now in Miami, Florida

14

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page16
16of
of
150
224

Johns, Ken, Macdill AFB, Florida


Lyons, XXXXX, Macdill AFB, Florida
Macbeth, W. Rhys, Eglin AFB, Florida
Nazelrod, Craig, Eglin AFB, Florida
Pipes, XXXXX, Macdill AFB, Florida
Roche, James, Macdill, Florida
Rumsfeld, Donald, now in Florida
Stillman, Phillip, Attorney for Dennis Montgomery, now in Miami, Florida
Madden, Tom, Boca Raton, Florida
Olivia, Adrian, Eglin AFB, Florida
Bartholomew, Mary L, Eglin AFB, Florida
Fiamengo, Nicholas A, Eglin AFB, Florida
Freeman, Gregory J, Eglin AFB, Florida
Savage, Cynthia, Eglin AFB, Florida
McCool, John C, Eglin AFB, Florida
Temple, James K, Eglin AFB, Florida
Griffin, Susan M., Macdill AFB, Florida
Russell, Deborah, Macdill AFB, Florida
Nettelhorst, Doug M, Macdill AFB, Florida
Stallworth, Hugh T, Macdill AFB, Florida
Bob McCaskey, Macdill AFB, Florida
Crutchfield, Chris, Macdill AFB, Florida
Melnyk, Michael S., Macdill AFB, Florida

15

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page17
17of
of
150
224

Lopez, Tina M, Macdill AFB, Florida


Cerny, Jeffrey D., Macdill AFB, Florida
Muccio, Anthony B., Eglin AFB, Florida
McKinney, Scott E Lt.Col., Eglin AFB, Florida
Purvis, Brad Civ, Eglin AFB, Florida
'Kirsch, Jim', Eglin AFB, Florida
Hughes, Stacey L, Eglin AFB, Florida (See Exhibit 13, attached to this affidavit).
37) Ultimately, I became aware that James Risen had published these false reports in the
Book and that Risen was conducting a nationwide publicity campaign to sell the
Book.
38) I heard and watched James Risen repeatedly in national and radio interviews
discussing his book but primarily about me, mostly ignoring and intentionally
omitting the rest of his Book in those interviews while attacking and defaming me as
a private individual.
39) In radio, television, and newspaper interviews, James Risen mainly focused on
slandering me in order to sell the Book in Florida and elsewhere.
40) Risens appearances on radio and television were not just commentary but attempts to
stimulate the sale of books inside Florida and elsewhere.
41) Risen was speaking on the radio and television shows in order to move books off of
Florida bookstore shelves and to the checkout counters in Florida and elsewhere.
42) The defamation by Defendants of me is not a criticism of the U.S. Government in the
District of Columbia, but excuses the U.S. Government as an innocent and
unsuspecting victim, while blaming me. Therefore, the U.S. Government has not

16

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page18
18of
of
150
224

suffered harm within Washington, D.C.


43) I had relatively little contact with the U.S. Government in Washington, D.C.,
Maryland or Virginia. It was the companies that I worked under, eTreppid and later
BLXWARE, who contracted with regional offices at various U.S. Government bases
or facilities. I interacted almost entirely with technical people pursuant to the
contracts.
44) It was Warren Trepp and later Edra Blixseth who used their contacts with the U.S.
Government to seek and arrange contracts for our work. I did not persuade the U.S.
Government to hire me, Trepp and Blixseth did. My own interaction with offices or
officials in Washington, D.C. was very limited because I was not the one running the
companies nor primarily interacting with the U.S. Government.
45) Starting as early as 2011, I was contacted by James Risen asking about my secret
work under contract for the U.S. Government in support of anti-terrorism efforts.
46) I see that in James Risens Declaration attached to the Defendants Motion to
Dismiss, Risen states that he has been working on the Book since 2011.
47) I continually provided numerous warnings, in writing, to James Risen that the false
statements he mentioned and later published in October 2014 in the Book are false.
48) However, James Risen attempted to blackmail me by demanding that I provide
classified documents and information to him or else he would publish the false and
misleading statements that he later did publish in the Book. That is, when I warned
him that the reports were false and misleading, James Risen responded to me by
telling me that he would not publish those false statements if instead I provided him
with classified information and documents. That is, James Risen demanded that I

17

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page19
19of
of
150
224

commit multiple crimes as the price for Risen not publishing the false and misleading
reports about me. Of course, I refused to be blackmailed into breaking the law as the
price for not being defamed.
49) Writers Aram Roston and James Risen were both after John Brennans information.
They both knew that I had worked for John Brennan. Both wanted his emails.
50) Roston and Risen published false and defamatory information about me to try to
pressure me into releasing classified information about John Brennan and others in
the war on terror to them as the price for them telling the truth.
51) However, Roston and Risen knew that my work was real and legitimate, because they
sought to obtain secret and classified information from Brennan from me.
52) Roston and Risen published defamation about me to punish and pressure me for not
illegally disclosing classified information and material to them.
53) In both cases, I told Risen and Roston I would have to turn over classified
information, a road I wasnt willing to go down. I was never what they were after.
They were writing these stories to hurt me so that I would provide classified
information about the various administrations. I was just their pawn.
54) Attached to this affidavit as Exhibit 8 are a few of my communications to James
Risen informing him in advance of the publication of the Book that his statements
were not only false but preposterous and that his sources were clearly unreliable.
55) In fact, on November 1, 2012, discussing the Book that he was then writing, I warned
James Risen under the email address TheAgencyInsider@Hotmail.com that his
reporting was false including because Warren Trepp was the CEO of eTreppid and
kept all the money. See Exhibit 8, attached to this affidavit.

18

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page20
20of
of
150
224

56) Risen also promised in that same email thread: If you give us the Brennan emails,
we will write a story. See Exhibit 8, attached to this affidavit.
57) However, this response was in the context of a long back-and-forth discussion
concerning the falsehood of Risens false and misleading statements against me.
58) Risen also promised in the attached email thread: As I said on the phone, I protect
my sources. I will never divulge the identify of my sources in a leak investigation.
But I also have to know that the source is telling me the truth. Jim
59) So Risen admitted that it was his professional responsibility to determine that the
sources he used to defame me are telling the truth. But Risen did not do that. The
sources he relied upon were obviously not telling the truth, as is patently obvious.
60) I warned James Risen concerning the falsehood of his reporting in that November 1,
2012, email thread, attached:
There is a reason the CIA and NSA were there, you must know
that.
Do you really think the government invoked the State Secrets
Privilege from being embarrassed or conned? Negroponte in his in
camera declaration, if ever released, was spell it all of out.
They government never wanted information to come out regarding
the other work. The program started out spying on terrorist, and
under Obama quickly moved to spying on Americans!! A program
which was started by Brennan in 2003 and continues to this day.
This technology is being used today to spy on Americans,
including candidate Romney.
I don't see you ever publishing that information? See Exhibit 81,
attached to this affidavit.

While my counsel turned over these initial disclosures to Defendants counsel, Defendants did
not turn over initial disclosure documents to my counsel in violation of the Courts Order of
April 1, 2015. I have asked my counsel to file a motion for order to show cause.
19

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page21
21of
of
150
224

61) Furthermore, this November 1, 2012, exchange concerning Risens plans writing the
Book which was eventually published on October 14, 2014, was seven (7) months
before the revelations by Edward Snowden that mass surveillance of Americans was
occurring. Therefore, Risen actually knew in 2013 that I was telling the truth and was
being lied about by his so-called sources. My discussions with James Risen on
November 1, 2012, were proven true in mid-2013. Therefore, Risen had actual
knowledge that I was indeed a whistleblower and that the sources he relied upon were
falsely discrediting me to cover up wrong-doing. In this, of course, Pulitzer Prize
winning New York Times reporter James Risen intentionally and falsely omitted the
real story.
62) I made it clear to James Risen, in the phone call referenced in the email, that the
Obama administration used mass surveillance technology to alter the 2012 election in
Florida, and that they will use the technology again in 2016.
63) In June of 2012, in a telephone call, I told James Risen and Eric Lichtblau that their
information about me in their 2011 New York Times story was incorrect, and they
needed to correct it. I also made it clear that I was under a federal court Protective
Order in Nevada, and a State Secrets Privilege order by the Director of National
Intelligence not allowing me to discuss my work. In addition, there were sealed
documents still in the Nevada case. I also made it clear, that the State secrets
privilege was also issued, to protect the work I did on domestic surveillance. I told
them I knew they met with my ex attorney Mike Flynn, for several days, in regards to
their story, and suggested, he had other motives for his conduct.
64) I also made it clear in June of 2012 that I had a brain aneurysm that was going to be

20

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page22
22of
of
150
224

repaired soon, and a risky procedure, and wanted my name cleared in case I died.
65) Therefore, the Defendants believed they could get away with their defamation
because I would probably die in the meantime.
66) In 2013, going over Risens and Lichtblaus heads, I sent emails directly to the editors
of The New York Times telling them their story was wrong and to retract it.
67) I sent an email to the Editors of The New York Times, demanding that they correct
the false reporting about me in 2012.
68) I believe that The New York Times conveyed my emails requesting a retraction of the
false statements to James Risen.
69) In 2012-2014, on at least 10 different occasions I made it clear to Aram Roston of
Playboy that his story was wrong and told him to retract it.
70) Carlotta Wells, a U.S. Department of Justice attorney assigned to matters involving
me, told me that if I talk to the press or leaked information, I will be charged with
treason for disclosing my work with the NSA and CIA. She told me when I signed
my Top Secret clearance, I forfeited my right to protect my first amendment rights.
71) Carlotta Wells additionally said that If the US Government wants to leak false
information to the press to hide successful work, and to confuse terrorist groups, they
will do it irrespective of my rights. Deal with it!
72) Carlotta Wells also stated to me and Jack Kemp, about my legal matters with the CIA
that I [Carlotta Wells] am just a foot solder doing what I am told of to do from the
White House. I dont agree with their strategy, but that is the way it is. Jack Kemp
replied, You are a senior litigation attorney for the DOJ, hard for me to believe that
you were listening to them. Carlotta Wells in turn replied Take it up with you

21

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page23
23of
of
150
224

friend George Bush.


73) I am personally aware that, through my counsel, two separate letters were sent to
executives at Houghton Mifflin requesting a retraction of the false and misleading
publication.
74) The first letter was sent on January 14, 2015 to Linda K. Zecher, President and Chief
Executive Officer and Director of Houghton Mifflin Harcourt, William Bayers,
Executive Vice President and General Counsel, and Houghton Mifflin Harcourt
located in Boston. See Exhibit 14, attached to this affidavit.
75) The second letter was sent on February 13, 2015, pursuant to Florida Statute 770.02
again requesting a retraction of the false and misleading published statements. See
Exhibit 15, attached to this affidavit.
76) On January 20, 2015, I, through my counsel, received a letter from David Eber,
ccing James Risen and William Bayers, declining to redact the false and misleading
statements and also declining to meet my counsel to resolve matters amicably. See
Exhibit 16, attached to this affidavit.
I hereby swear under oath and penalty of perjury that the foregoing facts are true and
correct to the best of my personal knowledge and belief:

April 27, 2015


//Dennis Montgomery//
Mr. Dennis Montgomery

22

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page24
24of
of
150
224

Exhibit 1

State of Florida Voter Lookup | Voter Detail


Page 1 of 1
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page25
25of
of
150
224

Voter Registration as of: 4/7/2015

Republican: 4,183,006

Democrat: 4,613,370

Other: 3,212,454

Total: 12,008,830

Check Your Voter Status


Verifique su estado como votante
Below is your voter information as it appears on your voter record.
A continuacin encontrar sus datos de votante segn nuestros registros.

Full Name
Nombre completo : DENNIS LEE MONTGOMERY
Street Address
Direccin :
City
Ciudad : MIAMI

The following 2 links will take you to your


County's Supervisor of Elections Website
where you can get additional information
on:
Los siguientes dos vnculos lo
conectarn con el Sitio de su Supervisor
de Elecciones del Condado para obtener
informacin sobre:

Zip Code
Cdigo postal :

Your Absentee Ballot Status. /

County Name
Condado : MIAMI-DADE

Estado como votante en ausencia.


Your Precinct Location. /

Voter Gender
Gnero del votante : Male

Localizacin de su Distrito.

Date Of Registration
Fecha de inscripcin : 02/23/2015
Party
Partido : Republican Party Of Florida
Voter Status
Calificacin como votante : Active*
*An active voter refers to a registered voter who is eligible to vote.
*El votante activo es un votante inscripto en el padrn, que cumple con los requisitos necesarios para votar.

New Search / Nueva bsqueda

If you are experiencing a problem with this web site please email BVRS Help for assistance.
Si tiene problemas con esta pgina web por favor contctese por correo electrnico BVRS Help con la Divisin de Elecciones.

Florida Department of State

Division of Elections

Accessibility

http://registration.elections.myflorida.com/CheckVoterStatus

Privacy Policy

Contact Us

4/13/2015

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page26
26of
of
150
224

Exhibit 2

Houghton Mifflin Harcourt: Our Offices


Page 1 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page27
27of
of
150
224

Corporate Headquarters
Boston
222 Berkeley Street
Boston, MA 02116
(617) 351-5000

United States Offices


Austin
10801 North Mopac Expressway
Austin, TX 78759
(512) 721-7000
Denver
5680 Greenwood Plaza Blvd
Suite 550
Greenwood Village, CO 80111
(303) 504-9312
Evanston
909 Davis St # 300
Evanston, IL 60201
(847) 869-2300
Geneva
1900 South Batavia Avenue
Geneva, IL 60134-3399
(630) 232-2550
Indianapolis
2700 North Richart Avenue
Indianapolis, IN 46219
Itasca
761 District Drive
Itasca, IL 60143
New York City
215 Park Ave S # 12
New York, NY 10003-1621
(212) 420-5800
345 Seventh Avenue
New York, NY 10001
Orlando
9400 Southpark Center Loop
Orlando, FL 32819
(407) 345-2000
Portsmouth
361 Hanover Street
Portsmouth, NH 03801

http://www.hmhco.com/about-hmh/our-offices

4/18/2015

Houghton Mifflin Harcourt: Our Offices


Page 2 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page28
28of
of
150
224
Puerto Rico
B7 Calle Tabonuco, Suite 1410
Guaynabo, PR 00968-3003
(787) 520-9599/9585

Rolling Meadows
3800 Golf Road
Rolling Meadows, IL 60008
(630) 467-7000
Troy
465 South Lincoln Drive
Troy, MO 63379
636-528-8110
Wilmington
181 Ballardvale Street
Wilmington, MA 01887
(978) 661-1300

International Offices
Canada
4200 Boulevard St. Laurent
Suite 1203
Montreal, Qc H2W 2R2
Tel: (514) 598-0444
China
59 A Zhongguancun Street
Haidian District
Room 1004
HMH
Beijing, 100872
Tel: 86 10 62602236
Dubai
Standard Chartered Tower, Level 5
PO 35482, Emaar Square,
Downtown Burj Khalifa
Dubai
United Arab Emirates
Ireland
152 160 Pearse Street
Dublin 2
Ireland
Tel: +353 1 240 5900
Singapore
67 Ubi Road 1
#05-08 Bizhub
Singapore 408730
Tel: +65 6635 6825
South Korea
#501 KGIT SangAm Center
1601, SangAm-dong
Mapo-gu, Seoul
123-913, S. Korea
Tel: +82 (0)2 6393
5790/5792

http://www.hmhco.com/about-hmh/our-offices

4/18/2015

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page29
29of
of
150
224

Exhibit 3

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page30
30of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page31
31of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page32
32of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page33
33of
of
150
224

Exhibit 4

Amazon confirms fulfillment centers in Ruskin, Lakeland | Tampa Bay Times


Page 1 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page34
34of
of
150
224

Amazon confirms fulfillment centers in Ruskin, Lakeland


Susan Thurston, Times Staff Writer
Tuesday, October 22, 2013 4:56pm

TAMPA Online retailer Amazon confirmed Tuesday that it will open a 1-million-square-foot distribution
center in Hillsborough County and announced plans for a second, similar warehouse about an hour away in
Polk County.
The announcement came nearly two weeks after Hillsborough officials said the retailer had completed a real
estate deal for a center in Ruskin, and it ended speculation about whether Amazon wanted two facilities so
close to each other.
Amazon said the centers will process different kinds of orders from customers.

The Ruskin center will pick, pack and ship small items, including books, electronics and consumer goods. A
center to be located on Lakeland will ship large goods such as kayaks and televisions.
Seattle-based Amazon said it would create more than 1,000 full-time jobs at the centers with health care, stock
awards and other benefits. It didn't say when the distribution centers would open or when they would start
hiring.
Site work has already begun on the Hillsborough location at Interstate 75 and State Road 674, and at the
Lakeland location at 1760 County Line Road.
"We appreciate the state, city and county officials who have worked with us to bring these fulfillment centers to
Florida,'' said a statement from Mike Roth, Amazon's vice president of North America operations. "We're
excited to join the community, bringing great jobs and investment to the area."
Gov. Rick Scott announced in June that Amazon would invest $300 million in new warehouses and hire 3,000
people as part of a deal that would eventually require Amazon to charge Florida customers sales tax on
purchases. Currently, those taxes are not collected on purchases because Amazon doesn't have a physical
presence in the state.
But the issue of online sales taxes is being debated in other states and could be resolved nationally by Congress
or courts.
In a statement Tuesday, Scott applauded Amazon for choosing Florida for its new warehouses, known as
fulfillment centers.
"I would like to thank Amazon for recognizing that Florida's business-friendly environment we've helped create
is the perfect place for their latest expansion," he said.

http://www.tampabay.com/news/business/retail/amazon-confirms-fulfillment-centers-in-hil... 4/17/2015

Amazon confirms fulfillment centers in Ruskin, Lakeland | Tampa Bay Times


Page 2 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page35
35of
of
150
224
Amazon spokeswoman Kelly Cheeseman said the centers combined would employ more than 1,000 full-time
workers but didn't have an exact figure. Amazon prefers to hire full-time workers but may employ part-timers
who request it, she said.

Thousands more could work at the centers as seasonal employees to handle the holiday shopping rush.
Both Hillsborough and Polk counties lured Amazon with financial incentives. Hillsborough approved $6.4
million in property tax breaks over seven years and $1.1 million in payments to Amazon for bringing 375 aboveaverage paying jobs. Polk okayed a $4.5 million package that would require Amazon to create at least 100 highpaying jobs and make a minimum investment of $10 million.
Founded by Jeff Bezos, Amazon is expected to post $75 billion in revenue this year but not a lot of profit.
Despite its stock reaching a record high, Amazon lost money last year. Analysts expect another loss when the
company releases third-quarter results Thursday.
By contrast, McDonald's restaurants this week reported a $1.52 billion profit for the quarter.
Information from the New York Times supplemented this report.

Amazon confirms fulfillment centers in Ruskin, Lakeland 10/22/13


Photo reprints | Article reprints
2015 Tampa Bay Times
80

Tweet

86

Commenting Guidelines Abuse Policy


Ads by Adblade

Articles and offers from around the Web

http://www.tampabay.com/news/business/retail/amazon-confirms-fulfillment-centers-in-hil... 4/17/2015

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page36
36of
of
150
224

Exhibit 5

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page37
37of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page38
38of
of
150
224

Exhibit 6

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

ABOUT

UnitedStatesSpecialOperationsCommand(USSOCOM)-Home
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page39
39of
of
150
224
Search

FORCE&FAMILY

NEWS&PUBS

CARECOALITION

ACQUISITION

HealingAfghanistan:ASoldiersStory

JUNCTION,TexasMorethan10,000milesawayfromhome,fourAfghanNationalArmywoundedsoldierssitwiththeirsergeantmajorand
someAmericanmenandwomenintheheartlandofAmericaforaweeklongseminar,March31-April3,2015,tolearnskillsthatwillbetter
enablethemtotakecareoftheirAfghanbrotherswoundedincombat.

Headquarters,UnitedStatesSpecialOperationsCommand
7701TampaPointBoulevard
MacDillAirForceBase,Florida33621

S ERV ICEL IN KS

Army |Navy |AirFo rce |Marin es

US S OC OM L IN KS

Co n tact |Emp lo ymen t |FOIA |Accessib ility/Sectio n 508 |PrivacyPo licy

C OMMON A CCES S C A RD (C AC )R EQU IRED L IN KS

SOFPo rtal |USSOCOMWeb Mail |Co n co rd Resid en ces |USSOCOML esso n sL earn ed |SO-PEq u ip men tHelp Desk |SOCOMTrain in g Po rtal

http://www.socom.mil/default.aspx

1/1

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page40
40of
of
150
224

Exhibit 7

U.S. Central Command | Contact Us


Page 1 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page41
41of
of
150
224

Home | Contact Us

Contact Us
U.S. Central Command
Address:
7115 South Boundary Boulevard
MacDill AFB, FL
33621-5101
USA
MacDill AFB Base Operator
(813) 828-1110
MacDill AFB Base Locator:
(813) 828-2444
Central Command Communications Integration Public Affairs (CCCI PA)
For Public Affairs
(813) 529-0214
DSN: (312) 529-0214
For Media Queries
(813) 529-0220
(813) 529-0213
After hours: (813) 966-8937
For Community Relations Questions
(813) 529-0235
(813) 529-0218
CENTCOM Reserve Affairs
Army: (813) 529-1074
Air Force: (813) 529-1004
Marine Corps: (813) 529-1088
Navy: (813) 529-1098
CENTCOM Inspector General
(813) 529-0275
MacDill AFB Public Affairs
(813) 828-2215

http://www.centcom.mil/en/contact-us-en

4/27/2015

U.S. Central Command | Contact Us


Page 2 of 2
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page42
42of
of
150
224
ISAF Public Affairs
ISAF HQ Public Affairs Office in Kabul
pressoffice@hq.isaf.nato.int
+93 (0) 700 13 - 2114 / 2928 / 2482
ISAF Joint Command Public Affairs Office
ijc.media@afghan.swa.army.mil
jcmediaopsnu@apod-kaia.isaf.nato.int
+93 (0) 799 51 3999 (Wait For Voice Prompt) 688-4441/4447
+93 (0) 701 13 2000 (Wait For Voice Prompt) 318-449-9244/9153/9154
NATO Public Information Office
Media Operations Center
NATO Headquarters
Blvd Leopold III
1110 Brussels, Belgium
moc.web@hq.nato.int
U.S. Department of Defense
Public Affairs
703-697-5131

http://www.centcom.mil/en/contact-us-en

4/27/2015

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page43
43of
of
150
224

Exhibit 8

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page44
44of
of
150
224
From:
To:
Subject:
Date:

james risen
Sectec Astronomy
Re: Agency
Thursday, November 01, 2012 1:44:59 PM

If you give us the Brennan emails, we will write a story


On Thu, Nov 1, 2012 at 4:34 PM, Sectec Astronomy <theagencyinsider@hotmail.com>
wrote:
Hard to imagine that you guys would ever report on anything negative regarding
Obama?
DM made it clear who was at the building, and why they were all there. There is a
reason the CIA and NSA were there, you must know that.
Do you really think the government invoked the State Secrets Priviledge from beiing
embarrassed or conned? Negroponte in his in camera declaration, if ever released,
was spell it all of out.
They governemnt never wanted information to come out regarding the other
work. The program started out spying on terrorist, and under Obama quickly moved
to spying on Americans!! A program which was started by Brennan in 2003 and
continues to this day. This technology is being used today to spy on Americans,
including candidate Romney.
I don't see you ever publishing that information?
Date: Thu, 1 Nov 2012 16:07:07 -0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Hi. As you recall, we had a very long phone conversation recently where we
discussed how it would be good to report on many of the things that we didn't
report on previously. I would like to include all of the points that you have raised in
my book, and also to write about many of these issues in the newspaper. For the
newspaper, I am particularly interested in the issue of Brennan, and his emails and
related documents, which you said when we last talked that you might be willing to
share with me. So I am open to discussing everything with you.
Jim
On Thu, Nov 1, 2012 at 3:58 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
You didn't answer my question:

You reported on FBI documents, as if they were accurate, when that the
Judge tossed out all of the claims in their report. The FBI refused to
produce any of the people in their report for examination by the court.
That include Daniel Bogden, who was reinstated by Obama as the US
Attorney for Nevada.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page45
45of
of
150
224
Why did you not mention in your story Judge Cooke scathing report
against the Warren Trepp, FBI, and other government officials? Judge
Cooke reported that DM had his 4th admendment constituional rights
violated?
How can I ever trust that you will report accurate information when your
prior story was based on information provided to you by Mike Flynn my
ex attorney?

Date: Thu, 1 Nov 2012 15:21:02 -0400


Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
I have tried West and Venables. I am writing a chapter in my book
about all this largely because we weren't able to tell much of the story
in the paper. I would like your input, and your voice in the chapter.
On Thu, Nov 1, 2012 at 3:16 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
DM doesn't need another hachet job on him. Have you
tried Agent West or Sloan Venables?
You reported on FBI documents, as if they were accurate,
when that the Judge tossed out all of the claims in their
report. The FBI refused to produce any of the people in
their report for examination by the court. That include
Daniel Bogden, who was reinstated by Obama as the US
Attorney for Nevada.
Why did you not mention in your story Judge Cooke
scathing report against the Warren Trepp, FBI, and other
government officials? Judge Cooke reported that DM had
his 4th admendment constituional rights violated?
This is so much you guys missed.

Date: Thu, 1 Nov 2012 14:54:31 -0400


Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Well, I would like to write more about him and everyone
else involved in my book now.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page46
46of
of
150
224
On Thu, Nov 1, 2012 at 12:51 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
His role? He is the CEO of eTreppid. He got all
of the money. Why was he not in your story?
Date: Thu, 1 Nov 2012 12:36:09 -0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
I have tried to talk to Warren Trepp. If you
have any information about his role, I would
like to talk to you about it.
On Thu, Nov 1, 2012 at 12:18 PM, Sectec
Astronomy <theagencyinsider@hotmail.com>
wrote:
Why have you not chased the
money, and contacted Warren
Trepp who kept all of the money?
I don't get that?
Date: Thu, 1 Nov 2012 11:41:01 0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Both. We discussed how you have
information that would be very
good for a story about his
involvement.
But I also want to talk to you more
generally about your experiences
and work during the war on terror.
On Thu, Nov 1, 2012 at 10:55 AM,
Sectec Astronomy
<theagencyinsider@hotmail.com>
wrote:
Is talking to me or
Brennan emails what
your after?
What other information
are you after?

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page47
47of
of
150
224
Date: Wed, 31 Oct
2012 23:25:56 -0400
Subject: Re: Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com
I thought what we
discussed before was
really interesting, and I
would like to continue
our discussion. As I
mentioned, I am
writing about it in my
book, and I would like
to talk to you for
that.But I would also
like to talk about what
you said about
Brennan and the White
House.
On Wed, Oct 31, 2012
at 7:06 PM, Sectec
Astronomy
<theagencyinsider@hotmail.com
> wrote:
Regarding?
So DM
get attack
in another
article?
Date: Wed,
31 Oct
2012
16:47:58 0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page48
48of
of
150
224
Hi. Can we
talk?
Jim Risen
On Fri, Oct
5, 2012 at
6:51 PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
> wrote:
I
guess
you
can
investigate
what
I
disclosed
and
then
decide.
Date:
Fri,
5
Oct
2012
18:47:34
0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com
As
I
said
on
the
phone,
I

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page49
49of
of
150
224
protect
my
sources.
I
will
never
divulge
the
identify
of
my
sources
in
a
leak
investigation.
But
I
also
have
to
know
that
the
source
is
telling
me
the
truth.
Jim
On
Fri,
Oct
5,
2012
at
5:51
PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
>
wrote:

Before
documents
are
sent,

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page50
50of
of
150
224
you
agree
that
you
will
protect
Dennis
Montgomery
as
a
protected
source.
If
the
US
Government
attacks
Dennis
Montgomery
you,
and
your
organization
will
do
everything
possible
to protect
and
defend
Dennis
Montgomery.
Agreed.

Date:
Fri,
5
Oct
2012
17:32:30
0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page51
51of
of
150
224
To:
theagencyinsider@hotmail.com
got
it,
thanks
Jim
Risen

On
Fri,
Oct
5,
2012
at
5:11
PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
>
wrote:
This
is
my
email
address...

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page52
52of
of
150
224

Exhibit 9

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page53
53of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page54
54of
of
150
224

Exhibit 10

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page55
55of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page56
56of
of
150
224

Exhibit 11

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page57
57of
of
150
224

Joe Eskridge, M.D.


Swedish Neuroscience Institute
550 17th Ave #500
Seattle WA 98122
206.320.4144

June 27, 2014


To Whom It May Concern

Dear Sirs,
I, Dr. Joe Eskridge recently treated Dennis Montgomery who is a 60 year old man who
suffered from a cerebral aneurysm. His aneurysm was detected in 2011. He does not
smoke and does not have any congenital blood vessel diseases that contribute to aneurysm
development.
High blood pressure can accelerate aneurysm growth and increase the risk of rupture and
stroke. Stress can increase blood pressure and contribute to aneurysm growth. On a
more probable than not basis stress related hypertension caused the development and
growth of his aneurysm.
I have performed over 5000 brain artery repair and embolization procedures over the
past 30 years. I was Professor of Radiology and Neurosurgery at the University of
Washington Medical School from 1987-2004.

Sincerely yours,

Joe Eskridge, M.D.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page58
58of
of
150
224

Exhibit 12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page59
59of
of

150
224

UnitedStatesSpecialOper ationsCommand
FromWikipedia,thefreeencyclopedia

TheUnitedStatesSpecialOper ationsCommand(USSOCOMorSOCOM)istheUnifiedCombatantCommand
chargedwithoverseeingthevariousSpecialOperationsComponentCommandsoftheArmy,AirForce,Navyand
MarineCorpsoftheUnitedStatesArmedForces.ThecommandispartoftheDepartmentofDefenseandistheonly
UnifiedCombatantCommandlegislatedintobeingbytheU.S.Congress.USSOCOMisheadquarteredatMacDillAir
ForceBaseinTampa,Florida.

UnitedStatesSpecialOper ationsCommand
(USSOCOM)

TheideaofaunifiedspecialoperationscommandhaditsoriginsintheaftermathofOperationEagleClaw,thedisastrous
attemptedrescueofhostagesattheAmericanembassyinIranin1980.Theensuinginvestigation,chairedbyAdmiral
JamesL.HollowayIII,theretiredChiefofNavalOperations,citedlackofcommandandcontrolandinter-service
coordinationassignificantfactorsinthefailureofthemission.[2]Sinceitsactivationon16April1987,U.S.Special
OperationsCommandhasparticipatedinmanyoperations,fromthe1989invasionofPanamatotheongoingGlobalWar
onTerrorism.[3][4]
USSOCOMconductsseveralcovertandclandestinemissions,suchasdirectaction,specialreconnaissance,counterterrorism,foreigninternaldefense,unconventionalwarfare,psychologicalwarfare,civilaffairs,andcounter-narcotics
operations.EachbranchhasaSpecialOperationsCommandthatisuniqueandcapableofrunningitsownoperations,but
whenthedifferentspecialoperationsforcesneedtoworktogetherforanoperation,USSOCOMbecomesthejoint
componentcommandoftheoperation,insteadofaSOCofaspecificbranch.[5]

UnitedStatesSpecialOperationsCommandEmblem

Active

Contents
1History

Country

Specialoperations

Role

Providefullycapablespecial
operationsforcestodefendthe
UnitedStatesanditsinterestsand
planandsynchronizeoperations
againstterroristnetworks[1]

Size

63,000[1]

1.2Somalia
1.3Iraq
2.1WarinAfghanistan
2.2Globalpresence
3SubordinateCommands
3.1JointSpecialOperationsCommand
3.2SpecialOperationsCommandJointCapabilities

Partof

DepartmentofDefense

Garrison/HQ

MacDillAFB,Florida,U.S.

Nickname

"USSOCOM","SOCOM"

Engagements

3.3Army
3.4Navy
3.5AirForce
3.6MarineCorps

OperationEarnestWill
InvasionofPanama
PersianGulfWar
UnifiedTaskForce
OperationGothicSerpent
BattleofMogadishu

4ListofUSSOCOMCombatantCommanders

OperationUpholdDemocracy
GlobalWaronTerrorism

5USSOCOMmedal
6Seealso

WarinAfghanistan

7References

IraqWar

7.1Citations

Commander s

7.2Bibliography
8Externallinks

UnitedStatesofAmerica

Type

1.1OperationEarnestWill

2Currentrole

April16,1987present[1]

Current
commander

GeneralJosephL.Votel[1]

Histor y
TheunworkablecommandandcontrolstructureofseparateU.S.militaryspecialoperationsforces(SOF),whichledtothefailureofOperationEagleClawin1980,
highlightedtheneedwithintheDepartmentofDefenseforreformandreorganization.Sincetheincident,theArmyChiefofStaff,GeneralEdwardC."Shy"Meyer,called
forafurtherrestructuringofspecialoperationscapabilities,eventuallyhelpingtocreatetheU.S.DeltaForce.[6]Althoughunsuccessfulatthejointlevel,Meyernevertheless
wentontoconsolidateArmySOFunitsunderthenew1stSpecialOperationsCommandin1982,asignificantsteptoimprovetheU.S.Army'sSOF.
By1983,therewasasmallbutgrowingsenseintheCongressfortheneedformilitaryreforms.InJune,theSenateArmedServicesCommittee(SASC)beganatwo-yearlongstudyoftheDefenseDepartment,whichincludedanexaminationofSOFspearheadedbySenatorBarryGoldwater(R-AZ).WithconcernmountingonCapitolHill,
theDepartmentofDefensecreatedtheJointSpecialOperationsAgencyon1January1984thisagency,however,hadneitheroperationalnorcommandauthorityoverany
SOF.[7][8]TheJointSpecialOperationsAgencythusdidlittletoimproveSOFreadiness,capabilities,orpolicies,andthereforewasinsufficient.WithintheDefense
Department,therewereafewstaunchSOFsupporters.NoelKoch,PrincipalDeputyAssistantSecretaryofDefenseforInternationalSecurityAffairs,andhisdeputy,Lynn
Rylander,bothadvocatedSOFreforms.[9]
Atthesametime,afewonCapitolHillweredeterminedtooverhaulUnitedStatesSpecialOperationsForces.TheyincludedSenatorsSamNunn(D-GA)andWilliam
Cohen(R-ME),bothmembersoftheArmedServicesCommittee,andRepresentativeDanDaniel(D-VA),thechairmanoftheUnitedStatesHouseArmedServices
SubcommitteeonReadiness.CongressmanDanielhadbecomeconvincedthattheU.S.militaryestablishmentwasnotinterestedinspecialoperations,thatthecountry's
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

1/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page60
60of
of

[9]SenatorsNunnandCohen
150
224
capabilityinthisareawassecondrate,andthatSOFoperationalcommandandcontrolwasanendemicproblem.
alsofeltstronglythattheDepartmentofDefensewasnotpreparingadequatelyforfuturethreats.SenatorCohenagreedthattheU.S.neededa
clearerorganizationalfocusandchainofcommandforspecialoperationstodealwithlow-intensityconflicts.[7]

InOctober1985,theSenateArmedServicesCommitteepublishedtheresultsofitstwo-yearreviewoftheU.S.militarystructure,entitled
"DefenseOrganization:TheNeedForChange."[10]Mr.JamesR.LocherIII,theprincipalauthorofthisstudy,alsoexaminedpastspecial
operationsandspeculatedonthemostlikelyfuturethreats.ThisinfluentialdocumentledtotheGoldwater-NicholsDefenseReorganizationAct
of1986.[11][12]Byspring1986,SOFadvocateshadintroducedreformbillsinbothhousesofCongress.On15May,SenatorCohenintroduced
theSenatebill,co-sponsoredbySenatorNunnandothers,whichcalledforajointmilitaryorganizationforSOFandtheestablishmentofan
officeintheDefenseDepartmenttoensureadequatefundingandpolicyemphasisforlow-intensityconflictandspecialoperations.[13]
RepresentativeDaniel'sproposalwentevenfurtherhewantedanationalspecialoperationsagencyheadedbyacivilianwhowouldbypassthe
JointChiefsandreportdirectlytotheSecretaryofDefensethiswouldkeepJointChiefsandtheServicesoutoftheSOFbudgetprocess.[8]

SenatorBarry
Goldwater,Former
ChairmanoftheSenate
ArmedServices
Committee

Congressheldhearingsonthetwobillsinthesummerof1986.AdmiralWilliamJ.CroweJr.,ChairmanoftheJointChiefsofStaff,ledthe
Pentagon'soppositiontothebills.Heproposed,asanalternative,anewSpecialOperationsForcescommandledbyathree-stargeneral.This
proposalwasnotwellreceivedonCapitolHillCongresswantedafour-stargeneralinchargetogiveSOFmoreclout.Anumberofretired
militaryofficersandotherstestifiedinfavoroftheneedforreform.[9]Bymostaccounts,retiredArmyMajorGeneralRichardScholtesgavethemostcompellingreasons
forchange.Scholtes,whocommandedthejointspecialoperationstaskforceinGrenada,explainedhowconventionalforceleadersmisusedSOFduringtheoperation,not
allowingthemtousetheiruniquecapabilities,whichresultedinhighSOFcasualties.Afterhisformaltestimony,ScholtesmetprivatelywithasmallnumberofSenatorsto
elaborateontheproblemsthathehadencounteredinGrenada.[14]
BoththeHouseandSenatepassedSOFreformbills,andthesewenttoaconferencecommitteeforreconciliation.SenateandHouseconfereesforgedacompromise.The
billcalledforaunifiedcombatantcommandheadedbyafour-stargeneralforallSOF,anAssistantSecretaryofDefenseforSpecialOperationsandLow-IntensityConflict,
acoordinatingboardforlow-intensityconflictwithintheNationalSecurityCouncil,andanewMajorForceProgram(MFP-11)forSOF(theso-called"SOF
checkbook").[15][16]Thefinalbill,attachedasaridertothe1987DefenseAuthorizationAct,amendedtheGoldwater-NicholsActandwassignedintolawinOctober1986.
CongressclearlyintendedtoforceDODandtheAdministrationtofaceuptotherealitiesofpastfailuresandemergingthreats.DODandtheAdministrationwere
responsibleforimplementingthelaw,andCongresssubsequentlyhadtopasstwoadditionalbillstoensureproperimplementation.[9]Thelegislationpromisedtoimprove
SOFinseveralrespects.Onceimplemented,MFP-11providedSOFwithcontroloveritsownresources,betterenablingittomodernizetheforce.Additionally,thelaw
fosteredinterservicecooperation:asinglecommanderforallSOFpromotedinteroperabilityamongtheforcesassignedtothesamecommand.TheestablishmentofafourstarCommanderinChiefandanAssistantSecretaryofDefenseforSpecialOperationsandLowIntensityConflicteventuallygaveSOFavoiceinthehighestcouncilsof
theDefenseDepartment.[15]
ImplementingtheprovisionsandmandatesoftheNunn-CohenAct,however,wasneitherrapidnorsmooth.Oneofthefirstissuestosurface
wasappointinganASD(SO/LIC),whoseprincipaldutiesincludedmonitorshipofspecialoperationsactivitiesandlow-intensityconflict
activitiesoftheDepartmentofDefense.TheCongressevenincreasedthenumberofassistantsecretariesofdefensefrom11to12,butthe
DepartmentofDefensestilldidnotfillthisnewbillet.InDecember1987,theCongressdirectedSecretaryoftheArmyJohnO.Marshtocarry
outtheASD(SO/LIC)dutiesuntilasuitablereplacementwasapprovedbytheSenate.Notuntil18monthsafterthelegislationpasseddid
AmbassadorCharlesWhitehouseassumethedutiesofASD(SO/LIC).[17]

GeneralJamesLindsay
thefirstCommanderin
Chief,SpecialOperations
Command

Meanwhile,theestablishmentofUSSOCOMprovideditsownmeasureofexcitement.Aquicksolutiontomanningandbasingabrandnew
unifiedcommandwastoabolishanexistingcommand.UnitedStatesReadinessCommand(USREDCOM),withanoftenmisunderstood
mission,didnotappeartohaveaviablemissioninthepostGoldwater-Nicholsera,anditsCommanderinChief,GeneralJamesLindsay,had
hadsomespecialoperationsexperience.On23January1987,theJointChiefsofStaffrecommendedtotheSecretaryofDefensethat
USREDCOMbedisestablishedtoprovidebilletsandfacilitiesforUSSOCOM.PresidentRonaldReaganapprovedtheestablishmentofthenew
commandon13April1987.TheDepartmentofDefenseactivatedUSSOCOMon16April1987andnominatedGeneralLindsaytobethefirst
CommanderinChiefSpecialOperationsCommand(USCINCSOC).TheSenateacceptedhimwithoutdebate.[9]

Oper ationEar nestWill


USSOCOM'sfirsttacticaloperationinvolvedSEALs,SpecialBoatTeams(SBT),and160thSpecialOperationsAviationRegiment
(Airborne)("NightStalkers")aviatorsworkingtogetherduringOperationEarnestWillinSeptember1987.DuringOperationEarnest
Will,theUnitedStatesensuredthatneutraloiltankersandothermerchantshipscouldsafelytransitthePersianGulfduringtheIran
IraqWar.IranianattacksontankerspromptedKuwaittoasktheUnitedStatesinDecember1986toregister11Kuwaititankersas
AmericanshipssothattheycouldbeescortedbytheU.S.Navy.PresidentReaganagreedtotheKuwaitirequeston10March1987,
hopingitwoulddeterIranianattacks.[9]TheprotectionofferedbyU.S.navalvessels,however,didnotstopIran,whichusedmines
andsmallboatstoharasstheconvoyssteamingtoandfromKuwait.InlateJuly1987,RearAdmiralHaroldJ.Bernsen,commander
oftheMiddleEastForce,requestedNSWassets.SpecialBoatTeamsdeployedwithsixMarkIIIPatrolBoatsandtwoSEAL
platoonsinAugust.[9]TheMiddleEastForcedecidedtoconverttwooilservicingbarges,HerculesandWimbrownVII,intomobile
seabases.ThemobileseabasesallowedSOFinthenorthernPersianGulftothwartclandestineIranianminingandsmallboat
attacks.

MH-60landingonHercules

On21September,NightstalkersflyingMH-60andLittleBirdstookofffromthefrigateUSSJarretttotrackanIranianship,theIranAjr.TheNightstalkersobservedthe
IranAjrturnoffitslightsandbeginlayingmines.Afterreceivingpermissiontoattack,thehelicoptersfiredgunsandrockets,stoppingtheship.AstheIranAjr'screw
begantopushminesovertheside,thehelicoptersresumedfiringuntilthecrewabandonedship.SpecialBoatTeamsprovidedsecuritywhileaSEALteamboardedthe
vesselatfirstlightanddiscoverednineminesonthevessel'sdeck,aswellasalogbookrevealingareaswherepreviousmineshadbeenlaid.ThelogbookimplicatedIranin
mininginternationalwaters.[9]
Withinafewdays,theSpecialOperationsforceshaddeterminedtheIranianpatternofactivitytheIranianshidduringthedaynearoilandgasplatformsinIranianwaters
andatnighttheyheadedtowardtheMiddleShoalsBuoy,anavigationaidfortankers.Withthisknowledge,SOFlaunchedthreeLittleBirdhelicoptersandtwopatrolcraft
tothebuoy.TheLittleBirdhelicoptersarrivedfirstandwerefireduponbythreeIranianboatsanchorednearthebuoy.Afterashortbutintensefirefight,thehelicopters
sankallthreeboats.Threedayslater,inmid-October,anIranianSilkwormmissilehitthetankerSeaIsleCityneartheoilterminaloutsideKuwaitCity.Seventeencrewmen
andtheAmericancaptainwereinjuredinthemissileattack.[9][18]DuringOperationNimbleArcher,fourdestroyersshelledtwooilplatformsintheRostamoilfield.After
theshelling,aSEALplatoonandademolitionunitplantedexplosivesononeoftheplatformstodestroyit.TheSEALsnextboardedandsearchedathirdplatform2miles
(3km)away.Documentsandradiosweretakenforintelligencepurposes.
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

2/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page61
61of
of

[19]Tensailorswere
150
224
On14April1988,65miles(100km)eastofBahrain,thefrigateUSSSamuelB.Roberts(FFG-58)hitamine,blowinganimmenseholeinitshull.
injured.DuringOperationPrayingMantistheU.S.retaliatedfiercely,attackingtheIranianfrigateSahandandoilplatformsintheSirriandSassanoilfields.[18]AfterU.S.
warshipsbombardedtheSirriplatformandsetitablaze,aUH-60withaSEALplatoonflewtowardtheplatformbutwasunabletogetcloseenoughbecauseoftheroaring
fire.Secondaryexplosionssoonwreckedtheplatform.[9]Thereafter,Iranianattacksonneutralshipsdroppeddrastically.On3July1988,theUSSVincennesshotdownan
Iraniancivilianairliner,IranAirFlight655,killingall290peopleonboard,including66children.On18July,IranacceptedtheUnitedNationsceasefireon20August
1988,theIranIraqWarended.TheremainingSEALs,patrolboats,andhelicoptersthenreturnedtotheUnitedStates.[9]Specialoperationsforcesprovidedcriticalskills
necessarytohelpCENTCOMgaincontrolofthenorthernPersianGulfandbalkIran'ssmallboatsandminelayers.Theabilitytoworkat
nightprovedvital,becauseIranianunitsuseddarknesstoconcealtheiractions.Additionally,becauseofEarnestWilloperational
requirements,USSOCOMwouldacquirenewweaponssystemsthepatrolcoastalshipsandtheMarkVSpecialOperationsCraft.[9]

Somalia

OneoftwoIranianoil
platformsetablazeafter
shellingbyAmerican
destroyers.

SpecialOperationsCommandfirstbecameinvolvedinSomaliain1992aspartofOperationProvideRelief.C-130scircledoverSomali
airstripsduringdeliveryofreliefsupplies.SpecialForcesmedicsaccompaniedmanyreliefflightsintotheairstripsthroughoutsouthern
Somaliatoassessthearea.TheywerethefirstU.S.soldiersinSomalia,arrivingbeforeU.S.forceswhosupportedtheexpandedrelief
operationsofRestoreHope.[9][20][21]ThefirstteamsintoSomaliawereCIASpecialActivitiesDivisionparamilitaryofficerswithelements
ofJSOC.Theyconductedveryhighriskadvancedforceoperationspriortotheentryofthefollowonforces.Thefirstcasualtyofthe
conflictcamefromthisteamandwasaParamilitaryofficerandformerDeltaForceoperatornameLarryFreedman.Freedmanwasawarded
theIntelligenceStarfor"extraordinaryheroism"forhisactions.[22]

TheearliestmissionsduringOperationRestoreHopewereconductedbyNavySEALs.TheSEALsperformedseveralhydro-graphicreconnaissancemissionstofind
suitablelandingsitesforMarines.On7December,theSEALsswamintoMogadishuHarbor,wheretheyfoundsuitablelandingsites,assessedtheareaforthreats,and
concludedthattheportcouldsupportoffloadingships.ThiswasatoughmissionbecausetheSEALsswamagainstastrongcurrentwhichleftmanyofthemoverheatedand
exhausted.Furthermore,theyswamthroughrawsewageintheharbor,whichmadethemsick.[9]WhenthefirstSEALshittheshorethefollowingnight,theyweresurprised
tomeetmembersofthenewsmedia.ThefirstMarinescameashoresoonthereafter,andthepressredirectedtheirattentiontothem.Later,theSEALsprovidedpersonal
securityforPresidentGeorgeBushduringavisittoSomalia.[9][21]InDecember1992,SpecialForcesassetsinKenyamovedtoSomaliaandjoinedOperationRestoreHope.
January1993,aSpecialForcescommandelementdeployedtoMogadishuastheJointSpecialOperationsForces-Somalia(JSOFOR)thatwouldcommandandcontrolall
specialoperationsforRestoreHope.JSOFOR'smissionwastomakeinitialcontactwithindigenousfactionsandleadersprovideinformationforforceprotectionand
providereportsontheareaforfuturereliefandsecurityoperations.BeforeredeployinginApril,JSOFORelementsdroveover26,000miles(42,000km),captured277
weapons,anddestroyedover45,320pounds(20,560kg)ofexplosives.[9]
InAugust1993,SecretaryofDefenseLesAspindirectedthedeploymentofaJointSpecialOperationsTaskForce(JSOTF)to
SomaliainresponsetoattacksmadebyGeneralMohamedFarrahAidid'ssupportersuponU.S.andUNforces.TheJSOTF,
namedTaskForce(TF)Ranger,waschargedwithamissionnamedOperationGothicSerpenttocaptureAidid.Thiswasan
especiallyarduousmission,forAididhadgoneunderground,afterseveralLockheedAC-130airraidsandUNassaultsonhis
strongholds.[9][23][24]
WhileMarinesfromthe24thMEUprovidedaninterimQRF(ForceReconDetandhelicoptersfromHMM-263),thetaskforce
arrivedinthecountry,andbegantrainingexercises.TheMarineswereaskedtotakeontheAididsnatchmission,buthavingthe
advantageofbeingintheareaformorethantwomonths,decidedaftermissionanalysisthatthemissionwasa"no-go"dueto
BravoCompany,3rdBattalionofthe75th
severalfactors,centeredaroundtheinabilitytorescuethecrewofadownedhelicopter(re:theindigenousforcestechniqueof
RangerRegimentinSomalia,1993.
usingRPGsagainsthelicoptersandblockingthenarrowstreetsinordertorestrictthemovementofagroundrescueforce).This
knowledgewasnotpassedontotheRangers,duetotheMarinesoperatingfromtheUSSWaspandtheRangersremainingon
land.TFRangerwasmadeupofoperatorsfromDeltaForce,75thRangerRegiment,160thSOAR,AirForcespecialtacticsunits,andSEALsfromtheNavalSpecial
WarfareDevelopmentGroup.[9][23]DuringAugustandSeptember1993,thetaskforceconductedsixmissionsintoMogadishu,allofwhichweresuccesses.AlthoughAidid
remainedfree,theeffectofthesemissionsseriouslylimitedhismovements.[24]
On3October,TFRangerlauncheditsseventhmission,thistimeintoAidid'sstrongholdtheBakaraMarkettocapturetwoofhiskeylieutenants.Themissionwasexpected
totakeonlyoneortwohours.[23]HelicopterscarriedanassaultandagroundconvoyofsecurityteamslaunchedinthelateafternoonfromtheTFRangercompoundat
Mogadishuairport.TheTFcameunderincreasinglyheavyfire,moreintensethanduringpreviousmissions.Theassaultteamcaptured24SomalisincludingAidid's
lieutenantsandwereloadingthemontotheconvoytruckswhenaMH-60Blackhawkwashitbyarocket-propelledgrenade(RPG).[9][24]Asmallelementfromthesecurity
force,aswellasanMH-6assaulthelicopterandanMH-60carryingafifteenmancombatsearchandrescue(CSAR)team,rushedtothecrashsite.[9][23][24]Thebattle
becameincreasinglyworse.AnRPGstruckanotherMH-60,crashinglessthan1mile(1.6km)tothesouthofthefirstdownedhelicopter.Thetaskforcefaced
overwhelmingSomalimobsthatoverranthecrashsites,causingadiresituation.[23]ASomalimoboverranthesecondsiteand,despiteaheroicdefense,killedeveryone
exceptthepilot,whomtheytookprisoner.Twodefendersofthiscrashsite,MasterSergeantGaryGordonandSergeantFirstClassRandallShughart,wereposthumously
awardedtheMedalofHonor.[9][23][24]Aboutthistime,themission'squickreactionforce(QRF)alsotriedtoreachthesecondcrashsite.Thisforcetoowaspinnedby
SomalifireandrequiredthefiresupportoftwoAH-6helicoptersbeforeitcouldbreakcontactandmakeitswaybacktothebase.[9]
Theassaultandsecurityelementsmovedonfoottowardsthefirstcrasharea,passingthroughheavyfire,andoccupiedbuildingssouthandsouthwestofthedowned
helicopter.Theyfoughttoestablishdefensivepositionssonottobepinneddownbyveryheavyenemyfire,whiletreatingtheirwounded,andworkedtofreethepilot's
bodyfromthedownedhelicopter.Withthedetaineesloadedontrucks,thegroundconvoyforceattemptedtoreachthefirstcrashsite.Unabletofinditamongstthenarrow,
windingalleyways,theconvoycameunderdevastatingsmallarmsandRPGfire.Theconvoyhadtoreturntobaseaftersufferingnumerouscasualties,andsustaining
substantialdamagetothetheirvehicles.
Reinforcements,consistingofelementsfromtheQRF,10thMountainDivisionsoldiers,Rangers,SEALs,PakistanArmytanksandMalaysianarmoredpersonnelcarriers,
finallyarrivedat1:55amon4October.Thecombinedforceworkeduntildawntofreethepilot'sbody,receivingRPGandsmallarmsfirethroughoutthenight.[9]Allthe
casualtieswereloadedontothearmoredpersonnelcarriers,andtheremainderoftheforcewasleftbehindandhadnochoicebuttomoveoutonfoot.[23]AH-6gunships
rakedthestreetswithfiretosupportthemovement.ThemainforceoftheconvoyarrivedatthePakistaniStadium-compoundfortheQRF-at6:30am,[23]thusconcluding
oneofthebloodiestandfiercesturbanfirefightssincetheVietnamWar.TaskForceRangerexperiencedatotalof17killedinactionand106wounded.Variousestimates
placedSomalicasualtiesabove1,000.[23]AlthoughTaskForceRanger'sfewmissionsweresuccesses,theoveralloutcomeofOperationGothicSerpentwasdeemeda
failurebecauseoftheTaskForce'sfailuretocompletetheirstatedmission,capturingMohamedFarrahAidid.[23]MostU.S.forcespulledoutofSomaliabyMarch1994.

http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

3/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page62
62of
of

150
224
ThewithdrawalfromSomalia,wascompletedonMarch1995.[9]EventhoughOperationGothicSerpentfailed,USSOCOMstillmadesignificantcontributionsto
operationsinSomalia.SOFperformedreconnaissanceandsurveillancemissions,assistedwithhumanitarianrelief,protectedAmericanforcesandconductedriverine
patrols.Additionally,theyensuredthesafelandingoftheMarinesandsafeguardedthearrivalofmerchantshipscarryingfood.[9][18]
Ir aq
USSOCOM's10thSpecialForcesGroup,elementsofJSOCandCIA/SADParamilitaryOfficerslinkedupagainandwerethefirsttoenterIraqpriortotheinvasion.Their
effortsorganizedtheKurdishPeshmergatodefeatAnsarAlIslaminNorthernIraqbeforetheinvasion.ThisbattlewasforcontrolofaterritoryinNortheasternIraqthat
wascompletelyoccupiedbyAnsarAlIslam,anallyofAlQaeda.Thiswasaverysignificantbattleandledtotheterminationofasubstantialnumberofterroristsandthe
uncoveringofachemicalweaponsfacilityatSargat.Theseterroristswouldhavebeeninthesubsequentinsurgencyhadtheynotbeeneliminatedduringthisbattle.Sargat
wastheonlyfacilityofitstypediscoveredintheIraqwar.ThisbattlemayhavebeentheToraBoraofIraq,butitwasasounddefeatforAlQaedaandtheirallyAnsarAl
Islam.ThiscombinedteamthenledthePeshmergaagainstSaddam'snorthernArmy.ThiseffortkeptSaddam'sforcesinthenorthanddeniedtheabilitytoredeployto
contesttheinvasionforcecomingfromthesouth.Thiseffortmayhavesavedthelivesofhundredsifnotthousandsofcoalitionservicemenandwomen.[25]
AtthelaunchoftheIraqWardozensof12-memberSpecialForcesteamsinfiltratedsouthernandwesternIraqtohuntforScud
missilesandpinpointbombingtargets.ScoresofNavySEALsseizedoilterminalsandpumpingstationsonthesoutherncoast.[26]
AirForcecombatcontrollersflewcombatmissionsinMC-130HCombatTalonIIsandestablishedausteredesertairstripstobegin
theflowofsoldiersandsuppliesdeepintoIraq.ItwasafarcryfromthePersianGulfwarof1991,whereSpecialOperationsforces
werekeptlargelyonthesidelines.ButitwouldnotbeareplayofAfghanistan,whereArmySpecialForcesandNavySEALsledthe
fighting.AftertheirstarturninAfghanistan,manyspecialoperatorsweredisappointedtoplayasupportingroleinIraq.Many
specialoperatorsfeltrestrictedbycautiouscommanders.[27]Fromthatpoint,USSOCOMhassincekilledorcapturedhundredsof
insurgentsandAl-Qaedaterrorists.IthasconductedseveralforeigninternaldefensemissionssuccessfullytrainingtheIraqisecurity
forces.[28][29]

Cur r entr ole


UnitedStatesSpecialOperationsCommandplayedapivotalroleinfightingtheformerTalibangovernmentinAfghanistanin
2001[30]andtopplingitthereafter,aswellascombatingtheinsurgencyandcapturingSaddamHusseininIraq.USSOCOMin2004
wasdevelopingplanstohaveanexpandedandmorecomplexroleintheglobalcampaignagainstterrorism,[31]andthatrole
continuedtoemergebeforeandafterthekillingofOsamabinLadeninPakistanin2011.[32][33]In2010,"ofabout13,000Special
Operationsforcesdeployedoverseas,about9,000[were]evenlydividedbetweenIraqandAfghanistan."[32]

War inAfghanistan
IntheinitialstagesoftheWarinAfghanistan,USSOCOMforceslinkedupwithCIAParamilitaryOfficersfromSpecialActivities
DivisiontodefeattheTalibanwithouttheneedforlarge-scaleconventionalforces.[34]Thiswasoneofthebiggestsuccessesofthe
globalWaronTerrorism.[35]Theseunitslinkedupseveraltimesduringthiswarandengagedinseveralfuriousbattleswiththe
enemy.OnesuchbattlehappenedduringOperationAnacondathemissiontosqueezelifeoutofaTalibanandAl-Qaedastronghold
dugdeepintotheShah-i-KotmountainsofeasternAfghanistan.Theoperationwasseenasoneoftheheaviestandbloodiestfightsin
theWarinAfghanistan.[36]ThebattleonanAfghanmountaintopcalledTakurGharfeaturedspecialoperationsforcesfromall4
servicesandtheCIA.NavySEALs,ArmyRangers,AirForceCombatControllers,andPararescuemenfoughtagainstentrenchedAlQaedafightersatopa10,000-foot(3,000m)mountain.Subsequently,theentrenchedTalibanbecametargetsofeveryassetinthe
sky.Accordingtoanexecutivesummary,thebattleofTakurGharwasthemostintensefirefightAmericanspecialoperatorshave
beeninvolvedinsince18U.S.ArmyRangerswerekilledinMogadishu,Somalia,in1993.[37][38][39]DuringOperationRedWingson
28June2005,fourNavySEALs,pinneddowninafirefight,radioedforhelp.AChinookhelicopter,carrying16servicemembers,
respondedbutwasshotdown.AllmembersoftherescueteamandthreeoffourSEALsonthegrounddied.Itwastheworstlossof
lifeinAfghanistansincetheinvasionin2001.TheNavySEALMarcusLuttrellalonesurvived.[40][41]TeamleaderMichaelP.
MurphywasawardedtheMedalofHonorforhisactionsinthebattle.

Globalpr esence

Mapofthemainbattlesitesduring
theBattleofMogadishu.

A7thSFGSpecialForcesmedicin
KandaharProvince,Afghanistan,in
September2008.

SOCchiefOlsonsaidin2011thatSOCOM"isamicrocosmoftheDepartmentofDefense,withground,air,andmaritimecomponents,aglobalpresence,andauthorities
andresponsibilitiesthatmirrortheMilitaryDepartments,MilitaryServices,andDefenseAgencies."[33]In2010,specialoperationsforcesweredeployedin75countries,
comparedwithabout60atthebeginningof2009.[32]In2011,SOCspokesmanColonelTimNye(Army[42])wasreportedtohavesaidthatthenumberofcountrieswith
SOCpresencewilllikelyreach120andthatjointtrainingexerciseswillhavebeencarriedoutinmostorallofthosecountriesduringtheyear.OnestudyidentifiedjointtrainingexercisesinBelize,Brazil,Bulgaria,BurkinaFaso,Germany,Indonesia,Mali,Norway,Panama,andPolandin2010andalso,throughmid-year2011,inthe
DominicanRepublic,Jordan,Romania,Senegal,SouthKorea,andThailand,amongothernations.Inaddition,SOCforcesexecutedthehighprofilekillingofOsamabin
LadeninPakistanin2011.[33]
Wikileaks'releasesofcablesfromtheU.S.Embassy,Pakistan,revealedthepresenceofadetachmentofSOCOM(orpossiblyUnitedStatesArmySpecialOperations
Command)referredtoasSOC(FWD)-PAK(09ISLAMABAD2449,9August2010).Thisunitorheadquartersmaybe,infullform,SpecialOperationsCommand
(Forward)-Pakistan.Itseemsunlikelythatthesymbolreferstotheminussignthatsometimesmeansthattheunitorheadquartersisoperatingatlessthanfullstrength.
TheunitorheadquartersincludesaMilitaryInformationSupportTeam(MIST[1](http://www.africom.mil/getArticle.asp?art=4866)).[43]Anotherstorythatreportedon
JSOC/Blackwateranti-terroristoperationsinPakistanwasJeremyScahill's"TheSecretU.S.WarinPakistan"(http://www.thenation.com/article/secret-us-war-pakistan),in
the7November2009,issueofTheNation.
In2010,WhiteHousecounterterrorismdirectorJohnO.BrennansaidthattheUnitedStates"willnotmerelyrespondafterthefact"ofaterroristattackbutwill"takethe
fighttoal-QaedaanditsextremistaffiliateswhethertheyplotandtraininAfghanistan,Pakistan,Yemen,Somaliaandbeyond."Olsonsaid,"Insomeplaces,indeferenceto
host-countrysensitivities,wearelowerinprofile.Ineveryplace,SpecialOperationsforcesactivitiesarecoordinatedwiththeU.S.ambassadorandareunderthe
operationalcontrolofthefour-starregionalcommander."[32]

http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

4/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page63
63of
of

TheconductofactionsbySOCforcesoutsideofIraqandAfghanwarzoneshasbeenthesubjectofinternalU.S.debate,includingbetweenrepresentativesoftheBush
150
224
administrationsuchasJohnB.BellingerIII,ononehand,andtheObamaadministrationonanother.TheUnitedNationsin2010also"questionedtheadministration's
authorityunderinternationallawtoconductsuchraids,particularlywhentheykillinnocentcivilians.Onepossiblelegaljustificationthepermissionofthecountryin
questioniscomplicatedinplacessuchasPakistanandYemen,wherethegovernmentsprivatelyagreebutdonotpubliclyacknowledgeapprovingtheattacks,"asone
reportputit.[32]

Subor dinateCommands

SpecialOperationsCommandStructure(Media:U.S.SpecialOperationsCommand.png).

J ointSpecialOper ationsCommand
[44]JointSpecialOperationsCommandisacomponentcommandoftheUSSOCOMandischargedtostudyspecialoperations

requirementsandtechniquestoensureinteroperabilityandequipmentstandardization,planandconductspecialoperationsexercises
andtraining,anddevelopJointSpecialOperationsTactics.[1]Itwasestablishedin1980onrecommendationofCol.Charlie
Beckwith,intheaftermathofthefailureofOperationEagleClaw.[45]
Units
TheU.S.Army's1stSpecialForcesOperationalDetachment-Delta,popularlyknownasDeltaForce,isthefirstofthetwo
primarycounter-terroristunitsofJSOCandSOCOM.[46]ModeledaftertheBritishSpecialAirService,DeltaForceis
regardedasoneofthepremierspecialoperationsforcesintheworld.[47]ThisisbecauseofDelta'sstringenttrainingand
selectionprocess.DeltarecruitsprimarilyfromthemosttalentedandhighlyskilledoperatorsintheArmySpecialForcesand
the75thRangerRegimentalthoughDeltawilltakeanyoneandeveryonethatcanpasstheirscreening.[23][47]Recruitsmust
passarigidselectioncoursebeforebeginningtraining.DeltahasreceivedtrainingfromnumerousU.S.governmentagencies

TheJointSpecialOperations
Commandinsignia

andothertieroneSOFandhascreatedacurriculumbasedonthistrainingandtechniquesthatithasdeveloped.[47]Deltaconductsclandestineandcovertspecial
operationsallovertheworld.[47]Ithasthecapabilitytoconductmyriadspecialoperationsmissionsbutspecializesincounter-terrorismandhostagerescue
operations.[23][46][48]
TheNavalSpecialWarfareDevelopmentGroup(DEVGRU,SEALTeamSix)isthesecondofthetwoprimarycounter-terroristunitsofJSOCandSOCOM.[46]
DEVGRUisNavalSpecialWarfare'scounterparttoDelta.LikeDelta,DEVGRUrecruitsthebestoperatorsfromthebestunitsinitsbranch,theNavySEALs.
DEVGRUiscapableofperforminganytypeofspecialoperationsmission,buttrainsespeciallyforcounter-terroristandhostagerescueoperations.[23][46]
TheIntelligenceSupportActivity(ISA,TheActivity)isthesupportbranchofJSOCandUSSOCOM.ItsprimarymissionsaretoprovideHumanIntelligence
(HUMINT)andSignalIntelligence(SIGINT)mainlyforDeltaandDEVGRU'soperations.[46][49]BeforetheestablishingoftheStrategicSupportBranchin2001,the
ISAneededthepermissionoftheCIAtoconductitsoperations,whichsometimescausedittobelesseffectiveinitssupportofJSOC'sprimaryunits.[46][50][51]
TheAirForce24thSpecialTacticsSquadron(24thSTS)istheAFSOCcomponentofJSOC.The24thSTSusuallyoperateswithDeltaandDEVGRUbecauseofthe
convenienceof24thSTSabilitytosynchronizeandcontrolthedifferentelementsofairpowerandenhanceairoperationsdeepinenemyterritory.[23]
PortionsofJSOCunitshavemadeuptheconstantlychangingspecialoperationstaskforce,operatingintheU.S.CentralCommandareaofoperations.TheTaskForce11,
TaskForce121,TaskForce6-26andTaskForce145arecreationsofthePentagon'spost-11Septembercampaignagainstterrorism,anditquicklybecamethemodelfor
howthemilitarywouldgainintelligenceandbattleinsurgentsinthefuture.OriginallyknownasTaskForce121,itwasformedinthesummerof2003,whenthemilitary
mergedtwoexistingSpecialOperationsunits,onehuntingOsamabinLadeninandaroundAfghanistan,andtheothertrackingSadaamHusseininIraq.[52][53]

SpecialOper ationsCommandJ ointCapabilities


SpecialOperationsCommandJointCapabilities(SOC-JC)wastransferredtoUSSOCOMfromthesoontobedisestablishedUnitedStatesJointForcesCommand.[54]
PrimaryMission:SOC-JCtrainsconventionalandSOFcommandersandtheirstaffs,supportsUSSOCOMinternationalengagementtrainingrequirements,andsupports
implementationofcapabilitysolutionsinordertoimprovestrategicandoperationalWarfightingreadinessandjointinteroperability.SOC-JCmustalsobepreparedto
supportdeployedSpecialOperationsJointTaskForce(SOJTF)Headquarters(HQ).
Asajointsub-unifiedcommandunderUSSOCOM,SOC-JC'scorefunctionistoenhancetheinteroperabilityofconventionalandSpecialOperationsForces(SOF)
commandersandstaffsthroughrobuststrategicandoperationalleveljointtraining.IncoordinationwiththeUSSOCOMJ3,J7/9andJointSpecialOperationsUniversity
(JSOU),SOC-JCprovidesexcellenttrainingandsupporttotheeducationforSOFandConventionalForces(CF)worldwide.Additionally,SOC-JCsupportsthejointSOF
capabilitiesdevelopmentprocesswhilemaintainingtheflexibilitytosupportemerginginitiatives.
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

5/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Ar my

Page
Page64
64of
of

150
224

On1December1989theUnitedStatesArmySpecialOperationsCommand(USASOC)activatedasthe16thmajorArmycommand.These
specialoperationsforceshavebeenAmerica'sspearheadforunconventionalwarfareformorethan40years.USASOCcommandssuchunitsas
thewellknownSpecialForces(SF,orthe"GreenBerets")andRangers,andsuchrelativelyunknownunitsasthePsychologicalOperations
Group(PSYOP)andCivilAffairsBrigade(CA).TheseareoneoftheUSSOCOM'smainweaponsforwagingunconventionalwarfareand
counter-insurgency.Thesignificanceoftheseunitsisemphasizedasconventionalconflictsarebecominglessprevalentasinsurgentandguerrilla
warfareincreases.[55][56]
Units
The75thRangerRegiment(U.S.ArmyRangers)isthepremierlight-infantryunitoftheUnitedStatesArmyandisheadquarteredatFort
Benning,Georgia.The75thRangerRegiment'smissionistoplanandconductspecialmissionsinsupportofU.S.policyandobjectives.[57]
TheRangersareaflexibleandrapid-deployableforce.Eachbattalioncandeployanywhereintheworldwithin18hoursnotice.TheArmy
placesmuchimportanceonthe75thRangerRegimentanditstrainingitpossessesthecapabilitiestoconductconventionalandmost

USASOCpatch.

specialoperationsmissions.Rangersarecapableofinfiltratingbyland,sea,orairanddirectactionoperationssuchasconductingraidsor
assaultingbuildingsorairfields.[58]
UnitedStatesArmySpecialForces(SF)akaGreenBeretsperformseveraldoctrinalmissions:unconventionalwarfare,foreigninternaldefense,special
reconnaissance,directactionandcounter-terrorism.ThesemissionsmakeSpecialForcesuniqueintheU.S.military,becausetheyareemployedthroughoutthethree
stagesoftheoperationalcontinuum:peacetime,conflictandwar.[59]Foreigninternaldefenseoperations,SF'smainpeacetimemission,aredesignedtohelpfriendly
developingnationsbyworkingwiththeirmilitaryandpoliceforcestoimprovetheirtechnicalskills,understandingofhumanrightsissues,andtohelpwith
humanitarianandcivicactionprojects.SpecialForcesunconventionalwarfarecapabilitiesprovideaviablemilitaryoptionforavarietyofoperationaltaskingsthat
areinappropriateorinfeasibleforconventionalforces.SpecialForcesaretheU.S.military'spremierunconventionalwarfareforce.[60]Foreigninternaldefenseand
unconventionalwarfaremissionsarethebreadandbutterofSpecialForcessoldiers.ForthisreasonSFcandidatesaretrainedextensivelyinweapons,engineering,
communicationsandmedicine.SFsoldiersaretaughttobewarriorsfirstandteacherssecondbecausetheymustbeabletotraintheirteamandbeabletotraintheir
alliesduringaFIDorUWmission.[59][61]OftenSFunitsarerequiredtoperformadditional,orcollateral,activitiesoutsidetheirprimarymissions.Thesecollateral
activitiesarecoalitionwarfare/support,combatsearchandrescue,securityassistance,peacekeeping,humanitarianassistance,humanitariande-miningandcounterdrugoperations.[62]
The160thSpecialOperationsAviationRegiment(NightStalkers)headquarteredatFortCampbell,Kentuckyprovidesaviation
supporttounitswithinUSSOCOM.TheRegimentconsistsofMH-6andAH-6lighthelicopters,MH-60helicoptersandMH47heavyassaulthelicopters.Thecapabilitiesofthe160thSOAR(A)havebeenevolvingsincetheearly1980s.Itsfocuson
nightoperationsresultedinthenickname,the"NightStalkers."[63]TheprimarymissionoftheNightStalkersistoconduct
overtorcovertinfiltration,exfiltration,andresupplyofspecialoperationsforcesacrossawiderangeofenvironmental
conditions.[64]
4thMilitaryInformationSupportGroup(Airborne)and8thMilitaryInformationSupportGroup(Airborne)Soldiersuse
persuasiontoinfluenceperceptionsandencouragedesiredbehavior.[65][66]PSYOPsoldierssupportsnationalobjectivesatthe

SpecialForcesonapatrolin
Afghanistan.

tactical,operationalandstrategiclevelsofoperations.Strategicpsychologicaloperationsadvancebroadorlong-term
objectivesglobalinnature,theymaybedirectedtowardlargeaudiencesoratkeycommunicators.Operationalpsychologicaloperationsareconductedonasmaller
scale.4thPSYOPGpisemployedbytheatercommanderstotargetgroupswithinthetheaterofoperations.4thPSYOPGppurposecanrangefromgainingsupport
forU.S.operationstopreparingthebattlefieldforcombat.Tacticalpsychologicaloperationsaremorelimited,usedbycommanderstosecureimmediateandneartermgoals.Inthisenvironment,theseforce-enhancingactivitiesserveasameanstolowerthemoraleandefficiencyofenemyforces.[67]
95thCivilAffairsBrigade(Airborne)specialistsidentifycriticalrequirementsneededbylocalcitizensinwarordisastersituations.Theyalsolocatecivilianresources
tosupportmilitaryoperations,helpminimizecivilianinterferencewithoperations,supportnationalassistanceactivities,planandexecutenoncombatantevacuation,
supportcounter-drugoperationsandestablishandmaintainliaisonwithcivilianaidagenciesandothernongovernmentalorganizations.Insupportofspecial
operations,theseculturallyoriented,linguisticallycapableSoldiersmayalsobetaskedtoprovidefunctionalexpertiseforforeigninternaldefenseoperations,
unconventionalwarfareoperationsanddirectactionmissions.[68]
SustainmentBrigade(SpecialOperations)(Airborne)(SBSO(A))hasadifficultmissionsupportingUSASOC.Intheirrespectivefields,signalandsupportsoldiers
providesupplies,maintenance,equipmentandexpertiseallowingSpecialOperationForcesto"shoot,moveandcommunicate"onacontinuousbasis.Because
USASOCoftenusesSpecialOperationsForces-uniqueitems,soldiersassignedtotheseunitsaretaughttooperateandmaintainavastarrayofspecializedequipment
notnormallyusedbytheirconventionalcounterparts.SBSO(A)alsoprovidestheUSASOCwithcentralizedandintegratedmaterialmanagementofproperty,
equipmentmaintenance,logisticalautomationandrepairpartsandsupplies.[69]
JohnF.KennedySpecialWarfareCenter(USAJFKSWCS)trainsUSSOCOMandArmySpecialOperationsForcesthroughdevelopmentandevaluationofspecial
operationsconcepts,doctrinesandtrainings.[70]

Navy
TheUnitedStatesNavalSpecialWarfareCommand(NAVSPECWARCOM,NAVSOC,orNSWC)wascommissionedApril16,1987,atNavalAmphibiousBase
CoronadoinSanDiegoastheNavalcomponenttotheUnitedStatesSpecialOperationsCommand.NavalSpecialWarfareCommandprovidesvision,leadership,doctrinal
guidance,resourcesandoversighttoensurecomponentspecialoperationsforcesarereadytomeettheoperationalrequirementsofcombatantcommanders.[71]Today,
SEALTeamsandSpecialBoatTeamscomprisetheelitecombatunitsofNavalSpecialWarfare.Theseteamsareorganized,trained,andequippedtoconductavarietyof
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

6/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page65
65of
of

missionstoincludedirectaction,specialreconnaissance,counter-terrorism,foreigninternaldefense,unconventionalwarfareandsupportpsychologicalandcivilaffairs
150
224
operations.TheirhighlytrainedoperatorsaredeployedworldwideinsupportofNationalCommandAuthorityobjectives,conductingoperationswithotherconventional
andspecialoperationsforces.
Units
UnitedStatesNavySEALshavedistinguishedthemselvesasanindividuallyreliable,collectivelydisciplinedandhighlyskilledspecial
operationsforce.ThemostimportanttraitthatdistinguishesNavySEALsfromallothermilitaryforcesisthatSEALsaremaritime
specialoperations,astheystrikefromandreturntothesea.SEALs(SEa,Air,Land)taketheirnamefromtheelementsinandfrom
whichtheyoperate.SEALsareexpertsindirectactionandspecialreconnaissancemissions.Theirstealthandclandestinemethodsof
operationallowthemtoconductmultiplemissionsagainsttargetsthatlargerforcescannotapproachundetected.Becauseofthedangers
inherentintheirmissions,prospectiveSEALsgothroughwhatisconsideredbymanymilitaryexpertstobethetoughesttrainingregime
intheworld.[72][73]
NavalSpecialWarfareDevelopmentGroup(DEVGRU),referredtoasSEALTeamSix,thenameofitspredecessorwhichwas

UnitedStatesNaval
SpecialWarfare
Commandemblem.

officiallydisbandedin1987.
SEALDeliveryVehicleTeamsareSEALteamswithanaddedunderwaterdeliverycapabilitywhousetheSDVMKVIIIand
theAdvancedSEALDeliverySystem(ASDS),submersiblesthatprovidesNSWwithanunprecedentedcapabilitythat
combinestheattributesofclandestineunderwatermobilityandthecombatswimmer.[74][75]
SpecialWarfareCombatant-craftCrewmen(SWCC)operateandmaintainstate-of-the-artsurfacecrafttoconductcoastal
patrolandinterdictionandsupportspecialoperationsmissions.FocusingoninfiltrationandexfiltrationofSEALsandother
SOF,SWCCsprovidededicatedrapidmobilityinshallowwaterareaswherelargershipscannotoperate.Theyalsobringto
thetableauniqueSOFcapability:MaritimeCombatantCraftAerialDeliverySystemtheabilitytodelivercombatcraftvia
parachutedrop.[1]LikeSEALs,SWCCsmusthaveexcellentphysicalfitness,highlymotivated,combat-focusedand

SEALsemergefromthewaterduring
ademonstration.

responsiveinhighstresssituations.[76]

Air For ce
AirForceSpecialOperationsCommandwasestablishedMay22,1990,withheadquartersatHurlburtField,Florida.AFSOCisoneofthe10
AirForceMajorCommandsorMAJCOMs,andtheAirForcecomponentofUnitedStatesSpecialOperationsCommand.Itcontainsthe
Twenty-ThirdAirForceandholdsoperationalandadministrativeoversightofsubordinatespecialoperationswingsandgroupsintheregular
AirForce,AirForceReserveCommandandtheAirNationalGuard.
AFSOCprovidesAirForcespecialoperationsforcesforworldwidedeploymentandassignmenttoregionalunifiedcommands.Thecommand's
SOFarecomposedofhighlytrained,rapidlydeployableairmen,conductingglobalspecialoperationsmissionsrangingfromprecision
applicationoffirepowerviaairstrikesorcloseairsupport,toinfiltration,exfiltration,resupplyandrefuelingofSOFoperationalelements.[77]
AFSOC'suniquecapabilitiesincludeairborneradioandtelevisionbroadcastforpsychologicaloperations,aswellasaviationforeigninternal
defenseinstructorstoprovideothergovernmentsmilitaryexpertisefortheirinternaldevelopment.
Thecommand'scoremissionsincludebattlefieldairoperationsagilecombatsupportaviationforeigninternaldefenseinformationoperations
precisionaerospacefirespsychologicaloperationsspecializedairmobilityspecializedrefuelingandintelligence,surveillanceand
reconnaissance.[27][78][79]

AirForceSpecial
OperationsCommand
emblem.

Units
CombatControllers(CCT)aregroundcombatforcesspecializedinatraditionalpathfinderrolewhilehavingaheavyemphasisonsimultaneousairtrafficcontrol,fire
support(viaairstrikes,closeairsupportandcommand,control,andcommunicationsincovertoraustereenvironments.[80][81]
Pararescuemen(PJ)aretheonlyDepartmentofDefensespecialtyspecificallytrainedandequippedtoconductconventionalandunconventionalpersonnelrecovery
operations.APJ'sprimaryfunctionisasapersonnelrecoveryspecialistwithemergencytraumamedicalcapabilitiesinhumanitarianandcombatenvironments.
SpecialOperationsWeatherTechnicians(SOWT)gather,assess,andinterpretweatherandenvironmentalintelligencefromforwarddeployedlocations,working
alongsidespecialoperationsforces.
Or ganization
The1stSpecialOperationsWing(1SOW)islocatedatHurlburtField,Florida.Itsmissionfocusisunconventionalwarfare:counter-terrorism,combatsearchand
rescue,personnelrecovery,psychologicaloperations,aviationassistancetodevelopingnations,"deepbattlefield"resupply,interdictionandcloseairsupport.The
wing'scoremissionsincludeaerospacesurfaceinterface,agilecombatsupport,combataviationadvisoryoperations,informationoperations,personnel
recovery/recoveryoperations,precisionaerospacefires,psychologicaloperationsdissemination,specializedaerospacemobilityandspecializedaerialrefueling.[82]
AmongitsaircraftistheMC-130CombatTalonII,alow-levelterrainfollowingspecialmissionstransportthatcanevaderadardetectionandslipintoenemyterritory
ata200-foot(61m)altitudeforinfiltration/exfiltrationmissions,eveninzerovisibility,droppingofforrecoveringmenorsupplieswithpinpointaccuracy.Italso
operatestheAC-130SpookyandSpectregunshipsthatprovidehighlyaccurateairbornegunfireforcloseairsupportofconventionalandspecialoperationsforceson
theground.[46]
The24thSpecialOperationsWing(24SOW)islocatedatHurlburtField,Florida.It'scomposedofthe720thSpecialTacticsGroup,724thSpecialTacticsGroup,
SpecialTacticsTrainingSquadronand16recruitinglocationsacrosstheUnitedStates.[83][84]TheSpecialTacticsSquadrons,underthe720thSTGand724thSTG,
aremadeupofSpecialTacticsOfficers,CombatControllers,CombatRescueOfficers,Pararescuemen,SpecialOperationsWeatherOfficersandAirmen,AirLiaison
Officers,TacticalAirControlPartyoperators,andanumberofcombatsupportairmenwhichcomprise58AirForcespecialties.[84]
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

7/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page66
66of
of

150
224
The27thSpecialOperationsWing(27SOW)islocatedatCannonAFB,NewMexico.Itsprimarymissionincludesinfiltration,exfiltrationandre-supplyofspecial
operationsforcesairrefuelingofspecialoperationsrotarywingandtiltrotoraircraftandprecisionfiresupport.Thesecapabilitiessupportavarietyofspecial
operationsmissionsincludingdirectaction,unconventionalwarfare,specialreconnaissance,counter-terrorism,personnelrecovery,psychologicaloperationsand
informationoperations.[85]
The193dSpecialOperationsWing(193SOW)isanAirNationalGuard(ANG)unit,operationallygainedbyAFSOC,andlocatedatHarrisburgInternational
Airport/AirNationalGuardStation(formerOlmstedAirForceBase),Pennsylvania.UnderTitle32USC,the193SOWperformsstatemissionsfortheGovernorof
PennsylvaniaaspartofthePennsylvaniaAirNationalGuard.UnderTitle10USC,the193SOWispartoftheAirReserveComponent(ARC)oftheUnitedStates
AirForce.ItsprimarywartimeandcontingencyoperationsmissionasanAFSOC-gainedunitispsychologicaloperations(PSYOP).The193SOWisuniqueinthatit
istheonlyunitintheU.S.AirForcetoflyandmaintaintheLockheedEC-130JCommandoSoloaircraft.
The919thSpecialOperationsWing(919SOW)isanAirForceReserveCommand(AFRC)unit,operationallygainedbyAFSOC,and
locatedatEglinAFBAuxiliaryField#3/DukeField,Florida.The919SOWfliesandmaintainstheMC-130ECombatTalonIandMC130PCombatShadowspecialoperationsaircraftdesignedforcovertoperations.
The352dSpecialOperationsWing(352SOW)atRAFMildenhall,UnitedKingdomservesasthecoretoUnitedStatesEuropean
Command'sstandingJointSpecialOperationsAirComponentheadquarters.Thesquadronprovidessupportforthreeflyingsquadrons,
onespecialtacticssquadronandonemaintenancesquadronforexercise,logistics,andwarplanningaircrewtrainingcommunications
aerialdeliverymedicalintelligencesecurityandforceprotectionweatherinformationtechnologiesandtransformationsupportand
currentoperations.[86]
The353dSpecialOperationsGroup(353SOG)isthefocalpointforallU.S.AirForcespecialoperationsactivitiesthroughouttheUnited
StatesPacificCommand(USPACOM)theater.HeadquarteredatKadenaAB,Okinawa,Japanthegroupispreparedtoconductavariety

AirForceSpecial
Operatorsonatraining
mission.

ofhigh-priority,low-visibilitymissions.ItsmissionisairsupportofjointandalliedspecialoperationsforcesinthePacific.Itmaintainsa
worldwidemobilitycommitment,participatesinPacifictheaterexercisesasdirectedandsupportshumanitarianandreliefoperations.[87]
TheUnitedStatesAirForceSpecialOperationsSchool(USAFSOS)atHurlburtField,FloridaisaprimarysupportunitoftheAirForceSpecialOperations
Command.TheUSAFSOSpreparesspecialoperationsAirmentosuccessfullyplan,organize,andexecuteglobalspecialoperationsbyprovidingindoctrinationand
educationforAFSOC,otherUSSOCOMcomponents,andjoint/interagency/coalitionpartners.[88]

Mar ineCor ps
InOctober2005,theSecretaryofDefensedirectedtheformationofUnitedStatesMarineCorpsForcesSpecialOperations
Command,theMarinecomponentofUnitedStatesSpecialOperationsCommand.ItwasdeterminedthattheMarineCorpswould
initiallyformaunitofapproximately2500toservewithUSSOCOM.OnFebruary24,2006MARSOCactivatedatCampLejeune,
NorthCarolina.MARSOCinitiallyconsistedofasmallstaffandtheForeignMilitaryTrainingUnit(FMTU),whichhadbeen
formedtoconductforeigninternaldefense.FMTUisnowdesignatedastheMarineSpecialOperationsAdvisorGroup
(MSOAG).[89]
AsaservicecomponentofUSSOCOM,MARSOCistaskedbytheCommanderUSSOCOMtotrain,organize,equip,anddeploy
responsiveU.S.MarineCorpsspecialoperationsforcesworldwide,insupportofcombatantcommandersandotheragencies.
MARSOChasbeendirectedtoconductforeigninternaldefense,directactionandspecialreconnaissance.MARSOChasalsobeen
directedtodevelopacapabilityinunconventionalwarfare,counter-terrorism,andinformationoperations.MARSOCdeployedits
firstunitsinAugust2006,sixmonthsafterthegroup'sinitialactivation.MARSOCreachedfulloperationalcapabilityinOctober
2008.[90]
Units

UnitedStatesMarineCorpsForces
SpecialOperationsCommand
emblem

MarineSpecialOperations"Raider"Regiment(MSOR)consistsofaHeadquartersCompanyandthreeMarineSpecial
OperationsBattalions,the1st,2ndand3rdMSOB.TheRegimentprovidestailoredmilitarycombat-skillstrainingandadvisor
supportforidentifiedforeignforcesinordertoenhancetheirtacticalcapabilitiesandtopreparetheenvironmentasdirectedby
USSOCOMaswellasthecapabilitytoformthenucleusofaJointSpecialOperationsTaskForce.MarinesandSailorsofthe
MRRtrain,adviseandassistfriendlyhostnationforcesincludingnavalandmaritimemilitaryandparamilitaryforcesto
enablethemtosupporttheirgovernments'internalsecurityandstability,tocountersubversionandtoreducetheriskof
violencefrominternalandexternalthreats.MRRdeploymentsarecoordinatedbyMARSOC,throughUSSOCOM,in
accordancewithengagementprioritiesforOverseasContingencyOperations.
MarineIntelligenceBattalion(MIB)trains,sustains,maintainscombatreadiness,andprovidesintelligencesupportatall
operationallevelsinordertosupportMARSOFtrainingandoperationsworldwidewithmission-specificintelligence
capability.
MarineSpecialOperationsSupportGroup(MSOSG)trains,equips,structures,andprovidesspeciallyqualifiedMarineforces,
including,operationallogistics,intelligence,MilitaryWorkingDogs,FirepowerControlTeams,andcommunicationssupport
inordertosustainworldwidespecialoperationsmissionsasdirectedbyCommander,U.S.MarineCorpsForcesSpecial
OperationsCommand(COMMARFORSOC).

DA/SROperatorsfrom1stSOB
(SpecialOperationsBattalion)
respondtoenemyfireinAfghanistan

TheMarineSpecialOperationsSchool(MSOS)performsthescreening,recruiting,training,assessmentanddoctrinaldevelopmentfunctionsforMARSOC.It
includestwosubordinateSpecialMissionsTrainingBranches(SMTBs),oneoneachcoast.
TheSpecialMissionTrainingBranchEastprovidespecialoperationstrainingintactics,techniquesandprocedures,andevaluationandcertificationof
MARSOCforcestospecifiedconditionsandstandardsforSOF.TheMarinesofMSOSareoperatorswiththetraining,experienceandmaturejudgmenttoplan,
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

8/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page67
67of
of

[91]
150
224
coordinate,instructandsupervisedevelopmentofSOFspecialreconnaissanceanddirectactionskills.

ListofUSSOCOMCombatantCommander s
No.

Image

Name

Br anch

Star tofTer m

EndofTer m

Timeinoffice

1.

GENJamesJ.Lindsay

USA

16April1987

27June1990

1,168days

2.

GENCarlW.Stiner

USA

27June1990

20May1993

1,058days

3.

GENWayneA.Downing

USA

20May1993

29February1996

1,015days

4.

GENHenryH.Shelton

USA

29February1996

25September1997 574days

(Acting)

RADMRaymondC.Smith,Jr. USN

25September1997 5November1997

41days

5.

GENPeterJ.Schoomaker

USA

5November1997

27October2000

1,087days

6.

GENCharlesR.Holland

USAF

27October2000

2September2003 1,040days

7.

GENBryanD.Brown

USA

2September2003 9July2007

1,406days

8.

ADMEricT.Olson

USN

9July2007

8August2011

1,491days

9.

ADMWilliamH.McRaven

USN

8August2011

28August2014

1,116days

10.

GENJosephL.Votel

USA

28August2014

Present

days

USSOCOMmedal
TheUnitedStatesSpecialOperationsCommandMedalwasintroducedin1994torecognizeindividualsforoutstandingcontributionsto,andinsupportof,special
operations.Sinceitwascreated,therehavebeenmorethan50recipients,fourofwhicharenotAmerican.Someofwhichincludes:GenerabroniWodzimierzPotasiski
(Poland,2010,posthumously),[92][93]KapteinGunnarSnsteby(Norway,2008),GenerabrygadyJerzyGut(Poland,June2014)[94]andGeneradywizjiPiotrPatalong
(Poland,October2014).[95]

Seealso
http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

9/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Refer ences

Page
Page68
68of
of

150
224

Citations
1. SOCOMPublicAffairs(2013).SOCOMFactBook2013(http://www.socom.mil/News/Documents/USSOCOM_Fact_Book_2013.pdf).SOCOMPublicAffairs.
2. "BiographyofAdmiralJamesL.HollowayIII,USNavy(Ret.)"(http://www.history.navy.mil/bios/holloway_j.htm).June2006.Retrieved21March2008.|first1=missing|last1=in
Authorslist(help)
3. Rother,Larry(6December1996)."WithaBang,PanamaIsErasingHouseofHorrors".TheNewYorkTimes.
4. Shanker,Thom(12February2004)."RegimeThoughtWarUnlikely,IraqisTellU.S".TheNewYorkTimes.
5. "USSOCOMPostureStatement"(http://web.archive.org/web/20080227010822/http://www.socom.mil/Docs/USSOCOM_Posture_Statement_2007.pdf)(PDF).USSOCOM.2007.
Archivedfromtheoriginal(http://www.socom.mil/Docs/USSOCOM_Posture_Statement_2007.pdf)on27February2008.Retrieved12February2008.
6. Delta:America'sEliteCounterterroristForce.TerryGriswold,D.M.Giangreco.ZenithImprint,2005.ISBN0-7603-2110-8.p.35
7. Sloan,Stephen(October1992).BeatingInternationalTerrorism:AnActionStrategyforPreemptionandPunishment.DianePubCo.ISBN1-56806-104-8.
8. Daniel,W.C.(September1986)."H.R.5109".AbilltoestablishaNationalSpecialOperationsAgencywithintheDepartmentofDefensetohaveunifiedresponsibilityforallspecial
operationsforcesandactivitieswithintheDepartment.
9. "USSOCOMCommandHistory"(http://fas.org/irp/agency/dod/socom/2007history.pdf)(PDF).Retrieved12October2014.
10. Goldwater,BarrySamNunn."S.CON.RES.80".Aconcurrentresolutiontoauthorizetheprintingof2,000additionalcopiesoftheCommitteePrintoftheCommitteeonArmedServices
(99thCongress,1stSession)entitled"DefenseOrganization:TheNeedforChange".
11. Nichols,BillBarryGoldwater(1986)."H.R.3622".Abilltoamendtitle10,UnitedStatesCode,tostrengthenthepositionofChairmanoftheJointChiefsofStaff,toprovideformore
efficientandeffectiveoperationoftheArmedForces,andforotherpurposes.
12. Lederman,GordonNathaniel(November1999).ReorganizingtheJointChiefsofStaff:TheGoldwater-NicholsActof1986.GreenwoodPress.ISBN0-313-31085-8.
13. Cohen,William(May1986)."S.2453".AbilltoenhancethecapabilitiesoftheUnitedStatestocombatterrorismandotherformsofunconventionalwarfare.
14. Taubman,Philip(5December1984)."U.S.Militarytriestocatchupinfightingterror".NewYorkTimes.
15. "SpecialOperations/LowIntensityConflict&InterdependentCapabilities(ASDSO/LIC&IC)"(http://www.defenselink.mil/policy/sections/policy_offices/solic/).DoD.Retrieved
19March2008.|first1=missing|last1=inAuthorslist(help)
16. Giles,JamesE.Altizer,HarrellB.Glass,DavidV.Parker,RobertW.(March1989)."ProvidingResourcesforSpecialOperationsForces:CompletingtheTransition"
(http://stinet.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA210951).Retrieved19March2008.
17. Lewis,Paul(1July2001)."CharlesS.Whitehouse,79,DiplomatandC.I.A.Official".NewYorkTimes.
18. AndrewKelley,Stephen(June2007)."BetterLuckyThanGood:OperationEarnestWillasGunboatDiplomacy"
(http://web.archive.org/web/20090318120640/http://www.ccc.nps.navy.mil/research/theses/kelley07.pdf)(PDF).NavalPostgraduateSchool.Archivedfromtheoriginal
(http://www.ccc.nps.navy.mil/research/theses/kelley07.pdf)on18March2009.Retrieved12May2008.
19. Peniston,Bradley(July2006).NoHigherHonor:SavingtheUSSSamuelB.RobertsinthePersianGulf.UnitedStatesNavalInstitutePress.ISBN1-59114-661-5.
20. "ABigSecondStepinSomalia".NewYorkTimes.4May1993.
21. "TwoToughTracksinSomalia".NewYorkTimes.10December1992.
22. TheBookofHonor:CoverLivesandClassifiedDeathsattheCIAbyTedGup,2000
23. Bowden,Mark(2001).BlackHawkDown:AStoryofModernWar.Signet.ISBN0-451-20393-3.
24. Eversmann,MattDanSchilling(July2006).TheBattleofMogadishu:FirsthandAccountsfromtheMenofTaskForceRanger.PresidioPress.ISBN0-345-46668-3.
25. PlanofAttack,BobWoodward,2004
26. Dao,James(22March2003)."TheCommandosNavySealsEasilySeize2OilSites".NewYorkTimes.
27. Dao,James(28April2003)."Aftereffects:SpecialOperationsForcesWarPlanDrewU.S.CommandosFromShadows".TheNewYorkTimes.
28. Kruzel,John(26May2007)."NavySEALssharewarstoriesfromAnbarprovince".AmericanForcesPressService.
29. R.Gordon,Michael(13June2003)."AfterTheWar:TheAlliesInMajorAssault,U.S.ForcesStrikeHusseinLoyalists".NewYorkTimes.
30. D.Kozaryn,Linda(14December2001)."U.S.SpecialOperationsForcesChange"FaceofWar" ".AmericanForcesPressService.
31. ThomShanker,EricSchmitt(2August2004)."TheReachofWar:MilitarySpecialWarriorsHaveGrowingRanksandGrowingPainsinTakingKeyAntiterrorRole"
(http://www.nytimes.com/2004/08/02/world/reach-war-military-special-warriors-have-growing-ranks-growing-pains-taking-key.html).TheNewYorkTimes.Retrieved11March2008.
32. DeYoung,Karen,andGregJaffe,"U.S.'secretwar'expandsgloballyasSpecialOperationsforcestakelargerrole"(http://www.washingtonpost.com/wpdyn/content/article/2010/06/03/AR2010060304965.html?nav=emailpage),WashingtonPost,4June2010.Retrieved5August2011.
33. Turse,Nick,"ASecretWarin120Countries:ThePentagon'sNewPowerElite"(http://counterpunch.org/turse08042011.html),CounterPunch,4August2011.Retrieved5August2011.
34. WashingtonPostop-ed,JohnLehmanformerSecretaryoftheNavy,October2008
35. Waller,Douglas(3February2003)."TheCIASecretArmy"(http://www.time.com/time/magazine/article/0,9171,1004145,00.html).TimeMagazine(Washington).Retrieved
28September2009.
36. "OperationAnaconda"(http://www.time.com/time/covers/1101020318/popup/).Time.10March2002.
37. Garamone,Jim."TheBattleofTakurGhar"(http://www.defenselink.mil/news/newsarticle.aspx?id=44020).AmericanForcesPressService.
38. ExecutiveSummaryoftheBattleofTakurGhar(http://www.defenselink.mil/news/May2002/d20020524takurghar.pdf)(PDF).|first1=missing|last1=inAuthorslist(help)
39. MacPherson,Malcolm(2006).RobertsRidge:AStoryofCourageandSacrificeonTakurGharMountain,Afghanistan.Dell.ISBN0-553-58680-7.
40. Luttrell,MarcusPatrickRobinson(2007).LoneSurvivor:TheEyewitnessAccountofOperationRedwingandtheLostHeroesofSEALTeam10.Little,BrownandCompany.ISBN0316-06759-8.
41. Blumenfield,Laura(11June2007)."TheSoleSurvivor"(http://www.washingtonpost.com/wp-dyn/content/article/2007/06/10/AR2007061001492.html).WashingtonPost.
42. Naylor,SeanD.,"McRaventappedtoleadSOCOM"(http://www.armytimes.com/news/2011/03/military-mcraven-picked-to-lead-socom-030111/),ArmyTimes,1March201116:53:04
EST.Retrieved5August2011.
43. http://www.imgc-global.com/testimonials.html.RetrievedFebruary2012.
44. Risen,James(20September1998)."TheWorld:PassingtheLaughTestPentagonPlannersGiveNewMeaningto'OvertheTop' ".NewYorkTimes.
45. Emerson1988,p.26.
46. Emerson,Steven(13November1988)."StymiedWarriors".NewYorkTimes.
47. L.Haney,Eric(August2005).InsideDeltaForce:TheStoryofAmerica'sEliteCounterterroristUnit.Delta.ISBN0-385-33936-4.
48. MarkMazzetti(13January2007)."PentagonSeesMoveinSomaliaasBlueprint".NewYorkTimes.

http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

10/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page69
69of
of

150
224

49. Smith,Michael(2007).KillerElite:TheInsideStoryofAmerica'sMostSecretSpecialOperationsTeam.NewYork,NewYork:St.Martin'sPress.ISBN0-312-36272-2.
50. Gellman,Barton(23January2005)."SecretUnitExpandsRumsfeld'sDomain".WashingtonPost.
51. Gerth,JeffPhilipTaubman(8June1984)."U.s.militarycreatessecretunitsforuseinsensitivetasksabroad".NewYorkTimes.
52. Schmitt,Eric(19March2006)."InSecretUnit's'BlackRoom,'aGrimPortraitofU.S.Abuse".NewYorkTimes.
53. E.Sanger,David(29February2004)."NewU.S.EffortStepsUpHuntForbinLaden".NewYorkTimes.
54. SOCJFCOMtransitionstoUSSOCOMandbecomesSpecialOperationsCommandJointCapabilities(http://www.jfcom.mil/newslink/storyarchive/2011/pa050211.html),2May2011
55. "USASOCoverview"(http://www.soc.mil/sofinfo/story.html).Retrieved8January2008.
56. Schmitt,EricMichaelR.Gordon(21September2001)."ANationChallenged:TheMilitary:TopAirChiefSent".NewYorkTimes.
57. "75thRangerRegimentwebsite"(http://web.archive.org/web/20080127071358/http://www.soc.mil/75thrr/75th_home.htm).Archivedfromtheoriginal
(http://www.soc.mil/75thrr/75th_home.htm)on27January2008.Retrieved12February2008.
58. "75thRangerRegimentwebsite"(http://web.archive.org/web/20080208083040/http://www.soc.mil/75thrr/75thrrfs.html).Archivedfromtheoriginal
(http://www.soc.mil/75thrr/75thrrfs.html)on8February2008.Retrieved12February2008.
59. Couch,Dick(March2007).ChosenSoldier:TheMakingofaSpecialForcesWarrior.ThreeRiversPress.ISBN0-307-33939-4.
60. Shanker,Thom(21January2002)."ANationChallenged:BattlefieldConductofWarIsRedefinedBySuccessofSpecialForces".NewYorkTimes.
61. Schmitt,EricThomShanker(2March2008)."U.S.PlanWidensRoleinTrainingPakistaniForcesinQaedaBattle".NewYorkTimes.
62. "USASFmission"(http://web.archive.org/web/20071211221352/http://www.soc.mil/SF/mission.htm).Archivedfromtheoriginal(http://www.soc.mil/SF/mission.htm)on11December
2007.Retrieved8January2008.
63. "NightStalkersfactsheet"(http://web.archive.org/web/20071217230457/http://www.soc.mil/160soar/soar_home.htm).Archivedfromtheoriginal
(http://www.soc.mil/160soar/soar_home.htm)on17December2007.Retrieved8January2008.
64. "160thSOAR,MH-60BlackHawkHelicopterFactSheet"(http://www.soc.mil/160soar/Blkhawk.html).Retrieved12February2008.
65. "PSYOPRecruitingwebsite"(http://web.archive.org/web/20080204120503/http://www.bragg.army.mil/psyop/psyopintro.htm).Archivedfromtheoriginal
(http://www.bragg.army.mil/psyop/psyopintro.htm)on4February2008.Retrieved12February2008.
66. "ArmyCivilAffairs,PsychologicalOperationsSoldiersDeployinSupportofTsunamiReliefEfforts"(http://www.defenselink.mil/home/articles/2005-01/a010705tj1.html)(Press
release).DepartmentofDefense.7January2005.Retrieved14March2008.
67. "PSYOPfactsheet"(http://web.archive.org/web/20080203103530/http://www.soc.mil/psyop/psyop_default.htm).Archivedfromtheoriginal
(http://www.soc.mil/psyop/psyop_default.htm)on3February2008.Retrieved12February2008.
68. "95thCivilAffairsFactSheet"(http://web.archive.org/web/20080119211325/http://www.soc.mil/ca/ca_default.htm).Archivedfromtheoriginal(http://www.soc.mil/ca/ca_default.htm)
on19January2008.Retrieved21January2008.
69. "SOSCOMHomePage"(http://web.archive.org/web/20080119210555/http://www.soc.mil/soscom/soscom_default.htm).Archivedfromtheoriginal
(http://www.soc.mil/soscom/soscom_default.htm)on19January2008.Retrieved12February2008.
70. "USAJFKSWCS"(http://web.archive.org/web/20080119211345/http://www.soc.mil/swcs/swcs_default.htm).Archivedfromtheoriginal(http://www.soc.mil/swcs/swcs_default.htm)on
19January2008.Retrieved19February2008.
71. "NAVSOCinfowebsite"(https://www.navsoc.navy.mil/).Retrieved8January2008.
72. "OfficialU.S.NavySEALInfoWebsite"(http://199.208.208.41/seal/introduction.aspx).Retrieved11January2008.
73. Couch,Dick(October2001).TheWarriorElite:TheForgingofSEALClass228.Crown.ISBN0-609-60710-3.
74. "NavySEALsinsertion/extractionpage"(http://www.navyseals.com/insertion-extraction).Retrieved11January2008.
75. Tiron,Roxana(February2002)."NewMini-SubGivesSEALsExtraSpeed,Range,Payload".NationalDefenseMagazine.
76. "OfficialU.S.NavySWCCInfoWebsite"(http://www.seal.navy.mil/swcc/introduction.aspx).Retrieved11January2008.
77. StevenLeeMeyers,ThomShanker(16October2001)."ANationChallenged:TheOffensiveSpecialOperationsGunshipBeingUsedAgainstTaliban".NewYorkTimes.
78. "AFSOC"(http://www2.afsoc.af.mil/).Retrieved11January2008.
79. Meyers,StevenLeeThomShanker(17October2001)."ANationChallenged:AirWarPilotsToldtoFireatWillinSomeZones".NewYorkTimes.
80. "CombatControlFactSheet"(http://archive.is/8rCmr).AirForceSpecialOperationsCommand.UnitedStatesAirForce.Archivedfromtheoriginal
(http://www.af.mil/information/factsheets/factsheet.asp?id=174)on21February2013.Retrieved13January2013.
81. "CombatControlcareerdescription"(http://www.airforce.com/careers/detail/combat-control-males-only/).Retrieved12January2013.
82. "1stSOWFactSheet"(http://www2.hurlburt.af.mil/library/factsheets/factsheet.asp?id=3485).AFSOC.Retrieved20January2008.
83. "AirForcelaunchesfirstspecialtacticswing"(http://archive.is/Do72).2012-06-13.Archivedfromtheoriginal(http://www.af.mil/news/story.asp?id=123305724)onDecember12,2012.
RetrievedJanuary15,2013.
84. "24thSOWFactsheet"(http://www.afsoc.af.mil/library/factsheets/factsheet.asp?id=19566).RetrievedJanuary15,2013.
85. "N.M.DelegationWelcomes27thSpecialOps.WingtoCannon"(http://bingaman.senate.gov/news/record.cfm?id=281393)(Pressrelease).29August2007.Retrieved21March2008.
86. "352ndFactSheet"(http://www2.afsoc.af.mil/library/factsheets/factsheet.asp?id=224).AFSOC.Retrieved21January2008.
87. "353rdSOGFactSheet"(http://www2.afsoc.af.mil/library/factsheets/factsheet.asp?id=225).AFSOC.Retrieved21January2008.
88. "USAFOSFactSheet"(http://web.archive.org/web/20080109132212/http://www.af.mil/factsheets/factsheet.asp?id=186).Archivedfromtheoriginal
(http://www.af.mil/factsheets/factsheet.asp?id=186)on9January2008.Retrieved21January2008.
89. Kenyon,Henry(May2006)."MarineCorpsSpecialOperationsCommandHitstheBeach"(http://www.afcea.org/signal/articles/templates/SIGNAL_Article_Template.asp?
articleid=1123&zoneid=182).SignalMagazine.Retrieved10April2008.
90. "MARSOC"(http://www.marsoc.usmc.mil/).Retrieved8January2008.
91. "MARSOC,MSOSInfowebsite"(http://web.archive.org/web/20080209195131/http://www.marsoc.usmc.mil/msos.html).Archivedfromtheoriginal
(http://www.marsoc.usmc.mil/msos.html)on9February2008.Retrieved21January2008.
92. USSOCOMMedalrecipients(http://www.shadowspear.com/vb/threads/united-states-special-operations-command-medal-to-lt-gen-wodzimierz-potasiski.6197/)
93. "NEWS|USSOCOMCommandervisitsPOLSOCOM|DowdztwoWojskSpecjalnych"(http://www.wojskaspecjalne.mil.pl/45,more,129-ussocom_commander_visits_polsocom.html?
ln=en).Wojskaspecjalne.mil.pl.2010-05-14.Retrieved2013-04-22.
94. "AmerykaskieDowdztwoOperacjiSpecjalnychdoceniopolskiegogeneraa"(http://www.wojsko-polskie.pl/pl/z-zycia-wojska/30655,amerykanskie-dowodztwo-operacji-specjalnychdocenilo-polskiego-generala.html).wojsko-polskie.pl.2014-06-03.Retrieved2014-06-03.
95. "MedalUSSOCOMdlapolskiegogeneraa"(http://mon.gov.pl/aktualnosci/artykul/najnowsze/2014-10-29-medal-dowodztwa-operacji-specjalnych-usa-dla-polskiego-generala/).
mon.gov.pl.2014-10-29.Retrieved2014-10-29.

http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

11/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM UnitedStatesSpecialOperationsCommand-Wikipedia,thefreeencyclopedia
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Bibliogr aphy

Page
Page70
70of
of

150
224

Briscoe,Charles(2001).WeaponofChoice:ARSOFinAfghanistan.CombatStudiesInstitutePress.
Couch,Dick(March2007).ChosenSoldier:TheMakingofaSpecialForcesWarrior.ThreeRiversPress.ISBN0-307-33939-4.
Couch,Dick(2006).DownRange:NavySEALsintheWaronTerrorism.NewYork,NewYork:ThreeRiversPress.ISBN1-4000-8101-7.
Kelley,StephenAndrew(June2007)."BetterLuckyThanGood:OperationEarnestWillasGunboatDiplomacy"
(http://web.archive.org/web/20090318120640/http://www.ccc.nps.navy.mil/research/theses/kelley07.pdf)(PDF).NavalPostgraduateSchool.Archivedfromtheoriginal
(http://www.ccc.nps.navy.mil/research/theses/kelley07.pdf)on18March2009.Retrieved12May2008.
Luttrell,MarcusPatrickRobinson(June2007).LoneSurvivor:TheEyewitnessAccountofOperationRedwingandtheLostHeroesofSEALTeam10.Little,BrownandCompany.
ISBN0-316-06759-8.
Pirnie,BruceR.(August1998).AssessingRequirementsforPeacekeeping,HumanitarianAssistanceandDisasterRelief.RANDCorporation.ISBN0-8330-2594-5.
Pushies,Fred(2007).U.S.AirForceSpecialOps.Osceola,Wisconsin:MBIPublishingCompany.ISBN0-7603-0733-4.
Smith,Michael(2007).KillerElite:TheInsideStoryofAmerica'sMostSecretSpecialOperationsTeam.NewYork,NewYork:St.Martin'sPress.ISBN0-312-36272-2.
Sweetman,Jack(March1999).GreatAmericanNavalBattles.NavalInstitutePress.ISBN1-55750-794-5.
DavidTucker,ChristopherJ.Lamb(2007).UnitedStatesSpecialOperationsForces.ColumbiaUniversityPress.ISBN0-231-13190-9.
Wise,HaroldLee(May2007).InsidetheDangerZone:TheU.S.MilitaryinthePersianGulf,19871988.USNavalInstitutePress.ISBN1-59114-970-3.
Web
USDOD.U.S.DODDictionaryofMilitaryTerms(http://www.dtic.mil/doctrine/jel/doddict/).UnitedStatesofAmerica:U.S.DepartmentofDefense.5June2003.
USDOD.U.S.DODDictionaryofMilitaryTerms:JointAcronymsandAbbreviations(http://www.dtic.mil/doctrine/jel/doddict/).UnitedStatesofAmerica:U.S.DepartmentofDefense.
5June2003.
Talmadge,Eric(27February2008)."NewUSSubmarinesTradeNukesforSEALs"(http://www.foxnews.com/wires/2008Feb27/0,4670,StealthatSea,00.html).FoxNews.Associated
Press.
EricSchmitt,MichaelR.Gordon(4February2008)."LeakonCross-BorderChasesFromIraq"(http://www.nytimes.com/2008/02/04/washington/04rules.html?
_r=1&scp=3&sq=Army+Rangers&st=nyt&oref=slogin).NewYorkTimes.
vonZielbauer,Paul(27April2007)."CriminalChargesAreExpectedAgainstMarines,OfficialSays"(http://www.nytimes.com/2007/04/27/world/asia/27abuse.html?
scp=1&sq=MARSOC&st=nyt).NewYorkTimes.
Graham,Bradley(2November2005)."EliteMarineUnittoHelpFightTerrorism"(http://www.washingtonpost.com/wp-dyn/content/article/2005/11/01/AR2005110102069.html).
WashingtonPost.Retrieved27May2010.Checkdatevaluesin:|year=/|date=mismatch(help)

Exter nallinks
U.S.SpecialOperationsCommand(http://www.socom.mil/)
AirForceSpecialOperationsCommand(http://www2.afsoc.af.mil/)
U.S.ArmySpecialOperationsCommand(http://www.soc.mil/)
U.S.NavalSpecialWarfareCommand(http://www.navsoc.navy.mil/)

WikimediaCommonshas
mediarelatedtoUnited
StatesSpecialOperations
Command.

U.S.MarineCorpsForcesSpecialOperationsCommand(http://www.marines.mil/unit/marsoc/Pages/default.aspx)
DepartmentofDefense(http://www.defenselink.mil/)
JointSpecialOperationsUniversity(https://jsou.socom.mil/)
Retrievedfrom"http://en.wikipedia.org/w/index.php?title=United_States_Special_Operations_Command&oldid=656910583"
Categories: SpecialoperationscommandsoftheUnitedStatesArmedForces MilitaryunitsandformationsinFlorida Counter-terrorism
Thispagewaslastmodifiedon17April2015,at15:26.
TextisavailableundertheCreativeCommonsAttribution-ShareAlikeLicenseadditionaltermsmayapply.Byusingthissite,youagreetotheTermsofUseand
PrivacyPolicy.WikipediaisaregisteredtrademarkoftheWikimediaFoundation,Inc.,anon-profitorganization.

http://en.wikipedia.org/wiki/United_States_Special_Operations_Command

12/12

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page71
71of
of
150
224

UnitedStatesCentr alCommand
FromWikipedia,thefreeencyclopedia

TheUnitedStatesCentr alCommand
(USCENTCOMorCENTCOM)isatheater-level
UnifiedCombatantCommandoftheU.S.Department
ofDefense,establishedin1983,takingoverthe1980
RapidDeploymentJointTaskForce(RDJTF)
responsibilities.
TheCENTCOMAreaofResponsibility(AOR)
includescountriesintheMiddleEast,NorthAfrica,and
CentralAsia,mostnotablyAfghanistanandIraq.
CENTCOMhasbeenthemainAmericanpresencein
manymilitaryoperations,includingthePersianGulf
War,theWarinAfghanistan(2001present),andthe
IraqWar.Asof2015CENTCOMforcesaredeployed
primarilyinIraqandAfghanistanincombatrolesand
havesupportrolesatbasesinKuwait,Bahrain,Qatar,
theUnitedArabEmirates,Oman,Pakistan,andcentral
Asia.CENTCOMforceshavealsobeendeployedin
Jordan,andSaudiArabiainthepast,withasmall
presenceremainingthere.asof2009.

UnitedStatesCentr alCommand

EmblemoftheUnitedStatesCentralCommand.

Active

1983present

Asof22March2013CENTCOM'scommanderis
GeneralLloydJ.Austin,U.S.Army.

Country
Type

UnifiedCombatantCommand

Ofall6Americanregionalunifiedcombatant
commandsCENTCOMisamongthethreewith
headquartersoutsideitsareaofoperations.
CENTCOM'smainheadquartersislocatedatMacDill
AirForceBase,inTampa,Florida.Aforward
headquarterswasestablishedin2002atCampAs
SayliyahinDoha,Qatar,whichin2009transitionedtoa
forwardheadquartersatAlUdeidAirBaseinQatarto
serveAmericanstrategicinterests.On12January,
2015,CENTCOM'sTwitterandYouTubeaccounts
werehacked.[2]

Headquarters

MacDillAirForceBase
Tampa,Florida,U.S.

Nickname

CENTCOM

Engagements

PersianGulfWar
IraqWar
WarinAfghanistan

Contents
1History
2Structure
2.1Warplanning
http://en.wikipedia.org/wiki/United_States_Central_Command

UnitedStatesofAmerica

Commander s
Combatant
Commander

GeneralLloydAustin,USA

Deputy
Commander

ViceAdmiralMarkFox,
USN[1]

Notable
commanders

GeneralDavidPetraeus
AdmiralWilliamFallon
GeneralJohnAbizaid
GeneralTommyFranks
GeneralAnthonyZinni
GeneralJamesMattis
1/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

3Geographicscope

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page72
72of
of
150
224
GeneralNormanSchwarzkopf

4Commanders
4.1Unitdecorations
5Seealso
6References

Insignia
Shouldersleeve
insignia
(USArmyonly)

7Externallinks

Histor y
In1983,U.S.CentralCommandwasestablishedtosucceedtheRapidDeploymentJointTaskForce,
formedatMacDillAFB,Floridaon1March1980,tohandleUSnationalsecurityinterestsinSouthwest
Asia,CentralAsiaandthePersianGulf.[3]
On17May1987,theUSSStark(FFG-31),conductingoperationsinthePersianGulfduringtheIran-Iraq
War,wasstruckbyExocetmissilesfiredbyanIraqiaircraft,resultingin37casualties.Soonafterward,as
partofwhatbecameknownasthe"TankerWar",theFederalgovernmentoftheUnitedStatesreflagged
andrenamed11Kuwaitioiltankers.InOperationEarnestWill,thesetankerswereescortedby
USCENTCOMsMiddleEastForcethroughthePersianGulftoKuwaitandbackthroughtheStraitof
Hormuz.[3]
Withthe1990InvasionofKuwaitandthesubsequentOperationDesertShield,hundredsofthousandsof
troopsweretransferredtoSaudiArabia.Islamistsobjectedtonon-MuslimtroopsinSaudiArabia,andtheir
useinOperationDesertStormthiswithotherattacksonIraqbecameakeyrallyingcryforopposition
movementsinSaudiArabiaandelsewhere.Bythelate1990s,CentralCommandgraduallymovedtroopsto
othercountries,particularlyBahrain,Kuwait,Qatar,Oman,andtheUnitedArabEmirates.
ExerciseInternalLookhasbeenoneofCENTCOM'sprimaryplanningevents.Ithadfrequentlybeenused
totrainCENTCOMtobereadytodefendtheZagrosMountainsfromaSovietattackandwasheld
annually.[4]Inautumn1989,themainCENTCOMcontingencyplan,OPLAN1002-88,assumedaSoviet
attackthroughIrantothePersianGulf.Theplancalledforfiveandtwo-thirdsUSdivisionstodeploy,
mostlylightandheavyforcesatsomethinglessthanfullstrength(apportionedtoitbytheJointStrategic
CapabilityPlan[JSCAP]).Thestrategyoftheoriginalplancalledforthesefiveandtwo-thirdsdivisionsto
marchfromthePersianGulftotheZagrosMountainsandpreventtheSovietGroundForcesfromseizing
theIranianoilfields.[5]After1990NormanSchwarzkopfreorientedCENTCOM'splanningtofendoffa
threatfromIraqandtheexercisemovedtoabiennialschedule.Theexercisehasbeenemployedforexplicit
warplanningonatleasttwooccasions:InternalLook'90,whichdealtwithathreatfromIraq,[4]and
InternalLook'03,whichwasusedtoplanwhatbecameOperationIraqiFreedom.
FromApriltoJuly1999CENTCOMconductedExerciseDesertCrossing1999centeredonthescenarioof
SaddamHusseinbeingoustedasIraqsdictator.ItwasheldintheMcLean,Virginia,officesofBooz
Allen.[6]:6-7Theexerciseconcludedthatunlessmeasuresweretaken,fragmentationandchaoswould
ensueafterSaddamHussein'soverthrow.

http://en.wikipedia.org/wiki/United_States_Central_Command

2/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page73
73of
of
150
224
InJanuary2015,CENTCOM'sTwitterfeedwasreportedtohavebeenhackedon11JanuarybyISIS

sympathizers.[7]forlessthanonehour.Noclassifiedinformationwaspostedandnoneoftheinformation
postedcamefromCENTCOMsserverorsocialmediasites",[8]however,someoftheslidescamefrom
federallyfundedLincolnLaboratoryatMIT.[7]

Str uctur e
CENTCOMheadquartersstaffdirectoratesincludepersonnel,intelligence,operations,logistics,plans&
policy,informationsystems,training&exercises,andresources,andotherfunctions.Theintelligence
sectionisknownasJointIntelligenceCenter,CentralCommand,orJICCENT,whichservesasaJoint
IntelligenceCenterfortheco-ordinationofintelligence.Undertheintelligencedirectorate,thereareseveral
divisionsincludingtheAfghanistan-PakistanCenterofExcellence.
CENTCOMdirectsfour"servicecomponentcommands"andonesubordinateunifiedcommandandno
fightingunitsdirectlysubordinatetoit:
TheUnitedStatesArmyCentral(USARCENT),andtheUnitedStatesAirForcesCentralCommand
(USAFCENT),bothheadquarteredatShawAirForceBaseinSouthCarolina,theU.S.MarineForces
CentralCommand(USMARCENT),headquarteredatMacDillAirForceBase,FloridaandtheU.S.Naval
ForcesCentralCommand(USNAVCENT),headquarteredatNavalSupportActivityBahraininthe
KingdomofBahrain.MacDillAirForceBasealsohostsaSub-unifiedcommandcalledtheSpecial
OperationsCommandCentral(USSOCCENT).
Twomajorsubordinatemulti-servicecommandsreportingtoCentralCommandwereresponsiblefor
Afghanistan:CombinedJointTaskForce180andCombinedForcesCommandAfghanistan(CFC-A).
CFC-AwasdisestablishedinFebruary2007.[9]Fromthatpointonward,theInternationalSecurity
AssistanceForcedirectedmostU.S.forcesinAfghanistan,andaU.S.general,GeneralDanK.McNeill,
assumedcommandofISAFthatsamemonth.[10]
TemporarytaskforcesincludetheCentralCommandForward-Jordan(CF-J),establishedinJordanafter
2011.ThereasonforitsestablishmenthasbeenreportedastoseizeSyrianWMDifnecessary.[11]
On1October2008CombinedJointTaskForce-HornofAfricaatCampLemonnierinDjiboutiwas
transferredtoUnitedStatesAfricaCommand(USAFRICOM).[12]TheUnitedStatesForcesIraqorUSFI,wasamajorsubordinatemulti-servicecommandduringtheIraqWarorderofbattleuntilitwas
disestablishedin2011.
ElementsofotherUnifiedCombatantCommands,especiallyUnitedStatesSpecialOperationsCommand
(USSOCOM),operateintheCENTCOMarea.ItappearsthatSOCCENTdoesnotdirectthesecretiveTask
Force77,thead-hocgroupingofJointSpecialOperationsCommand'black'unitssuchasDeltaForceand
ArmyRangers,whichistaskedtopursuethemostsensitivehighvaluetargetssuchasAlQaedaandthe
Talibanleadershipsince11September2001.RatherTF77,whichstartedoutasTaskForce11andhas
gonethroughanumberofname/numberchanges,reportsdirectlytoJointSpecialOperationsCommand,
partofUSSOCOM.

War planning
http://en.wikipedia.org/wiki/United_States_Central_Command

3/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page74
74of
of
150
224
[13]:46

ThefollowingcodenamesareknowntohavebeenassociatedwithwasplanningperWilliamArkin:
CENTCOMOPORDER01-97,ForceProtection
SOCEURSUPPLAN1001-90,9May1989
CENTCOMCONPLAN1010,July2003

CENTCOMCONPLAN1015-98,possiblysupporttoOPLAN5027forKorea,15March1991
CENTCOM1017,1999
CONPLAN1020
CONPLAN1067,forpossibleBiologicalWarfareresponse
CENTCOMCONPLAN1100-95,31March1992
Globalsecurity.orgalsolistsOPLAN1002(DefenseoftheArabianPeninsula).

Geogr aphicscope
Withthe1983establishmentofCENTCOMEgypt,Sudan,
Kenya,Ethiopia,SomaliaandDjibouticamewithintheareaof
responsibility(AOR).ThusCENTCOMdirectedthe'Natural
Bond'exerciseswithSudan,the'EasternWind'exerciseswith
Somalia,andthe'JadeTiger'exerciseswithOman,Somalia,
andSudan.ExerciseJadeTigerinvolvedthe31stMarine
ExpeditionaryUnitwithOmanfrom29November82-8Dec
82.[13]:404

CENTCOMAreaOfResponsibility

TheAreaofResponsibilityextendsto27countries:
Afghanistan,Bahrain,Egypt,Iran,Iraq,Jordan,Kazakhstan,Kuwait,Kyrgyzstan,Lebanon,Oman,
Pakistan,Qatar,SaudiArabia,Syria,Tajikistan,Turkmenistan,UnitedArabEmirates(UAE),Uzbekistan,
andYemen.InternationalwatersincludedaretheRedSea,PersianGulf,andwesternportionsoftheIndian
Ocean.[14]SyriaandLebanonweretransferredfromtheUnitedStatesEuropeanCommandon10March
2004.
IsraelissurroundedbyCENTCOMcountriesbutremainsinUnitedStatesEuropeanCommand(EUCOM).
GeneralNormanSchwarzkopfexpressedthepositionoverIsraelfranklyinhis1992autobiography:
'EuropeanCommandalsokeptIsrael,whichfrommyviewpointwasahelp:I'dhavehaddifficulty
impressingtheArabswithCentralCommand'sgraspofgeopoliticalnuanceifoneofthestopsonmy
itineraryhadbeenTelAviv.'[4]:318
On7February2007,planswereannouncedforthecreationofaUnitedStatesAfricaCommandwhich
transferredstrategicinterestresponsibilityforallofAfricatothenewUSAFRICOM,exceptforEgypt.On
1October2008,theAfricaCommandbecameoperationalandCombinedJointTaskForce-HornofAfrica,
theprimaryCENTCOMforceonthecontinent,startedreportingtoAFRICOMatStuttgartinsteadof
CENTCOMinTampa.

http://en.wikipedia.org/wiki/United_States_Central_Command

4/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page75
75of
of
150
224
TheU.S.armedforcesuseavariablenumberofbaselocationsdependingonitslevelofoperations.With

ongoingwarfareinIraqandAfghanistanin2003,theUnitedStatesAirForceused35bases,whilein2006
itused14,includingfourinIraq.TheUnitedStatesNavymaintainsonemajorbaseandonesmaller
installation,withextensivedeploymentsafloatandashorebyU.S.Navy,U.SMarineCorpsandU.S.Coast
Guardships,aviationunitsandgroundunits.

Commander s
AsofMarch2013,GENLloydAustiniscommander.HetookcommandfromGeneralJamesMattis,
USMC.Mattistookcommandfrom[15][16][17]LieutenantGeneralJohnR.Allen,USMC,thedeputy
commandersinceJuly2008,whotooktemporarycommandwhenthepreviouscommander,GeneralDavid
Petraeus,USA,lefttotakecommandoftheInternationalSecurityAssistanceForce(ISAF)inAfghanistan
on23June2010.[18]
No.

Image

Name

Ser vice

Star t

End

Timeinoffice

1.

GENRobert
Kingston

UnitedStates
Army

27
1January
November 1,061days
1983
1985

2.

GenGeorgeB.
Crist

UnitedStates
MarineCorps

27
23
November November 1,092days
1985
1988

3.

GENH.Norman UnitedStates
Schwarzkopf
Army

23
9August
November
1991
1988

989days

4.

GenJosephP.
Hoar

UnitedStates
MarineCorps

9August
1991

5August
1994

1,092days

5.

GENJ.H.
UnitedStates
BinfordPeayIII Army

5August
1994

13August
1,104days
1997

6.

GenAnthony
Zinni

13August 6July
1997
2000

http://en.wikipedia.org/wiki/United_States_Central_Command

UnitedStates
MarineCorps

1,058days
5/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page76
76of
of
150
224

7.

GENTommy
Franks

UnitedStates
Army

6July
2000

7July
2003

8.

GENJohn
Abizaid

UnitedStates
Army

7July
2003

16March
1,348days
2007

9.

ADMWilliamJ. UnitedStates
Fallon
Navy

16March 28March
378days
2007
2008

(Acting)

LTGMartinE.
Dempsey

UnitedStates
Army

31
28March
October
2008
2008

217days

10.

GENDavidH.
Petraeus

UnitedStates
Army

31
October
2008

30June
2010

607days

(Acting)

LtGenJohnR.
Allen

UnitedStates
MarineCorps

30June
2010

11August
42days
2010

11.

GenJames
Mattis

UnitedStates
MarineCorps

11August 22March
954days
2010
2013

12.

GENLloyd
Austin

UnitedStates
Army

Expr essioner r or :
22March
Incumbent Unexpectednumber .
2013
days

http://en.wikipedia.org/wiki/United_States_Central_Command

1,096days

6/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page77
77of
of
150
224

Unitdecor ations
TheunitawardsdepictedbelowareforHeadquarters,USCentralCommandatMacDillAFB.Awardfor
unitdecorationsdonotapplytoanysubordinateorganizationsuchastheservicecomponentcommandsor
anyotheractivitiesunlesstheordersspecificallyaddressthem.

http://en.wikipedia.org/wiki/United_States_Central_Command

7/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

Awar dstr eamer

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page78
78of
of
150
224

Awar d

Dates

Notes

DepartmentoftheArmyGeneral
Order(DAGO)1991-22&199234[19]

Joint
Meritorious
UnitAward

2August1990
21April1991

Joint
Meritorious
UnitAward

1August19924
DAGO1994-12&1996-01
May1993

Joint
Meritorious
UnitAward

8October1994
DAGO200125
16March1995

Joint
Meritorious
UnitAward

1September1996 JointStaffPermanentOrder(JSPO)J6January1997 ISO-0012-97

Joint
Meritorious
UnitAward

1October1997
JSPOJ-ISO-0241-98
15July1998

Joint
Meritorious
UnitAward

16July19981
November1999

Joint
Meritorious
UnitAward

2November1999
15March2001

Joint
Meritorious
UnitAward

11September
20011May
2003

Joint
Meritorious
UnitAward

2May200331
December2005

Joint
Meritorious
UnitAward

1January2006
1March2008

Joint
Meritorious
UnitAward

2March20081
July2010

Joint
Meritorious
UnitAward

2July201031
July2012

JSPOJ-ISO-0330-99/DAGO2001
25

DAGO200509

JSPOJ-ISO-0061-08

Seealso
StrategicArmyCorps

http://en.wikipedia.org/wiki/United_States_Central_Command

8/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

Refer ences

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page79
79of
of
150
224

1. http://www.centcom.mil/en/about-centcom-en/leadership-en
2. "Centcomhacked:Thiswasnomoreharmfulthanateenager'sprank"
(http://www.telegraph.co.uk/news/worldnews/islamic-state/11342416/Centcom-hacked-This-was-no-moreharmless-than-a-teenagers-prank.html).TheTelegraph.Retrieved12January2015.
3. AnthonyCordesman,USCENTCOMMissionandHistory
(http://csis.org/files/media/csis/pubs/uscentcom3%5B1%5D.pdf),CenterforStrategicandInternationalStudies,
August1998
4. NormanSchwarzkopf(1993).ItDoesn'tTakeaHero.BantamBookspaperbackedition.pp.3312,3356.
ISBN0-553-56338-6.HaroldCoyle'snovelSwordPointgivesanimpressionofwhatsuchplanningenvisaged,by
aU.S.Armyofficerwhowouldhavehadsomeideaofthegeneralplanningapproach.
5. RichardMoodySwain,LuckyWar:ThirdArmyinDesertStorm,U.S.ArmyCommandandGeneralStaff
CollegePressviaGoogleBooks,6.
6. MichaelR.Gordon,BernardE.Trainor(2012).TheEndgame:TheInsideStoryoftheStruggleforIraq,from
GeorgeW.BushtoBarackObama.NewYork:PantheonBooks.ISBN978-0-307-37722-7.
7. "U.S.CentralCommandTwitterfeedappearshackedbyIslamicStatesympathizers"
(http://www.reuters.com/article/2015/01/12/us-cybersecurity-centcom-hack-idUSKBN0KL1UZ20150112).
Reuters.12January2015.Retrieved12January2015.
8. CHRISGOOD,JOSHUACOHANandLEEFERRAN(12January2015)."Home>International
Cybervandalism:ISISSupportersHijackUSMilitarySocialMediaAccounts"
(http://abcnews.go.com/International/us-military-twitter-account-apparently-hijacked-isis-supporters/story?
id=28170963).ABC(ABCnewsInternetVenture).Retrieved12January2015.
9. JanGoldmanPh.D.,TheWaronTerrorEncyclopedia:FromtheRiseofAl-Qaedato9/11andBeyond,100-101.
10. AuerswaldandSaideman,2014,96f
11. NicolaNasser(5September2013)."JordanInvitesUSTargetsforSyrianRetaliation"
(http://www.globalresearch.ca/jordan-invites-us-targets-for-syrian-retaliation/5348258).CentreforResearchon
Globalization.
12. "AfricansFearHiddenU.S.AgendainNewApproachtoAfricom"
(http://www.foxnews.com/story/0,2933,430564,00.html).AssociatedPress.2008-09-30.Retrieved2008-09-30.
13. Arkin,William(25January2005).CodeNames:DecipheringU.S.MilitaryPlans,ProgramsandOperationsin
the9/11World(Firsted.).Steerforth.ISBN1586420836.
14. "CentralCommand"(http://www.globalsecurity.org/military/agency/dod/centcom.htm).GlobalSecurity.org.n.d.
Retrieved13January2015.
15. "MattistakesoverCentralCommand,vowstoworkwithMideastalliesinAfghanistan,Iraq"
(http://www.foxnews.com/us/2010/08/11/mattis-takes-central-command-vows-work-mideast-allies-afghanistaniraq/).FoxNewsChannel.AssociatedPress.11August2010.Retrieved15March2012.
16. Mitchell,Robbyn(12August2010)."MattistakesoverasCentComchief"
(http://www.tampabay.com/news/article1114800.ece).St.PetersburgTimes.p.1.Retrieved12August2010.
17. "MattisassumescommandofCENTCOM"(http://www.centcom.mil/news/mattis-assumes-command-ofcentcom).U.S.CentralCommand.11August2010.Retrieved12August2010.
http://en.wikipedia.org/wiki/United_States_Central_Command

9/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

UnitedStatesCentralCommand-Wikipedia,thefreeencyclopedia
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page80
80of
of
150
224
18. "Lt.Gen.AllennamedCENTCOMactingcommander"(http://www.centcom.mil/en/press-releases/lt-gen-allennamed-centcom-acting-commander)(Pressrelease).U.S.CentralCommand.30June2010.Retrieved2July
2010.
19. "DepartmentoftheArmyGeneralOrders"(http://armypubs.army.mil/epubs/da_general_orders_1.html).United
StatesArmyPublicationsDirectorate.Retrieved30April2011.(ArmyKnowledgeOnlineaccountmaybe
required.)

Exter nallinks
U.S.CentralCommandofficialwebsite(http://www.centcom.mil/)
Multi-NationalForceIraq.commnf-iraq.com(http://www.mnf-iraq.com)(English)
Multi-NationalForceIraq(http://www.shurakaal-iraq.com)shurakaal-iraq.com(Ar abic)
CombinedJointTaskForceHornofAfricaeofficialsite(http://www.hoa.centcom.mil/)
Spiegel,Peter(5January2007)."NamingNewGeneralsAKeyStepInShiftOnIraq"
(http://articles.latimes.com/2007/jan/05/nation/na-generals5).LosAngelesTimes.
ForeignPolicy,PentagonUpstheAnteinSyriaFight(http://foreignpolicy.com/2015/03/30/thepentagon-ups-the-ante-in-syria-fight-iraq-islamic-state-delta-force/)
http://www.armytimes.com/story/military/pentagon/2014/12/30/iraq-1st-infantry-funk/21062071/CombinedJointForcesLandComponentCommand-Iraq
Retrievedfrom"http://en.wikipedia.org/w/index.php?
title=United_States_Central_Command&oldid=655960119"
Categories: MilitaryunitsandformationsinFlorida OrganizationsbasedinTampa,Florida
UnifiedcombatantcommandsoftheUnitedStatesArmedForces
Militaryunitsandformationsestablishedin1983 1983establishmentsintheUnitedStates
Thispagewaslastmodifiedon11April2015,at11:43.
TextisavailableundertheCreativeCommonsAttribution-ShareAlikeLicenseadditionaltermsmay
apply.Byusingthissite,youagreetotheTermsofUseandPrivacyPolicy.Wikipediaisa
registeredtrademarkoftheWikimediaFoundation,Inc.,anon-profitorganization.

http://en.wikipedia.org/wiki/United_States_Central_Command

10/10

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

SouthFloridaHomelandSecurityOperations-SunSentinel
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page81
81of
of
150
224

PoliceshowoffHomelandSecurityintelligencecenter
B y Lin d a Tr is ch itta
SunSentinel
MARCH20,2015,12:15AM

DORAL

tasecretlocationinMiami-DadeCounty,analystsandinvestigatorstaskedwithpreventingterrorist
attacksstudytipsaboutpossibleplotsthatcouldbecarriedoutbetweenKeyWestandPalmBeach.

TheyarepartoftheSoutheastFloridaFusionCenter,oneof78centersintheUnitedStatesandGuam,PuertoRico
andtheU.S.VirginIslandsthatmakesurefederalandlocalpoliceagenciestalktooneanotheraboutpending
threats.
OnThursday,thecenterpromotedits"SeeSomething,SaySomething"campaigntoengageresidentsofMonroe,
Miami-Dade,BrowardandPalmBeachcountiesinitsefforts.
BeforetheSept.11,2001al-Qaedaattackswhennearly3,000died,someoftheterroriststrainedatFloridaair
fieldsbeforeflyingjetsintotheWorldTradeCenter,afieldinPennsylvaniaandthePentagoninWashington,
D.C.
"Therewasinformationouttherethatwasn'tbeingshared,"saidLt.MarioHernandezofMiami-Dadepolice,the
agencythatmanagestheeight-year-oldcenter."Oneagencyhadapieceofthepuzzle,anotheragencyhadapiece
ofthepuzzle,nobodyhadthewholepuzzle.We'retryingtopreventthatfromhappeningagain."
Besidescrimeanalysis,theyhelplocalauthoritiesprepareforbignationaleventsthatSouthFloridafrequently
hostsandwilllendequipmentsuchascamerastomonitorcrowds.
Thecenter'sdirector,actingMaj.JannaBolinger-Heller,ofMiami-DadePolice,saidshecouldnotdisclosemost
ofitssuccessstoriesorthenumberofterrorismincidentsthathavebeenthwarted.
ButofficialssaidtheyhelpedinvestigateRaeesAlamQazi,22,andhisbrotherSheheryarAlamQazi,32,of
OaklandPark,whopleadedguiltyMarch12tofederalterrorismchargesandadmittedtheyplottedaterrorist
attackonNewYorkCitylandmarks.
Thecentercoordinatedin2014withMiamiGardenspolice,U.S.CustomsandBorderProtectionandInterpolin
aninvestigationoftwoBahamianmenhereillegally.OnewassoughtinhiscountryforthemurderofaU.S.
citizenBahamianauthoritiestookhimintocustody.Theothermanwasdeported,accordingtoHomeland
Security.
AnexampleofwhatBolinger-Hellercalled"unintendedbenefits"washowthecenter'scamerasthathadbeenlent
totheMiami-DadeCountyFairhelpedrecoverlostchildren.
AndduringapastUrbanBeachWeekinMiamiBeach,acameraplacedonacausewayshowedpoliceracingtoa
StarIslandmansionandaburglarysuspectjumpingoffabackyarddockintoBiscayneBay,shesaid.Thecamera
monitorsdirectedcopstotheswimmingsuspect.
"Youcan'treallyputapriceonthekindsofresourceswehavehereandhowwecanusethemtobenefitthe
http://www.sun-sentinel.com/local/fl-south-florida-homeland-operations-20150319-story.html

1/3

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

SouthFloridaHomelandSecurityOperations-SunSentinel
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page82
82of
of
150
224
community,"Bolinger-Hellersaid.

SEARCH

ForeventssuchasFortLauderdale'sairshoworaSuperBowl,thecenterwillbeginitsthreatassessmentmonths
inadvanceandpollstheothercentersinthecountryforintelligencereports,Lt.MargaritaVarelasaid.
SUBSCRIBE
LOGIN
Theyalsoconsiderlocalcriminalactivity,concernsforpoliceandpublicsafetyintheirpreparations.Regardlessof
MEMBERCENTER
theprofessionals'efforts,Varelasaid,"thebottomlineforthepubliciswecan'tdoitalone.Wehavetoworkhand
w

inhandtogetherinordertopreventcriminalactivityoraterrorismattackfromhappeninginourhometown.Our
NEWS
kidsgotoschoolhere,ourfamiliesworkhere,wegotothemallshere,wecelebratehere."
w

Varelawouldlikethecenter'stiplinesiwatchsouthflorida.com,seffc@mdpd.comand855-352-7233tobe

CLASSIFIED

usedasoftenasCrimeStoppers.

w
"Wedon'twantonetypeofpersonbeingreportedon,"Varelasaid."Lookatthebehavior.Wasavehicleoritemleft

BROWARD

behind?Before9/11wecouldwalkbyandnotevenchallengethosethings.Intoday'ssociety,wecan't.Bringthis
PALMBEACH
w
totheattentionoftheauthoritiesandletusfollowuponit."

Tip s B ox :Eigh tSign s ofTer r or is m


SPORTS
w
Su r veilla n ce:Someonerecordingormonitoringactivities,takingnotes,drawingdiagrams,markingmapsor

w
usingbinocularsorothervisualdevices.

ENTERTAINMENT

BUSINESS
Elicita tion :Groupsorindividualsseekinginformationinpersonorbymail,phoneoremailaboutmilitary
w

operations,capabilitiesorpersonnel.
LIFESTYLE

Tes ts ofs ecu r ity:Attemptstomeasurereactiontimesbypolicetosecuritybreacheseffortstogothrough


securitybarriersormonitorprocedurestoassessstrengthsandweaknesses.

HEALTH

Fu n d in g:Suspicioustransactionsinvolvinglargecashpayments,withdrawalsordepositsaskingformoneyfor
TRAVEL
w
donations,ortopayforcriminalactivities.

Su p p lies :Purchasingorstealingexplosives,weaponsorammunitionacquiringmilitaryuniforms,decals,flight
OPINION
w
manuals,passes,badgesorequipmenttomakethemandotheritems.

Im p er s on a tionw
:Peoplewhodon'tseemtobelong,whetherinaworkplace,neighborhood,businessoratborder

WEATHER

crossingsandimpersonationoflawenforcement,militaryorcorporateemployees.

SFPARENTING

Reh ea r s a l:Puttingpeopleinplaceandmovingthemaccordingtoaplanwithoutactuallycommittingaterrorist
act.Oneelementofthisactivityincludesmappingroutesandtimingtrafficlightsandflow.
CARS&TRUCKS
w
Dep loym en t:Peopleandsuppliesgettingintopositiontocommitanact.Thisisthelastchanceforsomeoneto

VIDEOS&PHOTO

alertauthoritiesbeforeaterroristeventhappens.
Source:SoutheastFloridaFusionCenter
Ltrischitta@Tribune.com,954-356-4233orTw itter@LindaTrischitta
Copyright2015,SunSentinel

FROMAROUNDTHEWEB
http://www.sun-sentinel.com/local/fl-south-florida-homeland-operations-20150319-story.html

SponsoredLinks byTaboola
2/3

4/27/2015
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM

SouthFloridaHomelandSecurityOperations-SunSentinel
Document
Document
133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page83
83of
of
150
224

1DirtyLittleSecretToEliminate15YearsOfMortgagePayments
LowerMyBills

7OutrageousCreditCardsForThoseOfUsThatHaveExcellentCredit
NextAdvisor

This$15ProductisChanginga$13BillionIndustry
Harry's

Ex-Microsoftexecisdisruptingthetraditionalbrokermodel
Yahoo!Finance|MotifInvesting

KateUptonandTracyMorgan'sSuperBowlTouchdownDance
Vogue

30HighestPaidPerformersInTheWorld
Forbes

WhyYouShouldBeGettingYourWineOnline
BetchesLoveThis|Lot18

RussellWilsonDisagreesWithAaronRodgers,SaysGodDoesCareAboutFootball
ThePostGame

http://www.sun-sentinel.com/local/fl-south-florida-homeland-operations-20150319-story.html

3/3

4/27/2015
SheriffJoeArpaioHiredaPrivateInvestigatortoCheckonFederalJudge'sWife-TheAtlantic
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page84
84of
of

150
224

POLITICS

Sheri Joe vs. Uncle Sam


Joe Arpaio, America's most flamboyant lawman, hired a private detective to
investigate the wife of a federal judge considering whether he was in
contempt of court.

Ross D. Franklin / AP

DAVID A. GRAHAM
APR 25, 2015

Lots of conservatives talk a good game about how citizens should resist
federal control and devolve power to local governments. Few of them are
willing to put their convictions into action in quite the same way that Sheriff
Joe Arpaio is.
The man who calls himself "America's toughest sheriff" was already in
trouble with Uncle Sam, on trial for contempt of court in a U.S. district court.
http://www.theatlantic.com/politics/archive/2015/04/sheriff-joe-vs-uncle-sam/391418/

1/5

4/27/2015
SheriffJoeArpaioHiredaPrivateInvestigatortoCheckonFederalJudge'sWife-TheAtlantic
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page85
85of
of

150
224

It was only once that was under way that Arpaio and his lawyer apparently
had the idea to sic a private investigator on the wife of the federal judge
hearing his case. That shows toughness. It shows a willingness to use
unorthodox tactics to resist federal interference. It's also not especially
bright.
Reporters in the courtroom describe a somewhat shocking scene. Lawyers
had completed their questioning when Judge Murray Snow announced he
had some questions for Arpaio. After a series of queries, Snow asked: "Are
you aware that I've been investigated by anyone?"
The sheriff then admitted that his former attorney had hired the private
investigator to look into a tipster's allegation that Snow's wife had told
someone at a restaurant that Snow wanted to prevent Arpaio from being
reelected. Arpaio's amazing rationalization: "We weren't investigating you.
We were investigating some comments that came to our attention."
RELATED STORY

Sheriff Joe Arpaio: The Most Lawless


Lawman in America

The sheriff was on trial for, well, thumbing his nose at the federal
government. In 2011, Judge Murray Snow issued a ruling demanding that
Arpaio stop anti-immigration patrols arresting people solely on suspicion of
being in the country illegally, while Snow continued to consider whether they
http://www.theatlantic.com/politics/archive/2015/04/sheriff-joe-vs-uncle-sam/391418/

2/5

4/27/2015
SheriffJoeArpaioHiredaPrivateInvestigatortoCheckonFederalJudge'sWife-TheAtlantic
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page86
86of
of

150
224

constituted illegal racial profiling. (In 2013, Snow finally ruled that they did,
forcing Arpaio to drop the patrols permanently.) Arpaio simply disregarded
the order for 18 monthsas he now acknowledges. The question is whether
that was intentional or not; if the judge decides it's the former, he could find
Arpaio in contempt. The sheriff's somewhat improbable explanation is that
he simply didn't realize that a federal judge had issued the order.
"I have a deep respect for the courts," Arpaio said. "It really hurts me after 55
years to be in this position. I want to apologize to the judge. I should have
known more about these court orders that slipped through the cracks."
There are two problems with that. One is that a deputy testified this week
that Arpaio had personally instructed him to continue enforcing federal
immigration laws, in defiance of the judge's order. The second is that hiring a
PI to investigate the judge who's considering whether you're in contempt of
court isn't what most people would consider deep respect.
"It is contemptuous behavior on its face," a former U.S. attorney told The
Arizona Republic. "And it is information deserving of further investigation to
determine if other criminal misconduct occurred here."
Intimidating or trying to improperly influence a federal judge is in fact a
crime. But this isn't the first time Arpaio has pulled a stunt like thisand in
fact, he has a long history of launching investigations into political
opponents. In 2012, a federal grand jury concluded a three-year
investigation into abuse-of-power allegations without charging Arpaio.
The U.S. Department of Justice also has a civil-rights lawsuit pending against
the sheriff accusing him of retaliating against critics. In a bizarre Spy vs. Spy
moment, Arpaio also admitted to Snow that he had used county funds in
2013 to launch an investigation into ... the Justice Department. Elsewhere
during the questioning, Arpaio "conced[ed] that the agency employed
http://www.theatlantic.com/politics/archive/2015/04/sheriff-joe-vs-uncle-sam/391418/

3/5

4/27/2015
SheriffJoeArpaioHiredaPrivateInvestigatortoCheckonFederalJudge'sWife-TheAtlantic
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page87
87of
of

150
224

unreliable informants, private investigators and an unknown amount of


public funds to investigate Arpaio's political enemies," as the Republic put it.
Arpaio's current attorney pushed back on the big revelation after the hearing,
telling reporters: "These been no evidence that the sheriff ordered the
judge's wife to be investigated." But his client's use of the first-person plural
("we were investigating some comments that came to our attention") would
seem to contradict that.
Courts have already found that Arpaio violated the law, and there's no longer
any question that other aspects of his behavioreven those not yet
adjudicated for legalityare outlandish. The law isn't especially conflicted
on many of the issues about which he's outspoken. The federal government
has authority to enforce immigration laws; Arpaio's racial profiling was
unlawful; intimidating a judge, if that's what he's found to be doing, is
unlawful too; and yes, Barack Obama was born in the United States.

"I have a deep respect for the courts. I want to


apologize to the judge. I should have known more
about these court orders that slipped through the
cracks."
But there's a conflict between rule of law and rule of the people, and between
the federal government and local authority. Arpaio has won six elections,
never by less than six points. The closest was in 2012, when his legal trouble
was already underway and well into his ill-advised birther crusade against
Obama, but in 2008 he won by a comfortable 13 points. The point is:
Maricopa County voters like Arpaio and have kept returning him to office,
even as his M.O. has become abundantly clear. Maybe Washington doesn't
want him enforcing federal immigration laws, but a majority of Phoenix-area
voters apparently do. Besides, not all of the raps on Arpaio have stuck
http://www.theatlantic.com/politics/archive/2015/04/sheriff-joe-vs-uncle-sam/391418/

4/5

4/27/2015
SheriffJoeArpaioHiredaPrivateInvestigatortoCheckonFederalJudge'sWife-TheAtlantic
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page88
88of
of

150
224

witness the federal grand jury that didn't charge him (though that may have
been mostly because of a challenging burden of proof).
This conflict between federal and local authority, never far from the surface
in American history, has seen a resurgence in recent years, as conservative
governmentsmostly at the state levelhave reacted to legislation passed by
Democrats and backed by Obama by attempting to nullify or reject federal
law. On issues from Obamacare to gun control, state legislators have even
tried to write laws that would make enforcing federal statutes illegal. Few of
these laws have passed, though, and if they did, they'd have little chance of
surviving judicial review.
What's interesting about Arpaio is that unlike lawmakers who have pursued
doomed legislative attempts to stop the liberal agenda, the sheriff is fighting
back using his own executive authority, mixed with street-fighting moves.
And when the federal judiciary has smacked him down, he's simply
ratcheted up those efforts.
Perhaps investigating a federal judge's wife will be one step too far and spell
his demise. If not, he could run for a seventh time in 2016. There's some
precedent for voters punishing anti-federal pols in Arizonathey tossed State
Senator Russell Pearce, the major proponent of Arizona's controversial
illegal-immigration bill, after he seemed to have gone too far. Don't assume
the same rules will apply to Joe Arpaio that apply to everyone else, though
he certainly doesn't think they do.
ABOUT THE AUTHOR

DAVID A. GRAHAM is a staff writer at The Atlantic, where he covers political and global
news. He previously reported for Newsweek, The Wall Street Journal, and The
National.
@GrahamDavidA Email

http://www.theatlantic.com/politics/archive/2015/04/sheriff-joe-vs-uncle-sam/391418/

5/5

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page89
89of
of

150
224

U.S. Air Force Intel Unit


Helped Kill 1,200 People
in a Year
361st Intelligence, Surveillance and
Reconnaissance Group fed information to
commandos
by DAVID AXE
A secretive group of U.S. Air Force intelligence specialists ying aboard
American spy planes helped U.S. military commandos kill more than a
thousand enemy combatants in just a single year back in 2012.
Thats one startling revelation in the ocial annual history for 2012 of the
Air Forces Intelligence, Surveillance and Reconnaissance Agency, a heavilyredacted copy of which War Is Boring obtained through the Freedom of
Information Act.
Linguists and analysts from the 361st Intelligence, Surveillance and
Reconnaissance Group at Hurlburt Field in Florida ew on at least 31,180
combat sorties in 2012, supporting no fewer than 960 separate operations
that resulted in Special Operations Forces detaining more than 3,980
people and killing at least 1,210, according to the history.
That single years kill tally probably makes the 361st one of the deadliest
individual organizations in the entire U.S. military.

The 361st began as an aerial mapping unit during World War II. In 2008, the
Air Force revived the unit as part of a massive expansion of intel units to
support counterterrorism operations and the wars in Iraq and Afghanistan.

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

1/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page90
90of
of

150
224
Between 2008 and 2012, the Pentagon grew its eet of spy planes and
surveillance drones by 238 percentuntil they accounted for half of all Air
Force aircraft, according to the ISR Agency history. By 2012 the Defense
Department was spending $67 billion a year on intelligence and
surveillance.

Abovea U.S. Air Force MC-12W. At topairmen from the Air Forces ISR Agency at work. Air Force photos

Many intel ights require specialists to y aboard the aircraft to quickly


analyze the video the plane is shooting or translate the communications
between enemy ghters that the aircrafts receivers pick up.
The intelligence personnel can then pass the information they gather to
troops on the ground. The info might include the locations and strength of
enemy ghters.

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

2/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page91
91of
of

150
224
The 361stwhich oversees two smaller units of linguists and analysts, the
19th and 25th Intelligence Squadronsprovides the specialists for spy
ights supporting Special Operations Forces. The group is heavily tasked
around the world, the Air Force stated in a fact sheet.
Tech. Sgt. Brandi Fast from the 25th Intelligence Squadron was the Defense
Departments Language Professional of the Year in 2013. That year she
deployed twice to Southwest AsiaAfghanistan, presumablyand helped
during a mission to rescue 14 crew from a coalition helicopter that crashed.

Fast has a 16,000-word vocabulary in three languages, according to the Air Force.
Lt. Col. John Shirley, the 361sts commander since April 2014, called his
people the best and brightest America and the Air Force has to oer.

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

3/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page92
92of
of

150
224

A U.S. Air Force U-28. Air Force photo

The planes the 361sts specialists ride in could include special commando
aircraft belonging to the Air Force or the Army. The Air Forces few public
releases concerning the 361st specically mention U-28 and MC-12W spy
planes, which are heavily-modied turboprop transports sporting
sophisticated sensors.
The MC-12W was a xture in Afghanistan until recently. The U-28s spend
much of their time in Africa.
The 361sts intel personnel also support drone ights, presumably by sitting
in the robot planes command trailers and analyzing video and
communications intercepts the drones pipe in. In 2012, 19 percent of the
31,180 sorties the 361sts people supported were drone ights, according to
the ISR Agency history.

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

4/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page93
93of
of

150
224

Based on the more than 1,200 people the 361st helped to kill in 2012, the groups
work is certainly deadly to the bad guys. But the unit has also suered casualties of
its own.
On Feb. 18, 2012, a U-28 crashed in Djibouti in East Africa, killing Senior
Airman Julian Scholten from the 25th Intelligence Squadron.
And the 361sts Sta Sgt. Richard Dickson, who operated signalsintercepting gear, died in Afghanistan on April 27, 2013, when his MC-12W
went down in hostile territory.

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

5/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page94
94of
of

150
224

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

6/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page95
95of
of

150
224

The NSA Listened as Chinese MiGs Shot


Down American Warplanes
Declassified docs detail Vietnam War air clashes
medium.com

The U.S. Is Sending Specialists to Iraq to


Keep Tabs on Irans Agents
Counterintelligence troops help guard against spies
medium.com

The Pentagon Deployed Scent Warfare in


Vietnam
Electronic sniffers literally smelled for the enemy
medium.com

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

7/8

4/27/2015
U.S.AirForceIntelUnitHelpedKill1,200PeopleinaYearWarIsBoringMedium
Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM
Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015

Page
Page96
96of
of

150
224

https://medium.com/war-is-boring/u-s-air-force-intel-unit-helped-kill-1-200-people-d335ccf61cd0

8/8

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page97
97of
of
150
224

Exhibit 13

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page98
98of
of
150
224

IN UNITED STATES DISTRICT COURT


FOR THE SOUTHERN DISTRICT OF FLORIDA
CASE NO.: 15-cv-20782-Martinez
DENNIS MONTGOMERY,
Plaintiff,
v.
RISEN, ET AL.
Defendants.
_____________________________/
PLAINTIFFS REVISED INITIAL DISCLOSURE WITNESS LIST
Montgomery, Dennis
Miami, Florida
Software Validation and all issues relevant to the Complaint
Risen, James
Maryland
Book, defamatory statements, actual malice, communications with Dennis Montgomery and all
issues relevant to the Complaint
FRCP Rule 30(b)(6) witnesses of corporate Defendants
Mr. William Bayers, Esq.
General Counsel
Boston, Massachusetts 02116
Defamation, classified information, asked to correct defamatory statements, no journalistic
standards, Florida contacts and sales, fact checking and all issues relevant to the Complaint
Linda K. Zecher
President, Chief Executive Officer and Director
Boston, Massachusetts 02116
Defamation, classified information, asked to correct defamatory statements, fact checking,
Florida contacts and sales and all issues relevant to the Complaint
David Eber
Vice President and Associate General Counsel
Boston, Massachusetts 02116
Defamation, classified information, asked to correct defamatory statements, all issues relevant to
the Complaint

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page99
99of
of
150
224

Brook Colangelo
VP Houghton Mifflin Harcourt
White House Network Email and Network Infrastructure
all issues relevant to the Complaint
Houghton Mifflin Harcourt Publishing Company
Boston, Massachusetts 02116
all issues relevant to the Complaint
Rosemary Moseley
Lake Placid, Florida
Purchase of Book in Florida
all issues relevant to the Complaint
Kimberly Hines
Ft. Lauderdale, Florida
Montgomery Reputation, Purchase of Book in Florida
all issues relevant to the Complaint
Goss, Porter
Director of CIA
Miami, Florida
Software Validation, White House and Congressional Briefing
all issues relevant to the Complaint
Johns, Ken
Macdill AFB, Florida
Software Validation, White House and Congressional Briefing, Montgomery Reputation
all issues relevant to the Complaint
Lyons, XXXXX
Macdill AFB, Florida
Software Validation, White House and Congressional Briefing, Montgomery Reputation
all issues relevant to the Complaint
Macbeth, W. Rhys
Eglin AFB, Florida
Software Validation, White House and Congressional Briefing, Montgomery Reputation
all issues relevant to the Complaint
Nazelrod, Craig
Eglin AFB, Florida
Software Validation, White House and Congressional Briefing
all issues relevant to the Complaint
Pipes, XXXXX

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page100
100of
of
150
224

Macdill AFB, Florida


Reputation Damage
all issues relevant to the Complaint
Roche, James
Macdill, Florida
Software Validation, White House and Congressional Briefing, CIA Visits, eTreppid Visits
all issues relevant to the Complaint
Rumsfeld, Donald
Florida
Software Validation, White House and Congressional Briefing, CIA Visits, Reputation damage
all issues relevant to the Complaint
Stillman, Phillip
Attorney Dennis Montgomery
Miami, Florida
Dennis Montgomery Legal Briefs, Whistleblower complaints
all issues relevant to the Complaint
Madden, Tom
Boca Raton, Florida
Reputation, damage to reputation in FL
all issues relevant to the Complaint
Olivia, Adrian
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Bartholomew Mary L
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Fiamengo, Nicholas A
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Freeman, Gregory J
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Savage Cynthia

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page101
101of
of
150
224

Eglin AFB, Florida


US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
McCool John C
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Temple James K
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Griffin Susan M.
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Russell, Deborah
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Nettelhorst Doug M
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Stallworth Hugh T
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Bob McCaskey
Macdill AFB, Florida
Northrop Grumman TASC
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Crutchfield, Chris
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Melnyk, Michael S.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page102
102of
of
150
224

Macdill AFB, Florida


US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Lopez Tina M
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
Cerny, Jeffrey D.
Macdill AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Muccio Anthony B
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
McKinney Scott E LtCol
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Purvis Brad Civ
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
'Kirsch, Jim'
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Hughes Stacey L
Eglin AFB, Florida
US Government contracts, CIA Briefings, Software Functionality, Congressional Briefings
all issues relevant to the Complaint
Abramson, Jill
Former New York Times Editor in Chief
New York, NY
Dennis Montgomery Reputation, James Risen, Eric Lichtblau
all issues relevant to the Complaint
Anderson, Jesse
Employee eTreppid Technologies

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page103
103of
of
150
224

Reno, Nevada
SOCOM work
all issues relevant to the Complaint
Azzinaro, Neil
2006 Search Warrant
Las Vegas, Nevada
2006 Search Warrant
all issues relevant to the Complaint
Bauder, Jim
Employee eTreppid Technologies
Reno, Nevada
SOCOM work
all issues relevant to the Complaint
Blixseth, Edra
Beverly Hills, CA
760-831-1982
Software Works
all issues relevant to the Complaint
Blixseth, Tim
Medina, WA 98004
760-333-9024
Software Works
all issues relevant to the Complaint
Frye, Doug
Malibu, CA
Government Contracts, Montgomery Reputation, eTreppid Bank Accounts
all issues relevant to the Complaint
Sandoval, Michael
Bellevue, WA
Software Functionality, Mass Surveillance Technology, Congressional Briefing, Mike Flynn
Snowden, Edward
Somewhere in Russia
Mass Surveillance Technology, NSA and CIA Briefing
all issues relevant to the Complaint
Trepp, Warren
Reno, NV
US Government contracts, CIA Briefings, Search Warrant, Software Functionality
all issues relevant to the Complaint

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page104
104of
of
150
224

Venables, Sloan
Virginia City, NV
US Government contracts, CIA Briefings, Search Warrant, Software Functionality
all issues relevant to the Complaint
Wiedermann, Peter
Contractor USAF
Kirkland, WA
US Government contracts, CIA Briefings, Search Warrant, Software Functionality
all issues relevant to the Complaint

This is an initial disclosure witness list and Plaintiff reserves the right to supplement it as
this case proceeds to discovery and trial.

Dated: April 27, 2015

Respectfully submitted,
/s/ Larry Klayman
Larry Klayman, Esq.
Klayman Law Firm
FL Bar No. 246220
7050 W Palmetto Park Rd.
Suite 15-287
Boca Raton, FL 33433
(310) 595-0800
leklayman@gmail.com
Attorney for Plaintiff

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page105
105of
of
150
224

Exhibit 14

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page106
106of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page107
107of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page108
108of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page109
109of
of
150
224

Exhibit 15

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page110
110of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page111
111of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page112
112of
of
150
224

ATTACHMENT A
LIST OF EXAMPLES OF DEFAMATORY STATEMENTS, COMMENTS
DEFAMATION PER SE
1.

The following statements are defamatory per se, recognized under Florida law

when statements are so powerful in their ability to hurt someone that Florida law presumes
harmful as a matter of law. Montgomery v. Knox, 23 Fla. 595, 3 So. 211, 217 (1887), such that a
judge will allow damages to be awarded in these cases even if no evidence of harm has been
presented. [T]he law presumes malice in their utterance, Abraham v. Baldwin, 52 Fla. 151, 42
So. 591, 592 (1906), where the words are of such common notoriety established by the
general consent of men, that the courts must of necessity take judicial notice of its harmful
effect. Layne v. Tribune Co., 108 Fla. 177, 146 So. 234, 236 (1933).
2.

First, on Page 32 of the Book, Risen writes: 2


Consider the example of Dennis Montgomery. He provides a
perfect case study to explain how during the war on terror greed and
ambition have been married to unlimited rivers of cash to create a
climate in which someone who has been accused of being a con
artist was able to create a rogue intelligence operation with little or
no adult supervision. Crazy became the new normal in the war on
terror, and the original objectives of the war got lost in the process.

3.

As libel per se, Risen asserted that out of greed Montgomery create[d] a rogue

intelligence operation with little or no adult supervision and that he was someone who has been
accused of being a con artist.
1

Examples of defamation per se include those that hurt ones profession, business or trade;
falsely state that a person has a socially unacceptable illness or disease; or falsely state that a
person has been involved in some kind of criminal activity. Lawnwood Medical Center Inc. v.
Sadow, 43 So. 3d 710, 729 (Fla. 4th DCA 2010).
2
Note that several statements may qualify under different theories, but are presented in full
for proper context. Some statements are repeated for that portion of the statement that qualifies
under different theories of defamation under Florida law.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page113
113of
of
150
224

4.

Second, on Page 32 of the Book, the Risen writes:


Whatever else he was, Dennis Montgomery was a man who
understood how best to profit from Americas decade of fear. He saw
the post-9/11 age for what it was, a time to make money. Montgomery
was the maestro behind what many current and former U.S. officials
and others familiar with the case now believe was one of the most
elaborate and dangerous hoaxes in American history, a ruse that was so
successful that it nearly convinced the Bush administration to order
fighter jets to start shooting down commercial airliners filled with
passengers over the Atlantic. Once it was over, once the fever broke
and government officials realized that they had been taken in by a
grand illusion, they did absolutely nothing about it. The Central
Intelligence Agency buried the whole insane episode and acted like it
had never happened. The Pentagon just kept working with
Montgomery. Justice Department lawyers fanned out across the country
to try to block any information about Montgomery and his schemes
from becoming public, invoking the state secrets privilege in public, a
series of civil lawsuits involving Montgomery. It was as if everyone in
Washington was afraid to admit that the Emperor of the War on Terror
had no clothes.

5.

As libel per se, Risen asserted Montgomerys work many current and former

U.S. officials and others familiar with the case now believe was one of the most elaborate and
dangerous hoaxes in American history, a ruse that was so successful that it nearly convinced the
Bush administration to order fighter jets to start shooting down commercial airliners filled with
passengers over the Atlantic.
6.

As libel per se, Risen asserted about the Montgomery that once the fever broke

and government officials realized that they had been taken in by a grand illusion, they did
absolutely nothing about it
7.

Third, on Page 33 of the Book, Risen writes:


A former medical technician, a self-styled computer software
expert with no experience whatsoever in national security affairs,
Dennis Montgomery almost singlehandedly prompted President
Bush to ground a series of international commercial flights based
on what now appears to have been an elaborate hoax. Even after it
appeared that Montgomery had pulled off a scheme of amazing

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page114
114of
of
150
224

scope, he still had die-hard supporters in the government who


steadfastly refused to believe the evidence suggesting that
Montgomery was a fake, and who rejected the notion that the
super-secret computer software that he foisted on the Pentagon and
CIA was anything other than Americas salvation.
8.

As libel per se, Risen asserted that Montgomerys work now appears to have

been an elaborate hoax.


9.

As libel per se, Risen asserted that die-hard supporters in the government who

steadfastly refused to believe the evidence suggesting that Montgomery was a fake.
10.

As libel per se, Risen asserted that he that he foisted on the Pentagon and CIA

super-secret computer software.


11.

Fourth, on Page 34 of the Book, the Risen writes:


Montgomery was an overweight, middle-aged, incorrigible gambler,
a man who liked to play long odds because he was convinced that he
could out-think the house. He once boasted to a business partner that
he had a system for counting an eight-deck blackjack shoe, quite a
difficult feat for even the best card sharks, and he regularly tested his
theories at the El Dorado and the Peppermill Casino in Reno. He
usually came up short but that didnt stop him from playing blackjack
on a nightly basis, racking up unwieldy debts that eventually led to his
2010 arrest for bouncing more than $ 1 million in bad checks at
Caesars Palace in Las Vegas.

12.

As libel per se, Risen asserted about the Montgomery that he was an incorrigible

gambler, meaning in effect that Montgomery was a gambling addict who was playing
blackjack on a nightly basis. Historically, gambling and in particular an uncontrollable
gambling addict is a loathsome social status.
13.

Fifth, on Page 36 of the Book, Risen writes:


Michael Flynn, Montgomerys former lawyer who later
concluded that Montgomery was a fraud.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page115
115of
of
150
224

14.

As libel per se, Risen asserted about the Montgomery that Montgomerys lawyer

concluded that Montgomery was a fraud.


15.

Sixth, on Page 37 of the Book, Risen writes:


By the spring and summer of 2003, eTreppid was awarded contracts
by both the air force and U.S. Special Operations Command.
Montgomery was able to win over the government in part by offering
field tests of his technology tests that former employees say were
fixed to impress visiting officials. Warren Trepp later told the FBI
that he eventually learned that Montgomery had no real computer
software programming skills, according to court documents that
include his statements to the FBI. Trepp also described to federal
investigators how eTreppid employees had confided to him that
Montgomery had asked them to help him falsify tests of his object
recognition software when Pentagon officials came to visit. Trepp
said that on one occasion, Montgomery told two eTreppid employees
to go into an empty office and push a button on a computer when they
heard a beep on a cell phone. Meanwhile, Montgomery carried a toy
bazooka into a field outside eTreppid. He was demonstrating to a
group of visiting U.S. military officials that his technology could
recognize the bazooka from a great distance.

16.

As libel per se, Risen asserted about Montgomery that he committed fraud

including defrauding the U.S. Government, prohibited under the False Claims Act codified at 31
U.S.C. 3729 3733.
17.

Seventh, on Page 37 of the Book, Risen writes:


After he was in place in the field, he used a hidden cell phone to
buzz the cell phone of one the eTreppid employees, who then pushed
a key on a computer keyboard, which in turn flashed an image of a
bazooka on another screen prominently displayed in front of the
military officers standing in another room, according to court
documents. The military officers were convinced that Montgomerys
computer software had amazingly detected and recognized the
bazooka in Montgomerys hands. (Montgomery insists that the
eTreppid employees lied when they claimed that he had asked them to
fix the tests, and also says that the air force issued a report showing
that it had verified the tests.)

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page116
116of
of
150
224

18.

As libel per se, Risen asserted about Montgomery that he committed fraud

including defrauding the U.S. Government, prohibited under the False Claims Act codified at 31
U.S.C. 3729 3733.
19.

Eighth, on Page 40 of the Book, Risen writes:


Montgomery brilliantly played on the CIAs technical insecurities
as well as the agencys woeful lack of understanding about al
Qaeda and Islamic terrorism. He was able to convince the CIA that
he had developed a secret new technology that enabled him to
decipher al Qaeda codes embedded in the network banner
displayed on the broadcasts of Al Jazeera, the Qatar-based news
network. Montgomery sold the CIA on the fantasy that al Qaeda
was using the broadcasts to digitally transmit its plans for future
terrorist attacks. And only he had the technology to decode those
messages, thus saving America from another devastating attack.
The CIA more credulous than Hollywood or Las Vegas fell
for Montgomerys claims. In short, he convinced CIA officials that
he could detect terrorist threats by watching television.

20.

As libel per se, Risen asserted about Montgomery that Montgomery sold the

CIA on the fantasy that al Qaeda was using the broadcasts to digitally transmit its plans for
future terrorist attacks.
21.

As libel per se, Risen asserted about Montgomery that he defrauded the CIA.

22.

Ninth, on Page 42 of the Book, Risen writes:


A CIA official defensively pointed out that the agency did not
actually have a contract with eTreppid at the time Montgomery was
providing data from the Al Jazeera videotapes. While they were
working closely together during the final months of 2003, the CIA
had not yet started paying Montgomery, the official said. The
agency never finalized a contract with him because agency staff
eventually realized they had been conned, according to this official.
But that does not diminish the fact that for a few crucial months, the
CIA took Montgomery and his technology very seriously.

23.

As libel per se, Risen asserted about Montgomery that agency staff eventually

realized they had been conned, according to this official.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page117
117of
of
150
224

24.

Tenth, on Page 46 of the Book, the Risen writes:


It did not take long for the French firm to conclude that the whole
thing was a hoax. The French company said that there were simply
not enough pixels in the broadcasts to contain hidden bar codes or
unseen numbers. The firm reported back to the French government
that the supposed intelligence was a fabrication.

25.

As libel per se, Risen asserted about Montgomery that the whole thing

(Montgomerys work) was a hoax and a fabrication.


26.

Eleventh, on Page 46 of the Book, the Risen writes:


The CIA never investigated the apparent hoax nor examined how it
had been handled inside the agency. No one involved in promoting
Montgomery, in vouching for his information to the president, or in
proposing to shoot down planes based on his claims ever faced any
consequences.

27.

As libel per se, Risen asserted about Montgomery that his work was a hoax.

28.

Twelfth, on Page 47 of the Book, the Risen writes:


At the time of the Christmas 2003 scare, John Brennan was head of
the newly created Terrorist Threat Integration Center and in charge of
distributing terrorism-related intelligence throughout the government.
That meant that Brennans office was responsible for circulating
Montgomerys fabricated intelligence to officials in the highest
reaches of the Bush administration. But Brennan was never
admonished for his role in the affair. After Barack Obama became
president, Brennan was named to be his top counterterrorism advisor
in the White House. He later became CIA director.

29.

As libel per se, Risen asserted about Montgomery that That meant that

Brennans office was responsible for circulating Montgomerys fabricated intelligence to


officials in the highest reaches of the Bush administration.
30.

Thirteenth, on Page 50 of the Book, Risen writes:


Edra Blixseth was Dennis Montgomerys latest mark. After being
introduced to him by a former Microsoft executive and then hearing
Montgomery explain his software, she agreed in 2006 to bankroll
Montgomery to launch a new company, to be called Blxware.

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page118
118of
of
150
224

Montgomery needed new government contracts for Blxware, and


Edra Blixseth had the money and contacts to try to make it happen.
31.

As libel per se, Risen asserted about Montgomery that Edra Blixseth was Dennis

Montgomerys latest mark, clearly asserting Montgomery to be a con man.


32.

The libel is false, including because Montgomery owed no stock or ownership in

BLIXWARE so as to be able to make a mark of Edra Blixseth.


33.

Fourteenth, on November 6, 2014, James Risen appeared as an interview guest

on The Daily Show with Jon Stewart, by Comedy Central, interviewed by Jon Stewart.
Exhibit A, attached. The television interview was taped at The Daily Shows studio 11th Avenue
between 51st and 52nd Street, New York (Manhattan), New York, and broadcast for the first time
nationwide across the United States of America through cable television and satellite television
on The Comedy Central channel.
34.

James Risen stated in said television interview for his statements to be broadcast

on TV that his favorite story is the story of


Dennis Montgomery who is this guy was as a computer software
expert, supposed expert. Who convinced the CIA in 2003 that he had
the super-secret technology to read Al Jazeera news broadcasts and
decipher Al Qaeda codes inside the [interrupted by Jon Stewart]
[Jon Stewart] An Enigma machine for Al Qaeda...?
[Dennis Montgomery] Right. And he convinced the CIA in 2003 that
he could read numbers and letters hidden in the Al Jazeera broadcasts
that corresponded with flights that Al Qaeda was going to shoot down,
knock--- or blow up.
President Bush was so convinced of this that they grounded flights all
over the world at Christmas 2003 based on this guy's intelligence or
supposed intelligence. It took the French intelligence service, who had
gotten very mad because they grounded flights from Paris to Los
Angeles. And they demanded that the CIA tell them where they were
getting this information. And so they finally [non-verbal

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page119
119of
of
150
224

interruption]. They finally got the information. The French told them
this is a hoax. This is a fabrication.
And as soon as the CIA agreed with them, they covered the whole thing
up, and refused to ever talk about it. And Montgomery kept getting
more contracts after that.
[Other, extended discussion with Jon Stewart on other topics]
There is lots of raw intelligence every day that says there is an attack
about to happen. You really have to be a pretty sophisticated
consumer of intelligence after several years to begin to realize what's
real and what's not really a credible threat.
35.

As libel per se, Risen asserted about Montgomery that he convinced the CIA in

2003 that he could read numbers and letters hidden in the Al Jazeera broadcasts that
corresponded with flights that Al Qaeda was going to shoot down, knock--- or blow up.
36.

As libel per se, Risen asserted about Montgomery that The French told them this

is a hoax. This is a fabrication. And as soon as the CIA agreed with them, they covered the
whole thing up, and refused to ever talk about it. And Montgomery kept getting more contracts
after that. The statement that the CIA agreed with them is Risens assertion about
Montgomerys work that this is a hoax. This is a fabrication.
37.

As libel per se, Risen asserted about Montgomery that they covered the whole

thing up, and refused to ever talk about it, as a way of saying that the CIA had been conned.
38.

Fifteenth, on October 13, 2014, James Risen gave a television interview

with

Judy Woodruff which was broadcast nationwide by the Public Broadcasting System (PBS). In
that interview, James Risen made the following statements for broadcast on television, and Judy
Woodruff repeated many points from James Risens book which Risen agreed with and
endorsed. Much of the interview involved other chapters not relevant here.

http://www.pbs.org/newshour/bb/costs-security-price-high/
8

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page120
120of
of
150
224

JUDY WOODRUFF: In the next chapter, JAMES RISEN, you write


about millions of dollars spent on programs that were completely
fraudulent. One was run by a man named Dennis Montgomery. He
was a, He was a .... I guess he had worked in computer software...
but he was a GAMBLER! 4
JAMES RISEN: Right.
JUDY WOODRUFF: And he sold the CIA and the Pentagon on
technology that turned out to be not at all what he said it was.
JAMES RISEN: It is difficult to tell in some of these cases who is
scamming who. If you talk to Montgomery, he argues that the CIA
wanted him to do what he was doing. And so its a fascinating
dynamic that's developed in the war on terror, between people who
recognize the opportunities for this gold rush and the agencies which
are... who have so much money to spend now, they're getting so much
more money than they ever had before, that in some cases they don't
know what to do with.
In this case, they began to believe, in this sort of war fever, that you
could find Al Qaeda messages hidden in Al Jazeera broadcasts. And
so that.. that program, that highly secret program, was used to ground
planes all over Europe and the United States
JUDY WOODRUFF: When actually there was nothing to it.
JAMES RISEN: Right
JUDY WOODRUFF: It was a hoax.
JAMES RISEN: Right. Right.
JUDY WOODRUFF: And then there was another part of it where he
was saying he had special facial recognition software....
JAMES RISEN: Right. Right
JUDY WOODRUFF: ... used on drones?
JAMES RISEN: Yeah. There were cases in which people said that
he was fooling the military and the CIA about his operations and
how... what kind of techniques and technologies he had. He would
argue that the CIA actually wanted him and or the army believed him
4

Emphasis, by exclamation in tone of voice, the in original conversation.


9

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page121
121of
of
150
224

and tested it. So it's this very complicated story about a man
recognizing an opportunity who had never been involved in national
security before and the CIA and the military all just hungry for
whoever could come with the latest idea.
39.

As libel per se, Risen asserted about Montgomery that you write about millions

of dollars spent on programs that were completely fraudulent. One was run by a man named
Dennis Montgomery, which Risen confirms by saying Right. (Actually where the discussion
is about the next chapter that chapter is exclusively about Dennis Montgomery alone.)
40.

As libel per se, Risen asserted about Montgomery that When actually there was

nothing to it, which Risen confirms by saying Right. And also It was a hoax, which Risen
confirms by saying Right. Right.
41.

As libel per se, Risen asserted about Montgomery that There were cases in

which people said that he was fooling the military and the CIA about his operations and how...
what kind of techniques and technologies he had.
42.

Sixteenth, on October 24, 2014, James Risen gave an audio interview with Lucy

Worsley published on the New York Times website, titled Inside The New York Times Book
Review: James Risens Pay Any Price which is accessible at that website address.

In this

interview Inside The New York Times Book Review, with Pamela Paul, October 24, 2014,
James Risen stated for national broadcast:
PAMELA PAUL: How do we count and account for the costs of the
government's war on terror. We'll talk to James Risen, author of Pay
Any Price: Greed, Power, and Endless War.

See: ArtsBeat: Book Review Podcast: James Risen's 'Pay Any Price', by John Williams,
New York Times, October 24, 2014, http://artsbeat.blogs.nytimes.com/2014/10/24/book-reviewpodcast-james-risens-pay-any-price/ , based upon Louise Richardsons book review of Risens
book.
10

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page122
122of
of
150
224

JAMES RISEN ("tease" audio clip): It seems to me that what the


war on terror had become in thirteen years was a search for cash and a
search for power and status.
PAMELA PAUL: What is the British fascination with murder?
Lucy Worsley will explain all joining us to talk with us about her new
book: The Art of the English Murder.
LUCY WORSLEY ("tease" audio clip): The public used to consume
murder in a way that you can still see the modern media doing it
today. Just look at the Pistorius trial.
PAMELA PAUL: Alexander Alter will be here with Notes from the
Publishing world. And Greg Cole has bestseller news. This is "Inside
the New York Times Book Review." I am Pamela Paul.
James Risen joins me now. His new book is Pay Any Price: Greed,
Power, and Endless War. Hi James.
JAMES RISEN: Hi, thanks for having me.
PAMELA PAUL: Thanks for being here. Now this is a book that
covers a lot of territory. Tell us briefly about what it is you set out to
write about in the book.
JAMES RISEN: What I wanted to do was, I'd written one book
before about the war on terror, and I wanted to follow up with a new
book that kind of looked at where we were 13 years after 9/11 and
how we had what started out in the immediate aftermath of 9/11 as
kind of a search for justice or a search for retribution or whatever you
want to think, say we were doing right after 9/11 as a country. It
seemed to me that what the war had become in 13 years was a search
for cash and a search for power and status and that it was becoming
an endless war in which we had a new mercenary class of people who
were taking advantage of the war on terror. And that enormous
unintended consequences had happened. And I began to hear about
just some really crazy things that were going on. And so I thought it
would make a good story.
[The discussion then covers the Chapter "Rosetta" not relevant here,
concerning a lawsuit for 9/11 families against Saudi Arabia, except
the ending]
JAMES RISEN [winds up the Chapter on "Rosetta" by saying]: ....
in the war on terror became so complicated and so difficult to tell
what was really going on, to me it was like a case study in how the

11

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page123
123of
of
150
224

war on terror had been turned for other uses, and become a....
something that you could never tell what was the truth and what was
not the truth. And that to me was at the heart of the problems with the
war on terror, that you could never tell what's real and what was
concoction today.
[The discussion then covers how Risen went about researching the
book, not relevant here]
PAMELA PAUL: Did a lot of it arise out of stories that, reporting
that you'd originally done for the Times?
JAMES RISEN: Some of it. For instance, I did a chapter The
Emperor of the War on Terror, about Dennis Montgomery who
[laughs] who's a strange character, who I'd done a story about him for
the New York Times along with Eric Lichtbau my colleague there at
the Times. He's one of the most fascinating characters in the war on
terror. He... He was a computer software expert who convinced the
CIA that he could decipher secret codes from Al Qaeda in the Al
Jazeera news broadcasts. And that he could tell the CIA numbers and
letters that corresponded with flights that Al Qaeda wanted to attack.
And the CIA took this so seriously that they grounded, that the Bush
Administration grounded a bunch of international flights in Christmas
2003 based on what this guy was telling them. And when they
realized it was a hoax, they covered the whole thing up and never did
anything about it. So I had done a story for the Times with.... about
that and then expanded on that and got a lot more information for the
book.
PAMELA PAUL: How did you find out about him?
JAMES RISEN: Well he had been written about a little bit before we
wrote about it. But I had also, even before he was written about by
other people, I had heard from people in the CIA that there was this
crazy operation that nobody wanted to talk about, that they were all
embarrassed by. To me that, it was like a case study in just how crazy
the war on terror has become. And the only thing that makes sense
about why its gotten so crazy, is I think we kind of have deregulated
national security and we took all, you know, Cheney said we're going
to take the gloves off. And that means we deregulated national
security at the same time we poured hundreds of billions of dollars
into counter-terrorism. And so its had enormous unintended
consequences from what is essentially a national security crisis that is
kind of like the banking crisis.

12

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page124
124of
of
150
224

[The interview discussion then turns to the alleged deregulation of


national security on other topics not relevant here.]
43.

As libel per se, Risen asserted about Montgomery that And when they [the CIA]

realized it was a hoax, they covered the whole thing up and never did anything about it.
44.

The libel is false, for the reasons identified above, and including that Montgomery

never purported to be an expert in intelligence but left interpretation of the data he uncovered to
intelligence experts of the U.S. Government.
45.

Seventeenth, James Risen sat for a nationwide television news interview on the

television show DEMOCRACY NOW! A Daily Independent Global News Hour, with Amy
Goodman & Juan Gonzlez, at 207 W. 25th St., Floor 11, New York, NY 10001 on October 14,
2014. On this nationwide television news broadcast, the conversation turned to:
AMY GOODMAN: Dennis Montgomery?
JAMES RISEN: Dennis Montgomery is a fascinating character,
whohe was a computer software person, self-styled expert, who
developed what he said was special technology that would allow him
to do things with computers that other people couldnt do. One of the
things that he developed was this imaging technology that he said he
could find images on broadcast network news tapes from Al Jazeera.
He said that he could read special secret al-Qaeda codes in the
banners on the broadcasts of Al Jazeera. And the CIA believed this.
And he was giving them information based on watching hours and
hours of Al Jazeera tapes, saying that "I know where the next alQaeda attack is going to be basedis going to happen." And the Bush
administration and the CIA fell for this.
AMY GOODMAN: And it was in the news zipper at the bottom of
the Al Jazeera broadcasts?
JAMES RISEN: Well, he says it was in the banner. But anyway.
And so, it was this greatif you talk to him, he argues, well, they
thats what they were looking for. You know, they convinced him to
look for this. You know, it depends on who you talk to. But it was one
of the great hoaxes of the war on terror, where they actually grounded
planes in Europe, the Bush administration, based on information they

13

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page125
125of
of
150
224

were getting from Dennis Montgomerys so-called decryption of Al


Jazeera broadcasts.
And then theres a whole number of other things, like Alarbus, which
was this covert program at the Pentagon where a Palestinian involved
in that was actually trying to use the bank account set up by the secret
program, Pentagon program, to launder hundreds of millions of
dollars. And the FBI investigated this, but then tried to keep the whole
thing quiet.
AMY GOODMAN: How much did the U.S. government give to
Dennis Montgomery?
JAMES RISEN: Millions of dollars. And then he usedhe was a
heavy gambler and eventually, I think, had a lot of financial problems
as a result of that. So, its a strangeto me, the Dennis Montgomery
story is one of the strangest, because what it shows is, early on in the
war on terror, as I said, the CIA and all these other agencies had so
much money to spend on counterterrorism that they were willing to
throw it at everything. They were so afraid of the next terrorist attack
that they were willing to believe anybody who came up with some
idea. And I called that chapter about Montgomery, you know, "The
Emperor of the War on Terror," because nobody wanted to say that
the emperor had no clothes.
AMY GOODMAN: I mean, it had very real effects, aside from
spending all that money.
JAMES RISEN: Yeah.
AMY GOODMAN: For example, planes being sent back.
JAMES RISEN: Yes, yes. There were planes grounded. International
flights between the United States and Europe and Mexico were
grounded. There was talk at the White House even of shooting down
planes based on this information.
AMY GOODMAN: Because they could be used, as with September
11th, as weapons?
JAMES RISEN: Yeah, as missiles or whatever. And so, it was crazy.
It was absolutely insane.
AMY GOODMAN: And it was only the French government who
then did a study?

14

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page126
126of
of
150
224

JAMES RISEN: Yes, yes. Yeah, the French government finally


you know, the U.S.the CIA and the Bush administration didnt
want to tell anybody what was really happening, where they were
getting this information. You know, "This supersecret information
about Al Jazeera, we cant tell you." And finally, the French
intelligence service and the French government said, "You know,
youre grounding our planes. Youve got to tell us where youre
getting this information." And they gotthey finally shared the
information with them, and the French got a French tech firm to look
at this, and they said, "This is nuts. This is fabrication." And after a
while, the CIA was finally convinced maybe the French were right,
and they stopped talking about it. They didnt do anything else. They
just like shut it down eventually, but never wanted to talk about what
had really happened.
AMY GOODMAN: Then Dennis Montgomery, revealed as a con
man
JAMES RISEN: Yeah, yeah.
AMY GOODMAN: in jail for that?
JAMES RISEN: Well, no, hes not in jail. But it was ahe actually
got more contracts after that, with the Pentagon and other agencies.
And he continued to operate for a long time. You know, he kind of
went from one agency to the other.
AMY GOODMAN: Were talking to James Risen, Pulitzer Prizewinning investigative journalist for The New York Times. His new
book, just out today, Pay Any Price: Greed, Power, and Endless War.
When we come back, war corrupts, endless war corrupts absolutely.
Stay with us.
[break]
46.

As libel per se, Risen asserted about Montgomery that But it was one of the great

hoaxes of the war on terror, where they actually grounded planes in Europe, the Bush
administration, based on information they were getting from Dennis Montgomerys so-called
decryption of Al Jazeera broadcasts.
47.

As libel per se, Risen asserted about Montgomery when asked How much did

the U.S. government give to Dennis Montgomery? Risen answered in reply: Millions of

15

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page127
127of
of
150
224

dollars. And then he usedhe was a heavy gambler and eventually, I think, had a lot of financial
problems as a result of that.
48.

As libel per se, Risen asserted about Montgomery that the French got a French

tech firm to look at this, and they said, This is nuts. This is fabrication.
49.

As libel per se, Risen asserted about Montgomery when asked Then Dennis

Montgomery, revealed as a con man Risen confirmed in reply: Yeah, yeah.


50.

As libel per se, Risen asserted about Montgomery that he should be in jail.

51.

Eighteenth, James Risen gave an interview with Conversations with Great

Minds of The Big Picture RT with talk show host Thom Hartmann on October 24, 2014.
THOM HARTMAN: ... [Abrupt change of topic starting at about
time 5:27] ... There's just this enormous amount of government
money. Let's throw it at the private sector. They'll make things well.
One of the members of the private sector who came forward and said
I've got a secret, I can figure this stuff out, was a guy by the name of
Dennis Montgomery.
JAMES RISEN: Right. Uh, Dennis Montgomery is one of the best
stories in the war on terror. I think somebody should make a movie
about him. Dennis Montgomery was a computer software expert who
said that he had developed technology that basically could find objects
hidden in the video on television. And so he convinced, through a
whole series of contacts and meetings that I detail in the book, he was
able to get to the CIA and convince the CIA that he had the technology
to decipher Al Qaeda codes that were he said were hidden in Al Jazeera
news broadcasts.
THOM HARTMAN: They were hidden in the Chiron or the -JAMES RISEN: In the banner. In the banner, actually. He said that
he could find numbers and letters that were constantly showing up, or
not showing up but were being hidden, embedded deeply in the video.
And he would then give these numbers and letters to the CIA. And the
CIA, either he told them or they convinced themselves that these
numbers and letters corresponded to flights, international airline flights,
that Al Qaeda was going to attack. And so in December, in Christmas
6

https://www.youtube.com/watch?v=jc_8f4Pp9Zc
16

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page128
128of
of
150
224

2003, the Bush Administration and the CIA took this so seriously that
they actually grounded a whole series of international flights coming
into and out of the United States, and the White House even considered
shooting down some of these flights over the Atlantic.
THOM HARTMAN: Whoa.
JAMES RISEN: And once the CIA later was convinced by French
intelligence that this was all a fabrication and that this kind of
technology didn't exist and that these supposed Al Qaeda codes weren't
really in the Al Jazeera newscasts, the CIA covered the whole thing up
and never went public with it and just tried to act like it never
happened.
THOM HARTMAN: Well we know how aggressively this and
particularly the Obama Administration right now has gone after
whistleblowers and reporters. You would think they would also go
after people who had scammed the CIA. If one of us walked in off the
street and said to the CIA, hey have I got a deal for you, and it was just
a total lie, and they gave us millions of dollars, which they gave to
Dennis Montgomery, you'd think he would end up in prison.
JAMES RISEN: Well, no, he ended up getting more contracts from
the military... and the Pentagon. And he was continuing, he continued
to operate for several years. It's really a remarkable story.
THOM HARTMAN: Yeah, it really and truly is.
[Topic changes abruptly to discussions of torture in the war on terror]
52.

As libel per se, Risen asserted about Montgomery that the CIA later was

convinced by French intelligence that this was all a fabrication and that this kind of technology
didn't exist.
53.

As libel per se, Risen asserted about Montgomery that he belongs in prison,

responding to the question You would think they would also go after people who had scammed
the CIA. If one of us walked in off the street and said to the CIA, hey have I got a deal for you,
and it was just a total lie, and they gave us millions of dollars, which they gave to Dennis
Montgomery, you'd think he would end up in prison, by Risen answering in reply: Well, no,

17

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page129
129of
of
150
224

he ended up getting more contracts from the military... and the Pentagon. And he was
continuing, he continued to operate for several years. It's really a remarkable story.

GENERAL DEFAMATION
54.

In addition, Risen also made additional defamatory statements that are explicit

defamation under Florida law.


55.

Nineteenth, on Page 49 of the Book, Risen writes:


Trepp was furious. According to court documents, he told the FBI
that Montgomery had stolen the software eTreppid had used on secret
Pentagon contracts. As federal investigators moved in to investigate
the alleged theft of the technology, they heard from Trepp and others
that Montgomerys alleged technology wasnt real.

56.

As explicit libel, Risen asserted about Montgomery that Montgomery had stolen

valuable software yet also asserted that the software wasnt real.
DEFAMATION BY IMPLICATION UNDER FLORIDA LAW
Analogous to False Light
57.

For defamation by implication: . . . [L]iterally true statements can be defamatory

where they create a false impression. This variation is known as defamation by implication and
has a longstanding history in defamation law. See Jews for Jesus, Inc. v. Rapp, 997 So.2d 1098,
1106 (Fla. 2008). Defamation by implication occurs when a publication states facts that are
literally true, but produces a defamatory meaning apparent from a plain reading of the
publication in its entirety. See Chapin v. Knight-Ridder, Inc. 993 F.3d 1087 (4th Cir. 1993).
58.

Montgomery thus claims here that if the Court finds that any of the statements

labeled First through Nineteenth do not qualify as defamation per se or general defamation,

18

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page130
130of
of
150
224

then in the alternative Montgomery claims here that any and all such statements not qualifying as
defamation per se or general defamation are defamation by implication against Montgomery.
59.

Across the many examples of libelous statements from the Book or slanderous

interviews, Risen implies that Montgomery deceived the U.S. Government as to the meaning,
purpose, or interpretation of hidden data and clues that Montgomery uncovered, implying that
Montgomery defrauded and conned the U.S. Government.
60.

In fact, Montgomery refused to speculate as to the interpretation or meaning of

the data and analyses he uncovered, even when pressed to state what he thought the data might
mean, but Montgomery left the role of interpretation to U.S. Government intelligence experts.
61.

Thus, throughout the statements presented herein, Risen libels and slanders

Montgomery by implication that Montgomery defrauded and scammed the U.S. Government
concerning the meaning of the information Montgomery uncovered, implying that Montgomery
obtained millions of dollars by frightening and fooling child-like and gullible CIA officials.
62.

Across the many examples of libelous statements from the Book or slanderous

interviews, Risen implies that President George W. Bushs alleged decisions to ground and
almost shoot down passenger aircraft around Christmas 2003 (which Risen would have no way
of knowing about) were a result of Montgomerys fraud and scams, deceptively manipulating the
President of the United States and the U.S. national command authority.
63.

Across the many examples of libelous statements from the Book or slanderous

interviews, Risen implies that Montgomery should be in jail.


64.

Among the other statements, in particular, the First example of libel, on Page 32

of the Book, states that:


Consider the example of Dennis Montgomery. He provides a perfect
case study to explain how during the war on terror greed and ambition

19

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page131
131of
of
150
224

have been married to unlimited rivers of cash to create a climate in


which someone who has been accused of being a con artist was able to
create a rogue intelligence operation with little or no adult supervision.
Crazy became the new normal in the war on terror, and the original
objectives of the war got lost in the process.
65.

Thus, as libel by implication, Risen implies that Montgomery committed fraud

and went to any lengths motivated by greed, to obtain money at any cost.
66.

Among the other statements, in particular, in the Eleventh example of libel, on

Page 46 of the Book, states that:


The CIA never investigated the apparent hoax nor examined how it
had been handled inside the agency.
67.

Here, as libel by implication, even if it is true that The CIA never investigated

what Risen describes as an apparent hoax, the implication is that Montgomery perpetrated a
hoax upon the CIA, and in return for money, which would be both a fraud and a crime.
68.

Similarly, in the Sixteenth example of slander from an interview, Risen states that

It seemed to me that what the war had become in 13 years was a search for cash and a search
for power and status and that it was becoming an endless war in which we had a new mercenary
class of people who were taking advantage of the war on terror, implying that Montgomerys
work is fraudulent in being merely an effort to get cash.
69.

Among the other statements, in particular, the Nineteenth example of libel, on

Page 49 of the Book, states that:


Trepp was furious. According to court documents, he told the FBI
that Montgomery had stolen the software eTreppid had used on secret
Pentagon contracts. As federal investigators moved in to investigate
the alleged theft of the technology, they heard from Trepp and others
that Montgomerys alleged technology wasnt real.
70.

As libel by implication, Risen implies that Montgomery stole valuable software

yet at the same time the software was in fact worthless.

20

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page132
132of
of
150
224

71.

In addition, Risen also made additional defamatory statements that are defamation

by implication under Florida law.


72.

Twentieth, on the Preface Page of the Book, Risen writes:


Ive come back, he repeated. I was the King of Kafiristan me
and Dravot crowned Kings we was! In this office we settled it
you setting there and giving us the books. I am Peachey Peachey
Taliaferro Carnehan and youve been setting here ever since
Oh, Lord!
I was more than a little astonished and expressed my feelings
accordingly.
Its true, said Carnehan, with a dry cackle, nursing his fee, which
were wrapped in rags. True as gospel. Kings we were, with
crowns upon our head me and Dravot poor Dan oh, poor,
poor Dan, that would never take advice, not though I begged of
him!
-- Rudyard Kipling, The Man Who Would be King.

73. As libel by implication, Risen implies that Montgomery (along with others addressed
in the book) is a fraud and/or con man as in The Man Who Would be King.
74. Twenty-first, in the Prologue on Page xiv of the Book, Risen writes:
The new homeland security-industrial complex operates differently.
It is largely made up of a web of intelligence agencies and their
contractors, companies that mostly provide secret services rather than
large weapons systems and equipment. These contractors are hired to
help Washington determine the scale and scope of the terrorist threat;
they make no money if they determine that the threat is overblown or,
God forbid, if the war on terror ever comes to an end.
75.

As libel by implication, Risen states they make no money if they determine that

the threat is overblown or, God forbid, if the war on terror ever comes to an end, suggesting that
Montgomerys and eTreppids profits were contingent upon results, and false results at that.
76.

Twenty-second, in the Prologue on Page xv of the Book, Risen writes:

21

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page133
133of
of
150
224

Thus, the creation of a homeland security complex at a time


of endless war has bequeathed us with the central narrative of the war
on terror modern tales of greed joined hand in hand with stories of
abuse of power. It was inevitable that those wise in the ways of the
world would flock to Washington to try to cash in on the war on terror
gold rush and they have. This book offers just a few of those
stories. But those trying to monetize Americas obsession with
terrorism are not the only ones who have sought to exploit 9/11.
Opportunism comes in many forms and is driven by more
than just greed. Ambition and a hunger for power, status, and glory
have become great engines of post-9/11 opportunism as well. The
more troubling stories here concern abuses of power that have
extended across two presidencies for well over a decade. After 9/11,
the United States deregulated national security, stripping away the
post-Watergate intelligence reforms of the 1970s that had
constrained executive power for thirty years. The results are morally
challenging and continue to this day.
77.

Thus, as libel by implication, Risen implies that Montgomery committed fraud

and went to any lengths motivated by greed, to obtain money at any cost.
78.

Twenty-third, in the Prologue on Page xvii of the Book, Risen writes:


Washingtons global war on terror is now in its second decade,
thanks to the bipartisan veneer it has gained under Bush and Obama.
It shows no signs of slowing down, hustlers and freebooters continue
to take full advantage, and the wars unintended consequences
continue to pile up. All too often, things are not what they seem.

79.

As libel by implication, Risen implies that Montgomery one of the key objects

of the Book is a hustler and a freebooter.


80.

Twenty-fourth, Part 1 of the Book, including Chapter 2 which is focused entirely

on Dennis Montgomery, Risen have labeled Part 1: Greed


81.

Thus, by placing the chapter focused on Dennis Montgomery under a label for the

section of the Book of Greed, Risen libels Montgomery by implication as being motivated by
greed to commit fraud and carry out the alleged hoaxes identified in the rest of the Chapter 2.

22

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page134
134of
of
150
224

82.

Twenty-fifth, Risen have labeled Chapter 2 of the Book which is focused entirely

on Dennis Montgomery: Chapter 2: The Emperor of the War on Terror.


83.

By naming the chapter focused on Dennis Montgomery The Emperor of the War

on Terror, Risen libels Montgomery by implication as being the mastermind of the fraud that
Risen seeks to portray the war on terror to be.
84.

Twenty-Sixth, on Page 40 of the Book, Risen writes:


The CIAs Science and Technology Directorate, which had
largely been stuck on the sidelines of the war on terror, saw in
Dennis Montgomery an opportunity to get in the game. The
directorate had played an important role in the Cold War, but in the
first few years of the war on terror, it was struggling to determine
how technology could be leveraged against groups of terrorists
who were trying to stay off the grid.

85. As libel by implication, again, Risen blames Montgomery for the decisions of
government officials.
86. Twenty-Seventh, on Page 42 of the Book, Risen writes:
Montgomery was telling the CIA exactly what it wanted to hear. At
the time, the Bush Administration was obsessed with Al Jazeera, not
only because of the networks unrelenting criticism of the invasion of
Iraq, but also because it had become Osama Bin Ladens favorite
outlet for broadcasting his videotaped messages to the world.
87. As libel by implication, Risen implies that Montgomery defrauded and conned the CIA
by telling the CIA exactly what it wanted to hear.
88. Twenty-Eighth, on Page 42 of the Book, Risen writes:
What remains unclear is how Montgomery was able to convince all
of them that he had developed secret software that could decode Al
Qaedas invisible messages. While he had gotten by a few credulous
military officers who came to view his demonstrations, he apparently
found it just as easy to persuade the CIA as well.

23

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page135
135of
of
150
224

89. As libel by implication, Risen implies that Montgomery conned the U.S. Government
with a hoax. It would of course be entirely clear how Montgomery was able to convince all of
them if Montgomerys work and technology are legitimate.
90. Twenty-Ninth, on Page 46 of the Book, Risen writes:
Finally the French brought an end to it. Since Air France flights
to the United States were among those that had been grounded,
French officials had taken a dim view of the entire episode. They
began demanding answers from the Americans. The French
applied so much pressure on Washington that the CIA was finally
forced to reveal to French intelligence the source of the threat
information. Once they heard the story of Dennis Montgomery and
eTreppid, French officials arranged for a French high-tech firm to
reverse-engineer Montgomerys purported technology. The
French wanted to see for themselves whether the claims of hidden
messages in Al Jazeera broadcasts made any sense.
91. As libel by implication, if not explicit, the passage implies that Montgomery is a fraud
and that his work is a scam and a hoax.
92. Thirtieth, on Page 52 of the Book, Risen writes:
Montgomery continued to get defense contracts even during the
Obama administration. In 2009, Montgomery was awarded another
air force contract, and later claimed that he had provided the
government with warning of a threatened Somali terrorist attack
against President Obamas inauguration. Joseph Liberatore, an air
force official who described himself as one of the believers in
Montgomery and said he had heard from various federal agencies
thanking us for the support Montgomery and his company provided
during Obamas inauguration. The threat, however, later proved to be
a hoax.
93. As libel by implication, Risen implies that Montgomerys ability to continue to receive
contracts is due to Montgomerys ability to defraud the government (and stupidity of government
officials) rather than an endorsement of the legitimacy of Montgomerys work.
94. Thirty-First, on Page 31 of the Book, Risen writes:

24

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page136
136of
of
150
224

and a new breed of entrepreneur learned that one of the surest and
easiest paths to riches could be found not in Silicon Valley building
computers or New York designing clothes but rather in Tysons
Corner, Virginia, coming up with new ways to predict, analyze, and
prevent terrorist attacks or, short of that, at least in convincing a
few government bureaucrats that you had some magic formula for
doing so.
95. As libel by implication, Risen implies that Montgomery engaged in fraud to convince a
few government bureaucrats that he had a magic formula as an easy path to riches.
96. Thirty-Second, on Page 33 of the Book, Risen writes:
Montgomerys story demonstrates how hundreds of billions of
dollars poured into the war on terror went to waste. With all rules
discarded and no one watching the bottom line, government officials
simply threw money at contractors who claimed to offer an edge
against the new enemies. And the officials almost never checked back
to make sure that what they were buying from contractors actually did
any good or that the contractors themselves werent crooks. A 2011
study by the Pentagon found that during the ten years after 9/ 11, the
Defense Department had given more than $ 400 billion to contractors
who had previously been sanctioned in cases involving $ 1 million or
more in fraud.
97. As libel by implication, Risen implies that the money provided to Montgomery (among
others) went to waste.
98. Thirty-Third, on Page 33 of the Book, Risen writes:
The Montgomery episode teaches one other lesson, too: the chance
to gain promotions and greater bureaucratic power through access to
and control over secret information can mean that there is no
incentive for government officials to question the validity of that
secret information. Being part of a charmed inner circle holds a
seductive power that is difficult to resist.
99. As libel by implication, Risen implies that Montgomerys work was fraudulent.
100.

Thirty-Fourth, on Page 33 of the Book, Risen writes:


How his technology worked was a secret. Dennis Montgomerys
computer code became the great treasure behind eTreppid
Technologies, the company he and Trepp founded. Later, many of

25

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page137
137of
of
150
224

those around Montgomery began to suspect the reason why


Montgomery had to guard his technological innovations so
carefully. They came to believe that at least some of the
technology didnt really exist.
101.

As libel by implication, Risen implies that Montgomery committed fraud.

102.

Thirty-Fifth, on Page 35 of the Book, Risen writes:


Montgomery was on the lookout for somebody to bankroll him,
and had put out the word to his friends at the casinos that he
frequented the most. A year later, Montgomery and Trepp were in
business together. Trepp was one of the first, but hardly the last, to
be beguiled by Montgomerys claims that he had achieved
breakthroughs in computer technology of historic significance.

103.

As libel by implication, Risen implies that Montgomery beguiled Warren Trepp

by committing fraud.
104.

Thirty-Sixth, on Page 39 of the Book, Risen writes:


For a few months in late 2003, the technology from Dennis
Montgomery and eTreppid so enraptured certain key government
officials that it was considered the most important and most sensitive
counterterrorism intelligence that the Central Intelligence Agency had
to offer President Bush. Senior officials at the CIAs Directorate of
Science and Technology began to accept and vouch for Montgomery
to officials at the highest levels of the government. Montgomerys
claims grew ever more expansive, but that only solidified his position
inside the national security arena. His technology became too
impossible to disbelieve.

105.

As libel by implication, Risen imply that Montgomery committed fraud and is a

con man.
106.

Thirty-Seventh, on Page 40 of the Book, Risen writes:


Montgomery persuaded the spy agency that his special computer
technology could detect hidden bar codes broadcast on Al Jazeera,
which had been embedded into the video feed by al Qaeda. Allegedly,
al Qaeda was using that secret method to send messages to its terrorist
operatives around the world about plans for new attacks. Montgomery
convinced the CIA that his technology had uncovered a series of

26

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page138
138of
of
150
224

hidden letters and numbers that appeared to be coded messages about


specific airline flights that the terrorists were targeting.
107.

As libel by implication, Risen imply that Montgomery convinced the CIA of

claims that are not (were not) true.


108.

Thirty-Eighth, on Page 42 of the Book, Risen writes:


Based on Montgomerys information, President Bush ordered the
grounding of a series of international flights scheduled to fly into the
United States. This step caused disruptions for thousands of
travelers.

109.

As libel by implication, Risen imply that Montgomery convinced President Bush

and the national command authority of conclusions drawn from Montgomerys work.
110.

Thirty-Ninth, on Page 42 of the Book, Risen writes:


One former senior CIA official recalled attending a White House
meeting in the week following Christmas to discuss what to do next
about the information coming from Montgomery. The official claims that
there was a brief but serious discussion about whether to shoot down
commercial airliners over the Atlantic based on the intelligence.

111.

As libel by implication, Risen imply that Montgomery convinced President Bush

and the national command authority of conclusions drawn from Montgomerys work.
112.

Fortieth, on Page 47 of the Book, Risen writes:


Even more stunning, after the debacle over the bogus Christmas
2003 terrorist threats, Montgomery kept getting classified government
contracts awarded through several different corporate entities.
Montgomerys problems with the CIA did not stop him from peddling
variations of his technology to one government agency after another.
The secrecy that surrounded his work once again worked in his favor.
CIA officials were reluctant to tell their Pentagon counterparts much
about their experiences with Montgomery, so Defense Department
officials apparently did not realize that his technology was considered
suspect at CIA headquarters.

27

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page139
139of
of
150
224

113.

As libel by implication, Risen implies that Montgomery continued to defraud,

con, and scam the government, rather than concluding that the U.S. Government recognized the
legitimacy of Montgomerys work.
114.

Forty-First, on Page 48 of the Book, Risen writes:


He successfully infused a sense of mystery around himself. He was
like the Wizard of Oz, but now people were beginning to try to
examine the man behind the curtain.

115.

As libel by implication, Risen implies that the Montgomery engaged in fraud and

a hoax by keeping details mysterious.


116.

Forty-Second, on Page 48 of the Book, Risen writes:


The technology didnt meet the requirements for us, said a Special
Operations Command spokesman drily. Still, there is no evidence that
officials at Special Operations Command ever talked with their
counterparts at the CIA to check up on Montgomery before awarding
him a contract. Special Operations Command paid a total of $ 9.6
million to eTreppid under its contract with the firm.

117.

As libel by implication, Risen imply that Montgomery again repeated his fraud

and hoax against a new government agency.


118.

Forty-Third, on Page 54 of the Book, in the Chapter The New Oligarchs,

Risen writes:
CHAPTER 3: The New Oligarchs
Page 54: Dennis Montgomery is, of course, an extreme example of
the new kind of counterterrorism entrepreneur who prospered in the
shadows of 9/11. But he was hardly alone in recognizing the lucrative
business opportunities that the war on terror has presented. In fact, as
trillions of dollars have poured into the nations new homeland
security-industrial complex, the corporate leaders at its vanguard can
rightly be considered the true winners of the war on terror.
119.

As libel by implication, Risen implies that Montgomery engaged in fraud and a

hoax motivated by greed.

28

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page140
140of
of
150
224

Exhibit 16

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page141
141of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page142
142of
of
150
224

Exhibit 17

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page143
143of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page144
144of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page145
145of
of
150
224

Exhibit 18

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page146
146of
of
150
224

SOCOM & CIA


Visit 03/20/12
Location:
75180 Mediterranean
Palm Desert, CA 92211

Chris Pipes SOCOM

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page147
147of
of
150
224

Exhibit 19

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page148
148of
of
150
224

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page149
149of
of
150
224

H92222-04-D-0006
Task Order 0001
Page 2 of 2
Continuation Sheet
1. CONTRACT LINE ITEMS:
ITEM NO
0001AA

SUPPLIES/SERVICES

MAX QUANTITY
1
Falconview (PFPS) Maps - Compression
FFP
1 Each = 1 CPU that this software is installed on.

UNIT
Each

UNIT PRICE
$25,000.00

Each

$40.00

Each

$25,000.00

Each

$10.00

Each

$50,000.00

Each

$25.00

Each

$125,000.00

MAX AMOUNT
$25,000.00

FOB: Destination
0001AB

1
Falconview (PFPS) Maps - Plug-in Decoder
FFP
1 Each = 1 CPU that this software is installed on.

$40.00

FOB: Destination
0001AC

1
Still Image Compression
FFP
1 Each = 1 CPU that this software is installed on.

$25,000.00

FOB: Destination
0001AD

1
Still Image Decoder
FFP
1 Each = 1 CPU that this software is installed on.

$10.00

FOB: Destination
0001AE

1
Video Imagery w/ Audio - Compression
FFP
1 Each = 1 CPU that this software is installed on.

$50,000.00

FOB: Destination
0001AF

1
Video Imagery w/ Audio - Decoder
FFP
1 Each = 1 CPU that this software is installed on.

$25.00

FOB: Destination
0001AN

1
Generic Data Compression
FFP
1 Each = 1 CPU that this software is installed on.
FOB: Destination

$125,000.00

Case
Case1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document133-2
40-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket04/27/2015
09/10/2015 Page
Page150
150of
of
150
224

0001AP

1
Generic Data Decompressor
FFP
1 Each = 1 CPU that this software is installed on.

Each

$50.00

Each

$100,000.00

$50.00

FOB: Destination
0001AQ

1
Detection of Human and Non-Human Objects
FFP
1 Each = 1 CPU that this software is installed on.

$100,000.00

FOB: Destination

2. GOVERNMENT FURNISHED PROPERTY.


a) The Government will furnish one laptop computer to:
eTreppid Technologies
755 Trademark Dr
Reno NV 89521.
b) Upon receipt of the Government-furnished laptop, the Contractor shall load the software ordered on the
task order and return the laptop to:
HQ USSOCOM
ATTN: SOAL-SP (Brad Mohr)
7701 Tampa Point Blvd
MacDill AFB, FL 33621.
3. DELIVERY TIMEFRAME. The contract shall have 14 days from the receipt of the Government-furnished
laptop to load the software and return the laptop to the Government. If the 14th day falls on a weekend or
federal holiday, the due date shall automatically extend to the next business day.
//nothing follows//

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page2151
of 75
of
224

IN THE UNITED STATES DISTRICT COURT


FOR THE SOUTHERN DISTRICT OF FLORIDA
DENNIS L. MONTGOMERY
Plaintiff,
v.
HOUGHTON MIFFLIN HARCOURT
PUBLISHING COMPANY
and

Civil Action No. 1:15-cv-20782-JEM

HMH HOLDINGS, INC.


and
JAMES RISEN, an individual, Author
Defendants.
SECOND DECLARATION OF PLAINTIFF DENNIS MONTGOMERY IN SUPPORT
OF PLAINTIFFS OPPOSITION TO DEFENDANTS MOTION CHALLENGING
FLORIDA JURISDICTION AND VENUE
Pursuant to 28 U.S.C. 1746, I, Dennis Montgomery, hereby declare under penalty of perjury
that the following is true and correct:
1) I am over the age of 18 years old and mentally and legally competent to make this
affidavit sworn under oath1, despite having suffered a brain aneurism and serious
related health issues. See Exhibits 1, 2, and 3, attached to this affidavit.
2) Reporter James Risen of The New York Times, publisher Houghton Mifflin Harcourt
Publishing Company, and HMH Holdings, Inc., published a book Pay Any Price:
Greed, Power and Endless War in October 2014 (hereinafter the Book). See
1

My prior declaration is attached and incorporated substantially into the Amended


Complaint. The prior declaration should be read in conjunction with this Second Declaration.

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page3152
of 75
of
224

Amended Complaint 14-15, 30.


3) In Chapter 2 of the Defendants Book, James Risen, Houghton Mifflin Harcourt
Publishing Company, and HMH Holdings, Inc. lie about me and libel and slander me
maliciously and extensively.
4) Chapter 2 involves me, and James Risen focuses almost exclusively on defaming me
alone to sell copies of the Book in marketing interviews. Having read the Book, I
find that I am used by Risen as the centerpiece, that is the Defendants defamatory
punching boy, to sell books. Risen conspicuously and intentionally downplays the
many other events and incidents in the Book and focuses almost exclusively on
defaming me when promoting his Book for sales in Florida and elsewhere. See
Amended Complaint 41-42.
5) Whereas, the Defendants, especially Houghton Mifflin Harcourt Publishing
Company, have great resources and no doubt have errors and omissions insurance
to finance their legal defense, I have no money or resources at all. I lost my house in
foreclosure. The Defendants will be more than able to afford to litigate the claim in
Florida, particularly since two mega-law firms represent them.
6) My finances, employment, career and business opportunities have been severely
devastated and destroyed by the knowingly, and at a minimum recklessly, false and
misleading statements made by the Defendants, contributing to the loss of my
previous house in foreclosure and driving me into poverty just at the time I have also
been diagnosed with serious medical problems.
7) The Defendants knowingly and at a minimum recklessly published defamatory and
false and misleading statements which are not opinion or hyperbole and are not fair

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page4153
of 75
of
224

reporting of their sources or public records. The Defendants have not engaged in fair
reporting, but published extremely lopsided and unbalanced, falsified and defamatory
statements in which they knowingly and/or recklessly distorted and falsified the
information available to them. Importantly. the defamation is specifically false and
misleading in factually verifiable terms, including in that:
8) Defendants published defamatory material and statements from alleged confidential
U.S. Government sources in the intelligence and military communities. The false and
misleading statements obviously did not result from fair reporting of previously
published material, as they falsely and conveniently claim in their motions to dismiss
and related pleadings. They admit that on page ix of the Book by stating: Many
people have criticized the use of anonymous sources. Yet all reporters know that
the very best stories the most important, the most sensitive rely on them. This
book would not be possible without the cooperation of many current and former
government officials and other individuals who were willing to discuss sensitive
matters only on the condition of anonymity. See Amended Complaint 59-64.
Already, counsel for Defendants have misled this Court and stated on the record that I
am not a registered voter in Florida. Incredibly, this false statement was made under
oath by defense counsel Laura Handman of a large District of Columbia national law
firm that had the resources to check this out with Miami-Dade County Elections
Miami-Dade Portal.
Therefore, Risens Book is not a fair report of prior reports or public information.
Indeed, quite the contrary. It is a big selling point of Defendants Book that it
publishes new information that had never been accessible or published before,

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page5154
of 75
of
224

specifically revealing inside information, however falsified, from U.S. Government


sources. That appeal of revealing inside information previously unknown from U.S.
Government sources is exactly why the Book is a bestseller in Florida and elsewhere,
particularly given that Florida is at the center of U.S. counterterrorism military and
intelligence operations, as I testify to below.
9) Defendants are simply flat-out lying concerning what many of their sources in the
U.S. Government tell them. As presented in my affidavit to then U.S. District Judge
Brian Sandoval (now Governor of Nevada) on October 30, 2006, attached as Exhibit
4, especially on pages 11 to 15, the U.S. Government always independently tested
and verified my results, including that my software and technology frequently
predicted ahead-of-time terrorist attacks that did in fact later occur at the place and on
the date my data predicted. For example, as I stated in October 2006 in the affidavit
on pages 14-15, In early 2005, the Air Force contracted with an independent
consulting contractor who verified that there was, in fact, embedded patterns inside
the Al Jazeera signals, but that the consultant was unable to decode the encryptions.
Exhibit 4. The U.S. Government independently tested and confirmed my work. Realworld events accurately predicted by my software and technology ahead of time
confirmed my work. Therefore, based on all of my personal interaction with U.S.
Government officials and personnel who have any knowledge of my work, Defendant
Risen is knowingly and intentionally lying about, twisting, and distorting what his
claimed sources say about me and my work. See Amended Complaint 48-49.
10) The substance of the Defendants defamation is to blame me as a private citizen for
the actions and failures of U.S. Government officials. Defendants could not

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page6155
of 75
of
224

reasonably trust any sources of negative information about me from sources that
Defendants know are shifting the blame for their own actions to me as a scapegoat.
See Amended Complaint 50-51; 80-81.
11) Defendants defamed me with knowledge of their false statements or at a minimum a
reckless disregard to the truth and biased reporting because the Defendants actually
know that Warren Trepp has never been required to pay back any of the $30 million
that eTreppid received from the U.S. Government nor offered to pay any of it back
nor has the U.S. Government asked for any of the money back.
12) James Risen and the other Defendants actually know that their defamation of me is
false and misleading. If eTreppid received $30 million from the U.S. Government for
the use of my software and technology that was a fraud or a hoax, eTreppid would
have had to pay the money back to the U.S. Government. See Amended Complaint
106, 130.
13) Risen and the other Defendants know that if Trepp actually believed that eTreppid
had received $30 million as payment for my work that was fraudulent, a con, or a
hoax, Trepps lawyers would be offering to return the $30 million and to cut a deal to
keep Trepp out of jail.
14) Risen and the other Defendants know that my software and technology actually works
from their alleged sources if they are genuine and is valuable, which is why
eTreppid has not been required to pay any of the $30 million back. See Amended
Complaint 146, 151.
15) Defendants defamed me with knowledge of their falsity or at a minimum a reckless
indifference to the truth and biased and dishonest reporting because they knew that

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page7156
of 75
of
224

Warren Trepp controlled the company eTreppid and kept the money, yet accuse me
defrauding and conning the U.S. Government.
16) Defendants defamed me with knowledge of their false, published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting because they knew that Trepp negotiated with the U.S. Government and
entered into the contracts, yet they accuse me of defrauding and conning the U.S.
Government. See Amended Complaint 12, 46.
17) Defendants defamed me with knowledge of their false published statements or at a
minimum a reckless indifference to the truth and biased and dishonest reporting by
claiming that I fabricated intelligence to make money. In fact, eTreppid was paid for
software work and analysis to fulfill the CIAs concerns, not paid contingent upon
results or conditional upon finding any terrorist threats. Defendants had no reason to
recklessly presume that eTreppid made money contingent upon results. See Amended
Complaint 192.
18) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting because my software and technology did work, does work, and is still being
used today successfully by the U.S. Government.2 See Amended Complaint 99.
19) In fact, the Defendants ignore and intentionally omit my ten (10) patent applications,
which attest to and show my expertise. See Amended Complaint 62.
20) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest

Obviously, software goes through various versions of improvements.


6

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page8157
of 75
of
224

reporting because the U.S. Government independently tested and verified the results
of my software and technology. The U.S. Government did not rely upon my word
alone. See Amended Complaint 135.
21) The data detected by my software and technology did predict in advance actual
terrorist incidents and/or meetings, confirming that my work was legitimate. See
Amended Complaint 206.
22) Defendants defamed me with knowledge of their false, published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting by simply assuming without any reason that the U.S. Government did not
independently confirm the results of my work. See Amended Complaint 48.
23) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting by manufacturing, without any reason, that I could fake results without me
believing that the CIA, Defense Intelligence Agency (DIA), NSA, and/or U.S.
military would check if my data accurately predicted events in the real world. The
Defendants story presupposes that I could know that no one would check the validity
of my work. Id.
24) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting because I and the companies I worked with had equal or better opportunities
to provide my services to private sector companies, and had no need to work for the
U.S. Government to make the same amount of money or more. Defendants had no
reason to publish false statements, with knowledge or at a minimum recklessly, that

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 133-2
63-1 Entered
Enteredon
onFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page9158
of 75
of
224

the U.S. Government contracts were any more profitable than my other, private sector
opportunities. Defendants purposefully and falsely publish that my work for the U.S.
Government was more profitable than my other options. See Amended Complaint
46.
25) Defendants defamed me with reckless indifference to the truth and biased and
dishonest reporting by claiming that I persuaded the President, George W. Bush, to
ban international passenger aircraft from entering U.S. airspace and nearly shoot
down passenger aircraft rather than the President of the United States making his own
decisions. The Defendants could not rationally believe that an unknown private
civilian caused the President of the United States to ground international flights.
Such decisions are the responsibility of the President and his national security team,
not my role. See Amended Complaint 66; 75.
26) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased reporting
because the records and documents that the Defendants purport to be reporting from
demonstrate that Michael Flynn, Tim Blixseth, and Warren Trepp all went to
extraordinary and expensive efforts to obtain ownership of my work as being
extremely valuable, while simultaneously claiming that my work had no value.
27) The documents that the Defendants claim to be reporting on make unmistakably clear
that Trepp, Flynn and Blixseth by their various actions believed my software and
technology actually worked and had enormous value. The Defendants knew from the
documents that Trepps, Flynns and Blixseths actions contradicted their words.
Defendants knew that by talking down the value of the technology and software and

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page10159
of 75
of
224

attacking me, Trepp, Flynn, and Blixseth were seeking to gain leverage so as to
obtain ownership of my intellectual property at a lower price. See Amended
Complaint 245.
28) Defendants actually knew from the documents and information they claim to be
reporting on that the Defendants could not believe the words of Trepp, Flynn or
Blixseth, or their employees, because their words are sharply contradicted by their
actions.
29) Furthermore, Michael Flynn, Tim Blixseth, and Warren Trepp were attempting to
invoke the fraud exception to bankruptcy laws to invalidate my bankruptcy, and
therefore the Defendants knew that they had motives to fabricate or embellish their
accusations against me.
30) The public records that the Defendants claim to be relying upon though voluminous
overwhelmingly contradict the Defendants defamation of me.
31) Defendants defamed me with knowledge of their false published statements or at a
minimum demonstrated a reckless indifference to the truth and biased and dishonest
reporting with the technically absurd and obviously false statement that The French
company said that there were simply not enough pixels in the broadcasts to contain
hidden bar codes or unseen numbers. See Amended Complaint 130. This French
private company is never identified, of course. Id.
32) The Defendants Chapter 2 of the Book which smears me depends centrally on the
proposition that there is not enough data space within a video signal to contain hidden
codes, and therefore my work was a fraud and a hoax and I conned the U.S.
Government by claiming that video signals contained hidden data.

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page11160
of 75
of
224

33) Defendants defamed me with reckless indifference to the truth and biased and
dishonest reporting by falsely claiming that I claimed the data was contained only in
the crawl at the bottom of the screen. By diverting attention to only the crawl
Defendants intentionally and knowingly engage in biased and misleading defamation.
34) Defendants defamed me with reckless indifference to the truth and biased and
dishonest reporting by saying that I claimed the data was a bar code. By diverting
attention to a bar code Defendants intentionally and knowingly engage in biased and
misleading defamation.
35) Defendants defamed me with reckless indifference to the truth and biased reporting
by claiming a television signal could not contain such simple data as latitude and
longitude coordinates, consisting of only six numbers and two letters (East or West
longitude, North or South latitude), plus a date, hidden within the signal.
36) A video signal contains an enormous amount of data. The reason my data
compression technology was valuable is because a video signal consumes a
tremendous amount of transmission band with and storage space.
37) No reputable or honest person could claim or believe, much more falsify information,
that a television video signal cannot contain the hidden data that I uncovered and
reported to the U.S. Government.
38) Either the Defendants actually know that their defamation of me is false, because
codes can be hidden within video signals, or the Defendants based their entire
Chapter 2 on a total failure to research or investigate one of the most central
lynchpins of their entire reporting. Defendants either know that a video signal can in
fact contain the hidden data I found or made no attempt to investigate if it can, before

10

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page12161
of 75
of
224

they simply intended to defame me. See Amended Complaint 65, 177, 223.
39) Meanwhile, the Defendants claim that I sought publicity in the news media with
regard to then Congressman and later Governor Jim Gibbons.
40) That is false. In fact, I filed a False Claims Act lawsuit on the advice of counsel,
which was filed under seal in court.
41) Eventually, the court unsealed the lawsuit documents.
42) When the documents were unsealed in court, the news media began to report on what
was said in those court documents.
43) I did not seek news coverage or publicity about the Gibbons issue. See Amended
Complaint 25-28.
44) Eventually, when news interest grew strong, on the advice of counsel at the time, and
the business owner Edra Blixseth, I finally relented and was forced to succumb to
requests for comment and granted only one (1) interview with NBC News, which I
recall lasting about 45 seconds to one minute on the air.
45) On page 8, the Defendants rely upon an article in The Wall Street Journal titled
Congressmans Favors for Friend Include Help in Secret Budget. However, I did
not seek that news coverage or play any role in causing that news coverage.
46) On page 8, the Defendants rely upon an article in The Wall Street Journal titled
Nevada Governor Faces FBI Probe Into Contracts. However, I did not seek that
news coverage or play any role in causing that news coverage.
47) On page 9, the Defendants refer to an article in Bloomberg News titled Yellowstone
Club Divorcee Entangled in Terrorist Software Suits. However, I did not seek that
news coverage or play any role in causing that news coverage.

11

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page13162
of 75
of
224

48) On page 9, the Defendants refer to an article in Playboy in 2010. However, I did not
seek that news coverage or play any role in causing that news coverage.
49) On page 10, the Defendants refer to an article in The New York Times in 2011.
However, I did not seek that news coverage or play any role in causing that news
coverage.
50) On page 9, the Defendants refer to an article in Defense News Obamas
Counterterrorism Czar Gave Bogus Intel to Bush white House in 2012. However, I
did not seek that news coverage or play any role in causing that news coverage.
51) Nevertheless, the Defense News article does alert the Defendants to the fact that U.S.
Government officials sought to falsely and misleadingly shift blame to a scapegoat,
me.
52) On September 28, 1998, Warren Trepp and I co-founded eTreppid Technologies
(eTreppid) based on a Contribution Agreement of that date in which we agreed
to own the LLC in equal 50% shares. Trepp put up money and Montgomery
conveyed his software compression technology contained on CD No. 1 to eTreppid.
The business plan of eTreppid and the application of the compression technology
was to compress VHS video tapes used for surveillance in casinos for archiving and
more efficient storage. Over the preceding 20 years I developed and copyrighted
other types of software technology, including but not limited to Object Detection
software which is a crucial component of, among other things, colorizing black and
white movies. In order for the computer to add color, it must be able to recognize
individual objects in the movie which are moving in three dimensions, (that is
moving toward or away from the camera and changing in apparent size), aspect angle,

12

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page14163
of 75
of
224

orientation, etc. This was not conveyed to eTreppid and which, per the terms of the
Contribution Agreement, was expressly excluded. Shortly after the formation of
eTreppid, Montgomery offered to sell one part of his Object Detection System
(ODS) software to Trepp for the sum of ten million dollars, which Trepp rejected.
See Amended Complaint 80-81.
53) As reflected in a form SF-95 Attachment A prepared by me with my then attorney
Michael Flynn for presentation to the U.S. Government, Beginning on or about
November 2002, on behalf of the US Air Force, Montgomery began work on military
applications of his technology at Eglin Air Force base to demonstrate the application
of his technologies in the war on terror.
54) I am a citizen of the State of Florida, with a residence in an apartment community in
Miami, Florida. I have reported my address under seal for security reasons.
55) I am registered to vote in Florida. See Exhibit 9. I previously had a temporary address
while settling on the permanent address that I have now. I have updated my voter
registration to reflect my current Miami address.
56) I have reviewed the affidavit of defense counsel Laura Handman attached to the
Defendants initial motion stating that I had not registered to vote in Florida. The
Defendants affidavit is false. I am registered to vote in the State of Florida, and have
now updated my voter registration with my new address.
57) I found on the website of the publisher Houghton Mifflin Harcourt, that the publisher
Houghton Mifflin Harcourt Publishing Company maintains permanent and general
offices in Orlando, Florida at 9400 Southpark Center Loop, Orlando, Florida 32819.
See Exhibit C, attached to the Opposition, which I downloaded from the Defendant

13

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page15164
of 75
of
224

publishers website at http://www.hmhco.com/about-hmh/our-offices. These are


statements made by the Defendants about themselves.
58) On the website of the Florida Department of State Division of Corporations I found
that Defendant Houghton Mifflin Publishing Company is registered to do business in
Florida through the Florida Department of State Division of Corporations. See
Exhibit D, attached to my Opposition to the Defendants motion concerning Florida
jurisdiction and venue, which I downloaded from the Florida Department of States
website.
59) As shown in those Florida government documents, in 2008 Defendant changed its
name from Houghton Mifflin Harcourt to Houghton Mifflin Publishing
Company. Id. These are statements made by Defendants about themselves.
60) My research of the publisher also uncovered that Defendants rely significantly upon
sales in the Southeast of the United States through a company Amazon for very
substantial sales over the internet. Not coincidentally, Amazons regional distribution
centers or fulfillment centers are located in Ruskin, Florida in Hillsborough County
and Lakeland, Florida, in Polk County. Florida is the largest state in the South East
and the third largest in the nation. See Exhibit E, attached to my Opposition.
61) Much of the defamation which my lawsuit contests is contained within the physical
product physically shipped into Florida for sale, the Book written by James Risen and
published by Houghton Mifflin Harcourt Publishing Company.
62) In 2012, Edra Blixseth brought Chris Pipes, from the U.S. Special Operations
Command (SOCOM) from MacDill Air Force Base in Florida to our Palm Desert
offices. SOCOM was interested in pursuing object tracking, mass surveillance, and

14

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page16165
of 75
of
224

research on cloaking technologies. Chris Pipes met at our facility, with a


representative of the CIA. While he was in our building, Chris Pipes then received a
telephone call from SOCOM in Florida, and then told us that SOCOM could not
pursue the technology because of what was written about me in the news media. See
Exhibit 8.
63) The Defendant author James Risen actually knew or should have known that most of
my work was with U.S. Government entities in Florida and the contracting offices for
my work are in Florida. A competent Pulitzer Price winning New York Times
reporter who wrote the Book over a four-year period from 2011 through 2014 would
have reviewed the Wall Street Journal article from November 1, 2006, attached,
which includes the explanation:
Source of Secret Funds
One source of secret funds for eTreppid and other companies is the
Special Operations Command. Based in Tampa, Fla., the command
fields special-operations military and intelligence forces around the
globe and is at the forefront of the fight in Iraq and Afghanistan. It
has also been rocked by a criminal investigation of a former
contracting officer. The investigation is continuing, according to a
spokesman for the U.S. attorney in Tampa.
In a separate inquiry, Pentagon investigators last year found
evidence that the command kept special accounts for "unrequested
congressional plus-ups," or earmarks. The plus-ups were used to
reward lawmakers with projects in their districts, according to
declassified investigators' notes reviewed by The Wall Street
Journal. The Pentagon's inspector general closed the inquiry after
finding that the accounts weren't illegal.
Mr. Trepp said eTreppid won classified work on its merits and
already had a number of government contracts before Mr. Gibbons
starting making introductions on the company's behalf. Mr.
Gibbons's campaign manager, Robert Uithoven, said the
congressman has been a strong supporter of new defense
technology, particularly after 9/11. But he said there was "no quid

15

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page17166
of 75
of
224

pro quo whatsoever" for contributions from contractors. And while


some funding was secret, "it was because of the sensitive nature of
the work," Mr. Uithoven said, not to avoid public scrutiny.
For Mr. Trepp, eTreppid's success at winning multimillion-dollar
federal contracts marks a comeback from his Drexel days. He sat at
Mr. Milken's right arm on the firm's famous X-shaped trading desk
in Beverly Hills, sometimes trading as much as $2 billion in
securities a day. Federal regulators filed a civil securities-fraud
claim against him in 1995, and a Securities and Exchange
Commission administrative judge found that his violations had
been "egregious, recurring and intentional." But she dismissed the
proceeding against him, noting that the allegations were old and he
had left the securities business years earlier.
64) This article and dozens of others, as well as court documents, caused Risen to know
or he should have known upon reasonable inquiry over four years that Warren Trepp
was furiously trying to take ownership of my software and technology, which directly
calls into question his self-serving claims that the software and technology he was
trying to acquire rights to was worthless. The same article also reports:
Mr. Gibbons also got other, unreported gifts of cash and casino
chips from Mr. Trepp, according to sworn testimony in a civil
lawsuit brought by a former executive at eTreppid, Dennis
Montgomery. The suit, filed in February in federal court in Reno,
involves a dispute between Messrs. Trepp and Montgomery over
the rights to certain software code. .
The suit has raised alarms in Washington because of concern that
national secrets will be revealed if it goes to trial. For example, one
of the entities that funded eTreppid is code-named Big Safari and
is a classified program, documents in the case show. The nation's
top intelligence official, John D. Negroponte, recently filed a
statement with the court seeking to seal the case. He wrote that
after personally reviewing the matter, he has concluded that
disclosure of some information connected with the case could do
"exceptionally grave damage" to national security.
65) My greatest opportunities for employment, business, and/or an income are at either
Macdill Air Base near Tampa, Florida and Eglin Air Force Base near Fort Walton

16

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page18167
of 75
of
224

Beach, Florida.
66) As a result, I had had longstanding plans from years past to settle in Florida, in part
because of my failing health and desire to enjoy Florida at this stage in my life.
Florida also has no personal income tax, making it a great place to boost and save
income for eventual retirement. This is also why most military personnel choose
Florida as their home state and residence, which they have the unbridled right to do
under military regulations. This military readership is why Florida is one of the most
important markets for Defendants to sell books.
67) In 2011, I incorporated a business with a partner in Florida to contract with the
military and U.S. Government at bases in Florida to continue the same type of
services and software and technological work that I had performed under eTreppid
and BLXWARE. This business was named Alex James LLC, which I incorporated
through the Legal Zoom service company.
68) Exhibit N attached to my Opposition to the Defendants motion presents the papers I
processed through the Legal Zoom company and my payment information paying
for the company in Florida in 2011.
69) As an expert in national security issues, Defendant James Risen knows that the war
in Afghanistan was run largely from Florida electronically and by drone controllers
located in Florida. General Tommy Franks rarely set foot in Afghanistan but fought
the war from U.S. Air Force Bases in Florida. See Amended Complaint 73.
70) Defendant James Risen also knows that the U.S. military leadership and personnel are
concentrated mainly in Florida, secondarily in California, and thirdly in Texas.
Because U.S. military servicemen can easily and by right choose their State of

17

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page19168
of 75
of
224

residence despite being deployed, Floridas lack of an income tax makes Florida a
very attractive state for U.S. servicemen, often poorly paid. As a result, many of the
nations top military leaders, current and former, choose Florida.
71) Defendant Risen knew in publishing the Book that Florida is an enormous market as
the nations now third largest State, including with many retirees with more time to
read books than the average American.
72) The team on which I worked had contracts directly with the intelligence agencies at
the military bases in FLORIDA. I have video showing the work. The contracting
officers are out of those military bases, many of which are classified. I met and
worked with CIA officials in Florida at various military bases. However, I cannot
identify the exact units stationed at those bases, which is classified information.
73) We at eTreppid and later BLXWARE did most of our work with units stationed at
MacDill Air Force Base and Eglin Air Force Base, whose identity is secret. See
February 14, 2004, Order for Supplies or Services attached, with the Ship To
address of UQ USSOCOM/SOAL-SP (Mohr), 7701 Tampa Point Boulevard, MacDill
Air Force Base, Florida 33621.
74) Most of the payments for our work, the work I did for eTreppid and later
BLXWARE, came out of the CIA offices in Florida and SOCOM, the U.S. Special
Operations Command of the U.S. military at Macdill Air Force Base, Florida.
75) The U.S. Southern Command of the U.S. military is located in Dade County, Florida,
at 9301 NW 33rd Street, Doral, Fla. 33172, having telephone switchboard telephone
number (305) 437-1000. See Exhibit 5, attached.
76) The U.S. Central Command (CENTCOM) of the U.S. military is located at MacDill

18

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page20169
of 75
of
224

Air Force Base near Tampa, Florida. See Exhibit 6, attached.


77) Relating to my work conducting surveillance of international communications, major
fiber optics cables run from Florida across the ocean, which is partly why my work
opportunities for my experience and capabilities are in Florida.
78) I intend to call witnesses who can testify that my defamed software and technology
does indeed work and is not a hoax personnel based at Macdill Air Base near Tampa,
Florida and at Eglin Air Force Base near Fort Walton Beach, Florida, where I did a
lot of his work, as some of my most significant witnesses. The organizational units
housed at Macdill and Eglin used my software, technology, and work extensively
during the time period addressed by Defendants defamation of me. Those witnesses
can prove that the defamatory statements about me are false.
79) Relevant officials at Macdill and Eglin (and all facilities that my work has provided
services to anywhere) make their own contracting decisions and do not rely upon
contracting offices in Washington, D.C., nor even at the Central Intelligence Agency
in Langley, Virginia, the Pentagon in Arlington, Virginia, or the National Security
Agency in Fort Meade, Maryland.
80) Potential witnesses in this case, with whom I have worked, are largely in Florida,
including:
Goss, Porter, former Director of CIA, now in Miami, Florida
Johns, Ken, Macdill AFB, Florida
Lyons, XXXXX, Macdill AFB, Florida
Macbeth, W. Rhys, Eglin AFB, Florida
Nazelrod, Craig, Eglin AFB, Florida
Pipes, XXXXX, Macdill AFB, Florida
Roche, James, Macdill, Florida
Rumsfeld, Donald, now in Florida
Stillman, Phillip, Attorney for Dennis Montgomery, now in Miami, Florida
Madden, Tom, Boca Raton, Florida

19

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page21170
of 75
of
224

Olivia, Adrian, Eglin AFB, Florida


Bartholomew, Mary L, Eglin AFB, Florida
Fiamengo, Nicholas A, Eglin AFB, Florida
Freeman, Gregory J, Eglin AFB, Florida
Savage, Cynthia, Eglin AFB, Florida
McCool, John C, Eglin AFB, Florida
Temple, James K, Eglin AFB, Florida
Griffin, Susan M., Macdill AFB, Florida
Russell, Deborah, Macdill AFB, Florida
Nettelhorst, Doug M, Macdill AFB, Florida
Stallworth, Hugh T, Macdill AFB, Florida
Bob McCaskey, Macdill AFB, Florida
Crutchfield, Chris, Macdill AFB, Florida
Melnyk, Michael S., Macdill AFB, Florida
Lopez, Tina M, Macdill AFB, Florida
Cerny, Jeffrey D., Macdill AFB, Florida
Muccio, Anthony B., Eglin AFB, Florida
McKinney, Scott E Lt.Col., Eglin AFB, Florida
Purvis, Brad Civ, Eglin AFB, Florida
Kirsch, Jim', Eglin AFB, Florida
Hughes, Stacey L, Eglin AFB, Florida
81) Ultimately, I became aware that James Risen had published these false reports in the
Book and that Risen was conducting a nationwide publicity campaign, particularly
aimed at Florida, to sell the Book.
82) I heard and watched James Risen repeatedly in national television and radio
interviews discussing his book but primarily about me, mostly ignoring the rest of his
Book in those interviews while attacking me as a private individual.
83) In radio, television, and newspaper interviews, James Risen mainly focused on
libeling and slandering me in order to sell the Book.
84) Risens appearances on radio and television were not just commentary but attempts to
stimulate and promote the sale of books inside Florida and elsewhere.
85) Risen was speaking on radio and television to move books off of Florida bookstores
and shelves and to the checkout counter in Florida.

20

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page22171
of 75
of
224

86) The defamation by Defendants of me is not a criticism of the U.S. Government in the
District of Columbia, but excuses the U.S. Government as an innocent and
unsuspecting victim, while blaming and defaming me. Therefore, the U.S.
Government has not suffered harm within Washington, D.C.
87) I had relatively little contact with the U.S. Government in Washington, D.C. It was
the companies that I worked under, eTreppid and later BLXWARE, who contracted
with regional offices at various U.S. Government bases or facilities. I interacted
almost entirely with technical people pursuant to the contracts.
88) It was Warren Trepp and later Edra Blixseth who used their contacts with the U.S.
Government to seek and arrange contracts for our work. I did not persuade the U.S.
Government to hire me, Trepp and Blixseth did. My own interaction with offices or
officials in the Washington, D.C. area was very limited because I was not the one
running the companies nor primarily interacting with the U.S. Government.
89) Starting as early as 2011, I was contacted by James Risen asking about my secret
work under contract for the U.S. Government in support of anti-terrorism efforts.
90) I see that in James Risens Declaration attached to the Defendants Motion to
Dismiss, Risen states that he has been working on the Book since 2011.
91) I continually provided numerous warnings, in writing, to James Risen that the claims
he mentioned and later published in October 2014 in the Book are false.
92) However, James Risen attempted to blackmail me by demanding that I provide
classified documents and information to him or else he would publish the false claims
that he later did publish in the Book. That is, when I warned him that the reports
were false, James Risen responded to me by telling me that he would not publish

21

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page23172
of 75
of
224

those false claims if instead I provided him with classified information and
documents. See Exhibit 7. That is, James Risen demanded that I commit multiple
crimes as the price for Risen not publishing the false reports about me. Of course, I
refused to be blackmailed into breaking the law as the price for being defamed.
93) Writers Aram Roston and James Risen were both after John Brennans information.
They both knew that I had worked for John Brennan. Exhibit 7.
94) Roston and Risen published false and defamatory information about me to try to
pressure me into releasing classified information about John Brennan and others in
the war on terror to them as the price for them telling the truth.
95) However, Roston and Risen knew that my work was real and legitimate, because they
sought to obtain secret and classified information from Brennan from me.
96) Roston and Risen published defamatory statements about me to punish and to
pressure that is, coerce me for not illegally disclosing classified information and
material to them.
97) In both cases, I told Risen and Roston I would have to turn over classified
information, a road I wasnt willing to go down. I was never what they were after.
They were writing these stories to hurt me so that I would provide classified
information about the various administrations. I was just their pawn.
98) Attached as Exhibit 7 are a few of my communications to James Risen, which I have
produced to Defendants as initial disclosures, informing him in advance of the
publication of the Book that his claims were not only false but preposterous and that
his sources were clearly unreliable.
99) In fact, on November 1, 2012, discussing the Book that he was then writing, I warned

22

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page24173
of 75
of
224

James Risen under the email address TheAgencyInsider@Hotmail.com that his


reporting was false including because Warren Trepp was the CEO of eTreppid and
kept all the money.
100)

Risen also promised in that same email thread: If you give us the Brennan

emails, we will write a story.


101)

However, this response was in the context of a long back-and-forth discussion

concerning the falsehood of Risens accusations against me.


102)

In fact, in a November 1, 2012, email thread, attached as Exhibit 7, which I have

produced to Defendants as initial disclosures, discussing the Book that he was then
writing, I warned James Risen under the email address
TheAgencyInsider@Hotmail.com that his reporting was false including because
Warren Trepp was the CEO of eTreppid and kept all the money. See Amended
Complaint 47.
103)

Risen also promised in the attached email thread, which I have produced to

Defendants as initial disclosures: As I said on the phone, I protect my sources. I


will never divulge the identify of my sources in a leak investigation. But I also have
to know that the source is telling me the truth. Jim Exhibit 7.
104)

So Risen admitted that it was his professional responsibility to determine that the

sources he used to defame me are telling the truth. But Risen did not do that. The
sources he relied upon were obviously not telling the truth, as is patently obvious.
105)

I warned James Risen concerning the falsehood of his reporting in that November

1, 2012, email thread, which I have produced to Defendants as initial disclosures,


attached:

23

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page25174
of 75
of
224

There is a reason the CIA and NSA were there, you must know
that.
Do you really think the government invoked the State Secrets
Priviledge from beiing embarrassed or conned? Negroponte in his
in camera declaration, if ever released, was spell it all of out.
They governemnt never wanted information to come out regarding
the other work. The program started out spying on terrorist, and
under Obama quickly moved to spying on Americans!! A program
which was started by Brennan in 2003 and continues to this day.
This technology is being used today to spy on Americans,
including candidate Romney.
I don't see you ever publishing that information? Exhibit 7.
106)

Furthermore, this November 1, 2012, exchange concerning Risens plans writing

the Book which was eventually published on October 14, 2014, was seven (7) months
before the revelations by Edward Snowden that mass surveillance of Americans was
occurring. Therefore, Risen actually knew in 2013 that I was telling the truth and was
being lied to by his so-called sources. My discussions with James Risen on
November 1, 2012, were proven true in mid-2013. Therefore, Risen had actual
knowledge that I was indeed a whistleblower and that the sources he relied upon were
falsely discrediting me to cover up wrong-doing. In this, of course, James Risen
distorted and falsified the real story.
107)

I made it clear to James Risen, in the phone call referenced in the email, that the

Obama administration used mass surveillance technology to alter the 2012 election in
FLORIDA, and that they will use the technology again in 2016!
108)

In June of 2012, in a telephone call, I told James Risen and Eric Lichtblau that

their information about me in their 2011 New York Times story was incorrect, and
they needed to correct it. I also made it clear that I was under a US Protective Order

24

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page26175
of 75
of
224

in Nevada, and a State Secrets Privilege order by the Director of National Intelligence
not allowing me to discuss my work. In addition, there were sealed documents still in
the Nevada case. I also made it clear, that the State secrets privilege was also issued,
to protect the work I did on domestic surveillance. I told them I knew they met with
my ex attorney Mike Flynn, for several days, in regards to their story, and suggested,
he had other motives for his conduct!
109)

I also made it clear in June of 2012 that I had a brain aneurysm that was going to

be repaired soon, and a risky procedure, and wanted my name cleared in case I
became incapacitated or I died.
110)

Therefore, the Defendants believed they could get away with their defamation

because I would probably become incapacitated or die in the meantime.


111)

In 2013, going over Risens and Lichtblaus heads, I sent emails directly to the

editors of The New York Times telling them their story was wrong and to retract it.
112)

I sent an email to the editors of The New York Times, demanding that they

correct the false reporting about me in 2012.


113)

In 2012-2014, on at least 10 different occasions, I made it clear to Aram Roston

of Playboy, his story was wrong, and told him to retract it.
114)

Carlotta Wells, a U.S. Department of Justice attorney assigned to matters

involving me, told me that if I talk to the press or leak information, I will be charged
with treason for disclosing my work with the NSA and CIA. She told me when I
signed my Top Secret clearance, I forfeited my right to protect my first amendment
rights.
115)

Carlotta Wells additionally said that If the US Government wants to leak false

25

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page27176
of 75
of
224

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page28177
of 75
of
224

Exhibit 1

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page29178
of 75
of
224

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page30179
of 75
of
224

Exhibit 2

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page31180
of 75
of
224

Joe Eskridge, M.D.


Swedish Neuroscience Institute
550 17th Ave #500
Seattle WA 98122
206.320.4144

June 27, 2014


To Whom It May Concern

Dear Sirs,
I, Dr. Joe Eskridge recently treated Dennis Montgomery who is a 60 year old man who
suffered from a cerebral aneurysm. His aneurysm was detected in 2011. He does not
smoke and does not have any congenital blood vessel diseases that contribute to aneurysm
development.
High blood pressure can accelerate aneurysm growth and increase the risk of rupture and
stroke. Stress can increase blood pressure and contribute to aneurysm growth. On a
more probable than not basis stress related hypertension caused the development and
growth of his aneurysm.
I have performed over 5000 brain artery repair and embolization procedures over the
past 30 years. I was Professor of Radiology and Neurosurgery at the University of
Washington Medical School from 1987-2004.

Sincerely yours,

Joe Eskridge, M.D.

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page32181
of 75
of
224

Exhibit 3

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page33182
of 75
of
224

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page34183
of 75
of
224

Exhibit 4

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page35184
of 75
of
224

1
2
3
4
5
6
7
8

Ronald J. Logar, Esq., Nevada Bar No.: 0303


Eric A. Pulver, Esq., Nevada Bar No.: 7874
Law Office of Logar & Pulver, PC
225 S. Arlington Ave., Ste A
Reno, NV 89501
Phone: 775-786-5040; Fax: 775-786-7544
Michael J. Flynn, Esq., Mass. State Bar No.: 172780
Philip H. Stillman, Esq., California State Bar No.: 152861
Flynn & Stillman
224 Birmingham Drive, Suite 1A4
Cardiff, CA 92007
Phone: 888-235-4279; Fax: 888-235-4279
Admitted Pro Hac Vice in related Federal Case No. 3:06-cv-0056-BES-VPC

9
UNITED STATES DISTRICT COURT

10

FOR THE DISTRICT OF NEVADA

11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28

)
ETREPPID TECHNOLOGIES, INC., a California )
corporation,
)
)
Plaintiff,
)
)
vs.
)
DENNIS MONTGOMERY, an individual,
MONTGOMERY FAMILY TRUST, a California
Trust and DOES 1 THROUGH 20,

CASES Nos.: 3:06-cv-00145-BES-VPC & 3:06-cvN-06-00056-BES-VPC

SEALED DECLARATION OF DENNIS


MONTGOMERY IN SUPPORT OF HIS
OPPOSITION TO DODS AND ETREPPIDS
MOTIONS FOR PROTECTIVE ORDERS

Defendants.
_____________________________________
DENNIS MONTGOMERY, an individual; and
MONTGOMERY FAMILY TRUST, a
California Trust,
Plaintiffs,
vs.
eTREPPID TECHNOLOGIES, INC.,
a Nevada LLC; WARREN TREPP, an
individual; DEPARTMENT OF DEFENSE
of the UNITED STATES OF AMERICA
and DOES 1 through 10,
Defendants

THIS DECLARATION IS FILED UNDER SEAL


AND MAY BE VIEWED AND/OR READ ONLY
BY U.S. DISTRICT JUDGE BRIAN E.
SANDOVAL

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page36185
of 75
of
224

1
2

SEALED DECLARATION OF DENNIS MONTGOMERY

3
I, Dennis Montgomery, declare:
4
5

1.

I am over age 18 and a party to two civil lawsuits involving Warren Trepp and my

company eTreppid Technologies. I have personal knowledge of the facts stated herein, and if

called as a witness, I could and would testify competently to them.

BACKGROUND

9
10

2.

I have been a computer programmer since approximately 1978 developing software

11

programs and the source codes for the programs in thousands of different and varied applications,

12

but mostly involving thousands of different programs for data compression, pattern recognition,

13

anomaly detection and an Object Detection System. 1 These include but are not limited to the

14

following:

15
16

a. Software programs applicable to medicine, mostly involving anomaly detection; and pattern

17

recognition and mostly developed between 1981 and 1996. These are my copyrights and/or my

18

copyright derivatives.

19

b. An Object Detection System (ODS) derived from my copyrights involving anomaly detection

20

and pattern recognition, but having far more universal application and adaptability to many areas

21
22

other than medicine, mostly developed between 1994 and 1998. These programs constitute the

23

basis for my work on certain special military contracts. There are thousands of software developers

24

who have worked for decades attempting to develop an ODS comparable to mine; and I am

25
26
27
28

I use these terms generically to define the broadest possible genus of software programs
relating to this area of software development - sort of like saying automobiles as a category of four
wheel powered vehicles. But the different types of anomaly detection and pattern recognition
programs are vastly greater than the types of automobiles currently in existence worldwide.
-1-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page37186
of 75
of
224

1
2

unaware of anyone who has successfully created such software.


c. Data compression developed between 1996 and 1998 - conveyed to eTreppid on CD No.1";

3
and adapted for use in casino surveillance between 1998 and 2002, pursuant to our business plan
4
5

at eTreppid.

d. Data compression and pattern recognition programs, developed by me as an independent

contractor at eTreppid between 1998 and December 31, 2001 consisting of a part of eTreppids

work relating to casino surveillance - some involving patents assigned by me derived from CD No.

9
10
11

1"; and other programs not derived from CD No. 1 licensed to eTreppid pursuant to promises
made to me by Warren Trepp.

12

e. Data streaming compression for movies, not contained on CD No. 1" and mostly developed by

13

me between 1994 and 1998. I discussed these programs with Trepp before execution of the Sept.

14

28, 1998 Contribution Agreement and offered them for Five Million Dollars, which he rejected;

15
16

and which we again discussed years later in 2002 and 2003 and which he again rejected for Five

17

Million Dollars. In 2003 we also had several conversations about a sale for Ten Million Dollars

18

and/or promises by Trepp of licensing the software as described in my answers to interrogatories

19

attached to my opposition to the Governments and Trepps motions for protective orders.

20

f. Multiple software programs developed, owned, possessed and used exclusively by me derived

21
22

from my ODS between 1994 and December 31, 2002, some of the source codes for which are

23

direct derivatives of my copyrights, and which, beginning in November, 2002 , I began to adapt to

24

military applications on behalf of the Department of Defense, the Navy, the Air Force, and the

25

Central Intelligence Agency, mostly utilized in the war on terror between March 2003 and the

26

present.

27
28

The software programs and the source codes owned, possessed and used exclusively
-2-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page38187
of 75
of
224

1
2

by me on behalf of the foregoing Government agencies all derive from my exclusive copyrights
generally relating to anomaly detection and pattern recognition, and more specifically relating to

3
the source codes used in my ODS; and derivatives thereof which enabled me to detect and
4
5

decode embedded and encrypted al Qaeda communications to its field operatives. Presumably, the

sealed Government declaration informs and educates this Court with respect to this aspect of my

software technology.

Over the 25 years I have been developing software programs, I have collected and

9
10
11

stored thousands of different computer files and programs on my computers and on many different
types of computer storage media. Some of this collection was stored at my storage facility and some

12

of that was taken and/or damaged by the FBI. I generally store some of the programs and codes I

13

have developed and/or am working on on the computers I am currently using. The Government

14

took my computers during its raid on my home and storage facility on March 1 and March 3, 2006;

15
16

and the governments retention of my computers and computer storage files from my home and

17

storage facility has caused me, and will continue to cause me, irreparable harm because its retention

18

affects my livelihood and ability to work. Additionally, as a result of the Governments

19

unconstitutional raid, I do not have access to computer files which would enable me at this time to

20

provide a more detailed chronology of events relating to the SAP I worked on and at issue in these

21
22

cases. However, since my departure from eTreppid, as recited below, I have been able to

23

reconstruct on new computers specific software programs that I previously used in the decoding of

24

al Jazeera satellite television broadcasts encrypted with al Qaeda instructions to its field operatives.

25

I assume this work product or output from my software programs, together with my daily

26

interaction with top CIA officials and field operatives, is one of the concerns which must be recited

27
28

at least obliquely in the sealed Government declaration.


-3-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page39188
of 75
of
224

1
2

5.

More recently, notwithstanding the unconstitutional raid perpetrated on my home and

storage by Warren Trepp using his political influence with James Gibbons, (Gibbons has admitted

3
making phone calls to initiate criminal action against me on behalf of Trepp), Daniel Bogden and
4
5

the local FBI, I have provided the output from my decoding programs, without compensation, to

our Government in order to stop terrorist attacks and save American lives. My source codes for this

decoding technology which derives from my ODS are what Trepp and several Government

officials were attempting to steal from me when they raided my home.

9
10
11

6.

The Government has now held my computers and storage media for over six months

knowing I do not have possession of any classified information and knowing that all of the source

12

codes used on the special Government contracts worked on by me at eTreppid Technologies are

13

owned by me. No other person within our Government or at eTreppid has ever had access to the

14

source codes used on the special Government contracts. Anyone who swears under oath to the

15
16

contrary is lying and/or committing perjury. Obviously, if they did have access to this technology,

17

Trepp would have licensed and/or sold it to the Government for hundreds of millions of dollars. I

18

completely and zealously guarded the secrecy and confidentiality of my source codes used on the

19

special Government contracts at eTreppid, both from the Government, including the CIA, and from

20

eTreppid, as the exclusive owner and sole possessor. No person at eTreppid is able, to my

21
22

knowledge, to create the source codes that I have created having multiple applications in the war on

23

terror and other military uses. Conclusive proof on this issue is established by the recent interception

24

of the attempts by terrorists operating out of London to blow up jetliners originating in London and

25

bound for the US. I gave the appropriate authorities within the US Government accurate and very

26

specific intelligence regarding this terrorist plot, from my decoding software as I have done in

27
28

the past, weeks prior to the arrests by the London authorities - without compensation.
-4-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page40189
of 75
of
224

1
2

7.

Neither Warren Trepp, nor eTreppid Technologies, nor any person working there

have ever owned, possessed or processed output from my source codes used in the special

3
Government contracts. Other eTreppid individuals, as well as Government officials identified
4
5
6
7
8

herein, had access to the output only after I had processed it.
8.

In September, 2005, Trepp told me that the Government had appropriated One

Hundred Million Dollars for the decoding technology, but he was demanding Five Hundred
Million Dollars. Trepp instructed me to stop processing al Jazeera output on two occasions - first

9
10
11

in September, 2004, saying to stop temporarily until he made a deal with the Government to sell a
portion of the technology for Five Hundred Million dollars, which I refused. Secondly, about a

12

year later in September 2005, when my conflict with Trepp greatly intensified. On the latter

13

occasion, I told him it was a hold-up. I refused on both National Security grounds and over

14

Trepps failure to pay me licensing fees and to resolve our conflict over the split of the proceeds

15
16

derived from any sale. Trepp had previously acknowledged my ownership of the technology in

17

numerous conversations and promised to work things out. In September-October, 2005, Trepp

18

said that our deal would have to wait because he had other obligations and began to threaten me

19

as our conflict intensified. This ultimately resulted in my departure from eTreppid in January, 2006.

20

Since then I have given the highest levels of our Government vital national security information free

21
22
23
24
25
26

of charge while Trepp and his local Government cronies have raided my home and storage and tried
to get me indicted.
9.

I was an independent contractor throughout my time at eTreppid, notwithstanding

Trepps attempt to change my status for tax reasons in January 2003. Before that eTreppid even
treated me as an independent contractor. But his tax changes attempting to make me an employee

27
28

only reflect what we both knew and what is now obvious to any impartial observer. I owned the
-5-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page41190
of 75
of
224

1
2

technology, it was not developed while I was at eTreppid, and I exclusively controlled it. He was
attempting to steal what he refused to pay for, his modus operandi for his entire adult life, as shown

3
by his position as Head Trader for Michael Milken in the junk bond scam. While at eTreppid, I
4
5

fulfilled all of the indicia of an independent contractor even after January, 2003 when Trepp

realized the value of the technology in the war on terror. No one controlled, instructed, supervised,

or directed my work in the slightest manner - not one aspect of my work was controlled etc by

anyone or anything. Not one part of the source codes I used on Special Access Programs (SAP)

9
10
11

was ever created at eTreppid or on eTreppid computers. All codes used on the special military
contracts were created by me at my home or elsewhere. None of the source codes used on SAP

12

were ever on the premises at eTreppid, nor were any of them ever contained in eTreppid computers.

13

Almost all of my work on the SAP was done by me in an area occupied by me alone. Any

14

adaptation or changes to any of the source codes was done at my home.

15
The Negroponte Declaration

16
17

10.

I have not read the sealed declaration filed by the DoD. Therefore, I obviously do

18

not know its contents. I have read John Negropontes public declaration. I agree that the facts

19

involved herein relating to specific military contracts - the Special Access Programs, ( the SAP);

20

and that my software technology used to process data and create output from that data in SAP,

21
22

involve vital national security concerns, the disclosure of which would cause exceptionally grave

23

damage to the national security of the United States. I can only presume that the sealed

24

declaration relates to work I did on SAP, probably without referencing specific individuals that I

25

worked with from the CIA, and without describing precisely what I did. I expect, given the

26

Governments failure to use certain information that I processed which turned out to be accurate,

27
28

but on which the Government failed to act, resulting in multiple civilian and military casualties, that
-6-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page42191
of 75
of
224
such information is not in the sealed declaration. As to the information I provided which succeeded
1
2

in stopping al Qaeda attacks, like the recent London Airliner plots, I hope that the Government has
alerted this Court to the exceptional and grave importance of the use of my technology in the war

3
4
5

on terror.
11.

However, I vigorously dispute whether any of the applicable protocols for properly

classifying either the data I received from the Government, the processing I performed, or the

output I created, was ever properly designated classified information by an Original

Classification Authority pursuant to The National Security Industrial Program Operating Manual

9
10

(The Manual) while it was in my exclusive possession, custody and control at eTreppid. Much of

11

the work I did was simply too urgent and the output too vital to conform to any of the Manual

12

protocols, the eTreppid personnell were too incompetent to implement the protocols, the cost was

13

too great, and the CIA operatives I dealt with did not trust anybody at eTreppid but me - at least that

14

is what several of them said.

15
16

12.

For security reasons, and because I zealously protected the secrecy of my software

17

source codes from everyone, no other eTreppid employee had access to anything I was working on

18

in connection with SAP. Indeed, it was commonly discussed with the CIA field operatives, that any

19
20

leak to anyone at eTreppid would cause serious damage to national security. In general, eTreppid
employees were too incompetent to be involved, including Sloan Venables and Patty Gray. Nor did

21
22

any CIA or other Government official have access to the software programs that I used to create the

23

output on SAP. They repeatedly tried to gain access to the source codes and failed; including

24

attempts to reverse engineer the output but failed. In December, 2003, certain CIA Operatives

25

talked about just taking it after I had decoded pre 9/11 al Jazeera signals embedded with the

26
World Trade Center coordinates as hereinafter described. But I informed them that the programs
27
28

would self-destruct and that I would stop processing the encrypted data from the al Jazeera
-7-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page43192
of 75
of
224
broadcasts. Because of the statements about just taking it, I informed Warren Trepp and Edward
1
2

Charbonneau, an Associate Director of the CIA in charge of Technology. Charbonneau


immediately flew to Reno and signed the Agreement attached hereto as Exhibit 1, agreeing not to

3
4
5

attempt to seize the technology.


13.

Much of the output was personally hand delivered by me to CIA field operatives,

some of whom flew directly to Reno to pick up the output, and personally watched me process

data, some of which they brought with them. Several of the CIA field operatives scrutinized me for

months and attempted to look over my shoulder in order to gain access to the programs I used

9
10
11

and how I processed the data. Their efforts also failed.


14.

Several of the CIA field operatives told me repeatedly that they did not trust Warren

12

Trepp and that I should never allow him or anyone working for him to gain access to any of the

13

source codes for the programs. They recommended that I insert intrusion devices in to the programs

14

in order to prevent anyone from gaining access to the programs. On several occasions, two CIA field

15
16

operatives, who I worked with for long and intense weeks at a time, Sid Smith and Bill R, told me

17

that they did not trust the FBI, or the National Security Agency, and/or Paul Haraldsen. They knew

18

that I had begun to trust Haraldsen (which proved to be a mistake) and warned me about him. They

19
20

told me that anyone with close ties inside the Government with Warren Trepp was suspect
because the technology was worth hundreds of millions of dollars in the war on terror. At one

21
22
23
24
25

point, the CIA removed the local FBI from eTreppids building.
15.

As to how the Government classified its reports concerning my output after it left

my possession, I do not know. Presumably, given what I know about the output I gave, the
Government has internally classified this data without ever giving me copies of that classified

26
information. I do not have possession of any of those reports.
27
28

16

Mr. Negroponte never personally observed the processing of data or the creation of
-8-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page44193
of 75
of
224
my output. Presumably, he has received either the output I created on some form of electronic
1
2

storage media or reports concerning the same. I was told by numerous officials that the results from
my output were included in regular briefings to the President.

3
4

17.

The work I performed pursuant to Special Access Programs on specified military

contracts required that I have a Top Secret Security Clearance with access to Special Information

Compartmentalized. (SIC).

7
8

The Application of my ODS Technology to Special Access Programs


18.

Predator Project, USAF - November, 2002.

In October - November, 2002, I

9
10

developed a software program from my data streaming technology, not contained on CD No. 1"

11

and obviously created when even eTreppid treated me as an independent contractor, for use on the

12

unmanned aerial vehicle, the Predator. This program enabled the Predator to stream video at a

13

much faster rate than the rate then in use. The work was done pursuant to Contract # 209545S

14

originating in a Top Secret area at Eglin Air Force Base. My contacts included Colonel Rhys

15
16

Macbeth, Thayne Wescoatt, Debora Moffitt, and Chris Crutchfield. I will need depositions of each

17

of these individuals and others, together with all of the documentation used on the project in order

18

to prove my ownership, possession, custody and control of the technology used, how it was used,

19
20

how it differed from then existing technology I had transferred to eTreppid contained on CD No.
1"; and how I adapted my software to the specific application used on Predator. The adaptation

21
22
23
24
25

process is proof of my ownership and exclusive possession. The foregoing individuals watched me
as I demonstrated the application of the technology in the Predator program.
19.

Pointer, Predator, USAF - February, 2003. Between November 2002 and March,

2003, as a result of my work on the above Predator project, I discussed my object detection system

26
(ODS) with and/or interacted with numerous Air Force officers, consultants agents and officials,
27
28

including but not limited to Major Paul Hastert, Capt. Robert Lyons, Col. Rhys Macbeth, Peter
-9-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page45194
of 75
of
224
Wiedemann, Col. Felder, Matt Belmonte, David Whigham and others in connection with testing to
1
2

detect and/or track objects while streaming compressed unmanned aerial vehicle Pointer video for
Predator. Warren Trepp also advised these and other officials that I had developed an ODS which

3
4

could fulfill their tests. Between November, 2002 and January-February, 2003, Trepp explicitly

requested me to use my ODS, which obviously was then completely developed, (when even

Trepp treated me as an independent contractor) to prove to the Air Force that I could detect and

track objects inside streaming video. He agreed that if I passed the tests, he would make a deal

with me either to purchase or license my ODS technology. The tests were 90% successful. I

9
10

adapted my ODS system to use compressed streaming video on an unmanned aerial vehicle

11

Pointer to the ground and then to a central location while detecting and tracking objects on the

12

ground. The validation tests were conducted in February, 2003 at Eglin Air Force Base. The dates,

13

results, and testing procedures, together with all of the related documentation and involvement of

14

Government officials all prove my exclusive ownership and possession of the technology. I will

15
16

require the depositions of at least ten of the Government officials involved together with all of the

17

documentation and test results in order to prove my ownership, custody, possession and control of

18

the ODS. It has a value in excess of Five Hundred Million Dollars. If this case is to proceed, I will

19
20

provide the specific names of all individuals involved in this project, generally named USAF UAV
Battlelab, Contracts: F08651-03-P- 0182 and 0129. These contracts extended from March 26, 2003

21
22
23
24
25

until September 30, 2005, when my conflict with Trepp erupted.


20.

Tracking al Qaeda, USSOCOM and CIA - September, 2003. By June - September,

2003, my ODS had attracted the interest of the CIA and USSOCOM in connection with using
Predator to detect and track al Qaeda operatives in the field, including al Zarquawi, and specific

26
objects related to him such as cars and vans, with live video feeds encoded and scanning for
27
28

objects and people in real time. My object tracking was placed on a specific number of DV
-10-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page46195
of 75
of
224
laptops used by SOCOM and CIA operatives in the field. I interacted on a regular basis with these
1
2

operatives in connection with the use and application of my technology. Special servers were
installed in the POC Predator Operation Command at Nellis Air Force Base and at Fort Bragg to

3
4

look for, detect and track specific objects, which were, in fact, positively identified. I worked with

many people in special groups in the CIA, at Nellis, at Fort Bragg, at Eglin etc in connection with

my object tracking system. I will require all of the documentation, and depositions of at least twenty

individuals associated with this project, including General Brown, Mark Race, Michael Holland,

Jerry Dvorak, Kenneth Johns, Lance Lombardo, Sue Griffin, Merv Leavitt. Eric Barnes and Robert

9
10
11
12
13
14

Dailey . The contracts, USZA26-03-P-3294 and H92222-04-0006/DO-0001 to 0004 extended from


September, 19, 2003 until September 30, 2005 when my conflict with Trepp erupted.
21.

Decoding Al Jazeera, CIA - October 28, 2003. In September, 2003, the CIA brought Al

Jazeera video tapes to me and asked if I could detect embedded and/or encrypted patterns within
the tapes with my technology. I said I would try. In October 2003, I detected embedded patterns

15
16

within the al Jazeera tapes and on or about October 28, 2003, I broke the encryption. Soon after I

17

broke the encryption, the CIA brought me tapes relating to the World Trade Center bombing as

18

described below.

19
20

a. Muhaya Complex Bombing - November 8, 2003. On October 28, 2003, the same day I broke
the encryption, I gave this output to the CIA. That output consisted of the latitude/longitude

21
22

coordinates for a specific location, the Muhaya Complex in Riyadh, Saudi Arabia with the

23

associated date of November 8, 2003. On that date, hours before a suicide attack, the US State

24

Department, using my data, issued an urgent warning about an imminent attack. A suicide bomber

25

driving a truck detonated a bomb outside the Complex killing and wounding over one hundred

26
people. I was later told by operatives in the CIA that we had either failed to follow through quickly
27
28

enough or that the Saudis had failed to act. But I have always questioned why the State Department
-11-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page47196
of 75
of
224
made an urgent public warning just hours before the attack when the CIA knew at least 10 days
1
2

before the attack?


b. Miscellaneous Targets and Dates - November 2003 to October, 2004. Within days of the

3
4

Muhaya bombing, a large group pf CIA officials came to me and asked me to start processing all of

the data that they had. The CIA gave me a list of its operatives who I dealt with and could call any

time day or night. There are 18 names on the list with their home, office cell and pager phone

numbers. I will require the depositions of all 18 of these individuals in order to prove my exclusive

ownership, custody, possession and preservation of the secrecy of my software. Over the next

9
10

several months, I undertook the arduous and time consuming task of extracting data from the al

11

Jazeera satellite signals from tapes brought to me by the CIA. I decoded specific target coordinates

12

and dates within the US and overseas. But the Agency mostly concentrated on the US targets. I was

13

told by several CIA operatives that the output I gave them prevented several terrorist attacks in the

14

US. I have a list of the target coordinates in the US where my technology decoded encrypted targets.

15
16

I also specifically gave the CIA exact overseas locations in London, Madrid, and Iraq months before

17

bombings took place in those locations. I gave the CIA the precise coordinates for the London

18

Tube bombing, and the Madrid Train bombing long before the bombings took place. I know

19
20

what documents and electronic media exist in order to prove that my technology decoded the
targets well in advance of the bombings. I do not know why the attacks were not prevented. The

21
22

pressure on me to process was extreme. I was openly watched day and night by CIA operatives for

23

over a year.

24

c. The World Trade Center Tape and the CIA Letter - January 4, 2004.

25

In December, 2003,

the CIA asked me to process a tape without disclosing any details about the tape. I did so and

26
decoded a specific target coordinate in New York. I later learned that the tape consisted of al Jazeera
27
28

broadcasts in July-August, 2001 and the location I decoded was the World Trade Center in New
-12-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page48197
of 75
of
224
York. Immediately upon decoding the tape, Sid Smith, a CIA field operative told me to destroy all
1
2

of the work that I had done on the tape and to never discuss it with anyone, particularly Warren
Trepp. Sid Smith told me that the CIA was concerned that if any leak occurred, I would be

3
4

subpoened by the 9/11 Commission. Smith warned me never to trust Trepp, never to give him or his

employees access to any of my technology or the output, and to protect my technology from him

at all costs. After I decoded the World Trade Center tape, Smith told me that the technology was so

vital to national security that I could never copyright or patent it, and that the CIA was considering

just taking it. At that time, around Christmas, 2003, I placed intrusion devices into my software

9
10

programs to protect them from both the Government and Trepp. Around the same time, the FBI

11

brought in blade servers to accelerate the processing time. But the FBI got into a conflict with

12

the CIA over control of the entire operation and the CIA forced the FBI to leave the building. I did

13

inform Trepp of the just taking it conversation with Smith. As a result, Edward Charbonneau,

14

Associate Director of the CIA for Technical Operations flew to Reno and signed the letter dated

15
16

January 4, 2004, attached hereto as Exhibit 1. At that time, Charbonneau said the CIA would

17

purchase the technology. Trepp then gave him the price of Five Hundred Million Dollars.

18

Charbonneau said to keep processing and that he would initiate a purchase plan.

19
20

d. Decoding Live Al Jazeera Broadcasts. In February, 2004, working with rotating CIA
operatives, I started taking data directly from live al Jazeera satellite signals. Target coordinates were

21
22

provided for US locations and the London, Madrid and Iraq locations from live, real time broadcasts.

23

I had discussions with CIA operatives, including Peter Wiedemann and others, including Paul

24

Haraldsen (who I believed at that time was some sort of liason between the CIA and NSA) about

25

how al Jazeera and al Qaeda were encrypting their signals and I explained in detail what I believed

26
was the technique used, and a specific technique that would make the encoding even harder to
27
28

break. Shortly after one of these discussions, al Jazeera changed their encryption pattern, which I
-13-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page49198
of 75
of
224
again broke. These changes were explicitly discussed with Wiedemann and Haraldsen. On June 28,
1
2

2004, al Jazeera changed their pattern again, reverting back to their patterns from four months
earlier. I discussed these matters in detail with Haraldsen.

3
4

22.

Paul Haraldsen and the Air Force Take Over - The Christmas Eve Bombing. Between

June 2004 and December, 2004, Paul Haraldsen emerged as my primary contact. Haraldsen

repeatedly informed me that it was very difficult to know who to trust, that he worked directly for

the highest level of our Government, that he worked with General Bath, and to trust him alone.

He told me that there was a conflict on the inside and that the Air Force would be taking over the

9
10

project at the end of 2004. After June, 2004, Haraldsen told me that I should give him all of my

11

output, which I did on a weekly basis and that it was going directly to the President. On

12

December 14, 2004, I provided output to Haraldsen and Paul Allen from USSOCOM with target

13

coordinates and the date of December 24th, 2004 - Christmas Eve - for a specific location in the

14

middle of one of our military bases in Mosul, Iraq. I then picked up repeated patterns for that

15
16

location, so on December 20, 2004, I called my contact directly in Iraq and warned him of an

17

impending attack at that location. I repeatedly stressed to Haraldsen that I thought an attack was

18

imminent. On December 24, 2004, a suicide bomber detonated a device on the base killing over 20

19
20

people. Around that time, Haraldsen told me that all future funding would come from the Air Force
and that a buy out would be coordinated by him and other Air Force officials, including General

21
22

Bath. At one time, he mentioned that One Hundred Million Dollars had already been approved and

23

that he and Bath were working with Trepp. Later, in mid 2005, I informed him that I did not trust

24

Trepp, that the technology was mine, that the Government needed to deal with me, not Trepp, and

25

that I wanted to participate in any discussions. Haraldsen said he would take it up with the right

26
people inside the Air Force.
27
28

23.

Independent Corroboration of the Al Jazeera Decoding. In early 2005, the Air Force
-14-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page50199
of 75
of
224
contracted with an independent consulting contractor who verified that there was, in fact,
1
2

embedded patterns inside the al Jazeera signals, but that the consultant was unable to decode the
encryptions. Some months later, Haraldsen informed me that the buy out would go forward and

3
4
5

that I would participate.


24.

The Eagle Vision Contract, James Gibbons, and LLH & Associates. In early 2005,

James Gibbons, working with General Bath procured a military contract, the only contract

referenced in eTreppids Trade Secret law suit against me, but merely one of many SAP contracts I

worked on with my technology. The project was named Eagle Vision and involved the

9
10

compression of digital satellite streams. LLH & Associates was the primary contractor on this

11

contract, which sub-contracted the work to eTreppid. The contract was a Top Secret contract. In

12

order to prove my exclusive ownership of the technology involved in Eagle Vision and differentiate

13

it from any of the technology on CD No. 1," I will require the depositions of all individuals

14

involved in this project, together with all of the documentation. I believe that Trepp probably

15
16

identified this sole SAP contract in his Complaint without specifically identifying as such, but as an

17

LLH contract because during this time frame Trepp was actively using other eTreppid employees

18

to attempt to gain access to my codes through reverse engineering and our conflict was rapidly

19
20

intensifying. The national security concerns expressed in the Negroponte declaration apply to Eagle
Vision.

21
22

25.

Detecting and Tracking Submarines. In mid 2005, I was approached by Michael

23

Carter from the Naval Research Center. He provide me several high altitude satellite photographs of

24

the ocean and asked if I could detect any anomalies with my ODS. The area covered

25

approximately 100 square miles of ocean. I detected two objects in the photographs and reported

26
them to Carter and to Paul Salvatori who reported them to other Navy officials. Carter and Salvatori
27
28

told me that this was the first time software technology had detected a submarine under water.
-15-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page51200
of 75
of
224
They then told me that the Navy would set up a series of tests and that the most difficult test would
1
2

be in September, 2005. Between September and October, 2005, I used my technology to perform
the tests. I was told that the tests were remarkably accurate and that the Navy intended to purchase

3
4

the technology as soon as possible. In October, 2005, Paul Haraldsen informed me that he was

negotiating with Trepp and understood that Trepp and I were in some type of conflict. He assured

me that my interests would be protected and acknowledged that the technology was mine.

Haraldsen said One Hundred Million Dollars had already been approved for the technology. In

September through December, 2005, Trepp began to pressure me for the source codes for my

9
10

ODS, which, of course, I had always protected from everyone. When I refused to give Trepp the

11

codes, he began to threaten me with using his political influence with Gibbons to bury me; and

12

to use his connections to the Bonnano family, as hereinafter described. A detailed description of

13

my conflict with Trepp is contained in my answers to Trepps interrogatories, attached to my

14

opposition to the motion for a protective order.

15
16

26.

In order to prove my exclusive ownership, possession, custody and control of my

17

technology used with the CIA, the Air force, the Navy and USSOCOM, and the preservation of the

18

secrecy of the technology from Trepp, the Government and all eTreppid employees, and in order to

19
20

defend against Trepps spurious Trade Secret claims requiring preservation of the secrecy of the
trade secret, by me alone, I will have to discover all of the relevant documents, and depose all of

21
22

the involved individuals from the CIA, the Air Force, USSOCOM, and the Navy relating to the use

23

and application of my technology as recited above. These include but are not limited to: Paul

24

Haraldsen, Edward Charbonneau, Sid Smith, Johann Kim, Peter Wiedemann, all individuals listed

25

on the list given to me by Ed Charbonneau from the CIA, and all of my contacts in Iraq and in the

26
US relating to the London, Madrid and the Iraq bombings, James Gibbons, Ronald Bath, individuals
27
28

inside the Air Force involved with Bath and Gibbons and all others inside the Government who
-16-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page52201
of 75
of
224
tried to steal my technology at the behest of Trepp, Bath, Haraldsen and Gibbons. I will require the
1
2

regular briefings given to the President in order to determine how my technology was described
and characterized, how it was used and applied, and to calculate all my damages resulting from the

3
4

failure of the Government to pay me royalties knowing it belonged to me.


The DoJs Use of the Big Safari Contract to Permit Discovery is a Ruse.

5
6
7
8

27.

The DoJ and Ms. Wells in their motion for a protective order, refer to their agreement

to allow discovery in connection with the Big Safari contract. This is just a ruse. That contract and
the discovery they plainly intend to allow relates to the purchase of air conditioners for the blade

9
10

servers brought in by the FBI. That contract has no national security implications and none relating

11

to the ownership and possession of my technology. Referencing it as an example of how and why

12

discovery can proceed in these matters is disingenuous in the extreme.

13
14

Sealed Search Warrant Matters Relevant to National Security Issues


28.

Each and every relevant and material fact in Agent Wests affidavit filed in Court to

15
16

obtain a search warrant to raid my home and storage are materially false either by intentional

17

deletion, omission, mis-statement, or outright fabrication. The local Reno FBI raided my home on

18

the pretext that I had unlawfully taken classified information which posed a threat to our national

19
20

security. This was just a bold-faced fabrication to justify the theft of the technology I have described
herein. Paul Haraldsen knew that the so-called palm trees tapes - the pretext for the raid - were

21
22

neither classified or taken by me. The FBI, Haraldsen, and Trepp all knew that I had only

23

conveyed to eTreppid - the Company I own with Trepp, and now others, (that Trepp has

24

mysteriously and questionably brought in, including Michael Milken), the data compression

25

technology contained on CD No. 1". Yet West deleted this phrase from his affidavit, then omitted

26
the very next paragraph reciting that none of my other technologies were conveyed. Then he
27
28

explicitly deleted the phrase in eTreppids Operating Agreement proving that I was not subject to a
-17-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page53202
of 75
of
224
non-compete agreement and stated in his affidavit that I was. Then he swore under oath that I was
1
2

an employee from 2000 to November, 2001 when I assigned the patents he lists - a complete
falsehood; and he recites that Venables had access to my source codes when Venables had admitted

3
4

under oath three weeks before that he didnt. Now, the Government is asserting the state secrets

privilege in the civil cases after admitting in the criminal matter that no classified information was

stored at eTreppid and thus, I was not in possession of any. Yet, in these civil cases it is

representing to the Court that information involved in these cases involves an exceptionally grave

danger to the national security of the United States. I do not believe that the upper levels of our

9
10

Government, including John Negroponte, have been fully advised of the machinations and illegal

11

conduct of Trepp and the local FBI, or of the issues involved in these matters, and that the local

12

Nevada Government authorities aided my home because of the political influence of Trepp.

13

Perhaps, this explains the apparent discrepancy between the Negroponte public declaration and

14

the DoJs motion for a protective order. I raise these search matter issues herein as an explanation for

15
16
17
18
19
20

the discrepancy. I have potential claims arising out of the misconduct of the local Nevada officials.
29.

Agent West falsely led the Court issuing the search warrants to believe that there was a

non-compete agreement then in existence preventing me from using my source codes in


competition with eTreppid, knowingly deleting the explicit phrase stating that there was no noncompete agreement. Again, this conduct was material and intentional to steal my technology.

21
22

30.

I have never received any form of notice whatsoever from any Governmental agency

23

that my Top Secret SIC security clearance has been suspended or revoked. My security clearance

24

can only be revoked by the appropriate Governmental agency. Yet, Agent West falsely stated in his

25

search affidavit that my clearance had been suspended and that eTreppid possessed a clearance to

26
store classified information. These compounded falsehoods were manufactured by Trepp, Patty
27
28

Gray, Sloan Venables and West in order to raid my home on the false allegation that I unlawfully
-18-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page54203
of 75
of
224
retained classified information. After being challenged with my Rule 41 (g) Motion, as stated
1
2

above, the Government then admitted that there was no classified information taken by me or in
the possession of eTreppid. In the event these cases proceed, I will continue to make decisions and

3
4
5
6
7
8

utilize the information referenced in paragraph 11 of the Negroponte declaration based on my


possession of a Top Secret SIC security clearance.
31.

I view the search warrant lies and illegal conduct by my Government to be a result of

the local political connections between Trepp, James Gibbons, Daniel Bogden, and Ronald Bath,
but I do not know how far this corruption rises inside our Government. I have reason to believe that

9
10

certain high level Government officials, including, the President, Vice-President, Mr. Negroponte

11

and others have not been influenced by the political power of Trepp; but I also have reason to

12

believe that some Air Force officials have been influenced by Ronald Bath, and that they have

13

influenced others in the DoJ.

14

32.

Warren Trepp is an extremely powerful and connected individual in Nevada due to

15
16

his large political contributions. I have attended functions, a cruise, dinners, etc with Trepp and

17

James Gibbons. I have observed Trepp, once heavily intoxicated on a cruise, give Gibbons casino

18

chips and cash of approximately $100,000.00 Dollars. I have heard them discuss funneling

19
20

money in $10,000 dollar increments to Gibbons thru Trepps various entities. I have heard Gibbons
say words to the effect that given Trepps questionable background and the source of his

21
22
23
24
25

donations, the less people identify Trepp as one of his donors the better.
33.

Trepp is also a long term close associate of the Bonanno Family of the New Jersey mob

family bearing that name - dating back to at least Trepps Drexel days when Trepp and Michael
Milken, who went to prison in connection with his junk bond scams, invested money for the

26
Bonannos. Trepp threatened me with the Bonannos and I have fears for my life because of that
27
28

association. The Bonannos have close ties to Jack Abramoff, the Republican fund raiser, as does
-19-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page55204
of 75
of
224
Warren Trepp.
1
2

34.

I have participated in numerous meetings with Air Force General Ronald Bath, Trepps

consultant and Trepp. Gibbons and Bath, both Air Force and Nevada Air National Guard pilots

3
4

are the basis for Trepps political influence in Nevada and within the Air Force. In November, 2005,

in one of my many fights with Trepp over licensing my technology used in the special Government

contracts, Trepp threatened to bury me with his political influence over Bath and Gibbons. I

believe the FBI/Air Force raid on my home and property was the result of that influence to steal my

technology for Trepp. Gibbons has admitted that he initiated the criminal investigation against me.

9
Claims I Intend to Bring Not Yet Filed

10
11

35.

The fact that Trepp and Gibbons improperly influenced the FBI to raid my home and

12

that they have continued to conduct surveillance on me, including what I believe to be illegal

13

physical and electronic surveillance, including eavesdropping and wiretapping, leads me to believe

14

that they have used their secret surveillance program on AT&T customers to intercept my phone

15
16

records. I have been an AT&T customer. If this litigation is to proceed, I will intervene in the case of

17

Hepting v AT&T as a Plaintiff against AT&T and the Government. I will also bring claims similar to

18

those brought in the AT&T case in this Court. In that action, I understand that the Government

19
20

intervened and sought to dismiss the case based on the state secrets privilege.
36.

I also intend to bring claims under the Federal Tort Claims Act; and I intend to file

21
22
23
24
25

claims against various state and federal officers and employees in connection with the matters set
forth herein.
37.

At this point, given the unconstitutional raid on my home, which had a severely

damaging effect on my wife of 32 years and three children, I do not trust the State of Nevada, I do

26
not trust the US Government or any of its branches, agencies, divisions or departments. I am certain
27
28

that Gibbons, Bath, Haraldsen and others have used their political influence to corrupt the system;
-20-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page56205
of 75
of
224
but I am hopeful that the Judges hearing this matter will follow the law and apply the law to the facts
1
2

I declare under penalty of perjury under the laws of the United States and the State of Nevada

3
4
5

that the foregoing is true and correct. Signed this 30th day of October, 2006 in Seattle,
Washington..

6
7

________________________________
Dennis Montgomery

8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-21-

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page57206
of 75
of
224

Exhibit 5

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page58207
of 75
of
224

Contact Us Submissions - New Item


Page 2 of 2
Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page59208
of 75
of
224
Fax: (305) 536-5058
Email: Scott.Nirk@sba.gov
DoD Guide for Small Businesses: http://www.acq.osd.mil/osbp/index.shtml

Staff Contacts
J1 Manpower: 305-437-1117
J2 Intelligence: 305-437-3720
J3 Operations: 305-437-3331
J4 Logistics: 305-437-1400
J5 Strategy, Policy, and Plans: 305-437-1507
J6 Communicat on Systems: 305-437-1604
J7 Theater Engagement: 305-437-1588
J8 Resources & Assessments: 305-437-3829
J9 Partnering: 305-437-1019
Chief of Staff / Secretary of the Joint Staff: 305-437-1006
Command Chaplain: 305-437-3429
Command Surgeon: 305-437-1327
Congressional Affairs: 305-437-1020
Headquarters Commandant: 305-437-3102
Judge Advocate: 305-437-1304
Protocol: 305-437-1139
Reserve Affairs: 305-437-2719

| U.S. Army South| U.S. Naval Forces Southern Command/U.S. 4th Fleet| 12th Air Force and Air Forces Southern| U S. Marine Corps Forces, South| Special Operations
Command South| Joint Task Force Guantanamo| Joint Interagency Task Force South| Joint Task Force Bravo| Western Hemisphere Institute for Security Cooperation| William
J. Perry Center for Hemispheric Defense Studies| Naval Small Craft Instruction & Technical Training School| Inter American Air Forces Academy

ABOUT

FOIA

MISSIONS

WORK WITH SOUTHCOM

Visiting SOUTHCOM

FOIA Main

Building Partner Capacity

Work with SOUTHCOM Main

SOUTHCOM Component Commands & Units

FOIA Contact

Contingency Response

Employment

Leadership/Staff

File FOIA Request

Detainee Operations

SOUTHCOM Operational Contract Support

History

Freedom of Information Act

Countering Transnational Organized Crime

Public / Private Cooperation

Area of Responsibility

FOIA Reading Room

Missions Main

About Main

| DoD OPEN GOV| FAQ| DEFENSE.GOV| ACCESSIBILITY/SECTION 508| USA.GOV| NO FEAR ACT| EXTERNAL LINK DISCLAIMER| PRIVACY & SECURITY

http://www.southcom.mil/Lists/Contact%20Us%20Submissions/Item/newifs.aspx?List=ffe... 4/27/2015

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page60209
of 75
of
224

Exhibit 6

U.S. Central Command | Contact Us


Page 1 of 2
Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page61210
of 75
of
224

Home | Contact Us

Contact Us
U.S. Central Command
Address:
7115 South Boundary Boulevard
MacDill AFB, FL
33621-5101
USA
MacDill AFB Base Operator
(813) 828-1110
MacDill AFB Base Locator:
(813) 828-2444
Central Command Communications Integration Public Affairs (CCCI PA)
For Public Affairs
(813) 529-0214
DSN: (312) 529-0214
For Media Queries
(813) 529-0220
(813) 529-0213
After hours: (813) 966-8937
For Community Relations Questions
(813) 529-0235
(813) 529-0218
CENTCOM Reserve Affairs
Army: (813) 529-1074
Air Force: (813) 529-1004
Marine Corps: (813) 529-1088
Navy: (813) 529-1098
CENTCOM Inspector General
(813) 529-0275
MacDill AFB Public Affairs
(813) 828-2215

http://www.centcom.mil/en/contact-us-en

4/27/2015

U.S. Central Command | Contact Us


Page 2 of 2
Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page62211
of 75
of
224
ISAF Public Affairs
ISAF HQ Public Affairs Office in Kabul
pressoffice@hq.isaf.nato.int
+93 (0) 700 13 - 2114 / 2928 / 2482
ISAF Joint Command Public Affairs Office
ijc.media@afghan.swa.army.mil
jcmediaopsnu@apod-kaia.isaf.nato.int
+93 (0) 799 51 3999 (Wait For Voice Prompt) 688-4441/4447
+93 (0) 701 13 2000 (Wait For Voice Prompt) 318-449-9244/9153/9154
NATO Public Information Office
Media Operations Center
NATO Headquarters
Blvd Leopold III
1110 Brussels, Belgium
moc.web@hq.nato.int
U.S. Department of Defense
Public Affairs
703-697-5131

http://www.centcom.mil/en/contact-us-en

4/27/2015

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page63212
of 75
of
224

Exhibit 7

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page64213
of 75
of
224
From:
To:
Subject:
Date:

james risen
Sectec Astronomy
Re: Agency
Thursday, November 01, 2012 1:44:59 PM

If you give us the Brennan emails, we will write a story


On Thu, Nov 1, 2012 at 4:34 PM, Sectec Astronomy <theagencyinsider@hotmail.com>
wrote:
Hard to imagine that you guys would ever report on anything negative regarding
Obama?
DM made it clear who was at the building, and why they were all there. There is a
reason the CIA and NSA were there, you must know that.
Do you really think the government invoked the State Secrets Priviledge from beiing
embarrassed or conned? Negroponte in his in camera declaration, if ever released,
was spell it all of out.
They governemnt never wanted information to come out regarding the other
work. The program started out spying on terrorist, and under Obama quickly moved
to spying on Americans!! A program which was started by Brennan in 2003 and
continues to this day. This technology is being used today to spy on Americans,
including candidate Romney.
I don't see you ever publishing that information?
Date: Thu, 1 Nov 2012 16:07:07 -0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Hi. As you recall, we had a very long phone conversation recently where we
discussed how it would be good to report on many of the things that we didn't
report on previously. I would like to include all of the points that you have raised in
my book, and also to write about many of these issues in the newspaper. For the
newspaper, I am particularly interested in the issue of Brennan, and his emails and
related documents, which you said when we last talked that you might be willing to
share with me. So I am open to discussing everything with you.
Jim
On Thu, Nov 1, 2012 at 3:58 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
You didn't answer my question:

You reported on FBI documents, as if they were accurate, when that the
Judge tossed out all of the claims in their report. The FBI refused to
produce any of the people in their report for examination by the court.
That include Daniel Bogden, who was reinstated by Obama as the US
Attorney for Nevada.

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page65214
of 75
of
224
Why did you not mention in your story Judge Cooke scathing report
against the Warren Trepp, FBI, and other government officials? Judge
Cooke reported that DM had his 4th admendment constituional rights
violated?
How can I ever trust that you will report accurate information when your
prior story was based on information provided to you by Mike Flynn my
ex attorney?

Date: Thu, 1 Nov 2012 15:21:02 -0400


Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
I have tried West and Venables. I am writing a chapter in my book
about all this largely because we weren't able to tell much of the story
in the paper. I would like your input, and your voice in the chapter.
On Thu, Nov 1, 2012 at 3:16 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
DM doesn't need another hachet job on him. Have you
tried Agent West or Sloan Venables?
You reported on FBI documents, as if they were accurate,
when that the Judge tossed out all of the claims in their
report. The FBI refused to produce any of the people in
their report for examination by the court. That include
Daniel Bogden, who was reinstated by Obama as the US
Attorney for Nevada.
Why did you not mention in your story Judge Cooke
scathing report against the Warren Trepp, FBI, and other
government officials? Judge Cooke reported that DM had
his 4th admendment constituional rights violated?
This is so much you guys missed.

Date: Thu, 1 Nov 2012 14:54:31 -0400


Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Well, I would like to write more about him and everyone
else involved in my book now.

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page66215
of 75
of
224
On Thu, Nov 1, 2012 at 12:51 PM, Sectec Astronomy
<theagencyinsider@hotmail.com> wrote:
His role? He is the CEO of eTreppid. He got all
of the money. Why was he not in your story?
Date: Thu, 1 Nov 2012 12:36:09 -0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
I have tried to talk to Warren Trepp. If you
have any information about his role, I would
like to talk to you about it.
On Thu, Nov 1, 2012 at 12:18 PM, Sectec
Astronomy <theagencyinsider@hotmail.com>
wrote:
Why have you not chased the
money, and contacted Warren
Trepp who kept all of the money?
I don't get that?
Date: Thu, 1 Nov 2012 11:41:01 0400
Subject: Re: Agency
From: jrisen31@gmail.com
To: theagencyinsider@hotmail.com
Both. We discussed how you have
information that would be very
good for a story about his
involvement.
But I also want to talk to you more
generally about your experiences
and work during the war on terror.
On Thu, Nov 1, 2012 at 10:55 AM,
Sectec Astronomy
<theagencyinsider@hotmail.com>
wrote:
Is talking to me or
Brennan emails what
your after?
What other information
are you after?

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page67216
of 75
of
224
Date: Wed, 31 Oct
2012 23:25:56 -0400
Subject: Re: Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com
I thought what we
discussed before was
really interesting, and I
would like to continue
our discussion. As I
mentioned, I am
writing about it in my
book, and I would like
to talk to you for
that.But I would also
like to talk about what
you said about
Brennan and the White
House.
On Wed, Oct 31, 2012
at 7:06 PM, Sectec
Astronomy
<theagencyinsider@hotmail.com
> wrote:
Regarding?
So DM
get attack
in another
article?
Date: Wed,
31 Oct
2012
16:47:58 0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page68217
of 75
of
224
Hi. Can we
talk?
Jim Risen
On Fri, Oct
5, 2012 at
6:51 PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
> wrote:
I
guess
you
can
investigate
what
I
disclosed
and
then
decide.
Date:
Fri,
5
Oct
2012
18:47:34
0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com
To:
theagencyinsider@hotmail.com
As
I
said
on
the
phone,
I

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page69218
of 75
of
224
protect
my
sources.
I
will
never
divulge
the
identify
of
my
sources
in
a
leak
investigation.
But
I
also
have
to
know
that
the
source
is
telling
me
the
truth.
Jim
On
Fri,
Oct
5,
2012
at
5:51
PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
>
wrote:

Before
documents
are
sent,

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page70219
of 75
of
224
you
agree
that
you
will
protect
Dennis
Montgomery
as
a
protected
source.
If
the
US
Government
attacks
Dennis
Montgomery
you,
and
your
organization
will
do
everything
possible
to protect
and
defend
Dennis
Montgomery.
Agreed.

Date:
Fri,
5
Oct
2012
17:32:30
0400
Subject:
Re:
Agency
From:
jrisen31@gmail.com

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page71220
of 75
of
224
To:
theagencyinsider@hotmail.com
got
it,
thanks
Jim
Risen

On
Fri,
Oct
5,
2012
at
5:11
PM,
Sectec
Astronomy
<theagencyinsider@hotmail.com
>
wrote:
This
is
my
email
address...

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page72221
of 75
of
224

Exhibit 8

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page73222
of 75
of
224

SOCOM & CIA


Visit 03/20/12
Location:
75180 Mediterranean
Palm Desert, CA 92211

Chris Pipes SOCOM

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page74223
of 75
of
224

Exhibit 9

Case
Case 1:15-cv-20782-JEM
1:15-cv-20782-JEM Document
Document 63-1
133-2 Entered
EnteredononFLSD
FLSDDocket
Docket06/01/2015
09/10/2015 Page
Page75224
of 75
of
224

You might also like