Merge pull request #2 from nhammer514/drb-python

Drb python
This commit is contained in:
nhammer514 2023-04-10 12:28:49 -04:00 committed by GitHub
commit 994ee16c32
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
677 changed files with 488631 additions and 0 deletions

View File

@ -0,0 +1,4 @@
# joinforc.xml wrapping
- ```Find: .+ / Replace with: <xml>\</xml>```
- ```Find: ^[A-Z].+Schulman$ / Replace with <meta>\0</meta>```
- ```Find: ^[A-Z].+JNS] / Replace with <meta>\0</meta>```

View File

@ -0,0 +1,136 @@
<?xml version="1.0" encoding="UTF-8"?>
The following article is reprinted by permission from the
Los Angeles Times of June 8, 1992. Reproduction on
computer bulletin boards is permitted for informational
purposes only. Copyright (c) 1992 by the Los Angeles
Times. All other rights reserved.
[Note: the following text is drawn from the original
manuscript; there are insignificant changes in the
published version. -- JNS]
JOINING FORCES AGAINST A COMMON FOE
by J. Neil Schulman
There are about 200 million guns in America in the
hands of about 60 million Americans. The sale of guns
nationwide following the Los Angeles riots has reached
record levels, many of them to first-time buyers. Firearms
training classes are filled to capacity. The National
Rifle Association currently has 2.8 million members -- ten
times the membership of the American Civil Liberties Union
-- and expects to exceed 3 million by the end of 1992.
Both advocates of gun control and advocates of gun
rights agree that there is an epidemic problem with the
criminal use of guns in America. But every time a gun-
control advocate points to the latest atrocity committed
with a firearm, the gun-rights advocate will surely ask:
why was there no armed citizen who could have tried to stop
the criminal?
The difference between the advocate of gun control and
the advocate of gun rights lies in a perception of the
cause of the criminal use of a gun. Those who advocate gun
control think the cause is wide and easy availability of
guns. The advocates of gun rights think the cause is a
legal system which leaves criminals free to prey on a
public which is socially discouraged, and often legally
forbidden, from using guns for personal defense.
The war over gun control is fought with news reports.
Advocates of gun control have no shortage of reports that
prove guns in the hands of criminals are a plague on our
society. Advocates of gun rights find, however, that the
use of firearms to prevent or stop a crime is often left
unreported by media which are worried that reporting gun
defenses will encourage irresponsible vigilantism.
The war over gun control is fought with statistics.
The number of gun attacks in the United States is easy to
compile: just count up the thousands of bodies in the
morgues, and the hundreds of thousands of gunshot victims
treated in hospitals. The number of times a gun is used for
defense, however, has a built-in problem: the use of a
firearm to deter, prevent, or stop an attack is unrecorded,
overwhelmingly because the defense was accomplished without
pulling the trigger, and less often, because the person
using the gun for self-defense was legally forbidden to be
in possession of it at that time or place, and thus did not
report it.
The war over gun control is fought with historical
debates about the intent of the Second Amendment. Those
who advocate gun control say the Second Amendment has no
Supreme Court ruling which defines the Second Amendment as
protecting an individual right of the citizenry to keep and
bear arms for personal defense. Those who advocate gun
rights say that the intent of the authors of the Second
Amendment, and the Fourteenth Amendment which would apply
it to the states, is indisputable, and it is a politicized
Supreme Court which does not have the courage to enforce
it.
It's likely that the only other issue with such
polarized and deeply felt world views is abortion. Oddly,
those who advocate the right of choice on abortion are
often the same people advocating eliminating the right to
choose firearms as a defensive option.
It's also likely that a final Supreme Court ruling on
the Second Amendment would fail to end the issue. A ruling
in favor of an individual rights interpretation of the
Second Amendment would probably coalesce gun-control
advocates into a movement to repeal the amendment. A
ruling against an individual rights interpretation of the
Second Amendment would alienate and radicalize the millions
of Americans who believe in that right as firmly as the
advocates of abortion rights believe in theirs.
As long as the advocates of gun control write laws and
court rulings that abridge the right of private citizens to
buy, own, and carry the firearms they feel are theirs by
right to have for defensive and sporting use, gun owners
will continue to be alienated and radicalized, and become
more and more willing to engage in civil disobedience
against such abridgements.
Advocates of gun control need to realize that passing
laws that honest gun owners will not obey is a self-
defeating strategy. Gun owners are not about to surrender
their rights or their guns, and only the most foolish of
politicians would risk the stability of the government by
trying to use the force of the State to disarm the people.
If gun-control advocates do not acknowledge the right
of the people to keep and bear arms for individual and
civic defense before they attempt to remove guns from the
hands of those who abuse them, then sensible gun laws will
be out of reach, and the criminal plague of gun victimizing
will continue.
Can't advocates of gun control see the advantage
of recruiting gun-rights advocates to a joint cause of
eliminating gun tragedies? We can all agree that guns
need to be kept out of the hands of the violent criminal
and the lunatic. We can agree that the solution to gun
accidents is safety training. We can agree that those who
own and carry firearms for protection must take
responsibility for knowing how to use them safely and
appropriately.
Surely, instead of fighting one another, we can join
forces to fight our common enemy: the armed criminal?
#
J. Neil Schulman is a writer, hosts a radio program on the
American Radio Network, and is founder and chair of the
Committee to Enforce the Second Amendment.


View File

@ -0,0 +1,358 @@
<xml><p>
I scanned this excerpt in from the book, "The Delicate Balance" ,
written by John Zajac. 1989-1990 . ISBN Number 0-910311-57-9 .</p>
<p>** Begin Excerpt **</p>
<p> Automation
----------</p>
<p>To understand how 666 relates to this discussion, one needs to explore
technology. One pertinent contributor to this technology is the
International Business Machines Corporation. <ent type='ORG'>IBM</ent> developed a laser method
of information transfer that has now become universally accepted. Lasers are
used for many different applications in society today, such as measuring
distances, detecting structural flaws, determining straightness, and so
forth. You can see the <ent type='ORG'>IBM</ent> system at your local supermarket quickly reading
prices and controlling inventory as it prints out a list of all purchased
items. Since checkers no longer have to punch keys on a register, check-out
time and errors are reduced. This system also provides the shopper with an
itemized receipt. That receipt information is stored in a central computer,
which keeps inventory and indicates what products the store should order, as
well as which products should no longer be carried.</p>
<p>But the use of automation is going considerably further. In fact, in <ent type='GPE'>Fresno</ent>,
<ent type='GPE'>California</ent>, one of eight regional test cities, a new computer system called
<ent type='ORG'>Behavior Scan</ent> gives shoppers a bar code card that is read at each purchase.
The computer then keeps a detailed list of all purchases made by a family,
including brands and quantity of each product. This same computer is also
attached to <ent type='ORG'>the user</ent>'s home television set to monitor what is being watched.
It then selects commercials to be shown to that customer to affect his
specific buying habits. While most customers claim that they are not
affected by these commercials, the advertising companies have spent a lot of
money on research proving otherwise. Is this the start of a more modern
version of George Orwell's "1984," the complete control depicted in Vance
Packard's 'The Hidden Persuaders' ? Certainly, computers are powerful and
indispensable tools. Thanks to computers, paychecks are deposited
automatically into checking and savings accounts at predefined rates while
many bills and loans are automatically paid on time every month. The system
works so well that many institutions give a discount on loans and insurance
payments if automatic payment is used (they are more confident that they
will be paid and on time). This can convenientiy save time, postage, and
worry. The world is positioned to facilitate the ever growing requirements
for increased automation and convenience.</p>
<p>The convenience of computers is everywhere. Even a simple inexpensive $3
watch contains a computer. No longer does it merely tell time; it also can
add and subtract, keep time in three different zones, give the day and the
date, and beep at predetermined intervals. Computerized voices in fancy cars
warn you if you have not fastened your seat belt, that your oil is low, or
that you are almost out of fuel. The proliferation of computers has created
a strong dependence on them, for real need and pure convenience. The average
<ent type='NORP'>American</ent>'s name is accessed 35 times a day by computer, and this is only the
beginning as we become plugged into the ever-growing system.</p>
<p>Our credit card system is also very convenient. Carrying cash is unnecessary
and sometimes useless, for example, when renting a car or cashing a check.
With a credit card, transactions are easier, and banks are now able (and
more then willing), to deduct payment of your credit card bill automatically
from your main account.</p>
<p>In fact, paper money soon may become a thing af the past for three reasons:</p>
<p>1. The government is concerned about the advances being made in color
xerographic technology. <ent type='ORG'>Advanced</ent> copy machines will soon be able to produce
counterfeit bills that are indistinguishable from government issues. The
<ent type='ORG'>FBI</ent> reported that up to 20 percent of people having access to advanced color
copiers will produce some counterfeit bills.</p>
<p>2. The successful introduction of <ent type='ORG'>the Smart Card</ent> in <ent type='GPE'>France</ent> and U.S. test
cities such as <ent type='GPE'>Washington</ent>, D.C., and <ent type='GPE'>Norfolk</ent>, <ent type='GPE'>Virginia</ent>, may render cash
obsolete. This <ent type='ORG'>Smart Card</ent>, manufactured by <ent type='ORG'>Motorola</ent> and <ent type='ORG'>Toshiba</ent> carries a
complete history of <ent type='ORG'>the user</ent>, including a physical description and health
record. The card allows direct payment to the seller by instantaneously
deducting the purchase amount and any service charges directly from the
cardholder's account. Thus, not only is the seller paid immediately but,
also, the card companies save millions of dollars by eliminating bad
payments and personal bankruptcy debts. Reducing credit card fraud should
also save card companies large sums of money. For example, MasterCard could
save $25 million annually by eliminating fraudulent cards. By the end of
1990, 20 million fraud-resistant cards will be in use in <ent type='GPE'>France</ent>. Seventeen
other countries have agreed to a standard card for all bank machines. <ent type='ORG'>Visa</ent>,
Eurocheque, <ent type='ORG'>Eurocard</ent> and MasterCard have already agreed to a method to make
their cards, systems, and money access interchangeable. Thus, by eliminating
checks and voluntary payments, the credit card industry would save 3.2
billion dollars per year.</p>
<p>3. <ent type='ORG'>The Federal Government</ent> is paying close attention to methods for taxing
the $300 billion underground economy in <ent type='GPE'>the United States</ent>. Unreported income
costs the U.S. Treasury $90 billion per year. If cash were eliminated,
computers could keep track of all income.</p>
<p>Evidence that cards may soon replace cash (and checks) was provided by <ent type='ORG'>Arco</ent>
service stations and Lucky supermarkets, which announced in September 1986
that their pumps and check-out stands now accept automatic teller bank
cards. With this system, payment is deducted electronically from <ent type='ORG'>the user</ent>'s
bank account before <ent type='ORG'>the user</ent> received his purchase. Within one month, 6400
service stations and supermarkets in 23 states were fitted with the system.</p>
<p>The gentlemen who came up with the laser reader in supermarkets for <ent type='ORG'>IBM</ent>
also invented the means of placing the same kind of bar code beneath living
tissue in one-billionth of a second. This marking is totally invisible to
the naked eye, and it can be read only by a certain type of laser. The
writing and reading is totally harmless and painless. The inventor
demonstrated this system in 1979 by marking salmon as they swam downstream.
The fish were totally unaware of the process as the laser burned a code into
their flesh. The computer then keeps track of the codes. Years later, these
fish will be detected by the same system as they swim back upstream and are
forced through fish ladders and chutes. *</p>
<p>Just as impressive is what Walter Wriston, the chairman of CitiCorp did in
1983. He passed a rule within the bank that was later withdrawn as a result
of public outcry. His rule stated that unless you were a depositor of $5000
or more, you were not entitled to a teller. This meant that the vast
majority of depositors would have to stand in line outside the bank and
"talk" to machines. This was an economic move, of course, because banks have
had some problems of late. But its message was that people would no longer
talk to people. If banks could establish such a policy, then they could make
the minimum deposit higher and higher. Finally everything for everyone would
be done by machines. The concern is that we are reaching a highly automated
state, which if followed to the next logical step might have profound
impacts on how we rate life.</p>
<p>Even more startling was an "off the cuff"' statement made by an other
chairman of an eastern <ent type='ORG'>megabank</ent>: He announced that a method is in place that
can imprint in human hands a silicon chip the size of the head of a pin.
That chip will include not only the person's identification number, Social
Security number, name and birthplace, but also his criminal background,
educational level financial worth in the community, and his political
affiliations.</p>
<p>* Such a system is currently manufactured by Taymar, Inc., Westminster, CO
The U.S. Agriculture Department uses the product for cattle. Will it be
used for people in the future?</p>
<p>With such a system, the minute someone walked through the door of the bank,
he would be sensed and the bank would know who he was, where he came from,
what he did, and how much he was worth. All this would occur before a person
could reach the counter.</p>
<p>Now this was one step further than even progressive thinkers envisioned.
There had been discussions about placing codes on the hand to be used as
identification marks, like fingerprints, similar to package bar codes in
supermarkets. With such a system you would not need cash or a validated
check or even a <ent type='ORG'>Smart Card</ent>. You could put your hand through a laser and be
read by the computer. The store would automatically deduct the amount of the
purchase from your account. The method would be efficient in terms of cost,
speed, thoroughness, and elimination of bad checks. * But the price of all
this automation is individual independence from nameless bureaucrats looking
over your shoulder and approving (allowing) every transaction.</p>
<p>The amount of control would be unprecedented: however, the government would
immediately know how to put this control to use. People would no longer be
able to cheat the government because every time anyone had any money, the
government would know about it. The government could collect taxes each time
you spent your money, and, thus, there would be no more filing on April
15th. It also means that advanced printing and photocopying machines could
not be used for counterfeiting. Even a law breaker who traded with stolen
goods would have his purchase and sale traced by computer as he tried to
move or "spend" funds. The government would monitor every transaction,
knowing precisely everyone's location, actions, and worth. Instant
evaluations, approval or disapproval, and tax deductions on every individual
would be made.</p>
<p>* Such systems are not in the distant future. Six thousand people in <ent type='GPE'>Sweden</ent>
have accepted a mark on their right hands in a test of a totally cashless
society. Tests also have been conducted in <ent type='GPE'>Japan</ent> and <ent type='GPE'>the Dominican Republic</ent>
in <ent type='LOC'>Latin America</ent>.</p>
<p>Small wonder that the government likes this idea.
Governments have always liked control. They would like to control
everything, even the areas they say they do not want to control, such as
business, transportation, education, religion, entertainment, and other
governments. If this sounds the least bit exaggerated just look at our
government's actions regarding the restrictions of business concerning tax
credit, labor laws, advertising, antitrust, and corporate subsidies. Even in
deregulation, transportation requires licensing, registration, inspection,
subsidies, price controls, flight approval, and government flight
controllers. Although there may be talk of eliminating the Federal
Department of Education there is no attempt to reduce control of school
curriculum, subsidies, and even school lunches. Most universities are
dependent on federal aid and research grants.</p>
<p>The government controls religion by granting tax exemption to "desired
religions" and by making it illegal to pray in school. The government
exercises control of entertainment by licensing and or censoring television,
radio, movies, and books. <ent type='ORG'>The Federal Government</ent> also seeks to control other
governments by rewarding or threatening them with trade concessions,
military or <ent type='ORG'>econonic aid</ent>, sanctions, or war. The highest people in
government, it would seem, want the government to have total control of
everything.</p>
<p>In Orwell's 1984, the government "took over," and everyone was controlled by
"Big Brother." In reality, government may take over, not through control of
transportation and censorship, but through the economy, the lending
institutions, and every financial transaction. Is it too far-fetched to
imagine that you may have to take a mark on your hand to be able to buy and
sell and exist in a modern society? The technology exists. The chairman of
the <ent type='ORG'>megabank</ent> was asked what it would take to motivate people to put little
pieces of silicon under their skin. He answered, "a major catastrophe." He
knew people would not do it voluntarily.</p>
<p>Of course if there was a financial or national emergency (catastrophe), the
government would exercise unprecedented control, and compliance of citizens
would be anything but voluntary.</p>
<p> <ent type='ORG'>Central Computing</ent>
-----------------</p>
<p>As mentioned earlier, the impact of computers on society has been enormous.
However, their likely future role may be overwhelming. As powerful as
computers are, their effectiveness is greatly multiplied when they can
communicate with other computers. For example, missile launch command
computers talk to U.S. Weather Bureau computers to update the possible
flight paths of thousands of Minuteman missiles every hour. Thus, to enhance
a system's capabilities, computers need to talk to computers. To sort out
the enormous amount of cross-references, a central computer is needed.</p>
<p>The central computer for <ent type='GPE'>America</ent> is in <ent type='GPE'>Texas</ent>, and the international computer
that ties all the national central computers together is situated in
<ent type='GPE'>Brussels</ent>, <ent type='GPE'>Belgium</ent>. The <ent type='GPE'>Brussels</ent> computer is housed in a 13 story building,
the first three floors of which are occupied totally by this system's
hardware. Because of its size. the <ent type='GPE'>Brussels</ent> computer is referred to
affectionately as "the Beast."</p>
<p>This immense computer has enough capacity to store every detail about the
lives of every human being on <ent type='LOC'>Earth</ent>, the information contained in the
Library of <ent type='ORG'>Congress</ent>, and every book ever printed. Having operated for years,
it stores a growing volume of information as additional countries tie into
it ever more heavily. This allows international banking, interstate banking,
and quick credit references. Money can be moved from <ent type='GPE'>New York</ent> to <ent type='GPE'>California</ent>
or <ent type='GPE'>London</ent> in minutes. If a deposit is made in a bank other than where the
check was drawn, banks usually impose a 5 to 10-day holding period.
Actually, this practice is just a means for banks to increase their "float"
and thus to increase their profits, since the money is transferred within
one day. What happens to the money for the other days? The bank uses it to
float shorter loans by which the bank earns interest. Banks typically wait
longer to issue credit because they want to use the money for as many days
as possible.</p>
<p><ent type='ORG'>Daily</ent> manipulation of funds by banks is common. Many banks are forced to
move their funds around the globe with the sun to have their reserves where
they are needed-in the banks that are open. Even the <ent type='ORG'>CIA</ent> likes the
capability of the central computer because it can check on personnel
mobility, foreign trading, and all financial transactions.</p>
<p>Many advanced computers are available with many designations, but one is
especially interesting. <ent type='ORG'>NCR</ent> produced a six-core memory computer with 60
bytes per word in conjunction with six bits to the character. It is named
and advertised as the 6-60-6 which defines the size and shape of the
computer. The only way this can be pronounced is six sixty-six (666). In
computer language, 666 has a unique significance.</p>
<p>A computer is an information retrieval system, and all of its information is
stored as numbers. A computer's memory cell has only two states-on and off,
or mathematically 1 and 0. Thus, every number must be represented in 1's and
0's. We use a decimal system based on 10; thus, it has 10 symbols: 0, 1, 2,
3, 4, 5, 6, 7, 8, and 9. Computers use a binary system using two symbols (0
and 1). To manage large numbers, computers use a binary coded decimal system
(<ent type='ORG'>BCD</ent>) which consists of groups of four digits, to make up all numbers. By
comparing the groups of number listed below one can find each system's
equivalent symbol. Thus, 0011, 0111, 0101 in the binary coded decimal system
is equal to our decimal system number 1375.</p>
<p> Decimal System Binary System</p>
<p> 0- 0000
1- 0001
2- 0010
3- 0011
4- 0100
5- 0101
6- 0110
7- 0111
8- 1000
9- 1001</p>
<p>(For various reasons, some computers use Base 8 (0-7) and therefore do not
use the last two symbols shown.)</p>
<p>As shown in the <ent type='ORG'>BCD</ent> system, the number 6 is represented by 0110. This is
unique because 0110 written backwards or upside-down is still 0110. The
only other number in the <ent type='ORG'>BCD</ent> system with the same property is its complement
1001, or 9. (However, not every computer counts past 7.) This consistency is
the same in every country in the world, unaffected by language because every
computer speaks the same language of "1's" and "0's." Thus, 011001100110
is 666 universally.</p>
<p>In the Book of Revelation; John said that 666 is the mark of the beast. This
number also represents the universal consistency of the computers that will
be required to control the world's finances and thus the world's people.
When John wrote 1900 years ago, he did not know anything about the binary
number system, computers, or why computers would require binary coded
decimals. Yet, he stated emphatically that the mark of the beast is 666.</p>
<p>Is this to say that the endtime beast is merely a building located in
<ent type='GPE'>Belgium</ent>? No! The <ent type='GPE'>Brussels</ent> computer is no more the beast than a general is
an army. The significance is that computerization for financial dominance is
the financial beast. The beast is a false god and the worship of that false
god. Worship means "worth respect." A false god does not have to assume the
figure of a man: It is the physical representation of that which controls,
that which is worshipped. So, if people worship the "$" symbol too much for
what it can acquire, influence, or accomplish, then that can qualify it as
the false god. The <ent type='GPE'>Brussels</ent> computer is only the figurehead of a vast,
soon-to-be indispensable financial network that will control all financial
transactions and thus all business and people.</p>
<p>He who controls the system controls all. What is feared by some is that
whoever is in control wiil demand that all take the code (mark) on their
hand to be able to buy and sell. Money, credit cards, and checkbooks would
be totally eliminated. Everything would be done through the government,
through the computer, giving the government total control. The greatest fear
is that when receiving the mark, you also may be forced to pledge allegiance
to your flag and (as in the days of kings) to your ruler, but in this case
the world leader would be the Antichrist. Of course, to have allegiance with
the Antichrist is to make a pact with the Devil. If you think that this
unified system is very far away, then you have missed some intriguing news
items.</p>
<p>As you probably are aware, the government has been talking about a national
identification number for some time. It is supposed to make record keeping
easier and to provide a means of crosschecking. It will help find deserting
husbands who owe child support as well as locate tax evaders. Most people
anticipate that the <ent type='ORG'>Social Security</ent> number will play a part in this national
identification code.</p>
<p>The government's system for identification uses 18 digits, the last nine of
which are the <ent type='ORG'>Social Security</ent> number. Virtually every citizen in the country
over the age of 1 will be forced to have a <ent type='ORG'>Social Security</ent> number. At
present, a <ent type='ORG'>Social Security</ent> number is necessary to have a job or a
savings/checking account. Starting 1990, every child over one year old must
have a Sociai Security number to qualify as a dependent on tax returns.
Preceding this 9-digit <ent type='ORG'>Social Security</ent> number are 3 digits corresponding to
one's telephone area code. Obviously, the whole world is tied by phone; even
barren deserts with no inhabitants have area codes. In front of these
numbers is a country code; for <ent type='GPE'>America</ent> it is 110. From this single
universally consistent number, the government will instantly know a person's
country, region, and identity. Does that seem logical so far? But that
accounts for only 15 digits, and the system is based on 18. The missing
3-digit code specifes that you are in the system: 666.</p>
<p>All computerized companies are going to 18-digit identification codes.
According to the report '666 Is Here,' <ent type='ORG'>Sears Roebuck</ent> is going on this system
and is committed to changing over all its credit cards. J.C. <ent type='ORG'>Penney</ent>'s is
reported to be switching over, as well as <ent type='GPE'>New York</ent> Telephone. The U.S.
Government used to prefix all the serial numbers of everything it owned with
the code 451. But that also is changing; the dog tags on every soldier in
<ent type='GPE'>America</ent> are to be converted to 666.</p>
<p>Is that enough to concern you? The point is that 666 is a significant and
important part of what the future is going to hold. The Bible prophesied it.
<ent type='ORG'>Nostradamus</ent> explained it, and we are presently at the very edge of seeing it
become enacted. Rumors abound about people receiving checks with these
marks, governments admit they need better financial control, and the
chairman of one of the largest banks says, "It's ready; we just need a major
catastrophe."</p>
<p>** End Excerpt **
</p></xml>

View File

@ -0,0 +1,157 @@
<xml><p>Title: The Proven existance of 9 dimensional planes</p>
<p>Intro: In order to understand these files, one must assume the following is
completely true. If not assumed, one will be completely lost in the text of
the following files. You may laugh if you wish, but if you want to understand
the theory you must make compensations on your part. Ok, on with the file...</p>
<p>Volume I: Defining the 9 planes</p>
<p>Written by: Starmaster and Locust</p>
<p>1st dimensional plane: This plane consists of only the single dimension
of length. It is not advised to try to envision this dimension for it may
cause insanity, seriously.</p>
<p>2nd dimensional plane: This plane consists of both length and width. It
is not adviable to envision this either. The first and second planes are
not the same as the fourth dimension and are uncomprehendable except by
entities "living" in that plane of thought and sight.</p>
<p>3rd dimensional plane: This is the plane of depth. This one is easily
imagined by 4th dimensional entities, because they are so close to it, and
had just passed out of it.</p>
<p>4th dimensional plane: This is the plane that the entities that we call
beings "live" on. It consists of the forward movement of time. It is the one
we are on right now.</p>
<p>The cross-over: This is a place where the 4th dimensional entities make their
way into the 5th and above. It is often refered to as death, yet it is only a
cross-over point. At this point, all knowledge of the 4th and below
dimensions is lost.</p>
<p>5th dimensional plane: This plane consists of the backwards movement of
time. Although considered impossible by 4th dimensional entities, those
entities are only thinking in the 4th dimensional phase. Remember everything
else from here on out is done in metaphysical thinking.</p>
<p>6th dimensional plane: This is the plane of clairvoyance. Remember, all of
this you must assume, or no comprehension of the later explanations
will be understood. Not much is known about this plane, except you "inhabit"
the sense of clairvoyance.</p>
<p>7th dimensional plane: This is the plane of telekinesis. This is even less
understood than the plane of clairvoyance, yet it does exist. This
often thought of as "supernatural", when in fact it a real thing.</p>
<p>8th dimensional plane: This is the plane of perception. It is the highest any
entity can evolve to. It consists of all the planes from five and up.</p>
<p>9th dimensional plane: God. Refered to by many, but understood by few. All
cultures and beings, be it from our world or others, have this vision. God
created all life, so all life lives by him.</p>
<p>These are the explanations of all the dimensional planes. Dimensional planes
are achieved by the evolution of the mind/soul/entity, which are all the
same thing. Evolution is a continual learning process. As we evolve we
understand more, yet raise more questions. This theory is to help those
understand the answers to many questions concerning God and the
"supernatural". One thing is assumed. We are not the only lifeforms in this
universe. All lifeforms were created by God, and will evolve through the
process God laid forth unto us. The universe is infinitely large, which
shows God's power is also infinitely large.</p>
<div>-----------------------------------------------------------------------------</div>
<p>Volume II: Explanation of the Planes and their signifigance to the supernatural</p>
<p>Intro: This is the second part to the previous file on the proven existance of
9 dimensional planes. As stated in the last phile, one must assume all things
true in order to understand and comprehend the intensity of this phile. This
one will deal with the questions brought about by the theory itself.</p>
<p>One thing must be understood in this file. All the entities, in all the
dimensional planes, co-exist with one another in this one universe. There is
but one universe, in which all entities live in. There are no "outside"
universes. Everything co-exists in this one universe.</p>
<p>Explanation of "Insane Persons":</p>
<p>An insane person is thought of as a person without the ability to think clearly
and comprehend things on a 4th dimensional basis. They are not "insane". That
is a term 4th dimensional entities give to those entities which are not on the
the same thought plane that the other entities are on. Every plane is just a
level of thought process. In the past file I stated that evolution is a
continuing process of learning. The "insane" persons of a 4th dimensional
community are not on the same thought plane we consider ourselves on.</p>
<p>Explanation of "supernatural" powers</p>
<p>This deals with the idea of persons who are able to channel their psychic
powers to do physical things. This also deals with fortune tellers and People
who can see the future, i.e. <ent type='ORG'>Nostradameus</ent>. These occurances are also explained
by the thought level that these entities are on. They are actually 6th or 7th
dimensional beings stuck in a 4th deminsional body. Because 99.8% of the
population of the 4th dimension only thinks in 4 dimensions, they are often
considered "supernatural", "witches", "prophets", ect. You then will ask, if I
came up with this, how come I can't bend spoons with a thought. The answer is
simple. I am now just discovering this phenomenon. I have an upbringing of this
not really happening, but being a science-fiction thing. The people who do know
how to do these things have been concentrating all their lives to use this
"super" power givin to them by God. If everone thought on the 8th dimension,
there would be no use for a God. It is all a process of learning and
comprehending.</p>
<p>Explanation of "Ghosts, Spirits, and <ent type='NORP'>Poltergeists</ent>"</p>
<p>This is about the simplest thing to explain. As I stated above, all entities
co-exist in the same universe, for there is only one, which is infinite.
Sometimes, 4th dimensional beings see things they aren't "supposed" to see.
People are brought up with the idea ghosts are science-fiction, when in fact
they are a real thing. Sometimes these entities are accidently crossed back for
a few seconds, years, or minutes.</p>
<p>Explanation of Heaven or <ent type='GPE'>the Kingdom</ent> of God</p>
<p>This is fairly easily comprehended, if one thinks beyond the 4th dimension. It
is but the enternity at the other side of the cross-over. What do you think the
"light at the end of the tunnel" is? It is the "other side" or 5th dimension.
People lose their physical bodies and are "able to fly" around. This also
explains the angels 4th dimensional beings continually say are immortal.</p>
<p>Explanation of Immortality</p>
<p>Immortality is an easily comprehendable concept, if one thinks of a positive
charge and a negative charge. When thrown together, they cancel each other out.
This is the same priciple when you combine forward and reverse time together.
After you make the cross-over, your mind adapts to backwards time, yet when
backwards time collides with forward time it cancels it out. Therefore the
state of immortality is reached.</p>
<p>The one constant</p>
<p>There is but one constant in all the dimensions. <ent type='ORG'>Plank</ent>'s constant is only
valuable in 4th dimensional science and so is the speed of light. There is only
one constant in all of the 9 dimensions. It is the emotions. No one can explain
emotions except this phile. Emotions are the only constant of the co-existant
universe. Think about it. Why do you think the "ghosts" are happy, sad, angry,
ect., ect., when you see them. It is because of the power and intensity of the
emotional constant. When emotions of the 5th and above dimensional entities
gains great intensity, it then is transfered to all other dimensions.</p>
<p>That about does it for this file. That pretty much explains everything that I
can think of dealing with the unexplainable. If you can think of any more,
leave mail on Centre of Eternity for Starmaster (#75). I will ponder for the
answer, until I can get a suitable one using this theory. None will be turned
away. Who knows, maybe I'll get enough quetions to write another phile. <ent type='ORG'>Slatez</ent>
dudes.</p>
<p><ent type='NORP'>Greets</ent> to all metaphysical thinkers. This should answer some of your questions.
-------------------------------------------------------------------------------
<ent type='ORG'>Call Centre</ent> of Eternity-(615)552-5747/ 40 megs on-line/ 12/2400 baud.
HQ of <ent type='ORG'>The Esoteric Society</ent> and Toxic Shock
Call Ripco-(312)528-5020/ 12-9600 baud/ 60+ megs on-line
-------------------------------------------------------------------------------
</p></xml>

View File

@ -0,0 +1,512 @@
<xml><p>The A-Z of Conspiracy
As everyone knows, we are never allowed to know who is really
controlling our lives/the country/the world. But is this knowledge a
dangerous thing? To clear up this question beyond reasonable doubt
Life provides a comprehensive guide to the theoretical corridors and
sinister back offices in which true power (and general paranoia) may
(or may not) lie
02/12/95
THE GUARDIAN
Conspiracy theories are the will-o'-the-wisps of the modern
world. They provide an alternative history to the authorised
version of events, a coherent demonology in a godless, devil-less
age.
Conspiracy theories fill a human need. They make some sense of
the cruel narrative that is the 20th century. They turn the random
violence of a lone madman into an act of orchestrated malice. In
this way the loss of a figure like Kennedy becomes somehow more
comprehensible. To be angry is more bearable than to be uncertain.
This soothing function can be at odds with truth, however.
Alternative conspiracist history is as flawed as the `authorised'
version. Worse, a conspiracist view can suppress awkward pieces of
information by toying with the notion that events have been covered
up by the authorities to suit their own ends: encounters with alien
space ships, the real makers of the <ent type='GPE'>Lockerbie</ent> bomb and the truth
about Rudolf Hess have all been hidden from the public but the
higher officers of the state are in the know.
Some of the conspiracy theories which date from earlier this
century have more ignoble, murkier origins. Anti-semites were
behind the Protocols of the Elders of Zion, the <ent type='NORP'>Jewish</ent> Conspiracy
and countless others. Their modern equivalents are put about by
neo-<ent type='NORP'>Nazi</ent> cliques. Again, these conspiracy theories have a human
function. Failure in life is more bearable if `the truth' is that
the <ent type='NORP'>Jews</ent>/the blacks/the <ent type='ORG'>Illuminati</ent> have conspired against you, it
allows you to ignore the fact that you are a spotty social
inadequate with bad breath and too-tight <ent type='ORG'>lederhosen</ent>.
The conspiracy theorist is the bane of the working journalist.
The need for some sliver of evidence to support assertions is
secondary to the spell of the theory: that, for the conspiracy
theorist, is its charm. This difficulty is compounded by the fact
that not all conspiracy theories are untrue. Those in power across
the world do prefer to keep embarrassing truths secret; they do
cover up; they do, from time to time, kill people who get in the
way.
True or not, a rattling good conspiracy theory requires the
following qualities:</p>
<p> 1 it must be difficult, better still, impossible, to understand
at first glance.
2 it must contain a spaghetti-heap of leads, all of which cannot
be followed up. There must always be one more lead left to chase.
3 The story should speak to a `wider' truth about our society,
through a series of disconnected or unconnected or unfalsifiable
propositions.
4 There should be no easy way of verifying it.</p>
<p> The theories below demonstrate all of these qualities to a
greater or lesser degree. To savour our A-Z properly, we suggest
readers mull over it with deadpan credulousness in the small hours
of the morning listening to the theme music from The X-Files and
drinking black coffee.
A IS FOR ALIEN ENCOUNTERS that are being covered up by the
authorities. Perhaps the best-documented close encounter of the
third kind took place on 27 December 1980, when airmen at two <ent type='ORG'>RAF</ent>
stations in <ent type='GPE'>East Anglia</ent> witnessed something extraordinary. First
radar operators at <ent type='ORG'>RAF</ent> Watton in <ent type='GPE'>Norfolk</ent> picked up an oddity on
their screens. Then <ent type='ORG'>RAF</ent> Phantom pilots reported seeing intense
bright lights in the sky. Former radar operator Mal Scurrah said:
`As the <ent type='ORG'>Phantoms</ent> got close the hovering object shot upwards at
phenomenal speed " monitored at more than 1000 mph.' Later, airmen
stationed at <ent type='ORG'>RAF</ent> Woodbridge in <ent type='GPE'>Suffolk</ent> investigated a mystery fire
in <ent type='ORG'>Rendlesham Forest</ent>. Sergeant Jim <ent type='ORG'>Penniston</ent> witnessed the
encounter with airman John Burroughs. <ent type='ORG'>Penniston</ent> said: `The air was
filled with electricity and we saw an object about the size of a
tank. It was triangular, moulded of black glass and had symbols on
it. Suddenly it shot off faster than any aircraft I have ever
observed.' The next day the object returned. Base commander Lt Col
Charles Halt saw the flying saucer himself: `I couldn't believe
what I was seeing. It looked like the rising sun with a black
pulsating centre. It appeared to be dripping molten metal.' Hall
acted coolly, taping and photographing the object engineered by `an
intelligence which didn't originate on <ent type='LOC'>Earth</ent>'. His tape and film
were confiscated by visiting US defence officials. Former <ent type='NORP'>British</ent>
Chief of Defence Staff Lord Hill-Norton has claimed: `Someone is
sitting on information that should be in the public domain.'
<ent type='ORG'>Believability</ent>: 9/10 (Possible explanation: what the airmen saw may
not have been a UFO, but a prototype of the Stealth bomber, which
has a black triangular shape, a strange radar print and was, in
1980, ultra-secret. <ent type='ORG'>Project Aurora</ent>, a new ultra-ultra-secret
<ent type='ORG'>Pentagon Black Budget</ent> reconnaissance aircraft, is probably
responsible for all subsequent UFO sightings.)</p>
<p> B IS FOR <ent type='ORG'>THE BILDERBERG GROUP</ent>, which organises semi-secret
annual three-day meetings of the <ent type='LOC'>Europe</ent>an-<ent type='LOC'>Atlantic</ent> great and good
from the worlds of business, diplomacy and politics. The first
meetings were organised in 1954 by eminence grise Joseph Retinger,
the then secretary general of the newly fledged, <ent type='ORG'>CIA</ent>-funded
<ent type='ORG'>European Movement</ent>. Karl Otto Pohl, then president of Deutsche
Bundesbank, David Rockefeller, Lord Carrington and Governor Bill
Clinton of <ent type='ORG'>Arkansaswere</ent> among recent delegates. Denis Healey was at
that first meeting and, having retired, discusses Bilderberg in his
autobiography, The <ent type='ORG'>Time</ent> Of My Life. Bilderberg is one of the
transnational groups suspected by the <ent type='LOC'>Europe</ent>an-<ent type='NORP'>American</ent> far Right
of being part of the secret elite power structure. Even the
<ent type='ORG'>Financial Times</ent> column `Lombard' has noted: `If the Bilderberg
group is not a conspiracy of some sort, it is conducted in such a
way as to give a remarkably good imitation of one.' <ent type='ORG'>Believability</ent>:
8/10
C IS FOR <ent type='ORG'>CEAUSESCU</ent>, who was tried and executed on Christmas Day
to hush up the complicity of <ent type='GPE'>Romania</ent>'s new leaders in his crimes.
The videotape of the Christmas Day show trial of Nicolae and Elena
<ent type='ORG'>Ceausescu</ent> is an absorbing spectacle. <ent type='ORG'>Time</ent> and again, <ent type='ORG'>Ceausescu</ent> and
his wife turn on their interrogators and accuse them of knowing the
answers to the questions they have posed. Prosecutor: `What do you
know about the <ent type='ORG'>Securitate</ent>?' Elena: `They are sitting across from us
here.' The old witch was right, of course, because sitting in the
courtroom were secret police chiefs like Colonel Magureanu, who had
been party to the attack on civilians in <ent type='GPE'>Timisoara</ent> which had
triggered the revolution. He was later promoted by the leader of
the conspirators, Ion <ent type='ORG'>Iliescu</ent> " a former <ent type='ORG'>Ceausescu</ent> crony " to head
the renamed secret police, the `<ent type='GPE'>Romania</ent>n Information Service'.
<ent type='ORG'>Iliescu</ent> became and remains president, the tainted hero of a tainted
revolution.
<ent type='ORG'>Believability</ent>: 10/10</p>
<p> D IS FOR `DEEP THROAT', the mole in the Nixon administration
guiding the <ent type='ORG'>Washington Post</ent> journalists, Woodward and Bernstein, to
the Watergate story. `Throat' remains unidentified. In his book
Hidden Agenda (1984) Jim Hougan nominated both Nixon's chief of
staff, Alexander Haig, and <ent type='ORG'>National Security Agency</ent> boss, Admiral
Bobby Ray Inman, as candidates; Colodny and Gettlin also fingered
Haig in their book Silent Coup (1991). Barbara Newman, for Channel
4's Dispatches, came up with the head of the <ent type='ORG'>FBI</ent> field office in
<ent type='GPE'>Washington</ent>, the late Bob Kunkle. He was allegedly leaking for the
<ent type='ORG'>FBI</ent>, which was disgruntled by the Nixon cover-up.
<ent type='ORG'>Believability</ent>: 10/10 (Cynics suspect `Deep Throat' was merely a
dramatic device or a ploy to keep newspaper lawyers quiet.)</p>
<p> E IS FOR ELECTRICITY PYLONS, which fry our brains. A number of
protesters have complained that electro-magnetic waves in overhead
electricity pylons have led to depression, headaches, mental and
physical ill-health. No government ministry has placed much
credence on these complaints. The epidemiology of environmental
effect is notoriously hard to prove, but all good conspiracists
believe there is no smoke without a secret ray.
<ent type='ORG'>Believability</ent>: 7/10</p>
<p> F IS FOR FREEMASONS, who club together to better themselves in
the world. The majority of active freemasons have sworn not to
divulge the secrets of the craft, on pain of having their tongues
`cut out by the root and buried in the sand below low-water mark'.
Other masons who have tried to break ranks have come to sticky
ends, like `God's Banker' Roberto Calvi, found hanging from
Blackfriars Bridge in 1982. So it is hard to determine just how
much influence is wielded by the grown men who like to dress in
black suits, wear aprons, bare their breasts and roll up their
trouser legs. Not very much, say some sceptics, who suspect that
the masons have more control over, say, haberdashery in
<ent type='GPE'>Herefordshire</ent> than the <ent type='NORP'>British</ent> state. But freemasons still hold
some sway in the corridors of power. The Rt Hon the Lord Templeman
and Rt Hon Lord <ent type='ORG'>Justice</ent> Balcombe, both freemasons, are two of the
most senior judges in the land; junior <ent type='ORG'>Foreign Office</ent> minister Tony
Baldry, former <ent type='NORP'>Tory</ent> MP David Trippier and back bench MPs Sir Peter
Emery and Sir Gerard Vaughan are all on the square.
Many police officers, too, remain true to their masonic oaths of
secrecy. In 1993 at a <ent type='ORG'>Police Federation</ent> conference a motion urging
police officers to reveal membership of the masonic brotherhood was
debated. An officer from <ent type='ORG'>Merseyside</ent> said it did not matter if
officers `wore a goatskin or rolled up their trouser leg'. Another
said that freemasonry was `not all mumbo-jumbo'.
A third police officer, mocking the calls for more openness
about freemasonry in the ranks, put a paper bag over his head.
Finally a member of the <ent type='GPE'>Metropolitan</ent> branch came to the rostrum to
announce the vote. `I'm not telling,' he said to laughter. `It's a
secret.' The opponents of freemasonry lost the vote.
<ent type='ORG'>Believability</ent>: 8/10</p>
<p> G IS FOR THE GEMSTONE FILE, the conspiracy theory which first
surfaced in 1975. Originally a precis by <ent type='NORP'>American</ent> journalist
Stephania Caruana of allegations made in letters by <ent type='NORP'>American</ent>
chemist Bruce Roberts, now deceased, <ent type='ORG'>Gemstone</ent> attributes much of
post-war America's ills to the power of Aristotle Onassis, who had
the Kennedys and Dr King assassinated, seized the Howard Hughes
empire, did a deal with the <ent type='ORG'>Mafia</ent>, etc. The subject of a couple of
book-length studies to date, <ent type='ORG'>Gemstone</ent> has appeared in five or six
different versions, each one containing new material. Most striking
is the `Kiwi <ent type='ORG'>Gemstone</ent>' in which specifically <ent type='GPE'>New Zealand</ent> incidents
have been embedded in the original <ent type='NORP'>American</ent> narrative. <ent type='ORG'>Authorless</ent>,
floating round the world in samizdat form, <ent type='ORG'>Gemstone</ent> is a perfect,
small-scale disinformation vehicle for anyone who cares to use it.
<ent type='ORG'>Believability</ent>: 0/10</p>
<p> H IS FOR HESS, locked up in <ent type='GPE'>Spandau</ent> prison because he knew all
about the secret 1941 negotiations between <ent type='GPE'>Britain</ent> and <ent type='NORP'>Nazi</ent>
<ent type='GPE'>Germany</ent>. Rudolf Hess's flight in May 1941 remains one of the most
bizarre episodes of the Second World War. Lord James
Douglas-Hamilton, son of the Duke of Hamilton, the <ent type='NORP'>Scottish</ent>
landowner to whom Hess presented his plans, said: `Hess's proposals
consisted of a limited peace deal under which <ent type='GPE'>Germany</ent> would have
allowed <ent type='GPE'>Britain</ent> a free hand in her empire in return for <ent type='GPE'>Britain</ent>
allowing <ent type='GPE'>Germany</ent> a free hand in <ent type='LOC'>Europe</ent> and <ent type='GPE'>Russia</ent>. His so-called
peace plans would have meant the enslavement of <ent type='LOC'>Europe</ent>.' Hess was
arrested, tried to commit suicide, went mad, was sentenced to life
imprisonment and, at the age of 93, hanged himself in <ent type='GPE'>Spandau</ent>
prison. Or not, as the case may be.
One theory has it that the Churchill government, in a hideously
clever propaganda campaign against the <ent type='NORP'>Nazi</ent>s, ran a double, `Hess
Two'. Evidence supporting the double theory emerged when a <ent type='NORP'>Dutch</ent> TV
journalist, Karel Hille, disclosed that he had got the Most Secret
file on Hess via an unnamed <ent type='NORP'>British</ent> historian who had been given it
by the late MI6 spymaster Sir Maurice Oldfield. Oldfield had,
allegedly, stolen the file from the MI6 archive. That the man,
`Hess Two', who killed himself in prison was not the real Hess is
backed by Hugh Thomas, a <ent type='NORP'>Welsh</ent> surgeon, who, in the early 1970s,
was consultant to the <ent type='NORP'>British</ent> Military Hospital in <ent type='GPE'>West Berlin</ent>.
Thomas examined `Hess Two' and found him to lack the scars the real
Hess should have had after a wound he received in 1917. MI6 had
`Hess Two' hanged because they didn't want the truth to come out.
Then the killers burnt the evidence, including an electrical flex,
with which he was murdered.
<ent type='ORG'>Believability</ent>: 5/10 (Hess was mad. His 1917 wound was
pea-sized.)</p>
<p> I IS FOR THE <ent type='NORP'>ILLUMINATI</ent>, the secret society controlling all the
other secret societies. An 18th-century masonic splinter group
begun by Adam Weishaupt, the <ent type='ORG'>Illimunati</ent> were said to be the hidden
force behind the French Revolution. After the First World War they
were re-launched into the English-speaking world by one Nesta
Webster who credited them with organising the <ent type='GPE'>Russia</ent>n October
Revolution too. In 1921 the Spectator described Weishaupt as a
`<ent type='NORP'>Prussian</ent> with criminal instincts and lunatic perversions . . .
{who} shunted continental freemasonry on to <ent type='GPE'>Antinomian</ent> and
revolutionary lines.' In the demonology of the Anglo-<ent type='NORP'>American</ent> far
Right, the <ent type='ORG'>Illuminati</ent> largely replaced the <ent type='NORP'>Jews</ent> as the spider at
the centre of the web. These theories were brilliantly parodied in
the <ent type='ORG'>Illuminatus</ent>! trilogy (1976) by Robert Anton Wilson and Robert
Shea.
<ent type='ORG'>Believability</ent>: 0/10</p>
<p> J IS FOR JAMES JESUS ANGLETON, the orchid-growing,
poetry-writing, paranoid head of <ent type='ORG'>CIA</ent> counter intelligence
throughout much of the Cold War. Angleton believed the <ent type='ORG'>CIA</ent> and all
other spy networks to be so much gorgonzola, riddled with <ent type='ORG'>KGB</ent>
moles. In his search for these moles Angleton paralysed large
chunks of the <ent type='ORG'>CIA</ent> for years at a stretch and blighted the careers
of many senior officers.
It was Angleton who insisted in the 1960s that MI5 investigate
Harold Wilson, a task taken up enthusiastically by Peter Wright and
his circle in MI5. Angleton's overarching idiocy was to believe the
<ent type='ORG'>KGB</ent> defector Golitsyn, who claimed that the friction between the
<ent type='NORP'>Soviet</ent> Union and Mao's <ent type='GPE'>China</ent> in the late 1960s was a fake to
deceive the West. Despite the collapse of <ent type='GPE'>the Soviet Union</ent>,
Golitsyn remains convinced that it is all a black propaganda ploy.
However, the confession of top <ent type='ORG'>CIA</ent> man Aldrich Ames that he was a
<ent type='ORG'>KGB</ent> mole have proved some of Angleton's fears correct.
<ent type='ORG'>Believability</ent>: 6/10</p>
<p> K IS FOR KENNEDY, killed by almost anyone you care to mention.
According to Captain James T Kirk of the Starship Enterprise, the
`first rule of assassination is kill the assassins'. The killing of
Lee Harvey Oswald by Jack Ruby set a hare running that has never
stopped. Instead of Oswald's courtroom confession or denial of
guilt providing some explanation of the killing of the president,
the assassination of the assassin let conjecture reign.
So many had a hand in his murder it is too tedious to name them
all. Oliver Stone argued in his film JFK that Lyndon Baines Johnson
was the man behind the conspiracy. The <ent type='ORG'>KGB</ent>, the <ent type='ORG'>Mafia</ent>, the <ent type='NORP'>Cubans</ent>,
the <ent type='ORG'>FBI</ent> and the masons are all contenders. Perhaps the best JFK
conspiracy theory is that he is, after all, still alive, but kept a
permanent prisoner by <ent type='ORG'>the National Security Council</ent>.
<ent type='ORG'>Believability</ent>: 1/10</p>
<p> L IS FOR <ent type='GPE'>LOCKERBIE</ent>. On 21 December 1988, 270 people were
murdered when Pan Am 103 exploded over <ent type='GPE'>Scotland</ent>.
Six years later no one has been convicted of the crime, although
investigators on both sides of the <ent type='LOC'>Atlantic</ent> have consistently
pointed the finger at two <ent type='NORP'>Libyan</ent> intelligence officers who they
believe planted the bomb on a plane from <ent type='GPE'>Malta</ent> before it was
transferred at <ent type='GPE'>Frankfurt</ent> on to the fatal flight. UN sanctions are
enforced against <ent type='GPE'>Tripoli</ent> until Colonel Gadaffi agrees to hand over
the two for trial.
Others are not convinced by the official line. Tales of
suitcases of heroin recovered at the crash site by mysterious
<ent type='NORP'>American</ent> intelligence officers point to a joint <ent type='ORG'>CIA</ent>/Drug
Enforcement Administration operation that was fatally compromised
by <ent type='NORP'>Syrian</ent> and <ent type='NORP'>Iranian</ent>-backed <ent type='NORP'>Palestinian</ent> terrorists. <ent type='NORP'>American</ent>
spooks were running `controlled' deliveries of <ent type='NORP'>Lebanese</ent> heroin
through <ent type='GPE'>Frankfurt</ent> airport in return for information about the
whereabouts of the hostages in <ent type='GPE'>Beirut</ent>. The terrorists were aware of
this and switched the dope-filled Samsonite case with one
containing the bomb. Among those killed were Matthew Gannon, the
<ent type='ORG'>CIA</ent>'s deputy head of station in <ent type='GPE'>Beirut</ent>, and Major Charles McKee, a
<ent type='ORG'>Defence Intelligence Agency</ent> officer allegedly in charge of a
hostage rescue team. Some students of the tragedy have gone so far
as to suggest that McKee was flying home to blow the whistle,
disgusted that deals were being struck with dope dealers in order
to gain intelligence on the kidnap victims.
<ent type='ORG'>Believability</ent>: 8/10</p>
<p> M IS FOR DAVID MELLOR, got at by <ent type='ORG'>Mossad</ent> after his
pro-<ent type='NORP'>Palestinian</ent> outburst in 1988 on the <ent type='GPE'>West Bank</ent>. The <ent type='NORP'>Israelis</ent>
were out to topple Mellor after he became the most prominent critic
in the <ent type='NORP'>British</ent> Government of their conduct in the Occupied
Territories.
First, they managed to secure his removal as junior Foreign
Office minister, threatening to stop passing on intelligence
information about the hostages in <ent type='GPE'>Beirut</ent> unless Mellor was moved.
Second, they arranged for the clandestine phone-tapping
operation which led to the highly embarrassing `toe-sucking'
allegations.
The result: Mellor was forced to quit the <ent type='ORG'>Cabinet</ent>.
<ent type='ORG'>Believability</ent>: 5/10
N IS FOR NOSTRADAMUS, the 16th- century psychic seer who
predicted <ent type='NORP'>Napoleon</ent>, Hitler and the killing of John Kennedy. The
seer's muddily-written quatrains have spawned more than 200 books,
a propaganda war between the <ent type='NORP'>Nazi</ent>s and the Allies during the Second
World War, a movie, an <ent type='NORP'>American</ent> TV spin-off show, Monopoly-style
board games, a virtual reality game and even a watch, which ticks
down the seconds from 1 January 1995 to the millennium.
Whitstable housewife Valerie Hewitt, author of Nostradamus: His
Key To The Centuries (Heinemann, 1994), predicts that Prince
Charles will be crowned this year. `It will be something sudden
that will affect the Queen, an illness " whether it is political or
genuine it doesn't matter. And Diana will be offered the chance to
become Queen. But Charles's reign will be short and William could
be king before he's 18.' In 1993 she predicted that George Bush
would stay as president.
Rival Nostradamus buff John Hogue is more apocalyptic. He plumps
for nuclear disaster or terrorism in 1996, World War III before the
millennium and Aids " `a very great plague . . . with a great scab'
" and the ozone hole killing off two-thirds of the world population.
He quotes the prophet's vision of the future: `So many {die}
that no one will know the true owners of fields and houses. The
weeds in the city streets will rise higher than the knees, and
there shall be a total desolation of the clergy.' <ent type='ORG'>Believability</ent>:
0/10 (The verses of Nostradamus clearly refer to events and places
in the 16th century. For example, nowhere does he mention `Hitler',
only `Hister', the contemporary name for <ent type='ORG'>the Lower Danube</ent>.)</p>
<p> P IS FOR PROMIS SOFTWARE, stolen from a <ent type='GPE'>Washington</ent> law firm. In
1982 a <ent type='GPE'>Washington</ent> DC computer firm, Inslaw, developed a programme
called Promis (Prosecutors' Management Information System) which it
supplied to the US <ent type='ORG'>Justice</ent> Department for $10 million. A year
later, <ent type='ORG'>Justice</ent> stopped all payments and Inslaw went bankrupt. A
ruling in 1987 at a bankruptcy court concluded that the <ent type='ORG'>Justice</ent>
Department `took, converted and stole Promis software through
trickery, fraud and deceit', which is a little embarrassing for the
department charged with upholding the rule of law.
So far, so what? It is only when people started to probe into
why <ent type='ORG'>Justice</ent> had acted in such a way that it gets interesting,
prompting one investigator to claim that the case `was a lot
dirtier for the department than Watergate had been, both in its
breadth and depth'.
It turns out that (allegedly) the men behind the theft of the
software were all Reagan appointees who helped engineer the 1980
`October Surprise', whereby the <ent type='NORP'>Republicans</ent> struck a deal with the
<ent type='NORP'>Iranian</ent>s not to release <ent type='NORP'>American</ent> Embassy hostages from <ent type='GPE'>Tehran</ent> until
after Reagan was safely in the <ent type='ORG'>White House</ent>. The software was then
sold on to foreign intelligence agencies across the globe, (a) to
generate revenue for covert operations not authorised by <ent type='ORG'>Congress</ent>;
and (b) to make it easier for US operatives to hack into the
software.
The story was chased by US freelance Danny Casolaro. A year
after making himself known to the Inslaw people he was found dead
in a motel room in <ent type='GPE'>West Virginia</ent>. The official verdict was suicide,
but Elliott Richardson, the Attorney General under Nixon, hired by
Inslaw to investigate the case, concluded: `It's hard to come up
with any reason for Casolaro's death other than he was deliberately
murdered because he was so close to uncovering sinister elements in
what he called `the Octopus'.' <ent type='ORG'>Believability</ent>: 7/10</p>
<p> Q IS FOR CARROLL QUIGLEY, the granddaddy of all modern <ent type='NORP'>American</ent>
conspiracists. Quigley's 1340-page volume Tragedy And Hope "
History Of The World In Our <ent type='ORG'>Time</ent> (1966) included a dozen pages on
the existence of a hitherto unknown secret society, run by Alfred,
Lord Milner, <ent type='ORG'>Lloyd George</ent>'s Chef de <ent type='ORG'>Cabinet</ent>, funded by Cecil
Rhodes's estate. The group, said Quigley, who claimed to have
access to its papers, organised the Round Table groups in the
<ent type='ORG'>Commonwealth</ent>, <ent type='ORG'>the Royal Institute For International Affairs</ent> in
<ent type='GPE'>London</ent> and its counterpart in the US betwen the wars.
For far-Right groups such as <ent type='ORG'>the John Birch Society</ent> these pages
were proof, from an `insider', of the great conspiracy they had
always suspected. Not the <ent type='NORP'>communists</ent>, not the <ent type='NORP'>Jews</ent>, not even the
<ent type='ORG'>Illuminati</ent>, but the Perpetual Hidden Government " the <ent type='ORG'>PHG</ent>!
Quigley's revelations are behind much of the recent talk of One
Worlders and New World Orders and are part of <ent type='NORP'>Republican</ent>
presidential hopeful Pat Robertson's world view. Among Quigley's
students at <ent type='ORG'>Georgetown University</ent> was Bill Clinton, and the
conspiracists got quite excited when President Clinton referred to
the impact Quigley made on him in his inauguration speech.
<ent type='ORG'>Believability</ent>: 4/10</p>
<p> R IS FOR JAMES RUSBRIDGER, killed and framed as a sex pervert by
MI5. Rusbridger was a tremendous irritant to the security services.
His letters to newspapers poured scorn on the Official Secrets Act;
his books, such as The Intelligence Game, cast doubt on the
official version of events. But where Rusbridger, aged 65 at the
time of his death, really annoyed the spooks was when he unearthed
<ent type='GPE'>Britain</ent>'s code-cracking secrets, in particular the story that the
<ent type='NORP'>British</ent> had cracked <ent type='NORP'>Japanese</ent> naval codes in advance of the attack
on Pearl Harbour.
He was bright, hale and hearty for his age when he was
discovered in February 1994 at his home, dressed in a green
protective suit for use in nuclear, biological or chemical warfare,
green overalls, a black plastic mackintosh and thick rubber gloves.
His face was covered by a gas mask and he was also wearing a
sou'wester. His body was suspended from two ropes, attached to
shackles fastened to a piece of wood across the open loft hatch,
and was surrounded by pictures of men and mainly black women in
bondage. Consultant pathologist Dr Yasai Sivathondan said he died
from asphyxia due to hanging `in keeping with a form of sexual
strangulation'.
His death occasioned a piece by Sunday <ent type='ORG'>Time</ent>s reporter James
Adams, whose own books boast of contacts with <ent type='NORP'>British</ent> intelligence.
Adams quoted senior intelligence officials as saying Rusbridger
never had any connection with any branch of <ent type='NORP'>British</ent> intelligence:
"His death was as much a fantasy as his life,' said one source . .
. Rusbridger's interest in intelligence seems to have coincided
with his conviction for theft in 1977.' Such an extensive
posthumous demolition job by intelligence officials would perhaps
only be merited by someone who had been a serious thorn in their
side.
<ent type='ORG'>Believability</ent>: 7/10</p>
<p> S IS FOR THE SUICIDES OF THE SCIENTISTS WHO WORKED FOR MARCONI.
In 1988 a host of brilliant researchers working for the defence
giant killed themselves in a variety of ways: one drove his
petrol-laden car into a disused Little Chef, another jumped off the
<ent type='GPE'>Clifton</ent> suspension bridge, a third electrocuted himself.
The deaths appeared to be a case of life imitating art " in this
case, an episode of the 1960s Avengers series which features a
number of brilliant scientists killing themselves. The first
problem is that there was no linkage between the deaths. Second,
suicide is 10 times more common than murder in <ent type='GPE'>Britain</ent>. Third, men
kill themselves more violently than women. Fourth, scientists are
more ingenious than the rest of the population, so one would expect
them to kill themselves violently and bizarrely. Fifth, the defence
business employs huge numbers of scientists, and <ent type='ORG'>Marconi</ent> is a big
employer.
When the numbers are crunched, there is no statistical
aberration in the number of suicides by <ent type='ORG'>Marconi</ent> scientists. It is
too good a story for a newspaper to kill, however.
<ent type='ORG'>Believability</ent>: 0/10</p>
<p> U IS FOR THE UNIFIED CONSPIRACY THEORY, or the Grand Unified
Conspiracy Theory, which knits all the other conspiracy theories
into a coherent tapestry.
<ent type='ORG'>Believability</ent>: 1/10</p>
<p> V IS FOR VATICAN, which knocks off the popes it doesn't like.
The markedly short reign of John Paul I has given rise to this
particular crock of conjecture.
Old men can die quite quickly, even if they are popes. However,
rumours persist in the Vatican than John Paul I was going to clean
out the Augean stables of the pontiff's finances and expose the
scandalous links between the <ent type='ORG'>Mafia</ent>, the freemasons and senior
cardinals in <ent type='ORG'>the Roman Catholic Church</ent>.
<ent type='ORG'>Believability</ent>: 2/10</p>
<p> W IS FOR COLIN WALLACE, who was forced to resign from the
<ent type='ORG'>Ministry</ent> of Defence in 1975 when he leaked information about a
covert MI5 operation, `Clockwork Orange'. Wallace, an <ent type='ORG'>Ulsterman</ent>,
claimed he had been involved in the operation, which had been
designed to destabilise paramilitary organisations in the Province
through disinformation. Wallace alleged that the scope of the
operation had been extended to include mainland politicians viewed
as `politically soft or leftist', a list which included Harold
Wilson, Edward Heath and Jeremy Thorpe. Wallace claims it was in
his remit to discredit these `targets' using unfounded smear
stories about sexual impropriety.
He also alleged, in a memo to army chiefs, that a <ent type='GPE'>Belfast</ent> boys'
home named <ent type='GPE'>Kincora</ent> was being used as a homosexual trap for
intelligence gathering against prominent <ent type='NORP'>Unionist</ent> politicians. In
1990 an inquiry conducted by James Calcutt QC found Wallace's
dismissal to be unsafe and ordered <ent type='ORG'>the Ministry</ent> to award him
pounds 30000 in compensation. The inquiry was not, however,
empowered to make any judgment on Wallace's allegations.
<ent type='ORG'>Believability</ent>: 7/10</p>
<p> X IS FOR MR X, the third man who allegedly went to bed with two
senior <ent type='NORP'>Conservative</ent> politicians, now in the <ent type='ORG'>Cabinet</ent>, all at the
same time. This is a conspiracy theory never to be told.
<ent type='ORG'>Believability</ent>: 10/10</p>
<p> Y IS FOR YAKUZA, the <ent type='NORP'>Japanese</ent> mafia who run the world. The
<ent type='NORP'>Yakuza</ent> are the world's richest and most powerful gangsters. They
control many of the big-name <ent type='NORP'>Japanese</ent> corporations that now have
huge leverage in the major western economies. Nothing can be done
to loosen the grip of the <ent type='NORP'>Yakuza</ent> on the world economy.
<ent type='ORG'>Believability</ent>: 8/10
Z IS FOR THE ZAGREB OPERATION, when the <ent type='ORG'>NKVD</ent> inducted Robert
<ent type='ORG'>Maxwell</ent> as a <ent type='NORP'>Soviet</ent> double agent. <ent type='ORG'>Maxwell</ent> was never clear about how
he escaped from <ent type='NORP'>Nazi</ent>-occupied <ent type='GPE'>Germany</ent>. In fact, he was given secret
passage through <ent type='NORP'>Nazi</ent>-allied <ent type='GPE'>Croatia</ent> by <ent type='NORP'>Communist</ent> partisans, then
loyal to <ent type='GPE'>the Soviet Union</ent>, in return for a lifetime as a spy.
While passing through Zagreb <ent type='ORG'>Maxwell</ent> was recruited by an officer
of the <ent type='ORG'>NKVD</ent> " the forerunner to the <ent type='ORG'>KGB</ent> " and was told to travel to
<ent type='GPE'>Britain</ent> and ingratiate himself with the <ent type='NORP'>British</ent> Establishment.
<ent type='ORG'>Maxwell</ent> did brilliantly, becoming first a war hero then a respected
publisher. The <ent type='ORG'>NKVD</ent> and <ent type='ORG'>KGB</ent> helped <ent type='ORG'>Maxwell</ent> out from time to time,
smoothing his path in arranging deals with <ent type='LOC'>Eastern Bloc</ent> scientific
publishers and the like. <ent type='ORG'>Maxwell</ent> prospered.
It was only in 1991 that the <ent type='NORP'>Israeli</ent> secret service, <ent type='ORG'>Mossad</ent>,
came across the truth when they bought up a senior <ent type='ORG'>KGB</ent> archivist
who sold them the <ent type='ORG'>Operation Zagreb</ent> file. <ent type='ORG'>Maxwell</ent> " who <ent type='ORG'>Mossad</ent>
thought had been working for them " was terminated by a crack unit
of <ent type='NORP'>Israeli</ent> frogmen.
<ent type='ORG'>Believability</ent>: 6/10
</p></xml>

View File

@ -0,0 +1,346 @@
<xml><p>
<ent type='ORG'>WHO</ent> Murdered <ent type='LOC'>Africa</ent>
The Greatest Murder Mystery of all Time
There is no question mark after the title of this article because
the title is not a question. It's a declarative statement. <ent type='ORG'>WHO</ent>, the
World Health Organization, murdered <ent type='LOC'>Africa</ent> with the AIDS virus. Thats
a provocative statement, isn't it?
The answers to this little mystery, Murder on the <ent type='ORG'>WHO</ent> Express will
be quite clear to you by the end of this report. You will also
understand why the other suspects, the homosexuals, the green monkey
and the <ent type='NORP'>Haitians</ent>, were only pawns in this virocidal attack on the
non-<ent type='NORP'>Communist</ent> world.
If you believe the government propaganda that AIDS is hard to catch
then you are going to die even sooner than the rest of us. The common
cold is a virus. Have you ever had a cold? How did you catch it?
You don't really know, do you? If the cold virus was fatal, How many
people would be left in the world?
Yellow fever is a virus. You catch it from mosquito bites. <ent type='ORG'>Malaria</ent>
is a parasite also carried by mosquitoes. It is many times larger than
the AIDS virus ( like comparing a pinhead to a moose head ) yet the
mosquito easily carries this large organism to man.
The tuberculosis germ, also larger than that AIDS virus, can be
transmitted by formites ( inanimate objects such as towels ). The
AIDS virus can live for as long as 10 days on a dry plate. You can't
understand this murder mystery unless you learn a little virology.
Many viruses grow in animals and many grow in humans, but most of
the viruses that affect animals don't affect humans. There are exceptions,
of course, such as yellow fever and small pox.
There are some viruses in animals that can cause very lethal cancer
in those animals, but do not affect man or other animals. The Bovine
Leukemia Virus ( BLV ), for example, is lethal to cows but not humans.
There is also another virus that occurs in sheep called Sheep Visna Virus
which is also non-reactive in man. These Deadly viruses are " Retro -
Viruses ", meaning that they can change the genetic composition of the
cells that they enter.
<ent type='ORG'>The World Health Organization</ent>, in published articles, called for
scientists to work these deadly agents and attempt to make a hybrid
virus that would be deadly to humans. " An attempt should be made to
see if viruses can in fact exert selective effects on immune function.
The possibility should be looked into that the immune response to the
virus itself maybe impaired if the infecting virus damages, more or
less selectively, the cell responding to the virus."
Thats AIDS. What the <ent type='ORG'>WHO</ent> is saying in plain english is " Let's cook
up a virus that selectively destroys the T-Cell system of man, an
acquired immune deficiency. Why would anyone want to do this? If you
destroy the T-Cell system of man then you destroy man. Is it even
remotely possible that the <ent type='ORG'>WHO</ent> would want to develop a virus that would
wipe out the human race?
If there new creation worked, the <ent type='ORG'>WHO</ent> stated, then many terrible
and fatal infectious viruses could be made even more terrible and more
malignant. Does this strike you as being a peculiar goal for a health
organization?
Sometimes <ent type='NORP'>Americans</ent> believe in conspiracies and sometimes the don't.
Was there a conspiracy to kill President Kennedy? Twenty five years later
the debate still continues, and people keep changing there minds. One day
it's yes and the next it's no - depending upon what was served for lunch,
or how the stock market did the day before.
But it doesn't take a bad lunch to see an amazing concatenation of
events involving <ent type='NORP'>Russian</ent> and <ent type='ORG'>Chinesse</ent> communist nationals, The <ent type='ORG'>WHO</ent>, The
National Cancer Institute, and the AIDS epidemic.
But what about the green monkey? Some of the best virologist in the
world and many of those directly involved in AIDS research, such as
Robert Gallo and Luc Montagnier, have said that the green monkey may be
the culprit. You know the story: A green monkey bit a native on the ass
and, bam - AIDS all over central <ent type='LOC'>Africa</ent>.
There is a fatal flaw here. It is very strange. Because Gallo,
Montagnier and these other virologist know that the AIDS virus doesn't
occur naturally in monkeys. In fact it doesn't occur naturally in any
animal.
AIDS started practically simultaneously in <ent type='GPE'>the United States</ent>, <ent type='GPE'>Haiti</ent>,
<ent type='GPE'>Brazil</ent>, and Central <ent type='LOC'>Africa</ent>. ( Was the green monkey a jet pilot? )
Examination for the gene structure of the green monkey cells prove that
it is not genetically possible to transfer the AIDS virus from monkeys
to man by natural means.
Because of the artificial nature of the AIDS virus it will not easily
transfer from man to man unless it has become very concentrated in the
body fluids through repeated injections from person to person, such as
drug addicts, and through high multiple partner sexual activity such as
takes place in <ent type='LOC'>Africa</ent> and among homosexuals. After repeated transfer it
can become a " natural " infection for man, which it has.
Dr. Theodore Strecker's research of the literature indicates that
<ent type='ORG'>the National Cancer Institute</ent> ( <ent type='ORG'>NCI</ent> ) in collaboration with the <ent type='ORG'>WHO</ent>,
made the AIDS virus in there laboratories at Fort <ent type='ORG'>Detrick</ent> ( now <ent type='ORG'>NCI</ent> ).
They combined the deadly retro-viruses Bovine-Leukemia Virus and Sheep
Visna Virus, and injected them into human tissue cultures. The result
was the AIDS virus, the first human retro-virus known to man and now
believed to be 100% fatal to those infected.
The momentous plague that we now face was anticipated by the National
Academy of Sciences (<ent type='ORG'>NAS</ent>) in 1974 when they recommended that "Scientists
throughout the world join with the members of this committee in voluntarily
deferring experiments linking animal viruses". What the <ent type='ORG'>NAS</ent> is saying in
carefully guarded english is: "For God's sake. Stop this madness!" The
green monkey is off the hook. How about the <ent type='NORP'>Communist</ent>s?
<ent type='NORP'>Communist</ent> are in the process of conducting germ warfare from Fort
<ent type='ORG'>Detrick</ent>, <ent type='GPE'>Maryland</ent> against the free world, expecially <ent type='GPE'>the United States</ent>,
even using foreign communist agents within the US Army's germ warfare
unit euphamistically called <ent type='ORG'>the Army Infectious Disease Unit</ent>.
You don't believe it? Carlton Gajdusek, an <ent type='ORG'>NIH</ent> bigshot at <ent type='ORG'>Detrick</ent>
admits it. " IN THE FACILITY I HAVE A BUILDING WHERE MORE GOOD AND
LOYAL COMMUNIST SCIENTISTS FROM THE <ent type='GPE'>USSR</ent> AND MAINLAND CHINA WORK, WITH
FULL PASSKEYS TO ALL THE LABORATORIES, THAN THERE ARE AMERICAN. EVEN THE
ARMY'S INFECTIOUS DISEASE UNIT IS LOADED WITH FOREIGN WORKERS NOT ALWAYS
FRIENDLY <ent type='GPE'>NATIONALS</ent>."
Can you imagine that? A UN-<ent type='ORG'>WHO</ent> communist trogan horse in our
biological warfare center with the full blessing of the US government?
The creation of the AIDS virus by the <ent type='ORG'>WHO</ent> was not just a diabolical
scientific exercise that got out of hand. It was a cold-blooded
successful attempt to create a killer virus which was then used in a
successful experiment in <ent type='LOC'>Africa</ent>. So successful in fact that most of
Central <ent type='LOC'>Africa</ent> may be wiped out, 75000000 dead within 3-5 years.
It was not an accident, it was deliberate. In the Federation
Proceedings of <ent type='GPE'>the United States</ent> in 1972, <ent type='ORG'>WHO</ent> said : " In relation
to the immune response a number of useful experimental approaches can
be visualized ". They suggested a neat way to do this would be to put
their new killer virus ( AIDS ) into a vaccination program, sit back and
observe the results. " This would be particularly informative in
sibships," they said. That is, give AIDS to brothers and sisters and
see if they die, who dies first, and of what, just like rats in a
laboratory.
They used the smallpox vaccine for their vehicle and the geographical
sites chosen in 1972 were <ent type='GPE'>Ugunda</ent> and other <ent type='LOC'>Africa</ent>n sites, <ent type='GPE'>Haiti</ent>, <ent type='GPE'>Brazil</ent>
and <ent type='GPE'>Japan</ent>. The present and recent past of AIDS epidemiology coincides
with these geographical areas.
Dr. Strecker points out that even if the <ent type='LOC'>Africa</ent>n green monkey could
transmit AIDS to humans, the present known amount of infection in <ent type='LOC'>Africa</ent>
makes it statistically impossible for a single episode, such as a monkey
biting someone, to have brought this epidemic to this point. The doubling
time of the number of people infected, about every 14 months, when
correlated with the first known cases, and the present known number of
cases, prove beyond a doubt that a large number of people had to be
infected at the same time. Starting in 1972 with the first case from our
mythical monkey, and doubling the number of infected from that single
source every 14 months you get only a few thousand cases. From 1972 to
1987 is 15 years or 180 months. If it takes 14 months to double the number
of cases then there would have been 13 doublings. 1 then 2 then 4 then 8..
etc...In 15 years, from a single source of infection there would be about
8000 cases in <ent type='LOC'>Africa</ent>, not 75 million. We are approaching World War II
mortality statistics here - without a shot being fired.
Dr. Theodore A. Strecker is the courageous doctor who has unraveled
this conundrum, the greatest murder mystery of all time. He should get
the Nobel Prize but he'll be lucky not to get "suicided." ( "Prominent
<ent type='GPE'>California</ent> doctor ties his hands behind his back, hangs himself, and
jumps from 20th floor. There was no evidence of foul play." )
Strecker was employed as a consultant to work on a health proposal
for <ent type='ORG'>Security Pacific Bank</ent>. He was to estimate the cost of their health
care for the future. Should they form an <ent type='ORG'>HMO</ent> was the major issue. After
investigating the current medical market he advised against the <ent type='ORG'>HMO</ent> because
he found that the AIDS epidemic in all probability bankrupt the nation's
medical system.
He became fascinated with all the scientific anomalies concerning AIDS
that kept cropping up. Why did the " experts " keep talking about
green monkeys and homosexuals being the culprits when it was obvious that
the AIDS virus was a man-made virus? Why did they say it was a homosexual
and drug-user disease when in <ent type='LOC'>Africa</ent> it was obviously a heterosexual
disease? If the green monkey did it then why did AIDS explode practically
simultaneously in <ent type='LOC'>Africa</ent>, <ent type='GPE'>Haiti</ent>, <ent type='GPE'>Brazil</ent>, <ent type='GPE'>Japan</ent>, and <ent type='GPE'>the United States</ent>?
Why, when it was proposed to <ent type='ORG'>the National Institute</ent> of Health that the
AIDS virus was a combination of two bovine or sheep viruses cultured in
human cells in a laboratory, did they say it was " bad science " when
thats exactly what occurred?
As early as 1970 the <ent type='ORG'>WHO</ent> was growing these deadly animal viruses in
human tissue cultures. Cedric Mims, in 1981, said in a published article
that there was a bovive virus contaminating the culture media of th <ent type='ORG'>WHO</ent>.
Was this an accident or a "non-accident"? If it was an accident then why
did the <ent type='ORG'>WHO</ent> continue to use the vaccine?
This viral and genetic death bomb, AIDS, was finally produced in 1974.
It was given to monkeys and they died of pneumocystis carni which is
typical of AIDS.
Dr. R. J. Biggar said in <ent type='ORG'>Lancet</ent> ( a <ent type='ORG'>Brittish</ent> journal ) that the AIDS
agent could not have developed de novo. That means in plain english that
it didn't come out of thin air. AIDS was engineered in a laboratory by
virologists. It couldn't engineer itself. As Dr. Stricker so colorfully
puts it: " If a person has no arms or legs and shows up at a party in a
tuxedo, how did he get dressed? Somebody dressed him. "
There are 9000 to the 4th power possible AIDS viruses. ( There are
9000 base pairs on the geneome. ) So the fun has just begun. Some will
cause brain rot similar to the sheep virus, some leukemia-like diseases
from the cow viruses, and some that won't do anything. So the virus will
be constantly changing and trying out new esoteric disease on hapless
man. We're only the beginning
Because of the trillions of possible genetic combinations there will
never be a vaccine. Even if they could develop a vaccine they would
un-doubtfully give us something equally as bad as they did with the <ent type='ORG'>Polio</ent>
vaccine ( cancer of the brain ), the Swine Flu vaccine ( a <ent type='ORG'>Polio</ent>-like
disease ), the <ent type='ORG'>Smallpox</ent> vaccine (AIDS), and the Hepatitis vaccine (AIDS).
There are precedents. This is not the first time the virologists have
brought us disaster. SV-40 virus from monkey cell cultures contaminated
<ent type='ORG'>Polio</ent> cultures. Most people in there 40's are now carrying the virus
through contaminated <ent type='ORG'>Polio</ent> innoculations given in the early 60's. It is
known to cause brain cancer which explains the increase in this disease
that we have seen in the past 10 years.
This is the origin of the green monkey theory. The <ent type='ORG'>Polio</ent> vaccine was
grown on green monkey kidney cells. 64 million <ent type='NORP'>Americans</ent> were vaccinated
with SV-40 contaminated vaccine in the 60's. An increase in cancer of the
brain, possibly Multiple Sclerosis, and God only knows what else is the
tragic result. The delay between vaccination and the onset of cancer
with this virus is as long as 20-30 years. 1965 + 20 = 1985. Get the
picture?
The final piece of the puzzle is how AIDS devastated the homosexual
population in <ent type='GPE'>the United States</ent>. It wasn't from Smalpox vaccination as
in <ent type='LOC'>Africa</ent> because we don't do that any more. There is no <ent type='ORG'>Smallpox</ent> in the
United States and so vaccination was discontinued. Although some AIDS has
been brought to <ent type='GPE'>the United States</ent> from <ent type='GPE'>Haiti</ent> by homosexuals, It would not
be enough to explain the explosion of AIDS that occurred simultaneously
with the <ent type='LOC'>Africa</ent>n and <ent type='GPE'>Haiti</ent>an epidemics.
The AIDS virus didn't exist in <ent type='GPE'>the United States</ent> before 1978. You can
check back in any hospital and no stored blood samples can be found
anywhere that exhibit the AIDS virus before that date. What happened in
1978 and beyond to cause AIDS to burst upon the scene and devastate the
homosexual section of our population? It was the introduction of the
Hepatitis B vaccine which exhibits the exact same epidemiology of AIDS.
A Doctor W. <ent type='ORG'>Schmunger</ent>, born in <ent type='GPE'>Poland</ent> and educated in <ent type='GPE'>Russia</ent>, came
to this country in 1969. <ent type='ORG'>Schmunger</ent>'s immigration to the U.S. was
probably the most fatefull immigration in our history. He, by un-explained
process, became the head of one of the <ent type='GPE'>New York City</ent> blood bank. ( How
does a <ent type='NORP'>Russian</ent> trained doctor become the head of one of the largest blood
banks in the world? Doesn't that strike you as peculiar? )
He set up the rules for the Hepatitis vaccine studies. Only males
between the ages of 20 and 40 , who were not monogamous, were allowed to
participate in this study. Can you think of any reason for insisting that
all expermentees be promiscuous? Maybe you don't believe in the <ent type='NORP'>Communist</ent>
conspiracy theory but give me some other logical explanation. <ent type='ORG'>Schmunger</ent>
is now dead and his diabolical secret went with him.
<ent type='ORG'>The Centers for Disease Control</ent> reported in 1981 that 4% of those
receiving the Hepatitis vaccine were AIDS infected. In 1984 they admitted
to 60%. Now they refuse to give out the figures at all because they don't
want to admit that 100% of the Hepatitis vaccine receivers are AIDS
infected. Where is the data on the Hepatitis vaccine studied? <ent type='ORG'>FDA</ent>? <ent type='ORG'>CDC</ent>?
No, the U.S. Department of Justice has buried it where you will never see
it.
What has the government told us about AIDS?
* It's a homosexual disease-----------------------WRONG
* It's related to anal intercourse only-----------WRONG
* Only a small % of those testing positive
for AIDS would get the disease------------------WRONG
* It came from the <ent type='LOC'>Africa</ent>n green monkey-----------WRONG
* It came from cytomegalovirus--------------------WRONG
* It was due to popping amyl nitrate with sex-----WRONG
* It was started 400 years ago by the <ent type='NORP'>Portugese</ent>---WRONG
* You cant get it from insects--------------------WRONG
* The virus can't live outside the body-----------WRONG
The head of <ent type='ORG'>the Human Leukemia Research Group</ent> at <ent type='ORG'>Harvard</ent> is a
veterinarian. Dr. O. W. <ent type='ORG'>Judd</ent>, International Agency for Research on Cancer,
the agency that requested the production of the virus in the first place,
is also a veterinarian. The Leukemia research he is conducting is being
done under the auspices of a school of veterinary medicine. Now, there is
nothing wrong with being a vet but, as we have pointed out, the AIDS virus
is a human virus. You can't test these viruses in animals and you can't
test leukemias in them either. It doesn't work. So why would your
government give <ent type='ORG'>Judd</ent>, a veterinarian, 8.5 million dollars to study
leukemia in a veterinary college? As long as we are being used as
experimental animals maybe it is appropriate.
<ent type='ORG'>The London Times</ent> should be congratulated for uncovering the smallpox-
AIDS connection. But there expose was very misleading. The article states
that the <ent type='LOC'>Africa</ent>n AIDS epidemic was caused by the smallpox vaccine
"triggering" the AIDS in those vaccinated. Dr. Robert Gallo, who has been
mixed up in some very strange scientific snafus, supports this theory.
Whether the infection of 75 million Africians was deliberate or
accidental can be debated, but there is no room for debate whether the
smallpox shots "awakened the unsuspecting virus infection." There is
absolutely no scientific evidence that this laboratory-engineered virus
was present in <ent type='LOC'>Africa</ent> before the <ent type='ORG'>WHO</ent> descended upon these hapless people
in 1967 with their deadly AIDS-laced vaccine. The AIDS virus didn't come
from <ent type='LOC'>Africa</ent>, it came from Fort <ent type='ORG'>Detrick</ent>, <ent type='GPE'>Maryland</ent>, U.S.A.
The situation is extremely desperate and the medical profession is
too frightened and cowed (as usual) to take any action. Dr. Strecker
attempted to mobilize the doctors through some of the most respected
medical journals in the world. The prestigious Annals of Internal Medicine
said that his material "appears to be entirely concerned with maters of
virology" and so try some other publication.
In his letter to The Annals, Strecker said, "If correct human
experimental procedures had been followed we would not find half of the
world stumbling off on the wrong path to the cure for AIDS with the other
half of the world covering up the origination of the dammed disease. It
appears to me that your Annals of Internal Medicine is participating in
the greatest fraud ever perpetrated."
I guess they didn't like that so Stricker submitted his sensational
and mind-boggling letter with all of the proper documentation to the
<ent type='NORP'>British</ent> journal, <ent type='ORG'>Lancet</ent>. Their reply : " Thank you for that interesting
letter on AIDS. I am sorry to have to report that we will not be able to
publish it. We have no criticism" but their letter section was " over
crowded with submissions ".
They're too crowded to announce the end of western civilization and
possibly all mandkind? Doesn't seem reasonable. What can we do? The first
thing that should be done is to close down all laboratories in this
country that are dealing with these deadly retro-viruses. Then we must
sort out the insane, irresponsible and traitorous scientists involved
in these experiments and try them for murder. Then maybe, just ,maybe, we
can re-populate and re-civilize the world.
William Campbell Douglass, M.D.
P.O. Box 38 <ent type='GPE'>Lakemont</ent>, GA 30552
</p></xml>

View File

@ -0,0 +1,930 @@
<xml>
<p>The following articles are extracted from <ent type='GPE'>New Dawn</ent> magazine,
Volume No. 1 &amp; 2. (C) Copyright April 1992. Subscription rates are
as follows: $30 for 12 issues, $5 sample; Foreign US$40 &amp; US$7.
<ent type='GPE'>New Dawn</ent>, GPO Box 3126FF, <ent type='GPE'>Melbourne</ent>, 3001, Australia.</p>
<p>Shocking Revelations on AIDS Research by Our <ent type='NORP'><ent type='LOC'>North</ent> <ent type='NORP'>American</ent></ent>
Correspondent</p>
<p>Dr. Abdul Alim Muhammad, national spokesman for Minister Louis
<ent type='ORG'>Farrakhan</ent> and <ent type='ORG'>the Nation</ent> of <ent type='NORP'>Islam</ent>, dropped a bombshell on the
nation's capital at a mass rally held at All Souls Unitarian
Church on September 8. Although the event had been planned for
some time to celebrate the 10th anniversary of the <ent type='GPE'>Washington</ent>,
D.C. ministry of Dr. Muhammad, he turned the event into a report
on his recent fact-finding mission to the <ent type='NORP'>African</ent> nation of <ent type='GPE'>Kenya</ent>.</p>
<p>Dr. Muhammad startled the standing-room-only audience when he
announced that a research team working out of the <ent type='GPE'>Kenya</ent>n Medical
Research Institute, led by the <ent type='ORG'>Harvard</ent>-trained immunologist Dr.
David Koech, had made dramatic advances in the treatment of AIDS.
Dr. Muhammad also charged that the U.S. government was leading a
major effort by the international medical establishment to
suppress this groundbreaking research.</p>
<p>Among those who packed the church to hear Dr. Muhammad speak on
the theme "Can We Survive Genocide," were clergy from several
denominations along the <ent type='LOC'>East Coast</ent>, civil rights leaders,
community activists, leaders of <ent type='ORG'>the Nation</ent> of <ent type='NORP'>Islam</ent>, elected
officials and political leaders from <ent type='GPE'>Maryland</ent>, <ent type='GPE'>Virginia</ent>, and the
District of Columbia, and hundreds of ordinary citizens. The
introduction of <ent type='GPE'>Washington</ent>'s former Mayor Marion Barry - the man
on whom the Bush administration spent millions to remove him from
office - brought the house to its feet in an extended ovation.</p>
<p>A Policy of Genocide</p>
<p>In his remarks, Dr. Muhammad quoted extensively from a 1985
article authored by Lyndon LaRouche, "The Looming Extinction of
the 'White Race'". In that piece, LaRouche documents that the
imperial policies intrinsic to oligarchism have set into motion
the self-destruction of the population levels and economies of
those "white" nations that have complicitly tolerated oligarchical
policies - most specifically <ent type='GPE'>the United States</ent> and <ent type='GPE'>Great Britain</ent>.
LaRouche states that since what the oligarchs call the "Great
White Race" is dying out at an accelerating rate, and threatening
the supremacy of the Anglo-<ent type='NORP'>American</ent> financial establishment, we
witness a fanatically <ent type='NORP'>Malthusian</ent> commitment to a policy of
genocide directed against people of colour; a genocide consciously
implemented through the conditionalities policies of the
International Monetary Fund (<ent type='ORG'>IMF</ent>).</p>
<p>"That," Dr. Muhammad charged, "is one of the reasons they've got
him locked up; because he's got the guts to tell the truth."</p>
<p>Dr. Muhammad went on to present extensive evidence that the policy
of deliberate genocide is fully operational. He described the
<ent type='ORG'>CIA</ent>'s support for the cause of population control during George
Bush's tenure as Director of <ent type='ORG'>Central Intelligence</ent>, and reported
the contents of <ent type='ORG'><ent type='ORG'>Nation</ent>al Security <ent type='ORG'>Memorandum</ent></ent> 200, written during
the <ent type='ORG'>Ford</ent> administration, which advised that the preservation of
U.S. political and commercial interests "will require that the
President and Secretary of <ent type='ORG'>State</ent> treat the subject of population
growth control in the third world as a matter of paramount
importance...." To the amazement of the audience, Muhammad
identified the authors of the internal memo as Henry Kissinger and
Gen. Brent Scowcroft, now Bush's national security adviser. (See
The <ent type='GPE'>New Dawn</ent> Vol.1 No.1, May, 1991)</p>
<p>Dr. Muhammad used the case of <ent type='GPE'>Brazil</ent>, which has the second largest
black population in the world, to prove that the memorandum was
being implemented. "Today in <ent type='GPE'>Brazil</ent>, 40% of the women of
childbearing age have been surgically sterilized with funds
provided by the <ent type='ORG'>USAID</ent>," he said, "and 90% of those sterilized
women are black."</p>
<p>He insisted that this genocide was the real agenda of Bush's New
World Order; that it not only motivated the invasion of <ent type='GPE'>Panama</ent> and
the kidnapping of Gen. Manuel Noriega, but also the continuing
murder of the nation of <ent type='GPE'>Iraq</ent>. He told the audience that these were
just the opening battles in the war of the advanced sector nations
of the <ent type='LOC'>North</ent> against the developing nations of the <ent type='NORP'>South</ent>. Dr.
Muhammad denounced George Bush as a wicked man who cherished his
membership in the satanic secret society <ent type='ORG'>Skull</ent> and Bones. He
reminded the audience that the "skull and bones" was also the
emblem on the flag flown by the slave traders who raided <ent type='LOC'>Africa</ent>,
as well as of the latter day pirates.</p>
<p>AIDS and 'population control'</p>
<p>Given the Anglo-<ent type='NORP'>American</ent> establishment's commitment to mass
murder, the effort to suppress the promising research of Dr. Koech
and his colleagues should come as no surprise to anyone, the
<ent type='ORG'>Nation</ent> of <ent type='NORP'>Islam</ent> leader said. In fact, he contended, there is
substantial evidence to indicate that AIDS was developed as a
race-specific population control measure. Dr. Muhammad ridiculed
the theory that AIDS originated when the virus made a species jump
from the <ent type='NORP'>African</ent> green monkey to the <ent type='NORP'>African</ent> population. "We lived
with the green monkey for thousands of years and never had any
problems. The green monkey isn't our enemy. The <ent type='ORG'>IMF</ent> is."</p>
<p>Dr. Muhammad, who is a trained surgeon, said he traveled to <ent type='GPE'>Kenya</ent>
to see for himself what the alpha interferon derivative, which
goes under the trade name <ent type='ORG'>Kemron</ent>, was really all about. Dr.
Muhammad reported that he interviewed the research team in their
laboratory, was permitted to review their data, and to examine
AIDS patients currently undergoing treatment with <ent type='ORG'>Kemron</ent> and with
a new, more advanced form of <ent type='ORG'>Kemron</ent>, the drug <ent type='ORG'>Immunex</ent>, which
contains a greater number of alpha interferon components than the
original drug. Dr. Muhammad stressed that although the new drug
was only a treatment and not a cure for the deadly HIV virus, he
was tremendously hopeful and encouraged by the dramatic
improvement in the condition of those undergoing treatment.</p>
<p>Dr. Muhammad introduced Dr. Barbara Justice, a well-known <ent type='GPE'>New York</ent>
City-based cancer surgeon who has sent 54 AIDS patients to <ent type='GPE'>Kenya</ent>
for treatment over the past year. Dr. Justice reported that 97% of
her patients showed marked improvement within weeks of beginning
treatment, and that most were able to regain some degree of
normalcy in their ability to function.</p>
<p>It has been almost impossible for anyone outside of <ent type='GPE'>Kenya</ent>
administering <ent type='ORG'>Kemron</ent> on an experimental basis in the to assess the
work of the <ent type='GPE'>Kenya</ent>n team, which has been treatment of AIDS since
1989, since it has been systematically blacked out of the
scientific literature. Dr. Koech was to present his data, first at
<ent type='ORG'>the International AIDS Conference</ent> in <ent type='GPE'>the United States</ent> in 1987,
and then again at the 1991 AIDS Conference in <ent type='GPE'>Italy</ent>. On both
occasions, his invitation was inexplicably withdrawn.</p>
<p>Last year, Dr. Koech decided to take his data directly to the U.S.
medical community, and an extensive U.S. lecture tour was planned.
That tour was abruptly cancelled when the <ent type='ORG'>State</ent> Department refused
to issue Dr. Koech the necessary permission to enter the United
<ent type='ORG'>State</ent>s.</p>
<p>This is certainly not the first time that important AIDS research
has been suppressed. Quite the contrary, it is part of a
continuing criminal pattern of lies and cover-up. The importance
of a rapid evaluation of Dr. Koech's work with <ent type='ORG'>Kemron</ent> and <ent type='ORG'>Immunex</ent>
is obvious. Currently, the only treatment available to AIDS
victims is the drug AZT; however, AZT therapy is prohibitively
expensive and carries with it extremely destructive side effects,
especially with prolonged use. Additionally, a recent study
conducted by the U.S. <ent type='ORG'>Army</ent> showed that, for unexplained reasons,
AZT therapy is not only largely ineffective in the treatment of
blacks, but that, in fact, AZT seems to aggravate symptoms in an
alarming number of black patients.</p>
<p><ent type='GPE'>Kenya</ent>'s President Daniel Arap Moi clearly finds the Koech team's
findings to be convincing. He recently announced that his
government was building a factory to allow the mass production of
alpha interferon.**</p>
<div>======================================================================</div>
<p>AIDS - Man-Made Holocaust</p>
<p>The fact that AIDS is a man-made virus created in U.S.
laboratories has been covered up</p>
<p>By JASON JEFFREY</p>
<p>"America should withdraw from the <ent type='LOC'>Mediterranean</ent>, <ent type='LOC'>Europe</ent> and all
foreign bases and it should save that money to create jobs for 12
million unemployed <ent type='NORP'>Americans</ent>, and contribute towards the
elimination of the diseases it manufactured like AIDS which was
produced by the <ent type='ORG'>CIA</ent> at its laboratories and tested on <ent type='NORP'>American</ent>
prisoners who took the virus with them to the outside world when
released from prison and then it spread throughout the world."
- Muammar Al-Qadhafi speaking at the International Conference for
Peace in the <ent type='LOC'>Mediterranean</ent>, 4-6 May, 1990.</p>
<p>On July 4, 1984, the <ent type='NORP'>Indian</ent> daily <ent type='ORG'>Patriot</ent> published a
horrifying report that the disease AIDS was believed to
have originated from a virus created in the laboratories
at the U.S. germ warfare research institute at Fort
Detrick, <ent type='GPE'>Maryland</ent>. The editor explained that the
information had come from a well-known <ent type='NORP'>American</ent> scientist
and anthropologist who expressed the fear that <ent type='GPE'>India</ent> might
face a danger from the disease in the near future. The
<ent type='NORP'>American</ent> had to remain anonymous. He was obviously in
danger for having disclosed so deadly a secret. At that
time, when the full horror of the incurable disease was
not known <ent type='ORG'>Patriot</ent> reported that the World Health
Organisation believed AIDS posed the gravest threat to the
entire population of the world. More on the World Health
Organisation later. <ent type='ORG'>The <ent type='NORP'>British</ent> Sunday <ent type='ORG'>Express</ent></ent>, 26
October, 1986, with banner headlines, and an "exclusive"
label, announced "AIDS made in lab. shock." The front-page
story said that the virus was created during laboratory
experiments which "went disastrously wrong." It added that
a massive cover-up had kept the secret from the world. The
Sunday <ent type='ORG'>Express</ent> quoted a <ent type='NORP'>British</ent> expert, Dr. John Seale,
who first reported his conclusion that the virus was
man-made last August, 1986, in <ent type='ORG'>the Royal Society</ent> of
Medicine <ent type='ORG'>Journal</ent>. He said that his report was met with a
"deadly silence" from the medical profession, and that
made him very suspicious. The editor of the <ent type='ORG'>Journal</ent>
agreed, according to Dr. Seale, that "it sounded like a
conspiracy of silence." The second expert quoted by the
Sunday <ent type='ORG'>Express</ent>, was Prof. Jacob Segal, retired Director of
<ent type='ORG'>the Institute</ent> of Biology in <ent type='GPE'>Berlin</ent>. It said, "our
investigators have revealed that two U.S. Embassy
officials made a two-hour visit to Prof. Segal at his home
two weeks ago questioning him about what he knows, what he
thinks, where he got his information, and what he intends
doing with his report." The Professor told the reporters,
"one said he was a historian, and the other said he was a
political consul. But I am positive they were from the
<ent type='ORG'>CIA</ent>, and that they were deeply concerned that the cover-up
over the origin of AIDS was going to be exposed." I told
them I had known that in the mid-70s experiments were
being carried out at Fort Detrick, where the U.S. <ent type='ORG'>Army</ent>
Medical Research Command has its headquarters, on
volunteer long-term prisoners who were promised their
freedom after the tests. Almost certainly the scientists
were unaware of the extent of their terrible creation -
the AIDS virus.
<ent type='ORG'>WHO</ent> Involvement?
The third expert quoted in the Sunday <ent type='ORG'>Express</ent> was Dr.
Robert Strecker, an internist and <ent type='ORG'>gastroentarologist</ent> from
<ent type='GPE'>Glendale</ent>, <ent type='GPE'>California</ent>, who stated "it must have been
genetically engineered." Strecker believes, after years of
exhaustive research, that the AIDS virus is indeed
man-made. Strecker has alleged that AIDS was engineered at
the request of <ent type='ORG'>the World Health Organisation</ent> and other
scientific groups who, according to Strecker, injected the
disease during preventative vaccines. <ent type='ORG'>WHO</ent>, he says, along
with <ent type='ORG'>the International Agency for Research</ent> on Cancer and
<ent type='ORG'>The National Institute</ent> on Health, requested the production
of a virus that would attack the immune system's T-cells.
AIDS, he says, is a hybrid of two animal viruses - bovine
leukemia (found in cattle) and a sheep brain virus called
visna. This new virus was given as vaccinations in <ent type='GPE'>Haiti</ent>,
<ent type='GPE'>Brazil</ent>, <ent type='LOC'>Africa</ent> and the <ent type='LOC'>Caribbean</ent> by <ent type='ORG'>WHO</ent> in a 13-year
campaign against smallpox in <ent type='LOC'>Third World</ent> nations, reports
indicate. Strecker, in his 97-minute videotape, "The
Strecker <ent type='ORG'>Memorandum</ent>," cites specific documentation
supporting theories that AIDS is a result of that direct
request. For example, from Volume 47 of Bulletin of the
World Health Organisation (1972), page 259: "The effects
of virus infection of different cell types (e.g.,
Macrophages, T and B lymphocytes) should be studied in
greater detail with morphological changes perhaps serving
as an indication of functional alteration..." "The
possibility should also be looked into that the immune
response to the virus may itself be impaired if the
infecting virus damages more or less selectively the cells
responding to the viral antigens..." In fact, a May 11,
1987 frontpage article in <ent type='ORG'>the London Times</ent>, headlined
"Smallpox Vaccine Triggered AIDS Virus," said <ent type='ORG'>WHO</ent> was
investigating new evidence suggesting that "immunization
from the smallpox vaccine <ent type='ORG'>Vaccinia</ent> awakened the
unsuspected, dormant human immuno defense virus infection
(HIV)." <ent type='ORG'>Vaccinia</ent> was the actual vaccine given as smallpox
deterrents during the <ent type='ORG'>WHO</ent> project. Were the AIDS
infections intentional, accidental or coincidence?
According to Strecker in his "<ent type='ORG'>Memorandum</ent>," a key part of
the actual study "was to be the time relationship between
infection and antigen administration," which suggests <ent type='ORG'>WHO</ent>
officials - and other agencies who were directly dependent
on <ent type='GPE'>the United States</ent> government for research grants - had
to have known. The denials were not long in coming. But
the <ent type='NORP'>British</ent> Sunday Telegraph exposed itself. It said the
story (the Sunday <ent type='ORG'>Express</ent> article) was invented by the
<ent type='NORP'>Russians</ent> "to smear the <ent type='NORP'>Americans</ent>," and recalled that it
had appeared in the <ent type='NORP'>Soviet</ent> journal, <ent type='ORG'>Literary Gazette</ent>. It
said this paper based its report on the <ent type='ORG'>Patriot</ent> - and that
the <ent type='ORG'>Patriot</ent> report did not exist! Professor Segal
describes as "ludicrous and scientifically incredible" the
theory that the virus came from <ent type='NORP'>African</ent> green monkeys. One
thing is certain: the controversy surrounding the AIDS
virus will not die.</p>
<p>A Weapon Against Black People?
Zear Miles, a Black industrial engineer, who has studied
the AIDS virus and its origins for about six years has
stated that he has proof from various documentation and
letters from other AIDS researchers to prove that the
virus was made in an <ent type='NORP'>American</ent> military lab as a means to
suppress Blacks. In his document entitled "Rape <ent type='LOC'>Africa</ent>",
Miles researched the origin of the AIDS virus from 1952,
when the federal government had enough blood types and
characteristics of every nationality in the world up to
the <ent type='ORG'>King Alfred</ent> plan which called for the extinction of
Blacks in national security emergencies. Miles learned
that through <ent type='ORG'>Nation</ent>al Security Council <ent type='ORG'>Memorandum</ent> 46,
dated 1978, which called for a possible way to gauge and
control the impact of the growing Black movement, the
government was researching possible ways to suppress Black
hostility toward the authorities. Later called the King
Alfred plan, the scheme called for the extinction of
Blacks by the year 2000 with an AIDS-like virus. Miles
said he also gauged the increasing number of AIDS cases in
which the number of Black contractors have gone up
significantly compared with Whites, citing that the AIDS
virus attacked a Black person's immune system and
destroyed it in six weeks as opposed to a White person's
time of six months.</p>
<p>The Evidence
What is the evidence available to the layman. First, the
initial cases were reported in <ent type='GPE'>New York</ent> and there is no
dispute that Fort Detrick was working on immunological
defence against infection. The <ent type='NORP'>British</ent> <ent type='ORG'>Guardian</ent> reported
on October 27, 1986, that in 1969 evidence was given to a
<ent type='GPE'>Washington</ent> Appropriation Committee that "within the next
five or ten years it would probably be possible to make a
new infective micro-organism which would differ from any
known disease causing organism. Most important, that it
might be refractory to the immunological and therapeutic
properties on which we depend to maintain our relative
freedom from infectious disease." "Refractory" means,
according to the Oxford Dictionary, "not yielding to
treatment." AIDS answers precisely to that description.
On September 24, 1986, <ent type='ORG'>the Daily Telegraph</ent> reported from
<ent type='GPE'>Washington</ent>, "Enough of a debilitating virus to infect the
whole world, disappeared from an <ent type='NORP'>American</ent> germwarfare
laboratory five years ago, and has never been traced, an
environment group claimed yesterday in a <ent type='GPE'>Washington</ent> Court
action aimed at halting biological weapons research." In
1968, the J.D. <ent type='ORG'>Bernal Peace Library</ent> organised a conference
on the dangers of biological warfare research. Ritchie
Calder said then that among the weapons being stockpiled
were some designed to bring about genetic changes. He said
the "doomsday bug was under wraps" and that there was a
conspiracy of silence about germ weapons because the
implications were so frightening." He told the <ent type='NORP'>British</ent>
Daily Mirror after his address that "somewhere in the
world a germ is being cultured to which we would have no
natural resistance and to which there would be no sure
defence." A precise description of AIDS. The <ent type='NORP'>British</ent>
Observer, on June 30, 1968, quoted from an article in the
<ent type='ORG'>Journal</ent> of General Microbiology by W.D. Lawton of Fort
Detrick, and R.C. Morris and T.W. Burrows of the <ent type='NORP'>British</ent>
microbiological research station at Porton. One paragraph
said, "By engineering the genetics of individual strains,
microbiologists aim to produce a single strain containing
the most deadly combination of properties." Again, a
description of AIDS. The article says that at that time
Porton, according to the government, was concerned only
with defence applications of research, but Fort Detrick
was only committed to developing microbiological weapons
for offence. The <ent type='NORP'>Japanese</ent> carried out germ warfare
research in occupied <ent type='GPE'>China</ent> during the war. Some of these
criminals were captured by the <ent type='NORP'>Soviet</ent>s and duly tried and
sentenced. Others were given immunity by the <ent type='NORP'>Americans</ent> and
taken to work at Fort Detrick. In 1969, after the AIDS
virus was loose, negotiations began on a Convention
banning biological weapons, and it came into force in
1972. In its first review conference in 1980, it was
reported that 80 countries had ratified. But there is no
provision in the Convention to ban research or for
verification. Nichola Sims, who has written a book on
biological disarmament, wrote recently, "the failure of
the Convention to impose any restrictions even on
'offensive' biological warfare research, has been
frequently criticised." And she refers to popular fears
that a "super germ breakthrough in the means of waging
biological or toxin warfare is just around the corner and
may induce the possessor of such a germ to break out of
the Convention." She quotes Dr. Robert K. Mikulak of the
U.S. Arms Control and Disarmament Agency for the statement
that "there is no justification for classified military
research on the question in any country." But so far there
is no inspection or verification. A much more recent
accusation against <ent type='GPE'>the United States</ent> for the manufacturing
of the AIDS virus comes from the <ent type='NORP'>Libyan</ent> UN Ambassador, Mr.
Ali Ahmed Elhouderi. On January 9, 1992, at a press
conference, he stated that the AIDS virus was produced in
a laboratory probably as a weapon. He said, "We think it
is man-made and it was done in laboratories. And it was
not, as suggested, coming from monkeys in <ent type='LOC'>Africa</ent>." He also
suggested that the virus had been manufactured at the time
of the <ent type='GPE'>Vietnam</ent> War. These statements fit perfectly into
place as research would have been carried out at that time
at Fort Detrick for offensive purposes against the <ent type='LOC'>North</ent>
<ent type='GPE'>Vietnam</ent>ese.</p>
<p>AIDS Was Man-Made
On all the circumstantial evidence, the layman will almost
certainly reject the idea that the escape of the man-made
AIDS virus was the result of a disastrous error during
innocent civilian research. We can assuredly conclude that
it was the result of germ warfare research, and the finger
of guilt points to <ent type='GPE'>the United States</ent>. The scientists
could not have visualised that they would let loose a
so-far incurable disease that may and possibly will wipe
out millions, particularly in the <ent type='LOC'>Third World</ent>, where the
majority of the world's population lives. Never was the
need greater for the nations to drop their differences and
to concentrate all their skill and resources in a
world-wide battle against this terrible threat, and to end
the horror of germ warfare research.**</p>
<div>======================================================================</div>
<p>The Mystery of <ent type='ORG'>Skull</ent> Valley</p>
<p>By NIKOLAI FILIPPOV</p>
<p>Because of an error made by an airman testing a new germ weapon, a
deadly virus attacks the population of a small town in highland
<ent type='GPE'>Utah</ent>, <ent type='GPE'>USA</ent>. An incurable disease begins to kill people like a
plague epidemic. In an attempt to cover up the traces of their
crime, the military authorities artificially cause a landslide
that buries the town and doom chance survivors to lifelong
isolation.</p>
<p>This is the plot of Vector, a novel by Henry Sutton, an
<ent type='NORP'>American</ent> author. This book is based on dramatic events
during which the victims were fortunately not people but
animals. March 14-20, 1968 was a black week for <ent type='NORP'>American</ent>
farmers grazing sheep in the remote pasturelands of
semi-desert <ent type='ORG'>Skull</ent> Valley, <ent type='GPE'>Utah</ent>. About 6500 sheep died
there in those seven days under mysterious circumstances.
Even more of a mystery was that people, cattle and other
animals in the area were unscathed. Everybody - farmers,
residents of <ent type='GPE'>Utah</ent>, journalists - felt certain that the
accident was linked to the US <ent type='ORG'>Army</ent> chemical and
bacteriological testing ground in Dugway with an area of
several thousand square kilometres in the vicinity of
<ent type='ORG'>Skull</ent> Valley. Indeed, at that very time the thousands of
Dugway employees were carrying out large scale experiments
in preparation for further escalation of the chemical war
and the start of a germ war in <ent type='GPE'>Vietnam</ent>. For a whole year
<ent type='ORG'>the Defence Department</ent> emphatically denied that animals in
<ent type='ORG'>Skull</ent> Valley were being affected by the chemical or
biological agents disseminated in the atmosphere during
the test. In an attempt at a cover-up, experts at the
proving ground advanced hypotheses which must have seemed
untenable even to laymen about the sheep having been
killed by poisonous plants or a natural epizootic.
However, an inquiry by <ent type='GPE'>Utah</ent> authorities in collaboration
with veterinarians and health experts compelled the
<ent type='ORG'>Pentagon</ent> to admit its responsibility for the death of the
sheep. Even so, no one at Dugway was punished. The blame
for a terrible crime posing a real threat to people's
health due to a gross violation of safety standards in
conducting tests was placed on an unfortunate accident.
According to the official version formulated under the
direction of the U.S. military authorities, a test of
<ent type='ORG'>TMU</ent>-28/B spray tanks with nerve agent VX, was carried out
at Dugway on March 13, 1968. The gas was dispersed from an
F-4E jet bomber by means of two spray tanks with a total
capacity of 1200 litres. The bomber flew at an altitude
of 40 to 45 m. During the test something went wrong with
one of the tanks (or so the version ran), and besides, the
direction of the wind varied, with the result that part of
the nerve gas was carried beyond the proving ground. A
cloud of aerosol VX allegedly contaminated pasturelands on
an area of 400-500 sq. km. <ent type='ORG'>Skull</ent> Valley was not the only
area where sheep died, for a cloud of aerosol VX reached
<ent type='GPE'>Res Valley</ent>, killing sheep 70 km away from where the poison
gas had been released. Anyone who has read publications
dealing with the accident in <ent type='ORG'>Skull</ent> Valley and <ent type='GPE'>Res Valley</ent>
is bound to detect a contradiction between the military
authorities' version and the facts. The <ent type='ORG'>Pentagon</ent> has yet
to explain why a whole year passed before it made up its
mind about what chemical or biological agent caused the
death of the sheep outside Dugway. If the Dugway test had
to do only with VX, then that gas was the only cause of
the sheep's death and this could have been stated at once.
There is reason to presume that over a short period
experiments were carried out at Dugway involving a whole
range of poison gases and biological agents. But it is
logical to suppose that even in such a contingency experts
should know well the properties and casualty effects of
the test materials. And this implies that researchers must
have had no difficulty in ascertaining the nature of the
agent which killed so many sheep. The official story of
the experiment of March 13, 1968, says that the wind
carried beyond Dugway, in the form of vapours and highly
dispersed aerosol, a mere nine kg, or 0.8 per cent, of the
total amount of VX gas to be dispersed. <ent type='LOC'>Field</ent> chemical
control cannot ensure such a degree of accuracy. But the
authors of the version needed to cite some figure in order
to make people believe that the sheep had been killed by a
nerve gas. At the same time, the <ent type='ORG'>Pentagon</ent> wanted to
conceal from the public the real danger posed by chemical
weapon tests in the atmosphere to residents of <ent type='GPE'>Utah</ent> and so
it withheld information about the actual amount of gas
released over <ent type='ORG'>Skull</ent> Valley. The <ent type='ORG'>Pentagon</ent> officials
suggested that the contamination level in the <ent type='ORG'>Skull</ent> Valley
pastureland where deaths occurred among sheep averaged a
mere 0.02 gram per hectare. Let us note by way of
comparison that to kill humans, it would be necessary
according to U.S. data available to disseminate from one
to three kilograms of VX per hectare of target, or 100
thousand times more than the contamination level in <ent type='ORG'>Skull</ent>
Valley given in the official version. Reports said that in
a flock totalling 2800 sheep, 2500 or 90 per cent, were
killed. No such effect is possible where the VX
contamination level is 0.02 gram per hectare. A
publication put out by the Dugway proving ground said that
during the test on March 13, 1968, the greatest distance
at which VX drops spilled on the ground had been 5.4 km
and not 70 km, as the official version would have it. The
<ent type='ORG'>Pentagon</ent>'s information on one and the same fact varies
from document to document and from period to period.
Surely this shows that the version is false. A
contaminated cloud spreading wide in the atmosphere only
retains vapours and minute particles of aerosol which do
not settle on the ground and can be inhaled. It follows
that had such a cloud really floated over <ent type='ORG'>Skull</ent> Valley, it
would have caused inhalational casualties in other animals
as well, including cattle and horses, but no such thing
happened, according to documentary evidence. In the early
days after the accident, before the hypothesis about VX
was advanced, doubts were expressed even by Brig. Gen.
William Stone. He rightly asked why the gas had only
killed sheep without affecting people. There were also
other moot points. Why were the diseased sheep shot dead?
Why was no attempt made to save them by evacuating them to
an uncontaminated area or by treating them with atropine
or other antidotes? Marr Fawcett, a veterinarian of <ent type='GPE'>Utah</ent>,
refused to believe that the sheep had been poisoned with
VX, for in that case many of them could, in his opinion,
have been saved by means of antidotes. Dr. Kent Van
Kampen, a veterinary pathologist in <ent type='GPE'>Utah</ent>, said in April
1968, shortly after the accident, that as early as March
17, 1968, the supposition that the sheep had been hit by a
chemical poison affecting the nervous system could have
been refuted without difficulty since all symptoms of such
poisoning were lacking. The death of an animal poisoned
with a nerve gas such as VX is accompanied by spasms and
paresis of muscles in the limbs. Yet judging by what sheep
herders said in the early days of the inquiry into the
accident, dying sheep had shown no signs of spasms. True,
later on someone saw to it that a videotape recording
allegedly illustrating the <ent type='ORG'>Skull</ent> Valley accident was
projected widely. The tape showed the death of a single
sheep shaking with spasms as a group of civilians looked
on. One year after the accident, Kent Van Kampen and Marr
Fawcett contributed in collaboration with other experts of
<ent type='GPE'>Utah</ent> an article to the <ent type='ORG'>Journal</ent> of the <ent type='NORP'>American</ent> Veterinary
Medical Association setting out the causes and
circumstances of the sheep's death in <ent type='ORG'>Skull</ent> Valley, their
version tallying with the <ent type='ORG'>Pentagon</ent>'s. There was a footnote
saying that in writing their article, the authors had
enjoyed expert assistance (it is easy enough to guess what
kind of assistance) in particular from Dr. Mortimer
Rothenberg, the science director at Dugway, and Dr.
Bernard MacNamara of <ent type='ORG'>Edgewood Arsenal</ent>, the chief U.S. <ent type='ORG'>Army</ent>
centre for the development of chemical and germ weapons.
We might as well note at this point that shortly after the
sheep's death in <ent type='ORG'>Skull</ent> Valley Dr. Rothenberg, trying to
exonerate Dugway from blame for the accident, declared
that the symptoms displayed by the sheep had nothing
whatever in common with those of nerve gas poisoning. And
so, it took the <ent type='ORG'>Pentagon</ent> a year to invent an explanation
for the sheep's death and make the civilian experts
mentioned above present its version as their own, thereby
striking a bargain with their conscience. The videotape
which showed a sheep's death from VX was intended to serve
the same purpose. But the forgery was too crude for
knowledgeable people to mistake it for the truth. They
realised at once that the "documentary" showed a sheep
injected with a nerve gas by means of a syringe, that is,
in the same way as this is done in demonstrating the
effect of nerve gases on animals. They deduced this from
the absence of any other living or dead sheep on the
screen as well as from the presence of people wearing no
gas masks or protective clothes, whereas safety
regulations forbid anyone to enter without taking these
precautions in an area contaminated by VX to a degree
killing livestock. There is no such ban where a poison gas
is injected into the body of an animal outside a
contaminated area. A further fact worthy of note is that
the worker's teams which buried the dead sheep had no gas
masks on, judging by other videotapes and various
photographs. This is permissible only when the nature of
an agent which has caused the death of animals is known
for certain. Furthermore, it is necessary to note that the
agent used was completely harmless to humans. This detail,
like the others cited above, indicates that the sheep in
<ent type='ORG'>Skull</ent> Valley were killed by something other than nerve
gas. The death of livestock so far away from the testing
ground, as in the case of <ent type='ORG'>Skull</ent> Valley, could only be
caused by a biological agent. Experts could establish
without difficulty that nine litres of biological agent is
enough to generate a pathogenic aerosol cloud five km
long, two km deep and 100 m high. One litre of aerosol
cloud could contain several hundred units of pathogen.
Such a cloud can sail many dozens of kilometres without
losing its casualty effects. Consideration of the death
rate of biological agents during the drift of aerosol
particles in the atmosphere makes no difference as far as
the main conclusion is concerned. <ent type='ORG'>Poison</ent> gas tests
according to regulations in force at Dugway are generally
conducted in the morning to ensure that enough daylight
remains for collecting data on the results of tests and
cleaning the test site. The dissemination of VX on March
13, 1968, is alleged to have been carried out one hour
before sunset. Evening experiments are particularly
typical in the case of biological agents, for researchers
are careful to preclude the disastrous impact of sunrays
on pathogens. The year 1968, when the <ent type='ORG'>Skull</ent> Valley
accident occurred, has gone down in history as the peak of
U.S. chemical warfare in <ent type='GPE'>Vietnam</ent>, <ent type='GPE'>Laos</ent> and <ent type='NORP'>Kampuchea</ent>. In
thelate 1960s, the <ent type='ORG'>Pentagon</ent> worked at a frantic pace to
develop new chemical and germ weapons. A report by the
House Committee on Science and <ent type='ORG'>Astronautics</ent> said that in
the years preceding the accident, the <ent type='ORG'>Pentagon</ent> had been
engaged in a vast programme for germ weapon testing. The
tests were conducted at several military testing grounds,
on ocean islands, in the <ent type='GPE'>Panama</ent> Canal zone, <ent type='GPE'>Alaska</ent>, New
York City and <ent type='GPE'>San Diego</ent> as well as on airfields, in
subways and on highways. The Dugway test made on March 13,
1968, or somewhat earlier could be one of those tests. It
is reasonable to suppose that during that test use was
made of biological agents based on a virus selectively
killing sheep without doing any harm to humans. It could
be visna, a virus which has been intensively studied since
the late 1950s in several research centres, including Fort
Dettrick, <ent type='GPE'>Maryland</ent>, then the main U.S. centre for the
development of germ weapons. No visna-caused diseases have
been recorded among humans. This virus hardly affects
cattle, horses or other animals. Its properties in this
respect coincide entirely with those of the agent
responsible for the <ent type='ORG'>Skull</ent> Valley accident in 1968. Visna
affects the central nervous system of sheep, robbing their
body of immunity. The symptoms are progressive weakness,
shortness of breath, a wobbly gait, sagging withers and a
drooping head. The end affect is paresis and paralysis of
the skeletal muscles and then death. Similar symptoms were
registered in sheep affected with the <ent type='ORG'>Skull</ent> Valley
disease. The disease caused by visna is incurable. This
explains why the epidemiological service of <ent type='GPE'>Utah</ent> did the
right thing by deciding to slaughter the diseased sheep.
No antidotes could have helped the animals in the least
and were not used, either. If during the March 1968 tests
at Dugway visna was used as a simultant modelling the
properties of germ weapons, it is clear why the men who
buried the dead sheep used no gas masks or protective
clothes, since visna is harmless to man. And this invites
another conclusion: at that time, the nature of the agent
which affected the sheep was known to at least a small
group of people in charge of removing the effects of the
accident. The establishment of investigation committees
was merely designed to conceal the real objectives and
tasks of the Dugway experiments from the public. The
mystery of those criminal experiments has begun to come to
light in recent years. Competent scientists consider that
visna was used in <ent type='GPE'>the United States</ent> for genetic
engineering work which resulted in creating HIV, a
chimeric virus causing an incurable infectious disease of
man known as AIDS. Research into HIV at the molecular
level has shown that 60 per cent of its genome is
identical with that of visna and the rest is a built-in
nucleotide sequence isolated from the genome of another
retrovirus, HLTV-I. HIV, or the pathogen of AIDS, was
designed in U.S. genetic engineering laboratories on
instruction from the <ent type='ORG'>Pentagon</ent>. The purpose of this virus
is to augment the U.S. germ (biological) warfare potential
by acquiring a capability for depriving an enemy
population of vitally important immunity at the threshold
of a major or local armed conflict. The conclusion about
the complicity of the U.S. military authorities in the
appearance of AIDS, the new dangerous disease which
affects humans, is shared by John Seale of <ent type='GPE'>Britain</ent>, Jacob
Segal of <ent type='GPE'>Germany</ent>, Robert Strecker of <ent type='GPE'>the United States</ent> and
other noted scientists and experts who have carefully
analysed available scientific data. [See <ent type='GPE'>New Dawn</ent> Vol.2,
No.1] For the time being, they have discounted the events
and facts connected with the <ent type='ORG'>Skull</ent> Valley accident.
Nevertheless, they have come to the unanimous conclusion
that in designing HIV visna was made use of. Dr. Seale has
said that a scientist who wanted to evolve a virus capable
of destroying man's immunity system and provoking a
disease similar to AIDS would have to resort to visna.
The "patent" for inventing HIV should be issued to the
United <ent type='ORG'>State</ent>s because it was there that the virus was
developed and also because <ent type='NORP'>Americans</ent> were the first
victims of AIDS. The disease, which broke out in <ent type='GPE'>New York</ent>,
was carried to other big cities in <ent type='GPE'>the United States</ent> and
then to other countries and continents. Its virus was
transmitted by infected <ent type='NORP'>Americans</ent> serving at overseas
military bases. Besides, AIDS was contracted in the United
<ent type='ORG'>State</ent>s by <ent type='NORP'>Australian</ent> and <ent type='LOC'>Europe</ent>an tourists vacationing
there. HIV spread to <ent type='LOC'>Middle East</ent> and other <ent type='NORP'>Arab</ent> countries
which imported blood from donors stricken with AIDS. In
October 1986, John Seale quoted during an interview with
the <ent type='ORG'>Guardian</ent> an extract from a report prepared by the
<ent type='ORG'>Pentagon</ent> in 1969. It said that in the next five to ten
years an infective micro-organism might be evolved that
would differ substantially from all pathogens known so
far. Its most important property, the report said, would
consist in attacking the immune system and internal organs
on which the ability of the human body to resist
infectious diseases depends. Consequently, the AIDS
pathogen was deliberately created and development was
planned and funded. The test at Dugway which killed so
many sheep in <ent type='ORG'>Skull</ent> Valley turned out to be part of the
<ent type='ORG'>Pentagon</ent>'s programme for designing a new biological agent,
the AIDS pathogen.**</p>
<div>======================================================================</div>
<p>AIDS: As <ent type='ORG'>Biological</ent> &amp; Psychological Warfare</p>
<p>By WAVES FOREST</p>
<p>It is hard to imagine that a cure for AIDS would be withheld for
economic reasons alone. Could there be some other motive?</p>
<p>Despite repeated denials from <ent type='ORG'>Defense Department</ent>
officials, allegations persist that AIDS is a genetically
altered virus, which has been deliberately released to
wipe out homosexuals and/or non-whites in the U.S. and
reduce populations in <ent type='LOC'>Third World</ent> countries. At first
glance it seems like the epitome of paranoia to accuse the
military of conspiring to exterminate citizens of their
own country, and even some of their own troops. However,
the vast majority of military personnel could be
completely unaware of such a plot in their midst, while a
relative handful of traitors in key positions could
conduct it under cover of classified operations. And the
circumstantial evidence is actually quite compelling, that
the AIDS virus was artificially engineered, and planted in
several different locations at about the same time through
vaccination programs, and possibly blood bank
contamination. At a <ent type='ORG'>House Appropriations</ent> hearing in 1969,
the <ent type='ORG'>Defense Department</ent>'s <ent type='ORG'>Biological</ent> Warfare (BW) division
requested funds to develop through gene-splicing a new
disease that would both resist and break down a victim's
immune system. "Within the next 5 to 10 years it would
probably be possible to make a new infective
micro-organism which would differ in certain important
respects from any known disease-causing organisms. Most
important of these is that it might be refractory to the
immunological and therapeutic processes upon which we
depend to maintain our relative freedom from infectious
disease." (See A Higher Form of Killing: The Secret Story
of Chemical and <ent type='ORG'>Biological</ent> Warfare by R. Harris and J.
<ent type='ORG'>Paxman</ent>, p.266, Hill and <ent type='ORG'>Wang</ent>, pubs.) The funds were
approved. AIDS appeared within the requested time frame,
and has the exact characteristics specified. In 1972, the
World Health Organisation published a similar proposal:
"An attempt should be made to ascertain whether viruses
can in fact exert selective effects on immune function,
e.g. by... affecting T cell function as opposed to B cell
function. The possibility should also be looked into that
the immune response to the virus itself may be impaired if
the infecting virus damages more or less selectively the
cells responding to the viral antigens." (Bulletin of the
W.H.O., vol. 47, p.257-274.) This is a clinical
description of the function of the AIDS virus. The
incidence of AIDS infections in <ent type='LOC'>Africa</ent> coincides exactly
with the locations of the massive W.H.O. smallpox
vaccination program in the mid-1970's (<ent type='ORG'>London Times</ent>, May
11, 1987). Some 14000 <ent type='GPE'>Haiti</ent>ans then on UN secondment to
Central <ent type='LOC'>Africa</ent> were also vaccinated in this campaign.
Personnel actually conducting the vaccinations may have
been completely unaware that the vaccine was anything
other than what they were told. A striking feature of
AIDS is that it is ethno-selective. The rate of infection
is twice as high among Blacks, <ent type='NORP'>Latinos</ent> and Native
<ent type='NORP'>Americans</ent> as among whites, with death coming two to three
times as swiftly. And over 80% of the children with AIDS
and 90% of infants born with it are among these
minorities. "Ethnic weapons" that would strike certain
racial groups more heavily than others have been a
longstanding U.S. <ent type='ORG'>Army</ent> BW objective. (Harris and <ent type='ORG'>Paxman</ent>,
p.265) Under the current U.S. administration biological
warfare research spending has increased 500 percent,
primarily in the area of genetic engineering of new
disease organisms. The "discovery" of the AIDS virus
(<ent type='ORG'>HTLV</ent>3) was announced by Dr. Robert Gallo at <ent type='ORG'>the Nation</ent>al
Cancer Institute, which is on the grounds of Fort Detrick,
<ent type='GPE'>Maryland</ent>, a primary U.S. <ent type='ORG'>Army</ent> biological warfare research
facility. Actually, the AIDS virus looks and acts much
more like a cross between a bovine leukemia virus and a
sheep visna (brain-rot) virus, cultured in a human cell
culture, than any virus of the <ent type='ORG'>HTLV</ent>3 group. The closest
thing in this case to a "smoking test tube" so far is the
AIDS virus itself. If it was possible for such a
monstrosity to occur naturally it would have done so ages
ago and decimated mankind at that time. Some other life
form would presently be in control of this planet
(assuming that is not already the case). The Hepatitis B
vaccine study in 1978 appears to have been the initial
means of planting the infection in <ent type='GPE'>New York City</ent>. The test
protocol specified non-monogamous males only, and
homosexuals received a different vaccine from
heterosexuals. At least 25-50% of the first reported New
York AIDS cases in 1981 had received the Hepatitis B test
vaccine in 1978. By 1984, 64% of the vaccine recipients
had AIDS, and the figures on the current infection rate
for the participants of that study are held by the U.S.
<ent type='ORG'>State</ent> Department of Justice, and "unavailable." The AIDS
epidemic emerged full-blown in the three U.S. cities with
"organised gay communities" before being reported
elsewhere, including <ent type='GPE'>Haiti</ent> or <ent type='LOC'>Africa</ent>, so it is
epidemiologically impossible for either of those countries
to be the origin point for the U.S. infections. Another
indication AIDS had multiple origin points is that the
14-month doubling time of the disease cannot nearly
account for the current number of cases if we assume only
a small number of initial infections starting in the late
1970s. Before dismissing the possibility that a U.S. <ent type='ORG'>Army</ent>
BW facility would participate in genocide, bear in mind
that hundreds of top <ent type='NORP'>Nazis</ent> were imported into key
positions in the U.S. military-intelligence establishment
following WWII. U.S. military priorities were then
reorientated from defeating <ent type='NORP'>Nazis</ent> to "defeating" communism
at any cost, and strengthening military control of
economic and foreign policy decisions. (See Project
Paperclip by Clarence Lasby, <ent type='GPE'>Atheneum</ent> 214, NY, and Gehlen:
Spy of the Century by E.H. Cookridge, Random House.)
There's no proof those <ent type='NORP'>Nazis</ent> ever gave up their longterm
goals of conquest and genocide, just because they changed
countries. Fascism was and is an international phenomenon.
It's not as if this was a total reversal of previous U.S.
military policy, however. Hitler claimed to have gotten
his inspiration for the "final solution" from the
extermination of Native <ent type='NORP'>Americans</ent> in the U.S. For that
matter the first example of germ warfare in the U.S. was
in 1763 when some of the <ent type='LOC'>Europe</ent>an colonists gave friendly
<ent type='NORP'>Indian</ent>s a number of blankets that had been infected with
smallpox, causing many deaths. One indication of the
actual U.S. military priorities regarding BW was the
importation of the entire <ent type='NORP'>Japanese</ent> germ warfare unit
(#731) following WW II. These people killed over 3000
POWs, including many <ent type='NORP'>Americans</ent>, in a variety of grisly
experiments, yet they were granted complete amnesty and
given <ent type='NORP'>American</ent> military positions in exchange for sharing
their research findings with their U.S. <ent type='ORG'>Army</ent> counterparts.
Consider also the callous attitude displayed by top
military officials toward veterans suffering from the
after-effects of exposure to Agent Orange and radiation
from nuclear weapons tests. In fact, since the end of WW
II over 200 experimental BW tests have been conducted on
civilians and military personnel in the U.S. One example
was the test spraying from Sept. 20-26, 1950 of bacillus
globigi and syraceus maracezens over 117 square miles of
the <ent type='GPE'>San Francisco</ent> area, causing pneumonia-like infections
in many of the residents. The family of one elderly man
who died in the test sued the government, but lost. To
this day, syraceus is a leading cause of death among the
elderly in the <ent type='GPE'>San Francisco</ent> area. Another case was the
joint <ent type='ORG'>Army</ent>-<ent type='ORG'>CIA</ent> BW test in 1955, still classified, in which
an undisclosed bacteria was released in the <ent type='LOC'>Tampa Bay</ent>
region of <ent type='GPE'>Florida</ent>, causing a dramatic increase in whooping
cough infections, including twelve deaths. A third example
was the July 7-10, 1966 release of bacteria throughout the
<ent type='GPE'>New York</ent> subway system, conducted by the U.S. <ent type='ORG'>Army</ent>'s
Special Operations Division. Due to the vast number of
people exposed it would be virtually impossible to
identify, let alone prove, the specific health problems
resulting directly from this test. Despite the loyalty of
the vast majority of U.S. military personnel toward their
country, there are clearly some military officials who
have very different intentions, and they occupy high
enough positions to impose their priorities on military
programs and get away with it, so far. The first detailed
charges regarding AIDS as a BW weapon were published in
the <ent type='ORG'>Patriot</ent> newspaper in <ent type='GPE'>New Delhi</ent>, <ent type='GPE'>India</ent>, on July 4,
1984. It is hard to say where the investigations of this
story in the <ent type='NORP'>Indian</ent> press might have led, if they had not
been sidetracked by two major domestic disasters shortly
thereafter: the assassination of Indira Gandhi on Oct. 31
and the Bhopal Union Carbide plant "accident" that killed
several thousand and injured over 200000 on Dec. 3.
Apparently, homosexuals were an initial target in the U.S.
because their sexual practices would help in the rapid
spread of the disease, and because it was correctly
assumed that very few non-homosexual citizens would pay
much attention during the early years of the epidemic.
Also, the stigma of a "homosexual disease" would interfere
with rational analysis and discussion of AIDS. Bear in
mind that homosexuals were among the first to be
exterminated in <ent type='NORP'>Nazi</ent> <ent type='GPE'>Germany</ent>, before <ent type='NORP'>Jews</ent> and other
minorities, so fewer citizens would object. The details
of precisely how the AIDS virus was synthesized, mass
cultured, and spread by incorporating it into vaccination
programs are available but fairly intricate. Evil is hard
to confront, especially on the preposterous scale we have
here. If you acknowledge the presence of those who think
their only hope for survival is to kill off two thirds of
all the other kinds, and their ability to manage it, you
then pretty much have to do something about it.</p>
<p>Abridged from Now What #1.**</p>
<div>======================================================================</div>
<p><ent type='ORG'>Immunex</ent></p>
<p>The <ent type='NORP'><ent type='LOC'>North</ent> <ent type='NORP'>American</ent></ent>-based <ent type='ORG'>Nation</ent> of <ent type='NORP'>Islam</ent> (<ent type='ORG'>NOI</ent>) led by Minister
Louis <ent type='ORG'>Farrakhan</ent> launched an offensive in its battle against the
deadly "man-made" AIDS virus during its recent Saviours' Day
weekend. The following report is courtesy of The Final Call.
From the rostrum of Christ Universal Temple here, the
Honorable Louis <ent type='ORG'>Farrakhan</ent> announced that the <ent type='ORG'>NOI</ent> has
acquired exclusive distribution rights to the AIDS
fighting drug <ent type='ORG'>Immunex</ent>, an oral alpha-interferon treatment
developed in <ent type='GPE'>Kenya</ent>. "I just got a call from our chief of
staff 3 minutes before I came on the rostrum," Minister
<ent type='ORG'>Farrakhan</ent> said, regarding the confirmation of the <ent type='ORG'>Immunex</ent>
agreement that came from Leonard Muhammad in <ent type='GPE'>Kenya</ent>. "The
<ent type='ORG'>Nation</ent> of <ent type='NORP'>Islam</ent> is announcing to you that we have the
exclusive distribution rights of <ent type='ORG'>Immunex</ent> throughout the
United <ent type='ORG'>State</ent>s of America. "As of this day," he continued,
"Min. Alim will still teach, but he is now <ent type='ORG'>the Minister</ent> of
Health and Human Services for <ent type='ORG'>the Nation</ent> of <ent type='NORP'>Islam</ent>." Dr.
Alim told the cheering audience that the war against AIDS
is being won but total victory will not come "until we
deal with those responsible for making the AIDS virus."
Since the early 1970s under the Nixon administration, he
said, the official policy of this government has been to
commit genocide against non-white people around the earth.
That policy continues under the administration of
President George Bush, he said. Dr. Muhammad and former
Final Call Editor-in-Chief Abdul Wali Muhammad were sent
to <ent type='GPE'>Kenya</ent> by Minister <ent type='ORG'>Farrakhan</ent> last year on a fact-finding
tour regarding the drug <ent type='ORG'>Kemron</ent>. While there, the <ent type='ORG'>NOI</ent>
representatives learned about <ent type='ORG'>Immunex</ent>. Both drugs have
shown remarkable effects in relieving AIDS symptoms, but
the drugs have received very little media coverage in the
U.S. "We would like <ent type='ORG'>FDA</ent> approval," said Min. <ent type='ORG'>Farrakhan</ent>,
"however we can't wait. We will take any risk, bear any
burden to free our people of a man-made disease designed
to kill us all." The Minister added that the drug will be
offered to all who need it "regardless of race, creed or
colour."**
</p></xml>

View File

@ -0,0 +1,732 @@
<xml><p>
Taken from KeelyNet BBS (214) 324-3501
Sponsored by <ent type='ORG'>Vangard Sciences</ent>
PO BOX 1031
<ent type='GPE'>Mesquite</ent>, TX 75150</p>
<p> August 16, 1990
<ent type='ORG'>AIDSPLOT</ent>.ASC</p>
<p> AIDS as a Weapon of War</p>
<p> by Dr. William Campbell Douglas, M.D.</p>
<p> Introduction &amp; Comments by Jim Shults</p>
<p> INTRODUCTION AND COMMENTS</p>
<p> I must admit I am just a little gun shy of doing this
particular article. The reason is pretty obvious. Who in hell is
going to plead guilty to inventing the AIDS virus. Do I think it
was invented? Absolutely and without a doubt.</p>
<p> Firstly, where in hell has it been during the last 5000 years?
Why haven't we had exposure to it sooner, like in the last 50 years?</p>
<p> All of a sudden certain countries and entire continents are
coming down with the AIDS virus and no organization, body, group, or
whatever you care to call it has even a clue to the real source, and
it sure as hell isn't some monkey in <ent type='LOC'>Africa</ent>, that's for sure.</p>
<p> Over the last twenty years the genetic scientists have been
having a filed day inventing all kinds of new "life." Some have
even been granted patents for their creatures, which are usually
various types of bacteria, etc.</p>
<p> One patent was granted for the invention, or more accurately
put, creation, of a type of bacteria that eats oil, handy for oil
spills I guess. Now do you think for even a second that a virus
like the AIDS virus couldn't be created with all the genetic
engineering that is going on around the world?</p>
<p> There are certain types of bacteria that are living in test
tubes in labs around the world that if released would cause the end
of mankind in less than a year.</p>
<p> The real question is why we allow these bozos to play in labs,
making all kinds of new and artificial life in the first place. It
is going to backfire, in fact the author already feels it has,
through the deliberate release of the HIV (human immunodeficiency
virus); that's what AIDS is really called.</p>
<p> Something extraordinary happened last June (88'), in fact it
was so extraordinary that nothing like it has ever happened before.</p>
<p> <ent type='ORG'>The Surgeon General</ent> of <ent type='GPE'>the United States</ent> had mailed to every
mail box and address in <ent type='GPE'>the United States</ent> a brochure attempting to
explain AIDS, its danger, myths and means of transmission. The</p>
<p> Page 1</p>
<p> absolutely amazing thing about this was that it was done at
all.
Think of this for a minute: the U.S. Government mailed this
information to every address in <ent type='GPE'>America</ent>. That in itself should tell
all of us something that the media has somehow missed -- that this
is a population-destroying virus.</p>
<p> That really means that we all are in shit city, race fans, and
the Government know it. It is significant that they did the
mailing, and that should be very significant to anyone who knows
how our government works and what kind of very real panic those
who really know are experiencing.</p>
<p> When something like this brochure is made available as it was,
you can be very sure that the boys at the top, including the
scientific folks, are up against something they may not beat before
it has a very real chance of destroying at least half of mankind!</p>
<p> In fact, the fastest time even guessed at, for some kind of
beginning cure for some types of AIDS is at least five years and
that's thought to be impossible by medical people.</p>
<p> The author comes up with a very plausible scenario for how
rapidly AIDS has been distributed. (We are not blaming the
World Health Organization. In the author's scenario he simply
indicates that the <ent type='ORG'>WHO</ent> was used by others.)</p>
<p> Let's face it, we are in very real trouble. There are several
types of new AIDS viruses and more to be discovered, and who is to
say how the new ones, not yet mutated, will spread -- a sneeze
perhaps?</p>
<p> Our government and others around the world are not telling us
the truth about this stuff in order to protect our poor little dumb
minds. I suspect that if we know the truth, an enormous citizen
effort could be martialed worldwide which would probably shut down
the arms race for the time being.</p>
<p> Again, at the bottom line, we are in big trouble and "they"
know it....Many scientists predict we will lose half the world's
population (including U.S.) by the year 2000.</p>
<p> -- Jim Shults</p>
<p> Page 2</p>
<p> ABOUT THE AUTHOR</p>
<p> William Campbell Douglass, M.D.</p>
<p> Age: 62</p>
<p> Education: BS, University of Rochester, <ent type='GPE'>New York</ent>;
MD, University of Miami School of
Medicine; Graduate, U.S. <ent type='ORG'>Navy</ent> School of
Aviation and Space Medicine</p>
<p> Career: U.S. <ent type='ORG'>Navy</ent>, 7 years -- Flight Surgeon.
In practice for over 25 years. Former
state president, <ent type='GPE'>Florida</ent>, <ent type='GPE'>America</ent>n
College of Emergency Physicians.
Former Editor of <ent type='ORG'>the Journal</ent> of the
Sarasota County Medical Society.
Consulting Editor, <ent type='ORG'>Health Freedom News</ent>.
On Board of Governors of the National
Health Federation. Regular speaker at
<ent type='ORG'>the National Health Federation</ent> meetings
around <ent type='GPE'>the United States</ent>. Appears
regularly on radio and television
programs on health.
Doctor of the
Year: National Health Federation, 1985.</p>
<p> Dr. Douglass has studied in <ent type='GPE'>England</ent> with Dr. Katharina Dalton,
discoverer of the premenstrual syndrome. He was one of the
first doctors in <ent type='GPE'>the United States</ent> to diagnose and treat <ent type='ORG'>PMS</ent>.
He opened his <ent type='ORG'>PMS</ent> Clinic in 1981.</p>
<p> Page 3</p>
<p> AIDS as a Weapon of War</p>
<p> William Campbell Douglass, M.D.</p>
<p> The great powers renounced chemical and biological warfare 20
years ago -- but kept right on experimenting. The germ warfare
experiments on Seventh Day Adventist soldiers,</p>
<p> 1) the <ent type='ORG'>Tuskeegee</ent> syphilis experiments on prisoners,
2) the San Francisco Bay attack by the U.S. <ent type='ORG'>Army</ent> using
serratia marcescens bacteria,
3) the <ent type='GPE'>New York City</ent> subway germ attack
4 and many other experiments on humans, largely unknown to
the victims, continue in the free world.</p>
<p> In Novosybirsk, at <ent type='ORG'>the Ivanofsky Institute</ent> and other <ent type='NORP'>Soviet</ent>
centers of biological warfare, you can be sure that similar
diabolical experiments on humans continue at a frantic pace.</p>
<p> The <ent type='NORP'>Soviet</ent> press, always masters of the half truth, accused
the U.S. <ent type='ORG'>Army</ent> of having engineered the AIDS virus in the biological
warfare laboratories at Fort Detrick, <ent type='GPE'>Maryland</ent>.</p>
<p> This was a clever psy-war ploy which, for a while anyway,
neutralized those of us who were saying essentially the same thing,
that the AIDS virus was probably created through recombinant genetic
engineering (the rearranging of genes between two or more species of
plants or animal) and/or serial passage: the growing of a virus in
a series of generations of tissue culture cells or live animals,
thus adapting the virus to a new species, using human tissue culture
cells in the top security labs at Fort Detrick.</p>
<p> People started accusing us of spreading the <ent type='NORP'>communist</ent> line, not
a comfortable position for a dedicated anti-<ent type='NORP'>communist</ent> like myself.</p>
<p> What the <ent type='NORP'>Soviet</ent> propagandists didn't say was that their agents
had been working in our top security biological warfare laboratories
for over 20 years.</p>
<p> In a burst of brotherly love they were invited in by President
Nixon. The astounded <ent type='NORP'>communist</ent> scientists from <ent type='GPE'>Russia</ent>, the Eastern
Bloc and <ent type='NORP'>Communist</ent> <ent type='GPE'>china</ent>, who had been trying to penetrate this
vital security area for 40 years, quickly accepted.</p>
<p> They have been snickering in their beakers ever since, while
they prepare for our demise.</p>
<p> "It's no secret that they are there," Dr. Carlton Gajdusek,
Nobel Prize winner, a top official at the Fort Detrick <ent type='ORG'>Army</ent>
laboratory in <ent type='GPE'>Maryland</ent>, said in <ent type='ORG'>Onmi Magazine</ent> (March 1986): "In
the facility I have a building where more good and loyal <ent type='NORP'>communist</ent>
scientists from the <ent type='GPE'>USSR</ent> and mainland <ent type='GPE'>China</ent> work, with full passkeys
to all the laboratories, than there are <ent type='GPE'>America</ent>n. Even the <ent type='ORG'>Army</ent>'s
infectious disease unit is loaded with foreign workers who are not
always friendly nationals."</p>
<p> This answer to an interview question refers to the high number
of <ent type='NORP'>Soviet</ent> bloc scientists in this U.S. facility who act as</p>
<p> Page 4</p>
<p> inspectors to ensure that we are not producing bacteriological
weapons in violation of treaties with the <ent type='NORP'>Soviet</ent>s.</p>
<p> You can't put it more plainly than that. Even the <ent type='NORP'>Trojans</ent>
weren't that stupid: at least they didn't KNOW the Trojan horse
was full of soldiers.</p>
<p> When it became obvious to the <ent type='NORP'>Communist</ent> press that we were
getting the truth out about who was running things at Fort Detrick,
they completely reversed themselves and said it was all a mistake.
Everything was just fine at Fort Detrick.</p>
<p> To understand the enormity of our betrayal you must know about
the origin of the AIDS virus. The virologists of the world, the
sorcerers who brought us this ghastly plague, have a united front in
denying that the virus was laboratory-made from known, lethal animal
viruses.</p>
<p> The scientific party line is that a monkey in <ent type='LOC'>Africa</ent> with AIDS
bit a native on the butt. The native then went to town and gave it
to a prostitute who gave it to the local banker who gave it to his
wife and three girlfriends and what!</p>
<p> 50 to 75 million people became infected with AIDS in <ent type='LOC'>Africa</ent> and
throughout the world. This is an entirely preposterous story, and
it is preposterous because:</p>
<p> 1. The green velvet monkey of <ent type='LOC'>Africa</ent> doesn't get human AIDS. You
can't reproduce the disease in monkeys even by injecting AIDS
virus directly into them.</p>
<p> 2. After injecting the virus into monkeys, you can't transmit it
to other monkeys, much less to humans.</p>
<p> 3. Genetically, AIDS (HIV-1) is not even close to the monkey form
of immunodeficiency virus.
[Ed. Note: For references on the three items above,
see: Seale, Dr. John J.,
<ent type='ORG'>Royal Society</ent> of Medicine, Sept. 1987,
Seale, Dr. John J.,
The Origin of AIDS -- International
Conference on AIDS, <ent type='GPE'>Cairo</ent>, March 1988.]</p>
<p> 4. AIDS started not in the villages but in the cities of <ent type='LOC'>Africa</ent>,
where there are no wild monkeys.</p>
<p> 5. The doubling time of AIDS infection being about 12 months, one
monkey biting one native and then spreading the disease would
have taken 20 years to reach a million cases. Seventy-five
million <ent type='LOC'>Africa</ent>ns became infected practically simultaneously.
At the same time, the disease became rampant in the U.S.,
<ent type='GPE'>Haiti</ent> and <ent type='GPE'>Brazil</ent>.</p>
<p> It is obvious that one monkey couldn't have done that (or one
homosexual, either). There had to be some sort of simultaneous
seeding process.</p>
<p> The only worldwide simultaneous seeding going on at the same
time was the smallpox vaccine program of the World Health
Organization (the <ent type='ORG'>WHO</ent>).
Page 5</p>
<p> The early epidemiology of the AIDS pandemic fits the smallpox
vaccination project of the <ent type='ORG'>WHO</ent> -- AND NOTHING ELSE -- with the
exception of the U.S., which we will examine subsequently.)</p>
<p> The AIDS virus was created in a laboratory by combining lethal
animal "retroviruses" in human cancer (HeLA) cell cultures. These
viruses have never before caused infection in man.</p>
<p> The "species barrier" has always been nature's way of keeping a
deadly virus from wiping out the entire animal kingdom, including
man. The myxoma virus of rabbits, for example, wiped out the rabbit
population of <ent type='LOC'>Europe</ent>, but man and other animals were not affected.</p>
<p> The sheep visna virus completely decimated the flocks of
<ent type='GPE'>Iceland</ent>, but no other animal was affected.</p>
<p> The virologists deny that the AIDS virus, HIV-1, is of animal
origin. I am sure that you see the paradox here. <ent type='ORG'>Aren</ent>'t monkeys
animals?</p>
<p> They are also united in saying that it's not possible for the
virus to have been engineered in a laboratory. If it didn't come
from other animals and it didn't come from a laboratory, and they
now admit privately that the monkey couldn't have done it, then it
must have come out of thin air. That's a theological position and
hence beyond argument. It's certainly not scientific.</p>
<p> These scientists who have created this monstrous problem in
their sorcerer's retrovirology laboratories are constantly caught in
their own lies.</p>
<p> The line goes: "The AIDS virus could not have been engineered
in a laboratory because the technology wasn't available until
recently."</p>
<p> <ent type='GPE'>Iceland</ent>ic scientists combined the sheep visna virus with human
tissue cells over 20 years ago. The technology has been refined in
recent years, but the basic process has been actively used in labs
all over the world for long before the AIDS virus made its dramatic
appearance.</p>
<p> But the scientists hold fast in their denial of culpability.
Professor William Jarrett said, when asked about the possibility of
AIDS arising from animal retroviruses, "That is like someone saying
babies come out of cabbages."5</p>
<p> Dr. Robert Gallo said that people who claim AIDS was
manufactured artificially are "either insane or <ent type='NORP'>communist</ent>s."6</p>
<p> Dr. Luis Montagnier, the discoverer of the AIDS virus, said,
"In 1970 there was not enough knowledge in genetic engineering to
make such a virus starting from already existing viruses."7 (See
<ent type='GPE'>Iceland</ent>ic experiments mentioned above.)</p>
<p> This tower of lies must eventually fall of its own weight.
Then what? Where do we look for a solution? Certainly not from
the people who caused the disaster.</p>
<p> But where? -- the <ent type='ORG'>Pentagon</ent>? The <ent type='ORG'>Pentagon</ent> is supporting</p>
<p> Page 6</p>
<p> research on biological warfare in over 100 federal and private
laboratories, including those at many prominent universities.8 Yet,
Neil Levitt, who worked for 17 years at the <ent type='ORG'>Army</ent> Infectious Disease
Institute, says, "It's a joke...there's no defense against these
kinds of organisms. And if you can't defend against something, then
why are we pouring more and more money in it? There's something
else going on that we don't know about."9</p>
<p> Some joke.</p>
<p> A short virology lesson will help you understand that AIDS is
indeed an animal virus and that it was laboratory-made as a weapon
of biological warfare against the free world.</p>
<p> A basic rule of virology is that if two viruses have the same
shape, design and size, then they are almost certainly the same
virus (a very simple and easy to understand rule).10</p>
<p> For example, this virus:</p>
<div> -----------
|==| ||| |
-----------</div>
<p> ... a virus of bacteria (bugs have diseases, too), doesn't look
anything like this virus:</p>
<p> ___________
/ \
/ ~~~~~~~ \
\ /
\___________/</p>
<p> ... a virus of ticks that's transmitted to pigs, or this virus:</p>
<p> __________
____/ ~~~~ \
/ ______/
\________/</p>
<p> ... which is found in horses.</p>
<p> The AIDS virus, which "couldn't have come from animal
viruses" is almost certainly a recombinant virus from fusing a
cattle virus, bovine leukemia virus:</p>
<div> =
*
=* *=</div>
<div> =* ++++ *=</div>
<div> =* *=
*
=</div>
<p> Page 7</p>
<p> ...with sheep visna virus:</p>
<div> *
* *</div>
<div> * ==== *</div>
<div> * *
*</div>
<p> You combine the two in human tissue culture cells and you get bovine
visna virus:</p>
<div> =
*
=* *=</div>
<div> =* ==== *=</div>
<div> =* *=
*
=</div>
<p> ... A VIRUS THAT HERETOFORE DID NOT EXIST -- a product of man,
engineered in a laboratory.</p>
<p> Now, if you isolate the AIDS virus from an infected human, it
looks like this:</p>
<div> =
*
=* *=</div>
<div> =* ==== *=</div>
<div> =* *=
*
=</div>
<p> It doesn't look like this (the tick virus):</p>
<p> __________
____/ ~~~~ \
/ ______/
\________/</p>
<p> ... or this (the cattle virus):</p>
<div> =
*
=* *=</div>
<div> =* ++++ *=</div>
<div> =* *=
*
=</div>
<p> Page 8</p>
<p> It looks like THIS:</p>
<div> =
*
=* *=</div>
<div> =* ==== *=</div>
<div> =* *=
*
=</div>
<p> ... the recombinant virus from cattle and sheep AND ITS CALLED
AIDS. You don't have to be a genius to understand this. Any
properly instructed 10-year-old can understand it ....</p>
<p> But, some alert reader will say, we don't give smallpox
vaccinations in the U.S., so how do you explain the simultaneous
outbreak of AIDS in <ent type='LOC'>Africa</ent>, <ent type='GPE'>Brazil</ent> and <ent type='GPE'>Haiti</ent>, where they did indeed
give the vaccine, and in the U.S., where they didn't give the
vaccine?</p>
<p> Simple. The homosexual community was used as a large group of
experimental animals through the hepatitis-B program. It didn't
take many infected homosexuals among the I.V. drug users to quickly
spread the disease among a large percentage of the addicts due to
the near certainly of infection through direct intravenous insertion
of the virus.</p>
<p> To understand the seeding of AIDS among homosexuals (and
eventually to the rest of us through bisexuals unless drastic action
is taken), you must know about a character with the strange name of
Wolf Szmuness. His life story will seem bizarre to you unless, like
me, you have a conspiratorial turn of mind.</p>
<p> Dr. Szmuness was a <ent type='NORP'>Polish</ent> Jew who supposedly ended up in a
<ent type='NORP'>Siberian</ent> labor camp during World War II. But after the war he
somehow became a privileged person, was sent to medical school in
<ent type='GPE'>Tomsk</ent>, <ent type='GPE'>Russia</ent>, and married a <ent type='GPE'>Russia</ent>n woman. Hardly typical
treatment of an enemy of the <ent type='NORP'>Soviet</ent> state [under Stalin.</p>
<p> Szmuness' biographer said that Wolf was always reluctant to
discuss "those dark years in <ent type='LOC'>Siberia</ent>." Maybe he wasn't in <ent type='LOC'>Siberia</ent>.
If he [actually] was, he certainly wasn't shoveling salt.</p>
<p> In 1959 the <ent type='NORP'>Soviet</ent> government "allowed" him to practice in
<ent type='GPE'>Poland</ent> in a public health capacity. Standard policy in all
<ent type='NORP'>Communist</ent> countries is never to allow all members of a family to
travel out of the country to the <ent type='LOC'>West</ent> at the same time.</p>
<p> This eliminates 98 percent of all defection attempts. I have
physician friends in <ent type='GPE'>Hungary</ent>, for example. He can go to a meeting
anywhere in the world if she stays home. She can go if he stays
home. They can both go if the children are left at home. But in
1969, the entire Szmuness family was allowed by <ent type='NORP'>communist</ent> <ent type='GPE'>Poland</ent> to
go to a medical meeting in <ent type='GPE'>Italy</ent>. At that time they "defected" and
moved to <ent type='GPE'>New York City</ent>.</p>
<p> WITH NO AMERICAN CREDENTIALS <ent type='ORG'>WHATSOEVER</ent>, he immediately got a</p>
<p> Page 9</p>
<p> job as a "lab technician" at the <ent type='GPE'>New York City</ent> Blood Center. Within
a very few years this <ent type='NORP'>Polish</ent> immigrant was GIVEN HIS OWN LAB, a
separate department of epidemiology was created for him at the blood
bank and he, like the chrysalis turning into a butterfly, changed
into a FULL PROFESSOR OF <ent type='ORG'>EPIDEMIOLOGY</ent> AT THE COLUMBIA MEDICAL
SCHOOL!</p>
<p> In six years this "lab tech" became a full professor AND THEN
WENT BACK TO <ent type='ORG'>MOSCOW</ent> for a scientific presentation and was received
as a dignitary, not a defector.</p>
<p> We tell you this amazing story because in retrospect it is
obvious that Wolf Szmuness was a carefully groomed ... agent,
planted here after years of preparation, to instigate biological
warfare against the <ent type='GPE'>America</ent>n people.</p>
<p> Szmuness, with the full cooperation and financial support of
the U.S. Center for Disease Control and <ent type='ORG'>the National Institutes</ent> of
Health,11 masterminded the hepatitis-B vaccine experimental program
used on homosexual men.</p>
<p> He insisted that only young, promiscuous homosexuals be allowed
to participate in the experiment. The experiment started in New
York at the blood bank in November 1978.</p>
<p> THE EXPERIMENTAL VACCINE WAS PRODUCED in a government
supervised laboratory.12 The study was completed in October 1979.
Within 10 years, most of these young men would be dead or dying from
AIDS.</p>
<p> In 1980 the program was expanded to major cities all across the
U.S. In the fall of 1980 the first AIDS case was reported in San
Francisco. Eight years later most of the homosexuals in San
Francisco are infected, dead or dying.</p>
<p> Szmuness did not live to see the fruition of this larger
experiment. He died of cancer in 1982.</p>
<p> In 1986 Dr. Cladd Stevens, one of Szmuness's collaborators,
penned an astonishing report that did not make your local newspaper.</p>
<p> She reported that the majority of the homosexuals in the
experimental program were infected with the AIDS virus.13 The AIDS-
laced vaccine, through the bridge of bisexual men, now infects as
many as three million <ent type='GPE'>America</ent>ns. Mission accomplished.</p>
<p> AIDS was not the first germ warfare attack against <ent type='GPE'>America</ent>ns.</p>
<p> In the early '60s, millions of unsuspecting <ent type='GPE'>America</ent>ns took
either Salk injected polio vaccine or the live Sabin polio vaccine,
which was taken by mouth.</p>
<p> BOTH WERE LACED WITH S.V.-40, A CANCER-CAUSING MONKEY VIRUS.14</p>
<p> With an incubation period of 20 years, we are only now seeing
the grim results of this bio-attack against <ent type='GPE'>America</ent>ns, largely in
the form of brain tumors and leukemia.</p>
<p> Page 10</p>
<p> Salk didn't like the Sabin vaccine and Sabin didn't like the
Salk vaccine. I think they are both right. It is interesting to
note that polio was rapidly disappearing WITHOUT a vaccine (J. Trop.
Pediat, env. Child. Health 21, 11) ....</p>
<p> Our <ent type='NORP'>Soviet</ent> enemies not only instigated the AIDS epidemic
through clandestine agents within our government, but they now
control, through <ent type='ORG'>the World Health Organization</ent>, the AIDS policies of
the free world.</p>
<p> You are probably not aware that the international AIDS
prevention program of <ent type='ORG'>the World Health Organization</ent> (<ent type='ORG'>WHO</ent>) is run by
the <ent type='NORP'>Soviet</ent>s.</p>
<p> You don't believe it? Call <ent type='ORG'>WHO</ent> and ask them who is in charge
in <ent type='LOC'>Europe</ent>. If you want to save your nickel I'll tell you. He's a
<ent type='GPE'>Russia</ent>n named Bysencho and he operates out of <ent type='GPE'>Copenhagen</ent>....</p>
<p> The <ent type='NORP'>Soviet</ent>s control the response to AIDS of the entire free
world at many levels, including the top. Dr. Sergei Litvinov,
the coordinator of all task forces on AIDS at the <ent type='ORG'>WHO</ent>, is a high
official in the <ent type='NORP'>Soviet</ent> Ministry of Health. Allegedly Litvinov
gave out the order to our scientists and medical organizations in
the western world not to discuss the real cause of the epidemic.</p>
<p> At a secret meeting (information supplied the author from a
confidential source) between the editors of <ent type='ORG'>Lancet</ent>, the highly
respected <ent type='NORP'>British</ent> medical publication, and a group of the leading
<ent type='ORG'>retrovirologists</ent> of the world, it was decided not to publish any
academic discussion about the possible artificial creation of the
AIDS virus in a laboratory.</p>
<p> They particularly agreed not to make any mention of world-
renowned biologist Isaac Farlane Bernet's published remarks that
molecular biology may get out of hand like atomic physics and be
used for evil purposes and "practical applications of molecular
biology to cancer research might be sinister."</p>
<p> Other medical journals such as <ent type='ORG'>Science</ent> and <ent type='ORG'>JAMA</ent> have
lockstepped with <ent type='ORG'>Lancet</ent> and put all references to the man-made
origins of AIDS down the memory hole.</p>
<p> Did Comrade Litvinov have a little talk with the
<ent type='ORG'>retrovirologists</ent>? They, of course, wouldn't need any encouragement
from the <ent type='NORP'>Soviet</ent> [<ent type='ORG'>WHO</ent>] bosses to attempt a little coverup of their
own heinous crime, but <ent type='ORG'>Lancet</ent>, the <ent type='NORP'>British</ent> Medical Journal, and the
New <ent type='GPE'>England</ent> Journal of Medicine are another matter.</p>
<p> It took some powerful and sinister forces indeed to get these
respected publications to cover up the crime of the millennium.</p>
<p> The notable exception to this appalling censorship of mass
murder is Professor Harding Rains, Editor of the Journal of the
<ent type='ORG'>Royal Society</ent> of Medicine. Rains refers to "a conspiracy of
silence" covering the allegation that AIDS was man-made. I hope
Dr. Rains is watching his backside.</p>
<p> Dr. Zhores Medvedev, unlike Bysencho and Litvinov, supposedly
is a <ent type='GPE'>Russia</ent>n exile. Medvedev operates out of <ent type='GPE'>London</ent> at the National</p>
<p> Page 11</p>
<p> Institute for Medical Research. He's a senior research scientist
who continues to communicate freely with his supposed enemies in the
<ent type='NORP'>Soviet</ent> biowarfare laboratories, but we lack the space to catalog all
the details [here].</p>
<p> Medvedev is spreading the disinformation that AIDS is rampant
in <ent type='GPE'>Russia</ent> due to the escape of the virus from a laboratory, a sort
of biological <ent type='GPE'>Chernobyl</ent>.</p>
<p> This tends to divert suspicion away from Litvinov, Szmuness and
the other reds that President Nixon allowed to penetrate our
biological warfare laboratories at Fort Detrick, <ent type='GPE'>Maryland</ent>.</p>
<p> Having the <ent type='NORP'>Soviet</ent>s "control" the spread of AIDS in the <ent type='LOC'>West</ent> has
let to some interesting paradoxes. Our masters in the U.S. tell us
that there shall be absolutely no restrictions on travel between
various parts of the non-<ent type='NORP'>Communist</ent> world by persons who test
positive for AIDS.</p>
<p> Surgeon General C.E. <ent type='ORG'>Koop</ent> supports this <ent type='NORP'>Soviet</ent> policy of
biological suicide. (Are those the instructions he received when he
made his trip to <ent type='GPE'>Moscow</ent>, where the <ent type='ORG'>WHO</ent> has set up its main AIDS
research center?)</p>
<p> But, our <ent type='NORP'>Soviet</ent> masters in the <ent type='ORG'>WHO</ent> tell us, this open policy of
international travel does not apply to the <ent type='NORP'>communist</ent> bloc of
nations. If you or I were to visit <ent type='GPE'>Moscow</ent> and tested positive for
the AIDS virus, POW! -- out on the next plane!</p>
<p> If they stay clean through their immigration policies and we
die because of the immigration policies imposed on us through the
U.N.-controlled World "Health" Organization, who needs atomic bombs
for world conquest?</p>
<p> <ent type='GPE'>Cuba</ent>, Dr. John Seale informs me, has a strict asylum system for
the AIDS-infected. When their troops come back from "liberating"
<ent type='LOC'>Africa</ent>ns, they are tested as they get off the boat.</p>
<p> If tested positive the soldier goes directly to hell --
euphemistically called a sanitarium. He can visit his family
occasionally, but only in the presence of a commissar called a
"health official (no hanky-panky).</p>
<p> Unless the <ent type='LOC'>West</ent> gets its act together and closes down the U.N.
genocide division called the <ent type='ORG'>WHO</ent>, freedom and decency will disappear
from planet <ent type='LOC'>Earth</ent> for a thousand years. But the problem goes much
deeper.</p>
<p> How do you close down the U.S. government laboratories such as
the Centers for Disease Control (<ent type='ORG'>CDC</ent>), <ent type='ORG'>the National Institute</ent> of
Health (<ent type='ORG'>NIH</ent>) and the Fort Detrick bio-warfare lab when the
perpetrators of the crime are in control at all levels?</p>
<p> I don't know the answer. *****</p>
<p> _________________________</p>
<p> Page 12</p>
<p> 1 <ent type='ORG'>Project Whitecoat</ent>, to be published in <ent type='ORG'>Health Freedom News</ent>,
P.O. Box 688, <ent type='GPE'>Monrovia</ent> CA 91016/Subscription $20.00 per year.</p>
<p> 2 Bad Blood, J.H. Jones, MacMillan, NY, 1982.</p>
<p> 3 Common Cause Magazine, Jan./Feb. 1988.</p>
<p> 4 First aids Report, March/April 1988.</p>
<p> 5 Private communication, John Seale, M.D., 1988</p>
<p> 6 Ibid.</p>
<p> 7 First International Conference on the Global Impact of aids,
<ent type='GPE'>London</ent>, March 8-10, 1988.</p>
<p> 8 <ent type='ORG'>New Scientist</ent>, <ent type='GPE'>London</ent>, 5/19/88.</p>
<p> 9 <ent type='ORG'>Science</ent> News, 133:100, 2/13/88.</p>
<p> 10 Joklik, Virology, 2nd edition, pp. 36 ff.</p>
<p> 11 AIDS and the Doctors of Death, Cantwell, Aries Rising Press,
Los Angeles,p.76.</p>
<p> 12 Ibid.</p>
<p> 13 Ibid.
14 Salk/Sabin s.v.-40 Proc. Nat'l Acad. Sci., vol. 77, #8,
p. 4861, and <ent type='ORG'>Atlantic Monthly</ent>, 2/76.</p>
<div> --------------------------------------------------------------------</div>
<p> If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
<ent type='ORG'>Science</ent>s address as listed on the first page. Thank you for your
consideration, interest and support.</p>
<p> Jerry W. Decker...Ron Barker.....Chuck <ent type='GPE'>Henderson</ent>
<ent type='ORG'>Vangard Sciences</ent>/KeelyNet
--------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 484-3189
--------------------------------------------------------------------
</p></xml>

View File

@ -0,0 +1,207 @@
<xml><p>Title : AIDS: The Facts</p>
<p>Source : <ent type='NORP'>American</ent> <ent type='ORG'>Red Cross</ent></p>
<p> AIDS:
Spread Facts
Not Fear</p>
<p>What Is AIDS?</p>
<p>Acquired immune deficiency syndrome (AIDS) is a serious condition that affects
the body's ability to fight infection. A disgnosis of AIDS is made when a
person develops a life-threatening illness not usually found in a person with a
normal ability to fight infection. The two diseases most often found in AIDS
patients are a lung infection called Pneumocystis carinii pneumonia and a rare
form of cancer called Kaposi's sarcoma. It is these diseases, not the AIDS
virus itself, that can lead to death. To date, more than 50 percent of the
persons with AIDS have died.</p>
<p>What Causes AIDS?</p>
<p>Researchers have discovered the cause of AIDS - a virus that is called either
HTLV-III or <ent type='ORG'>LAV</ent>. This virus changes the structure of the cell it attacks.
Infection with the virus can lead to AIDS or to a less severe condition known
as AIDS-related complex (<ent type='ORG'>ARC</ent>). Some of those persons infected with the virus
will develop symptoms of AIDS or <ent type='ORG'>ARC</ent>. Other people who carry the virus may
remain in apparent good health. These carriers can transmit the virus during
sexual contact, or an infected mother can transmit the virus to her infant
before, during, or after birth (probably through breast milk).</p>
<p>Who Gets AIDS?</p>
<p>Since 1981, <ent type='ORG'>the Centers for Disease Control</ent> has been collecting information
on AIDS. Approximately 95 percent of the persons with AIDS belong to one of the
following groups:</p>
<p>* Sexually active homosexual or bisexual men (73 percent)</p>
<p>* Present or past abusers of intravenous drugs (17 percent)</p>
<p>* Patients who have had transfusions with blood or blood products (2 percent)</p>
<p>* Persons with hemophilia or other coagulation disorders (1 percent)</p>
<p>* <ent type='GPE'>Heterosexuals</ent> who have had sexual contact with someone with AIDS, or at risk
for AIDS (1 percent)</p>
<p>* Infants born to infected mothers (1 percent)</p>
<p>Approximately 5 percent of persons with AIDS do not fall into any of these
groups, but researchers believe that they came in contact with the virus in
similar ways. Some died before complete histories could be taken, while others
refused to provide any personal information.</p>
<p>What Are the Symptoms?</p>
<p>Most individuals infected with the AIDS virus have no symptoms and feel well.
Some develop symptoms that may include -</p>
<p>* Fever, including "night sweats."</p>
<p>* Weight loss for no apparent reason.</p>
<p>* Swollen lymph glands in the neck, underarm, or groin area.</p>
<p>* Fatigue or tiredness.</p>
<p>* Diarrhea.</p>
<p>* White spots or unusual blemishes in the mouth.</p>
<p>These symptoms are also symptoms of many other illnesses. They may be symptoms
of AIDS if they are unexplained by other illness. Anyone with these symptoms
for more than two weeks should see a doctor.</p>
<p>How is the AIDS Virus Spread?</p>
<p>The AIDS virus is spread by sexual contact, needle sharing, or rarely through
transfused blood or its components. Multiple sexual partners, either homosexual
or heterosexual, and sharing needles by drug users increase the risk of
infection with the virus.</p>
<p>Is the AIDS Virus Spread Through Casual Contact?</p>
<p>No. Casual contact with AIDS patients or people who carry the virus does NOT
place others at risk for getting AIDS. The AIDS virus is NOT spread by-</p>
<p>* Casual contact, such as hugging or hand shaking with an AIDS patient or a
person carrying the virus.</p>
<p>* Use of bathroom facilities, such as toilets, sinks, or bathtubs. Use of
swimming pools.</p>
<p>* Sneezing, coughing, or spitting.</p>
<p>* Dishes, utensils, or food handled by a person with AIDS.</p>
<p>The AIDS virus is not spread through normal daily contact at work, in school,
or at home. No cases have been found where the virus has been transmitted by
casual contact with AIDS patients in the home, workplace, or health care
setting. This statement is based in part, on studies of more than 300
households where people with AIDS were present. Not a single case of AIDS or
transmission of the virus was found except from sexual contacts or from
infected mothers to their infants. Many of those tested were children who had
shared bottles, beds, toothbrushes, and eating utensils with infected brothers
and sisters.</p>
<p>Is There a Test for AIDS?</p>
<p>There is an AIDS virus antibody test that detects antibodies to the AIDS virus
that causes the disease. The body produces antibodies that try to get rid of
bacteria, viruses, or anything else that is not supposed to be in the blood
stream. The test tells if someone has been infected with the AIDS virus. Most
people with AIDS have a positive test and some people with a positive test
will develop AIDS. The test does not tell who will develop AIDS.</p>
<p>What Does a Positive Test Mean?</p>
<p>It means that a person has been infected with the AIDS virus. It is estimated
that more than one million <ent type='NORP'>American</ent>s have been infected by the AIDS virus. Some
of these people will develop AIDS. Others who have the virus may stay well,
without any symptoms, but can transmit the virus to others.</p>
<p>Why Do We Have a Test?</p>
<p>The test was first used in blood donation centers to prevent the AIDS virus
from getting into the blood supply. We have always used tests to make the
blood supply as safe as possible. For example, all blood is tested for the
hepatitis B virus. This is to make sure that the person does not get hepatitis
B.</p>
<p>Is the Blood Supply Safe?</p>
<p>YES. The blood supply is well protected from the AIDS virus. People who may be
at risk of having AIDS are told that they should not donate blood. For example,
men who have had sex with another male since 1977 are told not to donate blood.
Also, the test is used to screen all donated blood and plasma for signs of the
virus that causes AIDS.</p>
<p>Can I Get AIDS by Donating Blood?</p>
<p>NO. All of the needles, syringes, tubing, and containers used by blood donation
centers are sterile and are used only once and thrown away, so there is no
chance of infection.</p>
<p>Is the Test Available to the Public?</p>
<p>YES. The test is available at a variety of test sites in most states. It is
also available through private doctors and clinics. Information about where to
get the test is available from state or local health departments, sexually
transmitted disease clinics, doctor's offices, and community blood services.
Anyone planning to take the test should get advice before the test and
understand what the results may indicate. It is important to have counseling
after the test.</p>
<p>How Can I Protect Myself From AIDS?</p>
<p>* Do not have sexual contact with AIDS patients, with members of the risk
groups, or with people who test positive for the AIDS virus. If you do, use
a condom and avoid sexual practices such as anal intercourse that may injure
tissue.</p>
<p>* Do not use IV drugs. If you do, do not share needles. Do not have sex with
people who use IV drugs.</p>
<p>* Women who are sex partners of risk group members or who use IV drugs should
consider the risk to their babies before pregnancy. These women should have
an HTLV-III antibody test before they become pregnant. If the become pregnant
they should have a test during pregnancy.</p>
<p>* Do not have sex with multiple partners, including prostitutes (who may also
be IV drug abusers). The more partners you have, the greater your chances of
contracting AIDS.</p>
<p>What Should I Do if I Have a Positive Test?</p>
<p>* Have a regular medical checkup and get counseling.</p>
<p>* Do not donate blood, sperm, or organs.</p>
<p>* Do not share drugs with others, and avoid exchanging bodily fluids during
sexual activity (a condom should be used). Avoid oral-genital contact and
intimate kissing.</p>
<p>* Do not share toothbrushes. razors, or anything that could be contaminated
with blood.</p>
<p>* Consider postponing pregnancy.</p>
<p>Further information about AIDS can be obtained from your <ent type='ORG'>Red Cross</ent> chapter,
local or state health department, other community agencies, or the Public
Health Service Hotline. The hotline number is 1-800-342-AIDS. <ent type='GPE'>Atlanta Area</ent>
callers should dial 329-1290.</p>
<p>______________________________________________________________________________</p>
<p>Developed in cooperation with <ent type='ORG'>the Washington Business Group</ent> on Health, based
upon <ent type='ORG'>Public Health Service</ent>/U.S. Department of Health and Human Services
pamphlet "Facts About AIDS"</p>
<p>Funding provided by the <ent type='NORP'>American</ent> Council of Life Insurance and the Health
Insurance Association of America.
______________________________________________________________________________</p>
<p>AIDS-1 Rev. May 1986</p>
</xml>

View File

@ -0,0 +1,265 @@
<xml><p>
:::::::::::::::::::::::::::::::::::::::::
:: AIDS: A U.S.- Made Monster? ::
:::::::::::::::::::::::::::::::::::::::::
:: PREFACE ::
In an extensive article in the Summer-Autumn 1990 issue of "Top Secret", Prof
J. Segal and Dr. L. Segal outline their theory that AIDS is a man-made disease,
originating at <ent type='ORG'>Pentagon</ent> bacteriological warfare labs at Fort Detrick, <ent type='GPE'>Maryland</ent>.
Top Secret is the international edition of the <ent type='NORP'>German</ent> magazine Geheim and is
considered by many to be a sister publication to the <ent type='NORP'>American</ent> Covert Action
Information Bulletin (CAIB). In fact, Top Secret carries the Naming Names
column, which CAIB is prevented from doing by the <ent type='NORP'>American</ent> government, and
which names <ent type='ORG'>CIA</ent> agents in different locations in the world. The article, named
"AIDS: US-Made Monster" and subtitled "AIDS - its Nature and its Origins," is
lengthy, has a lot of professional terminology and is dotted with footnotes.
The following is my humble attempt to encapsulate its highlights. It is
recommended that all interested read the original, which is available at some
bookstores, or can be ordered for $3.50 from:
Top Secret/Geheim Magazine P.O.Box 270324 5000 <ent type='GPE'>Koln</ent> 1 <ent type='NORP'>German</ent>y
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
:: AIDS FACTS ::
"The fatal weakening of the immune system which has given AIDS its name
(Acquired Immuno-Deficiency Syndrome)," write the Segals, "has been traced back
to a destruction or a functional failure of the T4-lymphocytes, also called
'helper cells`, which play a regulatory role in the production of antibodies in
the immune system." In the course of the illness, the number of functional T4-
cells is reduced greatly so that new anti-bodies cannot be produced and the
defenseless patient remains exposed to a range of infections that under other
circumstances would have been harmless. Most AIDS patients die from
opportunistic infections rather than from the AIDS virus itself.
The initial infection is characterized by diarrhea, erysipelas and intermittent
fever. An apparent recovery follows after 2-3 weeks, and in many cases the
patient remains without symptoms and functions normally for years. Occasionally
a swelling of the lymph glands, which does not affect the patient's well-being,
can be observed.
After several years, the pre-AIDS stage, known as <ent type='ORG'>ARC</ent> (Aids- Related Complex)
sets in. This stage includes disorders in the digestive tract, kidneys and
lungs. In most cases it develops into full-blown AIDS in about a year, at which
point opportunistic illnesses occur. <ent type='ORG'>Parallel</ent> to this syndrome, disorders in
various organ systems occur, the most severe in the brain, the symptoms of
which range from motoric disorders to severe dementia and death.
This set of symptoms, say the Segals, is identical in every detail with the
Visna sickness which occurs in sheep, mainly in <ent type='GPE'>Iceland</ent>. (Visna means tiredness
in <ent type='GPE'>Iceland</ent>ic). However, the <ent type='ORG'>visna</ent> virus is not pathogenic for human beings.
The Segals note that despite the fact that AIDS is transmitted only through
sexual intercourse, blood transfusions and non- sterile hypodermic needles, the
infection has spread dramatically. During the first few years after its
discovery, the number of AIDS patients doubled every six months, and is still
doubling every 12 months now though numerous measures have been taken against
it. Based on these figures, it is estimated that in the US, which had 120000
cases of AIDS at the end of 1988, 900000 people will have AIDS or will have
died of it by the end of 1991. It is also estimated that the number of people
infected is at least ten times the number of those suffering from an acute case
of AIDS. That in the year 1995 there will be between 10-14 million cases of
AIDS and an additional 100 million people infected, 80 percent of them in the
US, while a possible vaccination will not be available before 1995 by the most
optimistic estimates. Even when such vaccination becomes available, it will not
help those already infected. These and following figures have been reached at
by several different mainstream sources, such as the US Surgeon General and the
Chief of the medical services of the US Army.
Say the Segals: "AIDS does not merely bring certain dangers with it; it is
clearly a programmed catastrophe for the human race, whose magnitude is
comparable only with that of a nuclear war." They later explain what they mean
by "programmed," showing that the virus was produced by humans, namely Dr.
Robert Gallo of <ent type='ORG'>the Bethesda Cancer Research Center</ent> in <ent type='GPE'>Maryland</ent>. When
proceeding to prove their claims, the Segals are careful to note that: "We have
given preference to the investigative results of highly renowned laboratories,
whose objective contents cannot be doubted. We must emphasize, in this
connection, that we do not know of any findings that have been published in
professional journals that contradict our hypotheses."
:: DISCOVERING AIDS ::
The first KNOWN cases of AIDS occurred in <ent type='GPE'>New York</ent> in 1979. The first
DESCRIBED cases were in <ent type='GPE'>California</ent> in 1979. The virus was isolated in <ent type='GPE'>Paris</ent> in
May 1983, taken from a <ent type='NORP'>French</ent> homosexual who had returned home ill from a trip
to <ent type='LOC'>the East Coast</ent> of the US. One year later, Robert Gallo and his co-workers at
<ent type='ORG'>the Bethesda Cancer Research Center</ent> published their discovery of the same
virus, which is cytotoxic, i.e poisonous to cells.
Shortly after publishing his discovery, Gallo stated to newspapers that the
virus had developed by a natural process from the Human Adult Leukemia virus,
<ent type='ORG'>HTLV</ent>-1, which he had previously discovered. However, this claim was not
published in professional publications, and soon after, Alizon and Montagnier,
two researchers of <ent type='ORG'>the Pasteur Institute</ent> in <ent type='GPE'>Paris</ent> published charts of <ent type='ORG'>HTLV</ent>-1
and HIV, showing that the viruses had basically different structures. They also
declared categorically that they knew of no natural process by which one of
these two forms could have evolved into the other.
According to the professional "science" magazine, the fall 1984 annual meeting
of the <ent type='NORP'>American</ent> Association for the Advancement of Science (<ent type='ORG'>AAAS</ent>), was almost
entirely devoted to the question of: to what extent new pathogenic agents could
be produced via human manipulation of genes. According to the Segals, AIDS was
practically the sole topic of discussion.
:: THE AIDS VIRUS ::
The Segals discuss the findings of <ent type='ORG'>Gonda</ent> et al, who compared the HIV, <ent type='ORG'>visna</ent>
and other closely-related viruses and found that the <ent type='ORG'>visna</ent> virus is the most
similar to HIV. The two were, in fact, 60% identical in 1986. According to
findings of the Hahn group, the mutation rate of the HIV virus was about a
million times higher than that of similar viruses, and that on the average a
10% alteration took place every two years. That would mean that in 1984, the
difference between HIV and <ent type='ORG'>visna</ent> would have been only 30%, in 1982- 20%, 10% in
1980 and zero in 1978. "This means," say the Segals, "that at this time <ent type='ORG'>visna</ent>
viruses changed into HIV, receiving at the same time the ability to become
parasites in human T4-cells and the high genetic instability that is not known
in other retroviruses. This is also consistent with the fact that the first
cases of AIDS appeared about one year later, in the spring of 1979."
"In his comparison of the genomes of <ent type='ORG'>visna</ent> and HIV," add the Segals, "Coffin
hit upon a remarkable feature. The env (envelope) area of the HIV genome, which
encodes the envelope proteins which help the virus to attach itself to the host
cell, is about 300 nucleotides longer than the same area in <ent type='ORG'>visna</ent>. This
behavior suggests that an additional piece has been inserted into the genomes
of the <ent type='ORG'>visna</ent> virus, a piece that alters the envelope proteins and enables them
to bind themselves to the T4-receptors. BUT THIS SECTION BEHAVES LIKE A
BIOLOGICALLY ALIEN BODY, which does not match the rest of the system
biochemically. (emphasis mine)
The above mentioned work by <ent type='ORG'>Gonda</ent> et al shows that the HIV virus has a section
of about 300 nucleotides, which does not exist in the <ent type='ORG'>visna</ent> virus. That length
corresponds with what Coffin described. That section is particularly unstable,
which indicates that it is an alien object. According to the Segals, it
"originates in an <ent type='ORG'>HTLV</ent>-1 genome, (discovered by Gallo-ED) for the likelihood of
an accidental occurrence in HIV of a genome sequence 60% identical with a
section of the <ent type='ORG'>HTLV</ent>-1 that is 300 nucleotides in length is zero." Since the
<ent type='ORG'>visna</ent> virus is incapable of attaching itself to human T4 receptors, it must
have been the transfer of the <ent type='ORG'>HTLV</ent>-1 genome section which gave <ent type='ORG'>visna</ent> the
capability to do so. In other words, the addition of <ent type='ORG'>HTLV</ent>-1 to <ent type='ORG'>visna</ent> made the
HIV virus. In addition, the high mutation rate of the HIV genome has been
explained by another scientific team, Chandra et al, by the fact that it is "a
combination of two genome parts which are alien to each other BY ARTIFI<ent type='ORG'>CIA</ent>L
MEANS rather than by a natural process of evolution, because this process would
have immediately eliminated, through natural selection, systems that are so
replete with disorders."
"These are the facts of the case," say the Segals. "HIV is essentially a <ent type='ORG'>visna</ent>
virus which carries an additional protein monomer of <ent type='ORG'>HTLV</ent>-1 that has an epitope
capable of bonding with T4 receptors. Neither Alizon and Montagnier nor any
other biologist know of any natural mechanism that would make it possible for
the epitope to be transferred from <ent type='ORG'>HTLV</ent>-1 to the <ent type='ORG'>visna</ent> virus. For this reason
we can come to only one conclusion: that this gene combination arose by
artificial means, through gene manipulation."
:: THE CONSTRUCTION OF HIV ::
"The construction of a recombinant virus by means of gene manipulation is
extraordinarily expensive, and it requires a large number of highly qualified
personnel, complicated equipment and expensive high security laboratories.
Moreover, the product would have no commercial value. Who, then," ask the
Segals, "would have provided the resources for a type of research that was
aimed solely at the production of a new disease that would be deadly to human
beings?"
The <ent type='NORP'>English</ent> sociologist Allistair Hay (as well as <ent type='ORG'>Paxman</ent> et al in "A Higher
Form of Killing"-ED), published a document whose authenticity has been
confirmed by the US <ent type='ORG'>Congress</ent>, showing that a representative of the <ent type='ORG'>Pentagon</ent>
requested in 1969 additional funding for biological warfare research. The
intention was to create, within the next ten years, a new virus that would
not be susceptible to the immune system, so that the afflicted patient would
not be able to develop any defense against it. Ten years later, in the spring
of 1979, the first cases of AIDS appeared in <ent type='GPE'>New York</ent>.
"Thus began a phase of frantic experimentation," say the Segals.
One group was working on trying to cause animal pathogens to adapt themselves
to life in human beings. This was done under the cover of searching for a cure
for cancer. The race was won by Gallo, who described his findings in 1975. A
year later, Gallo described gene manipulations he was conducting. In 1980 he
published his discovery of <ent type='ORG'>HTLV</ent>.
In the fall of 1977, a P4 (highest security category of laboratory, in which
human pathogens are subjected to genetic manipulations) laboratory was
officially opened in building 550 of Fort Detrick, MD, the <ent type='ORG'>Pentagon</ent>'s main
biological warfare research center. "In an article in 'Der Spiegel`, Prof.
<ent type='GPE'>Mollings</ent> point out that this type of gene manipulation was still extremely
difficult in 1977. One would have had to have a genius as great as Robert Gallo
for this purpose, note the Segals."
Lo and behold. In a supposed compliance with the international accord banning
the research, production and storage of biological weapons, part of Fort
Detrick was "demilitarized" and the virus section renamed the "Frederick
Cancer Research Facility". It was put under the direction of the Cancer
Research Institute in neighboring <ent type='GPE'>Bethesda</ent>, whose director was no other than
Robert Gallo. This happened in 1975, the year Gallo discovered <ent type='ORG'>HTLV</ent>.
Explaining how the virus escaped, the Segals note that in the US, biological
agents are traditionally tested on prisoners who are incarcerated for long
periods, and who are promised freedom if they survive the test. However, the
initial HIV infection symptoms are mild and followed by a seemingly healthy
patient.
"Those who conducted the research must have concluded that the new virus
was...not so virulent that it could be considered for military use, and the
test patients, who had seemingly recovered, were given their freedom. Most of
the patients were professional criminals and <ent type='GPE'>New York</ent> City, which is
relatively close, offered them a suitable milieu. Moreover, the patients were
exclusively men, many of them having a history of homosexuality and drug abuse,
as is often the case in <ent type='NORP'>American</ent> prisons. 1111
It is understandable why AIDS broke out precisely in 1979, precisely among men
and among drug users, and precisely in <ent type='GPE'>New York</ent> City," assert the Segals. They
go on to explain that whereas in cases of infection by means of sexual contact,
incubation periods are two years and more, while in cases of massive infection
via blood transfusions, as must have been the case with prisoners, incubation
periods are shorter than a year. "Thus, if the new virus was ready at the
beginning of 1978 and if the experiments began without too much delay, then
the first cases of full- blown AIDS in 1979 were exactly the result that
could have been expected."
In the next three lengthy chapters, the Segals examine other theories,
"legends" as they call them, of the origins of AIDS. Dissecting each claim,
they show that they have no scientific standing, providing also the findings
of other scientists. They also bring up the arguments of scientists and
popular writers who have been at the task of discounting them as "conspiracy
theorists" and show these writers' shortcomings. <ent type='ORG'>Interested</ent> readers will have
to read the original article to follow those debates. I will only quote two
more paragraphs:
"We often heard the argument that experiments with human volunteers are part of
a barbaric past, and that they would be impossible in the US today... We wish
to present one single document whose authenticity is beyond doubt. An
investigative commission of the US House of Representatives presented in
October 1986 a final report concerning <ent type='ORG'>the Manhattan Project</ent>. According to this
document, between 1945 and 1975 at least 695 <ent type='NORP'>American</ent> citizens were exposed
to dangerous doses of radioactivity. Some of them were prisoners who had
volunteered, but they also included residents of old-age homes, inmates of
insane asylums, handicapped people in nursing homes, and even normal patients
in public hospitals; most of them were subjected to these experiments without
their permission. Thus the 'barbaric past` is not really a thing of the past."
"It is remarkable that most of these experiments were carried out in university
institutes and federal hospitals, all of which are named in the report.
Nonetheless, these facts remained secret until 1984, and even then a
<ent type='ORG'>Congress</ent>ional committee that was equipped with all the necessary
authorization needed two years in order to bring these facts to life. We are
often asked how the work on the AIDS virus could have been kept secret. Now,
experiments performed on a few dozen prisoners in a laboratory that is
subject to military security can be far more easily kept secret than could
be <ent type='ORG'>the Manhattan Project</ent>."
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Black Crawling Systems @ V0iD Information Archives
( 6 1 7 ) 4 8 2 - 6 3 5 6
</p></xml>

View File

@ -0,0 +1,331 @@
<xml><p> Info pulled from the Usenet. <ent type='ORG'>Air</ent> (atmosphere) <ent type='ORG'>Railway Systems</ent>.</p>
<p>Today and Yesterday
-------------------------</p>
<p>The ultimate responsibility for this thread :-) belongs to George
Medhurst (1759-1827), of <ent type='GPE'>England</ent>. During a period of a few years
about 1810, he invented three distinct forms of air-propelled
transport. None of them was implemented during his lifetime;
but all of them saw use eventually, reaching their greatest extent
in the reverse order of their original invention.</p>
<p>Medhurst's first method involved moving air through a tube a few
inches in diameter, pushing a capsule along it; this simple idea
was the pneumatic dispatch tube. <ent type='ORG'>Next</ent> he realized that if the same
system was built much larger, it could carry passengers (or freight
items larger than letters); it was natural to run the vehicle on
tracks, and so this became known since the vehicle would be large
enough to require tracks, this became known as a pneumatic railway.</p>
<p>But would anyone actually want to ride along mile after mile inside
an opaque pipe? Not likely. So he then thought of having only a
piston moving within the pipe, somehow dragging along a vehicle
outside it. He proposed several versions of this idea; in most of
them the vehicle ran on rails, so this became known as an atmospheric
railway (though a distinction between that term and the pneumatic
railway was not always observed). The key feature of all versions
of the system was a longitudinal valve: some sort of flexible flap
running the length of the pipe, which would be held closed by air
pressure except when the piston was actually passing. Medhurst
did try to raise capital to implement this system, but failed.</p>
<p>Now, while the first operable steam locomotive was built about 1804,
steam-powered trains did not see regular use for passengers for some
25 years after that. It was in the 1830's and 1840's that the steam
railway was shown to be practical in both engineering and financial
senses.</p>
<p>But the same technical developments that made possible the practical
steam railway also made the atmospheric railway, if not certainly
practical, at least worth a try. And it offered the prospect of
considerable advantages. Since the trains wouldn't have to carry
their prime mover, they would be lighter; therefore the track could
be built cheaper, and the trains' performance would be better.
The trains wouldn't trail smoke wherever they went (and into the
passenger cars in particular), and they would also be quiet.
And if one section of the route was hilly and required more motive
power, all that were needed would be more or larger pumping stations
along that section; no need to add extra locomotives. In short,
very much the same advantages that electricity gave a few decades
later. (Plus one more: a derailed train would tend to be kept near
the track by the pipe and piston.)</p>
<p>The success of the 1830's railways gave rise to the <ent type='ORG'>Railway</ent> Mania
of the 1840's, when interest in railway shares reached absurd levels.
In that climate the proposers of atmospheric lines could find the
backing they needed, and four atmospheric lines opened in a period
of about 3 years. In order of opening, these were:</p>
<p> * The <ent type='GPE'>Dublin</ent> &amp; <ent type='GPE'>Kingstown</ent>, from <ent type='GPE'>Kingstown</ent> to <ent type='GPE'>Dalkey</ent> in <ent type='GPE'>Ireland</ent>,
1.5 miles long; operated 1844-54.
* The <ent type='GPE'>London</ent> &amp; <ent type='GPE'>Croydon</ent>, from <ent type='GPE'>Croydon</ent> to <ent type='ORG'>Forest Hill</ent> in <ent type='GPE'>London</ent>,
<ent type='GPE'>England</ent>, 5 miles, then extended to <ent type='ORG'>New Cross</ent> for a total
of 7.5 miles; operated 1846-47.
* The <ent type='GPE'>Paris</ent> a St-Germain, from Bois de Vezinet to St-Germain
in <ent type='GPE'>Paris</ent>, <ent type='GPE'>France</ent>, 1.4 miles long; operated 1847-60.
* The <ent type='GPE'>South Devon</ent>, from <ent type='GPE'>Exeter</ent> to <ent type='GPE'>Teignmouth</ent> in <ent type='GPE'>Devonshire</ent>,
<ent type='GPE'>England</ent>, 15 miles, then extended to <ent type='ORG'>Newton</ent> (now <ent type='ORG'>Newton</ent> Abbot),
20 miles altogether; operated 1847-48.</p>
<p>I note in passing that while I (as a fan of his) might like <ent type='GPE'>Isambard</ent>
Kingdom <ent type='ORG'>Brunel</ent> to have invented the atmospheric system used on the
<ent type='GPE'>South Devon</ent>, it is wrong to say that he did so. He did choose it
and actively promoted it (well, "actively" is redundant with <ent type='ORG'>Brunel</ent>).
It was actually developed by Samuel Clegg and Joseph and Jacob Samuda.</p>
<p>Both of the longer, if shorter-lived, English lines used atmospheric
propulsion in both directions of travel, whereas the <ent type='NORP'>French</ent> and <ent type='NORP'>Irish</ent>
lines were built on hills and their trains simply returned downhill
by gravity. Since all were single-track lines, the one-way system
simplified the valves needed to let the pistons in and out of the
pipes at their ends (possibly while traveling at speed).</p>
<p>All four lines were converted to ordinary steam railways in the end,
and for the next 130 years the atmospheric system appeared dead.
For one thing, steam locomotive technology had too much of a head
start in development over the atmospheric system; steam railways
might have delays due to engine failure but they never had to shut
down for 6 weeks while a new design of longitudinal valve was
installed along the entire length of the route!</p>
<p>(The valve involved metal and leather parts and a greasy or waxy
sealant "composition". Although stories were told about rats
eating the composition, and this probably did happen sometimes,
it wasn't really a serious thing; the biggest problems in fact
were freezing and deterioration of the leather, and corrosion
of the metal parts.)</p>
<p>Also, the atmospheric system was inflexible, in that if the power
requirements for a section of route were greater than estimated,
very little could be done short of splitting the section and adding
a whole new pumping station. (All the lines used vacuum rather
than positive pressure in the pipes, which limited the pressure
differential to about 0.9 atmosphere in practice; but the valve
designs were marginal anyway and likely wouldn't have stood up
to greater pressures if they could have been used.)</p>
<p>What today might be seen as the most serious disadvantage of all,
the requirement for long interruptions of the motive power at
junctions, was not so noticeable in those days. If the train
didn't have enough speed to coast across the gap, well, the
third-class passengers could always get out and push, or maybe
there would be a horse conveniently at hand. At some stations
a small auxiliary pipe was used to advance the train from the
platform to the start of the main pipe.</p>
<p>There were many other proposals in those days for atmospheric
lines, but in view of these early failures, none of them were
ever built as atmospheric railways. The next atmospheric railway
to open actually appeared in 1990!</p>
<p>While the atmospheric railways were vanishing, the first
pneumatic dispatch tubes were beginning to appear; I'll get
into that later. But from that start, the pneumatic railway
idea began to return also. At first these were designed for
freight. Engineers J. Latimer Clark and T. W. <ent type='ORG'>Rammell</ent> formed
<ent type='ORG'>the Pneumatic Despatch Company</ent>, which built a demonstration tube
above ground in <ent type='GPE'>Battersea</ent> in 1861. This line successfully carried
loads up to 3 tons... and even a few passengers, lying down in
the vehicles in the 30-inch tunnel! The pressure used was up
to 0.025 atmosphere, and speeds up to 40 mph were reached.</p>
<p><ent type='ORG'>The Post Office</ent> became interested in the system and had several
tunnels built for it. They were used from 1863 to 1874, though
interrupted for a time by the financial crisis of 1866.</p>
<p>(At this point they decided that the system didn't gain enough time
to be worth the cost, not to mention the risk of a vehicle becoming
stuck in the tube. In the 1920's, when electricity was available,
they returned a driverless trains system, using tunnels of similar
size to the old pneumatic tubes. This is the <ent type='ORG'>Post Office</ent> "tube"
<ent type='ORG'>Railway</ent>, which continues in use to this day. Such systems also
exist in <ent type='GPE'>Switzerland</ent>, which had it first, and in <ent type='GPE'>West Germany</ent>.)</p>
<p>Meanwhile, while these lines were moving the mail from the streets
of <ent type='GPE'>London</ent> to tunnels underneath, the first underground railways
were doing the same with passenger traffic. The first section of
the <ent type='ORG'>Metro</ent><ent type='GPE'>politan</ent> <ent type='ORG'>Railway</ent> (from <ent type='ORG'>Farringdon</ent>, now <ent type='ORG'>Farringdon</ent> Street,
to <ent type='ORG'>Paddington</ent> station) opened in 1863. It was promptly followed
by extensions, as well as competition in the form of the <ent type='ORG'>Metro</ent>-
<ent type='GPE'>politan</ent> District <ent type='ORG'>Railway</ent>, a subsidiary that got away. (Their
routes in central <ent type='GPE'>London</ent> today form the <ent type='GPE'>London</ent> Underground's
<ent type='ORG'>Metro</ent><ent type='GPE'>politan</ent>, District, Circle, and <ent type='GPE'>Hammersmith</ent> &amp; City Lines.)</p>
<p>Now there was no thought of operating the <ent type='ORG'>Metro</ent><ent type='GPE'>politan</ent> with
anything but steam locomotives, despite the line being mostly
in tunnel. Sir John Fowler, who later co-designed the Forth Bridge,
did have the idea of a steam locomotive where the heat from the fire
would be retained in a cylinder of bricks, and therefore the fire
could be put out when traveling in the tunnels. One example of
this design, later called Fowler's Ghost, was tried in 1862.
It was thermodynamically absurd: as C. Hamilton Ellis put it,
"the trouble was that her boiler not only refrained from producing
smoke, it produced very little steam either".</p>
<p>In the end both the <ent type='ORG'>Met</ent> and the District were worked with condensing
steam locomotives: these emitted smoke as usual, but their exhaust
steam, while running in tunnels, was directed back into the water
tanks and condensed. The tanks were drained at the end of the run
and refilled with cold water.</p>
<p>So people were not only willing to travel in what amounted to an
opaque tube after all, but in one filled with smoke at that!
Why not one *without* smoke? And so the pneumatic railway was
now tried; but it never got past the demonstration stage.</p>
<p>The longest line to carry passengers was opened at the Crystal
Palace in <ent type='GPE'>London</ent> in 1864. It used a tunnel about 9 by 10 feet,
1800 feet long. The driving fan was 22 feet across, generating
about 0.01 atmosphere of pressure -- the larger the tube, the
lower the pressure you need. The vehicle was a full-size broad
gauge railway car ringed with bristles; it carried 35 passengers.
The trip took 50 seconds, thus averaging about 25 mph. Another,
smaller demonstration line was built at a fair in the US in 1867
by Alfred Ely <ent type='GPE'>Beach</ent>.</p>
<p><ent type='GPE'>Beach</ent> then formed <ent type='ORG'>the Beach Pneumatic Transit Company</ent>, which
obtained permission to build a freight-carrying pneumatic line
under Broadway in <ent type='GPE'>New York</ent>. But what he actually opened in 1870
was a passenger-carrying pneumatic subway, the only one to
actually operate under a city street. It was only 312 feet long,
from Warren Street to Murray Street. The tunnel was 9 feet in
diameter, and was worked by a single car with a capacity of
18 passengers.</p>
<p><ent type='GPE'>Beach</ent> tried but failed to get permission to extend the line.
It closed after a few months, and <ent type='GPE'>New York</ent> did not get a subway
again until 1904, when the first <ent type='ORG'>Interborough Rapid Transit</ent> route
was opened (from City Hall station along the present Lexington
Avenue, 42nd Street shuttle, and 7th Avenue lines to, um, initially
somewhere around 120th Street). This route was electric and so
have been all its successors.</p>
<p><ent type='GPE'>Beach</ent>'s tunnel had been almost forgotten when the crews
constructing the new subway broke into it in 1912.</p>
<p>In <ent type='GPE'>London</ent>, a pneumatic underground line was started *with* permission,
but construction was never completed. This was the Waterloo and
Whitehall <ent type='ORG'>Railway</ent>, which planned to connect Waterloo station to Great
Scotland Yard, 1/2 mile away, with a 12'9" diameter tunnel passing
under the <ent type='NORP'>Thames</ent>. Considering that the <ent type='NORP'>Thames</ent> Tunnel project of
Sir Marc <ent type='ORG'>Brunel</ent> and <ent type='ORG'><ent type='GPE'>Isambard</ent> Kingdom <ent type='ORG'>Brunel</ent></ent> -- now now part of
the Underground's East <ent type='GPE'>London</ent> Line -- had faced massive technical
and financial difficulties before its long-delayed completion only
about 20 years previously, this was no mean undertaking.</p>
<p>The Waterloo &amp; Whitehall was halted by the financial crisis of 1866;
and it was never revived. The tunnel had been started from the
<ent type='ORG'>Great Scotland Yard</ent> end, and had just reached the river; work on
the underwater section was beginning. There were other proposals
for passenger-carrying pneumatic lines, but none saw construction
in that form. (At least one, under the <ent type='GPE'>Mersey</ent> at <ent type='GPE'>Liverpool</ent>, <ent type='GPE'>England</ent>,
was eventually opened as an ordinary railway.)</p>
<p>The next type of underground line to open in <ent type='GPE'>London</ent> was the Tower
Subway, which also passed under the <ent type='NORP'>Thames</ent>. It was a short route,
just under the river, worked by a small cable car. It opened in
1870 and was short-lived. (The tunnel served as a footway for a
while after that, then was taken over for pipes. The <ent type='NORP'>Thames</ent> Tunnel,
conversely, had been used first as a footway, then converted to
railway use.)</p>
<p>After this time, electric railways began to become practical.
The next underground line to open was the City &amp; South <ent type='GPE'>London</ent>,
now part of the Underground's Northern Line. Its first section
(from <ent type='ORG'>Stockwell</ent> to a now disused terminus at King William Street,
replaced by the present <ent type='ORG'>Bank</ent> station) opened in 1890. It used
the new deep-level tube tunnels, with more limited ventilation
than on the <ent type='ORG'>Metro</ent><ent type='GPE'>politan</ent> <ent type='ORG'>Railway</ent>, so steam was out of the question
in any case. The original plan was for cable haulage, but instead
the new electric locomotives were tried and the line has always
been operated electrically. The line was first built with 10'2"
diameter tunnels, forcing use of rather small cars. (The cars
also had only tiny windows, on the grounds that there was nothing
to see -- so they got the nickname of "padded cells".)</p>
<p>All of the later lines in <ent type='GPE'>London</ent>, opened from 1900 onwards, were
built on the same general pattern as the C&amp;SL, with deep-level
tubes and electric traction -- first by locomotives and then by
multiple-unit trains. The other tube lines vary from 11'6" to
12-foot diameter tunnels, and the C&amp;SL was enlarged in the 1920's
to match. This is still rather small compared to most other
subways in the world, and is the reason for the distinctive
shape of the tube trains.</p>
<p>With the success of the electric lines, the <ent type='ORG'>Metro</ent><ent type='GPE'>politan</ent> and
District faced the loss of traffic, and they too were converted
to elecricity -- at least for the underground sections in central
<ent type='GPE'>London</ent> in 1905. The first line of the present <ent type='GPE'>New York</ent> subway
system opened in 1904 and this, too, has always used electricity.
(This was the original <ent type='ORG'>Interborough Rapid Transit</ent> route, from City
Hall station along the present Lexington Avenue, 42nd Street shuttle,
and 7th Avenue lines to, um, somewhere around 120th Street). <ent type='GPE'>Beach</ent>'s
tunnel had been almost forgotten when the crews constructing the
new subway broke into it in 1912.</p>
<p>Meanwhile, the humble original concept of the pneumatic dispatch tube
continued to develop. The first of them, 1.5 inches in diameter,
had been built in 1853 by J. Latimer Clark; it connected the
Electrical and [sic] International Telegraph Company's office in
Telegraph Street, <ent type='GPE'>London</ent>, with their branch 675 feet away at the
Stock Exchange.</p>
<p>The key invention was J. W. Willmott's double sluice valve of 1870,
which allowed rapid dispatching of successive capsules. It was also
possible, as had been done on the pneumatic railways, to use both
positive pressure (on the order of 1 atmosphere) and vacuum, to
drive the capsules both ways from a single pumping station. The
tubes became quite common; many miles were built in various <ent type='NORP'>European</ent>
and <ent type='NORP'>North American</ent> cities. By 1886 <ent type='GPE'>London</ent> had over 34 miles of them
for the <ent type='ORG'>Post Office</ent>'s telegraph service alone. In the <ent type='GPE'>Paris</ent> system
a person could pay a fee for a message to be sent specifically by
the tube.</p>
<p>They were also used within large buildings, and some survive in
use to this day.</p>
<p>Finally, in 1990, the <ent type='NORP'>Brazilian</ent> company Sur Coester stunned the
world by opening at a fair in <ent type='GPE'>Djakarta</ent>, <ent type='GPE'>Indonesia</ent>, a demonstration
line of their <ent type='ORG'>Aeromovel</ent> system. This is nothing more nor less
than an elevated atmospheric railway. The structure is concrete,
with steel rails and a rectangular concrete air pipe larger than
those on the 19th century lines. The longitudinal valve is made
of heavy cloth-reinforced rubber. Computerized remote control
is used.</p>
<p>Oh yes.</p>
<p>Pneumatic dispatch tubes were depicted in the 1985 movie "<ent type='GPE'>Brazil</ent>";
<ent type='GPE'>Beach</ent>'s tunnel was depicted, in rather distorted form, in the 1989
movie "Ghostbusters II"; the modern form of the <ent type='GPE'>New York</ent> subway
has been depicted in many movies, notably the 1974 one "The Taking
of Pelham One Two Three"; but I don't believe the atmospheric or
pneumatic systems have ever been depicted at work in any movie.
Clearly this needs to be rectified! :-)</p>
<p>References.</p>
<p>Almost all the information in this posting about the pneumatic
and atmospheric systems comes from one book... "Atmospheric
<ent type='ORG'>Railway</ent>s: A Victorian Venture in Silent Speed" by Charles Hadfield,
1967, reprinted 1985 by Alan Sutton Publishing, <ent type='GPE'>Gloucester</ent>; ISBN
0-86299-204-4.</p>
<p>For other topics, I principally consulted "The Pictorial
Encyclopedia of <ent type='ORG'>Railway</ent>s", 1976 edition, by (C.) Hamilton Ellis,
<ent type='ORG'>Hamlyn Publishing</ent>; ISBN 0-600-37585-4; some details came from other
books or my memory.</p>
<p>The information about the <ent type='GPE'>Djakarta</ent> line comes from two postings in
rec.railroad, one last November by Andrew Waugh quoting the November 24
issue of "<ent type='ORG'>New Scientist</ent>" magazine, and the recent one by Russell Day
citing "Towards 2000".</p>
<p>--
Mark Brader"Great things are not done by those
SoftQuad Inc., <ent type='GPE'>Toronto</ent> who sit down and count the cost
<ent type='ORG'>utzoo</ent>!sq!<ent type='ORG'>msb</ent>, <ent type='ORG'>msb</ent>@sq.com of every thought and act." -- Daniel Gooch</p>
<p>This article is in the public domain.
</p></xml>

View File

@ -0,0 +1,664 @@
<xml><p> -Here's the lowdown on "ALTERNATIVE 3" from a TV-movie compendium.
"ALTERNATIVE 3" (GB 1977; 52m, colour)
Amusing spoof do commentary about the disappearance of various high-IQ
citizens, allegedly to form nucleus of a standby civilization on <ent type='LOC'>Mars</ent> against
the coming End of the World. Sly parodies of fashionable breathless TV
journalism sweetened the joke, ex- newscaster Tim Brinton held it all
together with po-faced gravity and needless to say some supernature fanatics
refuse to this day to accept that it was anything but gospel truth, although
it was orignally scheduled for April 1st (1977). Written by David Ambrose;
directed by Chris Miles; for <ent type='GPE'>Anglia</ent>. Apparently the TV-movie was spawned by a
book (or assuming the date is accurate, vice versa) of the same name. Written
by Leslie Watkins, it was published by <ent type='ORG'>Sphere Books Ltd</ent>. in 1978.</p>
<div>======================================================================</div>
<p>ALTERNATIVE 003
by
Leslie Watkins</p>
<p>with
David Ambrose &amp; Christopher Miles</p>
<p>Section 1</p>
<p>NO NEWSPAPER has yet secured the truth behind the operation known
as ALTERNATIVE 3. Investigations by journalists have been blocked by
governments on both sides of the Iron Curtain. <ent type='NORP'>American</ent> and <ent type='GPE'>Russia</ent> are
ruthlessly obsessed with guarding their shared secret and this obsession, as
we can now prove, has made them partners in murder.</p>
<p>However, despite this intensive security, fragments of information have
been made public. Often they are released inadvertently by experts who do
not appreciate their sinister significance and these fragments, in isolation,
mean little. But when jigsawed together they form a definite pattern, a
pattern which appears to emphasize the enormity of this conspiracy of
silence.</p>
<p>On May 3, 1977, the Daily Mirror published this story:</p>
<p>President Jimmy Carter has joined the ranks of UFO spotters. He sent
in two written reports stating he had seen a flying saucer when he was the
Governor of <ent type='GPE'>Georgia</ent>.</p>
<p>The President has shrugged off the incident since then, perhaps fearing
that electors might be wary of a flying saucer freak.</p>
<p>But he was reported as saying after the "sighting"; "I don't laugh at
people any more when they say they've seen UFOs because I've seen one
myself."</p>
<p>Carter described his UFO like this: "Luminous, not solid, at first bluish,
then reddish. It seemed to move towards us from a distance, stopped, then
moved partially away."</p>
<p>Carter filed two reports on the sighting in 1973, one to the
International UFO Bureau and the other to the National Investigations
Committee on Aerial Phenomena.</p>
<p>Heydon Hewes, who directs <ent type='ORG'>the International UFO Bureau</ent> from his
home in <ent type='GPE'>Oklahoma City</ent>, is making speeches praising the President's
"open-mindedness."</p>
<p>But during his presidential campaign last year Carter was cautious. He
admitted he had seen a light in the sky but declined to call it a UFO.</p>
<p>He joked: "I think it was a light beckoning me to run in the <ent type='GPE'>California</ent>
primary election."</p>
<p>Why this change in Carter's attitude? Because, by then, he had been
briefed on Alternative 3?</p>
<p>A 1966 Gallup Poll showed that five million <ent type='NORP'>Americans</ent> including several
highly experienced airline pilots claimed to have seen <ent type='ORG'>Flying Saucers</ent>.
Fighter pilot Thomas Mantell has already died while chasing one over
<ent type='GPE'>Kentucky</ent> his F.51 aircraft having disintegrated in the violent wash of his
quarry's engines.</p>
<p>The U.S. Air Force, reluctantly bowing to mounting pressure, asked Dr.
Edward Uhler Condon, a professor of astrophysics, to head an investigation
team at <ent type='ORG'>Colorado University</ent>.</p>
<p>Condon's budget was $500000. Shortly before his report appeared in
1968, this story appeared in the <ent type='GPE'>London</ent> Evening Standard:</p>
<p>The Condon study is making headlines, but for all the wrong reasons. It
is losing some of its outstanding members, under circumstances which are
mysterious to say the least. Sinister rumors are circulating. At least four key
people have vanished from the Condon team without offering a satisfactory
reason for their departure.</p>
<p>The complete story behind the strange events in <ent type='GPE'>Colorado</ent> is hard to
decipher. But a clue, at last may be found in the recent statements of Dr.
James McDonald, the senior physicist at <ent type='ORG'>the Institute</ent> of Atmospheric
Physics at <ent type='ORG'>the University</ent> of Arizona and widely respected in his field. In a
wary, but ominous, telephone conversation this week, Dr. McDonald told me
that he is "most distressed." Condon's 1485-page report denied the
existence of <ent type='ORG'>Flying Saucers</ent> and a panel of <ent type='ORG'>the American National Academy</ent> of
Sciences endorsed the conclusion that "further extensive study probably
cannot be justified."</p>
<p>But, curiously, Condon's joint principal investigator, Dr. David Saunders,
had not contributed a word to that report. And on January 11, 1969, the
Daily <ent type='ORG'>Telegraph</ent> quoted Dr. Saunders as saying of the report:</p>
<p>"It is inconceivable that it can be anything but a cold stew. No matter
how long it is, what it includes, how it is said, or what it recommends, it will
lack the essential element of credibility."</p>
<p>Already there were wide-spread suspicions that the Condon
investigation had been part of an official coverup, that the government knew
the truth but was determined to keep it from the public. We now know that
those suspicions were accurate. And that the secrecy was all because of
Alternative 3.</p>
<p>Only a few months after Dr. Saunders made his "cold stew" statement a
journalist with the <ent type='GPE'>Columbus</ent> (<ent type='GPE'>Ohio</ent>) Dispatch embarrassed the National
Aeronautics and Space <ent type='ORG'>Agency</ent> by photographing a strange craft looking
exactly like a Flying Saucer at the <ent type='LOC'>White Sands</ent> missile range in <ent type='GPE'>New Mexico</ent>.</p>
<p>At first no one at <ent type='ORG'>NASA</ent> would talk about this mysterious circular craft,
15 feet in diameter, which had been left in the "missile graveyard" a section
of the range where most experimental vehicles were eventually dumped.</p>
<p>But the <ent type='ORG'>Martin Marietta</ent> company of <ent type='GPE'>Denver</ent>, where it was built,
acknowledged designing several models, some with ten and twelve engines.
And a <ent type='ORG'>NASA</ent> official, faced with this information, said, "Actually the engineers
used to call it 'The Flying Saucer."</p>
<p>That confirmed a statement made by Dr. Garry Henderson, a leading
space research scientist: "All our astronauts have seen these objects but have
been ordered not to discuss their findings with anyone."</p>
<p>Otto Binder was a member of the <ent type='ORG'>NASA</ent> space team. He has stated that
<ent type='ORG'>NASA</ent> "killed" significant segments of conversation between <ent type='ORG'>Mission Control</ent>
and <ent type='ORG'>Apollo</ent> 11, the spacecraft which took Buzz Aldrin and Neil Armstrong to
the Moon and that those segments were deleted from the official record:</p>
<p>"Certain sources with their own VHF receiving facilities that by passed
<ent type='ORG'>NASA</ent> broadcast outlets claim there was a portion of <ent type='LOC'>Earth</ent>-Moon dialogue
that was quickly cut off by the <ent type='ORG'>NASA</ent> monitoring staff."</p>
<p>Binder added:</p>
<p>"It was presumably when the two moon walkers, Aldrin and Armstrong,
were making the round some distance from the LEM that Armstrong
clutched Aldrin's arm excitedly and exclaimed 'What was it? What the hell
was it? That's all I want to know.' "</p>
<p>Then, according to Binder, there was this exchange:</p>
<p>MISSION CONTROL: What's there? malfunction(garble).Mission
Control calling <ent type='ORG'>Apollo</ent> 11.</p>
<p><ent type='ORG'>APOLLO</ent> 11: These babies were huge, sir. enormous, Oh, God you
wouldn't believe it!
I'm telling you there are other space-craft out there
lined up on the far side of the crater edge.
They're on the Moon watching us.</p>
<p><ent type='ORG'>NASA</ent>, understandably, has never confirmed Binder's story but Buzz
Aldrin was soon complaining bitterly about the <ent type='ORG'>Agency</ent> having used him as a
"traveling salesman."</p>
<p>And two years after his Moon mission, following reported bouts of heavy
drinking, he was admitted to hospital with "emotional depression."</p>
<p>"Traveling salesman", that's an odd choice of words, isn't it? What, in
Aldrin's view, were the <ent type='ORG'>NASA</ent> authorities trying to sell? And to whom?
Could it be that they were using him, and others like him, to sell their
official version of the truth to ordinary people right across the world?</p>
<p>Was Aldrin's Moon walk one of those great spectaculars, presented with
maximum publicity, to justify the billions being poured into space research?</p>
<p>Was it part of the <ent type='NORP'>American</ent>-<ent type='GPE'>Russia</ent>n cover for Alternative 3?</p>
<p>All men who have travelled to the Moon have given indications of
knowing about Alternative 3 and of the reasons which precipitated it.</p>
<p>In May, 1972, James Irwin, officially the sixth man to walk on the
Moon, resigned to become a <ent type='ORG'>Baptist</ent> missionary. And he said then, "The
flight made me a deeper religious person and more keenly aware of the
fragile nature of our planet."</p>
<p>Edgar Mitchell, who landed on the Moon with the <ent type='ORG'>Apollo</ent> 14 mission in
February, 1971, also resigned in May, 1972 to devote himself to
parapsychology. Later, at the headquarters of his Institute for noetic
Sciences near <ent type='GPE'>San Francisco</ent>, he described looking at this world from the
Moon: "I went into a very deep pathos, a kind of anguish. That incredibly
beautiful planet that was <ent type='LOC'>Earth</ent>, a place no bigger than my thumb was my
home.. a blue and white jewel against a velvet black sky...was being killed
off."</p>
<p>And on March 23, 1974, he was quoted in the Daily Express as saying
that society had only three ways in which to go and that the third was "the
most viable but most difficult alternative."</p>
<p>Another of the <ent type='ORG'>Apollo</ent> Moon walkers, Bob Grodin, was equally specific
when interviewed by a <ent type='ORG'>Sceptre Television</ent> reporter on June 20, 1977;</p>
<p>"You think they need all that crap down in <ent type='GPE'>Florida</ent> just to put two guys
up there on a bicycle? The hell they do! You know why they need us?
So they've got a P.R. story for all that hardware they've been firing into
space.
We're nothing, man! Nothing!"</p>
<p>On July 11, 1977, the Los Angeles Times came near to the heart of
the matter, nearer than any other newspaper, when it published a
remarkable interview with Dr. Gerard O'Neill.</p>
<p>Dr. O'Neill is a <ent type='ORG'>Princeton</ent> professor who served, during a 1976
sabbatical, as Professor of Aerospace at <ent type='ORG'>the Massachusetts Institute</ent> of
Technology and who gets nearly $500000 each year in research grants from
<ent type='ORG'>NASA</ent>. Here is a section from that article:</p>
<p>The <ent type='ORG'>United Nations</ent>, he says, has conservatively estimated that the
world's population, now more than 4 billion people, will grow to about 6.5
billion by the year 2000. Today, he adds, about 30% of the world's
population is in developed nations. But, because most of the projected
population growth will occur in underdeveloped countries, that will drop to
22% by the end of the century. The world of 2000 will be poorer and
hungrier than the world today, he says.</p>
<p>Dr. O'Neill also explained the problems caused by the earth's 4000 mile
atmospheric layer, but presumably because the article was comparatively
short one, he was not quoted on the additional threat posed by the notorious
"greenhouse" syndrome.</p>
<p>His solution? He called it Island 3. And he added: "There's no debate
about the technology involved in doing it. That's been confirmed by <ent type='ORG'>NASA</ent>'s
top people."</p>
<p>But Dr. O'Neill, a family man with three children who like to fly
sailplanes in his spare time, did not realize that he was slightly off target.
He was right, of course, about the technology.</p>
<p>But he knew nothing of the political ramifications and he would have
been astounded to learn that <ent type='ORG'>NASA</ent> was feeding his research to the <ent type='GPE'>Russia</ent>ns.</p>
<p>Even eminent political specialists, as respected in their sphere as Dr.
O'Neill is in his own, have been puzzled by an undercurrent they have
detected in East-West relationships.</p>
<p>Professor G. Gordon Broadbent, director of the independently financed
Institute of Political Studies in <ent type='GPE'>London</ent> and author of a major study of
U.S.-<ent type='NORP'>Soviet</ent> diplomacy since the 1950s, emphasized that fact on June 20,
1977, when he was interviewed on <ent type='ORG'>Sceptre Television</ent>:</p>
<p>"On the broader issue of <ent type='NORP'>Soviet</ent>-U.S. relations, I must admit there is an
element of mystery which troubles many people in my field."</p>
<p>He added: "What we're suggesting is that, at the very highest levels of
East-West diplomacy, there has been operating a factor of which we know
nothing. Now it could just be and I stress the word 'could' that this
unknown factor is some kind of massive but covert operation in space. But
as for the reasons behind it we are not in the business of speculation."</p>
<p><ent type='GPE'>Washington</ent>'s acute discomfort over O'Neill's revelations through the Los
Angeles Times can be assessed by the urgency with which a "suppression"
Bill was rushed to the Statute Book.</p>
<p>On July 27, 1977, only sixteen days after publication of the O'Neill
interview columnist Jeremy <ent type='ORG'>Campbell</ent> reported in the <ent type='GPE'>London</ent> Evening
Standard that the Bill would become law that September. He wrote:</p>
<p>It prohibits the publishing of an official report without permission,
arguing that this obstructs the Government's control of its own information.
That was precisely the charge brought against Daniel Ellsberg for giving the
<ent type='ORG'>Pentagon</ent> papers to the New York Times.</p>
<p>Most ominous of all, the Bill would make it a crime for any present or
former civil servant to tell <ent type='ORG'>the Press</ent> of Government wrong doing or pass on
any news based on information "submitted to the Government in private."</p>
<p><ent type='ORG'>Campbell</ent> pointed out that this final clause "has given serious pain to
guardians of <ent type='NORP'>American</ent> <ent type='ORG'>Press</ent> freedom because it creates a brand new crime."
Particularly as there was provision in the Bill for offending journalists to be
sent to prison for up to six years.</p>
<p>We subsequently discovered that a man called <ent type='ORG'>Harman Leonard Harman</ent>
read that item in the newspaper and that later, in a certain television
executives' dining room, he expressed regret that a similar Law had not been
passed years earlier by the <ent type='NORP'>British</ent> government.</p>
<p>He was eating treacle tart with custard at the time and he reflected
wistfully that he could then have insisted on such a Law being obeyed. That,
when it came to Alternative 3, would have saved him from a great deal of
trouble.</p>
<p>He had chosen treacle tart, not because he particularly liked it, but
because it was 2p(ence) cheaper than the chocolate sponge. That was
typical of Harman.</p>
<p>He was one of the people, as you may have learned already through the
<ent type='ORG'>Press</ent>, who tried to interfere with the publication of this book. We will later
be presenting some of the letters received by us from him and his lawyers
together with the replies from our legal advisers.</p>
<p>We decided to print these letters in order to give you a thorough insight
into our investigation for it is important to stress that we, like Professor
Broadbent, are not in the "business of speculation." We are interested only in
the facts.</p>
<p>And it is intriguing to note the pattern of facts relating to astronauts
who have been on Moon missions and who have therefore been exposed to
some of the surprises presented by Alternative 3.</p>
<p>A number, undermined by the strain of being party to such a
horrendous secret, suffered nervous or mental collapses. A high percentage
sought sanctuary in excessive drinking or in extramarital affairs which
destroyed what had been secure and successful marriages.</p>
<p>Yet these were men originally picked from many thousands precisely
because of their stability. Their training and experience, intelligence and
physical fitness all these, of course, were prime considerations in their
selection. But the supremely important quality was their balanced
temperament.</p>
<p>It would need something stupendous, something almost unimaginable
to most people, to flip such men into dramatic personality changes. That
something, we have now established, was Alternative 3 and, perhaps more
particularly, the night marish obscenities involved in the development and
perfection of Alternative 3.</p>
<p>We are not suggesting that the President of <ent type='GPE'>the United States</ent> has had
personal knowledge of the terror and clinical cruelties which have been an
integral part of the <ent type='ORG'>Operation</ent>, for that would make him directly responsible
for murders and barbarous mutilations.</p>
<p>We are convinced, in fact, that this is not the case. The President and
the <ent type='GPE'>Russia</ent>n leader, together with their immediate subordinates, have been
concerned only with broad sweep of policy.</p>
<p>They have acted in unison to ensure what they consider to be the best
possible future for mankind. And the day to day details have been delegated
to high level professionals.</p>
<p>These professionals, we have now established, have been classifying
people selected for the Alternative 3 operation into two categories: those
who are picked as individuals and those who merely form part of a "batch
consignment."</p>
<p>There have been several "batch consignments" and it is the treatment
meted out to most of these men and women which provides the greatest
cause for outrage.</p>
<p>No matter how desperate the circumstances may be$and we reluctantly
recognize that they are extremely desperate$no humane society could
tolerate what has been done to the innocent and the gullible.</p>
<p>That view, fortunately, was taken by one man who was recruited into
the Alternative 3 team three years ago. He was, at first, highly enthusiastic
and completely dedicated to the <ent type='ORG'>Operation</ent>. However, he became revolted by
some of the atrocities involved. He did not consider that, even in the
prevailing circumstances, they could be justified.</p>
<p>Three days after the transmission of that sensational television
documentary, his conscience finally goaded him into action. He knew the
appalling risk he was taking, for he was aware of what had happened to
others who had betrayed the secrets of Alternative 3, but he made telephone
contact with television reporter Colin Benson and offered to provide Benson
with evidence of the most astounding nature.</p>
<p>He was calling, he said, from abroad but he was prepared to travel to
<ent type='GPE'>London</ent>. They met two days later. And he then explained to Benson that
copies of most orders and memoranda, together with transcripts prepared
from tapes of <ent type='ORG'>Policy Committee</ent> meetings, were filed in triplicate in
<ent type='GPE'>Washington</ent>, <ent type='GPE'>Moscow</ent> and <ent type='GPE'>Geneva</ent> where Alternative 3 had its operational
headquarters.</p>
<p>The system had been instituted to ensure there was no
misunderstanding between the principal partners. He occasionally had
access to some of that material although it was often weeks or even months
old before he saw it and he was willing to supply what he could to Benson.
He wanted no money. He merely wanted to alert the public, to help stop the
mass atrocities.</p>
<p>Benson's immediate reaction, after he had assessed the value of this
offer, was that Sceptre should mount a follow up programme, one which
would expose the horrors of Alternative 3 in far greater depth.</p>
<p>He argued bitterly with his superiors at Sceptre but they were adamant.
The company was already in serious trouble with the government and there
was some doubt about whether its licence would be renewed. They refused
to consider the possibility of doing another programme. They had officially
disclaimed the Alternative 3 documentary as a hoax and that was where the
matter had to rest.</p>
<p>Anyway, they pointed out, this character who'd come forward was
probably a nut$ If you saw the documentary, you will probably realize that
Benson is a stubborn man. His friends say he is pig obstinate. They also say
he is a first class investigative journalist.</p>
<p>He was angry about this attempt to suppress the truth and that is why
he agreed to co-operate in the preparation of this book. That co-operation
has been invaluable.</p>
<p>Through Benson we met the telephone caller who we now refer to as
Trojan. And that meeting resulted in our acquiring documents, which we
will be presenting, including transcripts of tapes made at the most secret
rendezvous in the world, thirty five fathoms beneath the ice cap of the
<ent type='LOC'>Arctic</ent>.</p>
<p>For obvious reasons, we cannot reveal the identity of Trojan. Nor can
we give any hint about his function or status in the <ent type='ORG'>Operation</ent>.</p>
<p>We are completely satisfied, however, that his credentials are authentic
and that, in breaking his oath of silence, he is prompted by the most
honourable of motives.</p>
<p>He stands in relation to the Alternative 3 conspiracy in much the same
position as the anonymous informant "Deep Throat" occupied in the
Watergate affair. Most of the "batch consignments" have been taken from the
area known as the Bermuda Triangle but numerous other locations have also
been used.</p>
<p>On October 6, 1975, the Daily <ent type='ORG'>Telegraph</ent> gave prominence to this
story: </p>
<p>The disappearance in bizarre circumstances in the past two weeks of
20 people from small coastal communities in <ent type='GPE'>Oregon</ent> was being intensively
investigated at the weekend amid reports of an imaginative fraud scheme
involving a "flying saucer" and hints of mass murder.</p>
<p>Sheriff's officers at <ent type='GPE'>Newport</ent>, <ent type='GPE'>Oregon</ent>, said that the 20 individuals had
vanished without trace after being told to give away all their possessions,
including their children, so that they could be transported in a flying saucer
"by UFO to a better life."</p>
<p>"Deputies under Mr. Ron Sutton, chief criminal investigator in
surrounding <ent type='GPE'>Lincoln County</ent>, have traced the story back to a meeting on
September 14 in a resort hotel, the Bayshore Inn at <ent type='GPE'>Waldport</ent>, <ent type='GPE'>Oregon</ent>$
Local police have received conflicting reports as to what occurred (at the
meeting).</p>
<p>But while it is clear that the speaker did not pretend to be from outer
space, he told the audience how their souls could be "saved through a UFO.</p>
<p>"The hall had been reserved for a fee of $50 by a man and a woman who
gave false names. Mr. Sutton said witnesses had described them as "fortyish,
well groomed, straight types."</p>
<p>The <ent type='ORG'>Telegraph</ent> said that "selected people would be prepared at a special
camp in <ent type='GPE'>Colorado</ent> for life on another planet" and quoted Investigator Sutton
as adding:</p>
<p>"They were told they would have to give away everything, even their
children. I'm checking a report of one family who supposedly gave away
150-acre farm and three children."</p>
<p>"We don't know if it's fraud or whether these people might be killed.
There are all sorts of rumours, including some about human sacrifice and
that this is sponsored by the (Charles) Manson family."</p>
<p>"Most of the missing 20 were described as being "hippie types"
although there were some older people among them."</p>
<p>People of this calibre, we have now discovered, have been what is
known as "scientifically adjusted" to fit them for a new role as a slave
species.</p>
<p>There have been equally strange reports of animals, particularly farm
animals, disappearing in large numbers. And occasionally it appears that
aspects of the Alternative 3 operation have been bungled, that attempts to
lift "batch consignments" of humans or of animals have failed.</p>
<p>On July 15, 1977, the Daily Mail under a "Flying Saucer" headline
carried this story:</p>
<p>Men in face masks, using metal detectors and a geiger counter,
yesterday scoured a remote <ent type='ORG'>Dartmoor</ent> valley in a bid to solve a macabre
mystery. Their search centred on marshy grassland where 15 wild ponies
were found dead, their bodies mangled and torn.</p>
<p>All appeared to have died at about the same time, and many of the bones
have been inexplicably shattered. To add to the riddle, their bodies
decomposed to virtual skeletons within only 48 hours.</p>
<p>Animal experts confess they are baffled by the deaths at Cherry Brook
Valley near Postbridge.</p>
<p>Yesterday's search was carried out by members of the Devon
Unidentified Flying Objects centre at <ent type='ORG'>Torquay</ent> who are trying to prove a link
with outer space.</p>
<p>They believe that flying saucers may have flown low over the area and
created a vortex which hurled the ponies to their death. Mr. John Wyse,
head of the four-man team, said:</p>
<p>"If a spacecraft has been in the vicinity, there may still be detectable
evidence. We wanted to see if there was any sign that the ponies had been
shot but we have found nothing. This incident bears an uncanny
resemblance to similar events reported in <ent type='GPE'>America</ent>."</p>
<p>The Mail report concluded with a statement from an official
representing The <ent type='ORG'>Dartmoor</ent> Livestock Protection Society and the Animal
Defence Society:</p>
<p>"Whatever happened was violent. We are keeping an open mind. I am
fascinated by the UFO theory. There is no reason to reject that possibility
since there is no other rational explanation."</p>
<p>These, then, were typical of the threads, which inspired the original
television investigation. It needed one person, however, to show how they
could be embroidered into a clear picture.</p>
<p>Without the specialist guidance of that person the Sceptre television
documentary could never have been produced, and Trojan would never have
contacted Colin Benson.</p>
<p>And it would have been years, possibly seven years or even longer,
before ordinary people started to suspect the devastating truth about this
planet on which we live. That person, of course, is the old man$</p>
<div> </div>
<p>Section 2</p>
<p>THEY Realize now that they should have killed the old man.</p>
<p>That would have been the logical course to protect the secrecy of
Alternative 3. It is curious, really, that they did not agree to his death on
that Thursday in February for, as we have stated, they do use murder.</p>
<p>Of course, it is not called murder, not when it is done jointly by the
governments of <ent type='GPE'>America</ent> and <ent type='GPE'>Russia</ent>. It is an Act of Expediency.</p>
<p>Many Acts of Expediency are believed to have been ordered by the
sixteen men, official representatives of the <ent type='ORG'>pentagon</ent> and the <ent type='ORG'>Kremlin</ent>, who
comprise the <ent type='ORG'>Policy Committee</ent>.</p>
<p>Grotesque and apparently inexplicable slayings in various parts of the
world in <ent type='GPE'>Germany</ent> and <ent type='GPE'>Japan</ent>, <ent type='GPE'>Britain</ent> and <ent type='GPE'>Australia</ent> are alleged to have been
sanctioned by them.</p>
<p>We have not been able to substantiate these suspicions and allegations
so we merely record that an unknown number of people, including
distinguished radio astronomer Sir William Ballantine, have been executed
because of this astonishing agreement between the super-powers.</p>
<p>Prominent politicians, including two in <ent type='GPE'>Britain</ent>, were among those who
tried to prevent the publication of this book. They insisted that it is not
necessary for you, and others like you, to be told the unpalatable facts.</p>
<p>They argue that the events of the future are now inevitable, that there is
nothing to be gained by prematurely unleashing fear.</p>
<p>We concede that they are sincere in their views but we maintain that
you ought to know. You have a right to know.</p>
<p><ent type='ORG'>Attemps</ent> were also made to neuter the television programme which first
focused public attention on Alternative 3. Those <ent type='ORG'>attemps</ent> were partially
successful. And, of course, after the programme was transmitted, when
there was that spontaneous explosion of anxiety, <ent type='ORG'>Septre Television</ent> was
forced to issue a formal denial.</p>
<p>It had all been a hoax. That's what they were told to say. That's what
they did say.</p>
<p>Most people were then only too glad to be reassured. They wanted to
be convinced that the programme had been devised as a joke, that it was
merely an elaborate piece of escapist entertainment. It was more
comfortable that way.</p>
<p>In fact, the television researchers did uncover far more disturbing
material than they were allowed to transmit. The censored information is
now in our possession. And, as we have indicated, there was a great deal
that Benson and the rest of the television team did not discover, not until
after their programme had been screened. </p>
<div>------------------------------------------------------------------------ </div>
<p>Copies of Alternative 3 are rare. There is a source in <ent type='GPE'>ENGLAND</ent> which
we do not currently know, however, you may purchase an imported copy for
about $11.00 from <ent type='ORG'>Metaphysical Book Store</ent>, 9511 E. Colfax, Aurora, CO
80010 (303) 341-7562. Please mention that you got the address from VANGARD
SCIENCES or the KeelyNet Bulletin Board System. Thanks.</p>
<p>Placed in the public domain from the</p>
<p><ent type='ORG'>VANGARD SCIENCES</ent> archives on October 28 1989.
Our mailing address is PO BOX 1031, <ent type='GPE'>Mesquite</ent>, TX 75150.
Voice phone (Jerry 214-324-8741...Ron 214-484-3189
KeelyNet (214) 324-3501</p>
<div>======================================================================</div>
<p>The Truth about Alternative 3
from its author, Leslie Watkins</p>
<p>(This article is taken from the $<ent type='ORG'>Windwords</ent>$ newsletter)
address not available</p>
<p>In our June issue, we told you about the controversial book Alternative
3, by <ent type='NORP'>British</ent> author Leslie Watkins. In out attempt to find out if the
shocking theories in the book were true, we called <ent type='ORG'>Avon Books</ent>, the
<ent type='NORP'>American</ent> publisher; they said the book was out of print in the states. We
called <ent type='ORG'>Penguin Books</ent> in <ent type='GPE'>London</ent> and found that it was listed on their
NON-FICTION list. A senior editor there told us that it was officially
classified as FICTION BASED ON FACT. The author's agent told us it was
most definitely fiction. We wrote to the author himself to try to get the
real story, and here is the letter he sent us.</p>
<p>Dear Ms. Dittrich:</p>
<p>Thank you for your letter, which reached me today. Naturally, I am
delighted by your interest in Alternative 3 and by the fact that you plan to
sell it in the <ent type='ORG'>Windwords</ent> bookstore. I will certainly cooperate in any way I
can.</p>
<p>The correct description of Alternative 3 was given to you by the
representative from <ent type='ORG'>Penguin Books</ent>. The book is based on fact, but uses that
fact as a launchpad for a HIGH DIVE INTO FICTION. In answer to your
specific questions:</p>
<p>1) There is no astronaut named Grodin.
2) There is no <ent type='ORG'>Sceptre Television</ent> and the reported Benson is also
fictional.
3) There is no Dr. Gerstein.
4) Yes, a "documentary" was televised in June 1977 on <ent type='GPE'>Anglia</ent>
Television, which went out to the entire national network in <ent type='GPE'>Britain</ent>.
It was called Alternative 3 and was written by David Ambrose and
produced by Christopher Miles (whose names were on the book for
contractual reasons). This original TV version, which I EXPANDED
IMMENSELY for the book, was ACTUALLY A HOAX which had been
scheduled for transmission on April Fools' Day. Because of certain
problems in finding the right network slot, the transmission was
delayed.</p>
<p>The TV program did cause a tremendous uproar because viewers
refused to believe it was fiction. I initially took the view that the
basic premise was so way-out, particularly the way I aimed to
present it in the book, that no one would regard it as non-fiction.
Immediately after publication, I realized I was totally wrong. In fact,
the amazing mountains of letters from virtually all parts of the world
including vast numbers from highly intelligent people in positions of
responsibility-convinced me that I had ACCIDENTALLY trespassed
into a range of top-secret truths. </p>
<p>Documentary evidence provided by many of these
correspondents decided me to write a serious and COMPLETELY
NON-FICTION sequel. Unfortunately, a chest containing the bulk of
the letters was among the items which were mysteriously LOST IN
TRANSIT some four years when I moved from <ent type='GPE'>London</ent>, <ent type='GPE'>England</ent>, to
<ent type='GPE'>Sydney</ent>, <ent type='GPE'>Australia</ent>, before I moved on to settle in <ent type='GPE'>New Zealand</ent>. For
some time after Alternative 3 was originally published, I have
reason to suppose that my home telephone was being tapped and my
contacts who were experienced in such matters were convinced
that certain intelligence agencies considered that I probably knew
too much.</p>
<p>So, summing up, the book is FICTION BASED ON FACT. But I now feel
that I inadvertently got VERY CLOSE TO A SECRET TRUTH. I hope this is of
some help to you and I look forward to hearing from you again.</p>
<p>With best wishes,
Leslie Watkins</p>
<p>Unfortunately, Alternative 3 is no longer available. We (<ent type='ORG'>Windwords</ent>)
bought all the remaining copies from the <ent type='NORP'>British</ent> publisher and those quickly
sold out. If the book is reprinted, you can be sure we'll let you know and
we'll carry it in the <ent type='ORG'>Windwords</ent> bookstore.</p>
</xml>

View File

@ -0,0 +1,360 @@
<xml><p>
Anti-<ent type='ORG'><ent type='NORP'>American</ent> <ent type='NORP'>Jewish</ent> League</ent>
---------------------------</p>
<p>From: <ent type='ORG'>San Francisco Chronicle</ent>, Wed. Dec. 12, 1990 (Briefing Section)
----</p>
<p>The <ent type='NORP'>British</ent> <ent type='NORP'>Zionists</ent> were led by Chaim Weizmann, a brilliant chemist who
contributed to the war effort by discovering a new process for manufacturing
acetone, a substance vital for <ent type='ORG'>TNT</ent> that was until then only produced in
<ent type='GPE'>Germany</ent>. Weizmann saw a historic opening for <ent type='NORP'>Zionism</ent> and began to lobby
influential <ent type='NORP'>British</ent> politicians.</p>
<p>Early in their talks with <ent type='NORP'>British</ent> politicians, it became clear to them that
only a <ent type='NORP'>British</ent> <ent type='GPE'>Palestine</ent> would be a reliable buffer for the Suez Canal.
Weizmann therefore assured <ent type='GPE'>Britain</ent> that in exchange for its support,
<ent type='NORP'>Zionists</ent> would work for the establishment of a <ent type='NORP'>British</ent> protectorate there.
This suited <ent type='GPE'>Britain</ent> better than the agreement it had already made with
<ent type='GPE'>France</ent> for an international administration for <ent type='GPE'>Palestine</ent>.</p>
<p>So on November 2, 1917, Foreign Secretary Arthur Balfour made his famous
and deeply ambiguous declaration that <ent type='GPE'>Britain</ent> would "view with favor the
establishment in <ent type='GPE'>Palestine</ent> of a national home for the <ent type='NORP'>Jewish</ent> people..."
How did the pledge to the <ent type='NORP'>Zionists</ent> square with what had already been
promised to the <ent type='NORP'>Arabs</ent> in return for their support in the war against the
<ent type='NORP'>Turks</ent>? The <ent type='NORP'>Arabs</ent> realized that they had been outmaneuvered.</p>
<p>Note - As you can see, the main reason our troops are in <ent type='LOC'>the Persian Gulf</ent>
is because of the <ent type='NORP'>Zionist</ent> hunger for a national home in <ent type='GPE'>Palestine</ent>.
<ent type='GPE'>Palestine</ent> was an independent land before 1917. But after the
totally unfair Balfour Declaration, written by <ent type='NORP'>British</ent> <ent type='NORP'>Zionists</ent>,
<ent type='NORP'>Zionists</ent> (<ent type='NORP'>Jews</ent>) were given permission by Great <ent type='GPE'>Britain</ent> to take
over <ent type='GPE'>Palestine</ent> and keep lands which do not belong to them. And
the US has not done anything about it. Why? Because of the
better known media, which are all <ent type='NORP'>Zionists</ent>. (ie. Ted Koppell,
Larry King, etc etc etc) Many large corporations are also run
by <ent type='NORP'>Jews</ent>, including many of the large corporations which make
stuff for our military. </p>
<p>Note - The <ent type='NORP'>American</ent> Anti-<ent type='NORP'>Jewish</ent> League in no way supports the naked
aggression committed by Saddam Hussein against <ent type='GPE'>Kuwait</ent>. He
must leave <ent type='GPE'>Kuwait</ent>, even though <ent type='GPE'>Kuwait</ent>, contrary to popular
opinion, once WAS a <ent type='GPE'>PROVINCE</ent> of <ent type='GPE'>Iraq</ent>. There is no doubt about
this: just go to your public library and get a good book on
<ent type='GPE'>Iraq</ent>, <ent type='GPE'>Kuwait</ent>, or <ent type='NORP'>British</ent> Foreign Policy in the <ent type='LOC'>Middle East</ent>.
Once again, it was the <ent type='NORP'>British</ent> (and <ent type='NORP'>French</ent>) who set up the
current boundaries which exist today. However, what Saddam
has done must be overruled, exactly as what the <ent type='NORP'>Jews</ent> have
done to <ent type='GPE'>Palestine</ent> must be stopped. Do you know how much of
our <ent type='ORG'>TAXES</ent> go to <ent type='GPE'>Israel</ent> every year? Do you know how much
trouble we've gone through to protect <ent type='GPE'>Israel</ent>? Do you know
that there are more <ent type='NORP'>Jews</ent> in the <ent type='GPE'>USA</ent> than in any other country
in the world? Do you know most <ent type='NORP'>Jews</ent> (especially the conser-
vative and highly orthodox ones) are strong anti-<ent type='NORP'>Americans</ent>?
Why then, are we supporting them? Because many of our
highest government positions are run by <ent type='NORP'>Jews</ent>. They are
practically running the US. And what about the <ent type='NORP'>British</ent>?
It is not <ent type='GPE'>Japan</ent> that owns more of the US than other countries.
It is Great <ent type='GPE'>Britain</ent>. They own more US land, corporations,
stocks, interests, etc. in the US than the <ent type='GPE'>Japan</ent>ese and 5
other countries put together. If you don't believe any of
this, just print it out, and go to your local public library
or ask an unbiased History professor. This is all true.
Please spread the word around, and upload this and other
files to as many BBS's as you can. We must begin to stop
this low-profile takeover of our country, or else it will
be too late to control it. Thank you for your time.</p>
<p> <ent type='NORP'>American</ent> Anti-<ent type='NORP'>Jewish</ent> League
---------------------------</p>
<p>Have you ever wondered why so many people hate or dislike <ent type='NORP'>Jews</ent>? From their
very first existence, they have been hated by people around them and people
who knew them. Why? All through these ages, anti-semitism is still strong.
Why? It is true that some of this hatred is not founded for truly, such as
in the case of the <ent type='NORP'>Germans</ent>. Hitler was looking for a people to accuse of
<ent type='GPE'>Germany</ent>'s downfall, so he picked the <ent type='NORP'>Jews</ent>. Although this is not the main
reason for <ent type='GPE'>Germany</ent>'s weakness at that time, there is still something to it.
<ent type='NORP'>Jews</ent> were contributing, but very minutely, and in low-profile, to <ent type='GPE'>Germany</ent>'s
problems. Anyway, back to the main point. Now it is the <ent type='NORP'>Arabs</ent> who are after
the <ent type='NORP'>Jews</ent>, even though if you go back to <ent type='GPE'>Germany</ent> today, the majority of
<ent type='NORP'>Germans</ent> (although they will not admit it right away) are still anti-<ent type='NORP'>semitic</ent>.
Wouldn't you still be? Just look at ALL these movies made and shown on
TV and at cinemas in which the world is pitted against the <ent type='NORP'>Germans</ent>, and
the <ent type='NORP'>Germans</ent> always lose. These movies are still shown every day on TV and
cable. Just turn on <ent type='ORG'>TBS</ent>, <ent type='ORG'>TNT</ent>, etc. Anyway, now it is the <ent type='NORP'>Arabs</ent>. And
now we have and soon will have more movies which bring down the <ent type='NORP'>Arabs</ent>.
(ie. the new Sally Field movie, which is grossly exaggerated) Don't
forget who runs most of the TV networks and movie studios. So why do
so many people hate <ent type='NORP'>Jews</ent> (also known as <ent type='NORP'>Zionists</ent>, <ent type='NORP'>semitic</ent> people (not very
correctly though), <ent type='GPE'>Israel</ent>ites, <ent type='GPE'>Israel</ent>is) The answer to this question
is very simple. <ent type='NORP'>Jews</ent> believe that they are God's chosen people (they
honestly believe this, even though they will not admit it anymore di-
rectly) and that because they are so, then they are superior to all
other people. All others must work for <ent type='NORP'>Jews</ent>, because no one else is
as gifted as they are. It is true that most <ent type='NORP'>Jews</ent> have above-average
intelligence, and that they are very handy and dexterous, and work hard
(but only for themselves) We are not denying this. What we detest is
their attitude that they are superior to us, and therefore we must
be their slaves. And they can do almost anything they want, because
they are the "chosen" ones. Because of this belief of theirs, <ent type='NORP'>Jews</ent>
along with their other attributes have been slowly and quietly taking
over the most important world systems. They cheat a lot; this is one
of their most distinguished characteristics. What we mean by cheat
is not just cheating, but taking advantage of the right opportunities
to gain their objectives. They are extremely well-known for their
"money habits". They take advantage of less qualified peoples, using
them knowingly. They help mostly only themselves, and have very close
ties with each other. (they even have their owns BBs's, just look in-
side <ent type='ORG'>Computer Currents</ent>) Because of this connections, they can get
things done easily. If a <ent type='NORP'>Jew</ent> needs job, no problem. There are other
<ent type='NORP'>Jews</ent> in all the top job areas, who will right away hire him/her first
over others. They have extremely high-level propaganda machinery;
many TV and radio commentators are <ent type='NORP'>Jews</ent>, many reporters, book writers,
and magazines are <ent type='NORP'>Jewish</ent>. AND very importantly, the many publications
companies are run by <ent type='NORP'>Jews</ent>. If you have any doubts, just do some
research. It might take you a while, but you will find out that, yes,
it is true. And these people are ALL over the world: <ent type='GPE'>Israel</ent>, <ent type='GPE'>USA</ent>,
England, <ent type='GPE'>Canada</ent>, spread over in S. <ent type='NORP'>American</ent>, all over <ent type='LOC'>Europe</ent>, <ent type='GPE'>USSR</ent>,
etc etc. They are practically in the highest-level positions all over
the world. And they use their clear advantage to continually gain
more and more power. The <ent type='LOC'>Middle East</ent> is the last bastion of true
anti-<ent type='NORP'>Zionism</ent>. God only knows what would happen if they were to take
over the <ent type='LOC'>Middle East</ent> and its oil too. They already have the biggest
banks, corporations, communications systems, etc in the world. All
they need now is oil. And all throughout the ages, they have been
doing the same thing, and when successful, suppressing all opposing
views. Now they have finally succeeded in turning the whole world
against <ent type='GPE'>Iraq</ent>, the 2nd biggest anti-<ent type='NORP'>Zionist</ent> country in the world. This
of course, has been done in an indirect manner, and has taken them a
lot of time. But it has worked. Once Saddam is ousted, thanks to
our soldiers and money, they will then begin to slowly get control of
the region. There is still <ent type='GPE'>Iran</ent>, <ent type='GPE'>Syria</ent>, and other countries, but they
can be taken care of too. It will not be easy for them, because the
<ent type='NORP'>Arabs</ent> are tremendous anti-semites, and they are willing to do anything
to stop the <ent type='NORP'>Jews</ent>. But, with the US, <ent type='GPE'>Britain</ent>, and other countries
helping them, the <ent type='NORP'>Jewish</ent> will have all the support they need to accom-
plish their goals. And all because these countries are practically
run by <ent type='NORP'>Jews</ent>. So please, become more informed on this subject. Read
more books, newspapers, etc. about these people, making DEAD sure
that they are not written by <ent type='NORP'>Jewish</ent> authors, or published by <ent type='NORP'>Jewish</ent>
publication companies, or third-party <ent type='NORP'>Jewish</ent>-influenced writers.
We must stop these people from controlling the world. We don't want
to kill them or hurt them, we want to let them know that they are
not superior to us, they are not God's chosen people, and that they
cannot do whatever they want. Please, help us out. Spread these
files around, call your senators and representatives, read more
about this stuff, etc. <ent type='NORP'>JEWS</ent> MUST BE STOPPED... NOW!</p>
<p> <ent type='NORP'>American</ent> Anti-<ent type='NORP'>Jewish</ent> League
--------------------------- </p>
<p>How would you like it if another peoples, with greater military capability
and more money came to <ent type='GPE'>the United States</ent> and started to control it. If
they began to put strict restrictions on everything you did, and started
to take away your rights. If they set curfews, so that you couldn't
come outside at times, and refused to let you go wherever you wanted.
If they refused to allow you to celebrate certain holidays. If they put
down all opposition brutally, killing anyone who disobeyed their rules.
And to top if off, they were supported by the biggest military in the
world. You could do nothing about it. Nothing. All tries have been
put down by force. Anything you have done has ended in your people
being killed or injured. How would you feel? Be honest now. Well,
this is exactly what is happening in <ent type='GPE'>Palestine</ent> now. It's even worse
than this. There is no way to describe it. The only way to do so is
to sit down for a few minutes and imagine people coming into your
town and suddenly taking control of it. You have to do everything
they tell you to. If you go out and protest, they will injure you. If
you get violent, they will kill you, saying that you have been wanted
for other offenses as well, and that you had done such and such.
And there is absolutely nothing that you can do. Many people outside
are talking about this, but no one is really doing anything about it.
It feels terrible, doesn't it? You are beginning to get really angry
now, that no one is listening to your cries. You try more violent
methods - nothing. So you decide the only way to make it known to
others is to use terrorist methods. You hijack a plane. Now the
whole world is against you. More <ent type='NORP'>Jewish</ent> propaganda. You are called
a barbarian, uncivilized. Just throw a nuke on you, many say. So
what do you do? This is exactly what is happening to the <ent type='NORP'>Palestinian</ent>
people. Please, do something about it. Or at least, next time you
hear <ent type='NORP'>Jews</ent>, <ent type='NORP'>Jewish</ent> propaganda, or some other <ent type='NORP'>Jewish</ent> views, question
them, embarass them. Don't believe everything they say. Become
more informed. STOP THEM BEFORE IT'S TOO LATE!</p>
<p> <ent type='NORP'>American</ent> Anti-<ent type='NORP'>Jewish</ent> League
---------------------------</p>
<p> Disclaimer - Any use of this info for illegal purposes is forbidden
and against the law. All of the info in this file is
only for your personal knowledge. If you use any of
this info in the process, the consequences are yours
and yours alone.</p>
<div> </div>
<p> Useful Addresses and Phone Numbers
----------------------------------</p>
<p>1. Consulate General of <ent type='GPE'>Israel</ent>
220 <ent type='GPE'>Bush</ent>
<ent type='GPE'>San Francisco</ent>, CA.</p>
<p> (415) 398-8885</p>
<p> Open M-F 10am to 1pm</p>
<p>2. Adath <ent type='GPE'>Israel</ent>
Rabbi Jacob Traub
1851 Noriega</p>
<p> (415) 564-5665</p>
<p>3. Ahavat Shalom
150 Eureka</p>
<p> (415) 621-1020</p>
<p>4. <ent type='ORG'>Congregation</ent> Anshey Sfard
1500 Clement
(415) 752-4979</p>
<p>5. <ent type='ORG'>Congregation</ent> Beth <ent type='GPE'>Israel</ent>-<ent type='NORP'>Judea</ent>
Rabbi Herbert Morris
625 Brotherhood Way</p>
<p> (415) 586-8833</p>
<p>6. <ent type='ORG'>Congregation</ent> Beth Sholom
Rabbi Alexander Graubart
14th Ave &amp; Clement</p>
<p> (415) 221-8736</p>
<p>7. <ent type='ORG'>Congregation</ent> B'Nai B'Rit Ha Mashiach
(415) 992-2079</p>
<p>8. <ent type='ORG'>Congregation</ent> B'Nai Emunah (<ent type='NORP'>Conservative</ent> <ent type='NORP'>Jews</ent> - Give 'em HELL!)
Rabbi Theodore R. Alexander
3595 Taraval</p>
<p> (415) 664-7373</p>
<p>9. <ent type='ORG'>Congregation</ent> B'Nai <ent type='GPE'>Israel</ent> (also conservative)
Rabbi Malcolm Cohen
1575 Annie</p>
<p> (415) 756-5430</p>
<p>10. <ent type='ORG'>Congregation</ent> Chevra Thilim
751 25th Ave
(415) 386-9570 </p>
<p>11. <ent type='ORG'>Congregation</ent> Emanu-El
199 Arguello Bl.
(415) 751-2535</p>
<p>12. <ent type='ORG'>Congregation</ent> Keneseth <ent type='GPE'>Israel</ent>
1255 Post Suite 427
(415) 771-3420</p>
<p>13. <ent type='ORG'>Congregation</ent> Magain David Sephardim
351 4th Ave
(415) 752-9095</p>
<p>14. <ent type='ORG'>Congregation</ent> Ner Tamid
1250 Quintara</p>
<p> (415) 661-3383</p>
<p>15. <ent type='ORG'>Congregation</ent> Sherith <ent type='GPE'>Israel</ent>
2266 <ent type='GPE'>California</ent></p>
<p> (415) 346-1720</p>
<p>16. <ent type='ORG'>Hillel Foundation</ent>
33 <ent type='GPE'>Banbury</ent> Dr.</p>
<p> (415) 333-4922</p>
<p>17. <ent type='NORP'>Jewish</ent> Educational Center of SF
538 29th Ave</p>
<p> (415) 221-7045</p>
<p>18. <ent type='GPE'>United Synagogue</ent> of America
425 Divisadero
(415) 864-1051</p>
<p>Note - Some 42% of the problems of the US are a direct result of <ent type='NORP'>Jews</ent>. This
is not some hypothetical figure, it is thouroughly researched fact.
One of the main reasons our troops are in the <ent type='LOC'>gulf</ent> is <ent type='GPE'>Israel</ent>. Why?
They run practically all the biggest TV networks, newspapers, radio
stations, higher posts, etc. in the <ent type='GPE'>USA</ent>. </p>
<p> <ent type='NORP'>American</ent> Anti-<ent type='NORP'>Jewish</ent> League
---------------------------</p>
<p> UPDATE</p>
<p>So, now that Saddam Hussein has fired Scud missiles into <ent type='GPE'>Israel</ent>, and the
<ent type='NORP'>Jews</ent> have shown restraint, they immediately expect something from us. Today
they asked for 13 billion more dollars (billion, not million). In addition
to this, they have asked for another $10 billion from other countries.
Why the hell do we have to send our tax dollars to them? Why? They have
everything they already need. They have a huge air force, many nuclear
weapons, an army, navy, and money. Why should we send them anything? If
we are going to send money to someone, there are many other needier nations
on this planet who have none of the above. Instead, we send this money to
a country which from its very beginning has caused trouble. Possibly, no
other country has ever caused so many problems for humankind in history.
These <ent type='NORP'>Jewish</ent> pigs are now taking advantage of the circumstances to get many
of their ideas across, and thanks to Saddam, they are being very success-
ful. All the TV networks (most of which are run by <ent type='NORP'>Jews</ent> (many of the news
directors are <ent type='NORP'>Jewish</ent>, plus anchormen as well, such as Ted Coppel, Larry
King, etc etc)) are interviewing <ent type='NORP'>Jewish</ent> state figures, and asking them
favorable questions. <ent type='ORG'>CNN</ent> itself constantly interviews many <ent type='NORP'>Jewish</ent> heads
of state. But very few <ent type='NORP'>Arab</ent> leaders/figures are interviews, and if done
so, not very rational figures are chosen so that people get the wrong
impression. (ie. those two <ent type='NORP'>Jordanian</ent> engineers on Nightline who do not
reflect the majority opinion of <ent type='NORP'>Arabs</ent>) All the <ent type='NORP'>Jewish</ent> pigs interviewed
have been saying: "Now the world knows what we have had to put up with
all these years", when in fact, it is exactly the opposite! It is what
the <ent type='NORP'>Arab</ent> people have had to put up with, especially the <ent type='NORP'>Palestinian</ent>s,
who unfortunately supported Saddam's aggression. This is truly sad,
because it has given the <ent type='NORP'>Palestinian</ent>s a very bad image, especially in
the <ent type='GPE'>USA</ent>. Many of you are probably saying, "Oh, those poor <ent type='GPE'>Israel</ent>is,
look what they have to put up with. If <ent type='GPE'>San Francisco</ent> was bombed, I
would do the same too." And this is somewhat true; Saddam is a brutal
dictator, and the only thing he has done is help the <ent type='NORP'>Zionist</ent> pigs.
So here we go again; we've given them <ent type='ORG'>Patriot</ent> missile systems (each
<ent type='ORG'>Patriot</ent> missile costs $1 million - this is your TAX money!) Now we're
about to give those pigs, who don't really need this money, another
$13 billion. Of course the <ent type='NORP'>Arab</ent> countries will see us with an evil
eye. Not only have we ignored them, but now we are putting the icing
on the <ent type='NORP'>Jewish</ent> cake. This is enfuriating them. The <ent type='NORP'>Jews</ent> are (they say
this, and it is true, but they also take advantage of inferior peoples.
Just trace <ent type='NORP'>Jewish</ent> history) smart people, they are literate, have schools,
money, etc. Why can't they just get their own money? They practically
run a third of our country. Now, for restraining against immediate
attack (they will attack later though), they ask us for $13 billion.
This is an outrage! An absolute outrage! Our economy is going down,
we are cutting from health care, and from education, there are many
programs here that need money, and what do we do? We give those <ent type='NORP'>Jewish</ent>
pigs, who need the money less than we do, millions of dollars every
year. So that they can in return take advantage of our resources.
I plead with you that you do something about this. We have to stop
this. Many of the people who run the <ent type='GPE'>USA</ent> our <ent type='NORP'>Jews</ent>. Get them out
of their posts. Please, we must do something about this NOW, before
it's too late to even start something. Write letters. Ask people.
Inform yourselves. Read books (that are not biased - many of the
biggest publications companies are run by <ent type='NORP'>Jews</ent>) Spread this file
around as many bulletin boards as possible. Thank you for your
time.
</p></xml>

View File

@ -0,0 +1,769 @@
<xml><p>FROM THE ALL <ent type='ORG'>OHIO</ent> SCANNER CLUB:</p>
<p>SYSTEM PROFILE - The FEDERAL BUREAU OF INVESTIGATION</p>
<p>History</p>
<p>The <ent type='ORG'>FBI</ent> traces its roots back to the year 1908 when then U.S. Attorney General
Charles Bonaparte directed that Department of Justice investigations be handled
by a small group of special investigators. The group was formed as <ent type='ORG'>the Bureau</ent>
of Investigation and, in 1935, the present day name was designated by <ent type='ORG'>Congress</ent>.</p>
<p>Duties</p>
<p>The primary functions of the <ent type='ORG'>FBI</ent> and its agents are the investigations of
violations of certain <ent type='ORG'>Federal</ent> statutes and the collection of evidence in cases
in which <ent type='GPE'>the United States</ent> is or may be an interested party. The <ent type='ORG'>FBI</ent> performs
other duties specifically imposed by law or Presidential directive and conducts
a number of service activities for other law enforcement agencies. The <ent type='ORG'>FBI</ent> can
investigate a matter only when it has authority to do so under a law passed by
<ent type='ORG'>Congress</ent> or on instructions of the President or the Attorney General.</p>
<p>The <ent type='ORG'>FBI</ent> is not a <ent type='ORG'>Federal</ent> police force, it is a fact-finding organization
investigating violations of <ent type='ORG'>Federal</ent> laws and its authority is strictly limited
to matters within its jurisdiction. <ent type='ORG'>FBI</ent> agents may make arrests without a
warrant for any <ent type='ORG'>Federal</ent> offense committed in their presence, or when they have
reasonable grounds to believe that the person to be arrested has committed or
is attempting to commit a felony violation of <ent type='GPE'>United States</ent> laws. Agents may
also make arrests by warrant.</p>
<p>Agents do not make arrests for "investigation" or "on suspicion". Before
arrests are made, if at all possible, the facts of each case are presented tom
the U.S. Attorney who decides whether or not a <ent type='ORG'>Federal</ent> violation has occurred
and, if so, the U.S. Attorney may authorize agents to file a complaint which
serves as the basis of the arrest warrant.</p>
<p>The <ent type='ORG'>FBI</ent> has no authority to investigate local crimes which are not within its
jurisdiction. The <ent type='ORG'>FBI</ent> will, however, render all possible assistance to the
local police through the <ent type='ORG'>FBI</ent> Laboratory and Identification Division. The <ent type='ORG'>FBI</ent>
LID maintains fingerprint files on approximately 70 million (yes, million)
people. The <ent type='ORG'>FBI</ent> also maintains <ent type='ORG'>the National Crime Information Center</ent> (<ent type='ORG'>NCIC</ent>)
which keeps records of missing persons, serialized stolen property, wanted
persons for whom an arrest warrant is outstanding, and criminal histories on
individuals arrested and fingerprinted for serious or significant offenses.</p>
<p>The <ent type='ORG'>NCIC</ent> is a computerized information system established by the <ent type='ORG'>FBI</ent> as a
service to all criminal justice agencies- local, state and <ent type='ORG'>Federal</ent>. The
information can be instantly retrieved over a vast communications network
through the use of telecommunications equipment in criminal justice centers in
various locations in <ent type='GPE'>the United States</ent>, <ent type='GPE'>Canada</ent> and <ent type='GPE'>Puerto Rico</ent>. Many times when
monitoring the local or county police/sheriff departments a reference to a <ent type='ORG'>NCIC</ent>
check is heard.</p>
<p>The <ent type='ORG'>FBI</ent> is involved in criminal investigations and foreign counterintelligence
efforts. Most notably criminal investigations are those of bank robberies and
kidnapping cases. The <ent type='ORG'>FBI</ent> can also investigate criminal activity associated
with interstate transportation of stolen property, and the <ent type='ORG'>FBI</ent> can investigate
graft and corruption cases of local government under certain circumstances.
Department of Justice offices mat be found on some military installations as
the <ent type='ORG'>FBI</ent> has jurisdiction when a crime involves Government property, or funds,
or when only civilians are involved.</p>
<p>The <ent type='ORG'>FBI</ent>'s responsibility with respect to foreign counterintelligence, within
<ent type='GPE'>the United States</ent>, is to detect, lawfully counteract, and/or prevent espionage
and other clandestine intelligence activities, sabotage, international
terrorist activities, or assassinations conducted for or on behalf of foreign
powers, organizations, or persons. The <ent type='ORG'>FBI</ent> also investigates murders,
kidnappings, and assaults against foreign diplomatic officials while in the
<ent type='GPE'>United States</ent>, as well as damage to property of foreign governments in the
<ent type='GPE'>United States</ent>.</p>
<p>Organization</p>
<p>The <ent type='ORG'>FBI</ent> is an agency within the U.S. Department of Justice, which is lead by
the U.S. Attorney General. The head of the <ent type='ORG'>FBI</ent> is the Director who is appointed
by the President with the advice and consent of the <ent type='ORG'>Senate</ent>. Assistant directors
are the next level of command within the <ent type='ORG'>FBI</ent>. The <ent type='ORG'>FBI</ent> has ten assistant
directors who are accountable to the Director for all matters within their
sphere of operations.</p>
<p>The <ent type='ORG'>FBI</ent> has 59 field offices located in major cities throughout the United
States and in <ent type='GPE'>San Juan</ent>, <ent type='GPE'>Puerto Rico</ent>. Each, with the exception of the <ent type='GPE'>New York</ent>
Office which is headed by an Assistant Director, is under the direct
supervision of a Special Agent In Charge (<ent type='ORG'>SAIC</ent>). The <ent type='ORG'>SAIC</ent> is supervised and
receives directions from the <ent type='ORG'>FBI</ent> headquarters in <ent type='GPE'>Washington</ent>, D.C.</p>
<p>Each <ent type='ORG'>FBI</ent> Field Office has <ent type='ORG'>Resident Agencies</ent> which are local offices in some of
the larger cities within the field offices jurisdiction. Refer to the <ent type='ORG'>FBI</ent> field
office map for the sectioning of the field offices across <ent type='GPE'>the United States</ent>.
The following list of the field offices and associated data was generated by
data contributed from several readers who wish to remain anonymous and from
this editor.</p>
<p>Location F.O. Telephone No. Call Letters RA's</p>
<p>Albany, NY 12201 1 518 465 7551 <ent type='ORG'>KEC</ent> 250 - 262 8</p>
<p>Albuquerque, NM 87102 2 505 247 1555 6</p>
<p><ent type='GPE'>Alexandria</ent>, VA 3 KFQ 240 - 244 3</p>
<p>Anchorage, AK 99513 4 907 276 4441 2</p>
<p><ent type='GPE'>Atlanta</ent>, GA 30303 5 404 521 3900 KIE 300 - 311 8</p>
<p>Baltimore, MD 21207 6 301 265 8080 <ent type='ORG'>KGB</ent> 747 - 756 9</p>
<p>Birmingham, AL 35203 7 205 252 7705 5</p>
<p><ent type='GPE'>Boston</ent>, MA 02203 8 617 742 5533 KCB 800 - 814 12</p>
<p>Buffalo, NY 14202 9 716 856 7800 <ent type='ORG'>KEX</ent> 590 - 595 3</p>
<p>Butte, MT 59702 10 406 782 2304 13</p>
<p><ent type='GPE'>Charlotte</ent>, NC 28217 11 704 529 1030 <ent type='ORG'>KEV</ent> 220 - 228 8</p>
<p><ent type='GPE'>Chicago</ent>, IL 60604 12 312 431 1333 <ent type='ORG'>KSC</ent> 210 - 217 4</p>
<p><ent type='GPE'>Cincinnati</ent>, OH 45202 13 513 421 4310 <ent type='ORG'>KQC</ent> 390 - 399 8</p>
<p><ent type='GPE'>Cleveland</ent>, OH 44199 14 216 522 1400 <ent type='ORG'>KEX</ent> 740 - 750 9</p>
<p>Columbia, SC 29201 15 803 254 3011 <ent type='ORG'>KEX</ent> 820 - 830 8</p>
<p><ent type='GPE'>Dallas</ent>, TX 75202 16 214 720 2200 8</p>
<p><ent type='GPE'>Denver</ent>, CO 80202 17 303 629 7171 7</p>
<p><ent type='GPE'>Detroit</ent>, MI 48226 18 313 965 2323 <ent type='ORG'>KEX</ent> 760 - 772 12</p>
<p>El Paso, TX 79901 19 915 533 7451 1</p>
<p><ent type='GPE'>Honolulu</ent>, HI 96850 20 808 521 1411 0</p>
<p><ent type='GPE'>Houston</ent>, TX 77008 21 713 868 2266 3</p>
<p><ent type='GPE'>Indianapolis</ent>, IN 46204 22 317 639 3301 <ent type='ORG'>KEX</ent> 780 - 790 9</p>
<p><ent type='GPE'>Jackson</ent>, MS 39269 23 601 948 5000 9</p>
<p><ent type='GPE'>Jacksonville</ent>, FL 32211 24 904 721 1211 7</p>
<p><ent type='GPE'>Kansas City</ent>, MO 64106 25 816 221 6100 <ent type='ORG'>KEX</ent> 570 - 582 9</p>
<p><ent type='GPE'>Knoxville</ent>, TN 37902 26 615 544 0751 <ent type='ORG'>KEV</ent> 240 - 246 6</p>
<p><ent type='GPE'>Las Vegas</ent>, NV 89104 27 702 385 1281 2</p>
<p>Little Rock, AR 72211 28 501 221 9100 KFQ 200 - 208 7</p>
<p>Los Angeles, CA 90024 29 213 477 6565 KMC 250 - 275 25</p>
<p><ent type='GPE'>Louisville</ent>, KY 40202 30 502 583 3941 KIA 320 - 332 12</p>
<p><ent type='GPE'>Memphis</ent>, TN 38103 31 901 525 7373 6</p>
<p><ent type='GPE'>Miami</ent>, FL 33169 32 305 944 9101 <ent type='ORG'>KEV</ent> 300 - 305 4</p>
<p>Milwaukee, WI 53202 33 414 276 4684 <ent type='ORG'>KSC</ent> 220 - 228 6</p>
<p><ent type='GPE'>Minneapolis</ent>, MN 55401 34 612 339 7861 14</p>
<p>Mobile, AL 36602 35 205 438 3674 5</p>
<p><ent type='GPE'>Newark</ent>, NJ 07102 36 201 622 5613 <ent type='ORG'>KEX</ent> 620 - 628 6</p>
<p>New Haven, CT 06510 37 203 777 6311 <ent type='ORG'>KEX</ent> 600 - 606 4</p>
<p><ent type='GPE'>New Orleans</ent>, LA 70113 38 504 522 4671 6</p>
<p><ent type='GPE'>New York</ent>, NY 10278 39 212 553 2700 <ent type='ORG'>KEC</ent> 270 - 283 ?</p>
<p><ent type='GPE'>Norfolk</ent>, VA 23510 40 804 623 3111 <ent type='ORG'>KEX</ent> 340 - 341 1</p>
<p><ent type='GPE'>Oklahoma City</ent>, OK 73118 41 405 842 7471 11</p>
<p><ent type='GPE'>Omaha</ent>, NE 68102 42 402 348 1210 9</p>
<p><ent type='GPE'>Philadelphia</ent>, PA 19106 43 215 629 0800 <ent type='ORG'>KEX</ent> 640 - 651 7</p>
<p><ent type='GPE'>Phoenix</ent>, AZ 85012 44 602 279 5511 6</p>
<p><ent type='GPE'>Pittsburgh</ent>, PA 15222 45 412 471 2000 <ent type='ORG'>KEX</ent> 660 - 679 12</p>
<p>Portland, OR 97201 46 503 224 4181 <ent type='ORG'>KEX</ent> 720 - 728 6</p>
<p>Richmond, VA 23220 47 804 644 2631 <ent type='ORG'>KEX</ent> 360 - 369 6</p>
<p>Sacramento, CA 95825 48 916 481 9110 KFP 900 - 910 6</p>
<p>St Louis, MO 63103 49 314 241 5357 5</p>
<p><ent type='GPE'>Salt Lake City</ent>, UT 84138 50 801 355 7521 3</p>
<p><ent type='GPE'>San Antonio</ent>, TX 78205 51 512 225 6741 <ent type='ORG'>KEX</ent> 840 - 847 5</p>
<p>San Diego, CA 92188 52 619 231 1122 <ent type='ORG'>KEX</ent> 680 - ? 4?</p>
<p><ent type='GPE'>San Francisco</ent>, CA 94102 53 415 553 7400 KFP 970 - 990 19</p>
<p><ent type='GPE'>San Juan</ent>, PR 00918 54 809 754 6000 0</p>
<p><ent type='GPE'>Savannah</ent>, GA 31405 55 912 354 9911 <ent type='ORG'>KEV</ent> 380 - 389 4</p>
<p><ent type='GPE'>Seattle</ent>, WA 98174 56 206 622 0460 KOD 220 - 232 9</p>
<p><ent type='GPE'>Springfield</ent>, IL 62704 57 217 522 9675 <ent type='ORG'>KEX</ent> 800 - 812 10</p>
<p><ent type='GPE'>Tampa</ent>, FL 33602 58 813 228 7661 <ent type='ORG'>KEV</ent> 320 - 327 5</p>
<p><ent type='GPE'>Washington</ent>, D.C. 20535 59 202 324 3000 <ent type='ORG'>KGB</ent> 770 0</p>
<p>The list of <ent type='ORG'>Field Offices</ent> and RA's is not 100% accurate, updates please. The
number of RA's may differ from the call letter assignment block for a given
F.O. because many RA's were closed and consolidated during the Carter and early
Regan administrations. The call letters were assigned prior to their
administrations.</p>
<p>The F.O. call letters will be the first is an assigned block for a given F.O.
Example <ent type='GPE'>Cincinnati</ent> F.O. call is <ent type='ORG'>KQC</ent> 390 (or simply 390 as often will be heard)
or <ent type='GPE'>Cleveland</ent> F.O. call is <ent type='ORG'>KEX</ent> 740 (740).</p>
<p>The following is a list of <ent type='ORG'>Resident Agencies</ent> for the primary coverage states of
the <ent type='ORG'>AOSC</ent>. The list is as of 1 October 1987. I will send a copy of the <ent type='ORG'>FBI</ent> Field
Office and <ent type='ORG'>Resident Agency</ent> map for a SASE to those who desire a copy. A list of
RA's may be obtained from the map for your local area. The map will be a copy
of a copy, however it will be fairly legible. Note the two <ent type='ORG'>Ohio Field Office</ent>
lists are presented later in this column with the detailed <ent type='GPE'>Ohio</ent> data.</p>
<p><ent type='GPE'>Chicago</ent> "CG" Field Office - RA's</p>
<p> Lisle (<ent type='GPE'>Chicago</ent> West)
Mount Prospect (<ent type='GPE'>Chicago</ent> North)
Oakland Park (<ent type='GPE'>Chicago</ent> South)
Rockford</p>
<p>Frequency Plan:</p>
<p> A-1 167.3375 B-1 167.600
A-2 167.4875 B-2 167.675
A-3 167.425 B-3 167.7375
A-4 167.5625 B-4 167.5625
A-5 163.9875/167.3375 B-5 162.8625/167.600
A-6 Unconfirmed B-6 Unconfirmed
A-7 163.8625/167.5375 B-7 163.8625/167.5375
A-8 163.8375/167.2875 B-8 163.8375/167.2875</p>
<p><ent type='GPE'>Chicago</ent> F.O. utilizes 8 banks, A through H. Channel banks C through H are not
confirmed to exact frequencies and usage. There are one way links in the upper
162, lower 164 and upper 165 MHz ranges. The one way links are often a control
station to a repeater site utilizing a directional antenna. The one way links
may also be a point-to-point relay of communications from an outer fringe RA to
the F.O.</p>
<p><ent type='GPE'>Chicago</ent> appears to configured similarly as several other F.O.'s in that up to
five other VHF frequencies can be active with 163.9875 simultaneously with the
same radio traffic. <ent type='GPE'>Chicago</ent> F.O. also still uses some remote VHF receive/UHF
re-transmit link sites, but most are believed to be converted to microwave
links.</p>
<p>Also 167.7625 which Randy Strayer and this editor received via skip between <ent type='ORG'>KSC</ent>
210 and <ent type='ORG'>KSC</ent> 216. Channel identified as Bravo 1.</p>
<p><ent type='GPE'>Detroit</ent> "DE" Field Office - RA's</p>
<p> Ann Arbor
<ent type='GPE'>Benton Harbor</ent>
<ent type='GPE'>Flint</ent> <ent type='ORG'>KEX</ent> 762
<ent type='ORG'>Grand Rapids</ent>
<ent type='GPE'>Jackson</ent>
<ent type='GPE'>Kalamazoo</ent>
<ent type='GPE'>Lansing</ent>
Marquette <ent type='ORG'>KEX</ent> 767
Mount Clemens
<ent type='GPE'>Oakland County</ent>
<ent type='GPE'>Saginaw</ent>
<ent type='GPE'>Traverse City</ent> <ent type='ORG'>KEX</ent> 772</p>
<p>Frequencies per <ent type='ORG'>MFFD</ent> (1986) and others: 163.925/267.2625 R.A. repeater;
163.8875/167.750 F.O. repeater; 163.8625/167.5375R; 167.3125; 167.3625;
167.400; 167.450; 167.500; 167.650; 414.500 is a state-wide UHF link to <ent type='GPE'>Detroit</ent>
F.O. and 419.250 is believed to a <ent type='ORG'>FBI</ent> UHF link, continuous tone.</p>
<p><ent type='GPE'>Indianapolis</ent> "IP" Field Office - RA's</p>
<p> Bloomington
Evansville
Fort Wayne
Gary
<ent type='GPE'>Lafayette</ent>
<ent type='GPE'>Muncie</ent>
<ent type='GPE'>New Albany</ent> <ent type='ORG'>KEX</ent> 786
South Bend
Terre Haute</p>
<p>Frequencies from the <ent type='ORG'>MFFD</ent>: 163.9625/167.2125 R.A. repeater and 167.600.</p>
<p><ent type='GPE'>Louisville</ent> "LS" Field Office - RA's</p>
<p> Ashland
Bowling Green
Covington
<ent type='GPE'>Elizabethtown</ent>
<ent type='GPE'>Frankfort</ent>
<ent type='GPE'>Hopkinsville</ent>
<ent type='GPE'>Lexington</ent> KIA 321
<ent type='GPE'>London</ent>
<ent type='GPE'>Paducah</ent>
Pikeville</p>
<p>Frequencies from the <ent type='ORG'>MFFD</ent>: 163.9375/167.675 R.A. repeater and 167.600.</p>
<p><ent type='GPE'>Philadelphia</ent> Field Office - RA's</p>
<p> Allentown <ent type='ORG'>KEX</ent> 645
<ent type='GPE'>Harrisburg</ent> <ent type='ORG'>KEX</ent> 641
Landsdale <ent type='ORG'>KEX</ent> 648
Newtown Square <ent type='ORG'>KEX</ent> 650
<ent type='GPE'>Scranton</ent> <ent type='ORG'>KEX</ent> 643
State College <ent type='ORG'>KEX</ent> 652
Williamsport <ent type='ORG'>KEX</ent> 651</p>
<p>Frequencies: 163.9875/167.325R CH 1; 167.7125 CH 2; 167.500 CH 3; 167.5625 CH
4; 167.525 CH 5; 163.9625 ECC-1; 163.8375/167.3875R; 163.9375R; 167.2625;
167.300; 167.325; 167.3375; and 419.325 data/tone.</p>
<p><ent type='GPE'>Pittsburgh</ent> "PG" Field Office - RA's</p>
<p> Beckley (WV)
<ent type='GPE'>Charleston</ent> (WV)
<ent type='GPE'>Clarksburg</ent> (WV)
<ent type='GPE'>Erie</ent>
<ent type='GPE'>Greensburg</ent>
<ent type='GPE'>Huntington</ent> (WV)
<ent type='GPE'>Johnstown</ent>
<ent type='GPE'>Martinsburg</ent> (WV)
New Castle
<ent type='GPE'>Parkersburg</ent> (WV)
<ent type='GPE'>Washington</ent>
Wheeling (WV)</p>
<p>Frequencies per <ent type='ORG'>MFFD</ent> (1986, no updates since then): 163.925/167.475R R.A.
repeater; 163.950/167.2125 F.O. repeater; 167.6375 and UHF links on 414.025,
414.125, 414.425 and 419.425.</p>
<p><ent type='GPE'>Springfield</ent> (IL) Field Office - RA's</p>
<p> Alton
Belleville
Bloomington
Carbondale
Champaign
<ent type='GPE'>Danville</ent>
<ent type='GPE'>Decatur</ent>
<ent type='GPE'>Effingham</ent>
<ent type='GPE'>Peoria</ent>
Rock Island</p>
<p>Frequencies per the <ent type='ORG'>MFFD</ent>: 163.9125/167.725 R.A. repeater; 167.3625 and 167.625.</p>
<p>Now some miscellaneous data from the files on frequencies and call letters. The
following list of call signs are for NY and NJ state and are from a list dated
in 1981, so be fore told.</p>
<p>Albany F.O.: <ent type='ORG'>KEC</ent> 250; <ent type='ORG'>KEC</ent> 254 <ent type='GPE'>Watertown</ent>; <ent type='ORG'>KEC</ent> 256 <ent type='GPE'>Syracuse</ent>; <ent type='ORG'>KEC</ent> 257 <ent type='GPE'>Utica</ent>; <ent type='ORG'>KEC</ent>
258 <ent type='GPE'>Burlington</ent> (VT); <ent type='ORG'>KEC</ent> 259 <ent type='GPE'>Plattsburgh</ent>; and <ent type='ORG'>KEC</ent> 261 Glens Falls.</p>
<p>Buffalo F.O.: <ent type='ORG'>KEX</ent> 590; <ent type='ORG'>KEX</ent> 591 <ent type='GPE'>Rochester</ent>; <ent type='ORG'>KEX</ent> 592 <ent type='GPE'>Geneva</ent>; <ent type='ORG'>KEX</ent> 593 <ent type='GPE'>Jamestown</ent>;
and <ent type='ORG'>KEX</ent> 595 Niagara Falls.</p>
<p><ent type='GPE'>Newark</ent> F.O.: <ent type='ORG'>KEX</ent> 620; <ent type='GPE'>Camden</ent> <ent type='ORG'>KEX</ent> 624</p>
<p><ent type='GPE'>NYC</ent> F.O.: <ent type='ORG'>KEC</ent> 270/271; <ent type='ORG'>KEC</ent> 272 <ent type='GPE'>Suffolk</ent>; <ent type='ORG'>KEC</ent> 273 <ent type='GPE'>Garden City</ent> (NJ); <ent type='ORG'>KEC</ent> 277 JFK
Airport; <ent type='ORG'>KEC</ent> 278 <ent type='GPE'>Poughkeepsie</ent>, NY; <ent type='ORG'>KEC</ent> 280 <ent type='GPE'>Staten Island</ent>; <ent type='ORG'>KEC</ent> 281 Richmond
Hills; and <ent type='ORG'>KEC</ent> 283 <ent type='GPE'>New Rochelle</ent>. From a 1988 list I have a <ent type='ORG'>KEC</ent> 900 for <ent type='GPE'>NYC</ent> as
well as <ent type='ORG'>KEC</ent> 270.</p>
<p>Now some frequencies from the input basket contributed by <ent type='ORG'>AOSC</ent> or <ent type='ORG'>NESN</ent> (North
East Scanner News - more data at the end of this column) members during 1989 or
1990.</p>
<p><ent type='GPE'>Boston</ent> F.O.: Romeo Units (R.A.'s) - 162.7625, 162.7875, 167.2625, 167.3625,
167.5625, 167.600, 167.6625 and 167.7625. <ent type='ORG'>Delta Units</ent> - 167.2625, 167.3625,
167.4625, 167.600, 167.6625 and 167.7625. <ent type='GPE'>Rhode Island</ent> - 167.2375, 167.2625,
167.4625, 167.7125 and 167.7625. <ent type='GPE'>New Hampshire</ent> - 163.9875/167.3625R, also
167.2375 and 167.6125.</p>
<p>Still with <ent type='GPE'>Boston</ent> from <ent type='ORG'>NESN</ent>: 163.8375, 163.8875, 163.900 and 163.925/164.125,
163.975/167.275 repeaters. Also 164.150, 167.250, 167.325, 167.425, 167.450,
167.500, 167.6375, and 167.750.</p>
<p>CT/NY <ent type='ORG'>FBI</ent> - 163.750 NY; 163.8625 CH 6 CT; 163.8875 CT; 164.125 Long Island;
164.150 NY; 167.2375 CT; 167.2625 NY; 167.2875 NY?; 167.3375 Long Island;
167.3875 NY; 167.425 CT primary; 167.4375 CT; 167.4625 NY; 167.5375 CT (note
input to 163.8625 CH 6); 167.5625; 167.600 NY; 167.6875 NY; 167.775 Long
Island; 167.7875 CT; 413.625 NY; 414.075 CT; 414.350 NY "Bronco Base" and
419.350 CT tone. Also note from the previous <ent type='NORP'>American</ent> Scannergram
169.975/168.850 as a new <ent type='GPE'>NYC</ent> repeater.</p>
<p>Also several with "?" as follows: 165.925 NY; 167.175 NY; 169.575 NY, possible
<ent type='ORG'>FBI</ent>/<ent type='ORG'>DEA</ent>; and 419.250 NY. One other interesting frequency - 170.825 as a U.S.
Marshal/INS/<ent type='ORG'>FBI</ent> NY "tie-in" frequency.</p>
<p><ent type='GPE'>Charlotte</ent> F.O.: 163.9125/? A-1 <ent type='GPE'>Greensboro</ent> (R.A. repeater)
163.9625/?R, 167.750 and 167.7125.</p>
<p><ent type='GPE'>Knoxville</ent> F.O.: A-1 163.9875R <ent type='GPE'>Knoxville</ent> F.O., also A-5 (probably different
input frequency and/or tone).
A-4 163.8375/167.2375 <ent type='LOC'>Chattanooga</ent> R.A.
B-5 163.8375/167.400 R.A. repeater, also C-1
C-5 163.8375R R.A. repeater
<ent type='GPE'>Johnson City</ent> base call is <ent type='ORG'>KEV</ent>-243
<ent type='GPE'>Knoxville</ent> Unit Numbers: 99 - Aircraft; mobile units 1 - 69.</p>
<p>Los Angeles F.O.: An excellent complete and detailed listing is available from
<ent type='ORG'>Mobile Radio Resources</ent> (2661 Carol Drive, <ent type='GPE'>San Jose</ent>, CA 95125). The <ent type='ORG'>FBI</ent> in LA
utilizes repeater channels in the 162, 163, 164, and 165 MHZ frequency range.
Inputs can be found in the 167 MHz frequencies. The 165 repeater frequencies
are 167.5875 and 165.7125.</p>
<p><ent type='GPE'>Memphis</ent> F.O.: R.A. repeater - 163.9375; F.O. repeater 163.8625</p>
<p><ent type='GPE'>Norfolk</ent> F.O.: 163.8375/167.600 F1; 167.2375 F2; 167.4875 F3; and 167.5625 F4.</p>
<p>Richmond F.O.: 163.8875/167.625 <ent type='ORG'>Operations</ent> Repeater; 167.5625 (note -
nationwide <ent type='ORG'>FBI</ent> simplex common); 163.8625/167.5375 (note - this is the only
repeater frequency pair that is common nationwide, usually used for <ent type='ORG'>SWAT</ent> or
special operations - ed.); 414.250 and 419.525 as UHF links.</p>
<p>San Diego F.O. sampling via <ent type='ORG'>Mobile Radio Resources</ent> Government Radio Systems
directory: <ent type='ORG'>Repeaters</ent> in the 162, 163, 164 and 165 MHz ranges with the input in
the 167 MHz range. The 165 repeater is on 167.5625 MHz.</p>
<p><ent type='GPE'>San Francisco</ent> F.O. sampling via MRS GRS directory: <ent type='ORG'>Repeaters</ent> in the 163 and 167
MHz frequency ranges with inputs in the 167 and 162 MHz ranges respectively.</p>
<p><ent type='GPE'>Tampa</ent>-St. <ent type='GPE'>Petersburg</ent> from Blaine Brooks: A-2: 167.725; A-3 167.325; A-5
167.3875; A-6 167.275; repeater on 163.9875 and 419.250 UHF satellite receiver
link.</p>
<p><ent type='GPE'>CINCINNATI</ent> FIELD OFFICE OPERATIONS</p>
<p>The <ent type='GPE'>Cincinnati</ent> Field Office originally had nine <ent type='ORG'>Resident Agencies</ent> which were
located in <ent type='GPE'>Athens</ent>, <ent type='GPE'>Chillicothe</ent>, <ent type='GPE'>Columbus</ent>, <ent type='GPE'>Dayton</ent>, <ent type='GPE'>Hamilton</ent>, <ent type='GPE'>Portsmouth</ent>,
<ent type='GPE'>Springfield</ent>, <ent type='GPE'>Steubenville</ent> and <ent type='GPE'>Zanesville</ent>. The <ent type='GPE'>Springfield</ent> office is closed and
I am not sure about the <ent type='GPE'>Zanesville</ent> R.A.</p>
<p>The CI F.O. and R.A.'s radio communication systems are DES (Digital Encryption
Standard) capable and are utilized on a regular basis. CI appears to have a 32
channel DES system in place as testing was monitored during 1988 and 1989. Most
of their frequencies remained the same from the previous DES days. Note that
the CI radios are VHF/UHF mobiles. Refer to the B channel series in the
frequency list.</p>
<p>The signal numbers do not appear to be squad base (logically grouping by
general agent function such as bank robbery squad or drug enforcement, or by
R.A.'s), but rather a numeric numbering scheme starting with 1 and into the low
100's.</p>
<p>The CI F.O./R.A. operations still need some work from our southern <ent type='GPE'>Ohio</ent> members
as allot of holes and gaps remain. The following profile on CI was mainly made
possible by the efforts of Bill Gillie, Tony Cono, Rick Poorman, another member
who desires to named Mr. Anonymous, and this editor.</p>
<p>NOTE: ALL <ent type='ORG'>OHIO</ent> data is confirmed unless noted otherwise.</p>
<p>CI Call Letter Assignments</p>
<p> <ent type='ORG'>KQC</ent> 390 <ent type='GPE'>Cincinnati</ent>
<ent type='ORG'>KQC</ent> 391 <ent type='GPE'>Dayton</ent>
<ent type='ORG'>KQC</ent> 392 <ent type='GPE'>Columbus</ent>
<ent type='ORG'>KQC</ent> 393 <ent type='GPE'>Chillicothe</ent>
<ent type='ORG'>KQC</ent> 394 <ent type='GPE'>Springfield</ent> (closed)
<ent type='ORG'>KQC</ent> 395 <ent type='GPE'>Athens</ent>
<ent type='ORG'>KQC</ent> 396 <ent type='GPE'>Hamilton</ent>
<ent type='ORG'>KQC</ent> 397 <ent type='GPE'>Portsmouth</ent>
<ent type='ORG'>KQC</ent> 398 Stubenville
<ent type='ORG'>KQC</ent> 399 <ent type='GPE'>Zanesville</ent></p>
<p>CI Frequency Assignments</p>
<p> 167.650 A-1 <ent type='ORG'>Operations</ent> simplex R.A.'s
167.2375 A-2 " " F.O.
167.4375 A-3 " " division wide
167.5625 A-4 <ent type='ORG'>Nationwide</ent> common simplex
163.9875/167.650 A-5 <ent type='ORG'>Operations</ent> Repeater R.A.'s
163.8625/167.5375 A-6 <ent type='ORG'>SWAT</ent> Repeater
163.8375/167.2375 A-7 <ent type='ORG'>Operations</ent> Repeater F.O.</p>
<p>The B channels are local option assigned meaning that each office will have a
different set of frequencies. The CI F.O. has <ent type='GPE'>Cincinnati</ent> PD CH 5, 460.275R,
(B-1); <ent type='GPE'>Hamilton</ent> County Sheriff, 460.500R, (B-2); and several <ent type='ORG'>DEA</ent> frequencies.</p>
<p> ??? D-6 and D-8 channel designators heard, but not confirmed.</p>
<p> 163.9875/167.650 ECC-1 (Extended Car-to-Car) repeater R.A.'s
163.8375/167.2375 ECC-2 repeater F.O.
163.8625/167.5375 ECC-3 <ent type='ORG'>SWAT</ent>/Special <ent type='ORG'>Operations</ent> nationwide repeater
164.100/? ? Repeater heard with CI units</p>
<p> 167.325, 167.600, 167.625, 167.6625, 167.6875 and 167.725: Simplex
operations.</p>
<p> 412.575 - Xenia, <ent type='GPE'>Greene County</ent> UHF Repeater link
419.300 - <ent type='GPE'>New Vienna</ent>, <ent type='GPE'>Highland County</ent> UHF Repeater link
419.500 - <ent type='GPE'>Macon</ent>, <ent type='GPE'>Brown County</ent> UHF Repeater link</p>
<p> 168.000 - possibly a VHF one-way link.</p>
<p>CI Signal Numbering</p>
<p> 390 Signals: 1, 2, 3, 20, 22, 24, 53, 71, 72, 77, 90, 106, 133, 141 and
148.
391 Signals: 11 (<ent type='ORG'>SAIC</ent>), 18, 26, 29, 33, 43, 45, 49, 51, 52, 61, 64, 72,
75, 78, 91, 112, 137, 158 and 159.
392 Signals: 5 (<ent type='ORG'>SAIC</ent>), 6, 23, 34, 38, 40, 41, 42, 50, 54, 56, 65, 69, 73,
75, 82, 88, 93, 98, 100, 103, 104, 105, 108, 112, 113, 114,
116, 117, 122, 125, 147, 157, 166 and 225?
393 Signals: 71
397 Signals: 27 (<ent type='ORG'>SAIC</ent>)
398 Signals: 95 and 96.</p>
<p> Sometimes units may only use their last two digits, such as 14 or 17
instead of 114 or 117. Unit 90 usually in a helicopter or may be a helicopter.
Unit The <ent type='ORG'>MFFD</ent> has units in the 200's as surveillance vans/vehicles and units
in the 400's as surveillance air vehicles. Also we have report that unit 500 is
a surveillance aircraft.</p>
<p><ent type='GPE'>CLEVELAND FIELD</ent> OFFICE OPERATIONS</p>
<p>The <ent type='GPE'>Cleveland</ent> Field Office originally had 10 <ent type='ORG'>Resident Agencies</ent> located in
<ent type='GPE'>Akron</ent>, <ent type='GPE'>Canton</ent>, <ent type='GPE'>Elyria</ent>, <ent type='GPE'>Lima</ent>, Mansfield, Mentor, <ent type='GPE'>Painesville</ent>, Sandusky, <ent type='GPE'>Toledo</ent>
and <ent type='GPE'>Youngstown</ent>. The Mentor R.A. currently is the only R.A. out of service in
the CV division.</p>
<p>The CV F.O. And R.A.'s radio communication system is DES capable and utilized
quite often in the DES mode. The CV F.O. has been in DES since the mid-eighties
on a limited basis and a full system since early 1989. The CV system appears to
be a 64 channel system which was implemented during the latter part of 1989.</p>
<p>The CV division utilizes a squad numbering scheme for assignment of signal
numbers. There are still a few holes in the numbering, but for the most part it
is complete.</p>
<p>CV Call Letter Assignment</p>
<p> <ent type='ORG'>KEX</ent> 740 <ent type='GPE'>Cleveland</ent>
<ent type='ORG'>KEX</ent> 741 <ent type='GPE'>Akron</ent>
<ent type='ORG'>KEX</ent> 742 <ent type='GPE'>Toledo</ent>
<ent type='ORG'>KEX</ent> 743 <ent type='GPE'>Youngstown</ent>
<ent type='ORG'>KEX</ent> 744 <ent type='GPE'>Painesville</ent>
<ent type='ORG'>KEX</ent> 745 <ent type='GPE'>Elyria</ent>
<ent type='ORG'>KEX</ent> 746 Mentor (closed)
<ent type='ORG'>KEX</ent> 747 <ent type='GPE'>Lima</ent>
<ent type='ORG'>KEX</ent> 748 Mansfield
<ent type='ORG'>KEX</ent> 749 <ent type='GPE'>Canton</ent>
<ent type='ORG'>KEX</ent> 750 Sandusky</p>
<p>CV Frequency Assignments</p>
<p> 167.675 A-1 <ent type='ORG'>Operations</ent> Simplex F.O.
167.4125/167.7375 A-2 S.O.G. Repeater (Special <ent type='ORG'>Operations</ent> Group)
167.7875 A-3 S.O.G. Simplex; <ent type='ORG'>Operations</ent> Simplex
167.5625 A-4 <ent type='ORG'>Nationwide</ent> Common
164.100/167.2875 A-5 S.O.G. repeater
163.9125/167.675 A-6 <ent type='ORG'>Operations</ent> Repeater
163.8625/167.5375 A-7 (?) <ent type='ORG'>SWAT</ent> Repeater
154.935 A-8 <ent type='GPE'>Ohio</ent> <ent type='ORG'>LEERN</ent></p>
<p> 167.425 B-1 R.A. Simplex
167.5625 B-4 Simplex
163.875/167.425 B-5 R.A. <ent type='ORG'>Operations</ent> Repeater
155.370 B-6 <ent type='GPE'>Ohio</ent> Intercity</p>
<p> 167.3375/162.7375 C-2 <ent type='GPE'>Canton</ent> <ent type='ORG'>Operations</ent> Repeater
167.3375/? C-3 " " "
167.3875/? C-4 Mansfield " "
167.7875/167.7375 C-7 CV Repeater</p>
<p> 167.425 D-1 R.A. Simplex
163.875/167.425 D-4 R.A. Repeater
??? D-7 <ent type='GPE'>Akron</ent> simplex, not confirmed</p>
<p> 167.7625 G-1 <ent type='GPE'>Akron</ent> <ent type='ORG'>Operations</ent> Simplex
167.7625/162.7625 G-2 <ent type='GPE'>Akron</ent> R.A. <ent type='ORG'>Operations</ent> Repeater
167.3625 G-3 <ent type='GPE'>Painesville</ent> Simplex (?)</p>
<p> The F bank is believed to be local option. No E or H bank references.</p>
<p>Confirmed frequency list:</p>
<p> 162.7375 <ent type='GPE'>Canton</ent> B/M input to 167.3375 repeater
162.7625 <ent type='GPE'>Akron</ent> " " to 167.7625 "
163.8625/167.5375 CV <ent type='ORG'>SWAT</ent> Repeater
163.875/167.425 R.A. Repeater
163.9125/167.675 CV F.O. Repeater
164.100/167.2875 S.O.G. Repeater
167.100 Simplex
167.2125 CV simplex
167.2375 <ent type='GPE'>Akron</ent> simplex
167.2625 " "
167.2875 CV simplex; input to 164.100
167.3375/162.7375 <ent type='GPE'>Canton</ent> R.A. Repeater
167.3375/? <ent type='GPE'>Lima</ent>, Sandusky, <ent type='GPE'>Toledo</ent> R.A. Repeater
167.3625/162.7625 <ent type='GPE'>Akron</ent>, <ent type='GPE'>Painesville</ent> R.A. Repeater
167.3625 <ent type='GPE'>Akron</ent>, <ent type='GPE'>Painesville</ent> Simplex
167.3875/? Mansfield <ent type='ORG'>Operations</ent> Repeater
167.4125/167.7375 CV S.O.G. Repeater
167.425 R.A. Simplex; input to 163.875
167.4625 <ent type='ORG'>Mansfield Simplex</ent>
167.5125 CV Simplex
167.5375 Input to 163.8625
167.5625 Common simplex
167.675 CV Simplex; input to 163.9125
167.7375 CV Simplex AND CV Repeater
167.7625/162.7625 <ent type='GPE'>Akron</ent> R.A. repeater
167.7875 CV Simplex and CV Repeater</p>
<p>That is 22 unique confirmed frequencies and there are probably more out there
in CV. Also try 168.000 as it may be a VHF fixed one-way link.</p>
<p>Several frequencies come active with the same traffic at times, namely
167.4125, 167.7375 and 167.7875, and at times 164.100 also!</p>
<p>CV Signal Numbering</p>
<p> 1-99 Administration
100 - 199 Exact function(s) not confirmed
200 - 299 Gambling Squad
300 - 399 Bank Robbery Squad; Kidnapping Squad; Extortion Cases
400 - 499 Drug Enforcement Squad
500 - 599 Organized Crime Task Force; S.O.G. personnel
600 - 699 Exact function(s) not confirmed
assists w/kidnapping cases, surveillances
700 - 739 Assistant U.S. Attorney's; others?
740 - 750 Base Station Calls
800 - 899 <ent type='ORG'>SWAT</ent>; Foreign Counterintelligence; O.C.T.F.
900 - 999 <ent type='GPE'>Akron</ent>, <ent type='GPE'>Painesville</ent> R.A.'s
<ent type='GPE'>Akron</ent> - 900, 901, 902, 904, 906, 921 - 929
<ent type='GPE'>Painesville</ent> - 903, 920, 930
1000 - 1099 <ent type='GPE'>Canton</ent> and Mansfield R.A.'s
<ent type='GPE'>Canton</ent> - 1000 to 1010; 1030 to 1040
Mansfield - 1005, 1032 and 1033
1100 - 1199 Sandusky and <ent type='GPE'>Toledo</ent> R.A.'s
Sandusky - 1121 - 1129
<ent type='GPE'>Toledo</ent> - 1100 - 1119, 1130
1200 - 1299 <ent type='GPE'>Youngstown</ent> R.A. - 1200 to 1209 and 1220 to 1232.
1300 - 1399 <ent type='ORG'>Radio Technicians</ent> and <ent type='ORG'>Vehicle Maintenance</ent>
Radio Techs - 1302, 1303, 1304, 1307 and 1319
<ent type='ORG'>Vehicle Maintenance</ent> - 1300, 1301, 1305, 1306 and 1318.</p>
<p><ent type='ORG'>FBI</ent> COMMON FREQUENCY RANGES</p>
<p>I suggest searching the following frequency ranges for <ent type='ORG'>FBI</ent> radio activity. Note
that in many areas across the U.S. the <ent type='ORG'>FBI</ent> have picked up many traditional
non-<ent type='ORG'>FBI</ent> frequencies. Originally <ent type='ORG'>the Department</ent> of Justice had only 82 VHf
frequencies assigned for ALL of its members, let alone just the <ent type='ORG'>FBI</ent>. The <ent type='ORG'>FBI</ent>
originally had less than 40 of the 82 frequencies for their exclusive use.</p>
<p>During the change over to DES nationwide, the <ent type='ORG'>FBI</ent> has received additional
frequencies from other branches and departments who did not utilize or need
them. In the NE region the <ent type='ORG'>FBI</ent> received 110 VHF frequencies - almost 300%
increase in the number of frequencies available. The early days saw the <ent type='ORG'>FBI</ent> in
the 163 MHz range for repeaters and the 167 MHz range for simplex operations.</p>
<p>Limit your search to 500 KHz at a time, certainly no more than a 1 MHz. The
following are common ranges reported nationwide:</p>
<p> 162.6125 - 162.7875 Repeater Inputs; Outputs; 12.5KHz steps
163.825 - 163.9875 Repeater Outputs; 12.5KHz steps
164.000 - 164.500 Repeater Outputs; 25KHz steps
165.5125 - 165.900 Repeater Outputs; 12.5KHz steps
167.100 - 167.7875 Repeater Inputs; Outputs; Simplex; 12.5KHz steps
168.825 - 169.000 Repeater Inputs; 25KHz steps
169.825 - 169.975 Repeater Outputs; 25KHz steps</p>
<p><ent type='ORG'>FBI</ent> COMMON TEN CODES</p>
<p> 10-0 Negative 10-29 O.L. Check
10-4 Affirmative 10-42 Residence
10-7 Out-of-Service 10-58 Mileage
10-8 In-Service 10-66 Alarm (?)
10-9 Repeat 10-76 Enroute
10-16 Message Check 10-77 Bank Alarm
10-20 Location 10-85 Meet w/agent ...
10-21 Telephone Call 10-90 Bank Robbery
10-22 Report to Office 10-91 BR In Progress
10-23 Stand-By 10-99 Assist Agent
10-26 N.C.I.C. Check
10-28 Registration check</p>
<p><ent type='ORG'>FBI</ent> COMMON CODE WORDS</p>
<p>A<ent type='ORG'>SAIC</ent> - Assistant Special Agent In Charge
A<ent type='GPE'>USA</ent> - Assistant U.S. Attorney
Big K - K-Mart
Bird Dog - Surveillance Aircraft
C.I. - Confidential Informant
Diaper Change - Changing of battery (bug or trailing transmitter)
ECC - Extended Car-to-Car
FCI - Foreign Counter <ent type='ORG'>Intel</ent>ligence
Half Signal - An Agent's spouse
H.T. - Handi-Talkies
In-the-Pocket - Subject in surveillance net
<ent type='ORG'>Intel</ent> - <ent type='ORG'>Intel</ent>ligence
KEL - Manufacturer of Surveillance equipment
Main Man - Primary subject under surveillance/investigation
Mickey D's - McDonald's
Nest - Off-site office from F.O./R.A. for S.O.G. and <ent type='ORG'>Undercover Agents</ent>
No Joy - Negative Communications
O, The - The Office
OCTF - Organized Crime Task Force
Other Side - DES mode
Out-of-Pocket - Subject not currently under surveillance
Outside Agency - News Media
Package - Suspect or item under surveillance
Plank - Bridge
Private - DES Mode
Private Side - DES Mode
Port - Motel
Quarter Signal - An Agent's child
RA - <ent type='ORG'>Resident Agency</ent>
Rabbit - Subject under surveillance
Rabbit Tracks - subject on the move
R.D.O.- Regular Day Off
Red Balled - Stopped at traffic light w/subject
Red Boarded - " " " " ; subject not stopped
Road Runner - Surveillance Aircraft
<ent type='ORG'>SAIC</ent> - Special Agent In Charge
Signal - A field agent
S.O.G. - Special <ent type='ORG'>Operations</ent> Group
S.W. - Search Warrant
<ent type='ORG'>SWAT</ent> - <ent type='ORG'>Special Weapons and Tactics</ent>
Ten Check - Message Check
Unit - A vehicle
<ent type='GPE'>USA</ent> - U.S. Attorney
Wagon - Surveillance Van
Wire - Body Transmitter</p>
<p>FEDERAL NEWS - <ent type='ORG'>FBI</ent></p>
<p>The <ent type='ORG'>FCC</ent> has established a nationwide radio frequency for stolen vehicle
tracking systems operating on the frequency of 173.025. The frequency was
reported as a <ent type='ORG'>FBI</ent> assignment (wouldn't we like to see the exact frequency
assignment chart?) <ent type='ORG'>Nationwide</ent>. Perhaps this frequency was used for wireless
microphones or bugs, and if so perhaps others operate on nearby similar
frequencies. Give it a listen and let us know.</p>
<p>The <ent type='ORG'>FBI</ent> Academy, located 40 miles south of <ent type='GPE'>Washington</ent>, is the host to the most
crime ridden town in <ent type='GPE'>the United States</ent> - Hogan's <ent type='ORG'>Alley</ent>. Hogan's <ent type='ORG'>Alley</ent> is a
"<ent type='GPE'>Hollywood</ent>" town with a motel, bank, post office, drug store, laundry and even
a theater. It is used as a training ground for <ent type='ORG'>FBI</ent> agent trainees. Various
scenarios are enacted under the careful eyes of supervisors. The trainees
performance are evaluated with each exercise.</p>
<p>One thing about Hogan's <ent type='ORG'>Alley</ent> - it has a 100% success rate in solving of cases,
pretty impressive. Something that is not pretty impressive about the <ent type='ORG'>FBI</ent> is the
starting pay agents earn. According to a 8 January 1990 U.S. News and World
Report quirk the starting pay of a <ent type='ORG'>FBI</ent> agent is $26261. Consider that an agent
does not choice his assignment location, the agent could be placed in a very
high cost of living area. Placement in certain cities such as <ent type='GPE'>NYC</ent> offer
slightly more pay, however it is not enough for the work that they perform for
all of us. Yet even worse is the pay for <ent type='ORG'>DEA</ent> agents $19493 to $23846.</p>
<p>The <ent type='ORG'>Congress</ent> is aware of these low salaries (after all they, the <ent type='ORG'>Congress</ent>men
and Senators literally took care of themselves) and will hopefully rectify the
problem this year.
</p></xml>

View File

@ -0,0 +1,242 @@
<xml><p>Volume : SIRS 1991 History, Article 56
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Do Assassinations Alter the Course of History?
Author : Simon Freeman and Ronald Payne
Source : <ent type='NORP'>European</ent>
Publication Date : May 24-26, 1991
Page Number(s) : 9
EUROPEAN
(<ent type='GPE'>London</ent>, <ent type='GPE'>England</ent>)
May 24-26, 1991, p. 9
"Reprinted courtesy of <ent type='ORG'>THE EUROPEAN</ent>."
DO ASSASSINATIONS ALTER THE COURSE OF HISTORY?
by Simon Freeman and Ronald Payne
</p>
<p>
<ent type='GPE'>India</ent> faces collapse with the violent death of Rajiv Gandhi--or
does it? Simon Freeman and Ronald Payne analyse the importance of
individuals in the march of events
</p>
<p>
They have paid their tributes, expressed their horror and
pledged, as they always do when one of their number is murdered,
that democracy will triumph in the face of terrorism. Now, in
their weekend retreats, with their foreign affairs advisers and
their top secret intelligence reports, world leaders will have to
judge the true impact on <ent type='GPE'>India</ent> of the assassination of Rajiv
Gandhi.
</p>
<p>
They will conclude, perhaps a little unhappily for them but
fortunately for the rest of us, that Gandhi's death is unlikely
to be more than a footnote, if a substantial one, in the history
of his country. <ent type='GPE'>India</ent> will not disintegrate. There will be no
civil war. The <ent type='GPE'>India</ent>n military will not stage a coup. <ent type='GPE'>Pakistan</ent>
will not launch the oft-predicted strike which would set the
region ablaze.
</p>
<p>
Some <ent type='GPE'>India</ent>ns, perhaps many, may die over the next month in
the kind of primitive ethnic and religious feuding which has
always threatened to destroy the country. But, unless history is
truly mischievous, <ent type='GPE'>India</ent> will muddle through and get on with the
business of trying to survive.
</p>
<p>
It is rarely the personal stature of a statesman which
decides how pivotal his contribution to history will be. History
usually depends less on the drama of an assassination or the
status of the victim than on more profound political, economic or
demographic forces. In retrospect, it often appears that assassin
and victim were inexorably drawn together to become the catalyst
for inevitable change.
</p>
<p>
The most spectacular assassination in modern <ent type='NORP'>European</ent>
history--the shooting of Archduke Francis Ferdinand and his wife
at <ent type='GPE'>Sarajevo</ent> in 1914 by a <ent type='NORP'>Serbian</ent> student, Gavrilo Princip--was
undoubtedly the immediate cause of the First World War. But few
serious historians today subscribe to the theory that, had
Princip not pressed the trigger that late June day in the cause
of <ent type='NORP'>Serbian</ent> nationalism, the 19th-century order would have
survived.
</p>
<p>
Dr Christopher Andrew, of <ent type='ORG'>Cambridge University</ent>, believes
that the assassination merely set the timetable for war. He said:
"Even if the Archduke had not been killed then there might have
been a great war anyway." Other experts now talk not of Princip
but of an explosive cocktail of nationalism straining within
decrepit empires and of fatally dangerous alliances built by
leaders from an earlier world.
</p>
<p>
It is possible to see <ent type='GPE'>Sarajevo</ent> as the climax to a period in
which political murders became almost routine. The reference
books on late 19th-century <ent type='LOC'>Europe</ent> are peppered with the names of
hapless, long-forgotten politicians who were shot, bombed or
stabbed because, so it was thought by the many bands of
extremists, that was the only way to force change.
</p>
<p>
While there are no precise ways to assess the real
importance of an assassination, historians like Andrew reckon
that there are some general guidelines. In the stable, advanced
democracies of today the murder of a top politician is unlikely
to cause more than outrage and pain.
</p>
<p>
When <ent type='ORG'>the Irish Republican Army</ent> blew up the Grand Hotel in
<ent type='GPE'>Brighton</ent> in 1984 in an attempt to kill Prime Minister Margaret
Thatcher and most of her <ent type='ORG'>Cabinet</ent>, they hoped that there would be
such disgust at the murders that the <ent type='NORP'>British</ent> public would force
their leaders to pull out of <ent type='GPE'>Northern Ireland</ent>. But, even if
Thatcher had died this would not have happened. Her death would
probably have strengthened her successor's resolve not to bow to
terrorism.
</p>
<p>
The IRA should have known this from the reaction to the
killing five years earlier of Lord Louis Mountbatten,
distinguished soldier, public servant and pillar of the <ent type='NORP'>British</ent>
Establishment. The murder changed nothing in the province and
only demonstrated, as if it was necessary, that determined
terrorists often find ways to murder their chosen targets.
Similarly, <ent type='ORG'>The Red Brigade</ent> anarchists who cold-bloodedly killed
Aldo Moro, the <ent type='NORP'>Italian</ent> prime minister, in May, 1978, achieved
nothing except to ensure that the <ent type='NORP'>Italian</ent> authorities would hunt
them with even more determination. Nor did the killers of <ent type='NORP'>Swedish</ent>
Prime Minister Olof <ent type='LOC'>Palme</ent> accomplish anything. The murder--still
unsolved--drew the usual, but clearly genuine, shocked response
from world leaders. But even at the time they were hardpressed to
pretend that <ent type='LOC'>Palme</ent>'s murder would fundamentally matter to <ent type='GPE'>Sweden</ent>.
</p>
<p>
The Third World, on the other hand, is more volatile.
Sometimes, as in <ent type='GPE'>India</ent>, countries are an uneasy blend of
feudalism and capitalism, dynastic authoritarianism and
democracy. The demise of dictators often leaves a bloody vacuum.
Yet even here, the assassination of a tyrant does not necessarily
signal major upheaval. General Zia ul-Haque, who had ruled
<ent type='GPE'>Pakistan</ent> since 1977, was blown up in his plane in the summer of
1988. But, though he had long seemed crucial to the continuing
stability of the country, his death seemed to be the fated climax
to the era of military rule.
</p>
<p>
The murder of <ent type='GPE'>Egypt</ent>'s President Sadat in October 1981 seemed
then to herald some new dark age of internal repression and
aggression towards <ent type='GPE'>Israel</ent>. But his successor, Hosni Mubarak,
merely edged closer to the <ent type='NORP'>Arab</ent> world without returning to the
pre-Sadat hostility towards <ent type='GPE'>Israel</ent>.
</p>
<p>
The killers of kings and dictators in other <ent type='NORP'>Arab</ent> countries
have also discovered that they have murdered in vain. <ent type='GPE'>Iraq</ent> has
endured a succession of brutal military dictators who have died
as violently as they lived. The fact that <ent type='GPE'>Iraq</ent> has never
experienced democracy is the result of economic and historical
realities, not assassins' bullets. Saudi <ent type='NORP'>Arab</ent>ia has also seen its
share of high level killings yet, today, <ent type='ORG'>the House</ent> of Saud
remains immovably in power.
</p>
<p>
But in <ent type='GPE'>the United States</ent>, where the idea of righteous
violence is deeply embedded in the national consciousness, the
grand assassination has been part of the political process for
more than a century. Beginning with the murder of President
Abraham Lincoln in 1865, the list of victims is a long and
distinguished one. It includes most recently, President John F.
Kennedy in 1963; his brother, Robert, heir apparent, shot in
1968; Martin Luther King, civil rights campaigner and Nobel Peace
Prize winner, gunned down the same year. Ronald Reagan could
easily have followed in 1981 when he was shot and badly wounded.
</p>
<p>
John Kennedy's death now appears important for different
reasons from those one might have expected at the time. It did
not derail any of his vaunted civil rights or welfare programmes;
rather his death guaranteed that his successor, Lyndon Johnson,
would be able to push the Kennedy blueprint for a <ent type='LOC'>New America</ent>
through <ent type='ORG'>Congress</ent>. Nor did it end the creeping US involvement in
<ent type='GPE'>Vietnam</ent>.
</p>
<p>
But Kennedy has been immortalised by his assassin and the
mythology of his unfulfilled promise will endure long after his
real accomplishments are forgotten.
</p>
<p>
In a curious, perverse, sense he and his fellow-martyrs
might live on as far more potent symbols of change than if they
had survived into gentle retirement with their fudges revealed
and their frailties exposed.
</p>
<p>
Why good leaders die and bad ones survive
</p>
<p>
Few names of hated tyrants appear on the roll-call of world
leaders who fall to the assassin's bomb, knife or bullet, writes
Ronald Payne. One of the curiosities of the trade in political
murder is that those the world generally recognises as bad guys
often live to a ripe old age or die quietly in their beds. Few
who mourn the passing of Rajiv Gandhi would have shed so many
tears had President Saddam Hussein been blown to pieces in <ent type='GPE'>Iraq</ent>.
</p>
<p>
There was a time only a few years ago when <ent type='NORP'>Americans</ent> and
<ent type='NORP'>European</ent>s would have celebrated the violent demise of President
Muammar Gaddafi. Both the <ent type='NORP'>Libyan</ent> leader and Hussein live on, as
do Idi Amin of <ent type='GPE'>Uganda</ent>, or Fidel Castro, whom the American Central
Intelligence Agency plotted so imaginatively and ineffectually to
remove.
</p>
<p>
When academics play the game of what might have been, the
consequences of assassinating such monstres sacres as Stalin and
Hitler arise.
</p>
<p>
When the <ent type='NORP'>Russian</ent> dictator died suddenly of natural causes,
the whole <ent type='GPE'>Soviet Union</ent> was paralysed because no leader dared
claim the right to succeed him. That in itself suggests what
might have happened had Stalin been shot unexpectedly at a more
critical moment.
</p>
<p>
The timing of a political murder is crucial. Had Adolf
Hitler been assassinated before he achieved full power or before
his invasion of the <ent type='GPE'>Soviet Union</ent>, the history of <ent type='GPE'>Germany</ent>, and
indeed of <ent type='LOC'>Europe</ent>, would have been very different.
</p>
<p>
Fascinating though such intellectual exercises are, it seems
that as a rule it is the decent, the innocent and the relatively
harmless who perish as assassins' victims.
</p>
<p>
The reason may not be far to seek. Tyrants watch their backs
pretty carefully. The secret police are ever active. It is easier
to kill statesmen in democracies where the rule of law prevails
and the sad truth is that leaders in those countries which
exercise authority through voting rather than shooting are more
at risk than <ent type='LOC'>Middle East</ent> tyrants.
</p>
<p>
A further reason for the survival of the hated monster
figure might be that Western intelligence services have been
forbidden to go in for execution. The <ent type='ORG'>CIA</ent> and the <ent type='NORP'>British</ent> secret
intelligence service are now out of the killing business. Even
the <ent type='ORG'>KGB</ent>'s assassination specialists seem to have been stood down.
</p>
<p>
In any case the <ent type='ORG'>Kremlin</ent> was hardly keen on the murder of
ruling statesmen even in the bad old days. <ent type='NORP'>Soviet</ent> leaders
understood the realities of power well enough to know that such
acts were unlikely to further their cause.
</p>
<div>
</div></xml>

View File

@ -0,0 +1,354 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : Conspiracy Theories: Doubts Refuse to Die
Author : Bob Dudney
Source : <ent type='ORG'>Dallas Times Herald</ent> (<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 11
<ent type='GPE'>DALLAS</ent> <ent type='ORG'>TIMES HERALD</ent>
(<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Nov. 20, 1983, Commemorative Section, pp. 11
Reprinted with permission from the author.
CONSPIRACY THEORIES: <ent type='GPE'>DOUBTS</ent> REFUSE TO DIE
by Bob Dudney
Special to the Times Herald
</p>
<p>
Editor's Note: Bob Dudney, a former reporter for the <ent type='GPE'>Dallas</ent> Times
Herald, has written hundreds of articles about the investigation
of President Kennedy's assassination. He has covered
congressional inquiries on the subject, has interviewed dozens of
people connected with it, and has examined thousands of
government documents.
</p>
<p>
The shots fired in Dealey Plaza on a sunny <ent type='GPE'>Dallas</ent> day 20
years ago still reverberate in a bizarre way: the belief that
President John F. Kennedy's assassination resulted from a
conspiracy.
</p>
<p>
There is a deep, almost theological assumption by some
<ent type='NORP'>Americans</ent> that the President was the victim of conspirators who
still roam at large. The conclusion is strange because there is
no solid evidence to support it--and significant reasons to
believe it is false.
</p>
<p>
There is no denying the difficulty of accepting the Warren
Commission's verdict on the events of Nov. 22, 1963--that a
down-and-out, 24-year-old ex-<ent type='ORG'>Marine</ent> named Lee Harvey Oswald, with
no outside assistance, murdered the most glamorous, powerful man
in the world at the time.
</p>
<p>
But no matter how strong the unwillingness to believe, the
evidence in the case demonstrates beyond a reasonable doubt that
there was no plot. Undermining the scores of conspiracy theories
that have cropped up over the years are three crucial factors:
</p>
<p>
- The scientific, eyewitness and medical data establishing
that Oswald shot Kennedy.
</p>
<p>
- The absence of uncontroverted evidence linking Oswald to
other conspirators.
</p>
<p>
- The lack of evidence to suggest that Oswald was
unwittingly manipulated by others.
</p>
<p>
So long as these elements remain unshaken, claims that a
sinister plot was afoot that November day will amount to nothing
more than speculation.
</p>
<p>
Nevertheless, theories about the active involvement of
others in the assassination thrive and multiply. Their
proponents--some skilled and some not, some sincere and some not
--have produced dozens of books, films and articles that purport
to reveal the "full" treachery of events in <ent type='GPE'>Dallas</ent> two decades
ago.
</p>
<p>
In fact, from the volume and variety of conspiracy theories,
one might conclude that the possibility of a conspiracy had never
been officially probed. The theories discount thousands of
documents and millions of investigative man-hours devoted to that
question by the Warren panel, the <ent type='ORG'>FBI</ent> and the <ent type='ORG'>CIA</ent> in 1963 and
1964; <ent type='ORG'>the Rockefeller Commission</ent> in 1975; the Senate Select
Committee on Intelligence in 1975 and <ent type='ORG'>the House Committee</ent> on
Assassinations in 1977-1978.
</p>
<p>
The list of "suspects" the theories implicate is extensive.
Among them: The <ent type='NORP'>Soviet</ent> <ent type='ORG'>KGB</ent>; anti-<ent type='NORP'>Soviet</ent> exiles; Fidel Castro;
pro-Castro <ent type='NORP'>Cubans</ent> in <ent type='GPE'>the United States</ent>; anti-Castro <ent type='NORP'>Cubans</ent>;
loyalists of slain <ent type='NORP'>South Vietnamese</ent> leader Ngo Dinh Diem; right
wing fanatics; left wing <ent type='NORP'>Marxist</ent>s; the <ent type='ORG'>Mafia</ent>; rogue <ent type='GPE'>Texas</ent> oilmen;
labor unions; <ent type='NORP'>Southern</ent> white racists; the <ent type='GPE'>Dallas</ent> Police
Department; the <ent type='ORG'>CIA</ent>; the <ent type='ORG'>FBI</ent>; <ent type='ORG'>the Secret Service</ent>; the <ent type='NORP'>Chinese</ent>
communists; reactionary <ent type='ORG'>Army</ent> officers; and <ent type='NORP'>Jewish</ent> extremists.
</p>
<p>
But it is not enough to demonstrate that some group stood to
benefit from the murder. Theorists must establish participation
of two or more people in the murder. This they have not done.
</p>
<p>
Each theory alters the nature of Oswald's role in the death,
but the possible changes are necessarily limited. The principle
theories are:
</p>
<p>
Oswald is innocent: Adherents of this contention maintain
that law enforcement officials--cynically or through honest
error--settled on Oswald as the assassin even though there was no
reliable evidence against him. They say Oswald could have
exonerated himself at a trial had he not been killed by <ent type='GPE'>Dallas</ent>
nightclub owner Jack Ruby.
</p>
<p>
Challenging this theory is an abundance of evidence.
Scientific testing and physical evidence found at the scene show
that shots were fired at Kennedy's limousine from a sixth-floor
window of the <ent type='GPE'>Texas</ent> School Book Depository building.
</p>
<p>
Oswald worked in the building at Elm and <ent type='GPE'>Houston</ent>. He was
seen leaving it shortly after the shooting. Crates were found
stacked by the sixth-floor window as an apparent gun brace.
Oswald's fingerprints were on the crates. The morning of the
assassination, Oswald was seen carrying a long, paper-wrapped
object into the building. Wrapping paper found near the window
bore Oswald's fingerprints.
</p>
<p>
A rifle was found hidden between boxes in the building. A
bullet and the bullet fragments removed from Kennedy, Connally
and the limousine ballistically matched the rifle. Oswald's palm
print was found on the rifle. The rifle, purchased from a <ent type='GPE'>Chicago</ent>
mail order house, had been shipped to a <ent type='GPE'>Dallas</ent> post office box
rented by Oswald. A photograph showed Oswald holding a rifle
identical to the one found.
</p>
<p>
Proponents of this theory retort that all of the evidence
was fabricated and put credence in Oswald's post-arrest
declaration that he hadn't killed anyone.
</p>
<p>
But claims that the incriminating rifle photo was doctored--
with Oswald's head superimposed over another man's body--were
dispelled by Marina Oswald's confirmation that she took the
picture. And claims that Oswald's rifle was planted in the room
after the assassination were refuted by ballistic tests that
showed it fired the deadly shots.
</p>
<p>
Given the problems with claims of planted evidence, some
theorists have argued that there must have been a "planted
Oswald," or Oswald impersonator on the scene. This contention,
however, has been difficult to reconcile with the Oswald
fingerprints and palmprints found on the evidence.
</p>
<p>
Two years ago, conspiracy theorists, successfully pressed
for the opening of Oswald's grave to show it contained an
imposter--probably a <ent type='NORP'>Soviet</ent> agent. Subsequent examination,
however, determined the body was the "real" Lee Harvey Oswald.
</p>
<p>
Oswald had accomplices: Faced with the weight of evidence
indicating Oswald's guilt, quite a few conspiracy theories have
contended he was only one of those involved.
</p>
<p>
Some theories assert that a person or persons helped put
Oswald in position to shoot the President. They leave unexplained
why Oswald would need such help. As an employee of the book
depository, he had easy access to the building. After the
shooting, according to witnesses' testimony, he sought no help in
fleeing and left downtown <ent type='GPE'>Dallas</ent> by city bus and then a taxi.
</p>
<p>
Moreover, it would seem unlikely that accomplices could have
helped get Oswald a job that put him on the motorcycle route.
Oswald got his job at the depository on Oct. 15. <ent type='ORG'>White House</ent>
planning for the President's motorcade route did not begin until
Nov. 4, and the map of the route was not published until Nov. 19.
Somewhat more credible is the contention others provided
secret financing, planning, direction or encouragement for the
murder that Oswald carried out.
</p>
<p>
In this scenario, the chief suspect over the years has been
the <ent type='NORP'>Soviet</ent> Union. After all, Oswald defected to <ent type='GPE'>Russia</ent> in 1959.
He married a <ent type='GPE'>Russia</ent>n woman, <ent type='ORG'>Marina Prusakova</ent>, in 1961. He was a
vociferous <ent type='NORP'>Marxist</ent>. Even after he returned to <ent type='GPE'>the United States</ent>
in June 1962, Oswald had several fleeting contacts with <ent type='NORP'>Soviet</ent>
diplomats.
</p>
<p>
However, no evidence of <ent type='NORP'>Soviet</ent> complicity has been found.
Investigators who combed Oswald's effects discovered no
unexplained funds, no code books, no messages--nothing to suggest
a <ent type='NORP'>Soviet</ent> hand in Oswald's actions. Also, had Oswald been
recruited as a <ent type='NORP'>Soviet</ent> agent, the <ent type='GPE'>Russia</ent>ns would not have been
likely to allow him to defect, as he did--thereby exposing his
relationship with them.
</p>
<p>
The other top suspect has been <ent type='GPE'>Cuba</ent>. Oswald admired Fidel
Castro; he was a member of the Fair Play for <ent type='GPE'>Cuba</ent> Committee in
<ent type='GPE'>the United States</ent>; he visited the <ent type='GPE'>Cuba</ent>n embassy in <ent type='GPE'>Mexico City</ent> a
few weeks before the assassination, seeking a travel visa to that
country. Because the <ent type='ORG'>CIA</ent> was backing assassination plots against
Castro at the time, some speculate that Castro may have
retaliated through Oswald.
</p>
<p>
But, as with the theory of <ent type='NORP'>Soviet</ent> involvement, there is no
evidence. At one point, there did appear to be some. A young
<ent type='NORP'>Central American</ent> informant told U.S. authorities he saw Oswald in
the <ent type='GPE'>Cuba</ent>n embassy, talking to two other men, one of whom was
conversing in Spanish. Later, he said, Oswald supposedly received
$6500 to kill an important person. Under questioning, however,
the informant admitted he had never seen Oswald and had
fabricated the transaction, wishing to stir up <ent type='NORP'>American</ent> hatred
for Castro's <ent type='GPE'>Cuba</ent>. Subsequently, he retracted his retraction.
Finally, he failed a lie-detector test. Anyway, Oswald did not
speak Spanish.
</p>
<p>
Another account suggesting possible <ent type='GPE'>Cuba</ent>n involvement was
provided by a <ent type='GPE'>Cuba</ent>n exile who testified before the Warren
commission. She said two <ent type='NORP'>Hispanic</ent> men and an <ent type='NORP'>Anglo</ent> man they
identified as "Leon Oswald" came to her <ent type='GPE'>Dallas</ent> apartment 28 days
before the assassination. She said they spoke vaguely of <ent type='GPE'>Cuba</ent>n
revolutionary plans before she turned them away. She identified
Oswald in television film as the man she had seen, but federal
investigators said they do not believe it was him. They said they
believe that at that time, Oswald was traveling from his New
Orleans home to <ent type='GPE'>Mexico</ent> in his quest for a <ent type='GPE'>Cuba</ent>n entry visa.
</p>
<p>
The most publicized theories involving Oswald accomplices
are those that have featured other gunmen.
</p>
<p>
These various versions have assassins firing from other
windows in the depository building; from the Dal-Tex building;
from sewer drains, a grassy knoll near Dealey Plaza, the railroad
bridge over Elm, Main and Commerce streets and the <ent type='GPE'>Dallas</ent> County
Courthouse roof; and firing with silencers or automatic weapons.
</p>
<p>
The arguments surrounding these claims:
</p>
<p>
- One-man, one-bullet: The first shot that wounded Kennedy
in the neck did not also hit John Connally, as the Warren
Commission concluded. Rather they were struck by individual
bullets simultaneously, requiring that there be two shooters. A
team of experts, including a National Aeronautics and Space
Administration engineer, conducted an exhaustive study of this
question in 1978. The panel's conclusion: It is not only
possible, but almost certain that Kennedy and Connally were hit
by the same bullet.
</p>
<p>
- Filmed accomplices: Photographs of Dealey Plaza taken at
the time of the assassination show a dim form behind a wall on a
grassy knoll to the right and in front of the presidential
limousine. However, investigators found no spent cartridges,
weapons or footprints in this area. A panel of photography
experts concluded in 1978 that the images on the film were
shadows.
</p>
<p>
Films and photos also show a man in Dealey Plaza opening and
closing a black umbrella. Conspiracy theories suggest he was
signaling gunmen or that some weapon was hidden in the umbrella.
But at a hearing of <ent type='ORG'>the House Assassinations Committee</ent> in 1978, a
mild-mannered <ent type='GPE'>Dallas</ent> insurance worker identified himself as the
mysterious "umbrella man" and said he was only trying to harass
Kennedy.
</p>
<p>
- Head movement: The famous Zapruder film of the
assassination clearly shows President Kennedy's head lurching
backward when it was struck by the fatal gunshot. If the shot had
come from behind, conspiracy theorists reason, the impact would
have driven the President's head forward. Nonetheless, a panel of
medical experts concluded in 1978 that Kennedy's head wounds were
caused by a shot from the rear. Moreover, a panel of
wound-ballistics scientists concluded that the backward motion
was caused by the sudden tightening of the President's neck
muscles.
</p>
<p>
- Tape-recorded sounds: Sound transmitted through the
microphone of a motorcycle patrolman in the motorcade, and
recorded at <ent type='GPE'>Dallas</ent> police headquarters, shows four noise
"spikes." At the behest of <ent type='ORG'>the House Assassinations Committee</ent> in
1978, three acoustical experts conducted three test gunshot
firings in Dealey Plaza, compared the sounds and concluded it was
95 percent certain that four shots had been fired. The Warren
Commission had concluded that no more than three shots had been
fired from the window. The source of the previously unknown one,
the acoustical experts said, was the grassy knoll area.
</p>
<p>
The finding was the first scientific evidence supporting a
conspiracy theory and stirred an uproar. But it, too, was later
discounted. Twelve experts assembled by the National Research
Council reviewed the tapes and concluded the "spikes" were
actually recorded about a minute after the assassination.
</p>
<p>
<ent type='ORG'>The Assassinations Committee</ent> also grappled futily with the
prospect of a likely colleague for Oswald. "The question is with
who," said one member of the now-defunct committee. "If there's a
conspirator, then who could it have been? We asked ourselves over
and over: What associates did Oswald have, where was there
evidence of conspiracy? We found none."
</p>
<p>
Oswald was manipulated: These theories suggest that Oswald,
and perhaps other operatives, were unknowingly influenced in
their actions.
</p>
<p>
There can be only one reasonable candidate to mastermind
such a project--the <ent type='ORG'>KGB</ent>. It would have been the only organization
with the scientific means and the extended access to Oswald. Even
some <ent type='ORG'>Warren Commission</ent> lawyers and <ent type='ORG'>CIA</ent> members briefly toyed with
the possibility. Because Oswald spent some time in a <ent type='NORP'>Soviet</ent>
hospital while residing in <ent type='GPE'>Russia</ent>, there was the suspicion he
might have been brainwashed.
</p>
<p>
Once again, the problem is that there is no evidence to
suggest Oswald was brainwashed. Moreover, the <ent type='ORG'>CIA</ent> believes <ent type='ORG'>KGB</ent>
"mind conditioning" techniques at the time were primitive.
</p>
<p>
Surely, it is impossible to rule out the prospect of a
conspiracy in the assassination. <ent type='ORG'>The Warren Commission</ent> itself did
not do so. "Because of the difficulty of providing negatives to a
certainty," the panel said, proving there was no conspiracy
"cannot be established categorically." However, the panel said,
"if there is any such evidence it has been beyond the reach of
all the investigative agencies and resources of the United
States."
</p>
<p>
Twenty years later, that is still the case.
</p>
<div>
</div></xml>

View File

@ -0,0 +1,482 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : The Day John Kennedy Died
Author : Bryan Woolley
Source : <ent type='ORG'>Dallas Times Herald</ent> (<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Publication Date : Nov. 20, 1983
Page Number(s) : Sec. Sec. 2-3
<ent type='GPE'>DALLAS</ent> <ent type='ORG'>TIMES HERALD</ent>
(<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Nov. 20, 1983, Special Section, pp. 2-3
Reprinted with permission from the author.
THE DAY JOHN KENNEDY DIED
Sun cleared dawn's drizzle, but gloom clouded <ent type='GPE'>Dallas</ent>
by Bryan Woolley
Staff Writer
</p>
<p>
The valet walked past the <ent type='ORG'>Secret Service</ent> guard and entered
Suite 850 of <ent type='GPE'>Fort Worth</ent>'s <ent type='GPE'>Texas</ent> Hotel. He knocked on the door of
the master bedroom. It was 7:30 a.m. "Mr. President," he said,
"it's raining out."
</p>
<p>
President John F. Kennedy, coming out of sleep, replied,
"That's too bad."
</p>
<p>
While he was dressing, he heard the murmur of the crowd
outside and went to the window. Below him, 5000 people were
standing patiently in the soft drizzle, some wearing raincoats,
some holding umbrellas, most simply ignoring the weather. They
were office and factory workers. They had begun gathering before
dawn to hear the speech the President would make in the parking
lot where they stood. Mounted police officers wearing yellow
slickers moved among them. "Gosh, look at the crowd!" the
President said to his wife. "Just look! Isn't that terrific."
</p>
<p>
In the lobby, he was joined by Vice President Lyndon
Johnson, Gov. John Connally, Sen. Ralph Yarborough, several
members of <ent type='ORG'>Congress</ent> and the president of the <ent type='GPE'>Fort Worth</ent> Chamber
of Commerce. They crossed Eighth Street and plunged into the
crowd, shaking hands, smiling. They mounted the truck that was to
serve as the speaker's platform. Kennedy grabbed the microphone
and shouted: "There are no faint hearts in <ent type='GPE'>Fort Worth</ent>!"
</p>
<p>
The crowd cheered. Somebody yelled, "Where's Jackie?"
</p>
<p>
Kennedy pointed toward his eighth-floor window. "Mrs.
Kennedy is organizing herself," he replied. "It takes her a
little longer, but, of course, she looks better than we do when
she does it."
</p>
<p>
<ent type='GPE'>Fort Worth</ent> was the third stop on the President's five-city
<ent type='GPE'>Texas</ent> tour. He had ridden through <ent type='GPE'>Houston</ent> and <ent type='GPE'>San Antonio</ent> like a
triumphant emperor, and <ent type='GPE'>Fort Worth</ent> had stayed up past midnight to
welcome the handsome 46-year-old President and his beautiful
34-year-old wife, lining their route from <ent type='ORG'>Carswell Air Force</ent> base
to the hotel.
</p>
<p>
After an informal speech in the parking lot, he would go to
the hotel, deliver a breakfast speech, fly from <ent type='ORG'>Carswell</ent> to Love
Field, ride in a motorcade through <ent type='GPE'>Dallas</ent>, deliver a speech at a
$100-a-plate luncheon at the <ent type='GPE'>Dallas</ent> <ent type='ORG'>Trade Mart</ent>, fly to <ent type='GPE'>Austin</ent> for
a banquet and a reception at the Governor's Mansion, and then go
to the <ent type='ORG'>LBJ</ent> ranch for a weekend of rest.
</p>
<p>
Back inside the <ent type='GPE'>Texas</ent> Hotel, Kennedy accepted the ceremonial
cowboy hat from his hosts, but refused to wear it for
photographers and TV cameramen. He would model it later, he said,
at the <ent type='ORG'>White House</ent>. His breakfast speech was the standard
fence-mending one-- about the greatness of <ent type='GPE'>Texas</ent> and <ent type='GPE'>Fort Worth</ent>
and <ent type='ORG'>the Democratic Party</ent>--and it drew a thunderous ovation.
</p>
<p>
The President and the first lady retired to Suite 850 to
prepare for the flight to <ent type='GPE'>Dallas</ent>. Kennedy placed a call to former
Vice President John Nance "<ent type='ORG'>Cactus Jack</ent>" Garner in <ent type='GPE'>Uvalde</ent>, <ent type='GPE'>Texas</ent>,
to wish him a happy 95th birthday, and an aide showed him a
black-bordered full-page ad with a sardonic headline in The
<ent type='GPE'>Dallas</ent> Morning News. "Welcome Mr. Kennedy to <ent type='GPE'>Dallas</ent>," it read. In
13 rhetorical questions, something called the "American
Fact-Finding Committee" accused the administration of selling out
the world to communism.
</p>
<p>
"Oh, you know, we're heading into nut country today," the
President said. Mrs. Kennedy later told author William Manchester
that he paced the floor and then stopped in front of her. "You
know, last night would have been a hell of a night to assassinate
a president," he said. "There was the rain and the night, and we
were all getting jostled. Suppose a man had a pistol in a
briefcase." He pointed a finger at the wall and pretended to fire
two shots.
</p>
<p>
Not many in the presidential party were looking forward to
<ent type='GPE'>Dallas</ent>. Several <ent type='NORP'>Texans</ent>--some from <ent type='GPE'>Dallas</ent>--had warned the
President not to include <ent type='GPE'>Dallas</ent> on his <ent type='GPE'>Texas</ent> tour, that an ugly
incident was likely to occur there. But Kennedy insisted that the
state's second-largest city be placed on the itinerary.
</p>
<p>
So the preparations had been made. <ent type='GPE'>Dallas</ent> civic leaders had
launched a public relations campaign to try to ensure a friendly
turnout for the President.
</p>
<p>
Seven hundred law officers--city police officers and
firefighters, sheriff's deputies, <ent type='GPE'>Texas</ent> Rangers and state highway
patrol officers--had been assembled to keep order. About the time
that John Kennedy was waking up, <ent type='GPE'>Dallas</ent> Police Chief Jesse Curry
had gone on TV to warn that his officers would take "immediate
action to block any improper conduct." If the police were
inadequate, he said, even citizen's arrests were authorized.
</p>
<p>
Others were preparing, too, in the early morning. Waiters
were setting the places for the <ent type='ORG'>Trade Mart</ent> luncheon. A warehouse
worker named Lee Harvey Oswald sneaked a rifle and a telescopic
sight into the <ent type='GPE'>Texas</ent> School Book Depository. Because of forecasts
showing that the rain probably would be past <ent type='GPE'>Dallas</ent> by the time
the presidential party arrived, a Kennedy aide told the Secret
Service not to put the bubble-top on the big blue limousine in
which the President and Mrs. Kennedy would ride.
</p>
<p>
Air Force One had barely left the runway at <ent type='ORG'>Carswell</ent> before
it began its descent toward Love Field. The flight took only 13
minutes. The big plane touched down at 11:38 a.m. Police armed
with rifles stood along the roof of the terminal building. A
large crowd waited beyond a chain-link fence. Many in the crowd
were jumping, screaming, waving placards: "We Love Jack," "Hooray
for JFK." Others were less friendly. They held placards, too:
"<ent type='ORG'>Help Kennedy Stamp Out Democracy</ent>," "In 1964 Goldwater and
Freedom," "Yankees Go Home And Take Your Equals With You." They
booed and hissed when the President and first lady emerged from
the plane, smiled, waved and descended the stairs of Air Force
One.
</p>
<p>
For the fourth time in 24 hours, Lyndon and Lady Bird
Johnson were waiting to welcome the Kennedys to a <ent type='GPE'>Texas</ent> city. The
presidential couple was introduced to the 12-man official
welcoming committee. Mrs. Earle Cabell, wife of the <ent type='GPE'>Dallas</ent> mayor,
presented Mrs. Kennedy with a bouquet of red roses. Then Kennedy
broke from the official cluster and moved along the chain-link
fence, smiling, shaking hands; letting people touch him.
</p>
<p>
At 11:55, two motorcycle police officers led the motorcade
out of Love Field and turned left on Mockingbird Lane. Police
Chief Curry drove the lead car. With him rode <ent type='GPE'>Dallas</ent> County
Sheriff Bill Decker and two <ent type='ORG'>Secret Service</ent> agents. Then came
three more motorcycles. Then the blue limousine with two Secret
Service agents in the front, John and Nellie Connally in the jump
seats and the Kennedys in the back seat. Two motorcycles flanked
the car on each side. <ent type='ORG'>Next</ent> was another convertible, full of
Kennedy aides and <ent type='ORG'>Secret Service</ent> agents, and four more agents
standing on its running boards.
</p>
<p>
Then came the vice presidential convertible, carrying two
<ent type='ORG'>Secret Service</ent> agents, the Johnsons and Yarborough. A <ent type='GPE'>Texas</ent>
highway patrol officer and four <ent type='ORG'>Secret Service</ent> agents rode in the
next car. A press pool car, a press bus, convertibles bearing
photographers, and cars carrying lesser dignitaries completed the
procession.
</p>
<p>
The motorcade would move through a sizable portion of
<ent type='GPE'>Dallas</ent>--along Mockingbird to Lemmon Avenue, right on Lemmon to
<ent type='LOC'>Turtle Creek</ent> Boulevard, along <ent type='LOC'>Turtle Creek</ent> and Cedar Springs Road
to Harwood Street, down Harwood to Main Street, where, at City
Hall, it would turn right and move westward along Main through
the downtown business district.
</p>
<p>
At the west end of downtown, it would turn right onto
<ent type='GPE'>Houston</ent> Street and then immediately left onto Elm Street and move
through the Triple Underpass. A few yards beyond the underpass,
it would turn right again onto Stemmons Expressway and move to
the <ent type='ORG'>Trade Mart</ent> at the intersection of Stemmons and Harry Hines
Boulevard. After the President's speech, it would proceed out
Harry Hines to Mockingbird, turn right, and return to Love Field.
The sidewalk crowds were sparse at first. A few people in
the factories and offices along Mockingbird came out to have a
look. The sun was bright now, and Mrs. Kennedy was regretting
that she was wearing the pink wool suit. She had expected woolen
weather. It was, after all, late November. She put on sunglasses,
but her husband told her to take them off. The people wanted to
see her, he said.
</p>
<p>
At the corner of Lemmon and <ent type='GPE'>Lomo Alto</ent>, a group of children
held a long banner reading, "Please Stop and Shake Our Hands."
Kennedy ordered his driver to stop. He got out and shook their
hands. Farther along, he ordered another stop and got out to
greet a group of nuns. At Lee Park on <ent type='LOC'>Turtle Creek</ent>, the crowd
began to thicken. And at Harwood and Live Oak, still two blocks
from the turn onto Main, the people in the motorcade heard the
downtown crowd murmuring like a distant tide.
</p>
<p>
When the caravan made the turn, it faced pandemonium. People
were standing 10 and 12 deep on the sidewalks. Red, white and
blue bunting fluttered from the buildings. People leaned out
windows, waving and screaming. There were no picket signs, no
sour faces. The feared <ent type='GPE'>Dallas</ent> crowd was friendly--even adoring.
The nuts had stayed home. It was 12:21 p.m.
</p>
<p>
At the <ent type='ORG'>Trade Mart</ent>, the luncheon guests were showing their
tickets to the door guards and filing to their seats. The huge
building was surrounded by <ent type='GPE'>Dallas</ent> and <ent type='GPE'>Texas</ent> police, standing at
parade rest, holding riot sticks, glaring at a handful of
protesters. Inside the atrium hall, parakeets flew freely from
tree to tree. A fountain splashed. An organist was practicing
"Hail to the Chief." Dozens of yellow roses adorned the head
table. The presidential seal had been mounted on the rostrum.
</p>
<p>
As the motorcade neared <ent type='GPE'>Houston</ent> Street, the size of the
crowd diminished, but the cheers and applause were still hearty.
Nellie Connally turned in her seat and said, "You can't say
<ent type='GPE'>Dallas</ent> doesn't love you, Mr. President."
</p>
<p>
Kennedy replied, "No, you can't."
</p>
<p>
Workers from the <ent type='GPE'>Texas</ent> School Book Depository, the Dal-Tex
Building and the <ent type='GPE'>Dallas</ent> County buildings lined the sidewalks at
<ent type='GPE'>Houston</ent> and Elm as the head of the motorcade turned toward the
Triple Underpass. Others stood on the grass of Dealey Plaza. Many
had brought their children to see the President. Several
spectators noticed a man standing very still in a sixth-floor
corner window of the depository. One man saw the rifle he was
holding and assumed he was a <ent type='ORG'>Secret Service</ent> agent.
</p>
<p>
As the blue limousine made the sharp left turn from <ent type='GPE'>Houston</ent>
onto Elm, the <ent type='ORG'>Hertz</ent> rental car time-and-temperature sign on the
roof of the depository red 12:30. A <ent type='ORG'>Secret Service</ent> man in the
motorcade radioed the <ent type='ORG'>Trade Mart</ent>: "Halfback to Base. Five minutes
to destination." He wrote in his shift log: "12:35 p.m. President
Kennedy arrived at <ent type='ORG'>Trade Mart</ent>."
</p>
<p>
Some thought the noises were firecrackers. Others thought a
motorcycle was backfiring. Some recognized them as rifle shots.
<ent type='ORG'>Pigeons</ent> flew from the roof of the depository. Kennedy lurched
forward and grabbed his neck.
</p>
<p>
Sen. Yarborough, in the vice president's car, cried, "My
God! They've shot the President!" <ent type='ORG'>Secret Service</ent> agent Rufus
Youngblood climbed from the front seat to the back, threw Johnson
to the floorboard and covered him with his own body.
</p>
<p>
In the blue limousine, Gov. Connally had been hit, too. He
pitched forward and fell toward his wife. "No, no, no, no, no!"
he screamed.
</p>
<p>
Then another shot. The President's head exploded. Blood
spattered the occupants of the blue car. The first lady, in
shock, tried to climb out over the trunk. A <ent type='ORG'>Secret Service</ent> agent
pushed her back. The car slowed and then lurched out of the
motorcade line and sped past the Triple Underpass, with Chief
Curry's car and the <ent type='ORG'>Secret Service</ent> car in pursuit.
</p>
<p>
UPI <ent type='ORG'>White House</ent> correspondent Merriman Smith was sitting in
the middle of the front seat of the press pool car. He grabbed
the mobile phone. He called the wire service's <ent type='GPE'>Dallas</ent> bureau and
dictated the first bulletin: "Three shots were fired at President
Kennedy's motorcade in downtown <ent type='GPE'>Dallas</ent>."
</p>
<p>
The cheers of greeting in Dealey Plaza rose to screams of
horror and fear. "They killed him! They killed him! They killed
him!" Parents grabbed children and ran. Men and women lay
prostrate on the grass and sidewalks, as if dead. The motorcade
was disintegrating, the cars veering hither and yon, trying to
get through the crowd and follow the limousine. Helmeted police
officers leaped from motorcycles, pulled guns, looked wildly
about. The <ent type='ORG'>Hertz</ent> clock still read 12:30.
</p>
<p>
The staff at <ent type='ORG'>Parkland Memorial Hospital</ent> had only five
minutes notice of the massive emergency rushing upon them, and
many thought the message was a joke. When the blue car arrived,
they weren't ready. No one was waiting at the emergency entrance.
A <ent type='ORG'>Secret Service</ent> agent dashed inside to order stretchers.
</p>
<p>
Connally--whose wounds were serious but not fatal--was
wheeled to Trauma Room No. 2, Kennedy to Trauma Room No. 1. Teams
of surgeons and nurses went to work. The <ent type='ORG'>Secret Service</ent> regrouped
around the Johnsons and hustled them to seclusion in another part
of the hospital. Reporters dashed around the halls and offices,
searching for phones. <ent type='ORG'>Parkland</ent> patients heard the news and rushed
to have a look.
</p>
<p>
"Gentlemen," a weeping Yarborough told reporters, "this has
been a deed of horror. <ent type='ORG'>Excalibur</ent> has sunk beneath the waves."
Mrs. Kennedy insisted on being in the trauma room with her
husband. A nurse protested, but she was admitted.
</p>
<p>
Outside, more of the motorcade vehicles were arriving. Their
passengers tumbled out and stared in horror at the blood-soaked
convertible.
</p>
<p>
At 1 p.m., Dr. Kemp Clark, the senior physician working on
the President, pronounced him dead. A priest administered last
rites. At 1:13, the news was carried to the vice president. At
1:26, the <ent type='ORG'>Secret Service</ent>, fearing the assassination was part of a
massive plot against the government, spirited the Johnsons away
to unmarked cars and sped to Love Field. They boarded Air Force
One at 1:33, while Kennedy press aide Malcolm Kilduff was
announcing the President's death to the press.
</p>
<p>
Police were still combing the Dealey Plaza area for
Kennedy's murderer. Indeed, only a minute after the fatal shot
was fired, Marrion Baker, a <ent type='GPE'>Dallas</ent> motorcycle officer, had
pointed his pistol at Lee Harvey Oswald. Baker had been riding by
the <ent type='GPE'>Texas</ent> School Book Depository when the killing occurred, and
he jumped off his motorcycle and dashed inside with Roy Truly,
the building's superintendent. They encountered Oswald in the
second-floor lunchroom. Baker drew his gun. "Do you know this
man?" he asked Truly. "Does he work here?" Truly said he did, and
Baker let him go. A minute later, Oswald walked out the front
door of the depository, where he encountered <ent type='ORG'>NBC</ent> reporter Robert
MacNeil, who was looking for a phone. Oswald told him he could
find one inside. Five minutes later, police sealed off the door.
</p>
<p>
At 12:44, Oswald boarded a bus at Elm and Murphy streets,
seven blocks from the depository, but got off a few minutes later
when the bus was caught in a traffic snarl. By 12:45, <ent type='GPE'>Dallas</ent>
police had questioned the witness who had seen the man standing
in the depository window with the rifle and had broadcast his
description from a radio car in front of the depository. Two
minutes later, Oswald caught a taxicab at the Greyhound bus
station and rode to Beckley and Neely, a corner near his Oak
Cliff rooming house. He went to his room, got a pistol and left
again.
</p>
<p>
Meanwhile, Roy Truly had drawn up a list of depository
employees and told police that Oswald was missing. At 1:12,
sheriff's deputies found three empty cartridge cases near the
sixth floor corner window. Ten minutes later, they would find the
rifle, hidden between boxes of textbooks in the room.
</p>
<p>
At 1:15, <ent type='GPE'>Dallas</ent> officer J.D. Tippett was cruising by a drug
store at 10th and Patton, less than a mile from the <ent type='GPE'>Oak Cliff</ent>
rooming house, and spotted Oswald walking along the sidewalk.
Tippett, for reasons never determined, pulled over and stopped
him. Oswald jerked his pistol from under his jacket, shot four
times and ran away. Nine people saw the shooting. A pickup truck
driver took the dead officer's radio mike and said, "Hello,
police operator. We've had a shooting out here."
</p>
<p>
On Air Force One, stewards were removing some of the seats
in the tail compartment to make room for President Kennedy's
coffin. In the plane's stateroom, Lyndon Johnson was watching
Walter Cronkite on television and was asking aides and
congressmen whether he should be sworn in immediately or wait
until they had returned to <ent type='GPE'>Washington</ent>. Some thought he should
wait. Others thought it might be dangerous for the country to be
without a President while he was en route. Johnson decided he
would assume the office in <ent type='GPE'>Dallas</ent>. "Now," he said, "What about
the oath?"
</p>
<p>
The aides and congressmen were embarrassed. They could
remember neither the words nor where to find them. They couldn't
remember who, besides <ent type='ORG'>Supreme Court</ent> justices, was authorized to
administer the oath. Everyone was in such shock and confusion
that phone calls were made to several <ent type='ORG'>Justice Department</ent>
officials in <ent type='GPE'>Washington</ent> and <ent type='GPE'>Dallas</ent> before someone remembered that
a President may be sworn in by any judge and that the oath is in
the Constitution. Deputy Attorney General Nicholas Katzenbach
dictated it by phone from <ent type='GPE'>Washington</ent>, and U.S. District Judge
Sarah Hughes, an old friend of Johnson who had been appointed to
the North <ent type='GPE'>Texas</ent> federal bench by Kennedy, was dispatched to Love
Field.
</p>
<p>
At 1:40, Lee Oswald ran into the <ent type='GPE'>Texas</ent> Theater on West
Jefferson--eight blocks from officer Tippit's body--without
buying a ticket. The box office attendant called the police.
<ent type='ORG'>Cruisers</ent> began converging on the theater. At 1:50, the house
lights went up, and officers moved up and down the aisles, looked
into the faces of the few patrons. Officer M.N. McDonald stopped
at the 10th row and said to a man sitting alone: "Get up."
</p>
<p>
"Well, it's all over now," Oswald said, according to
witnesses and he stood up. But when McDonald moved closer, Oswald
struck him in the face and went for his pistol. McDonald struck
back and grabbed for the gun. Oswald pulled the trigger, but the
web of skin between McDonald's thumb and forefinger was caught
under the hammer. The gun didn't fire. Other officers joined the
fight. They subdued Oswald and hustled him out of the theater. "I
protest this police brutality!" Oswald shouted.
</p>
<p>
Twenty-five minutes later, Capt. Will Fritz, chief of
homicide, returned to <ent type='ORG'>the Police Department</ent> and ordered that the
missing <ent type='GPE'>Texas</ent> School Book Depository worker named Lee Harvey
Oswald be arrested as a suspect in the presidential killing. An
officer pointed to a small young man with a bruised eye who was
sitting in a chair. "There he sits," he said.
</p>
<p>
At <ent type='ORG'>Parkland</ent>, a <ent type='ORG'>Secret Service</ent> agent called Oneal's Funeral
Home in <ent type='GPE'>Oak Lawn</ent> to order a casket. The funeral director, Vernon
Oneal, arrived with it at 1:30. After the President's body had
been placed in the casket, Mrs. Kennedy entered Trauma Room No.
1, took off her wedding ring and placed it on her husband's
finger. The casket was closed and placed on a funeral home cart
to be moved to the hearse.
</p>
<p>
Dr. Earl Rose, the <ent type='GPE'>Dallas</ent> County medical <ent type='ORG'>examiner</ent>,
protested. Kennedy was a homicide victim, he said, and the body
couldn't be released legally until after an autopsy had been
performed. A quarrel developed between him and the Secret
Service. Kennedy aides and the <ent type='ORG'>Secret Service</ent> agents forced the
casket through the crowd that had gathered at the hospital door
and loaded it into the hearse. Mrs. Kennedy rode in the back with
it. At 2:20, the dead President was carried up the stairs into
Air Force One. Mrs. Kennedy retired to the bedroom.
</p>
<p>
Judge Hughes boarded the plane at 2:35 and was handed a
small white card with the oath scrawled on it. Capt. Cecil
Stoughton, an <ent type='ORG'>Army Signal Corps</ent> photographer, tried to arrange
the crowd in the cramped stateroom so that he could take a
picture of the ceremony. "We'll wait for Mrs. Kennedy," Johnson
said. "I want her here."
</p>
<p>
Mrs. Kennedy came out of the bedroom still wearing the
blood-soaked pink suit. Johnson pressed her hand and said, "This
is the saddest moment of my life." The photographer placed her on
Johnson's left, Lady Bird on his right. Judge Hughes, the first
woman to administer the presidential oath, was shaking.
</p>
<p>
"What about a Bible?" asked one of the witnesses. Someone
remembered that President Kennedy had kept a Bible in the bedroom
and went to get it.
</p>
<p>
"I do solemnly swear..."
</p>
<p>
The oath lasted 28 seconds. At 2:38 p.m., Lyndon B. Johnson
became the 36th President of <ent type='GPE'>the United States</ent>. The big jet's
engines already were screaming. "Now, let's get airborne," he
said.
</p>
<div>
</div></xml>

View File

@ -0,0 +1,178 @@
<xml><p>Volume : SIRS 1991 History, Article 02
Subject: Keyword(s) : KENNEDY and ASSASSINATION
Title : A Remembrance of Kennedy
Author : Jim Henderson
Source : <ent type='ORG'>Dallas Times Herald</ent> (<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Publication Date : Nov. 20, 1983
Page Number(s) : Special Sec. 1+
. . . Reprinted with permission from
<ent type='ORG'>DALLAS TIMES HERALD</ent>
(<ent type='GPE'>Dallas</ent>, <ent type='GPE'>Texas</ent>)
Nov. 20, 1983, Special Section, pp. 1+
A REMEMBRANCE OF KENNEDY
by Jim Henderson
Staff Writer
</p>
<p>
`Let the word go forth from this time and place...that the torch
has been passed to a new generation of <ent type='NORP'>Americans</ent>--born in this
century, tempered by war, disciplined by a hard and bitter peace,
proud of our ancient heritage.'
</p>
<p>
After 20 years, the events seem as compressed as a leanly
edited videotape.
</p>
<p>
A sunny day, a dark convertible, a steady din rebounding
from the canyon walls above a crowded street, three cracks from a
rifle in a sniper's nest, a scramble below, engines racing, a
sobbing black woman outside Parkland Memorial Hospital, a
policeman shot across town, a pronouncement of death, a scrawny,
handcuffed suspect in a corridor with Jack Ruby's .38 exploding
in his belly.
</p>
<p>
The nation was stunned by the images that were transmitted
from <ent type='GPE'>Dallas</ent>--hard images formed in terse, teletype prose and more
vivid ones fashioned from bits and pieces of celluloid.
</p>
<p>
<ent type='GPE'>America</ent> paused to watch the newsreel.
</p>
<p>
A new President quickly sworn in and airlifted into command,
a bloodstained widow never far from the coffin, a change to
black, a bewildered daughter kneeling before a flag-draped box in
the Capitol rotunda, the <ent type='GPE'>wintry</ent> streets of the capital, a dark
riderless horse with empty boots facing backward in the stirrups,
a slow-moving caisson, a young boy saluting the honor guard
carrying his father to <ent type='ORG'>Arlington National Cemetery</ent>, the lighting
of the eternal flame.
</p>
<p>
On the day John F. Kennedy was buried, Alistair Cooke wrote:
"He was snuffed out. In that moment, all the decent grief of a
nation was taunted and outraged. So along with the sorrow, there
is a desperate and howling note from over the land. We may pray
on our knees, but when we get up from them, we cry with the poet:
Do not go gentle into that good night. Rage, rage against the
dying of the light."
</p>
<p>
It is only in memory that the howling note from those four
days flits past. Behind the newsreel, the hours were agonizing
and interminable. For many, particularly in <ent type='GPE'>Dallas</ent>, time moved as
slowly as a motorcade or a horse-drawn caisson.
</p>
<p>
Erik Jonsson, then-president of the <ent type='GPE'>Dallas</ent> Citizens Council,
would recall the anxiety he felt when the President did not show
up on schedule for a luncheon at the <ent type='ORG'>Trade Mart</ent>. What's going on?
he asked himself over and over as the wait, only a few moments in
duration, seemed endless.
</p>
<p>
After 12:33 p.m. Nov. 22, 1963, the time the first news
bulletin notified the republic that its President had been shot
in <ent type='GPE'>Dallas</ent>, the city stood motionless and helpless, waiting for
the firestorm of scorn. It came in searing, overlapping bursts.
"Are these human beings or are these animals?" Adlai Stevenson
had asked moments after he escaped from a violent crowd in <ent type='GPE'>Dallas</ent>
a month earlier.
</p>
<p>
The world looked again at <ent type='GPE'>Dallas</ent> with the same question. It
would seem, in the slow-motion drift of events, that the answer
would never come. <ent type='GPE'>Dallas</ent> mourned the assassination as the rest of
the nation mourned it, as a deeply personal tragedy.
Schoolteachers wept as they broke the news to their classes. Men
cried in public. Rage and shame and guilt and dread melted into
one great immobilizing glob of emotional turmoil.
</p>
<p>
An eternity, two hours and 20 minutes, passed before the
truth would be known. Kennedy's assassin was not of <ent type='GPE'>Dallas</ent>, was
far removed from the nation's perception of the city and the
city's own worst fears of itself.
</p>
<p>
In time, the world, as well as <ent type='GPE'>Dallas</ent>, would believe the
city was merely caught in one of history's inscrutable warps,
that it was only by chance that the light passing through the
long prism of that era intersected in Dealey Plaza.
</p>
<p>
The howl that was heard through the dark night of those
times had the tone of a primal scream, a victim raging against a
felon. In truth, it was a cry of national doubt, of the sense
that <ent type='GPE'>America</ent> would not be the same. More than mere innocence was
lost that day in <ent type='GPE'>Dallas</ent>. With it went the cable that anchored the
nation to its sense of order.
</p>
<p>
To the historians who define eras in terms of events rather
than years, the decade of the '60s was born in <ent type='GPE'>Dallas</ent>.
</p>
<p>
In a great, shuddering spasm, the fragile floodgates that
had held back the reservoir of a restless social movement was
punctured by the bullets that rained down from the <ent type='GPE'>Texas</ent> School
Book Depository.
</p>
<p>
Within months, <ent type='GPE'>America</ent> would experience the first of her
long hot summers, just the beginning of another newsreel: the
dogs and fire hoses of <ent type='GPE'>Birmingham</ent>, the first smiling <ent type='NORP'>Marines</ent>
marching into <ent type='GPE'>Vietnam</ent> and returning in body bags, campus radicals
occupying the administration building at <ent type='ORG'>Columbia University</ent>,
rioting outside <ent type='ORG'>the Democratic National Convention</ent> in <ent type='GPE'>Chicago</ent>,
the fires of <ent type='GPE'>Watts</ent> and <ent type='GPE'>Newark</ent> and <ent type='GPE'>Detroit</ent>, Dr. Strangelove,
<ent type='ORG'>Apollo</ent> 11, <ent type='GPE'>Woodstock</ent>, Charles Manson, the cultural revolution,
the counterculture revolution, the sexual revolution, the
yippies, the hippies, the peaceniks and the crazies.
</p>
<p>
In 1968, Stuart Udall, secretary of interior for both
Kennedy and Johnson, was asked his opinion of the times, which
seemed to be reeling out of control. He offered a sober, but
startling, observation.
</p>
<p>
"This may be remembered," he said, "as the most creative
time in our history."
</p>
<p>
It did not seem such an outrageous judgment when the
hurricane had passed. A sorting out had occurred in the storm.
Not many years would pass before a black preacher from <ent type='GPE'>Chicago</ent>
would run for the presidency. Women would flood the work place
and supervise staffs of men. Men with an eye on <ent type='ORG'>the White House</ent>
could talk of a female running mate without risking ridicule.
Wars would be harder to make, nuclear waste harder to conceal,
books harder to burn, air harder to pollute, justice harder to
deny.
</p>
<p>
<ent type='GPE'>America</ent> was starkly different. Kennedy's presidency and his
assassination may have been essential to unlocking the passions
of the time, but what the land became was neither his legacy, nor
Oswald's nor <ent type='GPE'>Dallas</ent>.'
</p>
<p>
After the trauma and shame and guilt were gone, the judgment
of history would be that Kennedy and Oswald, Edwin Walker and
Martin Luther King, George Wallace and Stokely Carmichael, Angela
Davis and George Lincoln Rockwell, <ent type='GPE'>Dallas</ent> and <ent type='GPE'>Los Angeles</ent>,
<ent type='GPE'>Memphis</ent> and <ent type='GPE'>Birmingham</ent>, <ent type='GPE'>Detroit</ent> and Da Nang were fragments of the
<ent type='GPE'>America</ent>n character, slivers of the dream and the nightmare.
</p>
<p>
The legacy of that sunlit moment in <ent type='GPE'>Dallas</ent> was a nation's
fretful and all-consuming search for itself, a long and howling
rage against the dying of the light.
</p>
<div>
</div></xml>

View File

@ -0,0 +1,177 @@
<xml>
<p> <ent type='ORG'>The Next Banking Crisis</ent>:
=========================================
The Issue Whose Name They Dare Not Speak.
========================================= </p>
<p> Late in June, [the Bush] <ent type='ORG'>Administration</ent> unleashed a bill that
would gut the Community Reinvestment Act (which requires banks to
make loans in their own neighborhoods, including low-income
areas), ease restrictions on loans to a bank's own officers and
directors and postpone the effective date of some tighter
regulations contained in last year's banking law.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This proposal is only the latest in a series of deregulatory
gestures by the <ent type='ORG'>Administration</ent> and the <ent type='ORG'>Fed</ent>. [whose] gifts to the
financial industry -- [recently] forty-five actions, taken rather
quietly since December [..] mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective
effect is to make the banking industry look healthier than it
really is and to permit riskier behavior in the future. These
moves defer tomorrow's disasters
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The <ent type='ORG'>CBO</ent> estimates that the repeated delays in shutting down
insolvent institutions from 1980 to 1991 added $66 billion to the
cost of the S&amp;L bailout -- enough to fund <ent type='ORG'>the Aid</ent> to Families with
Dependent Children program for three years, or AIDS research for 50 </p>
<p> <ent type='ORG'>The Next Banking Crisis</ent>:
=========================================
The Issue Whose Name They Dare Not Speak.
=========================================
By Doug Henwood, _The Nation_, July 20/27, 1992
(See below for more about _The Nation_) </p>
<p>Transcribed by Joseph Woodard </p>
<p>Whatever happened to the financial crisis? Only a year ago, it seemed
the credit system was imploding, and ever-more-extravagant bailouts
appeared inevitable. Now, the Resolution Trust Corporation (R.T.C.),
liquidator of failed savings and loans, is winding down operations;
banks and surviving thrifts seem generally profitable; and the seizure
of failing institutions has all but ceased. Surely the weak, possibly
failing, economic recovery we've seen since late last year can't be
solely responsible for this apparent reversal of fortune. </p>
<p>No, finance owes its recovery mainly to an indulgent government, whose
normal generosity has been deepened by election year concerns. The
Bush <ent type='ORG'>Administration</ent> wants to bury the problem, <ent type='ORG'>Congress</ent> is happy to go
along and the media aren't asking any unpleasant questions. Clinton
raises the issue with his typical technocratic dullness, and Perot
with his usual empty fury -- but neither has made that big a deal of
the timely disappearance of the financial crisis. That's odd,
considering that, as Bush campaign officials told Lynda Edwards of
_The Village Voice_, people in their focus groups are obsessed with
the savings and loan bailout and wonder why the press isn't covering
it. </p>
<p>One reason the banking mess has receded from view is that the <ent type='ORG'>Fed</ent>eral
Reserve -- which no doubt prefers that the financial system never be
an electoral issue at all -- has been easing policy gradually but
steadily since March 1989. The federal funds rate (the interest rate
banks charge one another for overnight loans), the most sensitive
indicator of the central bank's policy, has fallen in thirty-two of
the past forty months, pushing short-term interest rates to their
lowest levels since 1963. </p>
<p>Although the economy has barely responded to this treatment -- no
modern slump has proved so resistant to lowered rates -- it has helped
refloat the banking system in at least two ways. First, banks haven't
really shared the <ent type='ORG'>Fed</ent>'s generosity with their customers. Rates charged
for loans haven't declined anywhere near as much as those paid on
deposits, boosting bank profits. And second, long-term rates haven't
declined nearly as much as short-term rates. Leaving aside two brief
spikes in the 1950s, the gap between long- and short-term rates is the
widest it's been since the dislocations of the 1930s and 1940s. This
also fattens the banks, which have been buying government bonds
(rather than making loans) and pocketing the large spread between what
they pay their depositors and what they can get from Uncle Sam. Should
the relation between long-term and short-term rates return to normal,
the banks would take a quick turn for the worse. </p>
<p><ent type='ORG'>Fed</ent> chairman Alan Greenspan isn't the banks' only friend. The other is
the man who has said he will do anything to get re-elected, George
Bush. Late in June, his <ent type='ORG'>Administration</ent> unleashed a bill that would gut
the Community Reinvestment Act (which requires banks to make loans in
their own neighborhoods, including low-income areas), ease
restrictions on loans to a bank's own officers and directors and
postpone the effective date of some tighter regulations contained in
last year's banking law. </p>
<p>This proposal is only the latest in a series of deregulatory gestures
by the <ent type='ORG'>Administration</ent> and the <ent type='ORG'>Fed</ent>. <ent type='ORG'>The Durham</ent>, <ent type='GPE'>North Carolina</ent>-based
<ent type='ORG'>Financial Democracy Campaign</ent> recently issued a five-page list of such
gifts to the financial industry -- forty-five actions, taken rather
quietly since December, that mandate looser capital requirements,
lighter supervision and gimmicky accounting. Their collective effect
is to make the banking industry look healthier than it really is and
to permit riskier behavior in the future. </p>
<p>These moves defer tomorrow's disasters, shoring up shaky banks (more
than 1000 are on the F.D.l.C.'s problem list); yesterday's disasters
are being dealt with separately. The government has virtually stopped
seizing failed banks and thrifts; the liquidators can only move in
when ordered to by <ent type='ORG'>Administration</ent> agencies (<ent type='ORG'>the Office</ent> of Thrift
Supervision and <ent type='ORG'>the Comptroller</ent> of the Currency, both fiefdoms within
Nicholas Brady's <ent type='ORG'>Treasury Department</ent>), and such orders aren't being
given. This is good news for the liquidators, since their insurance
funds are broke, and <ent type='ORG'>Congress</ent> is reluctant to vote them more money --
at least not in an election year. </p>
<p>If you listen to the R.T.C., its work is nearly done. Even though it
has run through only half its budget, the corporation is shutting
offices and reducing staff. Among the staff being reduced, as Susan
Schmidt has been reporting in _<ent type='ORG'>The Washington Post</ent>_, are lawyers with
the professional liability section, who are supposed to be going after
the executives and board members who ran the thrift industry into the
ground. With a three-year statute of limitations (running from the
moment institutions are seized), the division needs more staff, not
less -- but the R.T.C. is dismissing experienced lawyers and replacing
them with novices. No one can prove anything yet, of course, but the
likely targets of such liability investigations, aside from bankers,
would be realtors, accountants, lawyers, doctors and others who are
likely to be generous campaign contributors to both parties. </p>
<p>Insofar as there's a strategy behind this delay in dealing with the
banking problem (aside from political expediency), it's one of
"forbearance" -- the hope that the problem will just go away with time
and economic growth. But the economy is hardly growing, and insolvency
isn't one of the diseases that time can cure. The <ent type='ORG'>Congress</ent>ional Budget
Office estimates that the repeated delays in shutting down insolvent
institutions from 1980 to 1991 added $66 billion to the cost of the
S&amp;L bailout -- enough to fund <ent type='ORG'>the Aid</ent> to Families with Dependent
Children program for three years, or AIDS research for fifty. </p>
<p>Students of the S&amp;L disaster are reminded of 1988, when the same trio
of co-conspirators -- the executive and legislative branches, assisted
by a lazy or complicit media -- ignored the disaster until after the
election. In early 1989, the thrift crisis was suddenly "discovered,"
only to disappear again in accordance with the quadrennial cycle. </p>
<p>But the problems won't just go away. <ent type='ORG'>Bank</ent> and thrift balance sheets
are contaminated with billions of dollars of loans that went to build
pointless shopping centers and see-through office buildings. Salomon
Brothers estimates that it will take a national average of twelve
years to fill up existing empty commercial real estate -- ten years in
<ent type='GPE'>Los Angeles</ent>, twenty-six years in <ent type='GPE'>Boston</ent>, forty-six years in <ent type='GPE'>New York</ent>
City and fifty-six years in <ent type='GPE'>San Antonio</ent>, the national champ. </p>
<p>Aside from increasing the ultimate cost of the financial rescue, the
conspiracy of silence has largely prevented any serious discussion of
why the financial meltdown happened or how we might make the best of
the situation. The government is spending hundreds of billions of
public dollars to restore business as usual. Instead, failed
institutions could be transformed to publicly or cooperatively owned
local development banks, and the government's vast inventory of
near-worthless real estate could be turned over to community groups,
local governments or nonprofit associations for creative use. But some
things are too important to be discussed openly, especially during
election season. </p>
<p>**************************************************************
Doug Henwood is Editor of _Left Business Observer_ (see below)
************************************************************** </p>
<p>
##################################################################
Reprinted with permission - granted by <ent type='ORG'>The Nation magazine</ent>/The Nation
Company, Inc. Copyright 1992
##################################################################
Subscriptions to _The Nation_ -- published since 1865 and the oldest
weekly magazine in <ent type='GPE'>America</ent> -- are $32 per year (47 issues):
The Nation // Dept MAP // 72 Fifth Ave. // <ent type='GPE'>New York</ent>, NY 10011
Or a half-year subscription (24 issues) is $22.
</p></xml>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,432 @@
<xml><p>&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#
%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;
#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%
&amp;%# &amp;%#
%#&amp; Axon Industries Present %#&amp;
#&amp;% #&amp;%
&amp;%# The <ent type='ORG'>Kromery</ent> Converter/Free Electricity &amp;%#
%#&amp; %#&amp;
#&amp;% Original articles by John Bedini, Eike Mueller, and Tom <ent type='LOC'>Bearden</ent>. #&amp;%
&amp;%# Retyped Without Permission 07/04/86 by (_&gt;Shadow Hawk 1&lt;_) &amp;%#
%#&amp; %#&amp;
#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%
&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#
%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;%#&amp;</p>
<p>Tom <ent type='LOC'>Bearden</ent></p>
<p> John Bedini has a prototype free energy motor.</p>
<p> Imagine having a small D.C. electrical motor sitting on your laboratory bench powered
by a common 12 volt battery. Imagine starting with a fully charged battery and
connecting it to the motor with no other power input. Obviously, the motor is go
ing to run off the battery, but by conventional thinking it will stop when the battery
runs down.</p>
<p> It isn't running by the conventional wisdom of electrical physics. It isn't running
by the conventional rules of electric motors and generators, but it is running.</p>
<p> And it isn't something complex. It's pretty simple, once one gets the hang of the
basic idea.</p>
<p> Impossible, you say. Not at all. That's precisely what John Bedini has done, and the
motor is running now in his workshop.</p>
<p> It's running off the principles of electromagnetics that <ent type='ORG'>Nikola Tesla</ent>
discovered shortly before 1900 in his Colorado Springs experiments. It's running
off the fact that pure empty vacuum - pure "emptiness", so to speak, is filled with riv
ers and oceans of seething energy, just as <ent type='ORG'>Nikola Tesla</ent> pointed out.</p>
<p> It's running off the fact that vacuum space-time itself is nothing but pure masless
charge. That is, vacuum has a very high electrostatic scalar potential - it is greatly
stressed. To usefully tap the enormous locked-in energy of that stress, all one
has to do is crack it sharply and tap the vacuum oscillations that result. The best
way to do that is to hit something resonant that is imbedded in the vacuum, then
tap the resonant stress of the ringing of the vacuum itself.</p>
<p> In other words, we can ring something at its resonant frequency and, if that
something is imbedded in the vacuum, we can tap off the resonance in vacuum stress,
without tapping energy directly from the embedded system we rang into oscillation.
So
what we really need is something that is deeply imbedded in the vacuum, that is,
something that can translate the "vacuum" movement into "mass" movement.</p>
<p> Well, all charged particles and ions are already imbedded in the vacuum by their
charged fluxes, so stressed oscillations - that is, vacuum oscillations - can be
converted into normal energy of mass movement by charged particles or ions, if the
sy
stem of charged particles or ions is made to resonate in phase with our tapping
"potential". For our purpose, let's use a system of ions.</p>
<p> First we will need a big accumulator to hold a lot of the charged ions in the system
that we wish to shock into oscillation. We need something that has a big capacitance
and also contains a lot of ions.</p>
<p> An ordinary battery filled with electrolyte fits the bill <ent type='ORG'>nic</ent>ely. While it's not
commonly known, ordinary lead-acid storage batterys have a resonant io<ent type='ORG'>nic</ent> frequency,
usually in the range of from 1 - 6 Mhz. All we have to do is shock -oscillate the
ions in the electrolyte at their resonant frequency and time our "trigger" potential
and "siphon" circuit correctly. Then if we keep adding potential to trigger the
system we can get all that "potential" to translate into "free electrical energy".</p>
<p> Look at it this way. Conventionally "electrostatic scalar potential" is composed
of work or energy per columb of charged particle mass. So if we add potential alone,
without the mass flow, to a system of oscillating charged particles, we add "physica
l energy" in the entire charged particle system. In other words, the "potential" we
add is converted directly into "ordinary energy " by the imbedded ions in the system.
And if we are clever we don't have to furnish any pushing energy to move pure po
tential around. (For proof that this is possible, see <ent type='LOC'>Bearden</ent>'s Toward a New
Electromagnetics; Part IV; Vectors and Mechanisms Clarified, Tesla Book Co., 1983,
Slide 19, Page 43, and the accompanying write-up, pages 10, and 11. Also see Y.
Aharonov an
d V. Bohm, "Significance of <ent type='ORG'>Electromagnetic Potentials</ent> in the Quantum Theory",
Physical Review, Second Series, Vol. 115, No. 3, Aug. 1, 1959, pages 485-491. On page
490 you will find that it's possible to have a field-free reigon of space, and
still have the potential determine the physical properties of the system.)</p>
<p> Now this "free energy resonant coupling" can be done in a simple, cheap system.
You don't need big cyclotrons and huge laboratories to do it; you can do it with
ordinary D.C. motors, batteries, controllers and trigger circuits.</p>
<p> And that's exactly what John Bedini has done. It's real. It works. It's running
now on John's laboratory bench in prototype form.</p>
<p> But that's not all. John is also a humanitarian. He's as concerned as I am for that
little old widow lady at the end of the lane, stretching her meager <ent type='ORG'>Social Security</ent>
check as far as she can, shivering in the cold winter and not daring to turn
up her furnace because she can't afford the frightful utility bills.</p>
<p> That's simply got to change and John Bedini may well be the fellow who changes it.
By openly releasing his work in this paper, he is providing enough information
for all the tinkerers and independent inventors around the world to have at it. If
he can get a thousand of them to duplicate his device, it simply can't be supressed as
so many others have been.</p>
<p> So here it is. John has deliberately written his paper for the tinkerer and
experimenter, not for the scientist. You must be careful, for the device is a little
tricky to adjust in and synchronize all the resonances. You'll have to fiddle with
it,
but it will work. Keep at it.</p>
<p> Also, we warn you not to play with this unless you know what you are doing. The
resonating battery electrolyte produces hydrogen, and if you hit it to hard with a
"voltage spike" you can get an electrical spark inside the battery. If that happens, </p>
<p>THE BATTERY WILL EXPLODE, so don't mess with it unless you are qualified and use the
utmost caution.</p>
<p> But it DOES work. So all you experimenters and pioneers, now's your chance. Have
at it. Build it. Tinker with it. Fiddle it into resonant operation. Then lets build
this thing in quantity, sell it widely, and get those home utilities down to where w
e can all afford them - including the shivering little old lady at the end of the lane.</p>
<p> And when we do, lets give John Bedini, and men like him the credit and appreciation
they so richly deserve.</p>
<p> Tom <ent type='LOC'>Bearden</ent></p>
<p> April 131984</p>
<p>John Bedini</p>
<p>[Note: John Bedini developed Two kinds of controller devices. One, being very simple,
is the one I will present here. The other is quite a bit more complex, and would be
impossible for me to reproduce here... Anyway if you want to see the all electro
<ent type='ORG'>nic</ent> controller, get the book "Bedini's Free Energy Generator" by John C. Bedini,
Published by <ent type='ORG'>the Tesla Book</ent> Co. 1580 Magnolia Ave., Millbrae, CA 94030.]</p>
<p> For some time man has been looking for different ways to generate electricity. He has
used water power, steam power, nuclear power, and solar power. Recent papers written
by Tom <ent type='LOC'>Bearden</ent> make a free energy generator possible. Tom <ent type='LOC'>Bearden</ent>, rather
than patent his devices, chose to share them with people who had open ears. I
myself have had many conversations with Tom <ent type='LOC'>Bearden</ent>. He found Tom to be one of
the most reasonable men he had ever dealt with in this energy field. Most others woul
d tell you stories of great machines they had, but would never present the truth
with circuit diagrams or a look at the machine in question. Tom, on the other hand,
clearly presents his ideas and clearly presents his ideas and discloses the
concepts by means of which they work.</p>
<p>The facts I am about to present to you about free energy were never put into textbooks,
only portions were. The textbooks have grounded people in conventional theory and made
things very complicated. What I am about to explain is very simple; anyone
can understand this theory and anyone who understands what he is doing can build
this device.</p>
<p> I have been grounded in conventional theory for some eleven years. I have always
tried to study the simplicity of electrical circuits, but my mind wouldn't allow
this because of my orthodox training. In any event, I had to change the way
i was looking at things. I started to wonder, why do we need to have things so
complicated? The truth of the matter is, we have been taught to consume or waste energy
at every turn in our lives, so we jump into our cars, turn on lights, etc. In other
words, we have been conditioned to waste energy and fuels lavishly, not realizing
that someday someone will sky-rocket our energy bills to a point where we will
not be able to pay for these fuels. Everything will come to a stand-still. But la
ugh as you will, at that time Rube Goldberg machines will power your future. It
probably will not be uncommon to see machines from the size of garbage cans to the
size of two story apartment houses powering everything in sight. These machines will </p>
<p>be using a force in nature never conceived by the conventionally trained mind of today.</p>
<p> The theory I am about to explain to you will bring you one step closer to gaining
free energy.</p>
<p> To begin my story I must state I had a vision - looking for this energy. Many times
I hammered my head into the ground, but I refused to give up in my search. Any person
with a dream should never let it be wasted by fools, who will always say "you
can't do that". All that statement really means is that they do not know how to do it.</p>
<p> There are many different ways to explain this theory. I will discuss the first
one now.</p>
<p> The device is very simple and uses a motor, a generator, a controller switch, and a
battery. Basically, we drive a direct current motor with pulsed current from a battery,
then utilize a special means to cause the battery to recharge itself.</p>
<p> First, the battery, controller, and generator are interconnected as shown in figure
3. (See also Figure 1)</p>
<p>Figure 1: The <ent type='ORG'>Kromery</ent> Converter</p>
Figure 2: Controller Construction
<p>Figure 3: Schematic of the device </p>
<p>Let's begin by stating certain facts. The ions move backwards under charging
conditions and in reverse under discharging conditions. So here we start our new
concept. Suppose we have constructed a machine that has tricked this battery into a
different space and time relationship. Simply put, suppose the battery never did any
work
and it should have its full charge left in it. Suppose this becomes possible because
we have stressed the terminals in such a way that the ions in the battery electrolyte
actually move themselves backwards. The machine, or unit, that makes this possible h
as many different names. Some people call these units generators, energizers,
alternators, etc. Conventionally such devices have one thing in common; they stress the
battery backwards by pushing electricity into the battery and forcibly pushing the ions
i
n the electrolyte backwards. In our theory, we are not going to push anything - the ions
are going to move themselves, recharging the battery.</p>
<p>If we go a little deeper into this theory, you are probably asking yourself, "what is
this madman talking about?" Simply put, we are going to put a stress on the battery
terminals for a moment in time and the battery will do the rest. Now comes the heavy
part of this theory. What they didn't teach you in textbooks is that, in order for the
battery to charge, two oscillatory actions must occur, one at the positive terminal and
one at the negative terminal. Under different stress levels this then forces the
ions backwards. The same would occur for an electron. Our machine will slingshot ions
in the battery electrolyte backwards beyond the normal recoil action.</p>
<p> I must give a very stern warning at this time that if the voltage developed is too
high the battery will explode. Use the utmost care. Test setups in my lab have proven
that this can be dangerous. Do not build the device and experiment with it unless yo
u know what you are doing, and use the utmost caution.</p>
<p> When struck by a sharp voltage spike, the electrolyte in the battery will resonate
at a certain frequency and this can also force the ions backwards. Simply put, the
battery, the motor, and the energizer will become resonant at some point, "ring" like
a
bell when we "strike" it, and in its ringing the most energy will be developed.</p>
<p>[Note: sorry I can't produce waveforms here so get the book! I will present the
explanation here, however]</p>
<p> The battery is really charging itself. The ions in the electrolyte are being stressed
in a curved space and time relationship, the battery is actually forced into believing
that no work ever occured. The oscillatory action that has taken place by the en
ergizer has just pulsed our "slingshot" and immediately let go. Once this has happened,
the electrolyte in the battery goes wild and the ions race backwards, giving off
hydrogen and oxygen gas. I must make a stern warning here! The time of the stimulaing
pulse is very important. If the time is to long the battery will burn itself out. If
the pulse time is too short or if the circuit fails to operate correctly, the battery
will never recover its charge. Taking this into consideration, the only failures tha
t could occur would be the controller failure due to a points faiulre (on the electro<ent type='ORG'>nic</ent>
controller), or the multivibrator latched in the "on" position (again, only on the
electro<ent type='ORG'>nic</ent> controller). Anyone studying this can see that we have used very little
energy to get to this point, and gained a lot of resonant energy in return.</p>
<p> We must remember that, if the battery is applied to the energizer longer than normal,
we must burn up the excess energy to keep the battery cool. The problem now becomes one
of embarrassing excess of energy, not a shortage.</p>
<p> The energizer is also a simple machine, but if yu want to, you can make it very
complex. The simple way is to study the alternator principles. The waves we want to
generate are like those that came from old D.C. generators with the exception of
armature
drag, bearing drag, and no excited fields. Also, we would want to cut the magnetic
fields at 90 degress to the armature. The simpler the better.</p>
<p> I am going to throw a few ideas your way. I have run some tests in my lab and
discovered that certain types of energizers, generators, and alternators do what we
need. Also, we want to be able to tune the output of our energizer. The old D.C.
generator
puts out something very close towhat we need, except for The drag.</p>
<p> In an A.C. generator output we are going to see just what we manufacture. It would
appear that this leaves this generator out. Not really, because we can make this
generator's output change by rectifying it.</p>
<p> In looking at the A.C. generator with rectified output, we see that it could become
very useful to us as an energizer, simply because it is the easiest to construct and
its principles are simple. I have done experiments with an A.C. generator using ALL
N. alligned magnets, and rectified. Most people can see that that type o alternator
might have some problems. However, remember that I am looking for a certain type of wave
form that I want to tune to a certain frequency at a certain speed. The winding of
this alternatr is a problem and it is a bit tricky, but I chose to stay with this unit.
You may choose a different method if you retain the principle. The type of energizer
that was used for the prototype was a standard office type 2-speed A.C. fan housi
ng. The coils were replaced with 6 coils of approx. 200 turns of #20 wire - all in
phase. Six permanent magnets are bonded to an aluminum disc. This arrangement is
basically a magneto, but will produce more amperage than ordinarily expected of a
magneto.</p>
<p>Controller Construction: Figure 2 shows the controller. It should be made of two
coencentric circles, one with approx. 140 degrees of copper, the other, spaced far
enough from the first for a brush to be inserted between them, a full 360 degrees of
copper
. Provisions should be made to rotate the brushes in relationship to each other in order
to secure the required timing.</p>
<p>Eike Mueller</p>
<p>John Bedini found that the material generally available concerning <ent type='ORG'>Kromery</ent>'s
Converter had been altered. Rebuilding the <ent type='ORG'>Kromery</ent> Converter from the patent papers
ended up in a non-functioning device. Bedini found the necessary modifications </p>
<p>which made this machine perform.</p>
<p>Our first goal was to determine the converters efficiency. We found this to be
quite difficult as the efficiency changes with the load applied.</p>
<p>Figure K-1 shows the first setup we used. We drove the <ent type='ORG'>Kromery</ent> Converter from
a 12v motorcycle battery. We connected at the output of the converter a condenser
and a rectifier bridge in parallel. The rectified current was then put b
ack into the motorcycle battery. To detect any current flow, we connect into the
positive line a 12 V light bulb.</p>
<p>The result of this test was the light bulb was lit up. However after 15 minutes the
batrery voltage had dropped from 11.05 V to 9.10 V. The speed of the converter
was stabale at 1020 rpm.</p>
<p>In the next test we introduced a seperate battery (battery #2) for charging from
the converter.</p>
<p>We recharged the battery #2 from 12.30 V to 12.40 V within 4 minutes, and we measured
a current flow into the battery #2 of 0.8 amperes.</p>
<p>Figure K-2 shows the second test setup. Because the <ent type='ORG'>kromery</ent> converter ran
too slow on one 12 V battery, we decided to drive the converter using 24 V via tw
o 12 V batteries, connected in series.</p>
<p> Next we wanted to find a correlation between the normal charging of battery #2 using
a commercial battery charger, and charging this same battery with the <ent type='ORG'>Kromery</ent> converter.
We drained the battery #2 to 8 V, connected it to the <ent type='ORG'>Kromery</ent> Converter, and af
ter reaching 11.51 V, we measured the time it took to charge the battery from this
voltage level of 11.51 V to 12.45 V. We reached this voltage (12.45 V) after 11
minutes. The indicated current into the battery was 0.94 A.</p>
<p>We then repeated these steps using the commercial battery charger. Because we ran out
of time after nearly 2 hours, we disconnected the battery from the charger. The
battery voltage had reached 12.41 V. The measurement is depicted in Figure K-3.</p>
<p> THE BATTERY CHARGER NEEDED 119 MINUTES</p>
<p> TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.41 V
FIGURE K - 3</p>
<p> THE KROMERY CONVERTER NEEDED 11 MINUTES</p>
<p> TO RAISE THE BATTERY VOLTAGE FROM 11.51 V TO 12.45 V</p>
<p> NOTE: The charger could not fill up the batteries
to 12.45 volts within two hours.</p>
<p>We wanted to find a correction factor for the <ent type='ORG'>Kromery</ent> Converter by comparing the
same effect, i.e. the charging of the same battery from one specific voltage to
another specific voltage. The calculation of this factor is avilable in the book "E
xperiments with a <ent type='ORG'>Kromery</ent> and a <ent type='ORG'>Brandt</ent>-Tesla converter built by John Bedini" By Eike
Mueller, with Comments by Tom <ent type='LOC'>Bearden</ent>. Table K-1 shows the combined test results.
Because we detected an increase in the speed of the <ent type='ORG'>Kromery</ent> Converter as well as
a
decrease in the input energy when we increased the output load, we decided to
measure the input energy and speed when the output was shorted. Again, the input energy
dropped and the speed increased.</p>
<p> Measurement No Load Loaded With Shorted Corrected
Battery Fact. 5.535
============================================================</p>
<p> Input Voltage 25.30 25.00 24.90 </p>
<p> Input Current 3.90 3.00 2.20 </p>
<div> ------------------------------------------------------------</div>
<p> Watts In 98.67 75.00 54.78 </p>
<p> Watts Out N/A 10.26 N/A 56.78 </p>
<div> ------------------------------------------------------------</div>
<p> Speed In Rev/Sec 40.00 65.00 73.00 </p>
<p> Output Voltage DC 48.00 10.80 N/A
Output Current N/A 0.95 1.05
------------------------------------------------------------</p>
<p> Watts In/Out N/A 7.31 N/A 1.32 </p>
<div> ============================================================</div>
<p> Table K - 1</p>
<p>Using the earlier determined correction factor of 5.535 we calculated the energy
they put into the battery to 56.78 watts (from 10.26 * 5.535). Looking at Table K-1
we see that it takes only 54.78 watts to run the <ent type='ORG'>Kromery</ent> Converter when the outpu
t is shorted. This result led us to continue with theese tests and load the converter
output even more. The results of these tests can be seen in Table K-2.</p>
<p>Here again, we detected that we would get a higher efficiency of the total device,
the more we load down the output side. This effect is totally contradictory
to the conventional laws of physics.</p>
<p> Measurement No Load Loaded With Loaded w/ Loaded w/
Lamp &amp; Batt 13.5 Ohms 0.63 Ohms
============================================================</p>
<p> Input Voltage 25.40 25.30 20.00 21.90 </p>
<p> Input Current 3.90 3.90 3.39 2.30 </p>
<div> ------------------------------------------------------------</div>
<p> Watts In 99.06 98.67 67.80 50.37 </p>
<p> Watts Out N/A 21.00 185.19 634.92 </p>
<p> Watts Out (Corrected) 116.24
------------------------------------------------------------</p>
<p> Resistance (Ohms) N/A N/A 13.50 0.63 </p>
<p> Output Voltage DC 48.00 28.00 50.00 20.00 </p>
<p> Output Current N/A 0.75 N/A N/A </p>
<div> ------------------------------------------------------------</div>
<p> Watts In/Out N/A 0.85 0.37 0.08 </p>
<div> ============================================================</div>
<p> Table K - 2</p>
<p>We used the <ent type='ORG'>Kromery</ent> correction factor for the First case, when we had connected the
battery to the converter output. We did not use this factor in both other cases when
we used resistors in the output circuit.</p>
<p>The above test results show that the efficiency of the <ent type='ORG'>Kromery</ent> Converter is well
above 100%.</p>
<p>The end. Typed by (_&gt;Shadow Hawk 1&lt;_). May be distributed anywhere as long as you keep
the credits. I dont give a shit what you do with it either.</p>
<p>DOWNLOADED FROM P-80 SYSTEMS</p></xml>

View File

@ -0,0 +1,43 @@
<xml><p>"<ent type='ORG'>The Bermuda Triangle</ent> and Parapsychology" By Dave Beall</p>
<p>. Although not embraced by the parapsychological community, the Bermuda
Triangle phenomena is an intriguing topic to the public. Jane Roberts' Seth
claims the mysterious disappearances of ships and planes is the result of a
"coordination point", which is a place where time and space meet. Supposed
energy "crystals" from the ancient culture of Atlantis, which Edgar Cayce
predicted would be discovered in the <ent type='LOC'>Atlantic Ocean</ent>, are suspected by some to
be responsible for the peculiar events in this region. Some individuals
consider UFOs as the source of the phenomena.</p>
<p>. A provacative theory has been proposed by geologists as a result of the
recent discover and subsequent laboratory analysis of an ice like substance
called hydrate. A hydrate layer, formed by mixing cold sea water and natural
gas at immense pressures of the deep ocean, has been found on the ocean floor
in the triangle area, and this seal prevents natural venting of natural gas
from the large hydrocarbon desposits located there.</p>
<p>. When a large natural gas pocket is suddenly released as a result of a
buildup in pressure or sea floor movement (i.e. faulting), ships can be
suddenly swallowed by the foamy mixture of gas and water and temporary
"islands" as much as one mile across can be visible on neighboring ship's radar
screens, as the gas enters the atmosphere. Negative ions generated by agitated
sea water rise into the atmosphere along with the lighter-than-air-gas, causing
magnetic disturbances which could disrupt compass readings in the area.
<ent type='ORG'>Aircraft</ent>, passing over the gas blowout, could experience engine failure due to
oxygen starvation in the gas rich air and crash without a trace.</p>
<p>. Any sinking wreckage from a plane or ship could be carried miles from the
accident site by the strong currents in the region, before being consumed by
thick bottom muds or hydrate accumulations, leaving no evidence. The release
of trapped gas desposits ruptured by faulting in shallow ocean areas could
display similar characteristics, whithout hydrate, and the chance of a gas
blowout of this nature exists anywhere in the world's oceans where large
natural gas deposits are present. In the case of the Bermuda Triangle
phenomena, it would appear that a reasonable explanation has been proposed.
. Many aspects of parapsychology or related areas may not have solutions
which readily conform to known physical principles. On the other hand, many
esoteric or metaphysical ideas may someday be explainable in purely physical
terms. In an attempt to understand paranormal occurences, an individual should
remain open and objective until all of the evidence is in so that the
temptation towards premature and unfounded conclusions can be overcome. </p></xml>

View File

@ -0,0 +1,355 @@
<xml><p>Foresight Background
No. 4, Rev. 0
Copyright 1989 The Foresight Institute.
All rights reserved by the author.
Box 61058, <ent type='GPE'>Palo Alto</ent>, CA 94306 USA</p>
<p>by Arthur <ent type='ORG'>Kantrowitz</ent></p>
<p><ent type='ORG'>Dartmouth</ent> College</p>
<p>"The best weapon of a dictatorship is secrecy, but the best weapon of
a democracy should be the weapon of openness."</p>
<p>--Niels Bohr</p>
<p>Introduction</p>
<p>What is the "weapon of openness" and why is it the best weapon of a
democracy? <ent type='ORG'>Openness</ent> here means public access to the information needed
for the making of public decisions. Increased public access (i.e. less
secrecy) also gives information to adversaries, thereby increasing
their strength. The "weapon of openness" is the net contribution that
increased openness (i.e. less secrecy) makes to the survival of a
society. Bohr believed that the gain in strength from openness in a
democracy exceeded the gains of its adversaries, and thus openness was
a weapon.</p>
<p>This is made plausible by a <ent type='NORP'>Darwinian</ent> argument. Open societies evolved
as fittest to survive and to reproduce themselves in an international
jungle. Thus the strength of the weapon of openness has been tested
and proven in battle and in imitation. Technology developed most
vigorously in precisely those times, i.e. the industrial revolution,
and precisely those places, western <ent type='LOC'>Europe</ent> and <ent type='GPE'>America</ent>, where the
greatest openness existed. Gorbachev's glasnost is recognition that
this correlation is alive and well today.</p>
<p>Let us note immediately that secrecy and surprise are clearly
essential weapons of war and that even countries like the U.S., which
justifiably prided itself on its openness, have made great and
frequently successful efforts to use secrecy as a wartime weapon.
Bohr's phrase was coined following WWII when his primary concern was
with living with nuclear weapons. This paper is concerned with the
impact of secrecy vs. openness policy on the development of military
technology in a long duration peacetime rivalry.</p>
<p>Let us also immediately note that publication is the route to all
rewards in academic science and technology. When publication is
denied, the culture changes toward the standard hierarchical culture
where rewards are dependent on finding favor with superiors. Reward
through publication has been remarkably successful in stimulating
independent thinking. However, in assessing openness vs. secrecy
policy it must be borne in mind that research workers (including the
present author) start with strong biases favoring openness.</p>
<p>In contrast, secrecy insiders come from a culture where access to
deeper secrets conveys higher status. Those who "get ahead" in the
culture of secrecy understand its uses for personal advancement.
Knowledge is power, and for many insiders access to classified
information is the chief source of their power. It is not surprising
that secrecy insiders see the publication of technological information
as endangering national security. On the other hand, to what degree
can we accept insiders' assurances that operations not subject to
public scrutiny or to free marketplace control will strengthen our
democracy?</p>
<p>My own experience relates only to secrecy in technology. Therefore I
will not discuss such secrets as submarine positions (which seem
perfectly justifiable to me in the sense that they clearly add to our
strength) or activities which are kept secret to avoid the
difficulties of explaining policy choices to the public (which seem
disastrously divisive to me).</p>
<p>First, we offer some clues to understanding the historical military
strength of openness in long duration competition with secrecy.</p>
<p><ent type='ORG'>Sec</ent>ond, we suggest a procedure for the utilization of more openness to
increase our strength.</p>
<p>The Strength of <ent type='ORG'>Openness</ent></p>
<p> An important source of support for secrecy in technology is the
ancient confusion between magic and science. In many communications
addressed to laymen the terms are used almost interchangeably. <ent type='ORG'>Magic</ent>
depends on secrecy to create its illusions while science depends on
openness for its progress. A major part of the educated public and the
media have not adequately understood this profound difference between
magic and science. This important failure in our educational system is
one source of the lack of general appreciation of the power of
openness as a source of military strength. A more general
understanding of the power of openness would bolster our faith that
open societies would continue to be fittest to survive.</p>
<p><ent type='ORG'>Openness</ent> is necessary for the processes of trial and the elimination
of error, Sir Karl Popper's beautiful description of the mechanism of
progress in science. Let's try to understand what happens to each of
these processes in a secret project and perhaps we can shed some light
on how the peacetime military was able to justly acquire its
reputation for resistance to novelty.</p>
<p>Trial in Popper's language means receptivity to the unexpected
conjecture. There is the tradition of the young outsider challenging
the conventional wisdom. However in real life it is always difficult
for really new ideas to be heard. Such a victory is almost impossible
in a hierarchical structure. The usual way a new idea can be heard is
for it to be sold first outside the hierarchy. When the project is
secret this is much more difficult, whether the inventor is inside or
outside the project.</p>
<p>Impediments to the elimination of errors will determine the pace of
progress in science as they do in many other matters. It is important
here to distinguish between two types of error which I will call
ordinary and cherished errors. Ordinary errors can be corrected
without embarrassment to powerful people. The elimination of errors
which are cherished by powerful people for prestige, political, or
financial reasons is an adversary process. In open science this
adversary process is conducted in open meetings or in scientific
journals. In a secret project it almost inevitably becomes a political
battle and the outcome depends on political strength, although the
rhetoric will usually employ much scientific jargon.</p>
<p>Advances in technology incorporate a planning process in addition to
the trial and elimination of error which is basic to all life. When
the planned advance is small the planning can be dominant, in the
sense that little new knowledge is required and no significant errors
must be anticipated. When the planned advance is large it will usually
involve research and invention, and the processes of trial and the
elimination of error discussed above will determine the rate of
progress. In these cases the advantages of openness will be especially
important. The familiar disappointments in meeting schedules and
budgets are frequently related to the fact that, in selling new
programs, the importance of these unpredictable processes is not
sufficiently emphasized. More openness would reduce these
disappointments.</p>
<p>Trial and the elimination of error is essential to significant
progress in military technology, and thus both aspects of the process
by which significant progress is made in military technology are
sharply decelerated when secrecy is widespread in peacetime. <ent type='ORG'>Openness</ent>
accelerates progress. In peacetime military technology, openness is a
weapon. It is one clue to the survival of open societies in an
international jungle.</p>
<p><ent type='ORG'>Secrecy</ent> as an Instrument of Corruption</p>
<p>The other side of the coin is the weakness which secrecy fosters as an
instrument of corruption. This is well illustrated in Reagan's 1982
<ent type='ORG'>Executive Order</ent> #12356 on <ent type='ORG'>National Security</ent> (alarmingly tightening
secrecy) which states {<ent type='ORG'>Sec</ent>. 1.6(a)};</p>
<p>In no case shall information be classified in order to conceal
violations of law, inefficiency, or administrative error; to prevent
embarrassment to a person, organization or agency; to restrain
competition; or to prevent or delay the release of information that
does not require protection in the interest of national security.</p>
<p>This section orders criminals not to conceal their crimes and the
inefficient not to conceal their inefficiency. But beyond that it
provides an abbreviated guide to the crucial roles of secrecy in the
processes whereby power corrupts and absolute power corrupts
absolutely. Corruption by secrecy is an important clue to the strength
of openness.</p>
<p>One of the most important impacts of corruption from secrecy is on the
making of major technical decisions. Any federally sponsored project
and especially a project so hotly contested as the Strategic Defense
Initiative must always keep all its constituencies in mind when making
such decisions. Thus the leadership must ask itself whether its
continual search for allies will be served by making a purely
technical decision one way or the other. (A purely technical decision
might determine whether money flows to <ent type='GPE'>Ohio</ent> or to <ent type='GPE'>Texas</ent>. Worse yet,
revealing technical weaknesses could impact the project budget.)</p>
<p>When this search for allies occurs in an unclassified project,
technical criticisms, which will come from the scientific community
outside the project, must be considered. Consideration of these
criticisms can improve the decision making process dramatically by
bringing a measure of the power of the scientific method to the making
of major technical decisions.</p>
<p>In a classified project, the vested interests which grow around a
decision can frequently prevent the questioning of authority necessary
for the elimination of error. <ent type='ORG'>Peacetime</ent> classified projects have a
very bad record of rejecting imaginative suggestions which frequently
are very threatening to the existing political power structure.</p>
<p>When technical information is classified, public technical criticism
will inevitably degrade to a media contest between competing
authorities and, in the competition for attention, it will never be
clear whether politics or science is speaking. We then lose both the
power of science and the credibility of <ent type='NORP'>democratic</ent> process.</p>
<p>Corruption is a progressive disease. It diffuses from person to person
across society by direct observations of its efficacy and its safety.
The efficacy of the abuse of secrecy for interagency rivalry and for
personal advancement is well illustrated by the array of abuses listed
in <ent type='ORG'>Sec</ent>. 1.6(a). The safety of the abuse of secrecy for the abuser is
dependent upon the enforcement of the <ent type='ORG'>Sec</ent>tion. As abuses spread and
become the norm, enforcibility declines and corruption diffuses more
rapidly.</p>
<p>However, diffusive processes take time to spread through an
organization, and this makes it possible for secrecy to make a
significant contribution to national strength during a crisis. When a
new organization is created to respond to an emergency, as for example
the scientific organizations created at the start of WWII, the
behavior norms of the group recruited may not tolerate the abuse of
secrecy for personal advancement or interagency rivalry. In such
cases, and for a short time, secrecy may be an effective tactic. The
general belief that there is strength in secrecy rests partially on
its short-term successes. If we had entered WWII with a well-developed
secrecy system and the corruption which would have developed with
time, I am convinced that the results would have been quite different.</p>
<p><ent type='ORG'>Secrecy</ent> Exacerbates Divisiveness: <ent type='ORG'>the SDI</ent> Example</p>
<p>Reagan's <ent type='ORG'>Executive Order</ent>, previously referred to, provides another
clue to the power of openness. The preamble states;</p>
<p>It [this order] recognizes that it is essential that the public be
informed concerning the activities of its <ent type='ORG'>Government</ent>, but that the
interests of <ent type='GPE'>the United States</ent> and its citizens require that certain
information concerning the national defense and foreign relations be
protected against unauthorized disclosure.</p>
<p>The tension in this statement is not resolved in the order. It may be
informative to attempt a resolution by considering a concrete example,
namely the Strategic Defense Initiative. SDI symbolizes one of the
conflicts, clearly exacerbated by secrecy, which currently divide us.</p>
<p>I would assert that there are unilateral steps toward openness which
we could take, and which would leave us more unified and stronger,
even if no reciprocal steps were taken by the <ent type='NORP'>Soviets</ent>. I propose that
we start unclassified research programs designed to provide scientific
information needed for making public policy. If these programs are
uncoupled from classified programs, their emphases would not
compromise classified information. Their purpose would be to provide a
knowledge base for public policy discussions. These programs would not
reveal the decisions taken secretly, but a public knowledge base would
reduce the debilitating divisiveness fostered by secrecy.</p>
<p>The Strategic Defense Initiative provides a classic example of
debilitating divisiveness. Countermeasures to SDI are deeply
classified. The deadly game of countermeasures and
countercountermeasures will probably determine whether SDI is
successful or a large-scale Maginot Line. At the present time,
classification of the countermeasure area trivializes the public
debate to a media battle between opposed authorities offering
conflicting interpretations of secret information.</p>
<p>An example of this game is decoying vs. discrimination. If the offense
can proliferate a multitude of decoys which cannot be discriminated
from warheads by the defense, SDI will not succeed. Knowing a decoy
design would of course make it easier for an adversary to discriminate
it from a warhead. It is therefore very important that such designs be
carefully guarded. On the other hand, maintaining secrecy over the
scientific and engineering research basic to the
decoying-discrimination technology would, for the reasons discussed
earlier, make it much more difficult to provide assurance to the
public that all avenues had been explored. Indeed, a substantial part
of the criticism of the feasibility of SDI turns on the possibility
that an adversary would invent a countermeasure for which we would be
unprepared.</p>
<p>The Cryptography Case: Uncoupled Open Programs</p>
<p>We can learn something about the efficiency of secret vs. open
programs in peacetime from the objections raised by Adm. Bobby R.
Inman, former director of the <ent type='ORG'>National Security</ent> Agency, to open
programs in cryptography. <ent type='ORG'>NSA</ent>, which is a very large and very secret
agency, claimed that open programs conducted by a handful of
<ent type='GPE'>matheticians</ent> around the world, who had no access to <ent type='ORG'>NSA</ent> secrets, would
reveal to other countries that their codes were insecure and that such
research might lead to codes that even <ent type='ORG'>NSA</ent> could not break. These
objections exhibit <ent type='ORG'>NSA</ent>'s assessment that the best secret efforts, that
other countries could mount, would miss techniques which would be
revealed by even a small open uncoupled program. If this is true for
other countries is it not possible that it also applies to us?</p>
<p>Inman (1985) asserted that "There is an overlap between technical
information and national security which inevitably produces tension.
This tension results from the scientists' desire for unrestrained
research and publication on the one hand, and the Federal <ent type='ORG'>Government</ent>'s
need to protect certain information from potential foreign adversaries
who might use that information against this nation.</p>
<p>I would assert that uncoupled open programs (<ent type='ORG'>UOP</ent>) in cryptography make
<ent type='GPE'>America</ent> stronger. They provide early warning of the capabilities an
adversary might have in breaking our codes. There are many instances
where secret bureaucracies have disastrously overestimated the
invulnerability of their codes. In this case I see no tension between
the national interest and openness. The cryptographers have provided a
fine case study in strengthening the weapon of openness.</p>
<p>Consider then the value of starting unclassified, relatively cheap,
academic research programs uncoupled from the classified programs.
These <ent type='ORG'>UOP</ent> could provide the more solid information on countermeasures
needed for an informed political decision on SDI, just as the open
cryptography research has taught us something about the security of
our codes. If indeed SDI's critics are right about the opportunities
for the invention of countermeasures, then the <ent type='ORG'>UOP</ent> would provide an
opportunity to make a conclusive case. On the other hand if the open
programs exhibited that SDI could deal with all the countermeasures
suggested and retain its effectiveness, its case would be
strengthened.</p>
<p>These open programs would indeed be shared with the world. They would
strengthen the U.S. even if there were no response from the <ent type='GPE'>USSR</ent> by
reducing corruption by secrecy, by improving our decision making, and
by reducing our divisiveness. Undertaking such programs would exhibit
our commitment to strengthening the weapon of openness. Making that
commitment would enable <ent type='NORP'>democratic</ent> control of military technology.
More openness, reducing suspicions in areas where <ent type='GPE'>America</ent>ns are
divided, will do more to increase our military strength by unifying
the country and its allies than it could possibly do to increase the
military strength of its enemies.</p>
<p><ent type='ORG'>The Weapon</ent> of <ent type='ORG'>Openness</ent> and the Future</p>
<p>Bohr's phrase which was the keynote of this article was invented in an
effort to adapt to the demands for social change required to live with
advancing military technology. Unfortunately Bohr's effort, to
persuade FDR and Churchhill of the desirability of more openness in
living with nuclear weapons, was a complete failure. There can be no
doubt that the future will bring even more rapid rates of progress in
science-based technology. Let's just mention three possibilities,
noting that these are only foreseeable developments and that there
will be surprises which, if the past is any guide, will be still more
important.</p>
<p><ent type='ORG'>Artificial Intelligence</ent> is advancing, driven by its enormous economic
potential and its challenge in understanding brain function.</p>
<p>Molecular biology and genetic engineering are creating powers beyond
our ability to forecast limits.</p>
<p><ent type='ORG'>Feynman</ent> some years ago wrote a paper entitled "There's Plenty of Room
at the Bottom" pointing out that miniaturization could aspire to the
huge advances possible with the controlled assembly of individual
atoms. When the possibility of the construction of assemblers which
could reproduce themselves was added by Eric Drexler in his book
Engines of Creation, a very large expansion of the opportunities in
atomic scale assembly were opened up. This pursuit, today known as
nanotechnology, will also be driven by the enormous advantages it
affords for health and for human welfare.</p>
<p>But each of these has possible military uses comparable in impact to
that of nuclear weapons. With the aid of the openness provided by
satellites and arms control treaties, we have been able to live with
nuclear weapons. We will need much more openness to live with the
science-based technologies that lie ahead.</p>
<p>Dr. <ent type='ORG'>Kantrowitz</ent> is a professor at <ent type='ORG'>the Thayer School</ent> of Engineering at
<ent type='ORG'>Dartmouth</ent>, and former Chairman of Avco-Everett Research Lab. He
serves as an Advisor to <ent type='ORG'>the Foresight Institute</ent>.
</p></xml>

View File

@ -0,0 +1,191 @@
<xml><p>
The War and Peace Digest is a bimonthly international newsletter on issues
of disarmament, government secrecy, media accountability, the nuclear
threat (from both civilian power plants and the military weapons complex),
ecological destruction, and peaceful conflict resolution through the
structures of the <ent type='ORG'>United Nations</ent>. If you would like to be placed on our
mailing list or receive a copy of our new information packet on nuclear
power, contact Matthew Freedman at 32 Union Square East, <ent type='GPE'>New York</ent>, NY
10003-3295 (Tel: 212-777-6626).
Contributions are always welcome. All materials may be reproduced without
permission.
--------------------
<ent type='ORG'>BNL</ent> - IRAQGATE SCANDAL
The <ent type='GPE'>Chicago</ent> Connection - Bush &amp; <ent type='ORG'>Saddam Inc</ent>.
Key documents - sought by Gonzalez - withheld
With George Bush ready to take <ent type='GPE'>America</ent> into another war with <ent type='GPE'>Iraq</ent> to
destroy the nuclear, chemical, biological and missiles weapons that Bush
himself helped Saddam Hussein to build, <ent type='ORG'>Congress</ent>men Henry Gonzalez, the
courageous <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who heads <ent type='ORG'>the House Banking Committee</ent>, continues,
single-handedly, to peel back layer after layer of cover-up to reveal the
monumental proportions of the <ent type='GPE'>Iraq</ent>gate-<ent type='ORG'>BNL</ent> (<ent type='ORG'>Banca Nazionale Del Lavoro</ent>)
scandal that now threatens to bring down the Bush regime. But the most
explosive documents have been withheld.
Over the past several months Gonzalez has shown the <ent type='GPE'>Iraq</ent>gate-
<ent type='ORG'>BNL</ent> scandal to be bigger than anyone had imagined. He has uncovered and
reported incontestable evidence that Bush and his associates secretly sold
nuclear, biological, chemical and missile-related weapons materials to
Saddam Hussein; blocked investigations into the use of such materials by
Hussein; suppressed memos warning of the dangers of such sales;
deliberately falsified documents on such sales submitted to <ent type='ORG'>Congress</ent> and
interfered illegally to halt investigations into the criminal activities of
the <ent type='ORG'>BNL</ent> bank in secretly diverting <ent type='GPE'>America</ent>n agricultural loans to buy the
weapons for Hussein.
<ent type='ORG'>BNL</ent>-<ent type='ORG'>BCCI</ent> <ent type='GPE'>Chicago</ent> Branches
Gonzalez has revealed a Bush policy disaster that lead to the first
<ent type='LOC'>Gulf</ent> War and a blunder that is now costing the <ent type='GPE'>America</ent>ns $2 billion to pay
off the loans Bush guaranteed with U.S. taxpayersU money . Bush repeatedly
ignored warnings that <ent type='GPE'>Iraq</ent> would default on the loans. Now, certain key
documents - perhaps the most revealing yet - are being withheld from the
Gonzalez investigation. They are said to be the records of the <ent type='GPE'>Chicago</ent>
branches of <ent type='ORG'>BNL</ent> and <ent type='ORG'>BCCI</ent> (Bank of Credit and Commerce International),
through which, some investigators say , George Bush and Saddam Hussein may
have been involved in a joint, private enterprise to skim oil profits
arising from Reagan-Bush policies toward <ent type='GPE'>Iraq</ent>. The documents have been
impounded by a <ent type='GPE'>Chicago</ent> court and <ent type='ORG'>Congress</ent>man Gonzalez <ent type='ORG'>Banking Committee</ent>
has been denied access.
Bush's <ent type='ORG'>Pennzoil</ent> Profits
Between 1980 and 1990 the <ent type='LOC'>Gulf</ent> region exported a trillion dollars
worth of oil to the West. Hundreds of billions of dollars in kickbacks were
involved. Some of the kickbacks were said to be handled by the <ent type='ORG'>BNL</ent>/<ent type='ORG'>BCCI</ent>
banks for <ent type='ORG'>Pennzoil</ent>, an oil company founded by George Bush The <ent type='ORG'>Pennzoil</ent>
case was (is?) the target of Ross PerotUs much-denied investigation of the
Bush family and friends. Investigators believe the <ent type='GPE'>Chicago</ent> bank records
could help explain BushUs massive, covert military support for <ent type='GPE'>Iraq</ent> in the
years between 1981-1990.
The <ent type='GPE'>Chicago</ent> <ent type='ORG'>BNL</ent> /<ent type='ORG'>BCCI</ent> records could also provide clues to why the
Bush Administration secretly - and possibly illegally - exempted eleven
members of the Bush cabinet from conflict of interest restrictions in their
handling of the <ent type='LOC'>Gulf</ent> war policy. Bush simply declared that the law
regarding conflict of interest would cease to apply to his advisors on the
<ent type='LOC'>Gulf</ent> war policy. He then ordered that his declaration would be not be made
public. <ent type='ORG'>Congress</ent>man Gonzalez is now asking Bush to explain the deal. Bush
has not responded.
According to some investigators, the <ent type='ORG'>BNL</ent>-<ent type='ORG'>BCCI</ent> bank documents
now impounded by a <ent type='GPE'>Chicago</ent> judge could shed light not only on the
<ent type='GPE'>Iraq</ent>gate case, but on other illegal transactions including <ent type='GPE'>Iran</ent>-Contra,
October Surprise and the Inslaw case. In all instances monies passed
through the <ent type='ORG'>BNL</ent>/<ent type='ORG'>BCCI</ent> banking network.
<ent type='ORG'>BNL</ent> is an <ent type='NORP'>Italian</ent> bank now under investigation by <ent type='ORG'>Congress</ent> for
fraud in using loans from the U.S. Department of Agriculture to finance
<ent type='GPE'>Iraq</ent>Us pre-war military buildup. Over the past thirty years, <ent type='ORG'>BNL</ent> is
suspected of involvement in a wide range of international criminal
activities. (<ent type='ORG'>French Intelligence</ent> investigators have even linked the bank to
large payments to certain individuals in <ent type='LOC'>Europe</ent> in late 1963, thought to be
associated with the John Kennedy assassination.)
On December 28th 1990, when Gonzalez sought the records of the
<ent type='GPE'>Chicago</ent> branch of <ent type='ORG'>BNL</ent> (Case number 90 C 6863 of the U.S. District Court in
<ent type='GPE'>Chicago</ent>: People of the <ent type='ORG'>State</ent> of Illinois ex re; William C. Harris v. the
Board of Governors of <ent type='ORG'>the Federal Reserve System</ent>), Gonzalez was told by
Federal Judge, Brian Duff that he could not have them. Duff, a friend of
both Bush and Reagan, works closely with <ent type='ORG'>the Federal Reserve Bank</ent>. Duff
impounded the documents and abused GonzalezU attorney for Rbehaving like an
800 -pound gorilla.S That is when Duff impounded the records.
Questions abound. Suspicions arise from the fact that among
officials involved in the <ent type='ORG'>BNL</ent> bank is Brent Scowcroft, BushUs National
Security advisor who, Gonzalez has now revealed, maintained a million-
dollar financial interest in 40 of the biggest U.S. weapons companies that
profited from U.S. policies toward <ent type='GPE'>Iraq</ent>, including <ent type='ORG'>General Electric</ent>,
<ent type='ORG'>General Motors</ent>, <ent type='ORG'>ITT</ent>, and <ent type='ORG'>Lockheed</ent>. Gonzalez has also revealed that
Assistant Secretary of <ent type='ORG'>State</ent> Laurence Eagleberger worked closely with <ent type='ORG'>BNL</ent>
when he and Scowcroft were part of Henry KissingerUs consulting firm.
Kissinger was a member of the board of <ent type='ORG'>BNL</ent> and his firm represents <ent type='ORG'>BNL</ent> in
the <ent type='GPE'>USA</ent>.
<ent type='ORG'>BNL</ent>, P2 and <ent type='ORG'>the Vatican Bank</ent>
The <ent type='ORG'>BNL</ent> bank was also used for secret arms trade by the outlawed P2
<ent type='ORG'>Masonic Lodge</ent> of <ent type='GPE'>Rome</ent>, whose Grandmaster, Licio Gelli is thought to have
been the mastermind behind <ent type='ORG'>BNL</ent>Us illegal, world-wide banking strategies,
until his arrest in 1981, for embezzling $1.5 billion from the Vatican
Bank. The <ent type='ORG'>Vatican Bank</ent> had close ties with <ent type='ORG'>BNL</ent>. Gelli was recently
sentenced to 18 years in jail for his role in the case.
Gelli was involved with the PopeUs banker and bodyguard, Bishop
Marcinkus (formerly of <ent type='GPE'>Chicago</ent>) in <ent type='ORG'>the Vatican Bank</ent> embezzlement. When the
<ent type='NORP'>Italian</ent> government issued a warrant for the BishopUs arrest they were
blocked by the Vatican, which claims separate city-state authority. (The
Pope is still closely involved with Marcinkus and <ent type='ORG'>the Vatican Bank</ent> is still
closely associated with <ent type='ORG'>BNL</ent>.)
Bush and Gelli are friends. Gelli was guest of honor at the 1981
Reagan-Bush inaugural ball. (N.Y. <ent type='ORG'>Times</ent>, June 4, 1981, page 7.) Kissinger
also knew Gelli. When Gelli was arrested in March, 1981, Kissinger
immediately sent an agent to <ent type='GPE'>Rome</ent> with $18000 to try to buy some of the
documents in the P2 case to keep them from becoming public ( In These
<ent type='ORG'>Times</ent>, Sept. 1982). It may be of interest that P2 had a lodge in <ent type='GPE'>Chicago</ent>.
<ent type='GPE'>Chicago</ent>, it is now emerging, has been the central point for vast,
international, illegal transactions involving the <ent type='ORG'>BNL</ent> and <ent type='ORG'>BCCI</ent> banks and
secret deals with <ent type='GPE'>America</ent>n oil companies, military manufacturers, the <ent type='ORG'>CIA</ent>,
and possibly U.S. politicians. (According to a <ent type='GPE'>London</ent> source, unreleased
<ent type='ORG'>BCCI</ent> documents in the possession of <ent type='ORG'>the Bank</ent> of <ent type='GPE'>London</ent> list the names of
at least 105 members of U.S. <ent type='ORG'>Congress</ent> - of both <ent type='ORG'>Houses</ent> and both parties -
who have received money through the <ent type='GPE'>Chicago</ent> branch of <ent type='ORG'>BCCI</ent>. The U.S.
<ent type='ORG'>Federal Reserve</ent> is said to have a copy of the same secret <ent type='ORG'>BCCI</ent> list).
The Octopus
Just as the P2 scandal in <ent type='GPE'>Italy</ent> brought down the government and
destroyed hundred of careers in politics, industry and banking, so too the
<ent type='ORG'>BNL</ent>/<ent type='ORG'>BCCI</ent> - Penzzoil case could bring down the Bush administration and send
dozens of top administration officials to jail. Indeed the P2 and <ent type='ORG'>BNL</ent> cases
overlap in the October Surprise case, and U.S. investigators would do well
to examine the <ent type='NORP'>Italian</ent> government documents in the P2 case as part of their
inquiry into the October Surprise/<ent type='ORG'>BNL</ent>/<ent type='ORG'>BCCI</ent>/Penzzoil/Bush/Hussein links. It
is beginning to look as though the late journalist, Danny Casselaro was on
the right track at the time of his highly suspicious RsuicideS last year,
when he was investigating what he called <ent type='ORG'>RThe</ent> OctopusS, a vast,
interlocking, international criminal conspiracy.
Bush's Watergate
<ent type='ORG'>Congress</ent> is now calling for the appointment of a Special Prosecutor
to investigate the ballooning <ent type='ORG'>BNL</ent>-<ent type='GPE'>Iraq</ent>gate case. In his insightful and
relentless reporting on the case in The <ent type='GPE'>New York</ent> <ent type='ORG'>Times</ent>, William Safire says
flatly that <ent type='ORG'>BNL</ent> will be BushUs Watergate. Saffire is now investigating the
<ent type='GPE'>Chicago</ent> link to the case. (Updates on the case now appear regularly on the
recorded telephone hotlines of controversial <ent type='GPE'>Chicago</ent> investigator, Sherman
Scholnick of <ent type='ORG'>the RCommittee</ent> to Clean Up the CourtsS, who has spearheaded
his own investigation. Call: 312 - 731 1100 &amp; 312- 731 1505 for five-
minute recorded updates.)
When appointed, the Special Prosecutor in the <ent type='ORG'>BNL</ent>/<ent type='GPE'>Iraq</ent>gate case
should have immediate access to all the records, including the crucial
documents now confiscated and impounded by the <ent type='GPE'>Chicago</ent> court.
When the truth of the <ent type='ORG'>BNL</ent> case is finally revealed, the War &amp;
Peace foundation believes we will see the extent to which politics around
the world
have been corrupted by the arms trade. <ent type='GPE'>Iraq</ent>gate will serve as further
evidence of the need for international monitoring by the <ent type='ORG'>United Nations</ent> of
all weapons traffic as a first, essential step toward complete world
disarmament.
Ironically, as we go to press, joint efforts by both houses of
<ent type='ORG'>Congress</ent> in the wake of the <ent type='GPE'>Iraq</ent>gate revelations to tighten restrictions on
the sale of nuclear weapons-related materials to nations like <ent type='GPE'>Iraq</ent>, <ent type='GPE'>Iran</ent>
and <ent type='GPE'>Syria</ent>, have provoked a threat of veto by George Bush, who argues that
such non- proliferation legislation would mean a loss of business for
<ent type='GPE'>America</ent>n nuclear exporters!
** End of text from <ent type='ORG'>cdp</ent>:gen.newsletter **
</p></xml>

View File

@ -0,0 +1,54 @@
<xml><p>THE <ent type='ORG'>BOHEMIAN</ent> CLUB</p>
<p> For two and a half weeks every July, two thousand of the top
movers and shakers in business and government attend the <ent type='NORP'>Bohemian</ent>
Club's summer encampment. Although highly selective, the club has
a national membership and is among the most prestigious of
affiliations in neoconservative circles. Its membership is known
to include Ronald Reagan, George Bush, Gerald Ford, William F.
Buckley, Jr., Frank Borman, Justin Dart, William Randolph Hearst,
Jr., Caspar Weinberger, Charles Percy, George Schultz, Edward
Teller, Merv Griffin, and a large proportion of the directors and
chief executive officers of the Fortune 1000. Daniel Ludwig, the
richest private citizen on earth, is a <ent type='NORP'>Bohemian</ent>. Conspiracy nuts
think <ent type='ORG'>the Bohemian Club</ent> meets each summer to plot to take over the
world. These guys ALREADY run the world.
The club's name harkens back to its founding in 1872 by
artists and journalists in <ent type='LOC'>the Bay Area</ent>; the club proper is at 624
Taylor Street in <ent type='GPE'>San Francisco</ent>. The annual summer camp is held at
"<ent type='NORP'>Bohemian</ent> <ent type='ORG'>Grove</ent>," an isolated site in <ent type='GPE'>Sonoma County</ent>, <ent type='GPE'>California</ent>,
near the town of <ent type='GPE'>Monte Rio</ent>. To get there, you cross the bridge
over <ent type='LOC'>the Russian River</ent> and take the second left.
Signs warn off trespassers, and the <ent type='ORG'>Grove</ent> is guarded during
the encampment. Visitors must have invitations and sign in and
out; cooks and other workers have to wear ID badges. The club (and
hired staff) is all male. There are no black <ent type='NORP'>Bohemian</ent>s and just
one <ent type='NORP'>Asian</ent>; the former <ent type='NORP'>Philippine</ent> president Carlos Romulo.
The club does a good job of avoiding publicity, although in
1980 Rick Clogher, a writer for <ent type='ORG'>MOTHER JONES</ent> magazine, managed to
slip in to the encampment for four days with the help of an
unidentified insider. Brooding over the <ent type='ORG'>Grove</ent> is a giant rock that
looks like an owl. Clogher discovered that the rock is concrete,
covered with moss to look natural. <ent type='ORG'>The Cremation</ent> of Care ritual
takes place in front of the owl when, on the first night of camp,
robed members burn a doll representing <ent type='ORG'>Dull Care</ent>.
<ent type='NORP'>Bohemian</ent> <ent type='ORG'>Grove</ent> includes 122 distinct camps in its 2700
acres. The camps have whimsical names such as <ent type='ORG'>Whiskey Flat</ent>,
Toyland, Owl's Nest, Hill Billies, and Cave Man's, and each one
has its own kitchen-bar building -- there is a lot of drinking --
and sleeping quarters. The members of some camps sleep in tents;
other camps have redwood cabins. Daily "Lakeside Talks" on
geopolitical topics are given by prominent speakers, both members
and non-members. It is claimed that Richard Nixon and Ronald
Reagan conferred during the 1967 encampment, Reagan agreeing not
to challenge Nixon for the presidential nomination.
The highlight of camp is the <ent type='ORG'>Grove</ent> play, which is written
exclusively for the club. All the female roles are played by men
in drag. The 1980 play was an adaptation of the <ent type='NORP'>Greek</ent> myth of
Cronus and Zeus supplemented with fireworks, smoke bombs, and a
light show. (One can only wonder if Reagan ever starred in a <ent type='ORG'>Grove</ent>
play. He certainly has more acting experience than most club
members.) The polished productions cost the <ent type='NORP'>Bohemian</ent>s as much as
$25000 -- for one performance.</p>
<p> xperience than most </p></xml>

View File

@ -0,0 +1,545 @@
<xml><p>Path: uuwest!spies!apple!usc!samsung!uunet!isis!jsanders
From: jsanders@isis.cs.du.edu (Jim Sanders)
Newsgroups: alt.conspiracy
Subject: BOOK FILE! PROVES <ent type='ORG'>CIA</ent>-MOB-OIL-DRUG-MURDER WORLD CONSPIRACY!!!!
<info type="Message-ID"> 1991Jan21.054207.6954@isis.cs.du.edu</info>
Date: 21 Jan 91 05:42:07 GMT
Reply-To: jsanders@isis.<ent type='ORG'>UUCP</ent> (Jim Sanders)
Organization: Math/CS, University of <ent type='GPE'>Denver</ent>
Lines: 534</p>
<p>HERE IT IS -&gt; ********** THE BOOK FILE ***************</p>
<p><ent type='ORG'>THE SUPER RADICAL FILE</ent> THAT USES REAL SOURCES TO DOCUMENT THE
<ent type='ORG'>CIA</ent>/BUXH/MOB/<ent type='NORP'>ILLUMINATI</ent>/OIL CO LINKS TO RAPE AND STEAL FROM WE THE PEOPLE!!!</p>
<p>A KILLER COMPANION FILE TO THIS ONE IS THE OPAL FILE - WHICH WAS POSTED TO
ALT.CONSPIRACY ON 1/10/91 AND AGAIN ON APPX 1/21/91.
PLEASE CROSS POST THESE FILES ON YOUR LOCAL SSYSTEM NEWS FOR ALL TO SEE THE
TRUTH BEHIND WHY WE MUST NOW DIE FOR THE SEVEN SISTERS(THE OIL COMPANIES).</p>
<p>TABLE OR CONTENTS:
PARTI=LAWYERS/KILLER BOOKS,PARTII=MOB BOOK,PARTIII=DEA BOOK,PARTIV=<ent type='NORP'>ILLUMINATI</ent>.</p>
<p>PART I:</p>
<p>LAWYERS/<ent type='ORG'>CIA</ent>/MOB/BUSH -----&gt; RAPE/MURDER/DRUG SMUGGLE/STEAL </p>
<p>Part A:</p>
<p>Lawyers have amassed into a worldwide coalition to dominate the world in the
tradition of <ent type='ORG'>the <ent type='GPE'>Bavaria</ent>n <ent type='ORG'>Illuminati</ent></ent>. Back in the 1800's they managed to gain
control of <ent type='NORP'>Amerika</ent> by planting their seeds in the Executive, Legislative, and
<ent type='ORG'>Judicial</ent> branch of U.S. Now separation of powers of the 3 branches exists only
on the hemp paper the Constitution was written on. Oh, and they managed to make
hemp illegal because their buddies own chemical and logging industries that
hemp paper was and can put out of business because it grows 20 times faster,
makes better paper, and needs fewer chemicals to process into paper! They
turned U.S. politics into a morbid game for money. In 1700's our founders
warned us of political parties and hired farmers for presidents who did not use
<ent type='ORG'>CIA</ent> hitmen to topple foreign regimes for private business concerns. (Bush's
international construction company builds oil refineries in <ent type='GPE'>Saudi Arabia</ent>!*!*!)
Big brother is nothing more than a four eyed wimp called George with a
lust for megabucks. Death to all who oppose the villain - ex-head of the <ent type='ORG'>CIA</ent> -
turned US Pres! But he made a terrible mistake. He called a war on drugs,but
his <ent type='ORG'>CIA</ent> has imported Heroin from <ent type='LOC'>Asia</ent> for half a century and brought Coke into
the US on <ent type='LOC'>Air</ent> <ent type='NORP'>Amerika</ent> planes coming back from <ent type='ORG'>Contra Arms</ent> deliveries in Central
<ent type='NORP'>Amerika</ent>!</p>
<p>IMPEACH BUSH NOW - HE'S A DOPE DEALER BETTER YET HANG HIM HIGH FOR TREASON for
working in the Cia when they killed Kennedy so they could escalate the Viet
Nam War and sell heroin to soldiers and JP4 fuel and military jets/helicopters
to U.S. TAXPAYERS! </p>
<p>**** SEND THIS TO YOUR FRIENDS AND CONGRESSMAN/WOMAN AND TELL HER/HIM YOU WANT
BUSH IMPEACHED TODAY AND NO EXCUSES !!!
BESIDES, QUALE WOULD HAVE TROUBLE ESCALATING A BAR FIGHT BY DIALING 911
- HE COULDN'T START A WAR!!!
(MANY UNCONFIRMED THEORIES FORMULATE THAT IF BUSH WERE TO LOSE HIS LIFE OR GET
ROUND FILED, THE <ent type='ORG'>CIA</ent> WOULD HAVE TO ASSASINATE QUALE)
______________________________________________
| |
| WHAT FOLLOWS ARE EXPLANATIONS AND SOURCES: |
|______________________________________________|</p>
<p>Part B:(Some facts and logical conclusions about lawyers)</p>
<p> "AN AMERICAN TYRANNY,"
by David C. Morrow:</p>
<p>LAWYERS MAKE THE LAWS, JUDGE THE LAWS, BREAK THE LAWS, <ent type='GPE'>FUDGE</ent> THE LAWS
----------------&gt; SHOULDN'T THIS CHANGE?
Slave owners often helped themselves to their female property and medieval
lords showed their ability to dominate and degrade by having serfs' brides
spend their wedding nights with them and not the grooms.
<ent type='ORG'>The California State Bar</ent>'s <ent type='ORG'>Standing Committee</ent> on Professional Responsibility
and Conduct has recently decided that "a lawyer-client sexual relationship"
does not impair the lawyer's ability "to competently perform the legal services
required."
"A ban on any sexual relationship with a client," the gentlemen of the Bar
concluded, "appears overly broad and unnecessary." Like the Alaska Bar
Asso<ent type='ORG'>cia</ent>tion and, a few years ago, its <ent type='GPE'>Oregon</ent> counterpart, they ruled it
perfectly fine for lawyers to have sex with women (or men) they represent.
Much criticism of lawyers has come from men trying to reform divorce laws
that give wives at least half a man's property, most of his future income, and
child support without enforced visitation. The accusation is that attorneys,
in legislative offices deliberately make laws that bribe women to divorce in
order to generate cases and that judges, themselves lawyers, assign custody to
women because of evidence showing that maternal more than paternal custody
results in juvenile delinquency. That divorcees may not enjoy as high a living
standard as they anticipate is of no concern to the lawyers.
While these observations can be supported by findings of such established
researchers as <ent type='ORG'>the Kettering Foundation</ent> and the <ent type='ORG'>FBI Crime</ent> report, there are
broader implications.
<ent type='GPE'>Minnesotan</ent> R. F. Doyle, while researching the law's abuse of marriage, came
across a telling article in the September 17, 1975 "<ent type='ORG'>Philadelphia Inquirer</ent>".
Participants in a <ent type='ORG'>Philadelphia Bar Association</ent> meeting voted against marijuana
decriminalization. No health reasons were cited; instead the prominent attorney
A. Charles Peruto said that lawyers needed marijuana cases for personal profit.
One need but recall how prostitution, pornography, and other vices are usually
tolerated except during election year when incumbents need to demonstrate their
"effectiveness" and raise extra revenues while scratching one another's backs.
More recently, victims of violent crimes by repeat offenders have begun to
speak out against lenient judges and parole boards who do not keep dangerous
offenders locked up. Each retrial means money for lawyers, judges and a host of
court employees, and who better to guarantee retrials than habitual criminals?</p>
<p>"<ent type='ORG'>SINCE LAWYERS OCCUPY</ent> ALL BRANCHES OF GOVERNMENT,
THE SEPARATION OF POWER EXISTS ONLY ON PAPER!!!"</p>
<p> To test the lawyer conspiracy theory a few years ago, I sent to various
state legislatures for copies of their statistics. While <ent type='GPE'>Idaho</ent> listed only
eight of 105 legislators as lawyers in 1983, I discovered that in <ent type='GPE'>Wisconsin</ent>,
for example, eleven of thirty-one senators and twelve of ninety-nine
representatives were attorneys. During that time, seventeen of <ent type='GPE'>Alabama</ent>'s
thirty-five senators and eleven of sixty-five representatives were lawyers.
The <ent type='GPE'><ent type='GPE'>New York</ent> <ent type='ORG'>State</ent></ent> legislature was twenty percent lawyers. Governors, as in
<ent type='GPE'>Wisconsin</ent>, frequently proved to be lawyers.
It would seem that since members of the legal fraternity occupy all branches
of government, the separation of powers exists only on paper. This enables them
to generate cases for profit and the public detriment by making unenforceable
laws, encouraging repeat offenders as long as possible, and appealing to greed
to keep families - and thereby society in general - in disorder. Perhaps,
indeed, most of <ent type='GPE'>America</ent>'s problems are due less to mysterious sociological
factors than to sly legal machinations.
In their zeal to publicly approve their own sexual misbehavior, what lawyers
are really doing is, like slave owners or medieval lords, sneering down at the
rest of us from their pinnacle and flaunting their privileges in the most
degrading and insulting manner. They are also engaging in behavior that causes
so<ent type='ORG'>cia</ent>l change, espe<ent type='ORG'>cia</ent>lly change of ruling classes. It is the signal to take
actions to eliminate their tyranny.
We should exclude attorneys from all legislative and executive positions.
<ent type='ORG'>Office</ent> holders can hire or appoint legal advisers. Judges should be elected,
since appointment, espe<ent type='ORG'>cia</ent>lly by professional peers, would be perverted to
favor persons who work to advance their profession and not to secure justice
and so<ent type='ORG'>cia</ent>l stability. Rather than campaigning, judges should have to publish
their decisions and sentences with complete explanations in ordinary language,
and this information alone should be the basis of the voters' decision to
re-elect or turn them out of office. Since they enjoy immunity from prosecution
for wrongful decisions, judges' punishments for crimes committed while in
office should be extremely severe.
With these and other measures that may be found useful, we can enter the next
century with few so<ent type='ORG'>cia</ent>l problems, a very high standard of public morality, and
with crimes violent and victimless under a functional measure of control.</p>
<p>&lt;--<ent type='ORG'>REPRINT</ent> FROM <ent type='ORG'>NOMOS</ent>, Vol. 7, #'s 2 &amp; 3, <ent type='ORG'>Nomos Press</ent>, Inc. 9857 S. Damen Ave.,
Chicago, IL 60643, 1 year subscription of 4 issues costs $15 (Never mail cash)</p>
<p>Part C:(Some more facts about lawyers and Mr. <ent type='ORG'>CIA</ent> dude(G.BUSH!))</p>
<p>In the early 1800's, the professional politi<ent type='ORG'>cia</ent>ns took over this country and
public office went from "A duty and a privilege" to a profession. A
professional politi<ent type='ORG'>cia</ent>n must be a master of words. A lawyer's rhetoric is as
effective as a 357 magnum. Who better to pull off the bloodless coup. Or has it
been blood-less? The civil war devastated the north, the south, and the blacks
had to go to work in polluted northern factories for pennies a day afterwards
(quite handy however for the northern industrial imperialists.) Then the
bluecoats killed off the <ent type='NORP'>Indians</ent> and the buffalo to boot! Then came <ent type='GPE'>Korea</ent>, Nam,
Graneda, <ent type='GPE'>Nicaragua</ent>, <ent type='GPE'>Panama</ent>, El Salvador, <ent type='GPE'>Kuwait</ent>.
Around 1903 a <ent type='GPE'>New York</ent> oil baron had Nikolai <ent type='ORG'>Tesla</ent> thrown out of N.Y.
(<ent type='ORG'>Tesla</ent> was a super inventer of such things as AC current and the <ent type='ORG'>Westinghouse</ent>
electric motor!) It seems <ent type='ORG'>Tesla</ent> had discovered a way to transmit electricity
without wires around NY city! The oilmen knew it would be an end to their
gross profiteering from energy manipulation and tossed Nik outta there!
A book called "The Emperor Wears No Clothes" documents how hemp was
needed to win world wars, but soon after became illegal after oil, logging and
chemical companies realized hemp made better paper with less petro-chemicals
and converted to alcohol easily with extremely high energy per kilo of biomass!
(Cars can run on alcohol just as easily as gas-I know-I raced cars &amp; planes!)
"The Origin of Consciousness In the Breakdown of the Bicameral Mind" by
Dr. Julian Jaynes of <ent type='ORG'>Princeton</ent> U., shows in his book how leaders of the world
have confused us for thousands of years with rhetoric, mysticism, music, &amp;
theology, so as to better manipulate and tax the poor masses.
Then there was the carburetor invented in the 70's that got 100 MPG. All
of a sudden a major U.S. company bought the patent rights to the carb and
locked it away. Think of the pollution we now have that we could have avoided
if a handful of greedy politi<ent type='ORG'>cia</ent>ns and oilmen didn't want all of the excess
wealth their oil businesses have afforded them at the cost of our health!
And Bush is an Oil Refinery Contractor from <ent type='GPE'>Texas</ent>! Remember, the place
where LBJ, Carlos Marcello, and the <ent type='ORG'>CIA</ent> had Kennedy shot. Oh, but Bush was in
the <ent type='ORG'>CIA</ent>! Oh and Bush became the head of the <ent type='ORG'>CIA</ent> - the same folks that killed
JFK to escalate war and drug profits in <ent type='ORG'>NAM</ent>. A book "The politics of Heroin in
South East <ent type='LOC'>Asia</ent>" documents the <ent type='ORG'>CIA</ent>'s selling of narcotics to fund operations.
So does the Book "The <ent type='GPE'>America</ent>n Heroin Empire". HOT NEW BOOK ON DRUGWAR SCAM &amp;
<ent type='ORG'>COUNTERINSUGENCY</ent> IS CALLED "DEEP COVER" BY MICHAEL LEVINE - GET IT NOW!!!!!!!!!
<ent type='ORG'>Garrison</ent>'s book, "On the trail of Assassins" shows how Oswall was indeed also a
<ent type='ORG'>CIA</ent> agent. Lucky for the <ent type='ORG'>CIA</ent> &amp; <ent type='ORG'>FBI</ent> that Oswald died soon after, along with over
a dozen very important witnessess and suspects who perished for unexplainably
weird reasons within a year of JFK's murder. (And David Scheim's book "Contract
On <ent type='GPE'>America</ent>" provides the evidence showing how <ent type='ORG'>Mafia</ent> chiefs like Marcello worked
together with the <ent type='ORG'>CIA</ent> to murder JFK, Robert Kennedy(he prosecuted MOB Bosses
as JFK's Attorney General), Martin Luther King and Malcom X(these two were
begining to expose the facts that the <ent type='ORG'>CIA</ent>/MOB drug dealers were taking all the
money from the poor people they sold narcotics to!))
But Bush wants a drug war? But his <ent type='ORG'>CIA</ent> sells drugs(hard narcotics). Let
us impeach Bush for accessory to a felony to import narcotics(He knew about it)
Or impeach him for accessory to JFK's treasonous murder.(It is supreme high
treason to withhold knowledge of a conspiracy to kill a U.S. President - and
treason carries the death penalty!)
Hoover ran the <ent type='ORG'>FBI</ent> at the time the killing and helped the coverup. Such
twisted justice can be found described in <ent type='ORG'>Turner</ent>'s book, "Hoover's <ent type='ORG'>FBI</ent>."
Ex-<ent type='ORG'>CIA</ent> agents have written books like "The <ent type='ORG'>CIA</ent> File" and "Deadly Deceits" which
further documents the ruthless activities of drug smuggling and crime by
the <ent type='ORG'>CIA</ent> abroad and at home. (U.S. law strictly forbids <ent type='ORG'>CIA</ent> operation in U.S.)
"The Cocaine Wars" explains that the <ent type='ORG'>CIA</ent> now imports South <ent type='GPE'>America</ent>n Cocaine
into U.S. The <ent type='ORG'>Mafia</ent>s do too, but then they also work for the <ent type='ORG'>CIA</ent> in many areas
like drug smuggling, assassinations, and other clandistine, cloak and dagger
dirty work no longer needed in the global world of the nineties!
According to the book "Poisoning for Profit," by <ent type='ORG'>Block</ent> and <ent type='GPE'>Scarpitti</ent>, the
<ent type='ORG'>Mafia</ent>s basically own the nations waste disposal companies and have dumped toxic
waste illegally into U.S. water supplies for decades. If the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>Mafia</ent>
work together, then who is committing crimes against the U.S. now?
I would say that the Bush/Oil/<ent type='ORG'>CIA</ent>/<ent type='ORG'>Mafia</ent> connection poses the most threat
to U.S. national security for choking US with oil pollution in <ent type='LOC'>Air</ent> and Water,
killing our presidents, poisoning our water with toxic waste, and getting our
kids hooked on Smack, Coke and Crack - and all for their love of $.
Hell, these guys make the <ent type='ORG'>KGB</ent> look about as dangerous as a Cub Scout Pack
loaded with water balloons!
But these same guys control the news services too! No one ever hears any
of this. But then no one reads non-fiction books any more either! These books
are all available at a good college or city library to read for free! Just when
<ent type='GPE'>Iraq</ent> grabbed the headlines months ago, the <ent type='ORG'>Gannett news agency</ent> reported in a
small article that mostly <ent type='NORP'>Texans</ent> including G.Bush received over 500000 bucks
from failing S&amp;L's. Great smokescreen(sandscreen) George! </p>
<p> Oh, and Bush is a life member of the "Skull and Crossbones Club" which is
the <ent type='GPE'>America</ent>n equivalent of <ent type='ORG'>the <ent type='GPE'>Bavaria</ent>n <ent type='ORG'>Illuminati</ent></ent> - the motto of which falls
along the lines of "secrecy or death!" These secret sects were formed by
Lawyers as far back as 1776 to dominate, manipulate and tax the masses!</p>
<p>Part D(Conclusion:)
We the people could all have 2 day work weeks if $.60 out of every $1.00 we
spend did not pay for energy costs they have assessed us soley for their own
gains-this alone is multiple felony counts of interstate fraud/mail fraud by
Bush &amp; Company. (<ent type='ORG'>CIA</ent>, &amp; Logging, Oil, Chemical &amp; Finan<ent type='ORG'>cia</ent>l Industries!)
I propose a new order, not of imperfect, selfish, egotistical humans, but of
and through microprocessors. These machines would not rule the world as most
would expect, but would just aid in applying logic to the production of
solutions to the race's survival.
Data on natural resources, human resources, pollution, et cetera, would be
inputed into a program written in Basic language, open to anyone's inspection,
that would give a committee of non-lawyers/oilmen logical options to take in
handling the affairs of the people. Data input into the Basic interpreter by
the committee would be available to all citizens to duplicate and certify the
committees results.
If the program can be run on anyone's PC, then everyone with a PC could
verify the results the committee obtained so as to make sure that the committee
was not exceeding its own authority. The committee would have to post input
data in newspapers for each problem entered, to allow citizens to duplicate the
committee's findings. If the committee obtained results that differed with the
people's results, the committee would be subject to an audit of their hardware
and software systems until the reason was determined that they obtained
different solutions. This would eliminate the possibility for a virus to be
injected into their system and would eliminate the criminal elements from
tampering with our government for their own personal gains!
With such a system, we no longer would have the personal conflicts of
interest that we presently have with our leaders who are so economically tied
to world events and whose "solutions" are now tainted by such events.</p>
<div>---</div>
<p>PART II:</p>
<p>HOW POLITI<ent type='ORG'>CIA</ent>NS/ILLUNINATI USE MAFIAS TO DO THERE DIRTY WORK:</p>
<p>"CONTRACT ON AMERICA" =superexpose on mob/<ent type='ORG'>cia</ent>/illuminati JFK,King,Malcm X hits!</p>
<p>Well go to a good bookstore and aquire the book "Contract On <ent type='GPE'>America</ent>" by
David E Scheim. Paperback versions have 624 pages and cost 4.95 US bux.
This is probably the best single source on "the conspiracy" by our governent
to work with the Mob to take over the U.S.A. and run it for their personal
profit.</p>
<p>Chapter 21 "More Assassinations"
Documents how the Mob killed Martin Luther/Malcom X because the two had
begun to expose how much the Mob profitted off of ghetto Blacks by
selling drugs to the poor People!</p>
<p>Chapter 22 "Richard Nixon and the Mob."
This chapter documents a multitude of conections between Nixon and
the Mob/Hoffa/Teamsters/and relatives of such.
(in my opinion, Nixon was one of the fuckin greasyest, slimyest, scum
buckets who pretended to work for the People as a "politi<ent type='ORG'>cia</ent>n" -
- next to Rea-gun and Bush-wacker of course!)</p>
<p>Chapter 23 "The Reagan Administration"</p>
<p>Obviously deals with <ent type='ORG'>CIA</ent>/Mob connections that Reagan and his cronies like
G.Bush had in those 8 years of blood sucking!</p>
<p>And now for a quote from page 257 of "Contract On <ent type='GPE'>America</ent>" (read it and weep)</p>
<p> "Organized crime involves itself in the life of every single human being.
It causes prices to be raised; it affects your pocketbook when you go to a
laundry or dry cleaner; the price you pay for food in the market. I have
been involved in and know of bad meat being purchased, unfit for human
consumption, that has been converted into salami in <ent type='GPE'>delicatessens</ent> and
forced to be sold through grocery stores...
When I testified about Mr DeCarlo, I, too, had the native feel of what
organized crime was.
I saw photographs of graves dug in <ent type='GPE'>New Jersey</ent>, with over 35 bodies over
a period of years, melted with lye. I sat and heard the voices at dinner
talking over murdering a 12-year-old child and burying bodies in <ent type='GPE'>New Jersey</ent>...
<ent type='ORG'>Narcotics</ent>, manipulation of businesses that cause prices to spiral, we can
go on for a long, long time. . . .It goes on and on.</p>
<p> Mob defector Gerald Zelmanowitz, testifying
in 1973 before a U.S. <ent type='ORG'>Senate</ent> committee"</p>
<p>BUSH &amp; THE MOB:</p>
<p>page 594 states "Gelli is also "very well aquainted with Vice-President-Bush."
(in Mobese this translates to "the two fuckin worked together")</p>
<p>page367 states "On August 2, 1980, as resort-bound <ent type='NORP'>Italian</ent> and foreign tourists
crowded <ent type='GPE'>Italy</ent>'s <ent type='GPE'>Bologna</ent> R.R. station, a massive bomb ripped through a waiting
room. The explosion left 85 dead and 200 others injured. It was the worst
terrorist strike in postwar <ent type='LOC'>Europe</ent>....
....Another defendent in the pending trial(on the bombing) is P2
grandmaster Licio Gelli, now a fugitive believed to be hiding in S <ent type='NORP'>Amerika</ent>.
In 1981, shortly before fleeing multiple criminal indictments, Gelli had
been an honored guest at Reagan's inaugural ball...
...when police raided Gelli's villa in 1981...they found an exchange of
letters between Gelli and Guarino discussing ways to help "our brother
Michele," refering to Sindona, another P2 member. Sindona, who had curried the
<ent type='NORP'>Italian</ent>-<ent type='GPE'>America</ent>n vote for Nixon as Guarino did for Reagan, was then on trial
in <ent type='GPE'>New York</ent>. Gelli also wrote a letter of support to Reagan offering to ensure
favorable coverage for him in the <ent type='NORP'>Italian</ent> press. The powerful <ent type='NORP'>Italian</ent> used his
infuence in a major publishing empire to do exactly that....
....the president(Reagan-Bush) has countenanced the use of unsavory
partnerships and methods to further a political agenda. Moreover, two policy
developments of his presidency find disturbing counterparts in Mob ideology and
perhaps reflect traces of the Mob's insidious, post-assassination influence on:
1) A classic mob scam is to assume control of a thriving business and drain
its wealth through massive loans based on its previoously good fina<ent type='ORG'>cia</ent>l
standing. During Reagan's 2 terms, <ent type='NORP'>Amerika</ent>ns have been steered along in an orgy
of consumption that has tripled the national debt from $645 billion to
$2 trillion and turned the world's largest creditor nation into the world's
largest debtor.
2) Organized crime's "ultimate solution to everything is to kill somebody,"
as one defector observed. During the early years of Reagan's presidency,
military force became the prime instrument of U.S. foreign policy. Patterned
after a percieved <ent type='NORP'>Soviet</ent> menace and financed by the ballooning deficit, the
biggest peacetime weapons buildup in U.S. history was conducted. This obsessive
reliance on weaponry was no better exhibited than in the 1985 covert U.S. arms
sale to <ent type='GPE'>Iran</ent> - obstensibly a good-will gesture - while that nation was known
to be sponsoring terrorism against <ent type='NORP'>Amerika</ent>n citizens."</p>
<p><ent type='ORG'>Borrow</ent> or buy this book and learn even more! It has pictures, and it seems as
though every other sentence is documented with footnotes referencing hard core
sources!</p>
<p>_____</p>
<p>PART III:</p>
<p>*** <ent type='GPE'>NEW DRUGWAR</ent> COUNTERINSURGENCY MANUAL - "DEEP COVER": ***</p>
<p>"Deep Cover", by Michael Levine (an expose of the
phony drug war by a former undercover operative)
is out in paperback for $6.00. Seems pretty good
reading, and should provide lots of ammunition for
those of us trying to end this "drug war" madness.</p>
<p>(Standard plug: legalized drugs could bring in on
the order of $100 *<ent type='ORG'>BILLION</ent>* a year in tax revenues,
the best chance to reduce the deficit and pull us
out of the recession. Currently that money is going
overseas to 3rd world drug producers.)</p>
<p>Quote from the book: " ... the secret agencies that
really pull the strings of foreign policy believe that
our two-hundred-<ent type='ORG'>BILLION</ent>-dollar-a-year drug habit is a
necessary subsidy to keep the millions of poor in Third
World countries from turning to communism ..."</p>
<p>"Once lead the <ent type='GPE'>America</ent>n people into war, and they'll forget there
ever was such a thing as tolerance. To fight you must be brutal
and ruthless, and the spirit of ruthless brutality will enter into
every fiber of our national life ..." --- President Woodrow Wilson</p>
<div>----</div>
<p>PART IV:</p>
<p><ent type='NORP'>ILLUMINATI</ent> DIRECTLY LINKED TO CURRENT WORLD EVENTS BY VICTORY CHART:</p>
<p>Hell, I'm <ent type='NORP'>Jewish</ent>, but it sure as hell to me looks like international
banking is a Religious plot to rule the world. After all, the
major <ent type='ORG'>International Banks</ent> are owned by three <ent type='NORP'>Jewish</ent> families, the
<ent type='ORG'>Rosenthauls</ent>, the <ent type='ORG'>Rockefellers</ent>, and the Rothschilds! <ent type='GPE'>New York</ent> City was
owned by 'em until the Japs bought them out! Read a book by a former
Moussad operative(<ent type='NORP'>Israeli</ent> SS) called "Moussad" to become more enlightened about
this matter! And order the best single source on the <ent type='ORG'>Illuminati</ent> for *FREE*
by asking for the "Rise and Power of the <ent type='ORG'>International</ent> Bankers" chart from:</p>
<p> VICTORY BAPTIST CHURCH
900 46TH AVENUE
EAST MOLINE, IL 61244 </p>
<p>(Summary of just one-hundredth of the chart is found at end of this document.)</p>
<p>Jayne's book and I&amp;O Publishing out of <ent type='GPE'>Boulder City Nevada</ent> will illustrate that
whenever a bunch of religious fanatics do something, they ruin things for all
others. Take the Pope's overpopulation of the earth for example, or the
crusades, or the Koran's evil followers in <ent type='GPE'>Arabia</ent>. Every time We the People
are left holding the bag naked. I say lets drop the bag in the dumpster. Ditch
religion forever and think for yourself damn-it! I only include this church
literature cause they are involved with <ent type='ORG'>the Freedom Movement</ent> who, yes, are a
little fanatical, but they are the only ones around who will stand up to
the B.S. that has suppressed so many others, and are the only ones who dare
expose the <ent type='ORG'>Illuminati</ent> and live to talk about it!</p>
<p>NOW FOR THE SUM OF A MAN'S KNOWLEDGE ABOUT THE <ent type='NORP'>ILLUMINATI</ent>:</p>
<p>These folks are more secret than Moussad(the <ent type='NORP'>Israeli</ent> SS) who is the
undisputed ultimate "secret agent men/women" experts of the world.
Therefore, you will find no reliable sources of information on them.
They like to frequent <ent type='NORP'>Swiss</ent> chalets and spend their loot on good
spirits and women. Oh, they do not have women for members.
Their asso<ent type='ORG'>cia</ent>tes are in international banking and are world leaders of
organized crime. But they are not ever necessarily top world leaders or
top CEO's, but they completely influence the major decisions of most
multinational companies and world leaders.
They are always there but you never see them:
Once, at a coffee shop in an affluent <ent type='GPE'>Denver</ent> 'burb in the foothills, I ran
across a man of this general authority. With a <ent type='NORP'>German</ent> accent, he had told
me that if I were to sit at a table, I was to buy coffee, but he did not
work there. He wore a $2000 <ent type='NORP'>Swiss</ent> pilot's chronometer on one wrist. His
clothes cost at least half of the watch and he wasn't wearing a suit!
We were just waiting for the rain to stop and I could not believe my ears
when he tried to shoo me away from my dry spot under the curbside table's
canvas awning. I thought carefully and then replied something to the likes
of "The <ent type='ORG'>Illuminati</ent> would always like for me to be recirculating my money
back into their economic system of manipulation."
As soon as I said this, never mind the weather, he took off. He was a
strong 50 year old <ent type='NORP'>Aryan</ent>, about 6'1", 200lbs, to my 5'11", 150lbs
but he looked extremely agitated before he left. I could tell he was not
physically scared of me. In fact, he knew all too well what I was saying about
the global economic policies of his "asso<ent type='ORG'>cia</ent>tes" in the <ent type='ORG'>Illuminati</ent>. You see,
they have so effectively cut off information about even their existence, that
it will damn near give one of them vapor lock if you call their hand!
(Notice that <ent type='LOC'>Europe</ent> houses the ultimate banks next to <ent type='GPE'>Bavaria</ent> on <ent type='NORP'>Swiss</ent> soil,
and note how the <ent type='NORP'>Swiss</ent> are given <ent type='ORG'>International Neutrality</ent> to boot so that
the Secret accounts will be safe and stable! I would wager a month of Sundays
that money in a <ent type='NORP'>Swiss</ent> account is backed by real gold too!)
Bush belongs to the "Skull and Crossbones Club" which is the <ent type='GPE'>America</ent>n
Equivalent of the <ent type='ORG'>Illuninati</ent>. You have to study at <ent type='ORG'>Yale</ent> and be in a family that
is part of the old boy system and then you might get in. It is highly secret,
but really is much more well known than the <ent type='ORG'>Illuminati</ent>. It exists to perpetuate
the existence of the old boys in <ent type='NORP'>Amerika</ent>, much as the <ent type='ORG'>Illuminati</ent> does the same
in <ent type='LOC'>Europe</ent>.
Amazingly, the only reference to the <ent type='ORG'>Illuminati</ent> that I have ever seen other
than in a few paper back books on mysticism called the Trilogy which actually
are probably right 50% of the time, was in <ent type='ORG'>the Unabridged Webster</ent>'s Dictionary,
where all it dares say is that they were "the members of an anticlerical,
deistic, republican society founded in 1776 by Adam Weishaupt, professor of
law at <ent type='GPE'>Ingolstadt</ent> in <ent type='GPE'>Bavaria</ent>. It was suppressed by the <ent type='GPE'>Bavaria</ent>n government in
1785: called also <ent type='ORG'>the Order</ent> of the <ent type='ORG'>Illuminati</ent>."
I suppose they had to go deep undercover, much more so than even the <ent type='ORG'>Mafia</ent>.
This might explain the agitation I evoked in the fellow!
It might be fun to know more about these fellow, but you now know all you
need to know, except their names. <ent type='ORG'>Search</ent> and destroy! </p>
<p>The <ent type='ORG'>Illuminati</ent> was formed by <ent type='ORG'>the creme</ent> de la creme of <ent type='LOC'>Europe</ent>'s most powerful
aristocrats to perpetuate its iron grip on the peasants, to maintain the status
quo, to keep the rich rich, and the poor masses poor.</p>
<p>J.Jaynes book, "The Origin of Consciousness in the Breakdown Of the Bicameral
Mind," explains how for thousands of years, the masses have been hypnotized
into not thinking for themselves by <ent type='ORG'>Illuminati</ent> like leaders who use mysticism,
religion, music and propaganda to accomplish this. A person can still do very
hard organized work for these manipulators and actually still not ever think in
a non-bicameral or enlightened state of mind. This has allowed the world's
sadistic, oppressive leaders to screw us for 1000's of years.</p>
<p>It appears that the illuminati had penetrated U.S. government from the
beginning. The <ent type='ORG'>Illuminati</ent> was formed in 1776 by a lawyer in <ent type='GPE'>Bavaria</ent>.
These esquires snaked their way into the womb of <ent type='NORP'>Amerika</ent> from the <ent type='ORG'>getgo</ent>!
I find it revolting and an infinite slap in the face to see lawyers' own symbol
of economic repression on the very money we get shafted for by these leach
lawyers daily. </p>
<p>(In 1776 The <ent type='LOC'>Europe</ent>an Economic Community (the aristocracy) worried quite
a bit when WE told <ent type='GPE'>England</ent> to get the Hell outta here, so naturally they
regrouped and formed the <ent type='ORG'>Illuminati</ent> to deal with US and prevent future colonies
from being so eager to toss the king's tea taxes overboard!)</p>
<p>ACCORDING TO THE RISE AND POWER OF THE INTERNATIONAL BANKERS CHART:</p>
<p>Beginning in 1795, five of the Rothschild's sons were sent to five different
<ent type='LOC'>Europe</ent>an countries, were the <ent type='ORG'>Illuminati</ent>/World Banker scam started to spread
in <ent type='NORP'>German</ent>y, <ent type='GPE'>Vienna</ent>, <ent type='GPE'>England</ent>, <ent type='GPE'>Italy</ent>, and <ent type='GPE'>France</ent>. This put them in the top five
countries, where they soon rose to positions of immense power and influence.
Thus the manipulation of global affairs began!</p>
<p>The 10 commandments of the <ent type='ORG'>Illuminati</ent> are:
1 - <ent type='NORP'>Abolish</ent> land ownership.
2 - Taxation of the people.
3 - <ent type='NORP'>Abolish</ent> all rights of inheritance.
4 - Confiscate lands and properties of all rebels.
5 - Centralize credit - <ent type='ORG'>Create National</ent> banks.
6 - <ent type='ORG'>Control</ent> transportation and communication.
7 - <ent type='ORG'>State</ent> owned factories.
8 - Equal liability of all to labor.
9 - Distribution of the population.
10 - Free education to all in "public" schools.
(Sounds like <ent type='ORG'>bigbro</ent> ta me, Booboo!)</p>
<p>The chart shows that in 1798 the following 3 things occurred:
1 - <ent type='GPE'>Washington</ent> warned of the danger of the <ent type='ORG'>Illuminati</ent>.
2 - Jefferson wrote to John Adams stating that he agreed with
him that the international bankers were more powerful and
dangerous than standing armies.
3 - Professor John Robinson exposed it in his book, " PROOFS OF
A CONSPIRACY."</p>
<p>And then in 1836, Andrew Jackson abolished the central bank. If this
measure had not been taken, <ent type='GPE'>America</ent> would have fallen to the
<ent type='ORG'>International</ent> bankers at this time.</p>
<p>NOTE: the last 40 lines were 1% of the data on the chart showing the
<ent type='ORG'>Illuminati</ent>'s links and activities as "<ent type='ORG'>Control</ent>," which appears
to be their new name. Get the damn chart - I don't care what
you think of <ent type='NORP'>Baptists</ent>, these folks are just helping us now!
?
* * * * * * * * * * * * * * *
* PLEASE COPY AND DISTRIBUTE THIS TO AS MANY PEOPLE AS POSSIBLE !!! *
* SEND A COPY TO YOUR POLICE, GOVERNORS, LEGISLATORS, RELATIVES !!! *
* * * * * * * * * * * * * * *
____________________
| __ .__ |
| |__| |__| " |
| |
| DON'T TREAD ON ME! |
|____________________|
</p></xml>

View File

@ -0,0 +1,576 @@
<xml><p> Feel free to copy this article far and wide, but please
keep my name and this sentence on it.</p>
<p> The Bill of Rights, a Status Report
by Eric Postpischil</p>
<p> 4 September 1990</p>
<p> 6 Hamlett Drive, Apt. 17
Nashua, NH 03062</p>
<p> edp@jareth.enet.dec.com</p>
<p> How many rights do you have? You should check, because it
might not be as many today as it was a few years ago, or
even a few months ago. Some people I talk to are not
concerned that police will execute a search warrant without
knocking or that they set up roadblocks and stop and
interrogate innocent citizens. They do not regard these as
great infringements on their rights. But when you put
current events together, there is information that may be
surprising to people who have not yet been concerned: The
amount of the Bill of Rights that is under attack is
alarming.</p>
<p> Let's take a look at the Bill of Rights and see which
aspects are being pushed on or threatened. The point here
is not the degree of each attack or its rightness or
wrongness, but the sheer number of rights that are under
attack.</p>
<p> Amendment I</p>
<p> <ent type='ORG'>Congress</ent> shall make no law respecting an
establishment of religion, or prohibiting the
free exercise thereof; or abridging the freedom
of speech, or of the press; or the right of the
people peaceably to assemble, and to petition the
Government for a redress of grievances.</p>
<p> <ent type='ORG'>ESTABLISHING</ent> RELIGION: While campaigning for his first
term, George Bush said "I don't know that atheists should
be considered as citizens, nor should they be considered
patriots." Bush has not retracted, commented on, or
clarified this statement, in spite of requests to do so.
According to Bush, this is one nation under God. And
apparently if you are not within Bush's religious beliefs,
you are not a citizen. Federal, state, and local
governments also promote a particular religion (or,
occasionally, religions) by spending public money on
religious displays.</p>
<p> FREE EXERCISE OF RELIGION: Robert Newmeyer and Glenn
Braunstein were jailed in 1988 for refusing to stand in
respect for a judge. Braunstein says the tradition of
rising in court started decades ago when judges entered
carrying Bibles. Since judges no longer carry Bibles,
Braunstein says there is no reason to stand -- and his
Bible tells him to honor no other God. For this religious
practice, <ent type='ORG'>Newmeyer and Braunstein</ent> were jailed and are now
suing.</p>
<p> FREE SPEECH: We find that technology has given the
government an excuse to interfere with free speech.
Claiming that radio frequencies are a limited resource, the
government tells broadcasters what to say (such as news and
public and local service programming) and what not to say
(obscenity, as defined by the Federal Communications
Commission [<ent type='ORG'>FCC</ent>]). The <ent type='ORG'>FCC</ent> is investigating <ent type='ORG'>Boston PBS</ent>
station <ent type='ORG'>WGBH</ent>-TV for broadcasting photographs from the
Mapplethorpe exhibit.</p>
<p> FREE SPEECH: There are also laws to limit political
statements and contributions to political activities. In
1985, <ent type='ORG'>the Michigan Chamber</ent> of Commerce wanted to take out
an advertisement supporting a candidate in the state house
of representatives. But a 1976 <ent type='GPE'>Michigan</ent> law prohibits a
corporation from using its general treasury funds to make
independent expenditures in a political campaign. In
March, <ent type='ORG'>the Supreme Court</ent> upheld that law. According to
dissenting Justice Kennedy, it is now a felony in <ent type='GPE'>Michigan</ent>
for <ent type='ORG'>the Sierra Club</ent>, <ent type='ORG'>the American Civil Liberties Union</ent>, or
<ent type='ORG'>the Chamber</ent> of Commerce to advise the public how a
candidate voted on issues of urgent concern to their
members.</p>
<p> FREE PRESS: As in speech, technology has provided another
excuse for government intrusion in the press. If you
distribute a magazine electronically and do not print
copies, the government doesn't consider you a press and
does not give you the same protections courts have extended
to printed news. The equipment used to publish <ent type='ORG'>Phrack</ent>, a
worldwide electronic magazine about phones and hacking, was
confiscated after publishing a document copied from a Bell
South computer entitled "A <ent type='ORG'>Bell South</ent> Standard Practice
(<ent type='ORG'>BSP</ent>) 660-225-104SV Control Office Administration of
Enhanced 911 Services for Special Services and Major
Account Centers, March, 1988." All of the information in
this document was publicly available from <ent type='ORG'>Bell South</ent> in
other documents. The government has not alleged that the
publisher of <ent type='ORG'>Phrack</ent>, Craig Neidorf, was involved with or
participated in the copying of the document. Also, the
person who copied this document from telephone company
computers placed a copy on a bulletin board run by Rich
Andrews. Andrews forwarded a copy to AT&amp;T officials and
cooperated with authorities fully. In return, the Secret
Service (SS) confiscated Andrews' computer along with all
the mail and data that were on it. Andrews was not charged
with any crime.</p>
<p> FREE PRESS: In another incident that would be comical if
it were not true, on March 1 the SS ransacked the offices
of Steve Jackson Games (SJG); irreparably damaged property;
and confiscated three computers, two laser printers,
several hard disks, and many boxes of paper and floppy
disks. The target of the SS operation was to seize all
copies of a game of fiction called GURPS Cyberpunk. The
Cyberpunk game contains fictitious break-ins in a
futuristic world, with no technical information of actual
use with real computers, nor is it played on computers.
The SS never filed any charges against SJG but still
refused to return confiscated property.</p>
<p> <ent type='ORG'>PEACEABLE ASSEMBLY</ent>: The right to assemble peaceably is no
longer free -- you have to get a permit. Even that is not
enough; some officials have to be sued before they realize
their reasons for denying a permit are not Constitutional.</p>
<p> <ent type='ORG'>PEACEABLE ASSEMBLY</ent>: In <ent type='GPE'>Alexandria</ent>, <ent type='GPE'>Virginia</ent>, there is a
law that prohibits people from loitering for more than
seven minutes and exchanging small objects. Punishment is
two years in jail. Consider the scene in jail: "What'd
you do?" "I was waiting at a bus stop and gave a guy a
cigarette." This is not an impossible occurrence: In
<ent type='GPE'>Pittsburgh</ent>, Eugene Tyler, 15, has been ordered away from
bus stops by police officers. Sherman Jones, also 15, was
accosted with a police officer's hands around his neck
after putting the last bit of pizza crust into his mouth.
The police suspected him of hiding drugs.</p>
<p> PETITION FOR REDRESS OF GRIEVANCES: Rounding out the
attacks on the first amendment, there is a sword hanging
over the right to petition for redress of grievances.
<ent type='ORG'>House Resolution</ent> 4079, the National Drug and Crime
Emergency Act, tries to "modify" the right to habeas
corpus. It sets time limits on the right of people in
custody to petition for redress and also limits the courts
in which such an appeal may be heard.</p>
<p> Amendment II</p>
<p> A well regulated <ent type='ORG'>Militia</ent>, being necessary to the
security of a free <ent type='ORG'>State</ent>, the right of the people
to keep and bear Arms, shall not be infringed.</p>
<p> RIGHT TO BEAR ARMS: This amendment is so commonly
challenged that the movement has its own name: gun
control. Legislation banning various types of weapons is
supported with the claim that the weapons are not for
"legitimate" sporting purposes. This is a perversion of
the right to bear arms for two reasons. First, the basis
of freedom is not that permission to do legitimate things
is granted to the people, but rather that the government is
empowered to do a limited number of legitimate things --
everything else people are free to do; they do not need to
justify their choices. Second, should the need for defense
arise, it will not be hordes of deer that the security of a
free state needs to be defended from. <ent type='ORG'>Defense</ent> would be
needed against humans, whether external invaders or
internal oppressors. It is an unfortunate fact of life
that the guns that would be needed to defend the security
of a state are guns to attack people, not guns for sporting
purposes.</p>
<p> Firearms regulations also empower local officials, such as
police chiefs, to grant or deny permits. This results in
towns where only friends of people in the right places are
granted permits, or towns where women are generally denied
the right to carry a weapon for self-defense.</p>
<p> Amendment III</p>
<p> No Soldier shall, in time of peace be quartered
in any house, without the consent of the <ent type='ORG'>Owner</ent>,
nor in time of war, but in a manner to be
prescribed by law.</p>
<p> QUARTERING SOLDIERS: This amendment is fairly clean so
far, but it is not entirely safe. Recently, 200 troops in
camouflage dress with M-16s and helicopters swept through
<ent type='ORG'>Kings Ridge National Forest</ent> in <ent type='GPE'>Humboldt County</ent>, <ent type='GPE'>California</ent>.
In the process of searching for marijuana plants for four
days, soldiers assaulted people on private land with M-16s
and barred them from their own property. This might not be
a direct hit on the third amendment, but the disregard for
private property is uncomfortably close.</p>
<p> Amendment IV</p>
<p> The right of the people to be secure in their
persons, houses, papers and effects, against
unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be seized.</p>
<p> RIGHT TO BE SECURE IN PERSONS, <ent type='ORG'>HOUSES</ent>, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: The RICO law
is making a mockery of the right to be secure from seizure.
Entire stores of books or videotapes have been confiscated
based upon the presence of some sexually explicit items.
Bars, restaurants, or houses are taken from the owners
because employees or tenants sold drugs. In Volusia
County, <ent type='GPE'>Florida</ent>, Sheriff Robert <ent type='ORG'>Vogel</ent> and his officers stop
automobiles for contrived violations. If large amounts of
cash are found, the police confiscate it on the <ent type='ORG'>PRESUMPTION</ent>
that it is drug money -- even if there is no other evidence
and no charges are filed against the car's occupants. The
victims can get their money back only if they prove the
money was obtained legally. One couple got their money
back by proving it was an insurance settlement. Two other
men who tried to get their two thousand dollars back were
denied by the <ent type='GPE'>Florida</ent> courts.
RIGHT TO BE SECURE IN PERSONS, <ent type='ORG'>HOUSES</ent>, PAPERS AND EFFECTS
AGAINST UNREASONABLE SEARCHES AND SEIZURES: A new law goes
into effect in <ent type='GPE'>Oklahoma</ent> on January 1, 1991. All property,
real and personal, is taxable, and citizens are required to
list all their personal property for tax assessors,
including household furniture, gold and silver plate,
musical instruments, watches, jewelry, and personal,
private, or professional libraries. If a citizen refuses
to list their property or is suspected of not listing
something, the law directs the assessor to visit and enter
the premises, getting a search warrant if necessary. Being
required to tell the state everything you own is not being
secure in one's home and effects.
NO WARRANTS SHALL ISSUE, BUT UPON PROBABLE CAUSE, SUPPORTED
BY OATH OR <ent type='ORG'>AFFIRMATION</ent>: As a supporting oath or
affirmation, reports of anonymous informants are accepted.
This practice has been condoned by <ent type='ORG'>the Supreme Court</ent>.</p>
<p> PARTICULARLY DESCRIBING THE PLACE TO BE SEARCHED AND
PERSONS OR THINGS TO BE SEIZED: Today's warrants do not
particularly describe the things to be seized -- they list
things that might be present. For example, if police are
making a drug raid, they will list weapons as things to be
searched for and seized. This is done not because the
police know of any weapons and can particularly describe
them, but because they allege people with drugs often have
weapons.</p>
<p> Both of the above apply to the warrant the Hudson, New
Hampshire, police used when they broke down Bruce Lavoie's
door at 5 a.m. with guns drawn and shot and killed him.
The warrant claimed information from an anonymous
informant, and it said, among other things, that guns were
to be seized. The mention of guns in the warrant was used
as reason to enter with guns drawn. Bruce Lavoie had no
guns. Bruce Lavoie was not secure from unreasonable search
and seizure -- nor is anybody else.</p>
<p> Other infringements on the fourth amendment include
roadblocks and the <ent type='ORG'>Boston Police</ent> detention of people based
on colors they are wearing (supposedly indicating gang
membership). And in <ent type='GPE'>Pittsburgh</ent> again, Eugene Tyler was
once searched because he was wearing sweat pants and a
plaid shirt -- police told him they heard many drug dealers
at that time were wearing sweat pants and plaid shirts.
</p>
<p> Amendment V</p>
<p> No person shall be held to answer for a capital,
or otherwise infamous crime, unless on a
presentment or indictment of a Grand Jury, except
in cases arising in the land or naval forces, or
in the <ent type='ORG'>Militia</ent>, when in actual service in time of
War or public danger; nor shall any person be
subject to the same offence to be twice put in
jeopardy of life or limb; nor shall be compelled
in any criminal case to be a witness against
himself, nor be deprived of life, liberty, or
property, without due process of law; nor shall
private property be taken for public use without
just compensation.</p>
<p> INDICTMENT OF A GRAND JURY: Kevin Bjornson has been
proprietor of Hydro-Tech for nearly a decade and is a
leading authority on hydroponic technology and cultivation.
On October 26, 1989, both locations of Hydro-Tech were
raided by <ent type='ORG'>the Drug Enforcement Administration</ent>. National
Drug Control Policy Director William Bennett has declared
that some indoor lighting and hydroponic equipment is
purchased by marijuana growers, so retailers and
wholesalers of such equipment are drug profiteers and
co-conspirators. Bjornson was not charged with any crime,
nor subpoenaed, issued a warrant, or arrested. No illegal
substances were found on his premises. Federal officials
were unable to convince grand juries to indict Bjornson.
By February, they had called scores of witnesses and
recalled many two or three times, but none of the grand
juries they convened decided there was reason to criminally
prosecute Bjornson. In spite of that, as of March, his
bank accounts were still frozen and none of the inventories
or records had been returned. Grand juries refused to
indict Bjornson, but the government is still penalizing
him.</p>
<p> TWICE PUT IN JEOPARDY OF LIFE OR <ent type='GPE'>LIMB</ent>: Members of the
McMartin family in <ent type='GPE'>California</ent> have been tried two or three
times for child abuse. Anthony Barnaby was tried for
murder (without evidence linking him to the crime) three
times before <ent type='GPE'>New Hampshire</ent> let him go.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: Oliver North
was forced to testify against himself. <ent type='ORG'>Congress</ent> granted
him immunity from having anything he said to them being
used as evidence against him, and then they required him to
talk. After he did so, what he said was used to find other
evidence which was used against him. The courts also play
games where you can be required to testify against yourself
if you testify at all.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: In the <ent type='GPE'>New York</ent>
Central Park assault case, three people were found guilty
of assault. But there was no physical evidence linking
them to the crime; semen did not match any of the
defendants. The only evidence the state had was
confessions. To obtain these confessions, the police
questioned a 15-year old without a parent present -- which
is illegal under <ent type='GPE'>New York</ent> state law. Police also refused
to let the subject's Big Brother, an attorney for the
Federal government, see him during questioning. Police
screamed "You better tell us what we want to hear and
cooperate or you are going to jail," at 14-year-old <ent type='ORG'>Antron</ent>
McCray, according to Bobby McCray, his father. <ent type='ORG'>Antron</ent>
McCray "confessed" after his father told him to, so that
police would release him. These people were coerced into
bearing witness against themselves, and those confessions
were used to convict them.</p>
<p> COMPELLED TO BE A WITNESS AGAINST HIMSELF: Your answers to
Census questions are required by law, with a $100 penalty
for each question not answered. But people have been
evicted for giving honest Census answers. According to the
General Accounting Office, one of the most frequent ways
city governments use census information is to detect
illegal two-family dwellings. This has happened in
<ent type='GPE'>Montgomery County</ent>, <ent type='GPE'>Maryland</ent>; <ent type='ORG'>Pullman</ent>, <ent type='GPE'>Washington</ent>; and Long
Island, <ent type='GPE'>New York</ent>. The August 8, 1989, <ent type='ORG'>Wall Street Journal</ent>
reports this and other ways Census answers have been used
against the answerers.
COMPELLED TO BE A WITNESS AGAINST HIMSELF: Drug tests are
being required from more and more people, even when there
is no probable cause, no accident, and no suspicion of drug
use. Requiring people to take drug tests compels them to
provide evidence against themselves.
DEPRIVED OF LIFE, LIBERTY, OR PROPERTY WITHOUT DUE PROCESS
OF LAW: This clause is violated on each of the items life,
liberty, and property. Incidents including such violations
are described elsewhere in this article. Here are two
more: On March 26, 1987, in <ent type='GPE'>Jeffersontown</ent>, <ent type='GPE'>Kentucky</ent>,
Jeffrey Miles was killed by police officer John Rucker, who
was looking for a suspected drug dealer. Rucker had been
sent to the wrong house; Miles was not wanted by police.
He received no due process. In <ent type='GPE'>Detroit</ent>, $4834 was seized
from a grocery store after dogs detected traces of cocaine
on three one-dollar bills in a cash register.
PRIVATE PROPERTY TAKEN FOR PUBLIC USE WITHOUT JUST
COMPENSATION: RICO is shredding this aspect of the Bill of
Rights. The money confiscated by Sheriff <ent type='ORG'>Vogel</ent> goes
directly into <ent type='ORG'>Vogel</ent>'s budget; it is not regulated by the
legislature. Federal and local governments seize and
auction boats, buildings, and other property. Under RICO,
the government is seizing property without due process.
The victims are required to prove not only that they are
not guilty of a crime, but that they are entitled to their
property. Otherwise, the government auctions off the
property and keeps the proceeds.</p>
<p> Amendment VI</p>
<p> In all criminal prosecutions, the accused shall
enjoy the right to a speedy and public trial, by
an impartial jury of the <ent type='ORG'>State</ent> and district
wherein the crime shall have been committed,
which district shall have been previously
ascertained by law, and to be informed of the
nature and cause of the accusation; to be
confronted with the witnesses against him; to
have compulsory process for obtaining Witnesses
in his favor, and to have the assistance of
counsel for his defence.
THE RIGHT TO A SPEEDY AND PUBLIC TRIAL: Surprisingly, the
right to a public trial is under attack. When Marion Barry
was being tried, the prosecution attempted to bar Louis
Farrakhan and George Stallings from the gallery. This
request was based on an allegation that they would send
silent and "impermissible messages" to the jurors. The
judge initially granted this request. One might argue that
the whole point of a public trial is to send a message to
all the participants: The message is that the public is
watching; the trial had better be fair.
BY AN IMPARTIAL JURY: The government does not even honor
the right to trial by an impartial jury. US District Judge
Edward Rafeedie is investigating improper influence on
jurors by US marshals in the Enrique <ent type='ORG'>Camarena</ent> case. US
marshals apparently illegally communicated with jurors
during deliberations.
OF THE STATE AND DISTRICT WHEREIN THE CRIME SHALL HAVE BEEN
COMMITTED: This is incredible, but Manuel Noriega is being
tried so far away from the place where he is alleged to
have committed crimes that the United <ent type='ORG'>State</ent>s had to invade
another country and overturn a government to get him. Nor
is this a unique occurrence; in a matter separate from the
<ent type='ORG'>Camarena</ent> case, Judge Rafeedie was asked to dismiss charges
against <ent type='NORP'>Mexican</ent> gynecologist Dr. Humberto Alvarez Machain
on the grounds that the doctor was illegally abducted from
his <ent type='GPE'>Guadalajara</ent> office in April and turned over to US
authorities.</p>
<p> TO BE INFORMED OF THE NATURE AND CAUSE OF THE ACCUSATION:
Steve Jackson Games, nearly put out of business by the raid
described previously, has been stonewalled by the SS. "For
the past month or so these guys have been insisting the
book wasn't the target of the raid, but they don't say what
the target was, or why they were critical of the book, or
why they won't give it back," Steve Jackson says. "They
have repeatedly denied we're targets but don't explain why
we've been made victims." Attorneys for SJG tried to find
out the basis for the search warrant that led to the raid
on SJG. But the application for that warrant was sealed by
order of the court and remained sealed at last report, in
July. Not only has the SS taken property and nearly
destroyed a publisher, it will not even explain the nature
and cause of the accusations that led to the raid.</p>
<p> TO BE CONFRONTED WITH THE WITNESSES AGAINST HIM: The courts
are beginning to play fast and loose with the right to
confront witnesses. Watch out for anonymous witnesses and
videotaped testimony.</p>
<p> TO HAVE COMPULSORY PROCESS FOR <ent type='ORG'>OBTAINING</ent> WITNESSES: Ronald
Reagan resisted submitting to subpoena and answering
questions about <ent type='ORG'>Irangate</ent>, claiming matters of national
security and executive privilege. A judge had to dismiss
some charges against <ent type='ORG'>Irangate</ent> participants because the
government refused to provide information subpoenaed by the
defendants. And one wonders if the government would go
to the same lengths to obtain witnesses for Manuel Noriega
as it did to capture him.</p>
<p> TO HAVE THE ASSISTANCE OF COUNSEL: The right to assistance
of counsel took a hit recently. <ent type='GPE'>Connecticut</ent> Judge Joseph
Sylvester is refusing to assign public defenders to people
ACCUSED of drug-related crimes, including drunk driving.</p>
<p> TO HAVE THE ASSISTANCE OF COUNSEL: RICO is also affecting
the right to have the assistance of counsel. The
government confiscates the money of an accused person,
which leaves them unable to hire attorneys. The <ent type='ORG'>IRS</ent> has
served summonses nationwide to defense attorneys, demanding
the names of clients who paid cash for fees exceeding
$10000.</p>
<p> Amendment VII</p>
<p> In Suits at common law, where the value in
controversy shall exceed twenty dollars, the
right of trial by jury shall be preserved, and no
fact tried by a jury, shall be otherwise
reexamined in any Court of the United <ent type='ORG'>State</ent>s,
than according to the rules of common law.</p>
<p> RIGHT OF TRIAL BY JURY IN SUITS AT COMMON LAW: This is a
simple right; so far the government has not felt threatened
by it and has not made attacks on it that I am aware of.
This is our only remaining safe haven in the Bill of Rights.</p>
<p> Amendment VIII</p>
<p> Excessive bail shall not be required, nor
excessive fines imposed, nor cruel and unusual
punishments inflicted.</p>
<p> EXCESSIVE BAIL AND <ent type='ORG'>FINES</ent>: <ent type='GPE'>Tallahatchie County</ent> in
<ent type='GPE'>Mississippi</ent> charges ten dollars a day to each person who
spends time in the jail, regardless of the length of stay
or the outcome of their trial. This means innocent people
are forced to pay. Marvin Willis was stuck in jail for 90
days trying to raise $2500 bail on an assault charge. But
after he made that bail, he was kept imprisoned because he
could not pay the $900 rent <ent type='ORG'>Tallahatchie</ent> demanded. Nine
former inmates are suing the county for this practice.</p>
<p> CRUEL AND UNUSUAL PUNISHMENTS: <ent type='ORG'>House Resolution</ent> 4079
sticks its nose in here too: "... a Federal court shall
not hold prison or jail crowding unconstitutional under the
eighth amendment except to the extent that an individual
plaintiff inmate proves that the crowding causes the
infliction of cruel and unusual punishment of that
inmate."</p>
<p> CRUEL AND UNUSUAL PUNISHMENTS: A life sentence for selling
a quarter of a gram of cocaine for $20 -- that is what
Ricky <ent type='ORG'>Isom</ent> was sentenced to in February in <ent type='GPE'>Cobb County</ent>,
<ent type='GPE'>Georgia</ent>. It was <ent type='ORG'>Isom</ent>'s second conviction in two years, and
state law imposes a mandatory sentence. Even the judge
pronouncing the sentence thinks it is cruel; Judge Tom
Cauthorn expressed grave reservations before sentencing
<ent type='ORG'>Isom</ent> and Douglas Rucks (convicted of selling 3.5 grams of
cocaine in a separate but similar case). Judge Cauthorn
called the sentences "Draconian."</p>
<p> Amendment IX</p>
<p> The enumeration in the Constitution, of certain
rights, shall not be construed to deny or
disparage others retained by the people.</p>
<p> OTHER RIGHTS RETAINED BY THE <ent type='GPE'>PEOPLE</ent>: This amendment is so
weak today that I will ask not what infringements there are
on it but rather what exercise of it exists at all? What
law can you appeal to a court to find you not guilty of
violating because the law denies a right retained by you?</p>
<p> Amendment X</p>
<p> The powers not delegated to the United <ent type='ORG'>State</ent>s by
the Constitution, nor prohibited by it to the
<ent type='ORG'>State</ent>s, are reserved to the <ent type='ORG'>State</ent>s respectively,
or to the people.</p>
<p> POWERS RESERVED TO THE STATES OR THE <ent type='GPE'>PEOPLE</ent>: This
amendment is also weak, although it is not so nonexistent
as the ninth amendment. But few states set their own speed
limits or drinking age limits. Today, we mostly think of
this country as the -- singular -- United <ent type='ORG'>State</ent>s, rather
than a collection of states. This concentration of power
detaches laws from the desires of people -- and even of
states. <ent type='ORG'>House Resolution</ent> 4079 crops up again here -- it
uses financial incentives to get states to set specific
penalties for certain crimes. Making their own laws
certainly must be considered a right of the states, and
this right is being infringed upon.</p>
<p> Out of ten amendments, nine are under attack, most of them
under multiple attacks of different natures, and some of
them under a barrage. If this much of the Bill of Rights
is threatened, how can you be sure your rights are safe? A
right has to be there when you need it. Like insurance,
you cannot afford to wait until you need it and then set
about procuring it or ensuring it is available. Assurance
must be made in advance.</p>
<p> The bottom line here is that your rights are not safe. You
do not know when one of your rights will be violated. A
number of rights protect accused persons, and you may think
it is not important to protect the rights of criminals.
But if a right is not there for people accused of crimes,
it will not be there when you need it. With the Bill of
Rights in the sad condition described above, nobody can be
confident they will be able to exercise the rights to which
they are justly entitled. To preserve our rights for
ourselves in the future, we must defend them for everybody
today.
</p></xml>

View File

@ -0,0 +1,727 @@
<xml>
<p>NOTE: This is a report on Government and military techniques, notterrorist!</p>
<p> B R A I N W A S H I N G
By Lorenzo Saint Dubois</p>
<p>The report that follows is a condensation of a study by training experts of
the important information available on this subject.</p>
<p> BACKGROUND</p>
<p>Brainwashing, as a technique, has been used for centuries and is no mystery
to psychologists. In this sense, brainwashing means involuntary re-education
of basic beliefs and values. All people are being re-educated continually.
New information changes one's beliefs.</p>
<p>Everyone has experienced to some degree the conflict that ensues when new
information is not consistent with prior belief.</p>
<p>The experience of the brainwashed individual differs in that the inconsistent
information is forced upon the individual under controlled conditions after
the possibility of critical judgment has been removed by a variety of
methods.</p>
<p>There is no question that an individual can be broken psychologically by
captors with knowledge and willingness to persist in techniques aimed at
deliberately destroying the integration of a personality. Although it is
probable that everyone reduced to such a confused, disoriented state will
respond to the introduction of new beliefs, this cannot be stated
dogmatically.</p>
<p> HUMAN CONTROL AND REACTION TO CONTROL</p>
<p>There are progressive steps in exercising control over an individual and
changing his behaviour and personality integration.</p>
<p>The following five steps are typical of behaviour changes in any controlled
individual:</p>
<p>1. Making the individual aware of control is the first stage in changing his
behaviour. A small child is made aware of the physical and psychological
control of his parents and quickly recognizes that an overwhelming force
must be reckoned with.</p>
<p> So a controlled adult comes to recognize the overwhelming powers of the
state and the impersonal, incarcerative machinery in which he is enmeshed.
The individual recognizes that definite limits have been put upon the ways
he can respond.</p>
<p>2. Realization of his complete dependence upon the controlling system is a
major factor in the controlling of his behaviour.</p>
<p> The controlled adult is forced to accept the fact that food, tobacco,
praise and the only social contact that he will get come from the very
interrogator who exercises control over him.</p>
<p>3. The awareness of control and recognition of dependence result in causing
internal conflict and breakdown of previous patterns of behaviour.</p>
<p> Although this transition can be relatively mild in the case of a child,
it is almost invariably severe for the adult undergoing brainwashing.
Only an individual who holds his values lightly can change them easily.</p>
<p> Since the brainwasher/interrogators aim to have the individuals undergo
profound emotional change, they force their victims to seek out painfully
what is desired by the controlling individual. During this period the
victim is likely to have a mental breakdown characterized by delusions
and hallucinations.</p>
<p>4. Discovery that there is an acceptable solution to his problem is the
first stage of reducing the individuals conflict.</p>
<p> It is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror of
internal conflict would cease and that perhaps they would not be driven
insane.</p>
<p> It is at this point that they are prepared to make major changes in their
value system. This is an automatic rather than voluntary choice. They have
lost their ability to be critical.</p>
<p>5. Reintegration of values and identification with the controlling system is
the final stage in changing the behaviour of the controlled individual.</p>
<p> A child who has learned a new, socially desirable behaviour demonstrates
its importance by attempting to as apt the new behaviour to a variety of
other situations. Similar states in the brainwashed adult are pitiful.</p>
<p> His new value-system, his manner of perceiving, organizing, and giving
meaning to events, is virtually independent of his former value system.
He is no longer capable of thinking or speaking in concepts other than
those he has adopted. He tends to identify by expressing thanks to his
captors for helping him see the light.</p>
<p> Anyone willing to use known principles of control and reactions to
control and capable of demonstrating the patience needed in raising a
child can probably achieve successful brainwashing.</p>
<p> CONTROL TECHNIQUES AND THEIR EFFECTS</p>
<p>A description of usual <ent type='NORP'>communist</ent> control techniques follows.</p>
<p>INTERROGATION</p>
<p>There are at least two ways in which interrogation is used:</p>
<p>A. Elicitation, which is designed to get the individual to surrender
protected information, is a form of interrogation. One major difference
between elicitation and interrogation used to achieve brainwashing is that
the mind of the individual must be kept clear to permit coherent,
undistorted disclosure of protected information.</p>
<p>B. Elicitation for the purpose of brainwashing consists of questioning,
argument, indoctrination, threats, cajolery, praise, hostility and a
variety of other pressures. The aim of this interrogation is to hasten the
breakdown of the individual's value system and to encourage the substitution
of a different valuesystem.</p>
<p>The procurement of protected information is secondary and is used as a
device to increase pressure upon the individual. The term interrogation in
this article will refer in general, to this type. The interrogator is the
individual who conducts this type of interrogation and who controls the
administration of the other pressures. He is the protagonist against whom
the victim develops his conflict and upon whom the victim develops a state
of dependency as he seeks some solution to his conflict.</p>
<p>PHYSICAL TORTURE &amp; THREATS OF TORTURE</p>
<p>Two types of physical torture are distinguishable more by their psychological
effect in inducing conflict than by the degree of painfulness:</p>
<p>A. The first type is one in which the victim has a passive role in the pain
inflicted on him (e.g., beatings). His conflict involves the decision of
whether or not to give in to demands in order to avoid further pain.
Generally, brutality of this type was not found to achieve the desired
results. Threats of torture were found more effective, as fear of pain
causes greater conflict within the individual than does pain itself.</p>
<p>B. The second type of torture is represented by requiring the individual to
stand in one spot for several hours or assume some other pain-inducing
position. Such a requirement often engenders in the individual a
determination to stick it out. This internal act of resistance provide a
feeling of moral superiority at first. As time passes and his pain mounts,
the individual becomes aware that it is his own original determination to
resist that is causing the continuance of pain.</p>
<p>A conflict develops within the individual between his moral determination and
his desire to collapse and discontinue the pain. It is this extra internal
conflict, in addition to the conflict over whether or not to give in to the
demands made of him, that tends to make this method of torture more
effective in the breakdown of the individual personality.</p>
<p>
ISOLATION</p>
<p>Individual differences in reaction to isolation are probably greater than to
any other method. Some individuals appear to be able to withstand prolonged
periods of isolation without deleterious effects, while a relatively short
period of isolation reduces others to the verge of psychosis. Reaction
varies with the conditions of the isolation cell.</p>
<p>Some sources have indicated a strong reaction to filth and vermin, although
they had negligible reactions to the isolation. Others reacted violently to
isolation in relatively clean cells. The predominant cause of breakdown in
such situations is a lack of sensory stimulation (i.e., grayness of walls,
lack of sound, absence of social contact, etc.). Experimental subjects
exposed to this condition have reported vivid hallucinations and
overwhelming fears of losing their sanity.</p>
<p>CONTROL OF COMMUNICATION</p>
<p>This is one of the most effective methods for creating a sense of
helplessness and despair. This measure might well be considered the
cornerstone of the system of control. It consists of strict regulation of
the mail, reading materials, broadcast materials and social contact
available to the individual. The need to communicate is so great that when
the usual channels are blocked, the individual will resort to any open
channel, almost regardless of the implications of using that particular
channel.</p>
<p>Many POWs in <ent type='GPE'>Korea</ent>, whose only act of collaboration was to sign petitions
and peace appeals, defended their actions on the ground that this was the
only method of letting the outside world know they were still alive.</p>
<p>Many stated that their morale and fortitude would have been increased
immeasurably had leaflets of encouragement been dropped to them. When the
only contact with the outside world is via the interrogator, the prisoner
comes to develop extreme dependency on his interrogator and hence loses
another prop to his morale.</p>
<p>Another wrinkle in communication control is the informer system. The
recruitment of informers in POW camps discouraged communication between
inmates. POWs who feared that every act or thought of resistance would be
communicated to camp administrators, lost faith in their fellow man and
were forced to untrusting individualism. Informers are also under several
stages of brainwashing and elicitation to develop and maintain control over
the victims.</p>
<p>INDUCTION OF FATIGUE</p>
<p>This is a well-known device for breaking will power and critical powers of
judgment. Deprivation of sleep results in more intense psychological
debilitation than does any other method of engendering fatigue. They vary
their methods.</p>
<p>Conveyor belt interrogation that last 50-60 hours will make almost any
individual compromise, but there is danger that this will kill the victim.
It is safer to conduct interrogations of 8-10 hours at night while forcing
the prisoner to remain awake during the day. Additional interruptions in the
remaining 2-3 hours of allotted sleep quickly reduce the most resilient
individual.</p>
<p><ent type='ORG'>Alternate</ent> administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression. Fatigue, in addition to reducing the will to resist, also
produces irritation and fear that arise from increased slips of the
tongue forgetfulness and decreased ability to maintain orderly thought
processes.</p>
<p>CONTROL OF FOOD, WATER AND TOBACCO</p>
<p>The controlled individual is made intensely aware of his dependence upon his
interrogator for the quality and quantity of his food and tobacco. The
exercise of this control usually follows a pattern.</p>
<p>No food and little or no water is permitted the individual for several
days prior to interrogation. When the prisoner first complains of this to
the interrogator, the latter expresses surprise at such inhumane treatment.</p>
<p>He makes a demand of the prisoner, if the latter complies, he receives a
good meal. If he does not, he gets a diet of unappetizing food containing
limited vitamins, minerals and calories.</p>
<p>This diet is supplemented occasionally by the interrogator if the prisoner
cooperates. Studies of controlled starvation indicate that the whole value-
system of the subjects underwent a change. Their irritation increased
as their ability to think clearly decreased. The control of tobacco presented
an even greater source of conflict for heavy smokers. Because tobacco is not
necessary to life, being manipulated by his craving for it can in the
individual a strong sense of guilt.</p>
<p>CRITICISM AND SELF-CRITICISM</p>
<p>There are mechanisms of thought control. Self-criticism gains its
effectiveness from the fact that although it is not a crime for a man to be
wrong, it is a major crime to be stubborn and to refuse to learn. Many
individuals feel intensely relieved in being able to share their sense of
guilt.</p>
<p>Those individuals however, who have adjusted to handling their guilt
internally have difficulty adapting to criticism and self-criticism. In
brainwashing, after a sufficient sense of guilt has been created in the
individual, sharing and self-criticism permit relief. The price paid for
this relief, however, is loss of individuality and increased dependency.</p>
<p><ent type='ORG'>HYPNOSIS</ent> AND DRUGS AS CONTROLS</p>
<p>There is no reliable evidence of making widespread use of drugs or hypnosis
in brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and mood swings.</p>
<p>Other methods of control, which when used in conjunction with the basic
processes, hasten the deterioration of prisoners' sense of values and
resistance are:</p>
<p>A. Requiring a case history or autobiography of the prisoner provides a mine
of information for the interrogator in establishing and documenting
accusations.</p>
<p>B. Friendliness of the interrogator, when least expected, upsets the
prisoner's ability to maintain a critical attitude.</p>
<p>C. Petty demands, such as severely limiting the allotted time for use of
toilet facilities or requiring the POW to kill hundreds of flies, are
harassment methods.</p>
<p>D. Prisoners are often humiliated by refusing them the use of toilet
facilities during interrogation, until they soil themselves. Often
prisoners were not permitted to bathe for weeks until they felt
contemptible.</p>
<p>E. Conviction as a war criminal appears to be a potent factor in creating
despair in the individual. One official analysis of the pressures exerted
by the ChiComs on confessors and non-confessors to participation in
bacteriological warfare in <ent type='GPE'>Korea</ent> showed that actual trial and conviction
of war crimes was overwhelmingly associated with breakdown and confession.</p>
<p>F. Attempted elicitation of protected information at various times during
the brainwashing process diverted the individual from awareness of the
deterioration of his value-system.</p>
<p>The fact that, in most cases, the ChiComs did not want or need such
intelligence was not known to the prisoner. His attempts to protect
such information was made at the expense of hastening his own breakdown.</p>
<p> EXERCISE OF CONTROL
A SCHEDULE FOR BRAINWASHING</p>
<p>From the many fragmentary accounts reviewed, the following appears to be the
most likely description of what occurs during brainwashing. In the period
immediately following capture, the captors are faced with the problem of
deciding on best ways of exploitation of the prisoners.</p>
<p>Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. Concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological softening-up which
includes: limited unpalatable food rations, withholding of tobacco, possible
work details, severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness, limitation of sleep such as requiring a
subject to sleep with a bright light in his eyes.</p>
<p>The interrogation and autobiographical material, the reports of the
prisoner's behaviour in confinement and tentative personality typing by the
interrogators, provide the basis upon which exploitation plans are made.</p>
<p>There is a major difference between preparation for elicitation and for
brainwashing. Prisoners exploited through elicitation must retain sufficient
clarity of thought to be able to give coherent, factual accounts.</p>
<p>In brainwashing, on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defence, the controlled individual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes. The
most important aspect of the brainwashing process is the interrogation. The
other pressures are designed primarily to help the interrogator achieve his
goals. The following states are created systematically within the
individual. These may vary in order, but all are necessary to the
brainwashing process:</p>
<p>1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.
2. An initial reaction of surprise.
3. A feeling of uncertainty about what is required of him.
4. A developing feeling of dependence upon the interrogator.
5. A sense of doubt and loss of objectivity.
6. Feelings of guilt.
7. A questioning attitude toward his own value-system.
8. A feeling of potential breakdown i.e., that he might go crazy.
9. A need to defend his acquired principles.
10. A final sense of belonging (identification).</p>
<p>A feeling of helplessness in the face of the impersonal machinery of control
is carefully engendered within the prisoner. The individual who receives the
preliminary treatment described above not only begins to feel like an animal
but also feels that nothing can be done about it. No one pays any personal
attention to him. His complaints fall on deaf ears. His loss of
communication, if he has been isolated, creates a feeling that he has been
forgotten. Everything that happens to him occurs according to an impersonal
time schedule that has nothing to do with his needs. The voices and
footsteps of the guards are muted. He notes many contrasts, e.g., his
greasy, unpalatable food may be served on battered tin dishes by guards
immaculately dressed in white.</p>
<p>The first steps in depersonalization of the prisoner have begun. He has no
idea what to expect. Ample opportunity is allotted for him to ruminate upon
all the unpleasant or painful things that could happen to him. He approaches
the main interrogator with mixed feelings of relief and fright.</p>
<p>Surprise is commonly used in the brainwashing process. The prisoner is rarely
prepared for the fact that the interrogators are usually friendly and
considerate at first. They make every effort to demonstrate that they are
reasonable human beings.</p>
<p>Often they apologize for bad treatment received by the prisoner and promise
to improve his lot if he, too, is reasonable. This behaviour is not what he
has steeled himself for. He lets down some of his defences and tries to take
a reasonable attitude. The first occasion he balks at satisfying a request
of the interrogator, however, he is in for another surprise. The formerly
reasonable interrogator unexpectedly turns into a furious maniac. The
interrogator is likely to slap the prisoner or draw his pistol and threaten
to shoot him. Usually this storm of emotion ceases as suddenly as it began
and the interrogator stalks from the room. These surprising changes create
doubt in the prisoner as to his very ability to perceive another person's
motivations correctly. His next interrogation probably will be marked by
impassivity in the interrogator's mien.</p>
<p>A feeling of uncertainty about what is required of him is likewise carefully
engendered within the individual. Pleas of the prisoner to learn specifically
of what he is accused and by whom are side-stepped by the interrogator.</p>
<p>Instead, the prisoner is asked to tell why he thinks he is held and what he
feels he is guilty of. If the prisoner fails to come up with anything, he is
accused in terms of broad generalities (e.g, espionage, sabotage, acts of
treason against the people etc.)</p>
<p>This usually provokes the prisoner to make some statement about his
activities. If this take the form of a denial, he is usually sent to
isolation on further decreased food rations to think over his crimes.</p>
<p>This process can be repeated again and again, as soon as the prisoner thinks
of something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it. Meanwhile a strong sense of
dependence upon the interrogator is developed. It does not take long for the
prisoner to realize that the interrogator is the source of all punishment,
all gratification, and all communication. The interrogator, meanwhile,
demonstrates his unpredictbility. He is perceived by the prisoner as a
creature of whim.</p>
<p>At times, the interrogator can be pleased very easily and at other times no
effort on the part of the prisoner will placate him. The prisoner may begin
to channel so much energy into trying to predict the behaviour of the
unpredictable interrogator that he loses track of what is happening
inside himself. After the prisoner has developed the above psychological
and emotional reactions to a sufficient degree, the brainwashing begins in
earnest.</p>
<p>First, the prisoner's remaining critical faculties must be destroyed. He
undergoes long, fatiguing interrogations while looking at a bright light.
He is called back again and again for interrogations after minimal sleep.</p>
<p>He may undergo torture that tends to create internal conflict. Drugs may
be used to accentuate his mood swings. He develops depression when the
interrogator is being kind and becomes euphoric when the interrogator is
threatening the direst penalties. Then the cycle is reversed, the
prisoner finds himself in a constant state of anxiety which prevents him
from relaxing even when he is permitted to sleep. Short periods of
isolation now bring on visual and auditory hallucinations.</p>
<p>The prisoner feels himself losing his objectivity. It is in this state that
the prisoner must keep up an endless argument with the interrogator. He
may be faced with the confessions of other individuals who collaborated with
him in his crimes.</p>
<p>The prisoner seriously begins to doubts his own memory. This feeling is
heightened by his inability to recall little things like the names of the
people he knows very well or the date of his birth. The interrogator
patiently sharpens this feeling of doubt by more questioning. This tends to
create a serious state of uncertainty when the individual has lost most of
his critical faculties.</p>
<p>The prisoner must undergo additional internal conflict when strong feelings
of guilt are aroused within him. As any clinical psychologist is aware, it
is not at all difficult to create such feelings. Military servicemen are
particularly vulnerable.</p>
<p>No one can morally justify killing even in wartime. The usual justification
is on the grounds of necessity or self-defence. The interrogator is careful
to circumvent such justification. He keeps the interrogation directed toward
the prisoner's moral code. Every moral vulnerability is exploited by
incessant questioning along this line until the prisoner begins to question
the very fundamentals of his own value-system.</p>
<p>The prisoner must constantly fight a potential breakdown. He finds that
his mind is going blank for longer and longer periods of time. He can
not think constructively. If he is to maintain any semblance of psychological
integrity, he must bring to an end this state of interminable internal
conflict. He signifies a willingness to write a confession.</p>
<p>If this were truly the end, no brainwashing would have occurred. The
individual would simply have given in to intolerable pressure. The final
stage of the brainwashing process has just begun. No matter what the prisoner
writes in his confession the interrogator is not satisfied. The interrogator
questions every sentence of the confession. He begins to edit it with the
prisoner. The prisoner is forced to argue against every change. This is the
essence of brainwashing.</p>
<p>Every time that he gives in on a point to the interrogator, he must rewrite
his whole confession. Still the interrogator is not satisfied, in a desperate
attempt to maintain some semblance of integrity and to avoid further
brainwashing, the prisoner must begin to argue that what he has already
confessed to is true. He begins to accept as his own the statements he has
written. He uses many of the interrogator's earlier arguments to buttress
his position. By this process, identification with the interrogator's
value-system becomes complete.</p>
<p>It is extremely important to recognize that a qualitative change has taken
place within the prisoner. The brainwashed victim does not consciously
change his value-system; rather the change occurs despite his efforts. He is
no more responsible for this change than is an individual who snaps and
becomes psychotic. Like the psychotic, the prisoner is not even aware of the
transition.
</p>
<p>DEFENSIVE MEASURES</p>
<p>1. Training of Individuals potentially subject to <ent type='NORP'>communist</ent> control.
Training should provide for the trainee a realistic appraisal of what
control pressures the interrogators are likely to exert and what the
usual human reactions are to such pressures. The trainee must learn the
most effective ways of combating his own reactions to such pressures and
he must learn reasonable expectations as to what his behaviour should be.</p>
<p> Training has two decidedly positive effects; first, it provides the
trainee with ways of combating control; second, it provides the basis for
developing an immeasurable boost in morale. Any positive action that the
individual can take, even if it is only slightly effective, gives him a
sense of control over a situation that is otherwise controlling him.</p>
<p>2. Training must provide the individual with the means of recognizing
realistic goals for himself.</p>
<p> A. Delay in yielding may be the only achievement that can be hoped for.
In any particular operation, the agent needs the support of knowing
specifically how long he must hold out to save an operation, protect
his cohorts, or gain some other goal.</p>
<p> B. The individual should be taught how to achieve the most favourable
treatment and how to behave and make necessary concessions to obtain
minimum penalties.</p>
<p> C. Individual behavioural responses to the various control pressures
differ markedly. Therefore, each trainee should know his own particular
assets and limitations in resisting specific pressures. He can learn
these only under laboratory conditions simulating the actual pressures
he may have to face.</p>
<p> D. Training must provide knowledge of the goals and the restrictions
placed upon his interrogator. The trainee should know what controls
are on his interrogator and to what extent he can manipulate the
interrogator.</p>
<p> For example, the interrogator is not permitted to fail to gain
something from the controlled individual. The knowledge that, after
the victim has proved that he is a tough nut to crack he can
sometimes indicate that he might compromise on some little point to
help the interrogator in return for more favourable treatment, may be
useful indeed. Above all, the potential victim of interrogator control
can gain a great deal of psychological support from the knowledge that
the interrogator is not a completely free agent who can do whatever he
wills with his victim.</p>
<p> E. The trainee must learn what practical cues might aid him in recognizing
the specific goals of his interrogator. The strategy of defence against
elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the individual may hasten his
own state of mental confusion; whereas, to prevent brainwashing,
maintaining clarity of thought processes is imperative.</p>
<p> F. The trainee should obtain knowledge about carrots as well as sticks.
They keep certain of their promises and always renege on others, for
example, demonstrable the fact that informers receive no better
treatment than other prisoners should do much to prevent this particular
evil. On the other hand, certain meaningless concessions will often get
a prisoner a good meal.</p>
<p> G. In particular, it should be emphasized to the trainee that, although
little can be done to control the pressures exerted upon him, he can
learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about
internal conflict and conflict-producing mechanisms. He should learn
to recognize when someone is trying to arouse guilt feelings and what
behavioural reactions can occur as a response to guilt.</p>
<p> H. The training must teach some methods that can be utilized in thwarting
particular control techniques:</p>
<p>ELICITATION</p>
<p>In general, individuals who are the hardest to interrogate for information
are those who have experienced previous interrogations. <ent type='ORG'>Practice</ent> in being
the victim of interrogation is a sound training device.</p>
<p>TORTURE
The trainee should learn something about the principles of pain and shock.
There is a maximum to the amount of pain that can actually be felt. Any
amount of pain can be tolerated for a limited period of time. In addition,
the trainee can be fortified by the knowledge that there are legal
limitations upon the amount of torture that can be inflicted by jailors.</p>
<p>ISOLATION</p>
<p>The psychological effects of isolation can probably be thwarted best by
mental gymnastics and systematic efforts on the part of the isolate to
obtain stimulation for his neural end
organs. Controls on Food and Tobacco. Food given will always be enough to
maintain survival, sometimes the victim gets unexpected opportunities
to supplement his diet with special minerals, vitamins and other nutrients
(e.g., iron from the rust of prison bars).</p>
<p>In some instances, experience has shown that individuals could exploit
refusal to eat. Such refusal usually resulted in the transfer of the
individual to a hospital where he received vitamin injections and
nutritious food. Evidently attempts of this kind to commit suicide arouse
the greatest concern in officials.</p>
<p>If deprivation of tobacco is the control being exerted. The victim can gain
moral satisfaction from giving up tobacco. He can't lose since he is not
likely to get any anyway.</p>
<p>FATIGUE</p>
<p>The trainee should learn reactions to fatigue and how to overcome them
insofar as possible. For example, mild physical exercise clears the head in
a fatigue state.</p>
<p>WRITING PERSONAL ACCOUNTS AND SELF-CRITICISM</p>
<p>Experience has indicated that one of the most effective ways of combating
these pressures is to enter into the spirit with an overabundance of
enthusiasm.</p>
<p>Endless written accounts of inconsequential material have virtually
smothered some eager interrogators. In the same spirit, sober, detailed
self-criticisms of the most minute sins has sometimes brought good results.</p>
<p>Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an individual's
duties may become mutually incompatible in this situation.</p>
<p>Take the example of a senior grade military officer, he has the knowledge
of sensitive strategic intelligence which it is his duty to protect. He
has the responsibility of maintaining the physical fitness of his men and
serving as a model example for their behaviour. The officer may go to the
camp commandant to protest the treatment of the <ent type='ORG'>POW`s</ent> and the commandant
assures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another.</p>
<p>The officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for any
other behaviour if he does his utmost to carry out his highest priority
responsibility.</p>
<p>There is considerable evidence that many individuals tried to evaluate the
priority of their responsibilities on their own, but were in conflict over
whether others would subsequently accept their evaluations. More than one
individual was probably brainwashed while he was trying to protect himself
against elicitation.</p>
<p>CONCLUSIONS</p>
<p>The application of known psychological principles can lead to an
understanding of brainwashing.</p>
<p>1. There is nothing mysterious about personality changes resulting from the
brainwashing process.</p>
<p>2. Brainwashing is a complex process. Principles of motivation, perception,
learning, and physiological deprivation are needed to account for the
results achieved in brainwashing.</p>
<p>3. Brainwashing is an involuntary re-education of the fundamental beliefs of
the individual. To attack the problem successfully, the brainwashing
process must be differentiated clearly from general education methods for
thought-control or mass indoctrination, and elicitation.</p>
<p>4. It appears possible for the individual, through training, to develop
limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting
individual emotional reactions to brainwashing techniques rather than to
ward thwarting the techniques themselves.</p>
<p>DEVELOPMENT IN THE FIELD OF CONTROL OF HUMAN BEHAVIOUR</p>
<p>1. There are two major methods of altering or controlling human behaviour
and the <ent type='NORP'>Soviets</ent> where interested in both.</p>
<p> The first is psychological; the second, pharmacological. The two may be
used as individual methods or for mutual reinforcement.</p>
<p> For long-term control of large numbers of people, the former method is
more promising than the latter. In dealing with individuals, the U.S.
experience suggests the pharmacological approach (plus psychological
techniques) would be the only effective method. Neither method would be
very effective for individuals on a long term basis.</p>
<p>2. <ent type='NORP'>Soviet</ent> research on the pharmacological agents producing behavioural
effects has consistently lagged about five years behind <ent type='NORP'>Western</ent> research.</p>
<p> They have been interested in such research and are now pursuing research
on such chemicals as LSD-25, amphetamines, tranquillizers, hypnotics and
similar materials. There is no present evidence that anyone has any
singular, new, potent drugs to force a course of action on an individual.</p>
<p> They are aware of the tremendous drive produced by drug addiction and
perhaps could couple this with psychological direction to achieve
control of an individual.</p>
<p>3. The psychological aspects of behaviour control would include not only
conditioning by repetition and training, but such things as hypnosis,
deprivation, isolation, manipulation of guilt feelings, subtle or covert
threats, social pressure and so on.</p>
<p>Some of the newer trends in the <ent type='GPE'>USSR</ent> where as follows:</p>
<p>A. The adoption of a multi-disciplinary approach integrating biological,
social and physicalmathematical research in attempts better to
understand, and eventually, to control human behaviour in a manner
consonant with national plans.</p>
<p>B. The outstanding feature, in addition to the inter-disciplinary approach,
is a new concern for mathematical approaches to an understanding of
behaviour.</p>
<p> Particularly notable are attempts to use modern information theory,
automata theory and feedback concepts in interpreting the mechanisms by
which the second signal system, i.e., speech and associated phenomena,
affect human behaviour.</p>
<p> Implied by this second signal system, using information inputs as
causative agents rather than chemical agents, electrodes or other more
exotic techniques applicable, perhaps, to individuals rather than groups.</p>
<p>C. This new trend, observed in the early <ent type='NORP'>Soviet</ent> post-Stalin period,
continues. By 1960 the word cybernetics was used by the <ent type='NORP'>Soviets</ent> to
designate this new trend.</p>
<p> This science is considered by some as the key to understanding the human
brain and the product of its functioning - Psychic activity and
personality - To the development of means for controlling it and to ways
for moulding the character of <ent type='ORG'>the New Communist</ent> Man.</p>
<p> As one <ent type='NORP'>Soviet</ent> author put it: <ent type='ORG'>Cybernetics</ent> can be used in moulding of a
child's character, the inculcation of knowledge and techniques, the
amassing of experience, the establishment of social behaviour patterns,
all functions which can be summarized as 'control' of the growth process
of the individual. Students of particular disciplines in the <ent type='GPE'>USSR</ent>, such
as psychologist and social scientists, also support the general
cybernetic trend.
Research indicates that the <ent type='NORP'>Soviets</ent> had attempted to develop a technology
for controlling the development of behavioural patterns among the
citizens of the <ent type='GPE'>USSR</ent> in accordance with politically determined
requirements of the system. Furthermore, the same technology can be
applied to more sophisticated approaches to the coding of information for
transmittal to population targets in the battle for the minds of men.</p>
<p> Some of the more esoteric techniques such as ESP or, as the <ent type='NORP'>Soviets</ent> call
it, biological radio-communication, and psychogenic agents such as LSD,
are receiving some overt attention with, possibly, applications in mind
for individual behaviour control under clandestine conditions.</p>
</xml>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,111 @@
<xml><p>
Wrong Number BBS FILE NAME: <ent type='ORG'>BUSHBOMB</ent>.TXT
[Reproduced with permission from _The Spotlight_, June 22, 1992
The Spotlight
300 Independence Avenue, SE
<ent type='GPE'>Washington</ent>, DC 20003
Free use of this material is permitted provided that _The Spotlight_
is credited, including publisher's address]
BUSH LINKED TO TERROR BOMBING;
WILL U.N. ASK FOR EXTRADITION?:
Shocking Evidence Revealed
The evidence pointing to President Bush's role in the terrorist bombing of
a <ent type='NORP'>Cuban</ent> airliner grows stronger with new revelations. Will the UN Security
Council demand his extradition to <ent type='GPE'>Cuba</ent> or the <ent type='ORG'>World Court</ent>, as Bush and the
UN have done in the case of <ent type='NORP'>Libyan</ent> suspects in a similar crime?
By Warren Hough
Exclusive to The Spotlight
<ent type='GPE'>Washington</ent>, DC, 6/12/92 -- Long-suppressed records have turned up
"shattering" new evidence of the role played by President George Bush in
the <ent type='ORG'>midair</ent> bombing of a <ent type='NORP'>Cuban</ent> airliner and in its subsequent cover-up,
<ent type='NORP'>Latin American</ent> officials conducting a "preliminary review" of the tragic
incident have told the UN Security Council.
The secret files reportedly confirm that in mid-1976, while serving as
<ent type='ORG'>CIA</ent> chief, Bush was in "overall command" of a botched sabotage operation
that ended in the crash of a <ent type='NORP'>Cuban</ent> passenger jet, killing all 73 aboard,
The SPOTLIGHT has learned from diplomatic sources close to the
investigation.
A <ent type='ORG'>CIA</ent> agent identified as Luis Posada was arrested by <ent type='NORP'>Venezuelan</ent>
authorities shortly after the <ent type='NORP'>Cuban</ent> plane exploded in <ent type='ORG'>midair</ent> during its
takeoff from a <ent type='LOC'>Caribbean</ent> stopover, these sources say. Posada, a member of
a sizable <ent type='ORG'>CIA</ent> contingent conducting covert operations from <ent type='NORP'>Venezuelan</ent> bases
at the time, was charged with having smuggled an explosive device aboard
the flight, and held for trial.
Bush, anxious to disclaim all responsibility for such an atrocious
terrorist outrage, ordered a "no-holds-barred" cover-up of the crime, the
record suggests.
"In order to take the heat off Posada, the <ent type='ORG'>CIA</ent> targeted another
suspect, Dr. <ent type='ORG'>Orlando Bosch</ent>, a militant <ent type='NORP'>Cuban</ent> exile activist who advocated
`armed action' against the Castro dictatorship," recounted Felipe Rivero,
the popular <ent type='GPE'>Miami</ent> broadcaster who is The SPOTLIGHT's correspondent in the
region."
<ent type='GPE'>Venezuela</ent>'s secret police, known after its <ent type='NORP'>Spanish</ent> initials as DISIP,
maintained close relations with the <ent type='ORG'>CIA</ent> and followed its lead. <ent type='ORG'>Bosch</ent> was
imprisoned and charged with complicity in the bombing in <ent type='GPE'>Venezuela</ent>.
<ent type='ORG'>BUSH ORCHESTRATION</ent>
The next move in the cover-up reportedly orchestrated by Bush was to
"recover" Posada, these sources day. In a well-organized and lavishly
financed jailbreak, the alleged aerial bomber was spirited from <ent type='GPE'>Venezuela</ent>
to <ent type='GPE'>Panama</ent>, where the <ent type='ORG'>CIA</ent> issued him a new set of identity documents under
the name of Ramon <ent type='LOC'>Medina</ent>, a <ent type='NORP'>Guatemalan</ent> businessman.
In the concluding move of the cover-up, Posada, now known as "<ent type='LOC'>Medina</ent>,"
was handed over to Felix Rodriguez, a senior <ent type='ORG'>CIA</ent> field agent with whom Bush
had a personal working relationship, the record shows. Rodriguez gave
Posada a series of covert jobs with <ent type='ORG'>CIA</ent> teams stationed in <ent type='LOC'>Central America</ent>,
largely in order to protect him and "keep him happy," these sources
related.
"I, for my part, spent 11 years in various maximum security <ent type='NORP'>Venezuelan</ent>
prisons," <ent type='ORG'>Bosch</ent> told a SPOTLIGHT reporter during a recent telephone
interview. "During those years, I was put on trial four times for that
airplane bombing. My case was heard by military, civilian and appellate
courts. I was found innocent each time. But after each acquittal, the <ent type='ORG'>CIA</ent>
came up with new `suggestions' about my guilt."
<ent type='ORG'>PALE</ent> AND FRAIL
Finally the <ent type='NORP'>Venezuelan</ent> government told <ent type='GPE'>Washington</ent> it could no longer
hold <ent type='ORG'>Bosch</ent>. Pale and in frail health, the falsely accused "terrorist" was
flown back to <ent type='GPE'>Miami</ent>. "Here I could hope for no acquittal," recounted
<ent type='ORG'>Bosch</ent>. "At the airport, immigration officials threw me into chains. I was
held in solitary confinement for 29 months."
Finally granted a provisional release after leading <ent type='NORP'>Cuban</ent>-American
<ent type='NORP'>Republicans</ent> pressed his cause without letup, <ent type='ORG'>Bosch</ent> now lives in seclusion
near <ent type='GPE'>Miami</ent>. "My status is that of a `deportable' alien," he told The
SPOTLIGHT. "If I engage in any political activity, or even if I talk too
much, I can be tossed back into jail. I am in no position to comment on
controversial questions -- not even in my own cause."
Living under the assumed name and a small <ent type='ORG'>CIA</ent> paycheck in Central
America also proved difficult for Posada, SPOTLIGHT correspondent Rivero
reports. "A couple of years ago, two men walked up to Posada in a
<ent type='NORP'>Guatemalan</ent> restaurant and shot him five times," Rivero related. "He
survived the shooting by a sheer miracle. Badly injured -- he lives
largely on liquefied food and walks with a crutch, I hear -- he has
vanished into the `protective custody' of the <ent type='ORG'>CIA</ent>."
The reason for Posada's attempted assassination is known, however. He
"drank a bit and began to talk too much," U.N. sources said. "The <ent type='ORG'>CIA</ent>
needed an airtight cover-up of that airline bombing. When Posada turned
talkative, his usefulness to Bush was at an end -- and, but for an iron
physique and that miraculous survival, he would have been, too."
Now the U.N. Security Council, having assumed jurisdiction over such
international terrorist crimes when it clamped harsh sanctions on <ent type='GPE'>Libya</ent>
last April, faces a tougher challenge: How to deal with a case of aerial
mass murder in which the principal suspect happens to be THE INCUMBENT
PRESIDENT OF <ent type='GPE'>THE UNITED STATES</ent>.
</p></xml>

View File

@ -0,0 +1,246 @@
<xml><p>
*** The "Liberation of the Camps": FACTS vs. LIES ***</p>
<p> By Theodore J. O'Keefe
_______________________________________________________________________________</p>
<p> Nothing has been more effective in establishing the authenticity of the Holocaust in the minds of <ent type='NORP'>Americans</ent> than the terrible scenes U.S. GI's discovered when they entered the <ent type='NORP'>German</ent> concentration camps at the close of World War II.</p>
<p> At <ent type='GPE'>Dachau</ent>, <ent type='GPE'>Buchenwald</ent>, Dora, Mauthausen, and other work and detention camps, horrified <ent type='NORP'>American</ent> infantrymen encountered heaps of dead and dying inmates, emaciated and diseased. Survivors told them hair-raising stories of torture and slaughter, a
d backed up their claims by showing the GI's crematory ovens, alleged gas chambers, supposed implements of torture, even shrunken heads and lampshades, gloves, and handbags purportedly made from skin flayed from dead inmates.</p>
<p> U.S. government authorities, mindful that most <ent type='NORP'>Americans</ent>, who remembered the atrocity stories fed them during World War I, still doubted the <ent type='ORG'>Allied</ent> propaganda directed against the Hitler regime, resolved to "document" what the GI's had found in
he camps. Prominent newsmen and politicians were flown in to see the harrowing evidence, while the U.S. <ent type='ORG'>Army</ent> Signal Corps filmed and photographed the scenes for posterity. The famous journalist Edward R. Murrow reported, in tones of horror, but no lo
ger of disbelief, what he had been told and shown, and <ent type='GPE'>Dachau</ent> and <ent type='GPE'>Buchenwald</ent> were branded on the hearts and minds of the <ent type='NORP'>American</ent> populace as names of infamy unmatched in the sad and bloody history of this planet.</p>
<p> For <ent type='NORP'>Americans</ent>, what was "discovered" at the camps - the dead and the diseased, the terrible stories of the inmates, all the props of torture and terror - became the basis not simply of a transitory propaganda campaign but of the conviction that
es, it was true: the <ent type='NORP'>German</ent>s DID exterminate six million <ent type='NORP'>Jews</ent>, most of them in lethal gas chambers. What the GI's found was used, by way of films which were mandatory viewing for the vanquished populace of <ent type='NORP'>German</ent>y, to "re-educate" the <ent type='NORP'>German</ent> people b
destroying their national pride and their will to a united, independant national state, imposing in their place overwhelming feelings of collective guilt and political impotence. And when the testimony, and the verdict, at <ent type='GPE'>Nuremberg</ent> incorporated mos
, if not all, of the horror stories <ent type='NORP'>Americans</ent> were told about <ent type='GPE'>Dachau</ent>, <ent type='GPE'>Buchenwald</ent>, and other places captured by the U.S. <ent type='ORG'>Army</ent>, the Holocaust could pass for one of the most documented, one of the most authenticated, one of the most proven historical ep
sodes in the human record.</p>
<p> A Different Reality</p>
<p>* But it is known today that, very soon after the liberation of the *
* camps, <ent type='NORP'>American</ent> authorities were aware that the real story of the camps *
* was quite different from the one in which they were coaching military *
* public information officers, government spokesmen, politicians, *
* journalists, and other mouthpieces. *</p>
<p> When <ent type='NORP'>American</ent> and <ent type='NORP'>British</ent> forces overran western and central <ent type='NORP'>German</ent>y in the spring of 1945, they were followed by troops charged with discovering and securing any evidence of <ent type='NORP'>German</ent> war crimes. Among them was Dr. Charles <ent type='ORG'>Larson</ent>, one of <ent type='GPE'>America</ent>'s
leading forensic pathologists, who was assigned to the Judge Advocate General's Department. Dr. <ent type='ORG'>Larson</ent> performed autopsies at <ent type='GPE'>Dachau</ent> and some twenty other <ent type='NORP'>German</ent> camps, examining on some days more than 100 corpses. After his grim work at <ent type='GPE'>Dachau</ent>, he w
s questioned for three days by U.S. <ent type='ORG'>Army</ent> prosecutors.^1</p>
<p> Dr. <ent type='ORG'>Larson</ent>'s findings? According to an interview he gave to an <ent type='NORP'>American</ent> journalist in 1980, "What we've heard is that six million <ent type='NORP'>Jews</ent> were exterminated. Part of that is a hoax."^2 And what part was the hoax? Dr. <ent type='ORG'>Larson</ent>, who told his biographer
hat to his knowledge he "was the only forensic pathologist on duty in the entire <ent type='ORG'>European Theater</ent>,"^3 informed "<ent type='ORG'>Wichita Eagle</ent>" reporter Jan Floerchinger that "never was a case of poison gas uncovered."^4 Neither Dr. <ent type='ORG'>Larson</ent> nor any other forensic spec
alist has ever been cited by any Holocaust historian to substantiate a single case of death by poison gas, whether <ent type='ORG'>Zyklon</ent>-B or any other variety.</p>
<p> Typhus, Not Poison Gas</p>
<p> If not by gassing, how did the unfortunate victims at <ent type='GPE'>Dachau</ent>, <ent type='GPE'>Buchenwald</ent>, and Bergen-Belsen perish? Were they tortured to death? Deliberately starved? The answers to these questions are known as well. As Dr. <ent type='ORG'>Larson</ent> and other <ent type='ORG'>Allied</ent> medical men d
scovered, the chief cause of death at <ent type='GPE'>Dachau</ent>, Belsen, and the other camps was disease, above all typhus, an old and terrible scourge of mankind which until recently flourished in places where populations were crowded together in circumstances where p
blic health measures were unknown or had broken down. Such was the case in the overcrowded internment camps in <ent type='NORP'>German</ent>y at war's end, where, despite such measures as systematic delousing, quarantine of the sick, and cremation of the dead, the virtual
ollapse of <ent type='NORP'>German</ent>y's food, transport, and public health systems led to catastrophe.</p>
<p> Perhaps the most authoritative statement of the facts as to typhus and mortality in the camps has been made by Dr. John E. Gordon, M.D., Ph.D., a professor of preventive medicine and epidemiology at <ent type='ORG'>the Harvard University School</ent> of Public Health
who was with U.S. forces in <ent type='NORP'>German</ent>y in 1945. Dr. Gordon reported in 1948 that "The outbreaks in concentration camps and prisons made up the great bulk of typhus infection encountered in <ent type='NORP'>German</ent>y." Dr. Gordon summarized the causes for the outbreaks as
follows:</p>
<div> * * *</div>
<p> <ent type='NORP'>German</ent>y was in chaos. The destruction of whole cities and the path left by advancing armies produced a disruption of living conditions contributing to the spread of the disease. <ent type='ORG'>Sanitation</ent> was low grade, public utilities were seriously disrupted
food supply and food distribution was poor, housing was inadequate and order and discipline were everywhere lacking. Still more important, a shifting of populations was occurring such as few countries and few times have experienced.^5</p>
<div> * * *</div>
<p> Dr. Gordon's findings are corroborated by Dr. Russel Barton, today a psychiatrist of international repute, who entered Bergen-Belsen with <ent type='NORP'>British</ent> forces as a young medical student in 1945. Barton, who volunteered to care for the diseased survivo
s, testified under sworn oath in a <ent type='GPE'>Toronto</ent> courtroom in 1985 that "Thousands of prisoners who died at the Bergen-Belsen concentration camp during World War II weren't deliberately starved to death but died from a rash of diseases."^6 Dr. Barton furth
r testified that on entering the camp he had credited stories of deliberate starvations but had decided such stories were untrue after inspecting the well-equipped kitchens and the meticulously maintained ledgers, dating back to 1942, of food cooked
nd dispensed each day. Despite noisily publicized claims and widespread popular notions to the contrary, no researcher has been able to document a <ent type='NORP'>German</ent> policy of extermination through starvation in the <ent type='NORP'>German</ent> camps.</p>
<p> No Lampshades, No Handbags, Etc.</p>
<p> What of the ghoulish stories of concentration camp inmates skinned for their tattoos, flayed to make lampshades and handbags, or other artifacts? What of the innumerable "torture racks," "meathooks," whipping posts, gallows, and other tools of t
rment and death that are reported to have abounded at every <ent type='NORP'>German</ent> camp? These allegations, and even more grotesque ones profferred by <ent type='NORP'>Soviet</ent> prosecutors, found their way into the record at <ent type='GPE'>Nuremberg</ent>.</p>
<p> The lampshade and tattooed-skin charges were made against Ilse Koch, dubbed by journalists the "Bitch of <ent type='GPE'>Buchenwald</ent>," who was reported to have furnished her house with objects manufactured from the tanned hides of luckless inmates. But General L
cius Clay, military governor of the U.S. zone of occupied <ent type='NORP'>German</ent>y, who reviewed her case in 1948, told his superiors in <ent type='GPE'>Washington</ent>: "There is no convincing evidence that she [Ilse Koch] selected inmates for extermination in order to secure tattooed s
ins or that she possessed any articles made of human skin."^7 In an interview General Clay gave years later, he stated about the material for the infamous lampshades: "Well, it turned out actually that it was goat flesh. But at the trial it was still
human flesh. It was almost impossible for her to have gotten a fair trial."^8 Ilse Koch hanged herself in a West <ent type='NORP'>German</ent> jail in 1967.</p>
<p> It would be tedius to itemize and refute the thousands of bizarre claims as to <ent type='NORP'>Nazi</ent> atrocities. That there were instances of <ent type='NORP'>German</ent> cruelty, however, is clear from the testimony of Dr. Konrad Morgen, a legal investigator attached to the Reich Cr
minal Police, whose statements on the witness stand at <ent type='GPE'>Nuremberg</ent> have never been challenged by believers in the <ent type='NORP'>Jewish</ent> Holocaust. Dr. Morgen informed the court that he had been given full authority by Heinrich Himmler, commander of Hitler's SS and th
dread <ent type='ORG'>Gestapo</ent>, to enter any <ent type='NORP'>German</ent> concentration camp and investigate instances of cruelty and corruption on the part of the camp staffs. According to Dr. Morgen's sworn testimony at <ent type='GPE'>Nuremberg</ent>, he investigated 800 such cases, in which over 200 convi
tions resulted.^9 Punishments included the death penalty for the worst offenders, including Hermann Karl Koch, Ilse's husband, commandant of <ent type='GPE'>Buchenwald</ent>.</p>
<p> In reality, while camp commandants in certain cases did inflict physical punishment, such acts had to be approved by authorities in <ent type='GPE'>Berlin</ent>, and it was required that a camp physician first certify the good health of the prisoner to be disciplined
and then be on hand at the actual beating.^10 After all, the camps were throughout most of the war important centers of industrial activity. The good health and morale of the prisoners was critical to the <ent type='NORP'>German</ent> war effort, as is evidenced by a 1942
order issued by SS-Brigadefuhrer Richard Glucks, chief of the office which controlled the concentration camps, which held camp commanders "personally responsible for exhausting every possibility to preserve the physical strength of the detainees."^11</p>
<p> Concentration Camp Survivors - Merely Victims?</p>
<p> U.S. <ent type='ORG'>Army</ent> investigators, working at <ent type='GPE'>Buchenwald</ent> and other camps, quickly ascertained what was common knowledge among veteran inmates: that the worst offenders, the cruelest denizens of the camps were not the guards but the prisoners themselves. C
mmon criminals of the same stripe as those who populate U.S. prisons today committed many <ent type='GPE'>villainies</ent>, particularly when they held positions of authority, and fanatical <ent type='NORP'>Communists</ent>, highly organized to combat their many political enemies among the inma
es, eliminated their foes with <ent type='NORP'>Stalinist</ent> ruthlessness.</p>
<p> Two U.S. <ent type='ORG'>Army</ent> investigators at <ent type='GPE'>Buchenwald</ent>, Egon W. Fleck and Edward A. <ent type='ORG'>Tenenbaum</ent>, carefully investigated circumstances in the camp before its liberation. In a detailed report submitted to their superiors, they revealed, in the words of Alfred To
mbs, their commander, who wrote a preface to the report, "how the prisoners themselves organized a deadly terror within the <ent type='NORP'>Nazi</ent> terror."^12</p>
<p> Fleck and <ent type='ORG'>Tenenbaum</ent> described the power exercised by criminals and <ent type='NORP'>Communists</ent> as follows:
* * *</p>
<p>. . . The <ent type='ORG'>trusties</ent>, who in time became almost exclusively <ent type='NORP'>Communist</ent> <ent type='NORP'>German</ent>s, had the power of life and death over all other inmates. They could sentence a man or a group to almost certain death . . . The <ent type='NORP'>Communist</ent> <ent type='ORG'>trusties</ent> were directly responsible f
r a large part of the brutalities at <ent type='GPE'>Buchenwald</ent>.</p>
<div> * * *</div>
<p> Colonel Donald B. Robinson, chief historian of the <ent type='NORP'>American</ent> military government in <ent type='NORP'>German</ent>y, summarized the Fleck-<ent type='ORG'>Tenenbaum</ent> report in an article which appeared in "The <ent type='NORP'>American</ent> <ent type='ORG'>Mercury</ent>" shortly after the war. Colonel Robinson wrote succinctly of
he <ent type='NORP'>American</ent> investigators' findings: "It appeared that the prisoners who agreed with the <ent type='NORP'>Communists</ent> ate; those who didn't starved to death."^13</p>
<p> Additional corroboration of inmate brutality has been provided by Ellis E. Spackman, who, as Chief of Counter-Intelligence Arrests and Detentions for the Seventh U.S. <ent type='ORG'>Army</ent>, was involved in the liberation of <ent type='GPE'>Dachau</ent>. Spackman, later a professor of
history at <ent type='ORG'>San Bernardino Valley College</ent> in <ent type='GPE'>California</ent>, wrote in 1966 that at <ent type='GPE'>Dachau</ent> "the prisoners were the actual instruments that inflicted the barbarities on their fellow prisoners."^14</p>
<p> "Gas Chambers"</p>
<p> On December 9, 1944 Col. Paul Kirk and Lt. Col. Edward J. Gully inspected the <ent type='NORP'>German</ent> concentration camp at Natzweiler in <ent type='GPE'>Alsace</ent>. They reported their findings to their superiors at the headquarters of the U.S. 6th <ent type='ORG'>Army</ent> Group, which subsequently f
rwarded Kirk and Gully's report to <ent type='ORG'>the War Crimes Division</ent>. While, significantly, the full text of their report has never been published, it has been revealed, by an author supportive of Holocaust claims, that the two investigators were careful to ch
racterize equipment exhibited to them by <ent type='NORP'>French</ent> informants as a "SO-CALLED lethal gas chamber," and claim it was "<ent type='ORG'>ALLEGEDLY</ent> used as a lethal gas chamber"^15 [emphasis added].</p>
<p> Both the careful phraseology of the Natzweiler report, and its effective suppression, stand in stark contrast to the credulity, the confusion, and the blaring publicity which accompanied official reports of alleged gas chambers at <ent type='GPE'>Dachau</ent>. At fir
t, a U.S. <ent type='ORG'>Army</ent> photo depicting a GI gazing mournfully at a steel door marked with a skull and crossbones and the <ent type='NORP'>German</ent> words for: "Caution! Gas! Mortal danger! Don't open!" was identified as showing the murder weapon. Later, however, it was evidentl
decided that the apparatus in question was merely a standard delousing chamber for clothing, and another alleged gas chamber, this one cunningly disguised as a shower room, was exhibited to <ent type='NORP'>American</ent> congressmen and journalists as the site where thou
ands breathed their last. While there exist numerous reports in the press as to the operation of this second "gas chamber," no official report by trained <ent type='ORG'>Army</ent> investigators has yet surfaced to reconcile such problems as the function of the shower hea
s: Were they "dummies," or did lethal cyanide gas stream through them? (Each theory has appreciable support in journalistic and historiographical literature.)</p>
<p> As with <ent type='GPE'>Dachau</ent>, so with <ent type='GPE'>Buchenwald</ent>, Bergen-Belsen, and the other camps captured by the <ent type='ORG'>Allies</ent>. There was no end of propaganda about "gas chambers," "gas ovens," and the like, but so far not a single detailed description of the murder weapon and
ts function, not a single report of the kind that is mandatory for the successful prosecution of any assault or murder case in <ent type='GPE'>America</ent> at the time and today, has come to light.</p>
<p> Furthermore, a number of Holocaust authorities have now publicly decreed that there were no gassings, no extermination camps in <ent type='NORP'>German</ent>y after all! All these things, we are told, were located in what is now <ent type='GPE'>Poland</ent>, in areas captured by the <ent type='NORP'>Soviet</ent>
Red <ent type='ORG'>Army</ent> and off-limits to <ent type='NORP'>Western</ent> investigators. In 1960 Dr. Martin Broszat, who is now director of the <ent type='GPE'>Munich</ent>-based <ent type='ORG'>Institute for Contemporary History</ent>, which is funded by the West <ent type='NORP'>German</ent> government to SUPPORT the Holocaust story, wrote a letter to
he <ent type='NORP'>German</ent> weekly "Die <ent type='ORG'>Zeit</ent>" in which he stated categorically: "Neither in <ent type='GPE'>Dachau</ent> nor in Bergen-Belsen nor in <ent type='GPE'>Buchenwald</ent> were <ent type='NORP'>Jews</ent> or other prisoners gassed."^16 Professional <ent type='NORP'>Nazi</ent>-hunter Simon Wiesenthal wrote in 1975 that "there were no extermination
camps on <ent type='NORP'>German</ent> soil."^17 And <ent type='GPE'>Dachau</ent> "gas chamber" No. 2, which was once presented to a stunned and grieving world as a weapon which claimed hundreds of thousands of lives, is now described in the brochure issued to tourists at the modern <ent type='GPE'>Dachau</ent> "mem
rial site" in these words: "This gas chamber, camouflaged as a shower room, was not used."^18</p>
<p> The <ent type='ORG'>Propaganda</ent> Intensifies</p>
<p> More than forty years after <ent type='NORP'>American</ent> troops entered <ent type='GPE'>Dachau</ent>, <ent type='GPE'>Buchenwald</ent>, and the other <ent type='NORP'>German</ent> camps, and trained <ent type='NORP'>American</ent> investigators established the facts as to what had gone on in them, the government in <ent type='GPE'>Washington</ent>, the entertainment media in
<ent type='GPE'>Hollywood</ent>, and the print media in <ent type='GPE'>New York</ent> continue to churn out millions of words and images annually on the horrors of the camps and the infamy of the Holocaust. Despite the fact that, with the exception of the defeated Confederacy, no enemy of Ame
ica has ever so suffered so complete and devestating defeat as did <ent type='NORP'>German</ent>y in 1945, the mass media and the politicians and bureaucrats behave as if Hitler, his troops, and his concentration camps continue to exist in an eternal present, and our opini
n makers continue to distort, through ignorance or malice, the facts about the camps.</p>
<p> <ent type='ORG'>Time</ent> for the Truth</p>
<p> It is time that the government and the professional historians revealed the facts about <ent type='GPE'>Dachau</ent>, <ent type='GPE'>Buchenwald</ent>, and the other camps. It is time that they let the <ent type='NORP'>American</ent> public know how the inmates died, and how they didn't die. It is time that the
claims as to mass murder by gassing were clarified and investigated in the same manner as any other claims of murder are dealt with. It is time that the free ride certain groups have enjoyed as the result of unchallenged Holocaust claims be terminate
, just as it is time that other groups, including <ent type='NORP'>German</ent>s, eastern <ent type='NORP'>Europeans</ent>, the <ent type='NORP'>Roman Catholic</ent> hierarchy, and the wartime leadership of <ent type='GPE'>America</ent> and <ent type='GPE'>Britain</ent> stop being scapegoated, either for their alleged role in the Holocaust or their supposed fai
ure to stop it.</p>
<p> Above all, it is time that the citizens of this great democratic Republic have the facts about the camps, facts which they possess a right to know, a right that is fundamental to the exercise of their authority and their will in the governance o
their country. As citizens and as taxpayers, <ent type='NORP'>Americans</ent> of all ethnic backgrounds, of all faiths, have a basic right and an overriding interest in determining the facts of incidents which are deemed by those in positions of power to be determinative
n <ent type='GPE'>America</ent>'s foreign policy, in its educational policy, in its selection of past events to be memorialized in our civic life. The alleged facts of the Holocaust are today at issue all over the civilized world: in <ent type='NORP'>German</ent>y, in <ent type='GPE'>France</ent>, in <ent type='GPE'>Italy</ent>, in <ent type='GPE'>Brita</ent>
n, in the Low Countries and <ent type='LOC'>Scandinavia</ent>, in <ent type='GPE'>Japan</ent>, across our border in <ent type='GPE'>Canada</ent> and in <ent type='GPE'>the United States</ent> of <ent type='GPE'>America</ent> itself. The truth will be decided only by recourse to the facts, in the public forum: not by concealing the facts, denying the truth, s
onewalling reality. The truth will out, and it is time the government of this country, and governments and international bodies throughout the world, made public and patent the evidence of what actually transpired in the <ent type='NORP'>German</ent> concentration camps in
the years 1933-1945, so that we may put paid to the lies, without fear or favor, and carry out the work of reconciliation and renewal that is and must be the granite foundation of mutual tolerance between peoples and of a peace based on justice, rath
r than on guns, barbed wire, prisons, and lies.</p>
<p> NOTES</p>
<p> 1. _Crime Doctor_, a biography of <ent type='ORG'>Larson</ent> by John D. McCallum, <ent type='GPE'>Mercer</ent>,
<ent type='GPE'>Washington</ent> &amp; <ent type='GPE'>Vancouver</ent>, <ent type='NORP'>British</ent> Columbia, <ent type='GPE'>Canada</ent>, 1979, p. 69.</p>
<p> 2. _<ent type='ORG'>Wichita Eagle</ent>_, April 1, 1980, p. 4C.</p>
<p> 3. _Crime Doctor_, p. 46.</p>
<p> 4. _<ent type='ORG'>Wichita Eagle</ent>_, April 1, 1980, p. 4C.</p>
<p> 5. John E. Gordon, "Louse-Borne Typhus Fever in the <ent type='ORG'>European Theater</ent> of
Operations, U.S. <ent type='ORG'>Army</ent>, 1945," in <ent type='ORG'>Forest</ent> Ray Moulton, Ed., _Rickettsial
Diseases of Man_, Am. Acad. for <ent type='ORG'>the Advancement</ent> of Science, <ent type='GPE'>Washington</ent> D.C.
1948.</p>
<p> 6. _<ent type='GPE'>Toronto</ent> Star_, February 8, 1985, p. A2.</p>
<p> 7. _<ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s_, 24 September 1948, p. 3.</p>
<p> 8. Interview with Lucius Clay, _Official Proceeding of the George C. Marshall
Research Foundation,_ cited in "<ent type='GPE'>Buchenwald</ent>: Legend and Reality," Mark
Weber, _<ent type='ORG'>The Journal</ent> of Historical Review_, Vol. 7, no. 4.</p>
<p> 9. International Military Tribunal, Vol. XVII, p. 556; IMT, Vol. XX, pp. 489,
438.</p>
<p>10. Cited in _The Theory and Practice of Hell_, Eugen Kogon, <ent type='ORG'>Berkley Books</ent>, New
York, pp. 108-109.</p>
<p>11. <ent type='GPE'>Nuremberg</ent> document NO-1523.</p>
<p>12. _<ent type='GPE'>Buchenwald</ent>: A Preliminary Report_, Egon W. Fleck and Edward A. <ent type='ORG'>Tenenbaum</ent>,
U.S. <ent type='ORG'>Army</ent>, 12th <ent type='ORG'>Army</ent> Group, 24 April 1945. <ent type='ORG'>National Archives</ent>, Record Group
331, <ent type='ORG'>SHAEF</ent>, G-5, 17.11, Jacket 10, Box 151 (8929/163-8929/180).</p>
<p>13. "<ent type='NORP'>Communist</ent> Atrocities at <ent type='GPE'>Buchenwald</ent>," Donald B. Robinson, in _<ent type='NORP'>American</ent>
<ent type='ORG'>Mercury</ent>_, October 1946.</p>
<p>14. _San Bernardino Sun-Telegram_, March 13, 1966 (cited in _The Man Who
Invented "Genocide"_, James J. Martin, Institute for Historical Review,
IHR, 1984, pp. 110-111.</p>
<p>15. _Concentration Camp at <ent type='GPE'>Natzwiller</ent> [sic]_, RG 331, Records of <ent type='ORG'>Allied</ent>
Operations and Occupation, <ent type='ORG'>Army</ent> Headquarters WW2, <ent type='ORG'>SHAEF</ent>/G-5/2717, Modern
Military, <ent type='ORG'>National Archives</ent>, <ent type='GPE'>Washington</ent>, D.C., cited in Robert H. Abzug,
_Inside the Vicious Heart_, <ent type='ORG'>Oxford University Press</ent>, <ent type='GPE'>New York</ent>, 1985, p. 10,
p. 181.</p>
<p>16. _Die <ent type='ORG'>Zeit</ent>_, <ent type='GPE'>Hamburg</ent>, <ent type='NORP'>German</ent>y, August 26, 1960.</p>
<p>17. _Books &amp; Bookmen_, April 1975, Vol. 7, p. 5.</p>
<p>18. Leaflet, _Memorial Site Concentration Camp <ent type='GPE'>Dachau</ent>_, The International
<ent type='GPE'>Dachau</ent>-Committee, <ent type='GPE'>Dachau</ent>, <ent type='NORP'>German</ent>y, n.d.
_______________________________________________________________________________</p>
<p> Theodore J. O'Keefe is the editor of "<ent type='ORG'>The Journal</ent> of Historical Review." Educated at <ent type='ORG'>Harvard</ent>, he has studied history and literature on three continents, and has published many articles on historical and political subjects.
_____________________________________________________________________________
| |
| The conclusions of the early U.S. <ent type='ORG'>Army</ent> investigations as to the |
| truth about the wartime <ent type='NORP'>German</ent> concentration camps have since been |
| corroborated by all subsequent investigators and can be summarized: |
| |
| 1. The harrowing scenes of dead and dying inmates were not the result of |
| a <ent type='NORP'>German</ent> policy of "extermination," but rather the result of epidemics of |
| typhus and other disease brought about largely by the effects of <ent type='ORG'>Allied</ent> |
| aerial attacks. |
| |
| 2. Stories of <ent type='NORP'>Nazi</ent> supercriminals and sadists who turned <ent type='NORP'>Jews</ent> and others |
| into handbags and lampshades for their private profit or amusement were |
| sick lies or diseased fantasies; indeed, the <ent type='NORP'>German</ent> authorities |
| consistently punished corruption AND cruelty on the part of camp |
| commanders and guards. |
| |
| 3. On the other hand, the representations of the newly liberated inmates |
| to have been saints and martyrs of Hitlerism were quite often very far |
| from the truth; indeed, most of the brutalities inflicted on camp |
| detainees were the work of their fellow prisoners, in contravention of |
| <ent type='NORP'>German</ent> policy and <ent type='NORP'>German</ent> orders. |
| |
| 4. The alleged homicidal showers and gas chambers had been used either |
| for bathing camp inmates or delousing their clothes; the claim that they |
| had been used to murder <ent type='NORP'>Jews</ent> or other human beings is a contemptible |
| fabrication. Orthodox, Establishment historians and professional "<ent type='NORP'>Nazi</ent>- |
| hunters" have quietly dropped claims that inmates were gassed at <ent type='GPE'>Dachau</ent>, |
| <ent type='GPE'>Buchenwald</ent>, and other camps in <ent type='NORP'>German</ent>y. They continue, however, to keep |
| silent regarding the lies about <ent type='GPE'>Dachau</ent> and <ent type='GPE'>Buchenwald</ent>, as well as to |
| evade an open discussion of the evidence for homicidal gassing at |
| Auschwitz and the other camps captured by the <ent type='NORP'>Soviet</ent>s. |
|_____________________________________________________________________________|</p>
<p> Send $2 for a packet of literature and a full listing of books, audio cassettes and videotapes. Or, order more copies of this leaflet, postpaid, at the following prices:
10 copies: $2
50 copies: $5
100 copies or more: 8 cents each
THE INSTITUTE FOR HISTORICAL REVIEW
1822 1/2 Newport Blvd., Suite 191
<ent type='GPE'>Costa Mesa</ent>, <ent type='GPE'>California</ent> 92627
</p></xml>

View File

@ -0,0 +1,113 @@
<xml><p>
-------------------------------------------------------------------------------
CARTER'S TRUE LEGACY SHOCKING</p>
<p> By Mike Blair
Exclusive to The SPOTLIGHT</p>
<p><ent type='GPE'>Washington</ent>, DC -- While many frown when they think of the high interest
rates, U.S. hostages held abroad and foreign policy giveaways associated
with the Carter administration, former President Jimmy Carter's true legacy
may be even more shocking than imagined.</p>
<p> Carter seemingly ran an end run around a law passed in the wake of
Watergate and signed before Carter took office, which limited <ent type='ORG'>White House</ent>
powers, when he formed <ent type='ORG'>the Federal Emergency Management Agency</ent> (FEMA).</p>
<p> FEMA was based on Richard Nixon's Executive Order (EO) 11490.</p>
<p> The legislation contained nearly 200000 words on 32 pages. It
pertained to every executive order ever issued unless specifically revoked.</p>
<p> When Carter took office, EO 11490 was incorporated into a new order
allowing a president to assume dictatorial powers during any self-
proclaimed "emergency" situation; these powers will remain with a president
until specifically revoked by <ent type='ORG'>Congress</ent>.</p>
<p> Some senators thought they had successfully squashed the chief
executive's "national emergency" powers more than 10 years ago, after a
bipartisan congressional committee pushed the National Emergencies Act into
law.</p>
<p> Until September 14, 1976, the nation's chief executive officer was
empowered by more than 470 special statues to "seize property, organize and
control the means of production, seize commodities, institute martial law,
seize and control all transportation and communication, regulate the
operation of private enterprise, restrict travel and, in a host of other
ways, control the lives of <ent type='NORP'>Americans</ent>," then-Sen. Frank <ent type='ORG'>Church</ent> (D-<ent type='GPE'>Idaho</ent>)
said in the _<ent type='ORG'>Congress</ent>ional Record_.</p>
<p> <ent type='ORG'>The National Emergencies Act</ent>, which took effect in 1978, was supposed
to prevent the nation from turning into a potential dictatorship.
Presidents had used their "emergency" powers at least four times in the
previous 45 years.</p>
<p> The president held this little-known sway over citizens through
executive orders, which he could write into law in a moment's notice. No
group, neither elected officials, business leaders, nor private citizens,
had the power to void these laws.</p>
<p> Franklin Roosevelt invoked a national emergency in 1933 to deal with
the banking crisis, and Harry Truman responded to the Korean War with an
emergency act in 1950.</p>
<p> Richard Nixon declared a pair of crises. In March 1970 he declared a
national emergency to deal with the post office strike. The Nixon White
House was at it again 16 months later when it implemented currency
restriction in August of 1971 in order to control foreign trade.</p>
<p> Then, in 1976, after two years of public hearings and committee
meetings, a bipartisan special congressional Committee on Emergency Powers
pushed legislation to wrestle power from the <ent type='ORG'>White House</ent>.</p>
<p> <ent type='ORG'>The National Emergencies Act</ent> became law on September 14, 1978,.
Senators used the second anniversary of their law to pat each other on the
back -- through the _<ent type='ORG'>Congress</ent>ional Record_ -- and to attempt to establish
<ent type='ORG'>Congress</ent>'s role in national security.</p>
<p> "The <ent type='ORG'>Congress</ent> must never again trade away its responsibilities in the
name of national emergency," <ent type='ORG'>Church</ent> said. "Let that be one of the lessons
learned from the investigation completed, the passage of the National
Emergencies Act and the termination today of emergency powers."</p>
<p> <ent type='ORG'>Church</ent>'s warning fell on deaf ears. Less than one year later,
President Jimmy Carter ordered into being an entire apparatus --
unprecedented in <ent type='NORP'>American</ent> history -- designed to seize and exercise all
political, economic and military power in <ent type='GPE'>the United States</ent>.</p>
<p> Carter, Ronald Reagan, George Bush or any future president could
establish himself as total dictator.</p>
<p> Carter did this with an executive order -- EO 12148.</p>
<p> An executive order has never been defined by <ent type='ORG'>Congress</ent>. The validity
of such directives has been questioned many times, but there has never been
a decision made by the courts or <ent type='ORG'>Congress</ent> on how far-reaching executive
orders may be.</p>
<p> Through existing executive orders it is possible for one person to
ignore the Constitution, <ent type='ORG'>Congress</ent> and the will of the <ent type='NORP'>American</ent> people. A
complete dictatorship can be imposed under the veil of law.</p>
<p> A declaration by the president of the existence of a "national
emergency" has always stopped short of martial law, although the president
has that prerogative. Undoubtedly it would be exercised in the event of an
attack on <ent type='GPE'>the United States</ent>.</p>
<p> An attempt was made to incorporate all the "national emergency" powers
into one law under Nixon. However, in the wake of the Watergate scandal,
he was unable to pull off the presidential coup.</p>
<p> Carter, a <ent type='ORG'>Trilateralist</ent>, did.</p>
<div>-----------------</div>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
<ent type='GPE'>Washington</ent>, DC 20003
</p></xml>

View File

@ -0,0 +1,693 @@
<xml>
<p><ent type='GPE'>CUBA</ent>, CASTRO, and <ent type='GPE'>the UNITED STATES</ent>
or How One Man With A Cigar Dominated <ent type='NORP'>American</ent> Foreign Policy</p>
<p> In 1959, a rebel, Fidel Castro, overthrew the reign of
Fulgencia <ent type='ORG'>Batista</ent> in <ent type='GPE'>Cuba</ent>; a small island 90 miles off the
<ent type='GPE'>Florida</ent> coast. There have been many coups and changes of
government in the world since then. Few if any have had the
effect on <ent type='NORP'>American</ent>s and <ent type='NORP'>American</ent> foreign policy as this one.</p>
<p>In 1952, Sergeant Fulgencia <ent type='ORG'>Batista</ent> staged a successful
bloodless coup in <ent type='GPE'>Cuba</ent> . </p>
<p><ent type='ORG'>Batista</ent> never really had any cooperation and rarely
garnered much support. His reign was marked by continual
dissension.
</p>
<p> After waiting to see if <ent type='ORG'>Batista</ent> would be seriously opposed,
<ent type='GPE'>Washington</ent> recognized his government. <ent type='ORG'>Batista</ent> had already
broken ties with <ent type='GPE'>the Soviet Union</ent> and became an ally to the
U.S. throughout the cold war. He was continually friendly and
helpful to <ent type='NORP'>American</ent> business interest. But he failed to bring
democracy to <ent type='GPE'>Cuba</ent> or secure the broad popular support that
might have legitimized his rape of the 1940 Constitution.</p>
<p>As the people of <ent type='GPE'>Cuba</ent> grew increasingly dissatisfied with
his gangster style politics, the tiny rebellions that had
sprouted began to grow. Meanwhile the U.S. government was
aware of and shared the distaste for a regime increasingly
nauseating to most public opinion. It became clear that <ent type='ORG'>Batista</ent>
regime was an odious type of government. It killed its own
citizens, it stifled dissent. (1)</p>
<p> At this time Fidel Castro appeared as leader of the growing
rebellion. Educated in <ent type='GPE'>America</ent> he was a proponent of the
<ent type='NORP'>Marxist</ent>-<ent type='NORP'>Leninist</ent> philosophy. He conducted a brilliant guerilla
campaign from the hills of <ent type='GPE'>Cuba</ent> against <ent type='ORG'>Batista</ent>. On January
1959, he prevailed and overthrew the <ent type='ORG'>Batista</ent> government.</p>
<p>Castro promised to restore democracy in <ent type='GPE'>Cuba</ent>, a feat
<ent type='ORG'>Batista</ent> had failed to accomplish. This promise was looked
upon benevolently but watchfully by <ent type='GPE'>Washington</ent>. Castro was
believed to be too much in the hands of the people to stretch
the rules of politics very far. The U.S. government supported
Castro's coup. It professed to not know about Castro's
<ent type='NORP'>Communist</ent> leanings. Perhaps this was due to the ramifications
of Senator Joe McCarty's discredited anti-<ent type='NORP'>Communist</ent> diatribes.</p>
<p>It seemed as if the reciprocal economic interests of the
U.S. and <ent type='GPE'>Cuba</ent> would exert a stabilizing effect on <ent type='GPE'>Cuba</ent>n
politics. <ent type='GPE'>Cuba</ent> had been economically bound to find a market for
its #1 crop, sugar. The U.S. had been buying it at prices much
higher than market price. For this it received a guaranteed
flow of sugar. (2)</p>
<p>Early on however developments clouded the hope for peaceful
relations. According to <ent type='NORP'>American</ent> Ambassador to <ent type='GPE'>Cuba</ent>, Phillip
Bonsal, "From the very beginning of his rule Castro and his
sycophants bitterly and sweepingly attacked the relations of
the <ent type='GPE'>United States</ent> government with <ent type='ORG'>Batista</ent> and his regime".(3)
He accused us of supplying arms to <ent type='ORG'>Batista</ent> to help overthrow
Castro's revolution and of harboring war criminals for a
resurgence effort against him. For the most part these were
not true: the U.S. put a trade embargo on <ent type='ORG'>Batista</ent> in 1957
stopping the U.S. shipment of arms to <ent type='GPE'>Cuba</ent>. (4) However, his
last accusation seems to have been prescient.</p>
<p>With the advent of Castro the history of U.S.- <ent type='GPE'>Cuba</ent>n
relations was subjected to a revision of an intensity and
cynicism which left earlier efforts in the shade. This
downfall took two roads in the eyes of <ent type='GPE'>Washington</ent>: Castro's
incessant campaign of slander against the U.S. and Castro's
wholesale nationalization of <ent type='NORP'>American</ent> properties.</p>
<p>These actions and the U.S. reaction to them set the stage
for what was to become <ent type='ORG'>the Bay</ent> of Pigs fiasco and the end of
U.S.- <ent type='GPE'>Cuba</ent>n relations.</p>
<p>Castro promised the <ent type='GPE'>Cuba</ent>n people that he would bring land
reform to <ent type='GPE'>Cuba</ent>. When he took power, the bulk of the nations
wealth and land was in the hands of a small minority. The huge
plots of land were to be taken from the monopolistic owners and
distributed evenly among the people. Compensation was to be
paid to the former owners. According to Phillip Bonsal, "
Nothing Castro said, nothing stated in the agrarian reform
statute Castro signed in 1958, and nothing in the law that was
promulgated in the Official Gazzette of June 3, 1959, warranted
the belief that in two years a wholesale conversion of <ent type='GPE'>Cuba</ent>n
agricultural land to state ownership would take place".(5) Such
a notion then would have been inconsistent with many of the
Castro pronouncements, including the theory of a peasant
revolution and the pledges to the landless throughout the
nation. Today most of the people who expected to become
independent farmers or members of <ent type='ORG'>cooperatives</ent> in the operation
of which they would have had a voice are now laborers on the
state payroll. (6) </p>
<p>After secretly drawing up his Land Reform Law, Castro used
it to form <ent type='ORG'>the National Institute</ent> of Agrarian Reform (INRA)
with broad and ill defined powers. Through the INRA Castro
methodically seized all <ent type='NORP'>American</ent> holdings in <ent type='GPE'>Cuba</ent>. He promised
compensation but frequently never gave it. He conducted
investigations into company affairs, holding control over them
in the meantime, and then never divulging the results or giving
back the control. (7)</p>
<p>These seizures were protested. On January 11 Ambassador
Bonsal delivered a note to <ent type='GPE'>Havana</ent> protesting the <ent type='GPE'>Cuba</ent>n
government seizure of U.S. citizens property. The note was
rejected the same night as a U.S. attempt to keep economic
control over <ent type='GPE'>Cuba</ent>. (8)</p>
<p>As this continued Castro was engineering a brilliant
propaganda campaign aimed at accusing the U.S. of "conspiring
with the counter revolutionaries against the Castro regime"(9).
Castro's ability to whip the masses into a frenzy with wispy
fallacies about <ent type='NORP'>American</ent> "imperialist" actions against <ent type='GPE'>Cuba</ent> was
his main asset. He constantly found events which he could work
the "ol Castro magic " on, as Nixon said , to turn it into
another of the long list of grievances, real or imagined, that
<ent type='GPE'>Cuba</ent> had suffered.</p>
<p>Throughout Castro's rule there had been numerous minor
attacks and disturbances in <ent type='GPE'>Cuba</ent>. Always without any
investigation whatsoever, Castro would blatantly and publicly
blame the U.S.. </p>
<p>Castro continually called for hearings at <ent type='ORG'>the Organization</ent>
of <ent type='NORP'>American</ent> States and <ent type='ORG'>the United Nations</ent> to hear charges
against the U.S. of "overt aggression". These charges were
always denied by the councils. (10)</p>
<p>Two events that provided fuel for the Castro propaganda
furnace stand out. These are the "bombing" of <ent type='GPE'>Havana</ent> on
October 21 and the explosion of the <ent type='NORP'>French</ent> munitions ship La
Coubre on March 4, 1960.(11)</p>
<p>On the evening of October 21 the former captain of the
rebel air force, Captain Dian-Lanz, flew over <ent type='GPE'>Havana</ent> and
dropped a quantity of virulently anti-Castro leaflets. This was
an <ent type='NORP'>American</ent> failure to prevent international flights in
violation of <ent type='NORP'>American</ent> law. <ent type='ORG'>Untroubled</ent> by any considerations of
truth or good faith, the <ent type='GPE'>Cuba</ent>n authorities distorted the
facts of the matter and accused the U.S. of a responsibility
going way beyond negligence. Castro, not two days later,
elaborated a bombing thesis, complete with "witnesses", and
launched a propaganda campaign against the U.S. Ambassador
Bonsal said, "This incident was so welcome to Castro for his
purposes that I was not surprised when, at a later date, a
somewhat similar flight was actually engineered by <ent type='GPE'>Cuba</ent>n secret
agents in <ent type='GPE'>Florida</ent>."(12)</p>
<p> This outburst constituted "the beginning of the end " in
U.S.- <ent type='GPE'>Cuba</ent>n relations. President Eisenhower stated ,"Castro's
performance on October 26 on the "bombing" of <ent type='GPE'>Havana</ent> spelled
the end of my hope for rational relations between <ent type='GPE'>Cuba</ent> and the
U.S."(13)</p>
<p>Up until 1960 the U.S. had followed a policy of non
intervention in <ent type='GPE'>Cuba</ent>. It had endured the slander and seizure
of lands, still hoping to maintain relations. This ended,
when, on March 4, the <ent type='NORP'>French</ent> munitions ship La Coubre arrived
at <ent type='GPE'>Havana</ent> laden with arms and munitions for the <ent type='GPE'>Cuba</ent>n
government. It promptly blew up with serious loss of life. (14)</p>
<p>Castro and his authorities wasted no time venomously
denouncing the U.S. for an overt act of sabotage. Some
observers concluded that the disaster was due to the careless
way the <ent type='GPE'>Cuba</ent>ns unloaded the cargo. (15) Sabotage was possible
but it was preposterous to blame the U.S. without even a
pretense of an investigation. </p>
<p>Castro's reaction to the La Coubre explosion may have been
what tipped the scales in favor of <ent type='GPE'>Washington</ent>'s abandonment of
the non intervention policy. This, the continued slander, and
the fact that the <ent type='ORG'>Embassy</ent> had had no reply from the <ent type='GPE'>Cuba</ent>n
government to its representations regarding the cases of
<ent type='NORP'>American</ent>s victimized by the continuing abuses of the INRA.</p>
<p>The <ent type='NORP'>American</ent> posture of moderation was beginning to become,
in the face of Castro's insulting and aggressive behavior, a
political liability. (16)</p>
<p>The new <ent type='NORP'>American</ent> policy, not announced as such, but
implicit in the the actions of the <ent type='GPE'>United States</ent> government was
one of overthrowing Castro by all means available to the U.S.
short of open employment of <ent type='NORP'>American</ent> armed forces in <ent type='GPE'>Cuba</ent>.</p>
<p>It was at this time that the controversial decision was
taken to allow the <ent type='ORG'>CIA</ent> to begin recruiting and training of
ex-<ent type='GPE'>Cuba</ent>n exiles for anti-Castro military service. (17)</p>
<p>Shortly after this decision, following in quick steps,
aggressive policies both on the side of <ent type='GPE'>Cuba</ent> and the U.S. led
to the eventual finale in the actual invasion of <ent type='GPE'>Cuba</ent> by the
U.S!</p>
<p>In June 1960 the U.S. started a series of economic
aggressions toward <ent type='GPE'>Cuba</ent> aimed at accelerating their downfall.</p>
<p>The first of these measures was the advice of the U.S. to
the oil refineries in <ent type='GPE'>Cuba</ent> to refuse to handle the crude
petroleum that the <ent type='GPE'>Cuba</ent>ns were receiving from <ent type='GPE'>the Soviet Union</ent>.
The companies such as <ent type='ORG'>Shell</ent> and Standard Oil had been buying
crude from their own plants in <ent type='GPE'>Venezuela</ent> at a high cost. The
<ent type='GPE'>Cuba</ent>n government demanded that the refineries process the crude
they were receiving from <ent type='GPE'>Russia</ent> at a much cheaper price. These
refineries refused at the U.S. advice stating that there were
no provisions in the law saying that they must accept the
<ent type='NORP'>Soviet</ent> product and that the low grade <ent type='GPE'>Russia</ent>n crude would
damage the machinery. The claim about the law may have been
true but the charge that the cheaper <ent type='NORP'>Soviet</ent>
crude damaging the
machines seems to be an excuse to cover up the attempted
economic strangulation of <ent type='GPE'>Cuba</ent>. (The crude worked just fine as
is soon to be shown)</p>
<p>Upon receiving the refusal Che Gueverra, the newly
appointed head of <ent type='ORG'>the National Bank</ent>,and known anti-<ent type='NORP'>American</ent>,
seized all three major oil company refineries and began
producing all the <ent type='NORP'>Soviet</ent> crude,not just the 50% they had
earlier bargained for. This was a big victory and a stepping
stone towards increasing the soon to be controversial alliance
with <ent type='GPE'>Russia</ent>.</p>
<p>On July 6, a week after the intervention of the refineries,
President Eisenhower announced that the balance of <ent type='GPE'>Cuba</ent>'s 1960
sugar quota for the supply of sugar to the U.S. was to be
suspended. (18). This action was regarded as a reprisal to
the intervention of the refineries. It seems obvious that it
was a major element in the calculated overthrow of Castro.</p>
<p>In addition to being an act of destroying the U.S. record
for statesmanship in Latin <ent type='GPE'>America</ent>, this forced <ent type='GPE'>Cuba</ent> into
<ent type='GPE'>Russia</ent>'s arms and vice-versa.</p>
<p>The immediate loss to <ent type='GPE'>Cuba</ent> was 900000 tons of sugar
unsold. This was valued at about $100000000.(19) Had the
<ent type='GPE'>Russia</ent>ns not come to the rescue it would have been a serious
blow to <ent type='GPE'>Cuba</ent>. But come to the rescue they did, cementing the
<ent type='NORP'>Soviet</ent>-<ent type='GPE'>Cuba</ent>n bond and granting Castro a present he could have
never given himself. As Ernest Hemingway put it,"I just hope to
Christ that the <ent type='GPE'>United States</ent> doesn't cut the sugar quota. That
will really tear it. It will make <ent type='GPE'>Cuba</ent> a gift to the
<ent type='GPE'>Russia</ent>ns." (20) And now the gift had been made.</p>
<p>Castro had announced earlier in a speech that action
against the sugar quota would cost <ent type='NORP'>American</ent>s in <ent type='GPE'>Cuba</ent> "down to
the nails in their shoes" (21) Castro did his best to carry
that out. In a decree made as the Law of Nationalization, he
authorized expropriation of <ent type='NORP'>American</ent> property at Che Gueverra's
discretion. The compensation scheme was such that under
current U.S. - <ent type='GPE'>Cuba</ent>n trade relations it was worthless and
therefore confiscation without compensation.</p>
<p>The <ent type='NORP'>Soviet</ent> Unions assumption of responsibility of <ent type='GPE'>Cuba</ent>'s
economic welfare gave the <ent type='GPE'>Russia</ent>ns a politico-military stake in
<ent type='GPE'>Cuba</ent>. Increased arms shipments from the U.S.S.R and
<ent type='GPE'>Czechoslovakia</ent> enabled Castro to rapidly strengthen and expand
his forces. On top of this <ent type='GPE'>Cuba</ent> now had <ent type='GPE'>Russia</ent>n military
support. On July 9, three days after President Eisenhowers
sugar proclamation, <ent type='NORP'>Soviet</ent> Premier Nikita Kruschev announced,
"The U.S.S.R is raising its voice and extending a helpful hand
to the people of <ent type='GPE'>Cuba</ent>.....Speaking figuratively in case of
necessity <ent type='NORP'>Soviet</ent> artillerymen can support the <ent type='GPE'>Cuba</ent>n people with
rocket fire. (22) Castro took this to mean direct commitment
made by <ent type='GPE'>Russia</ent> to protect the <ent type='GPE'>Cuba</ent>n revolution in case of U.S.
attack. The final act of the U.S. in the field of economic
aggression against <ent type='GPE'>Cuba</ent> came on October 19, 1960, in the form
of a trade embargo on all goods except medicine and medical
supplies. Even these were to be banned within a few months.
Other than causing the revolutionaries some inconvenience, all
the embargo accomplished was to give Castro a godsend. For the
past 25 years Castro has blamed the shortages, rationings,
breakdowns and even some of the unfavorable weather conditions
on the U.S. blockade.</p>
<p>On January 6, 1961, Castro formally broke relations with
the <ent type='GPE'>United States</ent> and ordered the staff of the U.S. embassy to
leave. Immediately after the break in relations he ordered
full scale mobilization of his armed forces to repel an
invasion from the <ent type='GPE'>United States</ent>, which he correctly asserted
was imminent. For at this time the <ent type='GPE'>Washington</ent> administration,
under new President-elect Kennedy was gearing up for the <ent type='GPE'>Cuba</ent>n
exile invasion of <ent type='GPE'>Cuba</ent>. The fact that this secret was ill kept
led to increased arms being shipped to <ent type='GPE'>Cuba</ent> by <ent type='GPE'>Russia</ent> in late
1960.</p>
<p>President Kennedy inherited from the Eisenhower-Nixon
administration the operation that became <ent type='ORG'>the Bay</ent> of Pigs
expedition. The plan was ill conceived and a fiasco.</p>
<p>Both Theodore Sorensen and Arthur Schlesinger describe the
President as the victim of a process set in motion before his
inauguration and which he, in the first few weeks of his
administration, was unable to arrest in spite of his
misgivings. Mr. Schlesinger writes -"Kennedy saw the project
in the patios of the bureaucracy as a contingency plan. He did
not yet realize how contingency planning could generate its own
reality." (23)</p>
<p>The fact is that Kennedy had promised to pursue a more
successful policy towards <ent type='GPE'>Cuba</ent>. I fail to see how the proposed
invasion could be looked upon as successful. The plan he
inherited called for 1500 patriots to seize control over their
seven million fellow citizens from over 100000 well trained,
well armed <ent type='NORP'>Castroite</ent> militia!</p>
<p>As if the plan wasn't doomed from the start, the
information the <ent type='ORG'>CIA</ent> had gathered about the strength of the
uprising in <ent type='GPE'>Cuba</ent> was outrageously misleading. If we had won,
it still would have taken prolonged U.S. intervention to make
it work. This along with Kennedys decision to rule out
<ent type='NORP'>American</ent> forces or even <ent type='NORP'>American</ent> officers or experts, whose
participation was planned, doomed the whole affair.</p>
<p>Additionally these impromptu ground rules were not relayed
to the exiles by the <ent type='ORG'>CIA</ent>, who were expecting massive U.S.
military backing!</p>
<p>The exiles had their own problems; guns didn't work, ships
sank, codes for communication were wrong, the ammunition was
the wrong kind - everything that could go wrong, did. As could
be imagined the anti-Castro opposition achieved not one of its
permanent goals. Upon landing at <ent type='ORG'>the Bay</ent> of Pigs on April 17,
1961, the mission marked a landmark failure in U.S. foreign
politics. By April 20, only three days later, Castro's forces
had completely destroyed any semblance of the mission: they
killed 300 and captured the remaining 1200!</p>
<p>Many people since then have chastised Kennedy for his
decision to pull U.S. military forces. I feel that his only
mistake was in going ahead in the first place, although, as
stated earlier, it seems as if he may not have had much choice.</p>
<p>I feel Kennedy showed surer instincts in this matter than
his advisors who pleaded with him not to pull U.S. forces. For
if the expedition had succeeded due to <ent type='NORP'>American</ent> armed forces
rather than the strength of the exile forces and the anti-
Castro movement within <ent type='GPE'>Cuba</ent>, the post Castro government would
have been totally unviable: it would have taken constant
<ent type='NORP'>American</ent> help to shore it up. In this matter I share the
opinion of `ambassador Ellis O. Briggs, who has written "The
Bay of Pigs operation was a tragic experience for the <ent type='GPE'>Cuba</ent>ns
who took part, but its failure was a fortunate (if mortifying)
experience for the U.S., which otherwise might have been
saddled with indefinite occupation of the island.</p>
<p>Beyond its immediately damaging effects, <ent type='ORG'>the Bay</ent> of Pigs
fiasco has shown itself to have far reaching consequences.</p>
<p><ent type='GPE'>Washington</ent>'s failure to achieve its goal in <ent type='GPE'>Cuba</ent> provided
the catalyst for <ent type='GPE'>Russia</ent> to seek an advantage and install
nuclear missiles in <ent type='GPE'>Cuba</ent>. The resulting "missile crisis" in
1962 was the closest we have been to thermonuclear war.</p>
<p><ent type='GPE'>America</ent>'s gain may have been <ent type='GPE'>America</ent>'s loss. A successful
Bay of Pigs may have brought the <ent type='GPE'>United States</ent> one advantage.
The strain on <ent type='NORP'>American</ent> political and military assets resulting
from the need to keep the lid on in <ent type='GPE'>Cuba</ent> might have lid on <ent type='GPE'>Cuba</ent>
might have led the President of the <ent type='GPE'>United States</ent> to resist,
rather than to enthusiastically embrace, the advice he received
in 1964 and 1965 to make a massive commitment of <ent type='NORP'>American</ent> air
power, ground forces, and prestige in <ent type='GPE'>Vietnam</ent>.</p>
<p><ent type='GPE'>Cuba</ent>n troops have been a major presence as <ent type='NORP'>Soviet</ent>
surrogates all over the world, notably in <ent type='GPE'>Angola</ent>.</p>
<p>The threat of exportation of Castro's revolution permeates
U.S.-Central and <ent type='LOC'>South</ent> <ent type='NORP'>American</ent> policy. (Witness the invasion
of <ent type='GPE'>Grenada</ent>.)</p>
<p>This fear still dominates todays headlines. For years the
U.S. has urged support for government of El Salvador and the
right wing <ent type='NORP'>Contras</ent> in <ent type='GPE'>Nicaragua</ent>. The major concern underlying
<ent type='NORP'>American</ent> policy in the area is Castro's influence. The fear of
a Castro influenced regime in <ent type='LOC'>South</ent> and Central <ent type='GPE'>America</ent> had
such control of <ent type='NORP'>American</ent> foreign policy as to almost topple the
Presidency in the recent <ent type='GPE'>Iran</ent> - <ent type='NORP'>Contra</ent> affair. As a result the
U.S. government has once again faced a crisis which threatens
to destroy its credibility in foreign affairs. All because of
one man with a cigar.</p>
<p>In concluding I would like to state my own feelings on the
whole affair as they formed in researching the topic. To
start, all the information I could gather was one-sided. All
the sources were <ent type='NORP'>American</ent> written, and encompassed an <ent type='NORP'>American</ent>
point of view. In light of this knowledge, and with the
advantage of hindsight, I have formulated my own opinion of
this affair and how it might have been more productively
handled. <ent type='NORP'>American</ent> intervention should have been held to a
minimum. In an atmosphere of concentration on purely <ent type='GPE'>Cuba</ent>n
issues, opposition to Castro's personal dictatorship could be
expected to grow. Admittedly, even justified <ent type='NORP'>American</ent>
retaliation would have led to <ent type='GPE'>Cuba</ent>n counterretaliation and so
on with the prospect that step by step the same end result
would have been attained as was in fact achieved. But the
process would have lasted far longer; measured <ent type='NORP'>American</ent>
responses might have appeared well deserved to an increasing
number of <ent type='GPE'>Cuba</ent>ns, thus strengthening <ent type='GPE'>Cuba</ent>n opposition to the
regime instead of, as was the case, greatly stimulating
revolutionary fervor, leaving the <ent type='GPE'>Russia</ent>ns no choice but to
give massive support to the Revolution and fortifying the
belief among anti-Castro <ent type='GPE'>Cuba</ent>ns that the <ent type='GPE'>United States</ent> was
rapidly moving to liberate them. The economic pressures
available to the <ent type='GPE'>United States</ent> were not apt to bring Castro to
his knees, since the <ent type='NORP'>Soviet</ent>s were capable of meeting <ent type='GPE'>Cuba</ent>n
requirements in such matters as oil and sugar. I believe the
<ent type='GPE'>Cuba</ent>n government would have been doomed by its own
disorganization and incompetence and by the growing
disaffection of an increasing number of the <ent type='GPE'>Cuba</ent>n people. Left
to its own devices, the Castro regime would have withered on
the vine.
ammunition was
the wrong kind - everything that could go wrong, di
Downloaded from Just Say Yes. 2 lines, More than 1500 files online!
Do you write? Give us a call! 415-922-2008 CASFA </p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron 415-935-5845
Just Say Yes 415-922-1613
Rat Head 415-524-3649
<ent type='ORG'>Cheez Whiz</ent> 408-363-9766
Reality Check 415-474-2602
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p>Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
</xml>

View File

@ -0,0 +1,514 @@
<xml><p> CELINE'S LAWS
by <ent type='ORG'>Hagbard</ent> <ent type='ORG'>Celine</ent></p>
<p> As every thinking person has noticed, our national life has
become increasingly weird and surrealistic. The waiting lines at
banks and post offices are growing longer all the time, even
though demographers tell us US population is no longer rising.
The street signs more often than not say WALK on the red and
DON"T WALK on the green. You can't get a plumber on the
weekends. Nobody has been able to explain the cattle mutilations
yet. Every survey shows that the price of consumer goods, the
number of violent crimes, and the eerie popularity of THE GONG
SHOW are ominously accelerating.
I believe I have found the explanation these distressing
trends. Needless to say, I cannot present, in a short article,
all the evidence which I have accumulated in three decades of
careful metasociological research; that will have to await the
publication of my three-volume study, "Why Everybody Is Going
Bonkers." Here I can only mention the thousands of depth
interviewws, the innumerable flowcharts and helix-matrix
equations, the vast files of computer readouts, the I CHING
divinations, and other rigorous scientific techniques used in
developing what I modestly call <ent type='ORG'>Celine</ent>'s Laws of Chaos, Discord
and Confusion.
<ent type='ORG'>Celine</ent>'s First Law is that <ent type='ORG'>National Security</ent> is the chief
cause of national insecurity!
That may sound like a paradox, but I will explain it at one.
Every secret police agency must be monitored by an elite corps
of secret-police-of-the-second-order. There are numerous reasons
for this, but three are especially noteworthy.
********************************************************************************************
NATIONAL SECURITY IS THE CHIEF CAUSE OF NATIONAL INSECURITY!!!
*******************************************************************************</p>
<p>1). Infiltration of the secret police, for the purpose of
subversion, will always be a prime goal of internal
revolutionaries. This is an ordinary part of the spy-counterspy
game. There is nothing <ent type='ORG'>Weather Underground</ent> would like better
than having a few agents in the <ent type='ORG'>FBI</ent> or <ent type='ORG'>CIA</ent>, for the same reasons
that the <ent type='ORG'>FBI</ent> or <ent type='ORG'>CIA</ent> would like to have a few agents in Weather
Underground.</p>
<p>2). Such infiltration will also be a prime goal of hostile
foreign powers, for the same reasons.</p>
<p> Please note that these are simple facts of the secret-police
game, well-known even to the general public, the subject of many
ingenious plots in popular spy films, and not particularly
alarming...yet. Nonetheless, the seeds of Chaos, Discord,
Confusion, and <ent type='ORG'>Paranoia</ent> are already here, for the simple reason
that once a human being develops the habits of worry and
suspicion, he or she finds increasing justifications for more
worry and more suspicion. For instance, Richard Q. (not his real
initial), one of my interview subjects, became concerned, after
ten years in the <ent type='ORG'>CIA</ent>, with the possibility of infiltration by
"extraterrestrial" agents. He was eventually retired when he
began to claim that demons in the form of dogs wanted him to
assassinate Laverne and Shirley. </p>
<p>3). Secret-police officials acquire fantastic capacities to
blackmail and intimidate others in goverment.</p>
<p> Stalin executed three chiefs of his secret police in a row,
because of this danger. One of my informants claims that every
president since the <ent type='ORG'>National Security</ent> Act was passed in 1947 has
learned how to have sexual intercourse without making a single
audible sound, because of the possible electronic eavesdroppers.
As Nixion says so wistfully on the Watergate transcripts, "Well,
Hoover performed. He would have fought. That was the point. He
would have defied a few people. He would have scared them to
death. HE HAS A FILE ON EVERYBODY!" <special>Caps added</special>. Thus, those
who employ secret-police organizations MUST monitor them th be
sure they are not acquiring too much power.
In <ent type='GPE'>the United States</ent> today, the superelite that monitors the
<ent type='ORG'>CIA</ent> is the <ent type='ORG'>National Security</ent> Agency. ( And a group called "The
<ent type='ORG'>Store</ent>" monitors the <ent type='ORG'>NSA</ent>).
Here is where a sinister infinite regress enters the game.
Any such elite, second or third order secret-police agency must
be, according to the above pragmatic and necessary rules, subject
to infiltration by native subversives or hostile foreign powers,
or to acquiring "too much power" in the opinion of its masters.
(It may even be subject, if Richard Q. was correct in his
anxieties, to extraterrestrial manipulation). And so, it, too,
must be monitored by a secret police of the third order.</p>
<p> But this third-order secret-police (such as Nixon's notorious
"plumbers", or more currently, "The <ent type='ORG'>Store</ent>"). is also subject to
infiltration or to acquiring too much power...and thus, with
relentless logic, the infinite regress builds. Once a goverment
has n orders of secret police spying on each other, all are
potentially suspect, and to be safe a secret police of order n+1
must be created. And so on, forever.</p>
<p>******************************************
* THUS WHO EMPLOY SECRET *
* POLICE MUST MONITOR THEM TO *
* BE SURE THEY ARE NOT ACQUIRING *
* TOO MUCH POWER. *
****************************************** </p>
<p> In practice, of course, this cannot really regress to
infinity, but only to the point where every other citizen, or
until the funding runs out, whichever comes first.</p>
<p> <ent type='ORG'>National Security</ent> in practice, then, must always fall short of
the logically ideal infinite regress which we have shown is
necessary to the achievement of its goal. In that gap between
the ideal of "One nation under survillance, with wiretaps and
mail covers for all" andthe strictly limited real situation of
finite funding, there is ample encouragement for paranoias of all
sorts to flourish. In short, every government that employs
secret-police agencies must grow more insecure, not more secure,
as the strength, versatility, and power of the secret-police
agencies grow.
For instance, a certain left-wing nation which has employed
secret-police agencies for 61 years has now reached the point
where the leaders are terrified of painters and poets. In
another, right-wing nation infested with secret-police agencies,
several purges have been caused by three practical jokers who
regularly call middle-rank officials on the phone and talk in
what appears to be a code. The secret police, of course, are no
fools, and are aware that this might be what it in fact is, a
form of anarchist humor; but they can't be sure.</p>
<p> What usually happens in such cases is this: an official
receives one of these mystery calls, saying perhaps "Pawn to
queen rook five. No wife, no horse, no mustache. A boy has never
wept nor dashed a thousand kim." He knows immediately that
surveillance upon him will be increased tenfold. In the next few
days, while memories of all his mistakes, small bribes,
incautious remarks, and other incriminating events haunt his
imagination, he observes the increased surveillance, and begins
to suspect even the most loyal of his subordinates of watching
him with eyes that miss nothing and to give a sinister
interpertation to everything. Within ten days, he usually
attempts to contact a foreign goverment to seek political
sanctuary, and the secret-police net closes on him.</p>
<p> By the same process of worry leading to more worry and
suspicion leading to more suspicion, the very act of joining a
ecret-police organization will eventually turn a man or woman
into a clinical paranoi; in layman's terms, "bananas" or "wigged
out." THE AGENT KNOWS WHOM HE IS SPYING ON; BUT HE NEVER KNOWS
WHO IS SPYING ON HIM! Could it be his wife, his girl friend, his
secretary, the newsboy, the <ent type='ORG'>Good Humor</ent> man?
For these reasons, secret-police agents develop elaborate and
complex theories to account for what is actually going on.
According to one of my tables of data, there isn't a single
theory held by professional conspiracy buffs which isn't also
believed by many members of our various secret-police agencies.
In fact, the exact percentages of believes in these extravagant
scenarios are quite similar among a group of 1000 <ent type='ORG'>CIA</ent> agents and
a control group of 1000 readers of the underground press, as
shown in table 1.</p>
<p>Table 1. True Believes in various Conspiracy Theories Among <ent type='ORG'>CIA</ent>
Agents and Underground-Press Readers.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: :: :: UNDERGROUND PRESS ::
::CONSPIRACY THEORY :: <ent type='ORG'>CIA</ent> :: READERS ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::The <ent type='ORG'>Yankees</ent> (Eastern :: :: ::
::millionaires) run :: 25% :: 30% ::
::everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: The <ent type='ORG'>Cowboys</ent>(Western :: :: ::
:: millionaires) run :: 25% :: 15% ::
:: everything :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the result of :: :: ::
:: civil war between :: 23% :: 17% ::
::<ent type='ORG'>Yankees</ent> and <ent type='ORG'>Cowboys</ent> :: :: ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the 33 degree :: :: ::
:: Masons :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: It's the Jesuits :: 5% :: 5% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Elders of Zion :: 2% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Military :: :: ::
::Industrial Complex :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the <ent type='NORP'>Bilderbergers</ent> :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Gnomes of :: :: ::
:: Zurich :: 1% :: 2% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's the Lesbian :: :: ::
:: Vegetarians :: 10% :: 28% ::
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
::It's <ent type='ORG'>the Rock</ent> n Roll :: :: ::
:: Empire :: 2% :: 2% ::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: </p>
<p>a). Source: <ent type='ORG'>Gallup</ent>, Roper, and <ent type='ORG'>Hogtied</ent>, "WHO'S WATCHING WHOM"
(<ent type='GPE'>Washington</ent>, DC: US Goverment Printing Office, 1979), p. 432.</p>
<p>b). All figures are percentages. Figures do not add to 100, for
a variety of reasons. For a list of them, please send 25 cents
and a list of suspicious persons in your neighborhood to the US
Dept. of Bedding, <ent type='GPE'>Washington</ent> DC 20001.</p>
<p>c). Includes those who blame it all on the <ent type='NORP'>Bavarian</ent> Illuminati;
those who hold a <ent type='GPE'>multiconspiracy</ent> theory (e.g., the Lesbian
Vegetarians are allied with the <ent type='ORG'>Yankees</ent> and <ent type='NORP'>Bilderbergers</ent> against
the <ent type='ORG'>Cowboys</ent>, the TV Networks, and the Cattle Mutilators); those
who believe it is all part of the UFO Cover-Up; and those who
claim that demons in the form of dogs told them it's connected
somehow with the alligators in <ent type='GPE'>New York</ent>'s sewers.
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^</p>
<p>************************************
* IN <ent type='GPE'>RUSSIA</ent>, THE GOVERMENT IS *
* TERRIFIED OF PAINTERS AND POETS! *
************************************</p>
<p> Now, Table 1 clearly gives a picture of a rather schizzed-out
nation. This is the result of the impossible infinite regress
and its resultant of worry leading to more worry.
Furthermore, if there is a secret police at all, in any nation
you care to imagine, every branch and department of that
country's government becomes suspect, in the eyes of cautious and
intelligent people, as a possible front or funnel to the secret
police. (That is, the more shrewd citizens will recognize that
something titled a branch of the <ent type='ORG'>HEW</ent> or even <ent type='ORG'>PTA</ent> might actually
be run by the <ent type='ORG'>CIA</ent>). Inevitably, the government as a whole, and
many nongovernmental agencies, will be regarded by reasonable
persons with fear and trepidation. Proverbs like "One can't be
too careful these days" and "Better safe than sorry" become a
kind of sinister folk wisdom.</p>
<p> But further yet: any government which already has a secret
police (and a secret police monitoring the secret police, etc).
will become alarmed on observing that its more hip and
intelligent citizens now regard it with loathing and misgivings.
The government will therefore increase the size and powers of the
secret police. This is the only rational move, within the
context of the secret-police game.</p>
<p>******************************
* SOMETHING PASSING AS A *
* BRANCH OF <ent type='ORG'>HEW</ent> MIGHT BE A *
* <ent type='ORG'>FRONT</ent> FOR THE <ent type='ORG'>CIA</ent>! *
****************************** </p>
<p> (The only alternative was once suggested sarcastically by
playwright Bert Brecht, who said, "If the government doesn't
trust the people, why does'nt it dissovle them and elect new
people?" No way has yet been invented to elect a new people; so
the police state will instead spy on the existing people even
more vigorously).
This, of course, creates additional paranoia in both the
governors and the citizens, because a suffciently pugnacious
secret police will eventually "have a file on everybody,"
including its own creators. This leads to another infinite
regress: the more people will loathe the government, the more
power will be given to the secret police.
Thus, whether any of the hypothetical conspiracies mentioned
earlier really exist or not, a system of clandestine goverment
inevitably produces, in both the rulers and the ruled, a mood of
paranoia in which such conspiracy theories flourish.
This escalating sense of suspiciousness is accelerated by the
fact that every secret-police organization engages in both the
collection of information and the production misinformation.
That is, you score points in the secret-police game both by
hoarding signals (information units)---that is, by hiding facts
from competitive players---and by foisting false signals (fake
information units) on the other players. This creates the
situation which I call Optimum Fuckup, in which every participant
has rational (not neurotic) cause to suspect that every other
player may be attempting to deceive him, gull him, con him, dupe
him, and generally misinform him. As Henry Kissinger is rumored
to have said, "Anybody in <ent type='GPE'>Washington</ent> these days who isn't
paranoid is crazy!"
One could generalize the remark: anyone in the United States
today who isn't paranoid must be crazy!!!</p>
<p>**********************************
* "IF THE GOVERMENT DOESN'T *
* TRUST THE PEOPLE, WHY DOESN'T *
* IT DISSOLVE THEM AND ELECT A *
* NEW PEOPLE?" *
**********************************</p>
<p> The deliberate production of misinformation (or, as
intelligence agencies more euphemistically call it,
disinformation) creates a situation profoundly disorienting to
the philosopher, the scientist, and the ordinary Joe who wants to
know the best time to go to the bank. The desire to discover
"what-the-hell-is-really-going-on" (the definition of science
offered by physicist Saul-Paul Sirag) is totally incompatible
with the circulation of disinformation; we all need to know, at
least roughly, what the hell is really going on if we are not to
stumble around like blind robots colliding with things we weren't
told were there.
Maybe the UFO's really exist---or maybe the whole UFO
phenomenon is a cover for an intelligence operation. Maybe there
are black holes where space and time implode---or maybe the
entire black-hole cosmology was created to befuddle and mislead
<ent type='NORP'>Russian</ent> scientists. Maybe Jimmy Carter really exists---or maybe
he is, as the National Lampoon claims, an actor named Sidney
Goldfarb specially trained to project the down-home virtues that
the <ent type='NORP'>American</ent> people nostalgically seek. Perhaps only three men
at the top of the <ent type='ORG'>National Security</ent> Angency REALLY know the
answers to these questions---or perhaps those three are being
deceived by certain subordinates (as Lyndon Johnson was deceived
by the <ent type='ORG'>CIA</ent> about <ent type='GPE'>Vietnam</ent>) and are as disoriented as the rest of
us. Such is the logic of a Disinformation Matrix.
Personally, I find it easier to believe in UFO's than in black
holes or Jimmy Carter; but that may just indicate the damage to
my own brain caused by <ent type='ORG'>the Optimum Fuckup</ent> of the Disinformation
Matrix.
According to a recent survey 19 per cent of the population
believe the moon landings were faked by Stanley Kubrick and a
gang of special effects experts. Perhaps these archskeptics are
the sanest ones left among us. Who among the readers of this
file has a security clearance high enough to be ABSOLUTELY sure
that these ultraparanoids are wrong?</p>
<p> This general tendency toward chaos discord, and confusion,
once a secret police has been established, is complicated and
accelerated by <ent type='ORG'>Celine</ent>'s Second Law, to wit: "Accurate
communication is only possible in a nonpunishing situation."
This is a very simple statement of the obvious, and means no more
than that everybody tends to lie a little, to flatter or to
protect themselves, when dealing with those who have power over
them, especially the power to punish. (this is why communication
between parents and children is notoriously befoolzled).
Every authoritarian structure can be visualized as a pyramid,
with very few at the top and very many at the bottom, as in the
flowchart of any corperation or bureaucracy. On each rung,
participants bear a burden of nescience in relation to those
above them. That is, they must be very, very careful that their
natural sensory activities as conscious organisms---the acts of
seeing, hearing, smelling, tasting, feeling, drawing inferences
from perception, etc.---be in accord with the wishes of those
above them. This is absolutely vital; job security depends on
it. It is much less important---a luxury that can easily be
discarded---that these perceptions be in accord with actual
reality.</p>
<p>*************************
* COMMUNICATION IS ONLY *
* BETWEEN EQUALS. *
*************************</p>
<p> For instance, in the <ent type='ORG'>FBI</ent> under J. Edgar Hoover, the agent had
to develop the capacity to see godless communists everywhere.
Any agent whose perceptions indicated that there were actually
very few godless communists anywhere in this country wold
experience what psychologists call cognitive dissonance: his or
her reality grid was at variance with the official reality grid
of the pyramidal authority structure. To talk about such
divergent perceptions at all would be to invite suspicions of
eccentricity, of intellectual wiseacreing, or of being oneself a
godless communist. The same would apply to any Dominican
Inquisitor of earlier centuries who lacked the capacity to see
witches everywhere. In such authoritarian situations, it is
important to see what the authorities see; it is inconvenient,
and possibly dangerous, to see what is actually there.
But this leads to an equal and opposite burden of omniscience
on those at the top, in the Eye of the authoritarian pyramid.
All that is forbidden to those at the bottom---the conscious
activities of perception andand evaluation---is demanded of the
master classes, the elite and the super-elite. They must attempt
to do the seeing, hearing, smelling, tasting, feeling, thinking,
and decisionmaking for the whole society.
But a man with a gun (the power to punish) is told only what
his target thinks will not cause him to pull the trigger. The
elite, with their burden of omniscience, face the underlings,
with their burden nescience, and receive only the feedback
consistent with their own preconceived notions. The burden of
omniscience becomes, in short, another and more complex burden of
nescience. Nobody really knows anything anymore, or if they do,
they are careful to hide the fact.
As the national security paradigm approaches (or attempts to
approach) the ideal infinite regress of spies-spying-on-spies-
spying-on-spies, etc., the resultant general trepidation causes
all persons to hide anything they know (if it differs from the
official reality), not only from their superiors, but from peers
and inferiors as well. Anybody, after all, might be part of the
nth-degree secret police. "One can't be too careful these days."
The burden of nescience becomes omnipresent. More and more of
reality becomes unspeakable.
But as Freud noted, that which is objectively repressed
(unspeakable) soon becomes subjectively repressed (unthinkable).
Nobody likes to feel like a coward and a liar constantly. It is
easier to cease to notice where the official reality grid differs
from sensed experience. Thus Optimun Fuckup gradually becomes
Terminal Fuckup, and rigiditus bureaucraticus sets in; this is
the last stage before all brain activity ceases, and the society
is intellectually dead.
<ent type='ORG'>Celine</ent>'s Third Law is like unto the first two, and holds that
AN HONEST politician is a national calamity.
At first glance, this seems preposterous. People of all
shades of opinion agree that at least on the axiom that we need
more honest politicians, not more crooked ones. Please remember,
however, that people of all shades of opinion once agreed that
the <ent type='LOC'>Earth</ent> is flat.
Your typical dishonest politician (<ent type='ORG'>bocca grande</ent> normalis) is
interested only in enriching himself at the public expense, a
goal he shares with most of his fellow citizens, especially
doctors and lawyers. This is normal behavior for our primate
species, and society has always been able to endure and survive
it.
********************************
* NOBODY KNOWS ANYTHING, OR IF *
* THEY DO, THEY ARE CAREFUL TO *
* HIDE THE FACT! *
********************************</p>
<p> An honest politician (<ent type='ORG'>bocca grande</ent> giganticus) is far more
dangerous. He or she is <ent type='ORG'>sincerley</ent> commited to bettering society
by political action. In practice, that means by writing and
enacting more laws. Indeed, many groups of idealistic citizens
publish rating sheets on politicians every year, and those who
have created more laws are estimated as having higher value than
those who are frequently absent when bills are voted upon. The
assumption is that adding more laws to statute books is a
positive achievement, like adding more money to our paychecks or
more art works to a museum.
A little thought, however, shows that this assumption is not
tenable. Every law creates a whole new criminal class; for
instance, when marijuana was illegalized in 1937, several hundred
thousand formerly law-abiding citizens became criminals
overnight, by Act of <ent type='ORG'>Congress</ent>. As more and more laws are passed,
more and more citizens become criminals. The chief cause of the
rising crime rate is the rising number of laws being enacted. An
honest politician, who keeps his nose to the grindstone and
enacts several hundered laws in the course of his career, thereby
produces as many as several million new criminals. </p>
<p> It is furthermore mathematically demonstrable that the more
laws there are, the more restrictions there are on the freedom of
the individual. If there were, say, only three laws in a given
society---e.g., Thou shalt not kill; thau shalt not steal; thou
shalt not lie or defraud---there would be only three restrictions
on freedom, which all rational persons would accept as obviously
necessary to the maintenance of order. When there are several
hundred thousand restrictions on freedom, most of which are felt
as extremely irksome by large segments of the populace.
In fact, it would take a brigade of lawyers several weeks,
minutely examining your affairs, to determine if you are a
criminal. Certainly, no ordinary citizen has the time or
research facilities to discover if he or sshe is in violation of
one out of skillions of laws currently on our statute books. In
many cases, two lawyers consulted independently will give
opposite opinions about whether or not a given course of action
is in violation of the statutes.
And new laws are being enacted all the time. Obviously,
unless there is a sudden paper shortage, the number of laws on
the books will eventually reach the point satirized by T.H.White,
in which "everything not prohibited is compulsory." It would
then probably only take a few years or decades more for a cadre
of honest politicians diligently writing even more laws to reach
the complementary point where "everything not compulsory is
prohibited."
*********************************
* EVERY LAW CREATES A WHOLE *
* NEW CRIMINAL CLASS OVERNIGHT! *
*********************************</p>
<p> At that stage the nightmare world of Orwell's 1984 will be
achieved. Crooked politicians, merely interested in the normal
human activity of making themselves rich and comfortable, could
never create that ultimate horror; but honest and idealistic
politicians bring us closer to it every day, with every new law
they enact.
These three generalizations---that national security produces
national insecurity; that authoritarianism produces
miscommunication and eventual idiocy; and that honest politicians
are a plague upon society---will be found to fully explain the
Decline and Fall of <ent type='GPE'>Rome</ent>, the Decline and Fall of the British
Empire, and the Decline and Fall of any country you care to name.
They are as universal as Newton's laws of motion and apply to
ALL cases. Of course, the <ent type='NORP'>American</ent> Sociological Association says
I am mad. Mad, am I? They said <ent type='ORG'>the Wright Brothers</ent> were mad.
They said Edison was mad. They said Baron Frankenstein was
mad...</p>
<p><ent type='ORG'>HABARD</ent> CELINE was trained in contract law and naval engineering
but claims he acquired his real education playing the piano in a
whorehouse. He is captain of the world's largest yellow
submarine, the Leif Erikson, and president of Gold and Appel
Inc., an import-export firm that has frequently aroused the
suspicions of law enforcement agencies ("137 arrests and no
convictions," <ent type='ORG'>Hagbard</ent> brags). Some claim that he is a master of
disguise and has successfully passed himself off under such
alternative identities as Howard Cork, Carl Cory, Hugh Crane,
Clutch Cargo, Captain Nemo, etc., and has appeared in countless
epics and sagas.
I am mad. </p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron 415-935-5845
Just Say Yes 415-922-2008
Rat Head 415-524-3649
<ent type='ORG'>Cheez Whiz</ent> 408-363-9766</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
</xml>

View File

@ -0,0 +1,180 @@
<xml><p><ent type='NORP'>CHRISTIANITY</ent> AND FREEDOM</p>
<p>By JACOB G. HORNBERGER</p>
<p>Many <ent type='NORP'>Americans</ent> believe that by supporting the <ent type='ORG'>Welfare State</ent>,
they are fulfilling God's great commandment to "love thy
neighbor as thyself." Having been taught in public schools
since childhood that the <ent type='ORG'>Welfare State</ent> helps needy people,
<ent type='NORP'>Americans</ent> usually are filled with a deep sense of guilt and
embarrassment whenever they object to any aspect of
governmental assistance for others.</p>
<p>Of course, government officials foster these feelings in order
to minimize resistance to the <ent type='ORG'>Welfare State</ent>. For whenever a
citizen objects to any part of the welfare system in <ent type='GPE'>America</ent>,
he inevitably is assaulted by political officials with such
accusations as: "You hate the poor!"; "You are a racist!"; and
"You hate God!" These tactics usually are quite effective in
breaking down resistance to welfare programs. And the usual
result is that <ent type='NORP'>Americans</ent> call for reform, rather than
elimination, of the <ent type='ORG'>Welfare State</ent>.</p>
<p>But, in actuality, the <ent type='ORG'>Welfare State</ent> is founded on absolutely
immoral principles. And not only does a person not further
God's work by advocating or defending the <ent type='ORG'>Welfare State</ent>, he
instead denigrates it.</p>
<p>One can imagine the following scenario when a new arrival gets
to the pearly gates:</p>
<p> St. Peter: What did you do to fulfill God's commandment
to love thy neighbor as thyself?</p>
<p> Applicant: I have here my income tax returns, the
Internal Revenue Code, and <ent type='ORG'>the Federal Register</ent>.</p>
<p> St. Peter: What meaning do these items have?</p>
<p> Applicant: St. Peter, you obviously are not familiar with
the <ent type='ORG'>Welfare State</ent> of <ent type='GPE'>the United States</ent> of <ent type='GPE'>America</ent>. These
items show how much of my tax money was used by the
government to help others in need. So, please step aside
and let me in.</p>
<p> St. Peter: You were participating in a way of life which
constituted a wilful violation of God's sacred
commandment against stealing?</p>
<p> Applicant: Stealing? What are you talking about? Through
my tax payments, people were helped.</p>
<p> St. Peter: Was not the political process used to take
money from people against their will in order to
redistribute to others? Were you not supporting and
participating in this evil way of life?</p>
<p> Applicant: Oh! No, that wasn't me. That was the
politicians and bureaucrats. I just voted for them, just
like other patriotic <ent type='NORP'>Americans</ent>. Don't blame me for the
stealing. Just give me credit for all the good that was
done with the loot.</p>
<p>If I held a gun to a person's head, and demanded "Your money
or your life!," most people would believe that I had committed
an immoral (and illegal) act. Suppose I needed the money for
my (or someone else's) education. Would this change the
immoral (and illegal) nature of my act? Most people would
respond in the negative. While punishment might be mitigated
due to extenuating circumstances, it remains morally (and
legally) wrong to steal, no matter how great the need for
another person's money.</p>
<p>But the interesting phenomenon about the <ent type='ORG'>Welfare State</ent> is that
many people believe that by making the exact same act legal--
that is, by enshrining it into their political system--it
somehow is converted into a moral act. In other words, in the
<ent type='ORG'>Welfare State</ent>, people vote for someone who is given the legal
power to take a person's money in order to give it to someone
else; then, it is believed that this political act, immoral if
committed by a private individual, somehow becomes moral
because it is now performed by a democratically elected public
official.</p>
<p>We must also consider the matter of free will--one of the
greatest gifts which God bestowed on human beings. He
obviously loved us so much that we have been given the freedom
even to deny Him (and our neighbor). In other words, while we
are told to love Him and others, we are not compelled by Him
to do so.</p>
<p>One of the best examples of this wide ambit of freedom is
found in the story of "The Danger of Riches" in the New
Testament. A rich man approached Jesus and asked, "Teacher,
what good must I do to possess everlasting life?" After the
man advised Jesus that he already kept all of the
commandments, Jesus told him, "If you seek perfection, go,
sell your possessions, and give to the poor. You will then
have treasure in heaven. Afterward, come back and follow me."
Unable to let go of his material wealth, however, the man went
away sad.</p>
<p>The story, of course, is valuable in advising people of the
dangers of spiritual or psychological attachment to material
things. But the lesson it teaches is important in another way:
After the young man chose to reject the suggestion to give
everything he had to the poor, Jesus did not ask the political
authorities to seize the man's possessions and redistribute
them to the poor. In other words, he did not force the man to
comply with the suggestion. Since the man had been given the
freedom to choose, the choice he made, although not the
desired one, was honored.</p>
<p>It is the vital importance of freedom of choice that advocates
of the <ent type='ORG'>Welfare State</ent> so often forget. They favor "freedom" but
only when the person chooses the "right" way. In other words,
the person is told, "It is morally and ethically correct that
you should share your possessions with others, and you are
free to make this decision in your own way . . . but if you
choose the wrong way, we shall simply take your money from
you, against your will, and do with it what you should have
done with it."</p>
<p>It is the great principles of freedom of choice and individual
responsibity on which <ent type='GPE'>the United States</ent> was founded. By and
large, our <ent type='GPE'>America</ent>n ancestors were free to engage in a
tremendously wide range of choices as long as they did not
inflict violence or fraud on others. And early <ent type='NORP'>Americans</ent>
believed that the primary purpose of government was to protect
the exercise of choice rather than interfere with it. Thus,
for the first century of <ent type='GPE'>America</ent>'s history, there was, for
example, neither income taxation nor welfare.</p>
<p>Does this mean that our ancestors were evil and mean for not
providing a <ent type='ORG'>Welfare State</ent> as their descendants have? Of course
not. It simply means that they believed that each individual
should be free to do what he wants with his own money even
when, and especially when, it is not in accordance with the
wishes of the majority of his fellow citizens. And the irony
was that 19th-century <ent type='GPE'>America</ent> was not only the most prosperous
nation in history but also the most charitable nation in
history.</p>
<p>But unfortunately, the <ent type='GPE'>America</ent>n people of the 20th century
have rejected and abandoned that philosophy. The idea now is
that people must be forced to be "good" through the political
plunder of the <ent type='ORG'>Welfare State</ent>. Money is taken from people
against their will so that it can be given to those who need
it. And the taxpayers claim "credit" for all of the "good"
which the political authorities do with their money.</p>
<p>The result, of course, is that the government has become the
means by which everyone is trying to live at the expense of
everyone else. Everyone is trying to get his "fair" share of
the loot while, at the same time, blocking out of his mind
that it is being stolen from his friends, neighbors, and
fellow citizens across the land. And everyone is trying to get
his "fair" share of the "credit" while doing everything he can
to protect his own pocketbook.</p>
<p>At the end of the year, it is important to count our
blessings. Fortunately, we live in a nation in which, by and
large (and with many exceptions), the government is
constitutionally prohibited from interfering with our
religious, intellectual, and political activities. But it is
also important, at the beginning of the new year, to make
resolutions: Let us resolve to dedicate ourselves to ending
the <ent type='ORG'>Welfare State</ent> by recapturing the vision of freedom,
private property, and limited government which guided our
<ent type='GPE'>America</ent>n ancestors.</p>
<p>Mr. Hornberger is founder and president of <ent type='ORG'>The Future</ent> of
Freedom <ent type='ORG'>Foundation</ent>, P.O. Box 9752, <ent type='GPE'>Denver</ent>, CO 80209.</p>
<p>------------------------------------------------------------
From the December 1990 issue of <ent type='ORG'>FREEDOM DAILY</ent>,
Copyright (c) 1990, <ent type='ORG'>The Future</ent> of Freedom <ent type='ORG'>Foundation</ent>,
PO Box 9752, <ent type='GPE'>Denver</ent>, <ent type='GPE'>Colorado</ent> 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the <ent type='ORG'>Foundation</ent>.
</p></xml>

View File

@ -0,0 +1,251 @@
<xml><p>
<ent type='ORG'>CHRONOLOGY</ent> OF SECRET SOCIETIES
Excerpted from THE OCCULT CONSPIRACY
by Michael Howard
Published by Destiny Books
Pages 179 - 183
------------------------------------------------------------------</p>
<p> 40000 BCE
Early establishment of Mystery schools, as depicted in the <ent type='LOC'>Lascaux</ent>
cave paintings.</p>
<p> 30000 BCE
According to some occult traditions this period saw the
colonization of <ent type='LOC'>Asia</ent> and <ent type='GPE'>Australasia</ent> by the inhabitants of the
lost continent of <ent type='GPE'>Lemuria</ent> or Mu. Goddess worship and matriaarchal
cultures established worldwide.</p>
<p> 10000 BCE
Evidence suggestive of early contact between extraterrestials and
Stone Age tribes in <ent type='GPE'>Tibet</ent>.</p>
<p> 9000 - 8000 BCE
Estimated date of the destruction of Atlantis, according to some
occult traditions. <ent type='ORG'>The Atlantean</ent> priesthood flee to establish
colonies in the <ent type='NORP'>British</ent> Isles, <ent type='LOC'>Western Europe</ent>, <ent type='GPE'>North Africa</ent> and
<ent type='LOC'>South America</ent>. Rise of the Northern Mystery Tradition centered on
the island of Thule and the <ent type='NORP'>Aryan</ent> culture. Invention of the runic
alphabet.</p>
<p> 5000 BCE
First primitive cities established in <ent type='LOC'>the Middle East</ent>.
Agriculture begins with domestication of animals such as sheep and
goats. Possible contact between extraterrestials and early
<ent type='NORP'>Sumerian</ent> culture.</p>
<p> 5000 - 3000 BCE
Formation of the two lands in pre-dynastic <ent type='GPE'>Egypt</ent> ruled by
outsiders (Isis and <ent type='ORG'>Osiris</ent>). The <ent type='GPE'>Egypt</ent>ian pantheon of gods
established including Horus, Thoth, Set, Ra, Ptah and Hathor.
Pharoahs regarded as the divine representatives of the Gods.</p>
<p> 3000 - 2000 BCE
Building of burial mounds and chambered tombs in <ent type='LOC'>Western Europe</ent>
and the <ent type='LOC'>Mediterranean</ent> area; the <ent type='LOC'>Sphinx</ent> and <ent type='LOC'>the Great Pyramids</ent> of
<ent type='GPE'>Giza</ent> and Cheops of <ent type='GPE'>Egypt</ent>; and <ent type='ORG'>the ziggurat</ent> (Towers of Babel) in
Ur. <ent type='ORG'>Sarmoung Brotherhood</ent> founded in <ent type='GPE'>Babylon</ent>.</p>
<p> 2000 - 1000 BCE
Reign of <ent type='ORG'>Thothmes III</ent> in <ent type='GPE'>Egypt</ent> (c. 1480). <ent type='ORG'>Foundation</ent> of the
Rosicrucian <ent type='ORG'>Order</ent>. Reign of Akhenaton (c. 1370) who establishes
the mystical Brotherhood of Aton dedicated to the worship of the
<ent type='ORG'>Sun</ent> as a symbol of the Supreme Creator. Erection of Stonehenge
and other megalithic stone circles in the <ent type='NORP'>British</ent> Isles. Reign of
Ankhenaton's son Tutankhamun who re-establishes the old pantheon
of <ent type='GPE'>Egypt</ent>ian gods and goddesses. Moses leads Children of Israel
out of slavery in <ent type='GPE'>Egypt</ent> during the reign of Ramses II to the
promised land of <ent type='GPE'>Canaan</ent>.</p>
<p> 1000 - 500 BCE
<ent type='ORG'>Foundation</ent> of the <ent type='NORP'>Dionysian</ent> Artificers. The building of <ent type='GPE'>Solomon</ent>'s
temple (c. 950). Establishment of the city states of <ent type='GPE'>Greece</ent> and
the <ent type='ORG'>Olympic</ent> pantheon of gods to replace earlier Nature worship.
First temples erected in <ent type='GPE'>Mexico</ent>, <ent type='GPE'>Peru</ent> and southwest <ent type='LOC'>North America</ent>.
<ent type='NORP'>Celts</ent> invade <ent type='LOC'>Western Europe</ent>. Decline of Goddess worship and rise
of patriarchal sky gods personified by priest-kings. <ent type='GPE'>Rome</ent> founded
in 750.</p>
<p> 500 BCE - 001 CE
<ent type='NORP'>Celtic</ent> culture established in <ent type='GPE'>Britain</ent>. The foundation of Druidic
wisdom colleges in <ent type='GPE'>Gaul</ent> and the <ent type='NORP'>British</ent> Isles. Odin recognized as
major god in the Northern Mysteries replacing the Mother Goddess
and is credited with inventing the runes. Buddha, Lao Tze,
Confucius, Pythagoras, Plato and Zoroaster preach their new
religions and philosophies. Maya culture in <ent type='LOC'>South America</ent>.
Establishment of <ent type='NORP'>Eleusinian</ent> mystery cults. Rise of the Essene
sect in <ent type='GPE'>Palestine</ent> and <ent type='GPE'>Judea</ent>. Birth of Jesus of <ent type='GPE'>Nazareth</ent>.</p>
<p> 001 - 400 CE
Jesus possibly travels to <ent type='GPE'>India</ent>, <ent type='GPE'>Tibet</ent> and <ent type='GPE'>Britain</ent> to be initiated
into the esoteric traditions of <ent type='LOC'>East</ent> and West. Crucified for his
radical political and religious ideas (c. 33). Joseph of
Arimanthea establishes first <ent type='NORP'>Celtic</ent> Church at Glastonbury (c. 37).
Invasion of <ent type='GPE'>Britain</ent> by <ent type='NORP'>Roman</ent> legions and suppression of the Druids
(40 - 60). Paul travels to <ent type='LOC'>Asia</ent> Minor and <ent type='GPE'>Greece</ent> preaching his
version of the gospel (50). <ent type='NORP'>Jewish</ent> revolt against <ent type='NORP'>Roman</ent> rule led
by Zealots (66). <ent type='ORG'>Essenes</ent> suppressed and Dead Sea Scrolls hidden
in caves. <ent type='GPE'>Temple</ent> in <ent type='GPE'>Jerusalem</ent> destroyed by <ent type='NORP'>Roman</ent>s (70). New
testament written. The Nazarenes break away from Judasim to found
<ent type='ORG'>the Christian Church</ent> (c. 80). Ormus is converted to Esoteric
<ent type='NORP'>Christianity</ent> by Mark. Mithrasim and the Mysteries of Isis compete
with <ent type='NORP'>Christianity</ent> in the <ent type='NORP'>Roman</ent> Empire. Mani, a <ent type='NORP'>Persian</ent> high
priest of <ent type='NORP'>Zoroastrianism</ent>, is crucified (276). Emperor Constantine
declares <ent type='NORP'>Christianity</ent> the official religion of the <ent type='NORP'>Roman</ent> Empire.
<ent type='ORG'>The Council</ent> of Nicea defines heresy, condemns <ent type='NORP'>pagan</ent>ism and lays
the theological foundation for the <ent type='NORP'>Catholic</ent> or <ent type='ORG'>Universal Church</ent>
(325). Constantine's successor Julian the Apostate (361 - 363)
briefly re-establishes the <ent type='NORP'>pagan</ent> old religion. Emperor Theodosius
outlaws the worship of the <ent type='NORP'>pagan</ent> gods in <ent type='GPE'>Rome</ent> and closes the <ent type='NORP'>pagan</ent>
temples (378). Invasion of <ent type='GPE'>Rome</ent>, <ent type='GPE'>Greece</ent> and <ent type='LOC'>Europe</ent> by the
barbarians led by Atilla the Hun (395-480). Withdrawal of the
<ent type='NORP'>Roman</ent> legions from <ent type='GPE'>Britain</ent> (395). <ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Order</ent> of
Comacine by ex-members of the <ent type='NORP'>Roman</ent> College of Architects.</p>
<p> 500 - 1000 CE
Mohammed founds <ent type='ORG'>Islam</ent> (dies 632). <ent type='NORP'>Celtic</ent> Church outlawed by
Council of Whitby (664). <ent type='ORG'>Foundation</ent> of first <ent type='NORP'>Sufi</ent> secret
societies (c. 700). First written translation of <ent type='ORG'>Emerald Tablet</ent>
of Hermes Trismegistus. <ent type='ORG'>Charlemagne</ent> founds alleged first
Rosicrucian Lodge in <ent type='GPE'>Toulouse</ent> (898). <ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Cathars</ent>,
Druzes and <ent type='GPE'>Yezedi</ent> (900). Heretical <ent type='NORP'>Catholic</ent> monks found first
Rosicrucian college (1000).</p>
<p> 1000 - 1400 CE
<ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Order</ent> of the Devoted of Assassins by
Hasan-i-Sabbah (1034-1124) and <ent type='ORG'>the Order</ent> of St John (1050). First
Crusade to the Holy Land (1095). Capture of the city of <ent type='GPE'>Jerusalem</ent>
by Godfrey de Bouillan, founder of the Priory of <ent type='GPE'>Sion</ent> (1099).
Assassins infiltrate Thuggee cult in <ent type='GPE'>India</ent>. <ent type='ORG'>Foundation</ent> of the
<ent type='ORG'>Order</ent> of the Knights of the <ent type='GPE'>Temple</ent> of <ent type='GPE'>Solomon</ent> in <ent type='GPE'>Jerusalem</ent> (1118).
Charter granted to the Priory of <ent type='GPE'>Sion</ent> by Pope Alexander II (1178).
Crusade launched against Cathars (1208). Inquistion created to
fight heresy (1215). Massacre of <ent type='ORG'>the Cathars</ent> at Montsegur in
<ent type='LOC'>Southern France</ent> (1241). Troubadours practising their cult of
courtly love. Occult schools teaching the <ent type='GPE'>Cabbala</ent> and alchemy
established in <ent type='GPE'>Spain</ent> by the <ent type='ORG'>Moors</ent>. Count Rudolf von <ent type='GPE'>Hapsburg</ent>
crowned as Holy <ent type='NORP'>Roman</ent> Emperor (1273). <ent type='ORG'>Knights Templars</ent> arrested
by King Philip of <ent type='GPE'>France</ent> on charges of devil worship, heresy and
sexual perversion (1307). Last official Grand Master of the
<ent type='ORG'>Templar</ent>s, Jacques de Molay, burnt at the stake and <ent type='ORG'>the Order</ent> goes
underground (1314).</p>
<p> 1400 - 1600 CE
Alleged life of Christian Rosenkreutz (1379-1482). <ent type='ORG'>Foundation</ent>
of <ent type='ORG'>the Order</ent> of the Garter by Edward III (1348). First
publication of the Corpus Heremeticum by the <ent type='ORG'>Medici</ent> family in
<ent type='GPE'>Italy</ent> (1460). Publication of Malleus Malifiracum and the papal
bull of Pope Innocent which began the medieval witch hunting
hysteria (1484 and 1486). Martin Luther begins Reformation
(1521). Henry Agrippa refers to <ent type='ORG'>the Templars</ent> as Gnostics and
worshippers of the phallic god Priapus (1530). Life of Dr John
Dee (1527-1608). <ent type='ORG'>Foundation</ent> of the <ent type='NORP'>British</ent> Secret Service by Sir
Francis Walsingham. Birth of Johann Valenti Andrea (1586). Life
of Sir Francis Bacon (1561-1626). Defeat of the Spanish Armada,
with magical help from the <ent type='ORG'>New Forest Witches</ent> (1588).</p>
<p> 1600 - 1700 CE
<ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Virginia Company</ent> by James I (1606). The
<ent type='NORP'>Roman</ent>ovs become Czars of <ent type='GPE'>Russia</ent> (1613). Publication of
Rosicrucian manifesto (1614). Life of Elias Ashmole (1617-1692).
Voyage of the <ent type='ORG'>Mayflower</ent> to <ent type='LOC'>New England</ent> and the publication of Sir
Francis Bacon's novel The New Atlantis (1620). Establishment of
the <ent type='NORP'>pagan</ent> community of <ent type='GPE'>Merrymount</ent> in <ent type='GPE'>Massachusetts</ent> by Thomas
Morton. <ent type='NORP'>English</ent> Civil War begins (1642). First <ent type='NORP'>English</ent> <ent type='GPE'>Mason</ent>
guild accepts non-stonemasons into its meetings (c. 1646).
Charles I convicted of treason and beheaded (1649). Oliver
Cromwell allegedly makes pact with the Devil in order to retain
power. Introduction of Freemasonry to <ent type='NORP'>American</ent> colonies by <ent type='NORP'>Dutch</ent>
settlers (1658). <ent type='ORG'>Order</ent> of <ent type='NORP'>Pietists</ent> founded in <ent type='GPE'>Pennsylvania</ent>
(1694).</p>
<p> 1700 - 1800 CE
Birth of the Comte de Saint-Germain (1710). <ent type='GPE'>Mason</ent>ic Grand Lodge
of <ent type='GPE'>England</ent> and Druid <ent type='ORG'>Order</ent> founded (1717). First <ent type='GPE'>Mason</ent>ic lodge
founded in <ent type='GPE'>France</ent> (1721)&gt; Benjamin <ent type='ORG'>Franklin</ent> initiated as <ent type='GPE'>Mason</ent>
(1731). Chevalier Alexander Ramsey informs <ent type='NORP'>French</ent> <ent type='GPE'>Mason</ent>s that
they are heirs to the <ent type='ORG'>Templar</ent> tradition (1736). <ent type='NORP'>Roman</ent> Church
condemns <ent type='GPE'>Mason</ent>ry (1738). Birth of Count Cagliostro. Comte de
Saint-Germain involved in <ent type='NORP'>Jacobite</ent> plot to restore <ent type='ORG'>Stuart dynasty</ent>
to the <ent type='NORP'>English</ent> Throne (1743). Society of <ent type='ORG'>Flagellants</ent> and Skopski
founded in <ent type='GPE'>Russia</ent> (1750). George <ent type='GPE'>Washington</ent> initiated as a <ent type='GPE'>Mason</ent>
(1752). Sir Francis Dashwood founds the Hell Fire Club. <ent type='ORG'>Franklin</ent>
visits <ent type='GPE'>England</ent> to discuss the future of <ent type='NORP'>American</ent> colonies with
Dashwood (1758). <ent type='ORG'>Foundation</ent> of the Rite of the Strict Observance
by Baron von Hund based on the <ent type='ORG'>Templar</ent> tradition. Frederick of
<ent type='GPE'>Prussia</ent> founds <ent type='ORG'>Order</ent> of the Architects of <ent type='LOC'>Africa</ent> and uses the
title <ent type='ORG'>Illuminati</ent> to describe his neo-<ent type='GPE'>Mason</ent>ic lodges (1768).
<ent type='ORG'>Franklin</ent> elected Grand Master of the Nine Sisters lodge in <ent type='GPE'>Paris</ent>
(1770). <ent type='LOC'>Grand Orient</ent> founded in <ent type='GPE'>France</ent> (1771). <ent type='ORG'>Boston Tea Party</ent>
(1773). <ent type='GPE'>Washington</ent> appointed Commander-in-Chief of the new
<ent type='NORP'>American</ent> Army (1775). <ent type='ORG'>Order</ent> of Perfectibilists or <ent type='ORG'>Illuminati</ent>
founded. <ent type='NORP'>American</ent> Revolution (1776). Czar Peter founds the
Secret Circle (1778). Supposed death of the Comte Saint-Germain
(1784). Grand <ent type='GPE'>Mason</ent>ic <ent type='ORG'>Congress</ent> allegedly plots <ent type='NORP'>French</ent> Revolution.
Cagliostro involved in <ent type='ORG'>Diamond Necklace Affair</ent>. <ent type='ORG'>Illuminati</ent> banned
in <ent type='GPE'>Bavaria</ent> and goes underground (1785). <ent type='NORP'>French</ent> Revolution (1789).
<ent type='GPE'>Illuminist</ent> conspiracy to overthrow the <ent type='GPE'>Hapsburg</ent>s (1794).</p>
<p> 1800 - 1900 CE
Count Grabinka founds secret society in St. <ent type='GPE'>Petersburg</ent> based on
<ent type='NORP'>Martinism</ent> and Rosicrucianism (1803). <ent type='NORP'>French</ent> <ent type='NORP'>republican</ent> plot to
assassinate Napoleon by placing a bomb under his coach, led by
occultist Fabre d'Olivet. Emperor Napoleon takes control of
<ent type='NORP'>French</ent> <ent type='GPE'>Mason</ent>ry (1805). Revived <ent type='ORG'>Templar</ent> <ent type='ORG'>Order</ent> in <ent type='GPE'>France</ent> celebrates
the martyrdom of Jacques de Molay with public requiem (1808).
<ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Order</ent> of Sublime Perfects (1809). Eliphas Levi
(1810-1875) reveals the secret symbolism of the <ent type='ORG'>Templar</ent> idol
Baphomet. Czar Alexander I and Emperor Francis von <ent type='GPE'>Hapsburg</ent> unite
to defeat <ent type='NORP'>Italian</ent> revolution incited by secret societies. John
Quincy Adams, initiate of <ent type='ORG'>the Dragon Society</ent>, is elected US
President (1820). Czar Alexander outlaws <ent type='GPE'>Mason</ent>ry in <ent type='GPE'>Russia</ent>
(1822). <ent type='ORG'>Decembrist</ent> secret society attempts coup when Czar
Alexander allegedly dies (1825). Anti<ent type='GPE'>Mason</ent>ic Party founded in US
to combat secret societies in <ent type='NORP'>American</ent> politics (1828). Wagner
joins the Vaterlandsverein, a secret society dedicated to the
formation of a pan-<ent type='LOC'>Europe</ent>an federation of nations. <ent type='GPE'>Mason</ent>ic
convention at <ent type='GPE'>Strasbourg</ent> allegedly plots second <ent type='NORP'>French</ent> Revolution
(1848). Napoleon III condemns <ent type='LOC'>Grand Orient</ent> for dabbling in
radical politics (1850). Paschal Randolph founds Hermetic
Brotherhood of the Light (1858). Abraham Lincoln is assassinated
(1865). <ent type='ORG'>Klu Klux Klan</ent> founded (1866). Society of <ent type='NORP'>Rosicrucians</ent> in
<ent type='GPE'>Anglia</ent> founded (1867). <ent type='ORG'>Foundation</ent> of <ent type='ORG'>the Theosophical Society</ent> by
Madame Blavasky on instructions of the Great White Brotherhood.
Birth of Aleister Crowley (1875). Mysterious suicide of ArchDuke
Rudolph von <ent type='GPE'>Hapsburg</ent> at a hunting lodge at <ent type='GPE'>Mayerling</ent> (1889).
<ent type='ORG'>Foundation</ent> of the Hermetic <ent type='ORG'>Order</ent> of the Golden Dawn (1888).
Assassination of <ent type='ORG'>Empress</ent> Elizabeth von <ent type='GPE'>Hapsburg</ent> by anarchist
(1898).</p>
<p> 1900 - 1897 CE
<ent type='ORG'>Foundation</ent> of the Ordo Templi Orientis (1900). International
<ent type='ORG'>Order</ent> of CoFreemasonry founded in 1902. Publication of The
Protocols of the Wise Men of Zion in <ent type='GPE'>Russia</ent> (1905). <ent type='ORG'>Foundation</ent> of
the Ancient and Mystical <ent type='ORG'>Order</ent> of the Rose Crucis (1909). Black
Hand Society founded in 1911. Aleister Crowley accepted as head
of the <ent type='NORP'>British</ent> OTO. <ent type='ORG'>Order</ent> of the <ent type='GPE'>Temple</ent> of the Rosy Cross founded
in 1912. Assassination of ArchDuke Franz Ferdinand and
Archduchess Sophia von Hapsberg. Attempted murder of Rasputin.
WWI begins in 1914. <ent type='ORG'>Kaiser Wilhelm</ent> abdicates. <ent type='GPE'>Hapsburg</ent> dynasty
is overthrown. <ent type='ORG'>Bolshevik Revolution</ent> in <ent type='GPE'>Russia</ent> (1917-1918).
<ent type='ORG'>Foundation</ent> of <ent type='ORG'>German Workers Party</ent> by <ent type='ORG'>Thule Society</ent> (1919).
Hitler joins GWP and changes its name to the National Socialist
Party (1920). Crowley employed by MI6. Cardinal Roncalli, later
Pope John XXIII, allegedly joins Rosicrucian <ent type='ORG'>Order</ent>. Hitler
becomes first chancellor of the Third Reich (1933). Roosevelt
places <ent type='GPE'>Illuminist</ent> symbol of eye in triangle on the dollar bill
(1935). <ent type='NORP'>Nazi</ent> invasion of <ent type='GPE'>England</ent> prevented by <ent type='ORG'>New Forest Witches</ent>
(1940). Rudolf Hess lured to <ent type='GPE'>Britain</ent> on peace mission by fake
astrological data (1941). <ent type='ORG'>Order</ent> of the <ent type='GPE'>Temple</ent> revived in <ent type='GPE'>France</ent>
(1952). <ent type='ORG'>First Bilderberg</ent> meeting in 1954. <ent type='ORG'>Foundation</ent> of the P2
Lodge (1960). Death of Pope Paul VI, election and alleged murder
of Pope John Paul I, and election of Pope John Paul II (1978).
Exposure of P2 conspiracy. Attempt to assassinate John Paul II
(1981). L'Ordre Internationale Chevelresque Tradition Solaire
founded on instructions of the revived <ent type='ORG'>Order</ent> of the <ent type='GPE'>Temple</ent> in
<ent type='GPE'>France</ent> (1984).</p>
<p> <special>EOF</special>
5 January 1991</p>
</xml>

View File

@ -0,0 +1,315 @@
<xml><p>
Article: 569 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: Top Secret: How To Kill--"The <ent type='ORG'>CIA</ent>'s <ent type='ORG'>Secret Weapons Systems</ent>"
Keywords: our culture has lost its moral, ethical, and spiritual foundations
Organization: Silicon Graphics, Inc.
Date: Wed, 8 Apr 1992 15:56:51 GMT
Lines: 321</p>
<p> unless we know MUCH MORE about the atrocities committed "in the interests
and name of `national security,'" how can we possibly become sufficiently
motivated and driven to dedicate our energies towards changing this form
of "government" by lies, dissembling, expediency, profit-as-god, and
murder? we have no idea what is "done in our name." if we did, we would
no longer be able to participate in its commoditized seductiveness because
we would not be able to look ourselves in the mirror or sleep at night.
--ratitor</p>
<p> the following is taken from the June, 1978 issue of "Gallery" magazine:
__________________________________________________________________________
THE <ent type='ORG'>CIA</ent>'S SECRET WEAPONS SYSTEMS
by Andrew Stark</p>
<p> Exploding wine bottles, guns constructed out of pipes,
bullets made of teeth, aspirin explosives: they sound like
props from a second-rate spy story. <ent type='ORG'>Horrifyingly</ent> enough,
they are real. The <ent type='ORG'>CIA</ent> has spent a great deal of its time--
and your money--developing countless bizarre weapons for
assassination, sabotage, and mass destruction. If that's
news to you, it's because the <ent type='ORG'>CIA</ent> doesn't want these
products, some of which are quite easy to put together, to
fall into the "wrong hands." As for whether they are in the
right hands now--judge for yourself.</p>
<p> The <ent type='ORG'>CIA</ent> has developed many exotic and sophisticated devices
intended for use in interrogation, sabotage, and assassination.
These weapons are necessary--if you grant that what the <ent type='ORG'>CIA</ent> itself
does is necessary. If the <ent type='ORG'>CIA</ent> wants to eliminate a key <ent type='ORG'>KGB</ent> agent
operating in <ent type='GPE'>Hungary</ent>, it faces certain problems. It would be
virtually impossible to slip a deadly weapon, such as a gun or
bomb, past <ent type='NORP'>Hungarian</ent> customs officials. Thus, the <ent type='ORG'>CIA</ent> assassin
must assemble his weapon from commonly obtainable materials after
he crosses the border.
The <ent type='ORG'>CIA</ent> agent might decide to construct a urea nitrate
explosive, commonly known as a urine bomb. This weapon is quite
deadly, easily exploded, and consists primarily of nitric acid and
urine. The urine bomb is one of literally hundreds of murderous
weapons in the <ent type='ORG'>CIA</ent> arsenal.
"<ent type='ORG'>The New York Times</ent>" of September 26, 1975 revealed the
existence of guns that shoot cobra-venom darts. Then there was the
shoe polish compound intended to make Fidel Castro's beard fall
out, so that he would lose his "charisma." And <ent type='ORG'>CIA</ent> laboratories in
<ent type='GPE'>Fort Monmouth</ent>, <ent type='GPE'>New Jersey</ent> developed the famous rifle that shoots
around corners.
Some <ent type='ORG'>CIA</ent> weapons are designed to kill many people--deadly germs
can be released in subways; others are intended to kill a single,
specific individual--the Borgia ring contains deadly poison to be
slipped into a victim's drink; and still others are standard
weapons supplied for such missions as overthrowing the Allende
government in <ent type='GPE'>Chile</ent> in 1973.
The information about <ent type='ORG'>CIA</ent> weapons that you will read in this
article generally has not been made public before. It was not
intended to be. But your tax dollars pay for these devices; it is
your right to know about them.
There is a booklet, written in 1977 and distributed to a select
group of U.S. mercenaries, titled "<ent type='ORG'>CIA</ent> Improvised Sabotage
Devices." This instructional guidebook, part of "the Combat
Bookshelf," was published by <ent type='ORG'>Desert Publications</ent>, P.O. Box 22005,
<ent type='GPE'>Phoenix</ent>, <ent type='GPE'>Arizona</ent> 85028. If you want to know how the <ent type='ORG'>CIA</ent> turns a
cigar box into an explosive that can destroy a 10000-gallon
capacity storage tank, then "<ent type='ORG'>CIA</ent> <ent type='ORG'>Improvised Sabotage Devices</ent>" is
what you should read. You will need it if you want to build the
"Water-Drip Electric Delay," a bomb that requires little more than
wood scrap, a tin can, and a battery. The "<ent type='ORG'>Pocket Watch Electric</ent>
Delay" requires little more than a watch, a screw, and a battery.
The "Mousetrap Electric Release" is another bomb, this one
requiring a mousetrap, a trip wire, a battery, and little else. It
is described as "an excellent device to use with bazooka rockets
against trucks, tanks, or locomotives." The "Chemical
Instantaneous Initiator" is made from a sugar-chlorate mix and is
effective in sabotaging trains. The "Martini Glass Shaped Charge"
is a bomb that also can be made out of a beer can. You might want
to try to construct the "<ent type='ORG'>Vehicle Booby Trap</ent>." The "Potassium
Chlorate and Sugar Igniter" and the "Sawdust, Moth Flakes, and Oil
Incendiary" can be made with only what you see in their titles.
For these and more than fifty other <ent type='ORG'>CIA</ent> devices, step-by-step
instructions on how to make them and illustrations of what they
should look like when completed are given. Turn a wine bottle into
a bomb. Build a land-mine rocket. Manufacture napalm in your
basement. Even the simple how-tos of causing a dust explosion can
be found in "<ent type='ORG'>CIA</ent> <ent type='ORG'>Improvised Sabotage Devices</ent>."
Why is the <ent type='ORG'>CIA</ent> so deeply involved in sabotage techniques? The
<ent type='ORG'>CIA</ent> might think it is in this country's interest to delay
scientific work being done by another nation. Or, the <ent type='ORG'>CIA</ent> might
want to disrupt a nation's economy in the hope that the resulting
chaos will lead to civil unrest and the overthrow of the existing
government (some of this actually happened in <ent type='GPE'>Chile</ent>). The original
John Rockefeller used such tactics against his competitors. He
simply had their refineries blown up.
Another pamphlet the <ent type='ORG'>CIA</ent> would not like you to see is titled
"How to Kill," written by John Minnery, edited by Robert Brown and
Peder Lund, and published by <ent type='ORG'>Paladin Press</ent>, Box 1307, <ent type='GPE'>Boulder</ent>,
<ent type='GPE'>Colorado</ent> 80306. The reason the <ent type='ORG'>CIA</ent> would prefer that you not see
this eighty-eight-page pamphlet, which is unavailable at bookstores
and newsstands, is because it contains a number of "ingenious"
methods of doing what the title says. Also, <ent type='ORG'>Paladin Press</ent>, which
published a book called "<ent type='ORG'>OSS Sabotage and Demolition</ent> Manual," is
widely regarded by journalists as an organization with close ties
to mercenary groups and the <ent type='ORG'>CIA</ent>. <ent type='ORG'>Paladin Press</ent> doesn't want you to
know that, but how else could they have published the "<ent type='ORG'>OSS</ent> Sabotage
and Demolition Manual?" <ent type='ORG'>The Office</ent> of Strategic Services was the
precursor of today's <ent type='ORG'>CIA</ent>.
This writer's call to <ent type='GPE'>Colorado</ent> yielded the following
conversation:</p>
<p> "How could you publish the "<ent type='ORG'>OSS Sabotage and Demolition</ent> Manual,"
I asked Peter Lund, editor and publisher of <ent type='ORG'>Paladin Press</ent>, "if your
organization, at the least, was not dealing with former <ent type='ORG'>OSS</ent> agents?
And what about "How to Kill?"
"I don't talk to journalists," Lund said.
"You're called the <ent type='ORG'>Paladin Press</ent>. You must publish books. Can
I order them?"
"No."
"Why not? You're a publisher, aren't you?"
"We're afraid our publications might fall into the wrong hands."
"What are the right hands?" I asked.
"I don't talk to journalists."
"Have you ever heard of <ent type='ORG'>Desert Publications</ent>?" I asked.
"A fine outfit," Lund said. "If they recommend you, I'll send
you our material."
"That's my problem," I said. "They don't seem to have a phone
number."
"Well, they're a good group."
"Listen," I said, "wasn't your group, and <ent type='ORG'>Desert Publications</ent>
besides, involved in <ent type='ORG'>CIA</ent> mercenary activity in <ent type='LOC'>Africa</ent>?"
"I don't know anything about that."
"Were you in the Special Forces?"
"July 1967 to July 1968 in <ent type='GPE'>Vietnam</ent>."
"Were you <ent type='ORG'>CIA</ent>?"
"I was MACV [Military Armed Forces Command <ent type='GPE'>Vietnam</ent>]."
"You weren't affiliated with <ent type='ORG'>CIA</ent>?"
"I didn't say that."
"What do you say?"
"We did joint operations with <ent type='ORG'>CIA</ent> on the <ent type='GPE'>Phoenix</ent> Program."
"Wasn't that a murder operation?"
"No. It was snatching people."</p>
<p> The <ent type='GPE'>Phoenix</ent> Program was designed for a job that the <ent type='ORG'>CIA</ent>
euphemistically described as "eliminating the <ent type='GPE'>Viet Cong</ent>
infrastructure." In reality, it was a rampant reign of terror run
out of <ent type='ORG'>CIA</ent> headquarters at <ent type='GPE'>Langley</ent>, <ent type='GPE'>Virginia</ent>. Former <ent type='ORG'>CIA</ent> director
William Colby later termed the program "effective." The <ent type='GPE'>Phoenix</ent>
Program was a naked murder campaign, as proved by every realistic
report, ranging from <ent type='ORG'>the Bertrand Russell Tribunal</ent> to the Dellums
Committee to admissions by <ent type='ORG'>CIA</ent> agents themselves. The program
killed--and *none* of these killings occurred in combat--18000
people, mostly women and children.
But what about Peder Lund, editor and publisher of Paladin
Press? The book he edited and published, "How to Kill," outlined a
surfeit of murder methods, horrific techniques of causing people to
die. For example:
"Without getting too deeply into the realm of the bizarre,"
wrote John Minnery, the author of "How to Kill" as he proceeded to
just that, "a specially loaded bullet made from a human tooth
(bicuspid) could be fired under the jaw or through the mouth into
the head. The tooth is a very hard bone, and its enamel shell
would allow it to penetrate into the brain. The intention here is
also to hide the cause of death because the examiner in his search
for a projectile will disregard bone fragments."
One last example from "How to Kill" should give you the flavor
of the book:</p>
<p> Lesson Nine: Hot Wire</p>
<p> "Essentially, the weapon is an electrified grid in the urinal
basin. This can take the form of a screen cover for the drain
or a metal grill. If the urinal is completely porcelain, the
screen must be added by the assassin. The drain cover is
connected to the electrical system of the washroom by means of
an insulated cord that is hidden behind the plumbing.
"What happens when the subject uses the urinal should be
obvious now. The subject's urine, which is a salty liquid and
a perfect conductor of electricity, makes contact with the
charged grid, and the shock will kill him."</p>
<p> This reporter's investigation revealed that the "Hot Wire" was
child's play compared to certain other <ent type='ORG'>CIA</ent> weapons devices. For
instance, I was able to obtain Volumes One and Two of the "<ent type='ORG'>CIA</ent>
Black Book" on improvised munitions, volumes that are stamped "for
official use only" on almost every page. It is obvious why the <ent type='ORG'>CIA</ent>
would like these books to remain secret. With elaborate
instructions, they describe how to make high explosives from
aspirin, how to construct a nail grenade, and how to turn a Coke
bottle into a bomb.
Described in detail in the "Black Book" is the previously
mentioned urea nitrate explosive, or, as it is known to the pros,
"the piss bomb." Instructions for the preparation of this weapon
assure the maker that animal urine will do as well as human; the
important thing is to have ten cups of it, boil it down to one cup,
and mix it with the nitric acid.
Also described in the "Black Book" is how to construct a pipe
pistol, which, as the name indicates, is a gun constructed out of a
pipe. Other weapons include a cooking syringe filled with poison
that can be stabbed into "the subject's" stomach; a cyanide gas
pistol; a throat cutter gauntlet knife (razor sharp and only an
inch or so in length); and a mixture of fertilizer and aluminum
powder that can be made into a powerful bomb.
Why build murder weapons out of such weird material? Is the <ent type='ORG'>CIA</ent>
insane?
No. In its own way, the whole thing is perfectly logical.
The pamphlet "How to Kill" explained it all: "As most of these
devices are homemade, this precludes the possibility of their being
traced. They are, in effect, `sanitized' and perfect for
assassinations, where weapons are prohibited, or where customs in
the hostile country are stringent, so these can be made from local
materials."
Being a contract killer for the <ent type='ORG'>CIA</ent> is not all roses. You
cannot kill in just any way. A number of attempts have been made
on Fidel Castro's life--some with the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>Mafia</ent>
cooperating--and some of them may have failed because of
restrictions imposed on the potential assassins. It would be
unacceptable for Castro's murder to be laid at the door of the <ent type='ORG'>CIA</ent>.
This would make Castro a martyr in the eyes of his countrymen.
Thus, a method that would suggest death by natural causes must be
found.
Abundant speculation and considerable evidence suggest that the
<ent type='ORG'>CIA</ent> or some other government agency arranged for the "natural"
deaths of David Ferrie, Jack Ruby, George De Mohrenschildt, and
other potential witnesses into the assassination of John Kennedy.
Some methods of killing, like the injection of an air bubble into
the bloodstream, will often go unnoticed by medical examiners.
Another hard-to-trace method of killing is to mail a snake to
the victim. This is known as killing by long distance. A
disadvantage to this method is that the snake might bite an
innocent third party who just happens to open the package. The
advantage is that once the snake has struck, the evidence can
simply slither away.
Sometimes, as the <ent type='ORG'>CIA</ent> knows, killing has to be done at close
range. For this purpose, a valuable weapon is the ice pick with a
blood arrester attached. The blood arrester is a cloth wrapped
near the tip of the ice pick. When the pick is shoved into the
victim, the spurting blood is absorbed by the blood arrester.
People who see the victim fall will probably think he has had a
heart attack. While the onlookers try to help the victim, the
assassin uses this valuable ten or fifteen seconds to escape
unnoticed.
Often it is advisable to use what is called in the trade a
"quiet weapon." Silenced weapons can include pistols, rifles, and
even machine guns.
<ent type='ORG'>Poison</ent> is a quiet killer. Here is a partial list of the poisons
the <ent type='ORG'>CIA</ent> has become expert at administering: oil of bitter almonds;
ant paste; cadmium, used in vapor form, and death is delayed four
hours; radiator cleaner, also causing a delayed death;
Cantharides (<ent type='NORP'>Spanish</ent> Fly); ethyl mercury; and freon, heated by a
flame. These poisons and many others are listed in "How to Kill."
The author then cautions the reader:
"Unless otherwise stated, these poisons are either to be
injected into the subject, or taken orally by him by adding it to
his food. Use common sense in the application of these potions
and, if possible, double the O.D. necessary."
W.H. <ent type='ORG'>Bowart</ent>, in his book, "<ent type='ORG'>Operation Mind Control</ent>" described the
<ent type='ORG'>CIA</ent>'s use of drugs: "In 1953, the <ent type='ORG'>CIA</ent> made plans to purchase ten
kilograms of LSD for use in `drug experiments with animals and
human beings.' Since there are more than 10000 doses in a gram,
that meant the <ent type='ORG'>CIA</ent> wanted 100 million doses. The <ent type='ORG'>CIA</ent> obviously
intended to `corner the market' on LSD so that other countries
would not be ahead of the U.S. in their potential for `LSD
warfare.'"
Dr. Albert Hoffman, an early researcher into the uses of LSD,
was horrified by what the <ent type='ORG'>CIA</ent> was doing: "I had perfected LSD for
medical use, not as a weapon. It can make you insane or even kill
you if it is not properly used under medical supervision. In any
case, the research should be done by medical people and not by
soldiers or intelligence agencies."
Perhaps the most frightening weapon of all is the one that can
be used to alter weather and climate. It was used with
considerable success in <ent type='GPE'>Vietnam</ent>. It slowed troop movements with
heavy rains, and it destroyed the rice crop, as well. The danger
is that these climatological changes may become permanent,
affecting not only enemies of <ent type='GPE'>the United States</ent>, but also the
entire planet.
Finally, considerable evidence exists that <ent type='GPE'>the United States</ent>,
through the <ent type='ORG'>CIA</ent>, employed germ warfare during the Korean War. A
number of captured pilots testified that germ warfare was used, but
their testimony was dismissed as brainwashing. A <ent type='ORG'>Marine Corps</ent>
colonel named Frank H. Schwable signed a germ warfare confession
and, according to W.H. <ent type='ORG'>Bowart</ent>, "named names, cited missions,
described meetings and strategy conferences."
Schwable later repudiated his confession. But the charges of
germ warfare were taken up in front of the <ent type='ORG'>United Nations</ent>, and a
number of countries believed them.
<ent type='GPE'>The United States</ent>, incidentally, was later charged with using
nerve gas in <ent type='GPE'>Vietnam</ent>.
What you have read on these pages is pretty revolting stuff.
Yet, if the world ought to be saved from Communism, who can say it
is not necessary? One danger, of course, is that these terrible
weapons have been introduced into our body politic and have
produced strange and terrible fruits on our own native soil. When
assassination becomes government policy, when men are trained to
kill in every conceivable way, when morality is set aside for a
"higher good," can even the President of <ent type='GPE'>the United States</ent> consider
himself safe?</p>
<p> Andrew Stark is a pseudonym for a specialist on weaponry.</p>
<p>--
daveus rattus </p>
<p> yer friendly neighborhood ratman</p>
<p> KOYAANISQATSI</p>
<p> ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.</p></xml>

View File

@ -0,0 +1,810 @@
<xml><p>EX-<ent type='ORG'>CIA</ent> OFFI<ent type='ORG'>CIA</ent>L SPEAKS OUT</p>
<p>By Greg Kaza</p>
<p> This article is reprinted from Full Disclosure. Copyright (c) 1986
<ent type='ORG'>Capitol Information Association</ent>. All rights reserved. <ent type='ORG'>Permission</ent> is hereby
granted to reprint this article providing this message is included in its
entirety. Full Disclosure, Box 8275, <ent type='GPE'>Ann Arbor</ent>, <ent type='GPE'>Michigan</ent> 48107. $15/yr.</p>
<p>Full Disclosure: I'd like to start out by talking about your well-known book,
`The <ent type='ORG'>CIA</ent> and <ent type='ORG'>the Cult</ent> of Intelligence.' What edition is that in today?</p>
<p>Marchetti: The latest edition came out last summer. Its the <ent type='ORG'>Laurel edition</ent>,
<ent type='ORG'>Dell</ent> paperback.</p>
<p>FD: Its gone through a couple of printings?</p>
<p>Marchetti: Yes. It was originally published by <ent type='ORG'>Alfred Knopf</ent> in hardback and
by <ent type='ORG'>Dell</ent> in paperback. That was in 1974 with <ent type='ORG'>Knopf</ent> and 1975 with <ent type='ORG'>Dell</ent>. Then a
few years later we got some more of the deletions back from the government,
so <ent type='ORG'>Dell</ent> put out a second printing. That would have been about 1979. Then
recently, during the summer of 1983, we got back a few more deletions and
that's the current edition that is available in good bookstores (laughs) in
<ent type='ORG'>Dell</ent> paperback, the <ent type='ORG'>Laurel edition</ent>.</p>
<p>Originally the <ent type='ORG'>CIA</ent> asked for 340 deletions. We got about half of those back
in negotiations prior to the trial. We later won the trial, they were
supposed to give everything back but it was overturned at the appellate
level. <ent type='ORG'>The Supreme Court</ent> did not hear the case, so the appellate decision
stood. We got back 170 of those deletions in negotiations during the trial
period. A few years later when the second paperback edition came out there
were another 24 deletions given back. The last time, in 1983, when the the
third edition of the paperback edition was published, there were another 35
given back. So there are still 110 deletions in the book out of an original
340.</p>
<p>As for the trial, the <ent type='ORG'>CIA</ent> sued in early 1972 to have the right to review and
censor the book. They won that case. It was upheld at the appellate court in
<ent type='GPE'>Richmond</ent> some months later, and again <ent type='ORG'>the Supreme Court</ent> did not hear the
case. Two years later we sued the <ent type='ORG'>CIA</ent> on the grounds that they had been
arbitrary, capricious and unreasonable in making deletions and were in
violation of the injunction they had won in 1972. We went before Judge Albert
V. Bryan Jr., and in that case, he decided in our favor. Bryan was the same
fourth district judge in <ent type='GPE'>Alexandria</ent> who heard the original case. He said that
there was nothing in the book that was harmful to national security or that
was logically classifiable. Bryan said the <ent type='ORG'>CIA</ent> was being capricious and
arbitrary. They appealed, and a few months later down in <ent type='GPE'>Richmond</ent> the
appellate court for the fourth district decided in the government's favor,
and overturned Bryan's decision. Again, <ent type='ORG'>the Supreme Court</ent> did not hear the
case. It chose not to hear it, and the appellate court's decision stood.</p>
<p>By this time, we had grown weary of the legal process. The book was published
with blank spaces except for those items that had been given back in
negotiations. Those items were printed in bold face type to show the kind of
stuff the <ent type='ORG'>CIA</ent> was trying to cut out. In all subsequent editions, the
additional material is highlighted to show what it is they were trying to cut
out.</p>
<p>Of course the <ent type='ORG'>CIA</ent>'s position is that only they know what is a secret. They
don't make the national security argument because that is too untenable these
days. They say that they have a right to classify anything that they want to,
and only they know what is classifiable. They are establishing a precedent,
and have established a precedent in this case that has been used subsequently
against ex-<ent type='ORG'>CIA</ent> people like Frank Snepp and John <ent type='ORG'>Stockwell</ent> and others, and in
particular against Ralph McGee. They've also used it against (laughing), its
kind of ironic, two former <ent type='ORG'>CIA</ent> directors, one of whom was William Colby.
Colby was the guy behind my case when he was director. In fact, he was sued
by the <ent type='ORG'>CIA</ent> and had to pay a fine of I think, about $30000 for putting
something in that they wanted out about the Glomar Explorer. He thought they
were just being, as I would say, ``arbitrary and capricious,'' so he put it
in anyway, was sued, and had to pay a fine. Admiral Stansfield Turner was
another who, like Colby when he was director, was the great defender of
keeping everything secret and only allowing the <ent type='ORG'>CIA</ent> to reveal anything. When
Turner got around to writing his book he had the same problems with them and
is very bitter about it and has said so. His book just recently came out and
he's been on a lot of TV shows saying, ``Hells bells, I was director and I
know what is classified and what isn't but these guys are ridiculous,
bureaucratic,'' and all of these accusations you hear. It is ironic because
even the former directors of the <ent type='ORG'>CIA</ent> have been burned by the very precedents
that they helped to establish.</p>
<p>FD: What are the prospects for the remaining censored sections of your book
eventually becoming declassified so that they are available to the <ent type='NORP'>American</ent>
people?</p>
<p>Marchetti: If I have a publisher, and am willing to go back at the <ent type='ORG'>CIA</ent> every
year or two years forcing a review, little by little, everything would come
out eventually. I can't imagine anything they would delete. There might be a
few items that the <ent type='ORG'>CIA</ent> would hold onto for principle's sake. Everything that
is in that book, whether it was deleted or not, has leaked out in one way or
another, has become known to the public in one form or another since then. So
you know its really a big joke.</p>
<p>FD: Looking back on it, what effect did the publication of the `The <ent type='ORG'>CIA</ent> and
<ent type='ORG'>the Cult</ent> of Intelligence' have on your life?</p>
<p>Marchetti: It had a tremendous effect on my life. The book put me in a
position where I would forever be persona non grata with the bureaucracy in
the federal government, which means, that I cannot get a job anywhere, a job
that is, specific to my background and talents. Particularly if the company
has any form of government relationship, any kind of government contract.
That stops the discussions right there. But even companies that are not
directly allied with the government tend to be very skittish because I was so
controversial and they just don't feel the need to get into this. I have had
one job since leaving the <ent type='ORG'>CIA</ent> other than writing, consulting and things like
that, and that was with an independent courier company which did no business
with the government, was privately owned, and really didn't care what the
government thought. They ran their own business and they hired me as their
friend. But every other job offered to me always evaporates, because even
those individuals involved in hiring who say they want to hire me and think
the government was wrong always finish saying, ``Business is business. There
are some people here who do not want to get involved in any controversial
case.'' Through allies or former employees somebody always goes out of their
way to make it difficult for me, so I never have any other choice but to
continue to be a freelance writer, lecturer, consultant, etcetera, and even
in that area I am frequently penalized because of who I worked for.</p>
<p>FD: The government views you as a troublemaker or whistleblower?</p>
<p>Marchetti: As a whistleblower, and, I guess, troublemaker. In the
intelligence community, as one who violated the code.</p>
<p>FD: The unspoken code?</p>
<p>Marchetti: Right. And this has been the fate of all those <ent type='ORG'>CIA</ent> whistleblowers.
They've all had it hard. Frank Snepp, <ent type='ORG'>Stockwell</ent>, McGee, and others, have all
suffered the same fate. Whistleblowers in general, like Fitzgerald in the
Department of Defense, who exposed problems with the C-5A, overruns, have
also suffered the same kind of fate. But since they were not dealing in the
magical area of national security they have found that they have some leeway
and have been able to, in many other cases, find some other jobs. In some
cases the government was even forced to hire them back. Usually the
government puts them in an office somewhere in a corner, pays them $50000 a
year, and ignores them. Which drives them crazy of course, but thats the
government's way of punishing anybody from the inside who exposes all of
these problems to the <ent type='NORP'>American</ent> public.</p>
<p>FD: Phillip Agee explains in his book the efforts of the <ent type='ORG'>CIA</ent> to undermine his
writing of `Inside The Company' both before and after publication. Have you
run into similar problems with extralegal <ent type='ORG'>CIA</ent> harassment?</p>
<p>Marchetti: Yes. I was under surveillance. Letters were opened. I am sure our
house was burglarized. General harassment of all sorts, and the <ent type='ORG'>CIA</ent> has
admitted to some of these things. One or two cases, because the Church
Committee found out. For example, the <ent type='ORG'>CIA</ent> admitted to working with the <ent type='ORG'>IRS</ent> to
try and give me a bad time. <ent type='ORG'>The Church Committee</ent> exposed that and they had to
drop it. They've admitted to certain other activities like the surveillance
and such, but the <ent type='ORG'>CIA</ent> will not release to me any documents under the Freedom
of Information Act. They won't release it all -- any documents under <ent type='ORG'>FOIA</ent>,
period.</p>
<p>FD: About your time with the <ent type='ORG'>CIA</ent>?</p>
<p>Marchetti: No, about my case. I only want the information on me after leaving
the agency and they just refuse to do it. They've told me through friends
``You can sue until you're blue in the face but you're not going to get
this'' because they know exactly what would happen. It would be a terrible
embarrassment to the <ent type='ORG'>CIA</ent> if all of the extralegal and illegal activities they
took became public.</p>
<p>The most interesting thing they did in my case was an attempt at entrapment,
by putting people in my path in the hopes that I would deal with these
people, who in at least one case turned out to be an undercover <ent type='ORG'>CIA</ent> operator
who was, if I had dealt with him, it would have appeared that I was moving to
deal with the <ent type='NORP'>Soviet</ent> <ent type='ORG'>KGB</ent>. The <ent type='ORG'>CIA</ent> did things of that nature. They had people
come to me and offer to finance projects if I would go to <ent type='GPE'>France</ent>, live there,
and write a book there without any censorship. <ent type='GPE'>Switzerland</ent> and <ent type='GPE'>Germany</ent> were
also mentioned. The <ent type='ORG'>CIA</ent> used a variety of techniques of that sort. I turned
down all of them because my theory is that the <ent type='ORG'>CIA</ent> should be exposed to a
certain degree in the hope that <ent type='ORG'>Congress</ent> could conduct some investigation out
of which would come some reform. I was playing the game at home and that is
the way I was going to play. Play it by the rules, whatever handicap that
meant. Which in the end was a tremendous handicap.</p>
<p>But it did work out in the sense that my book did get published. The <ent type='ORG'>CIA</ent> drew
a lot of attention to it through their attempts to prevent it from being
written and their attempts at censorship, which simply increased the appetite
of the public, media, and <ent type='ORG'>Congress</ent>, to see what they were trying to hide and
why. All of this was happening at a time when other events were occurring.
Ellsberg's <ent type='ORG'>Pentagon</ent> Papers had come out about the same time I announced I was
doing my book. Some big stories were broken by investigative journalists. All
of these things together, my book was part of it, did lead ultimately to
congressional investigations of the <ent type='ORG'>CIA</ent>. I spent a lot of time behind the
scenes on the <ent type='ORG'>Hill</ent> with senators and congressman lobbying for these
investigations and they finally did come to pass.</p>
<p>It took awhile. President Ford tried to sweep everything under the rug by
creating the <ent type='ORG'>Rockefeller Commission</ent>, which admitted to a few <ent type='ORG'>CIA</ent> mistakes but
swept everything under the rug. It didn't wash publicly. By this time, the
public didn't buy the government's lying. So we ultimately did have the Pike
Committee, which the <ent type='ORG'>CIA</ent> and <ent type='ORG'>the White House</ent> did manage to sabotage. But the
big one was <ent type='ORG'>the Church Committee</ent> in the <ent type='ORG'>Senate</ent> which conducted a pretty broad
investigation and brought out a lot of information on the <ent type='ORG'>CIA</ent>. The result of
that investigation was that the <ent type='ORG'>CIA</ent> did have to admit to a lot of wrongdoing
and did have to make certain reforms. Not as much as I would have liked. I
think everything has gone back to where it was and maybe even worse than what
it was, but at least there was a temporary halt to the <ent type='ORG'>CIA</ent>'s free reign of
hiding behind secrecy and getting away with everything, up to and including
murder. There were some changes and I think they were all for the better.</p>
<p>FD: So instead of some of the more harsher critics of the <ent type='ORG'>CIA</ent> who would want
to see it abolished you would want to reform it?</p>
<p>Marchetti: Yes. Its one of these things where you can't throw out the baby
with the bathwater. The <ent type='ORG'>CIA</ent> does do some very good and valuable and
worthwhile and legal things. Particularly in the collection of information
throughout the world, and in the analysis of events around the world. All of
this is a legitimate activity, and what the <ent type='ORG'>CIA</ent> was really intended to do in
the beginning when they were set up. My main complaint is that over the years
those legitimate activities have to a great extent been reduced in
importance, and certain clandestine activities, particularly the covert
action, have come to the fore. Covert action is essentially the intervention
in the internal affairs of other governments in order to manipulate events,
using everything from propaganda, disinformation, political action, economic
action, all the way down to the really dirty stuff like para-military
activity. This activity, there was too much of it. It was being done for the
wrong reasons, and it was counterproductive. It was in this area where the
<ent type='ORG'>CIA</ent> was really violating U.S. law and the intent of the U.S. Constitution,
and for that matter, I think, the wishes of <ent type='ORG'>Congress</ent> and the <ent type='NORP'>American</ent> people.
This was the area that needed to be thoroughly investigated and reformed. My
suggestion was that the <ent type='ORG'>CIA</ent> should be split into two organizations. One, the
good <ent type='ORG'>CIA</ent> so to speak, would collect and analyze information. The other part,
in the dirty tricks business, would be very small and very tightly controlled
by <ent type='ORG'>Congress</ent> and <ent type='ORG'>the White House</ent>, and if possible, some kind of a public board
so that it didn't get out of control.</p>
<p>My theory is, and I've proved it over and over again along with other people,
is that the basic reason for secrecy is not to keep the enemy from knowing
what you're doing. He knows what you're doing because he's the target of it,
and he's not stupid. The reason for the <ent type='ORG'>CIA</ent> to hide behind secrecy is to keep
the public, and in particular the <ent type='NORP'>American</ent> public, from knowing what they're
doing. This is done so that the President can deny that we were responsible
for sabotaging some place over in <ent type='GPE'>Lebanon</ent> where a lot of people were killed.
So that the President can deny period. Here is a good example: President
Eisenhower denied we were involved in attempts to overthrow the <ent type='NORP'>Indonesian</ent>
government in 1958 until the <ent type='ORG'>CIA</ent> guys got caught and the <ent type='NORP'>Indonesian</ent>s produced
them. He looked like a fool. So did the N.Y. Times and everybody else who
believed him. That is the real reason for secrecy.</p>
<p>There is a second reason for secrecy. That is that if the public doesn't know
what you are doing you can lie to them because they don't know what the truth
is. This is a very bad part of the <ent type='ORG'>CIA</ent> because this is where you get not only
propaganda on the <ent type='NORP'>American</ent> people but actually disinformation, which is to
say lies and falsehoods, peddled to the <ent type='NORP'>American</ent> public as the truth and
which they accept as gospel. That's wrong. It's not only wrong, its a lie and
it allows the government and those certain elements of the government that
can hide behind secrecy to get away with things that nobody knows about. If
you carefully analyze all of these issues that keep coming up in <ent type='ORG'>Congress</ent>
over the <ent type='ORG'>CIA</ent>, this is always what is at the heart of it: That the <ent type='ORG'>CIA</ent> lied
about it, or that the <ent type='ORG'>CIA</ent> misrepresented something, or <ent type='ORG'>the White House</ent> did
it, because the <ent type='ORG'>CIA</ent> and <ent type='ORG'>the White House</ent> work hand in glove. The <ent type='ORG'>CIA</ent> is not a
power unto itself. It is an instrument of power. A tool. A very powerful tool
which has an influence on whoever is manipulating it. But basically the <ent type='ORG'>CIA</ent>
is controlled by <ent type='ORG'>the White House</ent>, the inner circle of government, the inner
circle of the establishment in general. The <ent type='ORG'>CIA</ent> is doing what these people
want done so these people are appreciative and protective of them, and they
in turn make suggestions or even go off on their own sometimes and operate
deep cover for the <ent type='ORG'>CIA</ent>. So it develops into a self-feeding circle.</p>
<p>FD: Spreading disinformation is done through the newsmedia.</p>
<p>Marchetti: Yes. Its done through the newsmedia. The fallacy is that the <ent type='ORG'>CIA</ent>
says the real reason they do this is to con the <ent type='NORP'>Soviet</ent>s. Now I'll give you
some examples. One was a fellow by the name of Colonel Oleg Penkovsky.</p>
<p>FD: Penkovsky Papers?</p>
<p>Marchetti: Yes. I wrote about that in `The <ent type='ORG'>CIA</ent> and <ent type='ORG'>the Cult</ent> of Intelligence.
The Penkovsky Papers was a phony story. We wrote the book in the <ent type='ORG'>CIA</ent>. Now,
who in the hell are we kidding? The <ent type='NORP'>Soviet</ent>s? Do we think for one minute that
the <ent type='NORP'>Soviet</ent>s, who among other things captured Penkovsky, interrogated him, and
executed him, do you think for one minute they believe he kept a diary like
that? How could he have possibly have done it under the circumstances? The
whole thing is ludicrous. So we're not fooling the <ent type='NORP'>Soviet</ent>s. What we're doing
is fooling the <ent type='NORP'>American</ent> people and pumping up the <ent type='ORG'>CIA</ent>. The <ent type='NORP'>British</ent> are
notorious for this kind of thing. They're always putting out phony
autobiographies and biographies on their spies and their activities which are
just outright lies. They're done really to maintain the myth of <ent type='NORP'>English</ent>
secret intelligence so that they will continue to get money to continue to
operate. Thats the real reason. The ostensible reason is that we were trying
to confuse the <ent type='NORP'>Soviet</ent>s. Well that's bullshit because they're not confused.</p>
<p>One of the ones I think is really great is `Khruschev Remembers.' If anybody
in his right mind believes that Nikita Khruschev sat down, and dictated his
memoirs, and somebody -- Strobe Talbot sneaked out of the <ent type='NORP'>Soviet</ent> Union with
them they're crazy. That story is a lie. That book was a joint operation
between the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>KGB</ent>. Both of them were doing it for the exact same
reasons. They both wanted to influence their own publics. We did it our way
by pretending that Khruschev had done all of this stuff and we had lucked out
and somehow gotten a book out of it. The <ent type='NORP'>Soviet</ent>s did it because they could
not in their system allow Khruschev to write his memoirs. Thats just against
everything that the <ent type='NORP'>Communist</ent> system stands for. But they did need him to
speak out on certain issues. <ent type='ORG'>Brezhnev</ent> particularly needed him to
short-circuit some of the initiatives of the right wing, the <ent type='NORP'>Stalinist</ent> wing
of the party. Of course the <ent type='ORG'>KGB</ent> was not going to allow the book to be
published in the <ent type='NORP'>Soviet</ent> Union. The stuff got out so that it could be
published by the <ent type='NORP'>American</ent>s. That doesn't mean that the <ent type='ORG'>KGB</ent> didn't let copies
slip into the <ent type='NORP'>Soviet</ent> Union and let it go all around. The <ent type='NORP'>Soviet</ent>s achieved
their purpose too.</p>
<p>This is one of the most fantastic cases, I think, in intelligence history.
Two rival governments cooperated with each other on a secret operation to
dupe their respective publics. I always wanted to go into much greater length
on this but I just never got around to it. Suffice it to say that <ent type='ORG'>TIME</ent>
magazine threatened to cancel a two-page magazine article they were doing on
me and my book if I didn't cut a brief mention of this episode out of the
book.</p>
<p>FD: How was this operation initially set up?</p>
<p>Marchetti: I don't know all of the ins and outs of it. I imagine what
happened is that it probably started with somebody in the <ent type='NORP'>Soviet</ent> <ent type='ORG'>Politburo</ent>
going to Khruschev and saying, ``Hey, behind the scenes we're having lots of
trouble with the right-wing <ent type='NORP'>Stalinist</ent> types. They're giving <ent type='GPE'>Brehznev</ent> a bad
time and they're trying to undercut all of the changes you made and all of
the changes <ent type='GPE'>Brehznev</ent> has made and wants to make. Its pretty hard to deal with
it so we've got an idea. Since you're retired and living here in your dacha
why don't you just sit back and dictate your memoirs. And of course the <ent type='ORG'>KGB</ent>
will review them and make sure you don't say anything you shouldn't say and
so on and so forth. Then we will get in touch with our counterparts, and see
to it that this information gets out to the West, which will publish it, and
then it will get back to the <ent type='NORP'>Soviet</ent> Union in a variety of forms. It will get
back in summaries broadcast by <ent type='ORG'>the Voice</ent> of <ent type='GPE'>America</ent> and <ent type='ORG'>Radio Liberty</ent>, and
copies of the book will come back in, articles written about it will be
smuggled in, and this in turn will be a big influence on the intelligentsia
and the party leaders and it will undercut Suslov and the right wingers.''
Khruschev said okay. The <ent type='ORG'>KGB</ent> then went to the <ent type='ORG'>CIA</ent> and explained things to
them and the <ent type='ORG'>CIA</ent> said, Well that sounds good, we'll get some friends of ours
here, the <ent type='ORG'>TIME</ent> magazine bureau in <ent type='GPE'>Moscow</ent>, Jerry Schecter would later have a
job in <ent type='ORG'>the White House</ent> as a press officer. We'll get people like Strobe
Talbot, who is working at the bureau there, we'll get these guys to act as
the go-betweens. They'll come and see you for the memoirs and everyone will
play dumb. You give them two suitcases full of tapes (laughs) or something
like that and let them get out of the <ent type='NORP'>Soviet</ent> Union. Which is exactly what
happened.</p>
<p>Strobe brought all of this stuff back to <ent type='GPE'>Washington</ent> and then <ent type='ORG'>TIME</ent>-LIFE began
to process it and put a book together. They wouldn't let anybody hear the
tapes, they didn't show anybody anything. A lot of people were very
suspicious. You know you can tell this to the public or anybody else who
doesn't have the least brains in their head about how the <ent type='NORP'>Soviet</ent> Union
operates and get away with it. But anybody who knows the least bit about the
<ent type='NORP'>Soviet</ent> Union knows the whole thing is impossible. A former <ent type='NORP'>Soviet</ent> premier
cannot sit in his dacha and make these tapes and then give them to a U.S.
newspaperman and let him walk out of the country with them. That cannot be
done in a closed society, a police state, like the <ent type='NORP'>Soviet</ent> Union.</p>
<p>The book was eventually published but before it was published there was
another little interesting affair. Strobe Talbot went to <ent type='GPE'>Helsinki</ent> with the
manuscript, where he was met by the <ent type='ORG'>KGB</ent> who took it back to <ent type='GPE'>Leningrad</ent>, looked
at it, and then it was finally published by <ent type='ORG'>TIME</ent>-LIFE. None of that has ever
been explained in my book. A couple of other journalists have made references
to this episode but never went into it. It's an open secret in the press
corps here in <ent type='GPE'>Washington</ent> and <ent type='GPE'>New York</ent>, but nobody ever wrote a real big story
for a lot of reasons, because I guess it's just the kind of story that it's
difficult for them to get their hooks into. I knew people who were then in
<ent type='ORG'>the White House</ent> and <ent type='ORG'>State Department</ent> who were very suspicious of it because
they thought the <ent type='ORG'>KGB</ent>...</p>
<p>FD: Had duped <ent type='ORG'>TIME</ent>?</p>
<p>Marchetti: Exactly. Once they learned this was a deal they quieted down and
ceased their objections and complaints, and even alibied and lied afterwards
as part of the bigger game. Victor Lewis, who was apparently instrumental in
all of these negotiations, later fit into one little footnote to this story
that I've often wondered about. Lewis is (was)... After all of this happened
and when the little furor that existed here in official <ent type='GPE'>Washington</ent> began
dying down, Victor Lewis went to <ent type='GPE'>Tel Aviv</ent> for medical treatment. He came into
the country very quietly but somebody spotted him and grabbed him and said,
``What are you doing here in <ent type='GPE'>Israel</ent>?'' ``Well I'm here for medical treatment,
'' Lewis said. They said, ``What?! You're here in <ent type='GPE'>Israel</ent> for medical
treatment?'' He said, ``Yes.'' They said, ``Well whats the problem?'' ``I've
got lumbago, a back problem, and they can't fix it in the <ent type='NORP'>Soviet</ent> Union. but
there's a great <ent type='NORP'>Jewish</ent> doctor here I knew in the <ent type='NORP'>Soviet</ent> Union and I came to
see him.'' That sounds like the craziest story you ever wanted to hear. But
then another individual appeared in <ent type='GPE'>Israel</ent> at the same time and some reporter
spotted him. He happened to be Richard Helms, then-director of the <ent type='ORG'>CIA</ent>. He
asked Helms what he was doing in <ent type='GPE'>Israel</ent>, and he had some kind of a lame
excuse which started people wondering whether this was the payoff. Helms
acting for the <ent type='ORG'>CIA</ent>, <ent type='ORG'>TIME</ent>-LIFE, and the U.S. government, and Lewis acting for
the <ent type='ORG'>KGB</ent>, <ent type='ORG'>Politburo</ent>, and the <ent type='NORP'>Soviet</ent> government. Its really a fascinating
story. I wrote about briefly in the book and it was very short. You'll find
it if you look through the book in the section we're talking about.
Publications and things like that. When I wrote those few paragraphs there
wasn't much further I could go, because there was a lot of speculation and
analysis.</p>
<p>Around the time my book came out, <ent type='ORG'>TIME</ent> magazine decided that they would do a
two-page spread in their news section and give it a boost. Suddenly I started
getting calls from Jerry Schecter and Strobe Talbot about cutting that part
out. I said I would not cut it out unless they could look me in the eye and
say I was wrong. If it wasn't true I would take the book and cut the material
out. But neither of them chose to do that. Right before the article appeared
in <ent type='ORG'>TIME</ent> I got a call from one of the editors telling me that some people
wanted to kill the article. I asked why and he said one of the reasons is
what you had to say about <ent type='ORG'>TIME</ent> magazine being involved in the Khruschev
Remembers book. I asked him, ``Thats it?'' I had talked to Jerry and Strobe
and this was their backstab. This editor asked me if I could find somebody
who could trump the people who were trying to have the article killed.
Somebody who could verify my credentials in telling the story. I said why
don't you call Richard Helms, who by that time had been eased out of office
by Kissinger and Nixon, and was now an ambassador in <ent type='GPE'>Teheran</ent>. So this editor
called Helms to verify my credentials (laughing) and Helms said, ``Yeah, he's
a good guy. He just got pissed off and wanted to change the <ent type='ORG'>CIA</ent>.'' So the
article ran in <ent type='ORG'>TIME</ent>. I think you're one of the very few people I've explained
this story to in depth.</p>
<p>FD: Did this operation have a name?</p>
<p>Marchetti: It probably did but I was already out of the agency and I don't
know what it was. But I do know it was a very sensitive activity and that
people very high up in <ent type='ORG'>the White House</ent> and <ent type='ORG'>State Department</ent> who you would
have thought would have been aware of it were not aware of it. But then
subsequently they were clearly taken into a room and talked to in discussions
and were no longer critics and doubters and in fact became defenders of it.</p>
<p>FD: Let me make sure I am clear about the <ent type='ORG'>CIA</ent>'s motivation...</p>
<p>Marchetti: The <ent type='ORG'>CIA</ent>'s motivation was that here we have a former <ent type='NORP'>Soviet</ent> premier
talking out about the events of his career and revealing some pretty
interesting things about his thinking and the thinking of others. All of
which shows that the <ent type='NORP'>Soviet</ent> Union is run by a very small little clique. A
very small <ent type='NORP'>Byzantine</ent>-like clique. There is a strong tendency to stick with
<ent type='NORP'>Stalinisn</ent> and turn to <ent type='NORP'>Stalinism</ent> but some of the cooler heads, the more
moderate types, are trying to make changes. Its good stuff from the <ent type='ORG'>CIA</ent>'s
point of view and from the U.S. government's point of view. This is what
we're dealing with. This is our primary rival. Look at how they are. And
Khruschev had to dictate these things in secrecy and they had to be smuggled
out of the <ent type='NORP'>Soviet</ent> Union.</p>
<p>Things like this are very subtle in their consistency. It's not a black and
white thing on the surface. You might say, ``Well, what's wrong with that?''
What's wrong with that is that it is a lie. The truth would have been much
more effective. Nikita Khruschev was approached by the <ent type='ORG'>KGB</ent> and <ent type='NORP'>Soviet</ent>
<ent type='ORG'>Politburo</ent> to dictate his memoirs, which he did under their supervision, which
means we don't know if he is telling the whole story or the complete truth
because they had an opportunity to edit it. The <ent type='NORP'>Russians</ent> were so anxious to
get this information out so that it could come back to the <ent type='NORP'>Soviet</ent> Union for
two reasons. The first was to build international pressure. The second was to
build up internal pressure against the <ent type='NORP'>Stalinist</ent>s. They were so anxious that
they were willing to make a deal with the <ent type='ORG'>CIA</ent>, and give us this material. So
that we could then prepare a book. Which we did. Thats the kind of a
government we are dealing with here. These are the kinds of people they are
and the kind of lies they live.</p>
<p>FD: Let's turn to world affairs for a moment. One of the events of recent
years that has always puzzled me is <ent type='GPE'>United States</ent> support for the Vanaaka
Party in what was once the <ent type='LOC'>New Hebrides</ent> Islands. In the late '70s, before the
<ent type='LOC'>New Hebrides</ent> achieved independence, there were basically two factions
fighting between themselves to see who would maintain control when the
colonial powers left. The <ent type='NORP'>British</ent> and the <ent type='NORP'>French</ent> had governed the New
Hebrides under a concept known as the condominium, and before independence,
the <ent type='NORP'>British</ent> and the labor movement in <ent type='GPE'>Australia</ent> threw their support behind
the ubiquitous socialist faction, in this case, <ent type='ORG'>the Vanaaka Party</ent>. The <ent type='NORP'>French</ent>
offered some behind-the-scenes support to the second faction, which was
basically pro-free market and pro-West. The U.S. under Jimmy Carter went
along with the <ent type='NORP'>British</ent>. Do you have any idea why this might have been done?</p>
<p>Marchetti: Offhand, I don't. The <ent type='ORG'>CIA</ent> has learned over the years that you
sometimes cannot support the people you would prefer to support, because they
just do not have the popular power to gain control or maintain control
without a revolution and things of that sort. The classic example is West
<ent type='GPE'>Berlin</ent>. Back in the '50s we were contesting with the <ent type='NORP'>Russians</ent> for influence
in <ent type='GPE'>Berlin</ent>. This was at a time when the <ent type='NORP'>Russians</ent> and <ent type='NORP'>East Germans</ent> were putting
tremendous pressure on to have <ent type='GPE'>West Berlin</ent> go almost voluntarily into the
<ent type='NORP'>Soviet</ent> bloc. The <ent type='GPE'>United States</ent> was struggling mightily to keep <ent type='GPE'>West Berlin</ent>
free. At that point in time the strong power in West <ent type='GPE'>Germany</ent> were the
<ent type='NORP'><ent type='NORP'>Christian</ent> <ent type='NORP'>Democrats</ent></ent> under Konrad Adenauer, and these were the people that we
were supporting.</p>
<p>The <ent type='NORP'><ent type='NORP'>Christian</ent> <ent type='NORP'>Democrats</ent></ent>, however, just did not have the wherewithal to save
<ent type='GPE'>West Berlin</ent>. The situation was such that the Social <ent type='NORP'>Democrats</ent> were the ones
who could save <ent type='GPE'>West Berlin</ent>. Not getting into all of the whys and wherefores
and policy positions, the Social <ent type='NORP'>Democrats</ent> also had a very charismatic person
named Willy Brandt. So by backing Willy Brandt and the Social <ent type='NORP'>Democrats</ent>,
instead of putting all of our eggs in the <ent type='NORP'>Christian</ent> Democratic Party basket,
Brandt and the Social <ent type='NORP'>Democrats</ent> were able to maintain a free <ent type='GPE'>West Berlin</ent> and
we were able to achieve our goal. There were some people in the <ent type='ORG'>CIA</ent> who
thought this was terrible, we were not being ideologically pure, and one of
them happens to be E. Howard Hunt, who actually considered Willy Brandt a <ent type='ORG'>KGB</ent>
spy. So there are times when you have to, I guess you would call it, choose
the lesser of two evils.</p>
<p>It might have been a miscalculated gamble. I don't have all of the facts, but
maybe the thinking was that if we left the pro-West faction in power we may
end up with a goddamned civil war.</p>
<p>FD: In retrospect, the Carter administration's decision seems even more
tragic and mistaken. Since coming to power <ent type='ORG'>the Vanaaka Party</ent> has consolidated
power in the new country, now known as <ent type='GPE'>Vanuatu</ent>, and established diplomatic
relations with governments like <ent type='GPE'>Cuba</ent> and <ent type='GPE'>Vietnam</ent>. Socialist <ent type='GPE'>Vanuatu</ent> has now
come to serve as a beacon of sorts for other independence movements in that
part of the world, such as the <ent type='GPE'>Kanaks</ent> in <ent type='GPE'>New Caledonia</ent>, who have subsequently
adopted socialism as their ideology. When I asked Jimmy Carter about this
during an interview recently he said he was sorry, but he did not remember
the episode. Is it possible that this may have been an incompetent blunder on
the part of the U.S. government? That somebody didn't do their homework, and
as a result those responsible for the decision didn't have all of the facts?</p>
<p>Marchetti: Absolutely. Absolutely. Yes. Its not the kind of an issue that
draws the most attention in <ent type='GPE'>Washington</ent>. As you just pointed out, Jimmy Carter
doesn't even remember it. I'm sure that decision was made pretty far down the
line. If Carter ever had to make a decision he probably doesn't even remember
it because it was probably staffed down because it was considered so
inconsequential at the time by Carter and everyone involved. They considered
it so inconsequential that they don't even remember it. It's something they
signed off on. My guess from what you have told me is that it was a mistake.</p>
<p>FD: You mentioned E. Howard Hunt earlier. I understand that you wrote an
article for a <ent type='GPE'>Washington</ent>-based publication about the assassination of John F.
Kennedy and Hunt sued the publication, charging libel. Could you give us some
background on this matter?</p>
<p>Marchetti: The article was written in the summer of 1978 and published by
SPOTLIGHT, a weekly newspaper that advertises itself as `The Voice of the
<ent type='NORP'>American</ent> Populist Party.' At the time I wrote the article for SPOTLIGHT the
House Select Committee on Assassinations was getting ready to hold its
hearings reviewing the Kennedy and King assassinations. I had picked up some
information around town that a memo had recently been uncovered in the <ent type='ORG'>CIA</ent>,
and that the <ent type='ORG'>CIA</ent> was concerned about it. I believe the memo was from James
Angleton, who at the time was chief of counterintelligence for Richard Helms.
I forget the exact date, but this memo was something like six years old,
while Helms was still in office as director.</p>
<p>The memo said that at some point in time the <ent type='ORG'>CIA</ent> was going to have to deal
with the fact that Hunt was in <ent type='GPE'>Dallas</ent> the day of the Kennedy assassination or
words to that effect. There was some other information in it, such as did you
know anything about it, he wasn't doing anything for me, and back and forth.
I had that piece of information, along with information that the House Select
Committee was going to come out with tapes that indicated there was more than
one shooter during the Kennedy assassination and that the <ent type='ORG'>FBI</ent>, or at least
certain people in the <ent type='ORG'>FBI</ent>, believed these tapes to be accurate and had always
believed that there was more than one shooter.</p>
<p>I was in contact with <ent type='ORG'>the House Select Committee</ent>, and they were probing real
deeply into things and they were very suspicious of the Kennedy
assassination. There were some other reporters working on the story at the
time, one in particular who has a tremendous reputation, and he felt there
was something to it. So we rushed into print at SPOTLIGHT with a story
saying, based on everything we put together, that we had this information,
and we tried to predict what was going to happen. In essence we said whats
going to happen is that the committee is going to unearth some new
information that there was more than one shooter and probably come up with
this memo, this internal <ent type='ORG'>CIA</ent> memorandum, and there will be some other things.
Then the <ent type='ORG'>CIA</ent> will conduct a limited hangout, and will admit to some error or
mistake, but then sweep everything else under the rug, and in the process
they may let a few people dangle in the wind like E. Howard Hunt, Frank
Sturgis, Jerry Hemming, and other people who have been mentioned in the past
as being involved in something related to the Kennedy assassination. It was
that kind of speculative piece.</p>
<p>What happened is that about a week after my article appeared in SPOTLIGHT the
Wilmington News-Journal published an article by Joe Trento. This was a longer
and more far-ranging article, in which he discussed the memo too but in
greater detail. A couple of weeks after that Hunt informed SPOTLIGHT that he
wanted a retraction. I checked with my sources and said I don't think we
should retract. I said we should do a follow-up article. Now by this time
some <ent type='ORG'>CIA</ent> guy was caught stealing pictures in the committee, some spy, so
things were really hot and heavy at the time. There was a lot of expectation
that the committee was going to do something, some really good work to bring
their investigation around. So I said to SPOTLIGHT let's do a follow-up
piece, but the publisher chickened out and said, nah, what we'll do is tell
Hunt we'll give him equal space. He can say whatever he wants to in the same
amount of space.</p>
<p>Hunt ignored the offer. A couple of months later Hunt comes to town for
secret hearings with the committee, and was heard in executive session. Hunt
was suing the publisher of the book `Coup D'Etat in <ent type='GPE'>America</ent>,' and deposed me
in relation to that case, and then he brought in, he tried to slip in, this
SPOTLIGHT article. I was under instructions from my lawyer not to comment. My
lawyer would have me refuse to answer on the grounds of journalistic
privilege, and also on the grounds of my relationship with the <ent type='ORG'>CIA</ent>. My lawyer
had on his own gone to the <ent type='ORG'>CIA</ent> before I gave my deposition and asked them
about this, and they said to tell me to just hide behind my injunction. I
told my lawyer I don't understand it, and he told me all that the <ent type='ORG'>CIA</ent> said is
that they hate Hunt more than they hate you and they're not going to give
Hunt any help. So that's what I did, and that was the end of it. We thought.</p>
<p>Two years after it ran Hunt finally sued SPOTLIGHT over my article. SPOTLIGHT
thought it was such a joke, all things considered, that they really didn't
pay any attention. I never even went to the trial. I never even submitted an
affidavit. I was not deposed or anything. The Hunt people didn't even try to
call me as a witness or anything. I was left out of everything. Hunt ended up
winning a judgment for $650000. Now SPOTLIGHT got worried. They appealed and
<ent type='ORG'>the Florida Appellate Court</ent> overturned the decision on certain technical
grounds, and sent it back for retrial. The retrial finally occurred earlier
this year. When it came time for the retrial, which we had close to a year to
prepare for, SPOTLIGHT got serious, and went out and hired themselves a good
lawyer, Mark Lane, who is something of an expert on the Kennedy
assassination. They got me to become involved in everything, and we ended up
going down there and just beating Hunt's pants off. The jury came in, I
think, within several hours with a verdict in our favor. The interesting
thing was the jury said we were clearly not guilty of libel and actual
malice, but they were now suspicious of Hunt and everything he invoked
because we brought out a lot of stuff on Hunt.</p>
<p>Hunt lost, and was ordered to pay our court costs in addition to everything
else. He has subsequently filed an appeal and that's where its at now. It's
up for appeal. I imagine it will probably be another six months to a year
before we hear anything further on it. Based on everything I have seen, Hunt
doesn't have a leg to stand on because the deeper he gets into this the more
he runs the risk of exposing himself. We had just all kinds of material on
Hunt. We had a deposition from Joe Trento saying, yes, he saw the internal
<ent type='ORG'>CIA</ent> memo. We produced one witness in deposition, Marita Lorenz, who was
Castro's lover at one point, and she said that Hunt was taking her and people
like Sturgis and Jerry Hemmings and others and running guns into <ent type='GPE'>Dallas</ent>.
Lorenz said that a couple of days before the assassination Hunt met them in
<ent type='GPE'>Dallas</ent> and made a payoff. What they all were doing, whether it was connected
to the assassination, we don't know.</p>
<p>I think if Hunt keeps pursuing this, all that he's doing is setting the stage
for more and more people to come forward and say bad things about him, and
raise more evidence that he was in <ent type='GPE'>Dallas</ent> that day and that he must have been
involved in something. If it wasn't the assassination it must have been some
kind of diversionary activity or maybe it was something unrelated to the
assassination and the wires just got crossed and it was a coincidence at the
time.</p>
<p>One of the key points in the mind of the jury as far as we`ve been able to
tell at SPOTLIGHT is that Hunt to this day still cannot come up with an alibi
for where he was the day of the assassination. Hunt comes up with the
weakest, phoniest stories that he can't corroborate. Some guy who was drunk
came out of a bar and waved at him. His story doesn't match with that guy's
story. Hunt says he can produce his children to testify he was in <ent type='GPE'>Washington</ent>.
None of his children appeared at the trial. It's a very, very strange thing.
Hunt clearly was, in my mind, not in <ent type='GPE'>Washington</ent> doing what he says he was
doing Nov. 22, 1963. He was certainly not at work that day at the <ent type='ORG'>CIA</ent>. This
subject has come up before, whether he was on sick leave, an annual leave, or
where the hell he was. Hunt just cannot come up with a good alibi.</p>
<p>Hunt has gone before committees. <ent type='ORG'>The Rockefeller Committee</ent>, I believe he was
before <ent type='ORG'>the Church Committee</ent>, and before <ent type='ORG'>the House Select Committee</ent>. Nobody
will give Hunt a clean bill of health. They always weasel words. Their
comment on Hunt is always some sort of a way that can be interpreted anyway
that you want. You can say this indicates the committee looked into it and
they feel he wasn't involved. Or you can look at it and say the committee
looked into it and they have a lot of doubts about Hunt, and they're just
being very careful about what they are saying. Hunt himself will not tell you
what happened before these committees. He says that his testimony is
classified information. Well, if the testimony vindicates Hunt and provides
him with an alibi then why can't he tell us? The mystery remains.</p>
<p>FD: Do you believe it possible that the <ent type='ORG'>CIA</ent> knows where Hunt was Nov. 22,
1963, but just do not want to release that information?</p>
<p>Marchetti: That's my guess. I think that subsequently, by now, the <ent type='ORG'>CIA</ent> may
not have known where Hunt was at the time, and they may not have even
realized what he was up to until years after and years later when his name
started to be commonly mentioned in connection with the assassination. I
think by now the <ent type='ORG'>CIA</ent> probably knows where Hunt was and what he was doing or
have some very strong feelings about that, and they're not too happy about
it. But whatever it was, and is, that Hunt was involved in, it seems to be,
or would appear, that he was in or around <ent type='GPE'>Dallas</ent> about the time of the
assassination, involved in some kind of clandestine activity. It may have
been an illegal clandestine activity, even something the <ent type='ORG'>CIA</ent> was unaware of.
The <ent type='ORG'>CIA</ent> acts very strangely about this. The <ent type='ORG'>CIA</ent> will not give Hunt any help.
He got no help at all from the <ent type='ORG'>CIA</ent> in the preparation of his case against us
or in the presentation of his case. They just left him out there. Hunt
managed to scrounge up a couple of his <ent type='ORG'>CIA</ent> friends who on their own were
willing to give some help, but caved in right away. One guy didn't testify.
Another guy gave a stupid deposition in the middle of the night to us
(laughs) which wasn't worth the paper it was written on.</p>
<p>Helms gave a deposition which said nothing. No way would he go out on a limb
for Hunt. In my own mind, I have a feeling that the <ent type='ORG'>CIA</ent> knows where Hunt was
and what he was doing, and while they're not going to prosecute him for a lot
of reasons, they're involved in the cover-up themselves and don't want to
bring any embarrassment upon the agency. On the other hand, they feel if he
screws around and gets his own mit in the ringer, that's his own fault, and
we can cover our ass. Hunt, for his own part, apparently feels he has some
sort of pressure on the <ent type='ORG'>CIA</ent> that while it might not be strong enough to bring
them forward to defend him before any committee or in a court of law, its at
least strong enough for them not to take any overt action against him. So it
seems to me to be some kind of double graymail. Hunt's graymailing the <ent type='ORG'>CIA</ent> on
one hand and they're graymailing him on the other hand. Its a very, very
strange thing.</p>
<p>FD: Did Jerry Hemmings give a deposition? I understand he is still in prison.</p>
<p>Marchetti: I think Jerry might still be in. He asked not to give a deposition
or be called as a witness unless it was absolutely necessary, because he was
either coming toward the end of his term, or he was up for parole. He
preferred not to get involved. This was pretty much the attitude of another
individual who was mentioned, but I was left with the feeling that if push
really came to shove, these people could be brought forward. Now what they
know, or whether they were going to risk perjury, which is a pretty big
gamble when you`re dealing with Mark Lane, particularly on this subject. He's
not only a brilliant lawyer, but this is a subject he has a lot of background
in.</p>
<p>FD: Did Gordon Novel fit into this at all?</p>
<p>Marchetti: No.</p>
<p>FD: You mentioned that it is possible the <ent type='ORG'>CIA</ent> is withholding information on
Hunt's whereabouts Nov. 22, 1963. The <ent type='ORG'>CIA</ent> has been accused many times in the
past of engaging in a cover-up of the JFK assassination. Do you believe they
are still covering up in a lot of ways?</p>
<p>Marchetti: Oh yeah, I think so, I'd think not only they and the <ent type='ORG'>FBI</ent>, I think
everybody is covering up.</p>
<p>FD: Are they covering up necessarily to just keep the <ent type='NORP'>American</ent> people in the
dark about the episode, or cover-up because of their own guilt and complicity?</p>
<p>Marchetti: I think its both. I think it all started with when it happened. I
don't think anybody was really sure in <ent type='GPE'>Washington</ent> who was behind the
assassination. I think they were very fearful that if they didn't come up
with a lone nut theory, and in this case a lone nut who was removed from the
scene in a matter of days, that the <ent type='NORP'>American</ent> people might panic. They might
lose their faith in the government. They might lose their faith in the
institutions. They might begin to point fingers at all kinds of people. The
<ent type='NORP'>Russians</ent>. The <ent type='GPE'>Cuba</ent>ns. Other elements of our society like the right wing and
organized crime and so on. I think there was a consensus in the minds of the
<ent type='NORP'>establishmentarians</ent> in our government which was that we should put this to
bed as quickly and as quietly as possible. We'll make a hero out of Kennedy
and let's forget about it. And then of course they did have to have a Warren
Commission, a blue-ribbon panel which would have the right people on it and
then we'll lay the thing to rest officially. Which is essentially what
happened. They didn't hear a lot of evidence. They ignored evidence. Evidence
was hidden. Evidence was destroyed. I think it was pretty much clear that
nobody was being absolutely forthcoming.</p>
<p>The former head of the <ent type='ORG'>CIA</ent>, Allen <ent type='GPE'>Dulles</ent>, even said he would lie to the
people about anything he considered to pertain to national security. <ent type='GPE'>Dulles</ent>
said he would lie to the people if he had to. I think the Kennedy
assassination was laid to rest by the establishment and it became just a
suspicion in the minds of the people. Then came the revelations. I think by
now everybody involved was deeply involved in the coverup, that that maybe
became even more paramount than the question of who did kill Kennedy and why.
To admit that we covered up from the very begining, and that we've been
covering up ever since, I think, would be more devastating than it would have
been a few years ago to say O.K., we've looked into it, and figured it out,
it was <ent type='ORG'>CIA</ent> renegades, or whoever was responsible for murdering Kennedy. I
think by now there are just too many people that feel they may have started
out originally for the most noble of motives but they cannot adjust to it. We
saw it with the Watergate affair, and see it every day in life. Once somebody
starts lying and covering up it just snowballs. It just keeps going on and on
and on and on. It keeps getting harder and harder and harder to determine the
truth. I think it's pretty difficult for somebody in 1985 to come forward and
say, yes, I was part of a cover-up, 22 years ago. What he's saying is that
I've lived a lie all of my life. I don't think we're ever going to get the
answer, frankly. I don't think we're every going to get the answer to the
story.</p>
<p>FD: You're pessimistic about the <ent type='NORP'>American</ent> people discovering the real truth
about the JFK assassination?</p>
<p>Marchetti: This is not to say that 50 years from now that some historian may
get access to some material when everybody is dead and buried, and might be
able to put together a pretty accurate story. But even then, with all of the
time that has gone by, the myth will have been established. You have those
people that will say, ``Ugh. Conspiracy theorists,'' while other people will
say, ``I never believe the government.'' But it will have no effect.</p>
<p>FD: So you believe it will only be time that will reveal the full truth about
the JFK assassination? The truth won't be revealed because of another big
government scandal like Watergate, or a president who is committed to seeing
that the case is solved?</p>
<p>Marchetti: One of the presidents who might have unearthed all this, actually
a potential president was Bobby Kennedy, but he got rubbed out.</p>
<p>FD: Bobby Kennedy made a statement three days before he was murdered that he
felt only the office of the presidency could get at the truth.</p>
<p>Marchetti: I'm not sure if thats possible. I wonder in my own mind if, let's
say, Teddy Kennedy would be elected president. I wonder if he, one, would
have the courage to reopen the case at this point in time knowing everything
he knows about it probably. And two, if he had the courage, would he have the
muscle to be able to resolve it completely and fully to the satisfaction of
everyone? I think there are those things in life you either resolve at the
time or never. After awhile, as the years pass by, it becomes more and more
difficult until it is impossible.</p>
<p>FD: The <ent type='NORP'>American</ent> people are told that they choose their leaders and run the
government. Is this true, or is it the invisible state within a state, the
intelligence community?</p>
<p>Marchetti: I don't think the intelligence community, although it is an
invisible arm of the government, runs it. I think the people who run the
country are the same people who usually run things not only here but all over
the world. The powerful economic interests, whether they are bankers, or
industrialists, or whatever. The real solid inner core of the establishment.
These are the movers and shakers, but they don't have absolute power. They
may not want a certain person to get nominated by a certain party. In some
cases they may not even be able to stop them from getting to power or using
it. Generally speaking, they have more influence on the government than the
other people do. Its manifested itself in all sorts of ways. There are all of
these forces at work.</p>
<p>FD: One last question: <ent type='ORG'>PSI</ent>. Both the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>KGB</ent> had a great interest in
this area. One of the things I know the <ent type='ORG'>CIA</ent> did, attempt to recruit <ent type='ORG'>KGB</ent>
agents in the afterlife. Are you familiar with this?</p>
<p>Marchetti: I do know there was great interest in this whole area of
parapsychology, for whatever benefit may have been achieved. Not only the
<ent type='ORG'>CIA</ent>, but the <ent type='ORG'>Pentagon</ent> was involved, and for that matter, the <ent type='ORG'>KGB</ent>. Everybody
has apparently examined it. There were a lot of stories floating around the
<ent type='ORG'>CIA</ent> that they had tried to contact old agents like Penkovsky, who had been
captured and killed, executed by the <ent type='NORP'>Soviet</ent> Union, in the hope that they
could derive additional information. To my knowledge none of this stuff
really worked.</p>
<p>FD: Thank you, Victor Marchetti.
could derive additional information. To my knowledge none of this stuff
really worked.</p>
<p>FD: Tha</p></xml>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,887 @@
<xml><p>SEE NOTES AT END FOR INFO ON SOURCES OF THESE DOCUMENTS</p>
<p> CENTRAL INTELLIGENCE AGENCY
<ent type='GPE'>WASHINGTON</ent> 25, D. C.</p>
<p> OFFICE OF THE DIRECTOR 25 APR 1956
-------------------------------------------------------------------------------</p>
<p> MEMORANDUM FOR: The Honorable J. Edgar Hoover
Director, <ent type='ORG'>Federal Bureau</ent> of Investigation</p>
<p> SUBJECT : Brainwashing</p>
<p> The attached study on brainwashing was prepared by my
staff in response to the increasing acute interest in the
subject throughout the intelligence and security components
of the <ent type='ORG'>Government</ent>. I feel you will find it well worth your
personal attention. It represents the thinking of leading psy-
<ent type='ORG'>chologists</ent>, psychiatrists and intelligence specialists, based
in turn on interviews with many <ent type='ORG'>individ</ent>uals who have had
personal experience with <ent type='NORP'>Communist</ent> brainwashing, and on
extensive research and testing. While <ent type='ORG'>individ</ent>uals specialists
hold divergent views on various aspects of this most complex
subject, I believe the study reflects a synthesis of majority
expert opinion. I will, of course, appreciate any comments
on it that you or your staff may have.</p>
<p> (signed)
Allen W. Dulles
Director</p>
<p> ENCLOSURE</p>
<p> OA 53-37
-------------------------------------------------------------------------------</p>
<p> A REPORT ON <ent type='ORG'>COMMUNIST</ent> BRAINWASHING</p>
<p> The report that follows is a condensation of a study by train-
ing experts of the important classified and unclassified information
available on this subject.</p>
<p>BACKGROUND</p>
<p> Brainwashing, as a technique, has been used for centuries and
is no mystery to psy<ent type='ORG'>chologists</ent>. In this sense, brainwashing means
involuntary re-education of basic beliefs and values. All people
are being re-educated continually. New information changes one's
beliefs. Everyone has experienced to some degree the conflict that
ensues when new information is not consistent with prior belief.
The experience of the brainwashed <ent type='ORG'>individ</ent>ual differs in that the in-
consistent information is forced upon the <ent type='ORG'>individ</ent>ual under controlled
conditions after the possibility of critical judgment has been re-
moved by a variety of methods.</p>
<p> There is no question that an <ent type='ORG'>individ</ent>ual can be broken psycholog-
ically by captors with knowledge and willingness to persist in tech-
niques aimed at deliberately destroying the integration of a personal-
ity. Although it is probable that everyone reduced to such a confused,
disoriented state will respond to the introduction of new beliefs, this
cannot be stated dogmatically.</p>
<p>PRINCIPLES OF HUMAN CONTROL AND REACTION TO CONTROL</p>
<p> There are progressive steps in exercising control over an <ent type='ORG'>individ</ent>-
ual and changing his be<ent type='ORG'>haviour</ent> and personality integration. The fol-
lowing five steps are typical of be<ent type='ORG'>haviour</ent> changes in any controlled
<ent type='ORG'>individ</ent>ual:</p>
<p> 1. Making the <ent type='ORG'>individ</ent>ual aware of control is the first stage in
changing his be<ent type='ORG'>haviour</ent>. A small child is made aware of the physical
and psychological control of his parents and quickly recognizes that
an overwhelming force must be reckoned with. So, a controlled adult
comes to recognize the overwhelming powers of the state and the im-
personal, "incarcerative" machinery in which he is enmeshed. The in
-<ent type='GPE'>dividual</ent> recognizes that definite limits have been put upon the ways
he can respond.</p>
<p>(Approved for Release) (62-80750-2712X)
(Date: 8 FEB 1984)</p>
<p> OA 53-37</p>
<p> 2. Realization of his complete dependence upon the controll-
ing system is a major factor in the controlling of his behavior.The con-
trolled adult is forced to accept the fact that food, tobacco,praise,
and the only social contact that he will get come from the very in-
terrogator who exercises control over him.
-------------------------------------------------------------------------------</p>
<p> 3. The awareness of control and recognition of dependence re-
sult in causing internal conflict and breakdown of previous patterns
of be<ent type='ORG'>haviour</ent>. Although this transition can be relatively mild in
the case of a child, it is almost invariably severe for the adult
undergoing brainwashing. Only an <ent type='ORG'>individ</ent>ual who holds his values
lightly can change them easily. Since the brainwasher-interrogators
aim to have the <ent type='ORG'>individ</ent>uals undergo profound emotional change, they
force their victims to seek out painfully what is desired by the
controlling <ent type='ORG'>individ</ent>ual. During this period the victim is likely to
have a mental breakdown characterized by delusions and hallucinat-
ions.</p>
<p> 4. Discovery that there is an acceptable solution to his prob-
lem is the first stage of reducing the <ent type='ORG'>individ</ent>ual's conflict. It
is characteristically reported by victims of brainwashing that this
discovery led to an overwhelming feeling of relief that the horror
of internal conflict would cease and that perhaps they would not,
after all, be driven insane. It is at this point that they are pre-
pared to make major changes in their value-system. This is an
automatic rather than voluntary choice. They have lost their a-
bility to be critical.</p>
<p> 5. Reintergration of values and identification with the cont-
rolling system is the final stage in changing the be<ent type='ORG'>haviour</ent> of the
controlled <ent type='ORG'>individ</ent>ual. A child who has learned a new, socially de-
sirable be<ent type='ORG'>haviour</ent> demonstrates its importance by attempting to as-
apt the new be<ent type='ORG'>haviour</ent> to a variety of other situations. Similar
states in the brainwashed adult are</p>
<p> (SECTION DELETED BY <ent type='ORG'>CIA</ent>)</p>
<p> OA 53-37</p>
<p>pitiful. His new value-system, his manner of perceiving,organizing,and
-------------------------------------------------------------------------------
giving meaning to events, is virtually independent of his former value-
system.He is no longer capable of thinking or speaking in concepts other
than those he has adopted. He tends to identify by expressing thanks to
his captors for helping him see the light.Brainwashing can be achieved
without using illegal means.Anyone willing to use known principles of
control and reactions to control and capable of demonstrating the patience
needed in raising a child can probably achieve successful brainwashing.</p>
<p><ent type='ORG'>COMMUNIST</ent> CONTROL TECHNIQUES AND THEIR EFFECTS</p>
<p> A description of usual <ent type='NORP'>communist</ent> control techniques follows.</p>
<p> 1. Interrogation. There are at least two ways in which "interro-
gation" is used:
a. <ent type='ORG'>Elicitation</ent>, which is designed to get the <ent type='ORG'>individ</ent>ual to
surrender protected information, is a form of interrogation. One major
difference between elicitation and interrogation used to achieve
brainwashing is that the mind of the <ent type='ORG'>individ</ent>ual must be kept clear to
permit coherent, undistorted disclosure of protected information.
b. <ent type='ORG'>Elicitation</ent> for the purpose of brainwashing consists of
questioning,argument,indoctrination,threats,cajolery,praise,hos-
tility, and a variety of other pressures. The aim of this interrogation
is to hasten the breakdown of the <ent type='ORG'>individ</ent>ual's value system and to encourage
the substitution of a different value-system. The procurement of protected
information is secondary and is used as a device to increase pressure upon
the <ent type='ORG'>individ</ent>ual. The term "interrogation" in this paper will refer, in
general, to this type. The "interrogator" is the <ent type='ORG'>individ</ent>ual who conducts
this type of interrogation and who controls the administration of the other
pressures. He is the protagonist against whom the victim develops his con-
flict, and upon whom the victim develops a state of dependency as he seeks
some solution to his conflict.</p>
<p> 2. Physical Torture and Threats of Torture. Two types of physical
torture are distinguishable more by their psychological effect in induc-
ing conflict than by the degree of painfulness:</p>
<p> a. The first type is one in which the victim has a passive role
in the pain inflicted on him (e.g.,beatings). His conflict involves the
decision of whether or not to give in to demands in order to avoid further
pain. Generally, brutality of this type was not found to achieve the
desired results. Threats of torture were found more effective, as fear
of pain causes greater conflict within the <ent type='ORG'>individ</ent>ual than does pain it-
self.</p>
<p> OA 53-37 </p>
<p> b. The second type of torture is represented by requiring the
<ent type='ORG'>individ</ent>ual to stand in one spot for several hours or assume some other
pain-inducing position. Such a requirement often engenders in the indi-
vidual a determination to "stick it out." This internal act of resistance
-------------------------------------------------------------------------------
provide a feeling of moral superiority at first. As time passes and his
pain mounts,however, the <ent type='ORG'>individ</ent>ual becomes aware that it is his own
original determination to resist that is causing the continuance of pain.
A conflict develops within the <ent type='ORG'>individ</ent>ual between his moral determination
and his desire to collapse and discontinue the pain. It is this extra
internal conflict, in addition to the conflict over whether or not to give
in to the demands made of him, that tends to make this method of torture
more effective in the breakdown of the <ent type='ORG'>individ</ent>ual personality.</p>
<p> 3. Isolation. In<ent type='GPE'>dividual</ent> differences in reaction to isolation are
probably greater than to any other method. Some <ent type='ORG'>individ</ent>uals appear to
be able to withstand prolonged periods of isolation without deleterious
effects, while a relatively short period of isolation reduces others to
the verge of psychosis. Reaction varies with the conditions of the iso-
lation cell. Some sources have indicated a strong reaction to filth and
vermin, although they had negligible reactions to the isolation. Others
reacted violently to isolation in relatively clean cells. The predominant
cause of breakdown in such situations is a lack of sensory stimulation
(i.e.,grayness of walls,lack of sound,absence of social contact,etc.).
Experimental subjects exposed to this condition have reported vivid hal-
licinations and overwhelming fears of losing their sanity.</p>
<p> 4. Control of Communication. This is one of the most effective
methods for creating a sense of helplessness and despair. This measure
might well be considered the cornerstone of the <ent type='NORP'>communist</ent> system of con-
trol. It consists of strict regulation of the mail,reading materials,
broadcast materials, and social contact available to the <ent type='ORG'>individ</ent>ual. The
need to communicate is so great that when the usual channels are blocked,
the <ent type='ORG'>individ</ent>ual will resort to any open channel, almost regardless of the
implications of using that particular channel. Many POWs in <ent type='GPE'>Korea</ent>, whose
only act of "collaboration" was to sign petitions and "peace appeals,"
defended their actions on the ground that this was the only method of
letting the outside world know they were still alive. May stated that
their morale and fortitude would have been increased immeasurably had
leaflets of encouragement been dropped to them. When the only contact
with the outside world is via the interrogator, the prisoner comes to
develop extreme dependency on his interrogator and hence loses another
prop to his morale.</p>
<p> Another wrinkle in communication control is the informer system.
The recruitment of informers in POW camps discouraged communication</p>
<p> OA 53-37</p>
<p>between inmates.POWs who feared that every act or thought of resistance
-------------------------------------------------------------------------------
would be communicated to the camp administrators, lost faith in their
fellow man and were forced to "untrusting <ent type='ORG'>individ</ent>ualism." Informers are
also under several stages of brainwashing and elicitation to develop
and maintain control over the victims.</p>
<p> 5. Induction of Fatigue. This is a well-known device for breaking
will power and critical powers of judgment. Deprivation of sleep results
in more intense psychological debilitation than does any other method of
engendering fatigue. The <ent type='NORP'>communists</ent> vary their methods. "Conveyor belt"
interrogation that last 50-60 hours will make almost any <ent type='ORG'>individ</ent>ual com-
promise, but there is danger that this will kill the victim. It is safer
to conduct interrogations of 8-10 hours at night while forcing the prisoner
to remain awake during the day. Additional interruptions in the remaining
2-3 hours of allotted sleep quickly reduce the most resilient <ent type='ORG'>individ</ent>ual .
Alternate administration of drug stimulants and depressants hastens the
process of fatigue and sharpens the psychological reactions of excitement
and depression.</p>
<p> Fatigue, in addition to reducing the will to resist,also produces
irritation and fear that arise from increased "slips of the tongue." for-
getfulness, and decreased ability to maintain orderly thought processes.</p>
<p> 6. Control of Food,Water and Tobacco. The controlled <ent type='ORG'>individ</ent>ual
is made intensely aware of his dependence upon his interrogator for the
quality and quantity of his food and tobacco. The exercise of this con-
trol usually follows a pattern. No food and little or no water is per-
mitted the <ent type='ORG'>individ</ent>ual for several days prior to interrogation.When the
prisoner first complains of this to the interrogator, the latter expresses
surprise at such inhumane treatment. He makes a demand of the prisoner.
If the latter complies,he receives a good meal. If he does not, he gets
a diet of unappetizing food containing limited vitamins,minerals, and
calories. This diet is supplemented occasionally by the interrogator if
the prisoner "cooperates." Studies of controlled starvation indicate
that the whole value-system of the subjects underwent a change. Their
irritation increased as their ability to think clearly decreased. The
control of tobacco presented an even greater source of conflict for heavy
smokers. Because tobacco is not necessary to life, being manipulated by
his craving for it can in the <ent type='ORG'>individ</ent>ual a strong sense of guilt.</p>
<p> 7. Criticism and Self-Criticism. There are mechanisms of <ent type='NORP'>communist</ent>
thought control. Self-criticism gains its effectiveness from the fact
that although it is not a crime for a man to be wrong, it is a major crime
to be stubborn and to refuse to learn. Many <ent type='ORG'>individ</ent>uals feel intensely re-
lieved in being able to share their sense of guilt. Those <ent type='ORG'>individ</ent>uals</p>
<p> OA 53-37</p>
<p>however, who have adjusted to handling their guilt internally have dif-
<ent type='ORG'>ficulty</ent> adapting to criticism and self-criticism. In brainwashing ,after
a <ent type='ORG'>suffi</ent>cient sense of guilt has been created in the <ent type='ORG'>individ</ent>ual, sharing
and self-criticism permit relief. The price paid for this relief, how-
-------------------------------------------------------------------------------
ever, is loss of <ent type='ORG'>individ</ent>uality and increased dependency.</p>
<p> 8. <ent type='ORG'>Hypnosis and Drugs</ent> as Controls. There is no reliable evidence
that the <ent type='NORP'>communists</ent> are making widespread use of drugs or hypnosis in
brainwashing or elicitation. The exception to this is the use of common
stimulants or depressants in inducing fatigue and "mood swings."</p>
<p> 9. Other methods of control, which when used in conjunction with the
basic processes, hasten the deterioration of prisoners' sense of values
and resistance are:</p>
<p> a. Requiring a case history or autobiography of the prisoner
provides a mine of information for the interrogator in establishing and
"documenting" accusations.</p>
<p> b. Friendliness of the interrogator , when least expected, up-
sets the prisoner's ability to maintain a critical attitude.</p>
<p> c. Petty demands, such as severely limiting the allotted time
for use of toilet facilities or requiring the POW to kill hundreds of
flies, are harassment methods.</p>
<p> d. Prisoners are often humiliated by refusing them the use of
toilet facilities during interrogator until they soil themselves. often
prisoners were not permitted to bathe for weeks until they felt contempti-
ble.</p>
<p> e. Conviction as a war criminal appears to be a potent factor
in creating despair in the <ent type='ORG'>individ</ent>ual. One official analysis of the pres-
sures exerted by the ChiComs on "confessors" and "non-confessors" to
participation in bacteriological warfare in <ent type='GPE'>Korea</ent> showed that actual trial
and conviction of "war crimes" was overwhelmingly associated with breakdown
and confession.</p>
<p> f. Attempted elicitation of protected information at various
times during the brainwashing process diverted the <ent type='ORG'>individ</ent>ual from aware-
ness of the deterioration of his value-system. The fact that, in most
cases, the ChiComs did not want or need such intelligence was not known
to the prisoner. His attempts to protect such information was made at
the expense of hastening his own breakdown.</p>
<p> OA 53-37</p>
<p>THE EXERCISE OF CONTROL: A "SCHEDULE" FOR BRAINWASHING
-------------------------------------------------------------------------------
From the many fragmentary accounts reviewed, the following appears
to be the most likely description of what occurs during brainwashing .</p>
<p> In the period immediately following capture, the captors are faced
with the problem of deciding on best ways of exploitation of the prisoners.
Therefore, early treatment is similar both for those who are to be exploited
through elicitation and those who are to undergo brainwashing. concurrently
with being interrogated and required to write a detailed personal history,
the prisoner undergoes a physical and psychological "softening-up" which
includes: limited unpalatable food rations,withholding of tobacco,possi-
ble work details,severely inadequate use of toilet facilities, no use of
facilities for personal cleanliness,limitation of sleep such as requiring
a subject to sleep with a bright light in his eyes. Apparently the inter-
rogation and autobiographical ,material, the reports of the prisoner's be-
<ent type='ORG'>haviour</ent> in confinement, and tentative "personality typing" by the interro-
gators, provide the basis upon which exploitation plans are made.</p>
<p> There is a major difference between preparation for elicitation and
for brainwashing .Prisoners exploited through elicitation must retain <ent type='ORG'>suffi</ent>-
cient clarity of thought to be able to give coherent,factual accounts. In
brainwashing , on the other hand, the first thing attacked is clarity of
thought. To develop a strategy of defense, the controlled <ent type='ORG'>individ</ent>ual must
determine what plans have been made for his exploitation. Perhaps the best
cues he can get are internal reactions to the pressures he undergoes.</p>
<p> The most important aspect of the brainwashing process is the interro-
gation. The other pressures are designed primarily to help the interrogator
achieve his goals. The following states are created systematically within
the <ent type='ORG'>individ</ent>ual . These may vary in order, but all are necessary to the
brainwashing process:</p>
<p> 1. A feeling of helplessness in attempting to deal with the impersonal
machinery of control.</p>
<p> 2. An initial reaction of "surprise."</p>
<p> 3. A feeling of uncertainty about what is required of him.</p>
<p> 4. A developing feeling of dependence upon the interrogator .</p>
<p> 5. A sense of doubt and loss of objectivity.</p>
<p> 6. Feelings of guilt.</p>
<p> OA 53-37</p>
<p> 7. A questioning attitude toward his own value-system.</p>
<p> 8. A feeling of potential "breakdown," i.e.,that he might go crazy.
-------------------------------------------------------------------------------
9. A need to defend his acquired principles.</p>
<p> 10. A final sense of "belonging" (identification).</p>
<p> A feeling of helplessness in the face of the impersonal machinery
of control is carefully engendered within the prisoner. The <ent type='ORG'>individ</ent>ual
who receives the preliminary treatment described above not only begins
to feel like an "animal" but also feels that nothing can be done about
it. No one pays any personal attention to him. His complaints fall on
deaf ears. His loss of communication, if he has been isolated, creates
a feeling that he has been "forgotten." Everything that happens to him
occurs according to an impersonal; time schedule that has nothing to do
with his needs. The voices and footsteps of the guards are muted. He
notes many contrasts,e.g.,his greasy,unpalatable food may be served
on battered tin dishes by guards immaculately dressed in white. The
first steps in "depersonalization" of the prisoner have begun. He has
no idea what to expect. Ample opportunity is allotted for him to ruminate
upon all the unpleasant or painful things that could happen to him. He
approaches the main interrogator with mixed feelings of relief and
fright.</p>
<p> Surprise is commonly used in the brainwashing process. The prisoner
is rarely prepared for the fact that the interrogators are usually friendly
and considerate at first. They make every effort to demonstrate that
they are reasonable human beings. Often they apologize for bad treatment
received by the prisoner and promise to improve his lot if he, too, is
reasonable. This be<ent type='ORG'>haviour</ent> is not what he has steeled himself for. He
lets down some of his defenses and tries to take a reasonable attitude.
The first occasion he balks at satisfying a request of the interrogator ,
however, he is in for another surprise. The formerly reasonable inter-
rogator unexpectedly turns into a furious maniac. The interrogator is
likely to slap the prisoner or draw his pistol and threaten to shoot him.
Usually this storm of emotion ceases as suddenly as it began and the in-
terrogator stalks from the room. These surprising changes create doubt
in the prisoner as to his very ability to perceive another person's moti-
vations correctly. His next interrogation probably will be marked by im-
passivity in the interrogator 's mien.</p>
<p> A feeling of uncertainty about what is required of him is likewise
carefully engendered within the <ent type='ORG'>individ</ent>ual . Pleas of the prisoner to
learn specifically of what he is accused and by whom are side-stepped by</p>
<p> OA 53-37</p>
<p>the interrogator. Instead, the prisoner is asked to tell why he thinks
-------------------------------------------------------------------------------
he is held and what he feels he is guilty of. If the prisoner fails to
come up with anything, he is accused in terms of broad generalities (e.g.,
espionage, sabotage,acts of treason against the "people"). This us-
ually provokes the prisoner to make some statement about his activities.
If this take the form of a denial, he is usually sent to isolation on
further decreased food rations to "think over" his crimes. This process
can be repeated again and again. As soon as the prisoner can think of
something that might be considered self-incriminating, the interrogator
appears momentarily satisfied. The prisoner is asked to write down his
statement in his own words and sign it.</p>
<p> Meanwhile a strong sense of dependence upon the interrogator is
developed. It does not take long for the prisoner to realize that the
interrogator is the source of all punishment , all gratification,and all
communication. The interrogator , meanwhile,demonstrates his unpredict-
bility. He is perceived by the prisoner as a creature of whim. At
times, the interrogator can be pleased very easily and at other times
no effort on the part of the prisoner will placate him. The prisoner
may begin to channel so much energy into trying to predict the be<ent type='ORG'>haviour</ent>
of the unpredictable interrogator that he loses track of what is happen-
ing inside himself.</p>
<p> After the prisoner has developed the above psychological and emotional
reactions to a <ent type='ORG'>suffi</ent>cient degree, the brainwashing begins in earnest.
First, the prisoner's remaining critical faculties must be destroyed.
He undergoes long, fatiguing interrogations while looking at a bright
light. He is called back again and again for interrogations after min-
imal sleep. He may undergo torture that tends to create internal con-
flict. Drugs may be used to accentuate his "mood swings." He develops
depression when the interrogator is being kind and becomes euphoric when
the interrogator is threatening the direst penalties. Then the cycle is
reversed. The prisoner finds himself in a constant state of anxiety
which prevents him from relaxing even when he is permitted to sleep.
Short periods of isolation now bring on visual and auditory hallucinations.
The prisoner feels himself losing his objectivity. It is in this state
that the prisoner must keep up an endless argument with the interrogator .
He may be faced with the confessions of other <ent type='ORG'>individ</ent>uals who "collabo-
rated" with him in his crimes. The prisoner seriously begins to doubts
his own memory. This feeling is heightened by his inability to recall
little things like the names of the people he knows very well or the date
of his birth. The interrogator patiently sharpens this feeling of doubt
by more questioning. This tends to create a serious state of uncertainty
when the <ent type='ORG'>individ</ent>ual has lost most of his critical faculties.</p>
<p> OA 53-37</p>
<p> The prisoner must undergo additional internal conflict when strong
feelings of guilt are aroused within him. As any clinical psychologist
is aware, it is not at all difficult to create such feelings. Military
servicemen are particularly vulnerable. No one can morally justify kill-
-------------------------------------------------------------------------------
ing even in wartime. The usual justification is on the grounds of neces-
sity or self-defense. The interrogator is careful to circumvent such
justification. He keeps the interrogation directed toward the prisoner's
moral code. Every moral vulnerability is exploited by incessant question-
ing along this line until the prisoner begins to question the very fun-
damentals of his own value-system. The prisoner must constantly fight a
potential breakdown. He finds that his mind is "going blank" for longer
and longer periods of time. He can not think constructively. If he is
to maintain any semblance of psychological integrity, he must bring to
an end this state of interminable internal conflict. He signifies a
willingness to write a confession.</p>
<p> If this were truly the end, no brainwashing would have occurred.
The <ent type='ORG'>individ</ent>ual would simply have given in to intolerable pressure. Ac-
tually, the final stage of the brainwashing process has just begun. No
matter what the prisoner writes in his confession the interrogator is
not satisfied. The interrogator questions every sentence of the confes-
sion. He begins to edit it with the prisoner. The prisoner is forced
to argue against every change. This is the essence of brainwashing.
Every time that he gives in on a point to the interrogator, he must re-
write his whole confession. Still the interrogator is not satisfied.
In a desperate attempt to maintain some semblance of integrity and to
avoid further brainwashing, the prisoner must begin to argue that what
he has already confessed to is true. He begins to accept as his own the
statements he has written. He uses many of the interrogator's earlier
arguments to buttress his position. By this process,identification
with the interrogator's value-system becomes complete. It is extremely
important to recognize that a qualitative change has taken place within
the prisoner. The brainwashed victim does not consciously change his
value-system; rather the change occurs despite his efforts. He is no
more responsible for this change than is an <ent type='ORG'>individ</ent>ual who "snaps" and
becomes psychotic. And like the psychotic, the prisoner is not even
aware of the transition.</p>
<p>DEFENSIVE MEASURES OTHER THAN ON THE POLICY AND PLANNING LEVEL</p>
<p> 1. Training of In<ent type='GPE'>dividual</ent>s potentially subject to <ent type='NORP'>communist</ent> control.</p>
<p> Training should provide for the trainee a realistic appraisal
of what control pressures the <ent type='NORP'>communists</ent> are likely to exert and what
the usual human reactions are to such pressures. The trainee must learn</p>
<p> OA 53-37</p>
<p>the most effective ways of combatting his own reactions to such pressures
-------------------------------------------------------------------------------
and he must learn reasonable expectations as to what his be<ent type='ORG'>haviour</ent> should
be. Training has two decidedly positive effects; first, it provides the
trainee with ways of combatting control; second, it provides the basis
for developing an immeasurable boost in morale. Any positive action that
the <ent type='ORG'>individ</ent>ual can take, even if it is only slightly effective, gives him
a sense of control over a situation that is otherwise controlling him.</p>
<p> 2. Training must provide the <ent type='ORG'>individ</ent>ual with the means of
recognizing realistic goals for himself.</p>
<p> a. Delay in yielding may be the only achievement that can be
hoped for. In any particular operation, the agent needs the support of
knowing specifically how long he must hold out to save an operation, pro-
tect his cohorts, or gain some other goal.</p>
<p> b. The <ent type='ORG'>individ</ent>ual should be taught how to achieve the most favor-
able treatment and how to behave and make necessary concessions to
obtain minimum penalties.</p>
<p> c. In<ent type='GPE'>dividual</ent> be<ent type='ORG'>haviour</ent>al responses to the various <ent type='NORP'>communist</ent>
control pressures differ markedly. Therefore, each trainee should know
his own particular assets and limitations in resisting specific pressures.
He can learn these only under laboratory conditions simulating the actual
pressures he may have to face.</p>
<p> d. Training must provide knowledge of the goals and the restric-
tions placed upon his <ent type='NORP'>communist</ent> interrogator. The trainee should know
what controls are on his interrogator and to what extent he can manipulate
the interrogator. For example, the interrogator is not permitted to fail
to gain "something" from the controlled <ent type='ORG'>individ</ent>ual. The knowledge that,
after the victim has proved that he is a "tough nut to crack" he can some-
times indicate that he might compromise on some little point to help the
interrogator in return for more favorable treatment, may be useful in-
deed. Above all, the potential victim of <ent type='NORP'>communist</ent> control can gain a
great deal of psychological support from the knowledge that the <ent type='NORP'>communist</ent>
interrogator is not a completely free agent who can do whatever he wills
with his victim.</p>
<p> e. The trainee must learn what practical cues might aid him in
recognizing the specific goals of his interrogator. The strategy of defense
against elicitation may differ markedly from the strategy to prevent
brainwashing. To prevent elicitation, the <ent type='ORG'>individ</ent>ual may hasten his own
state of mental confusion; whereas, to prevent brainwashing, maintaining
clarity of thought processes is imperative.</p>
<p> OA 53-37</p>
<p> f. The trainee should obtain knowledge about <ent type='NORP'>communist</ent> "carrots"
as well as "sticks." The <ent type='NORP'>communists</ent> keep certain of their promises and al-
ways renege on others. For example, the demonstrable fact that "informers"
receive no better treatment than other prisoners should do much to prevent
-------------------------------------------------------------------------------
this particular evil. On the other hand, certain meaningless concessions
will often get a prisoner a good meal.</p>
<p> g. In particular, it should be emphasized to the trainee that,
although little can be done to control the pressures exerted upon him, he
can learn something about controlling his personal reactions to specific
pressures. The trainee can gain much from learning something about in-
ternal conflict and conflict-producing mechanisms. He should learn to
recognize when someone is trying to arouse guilt feelings and what be-
<ent type='ORG'>haviour</ent>al reactions can occur as a response to guilt.</p>
<p> h. Finally, the training must teach some methods that can be utilized
in thwarting particular <ent type='NORP'>communist</ent> control techniques:</p>
<p> <ent type='ORG'>Elicitation</ent>. In general, <ent type='ORG'>individ</ent>uals who are the hardest to inter-
rogate for information are those who have experienced previous interroga-
tions. <ent type='ORG'>Practice</ent> in being the victim of interrogation is a sound train-
ing device.</p>
<p> Torture. The trainee should learn something about the principles of
pain and shock. There is a maximum to the amount of pain that can actually
be felt. Any amount of pain can be tolerated for a limited period of
time. In addition, the trainee can be fortified by the knowledge that there
are legal limitations upon the amount of torture that can be inflicted
by <ent type='NORP'>communist</ent> jailors.</p>
<p> Isolation. The psychological effects of isolation can probably be
thwarted best by mental gymnastics and systematic efforts on the part of
the isolate to obtain stimulation for his neural end organs.</p>
<p> Controls on Food and Tobacco. Foods given by the <ent type='NORP'>communists</ent> will
always be enough to maintain survival. Sometimes the victim gets unex-
pected opportunities to supplement his diet with special minerals,vitamins
and other nutrients (e.g.,"iron" from the rust of prison bars). In some
instances, experience has shown that <ent type='ORG'>individ</ent>uals could exploit refusal to
eat. Such refusal usually resulted in the transfer of the <ent type='ORG'>individ</ent>ual to
a hospital where he received vitamin injections and nutritious food. <ent type='ORG'>Evi</ent>-
dently attempts of this kind to commit suicide arouse the greatest concern
in <ent type='NORP'>communist</ent> officials. If deprivation of tobacco is the control being
exerted. the victim can gain moral satisfaction from "giving up" tobacco.
He can't lose since he is not likely to get any anyway.</p>
<p> OA 53-37</p>
<p> Fatigue. The trainee should learn reactions to fatigue and how to
-------------------------------------------------------------------------------
overcome them insofar as possible. For example, mild physical exercise
"clears the head" in a fatigue state.</p>
<p> Writing Personal Accounts and Self-Criticism. Experience has in-
dicated that one of the most effective ways of combatting these pressures
is to enter into the spirit with an overabundance of enthusiasm. Endless
written accounts of inconsequential material have virtually "smothered"
some eager interrogators. In the same spirit, sober, detailed self-
criticisms of the most minute "sins" has sometimes brought good results.</p>
<p> Guidance as to the priority of positions he should defend. Perfectly
compatible responsibilities in the normal execution of an <ent type='ORG'>individ</ent>ual's
duties may become mutually incompatible in this situation. Take the ex-
ample of a senior grade military officer. He has the knowledge of sensitive
strategic intelligence which it is his duty to protect. He has the respon-
sibility of maintaining the physical fitness of his men and serving as
a model example for their be<ent type='ORG'>haviour</ent>. The officer may go to the camp
commandant to protest the treatment of the POWs and the commandant as-
sures him that treatment could be improved if he will swap something for
it. Thus to satisfy one responsibility he must compromise another. The
officer, in short, is in a constant state of internal conflict. But if
the officer is given the relative priority of his different responsibilities,
he is supported by the knowledge that he won't be held accountable for
any other be<ent type='ORG'>haviour</ent> if he does his utmost to carry out his highest priority
responsibility. There is considerable evidence that many <ent type='ORG'>individ</ent>uals
tried to evaluate the priority of their responsibilities on their own,
but were in conflict over whether others would subsequently accept their
evaluations. More than one <ent type='ORG'>individ</ent>ual was probably brainwashed while he
was trying to protect himself against elicitation.</p>
<p>CONCLUSIONS</p>
<p> The application of known psychological principles can lead to an
understanding of brainwashing.</p>
<p> 1. There is nothing mysterious about personality changes resulting
from the brainwashing process.</p>
<p> 2. Brainwashing is a complex process. Principles of motivation,
perception, learning, and physiological deprivation are needed to account
for the results achieved in brainwashing.</p>
<p> 3. Brainwashing is an involuntary re-education of the fundamental
beliefs of the <ent type='ORG'>individ</ent>ual. To attack the problem successfully, the brain-
washing process must be differentiated clearly from general education
methods for thought-control or mass indoctrination, and elicitation.</p>
<p> OA 53-37</p>
<p> 4. It appears possible for the <ent type='ORG'>individ</ent>ual,through training,to
develop limited defensive techniques against brainwashing. Such defensive
measures are likely to be most effective if directed toward thwarting in-
<ent type='GPE'>dividual</ent> emotional reactions to brainwashing techniques rather than to-
-------------------------------------------------------------------------------
ward thwarting the techniques themselves.</p>
<p> 15 August 1955</p>
<p> =====================================================================
(note Declassified)</p>
<p> SECRET</p>
<p> CENTRAL INTELLIGENCE AGENCY
<ent type='GPE'>WASHINGTON</ent> 25, D. C.</p>
<p> 19 JUN 1964</p>
<p> (<ent type='ORG'>Commission</ent> No. 1131)</p>
<p> MEMORANDUM FOR: Mr. J. Lee Rankin
General Counsel
President's <ent type='ORG'>Commission</ent> on the
Assassination of President Kennedy</p>
<p> SUBJECT : <ent type='NORP'>Soviet</ent> Brainwashing Techniques</p>
<p> 1. Reference is made to your memorandum of 19 May 1964,
requesting that materials relative to <ent type='NORP'>Soviet</ent> techniques in mind
conditioning and brainwashing be made available to the <ent type='ORG'>Commission</ent>.</p>
<p> 2. At my request, experts on these subjects within the <ent type='ORG'>CIA</ent>
have prepared a brief survey of <ent type='NORP'>Soviet</ent> research in the direction
and control of human behavior, a copy of which is attached. The
<ent type='ORG'>Commission</ent> may retain this document. Please note that the use
of certain sensitive materials requires that a sensitivity indicator
be affixed.</p>
<p> 3. In the immediate future, this <ent type='ORG'>Agency</ent> will make available
to you a collection of overt and classified materials on these subjects,
which the <ent type='ORG'>Commission</ent> may retain.</p>
<p> 4. I hope that these documents will be responsive to the
<ent type='ORG'>Commission</ent>'s needs.</p>
<p> (SIGNED)</p>
<p> (DECLASSIFIED) Richard Helms
(By C.I.A.) Deputy Director for Plans
(letter of ___________)
(---------------------)</p>
<p> Attachment</p>
<p> CD 1131 SECRET</p>
<p> MEMORANDUM</p>
<p> SUBJECT: <ent type='NORP'>Soviet</ent> Research and Development in <ent type='ORG'>the Field</ent> of
Direction and Control of Human Behavior.</p>
<p> 1. There are two major methods of altering or controlling
human behavior, and the <ent type='NORP'>Soviet</ent>s are interested in both. The first
is psychological; the second, pharmacological. The two may be
used as <ent type='ORG'>individ</ent>ual methods or for mutual reinforcement. For
long-term control of large numbers of people, the former method
is more promising than the latter. In dealing with <ent type='ORG'>individ</ent>uals,
the U.S. experience suggests the pharmacological approach (assisted
by psychological techniques) would be the only effective method.
Neither method would be very effective for single <ent type='ORG'>individ</ent>uals on
a long term basis.</p>
<p> 2. <ent type='NORP'>Soviet</ent> research on the pharmacological agents producing
behavioral effects has consistently lagged about five years behind
<ent type='NORP'>Western</ent> research. They have been interested in such research,
however, and are now pursuing research on such chemicals as
LSD-25, amphetamines, tranquillizers, hypnotics, and similar
materials. There is no present evidence that the <ent type='NORP'>Soviet</ent>s have
any singular, new, potent drugs to force a course of action on
an <ent type='ORG'>individ</ent>ual. They are aware, however, of the tremendous drive
produced by drug addiction, and PERHAPS could couple this with
psychological direction to achieve control of an <ent type='ORG'>individ</ent>ual.</p>
<p> 3. The psychological aspects of behavior control would include
not only conditioning by repetition and training, but such things as
hypnosis, deprivation, isolation, manipulation of guilt feelings,
subtle or overt threats, social pressure, and so on. Some of the
newer trends in the <ent type='GPE'>USSR</ent> are as follows:</p>
<p> SECRET CD 1131
PAGE 1</p>
<p> a. The adoption of a multidisciplinary approach integrating
biological,social and physical-mathematical research in attempts
better to understand, and eventually, to control human behavior in a
manner consonant with national plans.</p>
<p> b. The outstanding feature, in addition to the inter-
disciplinary approach, is a new concern for mathematical approaches to
an understanding of behavior. Particularly notable are attempts to use
modern information theory, automata theory, and feedback concepts in
interpreting the mechanisms by which the "second signal system," i.e.,
speech and associated phenomena, affect human behavior. Implied by this
"second signal system," using INFORMATION inputs as causative agents
rather than chemical agents, electrodes or other more exotic techniques
applicable, perhaps, to <ent type='ORG'>individ</ent>uals rather than groups.</p>
<p> c. This new trend, observed in the early Post-Stalin Period,
continues. By 1960 the word "cybernetics" was used by the <ent type='NORP'>Soviet</ent>s to
designate this new trend. This new science is considered by some as
the key to understanding the human brain and the product of its
functioning--psychic activity and personality--to the development of
means for controlling it and to ways for molding the character of the
"New <ent type='NORP'>Communist</ent> Man". As one <ent type='NORP'>Soviet</ent> author puts it: <ent type='ORG'>Cybernetics</ent> can be
used in "molding of a child's character, the inculcation of knowledge
and techniques, the amassing of experience, the establishment of social
behavior patterns...all functions which can be summarized as 'control'
of the growth process of the <ent type='ORG'>individ</ent>ual." 1/Students of particular
disciplines in the <ent type='GPE'>USSR</ent>, such as psychologist and social scientists,
also support the general cybernetic trend. 2/ (Blanked by <ent type='ORG'>CIA</ent>)</p>
<p> 4. In summary, therefore, there is no evidence that the <ent type='NORP'>Soviet</ent>s
have any techniques or agents capable of producing particular behavioral
patterns which are not available in the West. Current research indi-
cates that the <ent type='NORP'>Soviet</ent>s are attempting to develop a technology for
controlling the development of behavioral patterns among the citizenry
of the <ent type='GPE'>USSR</ent> in accordance with politically determined requirements of
the system. Furthermore, the same technology can be applied to more
sophisticated approaches to the "coding" of information for transmittal
to population targets in the "battle for the minds of men." Some of the
more esoteric techniques such as ESP or, as the <ent type='NORP'>Soviet</ent>s call it,
"biological radio-communication", and psychogenic agents such as LSD,</p>
<p> SECRET CD 1131
PAGE 2</p>
<p> are receiving some overt attention with, possibly, applications in mind
for <ent type='ORG'>individ</ent>ual behavior control under clandestine conditions. However,
we require more information than is currently available in order to
establish or disprove planned or actual applications of various
methodologies by <ent type='NORP'>Soviet</ent> scientists to the control of actions of
articular <ent type='ORG'>individ</ent>uals.</p>
<p> References</p>
<p> 1. <ent type='ORG'>Itelson</ent>, Lev, "Pedagogy: An Exact Science?" <ent type='GPE'>USSR</ent> October 1963,
p. 10.
2. Borzek, Joseph, "Recent Developments in <ent type='NORP'>Soviet</ent> Psychology,"
Annual Review of Psychology, Vol. 15, 1964, p. 493-594.</p>
<p> SECRET CD 1131</p>
<p> PAGE 3</p>
<p> The first letter and attachment are from DECLASSIFIED
DOCUMENTS 1984 microfilms under MKULTRA (84) 002258, published
by <ent type='ORG'>Research Publication Woodbridge</ent>, CT 06525. Some original
markings were not retyped, but the content is the same. </p>
<p> The second letter and attachment are from the Warren
<ent type='ORG'>Commission</ent> documents. <ent type='ORG'>Notice</ent> should be paid to the different
tone Helms gives to his letter, keeping in mind he was found
guilty of lying to <ent type='ORG'>Congress</ent>. He places greater emphasis on
"<ent type='NORP'>Soviet</ent>" practices and tries to diminish breakthroughs gained
by <ent type='NORP'>Americans</ent>. Some thought should be given as to WHY the
Warren <ent type='ORG'>Commission</ent> sought such documents (remembering that
ALLEN DULLES was a member of that <ent type='ORG'>Commission</ent>). They were
exploring the <ent type='NORP'>Manchurian</ent> candidate theory. It was revealed
during the Church Committee hearings of 1975 that Helms had
been in charge of <ent type='ORG'>Project AMLASH</ent>, a program to assassinate
Castro (<ent type='GPE'>Cuba</ent>),<ent type='GPE'>Trujillo</ent> (Dominican Republic), Diem (RVN),
Schneider (<ent type='GPE'>Chile</ent>) using <ent type='ORG'>MAFIA</ent> figures John Roselli and Santos
Trafficante to do the job. </p>
<p> Care was used to insure lines appear in same length and order.
Page length will have to be adjusted if you desire to print
this. Look for other specials soon. David John Moses.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Salted Slug Systems Strange 408-454-9368
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Tomorrow's 0rder of Magnitude Finger_Man 408-961-9315
My Dog Bit Jesus Suzanne D'Fault 510-658-8078</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,560 @@
<xml><p>
Article: 571 of sgi.talk.ratical
From: dave@ratmandu.esd.sgi.com (dave "who can do? ratmandu!" ratcliffe)
Subject: How the <ent type='ORG'>CIA</ent> turned `being directed by the <ent type='ORG'>NSC</ent>' into `getting approval'
<ent type='ORG'>Keywords</ent>: the compartmentalized "need to know" security lid locks up the govn't
Organization: Silicon Graphics, Inc.
Date: Fri, 10 Apr 1992 18:01:36 GMT
Lines: 573</p>
<p> . . . Control of a good share of what the <ent type='ORG'>Pentagon</ent> is doing is
more important to the <ent type='ORG'>CIA</ent> than control over the government of
<ent type='GPE'>Jordan</ent> or <ent type='GPE'>Syria</ent>. . . .
When the <ent type='ORG'>CIA</ent> wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the <ent type='ORG'>CIA</ent> to get
a favorable reading from the "<ent type='ORG'>Forty Committee</ent>" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the <ent type='ORG'>NSC</ent> intrastructure, and then,
by clamping on a security id, it makes others believe that the <ent type='ORG'>CIA</ent>
had orders from the <ent type='ORG'>NSC</ent> or perhaps even from the President, when in
fact it did not.</p>
<p> the following appeared in the 7/75 issue of "<ent type='ORG'>Genesis</ent>:"
_____________________________________________________________________
How the <ent type='ORG'>CIA</ent> Controls President Ford
By L. Fletcher Prouty
reprinted here with permission of the author</p>
<p> In this monstrous U.S. government today, it's not so much what
comes down from the top that matters as what you can get away with
from the bottom or from the middle--the least scrutinized level.
(Contrary to the current <ent type='ORG'>CIA</ent> propaganda as preached by William
Colby, Ray Cline, Victor Marchetti and Philip Agee, who say,
incorrectly, "What the <ent type='ORG'>Agency</ent> does is ordered by the President.")
As with the <ent type='ORG'>Mafia</ent>, crime is a cinch if you know the cops and the
courts have been paid off. With the <ent type='ORG'>Central Intelligence</ent> <ent type='ORG'>Agency</ent>,
anything goes when you have a respected boss to sanctify and bless
your activities and to shield them from outside eyes.
Such a boss in the <ent type='ORG'>CIA</ent> was old Allen <ent type='GPE'>Dulles</ent>, who ran the <ent type='ORG'>Agency</ent>
like a mother superior running a whorehouse. He knew the girls
were happy, busy, and well <ent type='ORG'>fed</ent>, but he wasn't quite sure what they
were doing. His favorites, all through the years of his prime as
Director of <ent type='ORG'>Central Intelligence</ent>, were such stellar performers as
Frank <ent type='ORG'>Wisner</ent>, Dick Bissell, George Doole, Sheffield Edwards, Dick
Helms, <ent type='ORG'>Red White</ent>, Tracy Barnes, Desmond Fitzgerald, Joe Alsop, Ted
Shannon, Ed Lansdale and countless others. They were the great
operators. He just made it possible for them to do anything they
came up with.
When <ent type='ORG'>Wisner</ent> and Richard Nixon came up with the idea of mounting
a major rebellion in <ent type='GPE'>Indonesia</ent> in 1958, <ent type='GPE'>Dulles</ent> saw that they got
the means and the wherewithal. When General Cabell and his Air
Force friends plugged the U-2 project for Kelly Johnson of
<ent type='ORG'>Lockheed</ent>, <ent type='GPE'>Dulles</ent> tossed it into the lap of Dick Bissell. When Dick
Helms and Des Fitzgerald figured they could play fun and games in
<ent type='GPE'>Tibet</ent>, <ent type='GPE'>Dulles</ent> talked to Tom Gates, then Secretary of <ent type='ORG'>Defense</ent>, and
the next we knew <ent type='ORG'>CIA</ent> agents were spiriting the Dalai Lama out of
<ent type='GPE'>Lhasa</ent>, <ent type='ORG'>CIA</ent> undercover aircraft were clandestinely dropping tons of
arms, ammunitions, and supplies deep into <ent type='GPE'>Tibet</ent> and other planes
were reaching as far as northwestern <ent type='GPE'>China</ent> to <ent type='GPE'>Koko</ent> Nor.
While he peddled the hard-won <ent type='ORG'>National Intelligence Estimates</ent> to
all top offices and sprinkled holy water over the pates of our
leaders, <ent type='GPE'>Dulles</ent> dropped off minor miracles along the way to
titillate those in high places. If you win the heart of the queen
and convert her to your faith, you can control the king. This
works for the Jesuits. It worked well for the <ent type='ORG'>CIA</ent>. Allen <ent type='GPE'>Dulles</ent>
was no casual student and practitioner of the ancient art of
religion. He was an expert in the art of mind-control. He learned
how to operate his disciples and his <ent type='ORG'>Agency</ent> in the ways of the
cloth.
But for every Saint and every Sinner in the fold there must be
an order of monks, and the <ent type='ORG'>Agency</ent> has always been the haven for
hundreds of faceless, nameless minions whose only satisfaction was
the job well done and the furtherance of the cause. One of the
most remarkable--and surely the best--of these was an agent named
Frank Hand.
In my book, "The Secret Team," written during 1971 and 1972, I
mentioned that the most important agent in the <ent type='ORG'>CIA</ent> was an almost
unknown individual who spent most of his time in the <ent type='ORG'>Pentagon</ent>. At
that time I did not reveal his name; but a small item in a recent
obituary column stated that:</p>
<p> "Frank Hand, 61, a former senior official of the <ent type='ORG'>CIA</ent>, died in
Marshall, Minn. . . . (he was) a graduate of Harvard Law
School. He had served with the <ent type='ORG'>CIA</ent> from 1950 until
retirement in 1971."</p>
<p> After a life devoted to quiet, effective, skillful performance
of one of the most important jobs in the worldwide structure of
that unparalleled agency, all that the <ent type='ORG'>CIA</ent> would publicly say of
Frank Hand was that he was a "senior official."
Ask Dick Helms, Ed Lansdale, Bob McNamara, Tom Gates or Allen
<ent type='GPE'>Dulles</ent> or John Foster <ent type='GPE'>Dulles</ent>, if they were with us today, and they
all would tell us stories about Frank Hand. They would do more to
characterize the nature and the sources of power which make use of
and control the <ent type='ORG'>CIA</ent> than has ever been told before. He was that
superior operative who made big things work unobtrusively.
You might have been one of the grass-green McNamara "whiz kids,"
lost in the maze of the <ent type='ORG'>Pentagon</ent> Puzzle Palace, who came upon a
short, Hobbit-like, pleasant man who knew the <ent type='ORG'>Pentagon</ent> so well that
you got the feeling he was brought in with the original load of
concrete. Thousands of career men to this day will never realize
that Frank Hand was a "Senior Official" of the <ent type='ORG'>CIA</ent> and not one of
their civilian cohorts. To my knowledge he never worked anywhere
else. I was there in 1955 and he was there. I left in December
1963, and he was at my farewell party. He must have spent some of
his time at the agency; but it must have been before 1955. If he
had a dollar for every trip he made in those busy years between the
<ent type='ORG'>Pentagon</ent> and the <ent type='ORG'>CIA</ent> he would have died a very wealthy man. He
popularized the <ent type='ORG'>Agency</ent> term "across the river" and the "Acme
Plumbers" nickname for agents of the <ent type='ORG'>CIA</ent>. (A term later to be
confused by Colson and John Ehrlichman, among others, with the use
of the term "<ent type='ORG'>White House</ent> Plumbers" of Watergate fame. Someone knew
that Hunt, McCord, the <ent type='NORP'>Cubans</ent>, Haig, Butterfield and others all had
<ent type='ORG'>CIA</ent> backgrounds and connections and therefore were "Plumbers."
Only the insiders knew about the real "<ent type='ORG'>Acme Plumbers</ent>.")
Frank was as much at home with Allen <ent type='GPE'>Dulles</ent> as he was with the
famous old <ent type='GPE'>supersleuth</ent>, General Graves B. Erskine, and as he was
with Helms, Colby, or Fitzgerald. Ian Fleming may have popularized
the spy and the undercover agent as a flashing James Bond type;
but in the reality of today's world the great ones are more in the
mold of Frank Hand and "The Spy Who Came In From The Cold."
There has long existed a "golden key" group of agency and
agency-related supermen. They came from the <ent type='ORG'>CIA</ent>, the <ent type='ORG'>Pentagon</ent>, the
Department of State, the <ent type='ORG'>White House</ent> and other places in government
or from the outside. They have kept themselves inconspicuous and
they meet in the evening away from their offices. They are the men
who open the doors of big government to industry-banking law and to
the multinational corporate centers of greed and power. Their
strength lies in their common awareness of the ways in which real
power is generated in the government, the real power that controls
activities of the government. In many instances this is the power
of being able to keep something from happening, rather than to make
it happen. For example, if the President is murdered, real power
involves the control of government operations sufficient to make
any investigation ineffective and to assure that the government
will do nothing even if the investigation should turn up something.
Real power is the ability to keep the government bureaucracy from
going into action when the price of petroleum and wheat is doubled
or tripled by avaricious international monopolies.
Some of these "gold key" members have surfaced and have accepted
publicity, as did Des Fitzgerald, Allen <ent type='GPE'>Dulles</ent>, Tracy Barnes and
others. Frank never did. He was so anonymous that even his
friends could not find him.
The <ent type='ORG'>Agency</ent> covered for Frank Hand as it did for few others. The
James Bonds of this world may be the idols of the <ent type='ORG'>Intelligence</ent>
coterie; but if you are a Bill Colby, Dick Helms, or Allen <ent type='GPE'>Dulles</ent>,
you know the real value of an indispensable agent. Frank was their
man in the <ent type='ORG'>Pentagon</ent>, and the <ent type='ORG'>Pentagon</ent> was always the indispensable
prime target of the <ent type='ORG'>CIA</ent>. When the chips are down, the <ent type='ORG'>CIA</ent> could
care less about overturning "Communism" in <ent type='GPE'>Cuba</ent> or <ent type='GPE'>Chile</ent>. What
really matters is its relative power in the U.S. Government.
Control of a good share of what the <ent type='ORG'>Pentagon</ent> is doing is more
important to the <ent type='ORG'>CIA</ent> than control over the government of <ent type='GPE'>Jordan</ent> or
<ent type='GPE'>Syria</ent>.
Once, when the <ent type='ORG'>CIA</ent> wanted to move a squadron (twenty-five) of
helicopters from <ent type='GPE'>Laos</ent> to <ent type='LOC'>South Vietnam</ent>, long before the troubles
there had become a war, I turned down the request from the Deputy
Director of <ent type='ORG'>Central Intelligence</ent> in the name of the Secretary of
<ent type='ORG'>Defense</ent> for no other reason than the fact that I did not find that
project on the approved list of <ent type='ORG'>the National Security Council</ent>'s
"<ent type='ORG'>Forty Committee</ent>" (then called the 5412/2 committee). That meant
the agency had neither been directed by the <ent type='ORG'>National Security</ent>
Council to move those helicopters into <ent type='GPE'>Vietnam</ent>, nor had it received
authorization for such a tactical movement. In other words, the
planned intervention into <ent type='LOC'>South Vietnam</ent> with a squadron of
helicopters would at that time have been unlawful as an
intervention into the internal affairs of another country.
This denial then, in 1960, effectively blocked the <ent type='ORG'>CIA</ent> from
being able to move heavy war-making equipment into <ent type='GPE'>Vietnam</ent>. The
helicopters were actually U.S. <ent type='ORG'>Marine Corps</ent> property on "loan" from
<ent type='GPE'>Okinawa</ent> to the <ent type='ORG'>CIA</ent> for clandestine operations in <ent type='GPE'>Laos</ent>.
At that time my immediate superior was General Graves Erskine,
the Assistant to the Secretary of <ent type='ORG'>Defense</ent> for Special (Clandestine)
<ent type='ORG'>Operations</ent>, and the man then responsible for all military support
of clandestine operations of the <ent type='ORG'>CIA</ent>. Also at that time, Frank
Hand, "worked for" Erskine. Of course, this was a cover
assignment--"cover slot" as it was known to us and to the <ent type='ORG'>CIA</ent>.
Frank had a regular office in the <ent type='ORG'>Pentagon</ent>.
No sooner had the <ent type='ORG'>CIA</ent> request been turned down than someone near
the top of the agency called Frank and told him about it. In his
smiling and friendly way he came into my office, carrying two cups
of coffee, and began some talk about music, travel, or golf. Then,
as was his practice, he would get the subject around to his point
with such a comment as, "Fletch, who do you suppose took a call
here about the choppers in <ent type='GPE'>Laos</ent>?" and we would be off.
The special ability he possessed was best evidenced by the
process he would set in motion once he discovered a problem that
affected the ambitions of the agency. He would talk about the
choppers with Erskine. Then he would drop in to see the Chief of
Naval <ent type='ORG'>Operations</ent> and perhaps the Commandant of the <ent type='ORG'>Marine Corps</ent>.
He would talk with some of the other civilian Assistant
Secretaries. In other words, he would go from office to office
like a bee spreading pollen, titillating only the most senior
officers and civilian officials with the most "highly sensitive"
tidbits about the <ent type='ORG'>CIA</ent>'s plans for <ent type='GPE'>Vietnam</ent>. In this manner he would
find out what the real thinking in the <ent type='ORG'>Pentagon</ent> might be, and where
there might be real opposition to such an idea--such as in the
<ent type='ORG'>Marine Corps</ent>, which knew it would never get compensation for those
expensive helicopters and for the loss of time of all their support
people. He would also find out where there would be support, as
with the ever-eager U.S. <ent type='ORG'>Army</ent> Special Forces, most of whose senior
officers had been with the <ent type='ORG'>CIA</ent>.
Then he would drop out of the picture for awhile to travel back
to the old <ent type='ORG'>CIA</ent> headquarters, on the hill that overlooks what is now
the Watergate complex, for a long talk with Allen <ent type='GPE'>Dulles</ent> or the
Deputy Director, General Cabell. On matters involving the
clandestine services he would also stop by the old headquarters
buildings, that lined the reflecting pool near the Lincoln
Memorial, to talk with Dick Helms, Desmond Fitzgerald, and other
operators. Within a day or two he would have them fully brie<ent type='ORG'>fed</ent> on
the steps to be taken in order to win over the <ent type='ORG'>Defense</ent> Department;
or failing that, how to overpower and outmaneuver the <ent type='ORG'>Pentagon</ent> in
<ent type='ORG'>the Department</ent> of State and the <ent type='ORG'>White House</ent>.
The foregoing is a "case study" on the important subject of how
the <ent type='ORG'>CIA</ent> really operates and what it believes is its top priority.
The propaganda being spread around today by the <ent type='ORG'>CIA</ent> and its
propagandists that, "What the <ent type='ORG'>CIA</ent> does is ordered by the
President," is totally untrue in all but .00001 percent of actual
historical cases. It is much more factual to say that, "What the
<ent type='ORG'>CIA</ent> does is to find ways to initiate major foreign policy moves
without having the President find out--or at least without
discovery until it is too late."
"It is in precisely that manner that the <ent type='ORG'>CIA</ent> today works around,
beneath and behind the <ent type='ORG'>White House</ent> to effect policies that could
influence the survival of the nation and the world. "Gold Key"
operatives are, at this very moment, carrying out <ent type='ORG'>CIA</ent> game plans
entirely outside the power of President Ford's ability to affect
their activities. He is totally without knowledge of most of them,
and therefore powerless to stop or alter them.
In the case of the helicopters, Frank Hand was able to convince
Allen <ent type='GPE'>Dulles</ent> that the disapproval from the Secretary of <ent type='ORG'>Defense</ent>,
via my office, was real and that the Secretary would, at that time,
be unlikely to change his mind. Frank also could report that the
position of other top-level assistants was so cool to stepping up
the hardware *involvement* of the military in <ent type='GPE'>Vietnam</ent>, in 1960,
that none of them would likely attempt to persuade the Secretary to
change his policy of limited involvement.
Fortified with the information gleaned by Frank Hand, Allen
<ent type='GPE'>Dulles</ent> would have two primary options: drop the idea of moving
helicopters into <ent type='GPE'>Vietnam</ent>, or bypass the Secretary of <ent type='ORG'>Defense</ent> for
the time being by going to the <ent type='ORG'>White House</ent> for support. In 1960
this was a crucial decision. The huge attempt to support a
rebellion in <ent type='GPE'>Indonesia</ent> had failed utterly, the U-2 operations had
been curtailed because of the Gary Powers incident, the far-
reaching operations into <ent type='GPE'>Tibet</ent> had come to a halt by Presidential
directive and anti-Castro activities were limited to minor forays.
And at that time the large-scale (large for <ent type='ORG'>CIA</ent>) war in <ent type='GPE'>Laos</ent> had
become such a disaster that the <ent type='ORG'>CIA</ent> wanted no more of it. Dick
Bissell, the chief of the Clandestine Services, had written strong,
personal letters to Tom Gates, the Secretary of <ent type='ORG'>Defense</ent>, wondering
openly what to do about the 50000 or more miserable <ent type='NORP'>Laotian</ent> Meo
tribesmen the <ent type='ORG'>CIA</ent> had moved into the battle zones of <ent type='GPE'>Laos</ent> and then
had deserted with no plans for their protection, resupply, care or
feeding. The <ent type='ORG'>CIA</ent> badly wanted to be relieved of the war that they
had started and then found they could not handle. They wanted to
transfer and thus preserve the agency's assets, including the
helicopters, to the bigger prospects in <ent type='GPE'>Vietnam</ent>.
So, in 1960, if Allen <ent type='GPE'>Dulles</ent> dropped the idea of moving his
assets from <ent type='GPE'>Laos</ent>, he would not only have lost those helicopters
back to the <ent type='ORG'>Marine Corps</ent> but he would have seriously jeopardized
the <ent type='ORG'>CIA</ent>'s undercover leadership role in the development of the war
in <ent type='GPE'>Vietnam</ent>, which it had been fanning since 1954.
This was a crucial decision for both the <ent type='ORG'>CIA</ent> and for those who
wished to contain the agency. If those who wished to put the <ent type='ORG'>CIA</ent>
genie back in the bottle had been able at that time to prevent the
move of those <ent type='ORG'>CIA</ent> assets into <ent type='GPE'>Vietnam</ent>, <ent type='GPE'>Dulles</ent> would have had to
disband them: helicopters, B-26 bombers from the <ent type='GPE'>Indonesia</ent>n
fiasco, tens of thousands of rifles and other weapons, C-46, C-54
and other <ent type='ORG'>Air America</ent>-supported heavy transport aircraft, U-2
operations over <ent type='GPE'>Indochina</ent>, radar and other clandestine equipment,
C-130's specially modified for deep <ent type='GPE'>Tibet</ent>an operations, and much
more. From the point of view of the <ent type='ORG'>CIA</ent>, the helicopters were
simply the tip of the iceberg, and the decision was its most
important in that decade.
Typically, in his unwitting <ent type='LOC'>Mother Superior</ent>-style, which
included bulldog tenacity, <ent type='GPE'>Dulles</ent> chose the route to the White
<ent type='ORG'>House</ent>. Here again he could rely strongly on Frank Hand. Working
with Hand in Erskine's office was the <ent type='ORG'>CIA</ent>'s other best agent, Major
General Edward G. Lansdale, who had long served in the <ent type='ORG'>CIA</ent>. Like
Hand, he had unequalled contacts in <ent type='ORG'>the Department</ent> of State and in
the <ent type='ORG'>White House</ent>. In support of <ent type='GPE'>Dulles</ent>, they contacted their
friends there and began a subtle and powerful move destined to
prepare the way for what would appear to be a decision by President
Eisenhower. This was an important feature of the "case study":
The *apparent* Presidential decision.
When the <ent type='ORG'>CIA</ent> wants to do something for which it does not have
prior approval and for which it does not have legal sanction, it
works from the bottom, using all of its guile with security and
"need to know"--a euphemism for "keep the scheme away from anyone
at any level of government who might stand in its way." Hand and
Lansdale, among others, were almost always able to line up enough
support in the right places to make it possible for the <ent type='ORG'>CIA</ent> to get
a favorable reading from the "<ent type='ORG'>Forty Committee</ent>" on any subject,
legal or not. In fact, this is the great weakness of such a
committee. Rather than working to control the agency it works the
other way. The procedure makes it possible for the agency to win
approval from a lesser echelon of the <ent type='ORG'>NSC</ent> intrastructure, and then,
by clamping on a security id, it makes others believe that the <ent type='ORG'>CIA</ent>
had orders from the <ent type='ORG'>NSC</ent> or perhaps even from the President, when in
fact it did not.
Thus it was that, about two weeks from the day that I received
that first call requesting the movement of the squadron of
helicopters, received word from General Erskine that he had been
"officially" informed that the <ent type='ORG'>White House</ent> (<ent type='ORG'>Forty Committee</ent>) had
approved the secret operation. The helicopters were moved into
<ent type='GPE'>Vietnam</ent>. They were the first of thousands.
The great significance of this incident is to point out how the
<ent type='ORG'>CIA</ent> works powerfully, deftly, and with great assurance at any level
of our government to get anything it wants done. But the anecdote
shows only the surface coating of the application of the <ent type='ORG'>CIA</ent>
apparatus.
One year earlier, in 1959, Frank Hand had directed a <ent type='GPE'>Boston</ent>
banker to my office. At that time I worked in <ent type='ORG'>the Directorate</ent> of
Plans in <ent type='ORG'>Air Force</ent> headquarters and my work was top secret. Few of
my contemporaries in the <ent type='ORG'>Pentagon</ent> knew that I was in charge of a
global U.S. <ent type='ORG'>Air Force</ent> system created for the dual purpose of
providing <ent type='ORG'>Air Force</ent> support for the <ent type='ORG'>CIA</ent> and for protecting the best
interests of the <ent type='ORG'>USAF</ent> while performing that task. My door was
labeled simply, "Team B"; yet that <ent type='GPE'>Boston</ent> banker knocked and
entered with assurance. Somehow he knew what my work was and he
knew that I might be able to help him.
In 1959 there were very few helicopters in all of the services,
and military procurement of those expensive machines was at an
all-time low. <ent type='ORG'>The Bell Helicopter Company</ent> was all but out of
business, and its parent company, <ent type='ORG'>Bell Aerospace Corp</ent>., was having
trouble keeping it financially afloat. Meanwhile, the shrewd Royal
Little, President of the <ent type='GPE'>Providence</ent>-based <ent type='ORG'>Textron Company</ent>, had a
good cash position and could well afford the acquisition of a
loser. <ent type='ORG'>Textron</ent> and <ent type='ORG'>the First National Bank</ent> of <ent type='GPE'>Boston</ent> got together
to talk helicopters. Neither one knew a thing about them. But men
in First <ent type='GPE'>Boston</ent> were close to the <ent type='ORG'>CIA</ent>, and they learned that the
<ent type='ORG'>CIA</ent> was operating helicopters in <ent type='GPE'>Laos</ent>. What they needed to know
now was, "What would be the future of the military helicopter, and
would the use of helicopters in <ent type='LOC'>South East Asia</ent> escalate if given a
little boost--such as moving a squadron from <ent type='GPE'>Laos</ent> to <ent type='GPE'>Vietnam</ent>?" The
<ent type='ORG'>CIA</ent> could tell them about that, and Frank Hand would be the man who
could get them to the right people in the <ent type='ORG'>Pentagon</ent>.
The banker from <ent type='GPE'>Boston</ent> phrased his questions as though he
believed that the helicopters in <ent type='GPE'>Laos</ent> were somehow operating under
the <ent type='ORG'>Air Force</ent>, and then went on to ask about their tactical
significance and about the possible increase of helicopter
utilization for that kind of warfare. This was at a time when not
even newspapers had reported anything like the operation of such
large and expensive aircraft in that remote war. We had a rather
thorough discussion and then he left. He called me several times
after that and visited my office a month or two later.
As the record will show, <ent type='ORG'>Textron</ent> did acquire the <ent type='ORG'>Bell</ent> Helicopter
Company and the <ent type='ORG'>CIA</ent> did step up use of helicopters to the extent
that one of the <ent type='ORG'>CIA</ent>'s own proprietary companies, Asia Aeronautics
Inc., had more than four thousand men on each of two bases where
helicopters were maintained. Most of those men were involved in
their maintenance--<ent type='ORG'>Bell Helicopters</ent>, no less!
Orders for Bel Helicopters for use in <ent type='GPE'>Vietnam</ent> exceeded $600-
million. Anyone wanting to know more about how the U.S. got so
heavily ($200-billion and the loss of 58000 <ent type='NORP'>American</ent> lives)
involved in <ent type='GPE'>Indochina</ent> need look no further. This was the pattern
and the plan.
At the present time, when the <ent type='ORG'>White House</ent>, the <ent type='ORG'>House</ent>, and the
<ent type='ORG'>Senate</ent> are all investigating the <ent type='ORG'>CIA</ent>, it is important to understand
the <ent type='ORG'>CIA</ent> and to put it all in the proper perspective. It is not the
President who instructs the <ent type='ORG'>CIA</ent> concerning what it will do. And in
many cases it is *not* even the Director of <ent type='ORG'>Central Intelligence</ent>
who instructs the <ent type='ORG'>CIA</ent>. The <ent type='ORG'>CIA</ent> is a great, monstrous machine with
tremendous and terrible power. It can be set in motion from the
outside like a programmer setting a computer in operation, and then
it covers up what it is doing when men like Frank Hand--the real
movers--put grease on the correct gears. And in a majority of
cases, the power behind it all is big business, big banks, big law
firms and big money. The agency exists to be used by them.
Let no one misunderstand what I mean. It was President Lyndon
B. Johnson who on more than one occasion said that the <ent type='ORG'>CIA</ent> was
"operating a damn <ent type='ORG'>Murder Inc</ent>. in the <ent type='NORP'>Carribean</ent>." In other words,
he knew it was doing this--and he was the President! This
knowledge has been recently confirmed by <ent type='ORG'>Defense</ent> Secretary James
Schlesinger (who is a former head of the <ent type='ORG'>CIA</ent>) and others by their
admission that they told the agency to end all "terminations." But
Lyndon Johnson was powerless to do anything about it. This is an
astounding admission from a President, the very man from whom, the
<ent type='ORG'>CIA</ent> says, it always gets its instructions.
The present concern over "domestic surveillance" and such other
lean tidbits--most important to you and me as they are--is not
important to the <ent type='ORG'>CIA</ent>. It can easily dispense with a James Angleton
or even a Helms or a Colby (just look at the list of <ent type='ORG'>CIA</ent> bigwigs
who have been fired--Allen <ent type='GPE'>Dulles</ent>, Frank <ent type='ORG'>Wisner</ent>, Dick Bissell, Dick
Helms, and now perhaps Colby); but the great machine will live on
while <ent type='ORG'>Congress</ent> digs away at the Golden Apples tossed casually aside
by the <ent type='ORG'>CIA</ent>--the supreme Aphrodite of them all. Notice that the
agency cares little about giving away "secrets" in the form of
cleverly written insider books such as those by Victor Marchetti
and Philip Agee. The <ent type='ORG'>CIA</ent> just makes it look as though it cared
with some high-class window dressing. Actually the real harm to
the <ent type='NORP'>American</ent> public from those books is to make people believe that
certain carefully selected propaganda is true.
In the story of Frank Hand we come much closer to seeing exactly
how the <ent type='ORG'>CIA</ent> operates to control this government and other foreign
governments. It is still operating that way. Today it is
President Ford who is the unwitting accessory.</p>
<div> * * * * * * * *</div>
<p> the following is taken from an article Fletcher Prouty wrote
for the February 1986 issue of "Freedom" magazine, entitled,
"Why <ent type='GPE'>Vietnam</ent>? <ent type='ORG'>The Selection and Preparation</ent> of the
Battlefield For <ent type='GPE'>America</ent>'s Entry into the <ent type='GPE'>Indochina</ent> War," Part
7 in a Series on the <ent type='ORG'>Central Intelligence</ent> <ent type='ORG'>Agency</ent>. i include
it to amplify on the curious visit Colonel Prouty received in
1959 from the vice president of <ent type='ORG'>the First National Bank</ent> of
<ent type='GPE'>Boston</ent> and how it demonstrates that</p>
<p> There was only one way that vice president of the First
<ent type='ORG'>National Bank</ent> of <ent type='GPE'>Boston</ent> could have come directly to my
office in the <ent type='ORG'>Pentagon</ent>. The <ent type='ORG'>CIA</ent> had sent him there.
This is one of the most important "truly confidential"
roles of the agency. The <ent type='ORG'>CIA</ent> is the best friend of the top
executives of <ent type='GPE'>America</ent>'s biggest businesses, and it works for
them at home and abroad. It is always successful in the
highest echelons of government and finance. . . .
Translated into everyday terms, Casey's <ent type='ORG'>CIA</ent>, as was Allen
<ent type='GPE'>Dulles</ent>' <ent type='ORG'>CIA</ent>, is one of the true bastions of power as a
servant of the <ent type='NORP'>American</ent> and transnational business and
financial community.</p>
<p> --ratitor</p>
<p> ______________________________________________________________________
| |
| Helicopters in <ent type='GPE'>Vietnam</ent> |
| |
| Toward the end of World War II, a small number of |
| helicopters made their appearance in military operations. |
| During the costly battle for <ent type='GPE'>Okinawa</ent>, in the summer of 1945, |
| General Joseph Stilwell--famed for his role as commander in |
| the <ent type='GPE'>China</ent>-<ent type='GPE'>Burma</ent>-<ent type='GPE'>India</ent> theater of the war--began to use an |
| early model of the Sikorsky helicopter as a"command car." |
| During the early 1950s, the Korean War gave the |
| helicopter industry a much needed boost and several models |
| were used there. After the Korean War, the use of |
| helicopters in all services was severely curtailed by high |
| costs of procurement and by the enormous amounts of time and |
| money required to keep them in operation. By 1959 almost |
| all helicopter manufacturers were broke, or at least on very |
| hard times. This included <ent type='ORG'>the Bell Helicopter Company</ent> in |
| <ent type='GPE'>Buffalo</ent>, New York. |
| The helicopters used on operational missions into <ent type='GPE'>Laos</ent>, |
| mentioned in this article, were the only military |
| helicopters anywhere in the world getting regular and |
| frequent tactical use. However, their very existence in |
| <ent type='GPE'>Thailand</ent> and their employment in <ent type='GPE'>Laos</ent> were secrets. They |
| had been moved from <ent type='GPE'>Okinawa</ent> to <ent type='GPE'>Thailand</ent> and were supported |
| by my office in the <ent type='ORG'>Pentagon</ent>. |
| One day, in 1959, a man entered my office to discuss |
| helicopters. |
| Because of the nature of the work my office was doing, |
| this was an infrequent event. Outside the door of the |
| office there was a small blue card that read: |
| |
| <ent type='ORG'>Air Force</ent> Plans |
| "Team B" |
| Chief--Lt. Col. L. F. Prouty |
| |
| That card by the door drew little attention, and it was |
| meant to be that way. Then how did this civilian visitor |
| from the outside world know that "Team B" was the place he |
| wanted to visit--for business purposes? |
| He introduced himself as a vice president of the First |
| <ent type='ORG'>National Bank</ent> of <ent type='GPE'>Boston</ent>. He said he was interested in the |
| tactical utilization of helicopters. Somehow he had been |
| directed to "Team B." "Team B" had been established in 1955 |
| to provide "military support of the clandestine activities |
| of the <ent type='ORG'>CIA</ent>." The use of helicopters in <ent type='GPE'>Laos</ent> was a |
| clandestine operation of the <ent type='ORG'>CIA</ent>. |
| My visitor knew quite a bit about the helicopters in |
| <ent type='GPE'>Thailand</ent>. He wanted to know if this utilization of large |
| helicopters on tactical missions was a harbinger of more |
| helicopters or was it simply a make-work project? Then he |
| got to the reason for his visit. |
| He said that the <ent type='ORG'>Textron Company</ent> of <ent type='GPE'>Providence</ent>, <ent type='GPE'>Rhode</ent> |
| Island, was a major customer of his bank. <ent type='ORG'>Textron</ent> was in a |
| good cash position and the bank was advising them to |
| diversify and acquire a marginally viable company for tax |
| purposes and with an eye to future value. |
| To <ent type='ORG'>the First National Bank</ent> of <ent type='GPE'>Boston</ent> the helicopter |
| business and specifically <ent type='ORG'>the Bell Helicopter Company</ent> in |
| <ent type='GPE'>Buffalo</ent> appeared to be a prime prospect on both counts. |
| <ent type='ORG'>Textron</ent> was interested. The only problem was the market. |
| Would there ever be an interest in and a need for |
| helicopters by the military, meaning in big numbers? The |
| <ent type='NORP'>Laotian</ent> operation was the only show in town. |
| Because of the role being played by my office in support |
| of the use of helicopters in <ent type='LOC'>Southeast Asia</ent>, I already knew |
| the <ent type='ORG'>Bell</ent> people well both in <ent type='GPE'>Washington</ent>, D.C., and <ent type='GPE'>Buffalo</ent>. |
| I knew Bill Gesel, the president of <ent type='ORG'>Bell</ent> Helicopter. I knew |
| they were competent, but in trouble for lack of orders. |
| I described the helicopter as a useful vehicle of limited |
| potential, but rather well suited for covert operations. In |
| simple terms, the helicopter was too costly for the regular |
| military budget, but, as a rule, covert operations had money |
| to burn. That was the kind of money helicopters needed. |
| Because of the trend of covert operations in <ent type='LOC'>Southeast Asia</ent>, |
| I believed the demand for helicopters would increase. |
| As events later transpired, <ent type='ORG'>the First National Bank</ent> of |
| <ent type='GPE'>Boston</ent>, of which this man was a vice president, was |
| instrumental in getting <ent type='ORG'>Textron</ent> to acquire the <ent type='ORG'>Bell</ent> |
| Helicopter Company. This was the beginning of the <ent type='ORG'>Textron</ent> |
| acquisition of <ent type='ORG'>Bell</ent> and of the great success <ent type='ORG'>Bell</ent> had in |
| selling helicopters for use in <ent type='GPE'>Indochina</ent>. As we all know |
| now, the <ent type='ORG'>Bell</ent> "Huey" helicopter was the unsung hero of the |
| struggle in <ent type='GPE'>Vietnam</ent>. Thousands were used there. |
| On one occasion, while I was at lunch at the <ent type='ORG'>Army</ent> and |
| <ent type='ORG'>Navy Club</ent> in <ent type='GPE'>Washington</ent>, Bill Gesel, still president of |
| <ent type='ORG'>Bell</ent>, came by my table and pulled a check out of his pocket |
| that was in the range of nine figures--hundreds of millions |
| of dollars. Needless to say, <ent type='ORG'>Bell</ent> was doing well. <ent type='ORG'>Textron</ent> |
| was doing well. The First <ent type='ORG'>National Bank</ent> of <ent type='GPE'>Boston</ent> had |
| earned its fees and, as a result, the remains of hundreds of |
| Hueys are scattered all over the countryside of <ent type='GPE'>Vietnam</ent>. |
| The Huey had become the famous "gun ship" of that war. |
| There was only one way that vice president of the First |
| <ent type='ORG'>National Bank</ent> of <ent type='GPE'>Boston</ent> could have come directly to my |
| office in the <ent type='ORG'>Pentagon</ent>. The <ent type='ORG'>CIA</ent> had sent him there. |
| This is one of the most important "truly confidential" |
| roles of the agency. The <ent type='ORG'>CIA</ent> is the best friend of the top |
| executives of <ent type='GPE'>America</ent>'s biggest businesses, and it works for |
| them at home and abroad. It is always successful in the |
| highest echelons of government and finance. |
| This is the way things were more than 25 years ago. You |
| may be assured these successes have not diminished under the |
| current director of central intelligence, William J. Casey, |
| a true friend of business. |
| During a speech, delivered in December 1979 before an |
| <ent type='NORP'>American</ent> Bar Association workshop on "Law, <ent type='ORG'>Intelligence</ent> and |
| <ent type='ORG'>National Security</ent>," Casey said that he would like to see the |
| <ent type='ORG'>CIA</ent> be a place "in the <ent type='GPE'>United States</ent> government to |
| systematically look at the economic opportunities and |
| threats in a long-term perspective, . . . [to] recommend, or |
| act on the use of economic leverage, either offensively or |
| defensively for strategic purposes." |
| Translated into everyday terms, Casey's <ent type='ORG'>CIA</ent>, as was Allen |
| <ent type='GPE'>Dulles</ent>' <ent type='ORG'>CIA</ent>, is one of the true bastions of power as a |
| servant of the <ent type='NORP'>American</ent> and transnational business and |
| financial community. |
| |
|____________________________________________________________________|</p>
<p>--
daveus rattus </p>
<p> yer friendly neighborhood ratman</p>
<p> KOYAANISQATSI</p>
<p> ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating. 5. a state of life that calls for another way of living.
</p></xml>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,190 @@
<xml><p> Host Element Fusion</p>
<p> Unpublished Work
Copyright (c) 1990
Earl Laurence Lovings</p>
<p>1. Proton (1 <ent type='ORG'>Hydrogen</ent> 1) Energy: 938.3 Mev = 1.007825 amu
2. Neutron (1 Neutron 0) Energy: 939.6 Mev = 1.008665 amu
3. <ent type='GPE'>Deuterium</ent> (2 <ent type='ORG'>Hydrogen</ent> 1) = 2.014102 amu
4. [(1 Neutron 0) + (1 <ent type='ORG'>Hydrogen</ent> 1) - electron] =
(939.6 Mev + 938.3 Mev - .511 Mev) = 1877.389 Mev =
2.015447128 amu
5. [(1 Neutron 0) - (1 <ent type='ORG'>Hydrogen</ent> 1) + electron] =
(939.6 Mev - 938.3 Mev + .511 Mev) = 1.811 Mev =
1.9441763 x 10 - 03 amu
6. (105 <ent type='ORG'>Palladium</ent> 46) = 104.905064 amu
7. (103 <ent type='ORG'>Rhodium</ent> 45) = 102.905511 amu</p>
<p>The host element fusion experiment begins with a <ent type='ORG'>Palladium</ent>
electrode submersed in <ent type='GPE'>Deuterium</ent>. A energy source is supplied,
which enables the fusion process to begin. My theory on this
subject is explained below:</p>
<p>The <ent type='GPE'>Deuterium</ent> atoms are allowed inside the <ent type='ORG'>Palladium</ent> electrode due
to the electric field on the electrode. Once the <ent type='GPE'>Deuterium</ent> atoms
are inside, the <ent type='GPE'>Deuterium</ent> causes the <ent type='ORG'>Palladium</ent> to become unstable.
This is done by this process:</p>
<p>[ (105 Pd 46 - (1 Neutron 0 + 1 <ent type='ORG'>Hydrogen</ent> 1 - electron) +
(1 Neutron 0 - 1 <ent type='ORG'>Hydrogen</ent> 1 + electron)] or,
[ 104.905064 amu - 2.015447128 amu + 1.9441763 x 10-03 amu] =
102.8916 amu.</p>
<p>The closest element <ent type='ORG'>Palladium</ent> can try to become stable is
(103 <ent type='ORG'>Rhodium</ent> 45).</p>
<p>Take <ent type='ORG'>Palladium</ent>'s new mass and subtract it with <ent type='ORG'>Rhodium</ent>'s mass.
(103 <ent type='ORG'>Rhodium</ent> 45) - 102.8916 amu, or
102.905511 amu - 102.8916 amu = 1.394653 x 10-02 amu.</p>
<p>To find out how many electrons that is equivalent to:
(1.394653 x 10-02 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
25.42309 electrons</p>
<p>This is the amount of electrons required to be ionized to enable
host element fusion with <ent type='GPE'>Deuterium</ent>. </p>
<p>That is the first process of host element fusion. </p>
<p>The second process begins when the ionized electrons from the
palladium atom shields the deuterium atoms to allow host element
fusion.</p>
<p> The Equation:</p>
<p>Q = [(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) + (25.423 e) -
(1877.389 Mev) + (1.811 Mev) - (2 <ent type='ORG'>Hydrogen</ent> 1)] x 931.5 Mev or,</p>
<p>Q = [(2.014102 amu + 2.014102 amu + .01394653 amu - 2.015447 amu
+ 1.944176 x 10-03 amu - 2.014102 amu)] x 931.5 Mev</p>
<p>Q = 13.55 Mev</p>
<p>You must realize for this process to work for host element fusion,
you have to have a host element before <ent type='GPE'>Deuterium</ent> will fuse.
My equation also theoretically works for known <ent type='GPE'>Deuterium</ent> fusion
processes.</p>
<p> Known Equation:</p>
<p>1. [(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1)] -&gt; (3 Helium 2) +
(1 Neutron 0)] = or,</p>
<p> [(2.014102 amu + 2.014102 amu - 3.016030 amu - 1.008665 amu) x
(931.5 Mev/amu)] = Q = 3.27 Mev</p>
<p>My Equation: </p>
<p>Host Element = (3 Helium 2) + (1 Neutron 0)
[(3 Helium 2) + (1 Neutron 0) - 1877.389 Mev + 1.811 Mev] =
[3.016030 amu + 1.008665 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.011192 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 <ent type='ORG'>Hydrogen</ent> 1)</p>
<p>(2.014102 amu) - 2.011192 amu = 2.909899 x 10-03 amu excess mass
convert to electrons</p>
<p>(2.909899 x 10-03 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
5.304445 electrons</p>
<p>Now the fusion of <ent type='GPE'>Deuterium</ent> atoms
[(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) + 5.30444e - 1877.389 Mev
+ 1.811 Mev - (2 <ent type='ORG'>Hydrogen</ent> 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.909899x10-03 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu)</p>
<p>Q = 3.27 Mev</p>
<p> Known Equation:</p>
<p>2. [(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) -&gt; (4 Helium 2)] = or,
[(2.014102 amu + 2.014102 amu - 4.002603 amu)] x
(931.5 Mev/amu) = Q = 23.85 Mev
My Equation: </p>
<p>Host Element = (4 Helium 2)
[(4 Helium 2) - 1877.389 Mev + 1.811 Mev] =
[(4.002603 amu - 2.015447 amu + 1.944176x10-03 amu)] = 1.9891 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 <ent type='ORG'>Hydrogen</ent> 1)</p>
<p>(2.014102 amu) - 1.9891 amu = 2.500188 x 10-02 amu excess mass
convert to electrons</p>
<p>(2.500188 x 10-02 amu x 931.5 Mev/amu) /(.511 Mev/electrons) =
45.57585 electrons</p>
<p>Now the fusion of <ent type='GPE'>Deuterium</ent> atoms
[(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) + 45.58 electrons - 1877.389 Mev
+ 1.811 Mev - (2 <ent type='ORG'>Hydrogen</ent> 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 2.500188x10-02 amu - 2.015447 amu
+ 1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =</p>
<p>Q = 23.85 Mev</p>
<p> Known Equation:</p>
<p>3. [(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) -&gt; (3 <ent type='ORG'>Hydrogen</ent> 1) +
(1 <ent type='ORG'>Hydrogen</ent> 1) = or,</p>
<p>[(2.014102 amu + 2.014102 amu - 3.016050 amu - 1.007825 amu)] x
(931.5 Mev/amu) = Q = 4.03 Mev</p>
<p>My Equation: </p>
<p>Host Element = (3 <ent type='ORG'>Hydrogen</ent> 1) + (1 <ent type='ORG'>Hydrogen</ent> 1)
[(3 <ent type='ORG'>Hydrogen</ent> 1) + ( 1 <ent type='ORG'>Hydrogen</ent> 1) - 1877.389 Mev + 1.811 Mev] =
[3.016050 amu + 1.007825 amu - 2.015447 amu + 1.944176x10-03 amu]
= 2.010372 amu</p>
<p>The element whose mass is closest to the new unstable "element" is
(2 <ent type='ORG'>Hydrogen</ent> 1)</p>
<p>(2.014102 amu - 2.010372 amu) = 3.729582x10-03 amu excess mass
convert to electrons</p>
<p>(3.729582x10-03 amu x 931.5 Mev/amu)/(.511 Mev/electrons) =
6.798641 electrons</p>
<p>Now the fusion of <ent type='GPE'>Deuterium</ent> atoms
[(2 <ent type='ORG'>Hydrogen</ent> 1) + (2 <ent type='ORG'>Hydrogen</ent> 1) + 6.799 electrons - 1877.389 Mev
+ 1.811 Mev - (2 <ent type='ORG'>Hydrogen</ent> 1)] x 931.5 Mev =
[(2.014102 amu + 2.014102 amu + 3.7296x10-03 amu - 2.015447 amu +
1.944176x10-03 amu - 2.014102 amu)] x (931.5 Mev/amu) =
Q = 4.03 Mev</p>
<p> Known Equation:</p>
<p>4. [(1 <ent type='ORG'>Hydrogen</ent> 1) + (1 <ent type='ORG'>Hydrogen</ent>) -&gt; (2 <ent type='ORG'>Hydrogen</ent> 1) +(electron)=
[(1.007825 amu + 1.007825 amu - 2 electrons - 2.014102 amu)]
x (931.5 Mev/amu) = Q = .42 Mev</p>
<p>My Equation:</p>
<p>Host Element = (2 <ent type='ORG'>Hydrogen</ent> 1)
[(2 <ent type='ORG'>Hydrogen</ent> 1) - 1877.389 Mev + 1.811 Mev] =
[(2.014102 amu - 2.015447128 amu + 1.9441763x10-03 amu)] =
5.990302x10-04 amu</p>
<p>The element whose mass is closest to the new unstable "element"
is (1 <ent type='ORG'>Hydrogen</ent> 1)</p>
<p>(1.007825 amu - 5.990302x10-03 amu) = 1.007226 amu excess mass
convert to neutrinos</p>
<p>(1.007226 amu x 931.5 Mev/amu) / (.42 Mev/neutrinos) =
2233.884 neutrinos</p>
<p>Now the fusion of 1 <ent type='ORG'>Hydrogen</ent> 1 atoms</p>
<p>[(1 <ent type='ORG'>Hydrogen</ent> 1) + (1 <ent type='ORG'>Hydrogen</ent> 1) + 2234 neutrinos - 2 electrons
- 1877.389 Mev + 1.811 Mev - (1 <ent type='ORG'>Hydrogen</ent>)] x 931.5 Mev/amu =
[(1.007825 amu + 1.007825 amu + 1.007226 amu - .001097 amu
-2.015447128 amu + 1.9441763x10-03 amu - 1.007825 amu)]
x 931.5 Mev/amu = Q = .42 Mev
</p></xml>

View File

@ -0,0 +1,681 @@
<xml><p>
The Computational Self
by Robert M. Galatzer-Levy, M.D.
180 North Michigan Avenue
<ent type='GPE'>Chicago</ent>, <ent type='GPE'>Illinois</ent> 60601
CIS PPN 722551101
This is a paper original delivered at the First Annual Mathematics
and Psychoanalysis Meeting in <ent type='GPE'>New York</ent>, N.Y. on June 6, 1988. Any
comments are very welcome.
What I have to say today is more by way of posing a problem
and indicating an area where I suspect the solution to lie than a
coherent presentation of a new theory. I am going to talk about
some elementary ideas from a branch of psychoanalysis called self
psychology and some elementary ideas from computer science that
seem to me to provide a framework for thinking about the self of
self psychology and then invite you all to let me know whether what
I have said has made sense and whether you can see directions for
the development of these notions.
Freud's effort to explain mental life on the basis of drives
that are the psychological representations of biological
disequilibria fell on hard times as he tried to work out the theory
in detail. He introduced a new entity, the ego, dangerously close
to a homunculus within the mind, that performed certain functions
and vigorously protected itself from being "overwhelmed" or
traumatized. The ego's functions included managing the persons
relation to reality, regulations of drives, object relations,
thought processing, defensive functions, perceptions and motor
activity, and integration of all other psychological functions -
its so called synthetic function.
The concept of the ego became the center of <ent type='NORP'>American</ent>
psychoanalytic theory in the forties ,fifties and sixties. Despite
heroic, rigorous efforts to sharpen the terms's meaning, the
confusion Freud left between the ego and the subjective experience
of the self continued. This persistent confusions was not merely
the result of intellectual sloppiness. Nor was it, as Bruno
Bettleheim proposes, the result of Freud's English translators'
discomfort the soul-like implications of the Freud's original idea.
The difficult is more fundamental. The terminologic and theoretic
confusion reflected a clinical reality.
It often happens that people who functioned badly in the areas
called "ego functions" also have major disturbances in their
experience of the self and that the two types of difficulty are
exacerbated or diminished in concert. The idea of the ego as a
unitary entity is not just as a convenient, if confusing, name for
the set of functions described earlier, a sort of waste basket for
what is neither id nor superego. The term reflect the commonly
observed covariation in these functions.
The systematic exploration of the self experience began in
psychoanalysis in the years following the second world war, though,
of course the concept of self has been the object of study since
the dawn of civilization. Although he had significant
psychoanalytic precursors, notably in the work of Paul Federn, Erik
Erikson was the first to propose that the core of much
psychopathology lies in disorders of self experience. Erikson's
concept of identity, which amalgamated the many sources of beliefs
about who one is is both evocative of common experience and proved
clinically useful. Many kinds of difficultly, as well a normal, and
supernormal psychological development can be usefully explored as
experiences of loss or diffusion of identity or attempts to
establish a satisfactory identity where one was lacking.
Erikson's work is problematic from a psychoanalytic point of
view for two reasons. First, reading Erikson carefully one
discovers that his wonderful portrayal of emotional states through
imagery, metaphor and clinical detail is not matched by explicit,
clear theoretical formulations. Second, his writings often focus
on external environmental effects rather than people's
psychological worlds and the manner of their construction.
Erikson never systematically described his therapeutic
approach to his patients. However, it is clear that he consistently
placed a positive connotation on his patients' struggles. He
demonstrated how manifest psychopathology could be understood as
potentially successful attempts to achieve valuable identities,
that while there might be difficulties in the way the patient's
basic project and his ways of attempting to accomplish it were
closer to healthy development than the patient or the society might
recognize. Erikson's psychobiographical studies of Luther, Gandhi,
Hitler and Shaw are messages to readers, many of them young, about
the value of their struggles to form workable identities. Erikson's
implicit view is that an appreciative stance toward the patients'
struggles which include or dominated by external realities is
therapeutic.
In the years following the second world war Harry Stack
Sullivan, observed that the experience of the self of many of his
schizophrenic patients was grossly disturbed. Borrowing from the
<ent type='GPE'>Chicago</ent> School of Sociology, most notably George Herbert Mead,
Sullivan conceptualized the self as a summation of social roles,
some of them retained without full awareness from archaic periods
of development. In this "interpersonal theory" of psychology
pathology resulted from a self system that was internal incongruent
or problematic in terms of the environment. Therapeutic
intervention consisted in understanding and appropriately revising
the self system in the light of more mature and current
understanding. What is central to our discussion is Sullivan's view
that the self system was both the product of the external
environment and made no sense whatever outside of a social system.
Several analysts, notably Klein, Winnicott, Khan, Fairburn,
Bion, Spitz, and <ent type='ORG'>Modell</ent> emphasized the role of holding environment,
environmental container or the "mother" in the development of the
self. From their very different perspectives each emphasized how
the self's growth required an external situation of being "held"
as the emerging and vulnerable self gained strength and autonomy.
People whose psychopathology centered in problematically self
development, a condition that all these authors equated with
difficulties in the first two years of life, could work out their
problems if provided with an analytic situation that allowed them
to reengage those phases with the analyst experienced as the
archaic maternal environment of that era. Some of these analysts
believed, like Melaine Klein, that these very early situations
involved inherent conflicts that now be resolved through
interpretation in analysis. Others like Donald Winnicott held that
new experiences, "beyond interpretation," with a good-enough object
were needed so that the developmental failure could be righted
through new development. The theoretical formulations of many of
these authors was either so inherently fantastic, or so abstruse,
or so unsystematic that their work has had relatively little
influence on psychoanalytic theory beyond the range of their
immediate followers. It is only now being integrated into the
mainstream of psychoanalytic thought.
Margaret Mahler and her coworkers also concerned themselves
with he early development of the self. They centered their
attention on the era of late toddlerhood that involved the
difficulties of the child emerging from a state they called
"symbiosis" in which the experience of the self includes the care
taking environment into a state of being an individual in one's own
right. Based on treatment experiences with youngsters and adults
who seemed to have difficulties in the area of the self experience
and observations of toddlers, which unfortunately were dominated
by their preexisting theory, Mahler and her group concluded that
much of the difficulty in self experience arose from a failure to
adequately separate from the mother of infancy. Although there are
many well informed analysts who would disagree with me, I will
assert that the overwhelming data of infant and later developmental
studies demonstrate that Mahler's symbiotic phase is not part of
normal development nor is separateness, in the sense she meant it,
characteristic of ordinary or healthy more mature psychological
function.
However the clinical observations that lead to Mahler's
thinking and that have been explained in terms of her theories are
certainly common. That is, there are many people who seem to have
shaky experiences of themselves and function with a conflicting
notions that on the one hand they desperately need other people if
they are to function at all reasonably and that some core aspect
of themselves is in danger precisely in these urgently needed
interactions.
Starting in the sixties in <ent type='GPE'>Chicago</ent> Heinz Kohut initiated a
psychoanalytic study of disorders of the self. His approach to
these researches was methodologically distinct and is worth a
moment's pause. First he took a radical position, that he claimed,
incorrectly at the time, to be a standard one, that psychoanalytic
data was collected in a manner different from that of the natural
sciences. He asserted that it is possible and usually to
immediately comprehend complex psychological configurations in
others and that such understanding ordinary mode of operation of
the working analyst. Empathy for other's internal states, as a mode
of comprehension, was, for Kohut, similar to the way we perceive
faces - as a complete and immediate gestalt. Analytic training and
technique are designed to maximize the analyst's ability to use
this investigative tool and to overcoming its pitfalls, just a
training in microscopy enables us to vastly extend ordinary visual
capacities. While Kohut claimed to be making explicit what everyone
did anyway, his position, right or wrong, was deeply antithetical
to Freud's view of psychoanalysis as a natural science-like
investigation and also Hartman's explicit statements that empathy
in the sense that Kohut meant it had no appropriate role in
psychoanalytic investigation.
A second, and less problematically, position about
psychoanalytic investigative method was Kohut's position on
transference. In his early writings on self psychology Kohut
assumed that the only data to be taken seriously in psychoanalysis
were the data of the transference. The various stories the patient
told, the analyst's conceptual framework and responses and all the
other stuff the analyst commonly use to frame a picture of the
patient's psychology was of minimal importance compared to the job
of describing and understanding the interaction between patient
and analyst. Kohut also believed that premature interpretations to
the effect that the patient was avoiding knowing something about
himself often interfered with the full blossoming of the
transference. According to Kohut, premature interpretations,
particularly premature interpretations of defense often resulted
in the analyst discovering evidence that confirmed their
preexisting notions because they misunderstood possibly contrary
clinical facts as representative of the patients' avoidance of
already known realities.
Using empathy and the exploration of transference as their
primary tools, Kohut and his students treated a group of patients
whose distress took three overlapping forms. One group of patients
suffered from feelings of depletion, emptiness, triviality and/or
fragmentation. These experiences often took symbolic expression in
the form of hypochondriasis. Another set of patients were engaged
in activities that seemed enormously driven or addictive such as
sexual promiscuity and perversion, shop lifting, desperately
clinging relations to other people and substance abuse. Finally,
some of the patients had chronic and acute states of tantrum like
rage.
In analysis, at least as conducted by Kohut and his followers,
these patients developed characteristic attitudes to the analyst
that Kohut labeled selfobject transferences. Characteristically,
often against considerable internal resistance, these patients came
to experience the analyst as essential to their well being. His
physical or psychological absence variously precipitated great
distress and/or the reemergence of symptoms that had been
previously remitted. For example, a young man who had entered
analysis much distressed by his promiscuous homosexual behavior
reported what for him was a major business success during a
session. The analyst, noting that the patient's anxiety had
interfered with an even greater accomplishment, made the plausible
interpretation that the patient had inhibited himself from doing
even better because he experienced his business competitor as like
the analyst and feared the analyst's reprisal if the patient beat
him in competition. The interpretation was bolstered by several
significant details that made it plausible and the patient thought
it was "right on the mark" and promised "to try to do better next
time." Retrospectively he said he had felt irritable and "headachy"
during and immediately after the interpretation was given. That
evening he returned to a gay pornographic movie theatre were there
was much sexual activity among the patrons. Before the analysis
this was one of his regular haunts but he had stopped patronizing
the theatre many months before. The patient allowed several men to
perform fellatio on him. He felt angry and painfully excited as he
thought the fallators really appreciated what he had. In response
to what he felt was the analysts inadequately appreciative response
the patient had desperately turned to a more concrete indication
that someone could appreciate his accomplishments. Another patient
experienced every weekend as "like being sent away to live in the
<ent type='LOC'>Sahara</ent> in a desert" and the return to the analysis as "like coming
back to the oasis."
When their feelings are not interrupted these patients like
these experience the analyst in characteristic ways that Kohut
described with oversimplifying systemticity. Some patients
idealized the analyst seeing in him the embodiment of strength and
good and feeling alive and whole in his presence. Others find
relief in the sense of being in a unity with their analyst, or
being like him or being appreciated by him. Interruptions in these
states of mind commonly bring with them inordinate distress or
symptoms which could be reasonably understood as experiences of a
fragmented or devitalized self or attempts to avoid those
experiences.
From these clinical experiences Kohut posited that there were
a group of people for whom the maintenance of a satisfactory self
experience was centrally important because it was so problematic.
The analyses of these patients was characterized by the use of the
analyst to maintain the a cohesive and vital self by using the
image of the analyst as part of the self or as a support for the
self. Any interruption in the capacity to use the analyst in this
manner lead to the reemergence of problems in this area. The
situation within the analysis was equated with postulated normal
developmental states in which the caretaker ordinarily performs the
functions for the self. These functions Kohut called selfobject
functions and he believed his patients to be suffering from
disorders of the self resultant on traumatic failures of early
selfobject functions. As in normal development small, empathically
supported, failures in the selfobject function allow patients to
identify with the image of the way the analyst should have
functioned and to make those functions more their own. However
mental health does not consist in giving up self objects. Kohut
asserted that selfobject functions normally continue across the
course of life and that it is their qualities, not their existence,
that is altered with maturity. (Having made this assertion Kohut
never elaborated or demonstrated it. Recently Bertram Cohler and
myself have undertaken the task of exploring the empirical evidence
for Kohut's position.)
Kohut's findings, and the findings of many of those who have
examined the psychology of the self from other viewpoints, have
been questioned in too apparently distinct ways, whose
interconnection I will show you in a moment.
The first objection is that Kohut's theories serve to avoid
painful psychological truths. Many of the phenomena Kohut observed
had been observed previously and classified as defensive
operations. For example, idealizations of the analyst were commonly
understood as ways both to avoid knowing of the unconscious
demeaning of the analyst and to arrange for disappointments when
the analyst fails to live up to the idealization as he inevitably
must. The idea that the patient "needs" the analyst to function in
some certain fashion lest his core being be seriously damaged could
be understood as a fantasied misunderstanding designed to
rationalize wishes whose non-fulfillment may be extremely
frustrating but not inherently, must less psychologically fatally,
damaging.
The second set of objections has to do with the theory of the
self. Kohut never clearly defines his central concept of the self.
Essentially he says that everyone knows from experience what the
self is and leaves it at that. After studying the many discussions
of the meaning of the "self" in the psychoanalytic literature one
is reminded of the Buddha's comments on the self. He said that
those who believe in the self are like "a man who says that he is
in love with the most beautiful woman in the land, but is unable
to specify her name, her family or her appearance" (Digha Nikaya
I 193, quoted in <ent type='ORG'>Carrithers</ent> (1983).) The essential theoretical
difficulty was clarified by Meissner who pointed out that the term
self as habitually used by Kohut and most other writers whose work
places the self at the center of psychological life, is
consistently used to refer to both a psychological representation
and also a psychological agent. Although more systematic
researchers, for example Hartman, limit the concept of self to a
psychological representation of the person, they also give the self
a markedly subsidiary role in psychology. Meissner's argument is
quite similar to Schafer's later discussions of internalization in
which Schafer observed that the elaborate analytic theories of
internalization were in fact nothing more then the translation into
psychoanalytic jargon of unconscious fantasies and did not, in his
view represent, represent actual psychological mechanism and in
fact obscured, what actually happens when we have experience that
had been described as the taking in of another person or aspects
of that person.
The two problems with self psychology, its use as a defense
against painful insight and its confusion of agent and image, are
related. Notice that if the self is "only" a psychological
representation it would follow that the patient's idea that had
will be dysfunctional as a direct result of some impairment in this
representation seems mistaken - or at least so it seemed to many
thoughtful psychoanalysts. Only the impairment of some mental
agency could really result in dysfunction. It was if the patient
complained that his car did not function because part of a picture
of the vehicle had been obliterated. The idea that the patient is
in error in this regard supports the clinical stance that the
patient's fears in these matters are not an accurate assessment of
the situation but rather fantasies motivated by their unconscious
desires to hide deeper psychological realities.
Now of course we all know that there are "mere"
representations that are very good for actually doing things and
whose faultiness causes no end of problems. These representations
are called programs.
Now, I suspect that once stated the notion that the self is
a program which like other programs is capable of change by
altering its representation and at the same time is an active agent
is neither a surprising or remarkable idea. However, when one
notices that fifty years or so of both clinical and theoretic
psychoanalytic thinking about the self has been profoundly
influenced by the idea that the existence of such an object is a
logical impossibility the point seems more worth making. The other
advantage of making this point is that it invites us to use what
we know about programs to think about the self and suggests the
systematic characterization of the self as a program.
Let us begin the selfobject function whose enemies are want
to equate it with some form of mysticism. We know, of course, that
programs have meaning and function only within computational
environments. An inappropriate computational environment can alter
the meaning and operation of the program or render it altogether
meaningless. For example a routine that calls a global variable
gives a different value depending on the value of that variable;
a program written in C for which one has no compiler is totally
useless. The use of the term "computation environment" in computer
science is relative to the process being discussed and only has
meaning once one specifies what program is being referred to. An
expression only has meaning within an environment. Having bound a
global variable that value then becomes part of the computational
environment of the programs running within that context. Of course
from a different viewpoint the program that sets up the environment
for our first program itself has an environment. Thus ordinarily
we expect that program will "need" appropriate environments in the
same way that self psychology predicts that people need
selfobjects.
What one chooses to call program and what environment
obviously effects the picture of the situation that emerges and is
a function of the interest of the investigator. Similarly the
boundaries of the self depend on the point of view we adopt based
on the focus of our interests. It is only important to notice that
the choice is ours, not intrinsic to the system under study and
that it is important not to become confused about the principles
governing the entities we have defined. A few decades ago von
Bertalanfy made a minor industry of pointing out the inappropriate
application of conservation principles to "open" systems that were
mistakenly treated as having no energy flux across their
boundaries.
The mechanics of the selfobject or the environment is
naturally important but by no means definitive in terms of its
function. In one since it is obviously of considerable importance
whether a subroutine that is called is available in <ent type='ORG'>RAM</ent>, is
currently located on a easily accessed storage device or is located
on a tape that the machines operator must fetch and mount before
it can be used. In another sense these mechanical considerations
are of minor importance in our understanding of the program.
Likewise whether the capacity to be soothed is a readily available
group of psychological functions represented within the cranium,
the activity of a caretaker who is but a cry away or requires some
elaborate undertaking - say a few years of psychoanalysis - can be
regarded as involving no essential difference in this function.
Although he never would have put it in this way this is an
essential aspect of what Kohut was trying to point to in the idea
of the selfobject - something that functions as an essential aspect
of the self or of the support of the self but which because of the
mechanics of its availability is at times less efficiently
accessible than other aspects of the self that we are more
accustomed to including in our idea of the self. This computational
relative inaccessablity commonly is associated with the need for
particular perceptual inputs and computational assistance.
For instance the phenomenon of "social referencing" has been
studied extensively from a social psychological point of view.
Starting at about age seven months given a novel situation or a
situation with elements that suggest danger babies look to
caregivers for cues about whether to proceed and base their actions
on the caretaker's response. Toddlers as they move away from mother
in a play ground frequently turn around, checking mother's
expression before proceeding further. In the toddlers experience
the decision does not take its basis in the issue of whether
mother, as a person approves or disapproves of the action, rather
the mother's approving response registers as an impersonal "It is
okay." The toddler has not called the person "mother" in this
situation but has rather expanding his computational resources
which happen at the moment to be located in the being we would
refer to as his mother. The child needs loves nor hates the mother
in this context but does need her to function. If she is
functioning well like any computational resource he remains unaware
of her presence. It is only her failure of availability that makes
her of interest, just as we are generally unaware of our memories
except when we have difficulty recollecting something we need to
continue our thinking.
Those of you familiar with Marvin Minsky's work recently
summarized in <ent type='ORG'>The Society</ent> of Mind will recognize in these ideas a
particular application of the multi-hierarchy computational model
that can be used to explore processing within many levels of human
function from neurons to societal organizations. The issue of a
non-pejorative attitude to what we call mysticism comes to mind
here. Much of what is referred to as mystical might well be
considered as attempts to comprehend hierarchically higher
computational structures within the computational world of lower
order entities.
The self as a program does two important things that are the
subject of our constant attention in our analytic work. The program
monitors its own operation and ordinarily modifies itself in
response to such monitoring. The type of programs we are familiar
with in daily work with computers generally have facilities to
monitor and modify their own execution to a limited extent. Error
trapping of one type or other is virtually universally employed so
that unexpected or undesirable situations do not result in the
continuation of "business as usual" but instead lead to some kind
of branching in the process. In an "error" situation the new
execution often takes the form of enlarging the computational
environment to include the operator who is asked how to proceed or
to correct some situation that impedes the computation or to
authorize the use of additional computational resources. For
example if the execution of a program requires more than a certain
amount of time the systems operator may be asked whether to
continue or abort the execution.
Similarly, but much more extensively, the self is engaged in
a constant process of monitoring its own function and functional
needs, arranging for them to be met or attempting to compensate for
their not being met. We have already implicitly discussed the
ongoing monitoring of computational resources and the recognition
of the need to evoke devices such as the perception of other people
to serve as selfobjects. The detailed study of the nature,
functions and situations in which these additional computational
devices are called or where calls to such devices is avoided
constitutes a major area of psychoanalytic investigation that
encompasses much of object relations theory, including self
psychology, attachment theory, the concept of the transitional
object and the role of cultural experience.
In the von <ent type='ORG'>Neumann</ent> architecture computer design was dominated
by the wish to avoid programming errors. This was accomplished by
carefully separating data, programs and processing functions and
forcing sequential processing so that except in terms of the
overall duration of computation the outcome of a computation was
unaffected by the time required for each computational step.
Furthermore building this basic architecture requires the
anticipation at least the basic architecture of the system from
its beginning. It cannot result of the evolutionary piecing
together of elements designed for other functions as the brain must
have evolved.
The von Neuman architecture is so excellent an environment for
humans to design programs for that it dominated computer design for
almost four decades. However as von <ent type='ORG'>Neumann</ent> noted from early on
this architecture is a poor model for brain functioning. The
microsecond firing times of neurons are much to slow to allow
brains to do the things they do all the time with a von <ent type='ORG'>Neumann</ent>
machines. Furthermore brains are the result of a bioevolutionary
process, not a unitary design and its programmer is not an
individual who sets out to explicitly specify processes but an
environment with many other things on its mind than programming
brains. Of course we know from direct study of brains that they
operate through massively parallel processing.
Fortunately for those of us interested in brains and their
productions it has become clear that the technological limitations
inherent in the von <ent type='ORG'>Neumann</ent> architecture make it essential that
other architectures be explored in depth to make more capable
computers. The last five years has seen an explosion of
publications about parallel processing architecture and we will be
among the beneficiaries of the resultant intellectual advances.
But, of course, the problems that von <ent type='ORG'>Neumann</ent> sought to avoid
in computer design are precisely the problems that emerge in
parallel processing. It is simply much more difficult to predict
what is going to happen when things do not go on sequentially, when
the distinction between memory and processing is abandoned and
simple hierarchies of bindings are abandoned. Now rather then
building the absence of these difficulties into the architecture
of the system it becomes necessary to discover ways to overcome
them. A much more elaborate system of error trapping and control
becomes essential.
<ent type='ORG'>Parallel</ent> systems are highly vulnerable to internal conflicts
and instabilities. Attempts to remove these features from the
system usually entail the loss of precisely what has been gained
through parallelism. To give an very elementary but quite everyday
example, when a database can be updated through several different
inputs there is considerable danger that attempting simultaneous
updating of a record will result in loss of data or undesirable
results. Suppose I am making a deposit in my savings account at the
same time that interest is being calculated and recorded in the
same record. In many database systems the entire record is
retrieved updated and stored again. So in this instance the
original record is retrieved by both the deposit and the interest
function. Each, independently updates the record and then writes
it to the storage device. Either the deposit or the interest
payment, whichever is stored last, will be recorded but not both.
A simple solution that is used in many database systems is to make
the record available to only one potential input at a time by
locking it to other users while it is in the hands of a potential
inputter. In essence one suspends parallel processing and goes to
sequential processing in the face of such potential errors. This
is an awful solution for simple database management, although as
anyone who has worked with such a system knows it can be thoroughly
annoying. But such a general solution for a massively parallel
system would slow the whole thing to a snails pace. Thus special
mechanism for recognizing, protecting against and resolving
conflicts are expected to be a central aspect of massively parallel
system.
But notice how close we have gotten to the ordinary stuff of
psychoanalytic clinical work. A lot of what we do in analysis has
to do with successes and failures to resolve conflicts between
computational results achieved through parallel processing of
situations. To give a much oversimplified instance, a young man
who might displace a supervisor by putting forward his own ideas
expresses them but muddles their presentation. Analysis reveals
that his actions result from two parallel, conflicting computations
and an attempt to resolve that conflict. On the one hand are a
variety of factors including his wish for greater prestige and
material wealth that in turn reflect a long sequence of
developmental processes and on the other his assumption (which is
outside of awareness) that he will be harmed in various ways if he
pursues these wishes results in a state of conflict. This conflict
and potential conflicts are dealt with variously by some higher
order resolutions or through the isolation of the processes from
one another by a variety of means. The resulting action,
unfortunately called a "compromise formation" in psychoanalytic
jargon is an attempt to synthesize the results of these two groups
of computations.
An even greater danger to the system than partially
contradictory computational results is its own instability.
Computational process may become chaotic, disorganized or pass
through a catastrophe as we recognize in depth when we study them
in terms of dynamical systems. It is reasonable to expect that a
computational system can only function in anything like a
satisfactory manner if such situations is rigorously limited to
lower levels of function and if the system has extensive safeguards
against higher level catastrophes or chaos.
Again this is precisely what we find clinically. The most
central concerns in disorders of the self frequently are concerns
about discontinuous and disorderly change. A typical error trapping
procedure in the area where catastrophic change seems a danger is
to avoid all change whatsoever and to attempt to isolate the
computational processes from outside influences that might result
in change. Recently I described how the process of working through
in psychoanalysis, the repeated reexamination if slightly different
versions of paradigmatic situations within an analysis, could
usefully be regarded as the reestablishment of a Boltzman
algorithm-like psychological function by which existing "solutions"
are repeatedly and automatically reexamined both to achieve greater
optimality and to integrate data that may have been unavailable at
the time they were formed. I said that much psychopathology could
be usefully characterized as the interruption of this ordinary
process in the face of a perceived threat of disruption or
disorganization and that what we often think of as the curative
factor of working through is just the resumption of normal
psychological function.
This brings us to the third way in which the self differs from
the programs we are most familiar with from the study of computers.
The self is self developing. Here my opinions are somewhat
different from many of my psychoanalytic colleagues, so let me
spell them out briefly. As she attempted to explore the concepts
of normality and pathology in childhood, Anna Freud discovered that
the presence or absence of symptoms per se was not an adequate
guide in assessing children. She concluded that childhood was
normatively a period of change and development and these were its
primary tasks. The failure of such for such development to be
ongoing was the essence of psychological disturbance in childhood.
For Anna Freud, who had a clear picture of what psychological
health was like in adulthood, the task of childhood was move toward
such mature functioning and she posited a drive to "the completion
of development."
Three groups of observation impressed me into extending her
notion. First the past quarter century has yielded a massive
demonstration that human development normal continues across the
entire life course - that the idea of a definite mature
developmental state whether occurring with the resolution of the
<ent type='ORG'>Oedipus</ent> complex or the end of late adolescence or whenever else is
mistaken. Second there seem to be quite diverse ways to be
psychologically healthy which becomes readily apparent if we avoid
employing a priori notions of the meaning of health. Finally the
work begun by Marsh to the effect that programs can be written not
with specific goals in mind but rather that proceed to explore and
develop in area that are vaguely defined by such criteria as
"interestingness" corresponded so well to the observations of
workers like <ent type='ORG'>Piaget</ent> who found that exploration and development were
self motivating that it seemed likely that the human mind is such
a system. It thus seems reasonable to posit that an ongoing
function of the self is its own reorganization and development.
Indeed it was this point that first led to my interest in a
computation model of the self because the question of how the self
could be both agent and representation and in particular how it
could be an agent acting on itself as a representation has a long
standing concrete instaniation in Lisp. Lisp, one of the two oldest
high level programming languages in common use, was specifically
designed to manipulate list of symbols. Of course lisp programs are
themselves list of symbols so that lisp programs can be operated
on my lisp programs including the program itself. The species that
seemed so internally contradictory that analysts denied there
existence have in fact been around for a long time.
Now, of course such programs are not without very serious
problems - in particular they too can be much less stable and far
less predictable than those programs were program and data are kept
strictly separate. As with parallel processing one way to protect
from the dangers inherent in such a structure is to carefully limit
in advance the changes the program can make in itself. Another
possibility is to monitor the development of the program and
introduce error trapping and correction as untoward consequences
of the rewriting occur. A combination of the two approaches would
seem to be necessary. In a sequential system for example a fatal
error occurs if a real interminable loop is introduced into a
program. Here, however, parallelism and conflict can be of
considerable help. Freud's idea of a tripartite model of mind
essentially involves the parallel processing of data, the
consequent development and resolution of conflict so that a variety
of needs can be met through these various modes of processing. In
particular aspects of the mind can monitor the ongoing process of
the development of the self - interrupting and altering it when it
comes parlously close to instability or stagnation.
The hierarchical level at which these process can proceed are
various and new levels in the hierarchy seem to develop with
greater maturity. In particular greater capacities for abstraction
both from data and process appear to be a normal part of human
development. With these capacity comes increased abilities for
metacognition. <ent type='ORG'>Piaget</ent>'s observation of the progressive decentering
of cognition with the related capacity, for example to think about
thinking, represents such an elaboration of abstraction
hierarchies.
Among the many objections that could be raised to my
discussion is the importance I lay on introspection and
subjectivity as a source of information about psychological
processes. From a computational viewpoint consciousness is an odd,
unnecessary, or at least peculiar phenomenon, while from the point
of view of classical psychoanalysis precisely what is most
interesting about people is barred from the conscious awareness.
Thus subjective reports about experience should be relatively
uninteresting to both groups. However, following Vygotsky and
<ent type='ORG'>Basch</ent>, I take a different point of view about consciousness.
<ent type='ORG'>Consciousness</ent> is a state that we employ when automatic functioning
becomes problematic. For example we only become aware of walking
when we stumble or when we are learning how to do it and only
attend to it in detail if something impedes are ability to walk.
It is thus precisely in areas of difficulty that we expect
awareness to appear. So it is the areas of difficulty that we
should find well represented in consciousness. Freud's idea of
bringing the unconscious into awareness then is nothing more then
the extension of this normal process into areas in which it is not
employed. In particular the mechanism of repression reflects a
special procedure to keep ideas separate from each other by not
bringing them into awareness. But more generally we can use
subjective experience as at least a preliminary guide to the
computational difficulty.
I am well aware of having painted the picture of the
computational self with extremely broad strokes and having done
violence to many subtle and important issues in the process. At the
same time I am impressed that psychoanalysts having discovered that
the <ent type='NORP'>Freudian</ent> and ego-psychological paradigms are inadequate have
largely abandoned the attempt to develop broad theories that
encompass the particular data of the psychoanalytic field, choosing
instead to focus on smaller more tractable problems and maintaining
an unavowed theoretical agnosticism.
An exception to this abandonment of theory lies in the work
of the self psychologists. However their conceptualizations,
especially those of Kohut, while evocative remain vague. I think
it is clear that the computational properties of the mind must find
representation in personal psychology. I have suggested one
possibility for how this may occur using the computational self as
the central organizer for my thinking and attempting to show how
ideas from computer science may yield models that are congruent
with our clinical experience. Just as I believe development is the
central activity of the self so to I believe development should be
the central goal of our intellectual activities. Thus if this
paper, despite its flaws does nothing more then stimulate some of
you to think along these lines and to help me do so more cogently
I will be satisfied.</p></xml>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,10 @@
<?xml version="1.0" encoding="UTF-8"?>
<project>
<meta>
<filters directoryPatterns="" filePatterns="\Qconspiracy_project.xpr\E" positiveFilePatterns="" showHiddenFiles="false"/>
<options/>
</meta>
<projectTree name="conspiracy_project.xpr">
<folder path="."/>
</projectTree>
</project>

View File

@ -0,0 +1,213 @@
<xml><p>From: Alan Lustiger <special>alu@pruxp.pr.att.com</special>
Newsgroups: rec.humor.funny
Subject: 25 QUESTIONS AND ANSWERS ABOUT THE "ATOM BOMB"
<info type="Message-ID"> S4dc.13e2@looking.on.ca</info>
Date: Tue, 12 Jan 93 4:30:03 EST
Lines: 209
25 QUESTIONS AND ANSWERS ABOUT THE "ATOMIC BOMB"
1. Is there any evidence that a thermonuclear device exploded over
<ent type='GPE'>Hiroshima</ent> in 1945?
No, absolutely none. According to leading historians and physicists,
the thermonuclear bomb was not invented until years after the supposed
detonation over <ent type='NORP'>Japanese</ent> territory.
2. Is there any evidence that a uranium-based "atom bomb" was ever dropped
onto <ent type='GPE'>Nagasaki</ent>, <ent type='GPE'>Japan</ent>?
Absolutely not. While many historians and journalists made this claim
in the late 40's and early 50's, everyone now agrees that no such
bomb ever exploded over <ent type='GPE'>Nagasaki</ent>. Yet there are some who still stubbornly
cling to this supposed "fact."
3. What are the materials needed to make an "atom bomb?"
<ent type='ORG'>Uranium</ent>-238 and plutonium-239.
4. Aren't these materials radioactive?
Highly so. Anybody who attempts to use these materials is endangering
his/her life.
5. Is it likely that nuclear scientists in the 40's would be
handling uranium and plutonium?
This would be highly unlikely. Very few people felt so threatened
by the <ent type='NORP'>Japanese</ent> to be willing to risk their lives on a theoretical
chance of a superbomb that could end a far-away war a little sooner.
6. Aren't there witnesses to the atomic bomb in <ent type='GPE'>Hiroshima</ent>?
The only "witnesses" that could possibly survived this supposed
explosion would have been blinded by the intense flash of light,
so their testimony is quite unreliable and contradictory.
7. According to conventional historians, was the uranium bomb tested
before supposedly being dropped over <ent type='GPE'>Hiroshima</ent>?
No. There was no testing whatsoever of a uranium bomb in <ent type='GPE'>Alamogordo</ent>
or anywhere else before <ent type='GPE'>Hiroshima</ent>.
8. Isn't that strange?
Yes. Typical weapons are tested for months and years before deployment;
there is no other weapon that according to the accepted "facts" deployed
before any testing whatsoever.
9. How many witnesses are there for all of the atomic tests allegedly
occuring during the fifties and sixties?
Very few, perhaps a few hundred, who claimed to have seen them.
10. What did <ent type='ORG'>the General Advisory Committee</ent> of the Atomic Energy
Commission say in their report of October 30, 1949?
They recommended strongly against the development of what they
called the "Super Bomb," which is simply a thermonuclear
bomb. They said that "A super bomb might become a weapon of
genocide."
11. Isn't this four years after <ent type='GPE'>Hiroshima</ent> and <ent type='GPE'>Nagasaki</ent>?
Yes. Obviously development of nuclear weapons occurred well
after their supposed implementation in 1945.
12. Is radioactivity dangerous?
Everything is radioactive to some extent.
13. What was the triggering method of the bomb that supposedly
was dropped on <ent type='GPE'>Hiroshima</ent>?
According to the standard historical accounts, it used a gun-
assembly trigger.
14. Wasn't the gun-assembly method of triggering abandoned
in the design stage?
Yes; according to these same sources the gun method would not
work with uranium-derived plutonium-239 because some of the
plutonium-239 absorbs a neutron to become plutonium-240, which
undergoes spontaneous fission, all before supercriticality,
causing a premature and very small explosion that is unusable
for the very purpose that it was supposedly designed for!
15. How do conventional historians rectify these two "facts?"
They don't even attempt to.
16. How many books have been written about the atomic bomb?
Many hundreds, as well as thousands of articles in magazines
and newspapers.
17. Why was <ent type='GPE'>Hiroshima</ent> "targeted," and not <ent type='GPE'>Tokyo</ent>?
Perhaps because no one had heard of <ent type='GPE'>Hiroshima</ent>, and no one knew anyone
from there. It would be far more difficult to claim that <ent type='GPE'>Tokyo</ent> was bombed
than <ent type='GPE'>Hiroshima</ent> and <ent type='GPE'>Nagasaki</ent>. In fact, most world maps from before "World
War Two" do not even mention these cities at all.
18. How does <ent type='GPE'>Japan</ent> benefit from the "atom bomb" story?
As a direct result of the "war," <ent type='GPE'>Japan</ent> has received billions of dollars
worth of US aid for its defense. <ent type='GPE'>Japan</ent> has essentially no defense
budget, so it can pour resources through <ent type='ORG'>MITI</ent> into defeating the US
economically, all while playing on the emotions of anti-"nuke" activists
about the "horrors" of nuclear weapons.
19. Wow, I never thought of that. How else do the <ent type='NORP'>Japanese</ent>
benefit from this story?
The <ent type='NORP'>Japanese</ent> now own major <ent type='GPE'>Hollywood</ent> studios, from which many war
movies are produced. Also, they play upon our sympathy for the
supposed "atom bomb" to blind us to the fact that this foreign
nation had taken over our semiconductor industry, many <ent type='GPE'>California</ent>
banks and practically the entire state of <ent type='GPE'>Hawaii</ent>.
This is all a part of the <ent type='NORP'>Japanese</ent> plot to take over the world.
According to the "Protocols of the Elders of the <ent type='NORP'>Orient</ent>," this
is a <ent type='NORP'>Japanese</ent> conspiracy all foretold by their ancient texts
that very few Anglo-Saxons have the ability to read.
19. How many people are supposed to have died in the explosions?
It is hard to say. Some sources say 60000 in <ent type='GPE'>Hiroshima</ent>, others say
140000. No attempt has been made to rectify the various numbers.
20. How many people die annually from car accidents in the US?
Over 50000.
21. So, what makes <ent type='GPE'>Hiroshima</ent> so special?
Nothing, especially given the contradictory evidence about it.
22. Boy, I'm mad. What should I do about this?
Glad you asked. First, send me lots of money so we can spread this
message far and wide. Maybe we'll take out ads in college newspapers
or something.
Second, direct your anger at the <ent type='NORP'>Japanese</ent>. We are the victims, and
they are the aggressors. Make yourself feel important again by bashing
<ent type='GPE'>Japan</ent> at every opportunity. <ent type='NORP'>Japanese</ent> people are inherently evil, and
basically subhuman. They were never bombed, and if they would have been
they would have deserved it. Who do they think they are, anyway?
Yes, we Revisionists have all the answers. Life is a lot simpler than
you thought it was. Join us, and you won't have to be bothered anymore
by any feelings of guilt for your inherent hatred. We can justify it!
Oh, it's not the <ent type='NORP'>Japanese</ent> you hate, but the crippled? Hey - so do we!
It's easy: we don't like feeling uncomfortable around people in wheelchairs,
either! Who do they think they are, taking all the good parking spaces
when they were stupid enough to slip on a banana peel? IT'S A
CONSPIRACY! --See how easy it is to start? Now, just mix in a few
real facts, and start converting all of the otherwise messed-up
people to OUR CAUSE!
23. Wow! You mean that I could write stuff like this, too?
Sure! It's embarrasingly easy to write what we wrote above. In fact,
it's even superior to the usual anti-<ent type='NORP'>Semitic</ent> revisionist garbage,
because it has a higher percentage of REAL <ent type='ORG'>FACTS</ent>! Most of the
apparent "contradictions" above come from the facts that <ent type='GPE'>Nagasaki</ent>
was bombed by a plutonium bomb, not uranium; and that hydrogen
bombs are thermonuclear, not atomic bombs. Just juggle information
about the different types of bombs and mix them up so they seem to
be contradicting each other. It doesn't take ANY INTELLIGENCE
WHATSOEVER, and you can get lots of free air time on "48 Hours"!
Oh, I forgot to mention: I have a <ent type='NORP'>Japanese</ent> girlfriend who agrees
with EVERY WORD I've written above. Here she is:
"Yes, I am his <ent type='NORP'>Japanese</ent> girlfriend. I love him very much, and I've
always been troubled by my <ent type='NORP'>Japanese</ent> friends claiming to know people
who died in <ent type='GPE'>Hiroshima</ent>."
There you have it! Just throw some unverifiable opinions on top
of ridiculous proofs to STRENGTHEN YOUR CASE!
24. Couldn't I be arrested for this?
No! This country is founded on FREE SPEECH! But, just make sure
that you mention how much you are being persecuted for saying
your version of history. (More than three email messages a day
qualify for being called harrassment. Five may merit a lawsuit.)
25. Where can I get more information?
Go to a library. Take a book at random. Skim it. Then, decide how
that book is either for you or against you. If it is for you, quote
liberally and out of context. If against you, do the same.
DON"T LET YOURSELF GET CONFUSED BY THE <ent type='ORG'>FACTS</ent>! We certainly don't!
------------------------------------------------------------------
Alan LustigerINTERNET:lustiger@att.com <ent type='ORG'>UUCP</ent>:att!pruxp!alu
ATTMAIL:!alustiger CIS:72657366
--
Selected by Maddi Hausmann. MAIL your joke (jokes ONLY) to funny@clarinet.com.</p></xml>

View File

@ -0,0 +1,180 @@
<xml><p>SOLDIER OF FORTUNE DIES MYSTERIOUSLY AFTER
TALKING TO <ent type='ORG'>CONGRESSIONAL</ent> INVESTIGATORS</p>
<p>by Vince Bielski and Dennis Bernstein</p>
<p> A county coroner in <ent type='GPE'>Los Angeles</ent> has yet to announce the
cause of death of Steven Carr, a 27-year-old U.S. mercenary who
has provided <ent type='ORG'>Congress</ent> with much of what it knows about weapons
shipments to the <ent type='NORP'>contras</ent>. Had Carr lived, he was also expected to
testified in federal court against 29 <ent type='NORP'>contra</ent> supporters allegedly
involved in cocaine trafficking, an assassination attempt on
former <ent type='NORP'>contra</ent> leader Eden Pastora and a scheme to kill U.S
Ambassador to <ent type='GPE'>Costa Rica Lewis</ent> Tambs.</p>
<p> While Detective Mel Arnold of the <ent type='GPE'>Los Angeles</ent> Police
Department said the department is investigating the possibility
that Carr was murdered, at this point he said there doesn't
appear to be any evidence of "foul play." But in the days before
his death, Carr told several people that he feared he would be
assassinated. He was "very paranoid and frightened" because of
his role as a witness, Carr's sister Ann of <ent type='GPE'>Naples</ent>, <ent type='GPE'>Fla</ent>., said.</p>
<p> Here is what the police are saying about Carr's death. He
died at 4 am on December 13 in a parking lot near his friend's
apartment in <ent type='GPE'>Van Nuys</ent>, <ent type='GPE'>Calif</ent>., where he was staying. In the
predawn hours on this Saturday morning, while his friend,
Jacqueline Scott, was asleep, Carr left the apartment for an
unknown reason. After spending an undetermined amount of time
outside, Carr began making noise which awoke Scott. Arnold said
he could not describe the type of noise Carr was making. Scott
found Carr in the parking lot, who was "distressed and having
coordination problems." Soon after he died from a "probable
cocaine overdose." Asked if the police found any physical
evidence of cocaine use in the area of the apartment or parking
lot, Arnold said "no comment."</p>
<p> Dan Sheehan, an attorney with <ent type='ORG'>the Christic Institute</ent> in
<ent type='GPE'>Washington</ent> which filed the law suit against the 29 <ent type='NORP'>contra</ent>
supporter, said Carr used cocaine, but called him "an educated
user." Martha <ent type='ORG'>Honey</ent>, a reporter for the <ent type='ORG'>BBC</ent>, became friends with
Carr while he was a mercenary in <ent type='GPE'>Costa Rica</ent>. She said Carr was
not the type of person who would kill himself because he was
under pressure. "Stevie was a survivor. He had this ability to get
himself in trouble but he always seemed to bounce back. He had a
great sense of humor."</p>
<p> The source of his fears were not just the <ent type='NORP'>contra</ent>
supporters whose alleged crimes he revealed, but also the U.S.
government. Carr said that while he was in <ent type='GPE'>Costa Rica</ent>, U.S.
embassy officials threatened to jail him if he squealed on their
<ent type='NORP'>contra</ent> operation in <ent type='GPE'>Costa Rica</ent>.</p>
<p> In April 1985 Carr was arrested by <ent type='GPE'>Costa Rica</ent>n authorities
for violating the country's neutrality and sent to prison. Carr
was one of several mercenaries based in northern <ent type='GPE'>Costa Rica</ent> on
land owned and managed by a U.S. citizen and reported <ent type='ORG'>CIA</ent>
operative named John <ent type='GPE'>Hull</ent>. Evidence from several sources suggests
that the <ent type='NORP'>contras</ent> operate what amounts to a military base on
property controlled by <ent type='GPE'>Hull</ent> as well as an airbase for the
movement of cocaine from <ent type='ORG'>Columbia</ent> into <ent type='GPE'>the United States</ent>.</p>
<p> While in jail, Carr spilled the beans about the <ent type='NORP'>contra</ent>
operation. To reporters, he claimed that <ent type='GPE'>Hull</ent> had told him that
<ent type='GPE'>Hull</ent> was the <ent type='ORG'>CIA</ent> liaison to the <ent type='NORP'>contras</ent> and was receiving $10000 a
month from <ent type='ORG'>the National Security Council</ent> to help finance the
operation. Carr told <ent type='ORG'>Honey</ent> why he was revealing such secrets:
"Carr said that the mercenaries had been led to believe that
their mercenary activity was sanctioned by top U.S. military and
<ent type='GPE'>Costa Rica</ent>n officials. He was extremely bitter at having been
arrested."</p>
<p> <ent type='ORG'>Honey</ent> compiled information from Carr and other sources into
a book focusing on the role of <ent type='GPE'>Hull</ent> and other <ent type='NORP'>contra</ent> supporters in
the May 1984 assassination attempt against Pastora in <ent type='GPE'>Nicaragua</ent>
in which a bomb explosion killed eight people and injured
Pastora. <ent type='GPE'>Hull</ent> sued <ent type='ORG'>Honey</ent>, and her colleague Tony Avirgan, for
libel in May 1986. Carr received a subpoena to appear at the
trial, where he was to be a key witness for the reporters'
defense.</p>
<p> On May 16, Carr was released from jail. He later described
the events which took place in his life over the course of the
next week to <ent type='ORG'>Honey</ent> and an U.S. congressional aide involved in an
investigation of the arms supply network to the <ent type='NORP'>contras</ent>.</p>
<p> Carr said that <ent type='GPE'>Hull</ent> bailed him out of jail as a way of
persuading him to testify on <ent type='GPE'>Hull</ent>'s behalf. <ent type='GPE'>Hull</ent> requested that
Carr testify that the reporters forced him to make the charges
against <ent type='GPE'>Hull</ent>, Carr said.</p>
<p> That same day, Carr said he went to the U.S. embassy to
determine why he was arrested for participating in a war that the
U.S. supports. He said he met with two officials, Kirk Kotula,
the counsel general and John Jones, the acting chief of the
consulute.</p>
<p> According to <ent type='ORG'>Honey</ent>'s notes of her conversation with Carr
about his meeting with the officials, Carr said: "The officials
told me they knew all about <ent type='GPE'>Hull</ent>'s <ent type='NORP'>contra</ent> operation and they had
me call him. He picked up the phone instantly, as if he had been
waiting for my call.</p>
<p> "They said if I go to court and testify in your behalf I'll
go to jail whether I tell the truth or not. I had no choice in
the matter. The embassy told me to get the hell out of <ent type='ORG'>Dodge</ent> or
I'd go back to La Reforma prison. They told me that the bus to
<ent type='GPE'>Panama</ent> leaves at 7:30 pm and to be on it," he said.</p>
<p> Carr spent the next three days staying at <ent type='ORG'>Honey</ent>'s house. On
night of May 19, Carr left the house to visit a friend, and the
following day, the U.S. embassy told the court that Carr was in
their custody and that he would appear at the trial, <ent type='ORG'>Honey</ent> said.
However, Carr said on May 20, following U.S. embassy orders, he
took a bus to <ent type='GPE'>Panama</ent>, and with the help to the U.S. embassy
there, flew to <ent type='GPE'>Miami</ent> a few days later. Upon his return, Carr was
put in jail in <ent type='GPE'>Naples</ent>, <ent type='GPE'>Fla</ent>., for a prior offense.</p>
<p> Kotula said he had talked with Carr, but denied the he had
threatened him or forced him to leave <ent type='GPE'>Costa Rica</ent>. "That's not
true, at least by me. I did not threaten him with any such thing.
I couldn't do that, what would be the possible motive. I can't
put people in jail and I can't get people out of jail.</p>
<p> "I tried to convince Steve Carr when I first met him not to
go and join up with some bunch of guys. He was nothing but a
overgrown child who had read too many John Wayne comic books."</p>
<p> Jonathan <ent type='ORG'>Winer</ent>, an aide to Sen. John Kerry D-Mass., said
the Senator's office is investigating the matter. "There are
obviously some very serious questions regarding the U.S.
embassy's role in Steven Carr leaving <ent type='GPE'>Costa Rica</ent>," he said.</p>
<p> After Carr's return to the U.S., congressional investigators
said they had planned on bringing him before <ent type='ORG'>Congress</ent>. His
testimony, based on his participation on a March 6, 1985 arms
shipment from <ent type='GPE'>Fort Lauderdale</ent> to Ilogango Air Base in El
Salvador, would have linked Felix Rodriguez--the ex-<ent type='ORG'>CIA</ent> agent who
reportedly met with Donald Gregg, aide to Vice President George
Bush--to that weapons shipment, Sheehan said.</p>
<p> "He is the guy that can prove that the March 6
shipment of weapons that flew out of the <ent type='GPE'>Fort Lauderdale</ent> Airport
went to <ent type='LOC'>Ilopango</ent> airport," said Sheehan. "He witnessed and can
identify Felix Rodriguez as the guy who off loaded the weapons to
smaller planes which were then flown to <ent type='GPE'>Hull</ent>'s ranch in Costa
Rica."</p>
<p> In early 1986, Carr and two other eye-witnesses told federal
authorities that several major players in the arms supply network
were involved in the shipment, including Tom Posey, head of the
mercenary group <ent type='ORG'>Civilian Materiel Assistance</ent>, Robert Owen,
reportedly a liaison to fired Lt. Col. Oliver North, and <ent type='GPE'>Hull</ent>,
Sheehan said.</p>
<p> With no criminal indictment by October, Sheehan alleged
before a congressional committee that <ent type='ORG'>the Justice Department</ent> had
engaged in a "willfull conspiracy...to obstruct justice....A
number of telephone calls were then placed to Mr. <ent type='ORG'>Kellner</ent> (the
U.S. Attorney in <ent type='GPE'>Miami</ent>) personally by Edwin Meese...instructing
Mr. <ent type='ORG'>Kellner</ent> 'to proceed very, very, very slowly' in any
investigation of this case." <ent type='ORG'>Kellner</ent> has said he
has talked with Meese about the case, but denied Sheehan's
allegation.</p>
<p> A grand jury has recently formed in <ent type='GPE'>Miami</ent> to reportedly hear
evidence about the March 6 weapons shipment. But the one person
who could have provided the grand jury with an eye-witness
account that the weapons were transported from U.S. soil to El
Salvador--evidence which is essential in making a case that the
U.S. Neutrality Act and <ent type='ORG'>the Arms Export Control Act</ent> were
violated--is now dead.</p>
<p> "A great deal of the information Carr provided did check
out. It will now be harder for anyone to bring a prosecution with
Steven's testimony now unavailable, and I think that is very
unfortunate," <ent type='ORG'>Winer</ent> said.
-----------------------------------------------------------------
e, and I think that is very
unfortunate,"</p></xml>

View File

@ -0,0 +1,205 @@
<xml><p>SECRET TEAM OF WEAPONS DEALERS
by Vince Bielski</p>
<p> A "secret team" of former <ent type='ORG'>CIA</ent> and military officials and
arms dealers are responsible for the covert weapons shipments to
<ent type='GPE'>Iran</ent> and the <ent type='NORP'>contras</ent> under the direction of fired <ent type='ORG'>White House</ent>
aide Lt. Col. Oliver <ent type='ORG'>North</ent>.</p>
<p> Members of the "secret team" came together in the secret war
against <ent type='GPE'>Cuba</ent> in 1961, and have since been involved in "political
assassination" programs in <ent type='GPE'>Laos</ent>, <ent type='GPE'>Vietnam</ent>, <ent type='GPE'>Chile</ent> and now
<ent type='GPE'>Nicaragua</ent>.</p>
<p> The "secret team," through an association with known <ent type='ORG'>Mafia</ent>
leaders, has resorted to opium and cocaine trafficking to
finance their operations.</p>
<p> Edwin Wilson, the ex-<ent type='ORG'>CIA</ent> operative convicted for selling
explosives to <ent type='GPE'>Libya</ent>'s Moammar Gadhafi, was an active member.</p>
<p> These allegations are part of a lengthy affidavit filed this
week in a <ent type='GPE'>Miami</ent> federal court in support of a law suit brought
by Dan Sheehan, an attorney with <ent type='ORG'>the Christic Institute</ent> in
<ent type='GPE'>Washington</ent>. The suit names 29 alledged operatives in the <ent type='NORP'>contras</ent>
arms network as defendants.</p>
<p> The suit alleges that the defendants supplied the C-4
explosives which were used in the May 1984 assassination attempt
against <ent type='NORP'>contra</ent> leader Eden Pastora in <ent type='GPE'>Nicaragua</ent> in which eight
people were killed and Pastora injured. The plaintiffs, Martha
Honey and Tony Avirgan, are <ent type='NORP'>American</ent> journalists who are sueing
for personal injuries they suffered from the bombing.</p>
<p> <ent type='ORG'>The Christic Institute</ent>, a church funded public interest law
firm, has taken on controversial cases in the past, such as the
suit against Kerr McGree Nuclear Corporation on behalf of Karen
Silkwood. And it was while Sheehan was defending a sanctuary
worker that he received information which led him
into the investigation of the <ent type='NORP'>contra</ent> arms supply opertation.</p>
<p> In March 1984, he learned from a member of the Federal
Emergency Management Agency that <ent type='ORG'>FEMA</ent> had a highly secret plan to
"deputize" government and <ent type='ORG'>State National Guard</ent> personnel for the
purpose of interning 400000 undocumented Central
<ent type='NORP'>American</ent>s in detention centers in the event that President Reagan
launched "Operation Night-train"--a military invasion into
<ent type='LOC'>Central America</ent>.</p>
<p> The plan also called for the distribution from U.S. military
bases of hundreds of tons of weapons to be used by newly created
<ent type='ORG'>State Defense Forces</ent>, composed of civilians, who would help
enforce the "State of Domestic National Emergency" during the
invasion. Sheehan learned from a <ent type='GPE'>Louisiana</ent> <ent type='ORG'>State National Guard</ent>
Colonel that a <ent type='ORG'>State Defense Force</ent> in <ent type='GPE'>Louisiana</ent> planned to give
half of the weapons it received to the <ent type='NORP'>contras</ent>.</p>
<p> In <ent type='GPE'>Miami</ent>, former U.S. military personnel and active National
Guard units had organized a para-military organization, called
<ent type='ORG'>Civilian Military Assistance</ent>, to arm, train and fight with the
<ent type='NORP'>contras</ent>. The group, headed by Tom Posey, obtained "surplus"
military equipment from the 20th Special Forces Unit of the U.S.
Army in <ent type='GPE'>Alabama</ent>, Sheehan learned from a member of the group.</p>
<p> In June 1984, Sheehan was informed a man who
working with the para-military organization in helping arm the
<ent type='NORP'>contras</ent> also claimed to be a "personal representative to the
<ent type='ORG'>Contras</ent> of...Lt. Col. Oliver <ent type='ORG'>North</ent>." His name is Robert Owen.</p>
<p> One year later, Sheehan began putting this information into
a law suit when he learned that Posey, Owen and others
were allegedly involved in the bombing of the Pastora press
conference which caused physical and personal injury to the two
<ent type='NORP'>American</ent> reporters.</p>
<p> <ent type='NORP'>Sheehans</ent> investigation also led him to the discovery of a
"secret team" of former high ranking U.S. officials and officers
who oversaw the procurement and shipment of weapons to the
<ent type='NORP'>contras</ent> to to <ent type='GPE'>Iran</ent>. Through Posey, Owen and other they allegedly
supplied the explosives for the press conference bombing. The
"secret team" includes former high-ranking <ent type='ORG'>CIA</ent> officials Theodore
<ent type='ORG'>Shackley</ent> and Thomas Clines, ret. <ent type='ORG'>Air Force</ent> Gen. Richard Secord,
ex-<ent type='ORG'>CIA</ent> operative Edwin Wilson, and two arms dealers, Albert Hakim
(of <ent type='GPE'>Los Gatos</ent>) and Rafael Quintero, both of whom are U.S.
citizens.</p>
<p> In the affidavit, which cites 79 seperate sources, Sheehan
said he learned of the "secret team" from a former U.S.
intelligence officer who worked in <ent type='GPE'>Iran</ent>, a retired <ent type='ORG'>CIA</ent> officer,
and a former <ent type='ORG'>Air Force</ent> officer.</p>
<p> The intelligence officer discussed "the existence of a
'secret team' of former high-ranking <ent type='NORP'>American</ent> <ent type='ORG'>CIA</ent> officials,
former high-ranking U.S. military officials and <ent type='NORP'>Middle Eastern</ent>
arms merchants--who also specialized in the performance of covert
political assassinations of communists...(and) which carried on
its own, independent, <ent type='NORP'>American</ent> foreign policy--regardless of the
will of <ent type='ORG'>Congress</ent>,...the President,...or the (<ent type='ORG'>CIA</ent>)," the affidavit
reads.</p>
<p> The source said the "secret team" was set up in
1977 under the supervision of <ent type='ORG'>Shackley</ent> and Cline, who were then
with the <ent type='ORG'>CIA</ent>. Wilson worked with Gadhafi "to secretly train
<ent type='GPE'>Libya</ent>n anti-Shah of <ent type='GPE'>Iran</ent> terrorists in the use of deadly C-4
explosives," the affidavit reads. Wilson's real purpose was to
gather intelligence on the anti-Shah terrorist missions, and then
pass the information to Quintero, "who was responsible for the
assassination of these <ent type='GPE'>Libya</ent>n terrorists,"</p>
<p> Wilson was convicted for his dealings with Gadhafi, and
<ent type='ORG'>Shackley</ent> and Clines resigned under pressure from then-<ent type='ORG'>CIA</ent>
director Stansfield Turner. <ent type='ORG'>Shackley</ent> and Clines then join with
Secord and Hakim and "went private" continuing to run their
"secret team," the affidavit reads.</p>
<p> This group--initially through the Egyptian-<ent type='NORP'>American</ent>
Transport and Service Company--was "responsible for the entire
supply of weapons...to the <ent type='ORG'>Contras</ent>," when the <ent type='ORG'>CIA</ent> wasn't directly
providing them. They began arming the <ent type='NORP'>contras</ent> in August 1979,
after entering "into a formal <ent type='NORP'>contra</ent>ctual agreement with
<ent type='GPE'>Nicaragua</ent>n dictator Anastasio Somoza" despite President Carter's
order banning the sending of weapons to Somoza, the affidavit
reads.</p>
<p> The <ent type='ORG'>CIA</ent> took over in 1981, but when the 1984 ban on U.S.
support went into effect, <ent type='ORG'>North</ent> reactivated the private
merchants. Quintero, operating through a <ent type='GPE'>Florida</ent> based
corporation named <ent type='ORG'>Orca Supply Company</ent>--a company earlier set up
by Edwin Wilson--saw to it that the supplies were delivered to
the <ent type='NORP'>contras</ent> through John <ent type='GPE'>Hull</ent>, a U.S. citizen, who reportedly
operates a <ent type='NORP'>contra</ent> base in northern <ent type='GPE'>Costa Rica</ent> on land he owns.
Among the delivered weapons were the explosives used in the
Pastor bombing, the <ent type='ORG'>CIA</ent> source said.</p>
<p> To fund the <ent type='NORP'>contras</ent>, the "secret team" resorted to the
foreign military sales scheme used in <ent type='GPE'>Iran</ent> in which military
equipment is bought from the U.S. government at the
manufacturer's cost and sold to <ent type='GPE'>Iran</ent> at replacement cost. The
profits are then laundered through front companies.</p>
<p> The <ent type='ORG'>Examiner</ent> reported in July that Secord, partners with
Hakim in <ent type='ORG'>Standford Technology Trading Group International</ent>, was
involved in the 1981 sale of AWACS to <ent type='GPE'>Saudi Arabia</ent>, in which
money from that sale financed the <ent type='NORP'>contra</ent> operation.</p>
<p> In another report, the <ent type='ORG'>Examiner</ent> said the weapons were also
financed by an elaborate cocaine ring involing <ent type='ORG'>Columbia</ent>'s largest
cocaine dealers in which the drug moves from <ent type='ORG'>Columbia</ent>,
through <ent type='GPE'>Hull</ent>'s land, into the U.S at a level of one ton each
week.</p>
<p> When <ent type='ORG'>the Reagan Administration</ent> decided to undertake the
secret sales of arms to <ent type='GPE'>Iran</ent> in 1985, it was <ent type='ORG'>Shackley</ent>, Clines,
Hakim and Secord whom they used to carry out the mission, the
affidavit reads.</p>
<p>BACKGROUND</p>
<p> In 1961, <ent type='ORG'>Shackley</ent>, a <ent type='ORG'>CIA</ent> station chief in <ent type='GPE'>Miami</ent>, and his
deputy Clines, directed the covert war against <ent type='GPE'>Cuba</ent>. A special
unit formed to assassinate Castro, supervised by the "<ent type='ORG'>Mafia</ent>
Lieutenant Santo Trafficante," included Quintero--and Felix
Rodreguez and Luis <ent type='ORG'>Pasada</ent> Carillo--two ex-<ent type='ORG'>CIA</ent> agent who
reportedly operate the <ent type='NORP'>contras</ent> arms network at an El Salvador air
base. <ent type='ORG'>Pasada</ent> was involved in the 1976 mid-air bombing
of a <ent type='GPE'>Cuba</ent>n passenger airliner.</p>
<p> After the covert war activists were caught smuggling narcotics
into the U.S. from <ent type='GPE'>Cuba</ent>, the operation was shut down, and <ent type='ORG'>Shackley</ent>
and Clines were transfered to <ent type='GPE'>Laos</ent>, where <ent type='ORG'>Shackley</ent> was made <ent type='ORG'>CIA</ent>
Deputy Chief of Station and Clines continued as his deputy.</p>
<p> According to the affidavit, <ent type='ORG'>Shackley</ent> and Clines directed a
secret program which trained and used Meo tribesmen "to
secretly assassinated over 100000 non-combatant village mayors,
book-keepers, clerks and other civilian bureaucrats in <ent type='GPE'>Laos</ent>,
<ent type='GPE'>Cambodia</ent> and <ent type='GPE'>Thailand</ent>." The operation was funded by profits from
an illegal opium trade.</p>
<p> A commander the political assassination program was ret.
Army General John Singlaub, who has said publicly that he is
helping arm the <ent type='NORP'>contras</ent>. <ent type='ORG'>North</ent>, a <ent type='ORG'>Marine Corps</ent> Major at the time,
was one of Singlaub's deputies. Also involved with <ent type='ORG'>Shackley</ent> in
<ent type='GPE'>Laos</ent> was Secord, then an <ent type='ORG'>Air Force</ent> General, the affidavit
reads.</p>
<p> In 1971, <ent type='ORG'>Shackley</ent> and Clines, from their post the <ent type='ORG'>CIA</ent>'s
<ent type='LOC'>Western Hemisphere</ent> operations, directed the "Track II" operation
in <ent type='GPE'>Chile</ent> which played a role in the assassination of <ent type='GPE'>Chile</ent>an
President Salvador Allende, the affidavit reads.</p>
<p> In 1974, the two directed the <ent type='GPE'>Phoenix</ent> project in <ent type='GPE'>Vietnam</ent>,
which carried out the political assassination of some 60000 non-
<ent type='GPE'>Viet Cong</ent> civilians in an attempt to cripple <ent type='GPE'>Vietnam</ent>'s political
institutions.</p>
<p> "With their secret <ent type='ORG'>CIA</ent> anti-communist extermination program
coming to a end,...(they) started their own private assassination
business..."</p>
<div>--------------------------------------------------------------</div>
<p> ) started their own private assassination
business..."</p>
<div>-----------------------</div></xml>

View File

@ -0,0 +1,228 @@
<xml><p>RACISM, CONTROL, AND ROCK AND ROLL</p>
<p>By JACOB G. HORNBERGER</p>
<p>Civil rights laws are among the most repugnant forms of
political control in <ent type='NORP'>American</ent> society. Not only are they a
severe violation of the principles of freedom, they also have
totally failed to achieve their purported end -- the
elimination of racism in <ent type='GPE'>America</ent>.</p>
<p>Few intelligent people will deny that racial prejudice is
itself morally abhorrent. And being half-<ent type='NORP'>Mexican</ent>, I know from
personal experience that it is not pleasant to be at the
receiving end of prejudice against <ent type='NORP'>Hispanics</ent> (or half-
breeds!). But does the wrongful nature of racism mean that
such social conduct should be turned over to the coercive
power of government? NO!</p>
<p>First, how can an individual be considered free if government
officials have the power to coerce him, through fine or
imprisonment, to associate with people with whom he does not
desire to associate? It is the essence of individual liberty
to be able to choose one's friends and associates without
interference from the political authorities.</p>
<p>Moreover, the bedrock of freedom is private ownership of
property. How can a person be considered free if he can be
coerced, through fine or imprisonment, into selling what
supposedly belongs to him to a person to whom he would rather
not sell? It is the essence of private ownership of property
that a person have the right to do whatever he wants with his
own property, as long as it is peaceful.</p>
<p>Racial prejudice, of course, has long existed in <ent type='NORP'>American</ent>
society. No where was this better exemplified in this century
than in the segregation laws which <ent type='NORP'>American</ent> politicians and
bureaucrats enforced in the 1950s. Did segregation laws
guarantee the freedom and private property rights of
individuals? On the contrary! These equally offensive forms of
political control constituted the denial of individual freedom
and private property. Why? Because they prohibited blacks and
whites, through fine or imprisonment, from voluntarily
associating with each other in many social and business
contexts.</p>
<p>The crucial question is: Why did the politicians and
bureaucrats believe that segregation laws were necessary? Why
didn't they simply leave people free to discriminate or not on
a purely private basis? Why did they force them to
discriminate with segregation laws? Because they knew that the
market process would impose tremendous financial costs on
racists and ultimately break down racial barriers in <ent type='GPE'>America</ent>.</p>
<p>Are there any examples of where the market, rather than the
government, has accomplished this end? Yes! One of the best
examples involves one of the most controversial activities in
20th century <ent type='GPE'>America</ent>: rock and roll.</p>
<p>The story of rock and roll has been told in many books, among
which are You Say You Want a Revolution by Robert G. Pielke
and The Story of Rock by Carl Belz. From the very beginning,
it was the music of the young, and was hated and reviled by
the old. Why? Not simply because the music itself was
distasteful to adults. The animosity against rock and roll
went much deeper than that. Rock and roll shook the
foundations of values and beliefs held dear by grown-ups in
the 1950s.</p>
<p>One of the most important social teachings during that time
was that blacks were inferior to whites and, therefore, that
it was unacceptable for whites to associate with blacks. The
best example of this was found in government schools. With
segregation, and the battle against integration, in government
schools, <ent type='NORP'>American</ent> teenagers were taught by their parents and
government officials that it was socially detestable for
whites to be with blacks.</p>
<p>Along came rock and roll and turned that teaching upside down.
While rock and roll had its roots in various strands of
<ent type='NORP'>American</ent> music, i.e., country/western and gospel, its biggest
foundation was rhythm and blues or "race music" as it was
known in the 1950s. While whites were enjoying the sweet,
innocent sounds of the Big Bands, rhythm and blues, with its
especially strong sexual overtones, predominated among blacks.</p>
<p>It was natural for white parents to expect their children to
pursue their same musical interests. But it was not to be.
When Bill Haley's "Rock Around the <ent type='ORG'>Clock</ent>" was played in the
1955 movie, The Blackboard Jungle, a story of student protest
in a government school, rock and roll became the music of
choice for <ent type='NORP'>American</ent> teenagers.</p>
<p> While parents were resisting their children's growing
love for rock and roll, teenagers were listening to it on the
radio late at night (after their parents had gone to bed).
Many well-established radio stations refused to play the new
music, but teenagers would carefully search the radio band for
the few that did. (My favorite was an <ent type='GPE'>Oklahoma City</ent> station
more than 500 miles from my home.)</p>
<p>And along came Sam Phillips, the entrepreneur par excellence,
who shook the world by looking for a white man who sang like a
black man. One day the invisible hand of the market brought
into his studio the man who would become the King of Rock and
Roll, Elvis Presley. Elvis was hated and condemned by grown-
ups. But teenagers didn't care, and Elvis became the social
phenomenon of the century. (While on our way to a national
student council convention when I was in the 9th grade, a few
of us discovered that Elvis was staying in our motel. I
knocked on his door and asked if Elvis would come out to
visit. At about midnight, Elvis Presley came down to the pool
and spent some time visiting with a few of us. It did not take
long to see that he was a great person and that what grown-ups
were saying about him was untrue.)</p>
<p>The white racists were furious over the trend toward rock and
roll. But not just because teenagers were rejecting their
social teaching. Well-established financial interests were
getting hurt by the market process. Radio stations which
played only the "correct" music were losing market share and,
therefore, advertising revenue.</p>
<p>There was also a tremendous upheaval in the record business.
Small independent record companies called "indies" were
experiencing phenomenal growth rates by producing rock and
roll records. And the well-established record companies which
concentrated on the traditional music were losing a major
share of the market.</p>
<p>Rock and roll was providing a vehicle by which blacks could
out-compete whites and accumulate wealth. There were numerous
success stories; among the best known was Berry Gordy, Jr.,
and his <ent type='ORG'>Motown Records</ent>, who produced such rock and roll greats
as The Supremes, The Four Tops, Smokey Robinson and the
Miracles, and The Temptations. Blacks were getting wealthy,
and white racists were infuriated.</p>
<p>The market process was also bringing whites and blacks closer
together in other ways. <ent type='ORG'>Buddy Holly</ent>, who created some of the
most beautiful music ever written, shocked the black audience
at the <ent type='ORG'>Apollo</ent> Theater in <ent type='GPE'>New York City</ent>. (No white act had ever
played the <ent type='ORG'>Apollo</ent>!) And they loved him! White teenagers were
flocking to see Chuck Berry sing "Roll Over Beethoven,"
"<ent type='ORG'>Maybellene</ent>," and "Sweet Little Sixteen." And, horror of
horrors, white and black musicians were even travelling
together!</p>
<p>The world of racial separation for which adults longed in the
1950s was disintegrating among their children. And it was
occurring not as a result of government coercion but in spite
of it.</p>
<p>The response of the political authorities was not amusing. In
some cases, rock concerts were banned by ordinance. Musicians
were arrested on questionable charges. But the most tragic
abuse of political power came from the <ent type='GPE'>United States</ent>
government which, with its payola investigation, did
everything it could to destroy rock and roll.</p>
<p>Payola was a practice in which record companies would pay disc
jockies to promote their records. Payola was well-known and
well-established in the music business and had been going on
long before the advent of radio. But U.S. Congressmen had not
objected when musicians in the Big Band era were paid to play
a composer's music. It was only when rock and roll became
popular among the youth of <ent type='GPE'>America</ent> that the politicians' wrath
came in the form of a <ent type='NORP'>Congressional</ent> investigation of an
activity that was harming no one.</p>
<p>While the political investigation cast a wide net over rock
and roll, its ultimate brunt was felt by Alan Freed, a disc
jockey who was the first to coin the term "rock and roll."
Freed was one of the earliest and most successful promoters of
rock and roll, is generally recognized as the "Father of Rock
and Roll," and appeared in the rock and roll movie, Rock
Around the <ent type='ORG'>Clock</ent>. But all that ended with the <ent type='NORP'>Congressional</ent>
attempt to destroy rock and roll. In one of the ugliest abuses
of political power in <ent type='NORP'>American</ent> history, U.S. Congressmen
brutalized and butchered Alan Freed. He died a broken man in
1965 at the age of 43.</p>
<p>But the politicians and the racists, despite their fervent
hopes and valiant efforts, have never been able to destroy
rock and roll and its wonderful influence on <ent type='NORP'>American</ent> culture.</p>
<p><ent type='ORG'>Reliance</ent> on the market, rather than government, to break down
racial barriers ensures that the costs of racial prejudice are
self-imposed rather than externally imposed. If the racist
radio station owner, for example, chooses not to play the
music of blacks, he foregoes the advertising revenue which
could be used to improve the lot of his family. He bears the
cost which his racial prejudice has induced him to impose upon
himself!</p>
<p>The market process also enables racists to vent their
prejudices by engaging in discrimination. Denying them this
opportunity does not eliminate the racism under which they
suffer; instead, it compresses it in a "pressure cooker" which
ultimately is bound to explode.</p>
<p>Rock and roll has been one of the most revolutionary cultural
phenomena in <ent type='NORP'>American</ent> history. It has produced some of the
world's most beautiful music. Of course, not all of its music
has been popular but that is the essence of a free society --
the legal protection of those peaceful activities which the
majority dislike.</p>
<p>But rock and roll did more than just contribute to the musical
heritage of the world. It also sent deep and profound quakes
through some of the most wrongful beliefs of <ent type='NORP'>American</ent> adults.
The social upheaval began with challenges to racial prejudice
but it did not end there. A few years later, appeared an
individual named Boy Dylan, one of the world's greatest poets
and ironically a product of <ent type='GPE'>America</ent>'s government schools.
Through the message of his music, Dylan pierced the conscience
of a generation during the most controversial war in <ent type='NORP'>American</ent>
history.</p>
<p>Mr. Hornberger is founder and president of <ent type='ORG'>The Future</ent> of
Freedom <ent type='ORG'>Foundation</ent>, P.O. Box 9752, <ent type='GPE'>Denver</ent>, CO 80209.
------------------------------------------------------------
From the October 1990 issue of <ent type='ORG'>FREEDOM DAILY</ent>,
Copyright (c) 1990, <ent type='ORG'>The Future</ent> of Freedom <ent type='ORG'>Foundation</ent>,
PO Box 9752, <ent type='GPE'>Denver</ent>, <ent type='GPE'>Colorado</ent> 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the <ent type='ORG'>Foundation</ent>.
</p></xml>

View File

@ -0,0 +1,114 @@
<xml>
<p>Subject: Corporate buyout of <ent type='ORG'>the Democratic Party</ent></p>
<p>******************************
&gt;From the SF Examiner, Monday July 20, 1992.
Jeff Cohen and Norman Solomon (Jeff Cohen is founder
of <ent type='ORG'>FAIR</ent>, a media watchdog group; Norman Solomon is
a media critic.)</p>
<p>The Takeover of <ent type='ORG'>the Democratic Party</ent></p>
<p> Thousands of journalists covered the <ent type='NORP'>Democratic</ent> National
Convention here. Almost all of them missed the biggest
story.
The story wasn't missed because it happened in the shadows
of in some smoke-filled back room. It was bypassed because of
ideological binders worn by so many in the conformist press.
The big story was the takeover of <ent type='ORG'>the Democratic Party</ent> by
big business.
Of course, <ent type='ORG'>the Democratic Party</ent> has always included hefty
doses of corporate interests. But in past years, they were
one of many competing forces in the party, along with
representatives of labor, minorities, senior citizens, women
and others.
The significance of this convention is that corporate <ent type='GPE'>America</ent>
has taken undisputed control - at least for now - of both major
political parties, not just the <ent type='ORG'>GOP</ent>.
How did so many in the political press corps miss the story?
Most establishment journalists seem blind to the fact that
corporations are thoroughly political institutions, seeking
ever-increasing influence over parties, legislation and government
regulation. (These businesses are, after all, the folks who
underwrite the news with their advertising.)
In political reporting, corporations are treated as benign, neutral,
invisible. Their political maneuvers are generally not news.</p>
<p> It's not that journalists are oblivious to political wheeling and
dealing by various groups. In the days before the convention,
political reporters scrutinized teachers unions, black activists,
senior-citizen groups, feminists, gay-rights advocates - denigrating
them as ``special interests'' who could ruin ``Clinton's convention''
by ``alienating middle-class voters.''
With so much media focus on these relatively powerless grass-roots
groups, powerful corporations - the country's REAL special
interests - ran off with the party.</p>
<p> ITEM: Two days before the convention, a ``Victory Train'' carried
congressional <ent type='NORP'>Democrats</ent> from <ent type='GPE'>Washington</ent> to <ent type='GPE'>New York</ent>. Accompanying
the party elite on the train ride were corporate lobbyists who
paid $10000 to $25000 for the right to mingle and shmooze.
The <ent type='NORP'>Democratic</ent> National Committee has been raking in money from
virtually every corporate interest needing a government
favor. The message to anti-poverty or consumer-rights activists:
No need for you to come on board. You can wait at the station.</p>
<p>ITEM: The Clinton-Gore ticket represents the seizure of the
party hierarchy by the <ent type='NORP'>Democratic</ent> Leadership Council, which
is typically euphemized in the media as a group of
``moderate'' <ent type='NORP'>Democratic</ent> politicians who want the party to
``speak for the middle class.'' (Clinton and Gore were
founders of the DLC; Clinton was its chair in 1990-91.)
The problem is that the DLC has no middle-class constituents.
It is bankrolled by - and speaks for - corporate <ent type='GPE'>America</ent>:
<ent type='ORG'>ARCO</ent>, <ent type='ORG'>Dow Chemical</ent>, <ent type='ORG'>Georgia Pacific</ent>, Martin Marietta, the
<ent type='ORG'>Tobacco Institute</ent>, <ent type='ORG'>the Petroleum Institute</ent>, etc.</p>
<p>ITEM: Clinton became the media-designated ``front-runner'' in
large part because he raised so much money early in the
campaign. The cash didn't come from middle-class folks.
As reported by the weekly In These <ent type='ORG'>Times</ent>, most of it
came from conservative business interests; investment
bankers, corporate lobbyists and Wall Street firms which
fund both major political parties.</p>
<p>ITEM: Two of Clinton's key fund-raisers were Robert Barry,
a longtime <ent type='ORG'>General Electric</ent> lobbyist, and Thomas H. Boggs
Jr., who ears $1.5 million a year as a lawyer-lobbyist
for the <ent type='GPE'>Washington</ent> firm of Patton, Boggs, and Blow.
Boggs' parents were members of <ent type='ORG'>Congress</ent>; his sister is
media pundit Cokie Roberts. His law firm boasts a computer
program that matches corporate donors with <ent type='ORG'>Congress</ent> members
who seek his help in raising money; a match depends on what
legislation is pending before <ent type='ORG'>Congress</ent>.</p>
<p>ITEM: The Boggs law firm also boasts partner Ron Brown,
chair of <ent type='ORG'>the Democratic Party</ent>. Some pundits have suggested
that since Brown in an African-<ent type='GPE'>America</ent>n, the Clinton-Gore
ticket has less need of Jesse Jackson to mobilize the
black vote in November. But Ron Brown is far more familiar
with corporate boardrooms and government corridors than
grass-roots organizing. His clients have included an
array of U.S. and foreign business interests, as well as
the regime of <ent type='NORP'>Haitian</ent> dictator Jean Claude Duvalier.</p>
<p> When Jerry Brown spent his campaign denouncing
``<ent type='GPE'>Washington</ent> sleaze,'' he was referring to these kinds of
cozy corporate-government relations.
But mainstream media have demonstrated far less animus
toward corporate influence than toward Jerry Brown, who
was routinely described by journalists covering the
convention as ``disruptive,'' ``egotistical'' and a
``party pooper.''
Aided by this media slant, corporate insiders are
laughing all the way to the bank.</p>
<div>*******************************************</div>
<p>This is the real problem with our "democracy" - the voters have
very little influence over the choices. Those decisions have
already been made for us. We should feel glad about it, now
we don't have to make the difficult decisions...</p>
</xml>

View File

@ -0,0 +1,140 @@
<xml><p>Subject: Conspiracy for the Day -- November 3, 1993
From: bfrg9732@uxa.cso.uiuc.edu (Brian F. Redman)
Date: 3 Nov 1993 00:02:07 GMT</p>
<p> Conspiracy for the Day -- November 3, 1993
=============================================
("Quid coniuratio est?")</p>
<div>-!---------------------------------------------------------------</div>
<p>The Search for the "<ent type='NORP'>Manchurian</ent> Candidate":
The <ent type='ORG'>CIA</ent> and <ent type='ORG'>Mind Control</ent>
by John Marks
[Excerpts]</p>
<p>By the 1950s, most "<ent type='NORP'>Americans</ent> knew something about the famous
trial of the <ent type='NORP'>Hungarian</ent> Josef Cardinal Mindszenty, at which the
Cardinal appeared zombielike, as though drugged or hypnotized.
Other defendants at <ent type='NORP'>Soviet</ent> 'show trials' had displayed similar
symptoms as they recited unbelievable confessions in dull,
cliche-ridden monotones. <ent type='NORP'>Americans</ent> were familiar with the idea
that the <ent type='NORP'>communists</ent> had ways to control hapless people, and [the
term 'brainwashing'] helped pull together the unsettling evidence
into one sharp fear."</p>
<p>Many <ent type='NORP'>Americans</ent> "saw the confessions as proof that the <ent type='NORP'>communists</ent>
now had techniques 'to put a man's mind in a fog so that he will
mistake what is true for what is untrue, what is right for what
is wrong, and come to believe what did not happen actually had
happened, until he ultimately becomes a robot.'"</p>
<p>"Given the incontrovertible evidence that the <ent type='NORP'>Russians</ent> and the
<ent type='NORP'>Chinese</ent> could, in a very short time and often under difficult
circumstances, alter the basic belief and behavior patterns of
both domestic and foreign captives, [it was argued that] there
must be a technique involved that would yield its secrets under
objective investigation."</p>
<p>Harold Wolff and Lawrence Hinkle "became the chief brainwashing
studiers for the U.S. government... Their secret report to [<ent type='ORG'>CIA</ent>
chief] Allen Dulles, later published in a declassified version,
was considered the definitive U.S. Government work on the
subject."</p>
<p>"The <ent type='ORG'>CIA</ent> built up its own elaborate brainwashing program
[which]... took its own special twist from our national
character. It was a tiny replica of the <ent type='ORG'>Manhattan Project</ent>,
grounded in the conviction that the keys to brainwashing lay in
technology. <ent type='ORG'>Agency</ent> officials hoped to use old-fashioned <ent type='NORP'>American</ent>
know-how to produce shortcuts and scientific breakthroughs... The
<ent type='ORG'>Agency</ent>'s brainwashing experts gravitated to people more in the
mold of the brilliant -- and sometimes mad -- scientist."</p>
<p><ent type='ORG'>CIA</ent> officials began to look for scientists and guinea pigs. "Some
of their experiments would wander so far across the ethical
borders of experimental psychiatry (which are hazy in their own
right) that <ent type='ORG'>Agency</ent> officials thought it prudent to have much of
the work done outside <ent type='GPE'>the United States</ent>."</p>
<p><ent type='GPE'>Montreal</ent> hospital. One of Cameron's projects was an attempt to
"depattern" experimental subjects. "Cameron defined
'depatterning' as breaking up existing patterns of behavior... by
means of particularly intensive electroshocks, usually combined
with prolonged, drug-induced sleep... Cameron claimed he could
generate 'differential amnesia.' Creating such a state in which a
man who knew too much could be made to forget had long been a
prime objective [of <ent type='ORG'>CIA</ent>] programs."</p>
<p>Cameron's depatterning "normally started with 15 to 30 days of
'sleep therapy.' As the name implies, the patient slept almost
the whole day and night. According to a doctor at the hospital
who used to administer what he calls the 'sleep cocktail,' a
staff member woke up the patient three times a day for medication
that consisted of a combination of 100 mg. Thorazine, 100 mg.
Nembutal, 100 mg. Seconal, 150 mg. Veronal, and 10 mg. Phenergan.
Another staff doctor would also awaken the patient two or
sometimes three times daily for electroshock treatments... In
standard, professional electroshock, doctors gave the subject a
single dose of 110 volts, lasting a fraction of a second, once a
day or every other day. By contrast, Cameron used a form 20 to 40
times more intense, two or three times daily, with the power
turned up to 150 volts."</p>
<p>"The frequent screams of patients that echoed through the
hospital did not deter Cameron or most of his associates in their
attempts to 'depattern' their subjects completely. Other hospital
patients report beinng petrified by the 'sleep rooms,' where the
treatment took place, and they would usually creep down the
opposite side of the hall."</p>
<p>"The <ent type='ORG'>Agency</ent> sent the psychiatrist research money to take the
treatment *beyond this point*. <ent type='ORG'>Agency</ent> officials wanted to know
if, once Cameron had produced a blank mind, he could then program
in new patterns of behavior, as he claimed he could. As early as
1953 -- the year he headed the <ent type='NORP'>American</ent> Psychiatric Association
-- Cameron conceived a technique he called 'psychic driving,' by
which he would bombard the subject with repeated verbal
messages."</p>
<p>The <ent type='ORG'>CIA</ent> continued to fund Cameron's research. Then, in 1964, he
retired abruptly. "His successor, Dr. Robert Cleghorn, made a
virtually unprecedented move in the academic world of mutual
back-scratching and praise. He commissioned a psychiatrist and a
psychologist, unconnected to Cameron, to study his electroshock
work."</p>
<p>"The study-team members couched their report in densely academic
jargon, but one of them speaks more clearly now. He talks
bitterly of one of Cameron's former patients who needs to keep a
list of her simplest household chores to remember how to do
them... He continues, 'I probably shouldn't talk about this, but
Cameron -- for him to do what he did -- he was a very
schizophrenic guy, who totally detached himself from the human
implications of his work... God, we talk about concentration
camps. I don't want to make this comparison, but God, you talk
about ''we didn't know it was happening,'' and it was -- right in
our back yard.'"</p>
<p>"It cannot be said how many -- if any -- other <ent type='ORG'>Agency</ent></p>
<p>Details are scarce, since many of the principal witnesses have
died, will not talk about what went on, or lie about it. In what
ways the <ent type='ORG'>CIA</ent> applied work like Cameron's is not known. What is
known, however, is that the intelligence community, including the
<ent type='ORG'>CIA</ent>, changed the face of the scientific community during the
1950s and early 1960s by its interest in such experiments."</p>
<p>-!---------------------------------------------------------------
Today's conspiracy brought to you by.......
Brian Francis Redman
.....................
: <ent type='NORP'>Aperi</ent> os tuum muto, :
: et causis omnium filiorum qui pertranseunt. :
: <ent type='NORP'>Aperi</ent> os tuum, decerne quod justum est, :
: et judica inopem et pauperem. :
: -- Liber Proverbiorum XXXI: 8-9 :
:...................:
(bfrg9732@uxa.cso.uiuc.edu) (72567.3145@compuserve.com)
</p></xml>

View File

@ -0,0 +1,945 @@
<xml><p> THE COWTOWN CONNECTION
by
M. Duke Lane
(CIS ID: 760042356)</p>
<p>Harold Weisberg once said about his Whitewash works that "there are no
theories in my books... they're factual."[1] The sentiment about factuality
has been echoed by many respectable researchers, who insist that "the Kennedy
case ought to be treated as a homicide, which is what it is." <ent type='ORG'>Aren</ent>'t we
pressing for a final, legal investigation of the JFK murder to view all of
the evidence, new and old, holding it to the constraints of our legal system?
A common refrain, after all, is that <ent type='ORG'>the Warren Commission</ent>'s investigation
and "conviction" of Lee Oswald would never have held up in a true adversarial
judicial proceeding.</p>
<p>Interestingly, we don't seem to hold ourselves to the same constraints. If
one researcher discovers something, even in error, we are apparently
permitted to cite that person's work, without certification, as established
fact. Many people complain when their own theories are held up to the same
critical light as we hold the official investigations, as if we aren't
beholden to the same burden of proof we assign them.</p>
<p>There has even been recent argument on both sides of this issue regarding
whether researchers' conclusions ought to be held up to critical peer review
or whether we should be allowed to follow our intuition and reach reasonable
conclusions... which can't be anything more than speculation, by
definition.[2] That we accept such speculation and/or incomplete
investigation as "fact" is exemplified by Robert Morrow's recently published
<ent type='ORG'>First Hand Knowledge</ent> (FHK),[3] in which he suggests that an apparent <ent type='ORG'>CIA</ent>
operative was detained in <ent type='GPE'>Fort Worth</ent> only a couple of hours after Kennedy's
assassination.</p>
<p>FHK is, by most people's estimation, a reprint of Morrow's earlier <ent type='ORG'>Betrayal</ent>,
this time, however, naming names and adding new information. One piece of
this "new information" is that an "unidentified suspect" taken into custody
in <ent type='GPE'>Fort Worth</ent>, 30 miles west of <ent type='GPE'>Dallas</ent>, was, in fact, David Atlee <ent type='ORG'>Phillips</ent>, a
former <ent type='ORG'>CIA</ent> operative who was based in <ent type='GPE'>Mexico City</ent> while Lee Harvey Oswald was
purportedly visiting <ent type='NORP'>Soviet</ent> and <ent type='NORP'>Cuban</ent> embassies in that city, and/or the
"Maurice <ent type='ORG'>Bishop</ent>" character said to be <ent type='NORP'>Cuban</ent>s refugees' <ent type='ORG'>CIA</ent> contact for the
Bay of Pigs operation. What, the reader must wonder, was this man--of all
people--doing in that place at that time? This is information with curious
implications indeed!</p>
<p>As evidence of <ent type='ORG'>Phillips</ent>' apparent complicity in the murder, Morrow includes a
photo of <ent type='ORG'>Phillips</ent> beside <ent type='ORG'>the House Assassinations Committee</ent>'s sketch of
"<ent type='ORG'>Bishop</ent>," which many researchers agree look strikingly similar. The photo is
included with the <ent type='ORG'>Phillips</ent> and "<ent type='ORG'>Bishop</ent>" pictures. The man, Morrow asserts,
bears an "uncanny resemblance" to <ent type='ORG'>Phillips</ent>/<ent type='ORG'>Bishop</ent>. Even while the angles of
the men's faces are different, making a direct comparison difficult if not
impossible, there does indeed appear to be a resemblance between them.</p>
<p>What was <ent type='ORG'>Phillips</ent>/<ent type='ORG'>Bishop</ent> doing in <ent type='GPE'>Fort Worth</ent>? The reader is left to wonder,
for Morrow cites Gary Shaw and Larry Ray Harris' Cover-Up[4] to state that no
record of this man's arrest exists and, in fact, the negatives of the
pictures taken of the arrest have disappeared from the files of The Fort
Worth Star-Telegram. Who but the government could manage such an obvious
cover-up, one must wonder. Who indeed?</p>
<p>Since I live near <ent type='GPE'>Fort Worth</ent>, I decided to look into this. This article will
take the reader roughly through the steps of my investigation into this
question. In the end, we will find that not only was Morrow "reaching," but
also that previous information was incomplete at best. While I cannot
possibly clear <ent type='ORG'>Phillips</ent> from any sort of involvement in <ent type='ORG'>the Bay</ent> of Pigs
episode or the Kennedy hit, it is quite clear that he was NOT the man in the
photo Morrow uses to implicate him. This is perhaps an abject lesson for the
reader not to take everything he reads at face value, no matter what the
credentials of an author may seem to be....</p>
<p>Let us pause for a moment to consider Morrow's works. Morrow, as we know,
claims to be a former <ent type='ORG'>CIA</ent> contract agent who supposedly delivered four
<ent type='ORG'>Mannlicher</ent>- Carcano 7.65mm rifles to David Ferrie for what he later
determined to be the JFK assassination, one of which he says he kept. In both
FHK and <ent type='ORG'>Betrayal</ent>, he discusses the purchase and delivery of these rifles to
Ferrie, who of course, cannot confirm or deny Morrow's allegation since he is
dead. Nor can Morrow's <ent type='ORG'>CIA</ent> connection be affirmed or refuted; we have no
choice but to either take the man at his word or not, since it is impossible
to prove one way or the other. That is simply the nature of the beast.</p>
<p>Likewise, we can either believe or disbelieve his accounts of the various
newly-named people's involvement in the planning, execution and/or cover-up
of the assassination. Certainly, the dust jacket overview and the author's
own preface to his new book paint a reasonably credible picture of the man
who claims to have "first hand knowledge" of the assassination. Knowing,
however, that there is no statute of limitations against prosecution in a
murder, how is it that Morrow can publicly come forward with an admission of
having participated in the most notorious murder of our time? Even aside from
prosecution, surely one must wonder at what repercussions he might suffer at
the hands of those whom he names as his accomplices, including the <ent type='ORG'>CIA</ent>.</p>
<p>These questions are handled adroitly enough even before the reader reaches
the book's introduction. "Mr Morrow," the dust jacket states, "has now come
forward with the truth because he believes the danger to his family is
reduced due to the impending release of the <ent type='ORG'>Congressional</ent> files on the
assassination," thereby assuring us that Morrow doesn't expect to become
another "mysterious death."</p>
<p>But what of the others he names? His own preface makes this clear: "More than
half the characters about to come to life on these pages have already been
put to death, tortured, exiled or silenced in strange and horrible ways."
They are either dead or otherwise will not rise to their own defense against
Morrow's accusations. It is worthwhile to note that David Atlee <ent type='ORG'>Phillips</ent> is
among the former, having died of cancer at his <ent type='GPE'>Arlington</ent>, VA, home on July 7,
1988.[5] He will not be stepping forward to clear his name, nor will Tracy
Barnes, another of the people Morrow names in FHK and who is also dead. The
rest of the "more than half" of Morrow's characters will likewise not be
coming forward to correct the record and provide true facts since they've
either been "put to death, tortured, exiled or silenced in strange and
horrible ways." The other half, we may reasonably conclude, have but bit
parts in Morrow's narrative, and aren't connected with the assassination, and
so have nothing to "fear."</p>
<p>Returning to the question of <ent type='ORG'>Phillips</ent> (or <ent type='ORG'>Bishop</ent>) having been arrested in
<ent type='GPE'>Fort Worth</ent>, we must bear these factors in mind. Gary Shaw and Larry Harris
have already told us that no record of the arrest exists and that negatives
of the photographs taken of this man have "disappeared" from the
Star-Telegram's files. Morrow has only added to the mystery by connecting the
<ent type='ORG'>CIA</ent> to this man, a factor which can apparently not be proven nor disproven.
Or can it?</p>
<p>Tom <ent type='ORG'>Tilson</ent> Tells Tall Tales
===========================</p>
<p>One of the first things I was curious about was whether this arrest had any
connection to the black sedan chase so often related to the events in Dealey
Plaza. This connection was bolstered by an article which appeared the day
after the assassination in The <ent type='GPE'>Dallas</ent> Morning News which told of a man having
been arrested in <ent type='GPE'>Fort Worth</ent> because he was said to be driving a car "linked
to the slayer."[6] <ent type='GPE'>Fort Worth</ent> was the apparent destination of the driver of
the black sedan headed westbound on the DFW Turnpike and chased by an
off-duty <ent type='GPE'>Dallas</ent> policeman.</p>
<p>This incident was first reported by Earl Golz in The <ent type='GPE'>Dallas</ent> Morning News[7]
nearly twenty years after the fact, and repeated by Jim Marrs in
Crossfire,[8] to which the reader is referred for additional information. In
addition, rumblings of a car having been found abandoned in <ent type='GPE'>Fort Worth</ent> later
in the day_naturally tied to the "black car chase"_raised even more
interesting possibilities. Was the man in the FHK photo the same one who
off-duty officer Tom <ent type='ORG'>Tilson</ent> chased from Dealey Plaza, and who may
subsequently have abandoned the car before having been arrested?</p>
<p>Unequivocally not. To begin with, it is apparent that there never was a car,
black or otherwise, where <ent type='ORG'>Tilson</ent> claimed he initially saw it. His interview
with Golz clearly states that he was driving along Commerce Street just
beyond the Stemmons Freeway bridge but not yet as far as the Triple <ent type='ORG'>Underpass</ent>
(the railroad bridge) when he saw a man run down the bridge abutment, toss a
long object (a rifle?) into the back seat, run around to jump into the
driver's seat and take off.</p>
<p>According to his daughter who was riding with him, "seconds before she saw
the fleeing man, the presidential limousine had just sped past his parked car
on the grass... and the limousine was turning onto Stemmons Freeway."[9] This
time roughly corresponds to the time that Mel McIntire took two photographs
of the limo emerging from under the railroad bridge and, shortly thereafter,
<ent type='ORG'>the Secret Service</ent> follow-up car turning onto Stemmons.[10] In neither photo
is there a "parked car on the grass." With the rest of the motorcade still in
Dealey Plaza, it is impossible that a car could have gotten to that spot in
time for <ent type='ORG'>Tilson</ent> to have seen it before passing under the Triple <ent type='ORG'>Underpass</ent>. It
simply wasn't there.</p>
<p>Moreover, photographic evidence belies <ent type='ORG'>Tilson</ent>'s claim that "everyone was
jumping out of their cars pulling up on the median strip" in the plaza as he
saw the man running down the abutment and jumping into his car.[11] Of the
many photographs taken in DP, none show "everyone... jumping out of their
cars [and] pulling up on the median strip," and none show cars parked on the
median even long after the motorcade had left the plaza, much less when
<ent type='ORG'>Tilson</ent> claims they were (before the press bus had even reached the
<ent type='ORG'>Underpass</ent>). Obviously, <ent type='ORG'>Tilson</ent> has never looked at any pictures of the
assassination and aftermath before.</p>
<p>If that doesn't prove the lie, then consider that the <ent type='GPE'>Dallas</ent> Police
Department (<ent type='ORG'>DPD</ent>) recorded and investigated, however cursorily, quite a number
of reports about suspicious cars in the <ent type='GPE'>Dallas</ent> area that afternoon.[12] Yet,
according to <ent type='ORG'>Tilson</ent>, his own compatriots decided to ignore his report because
"if you didn't have a big white hat on, they didn't even want you in the
office."[13] Does it make sense that detectives will credit and investigate
reports from ordinary citizens, yet ignore one from "one of their own?"</p>
<p>Also, is it credible that a fleeing assassin would drive a dozen or so blocks
through city streets to get on a highway when there was and is an entrance
ramp onto the same highway, going in the same direction, within 100 yards of
where his car was supposedly parked and immediately to the left of the
Stemmons Freeway entrance taken by the motorcade? I think not.</p>
<p>If <ent type='ORG'>Tilson</ent>'s story is a fabrication, however, that doesn't preclude that a car
was found abandoned in <ent type='GPE'>Fort Worth</ent>, and in fact, one was. Almost by accident,
I met a retired <ent type='GPE'>Fort Worth</ent> police officer, WD Roberts, who had called in a
report of an abandoned and presumably stolen car only a few minutes after the
time that Kennedy was being shot thirty miles away.[14]</p>
<p>Officer Roberts, who is now retired from the force, was on patrol in the
Riverside section of east <ent type='GPE'>Fort Worth</ent> and had come across the vehicle. He
called it in to the dispatcher at about 12:45 to 1:00. (It was later
determined to have been stolen in <ent type='GPE'>Houston</ent> the previous week.) Roberts is
certain that the car was not black (ergo not related to <ent type='ORG'>Tilson</ent>'s "black
sedan"), but only recalls it as being "a light color, perhaps even
two-toned." Since it had been parked there for a number of days, we can
reasonably conclude that it was not related to the JFK murder, thereby
removing it from consideration in relation to the arrest in question.</p>
<p>If At First You Don't Succeed...
================================</p>
<p>Between the apparent fact that Tom <ent type='ORG'>Tilson</ent>'s black sedan never existed and
that the car found abandoned in <ent type='GPE'>Fort Worth</ent> wasn't connected to this
pseudo-event, it was quite certain that this avenue of inquiry would not lead
to a conclusion about the photo in FHK. Who, then, was the man in the photo,
and what could be learned about him? After all, he could be just about
anyone: how can an unidentified man be found thirty years later from his
image that is bound to have changed in the interim? There are more than two
million people in the <ent type='GPE'>Dallas</ent>-<ent type='GPE'>Fort Worth</ent> metroplex; where and how do you begin?</p>
<p>As anyone can see, there are in fact two men in the photograph: the
"unidentified suspect" and a police officer. Since nobody'd had any luck
finding out about the arrest from official files, I reasoned, the next-best
way would seem to be to find out what the arresting officer could remember.
And if you're trying to find out who a cop is, who're the best people to ask?
Naturally, other cops who may have worked with him. I decided to check with
<ent type='GPE'>Fort Worth</ent> police.</p>
<p>Identifying the officer in the photo proved not as easy as I'd thought, since
in the course of less than two hours, I'd gotten no less than four "positive
identifications" of the man from nearly a dozen of his fellow officers,
including the Assistant Chief of Police. Only one of them, as it turned out,
was correct. This should be instructive to anyone who attempts to identify a
person based upon the recollection of only one or two of his
contemporaries... even if they're trained observers, as police are frequently
termed.</p>
<p>The officer who found the abandoned car mentioned earlier, WD Roberts, also
turned out to be the arresting officer in the case of Donald Wayne <ent type='ORG'>House</ent>,
which many readers are familiar with. For the sake of those who aren't and
for putting Roberts' observations and impressions on the record (since
nobody's ever asked him about this before), we'll once again depart our main
focus on the FHK photo to recap the story of this arrest; interestingly, it
will lead us directly back to the photo.</p>
<p>In addition to the brief mention of the "2-city manhunt" in The <ent type='GPE'>Dallas</ent>
Morning News on the morning after the assassination, there was one (and only
one) other account of someone being arrested in <ent type='GPE'>Fort Worth</ent>. It appeared in
The <ent type='GPE'>Fort Worth</ent> Star-Telegram the day after the assassination, and related
that a 22-year-old man had been picked up as a possible suspect in the
assassination of President Kennedy.[15] While it didn't identify the man by
name, it did indicate that he was from Ranger, a small town southwest of Fort
Worth. It also identified the arresting officers (WD Roberts and BG Whistler)
and noted that the man had been arrested in the 3400 block of <ent type='GPE'>East Belknap</ent>
Street in the city.</p>
<p>Reconstructing this arrest from a variety of sources, it happened something
like this:</p>
<p>On the morning of November 22, Donald Wayne <ent type='ORG'>House</ent> left his home in Ranger, TX
bound for <ent type='ORG'>Mesquite</ent> (a <ent type='GPE'>Dallas</ent> suburb) to visit an old <ent type='ORG'>Army</ent> buddy, Randall
Hunsaker.[16] He had parked his car in a lot on Commerce Street at about
10:30[17] and called Hunsaker, who was apparently not home. Hearing that JFK
was due to ride through downtown, he decided to get a glimpse of Kennedy,
whom he says he had long admired.[18] After the motorcade had passed, he
headed toward <ent type='GPE'>Fort Worth</ent> on the DFW Turnpike to visit a cousin.[19]</p>
<p>Along the way, <ent type='ORG'>House</ent> says he stopped for gas at a station in <ent type='LOC'>Grand Prairie</ent>,
where two women who had heard about the assassination asked him if he knew
anything more about it. <ent type='ORG'>House</ent> told them that he'd heard the alleged
assassin's description, which he then related to the women. The description
he gave them of Oswald describes <ent type='ORG'>House</ent> as well, a resemblance that can be
clearly seen in photos taken of him that day except that <ent type='ORG'>House</ent> is much
shorter than Oswald.[20] It is also possible that the women had heard the
description themselves and felt that <ent type='ORG'>House</ent> matched it closely enough to
arouse their suspicions.</p>
<p>One of the two women he spoke with was apparently the "Mrs Cunningham"
identified in <ent type='GPE'>Dallas</ent> County Deputy Sheriff JC Watson's report who called the
<ent type='LOC'>Grand Prairie</ent> PD after <ent type='ORG'>House</ent> had left the filling station. The <ent type='LOC'>Grand Prairie</ent>
PD then notified the <ent type='GPE'>Dallas</ent> County sheriffs, who in turn made a general
broadcast including his description and that of his car and its license plate
number at 1:35 pm. A "short while" later <ent type='GPE'>Tarrant County</ent> officials notified
sheriffs that the car and driver had been taken into custody.[21]</p>
<p>The green and white <ent type='ORG'>Ford</ent> was heading westbound on the DFW Turnpike toward
<ent type='GPE'>Fort Worth</ent>.[22] At about the same time or just shortly after the Sheriff's
broadcast had gone out, <ent type='ORG'>FWPD</ent> officer WD Roberts had pulled into the Shady
Oaks Drive-in on Riverside Drive just after having called in his report of
the abandoned car. While waiting for a cup of coffee, he happened to glance
in his mirror and noticed the car going by. He took off after it, leaving the
carhop standing there with his order in hand.[23]</p>
<p>Roberts called into <ent type='ORG'>FWPD</ent> dispatch to verify <ent type='ORG'>House</ent>'s license plate number, and
because he was driving an underpowered cruiser, he also requested assistance
in case the driver attempted to evade him.[24] Officer BG Whistler, who was
patrolling an adjoining sector, sped to his assistance and met up with him a
short distance away at the "Five Points" intersection of <ent type='GPE'>East Belknap</ent> and
Bonnie Brae;[25] officer BL Harbour also fell in behind Whistler.[26] Upon
seeing he had assistance, Roberts notified dispatch that he was going to
"curb" the car.[27]</p>
<p>Roberts pulled around <ent type='ORG'>House</ent> and forced him to pull over in the 3400 block of
<ent type='GPE'>East Belknap</ent> Street near Sylvania Park; Whistler came up behind <ent type='ORG'>House</ent>, got
out of his squad car, and trained his shotgun on <ent type='ORG'>House</ent>, telling him to get
out of the car and keep his hands where they could be seen. Roberts frisked
him and put him in handcuffs before putting him in the back of Whistler's
car. By this time (shortly before 1:57 pm CST, the time on <ent type='ORG'>House</ent>'s arrest
report[28]), a number of other officers had also arrived, including Lt
Lawrence Wood who immediately took charge as the ranking officer. Harbour
joined Whistler in the latter's car and the two transported the prisoner to
city hall where they were photographed by newsmen.[29] Wood accompanied these
officers to city hall on his motorcycle[30] while Roberts remained behind to
secure the scene and inventory the vehicle.[31]</p>
<p>All of the officers involved described the arrest as "odd" because, during
all of this time, <ent type='ORG'>House</ent> never said a word. Roberts in particular thought so,
and "couldn't imagine how you could pull a man out of his car, frisk him,
handcuff him and put him in the back of a patrol car in a matter of just
seconds, all the time with a shotgun aimed at him and he never even asked why
he was being arrested!"[32]</p>
<p>Roberts' account was confirmed by Whistler, who added that Lt Wood had
instructed them not to ask <ent type='ORG'>House</ent> any questions or make any statements to him,
but to "leave that to the <ent type='NORP'>Feds</ent>," who had apparently been notified to meet the
officers at city hall.[33] <ent type='ORG'>House</ent>'s arrest report also indicated that "the
subject never once appeared nervous and in fact he was unusually calm," and
that he had never asked the officers why he was being arrested or taken into
jail.</p>
<p>Among the police, only Wood's account differed. He told a reporter that <ent type='ORG'>House</ent>
was "hysterical" and that "the guy stuttered, he was so scared he couldn't
get a single word out, no matter how long he tried,"[34] descriptions the
arresting officers adamantly denied. In Wood's defense, however, that
recollection was nearly twenty years old by the time it was made.</p>
<p>(<ent type='ORG'>House</ent>'s own account of it, published ten months after his arrest, says that
he'd asked why he was being arrested and was told by officers "You're being
arrested for the assassination of President Kennedy,"[35] which also
contradicts the officers' statements. I consider this to be a relatively
minor point since <ent type='ORG'>House</ent> was "in the spotlight" during the interview and may
have tended to meld details. He was undoubtedly told at some time why he'd
been brought in; whether it was before or after he arrived at city hall seems
more a matter of how he told the story than how it actually happened.)</p>
<p>Another oddity, Roberts recalled, was that <ent type='ORG'>House</ent>'s car was "absolutely
spotless, there wasn't even a slip of paper in the glove box," although he
found an empty dynamite box in the trunk, which <ent type='ORG'>House</ent> claimed to have been
using as a tool chest[36] (Wood, in his account, said that "we found several
boxes of dynamite in the back seat,"[37] which the arresting officers also
disputed). Roberts was surprised to learn that <ent type='ORG'>House</ent> supposedly junked the
car a short while later[38], saying that he couldn't imagine why he did since
the car was "immaculate."</p>
<p><ent type='ORG'>House</ent> was transported to city hall (which also housed police headquarters at
the time) by Officers Whistler and Harbour, and photographs[39] show the two
taking him inside. <ent type='ORG'>House</ent> was then put in the "shakedown" room and searched,
where the only belongings that were recorded having been taken from him was a
wallet containing $23 in cash and a knife.[40] According to <ent type='ORG'>House</ent>, he was
interrogated by federal officers for three hours and remained alone in his
cell for another hour before being cleared and released,[41] although the jail
report indicates the time was slightly shorter.[42]</p>
<p>Another apparent "oddity" came up when Roberts also recalled that, when he
arrived at city hall later in the day, he had gone to the chief's secretary
to dictate his report. About midway into his report, he says, the chief came
in and told him "not to bother" completing his report, that the man had
already been cleared by the <ent type='NORP'>Feds</ent>.[43] Whistler also did not recall writing a
report, corroborating Roberts' memory.</p>
<p>Again, there is nothing "sinister" about this. The official record of federal
agents interviewing him exists, and was published by the Warren
Commission.[44] I was also able to find an arrest report for <ent type='ORG'>House</ent> on file
that was compiled from "information from" the two arresting officers and BL
Harbour (who is now deceased). It was typed by a clerk and filed; it was not,
however, signed by the officers which is why I believe they don't remember
having filed it since, in reality, it was typed and filed after they'd
recounted the details of the arrest to the clerk. Considering the commotion
of the afternoon, it is hardly surprising that this occurred.</p>
<p>A Second Arrest in <ent type='GPE'>Fort Worth</ent>
=============================</p>
<p>While there is a relative wealth of information about Donald Wayne <ent type='ORG'>House</ent>
available, as we've already learned, nothing was known about the second man
who is pictured in FHK. As I've already noted, in Cover-Up, <ent type='ORG'>Shaw and Harris</ent>
relate that "a second <ent type='GPE'>Fort Worth</ent> arrest was made at the same time <ent type='ORG'>House</ent> was
taken into custody, but other than photographs from The <ent type='GPE'>Fort Worth</ent>
Star-Telegram, there is no record of the arrest." They continue that
"negatives of these photos [which include the one that appears in FHK and
also in Cover-Up] are now missing from the newspaper's files."[45] Morrow
added his opinion that the man looked like someone associated with the <ent type='ORG'>CIA</ent>
and/or <ent type='ORG'>the Bay</ent> of Pigs operation. It all sounds very mysterious, almost
sinister.</p>
<p>None of the newspaper articles around that period provide any indication of
who this man was, and no account of this second arrest appeared in any of the
local papers. None of the photos were published by local newspapers, although
there were at least four other photos taken of him in addition to the one in
FHK. A second picture, which appears in Cover-Up,[46] shows the man being
taken from the <ent type='ORG'>FWPD</ent> patrol car by Lt Wood, and a third on file at the
Star-Telegram offices depicts him being led by Wood and another officer (the
same one in the FHK photo) into city hall; two others show the back of the
man and the arresting officers as they entered the building.</p>
<p>Neither of the two photos in Cover-Up (one of which is the one in FHK) were
taken by Star-Telegram photographers, which explains why the negatives are
not on file there. Most likely, they were taken by its rival newspaper, The
<ent type='GPE'>Fort Worth</ent> <ent type='ORG'>Press</ent>, which ceased printing in May 1976 (although a new weekly
paper has been recently started under the same banner). The Star-Telegram, as
Shaw noted, no longer has all of the negatives of the photos they had taken,
but I was able to find photos on contact sheets (positives made directly from
the film strips) there, and most did indeed have negatives available. The
photo archives of the <ent type='ORG'>Press</ent> are said to be in private hands, so I have as yet
been unable to view whatever remains of them.</p>
<p>Some people have suggested that the Star-Telegram's negatives may have been
removed by the <ent type='ORG'>FBI</ent> as part of its official investigation, but there is no
evidence that this is the case. Some Star-Telegram staffers thought this
might be so, but the director of the photo archives told me that it is much
more likely that the photographers did not turn them all in, or removed them
after realizing that they may have some historical value. "We don't polygraph
them to make sure they do," he said. In any case, they were not removed by
any official body as part of either an investigation or a cover-up, nor most
certainly, to protect David <ent type='ORG'>Phillips</ent>.</p>
<p>While negatives are not available for a number of photos, there is nothing
particularly noteworthy about the ones that are missing versus those that are
not. In my estimation, it doesn't appear there is any cause to claim a
cleanup of "incriminating" photos, and certainly not with regard to this
particular arrest, since, as we shall soon see, the man had nothing to do
with either the assassination or the government. The photos on the contact
sheets can generally be viewed by the public on request, although it isn't
always easy to get copies of them.</p>
<p>The contact sheets turned out to be the solution to the question of who the
officer in the FHK photo actually was since, in one of the photos, I was able
to read the name plate on one of the men in one of the contact sheet photos:
it read "HW <ent type='ORG'>Sinclair</ent>," one of the four officers named by his associates.
After making a number of phone calls, I was able to locate <ent type='ORG'>Sinclair</ent>, and
phoned him an arranged to visit with him at his home in rural <ent type='GPE'>East Texas</ent>. Now
retired and raising cattle, he doesn't seem to have aged much in the past 29
years and looks very much the same as he did the day the photo was taken.
Both he and his wife positively identified him in the FHK photo, and also
identified Lt Lawrence Wood as the man with him in a photocopy I'd been able
to make of a Star-Telegram photo showing both officers.</p>
<p>(Two of the other officers who had been identified later called me and
identified <ent type='ORG'>Sinclair</ent> as well. It is also worth noting that, in head-on photos
of the man in custody, the similarity between him and "Maurice <ent type='ORG'>Bishop</ent>" and/or
David Atlee <ent type='ORG'>Phillips</ent> is no longer evident. One such photo can be seen in Shaw
and Harris' Cover-Up,[47] and another is on file at The <ent type='GPE'>Fort Worth</ent>
Star-Telegram.)</p>
<p><ent type='ORG'>Sinclair</ent> is a private man and wouldn't allow our interview to be taped. He
was, however, very forthcoming in his recollections of that period. In
addition to arresting the man in the picture, <ent type='ORG'>Sinclair</ent> had also performed
security at <ent type='ORG'>Miller</ent>'s Funeral Home while Lee Oswald was being prepared for
burial, and also at Rose Hill Cemetery when Oswald was buried. He also
pointed out that <ent type='ORG'>FWPD</ent> kept a guard at the gravesite for many months following
Oswald's burial, citing various threats of people digging up the body and
dragging it through the streets of the city.</p>
<p>It was a quirk of fate that got <ent type='ORG'>Sinclair</ent> involved in these events. Since he
had joined the force in 1956, he had been assigned as a patrolman in the
detective division, investigating fraud in plain clothes. Sometime in
mid-1963, however, someone decided that all patrolmen were to be assigned to
the <ent type='ORG'>Patrol Division</ent>, so <ent type='ORG'>Sinclair</ent> donned his uniform and patrolled the
streets. In January 1964, <ent type='ORG'>Sinclair</ent> was named the <ent type='ORG'>Patrol Division</ent> Officer of
the Year for 1963, and promoted to detective. He returned to plain clothes
and was assigned to <ent type='ORG'>the Homicide Division</ent> for the remainder of his years with
<ent type='ORG'>FWPD</ent>.</p>
<p><ent type='ORG'>Sinclair</ent> remembered the arrest having taken place in the Riverside area on
the east side of <ent type='GPE'>Fort Worth</ent>, although he couldn't recall the exact location.
He had assisted two officers who he thought were on motorcycles to transport
the prisoner to city hall. "There were a lot of cops there," he said, adding
that he had arrived after the other officers. Lt Wood, whom <ent type='ORG'>Sinclair</ent>
diplomatically said was "not shy of the media," appeared "out of nowhere"
when he arrived at city hall with the prisoner. (In fact, Wood was already at
city hall, having escorted officers Whistler and Harbour with Donald <ent type='ORG'>House</ent>
from the arrest scene. In the <ent type='ORG'>NBC</ent> film footage, Wood can be seen alighting
from his motorcycle in front of the police cruiser) Wood then helped <ent type='ORG'>Sinclair</ent>
take the man out of the patrol car and escorted him into city hall. Wood is
also pictured taking the man out of the cruiser's front seat in one of the
photos in Cover-Up,[48] and it is his fingers that can be seen at the
prisoner's right elbow in the FHK photo.</p>
<p>Because he had merely assisted in the arrest, <ent type='ORG'>Sinclair</ent> did not believe that
he had filed an arrest report, that duty falling to the actual arresting
officers, whom <ent type='ORG'>Sinclair</ent> recalled having stayed behind to secure the arrest
scene and inventory the vehicle the man had apparently been stopped in. He
says he may have filled in a "call sheet," but later investigation found that
these are only kept for six months before being destroyed, so if he had, it
is no longer available. Beyond these facts and his recollection that it was
the only time in his career that he had loosed the shotgun officers carried
in their cruisers, he couldn't remember anything particularly striking about
the arrest and he was unable to remember what the man's name might have been.
He noted that Wood is now deceased, and that he didn't know who the arresting
officers might have been.[49]</p>
<p>The Unidentified Man</p>
<p>While I had successfully identified the officer in the picture, I was still
no closer to learning who the man in custody was or why he been detained.
During my many meetings with current and retired <ent type='ORG'>FWPD</ent> officers, however, I
had been referred to a number of others who may have had some information
regarding the case. One of these men was assigned as an officer to the
Identification Division in 1963, where he continues to work today as a
civilian employee (his associates consider him to be "the best fingerprint
guy you can find anywhere"). <ent type='ORG'>Sinclair</ent> thought that this individual may have
been working the afternoon of the arrests, and could provide some useful
information.</p>
<p>As it turned out, he had worked the evening shift on November 22, and thus
had no details of the arrest. However, he thought there might still be a
record of it on file, but shortly found that the department's worksheets of
that period were no longer on file. He felt that I wouldn't be able to find
any information without knowing the man's name, but nevertheless transferred
me to the supervisor of <ent type='ORG'>the Records Division</ent>. The supervisor suggested that I
come into the police station and look through some of their old microfilm
records. I went to <ent type='GPE'>Fort Worth</ent> later the same afternoon.</p>
<p>I didn't really know what I was looking for, whether it would be a jail
roster or what, but I thought I might have been able to find a name that was
out of place or couldn't be verified against other records. I was given two
rolls of microfilm covering the period, one of arrest records, and another of
the Disposition Report and Property Records of prisoners. Since I had already
read elsewhere and been told by the officers that no arrest record was made,
I didn't know how much luck I'd have, but I figured it was worth a try.</p>
<p>I began reading the arrest reports. It appeared that November 22, 1963
started out like any other day for <ent type='ORG'>FWPD</ent> (aside from the President's visit
that morning). Of the thirty or so arrests officers made that day, many were
listed as "juvenile fugitives," and a roughly equal number were for
"investigation of theft under $50 (shoplifting)." There was also a report of
a man who'd been taken into custody because the police had learned he had VD,
and one of a man who had been arrested in the men's room of the local bus
station while injecting nitroglycerine into his arm. Maybe the day wasn't so
"typical" after all....</p>
<p><ent type='GPE'>Midway</ent> through the day's reports was the arrest report for Donald Wayne
<ent type='ORG'>House</ent>, which I decided to make a copy of since, after all, I'd been told it
hadn't been filed. The very next arrest report was for another man named
Kenneth Glenn <ent type='ORG'>Wilson</ent>, then of 6121 Broadway in <ent type='GPE'>Haltom City</ent> to the east of
<ent type='GPE'>Fort Worth</ent>. Interestingly, he had also been arrested at the 3400 block of
<ent type='GPE'>East Belknap</ent> Street, 23 minutes after <ent type='ORG'>House</ent> had been. The arresting officers
were listed as Lt LE Wood and HW <ent type='ORG'>Sinclair</ent>.[50]</p>
<p>This was an odd coincidence: nobody had mentioned two men having been
arrested in that place at that time. Who was this man, and what had he been
arrested for? That the arresting officers were the same two men who had been
photographed bringing the "unidentified suspect" into city hall made this
record all the more intriguing. (It is worth noting that Wood couldn't have
actually been an arresting officer since he'd already left the scene before
the man was taken into custody. He was, however, one of the two officers who
escorted him into city hall and booked him, and so was included in the
report.)</p>
<p><ent type='ORG'>Wilson</ent>, an auto parts salesman, was charged as an "investigation witness." If
he was the same man in the photos, this helped to explain why he is shown
unmanacled in the photos taken at city hall: the man wasn't a suspect, but a
witness! A witness of what? The details of the arrest provided that
information:</p>
<p>"The above subject was arrested and charged as above [Inv. Witness] after he
came to the scene of where <ent type='ORG'>House</ent> was arrested. When he arrived at the scene,
he stated that he recognized the car which <ent type='ORG'>House</ent> was driving and stated that
he thought that it belonged to his wife's cousin. On the way to the [city]
hall, the subject stated that <ent type='ORG'>House</ent> was recently been discharged from the
service. He stated that he had not seen <ent type='ORG'>House</ent> lately and that his home is in
Ranger, <ent type='GPE'>Texas</ent>" [emphasis added].[51]</p>
<p>As noted earlier, the interview <ent type='ORG'>House</ent> had with the <ent type='GPE'>Fort Worth</ent> <ent type='ORG'>Press</ent> said that
he was traveling to <ent type='GPE'>Fort Worth</ent> to visit his cousin, in addition to mentioning
his intent to visit his <ent type='ORG'>Army</ent> buddy in <ent type='GPE'>Dallas</ent>.[52] This man <ent type='ORG'>Wilson</ent>--or rather,
his wife--must be who <ent type='ORG'>House</ent> was going to see.</p>
<p>When I was talking with WD Roberts earlier, neither of us could figure out
why he had gotten off of the highway and driven up Riverside Drive since his
home was a number of miles farther out the same road. I drove to 6121
Broadway, the address given on <ent type='ORG'>Wilson</ent>'s arrest record. While the house no
longer exists, the route that <ent type='ORG'>House</ent> took would have led him to his cousin's
house about a mile from where he was arrested. This particular segment of the
story no longer held any mystery. The question that nagged at me, though, was
how <ent type='ORG'>Wilson</ent> knew <ent type='ORG'>House</ent> had been arrested in the first place, an answer I knew
only <ent type='ORG'>Wilson</ent> could provide.</p>
<p>I was finally able to locate and contact <ent type='ORG'>Wilson</ent> (he no longer lives in Fort
Worth), who verified that he was the same Kenneth Glenn <ent type='ORG'>Wilson</ent> who had lived
at the 6121 Broadway address nearly 30 years ago. I explained the reason I
was calling, to identify a man in a photo which I believed to be him, and
wondered if he would be willing to help me. We discussed the circumstances
which led up to the photo being taken, and as he provided me with various
details without prompting_<ent type='ORG'>House</ent>'s name, the make and color of car he was
driving, that he was from Ranger and that <ent type='ORG'>House</ent> was, in fact, his wife's
cousin_it quickly became apparent that I had found the man whose arrest
report I held, but was he the same man in the photo?</p>
<p>In the course of our conversation, he mentioned that he had a book about the
assassination with his picture in it; did I perhaps have the same one? It
turned out to be Cover-Up, which of course, I had. I asked him to turn to
page 89 where the photos of <ent type='ORG'>House</ent> and the "unidentified suspect" were, and
asked him if he recognized any of them. "Sure," he said. "The three across
the top are Don, and the two below that are of me."[53] One of these two
photos is the same as that which appears in FHK, as we've already discussed.</p>
<p>Satisfied that <ent type='ORG'>Wilson</ent> and the "unidentified suspect" were one and the same, I
arranged to meet with him the following weekend when I could make the time to
travel to where he now lives. We met one Saturday afternoon at a roadside
restaurant near the interstate; he was accompanied by his wife and young
grandson, who was visiting for the weekend. We talked for nearly three hours.</p>
<p><ent type='ORG'>Wilson</ent> now wears glasses and is, in his words, "a little fatter and deeper in
debt," but the similarity with the man in the FHK photo was unmistakable. He
parts his hair differently, but facial characteristics like the nose, chin
and forehead don't change, and_despite his denial_he still has the same slim
build he had back then. When he later posed in the same semi-profile as in
the picture, there was no doubt I was looking at the same man. Furthermore,
both he and Mrs <ent type='ORG'>Wilson</ent> recognized the pencil he'd always hung over his ear,
and the pocket protector he wore in those days.</p>
<p>How did <ent type='ORG'>Wilson</ent> come to be at that place and time where his cousin-in-law had
been arrested only moments before? Mrs <ent type='ORG'>Wilson</ent> provided most of the
details:[54]</p>
<p>At some point after the shooting, while <ent type='ORG'>House</ent> had been enroute to <ent type='GPE'>Fort Worth</ent>,
<ent type='GPE'>Dallas</ent> police had contacted his mother_with whom he was living at the time_to
determine his whereabouts. After two or three such calls, Mrs <ent type='ORG'>House</ent> became
concerned, and called her niece, Mrs <ent type='ORG'>Wilson</ent>. (Mrs <ent type='ORG'>House</ent> is now deceased, so I
was unable to determine what <ent type='ORG'>DPD</ent> had talked with her about during those
calls.) Mrs <ent type='ORG'>House</ent> called the <ent type='ORG'>Wilson</ent>s' because, whenever Don came to Fort
Worth, he would spend the night with the <ent type='ORG'>Wilson</ent>s and she expected he would do
so this night too. After the calls from <ent type='ORG'>DPD</ent>, she became worried.</p>
<p>Shortly after the call from her aunt, Mrs <ent type='ORG'>Wilson</ent> heard a radio broadcast of a
suspect, identified as "22-year-old Donald <ent type='ORG'>House</ent> of Ranger, <ent type='GPE'>Texas</ent>" having
been arrested at 3408 <ent type='GPE'>East Belknap</ent> in <ent type='GPE'>Fort Worth</ent>.[55] At first, she said, she
didn't recognize the name since "nobody called him Donald," but realized
after a moment that it had been her cousin who'd been taken into custody in
connection with the slaying.</p>
<p>She noted that the address was only a couple of blocks from where her husband
worked selling auto parts, and called to ask him to check on Don since it
appeared he was in some sort of trouble. He excused himself from work and
walked the short distance to where <ent type='ORG'>House</ent> had been arrested. There, he told
officers that he thought the car belonged to his wife's cousin, and was taken
into custody at 2:20 pm.[56] "I was looking out for Don," Ken <ent type='ORG'>Wilson</ent> told me,
"and they ended up taking me to jail!"</p>
<p>He was not charged with a crime, and as the record of his arrest shows, he
was brought in solely as a witness. He was questioned about his relationship
with Don <ent type='ORG'>House</ent> and released 90 minutes later, at 3:50.[57] He returned home
with his wife, where <ent type='ORG'>House</ent> joined them a couple of hours later (<ent type='ORG'>House</ent> wasn't
released until 5:15[58]).</p>
<p>(Mrs <ent type='ORG'>Wilson</ent> recalled an amusing anecdote from that day: when Don had finally
come to their house, everyone wanted to know if he'd been nervous. "Nervous?
Of course not, I didn't do anything," he said, sitting down... missing the
chair completely and sprawling on the floor. Nervous? Who me? I guess not.)</p>
<p><ent type='ORG'>Wilson</ent>'s account also clears up questions about HW <ent type='ORG'>Sinclair</ent>'s recollection of
the event and in reconstructing the "arrest:" <ent type='ORG'>House</ent> had been curbed by
Roberts and hurried into Whistler's cruiser with Harbour in the back with
<ent type='ORG'>House</ent>. They in turn sped off to city hall with their prisoner with Lt Wood in
the lead, who may well have given orders to secure the scene before
departing. Other officers began arriving during and after this period, one of
whom was <ent type='ORG'>Sinclair</ent>. Whether he arrived before or after <ent type='ORG'>Wilson</ent> is difficult to
determine and not really important. He was nevertheless selected to transport
<ent type='ORG'>Wilson</ent> to headquarters, which he did. Obviously, <ent type='ORG'>Sinclair</ent> did not feel
threatened by the mild-mannered <ent type='ORG'>Wilson</ent>, who rode beside him unmanacled and
volunteering information about his wife's cousin, Don <ent type='ORG'>House</ent>, during the five-
or ten-minute ride downtown. From all accounts, it was a relatively pleasant
trip, if being under arrest or dealing with suspected Presidential assassins
can ever be called "pleasant!"</p>
<p>On arriving at city hall, the two men were met by Lt Wood, who had escorted
Whistler, Roberts and <ent type='ORG'>House</ent> to city hall less than a half-hour before.
Undoubtedly, Wood felt a need for additional police presence ushering <ent type='ORG'>Wilson</ent>
into city hall because a crowd of people had gathered,[59] and under the
circumstances, it wouldn't have been unreasonable to suspect they might have
become unruly at the sight of a "suspect" in the assassination being led
before them. In fact, Ken <ent type='ORG'>Wilson</ent> recalled the scene as "a little frightening
with all those people standing around yelling."[60]</p>
<p>Photos of both <ent type='ORG'>House</ent> and <ent type='ORG'>Wilson</ent> were taken by photographers from both the
Star-Telegram and the <ent type='ORG'>Press</ent>, although neither paper ever published them. TV
camera crews also captured footage of <ent type='ORG'>House</ent> being led into city hall and
through the corridors of the police department, but if similar footage of
<ent type='ORG'>Wilson</ent> exists, I haven't seen it.</p>
<p>Conclusion
==========</p>
<p>Beginning with a photograph of an "unidentified man" said to have been
arrested in <ent type='GPE'>Fort Worth</ent> and connected with both the Kennedy murder and the
<ent type='ORG'>CIA</ent>, along with a vague rumor or two of how the "black sedan" described by
Tom <ent type='ORG'>Tilson</ent> may have been found in <ent type='GPE'>Fort Worth</ent>, we've come to find that not
only is there no evidence to support such a connection, but also that it is
quite apparent that the black sedan never actually existed and is either a
figment of <ent type='ORG'>Tilson</ent>'s imagination, a mis-recollection, or an attempt to portray
himself as having a role in the events of November 22, 1963_however
peripheral_which he in fact did not have.</p>
<p>While it is a fact that two men were taken into custody in <ent type='GPE'>Fort Worth</ent> "in
connection with the shooting," there is nothing other than speculation that
can link either of them with the murder. <ent type='ORG'>House</ent> had been to <ent type='GPE'>Dallas</ent> to visit a
friend who wasn't home when he got there. Unable to leave town because of the
heavy traffic due to the parade, he waited for the motorcade to pass before
he was able to leave to visit his cousin. A couple of women at a gas station
thought he matched the broadcast description of a suspect, and he was taken
into custody, cleared and released.</p>
<p>The second man, Ken <ent type='ORG'>Wilson</ent>, was only trying to help <ent type='ORG'>House</ent>, his wife's cousin.
He was taken into city hall as a witness, and not as a suspect. He wasn't
charged with any crime, and wasn't even handcuffed as he rode to city hall in
the front seat with HW <ent type='ORG'>Sinclair</ent>. He was questioned about his relationship to
<ent type='ORG'>House</ent>, released and went home. He's hardly given a second thought to these
events afterward until I spoke with him about them.</p>
<p>That Ken <ent type='ORG'>Wilson</ent> remained "unidentified" for nearly 30 years is surprising
when you consider that I was able to locate and identify him within two weeks
of the time his photo in FHK was brought to my attention, using records which
"don't exist" long after others had apparently attempted the same. None of
the police officers involved in these arrests_save Lawrence Wood, who was
interviewed by The <ent type='GPE'>Fort Worth</ent> Star-Telegram 20 years later_had ever been
contacted by anyone, and it's apparent that the search for the men's arrest
records was neither thorough nor tenacious since they were, in fact, quite
readily available.</p>
<p>I must admit I had been somewhat surprised that Ken <ent type='ORG'>Wilson</ent> had never
attempted to identify himself, especially having seen his photo in Cover-Up
along with what could be considered "mysterious" if not "sinister"
insinuations made about his being taken into custody. Then again, maybe I
shouldn't have been so surprised, since there are many people who are
apprehensive or skeptical, even cautious and suspicious of anything to do
with the JFK murder, and don't want their names associated with it.</p>
<p>On the other hand, we've also got to ask ourselves who would <ent type='ORG'>Wilson</ent> have gone
to even had he wished to identify himself? It's not an easy task to reach an
author through his publisher after all, and even so, once a book is published
and widely circulated, it is not an easy matter to change bits of material,
especially when it doesn't add to the story. It is unlikely that Cover-Up
will be amended, but will <ent type='ORG'>First Hand Knowledge</ent> be corrected because we now
know for certain that the "unidentified suspect" is no longer unidentified,
was never in fact a suspect, and was absolutely not either David <ent type='ORG'>Phillips</ent> or
"Maurice <ent type='ORG'>Bishop</ent>?" We'll have to wait for the second printing to find out.</p>
<p>While the underlying concern of whether it is "better" from a publishing
standpoint to maintain the intrigue and aura of mystery, or to ascertain that
mundane details_as this has turned out to be_are accurately portrayed remains
an important one, it is in truth of little consequence whether <ent type='ORG'>Wilson</ent>'s
"story" is corrected since, to all those thousands of people who've bought
Cover-Up and FHK and not read this article, Ken <ent type='ORG'>Wilson</ent> will always be a
"mysterious <ent type='ORG'>CIA</ent> agent" involved in the assassination whose "arrest" was
"covered up" by sinister forces. Certainly, I'd like to see the record
amended, but I don't expect it will be. I just hope the same mistake won't be
made by future authors.</p>
<p>It is perhaps unfortunate in some respects that I have brought these men and
women to the fore, even despite the fact that it has "cleared" an innocent
man from any involvement with the crime, and set the record straight about
his detention. <ent type='ORG'>Wilson</ent>, for example, told me how his wife's cousin, Don <ent type='ORG'>House</ent>,
had been "harassed" over the peripheral role he had played in the events of
November 22, 1963, and no longer wishes to talk to anyone about it; indeed,
Cover-Up states that when the authors attempted to interview <ent type='ORG'>House</ent> during the
course of their research, they met with "extreme hostility." Others declined
to have their recollections recorded, voicing similar concerns.</p>
<p>For these reasons, I have refrained from noting too many personal details to
preserve their privacy and hopefully to prevent them from becoming part of
"the continuing inquiry," ruing the day they first heard my name: their roles
are long since finished. I enjoyed meeting each of them, and appreciate the
time they took to speak with me, the hospitality they showed me, and the
assistance they provided to close this chapter of history quickly. I hope
they never have cause to regret it.</p>
<p>I hope too that this experience can temper the enthusiasm, even zeal, of many
researchers who feel that the "truth" can be found by citing every lead and
"reasonable conclusion" as absolute fact. If we are ever to be successful in
our efforts to re-open an official investigation of some sort, we must come
armed with evidence, not mere theories and speculations. After all, we're
supposed to be investigating a murder, not writing novels or creating myths,
aren't we?</p>
<p>Copyright c 1993, M. Duke Lane</p>
<p>The author gratefully acknowledges the advice, assistance and encouragement
of Gary Mack, Mary Ferrell, Dave Perry, and other <ent type='GPE'>Dallas</ent> area researchers in
this investigation.</p>
<p>NOTES
-----</p>
<p>1. Interview with Gary Null, <ent type='ORG'>WBAI</ent>-FM <ent type='GPE'>New York</ent>, 99.5 FM, October 1992</p>
<p>2. See Letters to the Editor of The Third Decade, Volume 9, Number 1,
November 1992, pp 36-40; Number 2, January 1993, pp 9-11; and Number 3, March
1993, pp 27-28 (all related).</p>
<p>3. Robert Morrow, <ent type='ORG'>First Hand Knowledge</ent>, 1992, S.P.I Books/Shapolsky
Publishers, Inc, <ent type='GPE'>New York</ent></p>
<p>4. Gary Shaw and Larry Ray Harris, Cover-Up, self-published, Cleburne TX,
1976, page 89</p>
<p>5. Obituary, <ent type='ORG'>The Washington Post</ent>, July 9, 1988, pG5</p>
<p>6. "Police Launch 2-city <ent type='ORG'>Manhunt</ent>," The <ent type='GPE'>Dallas</ent> Morning News, November 23, 1963,
page 2. The full account reads: "During the frantic period at the hospital,
police, <ent type='ORG'>Secret Service</ent> men and <ent type='ORG'>FBI</ent> agents had started a 2-city manhunt. They
arrested several persons, among them a <ent type='GPE'>Fort Worth</ent> man who was said to be
driving a car linked to the slayer." There was no additional coverage of this
event in the paper.</p>
<p>7. Earl Golz, "Ex-officer suspect he chased `2nd gun'," The <ent type='GPE'>Dallas</ent> Morning
News, August 20, 1978, p 42A.</p>
<p>8. Jim Marrs, Crossfire: The Plot that Killed Kennedy, 1989, Carroll &amp; Graf
Publishers, <ent type='GPE'>New York</ent>, pp 325-327. This is a nearly verbatim recounting of the
aforementioned Golz article.</p>
<p>9. Golz, "`2nd gun'"</p>
<p>10. "Scenes From an Assassination" (photographic essay), The <ent type='GPE'>Dallas</ent>
Times-Herald, November 20, 1983</p>
<p>11. Golz, "`2nd gun'"</p>
<p>12. <ent type='ORG'>See Decker Exhibit</ent> 5323 (affidavits to <ent type='GPE'>Dallas</ent> County Sheriffs): 19H500,
Malcolm Summers, November 23, 1963; 19H497-98, Jesse James Williams, November
22, 1963; 19H501, William Clifford Anderson, November 25, 1963; 19H522-23,
November 22, 1963; and Cover-Up, p 88 (reference to <ent type='ORG'>DPD</ent> radio logs for
11/22/63, time not indicated)</p>
<p>13. Golz, "`2nd gun'"</p>
<p>14. Interview with WD Roberts by author, December 22, 1992</p>
<p>15. "Man Arrested Here Released," The <ent type='GPE'>Fort Worth</ent> Star-Telegram, November 23,
1963, p9</p>
<p>16. Warren Commission Document #301 (CD 301), pp 111-112. See also John
Moulder, "'Suspect' Seized Here Made History," The <ent type='GPE'>Fort Worth</ent> <ent type='ORG'>Press</ent>,
September 28, 1964, page 1 and Cover-Up, p 88.</p>
<p>17. Ibid CD 301, and CD 897, p 331</p>
<p>18. "'Suspect' Seized Here Made History"</p>
<p>19. Ibid</p>
<p>20. Cover-Up, p 89</p>
<p>21. 19H522-23, November 22, 1963.</p>
<p>22. Ibid, and arrest report #19560, <ent type='ORG'>FWPD</ent>, Donald Wayne <ent type='ORG'>House</ent>. November 22, 1963</p>
<p>23. Roberts interview</p>
<p>24. A six cylinder <ent type='GPE'>Plymouth</ent>: Roberts interview and <ent type='ORG'>House</ent> arrest report</p>
<p>25. Interview with BG Whistler, January 5, 1993</p>
<p>26. <ent type='ORG'>House</ent> arrest report</p>
<p>27. Roberts interview; Whistler interview</p>
<p>28. <ent type='ORG'>House</ent> arrest report. Note that this may be "official" as opposed to
actual time since an <ent type='ORG'>NBC</ent> newscast transcript notes the first broadcast that
"a car has been stopped at <ent type='GPE'>Fort Worth</ent> that may have some connection with the
shooting" at 1:49 pm CST, eight minutes earlier. WBAP radio had also
broadcast a similar statement three minutes earlier at 1:46, indicating that
<ent type='ORG'>House</ent> had already been pulled over and perhaps already taken to city hall.</p>
<p>29. Cover-up, p 89, upper row of photos</p>
<p>30. Wood is now deceased and surviving officers do not recall who the
motorcycle officers were, but news footage taken by <ent type='ORG'>KXAS</ent>-TV (then WBAP-TV)
made available to me by <ent type='GPE'>Fort Worth</ent> researcher Gary Mack shows Wood getting
off of his motorcycle as <ent type='ORG'>House</ent> is being driven up in the squad car</p>
<p>31. <ent type='ORG'>House</ent> arrest report; Roberts and Whistler interviews</p>
<p>32. Roberts interview</p>
<p>33. Whistler interview</p>
<p>34. Elston Brooks, "An Arrest He'll Never Forget," The <ent type='GPE'>Fort Worth</ent>
Star-Telegram, November 20, 1983, p 20F (Sunday special section: "Turning
Point: The Assassination of JFK")</p>
<p>35. "'Suspect' Seized Here Made History"</p>
<p>36. Ibid</p>
<p>37. "An Arrest He'll Never Forget"</p>
<p>38. Cover-Up, p 88</p>
<p>39. Photos can be seen in Cover-Up, top of p 89</p>
<p>40. <ent type='ORG'>House</ent> Property Record #19560, <ent type='ORG'>FWPD</ent></p>
<p>41. "'Suspect' Seized Here Made History"</p>
<p>42. <ent type='ORG'>House</ent> disposition report #19560, <ent type='ORG'>FWPD</ent>. The report indicates that charges
were dropped after <ent type='ORG'>House</ent> was questioned, and he was released at 5:15 pm, 3
hours and 18 minutes after he'd been arrested</p>
<p>43. Roberts interview</p>
<p>44. CD 301</p>
<p>45. Cover-Up, page 89</p>
<p>46. Ibid</p>
<p>47. Ibid</p>
<p>48. Ibid</p>
<p>49. Interview with Mr and Mrs HW <ent type='ORG'>Sinclair</ent>, December 20, 1992</p>
<p>50. <ent type='ORG'>Wilson</ent> arrest record #19561, <ent type='ORG'>FWPD</ent> (shown on back cover), and accompanying
disposition report and property record #19561</p>
<p>51. Ibid</p>
<p>52. "'Suspect' Arrested Here Makes History."</p>
<p>53. Telephone interview with Kenneth Glenn <ent type='ORG'>Wilson</ent>, January 9, 1993</p>
<p>54. Interview with Mr and Mrs Kenneth Glenn <ent type='ORG'>Wilson</ent>, January 23, 1993</p>
<p>55. Live WBAP radio broadcast, November 22, 1963 at the time <ent type='ORG'>House</ent> was
brought into the jail. In addition to the newspaper reporters and
photographers who were at city hall, there were a number of television and
radio personnel. Footage from <ent type='ORG'>KXAS</ent>-TV and <ent type='ORG'>KTVT</ent>-TV (op cit) of <ent type='ORG'>House</ent> being
brought into police headquarters and being marched through the hallways and
offices clearly indicates that coverage of the arrest was immediate.</p>
<p>56. <ent type='ORG'>Wilson</ent> and <ent type='ORG'>House</ent> arrest records. Again, this is an official rather than
actual time.</p>
<p>57. At 3:50 pm; <ent type='ORG'>Wilson</ent> disposition report #19561</p>
<p>58. <ent type='ORG'>House</ent> disposition report #19560</p>
<p>59. WBAP-TV (<ent type='ORG'>NBC</ent>) news footage</p>
<p>60. <ent type='ORG'>Wilson</ent> interview</p>
</xml>

View File

@ -0,0 +1,950 @@
<xml><p>I notice the now-ancient Gauquelin "<ent type='LOC'>Mars</ent> Effect" affair continues to
crop up, perennially, with considerable time-honoured but still-fuzzy
rhetoric about an alleged <ent type='ORG'>CSICOP</ent> "cover up", including copious
laudatory mentions of Dennis Rawlins's ALSO-ancient jeremiad
"sTARBABY", which appeared in "Fate" magazine. Essentially all
treatments of the affair since then have been loose (and even MORE
careless) descendants of the Rawlins article, often committing gross
distortions, such as confusing the test of <ent type='NORP'>European</ent> athletes with the
later one based on U.S. data. </p>
<p>The ONLY proper rejoinder I've ever seen to Rawlins was a reply piece
by <ent type='ORG'>CSICOP</ent> Fellow P. J. <ent type='ORG'>Klass</ent>, which "Fate" refused to publish, and
which far too few have seen, over the years since. Robert Sheaffer
and I have now scanned in the text, and are attempting to distribute
it more widely. The full text may be downloaded or File REQuested,
but not FTP'd from my BBS as CRYBABY.ZIP (as Robert mentions in his
comments, which follow), and I'll be mailing it to other skeptics'
groups on diskette, as well as uploading it to CompuServe. </p>
<p>-- Rick Moen
Vice-Chair, <ent type='ORG'>Bay Area Skeptics</ent>
Sysop, <ent type='ORG'>The Skeptic</ent>'s Board BBS, <ent type='GPE'>San Francisco</ent>
(also reachable at 76711.243@CompuServe.com) </p>
<p> "CRYBABY" </p>
<p> by Philip J. <ent type='ORG'>Klass</ent> </p>
<p>Philip J. <ent type='ORG'>Klass</ent> is a member of <ent type='ORG'>the Executive Council</ent>, <ent type='ORG'>Committee</ent>
for the Scientific Investigation of Claims of the Paranormal
(<ent type='ORG'>CSICOP</ent>). </p>
<p> [Note: This article, written in 1981, was submitted for
publication to <ent type='ORG'>FATE Magazine</ent>, in reply to Dennis Rawlins'
accusations against <ent type='ORG'>CSICOP</ent> in his Oct., 1981 <ent type='ORG'>FATE</ent> article
"sTARBABY". <ent type='ORG'>FATE</ent> adamantly refused to publish this article.
Meanwhile, Rawlins was given the opportunity to make a
rambling, six-page statement in the SKEPTICAL INQUIRER
(Winter, 1981-82, p.58), which was published exactly as
received, presenting his accusations of a "coverup." This
was in addition to the 5 1/2 page article he earlier had on
the "<ent type='LOC'>Mars</ent> Effect" in the Winter, 1979-80 issue (p.26). To
this day, supporters of the paranormal still charge <ent type='ORG'>CSICOP</ent>
with perpetrating a "coverup" on this matter. Only a
relatively few people ever saw <ent type='ORG'>Klass</ent>'s "CRYBABY", the long
and detailed answer to Rawlins' "sTARBABY" charges. Now that
you have the opportunity to read <ent type='ORG'>Klass</ent>'s rebuttal, you can
make up your own mind. </p>
<p> <ent type='ORG'>Klass</ent>'s original text has been reproduced below, exactly as
typed, with the author's permission. <ent type='ORG'>Spelling</ent> and
punctuation have not been changed. Text that was underlined
in the original appears in capital letters.
- Robert Sheaffer, <ent type='ORG'>Bay Area Skeptics</ent>, 1991.
This article is brought to you courtesy of the Bay
Area Skeptics' BBS, 415-648-8944, from which it is
available for downloading, although not via FTP.] </p>
<p> "They call themselves the <ent type='ORG'>Committee</ent> for the Scientific
Investigation of Claims of the Paranormal. In fact, they are a
group of would-be-debunkers who bungled their major
investigation, falsified the results , covered up their errors
and gave the boot to a colleague who threatened to tell the
truth." Thus began a 32-Page article in the October 1981 issue of
<ent type='ORG'>FATE</ent> magazine, which a a press release headlined: "SCIENTIST
BLOWS THE WHISTLE ON PARANORMAL COVERUP." </p>
<p> Since <ent type='ORG'>CSICOP</ent> was formed in the spring of 1976, it has been a
thorn in the side of those who promote belief in "psychic
phenomena," in astrology, UFOs, and similar subjects and it has
been criticized sharply by <ent type='ORG'>FATE</ent> whose articles generally cater to
those who are eager to believe. However, this <ent type='ORG'>FATE</ent> article was
written by skeptic Dennis Rawlins, who was one of the original
Fellows in <ent type='ORG'>CSICOP</ent> and for nearly four years had been a member of
its <ent type='ORG'>Executive Council</ent>. This would seem to give credence to
Rawlins' charges -- except to those of us with first-hand
experience in trying to work with him and who are familiar with
his modus-operandi. </p>
<p> Because Rawlins proposed my election to <ent type='ORG'>CSICOP</ent>'s Executive
<ent type='ORG'>Council</ent> I cannot be charged with animosity toward him, except
what he later engendered by his actions. And in a recent letter
to me, Rawlins volunteered that I "was less involved than any
other active <ent type='ORG'>Councillor</ent>" in the alleged misdeeds. </p>
<p> The <ent type='ORG'>FATE</ent> article, entitled "sTARBABY" prompted my own
investigation into Rawlins' charges. But unlike Rawlins, who
relies heavily on his recollection of conversations several years
earlier, I chose to use hard evidence - published articles,
memoranda and letters, some of which Rawlins cites in his
article. When I requested copies of these letters and memoranda
from the several principals involved, all of them responded
promptly and fully except for one -- Dennis Rawlins, who had
accused the others of "cover-up" and "censorship." RAWLINS
REFUSED MY REPEATED REQUESTS TO SUPPLY HARD DATA THAT MIGHT
CONFIRM HIS CHARGES, AND WHICH ALSO COULD DENY THEM! </p>
<p> The results of my investigation, based on hard data,
prompted me to conclude that the Rawlins article should have been
entitled "CRYBABY," and that an appropriate subtitle would have
been: "A wounded ego is the root of much evil." </p>
<p> If the editors of <ent type='ORG'>FATE</ent> had spent only a few hours reading
published articles cited in the Rawlins article they could not in
good conscience have accused <ent type='ORG'>CSICOP</ent> of "cover-up" or of having
"falsified the results." Instead, <ent type='ORG'>FATE</ent> chose to ignore the
traditional journalistic practice of investigating both sides of
a controversial issue and publishing both sides, as those accused
by Rawlins had done. </p>
<p> Rawlins' charges result from two tests intended to assess
whether the position of the planet <ent type='LOC'>Mars</ent> at the time of a person's
birth has a significant influence on whether he/she becomes a
"sports champion." This "<ent type='LOC'>Mars</ent> effect" hypothesis was first
proposed by <ent type='GPE'>France</ent>'s Michel Gauquelin, who directs the laboratory
for <ent type='ORG'>the Study</ent> of Relations between Cosmic and Psychophysiological
Rhythms, based on a study of <ent type='NORP'>European</ent> champions. </p>
<p> The first of the two tests was performed by Gauquelin
himself, with results that generally were supportive of the <ent type='LOC'>Mars</ent>
effect hypothesis by eliminating a possible objection that first
had been raised by others, i,e, not <ent type='ORG'>CSICOP</ent>. The only way in which
<ent type='ORG'>CSICOP</ent>, or persons affiliated with it, could be guilty of
Rawlins' charges would be if they had refused to publish
Gauquelin's results or had intentionally altered the data in his
report. <ent type='ORG'>NEITHER</ent> OCCURRED. Nor did Gauquelin accuse <ent type='ORG'>CSICOP</ent> or its
members of trying to "cover-up" his results or altering the data
of this first test whose calculations he himself performed,
although there were some differences of interpretation of the
implication of these results. </p>
<p> <ent type='ORG'>HOWEVER</ent>, GAUQUELIN DID PUBLICLY ACCUSE RAWLINS OF <ent type='ORG'>DISTORTION</ent>
AND MISREPRESENTATION, with implied criticism of <ent type='ORG'>CSICOP</ent> because
Rawlins then was a member of its <ent type='ORG'>Executive Council</ent>. There would
be other occasions when <ent type='ORG'>CSICOP</ent> would be criticized because of
Rawlins' intemperate statements and actions. </p>
<p> This criticism was published by <ent type='ORG'>CSICOP</ent> in the Winter l978
issue of its publication, THE SKEPTICAL INQUIRER (p. 80). In it
Gauquelin wrote: "How, in spite of all this data could one
distort and misrepresent the effect in question and sow doubts on
the subject? Dennis Rawlins, a member of <ent type='ORG'>CSICP</ent> ... has done just
this in a polemic which appeared in the Fall-Winter 1977 issue of
that (<ent type='ORG'>CSICOP</ent>'s) journal." In "sTARBABY," Rawlins tries to shift
the blame for his transgressions to <ent type='ORG'>CSICOP</ent>. </p>
<p> According to "sTARBABY," <ent type='ORG'>CSICOP</ent> Chairman Prof. Paul Kurtz
was the principal architect of the alleged cover-up. Yet in
reality it was Kurtz, then editor of THE HUMANIST magazine
(published by <ent type='ORG'>the American Humanist Assn</ent>.) who printed the
lengthy paper by Gauquelin describing the seemingly favorable-
for-him results of the first test in the Nov/Dec,l977 issue (p.
30). What kind of doubletalk is this when Rawlins and <ent type='ORG'>FATE</ent> charge
that Kurtz's decision to publish test results favorable to an
"adversary" represents a "cover-up"? Rawlins might better have
waited until "l984" to resort to such "double-speak" accusations. </p>
<p> Because the issues are complex and because two different
publications and organizations were involved, it is useful to
recount briefly the events that led to the first <ent type='LOC'>Mars</ent> effect
test, which is at the root of the Rawlins/<ent type='ORG'>FATE</ent> charges, and the
second tests performed using data for outstanding U.S. athletes.
Based on calculations performed by Rawlins himself, the U.S.
champions test showed a very UNFAVORABLE result for the claimed
<ent type='LOC'>Mars</ent> effect, which Rawlins confirms in "sTARBABY." And these
Rawlins-computed results were published, without change, by
<ent type='ORG'>CSICOP</ent>. </p>
<p> The Sept/Oct. l975 issue of THE HUMANIST carried an article
by L.E. Jerome that was critical of astrology in general and of
the <ent type='LOC'>Mars</ent> effect in particular. When Gauquelin sought an
opportunity for rebuttal, Kurtz provided it in the Jan./Feb. 1976
issue of THE HUMANIST, which also carried several other articles
on astrology. Because Gauquelin's article claimed that the
<ent type='LOC'>Mars</ent> effect had been confirmed by <ent type='ORG'><ent type='NORP'>Belgian</ent> <ent type='ORG'>Committee</ent></ent> for the
Scientific Investigation of Alleged Paranormal Phenomena (created
some 25 years earlier), that group also was invited by Kurtz to
submit an article for publication. <ent type='NORP'>Belgian</ent> <ent type='ORG'>Comite Para</ent>, as it is
called, confirmed Gauquelin's calculations. But it questioned his
statistical assumption "that the frequency distribution of the
hours of birth during the day (the nych-themeral curve) is a
constant distribution...", i.e. that there is an equal
probability of a person being born during any hour of the day. </p>
<p> This seemed important because the <ent type='LOC'>Mars</ent> effect hypothesis
holds that persons born during an approximately two-hour period
just after <ent type='LOC'>Mars</ent> has "risen" or during a comparable period after
<ent type='LOC'>Mars</ent> is at upper culmination (zenith), are more likely to become
sports champions than persons born during other hours of the day.
If there is an equal probability of a person being born in any
one of the 24 hours, then 4/24, or l6.7%,of the general
population should be born when <ent type='LOC'>Mars</ent> is in one of these two "key
sectors." (Because of combined orbital motions of <ent type='LOC'>Earth</ent> and <ent type='LOC'>Mars</ent>,
the percentage of the day in which <ent type='LOC'>Mars</ent> is in two key sectors is
approximately l7%. But Gauquelin reported that 22% <ent type='NORP'>European</ent>
champions in his data base had been born when <ent type='LOC'>Mars</ent> was in the two
key sectors, significantly higher than the l7% "benchmark." </p>
<p> Because of the issue raised by Comite' Para, Kurtz
consulted statistics professor Marvin Zelen who in turn proposed a
control test that could resolve the statistical issue raised by
Comite' Para. This Zelen proposed test, also published in the
same (Jan./Feb. 1976) issue of THE HUMANIST, suggested that
Gauquelin should gather birth data for "non-champions" who had
been born in the same local areas and within three days of a
RANDOMLY SELECTED sub-sample of Gauquelin's "champions" who
seemed to show the <ent type='LOC'>Mars</ent> effect. </p>
<p> If only 17% of these NON-champions were born when <ent type='LOC'>Mars</ent> was
in the two key sectors, this would void the issue raised by
<ent type='ORG'>Comite Para</ent>. But if roughly 22% of the NON-champions also were
born when <ent type='LOC'>Mars</ent> was in the two key sectors, this would undercut
the <ent type='LOC'>Mars</ent> effect hypothesis. Zelen's article concluded that the
proposed test offered "an objective way for unambiguous
corroboration or dis-confirmation." In retrospect it would have
been more precise had he added: "...of the issue raised by
<ent type='NORP'>Belgian</ent> <ent type='ORG'>Comite Para</ent>." If Gauquelin's sample of "champions" data
was "biased," as Rawlins first suspected, this could not possibly
be detected by the Zelen-proposed test. </p>
<p> The same issue of The Humanist carried another article, by
astronomy professor George O. Abell, which was very skeptical of
astrology in general. But unlike Rawlins who dismissed the <ent type='LOC'>Mars</ent>
effect out-of-hand and "didn't believe that it merited serious
investigation yet" (<ent type='ORG'>FATE</ent>: p. 74), Abell wrote that if Gauquelin's
findings were correct, they were "extremely interesting." </p>
<p> However, Abell included the following note of caution: "If
all of Gauquelin's work is re-checked, and his results hold up,
then it is necessary to repeat the experiment with a new sample,
say in <ent type='GPE'>the United States</ent>. If that sample should give the same
result, then further verification is in order, until it is
absolutely certain that the effects are real and reproducible.
That is the way science works; reproducibility of results is
necessary before fundamental new laws can be inferred." This sage
advice clearly indicated the limits of what conclusions could be
drawn, and could not be drawn, from the results of the upcoming
Zelen test, and even from a complete re-check of Gauquelin's
original data on <ent type='NORP'>European</ent> champions, which was not attempted. It
should be stressed that at the time this first (Zelen) test was
proposed, <ent type='ORG'>CSICOP</ent> did not yet exist. Several months later, when it
was formed (initially under the auspices of the American Humanist
Assn.), Kurtz became its co-chairman and later its chairman.
Zelen and Abell were named Fellows, but not to <ent type='ORG'>CSICOP</ent>'s Executive
<ent type='ORG'>Council</ent>. In l980, Abell was elected to replace Rawlins on the
<ent type='ORG'>Council</ent>. </p>
<p> The results of this first (Zelen) test were published in the
Nov./Dec., l977 issue of THE HUMANIST, where the issue first was
raised, although by this time <ent type='ORG'>CSICOP</ent> had its own publication.
Gauquelin and his wife Francoise were given nearly six large-size
magazine pages to present their findings without censorship.
Gauquelin reported having difficulties in obtaining data for non-
champions born within several days of champions in small towns,
so he said that non-champions birth data had been obtained only
from the large cities in <ent type='GPE'>France</ent> and <ent type='GPE'>Belgium</ent>, The Gauquelins
reported that these data showed that only l7% of the non-
champions had been born when <ent type='LOC'>Mars</ent> was in the two sectors which
seemed to resolve the issue earlier raised by <ent type='GPE'>Belgium</ent>'s Comite
Para in favor of the <ent type='LOC'>Mars</ent> effect. </p>
<p> The same issue of THE HUMANIST carried an article jointly
authored by Zelen, Kurtz, and Abell, that began: "Is there a
'<ent type='LOC'>Mars</ent> Effect'? The preceding article by Michel and Francoise
Gauquelin discusses the experiment proposed by Marvin Zelen and
its subsequent outcome. Their conclusions come out in favor of
the existence of a '<ent type='LOC'>Mars</ent> effect' related to sports champions. It
is the purpose of this article to discuss the analysis of the
data and to point out the strengths and weaknesses of the
evidence in favor of the '<ent type='LOC'>Mars</ent> effect.'" </p>
<p> The Zelen/Kurtz/Abell article raised some questions about
the results. For example, that "the '<ent type='LOC'>Mars</ent> effect' only appears in
<ent type='GPE'>Paris</ent>, not in <ent type='GPE'>Belgium</ent> or in the rest of <ent type='GPE'>France</ent>." The article
concluded: "lf one had a high prior 'belief' that there is a <ent type='LOC'>Mars</ent>
effect, then the Gauquelin data would serve confirm this prior
belief. In the other hand, if the prior belief in the existence
of a <ent type='LOC'>Mars</ent> effect was low, then this data may raise the posterior
belief, but not enough to accept the existence of the <ent type='LOC'>Mars</ent>
effect." </p>
<p> Rawlins charges that publication of this article, following
the uncensored Gauquelin paper,"commited <ent type='ORG'>CSICOP</ent> to a cover-up."
(<ent type='ORG'>FATE</ent>: p.76) Yet is characteristic of scientific controversy for
one party to question or challenge another's interpretation of
the data. And Gauquelin would do so following the second test
without being accused of a "cover-up" in "sTARBABY." </p>
<p> In the same issue of THE HUMANIST, in a brief introduction
written by Kurtz, the first "linkage" with <ent type='ORG'>CSICOP</ent> occurred. Kurtz
wrote: "Thus, members of <ent type='ORG'>CSICOP</ent> involved in this inquiry believe
that the claim that there is a statistical relationship between
the position of <ent type='LOC'>Mars</ent> at the time of birth of individuals and the
incidence of sports champions among them has not been established
.. to further the cause of scientific inquiry, the committee has
agreed (with Gauquelin) to make an independent test of the
alleged <ent type='LOC'>Mars</ent> effect by a study of sports champions in the United
States." </p>
<p> In "sTARBABY," Rawlins charges that the U. S, champions test
was a "diversion." Clearly the Gauquelins themselves did not view
it in this light, judging from the concluding statement in their
article which said: "Let us hope that these positive results may
induce other scientists to study whether this effect, discovered
with the <ent type='NORP'>European</ent> data, appears also with the U.S. data." </p>
<p> On March 28, 1978, SEVERAL MONTHS AFTER THE RESULTS OF THE
FIRST TEST WERE PUBLISHED, Rawlins sent Kurtz a copy of a three-
page memorandum he had prepared a year earlier (March 29, 1977).
It contained a very technical analysis of the issue raised by
<ent type='ORG'>Comite Para</ent>, which prompted Rawlins to conclude that the 22%
figure reported for <ent type='NORP'>European</ent> champions was not the result of a
disproportionate share of births of the general population during
the early morning hours when <ent type='LOC'>Mars</ent> often was in one of the two key
sectors. In this analysis, Rawlins concluded that Gauquelin had
"made fair allowance for the effect." </p>
<p> But Rawlins had not written this three-page memo until
several month AFTER the Zelen test had been proposed in THE
HUMANIST. Shortly after preparing the analysis, Rawlins had sent
a copy to Prof. Marcello Truzzi, then editor of <ent type='ORG'>CSICOP</ent>'s
publication. Truzzi had decided not to publish it but sent a copy
to Gauquelin. IF the Rawlins analysis of 1977 took account of all
possible demographic factors -- and there is some disagreement on
this question -- it was much too technical to be understood by
persons without expertise in statistics and celestial mechanics. </p>
<p> When Rawlins finally got around to sending this analysis to
Kurtz on March 28, 1978, his letter of that date did NOT
criticize Truzzi or <ent type='ORG'>CSICOP</ent> for not having published it earlier.
Rather, Rawlins admitted, "I should not have kept my (Mar. 19,
1977) memo..private after all." He did suggest that perhaps it
might now be published in THE HUMANIST. But by this time Kurtz no
longer was its editor. More important, the results of the first
(Zelen) test already had been published several months earlier. </p>
<p>If, as Rawlins would later charge in "sTARBABY," the
Zelen/Kurtz/Abell article published several months earlier in THE
HUMANIST amounted to a "cover- up," Rawlins did not make such an
accusation to Kurtz when he wrote him April 6, 1978. Instead,
Rawlins wrote; "I think our best bets now are 1. The main
<ent type='NORP'>European</ent> investigation might seek to discover how the Eur. samp
(of Gauquelin) was (hypothetically) fudged -- check orig. records
microscopically for some sort of <ent type='ORG'>Soal</ent> trick. 2. Proceed with the
U.S, test, where we know we have a clean (unbiased) sample." </p>
<p> This April 6, 1978, letter clearly shows that while Rawlins
suspected that Gauquelin had manipulated his <ent type='NORP'>European</ent> champions
data ("<ent type='ORG'>Soal</ent> trick") he found no evidence of wrong-doing by
Zelen/Kurtz/Abell. On April 26, 1978, in another letter to Kurtz,
following his visit with Rawlins in <ent type='GPE'>San Diego</ent>, Rawlins wrote that
he "was certain" that Gauquelin's original data "was biased, but
not sure how." Rawlins concluded this letter on a cordial note:
"Now, wasn't it great visiting sunny, funny, <ent type='GPE'>California</ent> -- and
getting to see a real live nut religion launch itself in San
Diego? ... hope you'll get back this way soon again." </p>
<p> It was at about this time that <ent type='ORG'>CSICOP</ent> came under fire for
Rawlins' actions in another matter. In the summer of 1977,
Rawlins and Abell had been invited to be panelists in a symposium
on astrology to be held March 18, 1978 at <ent type='ORG'>the University</ent> of
Toronto at which Gauquelin, among others, would participate. The
invitation came from Dr. Howard Eisenberg on the stationary of
<ent type='ORG'>the University</ent>'s School of Continuing Studies. Both Rawlins and
Abel had accepted. Then, in late September, 1977, Eisenberg
withdrew the invitations on the grounds that "the response from
potential speakers...has yielded an incredible acceptance rate of
100%. This places us in the embarassing position of not being
able to sponsor all of you," i.e. pay travel expenses and allow
formal presentations. </p>
<p> On Feb. 6, 1978, Rawlins wrote to the president of the
University of Toronto, protesting what he said were "a number of
oddities" associated with the symposium, including an imbalance
between the number of astrology supporters and skeptics. The
Rawlins letter charged that "this conference looks to be a pretty
phoney confrontation, which will therefore give the irrational
pseudo-science of astrology an evidentially-unmerited 'academic'
boost in public credibility..." Rawlins sent a copy of his letter
to another university official. </p>
<p> Rawlins' suspicion of a loaded panel may have been
justified. But the letter of protest was written on <ent type='ORG'>CSICOP</ent>
stationery and signed "Dennis Rawlins, <ent type='ORG'>Executive Council</ent>,
<ent type='ORG'>CSICOP</ent>." Another regretable action was a Rawlins telephone call
late at night to a university astronomy professor, Robert
Garrison, which gave the impression that Rawlins was speaking in
behalf of <ent type='ORG'>CSICOP</ent>. In fact, Rawlins had taken these actions
without consulting other <ent type='ORG'>Council</ent> members and without official
approval to use <ent type='ORG'>CSICOP</ent>'s name. In early April 1978, a copy of the
Rawlins letter had reached Truzzi, who also had been invited and
dis-invited to participate in the conference. The Rawlins letter
claimed that Truzzi had co-authored "an astrology-supporting
paper...and so rates as a strange sort of skeptic." Truzzi sent
Kurtz a copy of this Rawlins letter with a note that said: "Since
Dennis' letter is on <ent type='ORG'>Committee</ent> stationery, would appear he is
writing on behalf of the <ent type='ORG'>Committee</ent>, I trust that will not happen
again." </p>
<p> Rawlins' actions were reported in the <ent type='NORP'>Canadian</ent> magazine
SCIENCE FORUM July/August 1978, in an article written by Lydia
Dotto. The article, entitled "Science Confronts 'Pseudo-
Science'", began; "It was after midnight on a Saturday night when
University of Toronto astronomer Bob Garrison was awakened by a
phone call. The caller identified himself as a member of the
<ent type='ORG'>Committee</ent> for the Scientific Investigation of Claims of the
Paranormal, and according to Garrison, he spent the best part of
the next hour urging the U of T scientist not to participate in
the conference on astrology...Dennis Rawlins, a <ent type='GPE'>California</ent>
astronomer and science writer and a member of the <ent type='ORG'>Committee</ent>,
acknowledged in an interview that he made the call, but denied he
was trying to talk Garrison out of attending the
conference...this and other incidents surrounding the conference
have become something of a cause celebre, particularly since the
event was cancelled shortly before it was to have taken place in
mid-March. Predictably, ACCUSATIONS BEGAN TO FLY THAT SCIENTIFIC
OPPONENTS OF <ent type='ORG'>ASTROLOGY</ent> WERE ENGAGED IN A CAMPAIGN TO SUPPRESS
FREEDOM OF SPEECH." (Emphasis added.) </p>
<p> Indeed they did, much to <ent type='ORG'>CSICOP</ent>'s embarassment. <ent type='GPE'>Britain</ent>'s
<ent type='ORG'>New Scientist</ent> magazine, in its June 29, 1978, issue, quoted the
<ent type='NORP'>Canadian</ent> magazine in an article that began: "Earlier this year an
astronomer at <ent type='ORG'>the University</ent> of Toronto, Dr. Bob Garrison, was
awakened by a phone call from a member of <ent type='ORG'>Committee</ent> for the
Scientific Investigation of Claims of the Paranormal. The caller
allegedly spent most of the next hour trying to dissuade Garrison
from taking part in a conference on astrology." </p>
<p> This <ent type='ORG'>New Scientist</ent> account was picked up by <ent type='ORG'>FATE</ent> magazine,
which in turn attributed the action to <ent type='ORG'>CSICOP</ent> rather than to one
<ent type='ORG'>Council</ent> member. <ent type='ORG'>FATE</ent> commented: "If you have difficulty
understanding their (<ent type='ORG'>CSICOP</ent>) motives, remember that here is a
dedicated group of witch-hunters seeking to burn nonbelievers at
the stake." (How ironic that <ent type='ORG'>FATE</ent> now is promoting the views of
the same person whose intemperate earlier actions had provoked
<ent type='ORG'>FATE</ent>'s harsh criticism.) The same criticism of <ent type='ORG'>CSICOP</ent>, because of
Rawlins' actions surfaced again in a feature article in THE
<ent type='GPE'>WASHINGTON</ent> POST (Aug. 26, 1979). The article, syndicated and
published elsewhere, was written by Ted Rockwell who was
identified as a member of <ent type='ORG'>the Parapsychological Association</ent>. </p>
<p> When I learned of the Rawlins incident, I was shocked as
were others on the <ent type='ORG'>Council</ent>. But all of us hoped that <ent type='ORG'>Council</ent>
members had learned an important lesson from the incident and
that it would have a maturing effect on Rawlins. Yet before
another year had passed Rawlins would once again demonstrate his
inability to distinguish between official <ent type='ORG'>CSICOP</ent> actions and
those of its individual members. </p>
<p> Originally it was expected that the required calculations of
<ent type='LOC'>Mars</ent>' position at the time of birth of U.S. champions (for the
second test) would be performed by Prof. Owen Gingerich of
<ent type='ORG'>Harvard University</ent>. But during the summer of 1978 the <ent type='ORG'>Harvard</ent>
astronomer was on an extended leave so Kurtz asked Rawlins to
perform the celestial mechanics computations. Rawlins did so and
found in sharp contrast to Gauquelin's findings that 22% of the
<ent type='NORP'>European</ent> champions were born when <ent type='LOC'>Mars</ent> was in the two key
sectors, and compared to the "chance" benchmark figure of 17%,
only 13.5% of the U.S. champions were born when <ent type='LOC'>Mars</ent> was in the
two key sectors. Thus, Rawlins' calculations showed that if <ent type='LOC'>Mars</ent>
had any effect on champions, it was a pronounced NEGATIVE effect
for U.S. athletes. </p>
<p> On Sept, 18, 1978, Rawlins prepared a four-page report
describing the procedures he had used in his calculations and a
summary of the results. But Rawlins could not resist including
some denigrating charges against Gauquelin. For example:
"Gauquelin was well known in his teens for his casting of
horoscopes (a practice he has since disowned)..." The comments
were both gratuitous and inappropriate. </p>
<p> Relations between Rawlins and Gauquelin had been strained
since <ent type='ORG'>CSICOP</ent> published a long, rambling Rawlins attack
(Fall/Winter 1977) in which he accused Gauquelin of "misgraphing
the results of the <ent type='NORP'>Belgian</ent> <ent type='ORG'>Comite Para</ent> check on his <ent type='LOC'>Mars</ent>-athletes
link..." Gauquelin had responded with the charge that Rawlins had
distorted and misrepresented the facts in a letter which then was
scheduled to be published shortly in the Winter 1978 issue of THE
SKEPTICAL INQUIRER. The same issue also would carry a sharp
rejoinder from Rawlins. </p>
<p> Thus it is hardly surprising that Kurtz decided that it
would be best if the upcoming summary report on the results of
the U.S. champions test should be written by Zelen, Abell and
himself -- especially since the three of them had jointly
authored the earlier article and Abell had proposed the U.S.
test. If Kurtz instead had suggested that the U.S. champions test
report be jointly authored with Rawlins instead of Abell,
"sTARBABY" might never have been published. This is evident from
numerous Rawlins complaints in "sTARBABY." For example, Rawlins
complains that the day after Kurtz received his Sept. 18, 1978,
report (with the ad hominem attack on Gauquelin) "Kurtz wrote
Abell to suggest <ent type='ORG'>KZA</ent> (Kurtz, Zelen and Abell) confer and prepare
the test report for publication (<ent type='ORG'>EXCLUDING</ent> ME)." (Emphasis
added.) (P.79.) </p>
<p> Rawlins also complains that Kurtz asked Zelen and Abell "to
verify the work," i.e. Rawlins' calculations. (P.80.) Because of
the importance of test, it was good scientific protocol to ask
other specialists to at least spot-check Rawlins' computations.
Then Rawlins reveals he was angered because "Abell asked
countless questions about my academic training." (P. 8O.)
Inasmuch as Rawlins lists his academic training as being in
physics rather than astronomy, Abell's questions seem justified. </p>
<p> Further evidence of Rawlins' wounded ego is his complaint
that "not only was Abell being invited to the press conference
(at the upcoming <ent type='ORG'>Council</ent> in <ent type='GPE'>Washington</ent>, D.C.), he was to be the
<ent type='ORG'>CSICOP</ent> spokesman on astrology in <ent type='GPE'>Washington</ent>." (P.81) Rawlins said
he "strongly protested the high-handedness of the choice of Abell
as the speaker at the annual meeting...I emphasized that <ent type='ORG'>CSICOP</ent>
had plenty of astronomers associated with it (Carl Sagan, Bart
Bok, Edwin <ent type='ORG'>Krupp</ent> and others), all of them nearer <ent type='GPE'>Washington</ent> than
Abell who lived all the way across the country, in the Los
Angeles area." (In fact, <ent type='ORG'>Krupp</ent> also lived in Southern <ent type='GPE'>California</ent>,
Bok lived <ent type='GPE'>Arizona</ent>, and Sagan then was working in <ent type='GPE'>California</ent> on
his "Cosmos" television series.) </p>
<p> In "sTARBABY," Rawlins claims that Abell had been invited to
speak because "Kurtz was trying to suppress my dissenting report
(of Sept. 18, 1978) and (by not paying my travel fare) to keep me
from the December <ent type='ORG'>Council</ent> meeting while inviting to <ent type='GPE'>Washington</ent> as
a prominent <ent type='ORG'>CSICOP</ent> authority the very person whose appointed task
I HAD MYSELF PERFORMED" (his italics, p. 81). In reality, there
was no question that Rawlins' Sept, 18, 1978, report, describing
his analytical procedures, needed to be published. The only
question was whether it should include the ad hominem attack on
Gauquelin. </p>
<p> It was not until approximately one year AFTER the results of
the Zelen test were published in THE HUMANIST that Rawlins first
charged the use of "bait-and-switch" tactics--what he calls
"BS"--had been employed. This allegation was contained in his
letter of Nov. 2, 1978, to Zelen, with a copy to Kurtz. BUT
RAWLINS STILL DID NOT CHARGE THAT THIS AMOUNTED TO A "COVER-UP,"
OR THAT <ent type='ORG'>CSICOP</ent> WAS INVOLVED. Quite the opposite. A few weeks
later when the Winter 1978 issue of THE SKEPTICAL INQUIRER was
published, there was a Rawlins response which said: "It SHOULD BE
CLEARLY UNDERSTOOD THAT <ent type='ORG'>CSICOP</ent> AS A BODY NEVER HAD ANYTHING TO DO
WITH THE HUMANIST ZELEN TEST 'CHALLENGE'...PUBLISHED BEFORE THE
COMMITTEE WAS FOUNDED"(Emphasis added.) </p>
<p> Like most members of <ent type='ORG'>CSICOP</ent>'s <ent type='ORG'>Executive Council</ent> who had not
been involved either in the first (Zelen) test or the subsequent
U.S. champions test, and who were not sufficiently expert in
celestial mechanics, statistics or astrology to take a prior
interest, my first exposure to the controversy came during the
<ent type='ORG'>Council</ent> meeting in <ent type='GPE'>Washington</ent> in early December, 1978, when
Rawlins unleashed a rambling <ent type='ORG'>harrangue</ent>. Understandably I was
confused by Rawlins' charge that <ent type='ORG'>CSICOP</ent> somehow was involved in a
Zelen test-results cover-up that had occurred more than a year
before which contradicted his just-published statement in THE
SKEPTICAL INQUIRER stating that the original Zelen test was NOT a
<ent type='ORG'>CSICOP</ent>-sponsored effort. </p>
<p> Despite my efforts to understand Rawlins' allegations, it
was not clear to me (and to many other <ent type='ORG'>Council</ent> members) just what
it was that he now was claiming had been"covered-up." After three
years of working with Rawlins I was well aware of his proclivity
for making harsh, exaggerated charges. Most often these were
directed against supporters of the para-normal, but sometimes
also against <ent type='ORG'>Council</ent> members who disagreed with his proposals for
intemperate actions against "the believers." For example, Rawlins
had charged that Truzzi was involved with the "Church of Satan." </p>
<p>Beyond having difficulty in understanding the specifics of
Rawlins' charges, I failed to grasp what he thought should be
done to correct the alleged problem. Because the hour was getting
late and <ent type='ORG'>Council</ent> members had to leave to catch flights back home,
I suggested to Rawlins that he write a memorandum that clearly
and concisely set forth the basic issues and that he recommend
appropriate corrective action. In this way <ent type='ORG'>Council</ent> members could
better comprehend the matter and consider corrective action if
such were justified. Rawlins cites this in "sTARBABY" and claims
he was the only party who had put the issues in writing. BUT HE
DID NOT SEND COPIES OF SUCH MEMORANDA TO COUNCIL MEMBERS. ONE
LOGICAL EXPLANATION FOR THIS IS THAT PREVIOUSLY HE DID NOT
BELIEVE THE MATTER INVOLVED <ent type='ORG'>CSICOP</ent> OR REQUIRED COUNCIL MEMBERS'
ATTENTION. </p>
<p> Rawlins was the last one to leave my apartment (where we had
been meeting that night) and he continued his earlier <ent type='ORG'>harrangue</ent>
but without clarifying the issues. Later, he called me from the
airport to continue the discussion. Again I asked that he clarify
the issues for me and other <ent type='ORG'>Council</ent> members by preparing a
memorandum. I assured Rawlins that since I had not been involved
in either of the two tests and since he had recommended my
election to <ent type='ORG'>Council</ent>, he could expect me to be at least neutral if
not sympathetic. </p>
<p> Rawlins never responded to my request. About six weeks later
(Jan. 17, 1979), he did circulate a five-page memo to <ent type='ORG'>CSICOP</ent>
Fellows and <ent type='ORG'>Council</ent> members. It was a "baby sTARBABY" which cited
a number of <ent type='ORG'>ALLEGED</ent> mistakes that had been made by OTHERS
involved in the tests and in <ent type='ORG'>CSICOP</ent>'s operations. I replied on
Jan. 31 saying that his memo was "for me an unintelligible
jumble." I added: "without meaning to give offense to a friend, I
once again urge you -- as I did at our meeting here -- to outline
the problem...then outline your recommendations. And please do
not assume, as you have done, that all of us follow the G-affair
as closely as you have done." My letter concluded: "Skip the
invective...outline the problem clearly, concisely, and offer
your recommendations." </p>
<p> Rawlins never responded to this request. Today, following my
recent investigation, I know why. There was no cover-up, except
in Rawlins' troubled mind, fed by the fires of a wounded ego and,
perhaps, by embarassment over his unauthorized intervention in
<ent type='ORG'>the University</ent> of Toronto symposium. Rawlins was unable to
recommend specific corrective action because nothing could have
saved his wounded ego unless it were possible to turn back the
clock and to have invited Rawlins to be the <ent type='ORG'>CSICOP</ent> speaker on
astrology in <ent type='GPE'>Washington</ent> and to replace Abell in writing the
report on the results of the U.S. champions test. </p>
<p> Readers of "sTARBABY" might easily conclude that Rawlins
believes that Zelen/Kurtz/Abell, in the Nov/Dec. 1977 issue of
THE HUMANIST, should have conceded "Gauquelin has won" and
cancelled plans for the U.S. champions test. Yet had they done
so, Rawlins would have been outraged because such a concession
would imply that the Zelen test had proved the <ent type='LOC'>Mars</ent> effect beyond
all doubt and this was not true. Had Zelen/Kurtz/Abell even
contemplated such a concession, I am certain that Rawlins would
have urged that they be ousted from <ent type='ORG'>CSICOP</ent>. </p>
<p> "sTARBABY" reveals that Rawlins imagines many things that
simply are not true, such as his charge that I was involved in a
plot to suppress his discussions of the Gauquelin test at the
1978 <ent type='ORG'>Council</ent> meeting. His article implies that <ent type='ORG'>Council</ent> meetings
are characterized by attempts to suppress dissenting views. In
reality one usually hears almost as many different viewpoints as
there are <ent type='ORG'>Council</ent> members present. And Kurtz is the most
<ent type='ORG'>unconstraining</ent> group chairman I have ever known in the many
organizations of which I have been a member. </p>
<p> Even on easily ascertainable matters, Rawlins chooses to
rely on his vivid imagination or recollections rather than take
time to check the facts. For example, in "sTARBABY," Rawlins
claims that he was an "associate editor" of THE SKEPTICAL
INQUIRER, as well as being a member of its editorial board --
which he was [not]. Rawlins makes that claim in seven different
places in his article. One would expect that a person who
imagines himself to be an associate editor of a publication over
a period of several years would at least once look at that
publication's masthead, where its editorial staff is listed. Had
Rawlins done so he would not have made this spurious claim. </p>
<p> This is not an error of great consequence. But when I
pointed it out to him, his response was revealing, especially
because he accuses others of being unwilling to admit to error
and of resorting to "cover-up." Rawlins' letter of Sept. 21,
1981, explained that at a <ent type='ORG'>Council</ent> meeting HELD FOUR YEARS EARLIER
he remembers that "Kurtz called all Ed. Board members 'Associate
Editors'...I adopted to save syllables." Rawlins tries to justify
his misstatement of fact on the grounds that he was able to save
approximately 42 characters in his 75000-character-long article! </p>
<p> In "sTARBABY," Rawlins claims that the full-day meeting of
the <ent type='ORG'>Council</ent> in <ent type='GPE'>Washington</ent> was held at <ent type='ORG'>the National Press Club</ent>
because this was "the temple of <ent type='ORG'>CSICOP</ent>'s faith." (P. 86.) Had
Rawlins asked me, I would have informed him that I had selected
<ent type='ORG'>the National Press Club</ent> because it was the lowest-cost facility
in downtown <ent type='GPE'>Washington</ent> that I could find. But Rawlins decided he
knew the answer without bothering to investigate. This is neither
good science nor good journalism. </p>
<p> In the previously cited Rawlins memorandum of Jan. 17, 1979,
following the <ent type='GPE'>Washington</ent> meeting, he wrote that he planned to
reduce his involvement with <ent type='ORG'>CSICOP</ent>. He added that there was no
reason to "hide" <ent type='ORG'>CSICOP</ent>'s problems "from the public. So I may
inform a neutral, responsible, unsensational member of the press
re the foregoing." In reality Rawlins already had taken such
steps at the December <ent type='ORG'>Council</ent> meeting whose press seminar was
attended by an experienced journalist with a known empathy for
some paranormal claims. During the early afternoon Rawlins and
this journalist left the meeting together and returned together
several hours later. But this journalist never published anything
on the matter, possibly because he has as much difficulty in
understanding Rawlins' charges as did <ent type='ORG'>Council</ent> members. </p>
<p> According to "sTARBABY," in mid-1979, Rawlins received a
letter from Jerome Clark of <ent type='ORG'>FATE</ent> magazine, expressing an interest
in learning more about Rawlins' complaints against <ent type='ORG'>CSICOP</ent>.
Rawlins claims that shortly afterward "I told the <ent type='ORG'>Council</ent> I'd be
open with <ent type='ORG'>FATE</ent>." I question the truthfulness of his statement
because Rawlins did not bother to attend the next <ent type='ORG'>Council</ent> meeting
in December, 1979, nor have I been able to locate any Rawlins
letter or memorandum to substantiate this claim. </p>
<p> "sTARBABY" claims that "as the <ent type='ORG'>FATE</ent>-story realization set
in, <ent type='ORG'>Council</ent> reacted like <ent type='ORG'>the White House</ent> when it learned that
John Dean had sat down with the prosecution (during the Watergate
scandal). (P.91) This claim I know to be false. The prospect of a
Rawlins article in <ent type='ORG'>FATE</ent> was never discussed at the 1979 or 1980
<ent type='ORG'>Council</ent> meetings, nor by memorandum during the two intervening
years. Otherwise <ent type='ORG'>CSICOP</ent> would have prepared a response which it
could have released immediately following publication of
"sTARBABY," preventing Rawlins from boasting that failure of
<ent type='ORG'>CSICOP</ent> to respond quickly to his many charges indicated an
inability to do so. </p>
<p> Returning, chronologically, to the fall of 1979, <ent type='ORG'>CSICOP</ent> was
preparing to publish the results of the U.S. champions test in
the Winter 1979-80 issue of THE SKEPTICAL INQUIRER. Rawlins
demanded the right to revise and expand his original Sept, 18,
1978, paper, and was given that opportunity. Furthermore,
according to "sTARBABY," Rawlins informed Ken Frazier, editor of
THE SKEPTICAL INQUIRER, "that if there were any alterations not
cleared with me, I wanted a note printed with the paper stating
that deletions had occurred over the author's protest and that
the missing portions could be obtained directly from me." (P.
92.) </p>
<p> Frazier (who had been recommended for the position by
Rawlins himself), acting on the recommendation of Prof. Ray
Hyman, a <ent type='ORG'>Council</ent> member who reviewed the Rawlins paper and the
others, and on Frazier's own long editorial experience, decided
to delete the sentence referring to Gauquelin's earlier interest
in traditional astrology. Frazier also opted to delete another
sentence that read: "In this connection I must also say that,
given the self <ent type='ORG'>piekill</ent> upshot (sic) of their <ent type='NORP'>European</ent>
(nonchampions) adventure plus their failure to perform
independently the U.S. study's technical foundations (sector
position, expectation curve), I find it amusing that <ent type='ORG'>ZKA</ent> (Zelen,
Kurtz, Abell) are the main commentators on this test in THE
SKEPTICAL INQUIRER." Once again Rawlins' wounded-ego had
manifested itself. </p>
<p> On Nov, 6, 1979, Rawlins sent a memo to other members of the
<ent type='ORG'>Editorial Board</ent> complaining that his article "has been neatly
censored here and there, so I have asked to add a statement
saying so and suggesting that readers who wish to consult the
original version may do so by contacting me. This sentence has
itself been bowdlerized (so that it reads as if no tampering
occurred)." Frazier had proposed an alternative sentence, which
was published at the end of the Rawlins paper, that read:
"Further commentary on the issues raised in this paper and in
these notes is available from the author." Rawlins' address also
was published. </p>
<p> This is the basis for Rawlins' harsh charges of "censorship"
against Frazier, the man whom he had so highly recommended for the
position. If Rawlins' complaint were justified, every working
journalist could make the same accusations regularly against
those who edit his/her copy to assure clarity and good taste and
to avoid libel. In response to Rawlins' charges, Frazier wrote to
members of <ent type='ORG'>the Editorial Board</ent> explaining what had transpired.
Frazier noted, "Dennis seems to believe his position as a member
of <ent type='ORG'>the Editorial Board</ent> gives his writings special status exempt
from normal editorial judgment. None of the rest of you has ever
suggested this," i.e. demanded privileged treatment. So because
Rawlins was not given privileged treatment, he charges
"censorship." </p>
<p> In the same Nov. 6, 1979, letter charging censorship,
Rawlins complained that he alone among <ent type='ORG'>Council</ent> members had not
been reimbursed for his travel expenses of $230 to the previous
<ent type='ORG'>Council</ent> meeting in <ent type='GPE'>Washington</ent>. Rawlins said that he would need
$400.00 for travel to attend the upcoming <ent type='ORG'>Council</ent> meeting in New
York and added "I won't do that unless all 63O dollars are here
beforehand." Kurtz promptly sent Rawlins a check for $350 as a
travel advance and assured him he would be reimbursed for
previous travel expense as soon as he submitted an expense
account--which Rawlins had never done (In "sTARBABY," Rawlins
characterizes this as a "ridiculous excuse" for failure to
reimburse him earlier.) Rawlins cashed the $350 check but did not
attend the <ent type='GPE'>New York</ent> <ent type='ORG'>Council</ent> meeting, nor did he inform the
<ent type='ORG'>Council</ent> that he would not attend. Rawlins never refunded the $120
difference between $230 he claimed was due him and the $350 he
received. Yet Rawlins professes to have been shocked and
surprised when the <ent type='ORG'>Council</ent> voted unanimously not to reelect
Rawlins at its <ent type='GPE'>New York</ent> meeting. (Since Rawlins seems so easily
shocked and surprised, I suspect he was equally surprised at the
resignation of Richard M. Nixon.) </p>
<p> Two months later, Rawlins wrote to Frazier saying he wished
to resign from <ent type='ORG'>the Editorial Board</ent>. But he insisted that the
resignation should not take effect until his statement
complaining about not being reelected "in absentia" was
published. This Rawlins statement claimed that he had not been
reelected solely because he had criticized "<ent type='ORG'>CSICOP</ent>'s conduct
during ITS FOUR YEAR INVOLVEMENT in testing Gauquelin's neo-
astrology..." (Emphasis added.) </p>
<p> Had Frazier opted to publish this grossly inaccurate
statement, which he did not, readers might well have wondered if
there were really two different Dennis Rawlins, recalling barely
a year earlier when a Rawlins letter had been published which
said: "It should be clearly understood that <ent type='ORG'>CSICOP</ent> as a body
never had anything to do with the Humanist Zelen test
'challenge'..." When Frazier accepted Rawlins' resignation, this
prompted Rawlins to complain that he had been removed from the
<ent type='ORG'>Editorial Board</ent> without "cause or written notice." Later,
following a mail ballot of <ent type='ORG'>Council</ent> members, <ent type='ORG'>CSICOP</ent> dropped
Rawlins from its list of Fellows. (The vote against Rawlins was
6:1.) </p>
<p> The foregoing highlights the key issues and actions that
prompted <ent type='ORG'>FATE</ent> and Rawlins to charge that <ent type='ORG'>CSICOP</ent> "bungled their
major investigation, falsified the results, covered up their
errors and gave the boot to a colleague who threatened to tell
the truth." (After my investigation, a re-reading of "sTARBABY"
gives me the feeling that I am reading a <ent type='ORG'>Pravda</ent> account
explaining that the <ent type='NORP'>Soviets</ent> moved into <ent type='GPE'>Afghanistan</ent> to help the
<ent type='NORP'>Afghans</ent> prevent an invasion by the U.S. Central Intelligence
Agency.) </p>
<p> Were it possible to turn back the clock, undoubtedly Kurtz,
Zelen and Abell would try to be more precise in defining test
objectives and protocol and would do so in writing. And more time
would be spent in more carefully phrasing articles dealing with
such tests. But all <ent type='ORG'>CSICOP</ent> <ent type='ORG'>Council</ent> members and Fellows have other
full-time professions that seriously constrain time available for
<ent type='ORG'>CSICOP</ent> efforts. </p>
<p>Were it possible to turn back the clock, the <ent type='ORG'>Council</ent> should have
insisted in the spring of 1978 that Rawlins issue a public
statement that he had erred in using <ent type='ORG'>CSICOP</ent>'s name in support of
his personal actions connected with <ent type='ORG'>the University</ent> of Toronto's
planned astrology symposium. Failure to do this has resulted in
an unjustified blot on <ent type='ORG'>CSICOP</ent>'s modus-operandi. Also at that time
the <ent type='ORG'>Council</ent> should have developed a policy statement, as it
recently did, that more clearly delineates activities that
members perform officially in behalf of <ent type='ORG'>CSICOP</ent> and those carried
out as private individuals. </p>
<p> When a small group of persons met in <ent type='GPE'>Buffalo</ent> in May, 1976,
to create <ent type='ORG'>CSICOP</ent>, their motivation was a concern over the growing
public acceptance of claims of the paranormal. <ent type='ORG'>CSICOP</ent> was created
to provide a counter-balance to those who espouse a variety of
claims, ranging from UFOs to astrology, from the "Bermuda
Triangle" to psychic phenomena. With the benefit of experience,
it was apparent that there was an extreme spectrum of viewpoints
on the <ent type='ORG'>Council</ent>. Rawlins was at the "hit-'em-hard" extreme, while
Truzzi was at the opposite pole and resigned after a couple
years, partially as a result of behind-the scenes plotting by
Rawlins which he admits in "sTARBABY." Now Rawlins has departed
and, in my view, <ent type='ORG'>CSICOP</ent> is much the better for it. </p>
<p> <ent type='ORG'>CSICOP</ent> never has tried to destroy those organizations that
promote belief in paranormal causes. But individuals in these
organization have tried to discredit <ent type='ORG'>CSICOP</ent>, even going so far in
one instance as to circulate a forged letter. </p>
<p> <ent type='ORG'>FATE</ent> magazine made wide distribution of the Rawlins
"sTARBABY" article in reprint form, together with its press
release. Prof. R.A. McConnell, University of Pittsburgh, founding
President of <ent type='ORG'>the Parapsychological Association</ent>, also distributed
copies to <ent type='ORG'>CSICOP</ent> Fellows and <ent type='ORG'>Council</ent> members, among others. In
his accompanying letter, McConnell said he believed the "Rawlins
report is certainly true in broad outline and probably true in
every detail...He has created a document of importance for the
history and philosophy of science." McConnell quoted an "unnamed
scientist" as claiming that "Rawlins has uncovered the biggest
scandal in the history of rationalism." McConnell characterized
<ent type='ORG'>CSICOP</ent> as "an intellectually dishonest enterprise." </p>
<p> <ent type='ORG'>FATE</ent> and McConnell have demonstrated the intrinsic flaw in
the basic approach of those who promote claims of the paranormal
-- THEIR EAGERNESS TO ACCEPT CLAIMS OF EXTRAORDINARY EVENTS
WITHOUT RIGOROUS INVESTIGATION. Neither <ent type='ORG'>FATE</ent> nor McConnell
contacted <ent type='ORG'>CSICOP</ent> officials to check out Rawlins' charges. This
demonstrates why <ent type='ORG'>CSICOP</ent> is so sorely needed. </p>
<p> The late President Harry Truman phrased it well: "If you
can't stand the heat, stay out of the kitchen." <ent type='ORG'>CSICOP</ent> is "in the
kitchen" by choice and intends to remain there despite the heat.
The response of <ent type='ORG'>CSICOP</ent>'s <ent type='ORG'>Council</ent> and its Fellows to recent events
shows that the <ent type='ORG'>Committee</ent> is not an easy victim of heat-
prostration. </p>
<p> If the <ent type='LOC'>Mars</ent> effect, or any other paranormal hypothesis,
should ever be demonstrated using rigorous scientific procedures,
there simply is no way in which the small group of individuals
involved in <ent type='ORG'>CSICOP</ent> could ever hope to suppress such evidence. Nor
have I found any <ent type='ORG'>CSICOP</ent> <ent type='ORG'>Council</ent> member or Fellow who is so
foolish as to try. </p>
<p> (end) </p>
<p> [In the years following "sTARBABY", Rawlins has continued to
receive publicity by making sensational charges of
scientific coverup and fraud. In 1988 he made national
headlines by renewing an earlier charge he had made before
<ent type='ORG'>CSICOP</ent>'s founding, this time supposedly supported by a new-
found document: that Admiral Peary never actually reached
<ent type='LOC'>the North Pole</ent> during his famous expedition in 1909, but
instead fabricated his navigational records to make it
appear as if he had. A <ent type='GPE'>New York</ent> Times article of October 13,
1988 carries the headline: "Peary's Notes Said to Imply He
Fell Short of <ent type='LOC'>Pole</ent>." It begins: "New evidence based on
navigational notes by Robert E. Peary indicates that the
<ent type='LOC'>Arctic</ent> explorer fell short of his goal and deliberately
faked his claim in 1909 that he was the first person to
reach <ent type='LOC'>the North Pole</ent>, according to an analysis by a
<ent type='GPE'>Baltimore</ent> astronomer and historian ... Dennis Rawlins, an
independent scholar who trained as an astronomer and who has
a long-standing interest in Peary's expedition, said
yesterday that his analysis of the navigational notes,
mainly sextant readings of the sun to establish geographic
position, indicated that Peary knew that he had come no
closer than 121 miles from the <ent type='LOC'>Pole</ent>." Officials of the
National Geographic Society promised to examine Rawlins'
data, but added "We believe Mr. Rawlins has been too quick
to cry fake." </p>
<p> After a three-month investigation of Rawlins' charges, a
press conference was sponsored by <ent type='ORG'>The Navigation Foundation</ent>
at which they dismissed his "sensational claims". As
reported in a <ent type='GPE'>Baltimore</ent> <ent type='ORG'>Sun</ent> story syndicated Feb. 2, 1989,
"Since October [Natl. Geographic] Society President Gilbert
M. <ent type='ORG'>Grosvenor</ent> and others had quietly endured Rawlins' public
calls for debate and unconditional surrender on the Peary
issue." <ent type='ORG'>The Society</ent> was willing to take seriously an
analysis by the <ent type='NORP'>British</ent> explorer Wally Herbert, based on
other evidence, that a navigation error may have caused
Peary to miss the pole by about 45 miles. "Suggesting that
Peary might not have reached the <ent type='LOC'>Pole</ent> is one thing," said
<ent type='ORG'>Grosvenor</ent>. "Declaring Peary a fraud is quite another."
Rawlins held his own "informal press conference" afterwards,
reports The <ent type='ORG'>Sun</ent>, in which Rawlins "admitted he had confused
time readings for chronometer checks with altitudes of the
sun and had mistaken serial numbers on the chronometers for
navigational observations." Rawlins conceded, "My
interpretation has some problems, and I acknowledge that.
It's fair to say that, if I'm saying Peary was a fraud, I
think I have not yet met the burden of proof." </p>
<p> Finally, in December, 1989, a 230-page report commissioned
by <ent type='ORG'>the National Geographic Society</ent> was released, concluding
that Peary actually did reach the <ent type='LOC'>Pole</ent>. As reported in a
story on p.1 of the <ent type='GPE'>New York</ent> Times, Dec. 12, 1989, a new
analysis of Peary's records by professional navigators
concluded that Peary's final camp was not more than five
miles from the <ent type='LOC'>Pole</ent>. "The report said, there was no evidence
of fraud and deception in the explorer's records. But one
critic, Dennis Rawlins, a <ent type='GPE'>Baltimore</ent> astronomer and
historian, said he remained convinced, despite the new
study, that Admiral Peary did not reach his goal and had
faked his claim." </p>
<p> Robert Sheaffer, Nov., 1991]
--
Rick Moen - via <ent type='ORG'>RBBS</ent>-NET node 8:914/201
INTERNET: moen@f207.n914.z8.<ent type='ORG'>RBBS</ent>-NET.ORG
Robert Sheaffer, Nov., 1991]
--
Rick Moen - via <ent type='ORG'>RBBS</ent>-</p></xml>

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,147 @@
<xml><p>***************************************************************************
***************************************************************************
<ent type='ORG'>DARK</ent> CONSPIRACY INVOLVING ELECTRICAL POWER COMPANIES SURFACES
Rewritten by the <ent type='ORG'>Quantum Mechanic</ent>
(Author Unknown)
Updated 8/7/88 W0PN
***************************************************************************
***************************************************************************
For years the electrical utility companies have led the public to believe
they were in business to supply electricity to the consumer, a service for
which they charge a substantial rate. The recent accidental acquisition of
secret records from a well known power company has led to a massive
research campaign which positively explodes several myths and exposes the
massive hoax which has been perpetrated upon the public by the power
companies.
The most common hoax promoted the false concept that light bulbs emitted
light; in actuality, these 'light' bulbs actually absorb <ent type='ORG'>DARK</ent> which is
then transported back to the power generation stations via wires. A more
descriptive name has now been coined; the new scientific name is for the
device is <ent type='ORG'>DARK</ent>SUCKER.
This newsletter introduces a brief synopsis of the darksucker theory,
which proves the existence of dark and establishes the fact that dark has
great mass, and further, that dark is the fastest known particle in the
universe. Apparently, even the celebrated Dr. Albert Einstein did not
suspect the truth.. that just as <ent type='GPE'>COLD</ent> is the absence of HEAT, LIGHT is
actually the ABSENCE of <ent type='ORG'>DARK</ent>... light does not really exist!
The basis of the darksucker theory is that electric light bulbs suck dark.
Take for example, the <ent type='ORG'>darksuckers</ent> in the room where you are. There is much
less dark right next to them than there is elsewhere, demonstrating their
limited range. The larger the darksucker, the greater its capacity to suck
dark. <ent type='ORG'>Darksuckers</ent> in a parking lot or on a football field have a much
greater capacity than the ones in used in the home, for example.
It may come as a surprise to learn that <ent type='ORG'>darksuckers</ent> also operate on a
celestial scale; witness the <ent type='ORG'>Sun</ent>. Our <ent type='ORG'>Sun</ent> makes use of dense dark, sucking
it in from all the planets and intervening dark space. Naturally, the <ent type='ORG'>Sun</ent>
is better able to suck dark from the planets which are situated closer to
it, thus explaining why those planets appear brighter than do those which
are far distant from the <ent type='ORG'>Sun</ent>.
Occasionally, the <ent type='ORG'>Sun</ent> actually oversucks; under those conditions, dark
spots appear on the surface of the <ent type='ORG'>Sun</ent>. Scientists have long studied these
'sunspots' and are only recently beginning to realize that the dark spots
represent leaks of high pressure dark because the <ent type='ORG'>Sun</ent> has oversucked dark
to such an extent that some of actually leaks back into space. This
leakage of high pressure dark frequently causes problems with radio
communications here on <ent type='LOC'>Earth</ent> due to collisions between the dark particles
as they stream out into space via the black 'holes' in the surface of the
<ent type='ORG'>Sun</ent>.
As with all manmade devices, <ent type='ORG'>darksuckers</ent> have a finite lifetime. Once they
are full of dark, they can no longer suck. This condition can be observed
by looking for the black spot on a full darksucker when it has reached
maximum capacity... you have surely noticed that dark completely surrounds
a full darksucker because it no longer has the capacity to suck dark at
all.
A candle is a primitive darksucker. A new candle has a white wick. You
will notice that after the first use the wick turns black, representing all
the dark which has been sucked into it. If you hold a pencil next to the
wick of an operating candle, the tip will turn black because it got in the
way of the dark flowing into the candle. Unfortunately, these primitive
<ent type='ORG'>darksuckers</ent> have a very limited range and are hazardous to operate because
of the intense heat produced.
There are also portable <ent type='ORG'>darksuckers</ent> called flashlights. The bulbs in these
devices cannot handle all of the dark by themselves, and must be aided by a
dark storage unit called a battery. When the dark storage unit is full, it
must be either emptied (a process called 'recharging') or replaced before
the portable darksucker can continue to operate. If you break open a
battery, you will find dense black dark inside, evidence that it is
actually a compact dark storage unit.
The <ent type='ORG'>darksuckers</ent> on your automobile are high capacity units with great
range, thus they require much larger dark storage units mounted under the
hood of the vehicle. Since there is far more dark available in the winter
season, automobile dark storage units reach capacity more frequently than
they do in the summer, requiring 'recharging', or in severe cases, total
replacement.
Dark has great mass. When dark is drawn into a darksucker, friction caused
by the speed of the dark particles (called anti-photons) actually generates
substantial heat, thus it is unwise to touch an operating dark sucker.
Candles represent a special problem, as the dark must travel into a solid
wick instead of through clear glass. This generates a great amount of
heat, making it very dangerous to touch an operating candle.
Because dark has such great mass, it is very heavy. If you swim just below
the surface of a lake, you see a lot of 'light' (absence of dark, to be
more precise). As you go deeper and deeper beneath the surface, you notice
it gets darker and darker. When you reach a depth of approximately fifty
feet, you are in total darkness. This is because the heavier dark sinks to
the bottom of the lake, making it appear 'lighter' near the surface.
The power companies have learned to use the dark that has settled to the
bottom of lakes by pushing it through turbines, which generate electricity
to help push the dark into the ocean where it may be safely stored for
their devious purposes.
Prior to the development of turbines, it was much more difficult to get the
dark from the rivers and lakes to the ocean. The <ent type='NORP'>Indians</ent> recognized this
problem, and developed means to assist the flow of dark on it's long
journey to the ocean. When on a river in a canoe travelling in the same
direction as the flow of dark, they paddled slowly, so as not to impede the
flow of dark; but when they travelled against the flow of dark, they
paddled vigorously to help propel the dark along its way.
Scientists are working feverishly to develop exotic new instrumentation with
which to measure the actual speed and energy level of dark. While such
instrumentation is beyond the capabilities of the average layman, you can
actually perform a simple test to demonstrate the unbelievable speed of
dark, right in your own home.
All that is required for the simple test is a closed desk drawer situated
in a bright room. You know from past experience that the tightly shut
drawer is FULL of dark. Now, place your hand firmly on the drawer's
handle. Quickly yank the drawer open.. the dark immediately disappears,
demonstrating the blinding speed with which the dark travels to the nearest
darksucker!
The secrets of dark are at present known only to the power companies. Dark
must be very valuable, since they go to such lengths to collect it in vast
quantities. By some well hidden method, more modern power 'generation'
facilities have devised methods to hide their collection of dark. The
older facilities, however, usually have gargantuan piles of solidified dark
in huge fenced in areas. Visitors to these facilities are told the huge
black piles of material are supplies of coal, but such is not the case.
The power companies have long used code words to hide their activities;
D.C. is Dark Conspiracy, whole A.C. is Alternate Conspiracy. The intent of
the A.C. is not yet known, but the D.C. is rapidly yielding it's secrets to
the probing eyes and instruments of honest scientists around the world.
New developments are being announced every day and we promise to keep the
public informed of these announcements as they occur via this newsletter.
Les Dark, Editor
</p></xml>

View File

@ -0,0 +1,574 @@
<xml><p>From "CROSSFIRE" by Jim Marrs
ISBN 0-88184-524-8
Copyright (c) 1989 by Jim Marrs
First published by Carroll &amp; Graf 1989</p>
<p>Reprinted without permission</p>
<p> CONVENIENT DEATHS</p>
<p> In the three-year period which followed the murder of President
Kennedy and Lee Harvey Oswald, 18 material witnesses died - six by
gunfire, three in motor accidents, two by suicide, one from a cut
throat, one from a karate chop to the neck, five from natural causes.
An actuary, engaged by <ent type='ORG'>the London Sunday Times</ent>, concluded that on
November 22, 1963m the odds against these witnesses being dead by
February 1967, were one hundred thousand trillion to one.</p>
<p> The above comment on the deaths of assassination witnesses was published in
a tabloid companion piece to the movie _Execution Action_, released in 1973.
By that time, part of the mythology of the Kennedy assassination included the
mysterious deaths of people who were connected with it.
By the mid-1960s, people in <ent type='GPE'>Dallas</ent> already were whispering about the
number of persons who died under strange or questionable circumstances. Well
into the 1980s, witnesses and others were hesitant to come forward with
information because of the stories of strange and sudden death that seemed to
visit some people with information about the assassination.
Finally, in the late 1970s, <ent type='ORG'>the <ent type='ORG'>House</ent> Select <ent type='ORG'>Committee</ent></ent> on Assassinations
felt compelled to look into the matter.
But aside from discrediting <ent type='ORG'>the London Sunday Times</ent> actuarial study, the
<ent type='ORG'>Committee</ent> was unable to come to any conclusions regarding the growing number
of deaths. The <ent type='ORG'>Committee</ent> said it could not make a valid actuarial study due
to the broad number and types of persons that had to be included in such a
study.
In response to a letter from the <ent type='ORG'>Committee</ent>, London <ent type='ORG'>Sunday Times</ent> legal
manager Anthony Whitaker stated:</p>
<p> Our piece about the odds against the deaths of the Kennedy witnesses
was, I regret to say, based on a careless journalistic mistake and
should not have been published. This was realized by The <ent type='ORG'>Sunday Times</ent>
editorial staff after the first edition - the one which goes to the
United States... - had gone out, and later editions were amended.
There was no question of our actuary having got his answer wrong: it
was simply that we asked him the wrong question. He was asked what
were the odds against 15 named people out of the population of the
United States dying within a short period of time, to which he replied
- correctly - that they were very high. However, if one asks what are
the odds against 15 of those included in the <ent type='ORG'>Warren Commission</ent> Index
dying within a given period, the answer is, of course, that they are
much lower. Our mistake was to treat the reply to the former question
as if it dealt with the latter - hence the fundamental error in our
first edition report, for which we apologize.</p>
<p> This settled the matter for the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent>, which apparently made
little or no attempt to seriously study the number of deaths that followed
the JFK assassination.
Jacqueline Hess, the <ent type='ORG'>Committee</ent>'s chief of research for the JFK
investigation, reported:</p>
<p> Our final conclusion on the issue is that the available evidence does
not establish anything about the nature of these deaths which would
indicate that the deaths were in some manner, either direct or
peripheral, caused by the assassination of President Kennedy or by
any aspect of the subsequent investigation.</p>
<p> However, an objective look at both the number and the causes of death
balanced against the importance of the person's connection to the case, still
causes raised eyebrows among those who study such a list.
In this section, people who were connected - no matter how tenuously -
with the assassination and who are now dead are listed according to date of
death.
This is dealing only with deaths, not with the numerous persons - such as
Warren <ent type='ORG'>Reynolds</ent>, Roger Craig, and Richard Carr - who claim to have been shot
at or attacked.
This chapter has been entitled "Convenient Deaths" because these deaths
certainly would have been convenient for anyone not wishing the truth of the
JFK assassination to become public.
The <ent type='ORG'>CIA</ent> has gone to some lengths to discredit the idea of mysterious
deaths plaguing assassination witnesses.
A 1967 memo from <ent type='ORG'>CIA</ent> headquarters to station chiefs advised:</p>
<p> Such vague accusations as that "more than 10 people have died
mysteriously" can always be explained in some rational way: e.g., the
individuals concerned have for the most part died of natural causes;
the [Warren] Commission staff questioned 418 witnesses - the <ent type='ORG'>FBI</ent>
interviewed far more people, conducting 25000 interviews and
reinterviews - and in such a large group, a certain number of deaths
are to be expected.</p>
<p> Testifying before the Church <ent type='ORG'>Committee</ent> in 1975, <ent type='ORG'>CIA</ent> technicians told of a
variety of <ent type='ORG'>TWEP</ent> technology - Terminate With Extreme Prejudice - that cannot
be detected in a postmortem examination.
One recently declassified <ent type='ORG'>CIA</ent> document, a letter from an <ent type='ORG'>Agency</ent> consultant
to a <ent type='ORG'>CIA</ent> officer, states:</p>
<p> You will recall that I mentioned that the local circumstances under
which a given means might be used might suggest the technique to be
used in that case. I think the gross divisions in presenting this
subject might be:
(1) bodies left with no hope of the cause of death being determined by
the most complete autopsy and chemical examinations
(2) bodies left in such circumstances as to simulate accidental death
(3) bodies left in such circumstances as to simulate suicidal death
(4) bodies left with residue that simulates those caused by natural
diseases.</p>
<p> The letter goes on to show that undetected murders do not have to be the
result of sophisticated chemicals. It states:</p>
<p> There are two techniques which I believe should be mentioned since
they require no special equipment besides a strong arm and the will to
do such a job. These would be either to smother the victim with a
pillow or to strangle him with a wide piece of cloth such as a bath
towel. In such cases, there are no specific anatomic changes to
indicate the cause of death...</p>
<p> While it is obvious that the <ent type='ORG'>CIA</ent> - and hence the mob through operatives who
work for both - has the capability of killing, it is less well known that the
<ent type='ORG'>Agency</ent> has developed drugs to induce cancer.
Recall that Jack Ruby died of sudden lung cancer just as he had been granted
a new trial.
A 1952 <ent type='ORG'>CIA</ent> memo reported on the cancer-causing effects of beryllium:
"This is certainly the most toxic inorganic element and it produces a
peculiar fibrotic tumor at the site of local application. The amount
necessary to produce these tumors is a few micrograms."
Local law-enforcement officers and coroners are not equipped, either by
training or by inclination, to detect deaths induced by such sophisticated
means. They look for signs of a struggle, evidence of a break-in, bruises,
or marks on the victim.
With no evidence to the contrary, many deaths are ruled suicide or accident.
Others are ruled due to natural causes, such as heart attack.
It is interesting to note how the deaths are grouped. Many of the
earliest deaths came during the time of the <ent type='ORG'>Warren Commission</ent> investigation
or just afterwards.
More deaths took place in the late 1960s as <ent type='GPE'>New Orleans District</ent> Attorney
Jim Garrison was launching his investigation. Other suspicious deaths
occurred during the mid-1970s, as the <ent type='ORG'>Senate</ent> Intelligence <ent type='ORG'>Committee</ent> was
looking into assassinations by U.S. intelligence agencies. And finally,
another spate of deaths came around 1977, just as <ent type='ORG'>the <ent type='ORG'>House</ent> Select <ent type='ORG'>Committee</ent></ent>
on Assassinations was gearing up its investigation.
These deaths are listed below in chronological order. An asterisk means
the death is a particularly suspicious one. They are also grouped according
to which investigation was being conducted at the time.
The possibility of convenient deaths leads one into a well of paranoia, yet
this long list cannot be summarily dismissed.
Obviously, many of these deaths - particularly in recent years - can be
ascribed to the passage of time. But others cannot - especially when viewed
in the context of the assassination inquiries taking place at the time.
Read for yourself and consider... When does coincidence end and conspiracy
begin?</p>
<p> List of Deaths</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>11/63 Karyn Kupcinet* TV host's daughter who was Murdered
overheard telling of JFK's
death prior to 11/22/63</p>
<p> The <ent type='ORG'>Warren Commission</ent> Investigation</p>
<p>12/63 Jack Zangretti* Expressed foreknowledge of Gunshot victim
Ruby shooting Oswald</p>
<p>2/64 Eddy Benavides* Look-alike brother to Tippit Gunshot to head
shooting witness, Domingo
Benavides</p>
<p>3/64 <ent type='ORG'>Betty</ent> McDonald* Former Ruby employee who Suicide by hanging
alibied Warren <ent type='ORG'>Reynolds</ent> in <ent type='GPE'>Dallas</ent> jail
shooting suspect</p>
<p>3/64 Bill Chesher Thought to have information <ent type='ORG'>Heart</ent> attack
linking Oswald and Ruby</p>
<p>3/64 Hank Killam* Husband of Ruby employee, Throat cut
knew Oswald acquaintance</p>
<p>4/64 Bill Hunter* Reporter who was in Ruby's Accidental shooting
apartment on 11/24/63 by policeman</p>
<p>5/64 Gary Underhill* <ent type='ORG'>CIA</ent> agent who claimed Gunshot in head,
<ent type='ORG'>Agency</ent> was involved Ruled suicide</p>
<p>5/64 Hugh <ent type='ORG'>Ward</ent>* Private investigator working Plane crash in
with Guy Banister and David Mexico
Ferrie</p>
<p>5/64 DeLesseps Morrison* <ent type='GPE'>New Orleans</ent> mayor Passenger in <ent type='ORG'>Ward</ent>'s
plane</p>
<p>8/64 Teresa Norton* Ruby employee Fatally shot</p>
<p>6/64 Guy Banister* Ex-<ent type='ORG'>FBI</ent> agent in <ent type='GPE'>New Orleans</ent> <ent type='ORG'>Heart</ent> attack
connected to Ferrie, <ent type='ORG'>CIA</ent>,
Carlos Marcello and Oswald</p>
<p>9/64 Jim Koethe* Reporter who was in Ruby's Blow to neck
apartment on 11/24/63</p>
<p>9/64 C.D. Jackson Life Magazine senior vice Unknown
president who bought Zapruder
film and locked it away</p>
<p>10/64 Mary Pinchot Meyer* JFK mistress whose diary was Murdered
taken by <ent type='ORG'>CIA</ent> chief James
Angleton after her death</p>
<p>1/65 Paul Mandal Life writer who told of JFK Cancer
turning to rear when shot in
throat</p>
<p>3/65 Tom Howard* Ruby's first lawyer, was in <ent type='ORG'>Heart</ent> attack
Ruby's apartment on 11/24/63</p>
<p>5/65 Maurice Gatlin* Pilot for Guy Banister Fatal Fall</p>
<p>8/65 Mona B. Saenz* Texas Employment clerk who Hit by <ent type='GPE'>Dallas</ent> bus
interviewed Oswald</p>
<p>?/65 David Goldstein <ent type='GPE'>Dallas</ent>ite who helped <ent type='ORG'>FBI</ent> <ent type='ORG'>Natural</ent> causes
trace Oswald's pistol</p>
<p>9/65 Rose Cheramie* Knew of assassination in Hit/run victim
advance, told of riding to
<ent type='GPE'>Dallas</ent> with <ent type='NORP'>Cubans</ent></p>
<p>11/65 Dorothy Kilgallen* Columnist who had private <ent type='ORG'>Drug</ent> overdose
interview with Ruby, pledged
to "break" JFK case</p>
<p>11/65 Mrs. Earl Smith* Close friend to Dorothy Unknown
Kilgallen, died two days
after columnist, may have
kept Kilgallen's notes</p>
<p>12/65 William Whaley* Cabdriver who reportedly <ent type='ORG'>Motor Collision</ent>
drove Oswald to Oak Cliff (the only <ent type='GPE'>Dallas</ent>
taxi driver to
die on duty)</p>
<p>1966 Judge Joe Brown Presided over Ruby's trial <ent type='ORG'>Heart</ent> attack</p>
<p>1966 Karen "Little Lynn" Ruby employee who last talked Gunshot victim
Carlin* with Ruby before Oswald shooting</p>
<p>1/66 <ent type='ORG'>Earline</ent> Roberts Oswald's landlady <ent type='ORG'>Heart</ent> attack</p>
<p>2/66 Albert Bogard* Car salesman who said Oswald Suicide
test drove new car</p>
<p>6/66 Capt. Frank Martin <ent type='GPE'>Dallas</ent> police captain who Cancer
witnessed Oswald slaying,
told <ent type='ORG'>Warren Commission</ent>,
"There's a lot to be said,
but probably be better if I
don't say it."</p>
<p>8/66 Lee Bowers, Jr.* Witnessed men behind picket <ent type='ORG'>Motor</ent> accident
fence on Grassy Knoll</p>
<p>9/66 Marilyn "Delilah" Ruby dancer Shot by husband
Walle* after one month
of marriage</p>
<p>10/66 William Pitzer* JFK autopsy photographer Gunshot, ruled
who described his duty as suicide
"horrifying experience"</p>
<p>11/66 Jimmy Levens <ent type='GPE'>Fort Worth</ent> nightclub owner <ent type='ORG'>Natural</ent> causes
who hired Ruby employee</p>
<p>11/66 James Worrell, Jr.* Saw man flee rear of Texas <ent type='ORG'>Motor</ent> accident
School Book Depository</p>
<p>1966 Clarence Oliver D.A. investigator who Unknown
worked Ruby case</p>
<p>12/66 Hank Suydam Life magazine official in <ent type='ORG'>Heart</ent> attack
charge of JFK stories</p>
<p> The Garrison Inquiry</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1967 Leonard Pullin Civilian Navy employee who One-car crash
helped film _Last Two Days_
about assassination</p>
<p>1/67 Jack Ruby Oswald's slayer Lung cancer (He
told family he
was injected with
cancer cells.)</p>
<p>2/67 Harold Russell* Saw escape of Tippit killer Killed by cop in
bar brawl</p>
<p>2/67 David Ferrie* Acquaintance of Oswald, Blow to neck,
Garrison suspect, and ruled accidental
employee of Guy Banister</p>
<p>2/67 <ent type='ORG'>Eladio Del Valle</ent>* Anti-Castro <ent type='NORP'>Cuban</ent> associate Gunshot wound,
of David Ferrie being sought ax wound to head
by Garrison</p>
<p>3/67 Dr. Mary Sherman* Ferrie associate working on Died in fire
cancer research (possibly shot)</p>
<p>1/68 A.D. Bowie Assistant <ent type='GPE'>Dallas</ent> D.A. Cancer
prosecuting Ruby</p>
<p>4/68 Hiram Ingram <ent type='GPE'>Dallas</ent> deputy sheriff, close Cancer
friend to Roger Craig</p>
<p>5/68 Dr. Nicholas <ent type='ORG'>Chetta</ent> <ent type='GPE'>New Orleans</ent> coroner who ruled <ent type='ORG'>Heart</ent> attack
on death of Ferrie</p>
<p>8/68 Phillip Geraci* Friend of Perry Russo, told of Electrocution
Oswald/Shaw connection</p>
<p>1/69 Henry Delaune* Brother-in-law to coroner Murdered
<ent type='ORG'>Chetta</ent></p>
<p>1/69 E.R. Walthers* <ent type='GPE'>Dallas</ent> deputy sheriff who Shot by felon
was involved in Depository
search, claimed to have found
.45-cal slug</p>
<p>1969 Charles Mentesana Filmed rifle other than <ent type='ORG'>Heart</ent> attack
Mannlicher-Carcano being taken
from Depository</p>
<p>4/69 Mary Bledsoe Neighbor to Oswald, also <ent type='ORG'>Natural</ent> causes
knew David Ferrie</p>
<p>4/69 John Crawford* Close friend to both Ruby and Crash of private
Wesley Frazier, who gave ride plane
to Oswald on 11/22/63</p>
<p>7/69 Rev. Clyde Johnson* Scheduled to testify about Fatally shot
Clay Shaw/Oswald connection</p>
<p>1970 George McGann* Underworld figure, connected Murdered
to Ruby friends; wife, <ent type='GPE'>Beverly</ent>,
took film in Dealey Plaza</p>
<p>1/70 Darrell W. Garner Arrested for shooting Warren <ent type='ORG'>Drug</ent> overdose
<ent type='ORG'>Reynolds</ent>, released after
alibi from <ent type='ORG'>Betty</ent> McDonald</p>
<p>8/70 Bill Decker <ent type='GPE'>Dallas</ent> sheriff who saw bullet <ent type='ORG'>Natural</ent> causes
hit street in front of JFK</p>
<p>8/70 Abraham Zapruder Took famous film of JFK <ent type='ORG'>Natural</ent> causes
assassination</p>
<p>12/70 Salvatore Granello* Mobster linked to Hoffa, Murdered
Trafficante, and Castro
assassination plots</p>
<p>1971 James Plumeri* Mobster tied to mob-<ent type='ORG'>CIA</ent> Murdered
assassination plots</p>
<p>3/71 Clayton Fowler Ruby's chief defense attorney Unknown</p>
<p>4/71 Gen. Charles Cabell* <ent type='ORG'>CIA</ent> deputy director connected Collapsed and
to anti-Castro <ent type='NORP'>Cubans</ent> died after
physical at Ft.
Myers</p>
<p> The Church <ent type='ORG'>Committee</ent> Investigation</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1972 Hale Boggs* <ent type='ORG'>House</ent> majority leader, member Disappeared on
of <ent type='ORG'>Warren Commission</ent> who began <ent type='NORP'>Alaskan</ent> plane
to publicly express doubts flight
doubts about findings</p>
<p>5/72 J. Edgar Hoover* <ent type='ORG'>FBI</ent> director who pushed "Lone <ent type='ORG'>Heart</ent> attack (no
assassin" theory in JFK autopsy)
assassination</p>
<p>9/73 Thomas E. Davis* Gun runner connected to both Electrocuted
Ruby and <ent type='ORG'>CIA</ent> trying to steal
wire</p>
<p>2/74 J.A. <ent type='ORG'>Milteer</ent>* <ent type='GPE'>Miami</ent> right-winger who Heater explosion
predicted JFK's death and
capture of scapegoat</p>
<p>1974 Dave Yaras* Close friend to both Hoffa Murdered
and Jack Ruby</p>
<p>7/74 Earl Warren Chief justice who reluctantly <ent type='ORG'>Heart</ent> failure
chaired <ent type='ORG'>Warren Commission</ent></p>
<p>8/74 Clay Shaw* Prime suspect in Garrison Possible cancer
case, reportedly a <ent type='ORG'>CIA</ent>
contact with Ferrie and E.
Howard Hunt</p>
<p>1974 Earle Cabell Mayor of <ent type='GPE'>Dallas</ent> on 11/22/63, <ent type='ORG'>Natural</ent> causes
whose brother, Gen. Charles
Cabell, was fired from <ent type='ORG'>CIA</ent> by
JFK</p>
<p>6/75 Sam Giancana* <ent type='ORG'><ent type='GPE'>Chicago</ent> <ent type='ORG'>Mafia</ent></ent> boss slated to Murdered
tell about <ent type='ORG'>CIA</ent>-mob death plots
to <ent type='ORG'>Senate</ent> <ent type='ORG'>Committee</ent></p>
<p>1975 Clyde Tolson J. Edgar Hoover's assistant <ent type='ORG'>Natural</ent> causes
and roommate</p>
<p>7/75 Allan Sweatt <ent type='GPE'>Dallas</ent> deputy sheriff involved <ent type='ORG'>Natural</ent> causes
in investigation</p>
<p>12/75 Gen. Earl Wheeler Contact between JFK and <ent type='ORG'>CIA</ent> Unknown</p>
<p>1976 Ralph Paul Ruby's business partner <ent type='ORG'>Heart</ent> attack
connected with crime figures</p>
<p>4/76 James Chaney <ent type='GPE'>Dallas</ent> motorcycle officer <ent type='ORG'>Heart</ent> attack
to JFK's right rear who said
JFK "struck in the face" with
bullet</p>
<p>4/76 Dr. Charles Gregory Governor John Connally's <ent type='ORG'>Heart</ent> attack
physician</p>
<p>6/76 William Harvey* <ent type='ORG'>CIA</ent> coordinator for <ent type='ORG'>CIA</ent>-mob Complications of
assassination plans against heart surgery
Castro</p>
<p>7/76 John Roselli* Mobster who testified to Stabbed and
<ent type='ORG'>Senate</ent> committee, was to stuffed in metal
appear again drum</p>
<p> 1977 - A Terrible Year for Many</p>
<p> The year 1977 produced a bumper crop of candidates for listing under
convenient deaths connected with the JFK assassination - including the deaths
of six top <ent type='ORG'>FBI</ent> officials all of whom were scheduled to testify before the
<ent type='ORG'>House</ent> Select <ent type='ORG'>Committee</ent> on Assassinations.
Topping this list was former number-three man in the <ent type='ORG'>FBI</ent>, William C.
Sullivan, who had already had a preliminary meeting with the investigators
for the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent>. Sullivan was shot with a high-powered rifle near
his <ent type='GPE'>New Hampshire</ent> home by a man who claimed to have mistaken him for a deer.
The man was charged with a misdemeanor - "shooting a human being by
accident" - and released to the custody of his father, a state policeman.
There was no further investigation of Sullivan's death.
Louis Nichols was a special assistant to J. Edgar Hoover as well as
Hoover's liaison with the <ent type='ORG'>Warren Commission</ent>. Alan H. <ent type='GPE'>Belmont</ent> also was a
special assistant to Hoover. James Cadigan was a document expert with access
to many classified assassination documents, while J.M. English headed the <ent type='ORG'>FBI</ent>
laboratory where Oswald's rifle and pistol were tested. Donald Kaylor was
the <ent type='ORG'>FBI</ent> fingerprint expert who examined prints found at the assassination
scene. None of these six <ent type='ORG'>Bureau</ent> officials lived to tell what they knew to
the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent>.
Other key assassination witnesses, such as George DeMohrenschildt and
former <ent type='NORP'>Cuban</ent> president Carlos Prio <ent type='ORG'>Soccaras</ent>, died within weeks of each other
in 1977, just as they, too, were being sought by the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent>.
The ranks of both organized crime and U.S. intelligence agencies were
thinned by deaths beginning in 1975, the time of the <ent type='ORG'>Senate</ent> Intelligence
Hearings, and 1978, the closing months of the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent>.
Charles Nicoletti, a mobster connected with the <ent type='ORG'>CIA</ent>-<ent type='ORG'>Mafia</ent> assassination
plots, was murdered in <ent type='GPE'>Chicago</ent>, while William Pawley, a former diplomat
connected with both organized crime and <ent type='ORG'>CIA</ent> figures, reportedly committed
suicide.
Adding to rumors that "hit teams" may have been at work, a <ent type='ORG'>Time</ent> magazine
article reported that federal agents had initiated a nationwide investigation
into more than 20 gangland assassinations constituting what agents believed
was an "open underworld challenge to governmental infiltration of <ent type='ORG'>Mafia</ent>
activities."
One <ent type='ORG'>FBI</ent> source was quoted as saying: "Our main concern is that we may be
facing a revival of the old `Murder, Inc.' days."
A <ent type='GPE'>New York News</ent> story concerning this official fear of roving
assassination squads even mentions the death of Sam Giancana, who was killed
one day before he was scheduled to testify about mob-<ent type='ORG'>CIA</ent> connections and
while under government protection.
Prior to the <ent type='ORG'>House</ent> <ent type='ORG'>Committee</ent> investigation into the JFK assassination,
the news media reported the following deaths:</p>
<p>Date Name Connection with Case Cause of Death</p>
<p>1/77 William Pawley* Former <ent type='NORP'>Brazilian</ent> ambassador Gunshot, ruled
connected to anti-Castro suicide
<ent type='NORP'>Cubans</ent>, crime figures</p>
<p>3/77 George Close friend to both Oswald Gunshot wound,
DeMohrenschildt* and Bouvier family (Jackie ruled suicide
Kennedy's parents), <ent type='ORG'>CIA</ent>
contract agent</p>
<p>3/77 Carlos Prio Former <ent type='NORP'>Cuban</ent> president, Gunshot wound,
<ent type='ORG'>Soccaras</ent>* money man for anti-Castro ruled suicide
<ent type='NORP'>Cubans</ent></p>
<p>3/77 Paul Raigorodsky Business friend of George <ent type='ORG'>Natural</ent> causes
DeMohrenschildt and wealthy
oilmen</p>
<p>5/77 Lou Staples* <ent type='GPE'>Dallas</ent> radio talk show host Gunshot to head,
who told friends he would ruled suicide
break case</p>
<p>6/77 Louis Nichols Former number-three man in <ent type='ORG'>Heart</ent> attack
<ent type='ORG'>FBI</ent>, worked on JFK
investigation</p>
<p>8/77 Alan <ent type='GPE'>Belmont</ent> <ent type='ORG'>FBI</ent> official who testified to "Long illness"
<ent type='ORG'>Warren Commission</ent></p>
<p>8/77 James Cadigan <ent type='ORG'>FBI</ent> document expert who Fall in home
testified to <ent type='ORG'>Warren Commission</ent></p>
<p>8/77 Joseph C. <ent type='ORG'>Ayres</ent>* Chief steward on JFK's Shooting accident
Air Force One</p>
<p>8/77 Francis G. Powers* U-2 pilot downed over <ent type='GPE'>Russia</ent> Helicopter crash
in 1960 (he reportedly
ran out of fuel)</p>
<p>9/77 Kenneth O'Donnell JFK's closest aide <ent type='ORG'>Natural</ent> causes</p>
<p>10/77 Donald Kaylor <ent type='ORG'>FBI</ent> fingerprint chemist <ent type='ORG'>Heart</ent> attack</p>
<p>10/77 J.M. English Former head of <ent type='ORG'>FBI</ent> Forensic <ent type='ORG'>Heart</ent> attack
<ent type='ORG'>Sciences Laboratory</ent></p>
<p>11/77 William Sullivan* Former number-three man in Hunting accident
<ent type='ORG'>FBI</ent>, headed <ent type='ORG'>Division</ent> 5,
counterespionage and
domestic intelligence</p>
<p>1978 C.L. "Lummie" <ent type='GPE'>Lewis</ent> <ent type='GPE'>Dallas</ent> deputy sheriff who <ent type='ORG'>Natural</ent> causes
arrested <ent type='ORG'>Mafia</ent> man Braden in
Dealey Plaza</p>
<p>9/78 Garland Slack Man who said his target was Unknown
fired at by Oswald at rifle
range</p>
<p>1/79 <ent type='ORG'>Billy Lovelady Depository</ent> employee said to be Complications
the man in the doorway in AP from heart attack
photograph</p>
<p>6/80 Dr. John Holbrook Psychiatrist who testified <ent type='ORG'>Heart</ent> attack, but
Ruby was not insane pills, notes found</p>
<p>1/81 Marguerite Oswald Mother of accused assassin Cancer</p>
<p>10/81 Frank Watts Chief felony prosecutor for <ent type='ORG'>Natural</ent> causes
<ent type='GPE'>Dallas</ent> D.A.</p>
<p>1/82 Peter Gregory Original translator for <ent type='ORG'>Natural</ent> causes
Marina Oswald and Secret
Service</p>
<p>5/82 Dr. James Weston Pathologist allowed to see Died while
JFK autopsy material for jogging, ruled
HSCA natural causes</p>
<p>8/82 Will H. Griffin <ent type='ORG'>FBI</ent> agent who reportedly Cancer
said Oswald was "definitely"
an <ent type='ORG'>FBI</ent> informant</p>
<p>10/82 W. Marvin Gheesling <ent type='ORG'>FBI</ent> official who helped <ent type='ORG'>Natural</ent> causes
supervise JFK investigation</p>
<p>3/84 <ent type='ORG'>Roy Kellerman</ent> <ent type='ORG'>Secret Service</ent> agent in charge Unknown
if JFK limousine
--- end
</p></xml>

View File

@ -0,0 +1,202 @@
<xml><p>PRODUCER INTERESTS VS. THE PUBLIC INTEREST: <ent type='ORG'>THE ORIGIN</ent> OF
DEMOCRATIZED PRIVILEGE</p>
<p>By RICHARD M. EBELING</p>
<p>In The Wealth of Nations, Adam <ent type='ORG'>Smith</ent> constructed some of the
most devastating arguments against the then-prevailing system
of economic policy--mercantilism. In practically every country
in <ent type='LOC'>Europe</ent>, governments regulated, controlled and planned the
economic activities of their subjects. In <ent type='GPE'>France</ent>, the
regulations were so detailed that they specified how many
stitches should be used in attaching a button to a shirt. In
<ent type='GPE'>Austria</ent>, the state limited the period in which people could be
in mourning so that the dye-makers would not lose the business
of selling colored cloth.</p>
<p>Adam <ent type='ORG'>Smith</ent> demonstrated that rather than bringing prosperity,
mercantilism had retarded economic progress. Governments, he
argued, had neither the wisdom nor the ability to plan the
economic affairs of a multitude of people. If governments
primarily limited themselves to the protection of life,
liberty and property, <ent type='ORG'>Smith</ent> said, men could be trusted to
manage their own affairs. And when left to do so in an open,
competitive market, the natural forces of supply and demand
would generate a rising prosperity for all. Free men in free
markets were the ultimate source of the wealth of nations.</p>
<p>But having presented the case for free markets, Adam <ent type='ORG'>Smith</ent> was
not optimistic about the future. To expect that a regime of
free trade would ever be established was, he said, as likely
as the establishment of a utopia. "Not only the prejudices of
the public," he despaired, "but what is much more
unconquerable, the private interests of many individuals
irresistibly oppose it."</p>
<p>Governments had turned over many industries and trades to
private monopolies, whose interests were clearly opposed to
open competition. Special-interest groups, with their
government-bestowed privileges, were too strong ever to be
defeated.</p>
<p>Within one lifetime, however, <ent type='ORG'>Smith</ent> was proven to be wrong. By
the middle of the 19th century, <ent type='GPE'>England</ent> was a free-trade
nation and many other nations were following its path.</p>
<p>But in our century, governments once again use their power to
regulate the marketplace, protect various industries from
foreign and domestic competition, and limit entry into markets
through licensing procedures. <ent type='ORG'>Mercantilism</ent> has returned; and
it has returned stronger than ever. The older mercantilism was
a system that benefited a few privileged producers at the
expense of most of the society. But in our era of <ent type='NORP'>democratic</ent>
government, it is the many who lobby and <ent type='ORG'>politick</ent> in the
political arena. Almost every group in society now does battle
for a piece of the economic pie--not through open competition
for consumer business, but through the political process to
gain a greater share by manipulating the market. Ours is the
era of democratized privilege.</p>
<p>Why have free societies all around the world become
battlegrounds for political privilege and economic plunder?</p>
<p>The answer is to be found in one of Adam <ent type='ORG'>Smith</ent>'s most famous
ideas: the division of labor. "The division of labor," <ent type='ORG'>Smith</ent>
explained, "so far as it can be introduced, occasions in every
art, a proportionate increase of the productive powers of
labor." By specializing in various lines of production, the
members of society are able to improve and increase their
skills and efficiency to do various things. Out of these
productive specializations comes an increased supply of all
kinds of goods and services. The members of society trade away
the large quantities of each commodity they respectively
produce for all the other goods offered by their fellows in
the market arena.</p>
<p><ent type='ORG'>Society</ent>'s members give up the independence of economic self-
sufficiency for the interdependence of a social system of
division of labor. But the gain is a much higher standard of
living than any one of them could ever hope to attain just by
using his own capabilities to fulfill all his wants and
desires through his own labor.</p>
<p>Each individual is now dependent upon others in the society
for the vast majority of the goods and services he wishes to
use and consume. But in a competitive market setting, this
works to his advantage. Sellers vie with one another for his
consumer business.</p>
<p>They underbid each other and offer him attractively lower
prices; they devise ways to produce and market new and
improved products. As consumer, the individual is the master
of the market, whom all sellers must serve if they are to
obtain his business.</p>
<p>Viewed from the perspective of the consumer, the competitive
market serves the public interest. The resources of society
are effectively applied and put to work to satisfy the various
wants and desires of the individuals of that society. The
products which are manufactured are determined by the free
choices of all of the demanders in the marketplace.
Production serves consumption.</p>
<p>But the market looks totally different from the perspective of
the individual producers. They, too, are dependent upon the
market: they are dependent upon buyers willing to purchase
what they have for sale. While the market serves every one as
a consumer, no one can be a consumer unless he has been
successful as a producer. And his success as a producer
depends upon his ability to market and sell his products or to
find willing buyers for his particular labor skills and
abilities.</p>
<p>As a consequence, for each producer the price of his own
product or labor service tends to be more important than the
prices of all of the multitude of consumer goods he might
purchase. Because unless he earns the necessary financial
wherewithal in his producer role, he cannot be a consumer.</p>
<p>Being the consumer of many things, but the producer of usually
one thing, each seller tends to view competition as a
financial threat to his position in the market as well as to
his specific share of the market. The incentive for each
producer, therefore, is to want to limit entry into his corner
of the market, or to reduce the amount of competition
currently existing in his industry or profession.</p>
<p>The only avenue for limiting competition, however, is the
government. Only the government has the ultimate authority to
permanently prohibit those who think they could do better in
the market and who desire to try. Producers, therefore, have
incentives to use portions of the resources and wealth at
their disposal in the political arena to gain or protect the
market position that they feel themselves unable to obtain or
maintain in an open field of competition. And as long as the
costs of acquiring political privileges and protections from
the government to secure profits are less than the costs of
earning profits by making better and less expensive products,
producers will resort to lobbying and <ent type='ORG'>politick</ent>ing to achieve
their ends.</p>
<p>The dilemma for the society is that when producers lobby in
the political process for profits via government privilege,
this results in a using-up of resources that otherwise could
have been invested in making products desired by consumers.
Furthermore, existing producers, sitting behind their walls of
political protections and privileges, have fewer incentives
for making product improvements. Therefore, the normal,
competitive forces that over time would result in better
and greater supplies of goods are retarded,</p>
<p>When government is viewed as the means for acquiring income
"entitlements," job "guarantees" and "fair" (rather than open)
markets, producer interests will always win over the public,
i.e., consumer, interest. Because most individual sellers will
view that they have more to lose from competition as producers
than they have to gain from competition as consumers.</p>
<p>Unfortunately, the pursuit of producer-protection policies
through government has a perverse outcome: the society as a
whole is poorer than it otherwise would be. Every privilege
and protection raises the prices, narrows the variety and
lowers the quality of the goods available to all of us as
consumers.</p>
<p>How, then, do we reverse our age of democratized privilege, in
which politics is reduced to a free-for-all for mutual plunder
and economic power? The answer is not an easy one nor one that
offers a "quick fix."</p>
<p>A turn from our era of neo-mercantilism, with its philosophy
of privileges for all who can win on the political battle
field, requires a moral revolution on the part of each of us.
It requires each and every one of us to apply the rules of
personal conduct to the arena of politics.</p>
<p>In our personal conduct, few of us would feel morally right in
forcibly preventing a buyer from leaving our respective
business establishment until he paid the price we wanted him
to pay. Nor would we feel morally correct in taking a sum of
money out of another's pocket without his consent simply
because he considered our price for our products or labor
services too high.</p>
<p>Yet this is done all of the time through the political
process. Not until we come to accept that the rules of
morality that apply in personal conduct must be the same rules
we follow in politics will the age of democratized privilege
and plunder come to an end. And, alas, we seem a long way off
from seeing that day!</p>
<p>Professor Ebeling is the Ludwig von Mises Professor of
Economics at <ent type='ORG'>Hillsdale College</ent>, <ent type='GPE'>Hillsdale</ent>, <ent type='GPE'>Michigan</ent>, and also
serves as vice-president of academic affairs for <ent type='ORG'>The Future</ent> of
Freedom <ent type='ORG'>Foundation</ent>, P.O. Box 9752, <ent type='GPE'>Denver</ent>, CO 80209.</p>
<p>------------------------------------------------------------
From the March 1991 issue of <ent type='ORG'>FREEDOM DAILY</ent>,
Copyright (c) 1991, <ent type='ORG'>The Future</ent> of Freedom <ent type='ORG'>Foundation</ent>,
PO Box 9752, <ent type='GPE'>Denver</ent>, <ent type='GPE'>Colorado</ent> 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the <ent type='ORG'>Foundation</ent>.
</p></xml>

View File

@ -0,0 +1,67 @@
<xml><p>Desktop genetic engineering.</p>
<p>By Kevin Kelly</p>
<p>I spent a day recently a biotechnology trade show, snooping around the
aisles of plumbing and lob gear to see how close we ore to having gene
equipment that would work in a suburban garage. was looking for
off-the-shelf components that could be assembled by a dedicated individual
into o lob for homebrewed DNA. / was surprised by how close it has come.
While most of the equipment for biotechnology is either delicate but
cumbersome laboratory research instruments, or massive industrial/chemical
plumbing for production purposes, there are o couple of items that hove
miniaturized the research methods into o suggestive desktop space. The
leader in self-contained DNA coding gear is <ent type='ORG'>Applied Biosystems</ent>. Their star
contraption is a table-top box linked to a <ent type='ORG'>Macintosh</ent> computer that will
assemble a short string of DNA from the order that you type into the Mac.
The unit generates the DNA sequence from the some four amino acids that
cellular DNA does. in this case the amino acids are provided in small
bottles in the front of the box, along with bottles of solvent to drive the
process. The DNA is outputted" into a tiny capillary tube. While the
machine is 99.8% accurate in what it constructs, the major (and it is major)
drawback is that it con assemble sequences that are no more than 180 units
long, which would make one short gene, at most. (Genes, like words, vary in
length.) Since human genes come in the order of about one billion units,
there is a way to go in improvements. On the other hand, since the
alteration of even one gene con make a big difference in a living organism
(many congenital diseases are due to a single gene), there is still power in
being able to rewrite o couple of hundred units. A complementary box made by
<ent type='ORG'>Applied Biosystems</ent> works in reverse. Rather than going from code to DNA, it
goes from DNA to code. It takes a bit of existing DNA and reads" its
sequence out as a display on the computer - ATTCGGACA, etc., for instance.
Not only con this verify a sequence one builds, but its main purpose is to
unravel the genetic code encrypted in all living things. It too is severely
limited in the amount of DNA it con handle at one time. But the task of
deciphering chromosomes that are 5 million genes long would be o bummer
without it. The two machines work as a pair. Both together would fit onto a
kitchen countertop. These units by themselves are not enough to do
biotechnology research. <ent type='ORG'>Sundry</ent> other hi-tech items, as well as low-tech ones
like incubators, cold rooms and basic labware, are essential. But these two
systems ore the heart of the hard work; they automate what was tedious and
unpredictable toil just a few years ago. I'd guess that true basement
biotechnology is still at least a decade away, if only because of the price
$50000 for each of these machines alone)<ent type='ORG'>aond</ent> the expertise Ph.0) needed to
get them going. -<ent type='ORG'>Kevin Kelly Information</ent> from: <ent type='ORG'>Applied Biosystems</ent>, inc.,
850 Lincoln Center Drive, <ent type='GPE'>Foster City</ent>, CA 94404.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,184 @@
<xml><p>
-------------------------------------------------------------------------------
BLUEPRINT FOR U.S. DICTATORSHIP PLACES INDIVIDUAL RIGHTS AT RISK</p>
<p> By Mike Blair
Exclusive to The SPOTLIGHT</p>
<p><ent type='GPE'>Washington</ent>, DC -- During the <ent type='LOC'>Persian Gulf</ent> war and the military buildup
leading to it, President George Bush began using the term "New World
Order," often suggesting that the commitment of so-called multinational
forces involved in the military effort was the beginning of this alleged
worldwide utopia.</p>
<p> Supposedly using the vehicle of the <ent type='ORG'>United Nations</ent>, Bush's New World
Order would be the arbitrator of all world problems and the apparatus to
enforce globalist dictates through the use of armed forces combined from
the armies of member nations. The UN law would be, regardless of the
nationalist interests of individual countries, the final word.</p>
<p> Actually, even the mention of a New World Order would normally be
anathema to thinking <ent type='NORP'>Americans</ent> and, in particular, conservative political
leaders and civil libertarians.</p>
<p> SINISTER TECHNOLOGY</p>
<p> It is also surprising to many critics of the move toward one-world
government that Bush would even dare choose the term "New World Order" to
define his globalist schemes. However, most <ent type='NORP'>Americans</ent> alive today were
born after World War II, when propaganda of the so-called <ent type='ORG'>Allied</ent> powers
used the terms of "<ent type='ORG'>New Order</ent>" or "New World Order" to describe in a
sinister way the military efforts of <ent type='GPE'>Japan</ent> and, in particular, <ent type='GPE'>Germany</ent>
under Adolf Hitler.</p>
<p> Few, it seems, have taken the time to analyze just what Bush has in
mind for his New World Order, of which <ent type='GPE'>America</ent> is to become an integral
part, starting with supplying about 90 percent of the muscle, and young
lives, that tackled and defeated <ent type='NORP'>Iraqi</ent> strongman Saddam Hussein's <ent type='NORP'>Arab</ent>
legions.</p>
<p> However, patriotic Constitutional scholars know that Bush's New World
Order is the worst attack ever on <ent type='GPE'>America</ent> as a sovereign, independent and
free nation.</p>
<p> BEGAN WITH WILSON</p>
<p> Efforts to form a global government are certainly nothing new.
<ent type='GPE'>America</ent>n political leaders, who were concerned with <ent type='GPE'>America</ent> first, were
able to overcome the internationalist, one-world government machinations of
President Woodrow <ent type='ORG'>Wilson</ent> following World War I. <ent type='ORG'>Wilson</ent> was prevented from
realizing his visions of a New World Order, through <ent type='ORG'>the League</ent> of Nations,
by a powerful <ent type='ORG'>Senate</ent> opposition, which refused to rubber-stamp for <ent type='ORG'>Wilson</ent>
U.S. membership in the world body.</p>
<p> A few decades later, however, President Franklin Delano Roosevelt,
near the end of World War II, was able to get his one-world plans under way
by laying the groundwork for today's <ent type='ORG'>United Nations</ent>, which was completed
under his successor, Harry S. Truman.</p>
<p> A few years later, that membership in an UN-mandated war in <ent type='GPE'>Korea</ent> cost
<ent type='GPE'>America</ent> 35000 young lives.</p>
<p> The problem that one-worlders have always encountered, of course, is
the U.S. Constitution, which has stood as a bulwark against any globalist
schemes.</p>
<p> Nevertheless, <ent type='GPE'>America</ent>n presidents since Roosevelt have insidiously
chipped away at the great powers of the people, written into the
Constitution by <ent type='GPE'>America</ent>'s immortal Founding Fathers, with the use of so-
called executive orders.</p>
<p> CAUSE FOR ALARM</p>
<p> <ent type='NORP'>Americans</ent> should be deeply alarmed that those presidents have signed a
series of executive orders (<ent type='ORG'>EOs</ent>) which, under the guise of any national
emergency declared by the president serving at the time, can virtually
suspend the Constitution and convert the nation into a virtual
dictatorship. Dissent, peaceful or otherwise, is eliminated.</p>
<p> Those backing efforts to circumvent the Constitution may have gotten
the idea from President Abraham <ent type='ORG'>Lincoln</ent>, whose use of various extraordinary
powers of his office -- which many Constitutional scholars still insist was
illegal -- suspended various civil rights to curb such problems as draft
riots during the Civil War.</p>
<p> In 1862, <ent type='ORG'>Congress</ent> enacted the Enrollment Act to allow the drafting of
young men for <ent type='ORG'>the Union Army</ent>. The act was rife with inequities, such as
the provision which allowed a man to pay $300 or hire a substitute to take
his place. This hated "Rich Man's Exemption," as it was called, angered
the average <ent type='GPE'>America</ent>n of military age and in particular young <ent type='NORP'>Irish</ent>
immigrants in <ent type='GPE'>New York City</ent>.</p>
<p> A riot erupted in <ent type='GPE'>New York</ent> in 1863, and it resulted in <ent type='ORG'>Lincoln</ent> using
some extraordinary powers of his office to keep the <ent type='ORG'>Union</ent> from falling
apart from within.</p>
<p> But over the years, presidents have used these powers for purposes
never intended by the Founding Fathers.</p>
<p> INDIANS VICTIMIZED</p>
<p> President John Tyler used such powers in 1842 to round up Seminole
<ent type='NORP'>Indians</ent> in <ent type='GPE'>Georgia</ent> and <ent type='GPE'>Florida</ent> and force-march them -- men, women and
children -- to <ent type='GPE'>Arkansas</ent>. This was probably the first use of internment in
<ent type='GPE'>America</ent> to deal with unpopular minorities. It was not the last.</p>
<p> In 1886, the Geronimo Chiricahua Apache <ent type='NORP'>Indians</ent> surrendered to U.S.
troops in the West, were rounded up by order of President Grover Cleveland,
and shipped to internment in <ent type='GPE'>Florida</ent> and <ent type='GPE'>Alabama</ent>.</p>
<p> Earlier, during the War Between the States, <ent type='ORG'>Sioux</ent> <ent type='NORP'>Indians</ent> in
<ent type='GPE'>Minnesota</ent>, when there was a delay in paying them their yearly allowance,
began attacking nearby white settlements. <ent type='ORG'>Lincoln</ent> sent in a hastily raised
force of volunteers under Col. H. H. Sibley. Little Crow, leader of the
<ent type='ORG'>Kaposia</ent> band, was decisively defeated by the <ent type='ORG'>Union</ent> troops on September 23,
1862, and more than 2000 <ent type='ORG'>Sioux</ent> were taken captive, although Little Crow
himself and a few followers escaped.</p>
<p> Through the process of a military tribunal, sanctioned by <ent type='ORG'>Lincoln</ent>, 36
<ent type='ORG'>Sioux</ent> leaders were publicly hanged. Whether the <ent type='ORG'>Sioux</ent> executed were
innocent or guilty was apparently immaterial. The revolt was quelled, and
the <ent type='GPE'>Minnesota</ent> <ent type='ORG'>Sioux</ent> were all moved to reservations in <ent type='GPE'>Dakota</ent>.</p>
<p> These instances of the nation's executive branch taking extraordinary
measures to confine, or intern, <ent type='GPE'>America</ent>n <ent type='NORP'>Indians</ent> are just a few of many
examples.</p>
<p> More recent examples of interning minorities by executive order
occurred during World War I and World War II.</p>
<p> During World War I, an unknown number of <ent type='NORP'>German</ent>-<ent type='NORP'>Americans</ent> were rounded
up by federal authorities and interned until after the war. In addition,
regardless of the First Amendment of the Constitution, which guarantees
freedom of speech and of the press. <ent type='NORP'>German</ent>-language newspapers, published
within <ent type='NORP'>German</ent>-<ent type='GPE'>America</ent>n communities in <ent type='GPE'>the United States</ent>, were banned.</p>
<p> WW II INTERNMENTS</p>
<p> After the <ent type='GPE'>Japan</ent>ese attack on <ent type='LOC'>Pearl Harbor</ent> on December 7, 1941, within
days the <ent type='ORG'>FBI</ent> rounded up tens of thousands of <ent type='GPE'>Japan</ent>ese-<ent type='NORP'>Americans</ent>, guilty
only of being of <ent type='GPE'>Japan</ent>ese ancestry, under the authority of an executive
order issued by President Franklin Delano Roosevelt. The lists of those to
be apprehended had been drawn up months earlier, before the war.</p>
<p> Held in concentration camps, the perimeters guarded by U.S. soldiers
armed with machine guns, the mostly innocent and patriotic <ent type='GPE'>Japan</ent>ese-
<ent type='NORP'>Americans</ent> were not released until after the war.</p>
<p> <ent type='ORG'>Congress</ent> has recently passed legislation extending the nation's
apologies to the <ent type='GPE'>Japan</ent>ese-<ent type='NORP'>Americans</ent> and extending them compensation for
their years of confinement.</p>
<p> However, no apology or compensation has ever been extended to the more
than 8000 <ent type='NORP'>German</ent>-<ent type='NORP'>Americans</ent> who were confined in dozens of jails and camps
across <ent type='GPE'>the United States</ent>, also by order of Roosevelt.</p>
<p> Many were not released until 1947, a full two years after the end of
the war, in total violation of the Geneva Conventions.</p>
<p> "What happened to me and thousands of others is old history," said
Eberhard Fuhr of <ent type='GPE'>Cincinnati</ent>, who was interned at 17 years of age, "but the
next time it could be any other group, which is then not politically
correct, or out of favor for any other reason (SPOTLIGHT, May 20, 1991).</p>
<p> Fuhr's warning, of course, had already been proved correct just
several months earlier when, under orders of Bush, the <ent type='ORG'>FBI</ent> hounded
thousands of innocent <ent type='NORP'>Arab</ent>-<ent type='NORP'>Americans</ent> as the U.S. prepared for the Persian
Gulf conflict.</p>
<p> Only the efforts of a handful of irate U.S. <ent type='ORG'>Congress</ent>men halted the
harassment but not until after a number of U.S. military bases were
selected as sites of internment camps for <ent type='NORP'>Arab</ent>-<ent type='NORP'>Americans</ent> and war
dissenters.</p>
<div>-----------------</div>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
<ent type='GPE'>Washington</ent>, DC 20003
</p></xml>

View File

@ -0,0 +1,100 @@
<xml><p>
-------------------------------------------------------------------------------
<ent type='ORG'>DICTATORSHIP</ent> POSSIBLE HERE</p>
<p> By Lawrence Wilmot and Martin Mann
Exclusive to The SPOTLIGHT</p>
<p><ent type='GPE'>Washington</ent>, DC -- Hidden in the bureaucratic maze <ent type='GPE'>Washington</ent> politicians
call "our Constitutional system of government," a little-known federal
agency is quietly making plans to turn <ent type='GPE'>the United States</ent> into a
dictatorship.</p>
<p> There are "stacks of blueprints" in the top-secret safe of the Federal
Emergency Management Agency (<ent type='ORG'>FEMA</ent>) designed to convert <ent type='NORP'>American</ent> society
into a "command system," a former deputy administrator of the agency has
told The SPOTLIGHT's investigative team.</p>
<p> In a private interview, allowing him to remain anonymous, this highly
placed source confirmed that the procedures developed by <ent type='ORG'>FEMA</ent> to "suspend"
the Constitution and to round up thousands of dissenters nationwide can be
activated by a simple phone call from <ent type='ORG'>the White House</ent>.</p>
<p> "Even people who have become aware of <ent type='ORG'>FEMA</ent>'s existence and know
something about its activities -- not many do -- think the word `Emergency'
in its designation means it will go into action only in case of a natural
disaster or perhaps a surprise nuclear attack," related this expert.</p>
<p> "In reality, however, this outfit can be mobilized whenever the
politicians occupying <ent type='ORG'>the White House</ent> decide they need special -- and
extra-Constitutional -- powers to impose their will on the nation."</p>
<p> As <ent type='ORG'>Liberty Lobby</ent> first revealed, <ent type='ORG'>FEMA</ent>'s bureaucrats can then proceed
to:</p>
<p> * Take over all farms, ranches or timberland in order to "utilize them
more effectively" as decreed in <ent type='ORG'>Executive Order</ent> (EO) 11490, the so-
called omnibus emergency preparedness decree promulgated by President
Richard Nixon on October 28, 1969.</p>
<p> * Seize all sources of public power: electric, nuclear, petroleum, etc.</p>
<p> * Freeze all wages, prices and bank accounts.</p>
<p> * Take over all communications media.</p>
<p> A FORCE OF FACELESS FEDS</p>
<p> Such totalitarian measures can be imposed by bureaucrats under <ent type='ORG'>FEMA</ent>'s
direction, not just in the face of a cataclysmic upheaval, but "[<ent type='ORG'>w]henever</ent>
necessary for assuring the continuity of the federal government in any
national emergency type situation," decreed a subsequent <ent type='ORG'>White House</ent> ukase,
EO 11921, issued by President Gerald Ford in April 1976.</p>
<p> Can such a blueprint for tyranny be clamped on <ent type='GPE'>the United States</ent> by a
force of faceless federal officials? It is the role of <ent type='ORG'>FEMA</ent> has been
preparing for most intensively, says the former high agency administrator.</p>
<p> "In recent years, despite talk of spending cuts, <ent type='ORG'>FEMA</ent>'s budget has
been steadily increasing," revealed this knowledgeable source. "It now
stands at somewhere around $3 billion annually. I say `somewhere' because
part of this agency's funding is appropriated under so-called black
programs, submitted to <ent type='ORG'>Congress</ent> with the defense budget without an
explanation of its purpose, aping the secret <ent type='ORG'>CIA</ent> appropriation."</p>
<p> <ent type='ORG'>FEMA</ent> can draw on the defense budget and on the protection of the
secrecy reserved for national security projects because it came into being
under President Jimmy Carter in a move that merged the civil defense and
disaster relief responsibilities formerly shared by the <ent type='ORG'>Pentagon</ent>, the
Commerce Department and <ent type='ORG'>the General Services Administration</ent> under a single
powerful agency.</p>
<p> WHAT'S <ent type='ORG'>FEMA</ent> REALLY UP TO?</p>
<p> But <ent type='ORG'>FEMA</ent>'s real focus is not on disaster relief, knowledgeable sources
say. An investigation of this little-known agency, conducted earlier this
year by <ent type='ORG'>the General Accounting Office</ent> (<ent type='ORG'>GAO</ent>), the congressional watchdog
unit, has found that less than 10 percent of <ent type='ORG'>FEMA</ent>'s staff -- 230
bureaucrats out of an estimated 2600 -- are assigned full-time to
preparing for and dealing with major natural disasters such as storms or
earthquakes.</p>
<p> What, then, is <ent type='ORG'>FEMA</ent> really up to? The SPOTLIGHT's investigative team
has obtained an advance copy of the <ent type='ORG'>GAO</ent> report on this secretive agency.</p>
<p> The study's surprising findings have been reviewed with the help of
well-placed confidential sources, in order to bring into full view, for the
first time, the federal bureaucracy's secret blueprint for tyranny in
<ent type='GPE'>America</ent>.</p>
<div>-----------------</div>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
<ent type='GPE'>Washington</ent>, DC 20003</p>
</xml>

View File

@ -0,0 +1,65 @@
<xml>
<p> (word processor parameters LM=8, RM=75, TM=2, BM=2)
Taken from KeelyNet BBS (214) 324-3501
Sponsored by <ent type='ORG'>Vangard Sciences</ent>
PO BOX 1031
<ent type='GPE'>Mesquite</ent>, TX 75150</p>
<p> October 17, 1990</p>
<p> listed on KeelyNet as FOOD1.ZIP
--------------------------------------------------------------------
<ent type='ORG'>FBI License Plate</ent> Codes</p>
<p> Somewhere in the vicinity of 2500 <ent type='NORP'>Soviet</ent> and Eastern European
officials live in <ent type='GPE'>the United States</ent> at any given time. The U.S.
State Department estimates that 30% to 40% of them are spies.</p>
<p> This comes to about 900 working spies in the diplomatic corps.</p>
<p> It is a very difficult job to keep track of the comings and goings
of these "diplomats", so the government has developed coded
diplomatic license plates.</p>
<p> The code applies ONLY to diplomatic plates which are conspicuously
red, white and blue with the word DIPLOMAT printed at the top.</p>
<p> All diplomatic licenses have a D. The other two letters indicate
the nation. SX for example, indicates that the car carries diplomats
from the <ent type='NORP'>Soviet</ent> Union.</p>
<p> <ent type='ORG'>FBI</ent> counter-intelligence agents are given wallet-sized cards listing
the codes for eighteen "problem" nations.</p>
<p> These nations are identified by the following codes :</p>
<p> <ent type='GPE'>Albania</ent> CP <ent type='GPE'>Libya</ent> FM
<ent type='GPE'>Bulgaria</ent> OM <ent type='GPE'>Nicaragua</ent> QU
<ent type='GPE'>China</ent> CY <ent type='GPE'>North Korea</ent> GQ
<ent type='GPE'>Cuba</ent> DC <ent type='GPE'>Poland</ent> QW
Czechoslavakia PH Romania ND
East <ent type='GPE'>Germany</ent> TJ South Africa FY
<ent type='GPE'>Hungary</ent> KH <ent type='NORP'>Soviet</ent> Union SX
<ent type='GPE'>Iran</ent> DM <ent type='GPE'>Syria</ent> AQ
<ent type='GPE'>Iraq</ent> TS Vietnam LD</p>
<p> The <ent type='ORG'>Washington Post</ent> published the code against the wishes of the
State Department. They feared <ent type='ORG'>RAMBO</ent> types might attack diplomatic
vehicles of countries they did not like.
--------------------------------------------------------------------</p>
<p> If you have comments or other information relating to such topics as
this paper covers, please upload to KeelyNet or send to the Vangard
Sciences address as listed on the first page. Thank you for your
consideration, interest and support.</p>
<p> Jerry W. Decker...Ron Barker.....Chuck Henderson
<ent type='ORG'>Vangard Sciences</ent>/KeelyNet</p>
<p> --------------------------------------------------------------------
If we can be of service, you may contact
Jerry at (214) 324-8741 or Ron at (214) 242-9346
--------------------------------------------------------------------</p>
</xml>

View File

@ -0,0 +1,390 @@
<xml><p>Carolee Boyles-SprenkelAbout 2650 words
Route 3, Box 2180Copyright 1989
<ent type='GPE'>Quincy</ent>, FL 32351Carolee Boyles-Sprenkel
(904) 627-2254Second Serial Rights</p>
<p> WILD DISEASES
By
Carolee Boyles-Sprenkel</p>
<p>A few days after Patsy M. returned home from a trip to
<ent type='GPE'>Hawaii</ent>, she came down with what she thought was intestinal flu.
After a week of nausea and vile-smelling diarrhea she went to her
doctor. He couldn't find anything wrong with her and put her on
a liquid diet. Two weeks and ten pounds later she was becoming
anemic. </p>
<p>Three stool samples, a sigmoidoscopy and a proctoscopy could
not establish the cause of her illness. Finally she mentioned
her symptoms to a colleague at work who recognized them as
something he'd heard of before. A little research turned up
information on an organism that parasitizes the human digestive
tract, Giardia. After only 24 hours on the antibiotic Flagyl,
Patsy knew she'd solved the problem. She recovered without
further incident.</p>
<p>Patsy was only one of a number of people who bring back more
from their outdoor experiences that they bargain for. Any time
we go into the woods, we run the risk of encountering illnesses
and discomforts our urban neighbors don't ever run into. Few
physicians even think about testing for these "exotic" diseases.
Untreated, some will run their course in a few days or a few
weeks. But not all are so benign. </p>
<p>According to epidemiologist Dr. Lisa Conti, doctors term
these diseases "zoonotic." That means they're caused by
organisms that infect both animals and humans. Though most
affect humans only rarely, a few are relatively common. </p>
<p>This is definitely not a case of "what you don't know won't
hurt you." What you don't know about some of these ailments
will, in some cases, kill you. </p>
<p> <ent type='ORG'>Lyme Disease</ent></p>
<p><ent type='ORG'>Lyme Disease</ent> may be the most visible of the little shop of
horrors found in the woods. Unlike some other diseases, <ent type='ORG'>Lyme</ent>
Disease is not rare. Dr. Robert <ent type='ORG'>Craven</ent>, a Centers for Disease
Control researcher studying <ent type='ORG'>Lyme</ent>, says doctors reported more than
2400 cases during 1988. He believes it's spreading throughout
the country.</p>
<p>A bacterium carried by deer mice and deer causes <ent type='ORG'>Lyme</ent>
Disease. Ixodid ticks can pass the organism from infected
animals to people.</p>
<p>The first symptom of the disease is a little red area where
the tick attached itself to you. The spot grows. Then fever,
headache, and muscle aches start. The spot increases in size
until it become a red ring several inches across with a light-
colored center. "It's kind of like a bull's-eye," says <ent type='ORG'>Craven</ent>. </p>
<p>If you don't get treatment, the effects can be severe. "It
can eventually cause cardiac problems, usually rhythm
disturbances," <ent type='ORG'>Craven</ent> says. "It can cause arthritis, which can
be fairly severe and debilitating. It can cause a whole host of
neurologic problems - encephalitis, meningitis type problems,
paralyses, that sort of thing."</p>
<p><ent type='ORG'>Lyme Disease</ent> is easy to treat with antibiotics. According
to <ent type='ORG'>Craven</ent>, researchers are trying to produce a vaccine, but none
is available at this time.</p>
<p> <ent type='LOC'>Rocky Mountain Spotted</ent> Fever</p>
<p>Another bacterium transmitted exclusively by tick bites is
<ent type='LOC'>Rocky Mountain Spotted</ent> Fever. Infected ticks can pass the
organism from generation to generation without feeding on a sick
animal. </p>
<p>According to Dr. Michael Wilder, a state public health
clinician, the first symptoms are fever, cramping stomach pain
and rash. "Stomach-ache seems to be a common early symptom," he
says. "There may be some vomiting, but no diarrhea." The rash
looks like measles but it appears on the wrists and palms of the
hand, which measles rarely does.</p>
<p>Antibiotics will cure <ent type='LOC'>Rocky Mountain Spotted</ent> Fever. Of the
patients who are not treated, though, a few die from either shock
or hemorrhaging.
Encephalitis</p>
<p>Several different types of encephalitis cause problems from
time to time. St. Louis Encephalitis follows a 10-year cycle in
the <ent type='GPE'>Mississippi Valley</ent>, according to <ent type='ORG'>Craven</ent>. <ent type='ORG'>Eastern Equine</ent>
Encephalitis and <ent type='ORG'>Western Equine</ent> Encephalitis appear in small
scattered outbreaks each summer.</p>
<p>Birds carry the viruses that cause encephalitis, which
mosquitoes spread from the birds to humans and other mammals.
Early symptoms include confusion and fever. Some varieties of
the ailment cause nausea and vomiting. Then, <ent type='ORG'>Craven</ent> says,
convulsions, coma, and other neurologic involvement may occur.</p>
<p>"<ent type='ORG'>Eastern Equine</ent> is a particularly virulent form of
encephalitis in humans," he says. "It frequently kills, and the
people who do survive are usually brain damaged to a greater or
lesser degree for life."</p>
<p>Antibiotics are useless against encephalitis, he says.
Researchers have developed a vaccine against both <ent type='ORG'>Eastern</ent> and
<ent type='ORG'>Western Equine</ent>, but officials recommend using it only during
epidemic conditions.
Tularemia</p>
<p>According to Dr. Thomas Quan with the <ent type='ORG'>CDC</ent>'s <ent type='ORG'>Fort Collins</ent>,
<ent type='GPE'>Colorado</ent> unit, most people acquire tularemia infections from
rabbits and hares, and the ticks associated with them. He says
people can pick up the versatile organism in a number of ways.</p>
<p>"Most human cases occur through the bite of a tick or
through direct contact with rabbits that are infected," he says.
"There are other modes of infection, such as deer fly bites and
mosquito bites." Sheep-shearers have acquired it from working
with infected sheep in <ent type='GPE'>Colorado</ent>. Some people have become ill
from drinking contaminated water. Farm workers can inhale the
organism from hay dust.</p>
<p>Early symptoms are fairly vague. You'll develop a bit of a
fever, and generally not feel too good. If you've inhaled the
organism, you'll have respiratory symptoms; if you've swallowed
it, you'll think you'll have intestinal flu. Swelling of the
armpits - called buboes - and other plague-like symptoms will
follow a tick bite or infection through a cut. For untreated
cases, the fatality rate is about 5 to 7 per cent. With
antibiotic treatment, patients can expect complete recovery.
"The people who get sick with it wish they'd die, but they
usually don't," Quan says. "But eventually they overcome it."
Giardia</p>
<p><ent type='ORG'>CDC</ent> worker Dr. David Addiss says the biggest source of
Giardia is contaminated water. Biologists have found the
organism from many streams and rivers. "It's found fairly
commonly throughout <ent type='GPE'>the United States</ent> in untreated surface
water," he says. "You don't find it very much in wells or big
lakes, but you do see it in streams."</p>
<p>A number of different animals, especially beavers, may carry
the protozoan that causes the illness. Symptoms include loose
stools or full-blown diarrhea, cramping, gas and burping, and
rarely nausea and vomiting. The disease may be more chronic than
acute. Giardia attaches itself to the wall of the small
intestine, where it lives and reproduces. Untreated, the ailment
may go away on its own. In many people, through, the infection
persists until it's treated with a course of antibiotic. </p>
<p>Don't rely on iodine or chlorine tablets to treat stream
water. They may work if the water is warm and only contains a
few Giardia cysts. But in cold or heavily infested water,
they're not particularly effective.</p>
<p> Relapsing Fever</p>
<p><ent type='ORG'>Craven</ent> also works with relapsing fever another tick-borne
disease related to <ent type='ORG'>Lyme Disease</ent>. He says it's fairly rare in the
<ent type='GPE'>United States</ent>. </p>
<p>The last big epidemic of Relapsing Fever occurred in the
Grand <ent type='LOC'>Canyon</ent> in the 1970s, and was related to squirrels nesting
in cabins where <ent type='LOC'>Canyon</ent> staff people were living. Generally,
though, the cases are fairly scattered.</p>
<p>The disease produces flu-like symptoms, including fever and
muscle aches. If it's not treated, the symptoms subside, and
patients think they're well. Then it comes back. This cycle
continues until the disease is treated. Fortunately, it doesn't
seem to produce any serious long-term effects like <ent type='ORG'>Lyme Disease</ent>
does.</p>
<p> Brucellosis</p>
<p>Unless you hunt wild hogs in the southeastern <ent type='GPE'>United States</ent>,
brucellosis is one problem you probably don't need to worry
about. This is not to say the disease isn't found in other
species; biologists have reported it in desert rats and other
rodents, hares, foxes, goats, sheep, deer, elk and bison, and
even dogs and cats. But Dr. Arnold <ent type='ORG'>Kaufmann</ent>, a physician with
the <ent type='ORG'>CDC</ent> in <ent type='GPE'>Atlanta</ent>, says he's never heard of hunters contracting
brucellosis from any animal except hogs. </p>
<p>The organisms which cause brucellosis are a group of
bacteria that live in the blood, bone marrow and lymphatic
system, including the liver and spleen. You can become infected
in a couple of ways. If you clean a hog without wearing gloves,
bacteria can enter through small cuts and scratches on your
hands. As you cut into the carcass of the animal a number of the
organisms are released into the air, where you can inhale them.</p>
<p>Heat kills the bacteria, so you're not at risk if you eat
well-cooked meat from a sick animal. In fact, when domestic
animals such as cattle are found to have brucellosis, one cure is
to send the animals to the slaughterhouse.</p>
<p>In humans, brucellosis is a vague sort of illness, according
to <ent type='ORG'>Kaufmann</ent>. It causes headache, fever, and exhaustion. You may
have achy joints and in general feel like you have a severe case
of the flu.</p>
<p>"It goes on and on and doesn't go away," says <ent type='ORG'>Kaufmann</ent>.
"It's a very complex disease. It can involved a variety of
organs." Untreated, most patients eventually recover; for a few,
though, it continues as a chronic illness. Treatment is simply a
course of antibiotics.</p>
<p> Q Fever</p>
<p>Q or Query Fever may be under reported, according to <ent type='ORG'>CDC</ent>
microbiologist Russell <ent type='ORG'>Regnery</ent>. As a result, the <ent type='ORG'>CDC</ent> doesn't
have any good data on how many cases occur in this country each
year.</p>
<p>"I think it's an important disease, but one for which very
little data can be found," says <ent type='ORG'>Regnery</ent>. In his opinion,
hunters and fishermen in sheep country need to be aware of the
disease as a potential long-shot ailment. "If, for example, you
were to shoot a sheep that had Q Fever and you butchered it out,
especially if that animal is a pregnant female, you would really
be asking for the possibility of exposure," <ent type='ORG'>Regnery</ent> says. The
organism reaches its highest concentration in amniotic fluid and
fetal tissues.</p>
<p>The agent is a specialized bacterium. It can infect humans
through cuts on the hand, but it's very infectious if inhaled.
As a result, clothes and other items can become contaminated by
the organism. </p>
<p>Symptoms include headache and fever, plus muscle pain.
Pregnant women may suffer complications. Untreated, the disease
usually resolves itself after a few days or a few weeks. A few
people, though, develop Q Fever endocarditis, or inflammation of
the heart. This can be a chronic problem, hard to treat, and
sometimes leading to death. Q-fever has been associated with
rabbit hunting in <ent type='GPE'>Canada</ent>.
Rabies</p>
<p>Despite modern vaccinations, rabies is still a potential
threat. Unlike most of the other diseases you can acquire in the
woods, rabies has no treatment - if you get it, you die. It's
that simple.</p>
<p>"Any warm-blooded animal can get rabies," says Wilder. "But
certain animals seem to play a more important role as a
reservoir. The main ones throughout most of the country are
insectivorous bats, skunks, foxes, and of course raccoons." Even
deer and antelope can become infected if a rabid animal bites
them.</p>
<p>You're only at a slight risk to pick up rabies if you dress
an infected deer or other ungulate without gloves on.
Theoretically, though, it's possible for you to get it,
especially if you skin out the head and get saliva on your hands.</p>
<p>Direct contact is not the only way you can acquire rabies.
In rare cases, spelunkers have become infected from inhaling the
virus in bat caves. </p>
<p>If you're bitten by a rabid animal, the first symptom of the
disease is what Wilder terms "an unusual sensation" at the site
of the bite. "It's an increased sensitivity, a feeling of
prickliness, just an odd sensation arising from the healing
wound." A fever and stiffening of the neck follow. Then you'll
have convulsions. You'll salivate because you're unable to
swallow. Death will follow in of days or weeks.</p>
<p>A post-exposure vaccine for people has been available for
many years. Recently, scientists have developed a pre-exposure
vaccine. Wilder says whether or not you need to get vaccinated
depends on what you're hunting. Most people don't need to worry
about it. But if you're a woodchuck or raccoon hunter, he
recommends it. At a cost of about $100, it's cheap insurance.</p>
<p>Wilder also stresses that hunters need to have their dogs
vaccinated against the disease. Some raccoon hunters in
particular fear the inoculation will affect the dogs' ability to
hunt, and so don't have them vaccinated. </p>
<p>Don't do the vaccination yourself. In <ent type='GPE'>Florida</ent> and perhaps a
few other state, rabies vaccine is available over the counter at
feed stores. "We've been most fortunate that no identified cases
of rabies have occurred from this practice," Wilder says.</p>
<p> Plague
Remember the bubonic plague, the disease that decimated
<ent type='LOC'>Europe</ent> in the Middle Ages? It's still with us in the western US. </p>
<p>Any rodent in the west can harbor the plague organism.
"Most people in <ent type='GPE'>the United States</ent> who acquire plague are getting
it from ground squirrels," Quan says. "On the west coast, it's
the California Ground Squirrel. In <ent type='LOC'>the Rocky Mountains</ent> it's the
Rock Squirrel. Then you have other smaller squirrels and
chipmunks." Even if you don't have direct contact with rodents,
you're still not immune. Your dog and cat may catch a squirrel,
pick up the fleas carrying the organism, and bring it home to
you.</p>
<p>Plague is transmitted to humans through flea bites. Early
symptoms are similar to those of tularemia: high fever, muscle
aches, fatigue. You'll have pain, sometimes quite severe, in the
area where the buboes, or swollen lymph glands, are going to
develop. </p>
<p>Untreated, plague kills. The organism produces toxins that
cause problems with blood clotting, and eventually gangrene.
Fifty-five to sixty per cent of patients die. Even treated,
plaque kills 15 to 20 per cent of patients. </p>
<p>As dreadful as plague is, it's easily treated. A variety of
antibiotics, including <ent type='ORG'>Tetracycline</ent> and sulfa drugs, will knock
it out. </p>
<p>"People who see a physician early on after symptoms, and who
have the savvy to know they were possibly exposed tend to
survive," Quan says. "A large percentage of those who die have
septicemic plague, which does not have a bubo." These cases look
like a lot of other diseases, are hard to diagnose, and as a
result often don't get treated early enough.</p>
<p>Fortunately, plague is rare. Quan says in 1983 doctors
reported a high of 40 cases, but in general the number is 10 to
20. This compares to 200-plus for tularemia each year.</p>
<p> Prevention</p>
<p>Most members of this hall of villains are easy to prevent
with little effort. First, don't drink untreated water. Carry
water or soft drinks with you. </p>
<p>Second, any time you dress game, don't do it bare-handed;
wear gloves. "If you don't wear gloves, you're really taking
your chances," Quan says. </p>
<p>Third, avoid contact with mosquitoes, ticks and fleas.
"Most of these things can be prevented with repellents," <ent type='ORG'>Craven</ent>
says. He notes especially Permanone, a permethrin compound that
is both an insecticide and a repellent useful for ticks. </p>
<p>If, after being in the woods, you begin to show symptoms
like any of the ones described here, go straight to the doctor.
Don't wait to see if you get better on your own. And be sure you
tell him or her what you suspect.</p>
<p>"Be sure you tell the physician you had the contact," Quan
says. "It's one way we have of making an early, proper
diagnosis. Tell the doctor you had contact with such-and-such an
animal. Then the physician is at least alerted that tularemia is
as possibility, or in the western states, plague." </p>
<p>These are only some of the weird and exotic diseases you may
encounter on a hunting or fishing trip. Others include
Leptospirosis, <ent type='ORG'>Anthrax</ent>, and a variety of fungal organisms. But
by following some common-sense preventive techniques, you can
avoid bringing home these unwanted freeloaders from the woods.</p>
<p> -End-
</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,215 @@
<xml><p>
VIOLATION OF LAW OF CONSERVATION OF CHARGE
IN SPACE POWER GENERATION PHENOMENON</p>
<p> By</p>
<p> PARAMAHAMSA TEWARI
Chief Project Engineer
Kaiga Project
NUCLEAR POWER CORPORATION
Karwar
INDIA</p>
<p> INTRODUCTION:</p>
<p> It has been hitherto believed in physics that the total electric
charge in the <ent type='ORG'>Universe</ent> is a constant quantity, and if additional
charge appears in some region, it is only at the expense of the
charge deficit in some other regions.</p>
<p> It is a basic law that electric charge is conserved and cannot be
destroyed or created. Precise experiments on a Space Power
Generator (<ent type='ORG'>SPG</ent>) which has been now further developed to demonstrate
the commercial viability of the newly discovered phenomenon of space
power generation however, totally violate the existing law of
conservation of charge, by generating output electrical power much
in excess of the input electrical power.</p>
<p> Since electric charge is a form of basic energy, the law of
conservation of energy will need to be enlarged to incorporate in it
the dynamics of absolute vacuum [1] which in a state of rotation
generates fundamental field to produce electrical charge and energy.</p>
<p> DESCRIPTION OF THE <ent type='ORG'>SPG</ent>:</p>
<p> The <ent type='ORG'>SPG</ent> shown in Fig. 1 is a further developed form of the machines
described [23] in earlier issues of this magazine.</p>
<p> A non-magnetic shaft interconnects two mild steel rotors on which
two electromagnets are mounted. Electric power at 1.5 volt d-c and
high ampheres is drawn from each unit, with the help of copper-
graphite brushes when the machine runs at 2860 rpm directly coupled
and driven by an induction motor.</p>
<p> The power is drawn between the inner rotor's cylindrical surface and
the shaft through d-c shunts that enable measurements of high d-c
current.</p>
<p> The <ent type='ORG'>SPG</ent> weighs about 150 Kg. and is fabricated out of 120 mm thick
mild steel plate. The two units enable generation of power at more
than 3 volt d-c by appropriate series connections between the two
coils. The electromagnet's coils are 16 swg super enamelled wire
with 216 turns in each coil.</p>
<p> The feature that brings improvements [4] in this machine is the
larger diameter of the rotors that produces higher d-c voltage at
comparatively lower speed, not exceeding 3000 rpm. Also the twin
units with single coil in each unit double the amount of power.</p>
<p> TEST RESULTS:</p>
<p> The drive motor (DM) takes no-load current of 2.6 amperes (1300
watts) to rotate itself and the <ent type='ORG'>SPG</ent> to overcome windage and friction
at 2870 rpm. The no-load voltage internally generated in each unit
of the <ent type='ORG'>SPG</ent> is adjusted to 1.5 volts d-c between the shaft and the
inner rotor by the control of the d-c excitation current in the two
electromagnet's coils connected in series.</p>
<p> The excitation current is 31 amperes, the total d-c resistance of
the two coils being 2.5 ohms. The power given to the electromagnets
is 31 x 31 x 2.5, that is, 2400 watts. The two shunts with
calibration of 2000 amperes for 75 mv are now connected across the
two output circuits.</p>
<p> The d-c currents measured in each circuit are almost equal to 2613
amperes corresponding to 98 mv reading of the shunt.</p>
<p> The output electrical power of each unit is 2613 x 1.5 watts, that
is, 3919 watts. Total electrical power from the two units is 7839
watts.</p>
<p> As the <ent type='ORG'>SPG</ent> is electrically loaded, the current of DM rises to 10
amperes, showing a rise of 7.4 amperes over the no-load current, and
corresponding to a rise in input electrical power of 3700 watts.</p>
<p> The load current of the DM of 10 amperes amounts to the total
electrical input to the DM of 5000 watts, out of which 1300 watts is
utilised to overcome the no-load losses.</p>
<p> The remaining electrical input of 3700 watts generates 7839 watts of
electrical output power, giving the efficiency of space power
generation in this particular as 211.8%.</p>
<p> Assuming electromagnetic efficiency of the DM as 80%, the efficiency
of the electrical energy generation of the <ent type='ORG'>SPG</ent> will rise to 264.75%.</p>
<p> If the excitation power of 2400 watts given to the <ent type='ORG'>SPG</ent> is deducted
from the total electrical output from the <ent type='ORG'>SPG</ent> of 7839 watts, the
balance electrical output of 5439 watts still exceeds the total
electrical input of 5000 watts by 439 watts, giving the total system
efficiency of 105.9% while, in addition the DM-<ent type='ORG'>SPG</ent> set runs as a
perpetual system drawing 1300 watts of power from space.</p>
<p> QUANTUM OF SPACE POWER:</p>
<p> The quantum of electrical charge produced due to the rotation of
space in a rotating electromagnet and the electrical power produced
when the power is withdrawn through an electric circuit, as
discussed in earlier article [2], is given by,</p>
<p> P = (1.8) LN(r^2)(10^-5)kW
(1)</p>
<p> where, P is power in kW, L is axial length of the <ent type='ORG'>SPG</ent> in centimeter,
N is revolution per second, and 'r' is the radius in centimeter of
the <ent type='ORG'>SPG</ent> on the inner rotor surface.</p>
<p> The derivation of the above relation was based on the assumption
that the radius of the spherical void at the centre of electron as
discussed in space vortex theory [12] is 1.5 x (10^-11) cm.</p>
<p> More precise measurements in space power generation experiments,
however show that the coefficient 1.8 in equation (1) should be 2.5,
and the void radius at electron's centre should be taken as 10^-11
cm. With these corrections the space power equation (1) now
becomes:</p>
<p> P = (2.5) LN(r^2)(10^-5)kW
(2)</p>
<p> substituting the values, L=12, N=47.6, and r=11.43 in (2),</p>
<p> P = 5.85 kW</p>
<p> Since there are two units of the <ent type='ORG'>SPG</ent> on the shaft, total power from
the two units will be 11.7 kW, which is 1.5 times the output power
drawn from the machine in the above test.</p>
<p> With additional brushes and reduced contacts at about 3000 rpm, the
above machine will have capacity to produce about 12 kW of power.</p>
<p> If the <ent type='ORG'>SPG</ent> is driven at 6000 rpm both the voltages and currents will
be doubled, producing 4 times output of 48 kW. Since the excitation
power remains constant, much higher total system efficiency is
expected though the efficiency of the <ent type='ORG'>SPG</ent> as computed above will
remain constant at 211.8%.</p>
<p> CONCLUSION:</p>
<p> Mass-energy equation of Einstein brought forth an universal law that
an electron like all matter contains in its structure energy. A
further enlargement of this law is that electron is itself energy,
where "energy" in physical terms is a state of vacuum in rotation.</p>
<p> Even at ordinary speed of rotation of an electromagnet, the inter-
atomic space of the iron core develops velocity fields of vacuum
that qualitatively act like additional charge within the rotating
system and liberate orbital electrons of the iron atoms.</p>
<p> With the interaction of the magnetic field the free electrons form
polarites [23].</p>
<p> It is possible to commercially develop a machine that can not only
rotate itself perpetually but also generate additional electrical
charge in kilowatts and higher range.</p>
<p> The law of conservation of charge and the law of conservation of
energy are applicable within the systems confined to material
interactions alone and not to the medium of space which is a dynamic
entity that can rotate and create charge at ordinary speeds, and can
rotate and create electrons at speed of light.</p>
<p> REFERENCES:</p>
<p> 1. Paramahamsa Tewari - "Beyond Matter", Printwell Publications,
<ent type='GPE'>Aligarh</ent>, <ent type='GPE'>India</ent> (1984).</p>
<p> 2. Paramahamsa Tewari - "Generation of Electrical Power from
Absolute Vacuum by High Speed Rotation of conducting Magnetic
Cylinder",
Magnets in Your Future, Vol. 1 No. 8, August 1986, P.O. Box 580,
<ent type='NORP'>Temecula</ent>, CA 92390, <ent type='GPE'>USA</ent>.</p>
<p> 3. Paramahamsa Tewari - "Interaction of Electron and <ent type='ORG'>Magnetic Field</ent>
in Space Power Generation Phenomenon", Magnets in Your Future,
Vol. 2 No. 12, December 1987, P.O. Box 580, <ent type='NORP'>Temecula</ent>, Ca. 92390,
<ent type='GPE'>USA</ent>.</p>
<p> 4. Report on the Initial Testing Phase of DePalma Energy
Corporation, N1 Electrical Power Generator, 6-1-1988 -
Bruce DePalma, DePalma Energy Corporation, 1060 <ent type='ORG'>Channel Drive</ent>,
<ent type='GPE'>Santa Barbara</ent>, <ent type='GPE'>California</ent>
93108, (805) 969-6442.</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,857 @@
<xml><p>
<ent type='ORG'>HOMOPOLAR</ent> "FREE-ENERGY" GENERATOR TEST</p>
<p> Robert Kincheloe
Professor of <ent type='ORG'>Electrical Engineering</ent> (Emeritus)
Stanford University</p>
<p> Paper presented at the 1986 meeting
of the
Society for Scientific Exploration
San Francisco</p>
<p> June 21, 1986
Revised February 1, 1987</p>
<div> --------------------------------------------------------------------</div>
<p> <ent type='ORG'>HOMOPOLAR</ent> "FREE-ENERGY" GENERATOR TEST
Robert Kincheloe</p>
<p> ABSTRACT</p>
<p> Known for over 150 years, the <ent type='ORG'>Faraday</ent> <ent type='ORG'>homopolar</ent> generator has
been claimed to provide a basis for so-called "free-energy"
generation, in that under certain conditions the extraction of
electrical output energy is not reflected as a corresponding
mechanical load to the driving source.</p>
<p> During 1985 I was invited to test such a machine. While it did
not perform as claimed, repeatable data showed anomalous
results that did not seem to conform to traditional theory.</p>
<p> In particular, under certain assumptions about internally
generated output voltage, the increase in input power when power
was extracted from the generator over that measured due to
frictional losses with the generator unexcited seemed to be
either about 13% or 20% of the maximum computed generated power,
depending on interpretation.</p>
<p> The paper briefly reviews the <ent type='ORG'>homopolar</ent> generator, describes the
tests on this particular machine, summarizes and presents
tentative conclusions from the resulting data.</p>
<p> THE SUNBURST <ent type='ORG'>HOMOPOLAR</ent> GENERATOR</p>
<p> In July, 1985, I became aware of and was invited to examine and
test a so-called free-energy generator known as <ent type='ORG'>the Sunburst</ent> N
Machine.</p>
<p> This device, shown in Figs 1a and 1b, was proposed by Bruce
DePalma and constructed by Charya Bernard of <ent type='ORG'>the Sunburst</ent>
Community in <ent type='GPE'>Santa Barbara</ent>, CA, about 1979.</p>
<p> The term "free-energy" refers to the claim by DePalma [1]
(and others [2]) that it was capable of producing electrical
output power that was not reflected as a mechanical load to the
driving mechanism but derived from presumed latent spatial
energy.</p>
<p> Apart from mechanical frictional and electrical losses inherent
in the particular construction, the technique employed was
claimed to provide a basis for constructing a generator which
could supply the energy to provide not only its own motive power
but also additional energy for external use. From August 1985
to April 1986 I made a series of measurements on this particular
machine to test these claims.</p>
<p> GENERATOR DESCRIPTION</p>
<p> Details of the generator construction are shown in Figs. 2 and 3.</p>
<p> It consists essentially of an electromagnet formed by a coil of
3605 turns of #10 copper wire around a soft iron core which
can be rotated with the magnetic field parallel to and
symmetrical around the axis of rotation.</p>
<p> At each end of the magnet are conducting bronze cylindrical
plates, on one of which are arranged (as shown in Fig. 3)
one set of graphite brushes for extracting output current
between the shaft and the outer circumference and a second
set of metering brushes for independently measuring the induced
voltage between these locations.</p>
<p> A third pair of brushes and slip rings supply the current for
the electromagnet. A thick sheath of epoxy-impregnated
fiberglass windings allow the magnet to be rotated at high speed.</p>
<p> The generator may be recognized as a so-called <ent type='ORG'>homopolar</ent>, or
acyclic machine, a device first investigated and described
by Michael <ent type='ORG'>Faraday</ent> [3] in 1831 (Figs. 45) and shown
schematically in Fig. 6.</p>
<p> It consists of a cylindrical conducting disk immersed in an
axial magnetic field, and can be operated as a generator with
sliding brushes extracting current from the voltage induced
between the inner and outer regions of the disk when the
rotational energy is supplied by an external driving source.</p>
<p> The magnitude of the incremental radial generated voltage
is proportional to both the strength of the magnetic field
and the tangential velocity, so that in a uniform magnetic
field the total voltage is proportional to the product of speed
times the difference between the squares of the inner and outer
brush radii.</p>
<p> The device may also be used as a motor when an external
voltage produces an radial current between the sliding brushes.</p>
<p> There have been a number of commercial applications of
<ent type='ORG'>homopolar</ent> motors and generators, particularly early in this
century [4], and their operating principles are described in a
number of texts [5].</p>
<p> The usual technique is to use a stationary magnet to produce
the magnetic field in which the conducting disk (or
cylinder) is rotated.</p>
<p> <ent type='ORG'>Faraday</ent> found, however, (Fig 7) that it does not matter whether
the magnet itself is stationary or rotating with the disk as long
as the conductor is moving in the field, but that rotating the
magnet with the conducting disk stationary did not produce an
induced voltage.</p>
<p> He concluded that a magnetic field is a property of space
itself, not attached to the magnet which serves to induce the
field [6].</p>
<p> DePalma stated [7] that when the conducting disk is attached
to a rotating magnet, the interaction of the primary magnetic
field with that produced by the radial output current results in
torque between the disk and the magnet structure which is not
reflected back to the mechanical driving source.</p>
<p> Lenz's law therefore does not apply, and the extraction of
output energy does not require additional driving power.
This is the claimed basis for extracting "free" energy.</p>
<p> Discussions of the torque experienced by a rotating magnet are also
discussed in the literature [8].</p>
<p> Because the simple form shown in Fig. 6 has essentially
one conducting path, such a <ent type='ORG'>homopolar</ent> device is characterized
by low voltage and high current requiring a large magnetic field
for useful operation.</p>
<p> Various <ent type='ORG'>homopolar</ent> devices have been used for specialized
applications [9] (such as generators for developing large
currents for welding, ship degaussing, liquid metal
magnetohydrodynamic pumps for nuclear reactor cooling,
torquemotors for propulsion, etc.), some involving quite high
power.</p>
<p> These have been extensively discussed in the literature,
dealing with such problems as developing the high magnetic
fields required (sometimes using superconducting magnets in
air to avoid iron saturation effects), the development of
brushes that can handle the very high currents and have low
voltage drop because of the low output voltage generated,
and with counteracting armature reaction which otherwise would
reduce the output voltage because of the magnetic field
distortion resulting from the high currents.</p>
<p> From the standpoint of prior art, the design of the
<ent type='GPE'>Sunburst</ent> generator is inefficient and not suitable for power
generation:</p>
<p> 1. The magnetic field is concentrated near the axis where
the tangential velocity is low, reducing the generated
voltage.</p>
<p> 2. Approximately 4 kilowatts of power are required to
energize the magnet, developing enough heat so that the
device can only be operated for limited periods of time.</p>
<p> 3. The graphite brushes used have a voltage drop almost
equal to the total induced voltage, so that almost all of
the generated power is consumed in heating the brushes.</p>
<p> 4. The large contacting area (over 30 square inches) of
the brushes needed for the high output current creates
considerable friction loss.</p>
<p> Since this machine was not intended as a practical generator but
as a means for testing the free energy principle, however,
from this point of view efficiency in producing external
power was not required or relevant.</p>
<p> DEPALMA'S RESULTS WITH THE SUNBURST <ent type='ORG'>HOMOPOLAR</ent> GENERATOR</p>
<p> In 1980 DePalma conducted tests with the <ent type='GPE'>Sunburst</ent>
generator, describing his measurement technique and results in an
unpublished report [10].</p>
<p> The generator was driven by a 3 phase a-c 40 horsepower motor
by a belt coupling sufficiently long that magnetic fields of
the motor and generator would not interact. A table from this
report giving his data and results is shown in Fig. 8.</p>
<p> For a rotational speed of 6000 rpm an output power of 7560 watts
was claimed to require an increase of 268 watts of drive power
over that required to supply losses due to friction, windage,
etc. as measured with the output switch open.</p>
<p> If valid, this would mean that the output power was 28.2 times
the incremental input power needed to produce it. Several
assumptions were made in this analysis:</p>
<p> 1. The drive motor input power was assumed to be the product
of the line voltage and current times the appropriate factor
for a three-phase machine and an assumed constant 70% power
factor.
There was apparently no consideration of phase angle
change as the motor load increased. This gives optimistic
results, since consideration of phase angle is necessary
for calculating power in an a-c circuit, particularly with
induction motors.
It might also be noted that the measured incremental line
current increase of 0.5 ampere (3.3%) as obtained with the
analog clamp-on a-c ammeter that was used was of limited
accuracy.</p>
<p> 2. The output power of the generator was taken to be the
product of the measured output current and the internally
generated voltage in the disk less the voltage drop due only
to internal disk resistance. Armature reaction was thus
neglected or assumed not to be significant.</p>
<p> 3. The generated voltage which produced the current in the main
output brushes was assumed to be the same as that measured
at the metering brushes, and the decrease in metered voltage
from 1.5 to 1.05 volts when the output switch is closed was
assumed to be due to the internal voltage drop resulting
from the output current flowing through the internal disk
resistance that is common to both sets of brushes and
calculated to 62.5 <ent type='GPE'>microohms</ent>.</p>
<p> Of these, the first assumption seems the most serious, and it is my
opinion that the results of this particular test were inaccurate.</p>
<p> Tim Wilhelm of <ent type='GPE'>Stelle</ent>, <ent type='GPE'>Illinois</ent>, who witnessed tests of <ent type='ORG'>the Sunburst</ent>
generator in 1981, had a similar opinion [11].</p>
<p> RECENT TESTS OF THE SUNBURST GENERATOR</p>
<p> Being intrigued by DePalma's hypothesis, I accepted the offer by
Mr. Norman Paulsen, founder of <ent type='ORG'>the Sunburst</ent> Community, to
conduct tests on the generator which apparently had not been
used since the tests by DePalma and Bernard in 1979.</p>
<p> Experimental Setup</p>
<p> A schematic diagram of the test arrangement is shown in Fig. 9,
with the physical equipment shown in Fig. 10. The generator
is shown coupled by a long belt to the drive motor behind it,
together with the power supplies and metering both contained
within and external to <ent type='ORG'>the Sunburst</ent> power and metering cabinet.</p>
<p> Figure 10b shows the panel of the test cabinet which provided
power for the generator magnet and motor field. The 4-1/2 digit
meters on the panel were not functional and were not used;
external meters were supplied.</p>
<p> I decided to use an avaiable shunt-field d-c drive motor
to facilitate load tests at different speeds and to simplify
accurate motor input power measurements.</p>
<p> Page 5</p>
<p> Referring to Figure 9, <ent type='ORG'>variacs</ent> and full-wave bridge
rectifiers provided variable d-c supplies for the motor armature
and field and the <ent type='ORG'>homopolar</ent> generator magnet.</p>
<p> Voltages and currents were measured with <ent type='GPE'>Micronta</ent> model 11-191
3-1/2 digit meters calibrated to better than 0.1% against a
<ent type='ORG'>Hewlett Packard</ent> 740B Voltage Standard that by itself was
accurate to better than .005%.</p>
<p> Standard meter shunts together with the digital voltmeters were
used to measure the various currents. With this
arrangement the generator speed could be varied smoothly from 0
to over 7000 rpm, with accurate measurement of motor input
power, metered generator output voltage Vg and generator output
current Ig.</p>
<p> Speed was measured with a General Radio model 1531 Strobotac
which had a calibration accuracy of better than 2% (as verified
with a frequency counter) and which allowed determination of
relative speed changes of a few rpm of less.</p>
<p> Small changes in either load or input power were clearly
evident because of the sensitivity of the Strobotac speed
measurement, allowing the motor input power to be adjusted
with the armature voltage variac to obtain the desired
constant speed with no acceleration or deceleration before
taking readings from the various meters.</p>
<p> Generator Tests</p>
<p> Various tests were conducted with the output switch open to
confirm that generated voltage at both the output brushes (Vbr)
and metering brushes (Vg) were proportional to speed and magnetic
field, with the polarity reversing when magnetic field or
direction of rotation were reversed.</p>
<p> Tracking of Vbr and Vg with variation of magnetic field is shown
in Fig. 11, in which it is seen that the output voltages are not
quite linearly related to magnet current, probably due to core
saturation.</p>
<p> The more rapid departure of Vg from linearity may be due to
the different brush locations as seen on Fig 3, differences
in the magnetic field at the different brush locations, or other
causes not evident. An expanded plot of this voltage
difference is shown in Fig. 12, and is seen to considerably
exceed meter error tolerances.</p>
<p> Figure 11 also shows an approximate 300 watt increase in drive
motor armature power as the magnet field was increased from
0 to 19 amperes.</p>
<p> (The scatter of input power measurements shown in the upper curve
of Fig. 11 resulted from the great sensitivity of the motor
armature current to small fluctuations in power line voltage,
since the large rotary inertia of the 400 pound generator did
not allow speed to rapidly follow line voltage changes).</p>
<p> At first it was thought that this power loss might be due to
the fact that the outer output brushes were arranged in a
rectangular array as shown in Fig. 3.</p>
<p> Since they were connected in parallel but not equidistant from
the axis the different generated voltages would presumably
result in circulating currents and additional power dissipation.</p>
<p> Measurement of the generated voltage as a function of
radial distance from the axis as shown in Fig. 13, however,
showed that almost all of the voltage differential occurred
between 5 and 12 cm, presumably because this was the region of
greatest magnetic field due to the centralized iron core.</p>
<p> The voltage in the region of the outer brushes was almost
constant, with a measured variation of only 3.7% between the
extremes, so that this did not seem to explain the increase in
input power. The other likely explanation seems to be that there
are internal losses in the core and other parts of the metal
structure due to eddy currents, since these are also moving
conductors in the field.</p>
<p> In any event, the increase in drive power was only about 10% for
the maximum magnet current of 19 amperes.</p>
<p> Figure 14 typifies a number of measurements of input power
and generator performance as a function of speed and various
generator conditions.</p>
<p> Since the generator output knife switch procedure was very stiff
and difficult to operate the procedure used was to make a
complete speed run from zero to the maximum speed and descending
again to zero with the switch open, taking readings at each
speed increment with the magnet power both off and on.</p>
<p> The procedure was then repeated with the switch closed. (It
was noted that during the descending speed run the input power
was a few percent lower than for the same speed during the
earlier ascending speed run; this was presumably due to
reduced friction as the brushes and/or bearings became
heated. In plotting the data the losses for both runs were
averaged which gave a conservative result since the losses
shown in the figures exceed the minimum values measured).</p>
<p> The upper curve (a) shows the motor armature input power
with a constant motor field current of 6 amperes as the speed
is varied with no generator magnet excitation and is seen to
reach a maximum of 4782 watts as the speed is increased to 6500
rpm.</p>
<p> This presumably represents the power required to overcome
friction and windage losses in the motor, generator, and drive
belt, and are assumed to remain essentially constant whether
the generator is producing power or not [12].</p>
<p> Curve 14b shows the increase of motor armature power over that
of curve (a) that results from energizing the generator magnet
with a current of 16 amperes but with the generator output
switch open so that there is no output current (and hence
no output power dissippation).</p>
<p> This component of power (which is related to the increase of
drive motor power with increased magnet current as shown in Fig.
11 as discussed above) might also be present whether or not the
generator is producing output current and power, although this is
not so evident since the output current may affect the
magnetic field distribution.</p>
<p> Curve 14c shows the further increase of motor armature input
power over that of curves (a) plus (b) that results when the
output switch is closed, the generator magnet is energized and
output current is produced.</p>
<p> It is certainly not zero or negligible but rises to a maximum of
802 watts at 6500 rpm. The total motor armature input power
under these conditions is thus the sum of (a), (b), and
(c) and reaches a maximum of 6028 watts at 6500 rpm.</p>
<p> The big question has to do with the generated output power.
The measured output current at 6500 rpm was 4776 amperes; the
voltage at the metering brushes was 1.07 volts.</p>
<p> Using a correction factor derived from Fig. 12 and assuming a
common internal voltage drop due to a calculated disk
resistance of 38 <ent type='GPE'>microohms</ent>, a computed internal generated
potential of 1.28 volts is obtained which if multiplied by
the measured output current indicates a generated power of
6113 watts.</p>
<p> All of this power is presumably dissipated in the internal
and external circuit resistances, the brush loss due both to
the brush resistance and the voltage drops at the contact
surfaces between the brushes and the disk (essentially an arc
discharge), and the power dissipated in the 31.25 microohm meter
shunt.</p>
<p> It still represents power generated by the machine, however,
and exceeds the 802 watts of increased motor drive power due
solely to closing the generator output switch and causing
output current to flow by a factor of 7.6 to 1.</p>
<p> If the 444 watts of increased input power that resulted
from energizing the magnet with the output switch open is assumed
to have been converted to generated output power and hence
should be included as part of the total increased drive motor
power required to produce generated output, the computed 6113
watts of generated power still exceeds the total input power of
444 watts plus 802 watts by a factor of 4.9 to 1.</p>
<p> The computed output power even slightly exceeds the total
motor armature input power including all frictional and windage
losses of 6028 watts under these conditions (although the
total system effeciency is still less than 100% because of the
generator magnet power of approximately 2300 watts and motor
field power of about 144 watts which must be added to the
motor armature power to obtain total system input power).</p>
<p> It would thus seem that if the above assumptions are valid
that DePalma correctly predicted that much of the generated
power with this kind of machine is not reflected back to the
motive source. Figure 15 summarizes the data discussed above.</p>
<p> To further examine the question of the equivalence between
the internally generated voltage at the main output brushes and
that measured at the metering brushes, a test was made of the
metered voltage as a function of speed with the generator magnet
energized with a current of 20 amperes both with the output
switch open and closed. The resulting data is shown in Fig. 16.</p>
<p> The voltage rises to about 1.32 volts at 6000 rpm with the
switch open (which is close to that obtained by DePalma) and
drops 0.14 volts when the switch is closed and the measured
output current is 3755 amperes, corresponding to an effective
internal resistance of 37 <ent type='GPE'>microohms</ent>.</p>
<p> Even if this were due to other causes, such as armature reaction,
it does not seem likely that there would be a large potential
drop between the output and metering brushes because of
the small distance, low magnetic field (and radial differential
voltage), and large mass of conducting disk material.</p>
<p> <ent type='ORG'>Internal</ent> currents many times the measured output current of
almost 4000 amperes would be required for the voltage
difference between the outer metering and output brushes to
be significant and invalidate the conclusions reached above.</p>
<p> A further method of testing the validity of the assumed
generated output potential involved an examination of the
voltage drop across the graphite brushes themselves.</p>
<p> Many texts on electrical machinery discuss the brush drop
in machines with commutators or slip rings.</p>
<p> All of those examined agree that graphite brushes typically have
a voltage drop that is essentially constant at approximately one
volt per brush contact when the current density rises above 10-15
amperes per square centimeter.</p>
<p> To compare this with <ent type='ORG'>the Sunburst</ent> machine the total brush
voltage was calculated by subtracting the IR drop due to the
output current in the known (meter shunt) and calculated (disk,
shaft, and brush lead) resistances from the assumed
internally generated output voltage. The result in Fig. 17
shows that the brush drop obtained in this way is even less than
that usually assumed, as typified by the superimposed curve
taken from one text.</p>
<p> It thus seems probable that the generated voltage is
not significantly less than that obtained from the metering
brushes, and hence the appropriateness of the computed output
power is supported.</p>
<p> CONCLUSIONS</p>
<p> We are therefore faced with the apparent result that the
output power obtained when the generator magnet is
energized greatly exceeds the increase in drive power over
that needed to supply losses with the magnet not energized.
This is certainly anomalous in terms of convential theory.
Possible explanations?</p>
<p> 1. There could be a large error in the measurements resulting
from some factor such as noise which caused the digital
meters to read incorrectly or grossly inaccurate current
shunt resistances.</p>
<p> If the measured results had shown that the computed generated
output power exceeded the input drive power by only a few percent
this explanation would be reasonable and would suggest that more
careful calibration and measurements might show that the results
described above were due to measurement error.</p>
<p> With the data showing such a large ratio of generated power to
input power increase, however, in my opinion this
explanation of the results seems unlikely.</p>
<p> (A later test showed that the digital meters are insensitive
to a large a-c ripple superimposed on the measured d-c, but
within their rated accuracy of 0.1% give a true average value).</p>
<p> 2. There could be a large difference between the measured
voltage at the metering brushes and the actual generated
voltage in the output brush circuit due to armature
reaction, differences in the external metering and output
circuit geometry, or other unexplained causes.</p>
<p> As discussed above the various data do not seem to support this
possibility.</p>
<p> 3. DePalma may have been right in that there is indeed a
situation here whereby energy is being obtained from a
previously unknown and unexplained source.</p>
<p> This is a conclusion that most scientists and engineers would
reject out of hand as being a violation of accepted laws of
physics, and if true has incredible implications.</p>
<p> 4. Perhaps other possibilities will occur to the reader.</p>
<p> The data obtained so far seems to have shown that while DePalma's
numbers were high, his basic premise has not been disproved.
While <ent type='ORG'>the Sunburst</ent> generator does not produce useful output power
because of the internal losses inherent in the design, a
number of techniques could be used to reduce the friction
losses, increase the total generated voltage and the
fraction of generated power delivered to an external load.</p>
<p> DePalma's claim of free energy generation could perhaps then
be examined.</p>
<p> I should mention, however, that the obvious application of using
the output of a "free-energy" generator to provide its own motive
power, and thus truly produce a source of free energy, has
occured to a number of people and several such machines have
been built.</p>
<p> At least one of these known to me [13], using what seemed to
be a good design techniques, was unsuccessful.</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> <ent type='ORG'>FOOTNOTES</ent></p>
<p> 1. DePalma, 1979a,b,c, 1981, 1983, 1984, etc.
2. For example, <ent type='ORG'>Satelite News</ent>, 1981, Marinov, 1984, etc.
3. Martin, 1932, vol. 1, p.381.
4. Das Gupta, 1961, 1962; Lamme, 1912, etc.
5. See, for example, Bumby, 1983; <ent type='ORG'>Bewley</ent>, 1952; <ent type='ORG'>Kosow</ent>, 1964; Nasar,
1970.
6. There has been much discussion on this point in the
literature, and about interpretation of flux lines. <ent type='ORG'>Bewley</ent>,
1949; <ent type='ORG'>Cohn</ent>, 1949a,b; Crooks, 1978; Cullwick, 1957; <ent type='ORG'>Savage</ent>,
1949.
7. DePalma, op. cit.
. Kimball, 1926; Zeleny, 1924.
9. Bumby, Das Gupta, op. cit.
10. DePalma, 1980.
11. Wilhelm, 1980, and personal communication.
12. The increase in motor losses with increased load are
neglected in this discussion because of a lack of accurate
values for armature and brush resistances, magnetic field
distortion resulting from armature reaction, etc. Such
losses, while small, would be appreciable, however; their
inclusion would further increase the ratio of generated to
drive power so that the results described are conservative.
13. Wilhelm, 1981, and personal communication.</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> REFERENCES</p>
<p> [<ent type='ORG'>Bewley</ent>, 1949] - L. V. <ent type='ORG'>Bewley</ent>, letter re [<ent type='ORG'>Cohn</ent>, 1949a]; ELECTRICAL
ENGINEERING, Dec. 1949, p.1113-4. (Claims error in <ent type='ORG'>Cohn</ent>'s paper)</p>
<p> [<ent type='ORG'>Bewley</ent>, 1952] - L. V. <ent type='ORG'>Bewley</ent>, FLUX LINKAGES &amp; ELECTROMAGNETIC
INDUCTION, <ent type='ORG'>Macmillan</ent>, NY, 1952. (Explanation of induction
phenomena and the <ent type='ORG'>Faraday</ent> generator)</p>
<p> [Bumby, 1983] - J. R. Bumby, SUPERCONDUCTING ROTATING ELECTRICAL
MACHINES, <ent type='ORG'>Claredon Press</ent>, 1983. (<ent type='ORG'>Homopolar</ent> designs, high current
brushes including liquid metal)</p>
<p> [<ent type='ORG'>Cohn</ent>, 1949a] - George I. <ent type='ORG'>Cohn</ent>, "Electromagnetic Induction",
ELECTRICAL ENGINEERING, May 1949, p441-7. (Unipolar generator as
paradox)</p>
<p> [<ent type='ORG'>Cohn</ent>, 1949b] - George <ent type='ORG'>Cohn</ent>, letter re [<ent type='ORG'>Savage</ent>, 1949]; ELECTRICAL
ENGINEERING, Nov 1949, p1018. (Responds to criticism by <ent type='ORG'>Savage</ent>)</p>
<p> [Crooks, 1978] - M. J. Crooks et al, "One-piece <ent type='ORG'>Faraday</ent> generator:
A paradoxical experiment from 1851", Am. J. Phys. 46(7), July
1978, p729-31. (Derives <ent type='ORG'>Faraday</ent> generator performance using
<ent type='ORG'>Maxwell</ent>'s equations)</p>
<p> [Cullwick, 1957] - E. G. Cullwick, <ent type='ORG'>ELECTROMAGNETISM</ent> AND RELATIVITY,
Longmans &amp; Green, London, 1957. (Chapter 10, "A Rotating
Conducting Magnet", pp.141-60, discusses question of flux rotation
with magnet)</p>
<p> [Das Gupta, 1961] - A. K. Das Gupta, "Design of self-compensated
high current comparatively higher voltage <ent type='ORG'>homopolar</ent> generators",
AIEE Trans. Oct 1961, p567-73. (Discusses very high current
<ent type='ORG'>homopolar</ent> generator design)</p>
<p> [Das Gupta, 1962] - A. K. Das Gupta, "Commutatorless D-C generators
capable to supply currents more than one million amperes, etc"
AIEE Trans. Oct 1962, p399-402. (Discusses very high current low
voltage <ent type='ORG'>Faraday</ent> generators)</p>
<p> [DePalma, 1979a] - Bruce DePalma, EXTRACTION OF ELECTRICAL ENERGY
DIRECTLY FROM SPACE: THE N-NACHINE, <ent type='ORG'>Simularity Institute</ent>, Santa
Barbara CA, 6 Mar 1979. (Discusses <ent type='ORG'>homopolar</ent> generator or N-
Machine as free-energy source)</p>
<p> [DePalma, 1979b] - Bruce DePalma, "The N-Machine", Paper given at
the World Symposium on Humanity, Pasadena, CA, 12 April 1979.
(Describes background, development of "free-energy" theories)</p>
<p> [DePalma, 1979c] - Bruce DePalma, ROTATION OF A MAGNETIZED
GYROSCOPE, <ent type='ORG'>Simularity Institute</ent> Report #33, 16 July 1979.
(Describes design of <ent type='GPE'>Sunburst</ent> <ent type='ORG'>homopolar</ent> generator)</p>
<p> [DePalma, 1980] - Bruce DePalma, "Performance of <ent type='ORG'>the Sunburst</ent> N
Machine", <ent type='ORG'>Simularity Institute</ent>, Santa Barbara, CA, 17 December
1980. (Description of tests and results)</p>
<p> [DePalma, 1981] - Bruce DePalma, "Studies on rotation leading to the
N-Machine", DePalma Institute, 1981 (transcript of talk?)
(Discusses experiments with gravity that led to development of
idea of free-energy machine)</p>
<p> [DePalma, 1983] - Bruce DePalma, THE ROTATION OF THE <ent type='ORG'>UNIVERSE</ent>,
DePalma Institute Report #83, <ent type='GPE'>Santa Barbara</ent>, CA, 25 July 1983.
(Uses <ent type='ORG'>Faraday</ent> disc to discuss universal principles).</p>
<p> [DePalma, 1984] - Bruce DePalma, THE SECRET OF THE FARADAY DISC,
DePalma Institute, <ent type='GPE'>Santa Barbara</ent>, CA, 2 Feb 1984. (Claims
explanation of <ent type='ORG'>Faraday</ent> disc as a free-energy device)</p>
<p> [Kimball, 1926] - A. L. Kimball, Jr., "Torque on revolving
cylindrical magnet", PHYS. <ent type='ORG'>REV</ent>. v.28, Dec 1928, p.1302-8.
(Alternative analysis of torque in a <ent type='ORG'>homopolar</ent> device to that of
Zeleny and Page, 1924)</p>
<p> [<ent type='ORG'>Kosow</ent>, 1964] - Irving L. <ent type='ORG'>Kosow</ent>, ELECTRICAL <ent type='GPE'>MACHINERY</ent> &amp; CONTROL,
Prentice-Hall, 1964. (Discusses high current <ent type='ORG'>homopolar</ent> (acyclic)
generators)</p>
<p> [Lamme, 1912] - B. G. Lamme, "Development of a successful direct-
current 2000-kW unipolar generator", AIEE Trans. 28 June 1912,
p1811-40. (Early discussion of design of high power <ent type='ORG'>homopolar</ent>
generator)</p>
<p> [Marinov, 1984]- Stefan Marinov, THE THORNY WAY OF TRUTH, Part II;
<ent type='GPE'>Graz</ent>, <ent type='GPE'>Austria</ent>, 1984 (Advertisement in NATURE). (Claims free-
energy generator proved by DePalma, Newman)</p>
<p> [Martin, 1932] - Thomas Martin (ed), FARADAY'S DIARY, Bell, 1932,
in 5 vols. (Transcription and publication of <ent type='ORG'>Faraday</ent>'s original
diaries)</p>
<p> [Nasar, 1970] - S. Nasar, ELECTROMAGNETIC ENERGY CONVERSION DEVICES
&amp; SYSTEMS, Prentice-Hall, 1970. (Discusses principles and
applications of acyclic (<ent type='ORG'>homopolar</ent>) machines)</p>
<p> [<ent type='ORG'>Satellite News</ent>, 1981] - "Researchers see long-life satellite power
systems in 19th century experiment", Research news, SATELLITE
NEWS, 15 June 1981. (Reports DePalma's claim for free-energy
generator)</p>
<p> [<ent type='ORG'>Savage</ent>, 1949] - Norton <ent type='ORG'>Savage</ent>, letter re [<ent type='ORG'>Cohn</ent>, 1949a]; ELECTRICAL
ENGINEERING, July 1949, p645. (Claims error in <ent type='ORG'>Cohn</ent>'s paper)</p>
<p> [Wilhelm, 1980] - Timothy J. Wilhelm, INVESTIGATIONS OF THE N-EFFECT
ONE-PIECE <ent type='ORG'>HOMOPOLAR</ent> DYNAMOS, <ent type='ORG'>ETC</ent>. (Phase I), <ent type='GPE'>Stelle</ent>, IL, 12 Sept
1980. (Discusses tests on DePalma's N-Machine)</p>
<p> [Wilhelm, 1981] - Timothy J. Wilhelm, INVESTIGATIONS OF THE N-EFFECT
ONE-PIECE <ent type='ORG'>HOMOPOLAR</ent> DYNAMOS, <ent type='ORG'>ETC</ent>. (Phase II), <ent type='GPE'>Stelle</ent>, IL, 10 June
1981. (Design and tests of improved <ent type='ORG'>homopolar</ent> generator/motor)</p>
<p> [Zeleny, 1924] - John Zeleny &amp; Leigh Page, "Torque on a cylindrical
magnet through which a current is passing", PHYS. <ent type='ORG'>REV</ent>. v.24, 14
July 1924, p.544-59. (Theory and experiment on torque in a
<ent type='ORG'>homopolar</ent> device)</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> (<ent type='ORG'>Sysop</ent> note: The following figure also had an accompanying drawing)</p>
<p> Figure 5 - Transcription of the first experiment showing generation
of electrical power in a moving conductor by Michael
<ent type='ORG'>Faraday</ent></p>
<p> 99*. Made many expts. with a copper revolving plate, about 12 inches
in diameter and about 1/5 of inch thick, mounted on a brass
axle.</p>
<p> To concentrate the polar action two small magnets 6 or 7 inches
long, about 1 inch wide and half an inch thick were put against
the front of the large poles, transverse to them and with their
flat sides against them, and the ends pushed forward until
sufficiently near; the bars were prevented from slipping down
by jars and shakes by means of string tied round them.</p>
<p> 100. The edge of the plate was inserted more of less between the two
concentrated poles thus formed. It was also well amalgamated,
and then contact was made with this edge in different places by
conductors formed from equally thick copper plate and with the
extreme end edges grooved and amalgamated so as to fit on to
and have contact with the edges of the plate. Two of these
were attached to a piece of card board by thread at such</p>
<p> *[99]
(<ent type='ORG'>Sysop</ent> note: a sketch appeared in this area)</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> (<ent type='ORG'>Sysop</ent> note: The following figure also had an accompanying drawing)</p>
<p> Figure 7 - Test of a rotating magnet by Michael <ent type='ORG'>Faraday</ent>, December
26, 1831.</p>
<p> 255. A copper disc was cemented on the top of a cylinder magnet,
paper intervening, the top being the marked pole; the magnet
supported so as to rotate by means of string, and the wires of
the galvanometer connected with the edge and the axis of the
copper plate. When the magnet and disc together rotated
unscrew the marked end of the needle went west. When the
magnet and disc rotated screw the marked end of the needle
went east.</p>
<p> 256. This direction is the same as that which would have resulted
if the copper had moved and the magnet been still. Hence
moving the magnet causes no difference provided the copper
moves. A rotating and a stationary magnet cause the same
effect.</p>
<p> 257. The disc was then loosed from the magnet and held still
whilst the magnet itself was revolved; but now no effect upon
the galvanometer. Hence it appears that, of the metal circuit
in which the current is to be formed, different parts must
move with different angular velocities. If with the same, no
current is produced, i.e. when both parts are external to the
magnet.</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> (<ent type='ORG'>Sysop</ent> note: The following figure also had an accompanying drawing)</p>
<p> Figure 8 - Test data from report by Bruce DePalma</p>
<p> PERFORMANCE OF THE SUNBURST <ent type='ORG'>HOMOPOLAR</ent> GENERATOR</p>
<p> machine speed: 6000 r.p.m.
drive motor current no load 15 amperes
drive motor current increase
when N machine is loaded 1/2 ampere max.</p>
<p> Voltage output of N generator no load 1.5 volts d.c.
Voltage output of N generator loaded 1.05 v.d.c.
Current output of N generator 7200 amperes
(225 m.v. across shunt @ 50 m.v./1600 amp.)</p>
<p> Power output of N machine 7560 watts = 10.03 H.p.</p>
<p> Incremental power ratio = 7560/268 28.2 watts out/watts in</p>
<p> <ent type='ORG'>Internal</ent> resistance of generator 62.5 micro-phms</p>
<p> Reduction of the above data gives as the equivalent circuit for the
machine:</p>
<p> (<ent type='ORG'>Sysop</ent> note: a drawing R(internal) = 62.5 micro-ohms
appeared in this area) R(brush) = 114.25 " "
R(shunt) = 31.25 " "</p>
<p> BRUCE DEPALMA
17 DECEMBER 1980</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p> Page 14</p>
<p> Figure 15 - Summary of test results at 6500 rpm</p>
<p> I II III</p>
<p> MAGNET POWER OFF ON ON
OUTPUT SWITCH OPEN OPEN CLOSED
SPEED 6500 6500 6500 RPM
MAGNET CURRENT 0 16 16
<ent type='ORG'>AMPERES</ent>
MOTOR ARMATURE POWER 4782 5226 6028
<ent type='ORG'>WATTS</ent>
INCREMENT 444 802
<ent type='ORG'>WATTS</ent>
METER BRUSH VOLTAGE .005 1.231 1.070
VOLTS
OUTPUT CURRENT 0 0 4776
<ent type='ORG'>AMPERES</ent>
GENERATED VOLTAGE 1.280 (1.280)
VOLTS
GENERATED POWER 0 0 (6113)
<ent type='ORG'>WATTS</ent></p>
<p> <ent type='ORG'>HOMOPOLAR</ent> GENERATOR TEST - <ent type='ORG'>BIG SPRINGS RANCH</ent> APRIL 26, 1986</p>
<div> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</div>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,129 @@
<xml><p>
ENERGY FROM SPACE
An Engineer's Invention Excites Interest</p>
<p> In a tiny room in a <ent type='GPE'>Bombay</ent> suburb, an electrical engineer works
on a machine that seems to have been conceived in a Sci-Fi book - a
generator which can ostensibly produce electricity from nothing.</p>
<p> But the machine's creator, Paramahamsa <ent type='NORP'>Tewari</ent>, 51, is not an
eccentric inventor from one of Sukumar Ray's fantastic tales. He is
a senior engineer with the Department of Atomic Energy's Nuclear
Power Corporation (<ent type='ORG'>NPC</ent>).</p>
<p> <ent type='NORP'>Tewari</ent> created a minor sensation 10 years ago when he produced the
theory that space is filled with a dynamic medium whose swirling
motion is the source of all matter and energy.</p>
<p> He called it the Space Vortex Theory (<ent type='ORG'>SVT</ent>) which postulated that at
the heart of the electron was a void whose high speed rotation
within a vacuum could produce energy from space.</p>
<p> Interestingly, it was the Theosophical Society which had first
published <ent type='NORP'>Tewari</ent>'s theory by arranging a special lecture in 1977 at
<ent type='GPE'>Adyar</ent> in <ent type='GPE'>Madras</ent>.</p>
<p> The theosophists were excited by <ent type='NORP'>Tewari</ent>'s ideas since they were
remarkably close to observations about the electron put forward by
Annie Besant's associate, the clairvoyant Charles W. Leadbeater, in
the book "Occult Chemistry."</p>
<p> However, the first indication that <ent type='NORP'>Tewari</ent>'s ideas about the
structure of space were more than just a mystic vision came earlier
this year at a conference in <ent type='GPE'>Hanover</ent> organised by the German
Association of Gravity Field Energy.</p>
<p> The Space Power Generator (<ent type='ORG'>SPG</ent>) invented by <ent type='NORP'>Tewari</ent> won the first
prize of Rs 25000 from among 25 similar machines presented at the
conference by scientists from all over.</p>
<p> <ent type='NORP'>Tewari</ent>'s generator is actually a simple machine, consisting
basically of a magnetised cylinder rotating at high speed with the
help of a motor.</p>
<p> Power from this device is extracted by connecting a wire between the
surface of the cylinder and its axis. According to the engineer-
inventor, the <ent type='ORG'>SPG</ent> produces two-and-a-half to three-and- a-half times
more power than it consumes, defying the basic physical law of
conservation of energy which says that the output of energy cannot
be more than the input.</p>
<p> <ent type='NORP'>Tewari</ent> says the excess power comes from the inter-atomic space of
the rotating cylinder - it is the movement of the "voids" in the
spinning cylinder which creates additional energy out of the space
between the machine's axis and the magnet.</p>
<p> <ent type='NORP'>Tewari</ent> admits that his theory sounds incredible taking into account
the existing laws and that he would never have developed it had he
been trained as a physicist and not an engineer, since it is so
divergent from conventional physics.</p>
<p> But, he says, it would have been difficult for him to go on with
work on the <ent type='ORG'>SVT</ent> and the generator were it not for encouragement from
two US physicists, John A. <ent type='ORG'>Wheeler</ent>, director of the Centre for
Theoretical Physics at the University of Texas, <ent type='GPE'>Austin</ent>, and Bruce
DePalma, formerly a lecturer in physics at the Massachusetts
Institute of Technology.</p>
<p> "But for DePalma, I wouldn't have been able to tie up my theory,"
says <ent type='NORP'>Tewari</ent>. "He was working on similar ideas and kept sending his
results to me."</p>
<p> Though <ent type='NORP'>Tewari</ent>, who is slated for transfer to <ent type='ORG'>the NPC</ent>'s <ent type='ORG'>Kaiga Project</ent>
in <ent type='GPE'>Karnataka</ent> as chief project engineer, has pursued his interest in
physics in his spare time, he has received infrastructural support
from <ent type='ORG'>the NPC</ent> for putting together his extraordinary new machine.</p>
<p> The <ent type='ORG'>SPG</ent> was built under <ent type='NORP'>Tewari</ent>'s supervision at the Tarapur Atomic
Plant. "<ent type='NORP'>Tewari</ent>'s prototype <ent type='ORG'>SPG</ent> can be considered a major
breakthrough," says S. L. Kati, managing director of <ent type='ORG'>NPC</ent>.</p>
<p> Before leaving for <ent type='GPE'>Hanover</ent>, <ent type='NORP'>Tewari</ent> addressed a meeting of scientists
and engineers at <ent type='ORG'>the Bhaba Atomic Research Centre</ent> on his theory.</p>
<p> But most physicists remained sceptical about his findings.</p>
<p> Undaunted, he is experimenting with a new model of the <ent type='ORG'>SPG</ent> since his
return, which he feels will be an improvement. He eventually hopes
to create a prototype for a generator which could deliver 50 kw to
100 kw of electricity.</p>
<p> "The encouragement I received abroad has been a great help, and
hopefully within a year, I will be able to build an experimental
model which could ultimately prove commercially viable," he says.</p>
<p> <ent type='NORP'>Tewari</ent>, of course, is not the only engineer hoping to build the
ultimate power generation machine - one which will run perpetually
since it will extract energy from space - as the <ent type='GPE'>Hanover</ent> conference
demonstrated.</p>
<p> In fact, DePalma, the first inventor to create such a machine, is
presently conducting experiments in <ent type='GPE'>California</ent> in anticipation of a
breakthrough which could lead to commercial production.</p>
<p> Their work promises to create ultimately a machine which appears to
come straight out of a futuristic fantasy.</p>
<p> - M. Rahman</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,464 @@
<xml><p>
<ent type='ORG'>WBAI</ent> Pacifica Radio <ent type='GPE'>New York</ent>
Interview with Mark Swaney
By: Paul DeRienzo.</p>
<div>--------------------------------</div>
<p><ent type='ORG'>WBAI</ent> radio interview with Mark Swaney from "Faithful <ent type='GPE'>Arkansas</ent>"
a citizens group, speaking of Bill Clinton's and George Bush's
connection with the <ent type='ORG'>CIA</ent> covert drug smuggling operation in
Mena <ent type='GPE'>Arkansas</ent> in support of the <ent type='NORP'>Contras</ent>.
MARK SWANEY:
. . . . [they] set up a front company in <ent type='GPE'>Guadalahara Mexico</ent>.
The purpose of which, he was told, was to smuggle weapons to
the <ent type='ORG'>Contra</ent>'s in <ent type='LOC'>Central America</ent>. And he was to be the front man
-- he was to provide the front cover for this company, but he
was given to know that behind the scenes they [the <ent type='ORG'>CIA</ent>] would
be using this company to smuggle weapons. So he was ok with
that and he went down to Guadalahara and was down there until
the summer of '87 --actually the plane was shot down in '86
so this operation in <ent type='GPE'>Mexico</ent> continued for a year after the
<ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> story was breaking and that's something that a
lot of people don't know --they think that <ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent>/<ent type='ORG'>Contra</ent>
Resupply stopped when the revelations were made in '86, but
they actually continued.
Anyway in the summer of '87, even as the hearings were going
on in <ent type='ORG'>Congress</ent>, Terry Reed began to suspect they were using
his front company for something other than smuggling weapons.
And one day he was looking for a lathe in one of his warehouses
by the airport there in Guadalahara and he went in and opened
up an air freight shipping container (which are very large,
they're about 28 feet long, 7 feet high, 8 feet wide), and he
found it packed full of <ent type='ORG'>Cocaine</ent> when he opened it up. He immediately
realized he was in a very precarious situation because he was
the only one on paper who had anything to do with that company,
and if they had ever gotten caught -- there was nobody to stand
up and say well this guy didn't know anything -- he was going
to be a patsy if anything went wrong. So he decided he wasn't
going to play the part of the patsy. The man who was his contact
man for the <ent type='ORG'>CIA</ent> in <ent type='GPE'>Mexico</ent> was Felix Rodrigez. So he confronted
Felix Rodrigez and said well listen I didn't bargain on getting
into Narcotics smuggling and I'm outa this all together guys
-- I'm leaving now -- I refuse to have anything further to do
with this. And Felix Rodrigez said ok fine if you want to be
out your out. Now before he was able to return even to Little
Rock <ent type='GPE'>Arkansas</ent> where his home was at the time, Governor Clinton's
Chief of Security, a man named Raymond <ent type='ORG'>Buddy Young</ent>, and
another man Tommy Baker, <ent type='ORG'>Private Investigator</ent> and I'm told
former member of the <ent type='GPE'>Arkansas</ent> State Police, were framing
Terry Reid for mail fraud. What this involved was the so
called project donation that Oliver North had set up. Terry
Reid's plane had been stolen a number of years earlier
-- and used in drug missions and such without his knowledge
-- and he claimed the insurance money for his plane being stolen
-- and so to set him up what they did was took the airplane
and put it back in his hangar before he got back to <ent type='GPE'>Arkansas</ent>.
Governor Clinton's Chief of Security just supposedly happened
--and this is what he tells the press -- he say's "one day I
just happened to be walking by this hangar, and the wind just
happened to blow the door open and I just happened to look in
and see this airplane that was stolen four years earlier in
another state and I realized -that was the plane." And so this
is how the case got started.
PAUL DeRIENZO:
How would he have known that was the plane?
MARK SWANEY: </p>
<p>Oh that's never been explained. Along with a number of aspects
in this famous story. We're in contact with Terry Reid's defense
attorney in Witchita and she's promised to send us all of the
documents --we have some of the documents already that indicate
--he was found not guilty --well he never went to trial.
PAUL DeRIENZO:</p>
<p>Is that the same <ent type='ORG'>Buddy Young</ent> by the way who's head of Governor
Clinton's security detail.
MARK SWANEY:</p>
<p>Yes he is.
PAUL DeRIENZO:
<ent type='ORG'>Buddy Young</ent>, let's keep his name in mind because I want to come
back to him. Let's jump now to the sight in <ent type='GPE'>Arkansas</ent> that was
used as the landing sight, the airport in <ent type='GPE'>Arkansas</ent> in the town
of Mena <ent type='GPE'>Arkansas</ent> --that was determinates of a lot of these
<ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> resupply flights.
MARK SWANEY:</p>
<p>Yes, in fact Terry Reid has stated in that same article that
you have that it was the *hub* of the <ent type='ORG'>Contra</ent> resupply effort.
Many people are not aware that <ent type='GPE'>Arkansas</ent> was very heavily and
very deeply involved in the <ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> affair all during the
time that Governor Clinton ???? Governor of the state.
And there were numerous stories written about it in the press.
Well the story about Mena is that Mena is a very small town
in the middle of the the Washitah (sp) mountains in Southwestern
<ent type='GPE'>Arkansas</ent> and not coincidentally it happens to be in <ent type='ORG'>Congress</ent>man
John Paul Hammerschmidt's district, the Third <ent type='ORG'>Congress</ent>ional
district. John Paul Hammerschmidt just happens to be one
of George Bush's very closest friend's. He was George Bush's
Presidential Campaign Manager for Bush's campaign in '76 and
again in 1980. The two people are very close. Anyway Mena
has an airport and it looks from the outside like an ordinary,
normal airport. The thing that separates Mena's airport from
any other is the fact that there are row upon row of hangars
--buildings which house aircraft refitting facilities. Now
aircraft refitting is an industry that is in demand by two
principal paying customers. One of them is the <ent type='ORG'>CIA</ent>, and the
other one are drug smugglers. And the reason is, is because if
you're a <ent type='ORG'>CIA</ent> guy and you're going to do covert actions overseas
-- they're almost entirely relying on air transport of some kind.
Particularly if you're going to covertly resupply an army that's
over a thousand miles away.
PAUL DeRIENZO:
Hassenfusse's plane was based there.
MARK SWANEY: </p>
<p>Pardon me.
PAUL DeRIENZO:
Hassenfusse's plane, the plane that was shot down, was based
in Mena <ent type='GPE'>Arkansas</ent>.
MARK SWANEY:</p>
<p>That plane was based there formally before Barry Seal was
murdered just a few months before it was shot down. That
was Barry Seal's own personal airplane. But anyway what
you need to do, if you're a <ent type='ORG'>CIA</ent> or a drug smuggler is you
need an airplane that can do things that normally airplanes
of the civilian variety are not allowed to do. Things like
have cargo doors that open to the inside of the airplane so
that you can make in-flight drops - so that you can drop
things out of the airplane while it's flying -- which is
illegal on a commercial or civilian type of aircraft. You
need to do things like install advanced navigational equipment
sometimes even ??? You need things like roller matts to put
down on the floor so that you can roll the crates forward
in the fuselage of the airplane to kick them out. You need
to be able to modify a civilian aircraft that is not legally
allowed to have such capability so that it does have those
capabilities.
PAUL DeRIENZO:
And this was done in Mena -- a smalltown airport.
MARK SWANEY:
Right. Now Mena has the second or third largest --I don't
know which, but one of the largest aircraft refitting
facilities in <ent type='GPE'>the United States</ent>. And as such it was --long
before the <ent type='ORG'>Nicaruguan</ent> episode happened, it was a base of <ent type='ORG'>CIA</ent>
covert operation and remains to this very minute a base of
<ent type='ORG'>CIA</ent> covert operation.
PAUL DeRIENZO:
Let's jump to another name that comes up in this -- a fella
by the name of Larry Nichols, former employee of the state
of <ent type='GPE'>Arkansas</ent>. He was a employee of the <ent type='GPE'>Arkansas</ent> Development
and Finance Authority now I have an <ent type='ORG'>Associated Press</ent> article
that came out just a couple of days ago that Larry Nichols
has dropped a lawsuit that he had instituted in 1990 against
Governor Clinton that came after his 1988 dismissal from that
state job for miss-use of agency telephones.</p>
<p>Can you tell us who Larry Nichols was.
MARK SWANEY:
Yeah this is probably the most interesting part of the story
-- you see Larry Nichols is the source of all these rumors
and the Jennifer Flowers thing and the Governor's sex life.
The story that the press has yet not picked up on is the
fact that Larry Nichols was a big time <ent type='ORG'>Contra</ent> supporter.
He has close connections to Mario Collero, Adolpho Collero
and Jack Singlove. In fact he served with General Singlove
in <ent type='GPE'>Vietnam</ent>. He spent the first half of the decade working
for the <ent type='NORP'>Contras</ent> in a connection with an organization that
General Singlove had. He spent time with the <ent type='ORG'>Contra</ent>'s on the
ground in <ent type='GPE'>Honduras</ent>. His job was to collect military information.
Now I've met with Larry Nichols -- this information that I'm
about to give you he has told me directly. And we have checked
out a great deal of what he's told us and everything that he
has told us has checked out totally accurate.
PAUL DeRIENZO:
So what we're seeing here is a connection between the mistress
sex scandal and the <ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> and the Governor of <ent type='GPE'>Arkansas</ent>.
There's a connection.
MARK SWANEY:
Well what you find out here in a minute is that the sex
scandals really have nothing to do with it. I saw his lawsuit
several months ago when I was in <ent type='GPE'>Little Rock</ent> and it was of
no interest to me I didn't even bother to make a copy of it.
But Larry Nichols, the man, and his relationship to the
Governor is extremely interesting. You see what it is --is
that his job was to make military analysis of the situation
in <ent type='GPE'>Honduras</ent> with the <ent type='NORP'>Contras</ent>. And to take that information
back to <ent type='GPE'>the United States</ent> and package it and present it to
<ent type='ORG'>Congress</ent>men who are in favor of <ent type='ORG'>Contra</ent> Aid with a view toward
convincing them that the <ent type='ORG'>Contra</ent>'s were an effective military
fighting force --that they could win militarily against the
<ent type='ORG'>Sandanistas</ent>. At some point around '85 I believe this job for
Larry ran out, and he didn't have any money and he approached
Governor Clinton. Now according to Larry, he and Governor Clinton
are close friends, have known each other for a long time. In
fact before the Governor was the Governor. He asked Governor
Clinton --hey I'm broke I need a job. Well it's not too usual
that somebody could just call up the Governor and say I want
a job and the Governor says sure we'll make you Marketing
Director for <ent type='ORG'>ADFA</ent>. That's the <ent type='GPE'>Arkansas</ent> Development Finance
Authority --which figures centrally in Bill Clinton's
relationship to the <ent type='ORG'>Contra</ent> Resupply network that the state
of <ent type='GPE'>Arkansas</ent> was so heavily involved in. In any case he was
there working at <ent type='ORG'>ADFA</ent> and someone at <ent type='ORG'>ADFA</ent> a fellow employee
had found out about this guy that was working with them who
was this romantic jungle fighter type of character. And
eventually she began to talk to some friends about it and
word reached the ears of a reporter and a reporter began
to investigate Larry Nichols --wondering what this big <ent type='ORG'>Contra</ent>
supporter was doing working for <ent type='ORG'>ADFA</ent>. Everyone who holds a
top position at <ent type='ORG'>ADFA</ent> is directly appointed by Bill Clinton --in
fact <ent type='ORG'>ADFA</ent> is a total invention of Bill Clinton's --he created
the agency out of thin air and appoints all of the top
directors. In any case a reporter approached Bill Clinton
in <ent type='GPE'>Japan</ent> and started to question him about Larry Nichols
--wanted to know what this guy was doing on state payroll
--if he was lobbying for the <ent type='ORG'>Contra</ent>'s or just what the story
was. Mr. Clinton, rather precipitously fired Larry Nichols
directly after that. And the story that was put out was that
he was fired for misusing state telephones that he'd supposedly
made hundreds of calls to the <ent type='NORP'>Contras</ent> and ran up thousands of
dollars worth of bills to the <ent type='NORP'>Contras</ent> -- uhmm that is an
unsubstantiated allegation --in fact on Larry Nichols suggestion
the organization I work with received his entire phone records
from <ent type='ORG'>ADFA</ent> through freedom of information act and went over
those phone records with him call by call and we did not find
any records of calls by him outside <ent type='GPE'>the United States</ent> on
those phone records so it was a phony charge and Larry Nichols
was in fact wrongfully fired and they made up this story that
he was calling the <ent type='NORP'>Contras</ent> in order to get rid of him.
PAUL DeRIENZO:
Why do you think that was?
MARK SWANEY:
Well I don't know the exact reason but I can tell you this
that Larry Nichols and <ent type='ORG'>Buddy Young</ent> the man I mentioned earlier,
are very close friends.
PAUL DeRIENZO:
Well that's a point that you just mentioned that <ent type='ORG'>Buddy Young</ent> was
the State Security man who discovered the airplane -- the allegedly
stolen airplane belonging to Terry Reid was in fact in a certain
airport hangar.
MARK SWANEY:
Everything to do with that in fact the federal judge is on record
for calling <ent type='ORG'>Buddy Young</ent> a liar in Terry Reid's trial. But see Larry
Nichols and <ent type='ORG'>Buddy Young</ent> knew each other and are close friends
according to the newspaper accounts that were in the newspaper
down here in <ent type='GPE'>Arkansas</ent> yesterday -- they're old buddies.
PAUL DeRIENZO:
Yes, well that's what the <ent type='ORG'>Associated Press</ent> report that I'm looking
at right now says that Nichols dropped his lawsuit after consulting
with <ent type='ORG'>Buddy Young</ent>.
MARK SWANEY:
Yes, Now I'm going to say something right now which is rather
shocking -- this is the first time this has been made public
to my knowledge. A member of my organization who is going to
be at a press conference that we're having tomorrow --spoke
with Larry Nichols --we've been in contact with him for several
months off and on on the telephone, and he's had a conversation
with him sometime around the first week of January -- during
which Larry Nichols tolde this member of my organization -- that
<ent type='ORG'>Buddy Young</ent> had called him and told him that he in fact was a
dead man -- that was under threat of death.
PAUL DeRIENZO:
<ent type='ORG'>Buddy Young</ent> was?
MARK SWANEY:
No. Larry Nichols. And at that time <ent type='ORG'>Buddy Young</ent> was frightened
-- he was not threatening Larry Nichols personally he was saying
that we're all in trouble with this because there's a move in
the Governor's office to get rid of me. So <ent type='ORG'>Buddy Young</ent> was
afraid that Governor Clinton was about to axe him in the same
way that he axed Larry Nichols. And so serious did he take
this possibility that he informed Larry Nichols directly that
he was a dead man.
PAUL DeRIENZO:
So Larry Nichols is now saying that <ent type='ORG'>Buddy Young</ent> the Chief of
Governor Clinton's gubernatorial campaign has told him that
he's a dead man.
MARK SWANEY:
Yes, that is the information that Larry Nichols gave to us
-- now as I say that has not been reported anywhere else and
I would not bet a lot right now on Mr. Nichols backing that
statement up, but I back it up.
PAUL DeRIENZO:
And this is prior to him dropping this lawsuit against Governor
Clinton.
MARK SWANEY:
Yes, the timing of his dropping the lawsuit is interesting to
us too, because we just recently were in contact with the Nation
Magazine, and it was approximately two days after the Nation
Magazine actually decided to take the information that we had
collected on this case very seriously and in fact are now
pursuing their own investigative journalism on this, it was
about two days after that that Larry Nichols declared that he
was going to drop his lawsuit. Uh, so there's some very strange
things that are going on. There's a great deal of other
information --uh, connecting Governor Clinton to the operation
in Mena. We don't have what you'd call a smoking gun on this
-- I have in front of me a piece of paper that I've written
17 questions for the Governor on that the media has totally
overlooked in their haste to salivate over all these sexual
stories --they've totally missed what's available. For example,
the organization that I work for has been --I don't say I work for,
nobody pays us we're getting broke doing this, but in any case
we've collected just about everything that's publicly available
about Mena and all of its ramifications and its a tremendous
story, and I'd like to emphasize right now that Governor
Clinton's part in this is very minor -- the real big fish in this
story is George Bush. The damage that could come from this
information coming out is in fact far more damaging to George
Bush than anyone else, because he's directly responsible for this
-- this operation was run out of the then Vice President George
Bush's office. And I'd also like to add that the <ent type='GPE'>Arkansas</ent> chapter
of the <ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> story was the one that was most heavily
covered up at the time -- it was part of the story they had
that they took the most care to see to it that nothing ever
came out about it. And that was for two reasons: 1) because
it involves massive cocaine smuggling -- we had one pilot that
came to the <ent type='ORG'>University</ent> and spoke directly to us and said
"I personally flew for the <ent type='ORG'>CIA</ent>, guns, <ent type='NORP'>Panamanian</ent> Defense
forces and approximately one ton of cocaine per flight.
I flew seven of these flights into Mena <ent type='GPE'>Arkansas</ent>." So they
wanted to cover it up because it was the one thing that would
have exposed the drug connection within <ent type='GPE'>the United States</ent>
most heavily. 2) And the other reason that they were very
anxious to coverup Mena's involvement was because the base
of operations that the <ent type='ORG'>CIA</ent> was using was in fact still active
at the time the hearings were going on. And that base of
operations supports covert operations all around the world
not just in <ent type='LOC'>Central America</ent>. For example, there's a current
covert operation that was going on there at least as late as
May of last year that killed a man from <ent type='GPE'>Arkansas</ent> and <ent type='GPE'>Angola</ent> --
so the entire time that Barry Seal was operating out of that
airport the <ent type='ORG'>CIA</ent> was supporting there covert war with <ent type='ORG'>Jonason</ent>(sp)
and <ent type='ORG'>Manunita</ent>(sp) in <ent type='GPE'>Angola</ent>. And we have sources within the
<ent type='GPE'>United States</ent> government that there is covert activity going on
in it this very day.
PAUL DeRIENZO:
Thank you very much Mark Swaney --this is an amazing story and
the amazing thing about it is that this is the *real* story about
Governor Bill Clinton and that what we're getting served to us from
all the media from start to finish from morning to night headlines
in all the <ent type='GPE'>New York</ent> papers, is this thing about Governor Clinton
and this woman Jennifer Flowers and her association with the
Governor who is married for 14 years, and the real story which
you get on <ent type='ORG'>WBAI</ent> underneath it all from our contacts in <ent type='GPE'>Arkansas</ent>
is that in fact the Governor of <ent type='GPE'>Arkansas</ent> is covering up an illegal
operation that began in the Vice President's office who is now
President of <ent type='GPE'>the United States</ent> -- George Bush. Which makes me
wonder why should I even bother voting -- who's there to vote for.
I mean both sides the <ent type='NORP'>Democrats</ent> and the <ent type='NORP'>Republicans</ent> are involved.
MARK SWANEY: </p>
<p>That's another part of the story --you know the best way to buy
off an election is to pay off both candidates. There's significant
<ent type='NORP'>Republican</ent> interest in seeing Bill Clinton get the nomination
from the standpoint that they will be assured then that none
of the issues of the <ent type='GPE'>Iran</ent>-<ent type='ORG'>Contra</ent> affair are likely to be talked
about. Certainly Clinton doesn't want to talk about them.</p>
<p>We tried before we knew that Mr. Clinton was involved in this --
we only came across this information 5 or 6 months ago and
for two years now we've been doing demonstrations, writing
letters collecting petitions holding informational gatherings
to try to get this story to the people, and we have on several
occasions sent Bill Clinton signatures, petitions of <ent type='GPE'>Arkansan</ent>'s
asking for a state investigation and he refused to do anything
about them he would do nothing more than have an aide send us a
two sentence letter saying we have received your petition and
then this last September just one week before he decided to
run for the Presidency we contacted his office and said listen
we'd be willing to talk to you or any one of your aides so that
we could talk to you about this major crime problem in our state
that we're concerned about that we'd like to get to the bottom
of -- and he refused that. During the 4 or 5 years now that
the press has covered this story about Mena and Barry Seal --
you know this is a story about people who have been murdered --
this is a very, very serious affair and during all of this time
talk of massive <ent type='ORG'>Cocaine</ent> smuggling, corruption of local officials
corruption of <ent type='ORG'>Federal and State</ent> judicial system on and on and on
there was total silence from the Governor, not a word. And it
was not until our organization had a large demonstration
-- it wasn't really a large demonstration but it was very well
covered in the <ent type='GPE'>Arkansas</ent> press --that reporters approached
Mr. Clinton about Mena. He talked about it for the first time
in 4 or 5 years and what he had to say at that time was that
he had in fact authorized some money for lonely little <ent type='GPE'>Polk County</ent>,
which is a poor county in Southwestern <ent type='GPE'>Arkansas</ent> to run an
investigation and so we asked him for back up from the
Governor's office we said -freedom of information act
-- we'd like to know if you have any documentation whatsoever
to back up your statement that you are willing to help the
<ent type='GPE'>Polk County</ent> investigators do their own state investigation
in this affair. And he could not produce a single thing.</p>
<div>---------------------------</div>
<p>"Why of course the people don't want war... It is the leaders...who
determine the policy and it is always a simple matter to drag the
people along...all you have to do is tell them they are being attacked
and denounce the pacifists for lack of patriotism and exposing the
country to danger. It works the same in any country.</p>
<p>Hermann Goering, 1936
</p></xml>

View File

@ -0,0 +1,210 @@
<xml><p>
<ent type='NORP'>CONTRAS</ent> USED COCAINE TO BUY ARMS
BY VINCE BIELSKI and <ent type='GPE'>DENNIS</ent> BERNSTEIN</p>
<p> WASHINGTON--Senator John Kerry (D-Mass) and his staff said recently
they are "confident" that money from the sale of narcotics helped finance
the <ent type='NORP'>contras</ent> and that the arms network set up by Lt. Col. Oliver <ent type='LOC'>North</ent> could
be involved.</p>
<p> <ent type='LOC'>North</ent> was fired from the staff of <ent type='ORG'>the National Security Council</ent> by
President Reagan this week after the <ent type='ORG'>Administration</ent> discovered that <ent type='LOC'>North</ent>
arranged for the transfer $30 million from the sale of arms to <ent type='GPE'>Iran</ent> to
<ent type='NORP'>Swiss</ent> bank accounts controlled by the <ent type='NORP'>contras</ent>.</p>
<p> "I'm confident that the <ent type='NORP'>contras</ent> have received drug money. They have
received illegal shipments of weapons and that U.S. officials knew of it,"
Kerry said, in calling for a special prosecutor to look into these other
allegations.</p>
<p> John Weiner, a Kerry aide, said while congressional investigators do
not know if <ent type='LOC'>North</ent> was directly involved, they do have evidence linking the
"<ent type='LOC'>North</ent> network" to the cocaine-arms operation. According to a report
produced by Kerry's staff, <ent type='LOC'>North</ent> established a network, involving retired
<ent type='ORG'>Army</ent> Gen. John Singlaub, U.S. mercenaries and <ent type='NORP'>Cuban</ent>-<ent type='NORP'>Americans</ent>, to provide
arms to the <ent type='NORP'>contras</ent> during the two-year congressional ban on U.S. support.
After the downing of the C-123 cargo plane over <ent type='GPE'>Nicaragua</ent>, <ent type='ORG'>Administration</ent>
officials also acknowledged that <ent type='LOC'>North</ent> set up the private arms operation to
the <ent type='NORP'>contras</ent>.</p>
<p> Weiner and several other sources charge that individuals involved in
the network traffic in cocaine to help buy weapons for the <ent type='NORP'>contras</ent>.</p>
<p> "We have received a variety of allegations about drug connections to
the <ent type='NORP'>contras</ent> and to parts of the <ent type='LOC'>North</ent> network. As to whether Oliver <ent type='LOC'>North</ent>
was directly involved in that I can't say. But parts of the <ent type='LOC'>North</ent> network
allegedly were. And that needs to be looked at very seriously," he said.</p>
<p> <ent type='ORG'>The Senate Foreign Relations</ent> committee is expected to investigate
these charges when <ent type='ORG'>Congress</ent> reconvenes in January.</p>
<p> The role that cocaine played in funding the network has been part of a
two-year investigation carried out by <ent type='ORG'>the Christic Institute</ent>, a <ent type='GPE'>Washington</ent>-
based law firm. Dan Sheehan, the attorney directing the investigation, said
the proceeds from the sale of cocaine has been "one significant source of
funding for the <ent type='NORP'>contras</ent>. He said he has subsantial evidence to prove that
the <ent type='NORP'>contras</ent> and their <ent type='NORP'>Cuban</ent>-American supporters are smuggling one ton of
cocaine into <ent type='GPE'>the United States</ent> each week.</p>
<p> The Drug Enforcement <ent type='ORG'>Administration</ent> estimates that one ton of cocaine
has a street value of between $26 and $50 million. Sheehan said a portion
the profits are used to purchase weapons.</p>
<p> The cocaine ring, involving mostly major <ent type='NORP'>Columbian</ent> cocaine trafficker,
or "cocaine lords," and <ent type='NORP'>Cuban</ent>-<ent type='NORP'>Americans</ent> from <ent type='GPE'>Miami</ent> had been operating for
years before the <ent type='LOC'>North</ent> network began in 1984. John <ent type='ORG'>Mattes</ent>, an attorney for
one of the <ent type='NORP'>Cuban</ent>-<ent type='NORP'>Americans</ent> involved in the <ent type='LOC'>North</ent> network, said that the
cocaine traffickers and the arms network "got together as a marriage of
convenience."</p>
<p> "The <ent type='NORP'>Columbian</ent>s saw that the <ent type='NORP'>contra</ent> base in <ent type='GPE'>Costa Rica</ent> was an ideal
transhipment point. Their planes would land there and refuel. They also
benefit from the pilots, planes and intelligence information which the arms
suppliers had and which they make extensive use of," <ent type='ORG'>Mattes</ent> said. In
return, <ent type='ORG'>Mattes</ent> said the <ent type='NORP'>Columbian</ent>s paid the <ent type='NORP'>contras</ent> $10000 to $25000 for
each plane carry cocaine which landed in <ent type='GPE'>Costa Rica</ent> for refueling. The
Christic Institute's allegations are all contained in a civil suit filed in
May 1986 in U.S. District Court in <ent type='LOC'>the Southern District</ent> of <ent type='GPE'>Florida</ent>.</p>
<p> The suit is brought by two U.S. journalists, Martha Honey and Tony
Avirgan, who charge that the cocaine/arms conspiracy was responsible for
the May 1984 assassination attempt on <ent type='NORP'>contra</ent> leader Eden Pastora in La
Penca, <ent type='GPE'>Nicaragua</ent>. The journalists are sueing for personal injuries they
suffered resulting from a bomb explosion at a press conference which killed
8 people and injured Pastora. "As amazing as it sounds," Sheehan said, "the
conspiracy is continuing to bring about one ton or 1000 kilos of cocaine
into <ent type='GPE'>the United States</ent> each week." Jesus Garcia, a former corrections
officer in <ent type='GPE'>Dade County</ent>, <ent type='GPE'>Florida</ent>, said he was actively involved in the
cocaine-arms operation.</p>
<p> He is one of Sheehan and Kerry's main sources of information. In a
telephone interview from prison, where Garcia is no serving a three-year
term for possession of a firearm, he said "it is common knowledge here in
<ent type='GPE'>Miami</ent> that that this whole <ent type='NORP'>contra</ent> operation in <ent type='GPE'>Costa Rica</ent> was paid for with
cocaine. Everyone involved knows it. I actually saw the cocaine and the
weapons together under one roof, weapons that I helped ship to <ent type='GPE'>Costa Rica</ent>."
In May of 1983, according to the suit, two <ent type='NORP'>Cuban</ent>-<ent type='NORP'>Americans</ent>, Rene <ent type='ORG'>Corbo</ent> and
Felipe Vidal joined forces with John <ent type='GPE'>Hull</ent>, a U.S. citizen who owns 1750
acres of land in northern <ent type='GPE'>Costa Rica</ent>, "to recruit, train, finance (and)
arm" a <ent type='NORP'>Cuban</ent>-American mercenary force to attack <ent type='GPE'>Nicaragua</ent>.</p>
<p> To finance the mercenary force, the <ent type='NORP'>Cuban</ent>-<ent type='NORP'>Americans</ent>, <ent type='GPE'>Hull</ent> and others
made arrangements with two known <ent type='NORP'>Columbian</ent> cocaine trafficers, Pablo
Escobar and Jorge Ochoa, "to provide hundreds of pounds of cocaine on a
regular basis," according to the suit. Garcia said that individuals
involved in the arms supply operation told him that Ochoa was supplying
cocaine to the <ent type='NORP'>contras</ent>.</p>
<p> The cocaine was flown from <ent type='GPE'>Columbia</ent> to <ent type='GPE'>Hull</ent>'s ranch, Sheehan said,
where the planes would refuel. Sheehan said he has obtained records of
<ent type='ORG'>Corbo</ent> buying huge gasoline tanks in <ent type='GPE'>Costa Rica</ent> which are used for refueling
the planes. <ent type='ORG'>The Christic Institute</ent> learned about the cocaine shipments from
members of <ent type='GPE'>Costa Rica</ent>n Rural Guard, workers on <ent type='GPE'>Hull</ent>'s land who unloaded the
illegal substance from the small planes, and the pilots who transported the
cocaine.</p>
<p> <ent type='ORG'>Corbo</ent> and Vidal belong to the <ent type='ORG'>Brigade</ent> 2506, an anti-Castro group in
<ent type='GPE'>Miami</ent> whose members were recruited and hired by the <ent type='ORG'>CIA</ent> to fight in <ent type='LOC'>the Bay</ent>
of Pigs invasion agaisnt <ent type='GPE'>Cuba</ent>. Kerry's staff report charges that "<ent type='GPE'>Hull</ent>...
has been identified by a wide range of sources, including Eden Pastora,
mercenaries, <ent type='GPE'>Costa Rica</ent>n officials, and <ent type='NORP'>contra</ent> supporters as "deeply
involved with military support for the <ent type='NORP'>contras</ent>...and has been identified by
a wide-range of sources...as a <ent type='ORG'>CIA</ent> or <ent type='ORG'>NSC</ent> liaison to the <ent type='NORP'>contras</ent>."</p>
<p> According to Steven Carr and Peter Glibbery, two mercenaries based on
land operated by <ent type='GPE'>Hull</ent> who were captured by the <ent type='GPE'>Costa Rica</ent>n Rural Guard in
1985, <ent type='GPE'>Hull</ent> introduced himself to them as "the chief liaison for the FDN
(<ent type='ORG'>National Democratic Force</ent>) and the <ent type='ORG'>CIA</ent>." <ent type='GPE'>Hull</ent> received $10000 a month
from the <ent type='ORG'>NSC</ent>, according to the report. The <ent type='ORG'>NSC</ent> denies having made payments
to <ent type='GPE'>Hull</ent>.</p>
<p> <ent type='GPE'>Hull</ent> has denied that he is assisting the <ent type='NORP'>contras</ent> and that he is
working for the U.S. government.</p>
<p> Sheehan said that the cocaine is flown from the land operated by <ent type='GPE'>Hull</ent>
to <ent type='GPE'>Memphis</ent> and then to <ent type='GPE'>Denver</ent>. The drug is also packed into container ships
at the <ent type='GPE'>Costa Rica</ent>n port of Limon and transported to <ent type='GPE'>Miami</ent>, <ent type='GPE'>New Orleans</ent> and
<ent type='GPE'>San Francisco</ent>.</p>
<p> Francisco <ent type='NORP'>Chanes</ent>, a <ent type='NORP'>Cuban</ent>-American, is the major importer and
distributor of the cocaine coming in from <ent type='GPE'>Costa Rica</ent>, according to the
suit. Sheehan said he learned of <ent type='NORP'>Chanes</ent>' role from Drug Enforcement
<ent type='ORG'>Administration</ent> agents who investigated <ent type='NORP'>Chanes</ent>, <ent type='ORG'>Corbo</ent> and Vidal.</p>
<p> During a January 1986 interview with <ent type='ORG'>FBI</ent> agents, Garcia said he told
the agents that <ent type='NORP'>Chanes</ent> and <ent type='ORG'>Corbo</ent> were also involved in the <ent type='NORP'>contra</ent> supply
operation.</p>
<p> Garcia said the agents responded by saying that <ent type='NORP'>Chanes</ent> and <ent type='ORG'>Corbo</ent> were
already the subjects of a <ent type='ORG'>FBI</ent> narcotics trafficing investigation. <ent type='ORG'>Mattes</ent>,
Garcia's attorney who was present at the interview, said he also heard the
agents say that the <ent type='ORG'>FBI</ent> was investigating <ent type='NORP'>Chanes</ent> and <ent type='ORG'>Corbo</ent>.</p>
<p> Sheehan said money from the sale of cocaine is deposited in one bank
in <ent type='GPE'>Miami</ent> and two in <ent type='LOC'>Central America</ent> and then withdrawn to purchase weapons
and explosives.</p>
<p> Garcia said he was personally involved in a March 1985 shipment of 6
tons of arms to <ent type='GPE'>Costa Rica</ent> from <ent type='GPE'>Miami</ent>. In July 1986, an official from the
U.S. Attorney's office in <ent type='GPE'>Miami</ent> confirmed to the <ent type='GPE'>Miami</ent> Herald that "we now
believe there were some weapons" illegally shipped to the <ent type='NORP'>contras</ent> by their
U.S. supporters from <ent type='ORG'>the Fort Lauderdale International</ent> airport in 1985.</p>
<p> Garcia said he saw both these weapons and three kilograms of cocaine
stored at the home of <ent type='NORP'>Chanes</ent> in <ent type='GPE'>Miami</ent> in the company of <ent type='NORP'>Chanes</ent> and Carr.</p>
<p> "They cocaine was kept in a dresser, about ten feet away from the
weapons. Carr told me that the three keys (kilograms) was what was left
from a larger shipment," Garcia said.[EP</p>
<p> He said he had no direct evidence that the weapons in <ent type='NORP'>Chanes</ent>' home
were purchased with the proceeds from the sale of cocaine. He said that
Carr told him that the three kilograms were part of a larger shipment of
cocaine brought to <ent type='GPE'>the United States</ent> from <ent type='GPE'>Costa Rica</ent> in container ships
belonging <ent type='ORG'>Ocean Hunter</ent>, a seafood importing company owned by <ent type='NORP'>Chanes</ent>.</p>
<p> Garcia said he helped load the weapons into a van which were then
taken to the aiport in <ent type='GPE'>Miami</ent>. Glibbery said he witnessed the arrival of
these weapons on airstrips located on land operated by <ent type='GPE'>Hull</ent> in <ent type='GPE'>Costa Rica</ent>,
according to the Kerry report.</p>
<p> The suit also names Theodore <ent type='ORG'>Shackley</ent>, former <ent type='ORG'>CIA</ent> associate deputy
director for world wide covert operations, and retired <ent type='ORG'>Army</ent> Gen. John
Singlaub as the main weapons suppliers.</p>
<p> According to the suit, <ent type='ORG'>Shackley</ent> "knowingly accept(ed) the proceeds
from illegal sales of narcotics in payment for illegal arms shipments."
Singlaub has made "admissions to various reporters that he has sent guns
and bullets to the <ent type='NORP'>contras</ent>," according to the report.</p>
<p>********************
<ent type='ORG'>Reasearch and Editorial Assistance</ent>: Connie Blitt</p>
<p> Articles by Vince Bielski (<ent type='GPE'>San Fransisco</ent>-based) and Dennis Bernstein
(new <ent type='GPE'>York</ent>) have appeared in <ent type='ORG'>Newsday</ent>, <ent type='ORG'>Philadelphia Inquirer</ent>, Plain Dealer,
<ent type='GPE'>Denver</ent> Post, <ent type='ORG'>Dallas Times Herald</ent>, <ent type='ORG'>Dallas Morning News</ent>, <ent type='ORG'>Baltimore Sun</ent>, San
Fransisco Examiner, <ent type='ORG'>Oakland Tribune</ent>, San Jose <ent type='ORG'>Mercury</ent>, <ent type='ORG'>Arizona Daily Star</ent>,
<ent type='ORG'>Seattle Times</ent>, Minnieapolis Star and <ent type='ORG'>Tribune</ent>, and others.
--------------------------------------------------------------------------</p>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,81 @@
<xml>
<p> A QUICK LESSON IN DO-IT-YOURSELF EMBALMING</p>
<p>FROM 'THE BATHROOM ALMANAC' BY GUS MCLEAVY (<ent type='ORG'>FREDERICK FELL PUBLISHERS</ent>, INC.)</p>
<p>TYPED IN 80 COLUMNS BY BIG BAD BARBARIAN (PARDON MY BAD TASTE.)</p>
<p> TO BEGIN, YOU'LL NEED THREE TO SIX GALLONS OF EMBALMING FLUID. IF YOU
CAN'T FIND A BRAND NAME FLUID YOU CAN MIX YOUR OWN, USING <ent type='ORG'>DYED</ent> AND <ent type='ORG'>PERFUMED</ent>
FORMALDEHYDES, GLYCERINE, BORAX, PHENOL, <ent type='ORG'>ALCOHOL</ent>, AND WATER. THE PROPORTIONS
AREN'T TOO IMPORTANT TO THE FINISHED PRODUCT, AS DR. JESSE CARR WILL EXPLAIN
LATER.</p>
<p> FIRST OF ALL, THE MOUTH MUST BE SEWN TOGETHER AT THE INSIDE OF THE LIPS.
(THE NEEDLE IS BROUGHT OUT THROUGH THE NOSTRIL, USUALLY THE LEFT ONE.) THEN
YOU TAKE A TROCAR, A LONG HOLLOW NEEDLE ATTACHED TO A <ent type='ORG'>TUBE</ent>. DRAIN THE CONTENTS
OF THE <ent type='ORG'>ABDOMINAL</ent> AND CHEST CAVITIES, AND REPLACE THE REMOVED MATTER WITH CAVITY
FLUID. PUMP OUT THE CIRCULATORY SYSTEM, REPLACE THE BLOOD AND PLASMA WITH THE
ENBALMING SOLUTION, AND THAT'S ABOUT IT. IN EIGHT TO TEN HOURS THE TISSUES WILL
BE FIRM AND DRY, AND READY FOR 'COSMETIC RESTORATION.'</p>
<p> CAREFUL, THOUGH! REGULAR ENBALMING FLUID WORKS DIFFERENTLY ON VARIOUS
BODIES ACCORDING TO THE CAUSE OF DEATH. WHILE IT WILL GIVE A PLEASANT PINK GLOW
TO THE FLESH OF A VICTIM OF CARBON MONOXIDE POISONING, WHEN IT IS USED ON
SOMEONE <ent type='ORG'>WHO</ent> DIED OF JAUNDICE IT IMPARTS A GREEN TINGE THAT REQUIRES A LOT OF
MAKE-UP TO CONCEAL.</p>
<p> ALTHOUGH IT IS WIDELY BELIEVED TO PRESERVE A BURIED BODY, EMBALMING IN
FACT DOES NO SUCH THING. IF IT HAS ANY WORTHWHILE PURPOSE AT ALL, IT IS TO MAKE
THE OPEN <ent type='ORG'>CASKET</ent> FUNERAL MORE PALATABLE. DR. JESSE CARR IS NO FRIEND OF THE
MORTUARY INDUSTRY, BUT HE IS A FORMER CHIEF OF PATHOLOGY AT SAN FRANCISCO
GENERAL HOSPITAL AND PROFESSOR OF PATHOLOGY AT THE UNIVERSITY OF CALIFORNIA
MEDICAL SCHOOL, AND HERE'S WHAT HE HAS TO SAY ABOUT IT:</p>
<p> AN EXHUMED BODY IS A <ent type='ORG'>REPUGNANT</ent>, MOLDY, FOUL-LOOKING OBJECT. IT'S NOT
THE IMAGE OF ONE <ent type='ORG'>WHO</ent> HAS BEEN LOVED . . . THE BODY ITSELF MAY BE
INTACT, AS FAR AS CONTOURS AND SO ON; BUT THE SILK LINING OF THE
<ent type='ORG'>CASKET</ent> IS ALL STAINED WITH BODY FLUIDS, THE WOOD IS ROTTING, AND THE
BODY IS COVERED WITH MOLD . . . IF YOU SEAL UP A <ent type='ORG'>CASKET</ent> SO IT IS
MORE OR LESS <ent type='ORG'>AIRTIGHT</ent>, YOU SEAL IN THE <ent type='ORG'>ANAEROBIC</ent> BACTERIA - THE KIND
THAT <ent type='ORG'>THRIVE</ent> IN AN AIRLESS ATMOSPHERE, YOU SEE. THESE ARE THE
PUTREFACTIVE BACTERIA, AND THE RESULTS OF THEIR GROWTH ARE PRETTY
HORRIBLE . . . YOU'RE BETTER OFF WITH A <ent type='ORG'>SHROUD</ent>, AND NO <ent type='ORG'>CASKET</ent> AT
ALL.</p>
<p> ///////////////////////////////////////////////////////
// The PIRATES' HOLLOW //
// 415-236-2371 //
// over 12 Megs of Elite Text Files //
// ROR-ALUCARD //
// <ent type='NORP'>Sysop</ent>: Doctor Murdock //
// C0-<ent type='NORP'>Sysop</ent>s: That One, Sir Death, Sid Gnarly &amp; Finn //
// //
// "The Gates of Hell are open night and day; //
// Smooth is the Descent, and <ent type='ORG'>Easy</ent> is the way.." //
///////////////////////////////////////////////////////</p>
<div> </div>
<p>X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X</p>
<p> Another file downloaded from: NIRVANAnet(tm)</p>
<p> &amp; <ent type='ORG'>the Temple</ent> of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102</p>
<p> Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.</p>
<p> Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.</p>
<p> "Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
</p></xml>

View File

@ -0,0 +1,503 @@
<xml>
<p> ."". "NO STONE UNTURNED"
." ". R A R A T REPORT
~~ ~~
-----------------------------------------------------------------------
BILL CROUSE, EDITOR FEB/MARCH 87 (c) 1987 NUMBER 2
-----------------------------------------------------------------------</p>
<p> POST WWII SIGHTINGS </p>
<p> The cold war began shortly after WWII. <ent type='GPE'>Turkey</ent> became one of the stages
where this drama of confrontation between superpowers was played. Along with
<ent type='LOC'>Jupiter</ent> missiles, the <ent type='NORP'>Americans</ent> set up elaborate listening devices in <ent type='GPE'>Turkey</ent>
to monitor <ent type='NORP'>Soviet</ent> activity. Cat and mouse games to gauge <ent type='NORP'>Soviet</ent> readiness
were played out almost on a daily basis. The <ent type='NORP'>Americans</ent> sent fighter planes to
the proximity of the <ent type='NORP'>Soviet</ent> border while the men on the ground checked the
responses of the <ent type='NORP'>Soviet</ent> defenses. Captain Gregor <ent type='ORG'>Schwinghammer</ent>, now a <ent type='ORG'>Pan</ent> Am
instructor and pilot, was one of the players in this game. Since <ent type='GPE'>Ararat</ent> is
near the <ent type='NORP'>Soviet</ent> border, there were many fly-bys around the mountain. During
one such excursion, a <ent type='NORP'>Turkish</ent> pilot participating in the maneuvers volunteered
to show some of the <ent type='NORP'>American</ent> pilots Noah's <ent type='ORG'>Ark</ent>. <ent type='ORG'>Schwinghammer</ent> took all this in
a light vein but went along. </p>
<p> The editor of AR discussed this incident with <ent type='ORG'>Schwinghammer</ent> about two years
ago. The only thing really clear in his memory was that it definitely looked
like a structure of some kind. He likened it to the long rectangular chicken
houses he had seen in the <ent type='LOC'>midwest</ent>. It didn't really hit him that this could
be Noah's <ent type='ORG'>Ark</ent> until he saw the movie In Search of Noah's <ent type='ORG'>Ark</ent> on TV.
<ent type='ORG'>Schwinghammer</ent> still is not sure what it was but he maintains it definitely was
a structure. </p>
<p> An interesting thing to note here about <ent type='ORG'>Schwinghammer</ent> is that he later flew
many bombing missions in <ent type='GPE'>Vietnam</ent> with the particular responsibility of
spotting the targets on the ground. We mention this to point out that the man
was trained to spot objects from a plane.
To read more on the <ent type='ORG'>Schwinghammer</ent> experience, see <ent type='ORG'>Berlitz</ent>' first book
Doomsday 1999 A.D. and the update in his latest book mentioned in this issue.
<ent type='ORG'>Schwinghammer</ent> now claims that the object he saw looked like the <ent type='NORP'>Hagopian</ent>
description as drawn by Elfred Lee. </p>
<p> <ent type='ORG'>Schwinghammer</ent> had a recollection of the U-2 pilots also seeing something in
photos. They flew out of the same base in <ent type='GPE'>Adana</ent>. As you will recall from the
Gary Powers' incident the <ent type='NORP'>Americans</ent> were flying reconnoissance missions deep
into the heart of the <ent type='NORP'>Soviet</ent> Union. On many occasions this took them right
over <ent type='GPE'>Ararat</ent>. </p>
<p> In the spring of 1985, one Sunday morning, we received a phone call at 7:00
a.m. with the caller excitedly telling us that he knew someone who had seen
photographs of the <ent type='ORG'>Ark</ent> while in the <ent type='ORG'>Air Force</ent>. After garnering some of the
facts, we made an appointment to see this man to check out his story.
After his basic training, this man spent most of his four years in the Air
Force in top security work at a large base in the <ent type='LOC'>midwest</ent>. His job was to
process film as it was brought into the lab from around the world.
Apparently, our U-2's were surreptitiously filming the whole world, even
friendly countries, in order to pin-point possible bomb targets when and if
this action ever became necessary. Our man remembers film coming in from
eastern <ent type='GPE'>Turkey</ent>. After he and others processed the film it was turned over to
another crew who were responsible for the analysis. What he remembers is the
perplexity these men had over a certain object high in the snows of <ent type='GPE'>Ararat</ent>. </p>
<p> It seems they could not figure out what the <ent type='NORP'>Turks</ent> could have built of that
size at that extreme altitude. What could it be? Finally, he recalled
hearing one of them jokingly exclaim: "It must be Noah's <ent type='ORG'>Ark</ent>!" Being a
<ent type='NORP'>Christian</ent> at the time, our friend pricked up his ears and went over for a
closer look. Basically, what he remembers is a barge-like object sticking out
of the ice with most of it still buried. Since he was in top security he told
no one of the incident. Being a distant event he apparently felt it was O.K.
to now share the experience with the hope that it might yield some clue to the
<ent type='ORG'>Ark</ent>'s whereabouts. </p>
<p> Upon discharge from the <ent type='ORG'>Air Force</ent> this gentleman enrolled in a <ent type='NORP'>Baptist</ent>
college near this <ent type='ORG'>Air Force</ent> base to prepare for the ministry. While at this
college, he recalls another incident while strolling around the student lounge
one day. To his surprise he noticed on the bulletin board a photo cut out of
a newspaper with the caption "Could this be Noah's <ent type='ORG'>Ark</ent>?" He did a double take
when he realized it was from the roll he had processed only a few years
previously in the lab. He wondered who dared disclose the photograph because
he remembered how his superiors drilled into them the subject of secrecy and
the penalty involved. </p>
<p> To this day he does not know if it was Noah's <ent type='ORG'>Ark</ent> but he wonders what else
it could have been. This man (who wishes to remain anonymous) was once a
pastor of a large <ent type='NORP'>Baptist</ent> church in <ent type='GPE'>Kansas City</ent>. Today he is a marriage and
family counselor in a large clinic in <ent type='GPE'>Dallas</ent>. We know this man personally and
can attest that his reputation is impeccable.
To add further authenticity to this story, in the summer of '85, Col. Jim
Irwin met an <ent type='NORP'>American</ent> two-star General in <ent type='GPE'>Turkey</ent> who also claimed to have seen
a file labeled Noah's <ent type='ORG'>Ark</ent> and a slide purporting to be the <ent type='ORG'>Ark</ent> while stationed
at an <ent type='ORG'>Air Force</ent> base in the <ent type='LOC'>midwest</ent> (not the same base). We are not privy to
all the details of the General's testimony, but as far as we know, nothing new
has turned up despite the General's promise to try and locate the photographs. </p>
<p> In 1953 an <ent type='NORP'>American</ent> employed by an <ent type='NORP'>American</ent> oil company not only claimed to
have seen the <ent type='ORG'>Ark</ent> while flying by in a helicopter, he also took a number of
photographs. Upon returning to the states this man, George J. Greene, was
unsuccessful in trying to raise support for a ground expedition. Some time
later he died, or was murdered in <ent type='LOC'>South America</ent>. Many people however, saw his
photographs, too many in fact for this to have been a fictitious story. A
more complete account of Greene's discovery can be found in Noah's <ent type='ORG'>Ark</ent>: Fact
or Fable by Violet <ent type='ORG'>Cummings</ent> (213ff). </p>
<p> For two very good reasons we are now 99% convinced that what George Greene
saw was a large rock formation that is known to most <ent type='ORG'>Ark</ent> researchers. The
particular formation we refer to came to light in the mid-seventies as a
result of an expedition led by Tom Crotser of the Holy Ground Mission. The
movie, In Search of Noah's <ent type='ORG'>Ark</ent>, which we refer to elsewhere in this issue,
zooms in on the Crotser photograph and shows an object with planking clearly
visible. <ent type='ORG'>Ark</ent> researchers have looked this photo over carefully and have
questioned its authenticity. It appeared to have been retouched. We now know
for a fact that it was indeed retouched, but not with any fraudulent intent,
so says Mr. David Fry, of <ent type='GPE'>Cleburne</ent>, TX a former acquaintance of Crotser's. </p>
<p> Fry met Crotser in a photo print shop in <ent type='GPE'>Dallas</ent> where he noticed Crotser's
scenic mountain photos. When he was informed that the mountain scenery was
<ent type='GPE'>Ararat</ent>, the two learned they had a mutual interest in <ent type='ORG'>Biblical</ent> history. Fry
agreed to assist Crotser in the analysis of the photo containing an
interesting ship-shaped object. Since they had shots of the object from
different angles Fry studied it stereo-scopically. While doing so, he noticed
lines that seemed to run parallel length-wise on the object when viewed
through a magnifying lense. Fry simply enhanced these lines and presented the
photo to Crotser who then proceded to publicly proclaim the lines as planking
on a structure. He also began announcing to the press that the structure was
Noah's <ent type='ORG'>Ark</ent>. </p>
<p> The object in question is positively located on the eastern rim of the
Ahora Gorge at approximately 12000 feet. It was photographed by Bob <ent type='LOC'>Stuplich</ent>
from the air in 1983 and by expeditions on the ground. </p>
<p> There are two reasons to link the Greene and Crotser sightings. Our first
reason for concluding that Greene's and Crotser's objects are one and the same
is their similarity to the sketch made by Fred Drake who claimed to have
viewed Greene's photographs. </p>
<p> Mr. Fry was kind enough to lend us a photograph of the object which he
said was made from one of the Crotser's slides. The object was shot at eye
level from the western rim of the gorge much the same as Greene would have
done from the helicopter, only from further away. </p>
<p> To us the similarity is striking! The object lies almost due north and
south exactly as Greene described it. The object is on a kind of rock shelf
over-looking a shear drop-off. When viewing <ent type='LOC'>Stuplich</ent>'s aerial photos it
appears that a side shot would also look just as Drake sketched it. <ent type='ORG'>Cummings</ent>
also reports that Greene was flying over the northeastern side of the mountain
(p.219). </p>
<p> The fact that the object is at about 12000 feet also supports our
contention. This is about the ceiling for a helicopter in the early '50s. We
did some checking on this awhile back and found that there was a high
performance <ent type='NORP'>French</ent> helicopter that could have flown to the summit of the
mountain, but it is doubtful that Greene would have had one of these at his
disposal. </p>
<p> This of course does not seal the case in concrete. We will never know for
certain until we actually see Greene's photos. However, we said that there
were two reasons why we are convinced that Greene saw the same rock formation
that Crotser photographed in 1974. </p>
<p> Rod Younquist, engineer and veteran of several trips to <ent type='GPE'>Ararat</ent>, related to
AR that he once met members of Crotser's expedition who informed him that they
had shown their photographs to people who had also viewed Greene's missing
photographs. Upon viewing the Holy Ground Mission photographs their response
was: "Oh, where did you get George Greene's photographs?" Hence our second
reason is the fact that Greene's friends mistakenly identified the Crotser
photographs as Greene's. </p>
<p> When Fry saw some of our slides of this object from different vantage
points he too became doubtful. However, he said it really looks convincing
when viewed stereo-scopically. He would like to see more photographs to have
added confirmation. We agree. Perhaps one of our readers may have a close up
of this formation. </p>
<p>(In subsequent issues we will continue our investigation of post WWII
sightings.) </p>
<p>EVOLUTION <ent type='ORG'>CONTRA</ent> CHRISTIANITY </p>
<p> Why are evolutionists so opposed to the subject of special creation? Is
it due to the overwhelming superiority of the evidence? We think not. The
real reason these two positions are so at loggerheads is much deeper than
evidence. The conflict begins back at the presuppositional level.
<ent type='ORG'>Presuppositions</ent> are those beliefs that are foundational; they are taken in
faith and they dictate how one interprets the data of experience. All world
views rest on these presuppositions or assumptions. What we have between
Evolution and <ent type='NORP'>Christian</ent>ity is a collision of world views. We thought it would
be helpful to our readers to pinpoint what some of these conflicting
assumptions are. First, we will list these side by side: </p>
<p> <ent type='NORP'>Christian</ent> Evolutionary </p>
<p> 1. Man fell from a 1. Living things
higher estate. are evolving
(devolution) to higher forms.
2. There is a qual- 2. Only a quant-
itative difference itative differ-
between man and the ence.
animals. </p>
<p> 3. God's providence 3. Chance.
in nature. </p>
<p> 4. True moral values. 4. Only mores.
5. Open universe. 5. Closed universe.
6. Man needs re- 6. Man needs more
demption. time. </p>
<p> 7. There is purpose 7. No purpose.
in the universe. </p>
<p> In future issues it is our plan to expound on these assumptions point by
point so our readers will know from whence the Creation-Evolution controversy
arises. </p>
<p>ARK MOVIES </p>
<p> We've had several responses to our inquiry in the January issue concerning
the Bart LaRue movie, The <ent type='ORG'>Ark</ent> of Noah. We now have our own copy and have
viewed it several times with great interest. Our tape library now contains
quite a few hours of various <ent type='ORG'>Ark</ent> films and we thought it might be a service to
our readers to review what we've learned about other <ent type='ORG'>Ark</ent> films and where our
readers might have access to them. </p>
<p> What intrigues us is that more than four films about the search for Noah's
<ent type='ORG'>Ark</ent> appeared in one year, 1976! Incidentally, we know of at least eight or
nine books on the subject of the <ent type='ORG'>Ark</ent> and the Flood that appeared between '72
and '76. Certainly this must have inspired film-makers to take advantage of
the interest generated by the books. </p>
<p> We don't know who qualifies as being first, but two of the films produced
that year are feature-length and were shown in theaters. A videotape of the
aforementioned Bart LaRue film can still be ordered from: United
Entertainment, Inc., 6535 E. Skelley Dr., <ent type='GPE'>Tulsa</ent>, OK 74145. The cost is
$39.95. Their phone number is 918-622-6460. </p>
<p> This movie is of interest to <ent type='ORG'>Ark</ent> researchers because of its historic
footage from <ent type='ORG'>Navarra</ent>, Search Foundation, and the Archaeological Research
Foundation. The movie itself plods along, contains many historical
inaccuracies, and is anti-<ent type='NORP'>Turkish</ent> in tone. LaRue himself is persona non-grata
in <ent type='GPE'>Turkey</ent> due to his illegal climb of the mountain while filming for the
movie. Viewers will also have difficulty discerning the real thing from what
is re-enactment. </p>
<p> Another major feature length movie, In Search of Noah's <ent type='ORG'>Ark</ent>, was made in
1976 by <ent type='ORG'>Sunn Classic Pictures</ent>. A major book of the same title was released
the same year. The authors of the book are Dave Balsiger and Charles E.
<ent type='ORG'>Sellier</ent>, Jr. Balsiger was the ghost-writer for the English version of
<ent type='ORG'>Navarra</ent>'s book: Noah's <ent type='ORG'>Ark</ent>: I Touched It. <ent type='ORG'>Sellier</ent> is also the producer of the
family-oriented TV show "<ent type='ORG'>The Life and Times</ent> of <ent type='ORG'>Grizzly Adams</ent>." In Search of
Noah's <ent type='ORG'>Ark</ent> has been seen by millions and is frequently shown on late night TV.
A video of this movie can probably be ordered from your local video store.
This is a better film, but it leaves you with the impression that the <ent type='ORG'>Ark</ent> has
been found and that the evidence is more credible than we would allow. </p>
<p> Ken Anderson Films of <ent type='GPE'>Winona Lake</ent>, IN produced the film Noah's <ent type='ORG'>Ark</ent> and the
<ent type='ORG'>Genesis</ent> Flood. Jack Dabner, now with Seven <ent type='ORG'>Star Productions</ent>, in <ent type='GPE'>Long Beach</ent>,
CA headed up the research effort and narrated this film. It appeared first in
1976. It is approximately an hour in length and rents for $52.
Unfortunately, it is not available on videotape. The film can be rented
through local rental agencies who handle Ken Anderson films. </p>
<p> Films for Christ, distributes a film mainly dealing with the <ent type='ORG'>Genesis</ent>
Flood. It has been translated into many languages and is still used
frequently in churches and by missionaries. The emphasis is apologetic and
evangelistic. Its title is The World that Perished. It contains an excellent
presentation of the many flood stories found in cultures on all the continents
of the world. On the whole, it is a very instructional film. It is about 35
minutues in length. A video of this film can be rented for $27 from Films for
Christ, 2628 W. Birchwood Cir., <ent type='ORG'>Mesa</ent>, AZ 85202. We were told that this film
is based on a book of the same name authored by Dr. John Whitcomb of Grace
Theological Seminary. We are acquainted with this book, and can attest that
it is a work of high quality. We highly recommend it to our readers. </p>
<p> Last summer, a <ent type='NORP'>Dutch</ent> film crew joined the Irwin team for the purpose of
making a documentary for <ent type='NORP'>Dutch</ent> television. A video (VHS) of this is available
from <ent type='ORG'>High Flight Foundation</ent>, Box 1387, <ent type='GPE'>Colorado Springs</ent>, CO 80901. Purchase
price is $20, or $10 to rent. The title of this video is: Waar is De <ent type='ORG'>Ark</ent> Van
Noach? Some of the dialogue is in <ent type='NORP'>Dutch</ent> but the majority is English. It
contains footage from a rare flight over the mountain, has a sense of drama,
and contains clear gospel testimonies by Col. Irwin and his team members. </p>
<p> We are also aware of another film released in '86 produced by Montana
Film, a <ent type='ORG'>German Company</ent>. This film is 43 minutes in length and has been shown
on <ent type='NORP'>German</ent> television. This company films mountain-climbing events all over
the world and the fact that they included footage about the search for the <ent type='ORG'>Ark</ent>
was incidental to their purpose. Dr. John Baumgardner and Ron Wyatt are
interviewed on the film. It also apparently contains some spectacular footage
shot on the summit of <ent type='GPE'>Ararat</ent> and the <ent type='GPE'>Parrot</ent> glacier area. It leaves you with
the impression that the ship-shaped formation southeast of <ent type='GPE'>Ararat</ent> is likely
the <ent type='ORG'>Ark</ent> of Noah. An English-version video cassette is available, but we are
not aware of any U.S. distributors at this time. Inquiries can be sent to
their <ent type='NORP'>German</ent> address: <ent type='ORG'>Montana Film</ent>, Am Fort Elisabeth 15, D-6500 <ent type='GPE'>Mainz</ent>, W.
<ent type='NORP'>German</ent>y. </p>
<p> We have knowledge that a <ent type='NORP'>Canadian</ent> film crew was present at <ent type='GPE'>Ararat</ent> in '85
with the intent of making a documentary for <ent type='NORP'>Canadian</ent> Broadcasting, however, we
have no details at this time as to whether or not one was made or shown in
<ent type='GPE'>Canada</ent>. </p>
<p> To our knowledge, these are all the "<ent type='ORG'>Ark</ent> Movies" formally "published." If
any of our readers are aware of others please let us know as we would like to
share that information. </p>
<p><ent type='ORG'>GOPHER</ent> WOOD---A PROCESS? </p>
<p>submitted by
Dr. Don Shockey
<ent type='GPE'>Albuquerque</ent>, NM </p>
<p> When asked what the <ent type='ORG'>Ark</ent> of Noah was constructed from we all immediately
know the answer. We can respond without hesitation by replying--"gopher
wood." That is correct, and is exactly what the KJV of the Bible states.
<ent type='ORG'>Genesis</ent> 6:14: "make thee an ark of gopher wood." The New International
Version says it a little differently: "So make yourself an ark of cypress
wood." The footnote tells the reader that cypress would be more likely the
wood of choice since the Hebrew meaning of go'phir is uncertain. Still no
problem since we know without reservation that whatever God told Noah would be
the absolute best to sustain the craft during the deluge to follow. One of
the primary objectives of the re-discovery of the <ent type='ORG'>Ark</ent> will be to
scientifically examine the wood and attempt to resolve once and for all what
type of wood was used in its construction. All seem to agree that it would be
some type of hard wood. Guesses have included white oak, cypress, etc. even a
type of tree no longer on earth has been suggested. </p>
<p> The following is offered to our AR readers and <ent type='ORG'>Ark</ent> researchers as a
possible interpretation of the term "gopher wood." </p>
<p> Recently, during a professional seminar in <ent type='GPE'>Texas</ent> a doctor approached me,
and a conversation began when I learned he was born in <ent type='GPE'>Israel</ent> and has a mother
who is 94 still living in <ent type='GPE'>Jerusalem</ent>. I asked him what gopher wood, as stated
in <ent type='ORG'>Genesis</ent>, really meant? The following is his reply: </p>
<p> "From a certain kind of resinous tree, when one makes an incision into the
bark and collects the resin or sap, he can use it as glue by applying it at
the joint between two pieces of wood. After letting it dry over-night, he
will not be able to break the joint. The wood will break before the joined
seam. This has been used in our area of the world for centuries, although it
is not used very often in modern times since this sap will discolor any wood
it happens to come into contact with. This is what Noah used to construct the
<ent type='ORG'>Ark</ent>. `Gopher wood' or `<ent type='ORG'>gophering</ent>' is a process not a particular tree."
(Emphasis mine). </p>
<p> He further suggested that Noah used the "<ent type='ORG'>gophering</ent> process" to fashion the
large timbers from many different pieces of hardwood that could have been some
type of hard oak tree. What, specifically, we can only guess. This
information turned on a light within my thinking. What he described would be
like our process of making plywood. If this is a valid assumption, then Noah
could have constructed large timbers needed of any size, thickness, or length,
without being dependent upon single, mammoth trees to accomplish God's
command. The original meaning should be traced back to determine if a gopher
wood process has any validity. As of this writing, a minister from
<ent type='GPE'>Albuquerque</ent> is to visit the Holy Land and will attempt to secure information
about this resin which we will test. I will update AR on this project. </p>
<p>BOOKS </p>
<p> In the November issue we noted that Charles <ent type='ORG'>Berlitz</ent>, author of the Bermuda
Triangle would be authoring a book on Noah's <ent type='ORG'>Ark</ent> and the Flood. We are
pleased to announce that this book is now available in major bookstore chains.
The book is titled The Lost Ship of Noah. It is published by G.P. Putnam's
Sons, and sells for $17.95 (hardback), 187 pp. </p>
<p> <ent type='ORG'>Berlitz</ent> is an author of the Erich von Daniken mold. He is particularly
interested in the myths and symbols of ancient cultures. It is his thesis
that behind them are actual historical events from which they arose. </p>
<p> This new book by <ent type='ORG'>Berlitz</ent> is an elaboration of a former book--Doomsday 1999
A.D. published in 1981. He believes there was not only a great world-wide
catastrophe in the past, i.e. a world-wide flood, but that there will likely
be another. He bases this prediction on two things: the course of modern
events whereby man seems to be destroying his environment, and the numerous
prophecies from a variety of cultures and religions. He sees the majority of
these prophecies as being authentic revelations that are this very moment
moving toward fulfillment. </p>
<p> In The Lost Ship of Noah <ent type='ORG'>Berlitz</ent> seeks to bring his readers up-to-date on
the search for Noah's <ent type='ORG'>Ark</ent> on Mt. <ent type='GPE'>Ararat</ent>, and sets forth the cases for a
previous world-wide deluge, and the probability of future global destruction.
Since most of the previous books on the <ent type='ORG'>Ark</ent> were written in the 70s <ent type='ORG'>Berlitz</ent>
does those who are interested in the search a service. He is not writing from
a scholarly perspective. However, he is a reporter who digs into his subject
and writes well. In addition we must point out that <ent type='ORG'>Berlitz</ent> is not necessarily
writing from a <ent type='NORP'>Christian</ent> perspective. He believes that there were probably
many arks that saved representatives of their respective cultures from the
catastrophic flood-waters. In fact, he cites evidence of other ships being
found in mountains and anticipates that more will undoubtedly be uncovered
(see p. 166ff). </p>
<p> All <ent type='ORG'>Ark</ent> enthusiasts will appreciate the many photos by Ahmet Arslan and Jay
Bitzer, who was this editor's photographer in a 1985 expedition. While most
<ent type='NORP'>Christian</ent>s will not accept his multiple ark theory we commend him for making a
clear case for a universal flood. SUMMER OF '87 </p>
<p> About this time of the year, the <ent type='ORG'>Ark</ent> Grapevine is humming with news about
expedition plans, new objects spotted in old photos, and new theories about
location, etc. </p>
<p> Permits are generally applied for in January. Plans are being made to
raise funds. Intense research is being carried out. Regular calls are made
to the <ent type='NORP'>Turkish</ent> embassy, and there is an "air" of secrecy. </p>
<p> AR is not a "tell all" sheet. If someone informs us about their plans or
research in confidence, we don't print it. Right now we are aware of some
pretty exciting research going on and some interesting developments that we
hope to report to you at the right time. </p>
<p> Currently we are aware of about 7 or 8 groups that are applying for
research permits for Mt. <ent type='GPE'>Ararat</ent>. Foreign groups are also getting involved.
We are aware of <ent type='NORP'>French</ent>, <ent type='NORP'>Norwegian</ent> and <ent type='NORP'>Japanese</ent> groups who are interested in
the search for the <ent type='ORG'>Ark</ent>. There is the possibility that a helicopter will be
used this summer for the first time. They will need adequate financing and
much prayer to pull this off. </p>
<p> It is also our hope that the ship-shaped formation southeast of <ent type='GPE'>Ararat</ent> will
be properly excavated this summer. We will also endeavor to keep you up-to-
date on this strange shape which the <ent type='NORP'>Turkish</ent> government is claiming to be the
<ent type='ORG'>Ark</ent> of Noah.
</p>
<p>POLITICAL AND WEATHER WATCH </p>
<p> We are still getting unconfirmed reports of a horrendous winter in <ent type='NORP'>Eastern</ent>
<ent type='GPE'>Turkey</ent>. We have news reports stating that areas in <ent type='GPE'>Turkey</ent> and <ent type='GPE'>Greece</ent> have
received snow where it has never snowed before! </p>
<p> On the political side we are happy to report that the U.S. has signed a new
five year treaty with <ent type='GPE'>Turkey</ent>. Our government will be paying $1 billion for
the privilege of maintaining our military bases. </p>
<p> The following article appeared in <ent type='ORG'>Insight</ent>, Mar. 30, 1987: </p>
<p> "A report from <ent type='GPE'>Ankara</ent>'s <ent type='ORG'>Security Department</ent> has accused <ent type='GPE'>Libya</ent> and <ent type='GPE'>Syria</ent> of
supplying arms and logistic support to <ent type='NORP'>Kurdish</ent> separatist terrorists in <ent type='GPE'>Turkey</ent>
and <ent type='GPE'>Iraq</ent>. The allegation was made during the trial of five persons accused of
smuggling arms into <ent type='GPE'>Turkey</ent> from <ent type='GPE'>Syria</ent> for the <ent type='NORP'>Kurds</ent>. Most of the insurgents
are members of the <ent type='NORP'>Kurdish</ent> Labor Party, a <ent type='NORP'>Marxist</ent>-<ent type='NORP'>Leninist</ent> organization with
headquarters in <ent type='GPE'>Syria</ent>. </p>
<p> The groups said to be receiving the supplies are the <ent type='NORP'>Kurdish</ent> Democratic
Party, <ent type='NORP'>Kurdish</ent> Workers Party and <ent type='ORG'>Patriotic Union</ent> of Kurdistan. </p>
<p> According to Western analysts, following the <ent type='NORP'>Turkish</ent> bombing of <ent type='NORP'>Kurdish</ent>
camps in <ent type='GPE'>Iraq</ent> last August, the flow of arms (some believed to be a gift of
<ent type='GPE'>Libya</ent>'s Col. Muammar Quaddafi) across the <ent type='GPE'>Syria</ent>n border is beginning to
increase in numbers and sophistication." </p>
<p> This one appeared in <ent type='LOC'>the Rocky Mountain News</ent>, 3/9/87: </p>
<p> "Assailants believed to be <ent type='NORP'>Kurdish</ent> guerrillas raided a <ent type='NORP'>Turkish</ent> village near
the <ent type='GPE'>Syria</ent>n border, killing six children and two adults, the <ent type='NORP'>Anatolia</ent> news
agency said yesterday. </p>
<p> The assailants fired automatic weapons and hurled hand grenades at two
homes in the village of Acikyol on Saturday night, the news agency said. </p>
<p> Most of the guerrillas operating in the region are linked to the <ent type='NORP'>Kurdish</ent>
Labor Party, which wants to set up an independent <ent type='NORP'>Kurdish</ent> state in eastern and
southeastern <ent type='GPE'>Turkey</ent>." </p>
<p> A note of interest with regard to the previous news article: The incident
referred to took place very close to one of the traditional resting places of
Noah's <ent type='ORG'>Ark</ent>--Nisibis. We will be doing a major article on the other
traditional resting places of Noah's <ent type='ORG'>Ark</ent> in a future issue. </p>
<p>BITS AND PIECES </p>
<p> In the November issue, we mentioned another forthcoming book by Rene
Noorbergen which would defend the thesis that the ship-shaped object south of
<ent type='GPE'>Ararat</ent> is the <ent type='ORG'>Ark</ent>. We have been informed that this book will not be out until
June. </p>
<p>* Back issues of ARARAT REPORT are available on the same donation basis. </p>
<p>* A continuously updated outline and bibliography is available on the search
for Noah's <ent type='ORG'>Ark</ent>. Please send $2.00 for postage and copying. </p>
<p>* A comprehensive bibliography on the subject of "<ent type='ORG'>Kibowtology</ent>" (<ent type='ORG'>Ark</ent> research)
is under preparation. <ent type='ORG'>Target</ent> date: early summer. </p>
<p>* <ent type='NORP'>Christian</ent> Information Ministries, International, which publishes the ARARAT
REPORT, is a faith ministry. That is, we depend on the gifts of God's people
to sustain us. The ARARAT REPORT is sent as a free gift to those who enable
this ministry to continue through their giving. If you own a personal
computer equipped with a modem and are interested in knowing more about THE
INFORMED CHRISTIAN <ent type='ORG'>NETWORK</ent>, write or call to receive a password. All back
issues of ARARAT REPORT are downloadable from our database. THE INFORMED
CHRISTIAN <ent type='ORG'>NETWORK</ent> is a growing library of <ent type='NORP'>Christian</ent> Information that we are
seeking to make available to <ent type='ORG'>the Body</ent> of Christ. </p>
<p>* We would like to make our readers aware of Origins Research &amp; Information
Service, 137 <ent type='ORG'>Oak Crest</ent> Dr., <ent type='GPE'>Lafayette</ent>, LA 70503. For $1.00 they will send an
introductory packet of Creationist material. </p>
<p>* We invite letters to the editor. We will print those that will make a
contribution to the overall discussion.
</p></xml>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,241 @@
<xml><p>
DESIGNER DISEASES</p>
<p> AIDS As <ent type='ORG'>Biological</ent> &amp; Psychological Warfare</p>
<p> by Waves Forrest</p>
<p>Despite repeated denials from <ent type='ORG'>Defense Department</ent> officials,
allegations persist that AIDS is a genetically altered virus,
which has been deliberately released to wipe out homosexuals
and/or non-whites in the U.S. and reduce populations in third
world countries.</p>
<p>At first glance it seems like the epitome of paranoia to accuse
the military of conspiring to exterminate citizens of their own
country, and even some of their own troops. However, the vast
majority of military personnel could be completely unaware of
such a plot in their midst, while a relative handful of traitors
in key positions could conduct it under cover of classified
operations. And the circumstantial evidence is actually quite
compelling, that the AIDS virus was artificially engineered, and
planted in several different locations at about the same time
through vaccination programs, and possibly blood bank
contamination.</p>
<p>At a <ent type='ORG'>House Appropriations</ent> hearing in 1969, the Defense
Department's <ent type='ORG'>Biological</ent> Warfare (BW) division requested funds to
develop through gene-splicing a new disease that would both
resist and break down a victim's immune system. "Within the next
5 to 10 years it would probably be possible to make a new
infective micro-organism which could differ in certain important
respects from any known disease-causing organisms. Most
important of these is that it might be refractory to the
immunological and therapeutic processes upon which we depend to
maintain our relative freedom from infectious diseases." (See -
A Higher Form of Killing: The Secret Story of Chemical and
<ent type='ORG'>Biological</ent> Warfare by R. Harris and J. <ent type='ORG'>Paxman</ent>, p 266, Hill and
<ent type='ORG'>Wang</ent>, pubs.) The funds were approved.</p>
<p>AIDS appeared within the requested time frame, and has the exact
characteristics specified.</p>
<p>In 1972, <ent type='ORG'>the World Health Organization</ent> published a similar
proposal: "An attempt should be made to ascertain whether viruses
can in fact exert selective effects on immune function, e.g.,
by ...affecting T cell function as opposed to B cell function.
The possibility should also be looked into that the immune
response to the virus itself may be impaired if the infecting
virus damages more or less selectively the cells responding to
the viral antigens." (Bulletin of the W.H.O., vol. 47, p 257-
274.) This is a clinical description of the function of the AIDS
virus.</p>
<p>The incidence of AIDS infections in <ent type='LOC'>Africa</ent> coincides exactly with
the locations of the W.H.O. smallpox vaccination program in the
mid-1970's (<ent type='ORG'>London Times</ent>, May 11, 1987). Some 14000 <ent type='GPE'>Haiti</ent>ans
then on UN secondment to Central <ent type='LOC'>Africa</ent> were also vaccinated in
this campaign. Personnel actually conducting the vaccinations
may have been completely unaware that the vaccine was anything
other than what they were told.</p>
<p>A striking feature of AIDS is that it's ethno-selective. The
rate of infection is twice as high among Blacks, <ent type='NORP'>Latinos</ent> and
<ent type='NORP'>Native Americans</ent> as among whites, with death coming two to three
times as swiftly. And over 80% of the children with AIDS and 90%
of infants born with it are among these minorities. "Ethnic
weapons" that would strike certain racial groups more heavily
than others have been a long-standing U.S. <ent type='ORG'>Army</ent> BW objective.
(Harris and <ent type='ORG'>Paxman</ent>, p 265)</p>
<p>Under the current U.S. administration biological warfare research
spending has increased 500 percent, primarily in the area of
genetic engineering of new disease organisms.</p>
<p>The "discovery" of the AIDS virus (<ent type='ORG'>HTLV</ent>3) was announced by Dr.
Robert Gallo at <ent type='ORG'>the National Cancer Institute</ent>, which is on the
grounds of Fort Detrick, <ent type='GPE'>Maryland</ent>, a primary U.S. <ent type='ORG'>Army</ent> biological
warfare research facility. Actually, the AIDS virus looks and
acts much more like a cross between a bovine leukemial virus and
a sheep visna (brain-rot) virus, cultured in a human cell culture, than any virus of the <ent type='ORG'>HTLV</ent> group.</p>
<p>The closest thing in this case to a "smoking test tube" so far is
the AIDS virus itself. If it was possible for such a monstrosity
to occur naturally it would have done so ages ago and decimated
mankind at that time. Some other life form would presently be in
control of this planet (assuming that is not already the case).</p>
<p>The Hepatitis B vaccine study in 1978 appears to have been the
initial means of planting the infection in <ent type='GPE'>New York City</ent>. The
test protocol specified non-monogamous males only, and
homosexuals received a different vaccine from heterosexuals. At
least 25-50% of the first reported <ent type='GPE'>New York</ent> AIDS cases in 1981
had received the Hepatitis B test vaccine in 1978. By 1984, 64%
of the vaccine recipients had AIDS, and the figures on the
current infection rate for the participants of that study are
held by the U.S. Department of Justice, and "unavailable."</p>
<p>The AIDS epidemic emerged full-blown in the three U.S. cities
with "organized gay communities" before being reported elsewhere,
including <ent type='GPE'>Haiti</ent> or <ent type='LOC'>Africa</ent>, so it is epidemiologically impossible
for either of those countries to be the origin point for the U.S.
infections.</p>
<p>Another indication AIDS had multiple origin points is that the
14-month doubling time of the disease cannot nearly account for
the current number of cases if we assume only a small number of
initial infections starting in the late 1970s.</p>
<p>Before dismissing the possibility that a U.S. <ent type='ORG'>Army</ent> BW facility
would participate in genocide, bear in mind that hundreds of top
<ent type='NORP'>Nazis</ent> were imported into key positions in the U.S. military-
intelligence establishment following WW II. U.S. military
priorities were then re-oriented from defeating <ent type='NORP'>Nazis</ent> to
"defeating" communism at any cost, and strengthening military
control of economic and foreign policy decisions (See - Project
Paperclip by Clarence Lasby, <ent type='GPE'>Atheneum</ent> 214, NY, and Gehlen: Spy of
the Century by E.H. Cookridge, Random House.) There's no proof
those <ent type='NORP'>Nazis</ent> ever gave up their long-term goals of conquest and
genocide, just because they changed countries. Fascism was and
is an international phenomenon.</p>
<p>It's not as if this was total reversal of previous U.S. military
policy, however. Hitler claimed to have gotten his inspiration
for the "final solution" from the extermination of Native
<ent type='NORP'>Americans</ent> in the U.S. For that matter the first example of germ
warfare in the U.S. was in 1763 when some of the <ent type='NORP'>European</ent>
colonists gave friendly <ent type='NORP'>Indians</ent> a number of blankets that had
been infected with smallpox, causing many deaths.</p>
<p>One indication of the actual U.S. military priorities regarding
BW was the importation of the entire <ent type='NORP'>Japanese</ent> germ warfare unit
(#731) following WW II. These people killed over 3000 POWs,
including many <ent type='NORP'>Americans</ent>, in a variety of grisly experiments, yet
they were granted complete amnesty and given <ent type='NORP'>American</ent> military
positions in exchange for sharing their research findings with
their U.S. <ent type='ORG'>Army</ent> counterparts.</p>
<p>Consider also the callous attitude displayed by top military
officials toward veterans suffering from the after-effects of
exposure to Agent Orange and radiation from nuclear weapons
tests.</p>
<p>In fact, since the end of WW II over 200 experimental BW tests
have been conducted on civilians and military personnel in the
U.S. One example was the test spraying from Sept. 20-26, 1950 of
bacillus globigi and syraceus maracezens over 117 square miles of
the <ent type='GPE'>San Francisco</ent> area, causing pneumonia-like infections in many
of the residents. The family of one elderly man who died in the
test sued the government, but lost. To this day, syraceus is a
leading cause of death among the elderly in the <ent type='GPE'>San Francisco</ent>
area. Another case was the joint <ent type='ORG'>Army</ent>-CIA BW test in 1955, still
classified, in which an undisclosed bacteria was released in the
<ent type='LOC'>Tampa Bay</ent> region of <ent type='GPE'>Florida</ent>, causing a dramatic increase in
whooping cough infections, including twelve deaths. A third
example was the July 7-10, 1966 release of bacteria throughout
the <ent type='GPE'>New York</ent> subway system, conducted by the U.S. <ent type='ORG'>Army</ent>'s Special
Operations Division. Due to the vast number of people exposed it
would virtually impossible to identify, let alone prove, and
specific health problems resulting directly from this test.</p>
<p>Despite the loyalty of the vast majority of U.S. military
personnel toward their country, there are clearly some military
officials who have very different intentions, and they occupy
high enough positions to impose their priorities on military
programs and get away with it, so far.</p>
<p>The first detailed charges regarding AIDS as a BW weapon were
published in the <ent type='ORG'>Patriot</ent> newspaper in <ent type='GPE'>New Delhi</ent>, <ent type='GPE'>India</ent>, on July
4, 1984. It is hard to say where the investigations of this
story in the <ent type='GPE'>India</ent>n press might have led, if they had not been
sidetracked by two major domestic disasters shortly thereafter:
the assassination of Indira Gandhi on Oct. 31 and the Bhopal
Union Carbide plant "accident" that killed several thousand and
injured over 200000 on Dec. 3.</p>
<p>The <ent type='NORP'>Soviet</ent> press picked up the story on October 1985, making it
easy for U.S. <ent type='ORG'>Defense Department</ent> spokesmen to dismiss the charges
as "<ent type='NORP'>Soviet</ent> propaganda," even though many other countries carried
it. The <ent type='NORP'>Soviet</ent>s recently retracted the charges, in the new
spirit of US-<ent type='GPE'>USSR</ent> cooperation.</p>
<p>A variation on the AIDS-BW theory that is popular in far-right
publications is that AIDS was developed in <ent type='NORP'>Soviet</ent> laboratories
for use against the U.S. An obvious problem with this idea is
that the victims of choice of a <ent type='NORP'>Soviet</ent> BW attack would be anti-
communists, not minorities or homosexuals, who are generally more
left-wing. The people at greatest risk from AIDS in the U.S. are
in fact the very elements most disliked by arch-conservatives.
In any case, it is simplistic to assume that one country, U.S. or
<ent type='GPE'>USSR</ent>, is conducting this campaign against one another. Although
concealed in apparent conflicts between nations, the real
culprits are multi-national fascists on both "sides" still bent
on massive population reductions and global domination.</p>
<p>Other motives include the old "divide and conquer" principle;
AIDS is inspiring fear and mistrust between people, and scaring
them away from relating to each other at the basic level of
sexuality. It is acting as a barrier to the attempted cultural
resurgence toward peace, love and cooperation. Of high school
students surveyed last year as to which decade they'd most like
to have grown up in, 90% chose the 60's. The last thing pro-war
fascists want is another "love generation," especially if it is
more politically sophisticated than the last one.</p>
<p>Apparently, homosexuals were an initial target in the U.S.
because their sexual practices would help in the rapid spread of
the disease, and because it was correctly assumed that very few
non-homosexual citizens would pay much attention during the early
years of the epidemic. Also, the stigma of a "homosexual
disease" would interfere with rational analysis and discussion of
AIDS. Bear in mind that homosexuals were among the first to be
exterminated in <ent type='NORP'>Nazi</ent> <ent type='GPE'>Germany</ent>, before <ent type='NORP'>Jews</ent> or other minorities, so
fewer citizens would object.</p>
<p>The details of precisely how the AIDS virus was synthesized, mass
cultured, and spread by incorporating into vaccination programs
are available but fairly intricate. It is beyond the scope of
this report to present a crash course in virology, epidemiology,
genetic engineering, and the military strategies of international
fascism. Readers are encouraged to obtain and study the
references cited here, and demand a full inquiry. Those
officials who are actually involved in the coverup will reveal it
by their inaction when pressed to investigate.</p>
<p>Evil is hard to confront, especially on the preposterous scale we
have here. If you acknowledge the presence of those who think
their only hope for survival is to kill off two thirds of all the
other kinds, and their ability to manage it, you then pretty much
have to do something about it.</p>
<p>Three good sources, each which lists many other key references,
are: <ent type='ORG'>Covert Action Information Bulletin</ent> #28 ($5), Box 50272,
<ent type='GPE'>Washington</ent>, D.C. 20004; Bio-Attack Alert ($20), Dr. Robert
Strecker, 1501 Colorado Blvd., <ent type='GPE'>Los Angeles</ent>, CA 90041; Radio Free
America #16 by Dave Emery and Nip Tuck (3 tapes, $10), Davkore
Co., 1300-D Space Park Way, Mountain View, CA 94043.</p>
<p>This report was originally printed in - Critique - Exposing
Consensus Reality, P.O. Box 11368, <ent type='GPE'>Santa Rosa</ent>, CA 95406. $15.00
for three issues (one year).
</p></xml>

View File

@ -0,0 +1,251 @@
<xml>
<p> 102nd <ent type='ORG'>Congress</ent>
2nd Session</p>
<p> Amendment No.
Offered by M.</p>
<p>1. <ent type='ORG'>SEC</ent>. 1. FINDINGS AND PURPOSES
2. (a) The <ent type='ORG'>Congress</ent> finds:
3. (1) that telecommunications systems and networks are often
4 used in the furtherance of criminal activities including
5 organized crime, racketeering, extortion, kidnapping, espionage,
6 terrorism, and trafficking in illegal drugs; and
7 (2 ) that recent and continuing advances in
8 telecommunications technology, and the introduction of new
9 technologies and transmission modes by the telecommunications
10 industry, have made it increasingly difficult for government
11 agencies to implement lawful orders or authorizations to
12 intercept communications and thus threaten the ability of such
13 agencies effectively to enfore the laws and protect the national
14 security; and
15 (3) without the assistance and cooperation of providers of
16 electronic communication services and private branch exchange
17 operators, the introduction of new technologies and transmission
18 modes into telecommunications systems witout consideration and
19 accomodation of the need of government agencies lawfully to
20 intercept communications, would impede the ability of such
21 agencies effectively to carry out their responsibilities.
22</p>
<p>1 The purpose of this Act are:
2 (1) to clarify the duty of providers of electronic
3 communication services and private branch exchange operators to
4 provide such assistance as necessary to ensure the ability of
5 government agencies to implement lawful orders or authorizations
6 to intercept communications; and
7 (2) to ensure that <ent type='ORG'>the Federal Communications Commission</ent>,
8 in the setting of standards affecting providers of electronic
9 communication services or private branch exchange operators, will
10 accomodate the need of government agencies lawfully to intercept
11 communications.</p>
<p>12 <ent type='ORG'>SEC</ent>. 2. Title II of the Communictions Act of 1934 is amended
13 by adding at the end thereof the following new sections:
14 "Sec__. GOVERNMENT REQUIREMENTS
15 "(a) <ent type='ORG'>The Federal Communications Commission</ent> shall,
16 within 120 days after enactment of this Act, issue such
17 regulations as are necessary to ensure that the government
18 can intercept communications when such interception is
19 otherwise lawfully authorized
20 "(b) The regulations issued by the commission shall:
21 "(1) establish standards and specifications for
22 telecommunications equipment and technology employed by
23 providers of electronic communication services or
24 private branch exchange operators as may be necessary
25 to maintain the ability of the government to lawfully
26 intercept communication</p>
<p>1 "(2) require that any telecommunications
2 equipment or technology which impedes the ability of
3 the government to lawfully intercept communications and
4 and which has been introduced into a telecommunications
5 system by providers of electronic communication
6 services or private branch exchange operators shall not
7 expanded so as to further impede such utility until
8 that telecommunications equpment or technology is
9 brought into compliance with the requirements set forth
10 in regulations issued by the <ent type='ORG'>Commission</ent>;
11 "(3) require that modifications which are
12 necessary to be made to existing telecommunications
13 equipment or technology to eliminate impediments to the
14 ability of the government to lawfully intercept
15 communications shall be implemented by such providers
16 of electronic communication services and private branch
17 exchange operators within 180 days of issuance of such
18 regulations; and
19 "(4) prohibit the use by electronic communication
20 service providers and private branch exchange operators
21 of any telecommunications equipment or technoloqy which
22 does not comply with the regulations issued under this
23 section after the 180th day following the issuance of
24 such regulations.
25 "(c) For the purposes of administering and enforcing
26 the provisions of this section and the regulations</p>
<p>1 prescribed hereunder, the <ent type='ORG'>Commission</ent> shall have the same
2 authority, power, and functions with respect to providers of
3 electronic communication services or private branch exchange
4 operators as the <ent type='ORG'>Commission</ent> has in administering and
5 enforcing the provisions of this title with respect to any
6 common carrier otherwise subject to <ent type='ORG'>Commission</ent> jurisdiction.
7 Any violation of this section by any provider of electronic
8 communication service or any private branch exchange
9 operator shall be subject to the same remedies, penalties,
10 and procedures as are applicable to a violation of this
11 chapter by a common carrier otherwise subject to <ent type='ORG'>Commission</ent>
12 jurisdiction, except as otherwise specified in subsection
13 (d).
14 "(d) In addition to any enforcement authorities vested
15 in the <ent type='ORG'>Commission</ent> under this title, the Attorney General may
16 apply to the appropriate <ent type='GPE'>United States District Court</ent> for a
17 restraining order or injunction against any provider of
18 electronic communication service or private branch exchange
19 operator based upon a failure to comply with the provisions
20 of this section or regulations prescribed hereunder.
21 "(e) Any person who willfully violates any provision
22 of the regulations issued by the <ent type='ORG'>Commission</ent> pursuant to
23 subjection (a) of this section shall be subject to a civil
24 penalty of $10000 per day for each day in violation.
25 "(f) To the extent consistent with the setting or
26 implementation of just and reasonable rates, charges and
</p>
<p>1 classifications, the <ent type='ORG'>Commission</ent> shall authorize the
2 compensation of any electronic communication service
3 providers or other entities whose rates or charges are
4 subject to its jurisdiction for the reasonable costs
5 associated with such modifications of existing
6 telecommunications equipment or technology, or with the
7 development or procurement, and the installation of such
8 telecommunications equipment or technology as is necessary
9 to carry out the purposes of this Act, through appropriate
10 adjustments to such rates and charges.
11 "(g) The Attorney General shall advise the <ent type='ORG'>Commission</ent>
12 within 30 days after the date of enactment of this Act, and
13 periodically thereafter, as necessary, of the specific needs
14 and performance requirements to ensure the continued ability
15 of the government to lawfully intercept communications
16 transmitted by or through the electronic communication
17 services and private branch exchanges introduced, operated,
18 sold or leased in <ent type='GPE'>the United States</ent>.
l9 "(h) Notwithstanding section 552b of Title 5, United
20 States Code or any other provision of law, the Attorney
21 General or his designee may direct that any <ent type='ORG'>Commission</ent>
22 proceeding concerning regulations, standards or
23 registrations issued or to be issued under the authority of
24 this section shall be closed to the public.
25 "(i) Definitions -- As used in this section --</p>
<p>1 "(l) 'provider of electronic communication
2 service' or 'private branch exchange operator' means
3 any service which profices to users thereof the ability
4 to send or receive wire, oral or electronic
5 communications, as those terms are defined in
6 subsections 2510(1) and 2510(12) of Title 18, United
7 States Code;
8 "(2) 'communication' means any wire or electronic
9 communication, as defined in subsection 2510(1) and
10 2510 (12), of Title 18, <ent type='GPE'>United States</ent> Code;
11 "(3) 'impede' means to prevent, hinder or impair
12 the government's ability to intercept a communication
13 in the same form as transmitted;
14 "(4) 'intercept' shall have the same meaning
l5 set forth in section 2510 (4) of Title 18, <ent type='GPE'>United States</ent>
16 Code;
17 "(5) 'government' means <ent type='ORG'>the Government</ent> of the
18 <ent type='GPE'>United States</ent> and any agency or instrumentality
19 thereof, any state or political subdivision thereof,
20 and <ent type='LOC'>the District</ent> of Columbia, and <ent type='ORG'>Commonwealth</ent> of Puerto
21 <ent type='GPE'>Rico</ent>; and
22 "(6) 'telecommunications equipment or technology'
23 means any equipment or technology, used or to be used
24 by any providers of electronic communication services
25 or private branch exchange operators, which is for the</p>
<p>1 transmission or recept of wire, oral or electronic
2 communications."</p>
<p>3 <ent type='ORG'>SEC</ent> 3. Section 510, Title V, P.L. 97-259 is amended deleting the
4 phrase "section 301 or 302a" and substituting the phrase "section
5 301, 302a, or ____.</p>
<p> <ent type='ORG'>DIGITAL TELEPHONY AMENDMENT</ent>
(report language)</p>
<p>Significant changes are being made in the systems by which
communications services are provided. <ent type='ORG'>Digital</ent> technologies,
fiber optics, and other telecommunications transmission
technologies are coming into widespread use. These changes
in communications systems and technologies make it increasingly
difficult for government agencies to implement lawful orders or
authorizations to intercept communications in order to enfore
the laws and protect the national security.</p>
<p>With the assistance of providers of electronic communication
services, these technological advances need not impede
the ability of government agencies to carry out their
responsibilities. This bill would direct the Federal
Communications <ent type='ORG'>Commission</ent> (<ent type='ORG'>FCC</ent>) to issue standards ensuring
that communications systems and service providers continue
to accomodate lawful government communications intercepts.
The regulations are not intended to cover federal government
communications systems. Procedure already exist by which
<ent type='ORG'>the Federal Bureau</ent> of Investigation amy obtain federal agency
cooperation in implementing lawful orders or authorizations
applicable to such systems. Further, there would be no
obligation on the part of the service providers or any other party
to ensure access to the plain text of encrypted or other encoded
material, but rather only to the communication in whatever form
it is transmitted. It is thus the intent and purpose of the
bill only to maintain the government's current communications
interception capability where properly ordered or authorized.
No expansion of that authority is sought.</p>
<p> ANALYSIS</p>
<p>
Subsection 2(a) and (b) would require the Federal Communications
<ent type='ORG'>Commission</ent> (<ent type='ORG'>FCC</ent>) to issue any regulations deemed necessary to
ensure that telecommunications equipment and technology used
by providers of electronic communications services or private branch
exchange operators will permit the government to intercept
communications when such interception is lawfully authorized.
The regulations would also require that equipment or technologies
currently used by such providers or operators that impede this
ability until brought into compliance with the regulations.
Compliance with <ent type='ORG'>FCC</ent> regulations issued under this section would
be required within 180 days of their issuance.</p>
<p>Subsection 2(c) provides that the <ent type='ORG'>Commission</ent>'s authority to
implement and enforce the provisions of this section are the same
as those it has with respect to common carriers subject to its
jurisdiction.</p>
<p>Subsection 2(d) would give the Attorney General the authority to
request injunctive relief against non-complying service providers
or private branch exchange operators.</p>
<p>Subsection 2(e) provides civil penalty authority for willful
violations of the regulations of up to $10000 per day for each
violation.</p>
<p>Subsection 2(f) would permit the <ent type='ORG'>FCC</ent> to provide rate relief to
service providers subject to its rate-setting jurisdiciton for
the costs associated with modifying equipment or technologies to
carry out the purposes of the bill.</p>
<p>Subsections 2(g), (h), and (i) require the Attorney General
to advise the <ent type='ORG'>Commission</ent> regarding the specific needs and
performance criteria required to maintain government intercept
capabilities, require the <ent type='ORG'>FCC</ent> to ensure that the standards and
specifications it promulgates may be implemented on a royalty-
free basis, and authorize the Attorney General to require that
particular <ent type='ORG'>Commission</ent> rulemaking proceedings to implement the Act
be closed to the public.</p>
<p>Subsection 2(j) provides definitions for key terms used in this
section.
</p></xml>

View File

@ -0,0 +1,426 @@
<xml><p>
SUBJECT: <ent type='ORG'>FEMA GULAG</ent>
SECRET CONCENTRATION CAMPS
The September issue of <ent type='ORG'>THE OSTRICH</ent> reprinted a story from the
<ent type='ORG'>CBA</ent> BULLETIN which listed the following principal civilian <ent type='ORG'>concentra</ent>-
tion camps established in <ent type='ORG'>GULAG USA</ent> under the =<ent type='ORG'>Rex</ent> '84= program:
Ft. Chaffee, <ent type='GPE'>Arkansas</ent>; Ft. Drum, <ent type='GPE'>New York</ent>; Ft. Indian Gap, <ent type='GPE'>Penn</ent>-
sylvania; Camp A. P. Hill, <ent type='GPE'>Virginia</ent>; <ent type='GPE'>Oakdale</ent>, <ent type='GPE'>California</ent>; Eglin
Air Force Base, <ent type='GPE'>Florida</ent>; Vendenberg AFB, <ent type='GPE'>California</ent>; Ft. Mc Coy,
<ent type='GPE'>Wisconsin</ent>; Ft. Benning, <ent type='GPE'>Georgia</ent>; Ft. <ent type='GPE'>Huachuca</ent>, <ent type='GPE'>Arizona</ent>; Camp
Krome, <ent type='GPE'>Florida</ent>. The February OSTRICH printed a map of the expanding
<ent type='ORG'>Gulag</ent>. <ent type='GPE'>Alhough</ent> this listing and map stirred considerable interest,
the report was not new. For at least 20 years, knowledgeable <ent type='ORG'>Patriots</ent>
have been warning of these sinister plots to incarcerate dissidents
opposing plans of the =<ent type='ORG'>Elitist Syndicate</ent>= for a totalitarian
=New World Order=. Indeed, the plot was recognized with the insidious
encroachment of "regionalism" back in the 1960's. As early as 1968,
the "greatest land steal in history" leading to global corporate
socialism, was in a ="Master Land Plan"= for <ent type='GPE'>the United States</ent>
by =<ent type='ORG'>Executive Orders</ent>= involving water resource regions,
population movement and control, pollution control, zoning
and land use, navigation and environmental bills, etc. Indeed,
the real undercover aim of the so-called "Environmental Rennaissance"
has been the abolition of private property.
All prelude to the total grab of the =<ent type='ORG'>World Conservation Bank</ent>=,
as <ent type='ORG'>THE OSTRICH</ent> has been reporting. The map on this page and
the list of executive orders available for imposition of an "emergency"
are from 1970s files of the late Gen. =P. A. <ent type='ORG'>Del Valle</ent>'s= <ent type='ORG'>ALERT</ent>,
sent us by =Merritt Newby=, editor of the now defunct AMERICAN
CHALLENGE.
=Wake up <ent type='NORP'>Americans</ent>!= The Bushoviks have approved =Gorbachev's=
imposition of "Emergency" to suppress unrest. =Henry Kissinger=
and his clients hardly missed a day's profits in their deals with
the butchers of Tiananmen Sqaure. Are you next?
*************************************************************************
SUBJECT: <ent type='ORG'>Executive Orders</ent>
APPLICABLE EXECUTIVE ORDERS
The following =<ent type='ORG'>Executive Orders</ent>=, now recorded in the Federal
Register, and therefore accepted by <ent type='ORG'>Congress</ent> as the law of the
land, can be put into effect at any time an emergency is declared:
10995--All communications media seized by <ent type='ORG'>the Federal Government</ent>.
10997--Seizure of all electrical power, fuels, including
gasoline and minerals.
10998--Seizure of all food resources, farms and farm equipment.
10999--Seizure of all kinds of transportation, including your
personal car, and control of all highways and seaports.
11000--Seizure of all civilians for work under Federal supervision.
11001--Federal takeover of all health, education and welfare.
11002--Postmaster General empowered to register every man, woman
and child in the U.S.A.
11003--Seizure of all aircraft and airports by the Federal
Government.
11004--Housing and Finance authority may shift population from
one locality to another. <ent type='ORG'>Complete</ent> integration.
11005--Seizure of railroads, inland waterways, and storage facilities.
11051--The Director of <ent type='ORG'>the Office</ent> of Emergency Planning authorized
to put <ent type='ORG'>Executive Orders</ent> into effect in "times of increased
international tension or financial crisis". He is also to
perform such additional functions as the President
may direct.
--------------------------------------------------------------------------
A Dangerous Fact Not Generally Known
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THESE EXECUTIVE ORDERS GROSSLY AND FLAGRANTLY VIOLATE ARTICLE
4 SECTION 4 OF THE CONSTITUTION OF <ent type='GPE'>THE UNITED STATES</ent>. "THE
UNITED STATES SHALL GUARANTEE TO EVERY STATE IN THIS UNION A
REPUBLICAN FORM OF GOVERNMENT, AND SHALL PROTECT EACH OF THEM
AGAINST INVASION; AND ON APPLICATION OF THE LEGISLATURE, OR OF THE
EXECUTIVE (WHEN THE LEGISLATURE CANNOT BE CONVENED) AGAINST
DOMESTIC VIOLENCE." "REGIONAL GOVERNMENT IS NOT A REPRESENTATIVE
REPUBLICAN FORM OF GOVERNMENT!"
When Government gets out of hand and can no longer be controlled
by the people, short of violent overthrow as in 1776, there are
two sources of power which are used by the dictatorial government
to keep the people in line: <ent type='ORG'>the Police Power</ent> and <ent type='ORG'>the Power</ent> of the
Purse (through which the necessities of life can be withheld).
And both of these powers are no longer balanced between the three
Federal Branches, and between the Federal and the <ent type='ORG'>State</ent> and
local Governments. These powers have been taken over, with the
permission of <ent type='ORG'>the Federal Legislature</ent> and the <ent type='ORG'>State</ent> Governments,
by <ent type='ORG'>the Executive Branch</ent> of <ent type='ORG'>the Federal Government</ent> and all attempts
to reclaim that lost power have been defeated.
<ent type='ORG'>State</ent>d simply: the dictatorial power of the <ent type='ORG'>Executive</ent> rests primarily
on three basis: <ent type='ORG'>Executive</ent> Order 11490, <ent type='ORG'>Executive</ent> Order 11647, and
<ent type='ORG'>the Planning</ent>, Programming, Budgeting System which is operated
through the new and all-powerful Office of Management and
Budget.
E. O. 11490 is a compilation of some 23 previous <ent type='ORG'>Executive Orders</ent>,
signed by Nixon on Oct. 28, 1969, and outlining emergency functions
which are to be performed by some 28 <ent type='ORG'>Executive</ent> Departments and
Agencies whenever the President of <ent type='GPE'>the United States</ent> declares
a national emergency (as in defiance of an impeachment edict,
for example). Under the terms of E. O. 11490, the President
can declare that a national emergency exists and the <ent type='ORG'>Executive</ent>
Branch can:
* Take over all communications media
* Seize all sources of power
* Take charge of all food resources
* Control all highways and seaports
* Seize all railroads, inland waterways, airports, storage facilities
* Commandeer all civilians to work under federal supervision
* Control all activities relating to health, education, and welfare
* Shift any segment of the population from one locality to another
* Take over farms, ranches, timberized properties
* Regulate the amount of your own money you may withdraw from
your bank, or savings and loan institution
All of these and many more items are listed in 32 pages incorporating
nearly 200000 words, providing and absolute bureaucratic
dictatorship whenever the President gives the word.
--&gt; <ent type='ORG'>Executive</ent> Order 11647 provides the regional and local mechanisms
--&gt; and manpower for carrying out the provisions of E. O. 11490.
--&gt; Signed by Richard Nixon on Feb. 10, 1972, this Order sets up Ten
--&gt; <ent type='ORG'>Federal Regional Councils</ent> to govern <ent type='ORG'>Ten Federal Regions</ent> made up
--&gt; of the fifty still existing <ent type='ORG'>State</ent>s of the Union.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Don sez:
*Check out this book for the inside scoop on the "secret" Constitution.*
SUBJECT: - "The Proposed Constitutional Model" Pages 595-621
Book Title - The Emerging Constitution
Author - <ent type='ORG'>Rex</ent>ford G. Tugwell
Publisher - <ent type='ORG'>Harpers Magazine</ent> Press,Harper and Row
Dewey Decimal - 342.73 T915E
ISBN - 0-06-128225-10
Note Chapter 14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
The 10 <ent type='ORG'>Federal Regions</ent>
~~~~~~~~~~~~~~~~~~~~~~
REGION I: <ent type='GPE'>Connecticut</ent>, <ent type='GPE'>Massachusetts</ent>, <ent type='GPE'>New Hampshire</ent>, Rhode
Island, <ent type='GPE'>Vermont</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Boston</ent>
REGION II: <ent type='GPE'>New York</ent>, <ent type='GPE'>New Jersey</ent>, <ent type='GPE'>Puerto Rico</ent>, Virgin Island.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>New York City</ent>
REGION III: <ent type='GPE'>Delaware</ent>, <ent type='GPE'>Maryland</ent>, <ent type='GPE'>Penn</ent>sylvania, <ent type='GPE'>Virginia</ent>, West
<ent type='GPE'>Virginia</ent>, District of Columbia.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Philadelphia</ent>
REGION IV: <ent type='GPE'>Alabama</ent>, <ent type='GPE'>Florida</ent>, <ent type='GPE'>Georgia</ent>, <ent type='GPE'>Kentucky</ent>, <ent type='GPE'>Mississippi</ent>,
<ent type='GPE'>North Carolina</ent>, <ent type='GPE'>Tennessee</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Atlanta</ent>
REGION V: <ent type='GPE'>Illinois</ent>, <ent type='GPE'>Indiana</ent>, <ent type='GPE'>Michigan</ent>, <ent type='GPE'>Minnesota</ent>, <ent type='GPE'>Ohio</ent>, <ent type='GPE'>Wisconsin</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Chicago</ent>
REGION VI: <ent type='GPE'>Arkansas</ent>, <ent type='GPE'>Louisiana</ent>, <ent type='GPE'>New Mexico</ent>, <ent type='GPE'>Oklahoma</ent>, <ent type='GPE'>Texas</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Dallas</ent>-<ent type='GPE'>Fort Worth</ent>
REGION VII: <ent type='GPE'>Iowa</ent>, <ent type='GPE'>Kansas</ent>, <ent type='GPE'>Missouri</ent>, <ent type='GPE'>Nebraska</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Kansas</ent> City
REGION VIII: <ent type='GPE'>Colorado</ent>, <ent type='GPE'>Montana</ent>, <ent type='GPE'>North Dakota</ent>, <ent type='GPE'>South Dakota</ent>,
<ent type='GPE'>Utah</ent>, <ent type='GPE'>Wyoming</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>Denver</ent>
REGION IX: <ent type='GPE'>Arizona</ent>, <ent type='GPE'>California</ent>, <ent type='GPE'>Hawaii</ent>, <ent type='GPE'>Nevada</ent>.
<ent type='ORG'>Regional Capitol</ent>: <ent type='GPE'>San Fransisco</ent>
REGION X: <ent type='GPE'>Alaska</ent>, <ent type='GPE'>Oregon</ent>, <ent type='GPE'>Washington</ent>, <ent type='GPE'>Idaho</ent>.
<ent type='ORG'>Regional Capitol</ent>: Seattle
Supplementing these Then Regions, each of the <ent type='ORG'>State</ent>s is, or is to
be, divided into subregions, so that Federal <ent type='ORG'>Executive</ent> control
is provided over every community.
Then, controlling the bedgeting and the programming at every
level is that politico-economic system known as <ent type='ORG'>PPBS</ent>.
The President need not wait for some emergency such as an impeachment
ouster. He can declare a National Emergency at any time, and freeze
everything, just as he has already frozen wages and prices. And
the <ent type='ORG'>Congress</ent>, and the <ent type='ORG'>State</ent>s, are powerless to prevent such an
<ent type='ORG'>Executive</ent> Dictatorship, unless <ent type='ORG'>Congress</ent> moves to revoke these
extraordinary powers before the Chief <ent type='ORG'>Executive</ent> moves to invoke
them.
THESE EXECUTIVE ORDERS GROSSLY AND FLAGRANTLY VIOLATE THE INTENT AND
PURPOSE OF ARTICLE 4 SECTION 3. THERE IS NO PROVISION IN THIS
SECTION OR THE CONSTITUTION OF <ent type='GPE'>THE UNITED STATES</ent> FOR FORMING A
REGIONAL STATE OUT OF A GROUP OF STATES! FURTHER, THESE EXECUTIVE
ORDERS GROSSLY AND FLAGRANTLY VIOLATE THE 9TH AND 10TH
AMENDMENTS TO THE CONSTITUTION!
By Proclaiming and Putting Into Effect <ent type='ORG'>Executive</ent> Order No. 11490,
the President would put <ent type='GPE'>the United States</ent> under TOTAL MARTIAL LAW
AND MILITARY <ent type='ORG'>DICTATORSHIP</ent>! The Guns Of The <ent type='GPE'>America</ent>n People Would
Be Forcibly Taken!
--------------------------------END:REF1------------------------------------------MORE--(40%)
################################################################################
--------------------------------REF2:<ent type='ORG'>FEMA</ent>---------------------------------------
<ent type='ORG'>Bushie</ent>-Tail used the Gulf War Show to greatly expand the powers of the
presidency. During this shell game event, the <ent type='ORG'>Executive Orders</ent> signed
into "law" continued <ent type='ORG'>Bushie</ent>'s methodical and detailed program to bury
any residual traces of the constitutional rights and protections of U.S.
citizens. The Bill of Rights--[almost too late to] use 'em or lose 'em:
|| The record of Bush's fast and loose approach to ||
|| constitutionally guaranteed civil rights is a history of ||
|| the erosion of liberty and the consolidation of an imperial ||
|| executive. ||
-----------------------------------------------------------------------------
From "Covert Action Information Bulletin," Number 37, Summer, 1991 (see
bottom 2 pages for subscription &amp; back issues info on this quarterly):
<ent type='ORG'>Domestic Consequences</ent> of the Gulf War
Diana Reynolds
Reprinted with permission of CAIB. Copyright 1991
Diana Reynolds is a Research Associate at the Edward R. <ent type='ORG'>Murrow Center</ent>,
<ent type='ORG'>Fletcher School for Public Policy</ent>, <ent type='ORG'>Tufts University</ent>. She is also an
Assistant Professor of Politics at <ent type='ORG'>Broadford College</ent> and a Lecturer at
<ent type='ORG'>Merrimack College</ent>.
A war, even the most victorious, is a national misfortune.
--Helmuth Von Moltke, <ent type='NORP'>Prussian</ent> field marshall
George Bush put <ent type='GPE'>the United States</ent> on the road to its second war in
two years by declaring a national emergency on August 21990. In
response to <ent type='GPE'>Iraq</ent>'s invasion of <ent type='GPE'>Kuwait</ent>, Bush issued two <ent type='ORG'>Executive</ent>
Orders (12722 and 12723) which restricted trade and travel with <ent type='GPE'>Iraq</ent>
and froze <ent type='GPE'>Iraq</ent>i and <ent type='GPE'>Kuwait</ent>i assets within the U.S. and those in the
possession of U.S. persons abroad. At least 15 other executive orders
followed these initial restrictions and enabled the President to
mobilize the country's human and productive resources for war. Under
the national emergency, Bush was able unilaterally to break his 1991
budget agreement with <ent type='ORG'>Congress</ent> which had frozen defense spending, to
entrench further the U.S. economy in the mire of the military-
industrial complex, to override environmental protection regulations,
and to make free enterprise and civil liberties conditional upon an
executive determination of national security interests.
The <ent type='ORG'>State</ent> of Emergency
In time of war a president's power derives from both constitutional
and statutory sources. Under Article II, Section 2 of the
Constitution, he is Commander-in-Chief of the armed forces. Although
<ent type='ORG'>Congress</ent> alone retains the right to declare war, this power has become
increasingly meaningless in the face of a succession of unilateral
decisions by the executive to mount invasions.
The president's statutory authority, granted by <ent type='ORG'>Congress</ent> and
expanded by it under the 1988 National Emergencies Act (50 <ent type='ORG'>USC</ent> sec.
1601), confers special powers in time of war or national emergency.
He can invoke those special powers simply by declaring a national
emergency. First, however, he must specify the legal provisions under
which he proposes that he, or other officers, will act. <ent type='ORG'>Congress</ent> may
end a national emergency by enacting a joint resolution. Once invoked
by the president, emergency powers are directed by the National
Security Council and administered, where appropriate, under the
general umbrella of <ent type='ORG'>the Federal Emergency Management Agency</ent> (<ent type='ORG'>FEMA</ent>).[1]
There is no requirement that <ent type='ORG'>Congress</ent> be consulted before an emergency
is declared or findings signed. The only restriction on Bush is that
he must inform <ent type='ORG'>Congress</ent> in a "timely" fashion--he being the sole
arbiter of timeliness.
Ultimately, the president's perception of the severity of a
particular threat to national security and the integrity of his
appointed officers determine the nature of any state of emergency.
For this reason, those who were aware of the modern development of
presidential emergency powers were apprehensive about the domestic
ramifications of any national emergency declared by George Bush. In
light of Bush's record (see "Bush Chips Away at Constitution" Box
below) and present performance, their fears appear well-founded.
The War at Home
It is too early to know all of the emergency powers, executive
orders and findings issued under classified National Security
Directives[2] implemented by Bush in the name of the Gulf War. In
addition to the emergency powers necessary to the direct mobilization
of active and reserve armed forces of <ent type='GPE'>the United States</ent>, there are
some 120 additional emergency powers that can be used in a national
emergency or state of war (declared or undeclared by <ent type='ORG'>Congress</ent>). The
"<ent type='ORG'>Federal Register</ent>" records some 15 <ent type='ORG'>Executive Orders</ent> (EO) signed by
Bush from August 21990 to February 141991. (See "Bush's <ent type='ORG'>Executive</ent>
Orders" box, below)
It may take many years before most of the executive findings and
use of powers come to light, if indeed they ever do. But evidence is
emerging that at least some of Bush's emergency powers were activated
in secret. Although only five of the 15 EOs that were published were
directed at non-military personnel, the costs directly attributable to
the exercise of the authorities conferred by the declaration of
national emergency from August 2, 1990 to February 1, 1991 for non-
military activities are estimated at approximately $1.3 billion.
According to a February 11, 1991 letter from Bush to congressional
leaders reporting on the "<ent type='ORG'>National Emergency With Respect</ent> to <ent type='GPE'>Iraq</ent>,"
these costs represent wage and salary costs for <ent type='ORG'>the Departments</ent> of
Treasury, <ent type='ORG'>State</ent>, Agriculture, and Transportation, U.S. Customs,
<ent type='ORG'>Federal Reserve Board</ent>, and <ent type='ORG'>the National Security Council</ent>.[3]
The fact that $1.3 billion was spent in non-military salaries alone
in this six month period suggests an unusual amount of government
resources utilized to direct the national emergency state. In
contrast, government salaries for one year of the state of emergency
with <ent type='GPE'>Iran</ent>[4] cost only $430000.
____________________________________________________________________
| |
| Bush Chips Away at Constitution |
| |
| George Bush, perhaps more than any other individual in |
| U.S. history, has expanded the emergency powers of |
| presidency. In 1976, as Director of <ent type='ORG'>Central Intelligence</ent>, |
| he convened Team B, a group of rabidly anti-<ent type='NORP'>communist</ent> |
| intellectuals and former government officials to reevaluate |
| <ent type='ORG'>CIA</ent> inhouse intelligence estimates on <ent type='NORP'>Soviet</ent> military |
| strength. The resulting report recommended draconian civil |
| defense measures which led to President Ford's <ent type='ORG'>Executive</ent> |
| Order 11921 authorizing plans to establish government |
| control of the means of production, distribution, energy |
| sources, wages and salaries, credit and the flow of money |
| in U.S. financial institutions in a national emergency.[1] |
| As Vice President, Bush headed <ent type='ORG'>the Task Force</ent> on |
| Combatting Terrorism, that recommended: extended and |
| flexible emergency presidential powers to combat terrorism; |
| restrictions on congressional oversight in counter- |
| terrorist planning; and curbing press coverage of |
| terrorist incidents.[2] The report gave rise to the Anti- |
| Terrorism Act of 1986, that granted the President clear-cut |
| authority to respond to terrorism with all appropriate |
| means including deadly force. It authorized the |
| <ent type='ORG'>Immigration and Naturalization Service</ent> to control and |
| remove not only alien terrorists but potential terrorist |
| aliens and those "who are likely to be supportive of |
| terrorist activity within the U.S."[3] The bill superceded |
| the War Powers Act by imposing no time limit on the |
| President's use of force in a terrorist situation, and |
| lifted the requirement that the President consult <ent type='ORG'>Congress</ent> |
| before sanctioning deadly force. |
| From 1982 to 1988, Bush led the Defense Mobilization |
| Planning Systems <ent type='ORG'>Agency</ent> (<ent type='ORG'>DMPSA</ent>), a secret government |
| organization, and spent more than $3 billion upgrading |
| command, control, and communications in <ent type='ORG'>FEMA</ent>'s continuity |
| of government infrastructures. Continuity of Government |
| (<ent type='ORG'>COG</ent>) was ostensibly created to assure government |
| functioning during war, especially nuclear war. The <ent type='ORG'>Agency</ent> |
| was so secret that even many members of the <ent type='ORG'>Pentagon</ent> were |
| unaware of its existence and most of its work was done |
| without congressional oversight. |
| Project 908, as the <ent type='ORG'>DMPSA</ent> was sometimes called, was |
| similar to its parent agency <ent type='ORG'>FEMA</ent> in that it came under |
| investigation for mismanagement and contract |
| irregularities.[4] During this same period, <ent type='ORG'>FEMA</ent> had been |
| fraught with scandals including emergency planning with a |
| distinctly anti-constitutional flavor. The agency would |
| have sidestepped <ent type='ORG'>Congress</ent> and other federal agencies and |
| put the President and <ent type='ORG'>FEMA</ent> directly in charge of the U.S. |
| planning for martial rule. Under this state, the executive |
| would take upon itself powers far beyond those necessary to |
| address national emergency contingencies.[5] |
| Bush's "anything goes" anti-drug strategy, announced |
| on September 6, 1989, suggested that executive emergency |
| powers be used: to oust those suspected of associating |
| with drug users or sellers from public and private housing; |
| to mobilize <ent type='ORG'>the National Guard</ent> and U.S. military to fight |
| drugs in the continental U.S.; to confiscate private |
| property belonging to drug users, and to incarcerate first |
| time offenders in work camps.[6] |
| The record of Bush's fast and loose approach to |
| constitutionally guaranteed civil rights is a history of |
| the erosion of liberty and the consolidation of an imperial |
| executive. |
| |
| 1. <ent type='ORG'>Executive</ent> Order 11921, "Emergency preparedness Functions, |
| June 11, 1976. <ent type='ORG'>Federal Register</ent>, vol. 41, no. 116. The |
| report was attacked by such notables as Ray Cline, the |
| <ent type='ORG'>CIA</ent>'s former Deputy Director, retired <ent type='ORG'>CIA</ent> intelligence |
| analyst Arthur Macy Cox, and the former head of the U.S. |
| Arms Control and Disarmament <ent type='ORG'>Agency</ent>, Paul Warnke for |
| blatantly manipulating <ent type='ORG'>CIA</ent> intelligence to achieve the |
| political ends of Team B's rightwing members. See Cline, |
| quoted in "Carter to Inherit Intense Dispute on <ent type='NORP'>Soviet</ent> |
| Intentions," Mary Marder, "<ent type='GPE'>Washington</ent> Post," January 2, |
| 1977; Arthur Macy Cox, "Why the U.S. Since 1977 Has |
| Been Mis-perceiving <ent type='NORP'>Soviet</ent> Military Strength," "<ent type='GPE'>New York</ent> |
| <ent type='ORG'>Times</ent>," October 20, 1980; Paul Warnke, "George Bush and |
| Team B," "<ent type='GPE'>New York</ent> <ent type='ORG'>Times</ent>," September 24, 1988. |
| |
| 2. George Bush, "Public Report of the Vice President's Task |
| Force On Combatting Terrorism" (<ent type='GPE'>Washington</ent>, D.C.: U.S. |
| Government Printing Office), February 1986. |
| |
| 3. Robert J. Walsh, Assistant Commissioner, Investigations |
| Division, <ent type='ORG'>Immigration and Naturalization Service</ent>, "Alien |
| <ent type='ORG'>Border Control Committee</ent>" (<ent type='GPE'>Washington</ent>, DC), October 1, |
| 1988. |
| |
| 4. Steven Emerson, "<ent type='GPE'>America</ent>'s Doomsday Project," "U.S. News |
| &amp; World Report," August 7, 1989. |
| |
| 5. See: Diana Reynolds, "<ent type='ORG'>FEMA</ent> and the <ent type='ORG'>NSC</ent>: The Rise of the |
| National Security <ent type='ORG'>State</ent>," "CAIB," Number 33 (Winter 1990); |
| Keenan Peck, "The Take-Charge Gang," "The Progressive," |
| May 1985; Jack Anderson, "<ent type='ORG'>FEMA</ent> Wants to Lead Economic |
| War," "<ent type='GPE'>Washington</ent> Post," January 10, 1985. |
| |
| 6. These Presidential powers were authorized by the Anti- |
| Drug Abuse Act of 1988, Public Law 100-690: 100th |
| <ent type='ORG'>Congress</ent>. See also: Diana Reynolds, "The Golden Lie," |
| "The Humanist," September/October 1990; Michael Isikoff, |
| "Is This Determination or Using a Howitzer to Kill a |
| Fly?" "<ent type='GPE'>Washington</ent> Post National Weekly," August 27-, |
| September 2, 1990; Bernard Weintraub, "Bush Considers |
| Calling Guard To Fight Drug Violence in Capital," "New |
| York <ent type='ORG'>Times</ent>," March 21, 1989. |
| |
--------------------------------------------------------------------
</p></xml>

View File

@ -0,0 +1,465 @@
<xml><p>
----<ent type='ORG'>FEMA</ent> pt 2 continued ----------------------------------------------
Even those <ent type='ORG'>Executive Order</ent>s which have been made public tend to
raise as many questions as they answer about what actions were
considered and actually implemented. On January 8, 1991, Bush signed
<ent type='ORG'>Executive Order</ent> 12742, National Security Industrial Responsiveness,
which ordered the rapid mobilization of resources such as food,
energy, construction materials and civil transportation to meet
national <ent type='ORG'>sec</ent>urity requirements. There was, however, no mention in
this or any other EO of <ent type='ORG'>the National Defense Executive Reserve</ent> (<ent type='ORG'>NDER</ent>)
plan administered under <ent type='ORG'>FEMA</ent>. This plan, which had been activated
during World War II and the Korean War, permits the federal government
during a state of emergency to bring into government certain
unidentified individuals. On January 7, 1991 the "<ent type='ORG'>Wall Street Journal</ent>
<ent type='LOC'>Europe</ent>" reported that industry and government officials were studying
a plan which would permit the federal government to "borrow" as many
as 50 oil company executives and put them to work streamlining the
flow of energy in case of a prolonged engagement or disruption of
supply. <ent type='ORG'>Antitrust</ent> waivers were also being pursued and oil companies
were engaged in emergency preparedness exercises with <ent type='ORG'>the Department</ent>
of Energy.[5]
Wasting the Environment
In one case the use of <ent type='ORG'>sec</ent>ret powers was discovered by a watchdog
group and revealed in the press. In August 1990, correspondence
passed between Colin McMillan, Assistant Secretary of <ent type='ORG'>Defense</ent> for
Production and Logistics and Michael Deland, Chair of <ent type='ORG'>the White House</ent>
Council on Environmental Quality. The letters responded to
presidential and <ent type='ORG'>National Security Council</ent> directives to deal with
increased industrial production and logistics arising from the
situation in <ent type='LOC'>the Middle East</ent>. The communications revealed that the
<ent type='ORG'>Pentagon</ent> had found it necessary to request emergency waivers to U.S.
environmental restrictions.[6]
The agreement to waive <ent type='ORG'>the National Environmental Policy Act</ent> (1970)
came in August. Because of it, the <ent type='ORG'>Pentagon</ent> was allowed to test new
weapons in the western U.S., increase production of materiel and
launch new activities at military bases without the complex public
review normally required. The information on the waiver was
eventually released by the <ent type='GPE'>Boston</ent>-based <ent type='ORG'>National Toxic Campaign Fund</ent>
(<ent type='ORG'>NTCF</ent>), an environmental group which investigates pollution on the
nation's military bases. It was not until January 30, 1991, five
months after it went into effect, that the "<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>," acting
on the <ent type='ORG'>NTCF</ent> information, reported that <ent type='ORG'>the White House</ent> had bypassed
the usual legal requirement for environmental impact statements on
<ent type='ORG'>Pentagon</ent> projects.[7] So far, no specific executive order or
presidential finding authorizing this waiver has been discovered.
Other environmental waivers could also have been enacted without
the public being informed. Under a state of national emergency, U.S.
warships can be exempted from international conventions on
pollution[8] and public vessels can be allowed to dispose of
potentially infectious medical wastes into the oceans.[9] The
President can also suspend any of the statutory provisions regarding
the production, testing, transportation, deployment, and disposal of
chemical and biological warfare agents (50 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 1515). He could
also defer destruction of up to 10 percent of lethal chemical agents
and munitions that existed on November 8, 1985.[10]
One <ent type='ORG'>Executive Order</ent> which was made public dealt with "<ent type='ORG'>Chemical</ent> and
Biological Weapons Proliferation." Signed by Bush on November 16,
1990, EO 12735 leaves the impression that Bush is ordering an
increased effort to end the proliferation of chemical and biological
weapons. The order states that these weapons "constitute a threat to
national <ent type='ORG'>sec</ent>urity and foreign policy" and declares a national
emergency to deal with the threat. To confront this threat, Bush
ordered international negotiations, the imposition of controls,
licenses, and sanctions against foreign persons and countries for
proliferation. Conveniently, the order grants <ent type='ORG'>the Secretaries</ent> of
<ent type='ORG'>State</ent> and the <ent type='ORG'>Treasury</ent> the power to exempt the U.S. military.
In February of 1991, the Omnibus Export Amendments Act was passed
by <ent type='ORG'>Congress</ent> compatible with EO 12735. It imposed sanctions on
countries and companies developing or using chemical or biological
weapons. Bush signed the law, although he had rejected the identical
measure the year before because it did not give him the executive
power to waive all sanctions if he thought the national interest
required it.[11] The new bill, however, met Bush's requirements.
____________________________________________________________________
| |
| BUSH'S EXECUTIVE ORDERS |
| |
| * EO 12722 "Blocking <ent type='GPE'>Iraq</ent>i Government Property and |
| Prohibiting Transactions With <ent type='GPE'>Iraq</ent>," Aug. 2, 1990. |
| |
| * EO 12723 "Blocking <ent type='GPE'>Kuwaiti</ent> Government Property," Aug. 2, |
| 1990. |
| |
| * EO 12724 "Blocking <ent type='GPE'>Iraq</ent>i Government Property and |
| Prohibiting Transactions With <ent type='GPE'>Iraq</ent>," Aug. 9, 1990. |
| |
| * EO 12725 "Blocking <ent type='GPE'>Kuwaiti</ent> Government Property and |
| Prohibiting Transactions With <ent type='GPE'>Kuwait</ent>," Aug. 9, 1990. |
| |
| * EO 12727 "Ordering <ent type='ORG'>the Selected Reserve</ent> of the Armed |
| Forces to Active Duty," Aug. 22, 1990. |
| |
| * EO 12728 "Delegating the President's Authority To |
| Suspend Any Provision of Law Relating to the Promotion, |
| Retirement, or Separation of Members of the <ent type='ORG'>Armed Forces</ent>," |
| Aug. 22, 1990. |
| |
| * EO 12733 "Authorizing the Extension of the Period of |
| Active Duty of Personnel of <ent type='ORG'>the Selected Reserve</ent> of the |
| <ent type='ORG'>Armed Forces</ent>," Nov. 13, 1990. |
| |
| * EO 12734 "National Emergency Construction Authority," Nov. |
| 14, 1990. |
| |
| * EO 12735 "<ent type='ORG'>Chemical</ent> and Biological Weapons Proliferation," |
| Nov. 16, 1990. |
| |
| * EO 12738 "Administration of Foreign Assistance and Related |
| Functions and Arms Export Control," Dec. 14, 1990. |
| |
| * EO 12742 "National Security Industrial Responsiveness," |
| Jan. 8, 1991. |
| |
| * EO 12743 "Ordering the Ready Reserve of the <ent type='ORG'>Armed Forces</ent> |
| to Active Duty," Jan. 18, 1991. |
| |
| * EO 12744 "Designation of Arabian Peninsula Areas, Airspace |
| and Adjacent Waters as a Combat Zone," Jan. 21, 1991. |
| |
| * EO 12750 "Designation of Arabian Peninsula Areas, Airspace |
| and Adjacent Waters as <ent type='LOC'>the Persian Gulf Desert Shield</ent> |
| Area," Feb. 14, 1991. |
| |
| * EO 12751 "Health Care Services for Operation Desert |
| Storm," Feb. 14, 1991. |
| |
--------------------------------------------------------------------
Going Off Budget
Although some of the powers which Bush assumed in order to conduct
the <ent type='LOC'>Gulf</ent> War were taken openly, they received little public discussion
or reporting by the media.
In October, when the winds of the <ent type='LOC'>Gulf</ent> War were merely a breeze,
Bush used his executive emergency powers to extend his budget
authority. This action made the 1991 fiscal budget agreement between
<ent type='ORG'>Congress</ent> and the President one of the first U.S. casualties of the
war. While on one hand the deal froze arms spending through 1996, it
also allowed Bush to put the cost of the <ent type='LOC'>Gulf</ent> War "off budget." Thus,
using its emergency powers, the Bush administration could:
* incur a deficit which exceeds congressional budget authority;
* prevent <ent type='ORG'>Congress</ent> from raising a point of order over the
excessive spending;[12]
* waive the requirement that the Secretary of <ent type='ORG'>Defense</ent> submit
estimates to <ent type='ORG'>Congress</ent> prior to deployment of a major defense
acquisition system;
* and exempt the <ent type='ORG'>Pentagon</ent> from congressional restrictions on
hiring private <ent type='NORP'>contra</ent>ctors.[13]
While there is no published evidence on which powers Bush actually
invoked, the administration was able to push through the 1990 Omnibus
Reconciliation Act. This legislation put a cap on domestic spending,
created a record $300 billion deficit, and undermined the Gramm-
Rudman-Hollings Act intended to reduce the federal deficit. Although
<ent type='ORG'>Congress</ent> agreed to pay for the war through supplemental appropriations
and approved a $42.2 billion supplemental bill and a $4.8 billion
companion "dire emergency supplemental appropriation,"[14] it
specified that the supplemental budget should not be used to finance
costs the <ent type='ORG'>Pentagon</ent> would normally experience.[15]
Lawrence Korb, a <ent type='ORG'>Pentagon</ent> official in the Reagan administration,
believes that the <ent type='ORG'>Pentagon</ent> has already violated the spirit of the 1990
Omnibus Reconciliation Act. It switched funding for the <ent type='ORG'>Patriot</ent>,
Tomahawk, Hellfire and <ent type='ORG'>HARM</ent> missiles from its regular budget to the
supplemental budget; added normal wear and tear of equipment to
supplemental appropriations; and made supplemental requests which
ignore a planned 25% reduction in the armed forces by 1995.[16]
The Cost In Liberty Lost
Under emergency circumstances, using 50 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 1811, the
President could direct the Attorney General to authorize electronic
surveillance of aliens and <ent type='NORP'>American</ent> citizens in order to obtain
foreign intelligence information without a court order.[17] No
<ent type='ORG'>Executive Order</ent> has been published which activates emergency powers to
wiretap or to engage in counter-terrorist activity. Nonetheless,
there is substantial evidence that such activities have taken place.
According to the <ent type='GPE'>New York</ent>-based <ent type='ORG'>Center for Constitutional Rights</ent>, the
<ent type='ORG'>FBI</ent> launched an anti-terrorist campaign which included a broad sweep
of Arab-<ent type='NORP'>American</ent>s. Starting in August, the <ent type='ORG'>FBI</ent> questioned, detained,
and harassed Arab-<ent type='NORP'>American</ent>s in <ent type='GPE'>California</ent>, <ent type='GPE'>New York</ent>, <ent type='GPE'>Ohio</ent>,
<ent type='GPE'>Pennsylvania</ent>, <ent type='GPE'>Virginia</ent>, <ent type='GPE'>Maryland</ent>, and <ent type='GPE'>Colorado</ent>.[18]
A <ent type='ORG'>CIA</ent> agent asked <ent type='ORG'>the University</ent> of Connecticut for a list of all
foreign students at the institution, along with their country of
origin, major field of study, and the names of their academic
advisers. He was particularly interested in students from the Middle
East and explained that the <ent type='ORG'>Agency</ent> intended to open a file on each of
the students. Anti-war groups have also reported several break-ins of
their offices and many suspected electronic surveillance of their
telephones.[19]
Pool of Disinformation
Emergency powers to control the means of communications in the U.S.
in the name of national <ent type='ORG'>sec</ent>urity were never formally declared. There
was no need for Bush to do so since most of the media voluntarily and
even eagerly cooperated in their own censorship. Reporters covering
the Coalition forces in the <ent type='LOC'>Gulf</ent> region operated under restrictions
imposed by the U.S. military. They were, among other things, barred
from traveling without a military escort, limited in their forays into
the field to small escorted groups called "pools," and required to
submit all reports and film to military censors for clearance. Some
reporters complained that the rules limited their ability to gather
information independently, thereby obstructing informed and objective
reporting.[20]
Three <ent type='ORG'>Pentagon</ent> press officials in the <ent type='LOC'>Gulf</ent> region admitted to James
LeMoyne of the "<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>" that they spent significant time
analyzing reporters' stories in order to shape the coverage in the
<ent type='ORG'>Pentagon</ent>'s favor. In the early days of the deployment, <ent type='ORG'>Pentagon</ent> press
officers warned reporters who asked hard questions that they were seen
as "anti-military" and that their requests for interviews with senior
commanders and visits to the field were in jeopardy. The military
often staged events solely for the cameras and would stop televised
interviews in progress when it did not like what was being portrayed.
Although filed soon after the beginning of the war, a lawsuit
challenging the constitutionality of press restrictions was not heard
until after the war ended. It was then dismissed when the judge ruled
that since the war had ended, the issues raised had become moot. The
legal status of the restrictions--initially tested during the U.S.
invasions of <ent type='GPE'>Grenada</ent> and <ent type='GPE'>Panama</ent>--remains unsettled.
A <ent type='ORG'>National Misfortune</ent>
It will be years before researchers and journalists are able to
ferret through the maze of government documents and give a full
appraisal of the impact of the President's emergency powers on
domestic affairs. It is likely, however, that with a post-war
presidential approval rating exceeding 75 percent, the domestic
casualties will continue to mount with few objections. Paradoxically,
even though the U.S. public put pressure on Bush to send relief for
the 500000 <ent type='GPE'>Iraq</ent>i <ent type='NORP'>Kurdish</ent> refugees, it is unlikely the same outcry
will be heard for the 37 million <ent type='NORP'>American</ent>s without health insurance,
the 32 million living in poverty, or the country's five million hungry
children. The U.S. may even help rebuild <ent type='GPE'>Kuwaiti</ent> and <ent type='GPE'>Iraq</ent>i civilian
infrastructures it destroyed during the war while leaving its own
education system in decay, domestic transportation infrastructures
crumbling, and inner city war zones uninhabitable. And, while the
U.S. assists <ent type='GPE'>Kuwait</ent> in cleaning up its environmental disaster, it will
increase pollution at home. Indeed, as the long-dead <ent type='NORP'>Prussian</ent> field
marshal prophesied, "a war, even the most victorious, is a national
misfortune."
FOOTNOTES:
1. The administrative guideline was established under Reagan in Executive
Order 12656, November 181988, "<ent type='ORG'>Federal Register</ent>," vol. 23, no. 266.
2. For instance, <ent type='ORG'>National Security Council</ent> policy papers or National
Security Directives (<ent type='ORG'>NSD</ent>) or <ent type='ORG'>National Security Decision Directives</ent>
(<ent type='ORG'>NSD</ent>D) have today evolved into a network of shadowy, wide-ranging and
potent executive powers. These are <ent type='ORG'>sec</ent>ret instruments, maintained in
a top <ent type='ORG'>sec</ent>urity classified state and are not shared with <ent type='ORG'>Congress</ent>. For
an excellent discussion see: Harold C. <ent type='ORG'>Relyea</ent>, The Coming of Secret
Law, "Government Information Quarterly," Vol. 5, November 1988; see
also: Eve Pell, "The Backbone of Hidden Government," "The Nation,"
June 191990.
3. "Letter to <ent type='ORG'>Congress</ent>ional Leaders Reporting on the National Emergency
With Respect to <ent type='GPE'>Iraq</ent>," February, 11, 1991, "Weekly Compilation of
Presidential Documents: Administration of George Bush," (<ent type='GPE'>Washington</ent>,
DC: U.S. Government Printing Office), pp. 158-61.
4. The U.S. now has states of emergency with <ent type='GPE'>Iran</ent>, <ent type='GPE'>Iraq</ent> and <ent type='GPE'>Syria</ent>.
5. Allanna Sullivan, "U.S. Oil Concerns Confident Of Riding Out Short <ent type='LOC'>Gulf</ent>
War," "<ent type='ORG'>Wall Street Journal</ent> <ent type='LOC'>Europe</ent>," January 7, 1991.
6. Colin McMillan, Letter to Michael Deland, Chairman, Council on
Environmental Quality (<ent type='GPE'>Washington</ent>, DC: Executive Office of the
President), August 24, 1990; Michael R. Deland, Letter to Colin
McMillan, Assistant Secretary of <ent type='ORG'>Defense for Production and Logistics</ent>
(<ent type='GPE'>Washington</ent>, DC: Department of <ent type='ORG'>Defense</ent>), August 291990.
7. Keith Schneider, "<ent type='ORG'>Pentagon</ent> Wins Waiver Of Environmental Rule," "<ent type='GPE'>New York</ent>
<ent type='ORG'>Time</ent>s," January 30, 1991.
8. 33 U.S. Code (<ent type='ORG'>USC</ent>) <ent type='ORG'>sec</ent>. 1902 9(b).
9. 33 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 2503 l(b).
10. 50 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 1521(b) (3)(A).
ll. Adam Clymer, "<ent type='ORG'>New Bill Mandates Sanctions</ent> On Makers of <ent type='ORG'>Chemical</ent> Arms,"
"<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>," February 22, 1991.
12. 31 <ent type='ORG'>USC</ent> O10005 (f); 2 <ent type='ORG'>USC</ent> O632 (i), 6419 (d), 907a (b); and Public
Law 101-508, Title X999, <ent type='ORG'>sec</ent>. 13101.
13. 10 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 2434/2461 9F.
14. When the <ent type='ORG'>Pentagon</ent> expected the war to last months and oil prices to
skyrocket, it projected the incremental cost of deploying and
redeploying the forces and waging war at about $70 billion. The
administration sought and received $56 billion in pledges from allies
such as <ent type='GPE'>Germany</ent>, <ent type='GPE'>Japan</ent> and <ent type='GPE'>Saudi Arabia</ent>. Although the military's
estimates of casualties and the war's duration were highly inflated,
today their budget estimates remain at around $70 billion even though
the <ent type='ORG'>Congress</ent>ional Budget office estimates that cost at only $40
billion, $16 billion less than allied pledges.
15. Michael Kamish, "After The War: At Home, An Unconquered Recession,"
"<ent type='GPE'>Boston</ent> Globe," March 6, 1991; Peter Passell, "<ent type='ORG'>The Big Spoils</ent> From a
Bargain War," "<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>," March 3, 1991; and Alan Abelson, "A
War Dividend For The <ent type='ORG'>Defense</ent> Industry?" "Barron's," March 18, 1991.
16. Lawrence Korb, "The <ent type='ORG'>Pentagon</ent>'s Creative Budgetry Is Out of Line,"
"<ent type='ORG'>International Herald Tribune</ent>," April 5, 199l.
17. Many of the powers against aliens are automatically invoked during a
national emergency or state of war. Under the Alien Enemies Act (50
<ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 21), the President can issue an order to apprehend, restrain,
<ent type='ORG'>sec</ent>ure and remove all subjects of a hostile nation over 13 years old.
Other statutes conferring special powers on the President with regard
to aliens that may be exercised in times of war or emergencies but are
not confined to such circumstances, are: exclusion of all or certain
classes of aliens from entry into the U.S. when their entry may be
"detrimental to the interests of the United <ent type='ORG'>State</ent>s" (8 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 1182(f));
imposition of travel restrictions on aliens within the U.S. (8 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>.
1185); and requiring aliens to be fingerprinted (8 <ent type='ORG'>USC</ent> <ent type='ORG'>sec</ent>. 1302).
18. Ann Talamas, "<ent type='ORG'>FBI</ent> Targets Arab-<ent type='NORP'>American</ent>s," "CAIB," Spring 1991, p. 4.
19. "Anti-Repression Project Bulletin" (<ent type='GPE'>New York</ent>: Center for
Constitutional Rights), January 23, 1991.
20. James DeParle, "Long Series of Military Decisions Led to <ent type='LOC'>Gulf</ent> War News
Censorship," "<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>," May 5, 1991.
21. James LeMoyne, "A Correspondent's Tale: <ent type='ORG'>Pentagon</ent>'s Strategy for the
Press: Good News or No News," "<ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent>," February 17, 1991.
______________________________________________________________________________
Covert Action INFORMATION BULLETIN
Back Issues
No. 1 (July 1978): Agee on <ent type='ORG'>CIA</ent>; <ent type='NORP'>Cuban</ent> exile trial; consumer research-<ent type='GPE'>Jamaica</ent>.*
No. 2 (Oct. 1978): How <ent type='ORG'>CIA</ent> recruits diplomats; researching undercover
officers; double agent in <ent type='ORG'>CIA</ent>.*
No. 3 (Jan. 1979): <ent type='ORG'>CIA</ent> attacks CAIB; <ent type='ORG'>sec</ent>ret supp. to <ent type='ORG'>Army</ent> field manual;
spying on host countries.*
No. 4 (Apr.-May 1979): U.S. spies in <ent type='NORP'>Italian</ent> services; <ent type='ORG'>CIA</ent> in <ent type='GPE'>Spain</ent>; <ent type='ORG'>CIA</ent>
recruiting for <ent type='LOC'>Africa</ent>; subversive academics; <ent type='GPE'>Angola</ent>.*
No. 5 (July-Aug. 1979): U.S. intelligence in <ent type='LOC'>Southeast Asia</ent>; <ent type='ORG'>CIA</ent> in
<ent type='GPE'>Denmark</ent>, <ent type='GPE'>Sweden</ent>, <ent type='GPE'>Grenada</ent>.*
No. 6 (Oct. 1979): U.S. in <ent type='LOC'>Caribbean</ent>; <ent type='NORP'>Cuban</ent> exile terrorists; <ent type='ORG'>CIA</ent> plans
for <ent type='GPE'>Nicaragua</ent>; <ent type='ORG'>CIA</ent>'s <ent type='ORG'>sec</ent>ret "Perspectives for Intelligence."*
No. 7 (Dec. 1979-Jan. 1980): Media destabilization in <ent type='GPE'>Jamaica</ent>; Robert
<ent type='ORG'>Moss</ent>; <ent type='ORG'>CIA</ent> budget; media operations; <ent type='ORG'>UNITA</ent>; <ent type='GPE'>Iran</ent>.*
No. 8 (Mar.-Apr. 1980): Attacks on Agee; U.S. intelligence legislation;
CAIB statement to <ent type='ORG'>Congress</ent>; <ent type='GPE'>Zimbabwe</ent>; <ent type='GPE'>Northern Ireland</ent>.
No. 9 (June 1980): <ent type='ORG'>NSA</ent> in <ent type='GPE'>Norway</ent>; Glomar Explorer; mind control; <ent type='ORG'>NSA</ent>.
No. 10 (Aug.-Sept. 1980): <ent type='LOC'>Caribbean</ent>; destabilization in <ent type='GPE'>Jamaica</ent>; <ent type='GPE'>Guyana</ent>;
<ent type='GPE'>Grenada</ent> bombing; "The Spike"; deep cover manual.
No. 11 (Dec. 1980): Rightwing terrorism; <ent type='GPE'>South Korea</ent>; K<ent type='ORG'>CIA</ent>; <ent type='GPE'>Portugal</ent>;
<ent type='GPE'>Guyana</ent>; <ent type='LOC'>Caribbean</ent>; AFIO; <ent type='ORG'>NSA</ent> interview.
No. 12 (Apr. 1981): U.S. in <ent type='GPE'>Salvador</ent> and <ent type='GPE'>Guatemala</ent>; New Right; William
Casey; <ent type='ORG'>CIA</ent> in <ent type='GPE'>Mozambique</ent>; mail surveillance.*
No. 13 (July-Aug. 1981): South <ent type='LOC'>Africa</ent> documents; <ent type='GPE'>Namibia</ent>; mercenaries;
the <ent type='ORG'>Klan</ent>; Globe Aero; <ent type='GPE'>Angola</ent>; <ent type='GPE'>Mozambique</ent>; <ent type='ORG'>BOSS</ent>; <ent type='LOC'>Central America</ent>;
Max Hugel; mail surveillance.
No. 14-15 (Oct. 1981): Complete index to nos. 1-12; review of intelligence
legislation; CAIB plans; extended Naming Names.
No. 16 (Mar. 1982): <ent type='ORG'>Green Beret</ent> torture in <ent type='GPE'>Salvador</ent>; <ent type='NORP'>Argentine</ent> death squads;
<ent type='ORG'>CIA</ent> media ops; <ent type='GPE'>Seychelles</ent>; <ent type='GPE'>Angola</ent>; <ent type='GPE'>Mozambique</ent>; the <ent type='ORG'>Klan</ent>; Nugan Hand.*
No. 17 (Summer 1982): CBW History; <ent type='NORP'>Cuban</ent> dengue epidemic; Scott Barnes
and yellow rain lies; mystery death in <ent type='GPE'>Bangkok</ent>.*
No. 18 (Winter 1983): <ent type='ORG'>CIA</ent> &amp; religion; "<ent type='ORG'>sec</ent>ret" war in <ent type='GPE'>Nicaragua</ent>; Opus Dei;
<ent type='GPE'>Miskitos</ent>; evangelicals-<ent type='GPE'>Guatemala</ent>; <ent type='ORG'>Summer Inst</ent>. of Linguistics; World
Medical Relief; <ent type='ORG'>CIA</ent> &amp; <ent type='ORG'>BOSS</ent>; torture S. <ent type='LOC'>Africa</ent>; <ent type='GPE'>Vietnam</ent> defoliation.*
No. 19 (Spring-Summer 1983): <ent type='ORG'>CIA</ent> &amp; media; history of disinformation;
"plot" against Pope; <ent type='GPE'>Grenada</ent> airport; Georgie Anne Geyer.
No. 20 (Winter 1984): Invasion of <ent type='GPE'>Grenada</ent>; war in <ent type='GPE'>Nicaragua</ent>; Ft. Huachuca;
<ent type='GPE'>Israel</ent> and <ent type='GPE'>South Korea</ent> in <ent type='LOC'>Central America</ent>; <ent type='ORG'>KAL</ent> flight 007.
No. 21 (Spring 1984): N.Y. <ent type='ORG'>Time</ent>s and the <ent type='GPE'>Salvador</ent> election; <ent type='ORG'>Time</ent> and
<ent type='ORG'>Newsweek</ent> in distortions; Accuracy in Media; <ent type='GPE'>Nicaragua</ent>.
No. 22 (Fall 1984): Mercenaries &amp; terrorism; Soldier of Fortune; "privatizing"
the war in <ent type='GPE'>Nicaragua</ent>; U.S.-South <ent type='LOC'>Africa</ent>n terrorism; <ent type='NORP'>Italian</ent> fascists.
No. 23 (Spring 1985): Special issue on "plot" to kill the Pope and the
"<ent type='NORP'>Bulgarian</ent> Connection"; <ent type='ORG'>CIA</ent> ties to <ent type='NORP'>Turkish</ent> and <ent type='NORP'>Italian</ent> <ent type='ORG'>neofascists</ent>.
No. 24 (Summer 1985): <ent type='ORG'>State</ent> repression, infiltrators, provocateurs;
sanctuary movement; <ent type='NORP'>American</ent> Indian Movement; Leonard Peltier;
<ent type='ORG'>NASSCO</ent> strike; Arnaud de Borchgrave, Moon, and <ent type='ORG'>Moss</ent>; Tetra Tech.
No. 25 (Winter 1986): U.S., <ent type='NORP'>Nazis</ent>, and the <ent type='ORG'>Vatican</ent>; Knights of Malta;
Greek civil war and <ent type='NORP'>Eleni</ent>; WACL and <ent type='GPE'>Nicaragua</ent>; torture.
No. 26 (Summer 1986): U.S. state terrorism; Vernon Walters; <ent type='GPE'>Libya</ent> bombing;
<ent type='NORP'>contra</ent> agents; <ent type='GPE'>Israel</ent> and South <ent type='LOC'>Africa</ent>; Duarte; media in Costa
Rica; democracy in <ent type='GPE'>Nicaragua</ent>; plus complete index to nos. 13-25.*
No. 27 (Spring 1987): Special: Religious Right; <ent type='ORG'><ent type='GPE'>New York</ent> <ent type='ORG'>Time</ent>s</ent> and Pope
Plot; Carlucci; Southern Air Transport; Michael Ledeen.*
No. 28 (Summer 1987): Special: <ent type='ORG'>CIA</ent> and drugs: S.E. <ent type='LOC'>Asia</ent>, <ent type='GPE'>Afghanistan</ent>,
<ent type='LOC'>Central America</ent>; Nugan Hand; MKULTRA in <ent type='GPE'>Canada</ent>; <ent type='ORG'>Delta Force</ent>;
special <ent type='ORG'>sec</ent>tion on AIDS theories and CBW.*
No. 29 (Winter 1988): Special issue on <ent type='NORP'>Pacific</ent>: Philippines, <ent type='GPE'>Fiji</ent>, New
Zealand, <ent type='GPE'>Belau</ent>, <ent type='NORP'>Kanaky</ent>, <ent type='GPE'>Vanuatu</ent>; atom testing; media on <ent type='GPE'>Nicaragua</ent>;
Reader's Digest; <ent type='ORG'>CIA</ent> in <ent type='GPE'>Cuba</ent>, <ent type='GPE'>Tibet</ent>; Agee on "Veil;" more on AIDS.*
No. 30 (Summer 1989): Special: <ent type='LOC'>Middle East</ent>: The intifada, <ent type='GPE'>Israel</ent>i arms
sales; <ent type='GPE'>Israel</ent> in <ent type='LOC'>Africa</ent>; disinformation and <ent type='GPE'>Libya</ent>; <ent type='ORG'>CIA</ent>'s William
Buckley; the <ent type='NORP'>Afghan</ent> arms pipeline and <ent type='NORP'>contra</ent> lobby.
No. 31 (Winter 1989): Special issue on domestic surveillance. The <ent type='ORG'>FBI</ent>; <ent type='ORG'>CIA</ent>
on campus; Office of Public Diplomacy; Lexington Prison; <ent type='GPE'>Puerto Rico</ent>.
No. 32 (Summer 1989): Tenth Year Anniversary Issue: The Best of CAIB.
Includes articles from our earliest issues, Naming Names, <ent type='ORG'>CIA</ent> at home,
abroad, and in the media. Ten-year perspective by Philip Agee.
No. 33 (Winter 1990): The Bush Issue: <ent type='ORG'>CIA</ent> agents for Bush; Terrorism Task
Force; El <ent type='GPE'>Salvador</ent> and <ent type='GPE'>Nicaragua</ent> intervention; <ent type='NORP'>Republicans</ent> and <ent type='NORP'>Nazis</ent>.
No. 34 (Summer 1990): Assassination of Martin Luther King Jr; <ent type='GPE'>Nicaragua</ent>n
elections; South <ent type='LOC'>Africa</ent>n death squads; U.S. and Pol Pot; Pan Am
Flight 103; Noriega and the <ent type='ORG'>CIA</ent>; <ent type='ORG'>Council for National Policy</ent>.
No. 35 (Fall 1990): Special: Eastern <ent type='LOC'>Europe</ent>; Analysis-Persian <ent type='LOC'>Gulf</ent> and
<ent type='GPE'>Cuba</ent>; massacres in <ent type='GPE'>Indonesia</ent>; <ent type='ORG'>CIA</ent> and <ent type='ORG'>Banks</ent>; <ent type='GPE'>Iran</ent>-<ent type='NORP'>contra</ent>
No. 36 (Spring 1991): Racism &amp; Nat. Security: <ent type='ORG'>FBI</ent> v. Arab-<ent type='NORP'>American</ent>s &amp; Black
Officials; Special: Destabilizing <ent type='LOC'>Africa</ent>: <ent type='GPE'>Chad</ent>, <ent type='GPE'>Uganda</ent>, S. <ent type='LOC'>Africa</ent>,
<ent type='GPE'>Angola</ent>, <ent type='GPE'>Mozambique</ent>, Zaire; <ent type='GPE'>Haiti</ent>; <ent type='GPE'>Panama</ent>; <ent type='LOC'>Gulf</ent> War; COINTELPRO "art."
No. 37 (Summer 1990): Special: <ent type='LOC'>Gulf</ent> War: Media; U.N.; <ent type='GPE'>Libya</ent>; <ent type='GPE'>Iran</ent>;
Domestic costs; <ent type='GPE'>North Korea</ent> Next? Illegal Arms Deals.
* Available in Photocopy only
Subscriptions (4 issues/year) (check one)
___$17 one year ___$32 two years U.S.
___$22 one year ___$42 two years <ent type='GPE'>Canada</ent>/Mexico
___$27 one year ___$52 two years Latin America/<ent type='LOC'>Europe</ent>
___$29 one year ___$56 two years Other
$5 per year addition charge for institutions
Books, etc.
$25 "Dirty Work II: The <ent type='ORG'>CIA</ent> in <ent type='LOC'>Africa</ent>," Ray, et al.
$10 "Deadly Deceits: 25 Years in <ent type='ORG'>CIA</ent>," McGehee
$8 "Secret Contenders: <ent type='ORG'>CIA</ent> and Cold War," Beck
$6.50 "White Paper/Whitewash," Agee/Poelchau
$10 "On The Run," Agee
$1 "No <ent type='ORG'>CIA</ent>" buttons (additionals $.50)
BACK ISSUES: <ent type='ORG'>Circle</ent> above, or list below. $6 per copy in U.S.
Airmail: <ent type='GPE'>Canada</ent>/Mexico add $2; other countries add $4.
CAIB, P.O. Box 34583, <ent type='GPE'>Washington</ent>, DC 20043
--
daveus rattus
yer friendly neighborhood ratman
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
KOYAANISQATSI
ko.yan.nis.qatsi (from the Hopi Language) n. 1. crazy life. 2. life
in turmoil. 3. life out of balance. 4. life disintegrating.
5. a state of life that calls for another way of living.
</p></xml>

View File

@ -0,0 +1,695 @@
<xml><p>
[PeaceNet forward from <ent type='ORG'>AML</ent> (ACTIV-L) -- see bottom for more info]
------------------------------------------------------------------
/** mideast.forum: 216.5 **/
** Written 8:11 pm Jan 17, 1991 by nlgclc in cdp:mideast.forum **
An excellent book which deals with the <ent type='ORG'>REX</ent> 84 detention plan is:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
``Guts and Glory: The Rise and Fall of Oliver <ent type='ORG'>North</ent>,'' by Ben
Bradlee Jr. (Donald I. Fine, $21.95. 573 pp.)
------------------------------------------------------------------
Reviewed by Dennis M. Culnan Copyright 1990, Gannett News Service All
Rights Reserved Short excerpt posted here under applicable copyright
laws
[Oliver] <ent type='ORG'>North</ent> managed to network himself into the highest levels of
the <ent type='ORG'>CIA</ent> and power centers around the world. There he lied and
boastfully ignored the constitutional process, Bradlee writes.
Yet more terrifying is the plan hatched by <ent type='ORG'>North</ent> and other Reagan
people in <ent type='ORG'>the Federal Emergency Manpower Agency</ent> (<ent type='ORG'>FEMA</ent>): A blueprint
for the military takeover of <ent type='GPE'>the United States</ent>. The plan called for
<ent type='ORG'>FEMA</ent> to become ``emergency czar'' in the event of a national emergency
such as nuclear war or an <ent type='NORP'>American</ent> invasion of a foreign nation. <ent type='ORG'>FEMA</ent>
would also be a buffer between the president and his cabinet and other
civilian agencies, and would have broad powers to appoint military
commanders and run state and local governments. Finally, it would
have the authority to order suspect aliens into concentration camps
and seize their property.
When then-Attorney General William <ent type='NORP'>French</ent> Smith got wind of the plan,
he killed it. After Smith left the administration, <ent type='ORG'>North</ent> and his <ent type='ORG'>FEMA</ent>
cronies came up with the <ent type='ORG'>Defense</ent> Resource Act, designed to suspendend
the First Amendment by imposing censorship and banning strikes.
Where was it all heading? The book's answer: ``<ent type='ORG'>REX</ent>-84 Bravo, a
<ent type='ORG'>National Security Decision Directive</ent> 52 that would become operative
with the president's declaration of a state of national emergency
concurrent with a mythical U.S. military invasion of an unspecified
Central <ent type='NORP'>American</ent> country, presumably <ent type='GPE'>Nicaragua</ent>.''
Bradlee writes that the <ent type='ORG'>Rex</ent> exercise was designed to test <ent type='ORG'>FEMA</ent>'s
readiness to assume authority over <ent type='ORG'>the Department</ent> of <ent type='ORG'>Defense</ent>, the
<ent type='ORG'>National Guard</ent> in all 50 states, and ``a number of state defense
forces to be established by state legislatures.'' The military would
then be ``deputized,'' thus making an end run around federal law
forbidding military involvement in domestic law enforcement.
<ent type='ORG'>Rex</ent>, which ran concurrently with the first annual U.S. show of force
in <ent type='GPE'>Honduras</ent> in April 1984, was also designed to test <ent type='ORG'>FEMA</ent>'s ability to
round up 400000 undocumented Central <ent type='NORP'>American</ent> aliens in the United
States and its ability to distribute hundreds of tons of small arms to
``state defense forces.''
Incredibly, <ent type='ORG'>REX</ent> 84 was similar to a plan secretly adopted by Reagan
while governor of <ent type='GPE'>California</ent>. His two top henchmen then were Edwin
Meese, who recently resigned as U.S. attorney general, and Louis
Guiffrida, the <ent type='ORG'>FEMA</ent> director in 1984.
If the review makes you nervous, you should read the book!
--Chip Berlet ** End of text from cdp:mideast.forum **
--------------------------------END:<ent type='ORG'>REF</ent>3-----------------------------------
###########################################################################
--------------------------------<ent type='ORG'>REF</ent>4:<ent type='ORG'>FEMA</ent>----------------------------------
[PeaceNet forward from <ent type='ORG'>AML</ent> (ACTIV-L) -- see bottom for more info]
------------------------------------------------------------------
This is the front-page article of the Jan. 16 issue of "The
<ent type='ORG'>Guardian</ent>," which describes some of the U.S. government's planning
for martial law in the event of the Gulf war. This is truly a
scary scenario that should concern all civil libertarians and
patriots.
------------------------------------------------------------------
WILL GULF WAR LEAD TO REPRESSION AT HOME?
by Paul DeRienzo and Bill Weinberg
On August 2, 1990, as Saddam Hussein's army was consolidating control
over <ent type='GPE'>Kuwait</ent>, President George Bush responded by signing two executive
orders that were the first step toward martial law in the United
States and suspending the Constitution.
On the surface, <ent type='ORG'>Executive Order</ent>s 12722 and 12723, declaring a
"national emergency," merely invoked laws that allowed Bush to freeze
<ent type='NORP'>Iraqi</ent> assets in <ent type='GPE'>the United States</ent>.
<ent type='ORG'>The International Emergency Executive Powers Act</ent> permits the president
to freeze foreign assets after declaring a "national emergency," a
move that has been made three times before -- against <ent type='GPE'>Panama</ent> in 1987,
<ent type='GPE'>Nicaragua</ent> in 1985 and <ent type='GPE'>Iran</ent> in 1979.
According to Professor Diana <ent type='ORG'>Reynolds</ent>, of <ent type='ORG'>the Fletcher School</ent> of
Diplomacy at <ent type='GPE'>Boston</ent>'s <ent type='ORG'>Tufts University</ent>, when Bush declared a national
emergency he "activated one part of a contingency national security
emergency plan." That plan is made up of a series of laws passed since
the presidency of Richard Nixon, which <ent type='ORG'>Reynolds</ent> says give the
president "boundless" powers.
According to <ent type='ORG'>Reynolds</ent>, such laws as the <ent type='ORG'>Defense</ent> Industrial
Revitalization and Disaster Relief Acts of 1983 "would permit the
president to do anything from seizing the means of production, to
conscripting a labor force, to relocating groups of citizens."
<ent type='ORG'>Reynolds</ent> says the net effect of invoking these laws would be the
suspension of the Constitution.
She adds that national emergency powers "permit the stationing of the
military in cities and towns, closing off the U.S. borders, freezing
all imports and exports, allocating all resources on a national
security priority, monitoring and censoring the press, and warrantless
searches and seizures."
The measures would allow military authorities to proclaim martial law
in <ent type='GPE'>the United States</ent>, asserts <ent type='ORG'>Reynolds</ent>. She defines martial law as the
"federal authority taking over for local authority when they are
unable to maintain law and order or to assure a <ent type='NORP'>republican</ent> form of
government."
A report called "<ent type='ORG'>Post Attack Recovery Strategies</ent>," about rebuilding
the country after a nuclear war, prepared by the right-wing Hudson
Institute in 1980, defines martial law as dealing "with the control of
civilians by their own military forces in time of emergency."
The federal agency with the authority to organize and command the
government's response to a national emergency is the Federal Emergency
Management Agency (<ent type='ORG'>FEMA</ent>). This super-secret and elite agency was
formed in 1979 under congressional measures that merged all federal
powers dealing with civilian and military emergencies under one
agency.
<ent type='ORG'>FEMA</ent> has its roots in the World War I partnership between government
and corporate leaders who helped mobilize the nation's industries to
support the war effort. The idea of a central national response to
large-scale emergencies was reintroduced in the early 1970s by Louis
Giuffrida, a close associate of then-<ent type='GPE'>California</ent> Gov. Ronald Reagan and
his chief aide Edwin Meese.
Reagan appointed Giuffrida head of the <ent type='GPE'>California</ent> <ent type='ORG'>National Guard</ent> in
1969. With Meese, Giuffrida organized "war-games" to prepare for
"statewide martial law" in the event that Black nationalists and
anti-war protesters "challenged the authority of the state." In 1981,
Reagan as president moved Giuffrida up to the big leagues, appointing
him director of <ent type='ORG'>FEMA</ent>.
According to <ent type='ORG'>Reynolds</ent>, however, it was the actions of George Bush in
1976, while he was the director of <ent type='ORG'>the Central Intelligence Agency</ent>
(<ent type='ORG'>CIA</ent>), that provided the stimulus for centralization of vast powers in
<ent type='ORG'>FEMA</ent>.
Bush assembled a group of hawkish outsiders, called Team B, that
released a report claiming the <ent type='ORG'>CIA</ent> ("Team A") had underestimated the
dangers of <ent type='NORP'>Soviet</ent> nuclear attack. The report advised the development
of elaborate plans for "civil defense" and post-nuclear government.
Three years later, in 1979, <ent type='ORG'>FEMA</ent> was given ultimate responsibility for
developing these plans.
Aware of the bad publicity <ent type='ORG'>FEMA</ent> was getting because of its role in
organizing for a post-nuclear world, Reagan's <ent type='ORG'>FEMA</ent> chief Giuffrida
publicly argued that the 1865 Posse Comitatus Act prohibited the
military from arresting civilians.
However, <ent type='ORG'>Reynolds</ent> says that <ent type='ORG'>Congress</ent> eroded the act by giving the
military reserves an exemption from Posse Comitatus and allowing them
to arrest civilians. <ent type='ORG'>The National Guard</ent>, under the control of state
governors in peace time, is also exempt from the act and can arrest
civilians.
<ent type='ORG'>FEMA</ent> Inspector General John Brinkerhoff has written a memo contending
that the government doesn't need to suspend the Constitution to use
the full range of powers <ent type='ORG'>Congress</ent> has given the agency. <ent type='ORG'>FEMA</ent> has
prepared legislation to be introduced in <ent type='ORG'>Congress</ent> in the event of a
national emergency that would give the agency sweeping powers. The
right to "deputize" <ent type='ORG'>National Guard</ent> and police forces is included in
the package. But <ent type='ORG'>Reynolds</ent> believes that actual martial law need not be
declared publicly.
Giuffrida has written that "Martial Rule comes into existence upon a
determination (not a declaration) by the senior military commander
that the civil government must be replaced because it is no longer
functioning anyway." He adds that "Martial Rule is limited only by the
principle of necessary force."
According to <ent type='ORG'>Reynolds</ent>, it is possible for the president to make
declarations concerning a national emergency secretly in the form of a
Natioanl Security Decision Directive. Most such directives are
classified as so secret that <ent type='ORG'>Reynolds</ent> says "researchers don't even
know how many are enacted."
DOMESTIC SPYING
Throughout the 1980s, <ent type='ORG'>FEMA</ent> was prohibited from engaging in
intelligence gathering. But on July 6, 1989, Bush signed Executive
Order 12681, pronouncing that <ent type='ORG'>FEMA</ent>'s <ent type='ORG'>National Preparedness Directorate</ent>
would "have as a primary function intelligence, counterintelligence,
investigative, or national security work." Recent events indicate that
domestic spying in response to the looming <ent type='LOC'>Middle East</ent> war is now
under way.
<ent type='ORG'>Reynolds</ent> reports that "the <ent type='ORG'>CIA</ent> is going to various campuses asking for
information on <ent type='LOC'>Middle East</ent>ern students. I'm sure that there are
intelligence organizations monitoring peace demonstrations."
According to <ent type='ORG'>the University</ent> of Connecticut student paper, the Daily
Campus, <ent type='ORG'>CIA</ent> officials have recently met there to discuss talking with
<ent type='LOC'>Middle East</ent>ern students.
<ent type='ORG'>The New York Times</ent> reports that the <ent type='ORG'>FBI</ent> has ordered its agents around
the country to question Arab-<ent type='NORP'>American</ent> leaders and business people in
search of information on potential <ent type='NORP'>Iraqi</ent> "terrorist" attacks in
response to a Gulf war.
A 1986 <ent type='ORG'>Immigration and Naturalization Service</ent> (<ent type='ORG'>INS</ent>) document entitled
"Alien Terrorists and Other Undesirables: A Contingency Plan" outlines
the potential round-up and incarceration in mass detainment camps of
U.S. residents who are citizens of "terrorist" countries, chiefly in
the <ent type='LOC'>Middle East</ent>. This plan echoed a 1984 <ent type='ORG'>FEMA</ent> nationwide "readiness
exercise code-named <ent type='ORG'>REX</ent>-84 ALPHA, which included the rehearsal of
joint operations with the <ent type='ORG'>INS</ent> to round up 40000 Central <ent type='NORP'>American</ent>
refugees in the event of a U.S. invasion of the region. One of the 10
military bases established as detainment camps by <ent type='ORG'>REX</ent>-84 ALPHA, Camp
Krome, <ent type='GPE'>Fla</ent>., was designated a joint <ent type='ORG'>FEMA</ent>-Immigration service
interrogation center.
Recently, <ent type='ORG'>FEMA</ent> has been criticized in the media for inadequate
response to the October, 1989 <ent type='GPE'>San Francisco</ent> earthquake. What the
mainstream press has failed to cover is the agency's planned role in
repressing domestic dissent in the event of an invasion abroad.
Source: The <ent type='ORG'>Guardian</ent>, Jan 16 1991
The <ent type='ORG'>Guardian</ent> is an independent radical news weekly. Subscriptions are
available at $33.50 per year from The <ent type='ORG'>Guardian</ent>, 33 West 17th St., New
York, NY 10011
----------------------------END:<ent type='ORG'>REF</ent>4------------------------------------
########################################################################
----------------------------<ent type='ORG'>REF</ent>5:<ent type='ORG'>NSDD</ent> 145-------------------------------
DATE OF <ent type='ORG'>UPLOAD</ent>: November 17, 1989
ORIGIN OF <ent type='ORG'>UPLOAD</ent>: <ent type='ORG'>Omni Magazine</ent>
CONTRIBUTED BY: Donald Goldberg
========================================================
PARANET INFORMATION SERVICE BBS
========================================================
Although this article does not deal directly with UFOs,
ParaNet felt it important as an offering to our readers who
depend so much upon communications as a way to stay informed.
This article raises some interesting implications for the future
of communications.
<ent type='ORG'>THE NATIONAL GUARDS</ent>
(C) 1987 <ent type='ORG'>OMNI</ent> MAGAZINE MAY 1987
(Reprinted with permission and license to ParaNet Information
Service and its affiliates.)
By Donald Goldberg
The mountains bend as the fjord and the sea beyond stretch
out before the viewer's eyes. First over the water, then a sharp
left turn, then a bank to the right between the peaks, and the
secret naval base unfolds upon the screen.
The scene is of a <ent type='NORP'>Soviet</ent> military installation on the Kola
Peninsula in the icy <ent type='LOC'>Barents Sea</ent>, a place usually off-limits to
the gaze of the <ent type='NORP'>Western</ent> world. It was captured by a small <ent type='NORP'>French</ent>
satellite called SPOT Image, orbiting at an altitude of 517 miles
above the hidden <ent type='NORP'>Russian</ent> outpost. On each of several passes --
made over a two-week period last fall -- the satellite's high-
resolution lens took its pictures at a different angle; the
images were then blended into a three-dimensional, computer-
generated video. Buildings, docks, vessels, and details of the
Artic landscape are all clearly visible.
Half a world away and thousands of feet under the sea,
sparkling-clear images are being made of the ocean floor. Using
the latest bathymetric technology and state-of-the-art systems
known as <ent type='ORG'>Seam Beam</ent> and <ent type='NORP'>Hydrochart</ent>, researchers are for the first
time assembling detailed underwater maps of the continental
shelves and the depths of the world's oceans. These scenes of
the sea are as sophisticated as the photographs taken from the
satellite.
From the three-dimensional images taken far above the earth
to the charts of the bottom of the oceans, these photographic
systems have three things in common: They both rely on the
latest technology to create accurate pictures never dreamed of
even 25 years ago; they are being made widely available by
commerical, nongovernmental enterprises; and the <ent type='ORG'>Pentagon</ent> is
trying desperately to keep them from the general public.
In 1985 the <ent type='ORG'>Navy</ent> classified the underwater charts, making
them available only to approved researchers whose needs are
evaluated on a case-by-case basis. Under a 1984 law the military
has been given a say in what cameras can be licensed to be used
on <ent type='NORP'>American</ent> satellites; and officials have already announced they
plan to limit the quality and resolution of photos made
available. <ent type='ORG'>The National Security Agency</ent> (<ent type='ORG'>NSA</ent>) -- the secret arm
of the <ent type='ORG'>Pentagon</ent> in charge of gathering electronic intelligence as
well as protecting sensitive U.S. communications -- has defeated
a move to keep it away from civilian and commercial computers and
databases.
That attitude has outraged those concerned with the
military's increasing efforts to keep information not only from
the public but from industry experts, scientists, and even other
government officials as well. "That's like classifying a road
map for fear of invasion," says Paul Wolff, assistant
administrator for the National Oceanic and Atmospheric
Administration, of the attempted restrictions.
These attempts to keep unclassified data out of the hands of
scientists, researchers, the news media, and the public at large
are a part of an alarming trend that has seen the military take
an ever-increasing role in controlling the flow of information
and communications through <ent type='NORP'>American</ent> society, a role traditionally
-- and almost exclusively -- left to civilians. Under the
approving gaze of the Reagan administration, Department of
<ent type='ORG'>Defense</ent> (DoD) officials have quietly implemented a number of
policies, decisions, and orders that give the military
unprecedented control over both the content and public use of
data and communications. For example:
**The <ent type='ORG'>Pentagon</ent> has created a new category of "sensitive" but
unclassified information that allows it to keep from public
access huge quantities of data that were once widely accessible.
**<ent type='ORG'>Defense Department</ent> officials have attempted to rewrite key laws
that spell out when the president can and cannot appropriate
private communications facilities.
**The <ent type='ORG'>Pentagon</ent> has installed a system that enables it to seize
control of the nation's entire communications network -- the
phone system, data transmissions, and satellite transmissions of
all kinds -- in the event of what it deems a "national
emergency." As yet there is no single, universally agreed-upon
definition of what constitutes such a state. Usually such an
emergency is restricted to times of natural disaster, war, or
when national security is specifically threatened. Now the
military has attempted to redefine emergency.
The point man in the <ent type='ORG'>Pentagon</ent>'s onslaught on communications
is Assistant <ent type='ORG'>Defense</ent> Secretary Donald C. Latham, a former <ent type='ORG'>NSA</ent>
deputy chief. Latham now heads up an interagency committee in
charge of writing and implementing many of the policies that have
put the military in charge of the flow of civilian information
and communication. He is also the architect of National Security
Decision Directive 145 (<ent type='ORG'>NSDD</ent> 145), signed by <ent type='ORG'>Defense</ent> Secretary
Caspar Weinberger in 1984, which sets out the national policy on
telecommunications and computer-systems security.
First <ent type='ORG'>NSDD</ent> 145 set up a steering group of top-level
administration officials. Their job is to recommend ways to
protect information that is unclassified but has been designated
sensitive. Such information is held not only by government
agencies but by private companies as well. And last October the
steering group issued a memorandum that defined sensitive
information and gave federal agencies broad new powers to keep it
from the public.
According to Latham, this new category includes such data as
all medical records on government databases -- from the files of
<ent type='ORG'>the National Cancer Institute</ent> to information on every veteran who
has ever applied for medical aid from <ent type='ORG'>the Veterans Administration</ent>
-- and all the information on corporate and personal taxpayers in
the Internal Revenue Service's computers. Even agricultural
statistics, he argues, can be used by a foreign power against the
<ent type='GPE'>United States</ent>.
In his oversize yet Spartan <ent type='ORG'>Pentagon</ent> office, Latham cuts
anything but an intimidating figure. <ent type='ORG'>Articulate</ent> and friendly, he
could pass for a network anchorman or a television game show
host. When asked how the government's new definition of
sensitive information will be used, he defends the necessity for
it and tries to put to rest concerns about a new restrictiveness.
"The debate that somehow the DoD and <ent type='ORG'>NSA</ent> are going to
monitor or get into private databases isn't the case at all,"
Latham insists. "The definition is just a guideline, just an
advisory. It does not give the DoD the right to go into private
records."
Yet the <ent type='ORG'>Defense Department</ent> invoked the <ent type='ORG'>NSDD</ent> 145 guidelines
when it told the information industry it intends to restrict the
sale of data that are now unclassified and publicly available
from privately owned computer systems. The excuse if offered was
that these data often include technical information that might be
valuable to a foreign adversary like the <ent type='NORP'>Soviet</ent> Union.
<ent type='ORG'>Mead Data Central</ent> -- which runs some of the nation's largest
computer databases, such as Lexis and <ent type='ORG'>Nexis</ent>, and has nearly
200000 users -- says it has already been approached by a team of
agents from <ent type='ORG'>the Air Force</ent> and officials from the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>FBI</ent>
who asked for the names of subscribers and inquired what Mead
officials might do if information restrictions were imposed. In
response to government pressure, <ent type='ORG'>Mead Data Central</ent> in effect
censured itself. It purged all unclassified government-supplied
technical data from its system and completely dropped the
National Technical Information System from its database rather
than risk a confrontation.
Representative Jack <ent type='ORG'>Brooks</ent>, a <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who chairs the
<ent type='ORG'>House</ent> Government Operations Committee, is an outspoken critic of
the <ent type='ORG'>NSA</ent>'s role in restricting civilian information. He notes
that in 1985 the <ent type='ORG'>NSA</ent> -- under the authority granted by <ent type='ORG'>NSDD</ent> 145
-- investigated a computer program that was widely used in both
local and federal elections in 1984. The computer system was
used to count more than one third of all votes cast in the United
States. While probing the system's vulnerability to outside
manipulation, the <ent type='ORG'>NSA</ent> obtained a detailed knowledge of that
computer program. "In my view," <ent type='ORG'>Brooks</ent> says, "this is an
unprecedented and ill-advised expansion of the military's
influence in our society."
There are other <ent type='ORG'>NSA</ent> critics. "The computer systems used by
counties to collect and process votes have nothing to do with
national security, and I'm really concerned about the <ent type='ORG'>NSA</ent>'s
involvement," says <ent type='NORP'>Democrat</ent>ic congressman Dan Glickman of <ent type='GPE'>Kansas</ent>,
chairman of the <ent type='ORG'>House</ent> science and technology subcommittee
concerned with computer security.
Also, under <ent type='ORG'>NSDD</ent> 145 the <ent type='ORG'>Pentagon</ent> has issued an order,
virtually unknown to all but a few industry executives, that
affects commercial communications satellites. The policy was
made official by <ent type='ORG'>Defense</ent> Secretary Weinberger in June of 1985 and
requires that all commercial satellite operators that carry such
unclassified government data traffic as routine <ent type='ORG'>Pentagon</ent> supply
information and payroll data (and that compete for lucrative
government contracts) install costly protective systems on all
satellites launched after 1990. The policy does not directly
affect the data over satellite channels, but it does make the <ent type='ORG'>NSA</ent>
privy to vital information about the essential signals needed to
operate a satellite. With this information it could take control
of any satellite it chooses.
Latham insists this, too, is a voluntary policy and that
only companies that wish to install protection will have their
systems evaluated by the <ent type='ORG'>NSA</ent>. He also says industry officials
are wholly behind the move, and argues that the protective
systems are necessary. With just a few thousand dollars' worth
of equipment, a disgruntled employee could interfere with a
satellite's control signals and disable or even wipe out a
hundred-million-dollar satellite carrying government information.
At best, his comments are misleading. First, the policy is
not voluntary. The <ent type='ORG'>NSA</ent> can cut off lucrative government
contracts to companies that do not comply with the plan. The
<ent type='ORG'>Pentagon</ent> alone spent more than a billion dollars leasing
commercial satellite channels last year; that's a powerful
incentive for business to cooperate.
Second, the industry's support is anything but total.
According to the minutes of one closed-door meeting between <ent type='ORG'>NSA</ent>
officials -- along with representatives of other federal agencies
-- and executives from AT&amp;T, <ent type='ORG'>Comsat</ent>, <ent type='ORG'>GTE Sprint</ent>, and <ent type='ORG'>MCI</ent>, the
executives neither supported the move nor believed it was
necessary. The <ent type='ORG'>NSA</ent> defended the policy by arguing that a
satellite could be held for ransom if the command and control
links weren't protected. But experts at the meeting were
skeptical.
"Why is the threat limited to accessing the satellite rather
than destroying it with lasers or high-powered signals?" one
industry executive wanted to know.
Most of the officials present objected to the high cost of
protecting the satellites. According to a 1983 study made at the
request of the <ent type='ORG'>Pentagon</ent>, the protection demanded by the <ent type='ORG'>NSA</ent> could
add as much as $3 million to the price of a satellite and $1
million more to annual operating costs. Costs like these, they
argue, could cripple a company competing against less expensive
communications networks.
<ent type='NORP'>American</ent>s get much of their information through forms of
electronic communications, from the telephone, television and
radio, and information printed in many newspapers. Banks send
important financial data, businesses their spreadsheets, and
stockbrokers their investment portfolios, all over the same
channels, from satellite signals to computer hookups carried on
long distance telephone lines. To make sure that the federal
government helped to promote and protect the efficient use of
this advancing technology, <ent type='ORG'>Congress</ent> passed the massive
Communications Act of of 1934. It outlined the role and laws of
the communications structure in <ent type='GPE'>the United States</ent>.
The powers of the president are set out in Section 606 of
that law; basically it states that he has the authority to take
control of any communications facilities that he believes
"essential to the national defense." In the language of the
trade this is known as a 606 emergency.
There have been a number of attempts in recent years by
<ent type='ORG'>Defense Department</ent> officials to redefine what qualifies as a 606
emergency and make it easier for the military to take over
national communications.
In 1981 the <ent type='ORG'>Senate</ent> considered amendments to the 1934 act
that would allow the president, on <ent type='ORG'>Defense Department</ent>
recommendation, to require any communications company to provide
services, facilities, or equipment "to promote the national
defense and security or the emergency preparedness of the
nation," even in peacetime and without a declared state of
emergency. The general language had been drafted by <ent type='ORG'>Defense</ent>
Department officials. (The bill failed to pass the <ent type='ORG'>House</ent> for
unrelated reasons.)
"I think it is quite clear that they have snuck in there
some powers that are dangerous for us as a company and for the
public at large," said <ent type='ORG'>MCI</ent> vice president Kenneth Cox before the
<ent type='ORG'>Senate</ent> vote.
Since President Reagan took office, the <ent type='ORG'>Pentagon</ent> has stepped
up its efforts to rewrite the definition of national emergency
and give the military expanded powers in <ent type='GPE'>the United States</ent>. "The
declaration of 'emergency' has always been vague," says one
former administration official who left the government in 1982
after ten years in top policy posts. "Different presidents have
invoked it differently. This administration would declare a
convenient 'emergency.'" In other words, what is a nuisance to
one administration might qualify as a burgeoning crisis to
another. For example, the Reagan administration might decide
that a series of protests on or near military bases constituted a
national emergency.
Should the <ent type='ORG'>Pentagon</ent> ever be given the green light, its base
for taking over the nation's communications system would be a
nondescript yellow brick building within the maze of high rises,
government buildings, and apartment complexes that make up the
<ent type='GPE'>Washington</ent> suburb of <ent type='GPE'>Arlington</ent>, Virginia. Headquartered in a
dusty and aging structure surrounded by a barbed-wire fence is an
obscure branch of the military known as the <ent type='ORG'>Defense</ent>
Communications Agency (<ent type='ORG'>DCA</ent>). It does not have the spit and
polish of <ent type='ORG'>the National Security Agency</ent> or the dozens of other
government facilities that make up the nation's capital. But its
lack of shine belies its critical mission: to make sure all of
<ent type='GPE'>America</ent>'s far-flung military units can communicate with one
another. It is in certain ways the nerve center of our nation's
defense system.
On the second floor of the <ent type='ORG'>DCA</ent>'s four-story headquarters is
a new addition called the National Coordinating Center (<ent type='ORG'>NCC</ent>).
Operated by the <ent type='ORG'>Pentagon</ent>, it is virtually unknown outside of a
handful of industry and government officials. The <ent type='ORG'>NCC</ent> is staffed
around the clock by representatives of a dozen of the nation's
largest commercial communications companies -- the so-called
"common carriers" -- including AT&amp;T, <ent type='ORG'>MCI</ent>, <ent type='ORG'>GTE</ent>, <ent type='ORG'>Comsat</ent>, and <ent type='ORG'>ITT</ent>.
Also on hand are officials from <ent type='ORG'>the State Department</ent>, the <ent type='ORG'>CIA</ent>,
the Federal Aviation Administration, and a number of other
federal agencies. During a 606 emergency the <ent type='ORG'>Pentagon</ent> can order
the companies that make up the National Coordinating Center to
turn over their satellite, fiberoptic, and land-line facilities
to the government.
On a long corridor in the front of the building is a series
of offices, each outfitted with a private phone, a telex machine,
and a combination safe. It's known as "logo row" because each
office is occupied by an employee from one of the companies that
staff the <ent type='ORG'>NCC</ent> and because their corporate logos hand on the wall
outside. Each employee is on permanent standby, ready to
activate his company's system should the <ent type='ORG'>Pentagon</ent> require it.
The <ent type='ORG'>National Coordinating Center</ent>'s mission is as grand as
its title is obscure: to make available to the <ent type='ORG'>Defense</ent>
Department all the facilities of the civilian communications
network in this country -- the phone lines, the long-distance
satellite hookups, the data transmission lines -- in times of
national emergency. If war breaks out and communications to a
key military base are cut, the <ent type='ORG'>Pentagon</ent> wants to make sure that
an alternate link can be set up as fast as possible. <ent type='ORG'>Company</ent>
employees assigned to the center are on call 24 hours a day; they
wear beepers outside the office, and when on vacation they must
be replaced by qualified colleagues.
The center formally opened on New Year's Day, 1984, the same
day Ma Bell's monopoly over the telephone network of the entire
<ent type='GPE'>United States</ent> was finally broken. The timing was no coincidence.
<ent type='ORG'>Pentagon</ent> officials had argued for years along with AT&amp;T against
the divestiture of Ma Bell, on grounds of national security.
<ent type='ORG'>Defense</ent> Secretary Weinberger personally urged the attorney
general to block the lawsuit that resulted in the breakup, as had
his predecessor, Harold Brown. The reason was that rather than
construct its own communications network, the <ent type='ORG'>Pentagon</ent> had come
to rely extensively on the phone company. After the breakup the
dependence continued. The <ent type='ORG'>Pentagon</ent> still used commercial
companies to carry more than 90 percent of its communications
within the continental <ent type='GPE'>United States</ent>.
The 1984 divestiture put an end to AT&amp;T's monopoly over the
nation's telephone service and increased the <ent type='ORG'>Pentagon</ent>'s obsession
with having its own nerve center. Now the brass had to contend
with several competing companies to acquire phone lines, and
communications was more than a matter of running a line from one
telephone to another. Satellites, microwave towers, fiberoptics,
and other technological breakthroughs never dreamed of by
Alexander Graham Bell were in extensive use, and not just for
phone conversations. <ent type='ORG'>Digital</ent> data streams for computers flowed
on the same networks.
These facts were not lost on the <ent type='ORG'>Defense Department</ent> or the
White <ent type='ORG'>House</ent>. According to documents obtained by <ent type='ORG'>Omni</ent>, beginning
on December 14, 1982, a number of secret meetings were held
between high-level administration officials and executives of the
commercial communications companies whose employees would later
staff the <ent type='ORG'>National Coordinating Center</ent>. The meetings, which
continued over the next three years, were held at the White
<ent type='ORG'>House</ent>, the State Department, <ent type='ORG'>the Strategic Air Command</ent> (<ent type='ORG'>SAC</ent>)
headquarters at Offutt Air Force Base in <ent type='GPE'>Nebraska</ent>, and at the
<ent type='ORG'>North</ent> <ent type='NORP'>American</ent> Aerospace <ent type='ORG'>Defense</ent> Command (<ent type='ORG'>NORAD</ent>) in Colorado
Springs.
The industry officials attending constituted the National
Security Telecommunications Advisory Committee -- called NSTAC
(pronounced N-stack) -- set up by President Reagan to address
those same problems that worried the <ent type='ORG'>Pentagon</ent>. It was at these
secret meetings, according to the minutes, that the idea of a
communications watch center for national emergencies -- the <ent type='ORG'>NCC</ent>
-- was born. Along with it came a whole set of plans that would
allow the military to take over commercial communications
"assets" -- everything from ground stations and satellite dishes
to fiberoptic cables -- across the country.
At a 1983 Federal Communications Commission meeting, a
ranking <ent type='ORG'>Defense</ent> Department official offered the following
explanation for the founding of <ent type='ORG'>the National Coordinating Center</ent>:
"We are looking at trying to make communications endurable for a
protracted conflict." The phrase protracted conflict is a
military euphemism for nuclear war.
But could the <ent type='ORG'>NCC</ent> survive even the first volley in such a
conflict?
Not likely. It's located within a mile of the <ent type='ORG'>Pentagon</ent>,
itself an obvious early target of a <ent type='NORP'>Soviet</ent> nuclear barrage (or a
conventional strike, for that matter). And the <ent type='ORG'>Kremlin</ent>
undoubtedly knows its location and importance, and presumably has
included it on its priority target list. In sum, according to
one <ent type='ORG'>Pentagon</ent> official, "The <ent type='ORG'>NCC</ent> itself is not viewed as a
survivable facility."
Furthermore, the <ent type='ORG'>NCC</ent>'s "Implementation Plan," obtained by
<ent type='ORG'>Omni</ent>, lists four phases of emergencies and how the center should
respond to each. The first, Phase 0, is Peacetime, for which
there would be little to do outside of a handful of routine tasks
and exercises. Phase 1 is Pre Attack, in which alternate <ent type='ORG'>NCC</ent>
sites are alerted. Phase 2 is Post Attack, in which other <ent type='ORG'>NCC</ent>
locations are instructed to take over the center's functions.
Phase 3 is known as Last Ditch, and in this phase whatever
facility survives becomes the de facto <ent type='ORG'>NCC</ent>.
So far there is no alternate <ent type='ORG'>National Coordinating Center</ent> to
which <ent type='ORG'>NCC</ent> officials could retreat to survive an attack.
According to <ent type='ORG'>NCC</ent> deputy director William Belford, no physical
sites have yet been chosen for a substitute <ent type='ORG'>NCC</ent>, and even whether
the <ent type='ORG'>NCC</ent> itself will survive a nuclear attack is still under
study.
Of what use is a communications center that is not expected
to outlast even the first shots of a war and has no backup?
The answer appears to be that because of the <ent type='ORG'>Pentagon</ent>'s
concerns about the AT&amp;T divestiture and the disruptive effects it
might have on national security, the <ent type='ORG'>NCC</ent> was to serve as the
military's peacetime communications center.
The center is a powerful and unprecedented tool to assume
control over the nation's vast communications and information
network. For years the <ent type='ORG'>Pentagon</ent> has been studying how to take
over the common carriers' facilities. That research was prepared
by NSTAC at the DoD's request and is contained in a series of
internal <ent type='ORG'>Pentagon</ent> documents obtained by <ent type='ORG'>Omni</ent>. Collectively this
series is known as <ent type='ORG'>the Satellite Survivability Report</ent>. Completed
in 1984, it is the only detailed analysis to date of the
vulnerabilities of the commercial satellite network. It was
begun as a way of examining how to protect the network of
communications facilities from attack and how to keep it intact
for the DoD.
A major part of the report also contains an analysis of how
to make commercial satellites "interoperable" with <ent type='ORG'>Defense</ent>
Department systems. While the report notes that current
technical differences such as varying frequencies make it
difficult for the <ent type='ORG'>Pentagon</ent> to use commercial satellites, it
recommends ways to resolve those problems. Much of the report is
a veritable blueprint for the government on how to take over
satellites in orbit above <ent type='GPE'>the United States</ent>. This information,
plus <ent type='ORG'>NSDD</ent> 145's demand that satellite operators tell the <ent type='ORG'>NSA</ent> how
their satellites are controlled, guarantees the military ample
knowledge about operating commercial satellites.
The <ent type='ORG'>Pentagon</ent> now has an unprecedented access to the civilian
communications network: commercial databases, computer networks,
electronic links, telephone lines. All it needs is the legal
authority to use them. Then it could totally dominate the flow
of all information in <ent type='GPE'>the United States</ent>. As one high-ranking
White <ent type='ORG'>House</ent> communications official put it: "Whoever controls
communications, controls the country." His remark was made after
our State Department could not communicate directly with our
embassy in <ent type='GPE'>Manila</ent> during the anti-Marcos revolution last year.
To get through, the State Department had to relay all its
messages through the <ent type='NORP'>Philippine</ent> government.
Government officials have offered all kinds of scenarios to
justify the National Coordinating Center, the Satellite
Survivability Report, new domains of authority for the <ent type='ORG'>Pentagon</ent>
and the <ent type='ORG'>NSA</ent>, and the creation of top-level government steering
groups to think of even more policies for the military. Most can
be reduced to the rationale that inspired <ent type='ORG'>NSDD</ent> 145: that our
enemies (presumably the <ent type='NORP'>Soviet</ent>s) have to be prevented from
getting too much information from unclassified sources. And the
only way to do that is to step in and take control of those
sources.
Remarkably, the communications industry as a whole has not
been concerned about the overall scope of the <ent type='ORG'>Pentagon</ent>'s threat
to its freedom of operation. Most protests have been to
individual government actions. For example, a media coalition
that includes the Radio-Television Society of Newspaper Editors,
and <ent type='ORG'>the Turner Broadcasting System</ent> has been lobbying that before
the government can restrict the use of satellites, it must
demonstrate why such restrictions protect against a "threat to
distinct and compelling national security and foreign policy
interests." But the whole policy of restrictiveness has not been
examined. That may change sometime this year, when <ent type='ORG'>the Office</ent> of
Technology Assessment issues a report on how the <ent type='ORG'>Pentagon</ent>'s
policy will affect communications in <ent type='GPE'>the United States</ent>. In the
meantime the military keeps trying to encroach on national
communications.
While it may seem unlikely that the <ent type='ORG'>Pentagon</ent> will ever get
total control of our information and communications systems, the
truth is that it can happen all too easily. The official
mechanisms are already in place; and few barriers remain to
guarantee that what we hear, see, and read will come to us
courtesy of our being members of a free and open society and not
courtesy of the <ent type='ORG'>Pentagon</ent>.
=================================================================
Psi-Tech and alien brain-wave research -- Whats going on at <ent type='GPE'>Los Alamos</ent>?
</p></xml>

View File

@ -0,0 +1,95 @@
<xml><div>
-------------------------------------------------------------------------------</div>
<p> HELP BUNGLED AND DISORGANIZED</p>
<p> By Martin Mann and George Nicholas
Exclusive to The SPOTLIGHT</p>
<p><ent type='GPE'>Washington</ent>, DC -- One after another, two violent, cataclysmic disasters
struck <ent type='GPE'>the United States</ent> in the fall of 1989. Hurricane Hugo roared
through <ent type='GPE'>the Virgin Islands</ent>, <ent type='GPE'>Puerto Rico</ent> and the <ent type='GPE'>Carolinas</ent> in September.
Within weeks, northern <ent type='GPE'>California</ent> was shaken by the <ent type='GPE'>Loma Prieta</ent> earthquake
that left hundreds of thousands of victims and billions of dollars in
damage in its wake.</p>
<p> Having spent "over $25 billion on setting up <ent type='ORG'>FEMA</ent>," <ent type='NORP'>American</ent> taxpayers
were entitled to expect "quick and efficient help" from it in the face of
such shattering calamities. But the response by the Federal Emergency
Management Agency (<ent type='ORG'>FEMA</ent>) to these upheavals was "bungled" and
"disorganized," says Ray Groover, who reported on the hurricane for a San
Juan, <ent type='GPE'>Puerto Rico</ent>, newspaper and is now studying for a graduate degree in
journalism at <ent type='ORG'>Columbia University</ent> in <ent type='GPE'>New York</ent>.</p>
<p> Since the Disaster Relief Act of 1988, <ent type='ORG'>FEMA</ent> has been responsible for
coordinating the "[disaster] preparedness, response and recovery actions of
state and local governments." Unable to live up to these responsibilities
during the 1989 crisis, the agency drew sharp criticism from the press and
from <ent type='ORG'>Congress</ent>, whose leaders assigned <ent type='ORG'>the General Accounting Office</ent> (<ent type='ORG'>GAO</ent>)
to conduct the first-ever detailed investigation of <ent type='ORG'>FEMA</ent>.</p>
<p> For a year, <ent type='ORG'>GAO</ent> field examiners interviewed hundreds of disaster
victims, state and local relief workers, journalists and other witnesses.
The agency has assembled a 71-page report on U.S. relief operations.</p>
<p> WATCHDOG AGENCY RATES <ent type='ORG'>FEMA</ent></p>
<p> Having obtained an advance copy of that survey, a team of SPOTLIGHT
reporters found that the congressional watchdog agency rated <ent type='ORG'>FEMA</ent>'s ability
to deal with natural disasters as being "inefficient," "weak" and
"dilatory."</p>
<p> Noting that "emergency management includes three phases:
preparedness, response and recovery," <ent type='ORG'>GAO</ent> probers warned that <ent type='ORG'>FEMA</ent> failed
to operate "as efficiently as possible" in all these areas.</p>
<p> There was evidence of "inadequate planning ... inadequate or no
standard operating procedures ... [and a] lack of coordination" wherever
<ent type='ORG'>FEMA</ent>'s bureaucrats intervened, the <ent type='ORG'>GAO</ent> report concluded. Among the results
of these botched relief attempts were "delays in providing disaster
assistance and duplicate payments for some [of <ent type='ORG'>FEMA</ent>'s] activities," the
congressional overseers discovered.</p>
<p> One example of <ent type='ORG'>FEMA</ent>'s failure cited by the <ent type='ORG'>GAO</ent> survey team involved
4000 low-income units wholly destroyed in <ent type='GPE'>California</ent>'s devastating October
1989 earthquake. "Thirteen months later, only 114 units had been processed
and approved for [rehabilitation] funding," the report reveals. Similarly,
10 months after Hurricane Hugo, most of the families left homeless "had not
yet been provided with housing assistance from <ent type='ORG'>FEMA</ent>."</p>
<p> DIRECTORS SHELL GAME</p>
<p> Warned that the <ent type='ORG'>GAO</ent> report will expose <ent type='ORG'>FEMA</ent> as incompetent and
wasteful, President George Bush fired agency Director Julius <ent type='ORG'>Becton</ent>, an
elderly three-star general, whose principal qualifications for flag rank
was Henry Kissinger's wish to promote "minority" officers, Defense
Department sources say.</p>
<p> <ent type='ORG'>Becton</ent> was replace by Wallace Stickney, a former <ent type='GPE'>New Hampshire</ent> state
official whose colorless and low-profile reputation is expected to dampen
the fireworks the <ent type='ORG'>GAO</ent> report might otherwise touch off about the inadequacy
of federal relief operations.</p>
<p> But simply shifting directors "does not answer the real question: If
[<ent type='ORG'>FEMA</ent> officials] seem uninterested and negligent when it comes to disaster
response, what are <ent type='ORG'>FEMA</ent>'s thousands of bureaucrats working on?" asked
Groover.</p>
<p> The answer, a SPOTLIGHT investigation has found, is that <ent type='ORG'>FEMA</ent>'s
leadership is developing programs that will not merely "[ensure] the
continuity of the federal government in any national emergency-type
situation," as decreed by President Gerald Ford in <ent type='ORG'>Executive Order</ent> 11921,
but REPLACE the nation's Constitutional statecraft with a centralized
"command system."</p>
<div>-----------------</div>
<p>Reproduced with permission from a special supplement to _The Spotlight_,
May 25, 1992. This text may be freely reproduced provided acknowledgement
to The Spotlight appears, including this address:</p>
<p> The SPOTLIGHT
300 Independence Avenue, SE
<ent type='GPE'>Washington</ent>, DC 20003</p>
</xml>

View File

@ -0,0 +1,68 @@
<xml><p>FEVERFEW: A HERBAL REMEDY FOR MIGRAINE?
"Some of the world's most effective medicines began their
careers as herbal remedies: digitalis came from foxglove, aspirin
from willow bark, and morphine from poppy blossoms. Potentially
the newest plant to cross over from folklore to mainstream
treatment is a member of the chyrsanthemum family known as common
feverfew or, botanically, <ent type='GPE'>Tanacetum</ent> parthenium.
"The name 'feverfew' indicates the belief, dating from the
middle ages, that the herb was a good treatment for fever and
certain other ailments, including arthritis, psoriasis, and
headaches. In modern <ent type='GPE'>England</ent>, eating feverfew leaves has become
a familiar method for prevention migraine attacks, and there is
now some reason to think that the folklore about feverfew has a
grain or two of truth to it. Some people for whom the usual
migraine treatments have not been very effective have turned to
feverfew. The typical users eats 1-4 fresh leaves a day. <ent type='ORG'>Food</ent>
is usually taken at the same time to mask the leaves' bitter
taste. Tablets and capsules containing dried feverfew have also
begun to appear in...health food store shelves.
"To evaluate the remedy, a group of <ent type='NORP'>British</ent> researchers
designed a controlled study. However, they did not feel free to
give feverfew to people who had never taken it, because the agent
has not gone through animal studies, as is appropriate before a
drug is tested in people. But they hit on a human test of
feverfew that was both rigorous and ethical. Many of the
patients seen in <ent type='GPE'>the City</ent> of London Migraine Clinic had already
been dosing themselves with feverfew for long periods of time as
a way to reduce migraine attacks. So, instead of setting up a
test in which the drug was GIVEN to subjects, investigators from
the clinic set up a test in which feverfew was TAKEN AWAY.
"The doctors identified patients who were dosing themselves
with feverfew and asked them to participate in a study. During
the research period, the subjects would take their medication
either as freeze-dried herb or as a placebo (presented in
identical-looking capsules). After a period on one preparation,
they would switch to the other, and then repeat the two stages
again. In this type of "double-blind crossover" test, neither
researcher nor subject is told which treatment is being given.
However, patients easily guessed when they were receiving placebo
because the frequency of headache and nausea virtually tripled,
and severity also increased markedly. These results support the
claim that a daily dose of something contained in feverfew may be
effective in preventing migraine attacks.
"The people studied had no serious ill effects while taking
feverfew, but that was to be expected, as they had been taking
the herb for some time. People who had tried the plaint and then
quit because they couldn't tolerate would have been excluded from
this study. Feverfew is capable of producing rather marked
allergic reactions; some people who try it develop sores in the
mouth or, less commonly, a generalized inflammation of the mouth
and tongue.
This first test of the effectiveness of feverfew must be
regarded as preliminary. It will no doubt lead to more thorough
testing, as it should. Even if feverfew pans out as preventive
medicine for migraine, it probably will not prove to be the
'answer.' But it may join the growing list of effective
treatments for a very unpleasant disorder."
Quoted from the April 1986 edition of the Harvard Medical
School Health Letter, reporting on research appearing in the
<ent type='NORP'>British</ent> Medical Journal, August 31, 1985.
</p></xml>

View File

@ -0,0 +1,201 @@
<xml><p>FOREIGN POLICY AND FOREIGN WARS</p>
<p>By RICHARD M. EBELING</p>
<p>When the Founding Fathers wrote and then defended the case for
passage of the Constitution in 1787-1788, they did so with a
strong belief in the natural rights of man, rights that Thomas
Jefferson had so eloquently expressed in the Declaration of
Independence in 1776. But their idealism was tempered with
stark realism, based on historical knowledge and personal
experience, about both human nature and the nature of
governments.</p>
<p>The separation of legislative, executive and judicial powers
was considered essential if the human inclination toward
political abuse of power was to be prevented. "No political
truth is certainly of greater intrinsic value, or is stamped
with the authority of more enlightened patrons of liberty,"
stated James Madison in The Federalist Papers, "than that
. . . [t]he accumulation of all power, legislative, executive
and judiciary, in the same hands, whether of one, a few, or
many, and whether hereditary, self-appointed, or elective, may
justly be pronounced the very definition of tyranny."</p>
<p><ent type='ORG'>Division</ent> of power and responsibilities, therefore, was seen as
an essential--though neither a perfect nor guaranteed--tool to
assure that the freedom and property of individuals would not
become political plunder to be devoured by either majorities
or minorities.</p>
<p>Issues concerning war and peace and individual liberty were of
deep concern to the Founding Fathers for the same reason. When
the matter came up at the convention as to which branch of
government would have the authority to "make war,"
disagreement arose. Pierce Butler of <ent type='GPE'>South Carolina</ent> wanted
that power to reside in the President who, he said, "will have
all the requisite qualities." James Madison and Elbridge Gerry
of <ent type='GPE'>Massachusetts</ent> were for "leaving to the <ent type='ORG'>Executive</ent> the power
to repel sudden attacks" but proposed changing the wording to
"declare" rather than "make war," and then only with the
approval of both <ent type='ORG'>Houses</ent> of <ent type='ORG'>Congress</ent>. Oliver Ellsworth of
<ent type='GPE'>Connecticut</ent> agreed, saying that "It should be more easy to get
out of war than into it." And George <ent type='ORG'>Mason</ent> of <ent type='GPE'>Virginia</ent> also
was "against giving the power of war to the <ent type='ORG'>Executive</ent>, because
[he was] not safely to be trusted with it." <ent type='ORG'>Mason</ent> "was for
clogging rather than facilitating war."</p>
<p>Thus, in the final, ratified Constitution, the <ent type='ORG'>Congress</ent>, in
Article I, Section 8, was given the sole authority, "To
Declare War," while the President, in Article II, Section 2,
was made "Commander in Chief of the <ent type='ORG'>Army</ent> and <ent type='ORG'>Navy</ent> of the
United <ent type='GPE'>States</ent>, and <ent type='ORG'>the Militia</ent> of the several <ent type='GPE'>States</ent>, when
called into the actual service of <ent type='GPE'>the United States</ent>." Civilian
authority over the military was established, with
Constitutionally divided power over its application in war:
<ent type='ORG'>Congress</ent> declared war, and the President oversaw its
execution.</p>
<p>The Founding Fathers possessed no misconceptions about the
potentially aggressive nature of governments toward their
neighbors. John Jay, in The Federalist Papers, insightfully
enumerated the various motives, rationales and passions that
had led nations down the road to war through the ages.</p>
<p>But neither did they have any illusions that <ent type='NORP'>Americans</ent> could
be any less susceptible to similar motives and passions. The
Constitution, through a division of powers, was meant to put
procedural hurdles and delays in the way before the passions
of the moment could result in declarations of war and the
initiation of hostilities against other nations.</p>
<p>Yet, in spite of these Constitutional restraints, the United
<ent type='GPE'>States</ent> has participated in four foreign wars in the 20th
century--two World Wars, the <ent type='NORP'>Korean</ent> "police action" and the
<ent type='GPE'>Vietnam</ent> conflict--and in three of these, <ent type='GPE'>the United States</ent> was
neither directly attacked nor threatened by a foreign enemy.
Why, then, did we intervene?</p>
<p>The answer lies in the ideology of the welfare state. First in
the years preceding World War I, and then again in the 1930s,
<ent type='NORP'>American</ent> intellectuals and politicians undertook grand
experiments in social engineering. <ent type='ORG'>The Progressive Era</ent> of
Theodore Roosevelt and Woodrow Wilson, and the New Deal days
of <ent type='ORG'>Franklin</ent> D. Roosevelt, were the crucial decades for the
implementation of the politics of government intervention and
economic regulation. It was the duty and responsibility of the
state to manage, oversee and control the social and economic
affairs of the citizenry.</p>
<p>The social engineers believed that people left alone to manage
their own affairs invariably went astray, with the result
being poverty, economic exploitation and social decay.
Enlightened leadership, under wise government, would provide
the population with the economic prosperity and social harmony
that the governmental policy-makers knew, in their hearts,
that they had the knowledge and expertise to provide. The
good wanted state power so they could benefit their fellow
men.</p>
<p>And what was good for <ent type='NORP'>Americans</ent> at home, surely would be no
less beneficial for the masses of people across the oceans.
Was not <ent type='LOC'>Europe</ent> a caldron of political intrigue and corruption?
Were not the people of <ent type='LOC'>Asia</ent>, <ent type='LOC'>Africa</ent> and <ent type='LOC'>Latin America</ent>
suffering in squalor and ignorance, the victims of tribal
despots and imperialist exploitors--easy prey to that even
greater threat of <ent type='NORP'>communist</ent> propaganda and revolution?</p>
<p><ent type='GPE'>America</ent>'s first crusade was in 1917, when Woodrow Wilson,
insisting that <ent type='GPE'>the United States</ent> had the moral duty to take
the lead and "make the world safe for democracy," had asked
for, and got, a declaration of war from <ent type='ORG'>Congress</ent>. <ent type='NORP'>Americans</ent>,
however, were repulsed in the years following World War I,
when instead of democracy, they saw that all that came out of
our participation in that noble crusade had been communism in
<ent type='GPE'>Russia</ent>, fascism in <ent type='GPE'>Italy</ent>, <ent type='NORP'>Nazism</ent> in <ent type='GPE'>Germany</ent> and imperialist
spoils for the victorious <ent type='LOC'>Europe</ent>an allies.</p>
<p>But World War II seemed to offer the opportunity for a second
chance. The <ent type='NORP'>American</ent> "arsenal of democracy" would free the
world of Hitler and <ent type='ORG'>Imperial Japan</ent> and then pursue an
international course of permanent foreign intervention to
create "a better world." What the world got was the Cold War,
with <ent type='GPE'>the Soviet Union</ent> gaining an Eastern <ent type='LOC'>Europe</ent>an empire, and
with <ent type='GPE'>China</ent> being lost behind what became known as the
<ent type='NORP'>communist</ent> "Bamboo Curtain."</p>
<p><ent type='GPE'>America</ent>'s rewards were global commitments that required
hundreds of thousands of <ent type='NORP'>American</ent> soldiers permanently
stationed in <ent type='LOC'>Europe</ent>; two bloody wars in <ent type='LOC'>Asia</ent> that cost the
lives of over a hundred thousand <ent type='NORP'>Americans</ent>; a huge defense
budget that siphoned off hundreds of billions of dollars from
the private sector for four decades; and even more tens of
billions of dollars in military and foreign aid to any
government, in any part of the world, no matter how corrupt,
just as long as it declared itself "anti-<ent type='NORP'>communist</ent>." And as
one of the founders of Human Events, Felix Morley, pointed out
in his book, Freedom and Federalism, in the heyday of
<ent type='NORP'>Keynesian</ent> economics in the 1950s and 1960s, defense spending
became a tool for "priming the pump" and guaranteeing "full
employment" through government expenditures.</p>
<p>But communism is now dying under the weight of its own
political corruption and economic failures. And the <ent type='LOC'>Europe</ent>an
and <ent type='LOC'>Asia</ent>n countries that benefited from decades of being on
the <ent type='NORP'>American</ent> defense and foreign aid dole have decided they
want to grow up and manage their own affairs.</p>
<p>But rather than be delighted that the Cold War Welfare State
can finally be ended, <ent type='NORP'>American</ent> political and foreign policy
makers are petrified. The global social engineers in
<ent type='GPE'>Washington</ent> are suddenly faced with a world that doesn't want
to be under the tutelage of <ent type='NORP'>American</ent> paternalism and
dominance. They are busy scrambling for some way to "keep
<ent type='GPE'>America</ent> in <ent type='LOC'>Europe</ent>," maintain <ent type='GPE'>Washington</ent>'s political control
and influence over international affairs and guarantee that
<ent type='GPE'>America</ent> will remain "in harm's way," potentially drawn into
numerous controversies and conflicts around the world.</p>
<p>If it is undesirable for <ent type='GPE'>the United States</ent> government to
intervene in the economic and social affairs of its citizenry
--as the advocate of individual freedom steadfastly believes
--then it is equally undesirable for <ent type='GPE'>the United States</ent>
government to intervene in the internal affairs of other
nations, or the conflicts that sometimes arise among nations.</p>
<p>The first duty of the <ent type='NORP'>American</ent> government is to protect the
life, liberty and property of the citizens of the United
<ent type='GPE'>States</ent> from foreign aggressors. Once a government sets itself
the task of trying to rectify the errors and choices of its
own citizens, it soon begins sliding down a slippery slope in
which the end result is state supervision and regulation of
all of its citizens' activities, and all in the name of a
higher "social good."</p>
<p>Just as our neighbors often do things of which we do not
approve, or which we do not consider good or wise, so do other
nations. But to follow the path of attempting to set the world
straight can lead to nothing but perpetual intervention and
war in the name of world peace and global welfare. And these
have been precisely the results of <ent type='GPE'>America</ent>'s global crusade to
save the world since 1945.</p>
<p>The end of communism, and the economic growth of <ent type='LOC'>Europe</ent> and
<ent type='LOC'>Asia</ent>, give us a new opportunity to foreswear the global
welfare state, free ourselves from foreign political and
military entanglements, and follow George <ent type='GPE'>Washington</ent>'s wise
advice of free commercial relationships with all, but foreign
alliances and intrigues with none.</p>
<p>Professor Ebeling is the Ludwig von Mises Professor of
Economics at <ent type='ORG'>Hillsdale College</ent>, <ent type='GPE'>Hillsdale</ent>, <ent type='GPE'>Michigan</ent>, and also
serves as vice-president of academic affairs of <ent type='ORG'>The Future</ent> of
Freedom <ent type='ORG'>Foundation</ent>, P.O. Box 9752, <ent type='GPE'>Denver</ent>, CO 80209.
------------------------------------------------------------
From the November 1990 issue of <ent type='ORG'>FREEDOM DAILY</ent>,
Copyright (c) 1990, <ent type='ORG'>The Future</ent> of Freedom <ent type='ORG'>Foundation</ent>,
PO Box 9752, <ent type='GPE'>Denver</ent>, <ent type='GPE'>Colorado</ent> 80209, 303-777-3588.
Permission granted to reprint; please give appropriate credit
and send one copy of reprinted material to the <ent type='ORG'>Foundation</ent>.
</p></xml>

View File

@ -0,0 +1,595 @@
<xml><p><ent type='ORG'>FOIA</ent> FILES KIT - <ent type='ORG'>INS</ent>TRUCTIONS</p>
<p>USING THE FREEDOM OF INFORMATION ACT
REVISED EDITION
Fund for Open Information and Accountability, Inc.
339 Lafayette Street, <ent type='GPE'>New York</ent>, NY 10012
(212) 477-3188</p>
<p><ent type='ORG'>INS</ent>TRUCTIONS</p>
<p> The Freedom of Information Act entitles you to request any
record maintained by a federal <ent type='ORG'>Executive</ent> branch agency. The
agency must release the requested <ent type='ORG'>matieral</ent> unless it falls into
one of nine exempt categores, such as "national security,"
"privacy," "confidential source" and the like, in which case the
agency may but is not compelled to refuse to disclose the
records.
This kit contains all the material needed to make <ent type='ORG'>FOIA</ent>
requests for records on an individual, an orgnaization or on a
particular subject matter or event.</p>
<p>HOW TO MAKE A COMPLETE REQUEST</p>
<p> Step 1: Select the appropriate smaple letter. Fill in the
blanks in the body of the letter. Read the directions printed to
the right of each letter in conjunction with the following
instructions:
For organizational files: In the first blank space insert
the full and formal name of the organization whose files you are
requesting. In the second blank space insert any other names,
acronyms or shortened forms by which the organization is or has
ever been known or referred to by itself or others. If some of
the organization's work is conducted by sub-groups such as clubs,
committees, special programs or through coalitions known by other
names, these should be listed.
For individual files: Insert the person's full name in the
first blank space and any vaiations in spelling, nicknames, stage
names, marriage names, titles and the like in the second blank
space. Unlike other requests, the signatures of an individual
requesting her/his own file must be notarized.
For subject matter or event files: In the first blank space
state the formal title of the subject matter or event including
relevant dates and locations. In the second blank space provide
the names of individuals or group sponsors or participants and/or
any other information that would assist the agency in locating
the material you are requesting.
Step 2: The completed sample letter may be removed,
photocopies and mailed as is or retyped on your own stationary.
Be sure to keep a copy of each letter.
Step 3: Addressing the letters: Consult list of agency
addresses.
<ent type='ORG'>FBI</ent>: A complete request requires a minimum of two letters.
Sen done letter to <ent type='ORG'>FBI</ent> <ent type='ORG'>Headquarters</ent> and separate letter to each
<ent type='ORG'>FBI</ent> field office nearest the location of the individual, the
organization or the subject matter/event. Consdier the location
of residences, schools, work and other activities.
<ent type='ORG'>INS</ent>: Send a request letter to each district office nearest
the location of the individual, the organization or the subject
matter/event.
Address each letter to the <ent type='ORG'>FOIA</ent>/PA office of the appropraite
agency. Be sure to make clearly on the envelope: ATTENTION--<ent type='ORG'>FOIA</ent>
REQUEST.</p>
<p>FEE WAIVER</p>
<p> You will notice that the sample letters include a request
for fee waiver. Many agencies automatically waive fees if a
request results in the release of only a small number of
documents, e.g. 250 pages or less. Under the Act, you are
entitled to a waiver of all search and copy fees associated with
your request if the release of the information would primarily
benefit the general public. However, in January 1983, the Justice
Department issued a memo to all federal agencies listing five
criteria which requesters must meet before they are deemed
entitled to a fee waiver. Under these criteria, a requester must
show that the material sought to be released is already the
subject of "genuine public interest" and "meaningfully
contributes to the public development or understanding of the
subject"; and that she/he has the qualifications to understand
and evaluate the materials and the ability to interpret and
disseminate the information to th epublic and is not motivated by
any "personal interest." Finally, if the requested information is
already "in the public domain," such as in the agency's reading
room, no fee waiver will be granted.
You should always request a waiver of fees if you believe
the information you are seeking will benefit the public. If your
request for a waiver is denied, you should appeal that denial,
citing the ways in which your request meets the standards set out
above.</p>
<p>MONITORING THE PROGRESS OF YOUR REQUEST</p>
<p> Customarily, you will receive a letter from each agency
within 10 days stating that your request has been received and is
being processed. You may be asked to be patient and told that
requests are handled cafeteria style. You have no alternative but
to be somewhat patient. but there is no reason to be complacent
and simply sit and wait.
A good strategy is to telephone the <ent type='ORG'>FOIA</ent> office in each
agency after about a month if nothing of substance has been
received. Ask for a progress report. The name of the person you
talk with and the gist of the converstaion should be recorded.
try to take notes during the conversation focusing especially on
what is said by the agency official. Write down all the details
you can recall after the call is completed. Continue to call
every 4 to 6 weeks.
Good recordkeeping helps avoid time-consuming and
frustrating confusion. A looseleaf notebook with a section
devoted to each request simplifies this task. Intervening
correspondence to and from the agency can be inserted bewteen the
notes on phone calls so that all relevant material will be at
hand for the various tasks: phone consultations, writing the
newsletter, correspondence, articles, preparation for media
appearances, congressional testimony or litigation, if that
course is adopted.</p>
<p>HOW TO MAKE SURE YOU GET EVERYTHING YOU ARE ENTITLED TO ...
AND WHAT TO DO IF YOU DO NOT</p>
<p> After each agency has searched and processed your request,
you will receive a letter that announces the outcome, encloses
the released documents, if any, and explains where to direct an
appeal if any material has been withheld. There are four possible
outcomes:
1. Request granted in full: This response indicates that
the agency has released all records pertinent to your request,
with no exclusions or withholdings. The documents may be enclosed
or, if bulky, may be mailed under separate cover. This is a very
rare outcome.
<ent type='ORG'>Next</ent> Step: Check documents for completeness (see
instructions below).
2. Requested granted in part and denied in part: This
response indicates that the agency is releasing some material but
has withheld some documents entirely or excized some passages
from the documents released. The released documents may be
enclosed or, if bulky, mailed under separate cover.
<ent type='ORG'>Next</ent> step: Check documents released for completeness (see
instructions below) and make an administrative appeal of denials
or incompleteness (see instructions below).
3. Request denied in full: This response indicates that
the agency is asserting that all material in its files pertaining
to your request falls under one or the nine <ent type='ORG'>FOIA</ent> exemptions.
These are categories of information that the agency may, at its
discretion, refuse to release.
<ent type='ORG'>Next</ent> step: Make an administrative appeal (see instructions
below). Since <ent type='ORG'>FOIA</ent> exemptions are not mandatory, even a complete
denial of your request can and should be appeals.
4. No records: This response will state that a search of
the agency's files indicates that it has no records corresponding
to those you requested.
<ent type='ORG'>Next</ent> step: Check your original request to be sure you have
not overlooked anything. If you receive documents from other
agencies, review them for indications that there is <ent type='ORG'>matieral</ent> in
teh files of the agency claiming it has none. For example, look
for correspondence, or references to correspondence, to or from
that agency. If you determine that there are reasonable grounds,
file an administrative appeal (see instructions below).</p>
<p>HOW TO CHECK FOR COMPLETENESS</p>
<p> Step 1: Before reading the documents, turn them over and
number the back of each page sequentilaly. The packet may contain
documents from the agency's headquarters as well as several field
office files. Separate the documents into their <ent type='NORP'>reqpective</ent> office
packets. Each of these offices will have assigned the
investigation a separate file number. Try to find the numbering
system. Usually the lower righthand corner of the first page
carries a hand-written file and document number. For instance, an
<ent type='ORG'>FBI</ent> document might be marked "100-7142-22". This would indicate
that it is the 22nd document in the 7142nd file in the 100
classification. As you inspect the documents, make a list of
these file numbers and which office they represent. In this way
you will be able to determine which office created and which
office received the document you have in your hand. Often there
is a block stamp affixed with the name of the office from whose
files this copy was retrieved. the "To/From" heading on a
document may also give you corresponding file numbers and will
help you puzzle out the origin of the document.
When you have finally identified eahc document's file and
serial number and separated the documents into their proper
office batches, make a list of all the serial numbers in each
batch to see if there any any missing numbers. If there are
missing serial numbers and some documents have been withheld, try
to determine if teh missing numbers might reasonably correspond
to the withheld documents. If not, the realease may be incomplete
and an administrative appeal should be made.
Step 2: Read all the document released to you. Keep a list
of all document referred to the text--letters, memos, teletypes,
reports, etc. Each of these "referred to" documents should turn
up in the packet released to you. If any are not in the packet,
it is possible they may be among those document withheld; a
direct inquiry should be made. In an administrative appeal, ask
that each of these "referred to" documents be produced or that
the agency state plainly that they are among those withheld. Of
course, the totals of unproduced vs. withheld must be within
reasons; that is, if the total number of unproduced documents you
find referred to the text of the documents produced exceeds the
total number of documents withheld, the agency cannot claim that
all the referred to documents are accounted for by the withheld
categoty. You will soon get the hand of making logical
conclusions from discrepancies in the totals and missing document
numbers.
Another thing to look for when reading the released
documents if the names of persons or agencies to whom the
document has been disseminated. the lower left-hadn corncer is a
common location for the typed list of agencies or offices to whom
the document has been directed. In addition, there may be
additional distribution recorded by hand, there or elsewhere on
the cover page. There are published glossaries for some agencies
that will help in deciphering these notaitons when they are not
clear. Contact <ent type='ORG'>FOIA</ent>, Inc., if you need assistance in deciphering
the text.
Finally, any other file numbers that appear on the document
should be noted, particularaly in the subject of the file is of
interest and is one you have not requested. You may want to make
an additional request for some of these files.</p>
<p>HOW TO MAKE AN ADMINISTRATIVE APPEAL</p>
<p> Under the <ent type='ORG'>FOIA</ent>, a dissatified requester has the right of
administrative appeal. the name and address of the proper appeal
office will be given to you by each agency in its final response
letter.
This kit contains a sample appeal letter with suggesting for
adapting it to various circumstances. However, you need not make
such an elaborate appeal; in fact, you need not offer any reasons
at all but rather simply write a letter to the appeals unit
stating that "this letter constitutes an appeal of the agency's
decision." Of course, if you have identified some real
<ent type='ORG'>discrepanices</ent>, you will want to set them for fully, but even if
you have not found any, you may simply ask that the release be
reviewed.
If you are still dissatisfied after the administrative
appeal process, the <ent type='ORG'>FOIA</ent> gives you the right to bring a lawsuit
in federal district court on an expedited basis.</p>
<p>SAMPLE <ent type='ORG'>FBI</ent> REQUEST LETTER</p>
<p>Date:</p>
<p>To: <ent type='ORG'>FOIA</ent>/PA Unit
<ent type='ORG'>Federal Bureau</ent> of Investigation</p>
<p> This is a request under the Freedom of Information Act.</p>
<p> I request a complete and thorough search of all filing
systems and locations for all records maintained by your agency
pertaining to and/or captioned: ______
_____________________________________________________
[describe records desired and/or insert full and
_____________________________________________________
formal name]
_____________________________________________________</p>
<p>_____________________________________________________</p>
<p>including, without limitations, files and documents captioned, or
whose captions include</p>
<p>_____________________________________________________
[insert changes in name, commonly used names,
_____________________________________________________
acronyms, sub-groups, and the like]
_____________________________________________________</p>
<p>_____________________________________________________</p>
<p> This request specifically includes "main" files and "see
references," including, but not limited to numbered and lettered
sub files, "DO NOT FILE" files, and control files. I also request
a search of the <ent type='ORG'>ELSUR</ent> Index,a nd the COINTELPRO Index. I request
that all records be produced with the administrative pges.
I wish to be sent copies of "see reference" cards,
abstracts, serach slips, including search slips used to process
this request, file covers, multiple copies of the same documents
if they appear in a file, and tapes of any electronic
surveillances.
I wish to make it clear that I want all records in you
roffice "identifiable with my request," even though reports on
those records have been sent to <ent type='ORG'>Headquarters</ent> and even though
there may be duplication between the two sets of fils. I do not
want just "interim" documents. I want all documents as they
appear in the "main" files and "see references" of all units of
your agency.
If documents are denied in whole or in part, please specify
which exemption(s) is(are) claimed for each passage or whole
document denied. Please provide a complete itemized inventory and
a detailed factual justification of total or partial denial of
documents. Give the number of pages in each document and the
total number of pages pertaining to this request. For
"classified" material denied pleae include the following
information: the classification (confidential, secret or top
secret); identity of the classifer; date or event for automatic
declassification, classification review, or down-grading; if
applicable, identity of official authorizing extension of
automatic declassification or review; and if applicable, the
reason for extended classification.
I request that excized material be "blacked out" rather
thatn "whited out" or cut out and that the remaining non-exempt
portions of documents will be released as provided under the
Freedom of Information Act.
Please send a memo (copy to me) to the appropriate units in
your office to assure that no records related to this request are
destroyed. Please advise of any destruction of records and
include the date of and authority for such destruction.
As I expect to appeal any denials, please specify the office
and address to which an appeal should be directed.
I believe my request qualifies for a waiver of fees since
the release of the requested information would primarily benefit
the general public and be "in the public interest."
I can be reached at the phone listed below. Please call
rather than write if there are any questions or if you need
additional information from me.
I expect a response to this request within ten (10) working
days, as provided for in the Freedom of Information Act.</p>
<p>Sincerely,</p>
<p>name: _______________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>telephone: __________________________________________</p>
<p>signature: __________________________________________</p>
<p>SAMPLE AGENCY REQUEST LETTER</p>
<p>DATE:
TO: <ent type='ORG'>FOIA</ent>/PA Unit</p>
<p> This is a request under the Freedom of Information Act.
I request a complete and thorough search of all filing
systems and locations for all records maintained by your agency
pertaining to and/or captioned
______________________________________________________
[describe records desired and/or insert full and
______________________________________________________
formal name]
______________________________________________________</p>
<p>______________________________________________________</p>
<p>including, without limitation, files and documents captioned, or
whose captions include:</p>
<p>______________________________________________________
[insert changes in name, commonly used names,
______________________________________________________
acronyms, sub-groups and the like]
______________________________________________________</p>
<p>______________________________________________________</p>
<p> I also request all "see references" to these names, a search
of the <ent type='ORG'>ELSUR</ent> Index or any similar technique for locating records
of electronic surveillance.
This request is also a request for any corresponding files
in <ent type='ORG'>INS</ent> <ent type='ORG'>Headquarters</ent> or regional offices.
Please place any "missing" files pertaining to this request
on "special locate" and advise that you have done this.
If documents are denied in part or whole, please specify
which exemption(s) is(are) claimed for each passage or whole
document denied. Please provide a complete itemized inventory and
detialed factual justification of total or partial denial of
documents. Specify the number of pates in each document and th
ttoal number of pages pertaining to this request. For classified
material denied, please include the following information: the
classification rating (confidential, secret, or top secret);
identify the classifier; date or event for automatic
declassification, classification review or downgrading; if
applicable, identify the official authorizing extension of
automatic declassification or reviw; and, if applicable, give the
reason for extended classification.
I request that excised material be "blacked out" rather than
"whited out" or cut out. I expect, as provided by the Freedom of
Information Act, that the remaining non-exempt portions of
documents will be released.
Please send a memo (copy to me) to the appropriate units in
your office or agency to assure that no records related to this
request are destroyed. Please advise of any destruction of
records and include the date of and authority for such
destruction.
As I expect to appeal any denials, please specify the office
and address to which an appeal should be directed.
I believe my request qualifies for a waiver of fees since
the release of the requested information would primarily benefit
the general public and be "in the public interest."
I can be reached at the phone listed below. Please call
rather than write if there are any questions or if you need
additional information from me.
I expect a response to this request within ten (10) working
days, as provided for in the Freedom of Information Act.</p>
<p>Sincerely,</p>
<p>name: _______________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>telephone: (___)_______________________________________</p>
<p>signature: __________________________________________</p>
<p>SAMPLE ADMINISTRATIVE APPEAL LETTER</p>
<p>Date:
To: <ent type='ORG'>FOIA</ent>/PA Appeals Office
RE: Request numer [Add this if the agency has given your request
a number]
This is an appeal pursuant to subsection (a)(6) of the
Freedom of Information Act as amended (5U.S.C. 552).
On [date], I received a letter from [name of official] of
your agency denying my request for [describe briefly the
information you are after]. This reply indicated that an appeal
letter could be sent to you. I am enclosing a copy of my exchange
of correspondence with your agency so that you can see exactly
what files I have requested and the insubstantial grounds on
which my request has been denied.
[Optional paragraph, to be used if the agency has withheld
all or nearly all the material which has been requested]:
You will note that your agency has withheld the entire (or
nearly the entire) document (or file, or report, or whatever)
that I requested. Since the <ent type='ORG'>FOIA</ent> provides that "any reasonably
secregable portion of a record shall be provided to any eprson
requesting such record after deletion of the portions which are
exempt," I believe that your agency has not complied with the
<ent type='ORG'>FOIA</ent>. I believe that there must be (additional) segregble
portions which do not fall wihtin <ent type='ORG'>FOIA</ent> exemptions and which must
be released.
[Optional paragraph, to be used in the agency has used the
(b)(1) exemption for national security, to withhold information]
Your agency has used the (b)(1) exemption to withhold
information [I question whether files relating to events that
took place over twenty years ago could realistically harm the
national security.] [Because I am familiar with my own activities
during the period in question, and know that none of these
activities in any way posed a significant threat to the national
security, I question the designation of my files or portions of
my file as classified and exempt from disclosure beca8use of
national security considerations.]
[Sample optional argument to be used if the exemption which
is claimed does not seem to make sense; you should cite as many
specific instances as you care to of items withheld from the
documents that you ahve received. We provide two examples which
you might want to adampt to your own case.]
"On the memo dated _____________ the second paragraph
withheld under the (b)(1) exemption appears to be describing a
conversation at an open meeting. If this is the case, it is
impossible that the substance of this converation could be
properly classified." Or, "The memo dated _____ refers to a
meeting which I attended, but a substantial portion is deleted
because of the (b)(6) and (b)(7)(c) exemptions for unwarranted
invasions of personal privacy. Since I already know who attended
this meeting, no privacy interest is served by the withholding."
I trust that upon examination of my request, you will
conclude that the records I requested are not properly covered by
exemption(s) [here repeat the exemptions which the agency's
denial letter claimed applied to your request] of the amended
<ent type='ORG'>FOIA</ent>, and that you will overrule the decision to withhold the
information.
[Use if an itemized inventory is not supplied originally]
If you choose instead to continue to withhold some or all of
the material which was denied in my initial request to your
agency, I ask that you give me an index of such <ent type='ORG'>matieral</ent>,
together with the justification for the denial of each item which
is still withheld.
As provided in the Act, I will expect to receive a reply to
this administrative appeal letter within twenty working days.
If you deny this appeal and do not adequately explain why
the material withheld is properly exempt, I intend to initial a
lawsuit to compel its disclosure. [You can say that you intend to
sue, if that is your present inclination; you may still decide
ultimately not to file suit.]</p>
<p>Sincerely yours,</p>
<p>name: ____________________________________________</p>
<p>address: ____________________________________________</p>
<p> ____________________________________________</p>
<p>signature: ___________________________________________</p>
<p>[Mark clearly on envelope: Attention: Freedom of Information
Appeals]</p>
<p><ent type='ORG'>FBI</ent> ADDRESSES AND PHONE NUMBERS</p>
<p><ent type='ORG'>FBI</ent> <ent type='ORG'>Headquarters</ent>, J. Edgar Hoover Bldg, <ent type='GPE'>Washington</ent>, D.C., 20535,
202-324-5520 (FOI/PA Unit)</p>
<p>Field Offices
<ent type='GPE'>Albany</ent>, NY 12207, U.S. Post Office and <ent type='ORG'>Courthouse</ent>, 518-465-7551
<ent type='GPE'>Albuquerque</ent>, NM 87101, <ent type='ORG'>Fed</ent>eral Office Bldg., 505-247-1555
<ent type='GPE'>Alexandria</ent>, VA 22314, 300 N. Lee St., 703-683-2681
<ent type='GPE'>Anchorage</ent>, AK 99510, <ent type='ORG'>Fed</ent>eral bldg., 907-272-6414
<ent type='GPE'>Atlanta</ent>, GA 30303, 275 Peachtree St. NE, 404-521-3900
<ent type='GPE'>Baltimore</ent>, MD 21207, 7142 Ambassador Rd., 301-265-8080
Birminghan, AL 35203, Room 1400, 2121 Bldg. 205-252-7705
<ent type='GPE'>Boston</ent>, MA 02203, J.F. Kennedy <ent type='ORG'>Fed</ent>eral Office Bldg., 617-742-5533
Buffalo, NY 14202, 111 W. Huron St., 716-856-7800
Butte, MT 59701, U.S. <ent type='ORG'>Courthouse</ent> and <ent type='ORG'>Fed</ent>eral Bldg., 406-792-2304
<ent type='GPE'>Charlotte</ent>, NC 28202, Jefferson Standard Life Bldg., 704-372-5485
<ent type='GPE'>Chicago</ent>, IL 60604, Everett McKinley Dirksen Bldg., 312-431-1333
<ent type='GPE'>Cincinnati</ent>, OH 45202, 400 U.S. Post Office &amp; Crthse Bldg., 513-421-4310
<ent type='GPE'>Cleveland</ent>, OH 44199, <ent type='ORG'>Fed</ent>eral Office Bldg., 216-522-1401
<ent type='GPE'>Columbia</ent>, SC 29201, 1529 Hampton St., 803-254-3011
<ent type='GPE'>Dallas</ent> TX 75201, 1810 Commrce St., 214-741-1851
Denver, CO 80202, <ent type='ORG'>Fed</ent>eral Office Bldg., 303-629-7171
<ent type='GPE'>Detroit</ent>, MI 48226, 477 <ent type='GPE'>Michigan</ent> Ave., 313-965-2323
El Paso, TX 79901, 202 U.S. Courthosue Bldg., 915-533-7451
<ent type='GPE'>Honolulu</ent>, HI 96850, 300 Ala Moana Blvd., 808-521-1411
<ent type='GPE'>Houston</ent>, TX 77002, 6015 <ent type='ORG'>Fed</ent>. Bldg and U.S.<ent type='ORG'>Courthouse</ent>, 713-224-1511
<ent type='GPE'>Indianapolis</ent>, IN 46202, 575 N. Pennsylvania St., 317-639-3301
Jackson, MS 39205, <ent type='ORG'>Unifirst Federal and Loan Bldg</ent>., 601-948-5000
<ent type='GPE'>Jacksonville</ent>, FL 32211, 7820 Arlington Expressway, 904-721-1211
<ent type='GPE'>Kansas City</ent>, MO 64106, 300 U.S. <ent type='ORG'>Courthouse</ent> Bldg., 816-221-6100
<ent type='GPE'>Knoxville</ent>, TN 37919, 1111 <ent type='GPE'>Northshore</ent> Dr., 615-588-8571
<ent type='GPE'>Las Vegas</ent>, NV 89101, <ent type='ORG'>Fed</ent>eral Office Bldg., 702-385-1281
Little Rock, AR 72201, 215 U.S Post Office Bldg., 501-372-7211
<ent type='GPE'>Los Angeles</ent>, CA 90024, 11000 Wilshire Blvd, 213-272-6161
<ent type='GPE'>Louisville</ent>, KY 40202, <ent type='ORG'>Fed</ent>eral Bldg., 502-583-3941
<ent type='GPE'>Memphis</ent>, TN 38103, Clifford Davis <ent type='ORG'>Fed</ent>eral bldg., 901-525-7373
<ent type='GPE'>Miami</ent>, FL 33137, 3801 Biscayne Blvd., 305-573-3333
<ent type='GPE'>Milwaukee</ent>, WI 53202, <ent type='ORG'>Fed</ent>eral Bldg and U.S. <ent type='ORG'>Courthouse</ent>, 414-276-4681
<ent type='GPE'>Minneapolis</ent>, MN 55401, 392 <ent type='ORG'>Fed</ent>eral Bldg., 612-339-7846
<ent type='GPE'>Mobile</ent>, AL 36602, <ent type='ORG'>Fed</ent>eral Bldg., 205-438-3675
<ent type='GPE'>Newark</ent>, NJ 07101, Gateway I, Market St., 201-622-5613
<ent type='GPE'>New Haven</ent>, CT 06510, 170 <ent type='LOC'>Orange</ent> St., 203-777-6311
<ent type='GPE'>New Orleans</ent>, LA 70113, 701 Loyola Ave., 504-522-4671
<ent type='GPE'>New York</ent>, NY 10007, 26 <ent type='ORG'>Fed</ent>eral Plaza, 212-553-2700
<ent type='GPE'>Norfolk</ent>, VA, 23502, 870 N. Military Hwy., 804-461-2121
<ent type='GPE'>Oklahoma City</ent>, OK 73118, 50 Penn Pl. NW, 405-842-7471
<ent type='GPE'>Omaha</ent>, NB 68102, 215 N. 17th St., 402-348-1210
Philadelpha, PA 19106, <ent type='ORG'>Fed</ent>eral Office Bldg., 215-629-0800
<ent type='GPE'>Phoenix</ent>, AZ 85004, 2721 N. central Ave., 602-279-5511
<ent type='GPE'>Pittsburgh</ent>, PA 15222, <ent type='ORG'>Fed</ent>eral Office Bldg., 412-471-2000
<ent type='GPE'>Portland</ent>, OR 97201, Crown Plaza Bldg., 503-224-4181
<ent type='GPE'>Richmond</ent>, VA 23220, 200 W. Grace St., 804-644-2531
<ent type='GPE'>Sacramento</ent>, CA 95825, <ent type='ORG'>Fed</ent>eral Bldg., 916-481-9110
St. Louis, MO 63103, 2704 <ent type='ORG'>Fed</ent>eral Bldg., 314-241-5357
<ent type='GPE'>Salt Lake City</ent>, UT 84138, <ent type='ORG'>Fed</ent>eral Bldg., 801-355-7521
<ent type='GPE'>San Diego</ent>, CA 92188, <ent type='ORG'>Fed</ent>eral Office Bldg., 619-231-1122
<ent type='GPE'>San Francisco</ent>, CA 94102, 450 Golden Gate Ave., 415-552-2155
<ent type='GPE'>San Juan</ent>, PR 00918 U.S. <ent type='ORG'>Courthouse</ent> and <ent type='ORG'>Fed</ent>. Bldg., 809-754-6000
<ent type='GPE'>Savannah</ent>, GA 31405, 5401 Paulson St., 912-354-9911
<ent type='GPE'>Seattle</ent>, WA 98174, 915 2nd Ave., 206-622-0460
<ent type='GPE'>Springfield</ent>, IL 62702, 535 W. Jefferson St., 217-522-9675
<ent type='GPE'>Tampa</ent>, FL 33602, <ent type='ORG'>Fed</ent>eral Office Bldg., 813-228-7661
<ent type='GPE'>Washington</ent>, DC 20535, 9th and Pennsylvania Ave. NW, 202-324-3000</p>
<p>FEDERAL AGENCIES (SELECTED ADDRESSES)</p>
<p>Central Intelligence Agency
Information and Privacy Coordinator
Central Intelligence Agency
<ent type='GPE'>Washington</ent>, D.C. 20505
202-351-5659</p>
<p><ent type='ORG'>Civil Service Commission</ent>
<ent type='ORG'>Appropriate Bureau</ent> (Bureau of Personnel Investigation,
Bureau of Personnel Information Systems, etc.)
<ent type='ORG'>Civil Service Commission</ent>
1900 E Street, N.W.
<ent type='GPE'>Washington</ent>, D.C. 20415
202-632-4431</p>
<p>Commission on Civil Rights
General Counsel, U.S. Commission on Civil Rights
1121 Vermont Ae., N.W. Room 600
<ent type='GPE'>Washington</ent>, D.C. 20415
202-254-6610</p>
<p><ent type='ORG'>Consumer Product Safety Commission</ent>
Office of the Secretary
<ent type='ORG'>Consumer Product Safety Commission</ent>
1111 18th St., N.W.
<ent type='GPE'>Washington</ent>, D.C. 20207
202-624-7700</p>
<p>Department of Defense/Dept. of Air Force
Freedom of Information Manager
<ent type='ORG'>Headquarters</ent>, USAF/DADF
<ent type='GPE'>Washington</ent>, D.C. 20330-5025
202-697-3467
</p></xml>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,514 @@
<xml><div> *********************** EXPLORING **********************</div>
<p> in
********************* <ent type='ORG'>EVERYDAY LIFE</ent> ********************</p>
<p> by
T.B. PAWLICKI
______________________________
I I
I (C) COPYRIGHT 1988 I
I by I
I T.B. Pawlicki I
I 843 FORT STREET I
I VICTORIA, BRITISH COLUMBIA I
I V8W 1H6 I
I CANADA I
I______________________________I </p>
<div>********************** FORWARD **********************</div>
<p> Thank you for participating in a pioneering publishing </p>
<p>venture. </p>
<p> Mass communication has progressed through four major </p>
<p>transformations. The first revolution separated the author from </p>
<p>his audience by means of writing; the LITERATI became a secret </p>
<p>society of <ent type='ORG'>COGNOSCENTI</ent> that used its exclusive knowledge to </p>
<p>dominate the ignorant masses. Modern democracy began when movable </p>
<p>type made it possible for a message to be received by everyone </p>
<p>who could read. Recently, radio broadcasting countered the first </p>
<p>and second revolutions by delivering messages to everyone who </p>
<p>can't read; television is likely to be the MATADOR of democracy. </p>
<p>The capital cost of printing plants and broadcasting studios </p>
<p>limits the messengers to parties of power and wealth, whose </p>
<p>messages are determined to maintain the STATUS QUO --- natcherly </p>
<p>--- especially their own status plus all the more quid they can </p>
<p>quo. The tragic consequence of mass communications has been the </p>
<p>dissemination of tendencious knowledge to enslave the minds of </p>
<p>mankind, rather than free us to experience our own ignorance </p>
<p>until we learn better. A truly free press for truly free minds </p>
<p>could not exist until the personal home photocopier brought </p>
<p>publishing within the economic capacity of every person with a </p>
<p>message and postage. As well as reducing the cost of copying to a </p>
<p>few pennies per kilowatt hour, the computer completes the </p>
<p>revolution of mass communications by restoring audience feedback. </p>
<p>As camels and soups show, quality goes down as participation </p>
<p>increases, but participation is better for the participators; </p>
<p>eventually, participators support higher standards.</p>
<p> Since authors began to write, instead of speaking directly </p>
<p>to their audience, ideas have flowed in one direction, only. It </p>
<p>is, however, as impossible to teach without learning as it is to </p>
<p>learn without teaching, which is why so little is learned from </p>
<p>reading books. For the first time since the advent of writing, </p>
<p>the computer makes it possible for readers to contribute to the </p>
<p>discourse and transform a lecture into a dialogue, a </p>
<p>conversation, a seminar, a workshop, a global town meeting.</p>
<p> Finding a publisher for my first book, How To Build A
--------------
Flying Saucer, took nearly ten years; nearly ten more years
-------------
passed while my market grew to critical mass by word of mouth. </p>
<p>Now people are reading my first book as if the ideas were as hot </p>
<p>as tomorrow's news, but a whole generation has grown up to </p>
<p>drinking age --- and another generation has died of cirrhotic </p>
<p>livers --- since I was working out those early insights. My </p>
<p>ideas develop so rapidly that I had to rewrite the manuscript </p>
<p>every year until it was published. Once printed, however, the </p>
<p>printing plates are as immutable as graven stone. As soon as I </p>
<p>began to write my personal correspondence on computer, I </p>
<p>realized that this electronic medium keeps discoveries alive and </p>
<p>growing through pooling contributions in ways not feasible by </p>
<p>any other means of communication. The entire industry is built</p>
<p>by fielding half-baked ideas and then improving them with </p>
<p>consumer feedback, as it goes along; no other industry advances </p>
<p>so fast, and in no other industry do the suppliers lag behind </p>
<p>the advances made by their own demanders. And thus it came to </p>
<p>pass as I was speaking to the <ent type='ORG'>Global Sciences</ent> <ent type='ORG'>Congress</ent>, held at </p>
<p>Denver in August, l987, that the idea came to me to offer my </p>
<p>audience my current manuscripts explaining HYPERSPACE to
----------
everyone who would participate by also sharing their ideas on </p>
<p>computer discs.</p>
<p> Ideally, a book of this nature should be transmitted over </p>
<p>wires to be downloaded by <ent type='ORG'>Special Interest Groups</ent> on </p>
<p>international networks. In the present state of the art, </p>
<p>however, computers still cannot replace paper. This </p>
<p>unrealistically jealous industry has not yet made files </p>
<p>universally readable, like sound and film tapes, and it is still </p>
<p>impractical to transmit text formats and illustrations through </p>
<p>wires. Even after the computer industry gets its parameters </p>
<p>together, all of us early worms will remain stuck with our </p>
<p>capital investments. Therefore, I have decided to print my </p>
<p>manuscripts onto discs for postal distribution to the computers </p>
<p>being used now.
---</p>
<p> This enterprise will succeed only if each reader will make </p>
<p>at least two copies and pass them on. Some readers may not know </p>
<p>three other people with compatible computers, so it is hoped </p>
<p>that readers with the most popular computer models will pass on </p>
<p>to their computing friends as many copies as they feel this </p>
<p>publication is worth. If anyone can make conversions to </p>
<p>unpopular computers, a copy returned to me will be passed on to </p>
<p>other readers out in left field.</p>
<p> This brings us to the matter of copyrights. Most people
----------
believe that anyone may freely copy published material in any </p>
<p>numbers for any purpose as long as the copies are not sold for a </p>
<p>profit (*1). If legal process were not so expensive, a lot of </p>
<p>copycats would learn how very mistaken they are. Copyright </p>
<p>entitles the author to assign legal permission to make copies and </p>
<p>set the conditions of contract. Although I am assigning all my </p>
<p>readers the right to make copies and distribute this literature </p>
<p>freely, the formal copyright remains mine. Any party enterprising </p>
<p>enough to reproduce these discs by the hundred for sale at a </p>
<p>profit will very likely interest my attorney to offer a royalty </p>
<p>contract as a more attractive alternative to a court ordered </p>
<p>remedy. Any party that fails to include my byline and copyright </p>
<p>notice will be taken to task for the more serious offense of</p>
<p>plagiarism.
----------</p>
<p> Heckling is a part of all public speaking, and most of the </p>
<p>fun. If hecklers had a fair chance to give their opinions, many </p>
<p>of them would have more to say than the speakers, and some may </p>
<p>have better ideas. The only way a reader can add his two bits </p>
<p>worth to a discourse is by scribbling in the margins of public </p>
<p>library books. Anything that can be done will be done, so </p>
<p>hecklers will always be with us, and so will graffiti, along </p>
<p>with carefully considered letters to editors. Since it is so </p>
<p>easy to add and subtract opinions to a magnetic publication, a </p>
<p>lot of opinionated readers are going to do it. The main purpose </p>
<p>of this venture is to turn audience feedback into an advantage </p>
<p>--- for everyone --- by encouraging constructive criticism </p>
<p>guided by rules for fair comment within the laws governing </p>
<p>copyright and public utterance.</p>
<p> By the nature of this medium, this publication is going to </p>
<p>be shared by an unknown number of readers. Those who want to </p>
<p>give us the benefit of their superior information are asked to </p>
<p>follow these rules. On those matters that readers can wait for, </p>
<p>please append your comments to the end of the file. If you feel </p>
<p>that your information needs to be interjected, then mark the </p>
<p>beginning and end of your contribution with lines or stars.</p>
<p>Please include your name and the date so that we know whom to </p>
<p>credit. If you find mistakes of fact, your immediate correction </p>
<p>is eagerly asked for. Critics looking for an argument improve </p>
<p>their chances by including their addresses. If you are so </p>
<p>offended by some statements that you are compelled to make </p>
<p>deletions, please mark your censorship with a notice of the </p>
<p>amount of text you deleted, in numbers of lines or bytes, and </p>
<p>include your name and date to prove <ent type='ORG'>the courage</ent> of your </p>
<p>convictions. Anyone who wants to retain his copyright on </p>
<p>contributions is advised to include notice of their legal claim </p>
<p>so that no one will assume that all commentaries and </p>
<p>contributions are in the public domain. Expect disputes; </p>
<p>democracy is not for weak stomachs and faint hearts.</p>
<p> Depending on the number of readers who distribute more </p>
<p>copies, and the number of contributions added --- not to mention </p>
<p>subtracted --- my original text will be unrecognizable by the </p>
<p>time this print passes through a dozen recopies. There is no way </p>
<p>to know whether all contributors have marked the changes they </p>
<p>make. Neither is there any way to know whether they have their </p>
<p>facts correct, unless they cite their sources for reference. </p>
<p>Furthermore, these discs are communicated person-to-person </p>
<p>through private, first-class mail, making the message into a </p>
<p>conversation between acquaintances rather than a publication to </p>
<p>strangers; it is permissible to say things in private and </p>
<p>personal mail that is regarded as unethical, if not illegal, in </p>
<p>public utterance. Therefore, all readers must always remember </p>
<p>and bear in mind that the copy they are reading is a </p>
<p>BOUILLABAISSE stirred by many cooks, not a FILET MIGNON SAUTEED </p>
<p>by a chef. Unless you receive a copy that you can certify as </p>
<p>unaltered from the original, do not believe anything that </p>
<p>offends your common sense and don't hold the original author or </p>
<p>signed contributors responsible for statements and/or context </p>
<p>that may have been altered by hecklers who prefer to remain </p>
<p>anonymous (*2). My own editors have altered my manuscripts until </p>
<p>I could hardly recognize my publications as my own compositions </p>
<p>--- usually for the better. If some party suffers personal </p>
<p>injury from this special interest group disc, everyone who </p>
<p>receives it becomes suspect. This is an utterly novel kind of </p>
<p>case for the courts to rule on, not quite so much privileged </p>
<p>privacy as a closed computer conference but still a one-on-one </p>
<p>private correspondence. I dare say that honest mistakes will be </p>
<p>excused with a pointed finger, but deliberate malice producing </p>
<p>suffering to an identifiable person, when proven unjustified in </p>
<p>these litiginous times, will be liable to legal penalties. We may </p>
<p>protect ourselves from slanderous or obscene remarks by scanning </p>
<p>each disc immediately before mailing, to check that no one else </p>
<p>has run the copy and added comments disgraceful to polite </p>
<p>company.</p>
<p> I have enough discoveries in my head to keep me writing </p>
<p>full time for ten years --- I should live so long. In the </p>
<p>likelihood that my insurance is vastly underrated, I am </p>
<p>curtailing my research and graphic design in order to put as </p>
<p>much of my time as I can into getting my ideas written. </p>
<p>Unfortunately, the charter members of this publishing revolution </p>
<p>will receive bare bones of text, a dearth shared by everyone who </p>
<p>buys Version 1.0 of any program. The economy of electronic </p>
<p>publication, however, enables me to update my text whenever I </p>
<p>get a break, add animated illustrations in colour, and enliven </p>
<p>the text with creative layouts in future editions. Most </p>
<p>important of all, as copies eventually find their way back to me </p>
<p>with accumulated reader input, new editions can be issued with </p>
<p>the latest and most extensive information --- better than </p>
<p>anything I can do. This publication can be considered as a book </p>
<p>written by its best qualified readers. In order to receive </p>
<p>updates and new books, all readers will have to send me their </p>
<p>names and addresses, regardless whence they received their </p>
<p>copies. Please bear in mind that my resources are exceedingly </p>
<p>limited, and expect to wait like a <ent type='NORP'>Christian</ent> for me to follow up </p>
<p>in my spare time. I expect this enterprise to be taken over by </p>
<p>more resourceful enthusiasts.</p>
<p> The definitive version of this disc book will be written on </p>
<p>an <ent type='ORG'>APPLE</ent> IIc, in ASCII files; the animated illustrations will be </p>
<p>rendered with DAZZLE DRAW and <ent type='ORG'>FANTAVISION</ent> --- if I can't find </p>
<p>more practical graphics programs. I invested in the <ent type='ORG'>APPLE</ent> system </p>
<p>because I believed all the press reports that the computer field </p>
<p>has more <ent type='ORG'>APPLE</ent> trees planted than anything else. I am deceived; </p>
<p>MS-DOS is the most widely used operating system on this scene. </p>
<p>This original version, however, is written on a KAYPRO II </p>
<p>operated by CP/M 2.2 in <ent type='ORG'>WORDSTAR</ent> 3.3. files. It will take me </p>
<p>time to convert <ent type='ORG'>WORDSTAR</ent> files to ASCII, and then convert both </p>
<p>to MS-DOS. The few graphics included on this disc are drawn with </p>
<p>keyboard characters. Since the ASCII code is standardized only </p>
<p>for alphanumeric characters, computers using different keyboard </p>
<p>codes will produce surprising characters --- the trouble is not </p>
<p>in the disk or your computer.</p>
<p> As long as computers remain inconvenient to read in bed or </p>
<p>on public transportation, I shall concurrently try to find </p>
<p>publishers for paper versions of my disc books. These discs hold </p>
<p>the beginning of a 75000 word paper book, heavily illustrated </p>
<p>with animated illustrations included on disc, under the title </p>
<p>TIME TRAVEL --- <ent type='ORG'>The Secret Science</ent> of The UFOs. Availing myself
----------- ------------------------------
of the impermanent and quasiconversational nature of magnetic </p>
<p>correspondence, I have included many speculations and tangents </p>
<p>on these disks to stimulate response; these unessential essays </p>
<p>will be deleted from the paper version. The heaviest reading is </p>
<p>the Second Chapter; once you establish the theoretical </p>
<p>foundation laid in my repetitive manner of logic, the rest of </p>
<p>the book is freeway, much like the First Chapter. For the first </p>
<p>time, the theory and engineering of time travel are explained in </p>
<p>sufficient practical detail for young physicists to begin </p>
<p>constructing their own <ent type='ORG'>Philadelphia Experiments</ent> in their home </p>
<p>workshops; at least one researcher I know is doing it already, </p>
<p>in <ent type='GPE'>California</ent>. Let me know whether you are willing to buy </p>
<p>TIME TRAVEL --- <ent type='ORG'>The Secret Science</ent> of The UFOs at a prepublication
----------- ------------------------------
price of $10 or a postpublication price of $16. Send no money. I </p>
<p>only want to know whether there is a market for a paper book </p>
<p>before I invest more than I can afford to print it. I apologize </p>
<p>for my inability to acknowlege subscribers to this paper book by </p>
<p>individual letters, as they are received; at a dollar a letter, </p>
<p>the cost of mailing is prohibitive. Subscribers will be notified </p>
<p>individually to write their cheques when the response is </p>
<p>sufficient to underwrite publication. In the meantime, enquiries </p>
<p>from royalty publishers are welcome. Zees is a bootstrap </p>
<p>production, Dollink --- my apologies to Zsa Zsa. </p>
<p> END OF FORWARD </p>
<p>*1 This is the belief taken by <ent type='ORG'>the Government</ent> of the United
States, especially its <ent type='ORG'>Public Broadcasting System</ent>. Assuredly,
what the lord hath given us starving authors with one hand, he
taketh away by truckloads driven by the other. With legal
protection like we got, we are better off with our pirates.
Unless you are a government authorized freebooter, however, the
first hand lays down the law.</p>
<p> Readers who copy programs published in magazines are
subject to the same legal strictures. The magazine publishers do
not assign its readers the right to make copies of their text to
give to their friends, much less sell.</p>
<div>---------------------------------------------------------------</div>
<p>*2 The most heavily edited and censored book in the world is
the Holy Bible, yet its readers are convinced every copy is the
original and every last Word of God. Evidently, God has
afterthoughts --- The New Testament. The Holy Koran is an even
later Word of the very same God compiled from the very same
orginal Scriptures. And don't forget the equally Holy Book of
<ent type='NORP'>Mormon</ent>. I can relate to Him; I am also compelled to rewrite my
original words innumerable times as I get my act together. </p>
<p> I believe the Bible; it is the publishers I question. I
have no doubt that God inspires all His chosen publishers, but I
wonder whether He chose every publisher; after all, the Bible is
in public domain. If God inspired the American Constitution, in
which I believe more than the Bible, He is the Source of the
First Amendment --- entitling Larry Flint to turn a dollar in
the pre-eminently profitable religious market. It isn't belief
in the Bible that fomented the most vicious wars, but belief in
the infallible veracity of the publishers.</p>
</xml>

Some files were not shown because too many files have changed in this diff Show More